Abstract

This paper is concerned with the security state estimation and event-triggered control of cyber-physical systems (CPSs) under malicious attack. Aiming at this problem, a finite-time observer is designed to estimate the state of the system successfully. Then, according to the state information, the event-triggered controller is designed through the event-triggered communication. It is proved that the system is uniformly and finally bounded. Finally, the effectiveness of the proposed method is verified by a simulation example.

1. Introduction

Nowadays, in modern control systems, network systems, information systems, and control systems show the characteristics of in-depth integration. In order to study this kind of system, the concept of cyber-physical system (CPS) has been put forward in [1]. CPS is a highly integrated and interactive intelligent system between computing units and physical objects in the network environment. However, it is precisely because of the close relationship between information processing and dynamic processes that it is particularly vulnerable to errors or attacks in data transmission. And this can result in much losses or major damage, such as the Brazilian power grid blackouts and the shock waves against Iran virus attack. The security of CPSs has attracted wide attention of the scientific community.

Due to the vulnerability of CPSs, various types of attacks are injected into those systems in a covert and unpredictable way. At present, there are some articles related to the security of information physical systems, which generally contain two categories. The first category focuses on attack detection, such as [26]. The second category focuses on safety state estimation and safety controller design. But most of the current research focuses on the former, and the secure state estimation and the control for CPSs have not been fully investigated. So how to ensure state estimation and control safely in the presence of attacks are still an urgent problem to be solved.

State estimation plays an important role in control theory. It can explain the dynamic characteristics of the system more clearly than the traditional method, and it also can achieve special control tasks. Especially when the state of system cannot be measured directly, state estimation is particularly important. Moreover, designing an appropriate observer is an effective way to solve the problem of state estimation in [7, 8]. Observer is a type of dynamic system that is derived from the actual values of the system’s external variables (input variables and output variables), and it is also called a state reconstructor. They are similar to the reference generator, but their scope of application is different. The reference generator is mainly used for the circuit generation.

When an unknown subset of sensors was arbitrarily destroyed by an opponent, Mishra et al. studied the security estimation of the linear dynamic system in [9]. Mitra and Sundaram studied the problem of collaboratively estimating the state of an LTI system monitored by a network of sensors (nodes) in [10]. When some sensors or actuators were destroyed, Mishra et al. [9] studied the estimation and control of linear systems. A safety state estimation algorithm is proposed. Liao and Chakrabortty [11] also developed a set of algorithms that can detect the identities of malicious data manipulators in large-power system models. However, the above algorithmic method has the disadvantage of losing the correctness guarantee, while the observer-based method has a fast response and saves the computing resources. A novel state observer was proposed in [12, 13]. Lu and Yang studied the problem of security state estimation of network physical systems and proposed a new security Luenberger observer in reference [14]. It should be noted that in [9,1315], the results allow only exponential convergence of the estimation error, or a limited but sufficiently large step to obtain the safety state estimation, which means that it may take quite a long time. This requires a specified finite-time estimate. Although Ao et al. [16] introduced two concepts of elastic observability index and sparse index of the system and designed a finite-time state observer with state correction, the actuator attack is not taken into account. Thus, studying the finite-time state estimate under actuator attack is meaningful.

However, in addition to security state estimation for CPSs, different security control strategies need to be considered to reduce the performance degradation caused by attacks. Recently, a lot of research about the control of CPSs has been lunched, such as [14,1720]. Many effective and novel design methods have been proposed, including linear feedback, sliding mode control, elastic control, and T-S fuzzy control.

For stochastic network attacks in the system, Liu et al. [21] proposed a distributed controller mechanism for stochastic network attacks and verified the stability of the system with Lyapunov function. In [22], a continuous-time controller based on the observer was presented to solve the problem of system reliability control. An improved adaptive resilient control scheme to mitigate the system’s antagonistic attacks was provided in [23]. In addition, Pang et al. and Ding et al. [24, 25] solved the problem of elastic nonlinear control according to the application of industrial 4.0. And Dolk et al. [26] proposed a systematic design framework for output-based dynamic event-triggered control (ETC) systems under denial-of-service (DoS) attacks. In reference [8], an adaptive event trigger scheme based on random sensor fault was proposed. However, most of the above studies are aimed at observer continuous control, and few of them are designed to event-triggered control because of the network resources of CPSs are limited in the integration of computing, network, and physical processes. It is of great significance to study event-triggered control of CPSs under malicious attacks. Although Dolk et al. and Nowzari et al. [26, 27] discussed the event-triggered control for CPSs, they did not consider the malicious attacks.

Motivated by the above reasons, this paper studies the problem of the secure state estimation and event-triggered control for CPSs. The main contributions of this paper are summarized as follows:(1)Inspired by Ao et al. in [16], we have proposed a finite-time observer to estimate the state of the system with actuator attacks. Ao et al. [16] studied the state estimation of systems against sensor attacks, while this article focuses on actuator attacks.(2)Inspired by the study of Zhang and Feng in reference [28], considering the resource constraints of the system, event-triggered control is introduced into the attacked cyber-physical system. Finally, it is proved that the system is uniformly ultimately bounded.(3)Finally, based on the Lyapunov stability analysis method, it is proved that the time interval is not equal to 0, which effectively avoids the Zeno behavior.

2. System Model

The system model iswhere represents the system state vector; and denote the control input vector and the actuator attack; is the output vector; and A, B, D, and C are the system matrices with appropriate dimensions with , where and q = rankD.

Assumption 1. The pairs and are controllable and observable, respectively.

Assumption 2. The system is feedback.

3. Design of the Finite-Time Observer

3.1. Transform of the System

In this part, a finite-time observer for system (1) can be designed. We define with , . Then, the system can be transformed intowhere , in which and . The transformed system (2) under the transformation is given by

Due to the transformation, only the system state of system (2) depends on the attack signal η. Using the transformation , withwhere , , and , we have

Substituting obtained from (5) in (2). The transformed system (2) under the transformation (4) iswith the matrix

3.2. Main Result

In this part, the finite-time observer for system (1) is designed. The finite-time observer consists of two observers for the transformed (7) as follows:with ,with . In equation (10), q is the estimate of the transformed system (7). The state estimate of system (1) is obtained by using the transformation

Hence, the finite-time observer for system (1) iswhere

In (12), define the matrices , , as . It is assumed that with arbitrary but bounded .

Theorem 1. Suppose that the inverse of the matrix exists. Then, (12) defines a finite-time observer for the system (1) and the observer estimates the exact state of system (1) in finite time τ, i.e., .

Proof. The finite-time observer (12) estimates the states of system (1) in finite time τ. One obtains from (12) and (9)

Hence, is in the time interval with , where ,

From equation (15), one can obtain for and then, for ,

Then, for , the estimate of system (1) is

We define the observation error . From (18), it is followed that for all . Therefore, also for all .

Remark 1. The method assumes that the attacker knows the entire physical model. If only partial knowledge of the system is available, the finite-time observer designed in this paper is not available because the observer is designed according to the system parameters, but we can implement the complete model of the system according to the parameter estimation method and then design the observer accordingly. We will carry out related research in the future work.

Remark 2. If the actual physical system is nonlinear, while the attacker only has access to one linear model of it (some operating point) and designs the attack based on that model only, in this case, we should design multiple observer according to the state information of each node as the Ref. [10] says. The attacker can attack one node and affect the closed-loop stability. In the multiple observer setup, the state observer is distributed among multiple computing nodes. So we can design the corresponding observer for the node attacked, according to the nonlinear or linear model of the system. Then by analyzing the stability of each node, we can achieve the closed-loop stability. This is also our future research. In this manuscript, we assume the system is linear, and this is just a special case.

As a summary, a finite-time observer is presented in this section. The observer estimates the exact state of the CPS in a predefined finite time despite the actuator attacks. In the next section, we will discuss the control of the system.

4. Design of the Event-Triggered Controller

In order to better design the controller, in this section, we rewrite the model of system (1) as follows. The symbol means the same implications as before:

4.1. Definition of Event Detectors

In this paper, we consider continuous-time event detectors. In order to reduce the energy consumption caused by sensor data acquisition and frequent communication and to reduce the dependence on global state information in event-triggered control, we design a distributed event-triggered controller in this section. The new state and attack signal will be sampled for control input calculation when the following judgement algorithm is satisfied:where , and , and .

4.2. Main Result

We have already assumed that system (1) is feedback. So under the event-triggered mechanism, the controller can be designed aswhere K is the controller parameter with the appropriate dimension. We use the following theorem to ensure that the system is ultimately bounded. Throughout the discussion, we take the norm of a specific vector as the Euclidean norm.

Theorem 2. Consider the line system (19) under the attack from actuator with sampling instants determined by using (20). For given gain matrices K, if there is a symmetric positive definite matrix satisfying the following matrix inequality,then the system is finally stable and converges to a certain area:where .

Proof. We define . Based on system (19), we can obtain

Considering the Lyapunov function , the time derivative of for is

Notice the sampling instants defined in (20). We can know that as long as , holds. Hence, for , we have

Notice that and both and are continuous for all . Then, always holds for all .

From the above discussion, we can obtain

There are three situations to discuss below. If , we obtain

If , we obtain

If , we have

Similar to the discussion of Theorem 2 in [28], we can conclude that, no matter what the value of is, the global uniform limit of system (19) can be guaranteed. The proof is completed.

Remark 3. In Theorem 2, under the event-driven condition (20), the exponentially decreasing event-driven condition is used to ensure the global uniform limit boundedness of the event-driven observer control system (19). Obviously, if we choose , the event-driven condition (20) will be reduced to the constant event-driven condition considered in [28]. In addition, if we choose , we can also get global asymptotic stability.

Remark 4. The malicious attack in this paper is not a specific type of attack. Any type of attack that satisfies the system can be used. Dolk et al. [26] proposed a systematic design framework for output-based dynamic event-triggered control (ETC) systems under denial-of-service (DoS) attacks. Compared with the methods in [11, 26], the method in this paper is more conservative and general.

4.3. Minimum Interevent Interval

We now prove that there is a minimum time interval to exclude the Zeno behavior of the sampling.

Theorem 3. With the sampling instants determined by using (20), the Zero behavior of the sampling does not exist.

Proof. Let be a sampling instant, and then in the time interval , is constant. For , according to the definition of in (20), we can obtainwherewhereIf , we haveLet , according to the definition of sampling instants (20), and the next event will not be generated before ; then, we haveThis shows that cannot be zero, thus .
Similarly, if , we haveand the lower bound can be computed bywhich also guarantees that .
With the above discussion, we can conclude that there exists a minimum interevent interval. This completes the proof.
As a summary, this section designs an event-triggered observer to solve the control of the CPS despite the actuator attacks. It proves that the system is ultimately bounded by the controller. And the Zeno behavior is effectively avoided. In the next section, the simulation will be presented.

5. Simulation

Without loss of generality, first, we present the simulation of safety state estimate. In this part, the finite-time observer is applied to a DC motor with actuator attack. The linear model of the DC motor iswhere represents the stator current, is the rotor current, is the angular velocity, and is the angular acceleration. We choose the convergent time τ, for example, as , and the parameter L is chosen such that the assumptions of Theorem 1 are fulfilled. The actuator attack is chosen . Figures 1 and 2 show the simulation results with an initial condition , and the finite-time observer (12) has a zero initial condition. Figure 1 shows the states of and and their estimates. Due to the limited space, only the states of and and their estimates are listed to verify the validity. Figure 2 shows the estimation errors. It can be seen that the finite-time observer converges in the predefined finite time , i.e., the estimation errors ; , and are exactly equal to zero after the convergent time τ.

Remark 5. Similar to reference [16], the states of x1 and x4 and their estimates are related to the initial state of the system and the initial state of the observer. Because the designed observer in this paper is finite time, the estimates are irregular before 0.5 s. In addition, the initial state of the system and the initial state of the observer have no effect on the final results, and we can change the initial state to adjust the estimates.
An example of the an inverted pendulum system with a car [28] to simulate the event-triggered control is presented. The linearized system model with actuator attack is given byFor this example, assuming that M = 0.5 kg, m = 0.5 kg, b = 0.1 N/m/s, l = 0.3 m, and M = 0.006 kg·m2. We assume the system’s initial condition is . By using pole assignment technique, one has the control gains as . It can be confirmed that the matrix inequality (22) is feasible for the positive definite matrix P.
Taking , and the actuator attack is chosen . Under the event-driven condition (20), the simulation results are shown in Figures 37. Figure 3 presents the state of the system with the actuator attack under the event-triggered controller (21) and the state of the system without the actuator attack under the event-triggered controller in [28], respectively. Figure 4 presents the state of the system with the actuator attack under the event-triggered controller (21) and continuous controller , respectively. It can be seen that the state of the CPS system is globally uniformly ultimately bounded whether or not attacks exist, and the performance of CPS system with the event-triggered controller is almost the same as the continuous controller. The interevent intervals are given in Figures 5 and 6. Figure 7 shows the signal . Moreover, we also chose and to show different ways the system can be attacked. The results are shown in Figures 8 and 9. It can be seen that the system is ultimately bounded in these different cases.

Remark 6. The system model parameters are related to the state and control inputs of the system. Therefore, the specific computational complexity is also related to the system. However, based on this, the attack added to the model in this manuscript and the complexity is not increased. So the system is more conservative than the system in references [16] and [28].

6. Conclusion

This paper is concerned with the secure state and event-triggered control problem for continuous-time cyber-physical systems under actuator attacks. First, a finite-time observer is constructed to estimate the state of the system. Then, a controller is designed based on the event-triggered communication. Unlike a sampled data control system, the controller is updated only when certain error signals exceed a given threshold. So it can reduce the loss of communication resources. In addition, the results show that the global uniform limit boundedness of CPS can be established. Simulation examples verify the effectiveness of the proposed method.

It should be pointed that, for simplicity, the disturbance and measurement noise are not considered in system (1). If those issues are considered, the event-triggered control problem becomes much more complicated. This is also the subject for our future research.

Data Availability

No data were used to support this study.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

Acknowledgments

This work was supported by the National Key Research and Development Plan under Grant no. 2016YFB0800902, the National Key Research and Development Program of China under Grant no. 2018YFB0803505, the University of Science and Technology Beijing under Grant no. FRF-BD-19-012A, the National Natural Science Foundation of China under Grant no. U1836106, and the Natural Science Foundation of Anhui Province under Grant no. 1708085QA16.