Abstract

In recent years, the research of the network control system under the event triggering mechanism subjected to network attacks has attracted foreign and domestic scholars’ wide attention. Among all kinds of network attacks, denial-of-service (DoS) attack is considered the most likely to impact the performance of NCS significantly. The existing results on event triggering do not assess the occurrence of DoS attacks and controller changes, which will reduce the control performance of the addressed system. Aiming at the network control system attacked by DoS, this paper combines double-ended elastic event trigger control, DoS attack, and quantitative feedback control to study the stability of NCS with quantitative feedback of DoS attack triggered by a double-ended elastic event. Simulation examples show that this method can meet the requirements of control performance and counteract the known periodic DoS attacks, which save limited resources and improve the system’s antijamming ability.

1. Introduction

Scholars have recently devoted much energy to studying network security and control stability of network systems against malicious attacks, including denial of service (DoS) attacks, replay attacks, and spoofing attacks. The research results on different types of network attacks can be obtained in the literature [15].

Among all kinds of network attacks, the DoS attack is considered the most likely type of network attack to impact the performance of NCS [6] significantly. In the past few years, the stability analysis of NCS under DoS attacks has been reported in the literature [7, 8]. Besides, because the event-triggered mechanism can be used to reduce the transmission of information without reducing the overall system performance, in recent years, more and more literature have used the event-triggered method to study the control stability of NCS under DoS attacks [9]. For example, in [6], the author, for the first time, investigated the stability analysis of event-triggered networked linear continuous-time systems under known pulse width modulation DoS attacks. Inspired by this work, the author proposes a more general DoS attack model in [10], in which the DoS attack signal is only constrained by DoS frequency and duration. Some extensions are also reported based on this idea, such as the dynamic output feedback controller [11] and distributed NCS [12].

An event trigger mechanism dependent on the Lyapunov function is proposed for nonlinear continuous systems in [13]. Eqtami et al. [14] use ISS’s technology to propose a self-triggering mechanism and a new event triggering mechanism for nonlinear discrete systems. A new event mechanism is proposed for nonlinear systems through Lyapunov in [15]. The asymptotic stability of the system is verified by using the distributed event trigger mechanism in [16], and the small gain theorem for the ISS-Lyapunov function [11] solved the resource consumption and resilient control strategy design of NCS subjected to malicious DoS attacks. In the presence of DoS attacks, the proposed system framework can still guarantee a strictly positive and lower bound on the event time. A system design framework is proposed for the output-based dynamic event trigger control (ETC) system under DoS attacks. De Persis and Tesi [17] studied the effective control strategy of nonlinear systems under a DoS attacks and provided the character of the maximum percentage of time that feedback information can be lost without causing feedback instability. It is based on the design of the event’s elastic control strategy, and the fixed pattern is used as an exact representation of the interval activity interval. The controller triggered by the event has made a clear representation of the minimum cross-sampling time of the controller. Su et al. [18] proposed incremental algorithms for rapidly evolving the network strategies, and the redundancy rules are further processed.

Focusing on defensive strategies against network attacks in cyberphysical system (CPS), Tian et al. [19] proposed both low- and high-interaction honeypots into CPS as a security management tool deliberately designed to be probed, attacked, and compromised. To improve the attack detection capability of content centric network (CCN), Xu et al. [20] proposed a way of interest flooding attack (IFA) making use of the characteristics of self-similarity of traffic and the information entropy of content name of interest packet.

Distributed Denial-of-Service (DDos) attack has become one of the most destructive network attack. Cheng et al. [21] proposed a detection method of DDos’ attacks based on generalized multiple kernel learning combining with the constructed parameter R, and the proposed method can effectively detect DDos’ attacks in complex environments with a higher rate and lower error rate. Chen et al. [22] provided the active approach based on the integrated entropy calculations to detect DDos’ attack. It is a lightweight approach could be applied in mobile device.

2. Preparation

2.1. LMI

The research on LMI (linear matrix inequalities) has been widespread. When it is used to solve control problems, LMI will be used to simplify the practical issues involved. Here are some definitions of LMI and many practical issues of LMI implementation used in later sections [23]. In general, the specific LMI, formula iswhere .. is the measure decision variable of LMI. is the decision vector is a symmetric matrix. Equation (1) is the general form of LMI, but through the exploration of scholars, most of the content of its solution is a variable matrix. If the following Lyapunov inequalitywhere is a real symmetric matrix, is a constantly fixed matrix, is an unknown solution matrix, so most of the contents of the LMI solution are variable matrices. Formulas (1) and (2) are two representations of LMI, but they embody the same essence. Therefore, the resolution of a kind of LMI problem [24] is obtained as follows: for the existing LMI , we can use the function that comes with LMI to solve it, in which there is a function with special meaning, which can be used to test whether the existing x satisfies . This kind of case is the LMI technique to solve the problem, and the solver in the function is expressed by feasp.

2.2. Control Theory

As the core part of robust control, , the theory provides many analysis ideas for control systems and effective solutions for robustness exploration. It can realize the calculation of the norm. By optimizing this kind of function and then designing the controller reasonably within the prescribed constraint conditions, the robustness of the system becomes very good. The block diagram of control is shown in Figure 1.

In addition, is the output information of the controller, is the controlled object, is the external interference information, is the information output of the object, is the measured value, and is the controller.

System objects are considered as follows:where is the input vector of the system, is the measured output of the system, denotes the state vector, represents the control output of the system, and represents the information of the disturbance signal. is a fixed constant matrix.

For any , if formula (3) contains the following properties:(1)If , then the system is stable.(2)If the function is used to represent the relationship between and by calculating the norm, we have

And, then it is equal to

Then, system (5) has performance [25].

Formula (5) is the ability of anti-interference to the outside world, so is called the suppression system to the outside world. The smaller the value of is, the better the control performance of the system will be.

2.3. Some Lemmas

Lemma 1. (Jensen inequality). For constant matrices , scalar , and vector-valued functions . The following formula holds:

Lemma 2. (Schur complement lemma). For symmetric matrices , where is dimensional, “” is a symmetric term, and the following conditions are equivalent: , .

Lemma 3. For the real matrix and the given scalar , the following formula holds: .

3. Problem Description

In the current research results, most of the studies are completed under the assumption that the object can be measured. In the actual system, the information of the object cannot be measured directly, so the NCSs’ study of state feedback under the DoS attack of event-triggered mechanism cannot act on the system directly. Therefore, the NCSs’ research of output feedback under the DoS attack is critical.

3.1. System Description

The model of the system is as follows:where is the input vector, is the state vector, is the interference signal, is the measured output, and is the constant matrix with appropriate dimension.

matrix is an uncertain matrix and must satisfy the condition of (8):where is a fixed constant matrix and is a time-varying unknown matrix with respect to time is and satisfies .

To improve the anti-interference ability of the system in the network, save the limited network resources, and apply the network model attacked by DoS to the control system, the system structure block diagram is shown in Figure 2.

3.2. Establishment of DoS Attack Model

Consider a general attack model that limits the actions of attackers only by limiting the frequency and duration of DoS attacks. It is a kind of periodic network interference signal with energy constraint in the form of pulse width modulation (PWM). Its specific expression is as follows:where is a periodic natural number, is an attack period, is the zero boundary point of DoS attack and non-DoS attack, and . The interval of the network system that is not attacked by DoS is , and the interval of the network system that is attacked by DoS is .

3.3. Establish a Double-Ended Elastic Event Trigger Mechanism

In view of the situation that the controlled object cannot be measured directly, we propose a two-terminal elastic event trigger mechanism which depends on the information of the object and the controller, which can enhance the anti-interference ability of the system and reduce the amount of data transmitted in the network channel at the same time.

The latest sensor trigger time is expressed by , and is used to indicate the next trigger time. If there is no DoS attack, the elastic trigger conditions on the sensor side arewhere is used to represent the threshold function and is used to represent the matrix that needs to be solved, and at the same time, it must satisfywhere is the known constant, the sampling state of the current time, and shows the latest state of the event trigger.

If there is a DoS attack, the trigger condition of the sensor-side trigger will be defined as

If the designed elastic event trigger satisfies condition (10) or (12) and the current state is defined as the latest state , then it is sent to the network. indicates the latest time of the controller, and indicates the next trigger time. If there is no DoS attack, the elastic trigger conditions of the controller are as follows:

Using to express the matrix that needs to be solved, it must satisfy

If there is a DoS attack, the event trigger conditions on the controller side need to be met as follows:

3.4. Establish the Model of Closed-Loop System

According to the study of timing and event mechanism in [25], we define . According to the duration of ZOH, it is finally divided into segments :

In addition, . For :

The combination of (18)–(20) can be described as follows:

Let , i.e., .

Define the function, , i.e.,where .

The set of real-time update times of the feedback forward channel zero-order holder will be expressed as, where . According to the relevant properties of ZOH, the input information of output feedback is

The control input of the controlled plant (7) is

Several functions are defined as follows.(1)Define the function:According to formulas (22), (23), and (25), the controller inputs as(2)Define the function:

According to formulas (22), (24), and (25), the control input of the controlled object (7) is

The feedback controller for output dynamics iswhere is the input vector of dynamic output feedback, is the output vector, and matrix is the matrix with a proper dimension of the state vector .

In the same timing, the input of (29) is substituted into model (7), and the input of (26) is brought into (29). The final closed-loop model is

In order to facilitate the analysis, this chapter introduces the switching signal:

For and, define

Let

Based on the set switching signal , the closed-loop system (30) can be simplified as follows:where

4. Stability Analysis of Closed-Loop System

Through the LMI method and the related theory of Lyapunov, aiming at whether the networked control system is attacked by DoS or not in the unmeasurable state, based on the proposed two-terminal elastic event trigger mechanism, the exponential stability of the system is proved.

Theorem 1. For a given state gain matrix and interference signal (9), the parameters and are known. Consider system (33), for the known positive scalar and the double-ended elastic event trigger parameter , if there is a positive definite matrix and the matrix , while satisfying the following conditionsthen along the system trajectories (4)–(21), for any , there are

Proof. Select the following time-varying Lyapunov functions:When , and are given, for any , when , calculate the derivative at :According to the literature [25], we can obtainThe simplified expressions of the two-terminal elastic event-triggering mechanisms (10)–(13) and trigger functions (23) and (28) can be obtained from the same time sequence of the input of equation (23) and the object input of (28):Combining formulas (38)–(41), (43), and (45),where .
Apparently, of (29) in the closed-loop system is brought into (47) to obtain (48):By using Shur Lemma, the following results are obtained:On the contrary, when , the same result is obtained:According to the condition , it is proved that it is completed if it satisfies .

Theorem 2. For a given state gain matrix and interference signal (9), consider system (33), when the sequence satisfies, and parameters and are known. For known positive scalars and the trigger parameter , such as symmetric, positive, definite matrix, , and matrix . Both (35) and the following inequalities are satisfied:

The closed-loop system (33) under known periodic DoS interference attacks (9) is globally exponentially stable with a decay rate.

According to the judgment basis of Theorems 1 and 2, it is determined that the system is globally exponentially stable. However, there is a coupling relationship between the corresponding matrix and in formula (29), so the controller cannot be directly designed. Therefore, Section 5 is needed to design the controller further.

5. Design of Dynamic Output Feedback Controller

Theorem 3. For the given matrix and pulse width interference signal (9), the sequence and parameters and are known. Considering series (33), for the known positive scalar, and, double-ended elastic event trigger parameter, . If it exists in the positive definite matrix, and the matrix , which is satisfied at the same time:

Then, the closed-loop system (33) is globally exponentially stable under the double-ended elastic event trigger mechanism (11) to (23). Also, the gain matrix of the output feedback controller (29) can be calculated as follows:

Proof. The matrix is decomposed intousing Lemma 1Define the matrix:By using to perform the congruent transformation of the conditions in Theorem 1, the result is obtained:For conversions,Applying Lemma 3 to deal with the coupling term in , the result is obtained:The gain matrix of the controller with output feedback isBecause equation (59) contains an unknown matrix N, the gain cannot be solved directly. Therefore, through the transformation of , the equivalent of solution (29) is as follows:The gain of the controller is expressed as follows:

6. Example Simulation

Considering the general satellite system model in [26, 27] as an example, the specific state-space model is described as (7), and the described matrix is given:

Because the eigenvalue of the system matrix is, the system is unstable without a controller.

In the following, this paper jointly designs the event trigger parameter and and the control parameter form of the event trigger state feedback, and the closed-loop system (33) is exponentially stable in periodic DoS interference attack.

Other parameter settings are as

By using Matlab, the parameters of the two-terminal elastic event trigger mechanism (10), (12), (13), and (15) and the gain matrix of the controller (53) can be obtained as follows:

The internal initial condition system is given and the simulation time is assumed to be . The state graph of DoS attack NCS based on output feedback is shown in Figure 3. Obviously, the system can have good stability through Theorem 3.

Figures 4 and 5 show the data trigger status of the controller and sensor side under the double-ended elastic event trigger mechanism designed in this chapter. The simulation results show that 120 data on the sensor side can meet the conditions of the elastic mechanism (10) and (12), and a total of 132 sampled data on the controller side meet the conditions of the elastic trigger mechanism (13) and (15).

A total of 300 data are required to be sent to the network, and the trigger interval must be 0.1 s. Therefore, after using the method of output feedback, the sensor has 134 data that can meet the conditions of the event mechanism.

As can be seen from Tables 1 and 2, compared with the two-terminal elastic event mechanism and periodic trigger mechanism proposed in this section, it is found that the controller and the sensor side save 55.60% and 60.00% of resources, respectively, and the transmission cycle increases by 0.1273 s and 0.1400 s, respectively. Compared with the single-ended mechanism DoS attack in [28], the controller and sensor side save 4.67% and 55.60% resources, respectively, and the cycle changes are 0.0261 s and 0.1273 s, respectively. Therefore, the double-ended elastic event mechanism proposed in this section meets the performance requirements of the system very well, counteracts the known periodic DoS attacks, saves limited network resources, and improves the antijamming ability of the system.

In order to show the influence of the interference period , this section also solves the following optimization problems for the time interval of different values [0, 40]:

In order to verify the influence of event trigger parameters and on system stability, Tables 3 and 4 are obtained.

To sum up, it can be concluded that (1) the system is stable; (2) the event trigger mechanism can reduce the traffic in the system; (3) the event-based output feedback controller does counteract the impact of periodic interference attacks.

7. Conclusion

Because the information of many objects cannot be directly monitored and there are DoS attacks in the network, this section studies the NCS under the output feedback of DoS attacks triggered by double-ended elastic events. First of all, this work proposes an elastic event trigger mechanism transmission scheme that depends on the information of the object and the controller, in order to reduce the burden of computing and communication and, at the same time, counteract the DoS interference attack imposed by the power-limited pulse width modulation (PWM) jammer. Secondly, based on the elastic event trigger mechanism and the DoS attack model, the closed-loop time-delay switching model of the system is established. Then, through LMI technology and Lyapunov knowledge, the stability criterion of is obtained, which contains the relationship among elastic event trigger mechanism, DoS attack, stability, and delay, and the sufficient conditions of dynamic output feedback controller and elastic event mechanism are obtained. Finally, through a numerical example, it is proved that the double-ended elastic event trigger mechanism designed in this work can not only counteract the impact of DoS attack interference and save network resources but also can better ensure the performance of the system.

Data Availability

The data used to support the findings of this study are available from the corresponding author upon request.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by Science and Technology Development Program of Jilin Province under Grant no. 20180201090GX.