
This article addresses the problem of state estimation for complex networks under hybrid cyber attacks. A hybrid model is constructed to encompass cyber attacks in both deception and denial-of-service (DoS) manners. A dynamic event-triggered mechanism (DETM) is brought into the channel between sensors and the estimator for deducing the transmission frequency. Our primary target is to develop an estimator capable of accurately assessing network states, relying on measurements from partially selected network nodes. Taking use of Lyapunov stability theory and stochastic analysis techniques, several criteria are formulated to guarantee the exponentially mean square ultimate boundedness (EMSUB) of the estimation error dynamics. The estimator gains are determined by resolving specific matrix inequalities. To illustrate the efficacy of our newly devised estimator design approach, a numerical example is provided along with corresponding simulations.
Citation: Lu Zhou, Jin Hu, Bing Li. Partial-nodes-based state estimation for complex networks under hybrid attacks: a dynamic event-triggered approach[J]. Mathematical Modelling and Control, 2025, 5(2): 202-215. doi: 10.3934/mmc.2025015
[1] | Yulin Guan, Xue Zhang . Dynamics of a coupled epileptic network with time delay. Mathematical Modelling and Control, 2022, 2(1): 13-23. doi: 10.3934/mmc.2022003 |
[2] | Zhiqiang Hang, Xiaolin Wang, Fangfei Li, Yi-ang Ren, Haitao Li . Learning-based DoS attack game strategy over multi-process systems. Mathematical Modelling and Control, 2024, 4(4): 424-438. doi: 10.3934/mmc.2024034 |
[3] | Yanfei Wang, Changxi Li, Jun-e Feng . Distributed pinning controllers design for set stabilization of $ k $-valued logical control networks. Mathematical Modelling and Control, 2023, 3(1): 61-72. doi: 10.3934/mmc.2023006 |
[4] | Chang Luo . Local controllability of complex networks. Mathematical Modelling and Control, 2021, 1(2): 121-133. doi: 10.3934/mmc.2021010 |
[5] | Weiwei Han, Zhipeng Zhang, Chengyi Xia . Modeling and analysis of networked finite state machine subject to random communication losses. Mathematical Modelling and Control, 2023, 3(1): 50-60. doi: 10.3934/mmc.2023005 |
[6] | M. Haripriya, A. Manivannan, S. Dhanasekar, S. Lakshmanan . Finite-time synchronization of delayed complex dynamical networks via sampled-data controller. Mathematical Modelling and Control, 2025, 5(1): 73-84. doi: 10.3934/mmc.2025006 |
[7] | Naveen Kumar, Km Shelly Chaudhary . Position tracking control of nonholonomic mobile robots via $ H_\infty $-based adaptive fractional-order sliding mode controller. Mathematical Modelling and Control, 2025, 5(1): 121-130. doi: 10.3934/mmc.2025009 |
[8] | Benjamin Zhang . Limiting behaviors of a bi-virus model with two interaction factors. Mathematical Modelling and Control, 2024, 4(1): 64-70. doi: 10.3934/mmc.2024006 |
[9] | Sheng Wang, Baoli Lei . Dynamics of a stochastic hybrid delay one-predator-two-prey model with harvesting and jumps in a polluted environment. Mathematical Modelling and Control, 2025, 5(1): 85-102. doi: 10.3934/mmc.2025007 |
[10] | Yao Chu, Xiuping Han, R. Rakkiyappan . Finite-time lag synchronization for two-layer complex networks with impulsive effects. Mathematical Modelling and Control, 2024, 4(1): 71-85. doi: 10.3934/mmc.2024007 |
This article addresses the problem of state estimation for complex networks under hybrid cyber attacks. A hybrid model is constructed to encompass cyber attacks in both deception and denial-of-service (DoS) manners. A dynamic event-triggered mechanism (DETM) is brought into the channel between sensors and the estimator for deducing the transmission frequency. Our primary target is to develop an estimator capable of accurately assessing network states, relying on measurements from partially selected network nodes. Taking use of Lyapunov stability theory and stochastic analysis techniques, several criteria are formulated to guarantee the exponentially mean square ultimate boundedness (EMSUB) of the estimation error dynamics. The estimator gains are determined by resolving specific matrix inequalities. To illustrate the efficacy of our newly devised estimator design approach, a numerical example is provided along with corresponding simulations.
Complex networks (CNs), which are large-scale systems consisting of numerous nodes interconnected by edges in specific topological arrangements, create a highly interdependent and dynamic network framework [1]. These networks effectively represent a variety of real-world systems, including sensor networks, neural networks, and biological networks, cited in the literature as references [2,3], and [4], respectively. In recent years, CNs have attracted substantial attention in the fields of intelligent control and system science, as referenced in [5,6,7]. Among the various research areas, the focus on stability and synchronization of CNs has been particularly notable, as highlighted in studies [8,9,10,11,12].
The analysis of CNs relies heavily on state information to decipher their intrinsic structures. However, the acquisition of precise state data in CNs poses a challenge due to issues such as their extensive scale, intricate interconnections between nodes, and uncertainties in their models [13,14,15,16,17,18,19]. Addressing the state estimation challenge in CNs, where only limited measurements are accessible, is crucial for comprehending their dynamic properties. State estimation involves deducing the internal states of network entities using these available data points. This issue has garnered considerable attention from the research community, leading to the development of various robust estimation methodologies. Notably, the H∞ estimation approach focuses on meeting specific performance criteria in the error dynamics of estimation [17]. Another prominent technique is the Kalman estimation method, designed for time-varying CNs. The target of this study is to establish a recursive estimator to minimize the error variance [19]. These methodologies have been pivotal in advancing state estimation in CNs, offering deeper insights into their dynamics and aiding in a more profound understanding of their fundamental network structures.
Existing research on state estimation in CNs often presupposes complete access to measurement data from all network nodes. Nevertheless, in practical situations, this presumption might not be applicable owing to the substantial expense to surveil and sample the complete measurements from a large number of network nodes. Besides, sensors may fail to measure and transmit the signal because of the limitation of communication resources. Additionally, considering the vulnerability of communication networks, the cyber attacks may also cause some of the measurements to be unobtainable by blocking the transmission channel. Given these practical limitations, it becomes vital to explore state estimation strategies that do not rely on data from all nodes. This leads to the concept of partial-nodes-based state estimation (PNBSE), a notion initially introduced in [20]. By utilizing the interdependencies among network nodes and the principle of partial observability, PNBSE posits that the states of unmonitored nodes can be inferred from the available data of the observed ones. Using a subset of nodes for state estimation can offer an effective and precise understanding of the general network dynamics in large-scale CNs, as indicated in references [21,22,23,24,25]. Despite the practical relevance of PNBSE, the literature on this topic remains fragmented. Our study attempts to bridge this gap by offering an extensive analysis of this nascent field.
The evolution of network communication technologies has introduced complexities in managing finite computational resources and shared bandwidth, particularly in sensor-limited networked systems. A common challenge in such environments is bandwidth constraints, often leading to time delays and packet losses. These issues require a strategic reduction in data transmission frequency to conserve network resources. To this end, event-triggered mechanisms (ETMs) have emerged as a solution, transmitting data only when specific conditions are met, as outlined in [26,27]. This approach skillfully balances resource usage and system performance. ETMs can be categorized into static event-triggered mechanisms (SETMs) [28,29] and dynamic event-triggered mechanisms (DETMs) [30,31,32,33]. SETMs operate with fixed threshold parameters, whereas DETMs dynamically adjust these thresholds using auxiliary variables. Recently, DETMs have advanced significantly, becoming increasingly favored for their efficient resource utilization and adaptability, surpassing traditional periodic triggering methods [34]. Integration into network system communications is crucial to improve resource management. However, in the context of CNs, the application of DETMs to PNBSE has not been extensively explored. This gap in the literature forms the primary impetus for our current research, with the aim of examining the problem of PNBSE under DETMs [35,36,37,38,39].
In networked systems, information transmission is pivotal for operational efficiency. Yet, this process is susceptible to cyber threats aimed at impairing network performance [40,41,42,43]. Key threats include deception attacks [44], DoS attacks [45,46], and replay attacks [47]. Deception attacks compromise the integrity of the data, making it difficult to differentiate between true and false information. A DoS attack can interdict the signal transmissions to cause data missing. Notably, attackers often alternate between different attack types, enhancing their disruptive impact. This tactic complicates network analysis and design, posing additional challenges. Although extensive research has been undertaken regarding state estimation in CNs impacted by hybrid cyberattacks [48,49,50,51,52], the majority of these studies have focused primarily on singular systems. Our paper expands this scope to encompass CN security more broadly, integrating the DETM. The aim is two-fold: to optimize the usage of network resources and to strengthen defenses against cyber threats while maintaining system performance.
Taking into account the preceding discussions, this paper aims to examine the challenge of PNBSE in a specific type of CN, which is vulnerable to hybrid attacks, utilizing a DETM. This paper's principal contributions are outlined below:
(1) A hybrid model consisting of DoS and deception attacks is constructed to accurately describe the complexities of real attacks.
(2) The DETM with a variable threshold is designed in the channel between sensor nodes and estimator for the aim of conserving communication resources.
(3) An innovative PNBSE problem is addressed in the context of CNs with considering both network resource demand and the efficiency of state estimation under cyber attacks.
The remainder of this paper is structured as follows: Sec. 2 presents the CN model and outlines the formulation of the problem. Sec. 3 details the main contributions of this paper. An illustrative simulation to showcase the theoretical results is provided in Sec. 4, while Sec. 5 concludes this paper.
Notations: In this study, we define the inverse and transpose of a matrix A as A−1 and AT, respectively. A>0 or A<0 implies that A is a positive or negative definite matrix, respectively. Rn denotes the n-dimensional Euclidean space, and Rn×m denotes the set of all n×m real matrices. The norm of a Euclidean vector is indicated as |⋅|. EA represents the expected value of a random variable A. A block diagonal matrix is denoted by diag{⋅}. For a symmetric matrix P, its minimum and maximum eigenvalues are signified by λmin(P) and λmax(P), respectively. The symbol ⊗ is used to denote the Kronecker product. The set of nonnegative integers is represented by N. The likelihood of an event is expressed as Prob{⋅}. Last, I denotes the identity matrix, appropriately dimensioned for the context.
Consider the discrete CNs with N coupled nodes as follows:
xi(k+1)=Aixi(k)+Bixi(k−τ(k))+f(xi(k))+N∑j=1wijΓxj(k)+Livi(k),i=1,2,…,N, | (2.1) |
where xi(k)=[xi1(k)xi2(k)⋯xin(k)]T∈Rn denotes the state vector of the ith node. The discrete time-varying delay, represented by the positive integer τ(k), adheres to 0<τ1≤τ(k)≤τ2 with τ1,τ2 being positive integers. The inner coupling matrix Γ=diag{γ1,γ2,…,γn}≥0 characterizes the connection of the jth state variable when γj≠0. The process noise vi(k)∈R, a Gaussian white noise sequence of zero mean, satisfies Evi2(k)≤θ21, with θ1 being a positive scalar. The matrices Ai, Bi, and Li are recognized as known real constant matrices. The outer-coupling configuration matrix W=[wij]∈RN×N, indicative of the CNs topology, requires that wij≥0 (i≠j) but not uniformly zero. Generally, W is symmetric and ensures ∑Nj=1wij=∑Nj=1wji=0 for i=1,2,…,N.
The nonlinear function f(⋅) is assumed to be continuous and satisfy the sector-bounded conditions as follows
[f(x)−f(y)−U1(x−y)]T×[f(x)−f(y)−U2(x−y)]≤0 | (2.2) |
for all x,y∈Rn, where U1, U2 are known constant matrices.
This paper aims to determine the states of (2.1) by leveraging measurements obtained from the network. It is crucial to acknowledge that in CNs, factors like limited resources and communication challenges often restrict the ability to gather data from all nodes. Consequently, our approach focuses on estimating the network's overall state using measurements derived from a select subset of nodes.
For the sake of generality, it is presupposed that access to the outputs of the initial q0 nodes is available:
yi(k)=Cixi(k),1≤i≤q0, | (2.3) |
where 0<q0<N, yi(k)=[yi1(k)yi2(k)⋯yim(k)]T∈Rm(1≤m≤n) signifies the measurement output of the ith node, with Ci∈Rm×n being a known constant matrix.
To optimize energy usage, we implement a DETM at each node. This mechanism decides the appropriate moments to transmit measurements to the state estimator. Specifically, for node i (where 1≤i≤q0), the transmission times are designated as 0≤ti0≤ti1≤⋯≤til≤⋯. These transmission times are determined on the basis of a predefined criterion:
til+1=min{k∈N∣k>til,1δiρi(k)+σiyTi(k)yi(k)−ξTi(k)ξi(k)≤0}, | (2.4) |
where δi and σi represent specified positive scalars, ξi(k) is defined as ξi(k)=yi(k)−yi(til), yi(til) represents the difference from the last transmitted measurement. Furthermore, ρi(k) serves as an internal dynamical variable determined by
ρi(k+1)=πiρi(k)+σiyTi(k)yi(k)−ξTi(k)ξi(k), | (2.5) |
where 0<πi<1 and ρi(0)=ρi0≥0 is a specified initial condition.
With ξi(k)=yi(k)−yi(til), the corresponding measurement output in the aforementioned scheme is depicted as
ˉyi(k)=yi(til). | (2.6) |
It is important to note the data safety concerns stemming from the susceptibility of transmitted data to cyber threats. To effectively encapsulate the characteristics of these cyberattacks, the measurement that the estimator receives is modeled in the following manner.
˜yi(k)=α(k)(ˉyi(k)+β(k)→yi(k)),1≤i≤q0 | (2.7) |
where →yi(k)=−ˉyi(k)+ϖ(k) stands for the deceptive attack signal injected by the hostile attacker. Here, ˜yi(k)∈Rm is the measurement signal actually received from node i, ϖ(k)∈Rm is an error signal that satisfies
E{ϖT(k)ϖ(k)}≤θ22, | (2.8) |
with θ2 being a given positive scalar. The variables α(k) and β(k), both Bernoulli-distributed, are independently mutual and comply with these statistical characteristics:
E{α(k)}=Prob{α(k)=1}=ˉα,E{β(k)}=Prob{β(k)=1}=ˉβ. |
From this, we have
E{α(k)−ˉα}=0,E{(α(k)−ˉα)2}=ˉα(1−ˉα),E{β(k)−ˉβ}=0,E{(β(k)−ˉβ)2}=ˉβ(1−ˉβ), |
where ˉα, ˉβ∈[0,1].
Remark 2.1. This research focuses on the adversary's goal to impair estimation accuracy by targeting the transmitted measurement ˉyi(k). In the framework of model (2.7), a scenario where α(k)=0 indicates a successful DoS attack, effectively halting all data transmission within the communication network. On the contrary, when α(k)=1 and β(k)=1, the measurement output undergoes a deception attack, leading to the replacement of authentic data with a false signal. Notably, the condition α(k)=1 and β(k)=0 signifies the secure transmission of measurement data to the estimator, free from cyberattacks. Both DoS and deception attacks may occur in varying patterns, either alternately or concurrently. Our numerical simulations consider scenarios where DoS attacks co-occur with deceptive tactics.
Utilizing the measurements from q0 nodes, the subsequent state estimators are constructed:
{ˆxi(k+1)=Aiˆxi(k)+Biˆxi(k−τ(k))+f(ˆxi(k))+N∑j=1wijΓˆxj(k)+Ki(˜yi(k)−α(k)Ciˆxi(k)),i=1,2,…,q0,ˆxi(k+1)=Aiˆxi(k)+Biˆxi(k−τ(k))+f(ˆxi(k))+N∑j=1wijΓˆxj(k)i=q0+1,q0+2,…,N, | (2.9) |
where ˆxi(k) is the estimation of xi(k), and Ki∈Rn×m (i=1,…,q0) are the estimator gain parameters to be designed.
Define ei(k)=xi(k)−ˆxi(k) as the state estimation error, which is characterized by the following equation:
{ei(k+1)=Aiei(k)+Biei(k−τ(k))+˜f(ei(k))+N∑j=1wijΓej(k)+Livi(k)−Ki(˜yi(k)−α(k)Ciˆxi(k)),i=1,2,…,q0,ei(k+1)=Aiei(k)+Biei(k−τ(k))+˜f(ei(k))+N∑j=1wijΓej(k)+Livi(k),i=q0+1,q0+2,…,N, | (2.10) |
where ˜f(ei(k))=f(xi(k))−f(ˆxi(k)).
To simplify the notation, it is further denoted
ℵ=[ℵT1ℵT2⋯ℵTN]T,(ℵ=x(k),x(k−τ(k)),v(k),e(k),e(k−τ(k))),F(x(k))=[fT(x1(k))⋯fT(xN(k))]T,R1=[II⋯I]Tm×q0m,ˉC=[C0],F(e(k))=[˜fT(e1(k))⋯˜fT(eN(k))]T,ℑ=diag{ℑ1,ℑ2,…,ℑN}(ℑ=A,B,L),Re=[ℜT1⋯ℜTq0]T(ℜ=ξ(k),y(k)),ℷ=diag{ℷ1,ℷ2,…,ℷq0}(ℷ=K,C),ˉK=[KT0]T. |
Subsequently, the dynamics of (2.10) is reformulated into the concise format
e(k+1)=Ae(k)+Be(k−τ(k))+F(e(k))+W⊗Γe(k)+Lv(k)−α(k)ˉKˉCe(k)+α(k)(1−β(k))ˉKξ(k)+α(k)β(k)ˉKˉCx(k)−α(k)β(k)ˉKR1ϖ(k). | (2.11) |
By defining η(k)=[xT(k)eT(k)]T and F(η(k))=[FT(x(k))FT(e(k))]T we attain the following augmented system:
η(k+1)=Aη(k)+Bη(k−τ(k))+F(η(k))+Lv(k)−α(k)C1η(k)+α(k)β(k)C2η(k)+α(k)(1−β(k))R2ξ(k)−α(k)β(k)R1ϖ(k), | (2.12) |
where
A=[A+W⊗Γ00A+W⊗Γ],B=[B00B]L=[LL],C1=[000ˉKˉC],C2=[00ˉKˉC0]R1=[0ˉKR1],R2=[0ˉK],C=[ˉC0]. |
In order to facilitate subsequent analysis, it is necessary to perform some required processing on (2.12). As a result, (2.12) can be reformulated as follows:
η(k+1)=Γ1+(α(k)−ˉα)Γ2+(β(k)−ˉβ)Γ3+(α(k)−ˉα)(β(k)−ˉβ)Γ4, | (2.13) |
where
Γ1=Aη(k)+Bη(k−τ(k))+F(η(k))+Lv(k)−ˉαC1η(k)+ˉαˉβC2η(k)+ˉα(1−ˉβ)R2ξ(k)−ˉαˉβR1ϖ(k),Γ2=−C1η(k)+ˉβC2η(k)+(1−ˉβ)R2ξ(k)−ˉβR1ϖ(k),Γ3=ˉαC2η(k)−ˉαR2ξ(k)−ˉαR1ϖ(k),Γ4=C2η(k)−R2ξ(k)−R1ϖ(k). |
The ensuing definition is pivotal in the upcoming analysis and the design of the estimator.
Definition 2.1. The evolution of the dynamics of the augmented estimation error according to (2.12) achieves the EMSUB status if there are positive scalars d,ˉγ, and μ∈[0,1) such that
E{‖η(k)‖2}≤dμk+γ(k),limk→+∞γ(k)=ˉγ. |
This section delves into the state estimation challenge for CN (2.1), focusing specifically on data from a subset of network nodes. Initially, we present an essential lemma for subsequent derivations.
Lemma 3.1. For the DETM (2.4)-(2.5) with ρi0≥0 (1≤i≤q0), the internal dynamic variable satisfies ρi(k)≥0 for all k≥0 if the parameters πi (0<πi<1) and δi (δi>0) satisfy πiδi≥1.
Proof. For all k≥0, according to the triggering condition (2.4), it follows that
1δiρi(k)+σiyTi(k)yi(k)−ξTi(k)ξi(k)≥0. |
Subsequently, by virtue of Eq (2.5), one deduces that
ρi(k+1)≥(πi−1δi)ρi(k)≥⋯≥(πi−1δi)k+1ρi0, |
which leads to the clear observation that ρ(k)≥0 for all k≥0 given the prerequisites πiδi≥1 and ρi0≥0. Hence, the proof is concluded.
Theorem 3.1. For all i=1,2,…,q0, assume that Lemma 3.1 is satisfied. Given the estimator parameters Ki and the positive constants θ1, θ2. The augmented estimation error dynamics, as indicated in (2.12), achieves EMSUB status provided there are matrices P=diag{P1,P2}>0 (P1=diag{P11,P12,…,P1N}, P2=diag{P21,P22,…,P2N}), Q>0, and positive scalars λ1, λ2, λ3, λ4 satisfying
Ξ=[Ψ∗ˉPˉΞ−ˉP]<0, | (3.1) |
where ˉP=diag{P,P,P,P},
Ψ=[Ψ11λ3(I⊗˜U2)00000∗−λ3I00000∗∗−Q0000∗∗∗−λ1I000∗∗∗∗−λ2I00∗∗∗∗∗−Ψ660∗∗∗∗∗∗Ψ77],ˉΞ=[Ξ1Tχ2αΞT2χ2βΞT3χ2αχ2βΞT4]T,Ξ1=[Ξ11IBL−ˉαˉβR1ˉα(1−ˉβ)R20],Ξ2=[−C1+ˉβC2000−ˉβR1(1−ˉβ)R20],˜U1=UT1U2+UT2U12,˜U2=UT1+UT22,Ξ3=[ˉαC2000−ˉαR1−ˉαR20],Ξ4=[C2000−R1−R20],Ψ77=diag{π1−1+λ4δ1,…,πq0−1+λ4δq0}Ψ66=diag{(1δ1+λ4)I,…,(1δq0+λ4)I},Ξ11=A−ˉαC1+ˉαˉβC2,θ2=λ1Nθ21+λ2θ22,Ψ11=−P+(τ2−τ1+1)Q+ΦCTC−λ3(I⊗˜U1),Φ=diag{(λ4σ1+σ1δ1)I,…,(λ4σq0+σq0δq0)I}. |
Proof. We select the following Lyapunov functional candidate:
M(k)=V(k)+ρ(k), | (3.2) |
where
V(k)=3∑i=1Vi(k),ρ(k)=q0∑i=11δiρi(k), |
with V1(k)=ηT(k)Pη(k), V2(k)=k−1∑i=k−τ(k)ηT(i)Qη(i), V3(k)=k−τ1∑j=k−τ2+1k−1∑i=jηT(i)Qη(i). According to system (2.13), the mathematical expectations of the variation in V(k) and ρ(k) are calculated as
E{ΔV1(k)}=E{V1(k+1)−V1(k)}=ΓT1PΓ1+χ2αΓT2PΓ2+χ2βΓT3PΓ3+χ2αχ2βΓT4PΓ4−ηT(k)Pη(k), | (3.3) |
where χ2α=ˉα(1−ˉα), χ2β=ˉβ(1−ˉβ).
E{ΔV2(k)}=ηT(k)Qη(k)−ηT(k−τ(k))Qη(k−τ(k))+k−τ1∑i=k−τ(k+1)+1ηT(i)Qη(i)+k−1∑i=k−τ1+1ηT(i)Qη(i)−k−1∑i=k−τ(k)+1ηT(i)Qη(i)≤ηT(k)Qη(k)−ηT(k−τ(k))Qη(k−τ(k))+k−τ1∑i=k−τ2+1ηT(i)Qη(i). | (3.4) |
E{ΔV3(k)}=(τ2−τ1)ηT(k)Qη(k)−k−τ1∑i=k−τ2+1ηT(i)Qη(i) | (3.5) |
and
E{Δρ(k)}=q0∑i=11δi(ρi(k+1)−ρi(k))=q0∑i=11δi[(πi−1)ρi(k)+σiyTi(k)yi(k)−ξTi(k)ξi(k)]=q0∑i=1πi−1δiρi(k)+q0∑i=1σiδiyTi(k)yi(k)−q0∑i=11δiξTi(k)ξi(k). | (3.6) |
On the other hand, by considering E{v2i(k)}≤θ21, one obtains
E{vT(k)v(k)}≤Nθ21. | (3.7) |
Taking into account the non-linearity (2.2), one has
Λ=[η(k)F(η(k))]T[I⊗˜U1I⊗(−˜U2)∗I][η(k)F(η(k))]≤0. | (3.8) |
Based on the triggering condition (2.4), we derive
q0∑i=11δiρi(k)+q0∑i=1σiyTi(k)yi(k)−q0∑i=1ξTi(k)ξi(k)≥0. | (3.9) |
Additionally, it follows from (3.3)–(3.5) that
E{ΔV(k)}≤ΓT1PΓ1+χ2αΓT2PΓ2+χ2βΓT2PΓ2+χ2αχ2βΓT3PΓ3−ηT(k)Pη(k)−ηT(k−τ(k))Qη(k−τ(k))+(τ2−τ1+1)ηT(k)Qη(k)≤ˉηT(k)(ˉΞTˉPˉΞ)ˉη(k)+(τ2−τ1+1)ηT(k)Qη(k)−ηT(k)Pη(k)−ηT(k−τ(k))Qη(k−τ(k)), | (3.10) |
where ˉρ(k)=[ρ121(k)ρ122(k)⋯ρ12q0(k)]T, ˉη(k)=[ηT(k),FT(η(k)),ηT(k−τ(k)),vT(k),ϖT(k),ξT(k),ˉρ(k)]T.
By taking (2.8) and (3.7)–(3.9) into account, it is deduced from (3.6) and (3.10) that
E{ΔM(k)}=E{ΔV(k)}+E{Δρ(k)}≤ˉηT(k)(ˉΞTˉPˉΞ+Ψ)ˉη(k)+θ2. | (3.11) |
Utilizing the Schur complement lemma on (3.1) yields
ˉΞTˉPˉΞ+Ψ<0. |
From this, we can further deduce:
E{ΔM(k)}≤aE{‖φ(k)‖2}+θ2, | (3.12) |
where φ(k)=[ηT(k)ˉρT(k)]T and a=λmax(ˉΞTˉPˉΞ+Ψ).
Due to the definition of M(k), we conclude that
E{M(k)}≤(τ2−τ1+1)λmax(Q)k−1∑i=k−τ2E{‖η(i)‖2}+λmax(P)E{‖η(k)‖2}+q0∑i=11δiρi(k)≤(τ2−τ1+1)λmax(Q)k−1∑i=k−τ2E{‖φ(i)‖2}+bE{‖φ(k)‖2}, | (3.13) |
where b=max{λmax(P),(1/δ1),…,(1/δq0)}.
For a given scalar c>1, the aforementioned inequality (3.13) implies that
E{ck+1M(k+1)}−E{ckM(k)}=ck+1E{M(k+1)−M(k)}+ck(c−1)E{M(k)}≤ckψ(c)E{‖φ(k)‖2}+ckϱ(c)k−1∑i=k−τ2E{‖φ(i)‖2}+ck+1θ2, | (3.14) |
where ψ(c)=ca+(c−1)b, ϱ(c)=(c−1)(τ2−τ1+1)λmax(Q).
Assuming r≥τ2+1 is a positive integer and summing both sides of (3.14) from 0 to r−1 with respect to k, it results in
E{crM(r)}−E{M(0)}≤ψ(c)r−1∑k=0ckE{‖φ(k)‖2}+c(1−cr)1−cθ2+ϱ(c)r−1∑k=0k−1∑i=k−τ2ckE{‖φ(i)‖2}, | (3.15) |
where ϱ(c)r−1∑k=0k−1∑i=k−τ2ckE{‖φ(i)‖2} can be computed as follows:
ϱ(c)r−1∑k=0k−1∑i=k−τ2ckE{‖φ(i)‖2}≤ϱ(c)(−1∑i=−τ2i+τ2∑k=0+r−1−τ2∑i=0i+τ2∑k=i+1+r−1∑i=r−τ2r−1∑k=i+1)ckE{‖φ(i)‖2}≤ϱ(c)τ2−1∑i=−τ2ci+τ2E{‖φ(i)‖2}+ϱ(c)τ2r−1−τ2∑i=0ci+τ2E{‖φ(i)‖2}+ϱ(c)τ2r−1∑i=r−τ2ci+τ2E{‖φ(i)‖2}≤ϱ(c)τ2cτ2c−1max−τ2≤i≤0E{‖φ(i)‖2}+ϱ(c)τ2cτ2r−1∑i=0ciE{‖φ(i)‖2}. | (3.16) |
Then, it is obtained that
E{crM(r)}−E{M(0)}≤ψ(c)r−1∑k=0ckE{‖φ(k)‖2}+τ2cτ2ϱ(c)r−1∑i=0ciE{‖φ(i)‖2}+τ2cτ2ϱ(c)c−1max−τ2≤i≤0E{‖φ(i)‖2}+c(1−cr)1−cθ2=τ2cτ2ϱ(c)c−1max−τ2≤i≤0E{‖φ(i)‖2}+c(1−cr)1−cθ2+ϵ(c)r−1∑k=0ckE{‖φ(k)‖2}, | (3.17) |
where ϵ(c)=ψ(c)+τ2cτ2ϱ(c).
Since ϵ(1)=a<0 and ϵ(+∞)=+∞, we can find a scalar c0>1 such that ϵ(c0)=0. Therefore, we have
E{crM(r)}−E{M(0)}≤τ2cτ20ϱ(c0)c0−1max−τ2≤i≤0E{‖φ(i)‖2}+c0(1−cr0)1−c0θ2. | (3.18) |
From (3.13), it is obvious that
E{M(0)}≤ςτ2max−τ2≤i≤0E{‖φ(i)‖2}, | (3.19) |
in which ς=max{b,(τ2−τ1+1)λmax(Q)}. Furthermore, according to the definition of M(k), one derives
E{M(r)}≥uE{‖φ(r)‖2}, | (3.20) |
with u=min{λmin(P),(1/δ1),…,(1/δq0)}.
By substituting (3.19) and (3.20) into (3.18), one has
E{‖φ(r)‖2}≤ϕ(c0)ucr0+cr0−1ucr−10(c0−1)θ2, | (3.21) |
with ϕ(c0)=(ςτ2+τ2cτ20ϱ(c0)c0−1)max−τ2≤i≤0E{‖φ(i)‖2}.
Consequently, we obtain the final result
E{‖η(k)‖2}≤E{‖φ(r)‖2}≤ϕ(c0)ucr0+(cr0−1)θ2ucr−10(c0−1). | (3.22) |
According to Definition 2.1, the augmented system (2.12) is said to be EMSUB by setting d=(ϕ(c0)/u), μ=(1/c0) and γ(r)=(cr0−1)θ2/ucr−10(c0−1). Moreover, the ultimate bound is derived as
ˉγ=limr→+∞γ(r)=c0θ2u(c0−1), |
with c0>1 satisfying ψ(c0)+τMcτ20ϱ(c0)=0. Thus, the proof of this theorem is concluded.
Theorem 3.2. Let Lemma 3.1 be satisfied and positive constants θ1, θ2 be given. The augmented estimation error dynamics (2.12) is EMSUB if there exist matrices P>0, Q>0, real-valued matrices ˉX=[XT0]T (X=diag{X1,X2,…,Xq0}), and positive scalars λ1, λ2, λ3, λ4 such that
Π=[Ψ∗˜Ξ−ˉP,]<0 | (3.23) |
in which P has the same structure as that of Theorem 3.1, ˜ΞT=[˜Ξ1T,χ2α˜Ξ2T,χ2β˜Ξ3T,χ2αχ2β˜ΞT4],
˜L=[PLPL],˜B=[PB00PB],˜C1=[000ˉXˉC],˜Ξ1=[˜Ξ11P˜B˜L−ˉαˉβ˜R1ˉα(1−ˉβ)˜R20],˜C2=[00ˉXˉC0]˜Ξ11=˜A−ˉα˜C1+ˉαˉβ˜C2,˜Ξ2=[−˜C1+ˉβ˜C2000−ˉβ˜R1(1−ˉβ)˜R20],˜Ξ3=[ˉα˜C2000−ˉα˜R1−ˉα˜R20],˜Ξ4=[˜C2000−˜R1−˜R20],˜A=[PA+PW⊗Γ00PA+PW⊗Γ],˜R1=[0ˉXR1],˜R2=[0ˉX], |
and Ψ is defined in (3.1). Additionally, the estimator gain matrix can be obtained by:
Ki=P−12iXi,(i=1,2,…,q0). | (3.24) |
Proof. Letting ˉX=P2ˉK, the substantiation of Theorem 3.2 is directly derived from the proof of Theorem 3.1.
It is worth noting that when we take δi→+∞, the proposed DETM encompasses the static one as follows:
til+1=min{k∈N∣k>til,σiyTi(k)yi(k)−ξTi(k)ξi(k)<0}, | (3.25) |
for all i=1,2,…,q0. As such, the corresponding results for the SETM can be easily derived from Theorem 3.2.
Corollary 3.1. Let the positive constants θ1, θ2 be given. The augmented estimation error dynamics (2.12) is EMSUB under the SETM (3.25) if there exist matrices ˜P>0, ˜Q>0, real-valued matrices ˜X=[˘XT0]T (˘X=diag{(˘X1,˘X2,…,˘Xq0}) and positive scalars ˜λ1, ˜λ2, ˜λ3, ˜λ4 that meet the subsequent inequality:
Υ=[Θ∗→PˉΥ−→P]<0, | (3.26) |
where ˉΥT=[Υ1T,χ2αΥ2T,χ2βΥ3T,χ2αχ2βΥ4T],
Θ=[Θ11˜λ3(I⊗˜U2)0000∗−˜λ3I0000∗∗−˜Q000∗∗∗−˜λ1I00∗∗∗∗−˜λ2I0∗∗∗∗∗−Θ66],Θ11=−˜P+(τ2−τ1+1)˜Q+˜ΦCTC−˜λ3(I⊗˜U1),→P=diag{˜P,˜P,˜P,˜P}˜Φ=diag{˜λ4σ1I,…,˜λ4σq0I},Θ66=diag{˜λ4I,…,˜λ4I},˜θ2=˜λ1Nθ21+˜λ2θ22,→L=[˜PL˜PL],→B=[˜PB00˜PB],→R1=[0˜XR1],→R2=[0˜X],Υ1=[Υ11˜P→B→L−ˉαˉβ→R1ˉα(1−ˉβ)→R2],Υ11=→A−ˉα→C1+ˉαˉβ→C2,Υ2=[−→C1+ˉβ→C2000−ˉβ→R1(1−ˉβ)→R2],Υ3=[ˉα→C2000−ˉα→R1−ˉα→R2],Υ4=[→C2000−→R1−→R2],→C2=[00˜XˉC0],→C1=[000˜XˉC],→A=[˜PA+˜PW⊗Γ00˜PA+˜PW⊗Γ]. |
If the inequality (3.26) is attainable, the desired estimator parameters can be represented by
Ki=˜P−12i˘Xi,(i=1,2,…,q0), | (3.27) |
which guarantees that the augmented estimation error dynamics (2.12) achieves EMSUB, with the ultimate bound described as follows
ˉγ=˜c0˜θ2˜u(˜c0−1), |
where ˜u=λmin(˜P) and ˜c0>1 satisfies
˜ψ(˜c0)+τ2˜cτ20˜ϱ(˜c0)=0 |
with
˜a=λmax(ˉΥT→PˉΥ+Θ),˜b=λmax(˜P),˜ψ(˜c)=˜c˜a+(c−1)˜b,˜ϱ(˜c)=(˜c−1)(τ2−τ1+1)λmax(˜Q). |
Proof. The proof of this corollary can be directly deduced from Theorem 3.1 upon letting δi→+∞ (i=1,2,…,q0).
Remark 3.1. The DETC-based PNBSE issue has been addressed for CNs under hybrid cyberattacks. This theorem distinguishes itself from existing research results in the following three aspects:
(1) By considering hybrid attacks including both DoS and deception forms, the state estimator is designed to make the error dynamics adhere to EMSUB in the sense of security requirements.
(2) An DETM with dynamical variable is introduced for effectively reducing the data transmission from sensors to estimator while guaranteeing the estimation performance.
(3) It pioneers a technique for state estimation in CNs that relies on acquiring measurements from a selective group of nodes, optimizing both resource allocation and data accuracy.
In this section, a numerical example is provided to illustrate the efficacy of the state estimation approach developed in this research.
Considering a CN with four nodes described in (2.1), we focus on accessing measurements from only the first two nodes. The network parameters are chosen as below:
A1=A2=[−0.02−0.05−0.040.060.05−0.020.010.02−0.03],A3=A4=[−0.01−0.03−0.020.030.02−0.020.040.01−0.02],B1=B2=[0.010.020.010.01−0.010.010.020.010.02],B3=B4=[0.020.010.020.03−0.010.010.020.030.02],L1=L2=[0.020.010.1],L3=L4=[0.010.030.01],C1=C2=[0.20.20.20.10.10.2],W=[−0.050.020.020.010.02−0.050.020.010.020.02−0.060.020.010.010.02−0.04],Γ=0.55I,τ(k)=2+1+(−1)k2,τ1=2,τ2=3,σ1=0.4,σ2=0.5,θ1=0.2,θ2=0.3,δ1=δ2=12,ˉα=0.4,ˉβ=0.2,π1=0.7,π2=0.5. |
The nonlinear vector-valued functions f(xi(k)) (i=1,2,3,4) are selected to be
f(xi(k))=[f1(xi(k)),f2(xi(k)),f3(xi(k))]T, |
wherein
f1(xi(k))=−0.1xi1(k)+0.1(|xi1(k)+2|−|xi1(k)−2|)+0.1xi2(k),f2(xi(k))=tanh(−0.2xi2(k)),f3(xi(k))=tanh(−0.2xi3(k)), |
xir(k)(r=1,2,3) denotes the r-th component of xi(k). Consequently, it is readily obtained that
U1=[0.10.100−0.2000−0.2],U2=[−0.10.10000000] |
satisfy the assumption (2.2).
By solving the LMI (3.23) with the help of the MATLAB toolbox, a type of feasible solution is attained as follows:
λ1=0.1295,λ2=0.1295,λ3=0.1130,λ4=0.0332,X1=X2=[0.0086−0.00300.0085−0.00300.0085−0.0030], |
which further implies the gain matrices of the state estimator (2.9)
K1=K2=[0.1705−0.05210.3122−0.11890.2501−0.0883]. |
For the purpose of simulation, the initial conditions of the states and the estimates are chosen as xi(0)=[0.10.10.1]T and ˆxi(0)=[000]T for i=1,2,3,4. The initial values of the internal dynamic variable are taken as ρ10=ρ20=1. The simulation results are shown in Figures 1–4. To be more specific, Figure 1 shows the occurrence instants of deception attacks and DoS attacks. The net nodes 1 and 2 are selected to be implement the event-triggered strategy. The release instants of DETM and SETM are described in the Figure 2 from which we note the transmission frequency of output signals is reduced dramatically. Figure 3 shows the estimation errors tend to a small domain of zero rather than converge to zero due to bounded perturbations, which indicates the dynamics of the augmented estimation error system achieve the desired EMSUB performance. Figure 4 depicts the evolution of the root mean square error of the augmented estimation error system. Table 1 presents the triggering rates of nodes 1 and 2 under different parameter selections for δi (i=1,2). The trigger rates are observed to show a consistent increase as the parameters δi (i=1,2) increase. In particular, according to (2.4), the DETM will reduce to the SETM when δi→+∞. Thus, both Table 1 and Figure 2 demonstrate that the DETM can reduce the frequency of triggers more effectively compared to the SETM. The simulation result has verified the efficiency of the implemented DETM.
Values of δi | Triggering of Node1 | Triggering of Node2 |
δ1=δ2=12 | 20% | 10% |
δ1=δ2=80 | 30% | 16.7% |
δ1=δ2=280 | 43.3% | 23.3% |
Static event-triggered case | 80% | 40% |
In this work, we addressed the PNBSE issue for CNs subjected to hybrid cyberattacks including both DoS and deception attacks. An innovative state estimator was designed by taking use of data from selected network nodes. The DETM was applied in the data transmission process between sensors and their respective state estimators, enhancing communication resource efficiency. A comprehensive condition was established to ensure the estimation error dynamics meet the EMSUB performance. Furthermore, we derived the state estimate gain matrices by solving LMIs. The efficacy of our proposed estimation method was validated through a numerical simulation. In the future, our research will concentrate on exploring potent optimization techniques to further refine state estimation performance.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
The authors would like to express their sincere thanks to the Editor and anonymous reviewers for their helpful comments and suggestions. This work was partially supported by the National Natural Science Foundation of China under Grants 62273066 and 62276034, the Natural Science Foundation of Chongqing under Grant CSTB2023NSCQ-LZX0092, and the Joint Training Base Construction Project for Graduate Students in Chongqing under Grant JDLHPYJD2021016.
All authors declare that there are no conflicts of interest in this paper.
[1] | S. H. Strogatz, Exploring complex networks, Nature, 410 (2001), 268–276. https://doi.org/10.1038/35065725 |
[2] |
H. Dong, Z. Wang, F. E. Alsaadi, B. Ahmad, Event-triggered robust distributed state estimation for sensor networks with state-dependent noises, Int. J. General Syst., 44 (2015), 254–266. https://doi.org/10.1080/03081079.2014.973726 doi: 10.1080/03081079.2014.973726
![]() |
[3] |
H. Liu, Z. Wang, B. Shen, X. Liu, Event-triggered H∞ state estimation for delayed stochastic memristive neural networks with missing measurements: the discrete time case, IEEE T. Neural Netw. Learn. Syst., 29 (2018), 3726–3737. https://doi.org/10.1109/TNNLS.2017.2728639 doi: 10.1109/TNNLS.2017.2728639
![]() |
[4] |
S. V. Vasaikar, B. Jayaram, J. Gomes, B. Jayaram, Rapid computation and interpretation of Boolean attractors in biological networks, J. Complex Netw., 3 (2015), 147–157. https://doi.org/10.1093/comnet/cnu011 doi: 10.1093/comnet/cnu011
![]() |
[5] |
R. M. D'Souza, M. Bernardo, Y. Y. Liu, Controlling complex networks with complex nodes, Nat. Rev. Phys., 5 (2023), 250–262. https://doi.org/10.1038/s42254-023-00566-3 doi: 10.1038/s42254-023-00566-3
![]() |
[6] |
D. A. Burbano, G. Russo, M. Bernardo, Pinning controllability of complex network systems with noise, IEEE T. Control Netw. Syst., 6 (2019), 874–883. https://doi.org/10.1109/TCNS.2018.2880300 doi: 10.1109/TCNS.2018.2880300
![]() |
[7] |
I. Macaluso, C. Galiotto, N. Marchetti, L. Doyle, A complex systems science perspective on wireless networks, J. Syst. Sci. Complex, 29 (2016), 1034–1056. https://doi.org/10.1007/s11424-016-4122-8 doi: 10.1007/s11424-016-4122-8
![]() |
[8] |
X. Wan, Z. Wang, M. Wu, X. Liu, H∞ state estimation for discrete-time nonlinear singularly perturbed complex networks under the round-robin protocol, IEEE T. Neural Netw. Learn. Syst., 30 (2019), 415–426. https://doi.org/10.1109/TNNLS.2018.2839020 doi: 10.1109/TNNLS.2018.2839020
![]() |
[9] |
T. Fang, J. Sun, Further Investigate the stability of complex-valued recurrent neural networks with time-delays, IEEE T. Neural Netw. Learn. Syst., 25 (2014), 1709–1713. https://doi.org/10.1109/TNNLS.2013.2294638 doi: 10.1109/TNNLS.2013.2294638
![]() |
[10] |
X. Yang, J. Lam, D. W. C. Ho, Z. Feng, Fixed-time synchronization of complex networks with impulsive effects via nonchattering control, IEEE T. Automat Control, 62 (2017), 5511–5521. https://doi.org/10.1109/TAC.2017.2691303 doi: 10.1109/TAC.2017.2691303
![]() |
[11] |
H. Rao, L. Zhao, Y. Xu, Z. Huang, R. Lu, Quasisynchronization for neural networks with partial constrained state information via intermittent control approach, IEEE T. Cybernetics, 52 (2022), 8827–8837. https://doi.org/10.1109/TCYB.2021.3049638 doi: 10.1109/TCYB.2021.3049638
![]() |
[12] |
Y. Chen, Z. Wang, B. Shen, H. Dong, Exponential synchronization for delayed dynamical networks via intermittent control: dealing with actuator saturations, IEEE T. Neural Netw. Learn. Syst., 30 (2019), 1000–1012. https://doi.org/10.1109/TNNLS.2018.2854841 doi: 10.1109/TNNLS.2018.2854841
![]() |
[13] |
Y. Wang, H. Liu, H. Tan, An overview of filtering for sampled-data systems under communication constraints, Int. J. Netw. Dyn. Intell., 2 (2023), 100011. https://doi.org/10.53941/ijndi.2023.100011 doi: 10.53941/ijndi.2023.100011
![]() |
[14] |
Y. A. Wang, B. Shen, L. Zou, Q. L. Han, A survey on recent advances in distributed filtering over sensor networks subject to communication constraints, Int. J. Netw. Dyn. Intell., 2 (2023), 100007. https://doi.org/10.53941/ijndi0201007 doi: 10.53941/ijndi0201007
![]() |
[15] |
H. Peng, B. Zeng, L. Yang, Y. Xu, R. Lu, Distributed extended state estimation for complex networks with nonlinear uncertainty, IEEE T. Neural Netw. Learn. Syst., 34 (2023), 5952–5960. https://doi.org/10.1109/TNNLS.2021.3131661 doi: 10.1109/TNNLS.2021.3131661
![]() |
[16] |
M. Zhang, X. Yang, Q. Qi, J. H. Park, State estimation of switched time-delay complex networks with strict decreasing LKF, IEEE T. Neural Netw. Learn. Syst., 35 (2024), 10451–10460. https://doi.org/10.1109/TNNLS.2023.3241955 doi: 10.1109/TNNLS.2023.3241955
![]() |
[17] |
F. Yang, Q. L. Han, Y. Liu, Distributed H∞ state estimation over a filtering network with time-varying and switching topology and partial information exchange, IEEE T. Cybernetics, 49 (2019), 870–882. https://doi.org/10.1109/TCYB.2017.2789212 doi: 10.1109/TCYB.2017.2789212
![]() |
[18] | X. Wan, Z. Wang, Q. L. Han, M. Wu, A recursive approach to quantized H∞ state estimation for genetic regulatory networks under stochastic communication protocols, IEEE T. Neural Netw. Learn. Syst., 30 (2019), 2840–2852. https://doi.org/10.1109/TNNLS.2018.2885723 |
[19] |
J. Hu, Z. Wang, S. Liu, H. Gao, A variance-constrained approach to recursive state estimation for time-varying complex networks with missing measurements, Automatica, 64 (2016), 155–162. https://doi.org/10.1016/j.automatica.2015.11.008 doi: 10.1016/j.automatica.2015.11.008
![]() |
[20] |
Y. Liu, Z. Wang, Y. Yuan, F. E. Alsaadi, Partial-nodes-based state estimation for complex networks with unbounded distributed delays, IEEE T. Neural Netw. Learn. Syst., 29 (2018), 3906–3912. https://doi.org/10.1109/TNNLS.2017.2740400 doi: 10.1109/TNNLS.2017.2740400
![]() |
[21] |
N. Hou, Z. Wang, D. W. C. Ho, H. Dong, Robust partial-nodes-based state estimation for complex networks under deception attacks, IEEE T. Cybernetics, 50 (2020), 2793–2802. https://doi.org/10.1109/TCYB.2019.2918760 doi: 10.1109/TCYB.2019.2918760
![]() |
[22] |
J. Y. Li, Z. Wang, R. Lu, Y. Xu, Partial-nodes-based state estimation for complex networks with constrained bit rate, IEEE T. Netw. Sci. Eng., 8 (2021), 1887–1899. https://doi.org/10.1109/TNSE.2021.3076113 doi: 10.1109/TNSE.2021.3076113
![]() |
[23] |
N. Hou, J. Li, H. Liu, Y. Ge, H. Dong, Finite-horizon resilient state estimation for complex networks with integral measurements from partial nodes, Sci. China Inf. Sci., 65 (2022), 132205. https://doi.org/10.1007/s11432-020-3243-7 doi: 10.1007/s11432-020-3243-7
![]() |
[24] |
M. Lin, Q. Shen, C. Liu, H. Peng, Y. Xu, Partial‐node‐based resilient set‐membership filtering for output‐coupled complex networks with event‐triggered mechanisms, Int. J. Robust Nonlinear Control, 34 (2024), 5555–5569. https://doi.org/10.1002/rnc.7268 doi: 10.1002/rnc.7268
![]() |
[25] |
L. Zou, Z. Wang, J. Hu, H. Dong, Partial-node-based state estimation for delayed complex networks under intermittent measurement outliers: a multiple-order-holder approach, IEEE T. Neural Netw. Learn. Syst., 34 (2023), 7181–7195. https://doi.org/10.1109/TNNLS.2021.3138979 doi: 10.1109/TNNLS.2021.3138979
![]() |
[26] |
N. Hou, H. Dong, W. Zhang, Y. Liu, F. E. Alsaadi, Event-triggered state estimation for time-delayed complex networks with gain variations based on partial nodes, Int. J. General Syst., 47 (2018), 477–490. https://doi.org/10.1080/03081079.2018.1462352 doi: 10.1080/03081079.2018.1462352
![]() |
[27] |
Y. Deng, Z. Meng, H. Lu, Adaptive event-triggered state estimation for complex networks with nonlinearities against hybrid attacks, AIMS Math., 7 (2022), 2858–2877. https://doi.org/10.3934/math.2022158 doi: 10.3934/math.2022158
![]() |
[28] |
J. Chen, D. Yue, C. Dou, S. Weng, X. Xie, Y. Li, Static and dynamic event-triggered mechanisms for distributed secondary control of inverters in low-voltage islanded microgrids, IEEE T. Cybernetics, 52 (2022), 6925–6938. https://doi.org/10.1109/TCYB.2020.3034727 doi: 10.1109/TCYB.2020.3034727
![]() |
[29] |
M. Shen, S. Yan, G. Zhang, A new approach to event-triggered static output feedback control of networked control systems, ISA Trans., 65 (2016), 468–474. https://doi.org/10.1016/j.isatra.2016.08.014 doi: 10.1016/j.isatra.2016.08.014
![]() |
[30] |
J. Sun, B. Shen, Y. Liu, F. E. Alsaadi, Dynamic event-triggered state estimation for time-delayed spatial-temporal networks under encoding-decoding scheme, Neurocomputing, 500 (2022), 868–876. https://doi.org/10.1016/j.neucom.2022.05.062 doi: 10.1016/j.neucom.2022.05.062
![]() |
[31] |
F. Han, Z. Wang, H. Dong, F. E. Alsaadi, K. H. Alharbi, A local approach to distributed H∞-consensus state estimation over sensor networks under hybrid attacks: dynamic event-triggered scheme, IEEE T. Signal Inf. Process. Netw., 8 (2022), 556–570. https://doi.org/10.1109/TSIPN.2022.3182273 doi: 10.1109/TSIPN.2022.3182273
![]() |
[32] |
Y. Niu, L. Sheng, M. Gao, D. Zhou, Dynamic event-triggered state estimation for continuous-time polynomial nonlinear systems with external disturbances, IEEE T. Ind. Inform., 17 (2021), 3962–3970. https://doi.org/10.1109/TII.2020.3015004 doi: 10.1109/TII.2020.3015004
![]() |
[33] |
Q. Li, Z. Wang, J. Hu, W. Sheng, Simultaneous state and unknown input estimation for complex networks with redundant channels under dynamic event-triggered mechanisms, IEEE T. Neural Netw. Learn. Syst., 33 (2022), 5441–5451. https://doi.org/10.1109/TNNLS.2021.3070797 doi: 10.1109/TNNLS.2021.3070797
![]() |
[34] |
Z. Han, S. Zhang, Z. Jin, Y. Hu, Secure state estimation for event-triggered cyber-physical systems against deception attacks, J. Franklin Inst., 359 (2022), 11155–11185. https://doi.org/10.1016/j.jfranklin.2022.10.049 doi: 10.1016/j.jfranklin.2022.10.049
![]() |
[35] |
H. Sang, J. Zhao, Input-output finite-time estimation for complex networks with switching topology under dynamic event-triggered transmission, IEEE T. Syst. Man Cybern.: Syst., 51 (2021), 6513–6522. https://doi.org/10.1109/TSMC.2019.2963411 doi: 10.1109/TSMC.2019.2963411
![]() |
[36] |
J. Cheng, L. Liang, J. H. Park, H. Yan, K. Li, A dynamic event-triggered approach to state estimation for switched memristive neural networks with nonhomogeneous sojourn probabilities, IEEE T. Circuits Syst. I, 68 (2021), 4924–4934. https://doi.org/10.1109/TCSI.2021.3117694 doi: 10.1109/TCSI.2021.3117694
![]() |
[37] |
S. Fan, H. Yan, X. Zhan, G. Zhou, K. Shi, Distributed set-membership estimation for state-saturated systems with mixed time-delays via a dynamic event-triggered scheme, J. Franklin Inst., 358 (2021), 10079–10094. https://doi.org/10.1016/j.jfranklin.2021.08.035 doi: 10.1016/j.jfranklin.2021.08.035
![]() |
[38] |
Y. Liu, Z. Wang, Y. Yuan, W. Liu, Event-triggered partial-nodes-based state estimation for delayed complex networks with bounded distributed delays, IEEE T. Syst. Man Cybern.: Syst., 49 (2019), 1088–1098. https://doi.org/10.1109/TSMC.2017.2720121 doi: 10.1109/TSMC.2017.2720121
![]() |
[39] |
N. Lin, D. Chen, J. Hu, C. Jia, Partial-nodes-based state estimation for stochastic coupled complex networks with random sensor delay: an event-triggered communication method, Circuits Syst. Signal Process., 41 (2022), 5461–5491. https://doi.org/10.1007/s00034-022-02059-7 doi: 10.1007/s00034-022-02059-7
![]() |
[40] |
H. Tao, H. Tan, Q. Chen, H. Liu, J. Hu, H∞ state estimation for memristive neural networks with randomly occurring DoS attacks, Syst. Sci. Control Eng., 10 (2022), 154–165. https://doi.org/10.1080/21642583.2022.2048322 doi: 10.1080/21642583.2022.2048322
![]() |
[41] |
Y. Sun, X. Tian, G. Wei, Finite-time distributed resilient state estimation subject to hybrid cyber-attacks: a new dynamic event-triggered case, Int. J. Syst. Sci., 53 (2022), 2832–2844. https://doi.org/10.1080/00207721.2022.2083256 doi: 10.1080/00207721.2022.2083256
![]() |
[42] |
G. Bao, L. Ma, X. Yi, Recent advances on cooperative control of heterogeneous multi-agent systems subject to constraints: a survey, Syst. Sci. Control Eng., 10 (2022), 539–551. https://doi.org/10.1080/21642583.2022.2074169 doi: 10.1080/21642583.2022.2074169
![]() |
[43] |
X. Meng, Y. Chen, L. Ma, H. Liu, Protocol-based variance-constrained distributed secure filtering with measurement censoring, Int. J. Syst. Sci., 53 (2022), 3322–3338. https://doi.org/10.1080/00207721.2022.2080297 doi: 10.1080/00207721.2022.2080297
![]() |
[44] |
B. Shen, Z. Wang, D. Wang, Q. Li, State-saturated recursive filter design for stochastic time-varying nonlinear complex networks under deception attacks, IEEE T. Neural Netw. Learn. Syst., 31 (2020), 3788–3800. https://doi.org/10.1109/TNNLS.2019.2946290 doi: 10.1109/TNNLS.2019.2946290
![]() |
[45] |
C. D. Persis, P. Tesi, Input-to-state stabilizing control under denial-of-service, IEEE T. Automatic Control, 60 (2015), 2930–2944. https://doi.org/10.1109/TAC.2015.2416924 doi: 10.1109/TAC.2015.2416924
![]() |
[46] |
L. Liu, L. Ma, J. Zhang, Y. Bo, Sliding mode control for nonlinear Markovian jump systems with denial-of-service attacks, IEEE/CAA J. Automatica Sin., 7 (2020), 1638–1648. https://doi.org/10.1109/JAS.2019.1911531 doi: 10.1109/JAS.2019.1911531
![]() |
[47] |
M. Zhu, S. Martínez, On the performance analysis of resilient networked control systems under replay attacks, IEEE T. Automatic Control, 59 (2014), 804–808. https://doi.org/10.1109/TAC.2013.2279896 doi: 10.1109/TAC.2013.2279896
![]() |
[48] |
J. Liu, Y. Gu, L. Zha, Y. Liu, J. Cao, Event-triggered H∞ load frequency control for multiarea power systems under hybrid cyber attacks, IEEE T. Syst. Man Cybern.: Syst., 49 (2019), 1665–1678. https://doi.org/10.1109/TSMC.2019.2895060 doi: 10.1109/TSMC.2019.2895060
![]() |
[49] |
J. Liu, M. Yang, E. Tian, J. Cao, S. Fei, Event-based security control for state-dependent uncertain systems under hybrid-attacks and its application to electronic circuits, IEEE T. Circuits Syst. I: Reg. Papers, 66 (2019), 4817–4828. https://doi.org/10.1109/TCSI.2019.2930572 doi: 10.1109/TCSI.2019.2930572
![]() |
[50] |
Y. Chen, X. Meng, Z. Wang, H. Dong, Event-triggered recursive state estimation for stochastic complex dynamical networks under hybrid attacks, IEEE T. Neural Netw. Learn. Syst., 34 (2023), 1465–1477. https://doi.org/10.1109/TNNLS.2021.3105409 doi: 10.1109/TNNLS.2021.3105409
![]() |
[51] |
Y. Deng, Z. Mo, H. Lu, Robust H∞ state estimation for a class of complex networks with dynamic event-triggered scheme against hybrid attacks, Chinese Phys. B, 31 (2022), 269–277. https://doi.org/10.1088/1674-1056/ac0ee9 doi: 10.1088/1674-1056/ac0ee9
![]() |
[52] |
Y. Qu, K. Pang, State estimation for a class of artificial neural networks subject to mixed attacks: a set-membership method, Neurocomputing, 411 (2020), 239–246. https://doi.org/10.1016/j.neucom.2020.06.020 doi: 10.1016/j.neucom.2020.06.020
![]() |
Values of δi | Triggering of Node1 | Triggering of Node2 |
δ1=δ2=12 | 20% | 10% |
δ1=δ2=80 | 30% | 16.7% |
δ1=δ2=280 | 43.3% | 23.3% |
Static event-triggered case | 80% | 40% |