
This paper investigates iterative learning control for Caputo fractional-order systems with one-sided Lipschitz nonlinearity. Both open- and closed-loop P-type learning algorithms are proposed to achieve perfect tracking for the desired trajectory, and their convergence conditions are established. It is shown that the algorithms can make the output tracking error converge to zero along the iteration axis. A simulation example illustrates the application of the theoretical findings, and shows the effectiveness of the proposed approach.
Citation: Hanjiang Wu, Jie Huang, Kehan Wu, António M. Lopes, Liping Chen. Precise tracking control via iterative learning for one-sided Lipschitz Caputo fractional-order systems[J]. Mathematical Biosciences and Engineering, 2024, 21(2): 3095-3109. doi: 10.3934/mbe.2024137
[1] | Sahar Badri . HO-CER: Hybrid-optimization-based convolutional ensemble random forest for data security in healthcare applications using blockchain technology. Electronic Research Archive, 2023, 31(9): 5466-5484. doi: 10.3934/era.2023278 |
[2] | Yang Song, Beiyan Yang, Jimin Wang . Stability analysis and security control of nonlinear singular semi-Markov jump systems. Electronic Research Archive, 2025, 33(1): 1-25. doi: 10.3934/era.2025001 |
[3] | Duhui Chang, Yan Geng . Distributed data-driven iterative learning control for multi-agent systems with unknown input-output coupled parameters. Electronic Research Archive, 2025, 33(2): 867-889. doi: 10.3934/era.2025039 |
[4] | Xiaoming Wang, Yunlong Bai, Zhiyong Li, Wenguang Zhao, Shixing Ding . Observer-based event triggering security load frequency control for power systems involving air conditioning loads. Electronic Research Archive, 2024, 32(11): 6258-6275. doi: 10.3934/era.2024291 |
[5] | Hangyu Hu, Fan Wu, Xiaowei Xie, Qiang Wei, Xuemeng Zhai, Guangmin Hu . Critical node identification in network cascading failure based on load percolation. Electronic Research Archive, 2023, 31(3): 1524-1542. doi: 10.3934/era.2023077 |
[6] | Ramalingam Sakthivel, Palanisamy Selvaraj, Oh-Min Kwon, Seong-Gon Choi, Rathinasamy Sakthivel . Robust memory control design for semi-Markovian jump systems with cyber attacks. Electronic Research Archive, 2023, 31(12): 7496-7510. doi: 10.3934/era.2023378 |
[7] | Rizhao Cai, Liepiao Zhang, Changsheng Chen, Yongjian Hu, Alex Kot . Learning deep forest for face anti-spoofing: An alternative to the neural network against adversarial attacks. Electronic Research Archive, 2024, 32(10): 5592-5614. doi: 10.3934/era.2024259 |
[8] | Yawei Liu, Guangyin Cui, Chen Gao . Event-triggered synchronization control for neural networks against DoS attacks. Electronic Research Archive, 2025, 33(1): 121-141. doi: 10.3934/era.2025007 |
[9] | Arvind Prasad, Shalini Chandra, Ibrahim Atoum, Naved Ahmad, Yazeed Alqahhas . A collaborative prediction approach to defend against amplified reflection and exploitation attacks. Electronic Research Archive, 2023, 31(10): 6045-6070. doi: 10.3934/era.2023308 |
[10] | Yongtao Zheng, Jialiang Xiao, Xuedong Hua, Wei Wang, Han Chen . A comparative analysis of the robustness of multimodal comprehensive transportation network considering mode transfer: A case study. Electronic Research Archive, 2023, 31(9): 5362-5395. doi: 10.3934/era.2023272 |
This paper investigates iterative learning control for Caputo fractional-order systems with one-sided Lipschitz nonlinearity. Both open- and closed-loop P-type learning algorithms are proposed to achieve perfect tracking for the desired trajectory, and their convergence conditions are established. It is shown that the algorithms can make the output tracking error converge to zero along the iteration axis. A simulation example illustrates the application of the theoretical findings, and shows the effectiveness of the proposed approach.
Cyber-physical system (CPS) is an emerging technology that integrates computation, communication, and physical devices. Introduction of network technology in CPS offers significant advantages in system efficiency, scalability, and maintainability. CPS is widely applied in various fields due to its robustness, high reliability, and fast operation speed [1,2,3]. Due to the close interaction among computation, sensing, communication, and actuation in CPS, it is highly susceptible to network security threats.Additionally, intelligent CPS presents new challenges and threats different from existing issues [4,5]. Notably, CPS closely integrated with national infrastructure can lead to immeasurable severe consequences if subjected to malicious attacks. Therefore, ensuring the secure operation of CPS-related devices is an urgent problem that needs to be addressed [6,7].
There have been many security incidents of CPS in the world, which have brought huge losses [8,9]. In June 2010, Iran's nuclear facilities were attacked by the Stuxnet virus, which seriously damaged nuclear power plants and other facilities, seriously jeopardizing Iran's nuclear security. In 2014, the Havex Trojan attacked numerous European industrial manufacturing systems. In addition to attacks on industrial systems, attacks on the power grid also occur frequently. In 2015, the Ukrainian power grid suffered a Black-Energy attack. In 2016, the Israeli power grid suffered a serious cyber attack, and in 2019, several South American countries suffered a cyber attack on the power system. An attack on the power grid would lead to widespread power outages, which would render factories inoperable and infrastructure paralyzed, causing serious inconvenience and impact to society.
In recent years, scholars have conducted extensive research on the security of CPSs. Attack detection is one of the important strategies to ensure the safe operation of CPS, aiming to identify malicious behaviors such as network attacks and take appropriate countermeasures as early as possible to minimize or prevent significant losses [10,11]. As the complexity of attacks in CPS increases, traditional anomaly detection methods have limitations and require the design of detection algorithms with specific characteristics for a particular domain [12,13]. Reference [14] tackles the design problem of intrusion detection systems by creatively combining feature-based intrusion detection system (SIDS) and anomaly-based intrusion detection system (AIDS) to form an improved stacked ensemble algorithm (ISEA). This algorithm significantly reduces the false positive rate (FPR) through a false positive elimination strategy (FPES). Reference [15] argues that in the era of Industry 4.0, a layered and distributed approach is required for intrusion detection. This approach includes perception-execution layer monitoring based on Kalman filters, network transmission layer monitoring based on recursive Gaussian mixture models, and application control layer monitoring based on sparse deep belief network models. It enables comprehensive and efficient identification of covert attacks and ensures security protection. Reference [16] proposes a federated deep learning scheme to address the attack problem in large-scale and complex industrial networked physical systems. This scheme utilizes a deep learning-based intrusion detection model combined with federated learning framework and secure communication protocols to enhance the privacy of industrial CPS while ensuring resilience against network threats.
Data tampering attacks are a prevalent and typical type of network attack targeting CPSs. They have also gained widespread attention in recent years[13,17,18]. The main method of data tampering attacks is to manipulate the data transmitted in the network, affecting the estimation and control center of CPS, leading to incorrect judgments or decisions, and issuing erroneous instructions, which may result in abnormal or even damaged physical devices[19,20,21]. Such attacks are often difficult to be detected by existing intrusion detection systems, thus they can quietly penetrate CPS systems and affect their stable operation[22,23].
In recent years, the detection algorithms for data tampering attacks have received attention, and some scholars have conducted in-depth analysis and research on these attacks. Reference [24] proposes a solution to mitigate the computational cost and enhance privacy for smart grid aggregation faced with deletion and tampering attacks, targeted specifically at data tampering attacks. Reference [25] addresses firmware tampering attack defense and forensics issues by designing a detection method based on joint testing action groups and memory comparison to detect firmware tampering attacks. Reference [26] addresses the problem of the χ2 detector being difficult to detect false data injection attacks with white noise. It proposes a novel summation (SUM) detector that not only utilizes current compromise information but also collects all historical information to reveal the threat. It also has good identification for improved false data injection. Reference [27] studies the identification problem of finite impulse response (FIR) systems with binary measurements under data tampering, and the optimal attack strategy and defense method are given. Reference [28] introduces a novel secure key aggregation searchable encryption scheme and anti-tampering blockchain technology to propose a data sharing system that selectively shares and retrieves vehicle sensor data, detecting unauthorized data tampering attacks.
This paper focuses on the data tampering attack problem in binary quantization FIR systems. Under the framework of system identification, a novel algorithm is designed to solve the system parameters and attack strategies using the maximum likelihood method and binary measurement data. The computation method is also provided. To begin, the maximum likelihood function of the measurement data is established. Then, parameter estimation algorithms are proposed for both known and unknown attack strategies. The closeness between the estimated system parameter values obtained from this estimation algorithm and the true values depends on the sample data size and whether the attack strategy is known or unknown. In the case of an unknown attack strategy, the difficulty in algorithm design increases due to the coupling between unknown parameters and attack strategies. The unknown variables in the maximum likelihood function are simplified to the system of equations. The Newton-Raphson iteration method is used to train the back propagation neural network (BPNN), and the attack strategy is estimated in advance. The estimated value of the attack strategy is then substituted into the algorithm to obtain the unknown parameter estimates. The results obtained from the algorithm show that with a small sample data size, the estimation algorithm produces large fluctuations in the solved system parameters. However, as the sample data size increases, the estimated values of the system parameters tend to become closer to the true values.
The structure of this paper is as follows. Section 2 describes the data tampering detection problem in binary quantization FIR systems; Section 3 presents the expression of the maximum likelihood function of the system; Section 4 discusses the use of maximum likelihood estimation to solve the system parameters in the case of a known attack strategy; Section 5 discusses the step-by-step solution of system parameters and attack strategies in the case of an unknown attack strategy; Section 6 validates the estimation algorithm through numerical simulations; and Section 7 provides a summary and outlook for this paper.
Consider a single-input single-output discrete-time FIR system:
yk=a1uk+a2uk−1+⋯+anuk−n−1+dk=ϕTkθ+dk,k=1,2,…, | (1) |
where uk is the quantized system input and its possible value is in {μ1,μ2,…,μr}, i.e., uk∈{μ1,μ2,…,μr}; ϕk=[uk,…,uk−n−1]T is the regression vector composed of quantized inputs, since uk can only take r different values, ϕk has l=rn possible values, which can be represented as π1,π2,…,πl, that is, ϕk∈{π1,π2,…,πl}; θ=[a1,…,an]T is the unknown parameters of the system; dk is the system noise; yk is the system output, measured by a binary sensor with threshold C∈(−∞,∞), and it can be represented by an indicator function as:
s0k=I{yk≤C}={1,yk≤C;0,else. | (2) |
From here on, the superscript T denotes the transpose of a matrix or vector.
As shown in Figure 1, s0k is transmitted through a communication network to a data center, but it is susceptible to data tampering attacks during the communication process. The data received by the data center is denoted as sk, and its relationship with s0k is as follows:
{Pr(sk=1|s0k=0)=p0;Pr(sk=0|s0k=1)=p1. | (3) |
The above equation essentially describes a data tampering attack strategy, which is denoted as (p0,p1).
In this paper, a maximum likelihood estimation method is used to provide an estimation algorithm for the unknown parameters θ, and the convergence performance of the algorithm is also analyzed.
Assumption 1. The system noise {dk} is an independent and identically distributed (i.i.d.) sequence of normal random variables with zero mean and variance σ2, and its probability distribution function and probability density function are denoted as F(⋅) and f(⋅), respectively.
Remark 1. 1) This paper is concerned with the binary observation. For the case of multi-threshold quantization, it can be converted into multiple binary values for processing [29]. 2) The attack process here is independent, and the existing literature often studies the cases where it is dependent and modeled as Markov processes [30]. The method in this paper can provide reference for the case of nonindependent attack process.
Maximum likelihood estimate is a commonly used parameter estimation method in statistics that estimates model parameters by maximizing the likelihood function of the sample data. This section presents the maximum likelihood function of the data received at the receiving center, laying the foundation for the subsequent algorithm design.
From Eqs (1) and (2), we can determine the probability of s0k=1 being equal to
Pr(yk≤C)=Pr(ϕTkθ+dk≤C)=Pr(dk≤C−ϕTkθ)=F(C−ϕTkθ). | (4) |
Combining this with Eq (3) and using the law of total probability, we obtain:
Pr(sk=1)=Pr(sk=1|s0k=0)⋅Pr(s0k=0)+Pr(sk=1|s0k=1)⋅Pr(s0k=1)=p0⋅Pr(yk>C)+(1−p1)⋅Pr(yk≤C)=p0⋅(1−F(C−ϕTkθ))+(1−p1)⋅F(C−ϕTkθ)def=gk. | (5) |
Then,
Pr(sk)=gskk⋅(1−gk)(1−sk). | (6) |
Based on Eq (5), gk can be simplified as:
gk=(1−p0−p1)F(C−ϕTkθ)+p0. | (7) |
Hence, for a data length of N, the maximum likelihood function of s1,s2,…,sN is:
L(θ|s1,s2,…,sN)=Pr(s1,s2,…,sN)=Pr(s1)⋅Pr(s2)⋅⋯⋅Pr(sN)=N∏k=1gskk⋅(1−gk)(1−sk). | (8) |
The principle of maximum likelihood estimation is based on the intuitive idea that a parameter is the most reasonable estimate if it gives the greatest probability that the sample data will occur. For the maximum likelihood function, the parameters at its maximum value are called the maximum likelihood estimates. In this section, the attack strategy (p0,p1) is assumed to be known. Two functions are defined as follows:
h1(x)=(1−p0−p1)f(C−x)(1−p0−p1)F(C−x)+p0,h2(x)=(1−p0−p1)f(C−x)(p0+p1−1)F(C−x)+1−p0. | (9) |
Let
∂∂θlnL(s1,s2,…,sN)=0. | (10) |
The solution of the equation is denoted as ˆθN=ˆθN(s1,s2,…,sN), which is the maximum likelihood estimate of θ.
Since Eq (10) is highly nonlinear, an explicit solution generally doesn't exist. Here, an approximate solution method is presented. Taking the logarithm of Eq (8), we have
lnL(θ|s1,s2,…,sN)=N∑k=1[sk⋅lngk+(1−sk)⋅ln(1−gk)]=N∑k=1sk⋅ln[F(C−ϕTkθ)(1−p0−p1)+p0]+N∑k=1(1−sk)⋅ln[F(C−ϕTkθ)(p0+p1−1)+1−p0]. | (11) |
Taking the partial derivative of the above equation with respect to θ, we get
∂∂θlnL(θ|s1,s2,…,sN)=N∑k=1sk⋅(1−p0−p1)f(C−ϕTkθ)⋅(−ϕTk)(1−p0−p1)F(C−ϕTkθ)+p0+N∑k=1(sk−1)⋅(1−p0−p1)f(C−ϕTkθ)⋅(−ϕTk)(p0+p1−1)F(C−ϕTkθ)+1−p0. | (12) |
By Eq (9), Eq (12) can be expressed as:
∂∂θlnL(θ)=N∑k=1skh1(ϕTkθ)(−ϕTk)+N∑k=1(sk−1)h2(ϕTkθ)(−ϕTk). | (13) |
Since ϕTk can take the values π1,π2,…,πl, grouping the above expression based on these values, we can rearrange it as:
∂∂θlnL(θ)=N∑k=1,ϕTk=π1skh1(π1θ)(−π1)+N∑k=1,ϕTk=π1(sk−1)h2(π1θ)(−π1)+N∑k=1,ϕTk=π2skh1(π2θ)(−π2)+N∑k=1,ϕTk=π2(sk−1)h2(π2θ)(−π2)+⋯+N∑k=1,ϕTk=πlskh1(πlθ)(−πl)+N∑k=1,ϕTk=πl(sk−1)h2(πlθ)(−πl). | (14) |
In Eq (15), if we have
N∑k=1,ϕTk=πiskh1(πiθ)+N∑k=1,ϕTk=πi(sk−1)h2(πiθ)=0,i=1,2,…,l, | (15) |
then ∂∂θlnL(θ)=0. Thus, the problem of solving the equation ∂∂θlnL(θ)=0 is reduced to solving the system of Eq (15).
By rearranging (15), we get
[h1(πiθ)+h2(πiθ)]N∑k=1,ϕTk=πisk=h2(πiθ)N∑k=1,ϕTk=πi1. |
As a result, we obtain
∑Nk=1skI{ϕTk=πi}∑Nk=1I{ϕTk=πi}=h2(πiθ)h1(πiθ)+h2(πiθ)=H(πiθ), | (16) |
where H(x)=h2(x)h1(x)+h2(x), h1(x), and h2(x) are given by (9). Let the H(x) reverse function be H−1(x), and we have
H(x)=(1−p0−p1)F(C−x)+p0⇒H(x)−p0=(1−p0−p1)F(C−x)⇒H(x)−p01−p0−p1=F(C−x) | (17) |
⇒F−1(H(x)−p01−p0−p1)=C−x. | (18) |
Therefore, from (16), we have
πiθ=C−F−1(∑Nk=1skI{ϕTk=πi}∑Nk=1I{ϕTk=πi}−p01−p0−p1),i=1,2,…,l. |
Expressing the above equation set in matrix form, we have
[π1⋮πl]θ=[C−F−1(∑Nk=1skI{ϕTk=π1}∑Nk=1I{ϕTk=π1}−p01−p0−p1)⋮C−F−1(∑Nk=1skI{ϕTk=πl}∑Nk=1I{ϕTk=πl}−p01−p0−p1)]. | (19) |
Let Φ=[πT1,πT2,…,πTl]T, ηN,i=C−F−1(∑Nk=1skI{ϕTk=πi}∑Nk=1I{ϕTk=πi}−p01−p0−p1), i=1,2,…,l. The maximum likelihood estimate of θ is obtained as:
ˆθN=Φ+[ηN,1,…,ηN,l]T, | (20) |
where + denotes the Moore-Penrose inverse of the matrix.
Remark 2. From the above, it can be seen that the distribution function of the system noise plays an important role in the algorithm design. For the unknown case, an estimation algorithm can be designed to estimate it, and then the estimated value can be used instead of the true value, so as to realize the adaptive identification of unknown parameters [29].
Theorem 1. Consider the system (1) and the binary observation (2) under the data tampering attack (3). If Assumption 1 holds, the matrix Φ generated by the system input is full rank, and ∑Nk=1I{ϕTk=πi}→∞ as N→∞ for i=1,2,…,l, then the maximum likelihood-based parameter estimate ˆθN given by (20) converges strongly to the true value θ, i.e.,
ˆθN→θ,N→∞,w.p.1. |
Proof. By (5), it is known that
E(skI{ϕTk=πi})=p0⋅(1−F(C−πiθ))+(1−p1)⋅F(C−πiθ)=p0+(1−p0−p1)F(C−πiθ). |
According to the Law of Large Numbers, for i=1,2,…,l, we have
∑Nk=1skI{ϕTk=π1}∑Nk=1I{ϕTk=π1}→p0+(1−p0−p1)F(C−πiθ),N→∞, | (21) |
which implies that
C−F−1(∑Nk=1skI{ϕTk=π1}∑Nk=1I{ϕTk=π1}−p01−p0−p1)→πiθ,N→∞. | (22) |
Since Φ is full rank, from (19) and (20), the theorem is proved.
In the previous section, an identification algorithm with unknown parameters was designed under the assumption of known attack strategies. In the case of unknown attack strategies, the design of the identification algorithm becomes more difficult. This is mainly because the unknown parameters and attack strategies are coupled together. This section primarily addresses this problem.
Using the maximum likelihood function, Eq (11) is used to obtain the maximum likelihood estimates of θ, p0, and p1, which results in a system of equations consisting of n+2 equations involving θ, p0, and p1. Solving this system of equations yields the estimates ˆθ, ^p0, and ^p1. However, solving a system of n+2 dimensional equations numerically will be challenging and time-consuming. The solution process is illustrated in Figure 2, divided into three steps below.
Step 1: Construction of system of equations for θ and (p0,p1)
Based on the analysis process, when the attack strategies are known, the likelihood function L(θ|s1,s2,…,sN) is first logarithmically transformed into a logarithmic form and then differentiated. From Eqs (16) and (17), it can be determined that the problem of solving the extremum of the maximum likelihood function is equivalent to the problem of solving the following system of equations:
{F(C−π1θ)=∑Nk=1skI{ϕTk=π1}∑Nk=1I{ϕTk=π1}−p01−p0−p1;F(C−π2θ)=∑Nk=1skI{ϕTk=π2}∑Nk=1I{ϕTk=π2}−p01−p0−p1;⋮F(C−πlθ)=∑Nk=1skI{ϕTk=πl}∑Nk=1I{ϕTk=πl}−p01−p0−p1. | (23) |
If πiθ is treated as an unknown variable, then the above system of equations has l+2 unknowns but only l equations. Therefore, it is generally unsolvable. To address this, the correlation between πi is utilized, which leads to the second step.
Step 2: Solve the system of equations for θ and (p0,p1), and obtain the estimated values of the attack strategies (ˆpN,0,ˆpN,1)
Let the number of maximal linearly independent sets of π1,π2,…,πl be denoted as l0. Without loss of generality, assume that π1,π2,…,πl0 form a maximal linearly independent set of π1,π2,…,πl. Then, each πi can be expressed as a linear combination of π1,π2,…,πl0, as follows:
πi=l0∑j=1αi,jπj,i=1,2,…,l. | (24) |
Substituting the above equation into Eq (23), we get
{F(C−∑l0j=1α1,jπjθ)=∑Nk=1skI{ϕTk=π1}∑Nk=1I{ϕTk=π1}−p01−p0−p1;F(C−∑l0j=1α2,jπjθ)=∑Nk=1skI{ϕTk=π2}∑Nk=1I{ϕTk=π2}−p01−p0−p1;⋮F(C−∑l0j=1αl,jπjθ)=∑Nk=1skI{ϕTk=πl}∑Nk=1I{ϕTk=πl}−p01−p0−p1. | (25) |
The above system of equations consists of l equations, and the number of unknowns is reduced to l0+2. Solving the above system of equations, denoted as g(s1,s2,…,sN)=(g1,g2,…,gl0+2), which gives the estimated values of π1θ,π2θ,…,πl0θ, and (p0,p1) as follows:
^π1θN=g1(s1,s2,…,sN); | (26) |
⋮ | (27) |
^πl0θN=gl0(s1,s2,…,sN); | (28) |
ˆpN,0=gl0+1(s1,s2,…,sN); | (29) |
ˆpN,1=gl0+2(s1,s2,…,sN). | (30) |
Equations (29) and (30) provide the estimated values of the attack strategies.
The most critical part is how to obtain the expression of g(s1,s2,…,sN), which can be divided into two cases. One case is when the system of Eq (25) has an analytical solution, in which case the expression of g(⋅) can be obtained through mathematical operations. The other case is when (25) does not have an analytical solution, in which case the expression of g(⋅) can be approximated using numerical methods and neural networks. The process is as follows.
Consider the following system of equations:
{F(C−∑l0j=1α1,jxj)=β1−xl0+11−xl0+1−xl0+2;F(C−∑l0j=1α2,jxj)=β2−xl0+11−xl0+1−xl0+2;⋮F(C−∑l0j=1αl,jxj)=βl−xl0+11−xl0+1−xl0+2, | (31) |
where X=[x1,x2,…,xl0+2]T∈Rl0+2 is the unknown variable, and β1,β2,…,βl are known parameters.
Given a step size Δ∈(0,1), we uniformly sample the interval [0,1] to obtain a set
Γ={(j−1)Δ:j=1,2,…,⌈1Δ⌉}, | (32) |
where ⌈⋅⌉ denotes the ceiling function. We randomly take any element β=[β1,β2,…,βl] from Γl and substitute it into Eq (31). Then, we solve the Eq (31) using the Newton-Raphson iteration method to obtain the solution X=X(β). Specifically, let ϖi(x1,x2,…,xl0+2)=F(C−∑l0j=1αi,jxj)−βi−xl0+11−xl0+1−xl0+2, i=1,2,…,l. Then, the system of Eq (31) can be equivalently written as:
Ω(X)=[ϖ1(x1,x2,…,xl0+2)ϖ2(x1,x2,…,xl0+2)⋮ϖl(x1,x2,…,xl0+2)]=0. | (33) |
The Jacobian matrix of the above equations is given by:
J(X)=[∂ϖ1∂x1⋯∂ϖ1∂xl0+2⋮⋱⋮∂ϖl∂x1⋯∂ϖl∂xl0+2]=[−α1,1f(C−∑l0j=1α1,jxj)⋯1−β1−xl0+2(1−xl0+1−xl0+2)2β1+xl0+1(1−xl0+1−xl0+2)2⋮⋱⋮⋮−αl,1f(C−∑l0j=1α1,jxj)⋯1−βl−xl0+2(1−xl0+1−xl0+2)2βl+xl0+1(1−xl0+1−xl0+2)2]. | (34) |
Given an initial value X0, let Xt=[x{t}1,x{t}2,…,x{t}l0+2]T represent the zero of the system of equations for the solution of Eq (33) obtained at the t-th iteration. Then,
Xt=Xt−1−J−1(Xt−1)Ω(Xt−1). | (35) |
Repeat the above process and iteratively calculate until ‖ is satisfied, where X(\beta) = X_t is the solution to the system of Eq (31), \|\cdot\| denotes the norm of a vector, and \varepsilon > 0 is a given constant called the iteration stopping tolerance.
Repeat the above process, letting \boldsymbol{\beta} traverse \Gamma^l , and simultaneously obtaining the solution X = X(\boldsymbol{\beta}) for Eq (31). This way, a set of data \{\boldsymbol{\beta}, X(\boldsymbol{\beta}): \boldsymbol{\beta}\in\Gamma^l\} is obtained. Treat \boldsymbol{\beta} as the input and X(\boldsymbol{\beta}) as the output of a BPNN*, and train the neural network as g^0(\beta_1, \beta_2, \ldots, \beta_l) . As a result, g(s_1, s_2, \ldots, s_N) can be computed as follows:
*Here we choose BPNN as the fitting algorithm, mainly to show our thinking and method. In specific use, one can also choose other regression algorithms, such as random forest and so on.
\begin{equation} g(s_1,s_2,\ldots,s_N) = g^0(\frac { \sum_{k = 1}^N s_k I_{\{\phi_k^T = \pi_1\}} } {\sum_{k = 1}^N I_{\{\phi_k^T = \pi_1\}}},\ldots,\frac { \sum_{k = 1}^N s_k I_{\{\phi_k^T = \pi_l\}} } {\sum_{k = 1}^N I_{\{\phi_k^T = \pi_l\}}}). \end{equation} | (36) |
The above process can be summarized into the following algorithm:
Algorithm 1 Algorithm for computing function g(\ldots) |
1. Initial values: sample step size \Delta of (0, 1) ; set D = \emptyset ; iteration tolerance \varepsilon > 0 for stopping Newton-Raphson iteration.
2. Set \Gamma based on (32), then obtain set \Gamma^ {l} with m elements denoted as \boldsymbol{\beta}_1 , \boldsymbol{\beta}_2, \ldots, \boldsymbol{\beta}_m 3. Loop: i = 1 , 2 , \ldots , m 3.1. Substitute \boldsymbol{\beta}_i into system of Eq (31) 3.2. Initialize X_0 , and use Newton-Raphson iteration to solve (31), obtain solution X_i = X_i(\boldsymbol{\beta}_i) 3.3. Update data set D = D\cup \{(\boldsymbol{\beta}_i, X_i)\} 4. End loop 5. Train the BPNN g^0(\beta_1, \beta_2, \ldots, \beta_l) based on data set D 6. Calculate g(\ldots) based on (36) |
Step 3: Obtain the estimated values of the unknown parameters \widehat{\theta}_N
Express the \widehat{\pi_1\theta} _N, \widehat{\pi_2\theta}_N, \ldots, \widehat{\pi_{l_0}\theta}_N obtained in Step 2 in vector form. Based on Eqs (26) and (28), we have:
\left[ \begin{array}{c} \pi_1 \\ \vdots \\ \pi_{l_0} \\ \end{array} \right]\widehat{\theta}_N = \left[ \begin{array}{c} g_1(s_1,s_2,\ldots,s_N) \\ \vdots \\ g_{l_0}(s_1,s_2,\ldots,s_N)\\ \end{array} \right]. |
Letting [\pi_1^T, \ldots, \pi^T_{l_0}]^T = \overline{\Phi} , we can obtain the estimate of \theta as:
\begin{equation} \widehat{\theta}_N = \overline{\Phi}^+\left[ \begin{array}{c} g_1(s_1,s_2,\ldots,s_N) \\ \vdots \\ g_{l_0}(s_1,s_2,\ldots,s_N)\\ \end{array} \right]. \end{equation} | (37) |
In the above equation, the expressions of g_1, \ldots, g_{l_0} may contain the attack strategies (p_0, p_1) as parameters. In this case, replace them with their estimated values from (29) and (30).
Theorem 2. Under the condition of Theorem 1, if the matrix \overline{\Phi} generated by the system input is full rank, the function g(\cdot) given by Algorithm 1 is the solution to the Eq (33), then the maximum likelihood-based parameter estimate \widehat{\theta}_N given by (37) converges strongly to the true value \theta , i.e.,
\widehat{\theta}_N\to\theta,\; \; N\to\infty,\; \; {\mbox{w.p.1}}. |
Proof. According to the conditions of the theorem and by (23) and (25), it is known that the solution to (31) is
\begin{eqnarray} X & = & X([p_0+(1-p_0-p_1)F(C - \pi_1\theta ),\ldots,p_0+(1-p_0-p_1)F(C - \pi_l\theta )]^T) \cr & = & [\pi_1\theta,\ldots,\pi_{l_0}\theta]^T. \end{eqnarray} | (38) |
From (21), we have
\begin{eqnarray*} && g^0(\frac { \sum_{k = 1}^N s_k I_{\{\phi_k^T = \pi_1\}} } {\sum_{k = 1}^N I_{\{\phi_k^T = \pi_1\}}},\ldots,\frac { \sum_{k = 1}^N s_k I_{\{\phi_k^T = \pi_l\}} } {\sum_{k = 1}^N I_{\{\phi_k^T = \pi_l\}}}) \\ &\to& g^0(p_0+(1-p_0-p_1)F(C - \pi_1\theta ),\ldots,p_0+(1-p_0-p_1)F(C - \pi_l\theta )),\; \; N\to\infty, \end{eqnarray*} |
which together with (36) gives
g(s_1,\ldots,s_N)\to g^0(p_0+(1-p_0-p_1)F(C - \pi_1\theta ),\ldots,p_0+(1-p_0-p_1)F(C - \pi_l\theta )) |
as N\to\infty . Combining the above and (38), by (37), it can be seen that
\begin{eqnarray} \widehat{\theta}_N = \overline{\Phi}^+\left[ \begin{array}{c} g_1(s_1,s_2,\ldots,s_N) \\ \vdots \\ g_{l_0}(s_1,s_2,\ldots,s_N)\\ \end{array} \right]\to \overline{\Phi}^+\left[ \begin{array}{c} \pi_1\theta\\ \vdots \\ \pi_{l_0}\theta\\ \end{array} \right],\; \; N\to\infty. \end{eqnarray} | (39) |
Considering that \overline{\Phi} is full rank, the proof is completed.
Consider the system
\begin{align*} \begin{cases} y_k\; \; = & \phi_k^T \theta + d_k ; \\ s_k^0\; \; = & I_{\{y_k \leq C\}} ; \end{cases} \end{align*} |
with the system parameters \theta = [a_1, \dots, a_n]^T = [-2, 4, 8]^T and the system input u_k \in \{1, 3, 5\} ; the threshold for the binary sensor output is C = 30 ; and the system noise follows an independent and identically distributed normal random variable sequence d_k \sim (0, 40^2) . The system output is transmitted to the data center through a communication network and is subjected to data tampering attacks with attack strategy (p_0, p_1) = (0.4, 0.2) .
The data center receives the tampered data s_k after the original data s_k^0 has been attacked. The relationship between the data is shown in Figure 3. The original data s_k^0 has been randomly altered.
Experiments are conducted on algorithms (10)–(22) to compute the estimated system parameter values \widehat \theta_N , where the length of the data sample is N = 80,000 . The results are shown in Figure 4, which indicate that: when the data sample size N is small, the estimated parameter values \widehat \theta_N have large convergence biases; When the data sample size N exceeds a critical value, the estimated parameter values \widehat \theta_N are close to the true values \theta ; as the data sample size N further increases, the deviation between the estimated parameter values \widehat \theta_N and the true values decreases.
Experiments are conducted on algorithms (23)–(39) for T = 150 times, and the average results of each experiment are computed to obtain \widehat \theta_N , p_0 , and p_1 , where the length of the data sample is N = 60,000 . The results are shown in Figures 5 and 6, which indicate that: As the data sample size N increases, the estimated system parameter values \widehat \theta_N approach the true values, and the estimated attack strategy values \widehat p_0 and \widehat p_1 also approach the true values. Moreover, due to the large number of experiments T , the convergence of each parameter improves as the data sample size N increases.
In the framework of system identification, this paper carried out the research of security issue based on the maximum likelihood estimation method. For FIR systems with binary observations and data tampering attacks, the parameter estimation algorithms are proposed in the two cases of known and unknown attack strategy, and the convergence condition and convergence proof of these algorithms are given.
The maximum likelihood estimation is a very classical and effective method. This paper explores its application in CPS security identification. In the future, this method can be extended to nonlinear systems, multi-threshold observations, colored noise, and other more general cases.
The authors declare they have not used Artificial Intelligence (AI) tools in the creation of this article.
This research was supported in part by the National Natural Science Foundation of China (62173030) and in part by the Beijing Natural Science Foundation (4222050).
The authors declare there is no conflict of interest.
[1] |
A. Maachou, R. Malti, P. Melchior, J. L. Battagliaand, A. Oustaloup, Nonlinear thermal system identification using fractional Volterra series, Control Eng. Pract., 29 (2014), 50–60. https://doi.org/10.1016/j.conengprac.2014.02.023 doi: 10.1016/j.conengprac.2014.02.023
![]() |
[2] |
P. E. Jacob, S. M. M. Alavi, A. Mahdi, S. J. Payne, D. A. Howey, Bayesian inference in non-Markovian state-space models with applications to battery fractional-order systems, IEEE Trans. Control Syst. Technol., 26 (2018), 497–506. https://doi.org/10.1109/TCST.2017.2672402 doi: 10.1109/TCST.2017.2672402
![]() |
[3] |
G. Tsirimokou, C. Psychalinos, A. S. Elwakil, K. N. Salama, Electronically tunable fully integrated fractional-order resonator, IEEE Trans. Circuits Syst. II Express Briefs, 65 (2018), 166–170. https://doi.org/10.1109/TCSII.2017.2684710 doi: 10.1109/TCSII.2017.2684710
![]() |
[4] |
E. S. A. Shahri, A. Alfi, J. A. T. Machado, Lyapunov method for the stability analysis of uncertain fractional-order systems under input saturation, Appl. Math. Modell., 81 (2020), 663–672. https://doi.org/10.1016/j.apm.2020.01.013 doi: 10.1016/j.apm.2020.01.013
![]() |
[5] |
C. Hou, X. Liu, H. Wang, Adaptive fault tolerant control for a class of uncertain fractional-order systems based on disturbance observer, Int. J. Robust Nonlinear Control, 30 (2020), 3436–3450. https://doi.org/10.1002/rnc.4950 doi: 10.1002/rnc.4950
![]() |
[6] |
S. Kamal, R. K. Sharma, T. N. Dinh, H. MS, B. Bandyopadhyay, Sliding mode control of uncertain fractional-order systems: A reaching phase free approach, Asian J. Control, 23 (2021), 199–208. https://doi.org/10.1002/asjc.2223 doi: 10.1002/asjc.2223
![]() |
[7] | J. X. Xu, Y. Tan, Linear and Nonlinear Iterative Learning Control, Springer-Verlag, Berlin, 2003. https://doi.org/10.1007/3-540-44845-4 |
[8] | Y. Q. Chen, K. L. Moore, On D^\alpha-type iterative learning control, in Proceedings of the 40th IEEE Conference on Decision and Control, IEEE, (2001), 4451–4456. https://doi.org/10.1109/CDC.2001.980903 |
[9] | Y. Li, H. S. Ahn, Y. Q. Chen, Iterative learning control of a class of fractional order nonlinear systems, in Proceedings of the 2010 IEEE International Symposium on Intelligent Control, IEEE, (2010), 779–782. https://doi.org/10.1109/ISIC.2010.5612935 |
[10] |
Y. H. Lan, Iterative learning control with initial state learning for fractional order nonlinear systems, Comput. Math. Appl., 64 (2012), 3210–3216. https://doi.org/10.1016/j.camwa.2012.03.086 doi: 10.1016/j.camwa.2012.03.086
![]() |
[11] |
Y. Li, W. Jiang, Fractional order nonlinear systems with delay initerative learning control, Appl. Math. Comput., 257 (2015), 546–552. https://doi.org/10.1016/j.amc.2015.01.014 doi: 10.1016/j.amc.2015.01.014
![]() |
[12] |
L. Li, Lebesgue-p norm convergence of fractional-order PID-type iterative learning control for linear systems, Asian J. Control, 20 (2018), 483–494. https://doi.org/10.1002/asjc.1561 doi: 10.1002/asjc.1561
![]() |
[13] |
S. Liu, J. R. Wang, Fractional order iterative learning control with randomly varying trial lengths, J. Franklin Inst., 354 (2017), 967–992. https://doi.org/10.1016/j.jfranklin.2016.11.004 doi: 10.1016/j.jfranklin.2016.11.004
![]() |
[14] |
D. Luo, J. R. Wang, D. Shen, PD^\alpha-type distributed learning control for nonlinear fractional-order multiagent systems, Math. Methods Appl. Sci., 42 (2019), 4543–4553. https://doi.org/10.1002/mma.5677 doi: 10.1002/mma.5677
![]() |
[15] |
D. Luo, J. R. Wang, D. Shen, Iterative learning control for locally Lipschitz nonlinear fractional-order multi-agent systems, J. Franklin Inst., 357 (2020), 6671–6693. https://doi.org/10.1016/j.jfranklin.2020.04.032 doi: 10.1016/j.jfranklin.2020.04.032
![]() |
[16] |
J. Zhang, D. Meng, Convergence analysis of saturated iterative learning control systems with locally Lipschitz nonlinearities, IEEE Trans. Neural Networks Learn. Syst., 31 (2020), 4025–4035. https://doi.org/10.1109/TNNLS.2019.2951752 doi: 10.1109/TNNLS.2019.2951752
![]() |
[17] |
D. Meng, K. L. Moore, Contraction mapping-based robust convergence of iterative learning control with uncertain, locally-Lipschitz nonlinearity, IEEE Trans. Syst. Man Cybern.: Syst., 50 (2020), 442–454. https://doi.org/10.1109/TSMC.2017.2780131 doi: 10.1109/TSMC.2017.2780131
![]() |
[18] |
S. He, H. Fang, M. Zhang, F. Liu, Z. Ding, Adaptive optimal control for a class of nonlinear systems: the online policy iteration approach, IEEE Trans. Neural Networks Learn. Syst., 31 (2020), 549–558. https://doi.org/10.1109/TNNLS.2019.2905715 doi: 10.1109/TNNLS.2019.2905715
![]() |
[19] |
H. Fang, M. Zhang, S. He, X. Luan, F. Liu, Z. Ding, Solving the zero-sum control problem for tidal turbine system: an online reinforcement learning approach, IEEE Trans. Cybern., 53 (2023), 7635–7647. https://doi.org/10.1109/TCYB.2022.3186886 doi: 10.1109/TCYB.2022.3186886
![]() |
[20] |
S. Raghavan, J. K. Hedrick, Observer design for a class of nonlinear systems, Int. J. Control, 59 (1994), 515–528. https://doi.org/10.1080/00207179408923090 doi: 10.1080/00207179408923090
![]() |
[21] |
W. Yu, P. DeLellis, G. Chen, M. di Bernardo, J. Kurths, Distributed adaptive control of synchronization in complex networks, IEEE Trans. Autom. Control, 57 (2012), 2153–2158. https://doi.org/10.1109/TAC.2012.2183190 doi: 10.1109/TAC.2012.2183190
![]() |
[22] |
M. Hussain, M. Rehan, C. K. Ahn, M. Tufail, Robust antiwindup for one-sided Lipschitz systems subject to input saturation and applications, IEEE Trans. Ind. Electron., 65 (2018), 9706–9716. https://doi.org/10.1109/TIE.2018.2815950 doi: 10.1109/TIE.2018.2815950
![]() |
[23] |
G. Hu, Observers for one-sided Lipschitz non-linear systems, IMA J. Math. Control Inf., 23 (2006), 395–401. https://doi.org/10.1093/imamci/dni068 doi: 10.1093/imamci/dni068
![]() |
[24] |
M. Xu, G. Hu, Y. Zhao, Reduced-order observer for one-sided Lipschitz nonlinear systems, IMA J. Math. Control Inf., 26 (2009), 299–317. https://doi.org/10.1093/imamci/dnp017 doi: 10.1093/imamci/dnp017
![]() |
[25] |
Y. Zhao, J. Tao, N. Z. Shi, A note on observer design for one-sided Lipschitz nonlinear systems, Syst. Control Lett., 59 (2010), 66–71. https://doi.org/10.1016/j.sysconle.2009.11.009 doi: 10.1016/j.sysconle.2009.11.009
![]() |
[26] | M. Abbaszadeh, H. Marquez, Nonlinear observer design for one-sided Lipschitz systems, in Proceedings of the 2010 American Control Conference, IEEE, (2010), 5284–5289. https://doi.org/10.1109/ACC.2010.5530715 |
[27] |
W. Zhang, H. Su, H. Wang, Z. Han, Full-order and reduced-order observers for one-sided lipschitz nonlinear systems using Riccati equations, Commun. Nonlinear Sci. Numer. Simul., 17 (2012), 4968–4977. https://doi.org/10.1016/j.cnsns.2012.05.027 doi: 10.1016/j.cnsns.2012.05.027
![]() |
[28] |
W. Zhang, H. Su, F. Zhu, S. P. Bhattacharyya, Improved exponential observer design for one-sided Lipschitz nonlinear systems, Int. J. Robust Nonlinear Control, 26 (2016), 3958–3973. https://doi.org/10.1002/rnc.3543 doi: 10.1002/rnc.3543
![]() |
[29] |
X. Cai, H. Gao, L. Liu, W. Zhang, Control design for one-sided Lipschitz nonlinear differential inclusions, ISA Trans., 53 (2014), 298–304. https://doi.org/10.1016/j.isatra.2013.12.005 doi: 10.1016/j.isatra.2013.12.005
![]() |
[30] |
W. Saad, A. Sellami, G. Garcia, H_\infty control for uncertain one-sided Lipschitz nonlinear systems in finite frequency domain, Int. J. Robust Nonlinear Control, 30 (2020), 5712–5727. https://doi.org/10.1002/rnc.5101 doi: 10.1002/rnc.5101
![]() |
[31] |
J. Ren, J. Sun, J. Fu, Finite-time event-triggered sliding mode control for one-sided Lipschitz nonlinear systems with uncertainties, Nonlinear Dyn., 103 (2021), 865–882. https://doi.org/10.1007/s11071-020-06096-2 doi: 10.1007/s11071-020-06096-2
![]() |
[32] |
R. Agha, M. Rehan, C. K. Ahn, G. Mustafa, S. Ahmad, Adaptive distributed consensus control of one-sided Lipschitz nonlinear multiagents, IEEE Trans. Syst. Man Cybern.: Syst., 49 (2019), 568–578. https://doi.org/10.1109/TSMC.2017.2764521 doi: 10.1109/TSMC.2017.2764521
![]() |
[33] |
M. A. Razaq, M. Rehan, M. Tufail, C. K. Ahn, Multiple Lyapunov functions approach for consensus of one-sided Lipschitz multi-agents over switching topologies and input saturation, IEEE Trans. Circuits Syst. II Express Briefs, 67 (2020), 3267–3271. https://doi.org/10.1109/TCSII.2020.2986009 doi: 10.1109/TCSII.2020.2986009
![]() |
[34] |
P. Gu, S. Tian, Analysis of iterative learning control for one-sided Lipschitz nonlinear singular systems, J. Franklin Inst., 356 (2019), 196–208. https://doi.org/10.1016/j.jfranklin.2018.10.014 doi: 10.1016/j.jfranklin.2018.10.014
![]() |
[35] |
P. Gu, S. Tian, D-type iterative learning control for one-sided Lipschitz nonlinear systems, Int. J. Robust Nonlinear Control, 29 (2019), 2546–2560. https://doi.org/10.1002/rnc.4511 doi: 10.1002/rnc.4511
![]() |
[36] |
P. Gu, S. Tian, P-type iterative learning control with initial state learning for one-sided Lipschitz nonlinear systems, Int. J. Control Autom. Syst., 17 (2019), 2203–2210. https://doi.org/10.1007/s12555-018-0891-2 doi: 10.1007/s12555-018-0891-2
![]() |
[37] | I. Podlubny, Fractional Differential Equations, Academic Press, New York, 1999. |
[38] |
M. A. Duarte-Mermoud, N. Aguila-Camacho, J. A. Gallegos, R. Castro-Linares, Using general quadratic Lyapunov functions to prove Lyapunov uniform stability for fractional order systems, Commun. Nonlinear Sci. Numer. Simul., 22 (2015), 650–659. https://doi.org/10.1016/j.cnsns.2014.10.008 doi: 10.1016/j.cnsns.2014.10.008
![]() |
[39] |
Y. H. Lan, Y. Zhou, Non-fragile observer-based robust control for a class of fractional-order nonlinear systems, Syst. Control Lett., 62 (2013), 1143–1150. https://doi.org/10.1016/j.sysconle.2013.09.007 doi: 10.1016/j.sysconle.2013.09.007
![]() |