41
Views
0
CrossRef citations to date
0
Altmetric
Research Article

A quantization-coding scheme with variable data rates for cyber-physical systems under DoS attacks

, , &
Article: 2348690 | Received 11 Dec 2023, Accepted 22 Apr 2024, Published online: 08 May 2024

Abstract

This paper considers Cyber-Physical Systems (CPSs) in the presence of Denial-of-Service (DoS) attacks, and investigates the networked control problem under data rate limitations. We develop a framework for CPSs in the presence of DoS attacks, and present a state-estimate control scheme for CPSs under DoS attacks. For the different communication status, the information on the plant state is transmitted to the controller by employing a different data rate in order to mitigate the influence of DoS attacks. Sufficient conditions on the data rate for mean square observability and stabilization of CPSs are derived by applying information theoretic tools of source coding. Our result is less conservative than some existing results. An illustrative example is given to demonstrate the effectiveness of the proposed quantization-coding scheme.

1. Introduction

In recent years, Cyber-Physical Systems (CPSs) have been an active research area (Fioravanti et al., Citation2023; Wang & Shen, Citation2023). As fundamental issues in control theory, the observability and stabilization problem for CPSs has attracted much attention because of their applications, such as intelligent transportation, smart grids and process automation systems (Weng et al., Citation2023). In CPSs, the information on the plant state is transmitted to the controller over a communication channel, which can be threatened by malicious attacks, such as denial-of-service (DoS) 4attacks. In remote state estimation, DoS attacks can block communication channels. This leads to degraded Quality of Service (QoS) of the communication network. In very severe cases, very few information on the plant state is transmitted to the controller due to DoS attacks such that the close-loop feedback system becomes instable. The networked control problem for CPSs in the presence of DoS attacks has received considerable attention (Liu et al., Citation2023).

A framework on DoS attacks was proposed in Persis and Tesi (Citation2015). In Qin et al. (Citation2017), the authors proposed an optimal DoS attack scheduling with energy constraint over packet-dropping networks, and in Ding et al. (Citation2017), the authors proposed a multi-channel transmission schedule for remote state estimation under DoS attacks. Li et al. (Citation2017) considered SINR-based DoS attacks on remote state estimation. Kato et al. (Citation2022) employed a deterministic DoS attack model constrained in terms of attacks' frequency and duration, and studied the stabilization problem of networked control systems under DoS attacks. Liu et al. (Citation2022) was concerned with the problem of stabilizing continuous-time linear time-invariant systems subject to quantization and DoS attacks, and proposed a novel structure based on a deadbeat controller as well as a delicate transmission protocol for the input and output channels, and codesigned a deadbeat controller and transmission protocol.

Networked state estimation over a shared communication medium was introduced in Xia et al. (Citation2017). An LMI approach could be used to design the state estimator for networked control systems (Muehlebach & Trimpe, Citation2018). A comprehensive solution to the plant state estimation problem for networked control systems in a distributed fashion over communication networks was provided in Li et al. (Citation2018). A remote state estimator over a wireless fading channel was designed (Ren et al., Citation2018). Furthermore, the problem of estimating the state of weakly coupled linear systems was considered, and an optimal allocation of the channel capacity was proposed (Chen et al., Citation2017). Kircher et al. (Citation2022) gave an optimization framework for resilient batch estimation in CPSs. Liu et al. (Citation2023) addressed remote estimation for energy harvesting systems under multiplicative noises. Xu et al. (Citation2022) addressed state estimation under joint false data injection attacks.

A lot of excellent results on data rate limitation have been reported in the literature. A lower bound on the data rate required to ensure observability and stabilizability of linear control systems was provided by Tatikonda and Mitter (Citation2004). Liu and Jin (Citation2017) further developed the result, and gave a smaller lower bound by employing the quantization and coding scheme where all plant states are quantized, coded and converted together into a codeword. Liu and Rui (Citation2018) constructed a binary code where the codeword length is determined by the real state prediction error, and further gave a less conservative result. A data rate condition to stabilize a continuous-time scalar linear system was derived on the basis of event triggering (Ling, Citation2017). Furthermore, event-triggering control under bandwidth limitation was also studied by Li et al. (Citation2017). Kostina et al. (Citation2022) gave sufficient conditions on the exact minimum number of bits to stabilize a linear system. Based on the spherical polar coordinate quantizer, a quantization method with finite data rate was proposed for handling the nested quantization and achieving the convergence to the origin of the system with input and output quantizations (Wang, Citation2023).

In this paper, we will consider networked control systems under data-rate constraints and DoS attacks. Namely, communication between sensors and controllers may take place over data-rate-limitation channels in the presence of DoS attacks. There exists the trade-offs between system resilience and data rate, which affects the stability of control systems (Feng et al., Citation2021). Feng et al. (Citation2022) further developed a variable bit rate (VBR) encoding–decoding protocol and quantized controller to stabilize the control system in the presence of DoS attacks. Ran et al. (Citation2023) were concerned with the quantized consensus problem for uncertain nonlinear multiagent systems under data-rate constraints and DoS attacks, and proposed a novel dynamic quantization with zooming-in and holding capabilities. The main differences between this paper and Feng et al. (Citation2022) include the following points. (1) Feng et al. (Citation2022) considered a system without the disturbance or noise, but we consider a system with the disturbance or noise. Clearly, our results are more meaningful. (2) (Feng et al., Citation2022) gave conditions for exponentially stability. However, we give ones for mean square observability and stabilization. (3) We gave a lower bound of data rates for mean square observability and stabilization, which is smaller than one given by Feng et al. (Citation2022). Thus, our result is less conservative than the results given by Feng et al., (Citation2021, Citation2022). (4) Our proof of technical methods is different from the proof given by Feng et al. (Citation2022).

The remainder of this paper is organized as follows: Section 2 introduces problem formulation. Section 3 proposes a state-estimate control scheme under DoS attacks, and presents sufficient conditions for observability and stabilization. The result of a numerical example is presented in Section 4. Conclusions are stated in Section 5.

2. Problem formulation

2.1. Process model

In this paper, we consider the CPS in Figure , where the process is a linear time-invariant control system as given below: (1) X˙(t)=AX(t)+BU(k)+FW(t),tR+.(1) Here, X(t)Rn denotes the plant state, U(t)Rp denotes the control input, and W(t)Rq denotes the disturbance or noise. A, B and F are known real matrices.

Figure 1. Networked control systems.

Figure 1. Networked control systems.

Here, we considered a networked control system with a state-estimate feedback controller, which is different from other existing frameworks. Notice that, the sensor is able to connect to the controller via a stationary memoryless digital communication channel. Thus, the plant state X(t) needs to be quantized, encoded and transmitted to the estimator. Then, the estimator will compute the estimation on the basis of data packets sent by the encoder. However, it is possible that some data packets are intercepted by attackers in communication networks. DoS attacks may cause failure of some transmission attempts. In remote state estimation, packet losses have important effects on observability and stabilization of the system (Equation1).

Here, we impose the following assumptions (Feng et al., Citation2022) on system (Equation1).

Proof

Assumption 2.1

The initial state X(0) may be considered as a zero mean, Gaussian random variable, satisfying (2) E[X(0)2]φ0<(2) and the disturbance W(t) may be considered as a stationary stochastic process, satisfying (3) E[W(t)2]φw<(3)

Proof

Assumption 2.2

Our model of the communication channel neglects the effect of networked-induced delay.

Proof

Assumption 2.3

System (Equation1) is a TCP-like system, which employs the packet acknowledgment (ACK) scheme.

Proof

Assumption 2.4

The network communication between the sensor and controller takes place over a data-rate limited communication channel subject to DoS attacks.

2.2. Attacker model

Defending against DoS attacks has become important in CPSs. DoS attacks block the communication channel to prevent information exchange between the sensor and controller. Namely, transmission attempts will fail in DoS status. Let T denote the sampling interval. We define the set of the state sampling instants by ϕT={t0,t1,t2,,tk,},kZ+where we set tk=kT and t0=0.

As stated in Feng et al. (Citation2021), the sequence of DoS off/on transitions is defined by {hn}nZ+ with h0>0. Let (τ,t) denote the finite time interval where t and τ is the end or beginning, respectively. Then, given τ,tR with t>τ0, we define f(τ,t) as the number of DoS off/on transitions in time [τ,t], and define s(τ,t) as the time set where the communication channel lies in the DoS status. Here, we impose the following assumptions on DoS attacks.

Proof

Assumption 2.5 (Feng et al., Citation2021)

There exist constant ηR+ and constant ωR+ such that f(τ,t)η+tτωholds for any τ,tR with t>τ0.

Proof

Assumption 2.5 (Feng et al., Citation2021)

There exist constant θR+ and constant ϖR+ such that s(τ,t)θ+tτϖholds for any τ,tR with t>τ0.

We define the subset ϕz={z0,z1,z2,}ϕT as the sequence of the time instants where transmissions are successful. Then, we give Lemma 2.1 following from Feng et al. (Citation2021).

Lemma 2.1

Feng et al., Citation2021

Consider the system (Equation1) over a communication channel subject to DoS attacks characterized by Assumptions 2.12.6. Let N(z0,t) denote the number of successful transmissions in the time interval [z0,t]. If 0<1ϖ+Tω<1 hold, it follows that N(z0,t)(11ϖTω)tz0Tθ+ηTT

2.3. Problem formulation and contribution

Let X^(k) and V(k) denote the state estimate and estimation error, respectively. Namely, we have (4) V(t)=X(t)X^(t)(4) Here, we implement a state-estimate feedback control law of the form (5) U(t)=KX^(t)(5) where we select K such that A + BK is a Hurwitz matrix.

The value of the plant state can be quantized and encoded into a finite number of bits. We define r(tk) as the number of bits transmitted at the kth sampling interval. The data rate R(t) at the kth sampling interval is defined as R(t)=r(tk)T(bits/s)

Definition 2.1

System (Equation1) with the initial state X(0) and disturbance W(t) satisfying conditions (Equation2) and (Equation3) is said to be mean square observable if there exists a quantization and coding scheme such that lim suptEV(t)φv<holds, where φv is a know constant.

Definition 2.2

System (Equation1) with the initial state X(0) and disturbance W(t) satisfying conditions (Equation2) and (Equation3) is said to be mean square stabilizable if there exists a state-estimate feedback control law of the form (Equation5) such that lim suptEX(t)φx<holds, where φx is a know constant.

In this paper, we will derive a lower bound of the data rate for mean square observability and stabilization of the system (Equation1), and give a state-estimate feedback control scheme for system (Equation1) in the presence of DoS attacks.

The main contributions of this paper are as follows.

  • We develop a framework for CPSs in the presence of DoS attacks, and present a state-estimate control scheme for CPSs under DoS attacks.

  • We discuss the effect of the disturbance, and derive sufficient conditions for mean square observability and stabilization of CPSs.

  • We present a lower bound on the data rate for observability and stabilization of CPSs, which is less conservative than some existing results (Feng et al., Citation2021Citation2022).

3. State-estimate control under doS attacks

In order to achieve a tight result on the data rate for observability and stabilization of system (Equation1) in the presence of DoS attacks, we first carry out the transformation on X(t). Let HRn×n denote a real orthogonal matrix that can diagonalize A=H1ΛHwhere we define the ith eigenvalue by λi and further define Λ=diag[λ1,λ2,,λn]Here, we only consider this case where matrix A has real eigenvalues each with geometric multiplicity one. For other cases, there exist the same result (Feng et al., Citation2022). Next, we define (6) X¯(t)=HX(t)=[x¯1(t)x¯2(t)x¯n(t)]TX~(t)=HX^(t)=[x~1(t)x~2(t)x~n(t)]TV¯(t)=HV(t)=[v¯1(t)v¯2(t)v¯n(t)]T(6) Clearly, we have (7) v¯i(t)=x¯i(t)x~i(t),i=1,2,,n.(7) Thus, system (Equation1) can be rewritten as X¯˙(t)=ΛX¯(t)+HBU(t)+HFW(t)For brevity, we define HBU(t)=[u¯1(t)u¯2(t)u¯n(t)]THFW(t)=[w¯1(t)w¯2(t)w¯n(t)]TIn particular, system (Equation1) is also rewritten as (8) x¯˙i(t)=λix¯i(t)+u¯i(t)+w¯i(t),i=1,2,,n(8) We employ a predictive coding method for plant states. Namely, at time tk, v¯i(tk), not x¯i(tk), is quantized and encoded,i=1,2,,n. By doing so, our result will be less conservative than the existing results (Feng et al., Citation2021Citation2022). Let qi(tk) and ei(tk) denote the quantization value and quantization error at time tk, respectively. Then, qi(tk) can be encoded into a finite number of bits. We define ri(tk) as the number of bits transmitted at the kth sampling interval. Then, a data packet of ri(tk) bits will be sent to the decoder. Namely, we can obtain the data rate R(t) given by R(t)=1Ti=1nri(tk)bits/sThen, we give Lemma 3.1 following from Cover and Thomas (Citation2006).

Lemma 3.1

Cover & Thomas, Citation2006

Consider the system (Equation1) over a communication channel. Let qi(tk) denote the quantization value of v¯i(tk). For a given Di(tk), find qi(tk) such that (9) E[(v¯i(tk)qi(tk))2]Di(tk)foralltk(9) If set ri(tk)12log2E[v¯i2(tk)]Di(tk) (bits), there exists a quantization and coding scheme such that condition (Equation9) holds. Thus, the data rate R(t) is given by R(t)12Ti=1nmax{log2E[v¯i2(tk)]Di(tk),0}(bits/s)

The information of the plant state needs to be transmitted over the communication channel under DoS attacks. Here, we divide time into three time zones. The first one is the DoS attack time zone defined as Ta, where the communication channel is in the DoS attack status. The second one is the defense time zone defined as Td, where the communication channel is in the defense status. The last one is the peace time zone defined as Tp, which is the time zone behind the defense time zone and in front of the next DoS attack time zone. Thus, we divide the set ϕT of the state sampling instants into three types of sets: DoS attack instant set ϕa, defense instant set ϕd and peace instant set ϕp. We define ϕa={tk:tk=kT,tkTa,kZ+}ϕd={tk:tk=kT,tkTd,kZ+}ϕp={tk:tk=kT,tkTp,kZ+}Here, we employ a variable data rate R(t) in order to mitigate the influence of DoS attacks. Especially, the data rate R(t) changes with the communication status, and is determined by (10) R(t)={0(bits/s)whentϕai=1nmax{λilog2e,0}(bits/s)whentϕpi=1nmax{(11ϖTω)1λilog2e,0(11ϖTω)1}(bits/s)whentϕd(10) where e denotes the natural constant.

Notice that, the communication between the sensor and controller is subject to data rate limitations. We want to give a tight result on the data rate for observability and stabilization of system (Equation1) in the presence of DoS attacks. First, we give the main result on observability of system (Equation1).

Theorem 3.1

Consider system (3.1) in the presence of DoS attacks in Assumptions 2.12.6. Let λ1,,λn denote n positive real eigenvalues of matrix A. Assume that 0<1ϖ+Tω<1 hold. If the information of the plant state is transmitted by employing the data rate given by (Equation10), the system (Equation1) is mean square observable.

Proof.

First, we consider the case where the communication channel is in DoS attack status.

In TCP/IP network communication, the encoder may receive a data packet acknowledgment (ACK) from the decoder if one data packet is successfully transmitted to the decoder. However, for the DoS attack status, no data packet can be received at the decoder, and no ACK can be received at the encoder too. Thus, both the encoder and the decoder know that the communication channel is in the DoS attack status. For this case, there is no need to transmit any data packet. Clearly, the data rate R(t) is equal to zero in DoS attack status. Thus, we have R(t)=0(bit/s)when the system (Equation1) is in the DoS attack status.

In the DoS attack status, both the encoder and the decoder compute the state estimate using the same method. First, we compute x~i(t) on the basis of (11) x~˙i(t)=λix~i(t)+u¯i(t),t>zl(11) where we define zl:={tk:tk=kT,tkϕdϕp,tk+1ϕa,kZ+}According to Equations (Equation7), (Equation8), and (Equation11), we can obtain v¯˙i(t)=λiv¯i(t)+w¯i(t),i=1,2,,n,t>zlBy solving the differential equation above, we may give (12) v¯i(t)=eλi(tzl)v¯i(zl)+zlteλi(τzl)w¯i(τ)dτ,i=1,2,,n,t>zl(12) If λi0, v¯i(t) will not increase. For this case, it is unnecessary for the encoder to encode v¯i(t). Namely, we do not transmit the information on v¯i(t), and set ri(t)=0. On the contrary, λi>0, v¯i(t) will be enlarged more than eλi(τzl) times.

It follows from Equation (Equation12) that (13) v¯i(tk)=eλiTv¯i(tk1)+tk1tkeλi(τtk1)w¯i(τ)dτ,i=1,2,,n,tkϕa(13) Furthermore, notice that the disturbance W(t) may be considered as a stationary stochastic process, satisfying (Equation3). Then, it follows from Assumptions 1 that we can define (14) φw¯i:=tk1tkeλi(τtk1)w¯i(τ)dτ=0Teλiτw¯i(τ)dτ<,i=1,2,,n(14) Substituting Equation (Equation14) into Equation (Equation13), we obtain (15) v¯i(tk)=eλiTv¯i(tk1)+φw¯i,i=1,2,,n,tkϕa(15) According to the recurrence formula (Equation15) above, we can further obtain v¯i(tk)=eλi(tkzl)v¯i(zl)+1eλi(tkzl)1eλiTφw¯i,tk>zl,i=1,2,,n,tkϕaThus, it follows that (16) E[v¯i2(tk)]=e2λiTnaE[v¯i2(zl)]+(1eλiTna1eλiT)2φw¯i2,tk>zl,i=1,2,,n,tkϕa(16) where we define na:=tkzlT. Clearly, the uncertainty of the state estimation error will increase in the DoS attack status because the information on the plant state cannot be sent to the estimator due to DoS attacks.

In defense status, both the encoder and the decoder compute the state estimate using the same method. First, we compute x~i(t) on the basis of (17) x~˙i(t)=λix~i(t)+u¯i(t),whent>zdx~i(t)=x~i(t)+qi(t),whent=zd(17) where we define zd:={tk:tk=kT,tkϕd,tk1ϕa,kZ+}According to Equations (Equation7), (Equation8), and (Equation17), we can obtain v¯˙i(t)=λiv¯i(t)+w¯i(t),whenzd<t<zd+1v¯i(t)=ei(t),whent=zdBy solving the differential equation above, we may give (18) v¯i(t)=eλi(tzd)v¯i(zd)+zdteλi(τzd)w¯i(τ)dτ,i=1,2,,n,zd<t<zd+1(18) with v¯i(zd)=ei(zd).

Then, it follows from Equation (Equation18) that (19) v¯i(tk+1)=eλiTv¯i(tk)+tktk+1eλi(τtk)w¯i(τ)dτ,i=1,2,,n,tkϕd(19) where we have v¯i(tk)=ei(tk)Clearly, it means that v¯i(tk+1)=ei(tk+1) holds too. Substituting Equation (Equation14) into Equation (Equation19), we obtain v¯i(tk+1)=eλiTv¯i(tk)+φw¯i,i=1,2,,n,tkϕdwith v¯i(tk+1)=ei(tk+1). Then, it follows that (20) E[v¯i2(tk+1)]=e2λiTE[v¯i2(tk)]+φw¯i2,i=1,2,,n,tkϕd(20) where we have (21) E[v¯i2(tk+1)]=E[ei2(tk+1)](21) Furthermore, notice that ei(tk+1)=v¯i(tk+1)qi(tk+1)Then, it follows from Lemma 3.1 that we have (22) E[ei2(tk+1)]=E[(v¯i(tk+1)qi(tk+1))2]Di(tk+1)(22) and (23) ri(tk+1)12log2E[v¯i2(tk+1)]Di(tk+1)(bits)(23) According to (Equation22) and (Equation23), we quantize, encode v¯i(tk+1) and have (24) E[ei2(tk+1)]=E[v¯i2(tk+1)]22ri(tk+1)(24) Substituting Equations (Equation20) and (Equation21) into Equation (Equation24), we obtain E[v¯i2(tk+1)]=e2λiT22ri(tk+1)E[v¯i2(tk)]+φw¯i222ri(tk+1),i=1,2,,n,tk+1ϕdAccording to the recurrence formula above, we can further obtain (25) E[v¯i2(tk)]=e2λiTnd22ndri(tk)E[v¯i2(zd)]+1e2λiTnd22ndri(tk)1e2λiT22ri(tk+1)φw¯i222ri(tk+1),tk>zd,i=1,2,,n,tkϕd(25) where we define nd:=tkzdT.

Notice that, the uncertainty of the state estimation error will increase in the DoS attack status because the information on the plant state cannot be sent to the estimator due to DoS attacks. In order to decrease the state estimation error, we increase the data rate R(t) and send more information on the plant state to the estimator. Let zm denote the last state sampling instant in defense status. Here, we define zm:={tk:tk=kT,tkϕd,tk+1ϕp,kZ+}According to Equations (Equation16) and (Equation25), we can obtain E[v¯i2(zm)]=e2λiT(na+nd)22ndri(t)E[v¯i2(zl)]+[(1eλiTna1eλiT)2e2λiTnd22ndri(t)++1e2λiTnd22ndri(t)1e2λiT22ri(t)122ri(t)]φw¯i2There exists a φmR+ such that [(1eλiTna1eλiT)2e2λiTnd22ndri(t)+1e2λiTnd22ndri(t)1e2λiT22ri(t)122ri(t)]φw¯i2<φmwith t. If we choose ri(t) such that (26) e2λiT(na+nd)22ndri(t)<1(26) holds, then the mean square value of the state estimation error is bounded and given by E[v¯i2(t)]<φmwith t. Thus, there exists a state-estimate feedback control law of the form (Equation5) such that EV(t)φv<holds for any tTd.

Next, we set t=zm, and have (27) T(na+nd)=tzl(27) Clearly, nd denotes the number of successful transmissions in the time interval [zl,t]. If assume that 0<1ϖ+Tω<1 holds, according to Lemma 1, we may give (28) nd=N(zl,t)(11ϖTω)tzlTθ+ηTT(28) in the time interval [zl,t]. Substituting (Equation27) and (Equation28) into (Equation26), we have (29) ri(t)>(11ϖTω)1λiTlog2e(bits)(29) with t. Namely, we set the number of bits given by (Equation29) for encoding when the ith eigenvalue of the system (Equation1) is greater than or equal to zero. On the contrary, we set ri(t)=0 when the ith eigenvalue of the system (Equation1) is less than zero. Furthermore, notice that the number of bits ri(t) must be an integer. Thus, we obtain ri(t)>max{(11ϖTω)1λiTlog2e,0}(bits)The data rate R(t) in the defense status is given by R(t)>i=1nmax{(11ϖTω)1λilog2e,0}×(bits/s)In the peace status, both the encoder and the decoder compute the state estimate using the same method. First, we compute x~i(t) on the basis of (30) x~˙i(t)=λix~i(t)+u¯i(t),whent>zpx~i(t)=x~i(t)+qi(t),whent=zp(30) where we define zp:={tk:tk=kT,tkϕp,tk1ϕd,kZ+}According to Equations (Equation7), (Equation8), and (Equation30), we can obtain v¯˙i(t)=λiv¯i(t)+w¯i(t),whenzp<t<zp+1v¯i(t)=ei(t),whent=zpBy solving the differential equation above, we may give (31) v¯i(t)=eλi(tzp)v¯i(zp)+zpteλi(τzp)w¯i(τ)dτ,i=1,2,,n,zp<t<zp+1(31) with v¯i(zp)=ei(zp).

Then, it follows from Equation (Equation31) that (32) v¯i(tk+1)=eλiTv¯i(tk)+tktk+1eλi(τtk)w¯i(τ)dτ,i=1,2,,n,tkϕp(32) where we have v¯i(tk)=ei(tk)Clearly, it means that v¯i(tk+1)=ei(tk+1) holds too. Substituting Equation (Equation14) into Equation (Equation32), we obtain v¯i(tk+1)=eλiTv¯i(tk)+φw¯i,i=1,2,,n,tkϕpwith v¯i(tk+1)=ei(tk+1). Then, it follows that (33) E[v¯i2(tk+1)]=e2λiTE[v¯i2(tk)]+φw¯i2,i=1,2,,n,tkϕp(33) where we have (34) E[v¯i2(tk+1)]=E[ei2(tk+1)](34) Furthermore, we notice that ei(tk+1)=v¯i(tk+1)qi(tk+1)Then, it follows from Lemma 2 that we have (35) E[ei2(tk+1)]=E[(v¯i(tk+1)qi(tk+1))2]Di(tk+1)(35) and (36) ri(tk+1)12log2E[v¯i2(tk+1)]Di(tk+1)(bits)(36) According to (Equation35) and (Equation36), we quantize, encode v¯i(tk+1) and have (37) E[ei2(tk+1)]=E[v¯i2(tk+1)]22ri(tk+1)(37) Substituting Equations (Equation33) and (Equation34) into Equation (Equation37), we obtain (38) E[v¯i2(tk+1)]=e2λiT22ri(tk+1)E[v¯i2(tk)]+φw¯i222ri(tk+1),i=1,2,,n,tk+1ϕp(38) According to the recurrence formula (Equation38) above, we can further obtain E[v¯i2(tk)]=e2λiTnp22npri(tk)E[v¯i2(zp)]+1e2λiTnp22npri(tk)1e2λiT22ri(tk+1)φw¯i222ri(tk+1),tk>zp,i=1,2,,n,tkϕpwhere we define np:=tkzpT.

Notice that the uncertainty of the state estimation error has decreased to the level that is considered the allowable error range of system (Equation1) in peace status. Thus, we only transmit the information on the plant state such that the uncertainty of the state estimation error will no longer increase. Clearly, the number of bits in peace status is less than one in defense status.

There exists a φsR+ such that 1e2λiTnp22npri(tk)1e2λiT22ri(tk+1)φw¯i222ri(tk+1)<φswith t. If we choose ri(t) such that (39) e2λiTnp22npri(t)<1(39) holds, then the mean square value of the state estimation error is bounded and given by E[v¯i2(t)]<φswith t. Thus, there exists a state-estimate feedback control law of the form (Equation5) such that EV(t)φv<holds for any tTp.

Then, it follows from (Equation39) that the number of bits ri(t) needs to satisfy (40) ri(t)>λiTlog2e(bits)(40) such that the system (Equation1) is mean square observable. Namely, we set the number of bits given by (Equation40) for encoding when the ith eigenvalue of the system (Equation1) is greater than or equal to zero. On the contrary, we set ri(t)=0 when the ith eigenvalue of the system (Equation1) is less than zero. Furthermore, notice that the number of bits ri(t) must be an integer. Thus, we obtain ri(t)>max{λiTlog2e,0}(bits)The data rate R(t) in peace status is given by R(t)>i=1nmax{λilog2e,0}(bits/s)Combined with the arguments above, we can show that there exists a constant φvR+ such that lim suptEV(t)φv<holds. Clearly, system (Equation1) is mean square observable if data packets on the information of the plant state are transmitted by employing the data rate given by (Equation10).

Remark 3.1

  • Notice that, we consider system (Equation1) with random disturbance. Thus, system (Equation1) is mean square stable, not exponentially stable.

  • The chief difference in our case is that we consider the communication channel which has three states: DoS status, defense status, and peace status. While the communication status is changing, the data rate is being changed. Thus, our result is less conservative than some existing results (Feng et al., Citation2021Citation2022).

  • For the proof technique in Theorem 3.1, we employ not only control theoretic tools but also information theoretic tools.

Next, we derive the sufficient condition on the data rate for mean square stabilization of system (Equation1) under DoS attacks, and give the following result.

Theorem 3.2

Consider system (Equation1) in the presence of DoS attacks in Assumptions 2.12.6. Let λ1,,λn denote n positive real eigenvalues of matrix A. Assume that 0<1ϖ+Tω<1 hold. If the information of the plant state is transmitted by employing the data rate given by (Equation10), system (Equation1) is mean square stabilizable.

Proof.

According to (Equation4) and (Equation6), we obtain X(t)=H1(X~(t)+V¯(t))Notice that both the encoder and decoder have a knowledge of X~(t) at any time t. However, V¯(t) is a random variable for the encoder and decoder. Then, we have (41) EX(t)<EX~(t)+EV¯(t)(41) As stated in Theorem 3.1, we have (42) lim suptEV¯(t)φv<(42) If there exists a constant φaR+ such that (43) lim suptEX~(t)φa<(43) holds, we may obtain lim suptEX(t)φx<Now, we will drive Inequality (Equation43) in three different situations. First, we consider the case where the communication channel is in DoS attack status. For this case, there is no need to transmit any data packet. Thus, we have R(t)=0(bit/s)when the system (Equation1) is in DoS attack status.

According to (Equation5) and (Equation6), we obtain U(t)=KH1X~(t)Then, we have X~(t)=e(Λ+HBKH1)(tzl)X~(zl)=eH(A+BK)H1(tzl)X~(zl)with t>zl. Notice that, we select K such that A + BK is a Hurwitz matrix. Thus, it follows that there exists a constant φaR+ such that EX~(t)φa<holds in DoS attack status.

Secondly, we consider the case where the communication channel is in defense status. For this case, we increase the data rate R(t) and send more information on the plant state to the estimator in order to decrease the state estimation error. Namely, the data rate R(t) in defense status is given by R(t)>i=1nmax{(11ϖTω)1λilog2e,0}×(bits/s)We define Q(t):=[q1(t)q2(t)qn(t)]TFor any tkϕd, we have X~(t)={eH(A+BK)H1(ttk)X~(tk),whentk<t<tk+1X~(t)+Q(t),whent=tkNotice that, Q(t) is the quantization value of V¯(t), and is norm-bounded. At the same time, A + BK is a Hurwitz matrix. Thus, it follows that there exists a constant φaR+ such that EX~(t)φa<holds in defense status.

Finally, we consider the case where the communication channel is in peace status. For this case, the uncertainty of the state estimation error has decreased to the level that is considered the allowable error range of system (Equation1). Thus, we only transmit the information on the plant state such that the uncertainty of the state estimation error will no longer increase. The data rate R(t) in peace status is given by (44) R(t)>i=1nmax{λilog2e,0}(bits/s)(44) For any tkϕp, we have X~(t)={eH(A+BK)H1(ttk)X~(tk),whentk<t<tk+1X~(t)+Q(t),whent=tkArguing as before, we can show that there exists a constant φaR+ such that EX~(t)φa<holds in peace status.

Combined with the arguments above, there exists a constant φaR+ such that (45) lim suptEX~(t)φa<(45) holds. Thus, according to (Equation41), (Equation42), and (Equation45), we can show that there exists a constant φxR+ such that lim suptEX(t)φx<holds. Clearly, if the information of the plant state is transmitted by employing the data rate given by (Equation10), system (Equation1) is mean square stabilizable.

Remark 3.2

  • It is shown in Theorem 3.2 that there exists a lower bound on the data rate above which one can find a state-estimate feedback control scheme to stabilize system (1) under DoS attacks.

  • No information on the plant state can be sent to the controller over the communication channel due to DoS attacks. Thus, one needs to transmit more information in defense status by employing higher data rate.

  • If assume that the disturbance is equal to 0, it follows from Theorem 2 that system (Equation1) is exponentially stable.

4. Numerical examples and simulations

In order to better understand our results, we give a simple numerical example. Consider a networked control system which is open-loop unstable and is given by [x˙1(t)x˙2(t)x˙3(t)]=[0.64270.0190.05350.03620.65370.0890.02470.01880.5636][x1(t)x2(t)x3(t)]+[u1(t)u2(t)u3(t)]+10[w1(t)w2(t)w3(t)]Here, we implement a state-estimate feedback control law of the form U(t)=KX^(t)with K=[2.13.742.314.0252.723.4651.9252.552.64]Let the sampling period T = 1 s. As stated before, we consider the communication channel in the presence of DoS attacks, and set ϖ=4.13 and ω=4.02. Clearly, we have 1ϖ+Tω=0.4909<1. Over a simulation horizon of 0–20 s, the communication channel is in peace status. Over a simulation horizon of 21–70 s, the communication channel is in DoS attack status. Over a simulation horizon of 71–100 s, the communication channel is in defense status. Over a simulation horizon of 101–150 s, the communication channel is in peace status again.

First, we select the data rate R1(t) given by R1(t)={0(bits/s)whentϕa3(bits/s)whentϕp6(bits/s)whentϕdwhich satisfies the condition in Theorems 3.1 and 3.2. The data rate R2(t) is given by Feng et al. (Citation2022). The curves of the data rate response are shown in Figure . Clearly, our result is less conservative than the one in Feng et al. (Citation2022). The simulation results of V(t) are shown in Figure . Clearly, V(t) is mean square convergent and the system is mean square observable. The simulation results of X(t) are shown in Figure . Clearly, X(t) is mean square convergent and the system is mean square stabilizable too.

Figure 2. The curve of the data rate response.

Figure 2. The curve of the data rate response.

Figure 3. The curve of the estimation error response.

Figure 3. The curve of the estimation error response.

Figure 4. The curve of the plant state response.

Figure 4. The curve of the plant state response.

5. Conclusion

In this paper, we addressed the networked control problem for CPSs in the presence of DoS attacks, and derived the sufficient conditions on the data rate for mean square observability and stabilization. There exists a lower bound of the data rate, above which one can find a quantization, coding, and control scheme to stabilize the unstable plant. It is shown in our result that the information on the plant state can be transmitted to the controller by employing the different data rate for the different communication status. The numerical simulation was also given to illustrate the validity of our result.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Additional information

Funding

This work was supported in part by Basic scientific research project of colleges and universities of Department of Education, Liaoning Provincial (general project) (Project Number: LJKMZ20220608) and 14th Five Year National Key R&D Program Project (Project Number: 2023YFB3211001).

References

  • Chen, X., Belabbas, M., & Başar, T. (2017). Optimal capacity allocation for sampled networked systems. Automatica, 85, 100–112. https://doi.org/10.1016/j.automatica.2017.07.039
  • Cover, T., & Thomas, J. (2006). Elements of information theory. Wiley. 200–205
  • Ding, K., Li, Y., Quevedo, D. E., Dey, S., & Shi, L. (2017). A multi-channel transmission schedule for remote state estimation under DoS attacks. Automatica, 78, 194–201. https://doi.org/10.1016/j.automatica.2016.12.020
  • Feng, S., Cetinkaya, A., Ishii, H., Tesi, P., & Persis, C. D. (2021). Networked control under DoS attacks: Trade-offs between resilience and data rate. IEEE Transactions on Automatic Control, 66(1), 460–467. https://doi.org/10.1109/TAC.9
  • Feng, S., Cetinkaya, A., Ishii, H., Tesi, P., & Persis, C. D. (2022). Resilient quantized control under denial-of-service: Variable bit rate quantization. Automatica, 141, 110302–110311. https://doi.org/10.1016/j.automatica.2022.110302
  • Fioravanti, C., Panzieri, S., & Oliva, G. (2023). Negativizability: A useful property for distributed state estimation and control in cyber-physical systems. Automatica, 157, 111240–111258. https://doi.org/10.1016/j.automatica.2023.111240
  • Kato, R., Cetinkaya, A., & Ishii, H. (2022). Linearization-based quantized stabilization of nonlinear systems under DoS attacks. IEEE Transactions on Automatic Control, 67(12), 6826–6833. https://doi.org/10.1109/TAC.2021.3133180
  • Kircher, A., Bako, L., Blanco, E., & Benallouch, M. (2022). An optimization framework for resilient batch estimation in cyber-physical systems. IEEE Transactions on Automatic Control, 67(10), 5246–5261. https://doi.org/10.1109/TAC.2021.3121223
  • Kostina, V., Peres, Y., Ranade, G., & Sellke, M. (2022). Exact minimum number of bits to stabilize a linear system. IEEE Transactions on Automatic Control, 67(10), 5548–5554. https://doi.org/10.1109/TAC.2021.3126679
  • Li, L., Wang, X., & Lemmon, M. D. (2017). Efficiently attentive event-triggered systems with limited bandwidth. IEEE Transactions on Automatic Control, 62(3), 1491–1497. https://doi.org/10.1109/TAC.2016.2577381
  • Li, Y., Philips, S., & R. G. Sanfelice (2018). Robust distributed estimation for linear systems under intermittent information. IEEE Transactions on Automatic Control, 63(4), 973–988. https://doi.org/10.1109/TAC.2017.2737139
  • Li, Y., Quevedo, D. E., Dey, S., & Shi, L. (2017). SINR-based DoS attack on remote state estimation: A game-theoretic approach. IEEE Transactions on Control of Network Systems, 4(3), 632–642. https://doi.org/10.1109/TCNS.2016.2549640
  • Ling, Q. (2017). Bit rate conditions to stabilize a continuous-time scalar linear system based on event triggering. IEEE Transactions on Automatic Control, 62(8), 4093–4100. https://doi.org/10.1109/TAC.2016.2618000
  • Liu, Q., & Jin, F. (2017). State estimation for networked control systems using fixed data rates. International Journal of Systems Science, 48(9), 1818–1828. https://doi.org/10.1080/00207721.2017.1287315
  • Liu, Q., & Rui, D. (2018). Observability and stabilisability of networked control systems with limited data rates. International Journal of Systems Science, 49(11), 2463–2476. https://doi.org/10.1080/00207721.2018.1505003
  • Liu, Q., Wang, Z., Dong, H., & Jiang, C. (2023). Remote estimation for energy harvesting systems under multiplicative noises: A binary encoding scheme with probabilistic bit flips. IEEE Transactions on Automatic Control, 68(1), 343–354. https://doi.org/10.1109/TAC.2022.3170540
  • Liu, W., Sun, J., Wang, G., Bullo, F., & Chen, J. (2022). Resilient control under quantization and denial-of-service: Codesigning a deadbeat controller and transmission protocol. IEEE Transactions on Automatic Control, 67(8), 3879–3891. https://doi.org/10.1109/TAC.2021.3107145
  • Liu, W., Sun, J., Wang, G., Bullo, F., & Chen, J. (2023). Data-driven resilient predictive control under denial-of-service. IEEE Transactions on Automatic Control, 68(8), 4722–4737. https://doi.org/10.1109/TAC.2022.3209399
  • Muehlebach, M., & Trimpe, S. (2018). Distributed event-based state estimation for networked systems: A LMI approach. IEEE Transactions on Automatic Control, 63(1), 269–276. https://doi.org/10.1109/TAC.2017.2726002
  • Persis, C. D., & Tesi, P. (2015). Input-to-state stabilizing control under denial-of-service. IEEE Transactions on Automatic Control, 60(11), 2930–2944. https://doi.org/10.1109/TAC.2015.2416924
  • Qin, J., Li, M., Shi, L., & Yu, X. (2017). Optimal denial-of-service attack scheduling with energy constraint over packet-dropping networks. IEEE Transactions on Automatic Control, 63(6), 1648–1663. https://doi.org/10.1109/TAC.9
  • Ran, M., Feng, S., Li, J., & Xie, L. (2023). Quantized consensus under data-rate constraints and DoS attacks: A zooming-in and holding approach. IEEE Transactions on Automatic Control, 68(9), 5397–5412. https://doi.org/10.1109/TAC.2022.3223277
  • Ren, X., Wu, J., Johansson, K. H., Shi, G., & Shi, L. (2018). Infinite horizon optimal transmission power control for remote state estimation over fading channels. IEEE Transactions on Automatic Control, 63(1), 85–100. https://doi.org/10.1109/TAC.2017.2709914
  • Tatikonda, S., & Mitter, S. K. (2004). Control under communication constraints. IEEE Transactions on Automatic Control, 49(7), 1056–1068. https://doi.org/10.1109/TAC.2004.831187
  • Wang, B., & Shen, C. (2023). A time-varying observer-based approach to equilibrium estimation and compensation for synchronization of heterogeneous nonlinear cyber-physical systems. IEEE Transactions on Automatic Control, 68(10), 6176–6183. https://doi.org/10.1109/TAC.2023.3293025
  • Wang, J. (2023). Quantized feedback control of discrete-time MIMO linear systems with input and output quantization over finite data rate channels. IEEE Transactions on Automatic Control, 68(10), 6277–6284. https://doi.org/10.1109/TAC.2022.3232991
  • Weng, P., Chen, B., Liu, S., & Yu, L. (2023). Secure nonlinear fusion estimation for cyber-physical systems under FDI attacks. Automatica, 148, 110759–110763. https://doi.org/10.1016/j.automatica.2022.110759
  • Xia, M., Gupta, V., & Antsaklis, P. J. (2017). Networked state estimation over a shared communication medium. IEEE Transactions on Automatic Control, 62(4), 1729–1741. https://doi.org/10.1109/TAC.2016.2593645
  • Xu, W., Wang, Z., Hu, L., & Kurths, J. (2022). State estimation under joint false data injection attacks: Dealing with constraints and insecurity. IEEE Transactions on Automatic Control, 67(12), 6745–6753. https://doi.org/10.1109/TAC.2021.3131145