Abstract

The H control issue for nonlinear Markov networked control systems in the presence of data packet loss and periodic denial-of-service (DoS) attacks is researched in this paper. First, two Bernoulli random variables are used to describe the packet loss between sensor to controller and controller to actuator. Considering the impact of DoS attacks, the probability of packet loss is set to be different during the attack sleeping interval and the attack active interval. Secondly, an observer is constructed on the controller side, and a comprehensive mathematical model including packet loss and DoS attacks is established. The sufficient conditions for the stochastic stability of the system are derived by the Lyapunov theory, and the design method of the controller and the minimum disturbance suppression performance index are also provided. Finally, a numerical example is utilized to reveal the applicability of the approach.

1. Introduction

Over the years, owing to the continuous development of network technology and the widespread application of computer networks, the structure of the control system is undergoing changes. The traditional point-to-point control method gradually loses its dominant position as the system becomes more complex and geographically dispersed. The network control system (NCS) formed by introducing a network into a control system and connecting sensors, controllers, and actuators has appeared [15]. NCS has far-going application backgrounds in different fields such as aerospace, national defense, transportation, wireless communications, and industrial automation, which makes networked control one of the research hot spots in academia [610].

NCS integrates various infrastructures through the network, thereby making human-computer interaction and physical processes more convenient. However, the introduction of communication networks impacts the stability of the system and also makes the system face the threat of network attacks. Generally speaking, typical network attacks are mainly divided into two types. The first type is the deception attack, which destroys the system by inserting incorrect data or processing raw data. The second type is the denial of service (DoS) attack, whose intent is to prevent intercourse between different system components, thereby degrading system functionality or destroying system stability [1113]. DoS attacks are easy to implement. For this reason, they have been extensively researched [1417]. For example, for a NCS under stochastic disturbances and DoS attacks, a distributed predictive controller was designed [18]. By using random perturbation information and explicitly considering packet loss due to DoS attacks, an observer was designed to reconstruct the state. For a class of NCS with DoS attacks, a resilient state feedback controller was designed [19]. The closed-loop system was modeled as an aperiodic sample data system that was related to the bound of the DoS attack duration. A state-error-dependent switched system model for NCS under resilient event-triggered communication schemes and periodic DoS attacks was proposed [20].

Data packet loss affects system performance as well as destabilizes the system, which has attracted a lot of attention and many research results have appeared. For instance, for the discrete NCSs subject to data packet loss in sensor-to-controller (S-C) and controller-to-actuator (C-A) channels, the range of successful packet transmission rates that made closed-loop NCSs stable was obtained with the asynchronous dynamical system theory [21]. For NCS suffering from S-C and C-A packet loss, an observer-based feedback control method was proposed. Considering the unmeasurable state of the controlled object, an observer was constructed to realize feedback control by describing the packet missing in S-C and C-A channels as stochastic Bernoulli variables [22]. The issue of predictive tracking control of NCSs subject to S-C data packet loss was investigated. The analysis of the packet miss impact on the performance of NCSs was carried out by taking input and output constraints into account [23]. Modeling the packet loss in the two channels as two independent Markov chains, the quantified dynamic output feedback control considering packet loss in the S-C and C-A channels was considered [24]. The above-mentioned results considered the problem of data packet loss without taking DoS attacks into account.

Currently, there are few results on the control problem for NCS in the presence of data packet loss and DoS attacks. The control issue for NCS with data packet dropout and DoS attacks was investigated [25]. However, the controlled plant in [25] was linear invariant system, and only the data packet loss in the S-C channel was considered. Moreover, resulted from the impacts such as component failures and environment changes, some control systems cannot be described by a definite model. The Markov jump system can be exploited to express the changes in the system parameters [2629]. Therefore, the research for a networked Markov jump system subject to DoS attacks and data packet dropout has important theoretical and practical significance. The control problem of nonlinear Markov jump system subject to DoS attacks and data packet in both the S-C channel and C-A channel has not been researched, which motivates the current research. The contributions of this paper can be mainly exhibited as follows:(1)Two independent Bernoulli variables are used to represent data packet loss in the S-C channel and C-A channel, respectively. Considering the fact that there is data packet transmission during the attack active interval, the probability of successful data packet transmission is set to be nonzero, which is much smaller than that during the attack sleeping interval.(2)The closed-loop system is modeled as a class of control system with two variables. Under the designed controller, the closed-loop system is still stochastically stable and attains the performance. And the connection between the disturbance suppression capability and DoS attacks is revealed.

The following content is divided into four sections. Section 2 establishes the mathematical model for nonlinear Markov NCS. Section 3 provides sufficient conditions on stochastic stability and the design method of the controller. In Section 4, numerical simulation example shows the effectiveness of the designed controller. Section 5 gives conclusions of this paper.

Notations: represents the-dimensional Euclidean space.  represents the transpose of the corresponding matrix block. represents the transpose of the matrix . If the matrix is invertible, represents the inverse of . The real positive definite matrix is represented as . represents the unit matrix of appropriate dimensions, and represents the diagonal matrix with as the main diagonal. Pr means mathematical probability. E stands for mathematical expectation and Var denotes variance.

2. Problem Formulation

The structure of nonlinear NCS subject to data packet loss and DoS attacks is exhibited in Figure 1, and the state equation of the plant is as follows:where represents the state, denotes the control input, stands for the disturbance, is the output, and , , , and are known matrices with suitable dimensions. takes value from , and the transition possibility matrix of is , , , and . is a nonlinear vector function and satisfies the following global Lipschitz condition [22]:where is a known real constant matrix.

Communication between NCS components usually suffers damage from malicious attackers. We suppose that the DoS attacks occur in the S-C channel. For the intent to describe the DoS attacks more conveniently, a power-constrained periodic jamming signal is illustrated as follows:where indicates the period number, indicates the attack period, indicates attack sleeping interval, indicates it is in the sleeping interval of attack in the attack cycle, and indicates it is in the active interval of attack in the attack cycle.

Owing to the nature of the network, such as bandwidth limitations and network overcrowding, packets are unavoidably lost during transference. We suppose that the packet loss scenarios also exist during the sleeping interval. A random variable is defined to describe the data packet transmission in the S-C channel. If , the data packet in the S-C channel is lost; if , the packet is successfully transmitted.

The random variable follows a Bernoulli distribution. For the sleeping interval, we suppose that the probability of successful data packet transference is , and the probability of data packet transference failure is . For the active period, the probability of successful data packet transmission is , and the probability of data packet transference failure is .

Therefore, the following equation can be obtained:where and .

Remark 1. In the attack active interval, the data packet loss phenomenon is more severe than that in the sleeping period, therefore, .
Similarly, we define a random variable to describe the data packet transmission in the C-A channel. When , the data packets transmitted in the C-A channel are lost; when , the data packets are successfully transmitted, and the Bernoulli distribution white sequence of random variable is as follows:The state equation of the observer is as follows:where , means the state of the observer, and means the control input of the observer.
Due to the possible data packet loss in C-A channel, the control input of the controlled plant is as follows:Define the state estimation error . Substituting (7) into (1) and (8), the closed-loop system model can be written as follows:where .
Define ; then the closed-loop system (9) can be expressed as follows:where

Definition 2. (see [30]) When , if for whichever initial mode and state , such thatthen system (10) is stochastically stable.
System (10) under random data packet loss and DoS attacks is stochastically stable and attains the performance requirement, if the following two requirements are satisfied:(1)System (10) under consideration is stochastically stable(2)Under the zero initial condition, for all , the controlled output satisfieswhere is a prescribed scalar.

Remark 3. Only the DoS attacks in the S-C channel is considered in this paper. The obtained results can be extended to the case where the DoS attacks exist in both the S-C and C-A channel, and the probability of packet loss in the C-A channel can be considered for both attack active interval and attack sleeping interval.

Lemma 4. (see [31]) (S-procedure) Letting be symmetric matrices, , , holds if there exist such that .

3. Main Results

The following theorem presents a sufficient condition on the stochastic stability of system (10).

Theorem 5. For the communication channel parameters and , if there exist positive definite matrices , , controller gain matrix , observer gain matrix , and nonnegative scalars , , such thatwhere

then system (10) is stochastically stable.

Proof. Define Lyapunov function for system (12) as follows:where . From (9) with , we can getOwing to , , thus we can getwhereIt follows from (2)-(3) thatwhich indicates thatBy the well-known S-procedure, that is, Lemma 4, we can get with constrains (22) and (23) holding, if there exist non-negative real scalars , such thatFrom (24), we haveFrom (25), for any , we haveTherefore, in accordance with Definition 2, that system (10) under consideration is stochastically stable.

Remark 7. Theorem 5 provides sufficient conditions, which makes sure system (12) is stochastically stable. The following Theorem 8 will provide the proof that system (12) under consideration is stochastically stable and attain the performance requirement (13).

Theorem 8. When , take as given the communication channel parameters , and a scalar , if there exist positive definite matrices , , matrices , , and scalars , , such thatwherethen system (10) attains the performance requirement (13).

Proof. When , from (11) we can getwhereFrom (18)-(19), we can obtainBy the well-known S-procedure, that is, Lemma 4, we can getwith constrains (32) and (33) holding. If there exist nonnegative real scalars , such thatFrom (26)–(30), we can conclude thatAdding up (39) from to :Duo to the condition that system (10) is stochastically stable, we can getwhich implies the performance index (12) is achieved. This ends the proof.

Remark 10. The prerequisites in Theorem 8 are a series of matrix inequalities under matrix inverse constraints, which can be settled by the cone complementary linearization method as follows:The computing steps are illustrated in Algorithm 1, where is a suitable scalar.

(1)Set as the maximal iteration number, and let
(2)Obtain a feasible solution satisfying (23) and (31), and let
(3)Settle the optimization issue bellow: such that (27) and (40)
(4)Set
(5)while iterations number <do
(6)if (27) and (28) hold, then
(7)  , , go to step 3
(8)else
(9)  , go to step 3
(10)end if
(11)end while
(12)if, then
(13)
(14)else
(15) No solution can be obtained within
(16)end if

4. Numerical Example

In this section, an example is presented to illustrate the effectiveness of the obtained method.

The parameter of the controlled plant is as follows:where

Suppose the attack period is , the sleeping period is set as , and the total operating time is , which is . The transition possibility matrices of is . To analyze the impact caused by the DoS attacks, the probabilities of success to transmission data packet in the sleeping period are fixed, that is and . Table 1 lists the allowable minimum value of . It is clear that when gets bigger, gets smaller. The impact of DoS attacks is clear, demonstrating the importance of investigating security issues.

According to Theorem 8, when , , and , , , and can be obtained as follows:

The initial conditions of the nonlinear NCS are supposed as , , and the disturbance input is assumed to be . The mode of the system under consideration is shown in Figure 2. The data packet dropout in the S-C channel is shown in Figure 3, and the data packet dropout in the C-A channel is exhibited in Figure 4. As can be seen from Figure 3, the probability of data packet loss during the active attack period is significantly greater than that during the attack sleep period. In the total running time, the number of successful packet transfers is 34. The number of packet transmission failures is 26, which is much higher than the average packet transmission failure probability of 0.1 when there is no network attack. In Figure 4, the number of successful data packet transmission in the total running time is 51. The number of packet transmission failures is 6, which is very close to the average data packet loss failure probability of 0.2 when there is no network attack.

We give the response curve of the open-loop system, as shown in Figure 5. Since both subsystems of the controlled object are stable, the system state converges to zero in the open-loop case. As can be seen from Figure 6, under the action of the designed controller, the system performance such as convergence time and overshoot is better than that of the open-loop system.

If there is no packet loss in S-C and C-A channels, the system state curve is shown in Figure 7. Compared with Figure 6, the system performance is better than that in the case of packet loss. Hence, data packet loss will reduce system performance.

5. Conclusions

This paper researches the control problem for a nonlinear Markov NCS with random data packet loss and periodic DoS attacks via observer. Premeditating the data packet loss in the S-C channel and C-A channel, sufficient conditions for the stochastic stability of the system are derived, and the controller design method is also proposed. Simulation results demonstrate the effectiveness of the proposed method. Under the event-triggered mechanism, the controller design for NCS subject to data packet dropout and DoS attacks in both the S-C channel and C-A channel will be researched in the future.

Data Availability

The data used in this study are available upon reasonable request to the corresponding author.

Conflicts of Interest

The authors declare that there are no conflicts of interest regarding the publication of this paper.

Acknowledgments

This work was supported by Suqian Basic Research Program Natural Science Foundation Project (grant no. K202224), Zhejiang Provincial Leader Innovation Team Project (grant no. 2020R01013).