Next Article in Journal
Ancilla-Assisted Generation of Photons from Vacuum via Time-Modulation of Extracavity Qubit
Previous Article in Journal
Analysis of Deep Convolutional Neural Networks Using Tensor Kernels and Matrix-Based Entropy
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Resilient Neural Control of Uncertain Time-Delay Nonlinear CPSs with Full-State Constraints under Deception Attacks

1
WESTA College, Southwest University, Chongqing 400700, China
2
College of Electronic and Information Engineering, Southwest University, Chongqing 400700, China
*
Author to whom correspondence should be addressed.
Entropy 2023, 25(6), 900; https://doi.org/10.3390/e25060900
Submission received: 9 April 2023 / Revised: 3 June 2023 / Accepted: 4 June 2023 / Published: 5 June 2023
(This article belongs to the Section Complexity)

Abstract

:
This paper focuses on the adaptive control problem of a class of uncertain time-delay nonlinear cyber-physical systems (CPSs) with both unknown time-varying deception attacks and full-state constraints. Since the sensors are disturbed by external deception attacks making the system state variables unknown, this paper first establishes a new backstepping control strategy based on compromised variables and uses dynamic surface techniques to solve the disadvantages of the huge computational effort of the backstepping technique, and then establishes attack compensators to mitigate the impact of unknown attack signals on the control performance. Second, the barrier Lyapunov function (BLF) is introduced to restrict the state variables. In addition, the unknown nonlinear terms of the system are approximated using radial basis function (RBF) neural networks, and the Lyapunov–Krasovskii function (LKF) is introduced to eliminate the influence of the unknown time-delay terms. Finally, an adaptive resilient controller is designed to ensure that the system state variables converge and satisfy the predefined state constraints, all signals of the closed-loop system are semi-globally uniformly ultimately bounded under the premise that the error variables converge to an adjustable neighborhood of origin. The numerical simulation experiments verify the validity of the theoretical results.

1. Introduction

The fundamental factor behind the advancement of theoretical approaches is the need in engineering practice. Since nonlinear systems make up the majority of systems in real engineering and cannot be approximated by utilizing linear approaches, stability analysis, and control design for unknown nonlinear systems have recently received a lot of interest from academics across the globe [1,2,3,4]. For nonlinear systems with strict feedback, the backstepping control technique was proposed in [5,6,7,8], which laid the groundwork for resolving nonlinear systems’ control issues. The dynamic surface approach was introduced in [9] to improve the backstepping control strategy and address the problem of “complexity explosion”. This considerably increased the backstepping technique’s range of applications. The design of the system controller is greatly complicated by the presence of unknown nonlinear functions in the nonlinear system. Many studies and tests have demonstrated that the dynamic surface backstepping control method, which is based on the approximation technique, is effective in solving the adaptive control problem of unknown nonlinear systems [10,11,12,13,14,15,16,17,18,19]. The more advanced approaches now available for the system’s unknown nonlinear variables use neural network approximation techniques [10,13,14,16,17] and fuzzy approximation techniques [15,18,19]. With the development of theoretical research, adaptive tracking control in multiple input multiple outputs (MIMO) systems has been accomplished using adaptive neural network approximation approaches [20,21]. Moreover, the time-delay effect is another problem that cannot be disregarded in the adaptive control of nonlinear systems. This issue is prevalent in real-world engineering applications such as magnetic levitation systems, crane systems, network control systems, etc. Therefore, the LKF is utilized in [16,22,23] for nonlinear systems with strict feedback and unknown time-delay to eliminate the effect of the time-delay component and combine with the dynamic surface technique to recursively build the controller to make the system stable. The traditional recursive approach does not work in this case because, as was mentioned in [24], the recursive design strategy used in the aforementioned paper is based on precise state variables, and once the system’s state variables are corrupted by outside attack signals, the system is paralyzed or even experiences a serious failure.
CPSs, which combine computational, networking, and physical components, are multidimensional complex systems. The CPS is made up of a communication network that connects hardware components to create an organism for exchanging information. Real-time data collection and actuator control are the responsibilities of the perception layer, while data transmission and communication are the responsibilities of the network layer. The control layer is in charge of calculating and analyzing the data transmitted by the perception layer to provide instructions to the controller for the subsequent operation. From the above description, we can infer that the network layer of CPS serves as a link between the physical and digital worlds and is also the layer that is most susceptible to hostile external attacks. As a result, improving CPS’s security control is one of the system’s urgent problems.
According to [25], the three main types of network attacks are Deception attacks [24,26,27], Denial-of-service (Dos) attacks [28,29,30], and Replay attacks [31,32]. The deception attack is a way for an outside malicious attacker to change the actual state variable information of the system by injecting error information to achieve their desired damage, such as Stuxnet, etc. The specific way to inject information is to apply additive signals to the CPS sensors and actuators to change the original measurement information and execution commands. Since the deception attack does not change the state information of the system, only the state measured at the control layer is changed by the attack signals, it should be a measurement attack according to the statement in [33].
Some practical examples of deception attacks are considered: in [34], an event-triggered adaptive control strategy for deception attacks on bottleneck sections of high-speed trains is proposed to achieve stable passage of a multi-train system; in [35], the anti-deception attack problem for network-based load frequency control is studied, and the proposed adaptive event-triggered control method effectively trades off communication resources with control performance. In [36], an adaptive control method for linear systems with unknown sensor and actuator attacks is proposed. Ref. [37] discusses adaptive control of a nonlinear CPS against a false data injection attack. The stability control problem of nonlinear strict feedback systems with a lower triangular structure is solved using a recursive control design method based on compromised variables in [24], which solves the issue that state variables corrupted by unknown deception attacks cannot be used in the design of recursive controllers. To explore the adaptive control of a class of switched systems with unknown deception attacks, [38] employs the novel recursive technique used in [24]. Although the aforementioned studies have produced promising experimental results based on certain hypotheses, in actual engineering practice, it is impossible to avoid the various constraint problems connected to them, making the aforementioned techniques ineffective. Therefore, the theoretical studies should take into account the state constraint problem of the system.
The study of state constraints for nonlinear systems has grown to be a popular topic in this subject since state constraints frequently and significantly impact a system’s performance, stability, and even safety. The issue of a class of nonlinear systems in a strict feedback form subject to output constraints was addressed in earlier research [39]. In [40] and [41], respectively, partial-state and full-state constraint problems for strict feedback systems were explored. In [42], strategies for controlling a class of nonlinear systems with time-varying full-state constraints using adaptive neural network technology were proposed. Ref. [43] proposed an adaptive neural network-based tracking control approach for nonlinear systems with time-delay effects. Based on the aforementioned findings, it can be known that BLF is a useful technique for handling state-constrained issues. It is of great theoretical and practical importance to study nonlinear CPSs with both state constraints and unknown deception attacks because more general nonlinear CPSs are not only constrained by a variety of practical factors but also have their communication network vulnerable to interference from outside malicious attackers.
Adaptive resilient control of a class of nonlinear systems with full-state constraints under an unknown deception attack is the main topic of this work. This is a new solution to the new problem of adaptive resilient control of nonlinear time-delayed systems with deception attacks and full-state constraints. In security control of CPS, this article effectively accomplishes the anti-attack control of CPS while making the system state satisfy the constraints.
The analysis is predicated on [24], where all sensors are taken to be subject to extra unknown attack signals, and all time-delay terms of the system are taken to be unknown and time-varying. The unknown nonlinear function of the system is estimated using an RBF neural network-based approximation method. The unknown time-delay terms are eliminated from the controller design by introducing LKF. The entire recursive design is based on the compromised variables in the backstepping control method mentioned in [24]. An attack compensator is established in each step to reduce the impact of the unknown deception attacks. The following two points serve as a summary of this paper’s specific contributions:
  • The adaptive control problem of nonlinear systems with full-state constraints and unknown deception attacks is investigated for the first time based on the studies in [24,38], and BLF is introduced for state constraints so that the system can satisfy full-state constraints as well as remain stable under external deception attacks.
  • A novel adaptive resilient recursive control approach based on state variables compromised by deception attack signals is employed for unknown time-varying deception attacks. An attack compensator is created during the recursive process to handle the effects of the unknown deception attacks on the controller design.
This paper’s general organization can be broken down into six sections. The research foundation and the problem this paper is addressing are introduced in this segment, which is the study’s opening section. The system’s mathematical model, together with any underlying presumptions and lemmas, is introduced in Section 2. Section 3 introduces the techniques utilized in the controller’s following recursive design. The controller’s recursive design process and the system’s stability analysis are both covered in Section 4. To confirm that the theory is feasible, Section 5 conducts two simulation tests. The entire paper is concluded in Section 6.

2. Problem Formulation

Consider the following mathematical model of an unknown nonlinear time-delay system under deception attacks:
x ˙ i ( t ) = x i + 1 ( t ) + f i ( x ¯ i ( t ) ) + h i ( x ¯ i ( t τ i ( t ) ) ) x ˙ n ( t ) = u + f n ( x ¯ n ( t ) ) + h n ( x ¯ n ( t τ n ( t ) ) ) + φ a ( t , x ¯ n ( t ) ) x j ( t ) = x j ( t ) + φ j , s ( t , x j ( t ) ) y ( t ) = x 1 ( t )
where  i = 1 , 2 , , n 1  represents the number of subsystems the system has and  j = 1 , 2 , , n  represents the total number of sensors it has,  x ¯ j ( t ) = [ x j ( t ) , x j ( t ) , , x j ( t ) ] Ω j  is the actual state variable while  y ( t ) = x 1 ( t ) Ω  is taken to be the system’s output,  x ¯ j ( t τ j ( t ) ) = [ x 1 ( t τ 1 ( t ) ) , x 2 ( t τ 2 ( t ) ) , , x j ( t τ j ( t ) ) ] Ω j  is the state variable with an unknown time-delay  τ j ( t ) u Ω  is the actual control input.  f j ( x ¯ j ( t ) ) : Ω j Ω  is an unknown nonlinear continuous function,  h j ( x ¯ j ( t τ j ( t ) ) ) : Ω j Ω  is an unknown nonlinear continuous function that has an unknown time-delay,  φ a ( t , x ¯ n ( t ) ) : Ω n Ω  is an actuator deception attack,  φ j , s ( t , x j ( t ) )  is a sensor deception attack, etc. These two types of attacks’ functions are all unknown time-varying continuous. As well, the compromised variable of the system variable  x j ( t )  following the occurrence of the unknown deception attack is defined as  x j ( t ) , and Assumption 1 elaborates on its specific mathematical expression.
Remark 1.
To ensure the reliability of the system model, refer to [24], the initial state of the system state variable  x ¯ n ( t 0 ) = ¯ ( t 0 ) ,   m t 0 0  is specified in this paper. For the unknown time-delay  τ j ( t )  mentioned in the system Equation (1), there is  0 < τ j m j <  and  0 < τ ˙ j m j , d < , so  m  can be defined as  m = max { m 1 , m 2 , m j , , m n } . To guarantee the stability of the system and the model of universal adaptation, this definition describes the beginning moment of the system state and the boundedness of the unknown time-delay term.
Remark 2.
The nonlinear functions  f j ( x ¯ j ( t ) )  and  h j ( x ¯ j ( t τ j ( t ) ) )  reflect the nonlinearity and uncertainties of the system shown in (1). Note that since the unknown nonlinear terms of the system need to be approximated by the RBF neural network, it is required that the functions  f j ( x ¯ j ( t ) )  and  h j ( x ¯ j ( t τ j ( t ) ) )  are bounded. Of course, if there are unbounded terms in the dynamic equations of the system (1), then the system must be unstable, and it is meaningless to discuss the control method any further.
Remark 3.
System (1) represents a class of nonlinear systems with unknown time-delay terms and unknown nonlinear terms. Each of its sensors suffers from an unknown deception attack, and the actuators of the system suffer from the same type of attack. The actual systems mentioned in [23], such as robotic systems and recycling chemical reactors, and networked control systems, as well as electrical networks in [44], may suffer from external malicious attacks in their communication networks, so the problem can be described by the differential equations of the system (1).
Control Objective:
The central issue of this study is the adaptive resilient control problem for a class of time-delay nonlinear systems with full-state constraints under unknown deception attacks. The established controller makes the system stable, and the state variables satisfy the predetermined constraint limits. In addition, all of the system’s closed-loop signals are uniformly ultimately bounded, and the stability error converges to an adjustable neighborhood of the origin.
Assumption 1 [24,45].
It is clear from the system’s features that the sensor and actuator attack signals are reliant on the system’s state variables. Define the sensor attack signal  φ j , s ( t , x j ( t ) ) = δ j ( t ) x j ( t ) ,   j = 1 , 2 , , n  and actuator attack signal  φ a , s ( t , x ¯ n ( t ) ) = ϕ a ( t ) q ( x ¯ n ( t ) ) , where  δ j ( t )  and  ϕ a ( t )  are unknown time-varying signals and  q ( x ¯ n ( t ) ) : Ω n Ω  is an unknown continuous nonlinear function. On this basis, both the unknown time-varying attack signals  δ j ( t )  and  ϕ a ( t )  are bounded, i.e.,  δ j ( t ) < δ ¯ j ,  δ ˙ j ( t ) < δ ¯ j , d , and  ϕ a ( t ) < ϕ ¯ a , where  δ ¯ j ,  δ ¯ j , d  and  ϕ ¯ a  are unknown constants.
Assumption 2 [45].
From Assumption 1, we can know that the compromised variable  x j ( t ) = x j ( t ) + φ j , s ( t , x j ( t ) ) ,   j = 1 , 2 , , n  in the system (1) can be transformed into the following form  x j ( t ) = ( 1 + δ j ( t ) ) x j ( t ) .  If  λ j ( t ) = 1 1 + δ j ( t )  is defined, then  x j ( t )  can be written as
x j ( t ) = λ j ( t ) x j ( t ) .
Assumption 1 states that  λ j ( t )  is a bounded function, and this paper specifies that  λ j ( t )  has a positive sign. We have  0 < λ _ j λ j ( t ) λ ¯ j < 1  to assume  λ _ j  and  λ ¯ j  are unknown constants.
Remark  4.
For the two aforementioned assumptions, the following two explanations are provided.
  • The model cited in [24,45] is based on Assumption 1, and it is significant to note that the unknown deception attack is introduced into a nonlinear system to cause damage. So, the attack signal must be controllable by the attacker for the attack to have the intended destructive effect. The main prerequisite for a controllable signal is that the signal is bounded because it is generally known that an infinite signal cannot be controlled. As a result, we reasonably assume that the attack signals  δ j ( t )  and  ϕ a ( t )  are bounded.
  • Similar to what was said in [24], the reason we introduced the compromised variable  x j ( t )  is that the impact of unknown deception attacks prevents us from measuring the actual state variable. We should define a variable first, that is,  ϖ j = 1 + δ j ( t ) . Because if  ϖ j = 0 , it also makes  x j ( t ) = ϖ j x j ( t ) = 0 , which prevents us from using the compromised variable  x j ( t )  as intended, so Assumption 2 specifies that  ϖ i > 0 .
Lemma 1 [46].
For any real-valued continuous function  f ( x , y )  whose variables are  x Ω m ,  y Ω n , respectively, the following inequality holds:
f ( x , y ) g 1 ( x ) + g 2 ( y )
where  g 1 ( x ) 0  and  g 2 ( y ) 0  are continuous scalar functions.
Lemma 2 [47].
Lemma 1 states that nonlinear functions with unknown time-delay terms are handled using the separation method described in [46], that is
h j ( x ¯ j ( t τ j ( t ) ) ) m = 1 j μ j , m ( x m ( t τ m ( t ) ) )
where  μ j , m ( · )  is an unknown and continuous function.
Definition 1 [24].
The system stability discussed in this paper refers to the semi-global uniformly ultimately bounded. The definitions are as follows:  β  exists in an adjustable neighborhood of the origin with  β ( 0 , b ) , where  b > 0  is an adjusted constant. There also exists a time constant  N , related to  β  and  c , i.e.,  N = N ( β , c ) , where  c > 0  is also an adjusted constant. There is:  x ¯ n ( t 0 ) β ,   t t 0 + N , where  t 0  is the initial time from Remark 1 and  x ¯ n ( t 0 ) = sup m o 0 x ¯ n ( t 0 + o ) .

3. Methodology

3.1. RBF Neural Network Approximate Technique

Since RBF neural networks can approximate any nonlinear function with arbitrary accuracy, and they have global approximation capability with fast learning and convergence, RBF neural networks are used in this paper to approximate the unknown nonlinear function in system (1). As mentioned in [47], if the approximation error is given as  ε ¯ > 0 , for any nonlinear continuous function  Q ( Z )  on a compact set  Ξ Z Ω q , there exists an RBF neural network that approximates  Q ( Z ) , i.e.,
Q ( Z ) = ω S ( Z ) + ε ( Z ) ,   ε ( Z ) < ε ¯
where  ω  stands for the ideal weight vector of the neural network, which can be defined as  ω : = arg min ω Ω N { sup Z Ξ Z Q ( Z ) ω S ( Z ) } N  is the number of neurons and  ε ( Z )  is the approximation error.  S ( Z )  is the RBF neural network’s activation function vector and  S ( Z ) = [ s 1 ( Z ) , s 2 ( Z ) , , s N ( Z ) ] Ω N  is precisely a Gaussian function which are listed as
s i ( Z ) = exp ( Z ϖ i ) ( Z ϖ i ) l i 2
where  ϖ i = [ ϖ i 1 , ϖ i 2 , , ϖ i q ] Ω q ,   i = 1 , 2 , , N  is the center of the receptive field;  l i  is the width of the Gaussian function.
Assumption 3 [48]. There exists an unknown constant  W ¯ > 0  that ensures that the RBF neural network weights are bounded  W < W ¯ .
Lemma 3 [48].
The RBF neural network’s activation function is a bounded Gaussian function, that is  S ( Z ) S ¯ .

3.2. Full-State Constraints: Barrier Lyapunov Function

In [49], to ensure that the constraints on the system state variables are not violated, the BLF based on the error surface is proposed:
V B = 1 2 log k b 2 k b 2 e 2
where  log ·  stands for the natural logarithm,  e  is the error surface, and  k b > 0  is the constraint constant. The function value of this function will converge to infinity when the error gets close to the constraint  k b , guaranteeing that the state constraints are not broken. In the future backstepping recursive design process, this function will be employed as a component of the Lyapunov function to create the Lyapunov function for each subsystem.
Lemma 4 [41].
For any positive real number  k b  and the variable  θ Ω  satisfying the condition that  θ < k b , the following inequality holds:
log k b 2 p k b 2 p θ 2 p < θ 2 p k b 2 p θ 2 p
where  p  is a positive constant.

4. Establishment of the Controller

In this section, a recursive design strategy based on RBF neural networks for the controller of system (1) will be developed so that all variables of the closed-loop system converge, while ensuring the full-state constraints of the system. Inspired by the novel backstepping recursive control strategy in [24], the error surface based on the compromised variables is firstly established, followed by the recursive design of the system controller, and finally, the stability of the system is tested.
Using the Backstepping recursive control design method as a framework, we decompose (1) into n first-order systems and construct Lyapunov functions for each first-order system to obtain the specific form of the virtual controller and to ensure the stability of each first-order system. With the previous  n 1  virtual controller forms, we can derive the specific form of the actual controller of the system in the n-th step. In this process, in order to make the form of the virtual controller simple and to keep the system stable, we need to choose the specific form of the appropriate attack compensator and the RBF neural network weight adaptive law. Eventually, the following conclusions were obtained:
u = ω ^ n S n ( Z n ) + α n z n ν n ( 2 k n + l n + ( 2 k n + k ¯ n ) 2 z n 2 ) γ n 2 k n γ n + ( 2 k n + k ¯ n ) 2 z n 2 γ n 1 + 2 ( k b n 2 / λ n 2 e n 2 )
ω ^ ˙ 1 = σ 1 ( e 1 + e 1 k b 1 2 / λ 1 2 e 1 2 ) S 1 ( Z 1 ) σ 1 a 1 ω ^ 1
ω ^ ˙ j = σ j ( γ j + e j k b j 2 / λ j 2 e j 2 ) S j ( Z j ) σ j a j ω ^ j
δ ^ ˙ j = ( 2 k j + l j + ( 2 k j + k ¯ j ) 2 z j 2 ) z j γ j ( 2 k j + k ¯ j ) z j 2 δ ^ j π j δ ^ j
where  j = 2 , 3 , , n  and  k i > 0 l i > 0 k ¯ i > 0 σ i > 0 a i > 0 π i > 0  are design constants with  i = 1 , 2 , 3 , , n γ j = x j δ ^ j z j  is an intermediate variable which can avoid using  e j  in design of controller.  z j  is the output signal of filter.  δ ^ j  is attack compensator to mitigate the effect of deception attacks and  Z 1 = [ x 1 , e 1 ] Z i = [ x ¯ i , e i 1 , e i , z i ]  are the input vector of neutral networks. (9) is the actual controller of the system, (10) is the weight adaptive law of the RBF neural network in Step 1, (11) is the adaptive law of RBF neural network weights for Step 2 to Step n, and (12) is the attack compensators from Step 2 to Step n. The origin of all the formulas and parameters will be derived in the next two sections.

4.1. Error Surface Coordinate Transformation

This study utilizes the dynamic surface technique to enhance the backstepping technique and eliminate the issue of “complexity explosion” generated by it. As a result, the following coordinate transformation is used:
e 1 = x 1 e i = x i z i ς i = z i α i
where  e 1  and  e i ,   i = 2 , , n  are the error variables,  α i  is the virtual controller and also the input signal of the first-order low-pass filter,  z i  is the output signal of the first-order low-pass filter, and  ς i  is the error between the input and output signals of the first-order low-pass filter. The specific form of the first-order low-pass filter is
ν i z ˙ i + z i = α i , z i ( 0 ) = α i ( 0 )
where  ν i > 0  is the first-order low-pass filter’s inherent constant. The error surfaces based on the compromised variables are
e 1 = x 1 e i = x i z i .
In the latter, the controller’s recursive design primarily employs (12) in place of (10).

4.2. Recursive Design Process of Controller

The recursive design steps of the adaptive resilient controller for nonlinear time-delay systems (1) with full-state constraints will be presented as follows.

4.2.1. The First Step of Backstepping

Step 1: Consider the first error surface  e 1 = x 1
e ˙ 1 = x 2 + f 1 ( x 1 ) + h 1 ( x 1 ( t τ 1 ) ) .
The Lyapunov Function  V 1  is chosen as
V 1 = 1 2 λ 1 e 1 2 + 1 2 σ 1 ω ˜ 1 T ω ˜ 1 + λ 1 2 log k b 1 2 k b 1 2 e 1 2 + 4 3 V L , 1
where the Lyapunov–Krasovskii function  V L , 1  is
V L , 1 = e ι 1 m 1 1 m 1 , d t τ 1 ( t ) t e ι 1 ( t s ) ψ 1 , 1 2 ( x 1 ( s ) ) d s
where  ι 1 > 0  is an unknown constant,  σ 1  is a design constant and  ψ 1 , 1 ( · )  is an unknown continuous nonlinear function which is same as  μ 1 , 1 ( · )  defined in (5). Since this paper has the same delay problem as the one studied in [24], the same form of LKF is chosen to solve the delay problem.
Substituting (16) into the time derivative of  V 1  yields
V ˙ 1 = λ ˙ 1 2 λ 1 2 e 1 2 + 1 λ 1 e 1 ( x 2 + f 1 ( x 1 ) + h 1 ( x 1 ( t τ 1 ) ) ) 1 σ 1 ω ˜ 1 ω ^ ˙ 1 + 4 3 V L , 1 + λ ˙ 1 2 log k b 1 2 k b 1 2 e 1 2 + λ 1 e 1 k b 1 2 e 1 2 ( x 2 + f 1 ( x 1 ) + h 1 ( x 1 ( t τ 1 ) ) ) .
Calculating the first-order derivative of concerning time  t  and using the boundness of the time-delay term in Remark 1 to amplify the equation, we can obtain  V L , 1 ι 1 V L , 1 + p 1 ψ 1 , 1 2 ( x 1 ( t τ 1 ) )  and  p 1 = e ι 1 m 1 1 m 1 , d ψ 1 , 1 2 ( x 1 ) .
Then, using Lemma 2, we have
1 λ 1 e 1 h 1 ( x 1 ( t τ 1 ) ) + λ 1 e 1 k b 1 2 e 1 2 h 1 ( x 1 ( t τ 1 ) ) + 4 3 V L , 1 4 3 ι 1 V L , 1 + 4 3 p 1 + 1 4 λ 1 2 e 1 2 + 3 λ 1 2 e 1 2 4 ( k b 1 2 e 1 2 ) .
In the meanwhile, by introducing auxiliary variables  η 1 = 4 λ 1 e 1 p 1 ( k b 1 2 e 1 2 ) 3 c 1 ( k b 1 2 e 1 2 + λ 1 2 )  and using  x 2 = e 2 + z 2 = e 2 + α 2 + ς 2  to simplify the inequality (19), we have
V ˙ 1 ( 1 λ 1 e 1 + λ 1 e 1 k b 1 2 e 1 2 ) [ e 2 + α 2 + ς 2 λ _ 1 , d 2 λ ¯ 1 e 1 + f 1 ( x 1 ) + 1 4 λ _ 1 e 1 + 3 λ ¯ 1 e 1 4 ( k b 1 2 e 1 2 ) + η 1 ] 4 3 ι 1 V L , 1 + 4 3 p 1 4 e 1 2 3 c 1 p 1 + λ ¯ 1 , d 2 log k b 1 2 k b 1 2 e 1 2 + ( λ ¯ 1 , d 1 2 ) e 1 2 k b 1 2 e 1 2 1 σ 1 ω ˜ 1 T ω ^ ˙ 1 e 1 2 k b 1 2 e 1 2 .
There exists an unknown continuous function  Q 1 ( Z 1 )  that can be expressed as  Q 1 ( Z 1 ) = f 1 ( x 1 ) + e 1 4 λ _ 1 + 3 λ ¯ 1 e 1 4 ( k b 1 2 e 1 2 ) λ _ 1 , d 2 λ ¯ 1 e 1 + η 1  with the input vector  Z 1 = [ x 1 , e 1 ] .
Then, using RBFNN to approximate the unknown nonlinear function
Q 1 ( Z 1 ) = ω 1 S 1 ( Z 1 ) + ε 1 ( Z 1 ) .
Substituting Equation (22) into inequality (21), we can obtain
V ˙ 1 ( 1 λ 1 e 1 + λ 1 e 1 k b 1 2 e 1 2 ) [ e 2 + ς 2 + ω 1 S 1 ( Z 1 ) + ε 1 ( Z 1 ) ] + 4 3 p 1 4 e 1 2 3 c 1 p 1 + λ ¯ 1 , d 2 log k b 1 2 k b 1 2 e 1 2 + ( λ ¯ 1 , d 1 2 ) e 1 2 k b 1 2 e 1 2 1 σ 1 ω ˜ 1 T ω ^ ˙ 1 4 3 ι 1 V L , 1 e 1 2 k b 1 2 e 1 2 .
Next, we can design the virtual controller to ensure system stability
α 2 = l 1 λ 1 e 1 k 1 λ 1 e 1 ω ^ 1 S 1 ( Z 1 ) = l 1 e 1 k 1 e 1 ω ^ 1 S 1 ( Z 1 )
where  l 1  and  k 1  are design constants. They are specified to have a positive sign, and the positive and negative coefficients are reflected in the front of this term.
And with the help of Lemma 3, the inequality (23) can be reduced to the following form:
V ˙ 1 ( 1 λ 1 e 1 + λ 1 e 1 k b 1 2 e 1 2 ) ( e 2 + ς 2 ) + ( 1 λ 1 e 1 + λ 1 e 1 k b 1 2 e 1 2 ) [ l 1 e 1 k 1 e 1 + ω ˜ 1 S 1 ( Z 1 ) + χ 1 ] + 4 3 p 1 4 e 1 2 3 c 1 p 1 + ( λ ˙ 1 1 2 ) log k b 1 2 k b 1 2 e 1 2 1 σ 1 ω ˜ 1 T ω ^ ˙ 1 4 3 ι 1 V L , 1 e 1 2 k b 1 2 e 1 2
where  χ 1 = ω 1 ( S 1 ( Z 1 ) S 1 ( Z 1 ) ) + ε 1 ( Z 1 ) , and  Z 1 = [ x 1 , e 1 ]  is also the input vector of RBF neutral network composed of compromised variables.
The weight adaptive law of RBFNN is (11), and bringing it into (25), we can get
V ˙ 1 ( 1 λ 1 e 1 + λ 1 e 1 k b 1 2 e 1 2 ) ( e 2 + ς 2 ) + ( 1 λ 1 e 1 + λ 1 e 1 k b 1 2 e 1 2 ) ( l 1 e 1 + χ 1 ) 4 3 ι 1 V L , 1 + 4 3 p 1 4 e 1 2 3 c 1 p 1 + a 1 ω ˜ 1 T ω ^ 1 + ( λ ˙ 1 1 2 ) log k b 1 2 k b 1 2 e 1 2 ( k 1 + 1 ) e 1 2 k b 1 2 e 1 2 k 1 e 1 2 .

4.2.2. The i-th Step of Backstepping

Step I ( i = 2 , 3 , , n 1 ): Consider the i-th error surface  e i = x i z i , the derivative is
e ˙ i = x i + 1 + f i ( x ¯ i ) + h i ( x ¯ i ( t τ i ) ) z ˙ i .
The Lyapunov Function  V i  in this step is chosen as
V i = 1 2 λ i e i 2 + 1 2 σ i ω ˜ i T ω ˜ i + λ i 2 log k b i 2 k b i 2 e i 2 + 4 3 V L , i + 1 2 δ ˜ i 2
where  δ ˜ i = δ i δ ^ i σ i  is a design constant. Lyapunov–Krasovskii functional  V L , i  is
V L , i = j = 1 i e ι i m j 1 m j , d t τ j ( t ) t e ι i ( t s ) ψ i , j 2 ( x j ( s ) ) d s
where  ι j  is an unknown constant and  ι j > 0  and  ψ i , j ( · )  is an unknown continuous nonlinear function which is same as  μ i , j ( · )  defined in (5).
Substituting (27) into the time derivative of  V i  yields
V ˙ i = λ ˙ i 2 λ i 2 e i 2 + 1 λ i e i ( x i + 1 + f i ( x ¯ i ) + h i ( x ¯ i ( t τ i ) ) z ˙ i ) + λ ˙ i 2 log k b i 2 k b i 2 e i 2 1 σ i ω ˜ i ω ^ ˙ i + λ i e i k b i 2 e i 2 ( x i + 1 + f i ( x ¯ i ) + h i ( x ¯ i ( t τ i ) ) z ˙ i ) + 4 3 V L , i + δ ˜ i ( δ ˙ i δ ^ ˙ i ) .
The first-order derivative of  V L , i  with respect to time  t  can be written as  V L , i ι i V L , i + p i j = 1 i ψ i , j 2 ( x j ( t τ j ) )  with  p i = j = 1 i e ι i m j 1 m j , d ψ i , j 2 ( x j ) .
Similarly, by using Lemma 3, one has
1 λ i e i h i ( x ¯ i ( t τ i ) ) + λ i e i k b i 2 e i 2 h i ( x ¯ i ( t τ i ) ) + 4 3 V L , i 4 3 ι i V L , i + 4 3 p i + 1 4 λ i 2 e i 2 + 3 λ i 2 e i 2 4 ( k b i 2 e i 2 ) .
So, the derivative of the Lyapunov function  V i  is
V ˙ i 1 λ i e i [ x i + 1 + f i ( x ¯ i ) λ ˙ i 2 λ i e i z ˙ i ] + λ i e i k b i 2 e i 2 [ x i + 1 + f i ( x ¯ i ) z ˙ i ] + λ ˙ i 2 log k b i 2 k b i 2 e i 2 + 1 4 λ i 2 e i 2 + 3 λ i 2 e i 2 4 ( k b i 2 e i 2 ) 2 + 4 3 p i 4 3 ι i V L , i 1 σ i ω ˜ i ω ^ ˙ i + δ ˜ i ( δ ˙ i δ ^ ˙ i ) .
Auxiliary variable  η i = 4 λ i e i p i ( k b i 2 e i 2 ) 3 c i ( k b i 2 e i 2 + λ i 2 )  is introduced in this step, and in the meanwhile, we add and subtract some auxiliary terms to help us create some desired terms and eliminate some unknown interfering terms. We can obtain
V ˙ i ( 1 λ i e i + λ i e i k b i 2 e i 2 ) [ x i + 1 + f i ( x ¯ i ) λ _ i , d 2 λ ¯ i e i + 1 4 λ _ i e i + 3 λ ¯ i e i 4 ( k b i 2 e i 2 ) + M i N i + η i z ˙ i ] + ( λ ˙ i 1 2 ) log k b i 2 k b i 2 e i 2 + 4 3 p i 4 e i 2 3 c i p i 1 λ i 1 e i 1 e i λ i 1 e i 1 k b i 1 2 e i 1 2 e i + 1 λ i e i ( 2 k i + k ¯ i ) z i δ i e i 2 k b i 2 e i 2 4 3 ι i V L , i 1 σ i ω ˜ i ω ^ ˙ i + δ ˜ i ( δ ˙ i δ ^ ˙ i )
where  M i = λ i e i ( k b i 2 e i 2 ) ( k b i 1 2 e i 1 2 + λ i 1 2 ) λ i 1 ( k b i 1 2 e i 1 2 ) ( k b i 1 2 e i 1 2 + λ i 2 ) N i = ( 2 k i + k ¯ i ) ( k b i 2 e i 2 ) z i δ i λ i 2 + ( k b i 2 e i 2 ) .
Then, the unknown continuous nonlinear function  Q i ( Z i )  can be expressed as  Q i ( Z i ) = f i ( x ¯ i ) λ _ i , d 2 λ ¯ i e i + 1 4 λ _ i e i + 3 λ ¯ i e i 4 ( k b i 2 e i 2 ) + M i N i + η i .  By employing RBFNN to approximate the above unknown function  Q i ( Z i )  as
Q i ( Z i ) = ω i S i ( Z i ) + ε i ( Z i )
where the input vector is  Z i = [ x ¯ i , e i 1 , e i , z i ] .
Substituting the (34) into (33), we have
V ˙ i ( 1 λ i e i + λ i e i k b i 2 e i 2 ) ( e i + 1 + α i + 1 + ς i + 1 + ω i S i ( Z i ) + ε i ( Z i ) z ˙ i ) + 4 3 p i 4 e i 2 3 c i p i + ( λ ˙ i 1 2 ) log k b i 2 k b i 2 e i 2 1 λ i 1 e i 1 e i λ i 1 e i 1 k b i 1 2 e i 1 2 e i + 1 λ i e i ( 2 k i + k ¯ i ) z i δ i e i 2 k b i 2 e i 2 4 3 ι i V L , i 1 σ i ω ˜ i ω ^ ˙ i + δ ˜ i ( δ ˙ i δ ^ ˙ i ) .
In the next step, since the state variables  x i  and the actual error surface  e i  of the system cannot be measured, the intermediate variable  γ i  is introduced to replace the actual error surface. From (13) and (15), we have
e i = x i z i δ i x i = x i z i δ i ( x i z i ) ( δ ˜ i + δ ^ i ) z i = x i z i δ ^ i z i δ i e i δ ˜ i z i .
So, using the intermediate variable  γ i = x i δ ^ i z i , the above equation can be transformed as  e i = λ i ( γ i δ ˜ i z i ) .  It is the representation of the system error surface using the attack compensator. The attack compensator is  δ ^ i , which is the estimated value of the unknown deception attacks. In the course of the subsequent analysis,  e i  with an attack compensator is used to mitigate the impact of the unknown deception attacks on the system stability control. Then, by substituting the new equation into (35), we can obtain
V ˙ i ( 1 λ i e i + λ i e i k b i 2 e i 2 ) ( e i + 1 + ς i + 1 ) + ( γ i δ ˜ i z i ) [ α i + 1 + ω i S i ( Z i ) + ε i ( Z i ) z ˙ i ] 4 3 ι i V L , i + λ i e i k b i 2 e i 2 [ α i + 1 + ω i S i ( Z i ) + ε i ( Z i ) z ˙ i ] + ( λ ˙ i 1 2 ) log k b i 2 k b i 2 e i 2 + 4 3 p i 4 e i 2 3 c i p i e i 2 k b i 2 e i 2 1 λ i 1 e i 1 e i λ i 1 e i 1 k b i 1 2 e i 1 2 e i + 1 λ i e i ( 2 k i + k ¯ i ) z i δ i 1 σ i ω ˜ i ω ^ ˙ i + δ ˜ i ( δ ˙ i δ ^ ˙ i ) .
The virtual control law  α i + 1  in this step can be designed as
α i + 1 = ω ^ i S i ( Z i ) + α i z i ν i ( 2 k i + l i + ( 2 k i + k ¯ i ) 2 z i 2 ) γ i ( 2 k i γ i + ( 2 k i + k ¯ i ) 2 z i 2 γ i ) 1 + 2 ( k b i 2 / λ i 2 e i 2 ) .
where  k i > 0 l i > 0 k ¯ i > 0  are design constants of the virtual controller.
V ˙ i  after adding the virtual controller (38) is
V ˙ i ( 1 λ i e i + λ i e i k b i 2 e i 2 ) ( e i + 1 + ς i + 1 ) + λ i e i k b i 2 e i 2 [ ω ^ i S i ( Z i ) l i γ i + ω i S i ( Z i ) + ε i ( Z i ) ] + ( γ i δ ˜ i z i ) [ ω ^ i S i ( Z i ) ( 2 k i + l i + ( 2 k i + k ¯ i ) 2 z i 2 ) γ i + ω i S i ( Z i ) + ε i ( Z i ) ] + ( λ ˙ i 1 2 ) log k b i 2 k b i 2 e i 2 + 4 3 p i 4 e i 2 3 c i p i 1 λ i 1 e i 1 e i λ i 1 e i 1 k b i 1 2 e i 1 2 e i 4 3 ι i V L , i e i 2 k b i 2 e i 2 + 1 λ i e i ( 2 k i + k ¯ i ) z i δ i 1 σ i ω ˜ i ω ^ ˙ i + δ ˜ i ( δ ˙ i δ ^ ˙ i ) .
Considering the auxiliary term  k i λ i 2 e i 2 , we have the following inequality  k i λ i 2 e i 2 2 ( k i γ i 2 + k i δ ˜ i 2 z i 2 ) . Using the inequality to simplify (39), one has
V ˙ i ( 1 λ i e i + λ i e i k b i 2 e i 2 ) ( e i + 1 + ς i + 1 ) + γ i [ ω ˜ i S i ( Z i ) ( l i + ( 2 k i + k ¯ i ) 2 z i 2 ) γ i + χ i ] 4 3 ι i V L , i + λ i e i k b i 2 e i 2 [ ω ˜ i S i ( Z i ) l i γ i + χ i ] δ ˜ i z i [ ω ˜ i S i ( Z i ) ( 2 k i + l i + ( 2 k i + k ¯ i ) 2 z i 2 ) γ i + χ i ] + ( λ ˙ i 1 2 ) log k b i 2 k b i 2 e i 2 + 4 3 p i 4 e i 2 3 c i p i 1 λ i 1 e i 1 e i λ i 1 e i 1 k b i 1 2 e i 1 2 e i + 1 λ i e i ( 2 k i + k ¯ i ) z i δ i e i 2 k b i 2 e i 2 1 σ i ω ˜ i ω ^ ˙ i + δ ˜ i ( δ ˙ i δ ^ ˙ i ) k i λ i 2 e i 2 + 2 k i ( δ ˜ i z i ) 2
where  χ i = ω i [ S i ( Z i ) S i ( Z i ) ] + ε i ( Z i )  and  Z i = [ x ¯ i , e i 1 , e i , z i ]  is also the input vector of RBF neutral network composed of compromised variables.
Weight adaptive law  ω ^ ˙ i  and attack compensator  δ ^ ˙ i  at this step can be designed as (11) and (12), respectively. Substituting (11) and (12) into (40) again, we get
V ˙ i ( 1 λ i e i + λ i e i k b i 2 e i 2 ) ( e i + 1 + ς i + 1 ) + γ i [ l i γ i ( 2 k i + k ¯ i ) 2 z i 2 γ i + χ i ] δ ˜ i z i [ ω ˜ i S i ( Z i ) 2 k i γ i l i γ i ( 2 k i + k ¯ i ) 2 z i 2 γ i + χ i ] + λ i e i k b i 2 e i 2 ( l i γ i + χ i ) + ( λ ˙ i 1 2 ) log k b i 2 k b i 2 e i 2 + 4 3 p i 4 e i 2 3 c i p i 1 λ i 1 e i 1 e i λ i 1 e i 1 k b i 1 2 e i 1 2 e i + 1 λ i e i ( 2 k i + k ¯ i ) z i δ i 4 3 ι i V L , i ω ˜ i ( a i ω ^ i ) k i λ i 2 e i 2 + 2 k i ( δ ˜ i z i ) 2 + δ ˜ i [ δ ˙ i ( 2 k i + l i + ( 2 k i + k ¯ i ) 2 z i 2 ) z i γ i ( 2 k i + k ¯ i ) z i 2 δ ^ i π i δ ^ i ] + k ¯ i δ ˜ i 2 z i 2 k ¯ i δ ˜ i 2 z i 2 e i 2 k b i 2 e i 2 .
From  e i = λ i ( γ i δ ˜ i z i ) , we could get  δ ˜ i z i = γ i 1 λ i e i , then, consider the following term and make it into the form we need,  ( 2 k i + k ¯ i ) δ ˜ i 2 z i 2 ( 2 k i + k ¯ i ) 2 z i 2 γ i 2 + 1 4 δ i 2 ( 2 k i + k ¯ i ) z i δ i e i λ i ( 2 k i + k ¯ i ) δ ˜ i δ ^ i z i 2 .
Substituting the above inequality into (41), one has
V ˙ i ( 1 λ i e i + λ i e i k b i 2 e i 2 ) ( e i + 1 + ς i + 1 ) + γ i ( l i γ i + χ i ) + λ i e i k b i 2 e i 2 ( l i γ i + χ i ) 4 e i 2 3 c i p i δ ˜ i z i [ ω ˜ i S i ( Z i ) + χ i ] + ( λ ˙ i 1 2 ) log k b i 2 k b i 2 e i 2 1 λ i 1 e i 1 e i 4 3 ι i V L , i λ i 1 e i 1 k b i 1 2 e i 1 2 e i + a i ω ˜ i ω ^ i k i λ i 2 e i 2 k ¯ i δ ˜ i 2 z i 2 + 4 3 p i + δ ˜ i ( δ ˙ i + π i δ ^ i ) + 1 4 δ i 2 e i 2 k b i 2 e i 2 .

4.2.3. The n-th Step of Backstepping

Step n: Consider the n-th error surface  e n = x n z n
e ˙ n = u + f n ( x ¯ n ) + h n ( x ¯ n ( t τ n ) ) + φ a ( t , x ¯ n ( t ) ) z ˙ n .
The Lyapunov Function  V n  is chosen as
V n = 1 2 λ n e n 2 + 1 2 σ n ω ˜ n T ω ˜ n + λ n 2 log k b n k b n 2 e n 2 + 4 3 V L , n + 1 2 δ ˜ n 2
where  δ ˜ n = δ n δ ^ n σ n  is a design constant. LyapunovKrasovskii function  V L , n  is
V L , n = j = 1 n e ι n m j 1 m j , d t τ j ( t ) t e ι n ( t s ) ψ n , j 2 ( x j ( s ) ) d s
where  ι n  is an unknown constant and  ι n > 0  and  ψ n , j ( · )  is an unknown continuous nonlinear function which is same as  μ n , j ( · )  defined in (5).
Substituting (43) into the time derivative of  V n  yields
V ˙ n = λ ˙ n 2 λ n 2 e n 2 + 1 λ n e n ( u + f n ( x ¯ n ) + h n ( x ¯ n ( t τ n ) ) + φ a ( t , x ¯ n ) z ˙ n ) + λ ˙ n 2 log k b n 2 k b n 2 e n 2 1 σ n ω ˜ n ω ^ ˙ n + λ n e n k b n 2 e n 2 [ x n + 1 + f n ( x ¯ n ) + h n ( x ¯ n ( t τ n ) ) + φ a ( t , x ¯ n ( t ) ) z ˙ n ] + 4 3 V L , n + δ ˜ n ( δ ˙ n δ ^ ˙ n ) .
The first-order derivative of  V L , n  with respect to time  t  can be written as  V L , n ι n V L , n + p n j = 1 n ψ n , j 2 ( x j ( t τ j ) )  with  p n = j = 1 n e ι n m j 1 m j , d ψ n , j 2 ( x j ) .
Next, as in Step I, using Lemma 3, we obtain
1 λ n e n h n ( x ¯ n ( t τ n ) ) + λ n e n k b n 2 e n 2 h n ( x ¯ n ( t τ n ) ) + 4 3 V L , n 4 3 ι n V L , n + 4 3 p n + 1 4 λ n 2 e n 2 + 3 λ n 2 e n 2 4 ( k b n 2 e n 2 ) .
The auxiliary variables  η n = 4 λ n e n p n ( k b n 2 e n 2 ) 3 c n ( k b n 2 e n 2 + λ n 2 ) M n = λ n e n ( k b n 2 e n 2 ) ( k b n 1 2 e n 1 2 + λ n 1 2 ) λ n 1 ( k b n 1 2 e n 1 2 ) ( k b n 1 2 e n 1 2 + λ n 2 )  and  N n = ( 2 k n + k ¯ n ) ( k b n 2 e n 2 ) z n δ n λ n 2 + ( k b n 2 e n 2 )  are introduced to the derivative of the Lyapunov function  V n  to create some ideal terms. So, we have
V ˙ n ( 1 λ n e n + λ n e n k b n 2 e n 2 ) [ u + f n ( x ¯ n ) + ϕ a ( t ) q ( x ¯ n ( t ) ) λ _ n , d 2 λ ¯ n e n + 1 4 λ ¯ n e n + 3 λ ¯ n e n 4 ( k b n 2 e n 2 ) + M n N n + η n z ˙ n ] + ( λ ˙ n 1 2 ) log k b n 2 k b n 2 e n 2 + 4 3 p n 4 e n 2 3 c n p n 1 λ n 1 e n 1 e n λ n 1 e n 1 k b n 1 2 e n 1 2 e n + 1 λ n e n ( 2 k n + k ¯ n ) z n δ n 4 3 ι n V L , n 1 σ n ω ˜ n ω ^ ˙ n + δ ˜ n ( δ ˙ n δ ^ ˙ n ) e n 2 k b n 2 e n 2 .
There also exists an unknown continuous function  Q n ( Z n )  that can be expressed as  Q n ( Z n ) = f n ( x ¯ n ) + ϕ a ( t ) q ( x ¯ n ( t ) ) + e n 4 λ ¯ n + 3 λ ¯ n e n 4 ( k b n 2 e n 2 ) λ _ n , d 2 λ ¯ n e n + η n + M n N n .  Then the RBFNN technique can be used to approximate this unknown function
Q n ( Z n ) = ω n S n ( Z n ) + ε n ( Z n )
where the input vector is  Z n = [ x ¯ n , e n 1 , e n , z n ] .
Substituting the (49) into the (48), we have
V ˙ n ( 1 λ n e n + λ n e n k b n 2 e n 2 ) ( u + ω n S n ( Z n ) + ε n ( Z n ) z ˙ n ) + ( λ ˙ n 1 2 ) log k b n 2 k b n 2 e n 2 + 4 3 p n 4 e n 2 3 c n p n 1 λ n 1 e n 1 e n λ n 1 e n 1 k b n 1 2 e n 1 2 e n + 1 λ n e n ( 2 k n + k ¯ n ) z n δ n 4 3 ι n V L , n 1 σ n ω ˜ n ω ^ ˙ n + δ ˜ n ( δ ˙ n δ ^ ˙ n ) e n 2 k b n 2 e n 2 .
Similar to the above process, denoting  γ n = x n δ ^ n z n , and we have  e n = λ n ( γ n δ ˜ n z n ) . So, the derivative is
V ˙ n ( γ n δ ˜ n z n ) [ u + ω n S n ( Z n ) + ε n ( Z n ) z ˙ n ] 1 σ n ω ˜ n ω ^ ˙ n + ( λ ˙ n 1 2 ) log k b n 2 k b n 2 e n 2 + λ n e n k b n 2 e n 2 [ u + ω n S n ( Z n ) + ε n ( Z n ) z ˙ n ] + 4 3 p n 4 e n 2 3 c n p n 1 λ n 1 e n 1 e n 4 3 ι n V L , n λ n 1 e n 1 k b n 1 2 e n 1 2 e n + 1 λ n e n ( 2 k n + k ¯ n ) z n δ n + δ ˜ n ( δ ˙ n δ ^ ˙ n ) e n 2 k b n 2 e n 2 .
At this step, we design the actual controller of the system (10) based on the form of the virtual controller (24) as well as (38) in the above steps. The weight adaptive law  ω ^ ˙ n  and attack compensator  δ ^ ˙ n  are also designed as (11) and (12), respectively.
Substituting (10), (11), and (12) into (51) yields
V ˙ n γ n ( l n γ n ( 2 k n + k ¯ n ) 2 z n 2 γ n + χ n ) δ ˜ n z n ( ω ˜ n S n ( Z n ) + χ n ) + 4 3 p n 4 e n 2 3 c n p n + a n ω ˜ n ω ^ n + λ n e n k b n 2 e n 2 ( l n γ n + χ n ) + ( λ ˙ n 1 2 ) log k b n 2 k b n 2 e n 2 + 1 λ n e n ( 2 k n + k ¯ n ) z n δ n 4 3 ι n V L , n k n λ n 2 e n 2 1 λ n 1 e n 1 e n + δ ˜ n [ δ ˙ n + ( 2 k n + k ¯ n ) z n 2 δ ^ n + π n δ ^ n ] λ n 1 e n 1 k b n 1 2 e n 1 2 e n e n 2 k b n 2 e n 2 + 2 k n δ ˜ n 2 z n 2 + k ¯ n δ ˜ n z n 2 k ¯ n δ ˜ n z n 2
where  χ n = ω n [ S n ( Z n ) S n ( Z n ) ] + ε n ( Z n )  and  Z n = [ x ¯ n , e n 1 , e n , z n ]  is also the input vector of RBF neutral network composed of compromised variables.
Similar to Step I, in this step, we can obtain  2 k n δ ˜ n 2 z n 2 + k ¯ n δ ˜ n z n 2 ( 2 k n + k ¯ n ) 2 z n 2 γ n 2 + 1 4 δ n 2 ( 2 k n + k ¯ n ) z n δ n e n λ n ( 2 k n + k ¯ n ) δ ˜ n δ ^ n z n 2 .
Then, we have the final form
V ˙ n γ n ( l n γ n + χ n ) δ ˜ n z n ( ω ˜ n S n ( Z n ) + χ n ) + λ n e n k b n 2 e n 2 ( l n γ n + χ n ) + a n ω ˜ n ω ^ n + ( λ ˙ n 1 2 ) log k b n 2 k b n 2 e n 2 + δ ˜ n ( δ ˙ n + π n δ n ) k n λ n 2 e n 2 + 1 4 δ n 2 4 3 ι n V L , n + 4 3 p n 4 e n 2 3 c n p n 1 λ n 1 e n 1 e n λ n 1 e n 1 k b n 1 2 e n 1 2 e n e n 2 k b n 2 e n 2 .

4.3. Stability Analysis

The previous section uses a recursive design approach to decompose the n-order system shown in (1) into n first-order systems to design their corresponding virtual controllers separately, and finally the specific form of the actual controller (10) is obtained. In this section, it will be analyzed whether the designed controller can make the whole system stable, and the conclusion is:
Theorem 1.
Adaptive resilient control with both unknown deception attack and full-state constraint problems is solved for the unknown time-delay nonlinear system illustrated in (1), and the designed control method consists of controllers (24), (38), and (10), weight adaptive laws (11), and attack compensators (12) to guarantee that all system variables are semi-globally uniformly ultimately bounded, while state variables satisfy the predefined constraint limits, and the error variables converge to an adjustable neighborhood of the origin.
The Proof of Theorem 1
Proof. 
We select the total Lyapunov function  V  to simplify the analysis that follows.
V = j = 1 n V j + j = 1 n 1 ς j + 1 2 2 = j = 1 n [ 1 2 λ j e j 2 + 1 2 σ j ω ˜ j ω ˜ j + λ j 2 log k b j 2 k b j 2 e j 2 + 4 3 V L , j ] + j = 2 n 1 2 δ ˜ j + j = 1 n 1 1 2 ς j + 1 2 .
By taking the first-order derivative of the total Lyapunov function  V , we obtain
V ˙ j = 1 n [ k j λ j 2 e j 2 + ( γ j + λ j e j k b j 2 e j 2 ) ( l j γ j + χ j ) 4 3 ι j V L , j + ( λ ˙ j 1 2 ) log k b j 2 k b j 2 e j 2 + a j ω ˜ j ω ^ j ] + j = 2 n [ δ ˜ j z j ( ω ˜ j S j ( Z j ) + χ j ) + δ ˜ j ( δ ˙ j + π j δ ^ j ) k ¯ j δ ˜ j 2 z j 2 + 1 4 δ j 2 ] j = 1 n e j 2 k b j 2 e j 2 + 4 3 j = 1 n ( p j e j 2 c j p j ) + j = 1 n 1 ς j + 1 ς ˙ j + 1 + j = 1 n 1 ( 1 λ j e j + λ j e j k b j 2 e j 2 ) ς j + 1 .
It is required to add that  e 1 = γ 1  for (55), and in this work, let  k 1 > 0  to assure the accuracy of the calculation. Next, simplify some of the terms in (55) using Young’s inequality so that it can take the desired form. They are listed as follows:  γ j χ j 1 2 l j γ j 2 + 1 2 l j χ ¯ j 2 l j γ j λ j e j k b j 2 e j 2 λ ¯ j e j 2 2 ( k b j 2 e j 2 ) + 1 2 l j γ j 2 λ j e j χ j k b j 2 e j 2 λ ¯ j e j 2 2 ( k b j 2 e j 2 ) + 1 2 χ ¯ j 2 a j ω ˜ j ω ^ j a j 2 ω ˜ j ω ˜ j + 2 a j ω ¯ j ω ¯ j δ ˜ j z j ω ˜ j S j ( Z j ) k ¯ j 2 δ ˜ j 2 z j 2 + 1 2 k ¯ j S ¯ j 2 ω ˜ j ω ˜ j δ ˜ j z j χ j k ¯ j 2 δ ˜ j 2 z j 2 + 1 2 k ¯ j χ ¯ j 2 δ ˜ j δ ˙ j k ¯ j δ ˜ j 2 + 1 4 k ¯ j δ ¯ j , d 2 π j δ ˜ j δ ^ j π j 2 δ ˜ j 2 + π j 2 δ ¯ j 2 2 λ ¯ j e j 2 k b j 2 e j 2 2 λ ¯ j log k b j 2 k b j 2 e j 2 . On top of this, we also need to define some constants to help us further simplify the inequality (55),  A j = ( 1 2 l j + 1 2 ) χ ¯ j 2 + a j 2 ω ¯ j ω ¯ j B j = 1 2 k ¯ j χ ¯ j 2 + 1 4 k ¯ j δ ¯ j , d 2 + ( 1 4 + π j 2 ) δ ¯ j 2 a j = 2 k j λ ¯ j b j = a j σ j S ¯ j 2 σ j k ¯ j c j = 4 λ ¯ j 4 λ _ j , d λ ¯ j 2 d j = 2 k ¯ j + π j . The following form can be obtained:
V ˙ j = 1 n [ a j 1 2 λ 1 e 1 2 b j 1 2 σ j ω ˜ j ω ˜ j 4 3 ι j V L , j c j λ j 2 log k b j 2 k b j 2 e j 2 + A j ] + j = 2 n [ d j 1 2 δ ˜ j 2 + B j ] + j = 1 n 1 ς j + 1 ( ς ˙ j + 1 + 1 λ j e j + λ j e j k b j 2 e j 2 ) + 4 3 j = 1 n ( 1 e j 2 c j ) p j .
The error  ς j  between the input signal and the output signal of the first-order low-pass filter in (14) is discussed in detail as follows. The  ς ˙ j + 1  mentioned in (56) can be expressed a
ς ˙ j + 1 = z ˙ j + 1 α ˙ j + 1 = ς j + 1 ν j + 1 α ˙ j + 1 .
It is clear that the stability of the system is significantly impacted by the boundedness of  α ˙ j + 1 ,   j = 1 , 2 , , n 1 , and the following discussion specifically addresses  α ˙ j + 1 . When  j = 1 α ˙ 2 = l 1 e ˙ 1 k 1 e ˙ 1 ω ^ ˙ 1 S 1 ( Z 1 ) ω ^ 1 S ˙ 1 ( Z 1 ) Z ˙ 1 ; and when  j > 1 α ˙ j + 1 = ω ^ ˙ j S j ( Z j ) ω ^ j S ˙ j ( Z j ) Z ˙ j + ς ˙ j ν j ( 2 k j + l j ) γ ˙ j 2 ( 2 k i + k ¯ i ) 2 z ˙ i z i γ i ( 2 k i + k ¯ i ) 2 z i 2 γ ˙ i ϑ ˙ j , where  ϑ j = 2 k j γ j + ( 2 k j + k ¯ j ) 2 z j 2 γ j 1 + 2 k b j 2 / λ j 2 2 e j 2 . For ease of representation, we presume the existence of a continuous function  Θ j + 1 · , one has
α ˙ j + 1 = Θ j + 1 ( ω ¯ j , e ¯ j , α ¯ j , ς ¯ j , δ ¯ j )
where  ω ¯ j = [ ω ^ 1 , ω ^ 2 , , ω ^ n , ω ^ ˙ 1 , ω ^ ˙ 2 , , ω ^ ˙ n ] e ¯ j = [ e 1 , e 2 , , e j , e ˙ 1 , e ˙ 2 , , e ˙ j ] α ¯ j = [ α 2 , , α j , α ˙ 2 , , α ˙ j ] ς ¯ j = [ ς 2 , , ς j , ς ˙ 1 , , ς ˙ j ] δ ¯ j = [ δ 2 , , δ j , δ ˙ 2 , , δ ˙ j ] . There exists an unknown constant  Θ ¯ j + 1 > 0  such that  Θ j + 1 ( ω ¯ j , e ¯ j , α ¯ j , ς ¯ j , δ ¯ j ) Θ ¯ j + 1 , so that we have
ς j + 1 ( ς ˙ j + 1 + 1 λ j e j + λ j e j k b j 2 e j 2 ) = ς j + 1 2 ν j + 1 + G j + 1 ς j + 1                                                                     ( 1 ν j + 1 + k ¯ j + 1 ) ς j + 1 2 + 1 4 k ¯ j + 1 G ¯ j + 1 2
where  G j + 1 = Θ j + 1 + 1 λ j + 1 e j ς j + 1 + λ j e j k b j 2 e j 2 . It can be deduced from the boundedness of  Θ j + 1  that  G j + 1 G ¯ j + 1 , and  G ¯ j + 1  is an unknown constant. Subsequently, by substituting (59) into (56), we can obtain
V ˙ j = 1 n [ a j 1 2 λ 1 e 1 2 + b j 1 2 σ j ω ˜ j ω ˜ j + 4 3 ι j V L , j + c j λ j 2 log k b j 2 k b j 2 e j 2 + A j ] j = 2 n ( d j 1 2 δ ˜ j 2 + e j 1 2 ς j + 1 2 ) + j = 2 n ( B j + C j ) + 4 3 j = 1 n ( 1 e j 2 c j )
where  e j = 2 ( 1 ν j + 1 k ¯ j + 1 ) C j = 1 4 k ¯ j + 1 G ¯ j + 1 2 .
Simplifying (59) again by letting  ρ = min j = 1 , 2 , , n { a j , b j , c j , d j , e j , 2 3 ι j } m = j = 1 n A j + j = 2 n ( B j + C j ) , one obtains
V ˙ ρ V + m + 2 j = 1 n ( 1 e j 2 c j ) p j .
It is obvious that just the sign of term  2 j = 1 n ( 1 e j 2 c j ) p j  in (60) cannot be determined, which makes our stability analysis more difficult.
2 j = 1 n ( 1 e j 2 c j ) p j = 2 j = 1 n ( c j e j 2 c j ) p j .
In accordance with (62), we divide into three cases and take into account the magnitude of  2 j = 1 n ( 1 e j 2 c j ) p j  in each case: the first case is  e j c j , i.e.,  2 j = 1 n ( 1 e j 2 c j ) p j 0 ; the second case is  e j > c j , i.e.,  2 j = 1 n ( 1 e j 2 c j ) p j < 0 ; for the third instance, first define the set  Ξ υ : = { e υ | e υ c υ } Ξ ο : = { e ο | e ο c ο } , and  Ξ υ Ξ ο = Ξ , which is the combination of the first two cases, i.e.,  e υ Ξ υ ,   e ο Ξ ο .
Case 1. ( e υ Ξ υ ,   υ = 1 , 2 , , n ): In this case,  2 j = 1 n ( 1 e j 2 c j ) p j 0 . We analyze the stability of each variable step by step. First, when  j = 1 e 1 c 1  is bounded, and according to (2) and Assumption 1, we can learn that  e 1 x 1 , and  x 1  are bounded, which means  ω ^ 1  is bounded, making the virtual controller  α 2  bounded. Second, when  j = 2 e 2 c 2  is bounded, and according to Assumption 1, we can learn that  e 2  is bounded; additionally, it can be deduced from the boundedness of  α 2  that its filter signal  z 2  is also bounded; when combined with the boundedness of  z 2 e 2  and (13) it can also be deduced that  x 2 ω ^ 2 , and  δ ^ 2  are also bounded, indicating that  α 3  is bounded. When  j = 3 , according to  e 3 c 3  is bounded, it can be known  e 3  is bounded, according to  α 3  is bounded, it can be known  z 3  is bounded, and the same procedure as when  j = 2 , it is possible to determine that  x 3 ω ^ 3 δ ^ 3 , and  α 4  are bounded. At  j = n , which is reached by repeatedly doing the aforementioned process, it is known that the closed-loop system’s actual controller,  u , and all of its signals are bounded.
Case 2. ( e ο Ξ ο ,   ο = 1 , 2 , , n ): In this case,  2 j = 1 n ( 1 e j 2 c j ) p j < 0 , so (60) can be rewritten in the following form:
V ˙ ρ V + m .
By solving the differential inequality shown in (62) we can obtain
V = [ V ( 0 ) m ρ ] e ρ t + m ρ .
When (54) and (63) are combined,  j = 1 n 1 2 λ j e j 2 [ V ( 0 ) m ρ ] e ρ t + m ρ  is obviously obtained. We get  e 2 λ m [ V ( 0 ) m ρ ] e ρ t + 2 λ m m ρ  by setting  λ m = max { λ 1 , λ 2 , , λ n }  and  e ¯ = [ e 1 , e 2 , , e n ] . The right-hand side of the inequality is a decreasing function with time, so that  e 2 λ m m ρ  when  t . The magnitude of the error variable  e j  depends on the parameters  m  and  ρ . We can see that all of the closed-loop system’s signals are bounded, and the error may be reduced arbitrarily slightly by selecting the proper parameters.
Case 3. ( e υ Ξ υ ,   e ο Ξ ο ,   υ ο ): In the calculation of the total Lyapunov function of the system, the summation operation makes some terms cancel each other, however, in this instance, the straightforward cumulative elimination is obviously erroneous, necessitating a thorough treatment of these terms. When  e υ Ξ υ ,   e ο Ξ ο ,   υ = ο + 1 , the term  1 λ ο e ο e υ λ ο e ο k b ο 2 e ο 2 e υ  is treated differently than before, we do the following for the term:  1 λ ο e ο e υ λ ο e ο k b ο 2 e ο 2 e υ 1 λ ο 2 e ο 2 + 1 4 e υ 2 e ο 2 k b ο 2 e ο 2 1 4 λ ο 2 e υ 2 , and then using Lemma 4 we can get  1 λ ο e ο e υ λ ο e ο k b ο 2 e ο 2 e υ 1 λ ο 2 e ο 2 log k b ο 2 k b ο 2 e ο 2 ( 1 4 λ _ ο 2 1 4 ) c υ . Next, we slightly modify the constant value set in the previous section, i.e.,  a j = 2 k j λ ¯ j 1 c j = 4 λ ¯ j 4 λ _ j , d λ ¯ j 4 ρ = min j = 1 , 2 , , n { a j , b j , c j , d j , e j , 2 3 ι j } m = j = 1 n A j + j = 2 n ( B j + C j ) ο Γ ο , υ Γ υ ( 1 4 λ _ ο 2 1 4 ) c υ . The above inequality (63) can be expressed as  V ˙ ρ V + m . Repeating the analysis steps in Case 2, we may draw the conclusion that the closed-loop system’s signals all converge and that the size of the chosen parameters determines the width of the error variable’s convergence domain.□
  • By proving cases 1–3, the proof of Theorem 1 is finished.
  • Figure 1 is the block diagram of the method proposed in this paper. For a class of unknown nonlinear systems under deception attacks, we use the Backstepping technique as a framework to design a controller  u  based on Lyapunov stability theory that allows the system to maintain stability while its state variables satisfy a predetermined full-state constraint.
Remark 5.
The parameters selected in the design process above are only sufficient conditions for system stability. As analyzed in Case 2 above, under the premise of ensuring system stability, appropriately increasing  ρ  or decreasing  m  will theoretically reduce the size of the error variable to a certain extent, but it does not mean that the larger the value of  ρ  is, the better, or the smaller the value of  m  is, the better, and the optimal value needs to be further determined in practice.
Remark 6.
The method designed in this paper only guarantees that the system remains stable under the condition that the constraint is satisfied, but does not consider the time for the system to reach stability. As analyzed in the above three cases, the system reaches the steady state when time  t , but for a practical system device, it is obvious that the shorter the time t to reach stability, the better. This is the limitation of this paper and an urgent problem for the next research work.
Remark 7.
Anti-attack control of CPS is one of the important branches of security control, and the purpose of this article is to keep the system stable, and the system state variables satisfy the constraint limits even when the system is subject to full-state constraints and external unknown deception attacks. I believe that applying it to the control example of a bottleneck section of a high-speed trains systems studied in [34] will yield good results.
Remark 8.
The following directions can be pursued in the follow-up research process:
  • Without concentrating on the system’s convergence time, the stability of the system is simply ensured in this study. The problem of finite-time adaptive resilient control of nonlinear time-delay systems with actuator failure and error data injection attacks is addressed in [50]. This finite-time resilient control method can be used in the next stage of research to accelerate the convergence speed of the system for nonlinear systems with both unknown deception attacks and full-state constraints.
  • Standing in the perspective of saving resources to consider, event-triggered control methods are proposed for unknown nonlinear systems in [51], but relatively little research has been done on adaptive event-triggered control for nonlinear systems with both unknown deception attacks and full-state constraints, which is a very promising research direction.
  • In this study, all sensors and actuators are presupposed to be affected by unknown deception attacks, although in real-world engineering, this is extremely uncommon and frequently only some of the actuators and sensors are exposed to unknown deception attacks. Therefore, taking into account the system’s resource usage and execution efficiency, a detection and estimation method for deception attacks on the actuators of nonlinear systems is proposed in [52]. Our next step can be to develop an attack detection method based on this approach.

5. Simulation

In this section, two specific examples will be provided to verify the rationality and validity of the theory. The first example is a numerical example and the second example is a practical case, a chemical reactor recovery system. It should be added that the simulation examples in this article are implemented using MATLAB software, without calling any library functions or toolboxes, and the simulation experiments are completed using only script files (.m).
Example 1.
To test the validity of the aforementioned theory, simulation experiments are conducted on a numerical example in this section. A third-order nonlinear system is created as shown below:
x ˙ 1 = x 2 + f 1 ( x 1 ( t ) ) + h 1 ( x 1 ( t τ 1 ( t ) ) ) x ˙ 2 = x 3 + f 2 ( x ¯ 2 ( t ) ) + h 2 ( x ¯ 2 ( t τ 2 ( t ) ) ) x ˙ 3 = u + φ a ( t , x ¯ 3 ( t ) ) + f 3 ( x ¯ 3 ( t ) ) + h 3 ( x ¯ 3 ( t τ 3 ( t ) ) ) x j = x j + φ j , s ( t , x j ( t ) )
where the unknown nonlinear function without the time-delay term and the unknown nonlinear function with the time-delay term are   f 1 ( x 1 ( t ) ) = x 1 2 ( t ) ,   h 1 ( x 1 ( t τ 1 ( t ) ) ) = x 1 ( t τ 1 ( t ) ) sin ( x 1 ( t τ 1 ( t ) ) ) ;   f 2 ( x ¯ 2 ( t ) ) = exp ( 0.1 x 1 ( t ) ) sin ( x 2 ( t ) ) + sin ( x 1 ( t ) ) sin ( x 2 ( t ) ) ,   h 2 ( x ¯ 2 ( t τ 2 ( t ) ) ) = sin ( x 2 ( t τ 2 ( t ) ) ) ;   f 3 ( x ¯ 3 ( t ) ) = x 1 ( t ) x 3 ( t ) cos ( x 2 ( t ) ) + sin ( x 3 ( t ) ) cos ( x 2 ( t ) ) ,   h 3 ( x ¯ 3 ( t τ 3 ( t ) ) ) = x 1 ( t τ 1 ( t ) ) exp ( 0.5 x 3 ( t τ 3 ( t ) ) ) + sin ( x 3 ( t τ 3 ( t ) ) ) x 2 ( t τ 2 ( t ) ) ; unknown sensor deception attack signals are   φ 1 , s ( t , x 1 ) = ( 1 + sin t ) x 1 ,   φ 2 , s ( t , x 2 ) = ( 1 + sin t ) x 2 ,   φ 3 , s ( t , x 3 ) = ( 1 + cos t ) x 3 ; unknown actuator attack signal is   φ a ( t , x ¯ 3 ) = cos ( 1.5 t ) x 1 x 3 . The unknown time-delay terms are   τ 1 ( t ) = 0.5 ( 3 + cos t ) ,   τ 2 ( t ) = 0.5 ( 3 + cos t ) ,   τ 3 ( t ) = 0.3 ( 4 + sin t ) . According to the controller designed above, the resilient control strategy is
α 2 = l 1 e 1 k 1 e 1 ω ^ 1 S 1 ( Z 1 )
α 3 = ω ^ 2 S 2 ( Z 2 ) + α 2 z 2 ν 2 ( 2 k 2 + l 2 + ( 2 k 2 + k ¯ 2 ) 2 z 2 2 ) γ 2 2 k 2 γ 2 + ( 2 k 2 + k ¯ 2 ) 2 z 2 2 γ 2 1 + 2 ( k b 2 2 / λ 2 2 e 2 2 )
u = ω ^ 3 S 3 ( Z 3 ) + α 3 z 3 ν 3 ( 2 k 3 + l 3 + ( 2 k 3 + k ¯ 3 ) 2 z 3 2 ) γ 3 2 k 3 γ 3 + ( 2 k 3 + k ¯ 3 ) 2 z 3 2 γ 3 1 + 2 ( k b 3 2 / λ 3 2 e 3 2 )
ω ^ ˙ 1 = σ 1 ( e 1 + e 1 k b 1 2 / λ 1 2 e 1 2 ) S 1 ( Z 1 ) σ 1 a 1 ω ^ 1
ω ^ ˙ i = σ i ( γ i + e i k b i 2 / λ i 2 e i 2 ) S i ( Z i ) σ i a i ω ^ i ,   i = 2 , 3
δ ^ ˙ i = ( 2 k i + l i + ( 2 k i + k ¯ i ) 2 z i 2 ) z i γ i ( 2 k i + k ¯ i ) z i 2 δ ^ i π i δ ^ i ,   i = 2 , 3 .
The initial values of the system state variables are selected to be  x ¯ 3 = [ 0.5 , 0.6 , 0 ]  for the system described in (65), and their coefficients are  k 1 = k 2 = 0.5 ,  k 3 = 0.15 ,  l 1 = 0.01 ,  l 2 = 0.3 ,  l 3 = 2.5 ,  k ¯ 2 = 0.2 ,  k ¯ 3 = 0.08 ,  ν 2 = 0.003 ,  ν 3 = 0.002 ,  σ 1 = 1.2 ,  σ 2 = 1 ,  σ 3 = 0 . 9 ,  a 1 = 0.008 ,  a 2 = 0.01 ,  a 3 = 0.01 ,  π 2 = 1 ,  π 3 = 0 . 8 ,  k b 1 = k b 2 = k b 3 = 3 . Neural networks  ω ^ 1 S 1 ( Z 1 ) ,  ω ^ 2 S 2 ( Z 2 ) , and  ω ^ 3 S 3 ( Z 3 )  have  N 1 = 3 ,  N 2 = 12 , and  N 3 = 48  neurons, respectively, and  l 1 , i = 1.5 ,   i = 1 , 2 , , N 1 ,  l 2 , i = 1.5 ,   i = 1 , 2 , , N 2  and  l 3 , i = 1.5 ,   i = 1 , 2 , , N 3 , respectively, are the widths of their receptive fields. For the first neural network  ω ^ 1 S 1 ( Z 1 ) , the centers of its receptive domain are  ϖ 1 , 1 = 0.7 ,  ϖ 1 , 2 = 0 ,  ϖ 1 , 3 = 0.7 ; for the second neural network  ω ^ 2 S 2 ( Z 2 ) , the centers of its receptive domain are distributed in the grid  { 0.7 , 0 , 0.7 } × { 0.8 , 0.8 } × { 0.3 , 0.3 } × { 0.5 , 0.5 } ; for the third neural network  ω ^ 3 S 3 ( Z 3 ) , the centers of its receptive domain are distributed in the grid  { 0.7 , 0 , 0.7 } × { 0.7 , 0.7 } × { 0.7 , 0.7 } × { 0.5 , 0.5 } × { 0.5 , 0.5 } × { 0.5 , 0.5 } .
Remark 9.
In order to avoid uncontrollable situations, our initial values are chosen to be within the state constraints, namely,  x 1 ( k b 1 , k b 1 ) ,  x 2 ( k b 2 , k b 2 ) ,  x 3 ( k b 3 , k b 3 ) . Within the above range, the initial value can be chosen arbitrarily. Regarding other parameters, the case of setting is not unique. Since we only need to justify the theory presented in this paper, all it takes is the existence of a situation in which it holds. The specific setting of the parameters varies with the case of the dynamic equations.
Figure 2 depicts the evolution of the system’s state variable, as time passes, each one converges and satisfies the preset state constraints. Figure 3 shows the curves of the virtual controller and the actual controller with time, all three show the process from fluctuation to convergence. The attack compensator’s changing curve is depicted in Figure 4. Figure 5 shows the system error variables’ change curve, which converges with time and follows the same general pattern as the system state variables and the controller. Figure 6 depicts the first-order filter’s variation curve for the controller’s output variables, and Figure 7 depicts the RBF neural network’s approximate variation curve. Using the control technique described above can successfully maintain the stability of the nonlinear system under unknown deception attacks and better satisfy the predefined full-state constraints, as can be shown when combined with the aforementioned simulation findings.
Example 2.
We introduce the chemical reactor recovery system in [44] to verify the practical applicability and theoretical correctness of the theoretical approach in this paper. As mentioned in [44], there is always some unnecessary waste in chemical reaction systems. In order to improve the utilization of resources, chemical reactor recycling systems were born. Their main operation is separation, separating raw materials from products which are later recycled through different paths. In the process of recycling, delays are inevitably generated. Moreover, during the operation of the whole device, it is also very vulnerable to external deception attacks that put the whole system in crisis.
In this paper, the problem of adaptive stability control of a class of three-stage chemical reaction cycle systems with time delays is studied. The dynamics of a three-stage chemical reaction system are shown in [44].
x ˙ 1 = ( A + 1 A ) x 1 1 A x 1 ( t τ 1 ) + 1 A Κ A x 2 x ˙ 2 = ϒ Κ B u B x 2 1 B x 2 2 2 B x 2 + B Κ B x 1 ( t τ 1 ) + B Κ B x 2 ( t τ 2 )
where  A = B = 0.5  are reaction constants,  A = B = 0.5  are the flow rates of recycle,  Κ A = Κ B = 0.5  are the volume of reactors,  A = B = 2  are the reactor residence times,  ϒ = 0.5  is the feed rate of this system, and the equilibrium point is  = 7 3 . In addition to this,  x 1  and  x 2  are the reactor production stream components, which are similar to the state variables of the system.
If we convert (72) into the form of (1) and consider the deception attacks from outside, we will get the following one:
x ˙ 1 = x 2 + f 1 ( x 1 ) + h 1 ( x 1 ( t τ 1 ) ) x ˙ 2 = u + f 2 ( x ¯ 2 ) + h 2 ( x ¯ 2 ( t τ 2 ) ) + φ a ( t , x ¯ 2 ) x j = x j + φ j , s ( t , x j )
where  j = 1 , 2  are the number of sensors, the unknown nonlinear terms are  f 1 ( x 1 ) = ( A + 1 A ) x 1  and  f 2 ( x ¯ 2 ) = B x 2 1 B x 2 2 2 B x 2 , the unknown terms with time-delay are  h 1 ( x 1 ( t τ 1 ) ) = 1 A x 1 ( t τ 1 )  and  h 2 ( x ¯ 2 ( t τ 2 ) ) = B Κ B x 1 ( t τ 1 ) + B Κ B x 2 ( t τ 2 ) . In addition to the system functions, we also have deception attacks of sensors as  φ 1 , s = 0.8 + cos ( 2 t )  and  φ 2 , s = 0.3 + sin ( t ) , deception attack of actuator is  φ a = cos ( t ) cos ( x 2 ( t ) ) x 1 ( t ) . The uncertainty of the system is reflected in the unknown nature of the  f i ( x ¯ i ) h i ( x ¯ i ( t τ i ) )  function.
According to the adaptive resilient control method designed above, we can obtain
α 2 = l 1 e 1 k 1 e 1 ω ^ 1 S 1 ( Z 1 )
u = ω ^ 2 S 2 ( Z 2 ) + α 2 z 2 ν 2 ( 2 k 2 + l 2 + ( 2 k 2 + k ¯ 2 ) 2 z 2 2 ) γ 2 2 k 2 γ 2 + ( 2 k 2 + k ¯ 2 ) 2 z 2 2 γ 2 1 + 2 ( k b 2 2 / λ 2 2 e 2 2 )
ω ^ ˙ 1 = σ 1 ( e 1 + e 1 k b 1 2 / λ 1 2 e 1 2 ) S 1 ( Z 1 ) σ 1 a 1 ω ^ 1
ω ^ ˙ 2 = σ 2 ( γ 2 + e 2 k b 2 2 / λ 2 2 e 2 2 ) S 2 ( Z 2 ) σ 2 a 2 ω ^ 2
δ ^ ˙ 2 = ( 2 k 2 + l 2 + ( 2 k 2 + k ¯ 2 ) 2 z 2 2 ) z 2 γ 2 ( 2 k 2 + k ¯ 2 ) z 2 2 δ ^ 2 π 2 δ ^ 2
The initial values of the system state variables are selected to be  x ¯ 2 = [ 0.4 , 0.4 ]  for the system described in (73), it is very important to note that the initial values are chosen in such a way that they do not violate the state constraints, that is,  x 1 ( k b 1 , k b 1 )  and  x 2 ( k b 2 , k b 2 ) . Their coefficients are  k 1 = k 2 = 0.5 l 1 = 0.01 l 2 = 0.3 k ¯ 2 = 0.2 ν 2 = 0.003 σ 1 = 1.2 σ 2 = 1 a 1 = 0.008 a 2 = 0.01 π 2 = 1 k b 1 = k b 2 = 0.75 . Neural networks  ω ^ 1 S 1 ( Z 1 )  and  ω ^ 2 S 2 ( Z 2 )  have  N 1 = 3 N 2 = 12  neurons respectively, and  l 1 , i = 1.5 ,   i = 1 , 2 , , N 1  and  l 2 , i = 1.5 ,   i = 1 , 2 , , N 2 , respectively, are the widths of their receptive fields. For the first neural network  ω ^ 1 S 1 ( Z 1 ) , the centers of its receptive domain are  ϖ 1 , 1 = 0.7 ϖ 1 , 2 = 0 ϖ 1 , 3 = 0.7 ; for the second neural network  ω ^ 2 S 2 ( Z 2 ) , the centers of its receptive domain are distributed in the grid  { 0.7 , 0 , 0.7 } × { 0.8 , 0.8 } × { 0.3 , 0.3 } × { 0.5 , 0.5 } .
Figure 8 shows the variation curves of the system state variables over time under the full-state constraints. Figure 9 shows the variation curves of the designed virtual controller and the actual controller over time. Figure 10 depicts the variation curves of the attack compensator over time. Figure 11 depicts the variation curves of the unknown nonlinearity of the RBF neural network approximation system. From the figures below, it can be seen that the curves all trend from violent vibration to gradual convergence, indicating that the method proposed in this paper can effectively combat unknown deception attacks under the condition of full-state constraints. It enables the chemical reactor recovery system to converge to the equilibrium state quickly even after the external spoofing attack.

6. Conclusions

For an unknown nonlinear system with unknown deception attacks and full-state constraints, an adaptive resilient control strategy based on neural networks is proposed. In the design process, the dynamic surface technique is used to improve the backstepping control strategy to reduce its computational complexity. The state variables of the system become unmeasurable due to the impact of the unknown deception attacks, so a novel compromised variables-based backstepping control method is used in this paper to overcome the problem of unavailable state variables. The unknown nonlinear terms are estimated using RBF neural networks, and an attack compensator is built to mitigate the impact of deception attacks. For the unknown time-delay terms, LKF is introduced to eliminate its influence on the controller design. The full-state constraint is an inevitable problem in practical engineering, so BLF is introduced to restrict the system state variables. Finally, the feasibility of the theory is confirmed by two simulation experiments. In future work, we can consider adding event-triggering techniques to achieve energy saving, or using finite-time adaptive control strategy to accelerate the convergence speed of the system, etc.

Author Contributions

Methodology, Z.C.; Software, Z.C.; Validation, Z.C.; Investigation, Y.S.; Writing—original draft, Z.C.; Writing—review & editing, N.P.; Supervision, X.W.; Funding acquisition, Y.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

No additional dataset is required for this article. Relevant simulation examples have been mentioned in Ref.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Wang, Q.; Wei, C. Output tracking of nonlinear systems with unknown control coefficients and nonlinear parameterization. In Proceedings of the 2008 Chinese Control and Decision Conference, Yantai, China, 2–4 July 2008; IEEE: Piscataway, NJ, USA, 2008; pp. 4198–4203. [Google Scholar]
  2. Shang, F.; Liu, Y.; Zhang, M.; Zhang, X. Adaptive stabilization for feedforward nonlinear systems with unknown control direction. In Proceedings of the 32nd Chinese Control Conference, Xi’an, China, 26–28 July 2013; IEEE: Piscataway, NJ, USA, 2013; pp. 615–619. [Google Scholar]
  3. Wang, X.; Zhao, J.; Tang, Y. State tracking model reference adaptive control for switched nonlinear systems with linear uncertain parameters. J. Control Theory Appl. 2012, 10, 354–358. [Google Scholar] [CrossRef]
  4. Xie, C.L.; Shao, C.; Zhao, D.D. Tracking control for a class of unknown nonlinear systems based on LS-SVM. In Proceedings of the 2010 International Conference on Machine Learning and Cybernetics, Qingdao, China, 11–14 July 2010; IEEE: Piscataway, NJ, USA, 2010; Volume 3, pp. 1519–1523. [Google Scholar]
  5. Kanellakopoulos, I.; Kokotovic, P.V.; Morse, A.S. Systematic design of adaptive controllers for feedback linearizable systems. In Proceedings of the 1991 American Control Conference, Boston, MA, USA, 26–28 June 1991; IEEE: Piscataway, NJ, USA, 1991; pp. 649–654. [Google Scholar]
  6. Krstić, M.; Kanellakopoulos, I.; Kokotović, P. Adaptive nonlinear control without overparametrization. Syst. Control Lett. 1992, 19, 177–185. [Google Scholar] [CrossRef]
  7. Kokotović, P.; Kanellakopoulos, I.; Morse, A. Adaptive feedback linearization of nonlinear systems. In Proceedings of the Foundations of Adaptive Control; Springer: Berlin/Heidelberg, Germany, 1991; pp. 309–346. [Google Scholar]
  8. Kokotovic, P. Joy of feedback: Nonlinear and adaptive. Bode Prize Lecture. In Proceedings of the 30th IEEE Conference on Decision and Control, Brighton, UK, 11–13 December 1991. [Google Scholar]
  9. Swaroop, D. Dynamic surface control for a class of nonlinear systems. IEEE Trans. Autom. Control 1996, 4, 545–552. [Google Scholar] [CrossRef] [Green Version]
  10. Wang, S.; Wang, L.; Yang, W.; Wang, X.; Xia, J. Adaptive neural network control of nonlinear MIMO systems with unmeasured states and unknown control coefficients. In Proceedings of the 2021 40th Chinese Control Conference (CCC), Shanghai, China, 26–28 July 2021; IEEE: Piscataway, NJ, USA, 2021; pp. 651–656. [Google Scholar]
  11. Li, H.; Bai, L.; Wang, L.; Zhou, Q.; Wang, H. Adaptive neural control of uncertain nonstrict-feedback stochastic nonlinear systems with output constraint and unknown dead zone. IEEE Trans. Syst. Man Cybern. Syst. 2016, 47, 2048–2059. [Google Scholar] [CrossRef]
  12. Liu, Z.; Wang, F.; Zhang, Y.; Chen, X.; Chen, C.P. Adaptive tracking control for a class of nonlinear systems with a fuzzy dead-zone input. IEEE Trans. Fuzzy Syst. 2014, 23, 193–204. [Google Scholar] [CrossRef]
  13. Yu, J.; Shi, P.; Dong, W.; Chen, B.; Lin, C. Neural network-based adaptive dynamic surface control for permanent magnet synchronous motors. IEEE Trans. Neural Netw. Learn. Syst. 2014, 26, 640–645. [Google Scholar] [CrossRef]
  14. Chen, B.; Zhang, H.; Lin, C. Observer-based adaptive neural network control for nonlinear systems in nonstrict-feedback form. IEEE Trans. Neural Netw. Learn. Syst. 2015, 27, 89–98. [Google Scholar] [CrossRef]
  15. Wu, C.; Liu, J.; Jing, X.; Li, H.; Wu, L. Adaptive fuzzy control for nonlinear networked control systems. IEEE Trans. Syst. Man Cybern. Syst. 2017, 47, 2420–2430. [Google Scholar] [CrossRef]
  16. Yu, Z.; Li, S.; Yu, Z. Adaptive neural control for a class of pure-feedback nonlinear time-delay systems with asymmetric saturation actuators. Neurocomputing 2016, 173, 1461–1470. [Google Scholar] [CrossRef]
  17. Si, W.; Dong, X.; Yang, F. Nussbaum gain adaptive neural control for stochastic pure-feedback nonlinear time-delay systems with full-state constraints. Neurocomputing 2018, 292, 130–141. [Google Scholar] [CrossRef]
  18. Yin, S.; Shi, P.; Yang, H. Adaptive fuzzy control of strict-feedback nonlinear time-delay systems with unmodeled dynamics. IEEE Trans. Cybern. 2015, 46, 1926–1938. [Google Scholar] [CrossRef] [PubMed]
  19. Liu, Z.; Lai, G.; Zhang, Y.; Chen, C.P. Adaptive fuzzy tracking control of nonlinear time-delay systems with dead-zone output mechanism based on a novel smooth model. IEEE Trans. Fuzzy Syst. 2015, 23, 1998–2011. [Google Scholar] [CrossRef]
  20. Yang, Q.; Yang, Z.; Sun, Y. Universal neural network control of MIMO uncertain nonlinear systems. IEEE Trans. Neural Netw. Learn. Syst. 2012, 23, 1163–1169. [Google Scholar] [CrossRef]
  21. Yang, Q.; Jagannathan, S.; Sun, Y. Robust integral of neural network and error sign control of MIMO nonlinear systems. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 3278–3286. [Google Scholar] [CrossRef] [PubMed]
  22. Wang, M.; Chen, B.; Shi, P. Adaptive neural control for a class of perturbed strict-feedback nonlinear time-delay systems. IEEE Trans. Syst. Man Cybern. Part B 2008, 38, 721–730. [Google Scholar] [CrossRef]
  23. Yoo, S.J.; Park, J.B.; Choi, Y.H. Adaptive neural control for a class of strict-feedback nonlinear systems with state time delays. IEEE Trans. Neural Netw. 2009, 20, 1209–1215. [Google Scholar]
  24. Yoo, S.J. Neural-network-based adaptive resilient dynamic surface control against unknown deception attacks of uncertain nonlinear time-delay cyberphysical systems. IEEE Trans. Neural Netw. Learn. Syst. 2019, 31, 4341–4353. [Google Scholar] [CrossRef]
  25. An, L.; Yang, G.H. Secure state estimation against sparse sensor attacks with adaptive switching mechanism. IEEE Trans. Autom. Control 2017, 63, 2596–2603. [Google Scholar] [CrossRef]
  26. Gao, R.; Huang, J. Adaptive Control for High-order Nonlinear Systems Subject to Deception Attacks with Assignable Stabilization Performance. In Proceedings of the 2022 IEEE 17th Conference on Industrial Electronics and Applications (ICIEA), Chengdu, China, 16–19 December 2022; IEEE: Piscataway, NJ, USA, 2022; pp. 1194–1199. [Google Scholar]
  27. Yang, Y.; Huang, J.; Su, X.; Wang, K.; Li, G. Adaptive control of second-order nonlinear systems with injection and deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2020, 52, 574–581. [Google Scholar] [CrossRef]
  28. Long, M.; Wu, C.H.; Hung, J.Y. Denial of service attacks on network-based control systems: Impact and mitigation. IEEE Trans. Ind. Inform. 2005, 1, 85–96. [Google Scholar] [CrossRef]
  29. Zhao, R.; Zuo, Z.; Wang, Y. Event-triggered control for switched systems with denial-of-service attack. IEEE Trans. Autom. Control 2022, 67, 4077–4090. [Google Scholar] [CrossRef]
  30. Lu, A.Y.; Yang, G.H. Observer-based control for cyber-physical systems under denial-of-service with a decentralized eventtriggered scheme. IEEE Trans. Cybern. 2019, 50, 4886–4895. [Google Scholar] [CrossRef] [PubMed]
  31. Zhu, M.; Martinez, S. On the performance analysis of resilient networked control systems under replay attacks. IEEE Trans. Autom. Control 2013, 59, 804–808. [Google Scholar] [CrossRef] [Green Version]
  32. Gallo, A.J.; Turan, M.S.; Boem, F.; Ferrari-Trecate, G.; Parisini, T. Distributed watermarking for secure control of microgrids under replay attacks. IFAC-PapersOnLine 2018, 51, 182–187. [Google Scholar] [CrossRef]
  33. Karpmski, M.; Martsenyuk, V.; Gvozdetska, I.; Akhmetov, B.; Zhumangalieva, N. Estimation problem for network model at state and measurements attacks and information cost criterion. In Proceedings of the 2016 16th International Conference on Control, Automation and Systems (ICCAS), Gyeongju, Republic of Korea, 16–19 October 2016; pp. 45–50. [Google Scholar] [CrossRef]
  34. Zhao, H.; Dai, X. Event-triggered adaptive control for multiple highspeed trains with deception attacks in bottleneck sections. Inf. Sci. 2021, 547, 470–481. [Google Scholar] [CrossRef]
  35. Zhang, X.; Yang, F.; Sun, X. Resilient Adaptive Event-Triggered Load Frequency Control of Network-Based Power Systems against Deception Attacks. Sensors 2021, 21, 7047. [Google Scholar] [CrossRef] [PubMed]
  36. Yucelen, T.; Haddad, W.M.; Feron, E.M. Adaptive control architectures for mitigating sensor attacks in cyber-physical systems. Cyber-Phys. Syst. 2016, 2, 24–52. [Google Scholar] [CrossRef]
  37. Ren, X.X.; Yang, G.H. Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks. Int. J. Robust Nonlinear Control 2020, 30, 65–79. [Google Scholar] [CrossRef]
  38. Li, Z.; Zhao, J. Resilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacks. Inf. Sci. 2021, 543, 398–409. [Google Scholar] [CrossRef]
  39. Tee, K.P.; Ge, S.S.; Tay, E.H. Barrier Lyapunov functions for the control of output-constrained nonlinear systems. Automatica 2009, 45, 918–927. [Google Scholar] [CrossRef]
  40. Tee, K.P.; Ren, B.; Ge, S.S. Control of nonlinear systems with time-varying output constraints. Automatica 2011, 47, 2511–2516. [Google Scholar] [CrossRef]
  41. Liu, Y.J.; Lu, S.; Tong, S.; Chen, X.; Chen, C.P.; Li, D.J. Adaptive control-based barrier Lyapunov functions for a class of stochastic nonlinear systems with full state constraints. Automatica 2018, 87, 83–93. [Google Scholar] [CrossRef]
  42. Gao, T.; Liu, Y.J.; Li, D.; Tong, S.; Li, T. Adaptive neural control using tangent time-varying BLFs for a class of uncertain stochastic nonlinear systems with full state constraints. IEEE Trans. Cybern. 2019, 51, 1943–1953. [Google Scholar] [CrossRef] [PubMed]
  43. Li, D.P.; Li, D.J. Adaptive neural tracking control for nonlinear time-delay systems with full state constraints. IEEE Trans. Syst. Man Cybern. Syst. 2017, 47, 1590–1601. [Google Scholar] [CrossRef]
  44. Hua, C.; Liu, P.X.; Guan, X. Backstepping control for nonlinear systems with time delays and applications to chemical reactor systems. IEEE Trans. Ind. Electron. 2009, 56, 3723–3732. [Google Scholar]
  45. Jin, X.; Haddad, W.M.; Yucelen, T. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems. IEEE Trans. Autom. Control 2017, 62, 6058–6064. [Google Scholar] [CrossRef]
  46. Lin, W.; Qian, C. Adaptive control of nonlinearly parameterized systems: The smooth feedback case. IEEE Trans. Autom. Control 2002, 47, 1249–1266. [Google Scholar] [CrossRef] [Green Version]
  47. Ge, S.S.; Hong, F.; Lee, T.H. Adaptive neural network control of nonlinear systems with unknown time delays. IEEE Trans. Autom. Control 2003, 48, 2004–2010. [Google Scholar]
  48. Wang, C.; Hill, D.J.; Ge, S.S.; Chen, G. An ISS-modular approach for adaptive neural control of pure-feedback systems. Automatica 2006, 42, 723–731. [Google Scholar] [CrossRef]
  49. An, L.; Yang, G.H. Improved adaptive resilient control against sensor and actuator attacks. Inf. Sci. 2018, 423, 145–156. [Google Scholar] [CrossRef]
  50. Song, S.; Park, J.H.; Zhang, B.; Song, X. Adaptive NN finite-time resilient control for nonlinear time-delay systems with unknown false data injection and actuator faults. IEEE Trans. Neural Netw. Learn. Syst. 2021, 33, 5416–5428. [Google Scholar] [CrossRef] [PubMed]
  51. Xing, L.; Wen, C.; Liu, Z.; Su, H.; Cai, J. Event-triggered adaptive control for a class of uncertain nonlinear systems. IEEE Trans. Autom. Control 2016, 62, 2071–2076. [Google Scholar] [CrossRef]
  52. Han, K.; Li, S.; Wang, Z.; Yang, X. Actuator deception attack detection and estimation for a class of nonlinear systems. In Proceedings of the 2018 37th Chinese Control Conference (CCC), Wuhan, China, 25–27 July 2018; IEEE: Piscataway, NJ, USA, 2018; pp. 5675–5680. [Google Scholar]
Figure 1. Block diagram of the method proposed in this paper.
Figure 1. Block diagram of the method proposed in this paper.
Entropy 25 00900 g001
Figure 2. System state variable change trajectory of Example 1.
Figure 2. System state variable change trajectory of Example 1.
Entropy 25 00900 g002
Figure 3. Controller change trajectory of Example 1.
Figure 3. Controller change trajectory of Example 1.
Entropy 25 00900 g003
Figure 4. Attack compensator change trajectory of Example 1.
Figure 4. Attack compensator change trajectory of Example 1.
Entropy 25 00900 g004
Figure 5. Error surface change trajectory of Example 1.
Figure 5. Error surface change trajectory of Example 1.
Entropy 25 00900 g005
Figure 6. Output signal change trajectory of first-order filter of Example 1.
Figure 6. Output signal change trajectory of first-order filter of Example 1.
Entropy 25 00900 g006
Figure 7. RBF neural network approximation curve of Example 1.
Figure 7. RBF neural network approximation curve of Example 1.
Entropy 25 00900 g007
Figure 8. System state variables change trajectory of Example 2.
Figure 8. System state variables change trajectory of Example 2.
Entropy 25 00900 g008
Figure 9. Controller change trajectory of Example 2.
Figure 9. Controller change trajectory of Example 2.
Entropy 25 00900 g009
Figure 10. Attack compensator change trajectory of Example 2.
Figure 10. Attack compensator change trajectory of Example 2.
Entropy 25 00900 g010
Figure 11. RBF neural network approximation curve of Example 2.
Figure 11. RBF neural network approximation curve of Example 2.
Entropy 25 00900 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Chen, Z.; Wang, X.; Pang, N.; Shi, Y. Adaptive Resilient Neural Control of Uncertain Time-Delay Nonlinear CPSs with Full-State Constraints under Deception Attacks. Entropy 2023, 25, 900. https://doi.org/10.3390/e25060900

AMA Style

Chen Z, Wang X, Pang N, Shi Y. Adaptive Resilient Neural Control of Uncertain Time-Delay Nonlinear CPSs with Full-State Constraints under Deception Attacks. Entropy. 2023; 25(6):900. https://doi.org/10.3390/e25060900

Chicago/Turabian Style

Chen, Zhihao, Xin Wang, Ning Pang, and Yushan Shi. 2023. "Adaptive Resilient Neural Control of Uncertain Time-Delay Nonlinear CPSs with Full-State Constraints under Deception Attacks" Entropy 25, no. 6: 900. https://doi.org/10.3390/e25060900

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop