Next Article in Journal
Beyond the Clinic: Maximum Free-Living Stepping as a Potential Measure of Physical Performance
Previous Article in Journal
Malicious Vehicle Detection Using Layer-Based Paradigm and the Internet of Things
Previous Article in Special Issue
RAIM and Failure Mode Slope: Effects of Increased Number of Measurements and Number of Faults
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Event-Triggered Robust State Estimation for Nonlinear Networked Systems with Measurement Delays against DoS Attacks

1
School of Automation, Qingdao University, Qingdao 266071, China
2
Shandong Key Laboratory of Industrial Control Technology, Qingdao 266071, China
*
Author to whom correspondence should be addressed.
Sensors 2023, 23(14), 6553; https://doi.org/10.3390/s23146553
Submission received: 28 June 2023 / Revised: 17 July 2023 / Accepted: 18 July 2023 / Published: 20 July 2023
(This article belongs to the Special Issue Robust State Estimation and Fault Diagnosis of Dynamic Systems)

Abstract

:
In this paper, we focus on the event-triggered robust state estimation problems for nonlinear networked systems with constant measurement delays against denial-of-service (DoS) attacks. The computation of the extended Kalman filter (EKF) generates errors of linearization approximations, which can result in increased state estimation errors, and subsequently amplifies the linearization errors. DoS attacks interfere with the transmission of measurements sent to the remote robust state estimator by overloading the communication networks, while the communication rate of the communication channel is constrained. Therefore, an event-triggered robust state estimation algorithm based on sensitivity penalization with an explicit packet arrival parameter is derived to defend against DoS attacks and linearization errors. Meanwhile, the presence of measurement delays precludes the direct use of conventional state estimation algorithms, prompting us to devise an innovative state augmentation method. The results of the numerical simulations show that the proposed robust state estimator can appreciably improve the accuracy of state estimation.

1. Introduction

Networked systems have achieved successful applications in various fields, including civil infrastructure, environmental monitoring, intelligent transportation, and smart grids [1]. The performance of various components within a networked system is contingent upon the accuracy of data transmission over the communication network, which is determined by the capabilities of the measurement and data transmission technologies employed. Recent advancements have shown a proclivity toward wireless shared communication networks over wired or dedicated networks [2]. Although the adoption of multi-purpose communication networks can reduce maintenance costs and provide flexibility in system architecture design, it also introduces new challenges. Open wireless communication networks, in particular, are vulnerable to network attacks and delays as opposed to separate dedicated network communication channels [2,3]. For this reason, an increasing number of studies focus on the security of wireless networked systems.
Deception attacks, denial-of-service (DoS) attacks, and replay attacks are among the most prevalent forms of attack in networked systems [4,5,6]. Due to the ease of implementation, DoS attacks have become one of the most common threats to networked systems. These attacks interfere with communication channels between sensors and robust state estimators, disrupting the availability of resources and resulting in packet dropping [7]. Various results have been published for the security of networked systems under DoS attacks. The measurement of missing phenomena caused by DoS attacks can be modeled using two fundamental methods: a binary switching sequence or a Markov chain. The security control of networked switched systems under the threat of DoS attacks during the transmission of output information from sensors to controllers is investigated in [8]. By assuming that DoS attacks follow a Bernoulli distribution, an event-triggered sampling mechanism is proposed to reduce the communication burden while preserving satisfactory performance. In [9], two independent Bernoulli distributions are used to model periodic DoS attacks and random packet dropout for cyber-physical systems. In [10], an aperiodic DoS attack is introduced, characterized by its duration and frequency, and a switched fuzzy Markov jump closed-loop system is established. An event-triggered scheme that incorporates membership functions is proposed to address the mismatched behavior between the membership functions of a fuzzy system and its fuzzy controller. The problem of event-triggered resilient L control for the Markov closed-loop jump system subject to DoS attacks is considered in [11], where criteria are proposed to ensure the L control performance of the system.
In the literature mentioned above, network communication is considered to be continuous, leading to a waste of communication resources. By reducing unnecessary data transmissions, an event-triggered mechanism helps reduce network traffic or congestion and mitigate network-related phenomena such as transmission delays and packet loss, thereby satisfying the basic quality-of-service requirements in the design of networked system estimators. An event-triggered mechanism can achieve a balance between the desired system estimation performance and resource utilization efficiency. In [12], a dynamic event-triggered strategy is proposed, which offers greater flexibility in setting the event-trigger threshold. The application of a node-based adaptive strategy eliminates the need for global information in the investigation of consensus for multi-agent systems. In [13], a new dynamic event-triggered mechanism is introduced for event-triggered control systems, featuring the inclusion of an internal dynamic variable. A general framework for the event-triggered stabilization of nonlinear systems using hybrid system tools is presented in [14]. This framework encompasses a wide range of existing event-triggered control techniques and provides a basis for their generalization and revision. The use of deterministic event triggers to schedule sensors destroys the Gaussian property of the state, rendering it computationally intractable to obtain an exact minimum mean-squared-error estimate. In response, a stochastic event-triggered sensor schedule for state estimation is introduced in [15], which is designed to preserve the Gaussianity of the system. Time delays are a common occurrence in complex networks due to factors such as network traffic congestion and the finite speed of signal transmission over links. The preponderance of the existing literature on the control and state estimation of systems with delays pertains to delays in inputs or actuators. Nonetheless, in networked systems, delays can also originate from sensor measurements or communication networks. The delay of most sensors and communication networks is similar or slightly modified due to their acquisition environment, acquisition algorithm, and transmission environment. Considering that subtle changes have less impact in the discrete domain, it is reasonable to assume that the measurement delay is constant. The decision-making process of a controller within a networked system depends on data from sensor measurements, and any delay in measurements or network transmission can adversely affect the system’s performance. Therefore, it is crucial to have an accurate real-time estimator capable of providing an accurate state of the system in the presence of delays.
Measurement delay in state estimation is a well-known issue, often referred to as the time-varying measurement problem, the time-delayed measurement problem, or the out-of-sequence measurement (OOSM) problem. Four distinct approaches exist for addressing problems with known delays: prediction, extrapolation, re-organized innovation, and state augmentation. Prediction, when applied within the Kalman filter algorithm, provides a solution to the one-step delayed OOSM problem. In [16], a method for forward prediction of OOSMs that does not rely on retrodiction is proposed. The tracklet is predicted forward and de-correlated from the actual track using a track de-correlation method similar to the information filter approach before being fused with the actual track. This method, referred to as forward-prediction fusion and de-correlation, has been shown to compare favorably to retrodiction-based algorithms while requiring less data storage in most cases. The extrapolation approach is a second viable method for addressing time-delayed measurement problems. In [17], a method involving the “extrapolation” of measurements to the current moment using past and present estimates of the Kalman filter is proposed, and the optimal gain of the extrapolated measurements is determined. Re-organized innovation is derived based on the projection in Hilbert space and an innovation analysis method. In [18], a system with l-time delayed measurements is studied using re-organized innovation analysis. State augmentation is an effective approach for tackling the time-delayed measurement problem. The approach involves utilizing the delayed measurement to estimate the state of the corresponding past moment and deriving the current state prediction from this corrected past state. The key to this approach lies in augmenting the state vector in a skillful manner and establishing a correlation between the augmented state vector, which includes the corresponding past state, and the delayed measurement. An augmented state Kalman filter is proposed in [19] to address the state estimation problem with time-delayed measurements. The uncertainty of the delay time is resolved based on its probability distribution. In [20], the problem of state estimation in the presence of delay uncertainty is studied and uncertain delay is represented as a probability density function. The proposed estimator addresses the impact of uncertain delayed measurements by incorporating an augmented state Kalman filter.
State estimation, commonly employed in automatic control and signal processing, refers to the process of estimating the internal state of a dynamic system based on available measurement data. Many conditions in the dynamic and measurement processes of real networked systems are nonlinear [21,22]. As a result, various estimation methods for nonlinear systems have been proposed, including the extended Kalman filter (EKF) [23], unscented Kalman filter (UKF) [24], cubature Kalman filter [25], and so on. Ref. [26] presents a method for nonlinear state estimation of biomass in a batch bioprocess, which employs the EKF with a sample-state augmentation method to incorporate delayed measurements. A dynamic state estimation algorithm is proposed in [27], which employs Holt’s two-parameter exponential smoothing and extended Kalman filtering techniques. The recursion formula for parameter identification, state prediction, and state filtering incorporates the statistical characteristics of data packet losses caused by DoS attacks. However, all these techniques assume that the system model is accurate and do not account for linearization errors.
The EKF is an efficient method for state estimation of a nonlinear state-space model, which is an expanded version of the standard Kalman filter. However, this approach may suffer performance degradation if there are considerable linearization errors caused by first-order linear approximations. To enhance estimation performance, various methods have been developed to address linearization errors. In [28], an adaptive loop is proposed that repeatedly executes a nonlinear solver on a fixed mesh until the linearization error estimate falls below the discretization error estimate. The mesh is then adaptively refined and the loop continues. In order to overcome the limitations imposed by linearization, the unscented transformation is introduced in [29] as a method for conveying mean and covariance information through nonlinear transformations. It is more precise, simpler to implement, and requires the same order of calculations as linearization. A robust tracking technique for the heating value in an underground coal gasification process is presented in [30], which utilizes dynamic integral sliding-mode control and a gain-scheduled modified Utkin observer. This control scheme can effectively handle parametric uncertainties, measurement noise, and water influx disturbance. A robust EKF is developed in [31] to provide an optimized upper bound on the state estimation error covariance, even in the face of model uncertainties and linearization errors. It possesses robustness against process noises, measurement noises, linearization errors, and model uncertainties.
Although there is extensive research on nonlinear systems, as indicated by the above analysis, few papers in the public domain specifically address methods for simultaneously overcoming constant measurement delays, DoS attacks, and linearization errors in nonlinear systems. In this paper, we concentrate on the event-triggered robust state estimation for nonlinear networked systems with constant measurement delays against DoS attacks. The robust state estimation algorithm is investigated based on the connection between the Kalman filter and the regularized least-squares problem. To reduce the transmission burden on the communication network, an event-triggered mechanism is implemented in the estimation process and a binary variable is used to represent the packet-sending parameter. Packet loss resulting from DoS attacks that jam communication networks is characterized by a Bernoulli distribution. Subsequently, a packet-arrival parameter that contains information about both the packet-sending and packet-loss parameters is explicitly included in the improved cost function. We meticulously design a specific state augmentation method to address constant measurement delays and modify the cost function of the regularized least-squares problem to account for linearization errors. An analytic expression for the robust state estimator is obtained, which is recursively implementable and has a form similar to the EKF. Furthermore, we design numerical simulations to confirm the efficacy of the proposed event-triggered robust state estimator.
The remainder of this paper is organized as follows. In Section 2, we present our model of packet loss due to DoS attacks and the packet transmission of the event trigger, as well as introduce an event-triggered nonlinear system model with a constant measurement delay under DoS attack conditions. In Section 3, a time-delay model is transformed into a formally non-time-delay model using a state augmentation method, an improved event-triggered model with a fixed measurement delay under DoS attacks is obtained, and a robust state estimation algorithm that employs a sensitivity penalty for the nonlinear networked system is proposed. In Section 4, we present numerical examples that demonstrate the efficacy of the estimator proposed in this paper. Finally, Section 5 summarizes the work of this paper.
Notations: N denotes the set of natural numbers, including zero. R n denotes the n-dimensional Euclidean space. x V denotes the norm with weighted coefficients x T V x . The Euclidean norm for real vectors is denoted by . E ( ) represents the expectation of a random vector or matrix and Pr ( ) represents the probability of *. v a r ( ) denotes the variance of *. c o l indicates the operation bracket of the stacking vector or matrix. d i a g is a block diagonal matrix.

2. Problem Formulation

We present a nonlinear networked system structure for even-triggered remote robust state estimation with a measurement delay against DoS attacks, as depicted in Figure 1. It consists of six main parts: a process, a sensor, an event trigger, a wireless network, an attacker, and a remote robust state estimator. The sensor continuously sends measurement values to the event trigger, where the event-triggered transmission mechanism decides if transmission to the remote state estimator over the wireless communication network is necessary. In addition to the packet loss caused by DoS attacks from network attackers, the wireless communication network also experiences transmission delays due to its structure, as shown in Figure 2.
If a sensor takes a measurement at the same instant that the measurement value is available in a filter, a general filtering algorithm such as the EKF can generate a consistent and correct estimation result. This ideal scenario is represented in Figure 3, where there is no time delay in the system. In contrast, in a delayed networked system, the time at which the sensor sends out the measurement value and the time at which it is received by the remote state estimator do not coincide, as shown in Figure 2.
An event-triggered transmission strategy is an effective method for reducing communication rates and alleviating bandwidth pressure on wireless communication networks. We consider a noisy measurement channel
y t = h x t + v t ,
where x t R n and y t R m denote the state vector and measurement output, respectively. v t R m represents the effect of communication noise. h ( · ) : R n R m is a nonlinear function and is assumed to be continuously differentiable. Let c t represent a packet-sending parameter, which is a binary variable taking the value of 1 if the data packet y t is transmitted at time instant t, and 0 otherwise. This relationship can be expressed as follows:
c t = 0 , if y t y ˜ t 2 Ξ , 1 , otherwise ,
where the vectors y ˜ t = y t n t R m . n t 0 denotes the number of time instants elapsed since the last transmission of the sensor, i.e., n t is such that c t n t = 1 and c t 1 = · · · = c t n t + 1 = 0 . The positive real Ξ has to be chosen to ensure that it satisfies the following transmission rate constraint:
lim τ 1 τ t = 1 τ E c t = α ,
where the transmission rate α ( 0 , 1 ) . For any given desired transmission rate α , the threshold Ξ can be readily determined by Ξ = ϵ m 1 ( 1 α ) , where ϵ m ( · ) is the cumulative distribution function of an χ 2 random variable with m degrees of freedom.
In a wireless networked system, the inherent openness of the wireless communication network makes it vulnerable to malicious network attacks such as DoS attacks—one of the most common and typical types of network attacks. When a DoS attack occurs, network congestion can lead to the loss or even continuous loss of sensor measurement data packets. This packet loss is time-varying due to the limited power of DoS attacks, which affects the state estimation results and endangers the safe operation of the system. Let γ t represent a packet-dropping parameter, which is determined depending on whether the communication channel is congested by an attacker using DoS attack techniques. We assume that the sequence of γ t is independent and identically distributed, forming a Bernoulli process, which is used to illustrate the stochastic property of packet sequential loss. Therefore, the packet-dropping parameter γ t can be expressed as follows:
Pr γ t = 1 = 1 ρ , Pr γ t = 0 = ρ , v a r γ t = ρ ( 1 ρ ) , E ( γ t ) = 1 ρ .
γ t predicts the occurrence of packet loss caused by DoS attacks at time instant t, which receives a value of 1 when the data packet is successfully delivered and a value of 0 when the communication channel is congested due to DoS attacks. The packet-dropping rate is represented by ρ 0 , 1 .
For the convenience of representation and calculation, let ψ t = c t γ t represent a packet-arrival parameter, which can be expressed as follows:
ψ t = 1 , if c t = 1 , γ t = 1 , sent and transmitted normally , 0 , if c t = 1 , γ t = 0 , sent but transmission failed , 0 , if c t = 0 , unsent .
This parameter represents whether the remote state estimator has received the packet from the event trigger. At time instant t when the remote robust state estimator successfully receives the packet, ψ t = 1 ; otherwise, ψ t = 0 . In practical engineering, the packet-arrival parameter ψ t can be achieved through timestamp technology.
Consider an event-triggered nonlinear networked system Σ 1 with a constant measurement delay under DoS attacks. The plant dynamics and its output measurements received by a remote robust state estimator are assumed to be describable using the following discrete model:
Σ 1 : { (5) x t + 1 = f x t , u t + w t (6) y t = ψ t h x t d + v t , t 0 ,
where t N represents the time index. The variable d N indicates the number of time-delayed frames of the measurement signal, which is known and time-invariant. u t R l is a known external input signal. The vector w t R n denotes the process noises. f ( · , · ) : R n × R l R n , which is nonlinear, is assumed to possess continuous differentiability. It is assumed that x t , w t , and v t are uncorrelated random vectors, with E ( c o l { w t , v t , x 0 } ) = 0 and E ( c o l { x 0 , w t , v t } c o l T { x 0 , w s , v s } ) = d i a g P 0 , Q t δ t s , R t δ t s , t , s > 0 , where P 0 , Q t , and R t are known positive definite matrices, and δ t s represents the Kronecker delta function, which equals 1 when t = s and 0 whenever t s . ψ t is the packet-arrival parameter, which is equal to 1 or 0, and needs to be adjusted according to whether the data packet arrives or not.

3. Design of the Robust State Estimator

We perform the three-step operation shown in Figure 4 on nonlinear system Σ 1 to further design the robust state estimation algorithm.
In the same manner as with the EKF, we first perform a first-order Taylor approximation to the nonlinear system Σ 1 . By linearizing the nonlinear function f ( · , · ) in Equation (5) and the function h ( · ) in Equation (6) at the posterior estimate and the prior estimate, respectively, and omitting higher-order infinitesimals, we can approximate the nonlinear system as follows:
Σ 2 : { (7) x t + 1 = f ( x ^ t t , u t ) + A t ( x ^ t t ) ( x t x ^ t t ) + w t (8) y t = ψ t ( h ( x ^ t d t d 1 ) + C t d ( x ^ t d t d 1 ) ( x t d x ^ t d t d 1 ) ) + v t , t 0 .
The matrices in the above equation are defined as
A t ( x ^ t t ) = f ( x , u ) x | x = x ^ t t u = u t , C t d ( x ^ t d t d 1 ) = h ( x ) x | x = x ^ t d t d 1 ,
which are known Jacobian matrices at the t-th sampled instant. We abbreviate A t ( x ^ t t ) and C t d ( x ^ t d t d 1 ) to A t and C t , respectively. x ^ t k represents the state estimate based on the measurement output y t | t = 0 k .
Linearization errors can severely degrade the performance of the EKF, particularly when heavily weighted. To mitigate these problems, it is necessary to implement specific considerations and employ an estimation algorithm that is robust to linearization errors. By combining the known terms of the system Σ 2 and taking into account linearization errors in state estimations, we revise the system Σ 2 as the following system:
Σ 3 : { (10) x t + 1 = A t ( x ^ t t , ε t 1 ) x t + a t + w t (11) y t = ψ t C t d ( x ^ t d t d 1 , ε t d 2 ) x t d + b t d + v t , t 0 ,
where a t = f ( x ^ t t , u t ) A t ( x ^ t t ) x ^ t t and b t d = h ( x ^ t d t d 1 ) C t d ( x ^ t d t d 1 ) x ^ t d t d 1 , which are known values at the t-th sampled instant. We abbreviate A t ( x ^ t t , ε t ) and C t ( x ^ t t 1 , ε t ) to A t ε t and C t ε t , respectively. In addition, ε t 1 and ε t 2 denote the differences between the true value of the plant state vector and its posterior and prior estimates at time t, respectively. To be more precise, A t ( x ^ t t , ε t 1 ) is composed of x ^ t t + ε t 1 and C t ( x ^ t t 1 , ε t 2 ) is composed of x ^ t t 1 + ε t 2 , which corresponds to the true value of the plant state vector.
In order to make the corresponding estimation problem mathematically tractable, the elements of the state estimation errors, namely ε t , k 1 and ε t , k 2 , k = 1 , 2 , n , are assumed to be independent of each other. Specifically, the matrices A t ( x ^ t t , ε t 1 ) and C t ( x ^ t t 1 , ε t 2 ) are defined in the same manner as A t ( x ^ t t ) and C t ( x ^ t t 1 ) in Equation (9). In other words, the definitions of these matrices are identical to those of A t ( x ^ t t ) and C t ( x ^ t t 1 ) , respectively.
A t ( x ^ t t , ε t 1 ) = f ( x , u ) x | x = x ^ t t + ε t 1 u = u t , C t d ( x ^ t d t d 1 , ε t d 2 ) = h ( x ) x | x = x ^ t d t d 1 + ε t d 2 .
By expanding A t x ^ t t , ε t 1 at ε t 1 = 0 , we obtain
A t x ^ t t , ε t 1 = A t x ^ t t + j n Δ A t , j ε t , j 1 + o ε t 1 2 2 ,
where ε t , j 1 denotes the j-th component of ε t 1 , Δ A t , j = A t x ^ t t , ε t ε i , j | ε i , j = 0 . Furthermore, we obtain
A t x ^ t t , ε t 1 = A t x ^ t t + ε t 1 I T Δ A t + o ε t 1 2 2 ,
where Δ A t = c o l ( Δ A t , j ) . The system matrices A t ( x ^ t t , ε t 1 ) and C t ( x ^ t t 1 , ε t 2 ) are differentiable at every time instant with respect to every element of ε t 1 and ε t 2 , respectively.
Since conventional state estimators such as the EKF are not directly applicable to systems with time delays, we implement state augmentation to transform the measurement-delay system Σ 3 into a system without time delays in its form.
Theorem 1. 
Under the assumption that the number of measurement-delay frames is known and constant, we construct the augmented state X t = col x t Δ t Δ t 1 Δ t d + 1 , where Δ t = C t 1 ε t 1 2 x t 1 + b t 1 C t ε t 1 x t b t . We transform the system Σ 3 into the following equivalent model:
Σ : { (15) X t + 1 = A ˜ t ε t 1 , ε t + 1 2 X t + D t d t + B ˜ t ε t + 1 2 a t + B ˜ t ε t + 1 2 w t , (16) y t = ψ t C ˜ t ε t 1 X t + b t + v t , t 0 ,
where
D t = 0 n × m I m 0 ( d 1 ) m × m ,
d t = b t b t + 1 ,
A ˜ t ε t 1 , ε t + 1 2 = A t ε t 1 0 n × ( d 1 ) m 0 n × m C t ε t 1 C t + 1 ε t + 1 2 A t ε t 1 0 m × ( d 1 ) m 0 m × m 0 ( d 1 ) m × n I ( d 1 ) m 0 ( d 1 ) m × m ,
B ˜ t ε t + 1 2 = I n × n C t + 1 ε t + 1 2 0 ( d 1 ) m × n ,
C ˜ t ε t 1 = C t ε t 1 I m I m d .
Proof of Theorem 1. 
First, we define
z t = Δ C t d ( x ^ t d t d 1 , ε t d 2 ) x t d + b t d C t ( x ^ t t 1 , ε t 2 ) x t b t .
Thus, the system Σ 2 can be re-expressed as the following system:
{ (23) x t + 1 = A t ( x ^ t t , ε t 1 ) x t + a t + w t (24) y t = ψ t C t ( x ^ t t 1 , ε t 2 ) x t + b t + z t + v t , t 0 ,
By combining A ˜ t ε t 1 , ε t + 1 2 and X t , and calculating A ˜ t ε t 1 , ε t + 1 2 X t , we can obtain
A ˜ t ε t 1 , ε t + 1 2 X t = A t ε t 1 0 n × ( d 1 ) m 0 n × m C t ε t 1 C t + 1 ε t + 1 2 A t ε t 1 0 m × ( d 1 ) m 0 m × m 0 ( d 1 ) m × n I ( d 1 ) m 0 ( d 1 ) m × m
× x t Δ t Δ t 1 Δ t d + 1 = A t ε t 1 x t C t ε t 1 x t C t + 1 ε t + 1 2 A t ε t 1 x t Δ t Δ t d + 2 .
Combining Equations (17)–(20) and (25) yields
A ˜ t ε t 1 , ε t + 1 2 X t + D t d t + B ˜ t ε t + 1 2 a t + B ˜ t ε t + 1 2 w t = A t ε t 1 x t + a t + w t C t ε t 1 x t + b t C t + 1 ε t + 1 2 A t ε t 1 x t + a t + w t b t + 1 Δ t Δ t d + 2 = x t + 1 Δ t + 1 Δ t Δ t d + 2 = X t + 1 .
From (21), we can deduce that
ψ t C ˜ t ε t 1 X t + b t + v t = ψ t C t ε t 1 x t + b t + Δ t + + Δ t d + 1 + v t = ψ t C t d ( ε t d 2 ) x t d + b t d + v t = y t .
By combining (26) and (27), we can obtain the system Σ . The proof of Theorem 1 ends here. □
State augmentation is a straightforward yet potent method that entails modifications to the parameter matrix. This transformation results in the system Σ with no measurement delay in its form and an increase in the system dimension from n to n + m d . The proposed state augmentation method indirectly establishes a correlation between the delayed measurements and the current state. As the time delay becomes larger, the system requires more computational resources to process and handle the delay. More specifically, the computational burden of the system does indeed increase correspondingly with the increase in the measurement delay. However, in practical engineering applications, the degree of the time delay is typically not excessive, minimizing the impact of this issue. During the derivation of the state estimator, the number of time-delayed frames, denoted as d, is required as it is included in both the coefficient matrix and the augmented state X t .
According to [32], the Kalman filter can be interpreted as the solution of a regularized least-squares (RLS) problem, which for the system Σ can be expressed as
X ^ t + 1 t + 1 = A ˜ t 0 , 0 X ^ t t + 1 + D t d t + B ˜ t 0 a t + B ˜ t 0 w ^ t t + 1 , X ^ t t + 1 w ^ t t + 1 = arg min X t t + 1 , w t t + 1 X t t + 1 X ^ t t P t t 1 2 + w t t + 1 Q t 1 2 + e t ( 0 , 0 ) R t + 1 1 2 ,
where e t ( 0 , 0 ) = y t + 1 b t + 1 C ˜ t + 1 ( 0 ) [ A ˜ t ( 0 , 0 ) X t t + 1 + D t d t + B ˜ t ( 0 ) a t + B ˜ t 0 w t t + 1 ] . The objective of the RLS problem is to ameliorate the estimation through the inclusion of new measurements; however, its effectiveness may be constrained by linearization errors.
Considering the appreciable deterioration of estimation performance because of linearization errors, which are generally unavoidable, and the pockets of sensor measurement data that do not arrive due to malicious network attacks and event triggers, we improve the cost function of the RLS problem as follows:
J X t | t + 1 , w t | t + 1 = 1 2 μ t X t | t + 1 X ^ t t P t t 1 2 + w t | t + 1 Q t 1 2 + ψ t + 1 μ t e t ( 0 , 0 ) R t + 1 1 2 + 1 μ t k = 1 n e t ( ε t 1 , ε t + 1 2 ) ε t , k 1 2 2 + e t ( ε t 1 , ε t + 1 2 ) ε t + 1 , k 2 2 2 ε t 1 = 0 ε t + 1 2 = 0 ,
where e t ( ε t 1 , ε t + 1 2 ) = y t + 1 b t + 1 C ˜ t + 1 ( ε t + 1 2 ) [ A ˜ t ( ε t 1 , ε t + 1 2 ) X t t + 1 + D t d t + B ˜ t ε t + 1 2 a t + B ˜ t ε t + 1 2 w t t + 1 ] . When disregarding the linearization error, we can obtain the cost function of the RLS problem, which is Equation (28). However, a large linearization error can reduce the estimation accuracy of the estimator and even cause a divergence of the estimation values. To improve the estimation performance of the state estimator when there is a large linearization error in the system and to enhance the robustness of the estimator, we add penalties for sensitivity to the linearization error by adding the corresponding differential terms in Equation (28). The basic principle is that the deviation of the innovation process from its nominal value reflects the contribution of the linearization error to the prediction error of the Kalman filter concerning the equipment output. These deviations usually have complex expressions, making it difficult to mathematically handle the corresponding estimation problem. To streamline processing, we conduct a first-order approximation of the deviations via linearization around the origin. In Equation (29), μ t 0 , 1 is a design parameter reflecting a trade-off between nominal estimation accuracy and penalization on the first-order approximation of deviations of the innovation process. Furthermore, ψ t + 1 is explicitly utilized and is generally obtainable in communications following the receipt of y t + 1 . To enable access to this information, the only requirement is the incorporation of an indication code or timestamp into the communication channel. In the event that the measurement is successfully conveyed, as denoted by ψ t + 1 = 1 , this cost function signifies that given the arrival of new information concerning x t at time instant t + 1 , its estimate should be updated in a robust fashion. If the remote robust state estimator is unable to receive the sensor measurement data packets, as denoted by ψ t + 1 = 0 , then y t + 1 will be devoid of any information pertaining to the plant output. A recursive robust estimation algorithm can be derived through the application of this construction procedure.
Theorem 2. 
Assume that both P t t and Q t are invertible, and ( 1 μ t ) / μ t is defined as λ t . The state vector x t + 1 of the nonlinear system Σ 1 can be estimated based on y k | k = 0 t + 1 and Equations (28) and (29) using the following recursive process.
(1) 
Linearization.
A t ( x ^ t t , ε t 1 ) = f ( x , u ) x | x = x ^ t t + ε t 1 u = u t ,
C t ( x ^ t t , ε t 1 ) = h ( x ) x | x = x ^ t t + ε t 1 ,
x ^ t + 1 t = f x ^ t t ,
C t + 1 ( x ^ t + 1 t , ε t + 1 2 ) = h ( x ) x | x = x ^ t + 1 t + ε t + 1 2 ,
where we abbreviate A t ( x ^ t t , 0 ) , C t ( x ^ t t , 0 ) , and C t + 1 ( x ^ t + 1 t , 0 ) as A t , C t , and C t + 1 , respectively.
(2) 
Parameter modification.
A ˜ t ε t 1 , ε t + 1 2 = A t ε t 1 0 n × ( d 1 ) m 0 n × m C t ε t 1 C t + 1 ε t + 1 2 A t ε t 1 0 m × ( d 1 ) m 0 m × m 0 ( d 1 ) m × n I ( d 1 ) m 0 ( d 1 ) m × m ,
B ˜ t ε t + 1 2 = I n × n C t + 1 ε t + 1 2 0 ( d 1 ) m × n ,
C ˜ t ε t 1 = C t ε t 1 I m I m d ,
P ^ t t = P t t 1 + λ t ψ t S t T S t 1 ,
Q ^ t = Q t 1 + λ t ψ t + 1 T t T I + λ t S t P t t S t T 1 T t 1 ,
A ^ t = A ˜ t λ t ψ t + 1 B ^ t Q ^ t T t T S t I λ t c t + 1 γ t + 1 P ^ t t S t T S t ,
B ^ 1 t = B ˜ t λ t ψ t + 1 A ^ t P t t S t T + B ^ 2 t Q ^ t T t T T t ,
B ^ 2 t = B ˜ t λ t ψ t + 1 A ˜ t P ^ t t S t T T t ,
a t = f ( x ^ t t , u t ) A t x ^ t t ,
b t = h ( x ^ t t 1 ) C t x ^ t t 1 ,
S t ( ε t 1 , ε t + 1 2 ) = col C ˜ t + 1 ε t + 1 2 A ˜ t ε t 1 , ε t + 1 2 ε t , j 1 C ˜ t + 1 ε t + 1 2 ε t + 1 , j 2 A ˜ t ε t 1 , ε t + 1 2 ε t + 1 , j 2 j = 1 n ,
T t ( ε t 1 , ε t + 1 2 ) = col 0 C ˜ t + 1 ε t + 1 2 ε t + 1 , j 2 B ˜ t + 1 ε t + 1 2 ε t + 1 , j 2 j = 1 n ,
Δ t = C t 1 ε t 1 2 x t 1 + b t 1 C t ε t 2 x t b t ,
D t = 0 n × m I m 0 ( d 1 ) m × m ,
d t = b t b t + 1 ,
where we abbreviate S t ( 0 , 0 , 0 ) , T t ( 0 , 0 , 0 ) , A ˜ t 0 , 0 , 0 , B ˜ t 0 , and C ˜ t 0 as S t , T t , A ˜ t , B ˜ t , and C ˜ t , respectively.
(3) 
Time-update step: update of the state predictions and pseudo-covariance matrix of the prediction errors.
X ^ t + 1 t = A ^ t X ^ t t + D t d t + B ^ 1 t a t ,
h x ^ t d + 1 t d = C ˜ t + 1 X ^ t + 1 t + b t + 1 ,
P t + 1 t = A t P ^ t t A t T + B ^ 2 t Q ^ t B ^ 2 t T ,
R e , t + 1 = ψ t + 1 C ˜ t + 1 P t + 1 t C ˜ t + 1 T + R t + 1 1 .
(4) 
Measurement-update step: update of the state estimation, pseudo-covariance matrix, and estimator gain.
K t + 1 = P t + 1 t 1 + ψ t + 1 C t + 1 T R t + 1 1 C t + 1 1 C t + 1 T R t + 1 1 = P t + 1 t + 1 1 C t + 1 T R t + 1 1 = P t + 1 t C t + 1 T R e , t + 1 1 = P t + 1 t C t + 1 T ( ψ t + 1 C t + 1 P t + 1 t C t + 1 T + R t + 1 ) 1 ,
X ^ t + 1 t + 1 = X ^ t + 1 t + ψ t + 1 K t + 1 ( y t + 1 h ( x ^ t d + 1 t ) ) = A ^ t X ^ t t + D t d t + B ^ 1 t a t + ψ t + 1 P t + 1 t 1 + ψ t + 1 C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 × C ˜ t + 1 T R t + 1 1 y t + 1 b t + 1 C ˜ t + 1 A ^ t X ^ t t + D t d t + B ^ 1 t a t ,
P t + 1 t + 1 = P t + 1 t 1 + ψ t + 1 C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 = ( I ψ t + 1 K t + 1 C ˜ t + 1 ) P t + 1 t = P t + 1 t ψ t + 1 P t + 1 t C ˜ t + 1 T ( ψ t + 1 C ˜ t + 1 P t + 1 t C ˜ t + 1 T + R t + 1 ) 1 C ˜ t + 1 P t + 1 t ,
x ^ t + 1 t + 1 = X ^ t + 1 t + 1 , 1 , X ^ t + 1 t + 1 , 2 , , X ^ t + 1 t + 1 , n T ,
where X ^ t t , j denotes the j-th component of vector X ^ t t .
To demonstrate the theoretical results presented in this paper, the following well-known results from matrix analysis and linear estimations, as described in [33], are required.
Lemma 1. 
Assuming arbitrary matrices A, B, C, and D with dimensions that are compatible, it is postulated that all matrix inverses necessary for the calculations are present. Then,
A B C D = I 0 C A 1 I A 0 0 D C A 1 B I A 1 B 0 I = I B D 1 0 I A B D 1 C 0 0 D I 0 D 1 C I
[ A + B C D ] 1 = A 1 A 1 B C 1 + D A 1 B 1 D A 1
A ( I + B A ) 1 = ( I + A B ) 1 A .
Proof of Theorem 2. 
In the interest of brevity, we define the vectors α t 0 and α t as α t 0 = c o l { X ^ t | t , 0 } and α t = c o l { X t | t + 1 , w t | t + 1 } , respectively. Furthermore, we define the matrices P ^ t t , Q ^ t , B ^ 1 t , B ^ 2 t , and A ^ t as (37)–(41), respectively.
It should be noted that for all k { 1 , 2 , , n } , the following is satisfied:
e t ε t 1 ε t + 1 2 ε t , k 1 = C ˜ t + 1 ε t + 1 2 A ˜ t ε t 1 , ε t + 1 2 ε t , k 1 X t t + 1 ,
e t ε t 1 , ε t + 1 2 ε t + 1 , k 2 = C ˜ t + 1 ε t + 1 2 ε t + 1 , k 2 A ˜ t ε t 1 , ε t + 1 2 ε t + 1 , k 2 X t t + 1 + B ˜ t + 1 ε t + 1 2 ε t + 1 , k 2 a t + B ˜ t + 1 ε t + 1 2 ε t + 1 , k 2 w t t + 1 .
It can be easily shown, based on the definition of the cost function J X t | t + 1 , w t | t + 1 , that
J α t = μ t 2 ( ) T d i a g P t t 1 , Q t 1 α t α t 0 + ψ t + 1 ( ) T R t + 1 1 × b t + 1 + C ˜ t + 1 A ˜ t B ˜ t α t + D t d t + B ˜ t a t y t + 1 + λ t ψ t + 1 ( ) T S t T t α t + T t a t .
Therefore.
J α t α t = μ t d i a g P t t 1 , Q t 1 α t α t 0 + ψ t + 1 C ˜ t + 1 A ˜ t B ˜ t T × R t + 1 1 b t + 1 + C ˜ t + 1 A ˜ t B ˜ t α t + D t d t + B ˜ t a t y t + 1 + λ t ψ t + 1 S t T t T S t T t α t + T t a t = μ t d i a g P t t 1 , Q t 1 + λ t ψ t + 1 S t T t T S t T t + ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 A ˜ t B ˜ t α t d i a g P t t 1 , Q t 1 α t 0 + ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 b t + 1 y t + 1 + ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 B ˜ t + λ t S t T t T T t a t + ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 D t d t .
It should be noted that J α t is a convex function and μ t 0 . The optimal value of α t , denoted as α ^ t , which minimizes J α t , is determined by its first-order derivative condition. That is,
α ^ t = d i a g P t t 1 , Q t 1 + λ t ψ t + 1 S t T t T S t T t + ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 A ˜ t B ˜ t 1 × d i a g P t t 1 , Q t 1 α t 0 ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 b t + 1 y t + 1 ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 B ˜ t + λ t S t T t T T t a t ψ t + 1 A ˜ t B ˜ t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 D t d t .
We can directly utilize the inverse application of the matrix inversion in Lemma (57b) to obtain the following equation:
T t T T t λ t ψ t + 1 T t T S t P t t 1 + λ t ψ t + 1 S t T S t 1 S t T T t = T t T I + λ t ψ t + 1 S t P t t S t T 1 T t .
Then, from Lemma 1 and the definitions of the matrices P t t 1 and Q t 1 , we can immediately obtain the following relation:
d i a g P t t 1 , Q t 1 + λ t ψ t + 1 S t T t T S t T t = I 0 λ t ψ t + 1 T t T S t P ^ t t I P ^ t t 1 0 0 Q ^ t 1 I λ t ψ t + 1 P ^ t t S t T T t 0 I .
By substituting this relation into (62), it can be further proved that
α ^ t = I λ t ψ t + 1 P ^ t t S t T T t 0 I P ^ t t 1 0 0 Q ^ t 1 + ψ t + 1 A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 A ˜ t B ^ 2 t 1 × col I , λ t ψ t + 1 T t T S t P ^ t t P t t 1 X ^ t t + ψ t + 1 A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 y t + 1 b t + 1 ψ t + 1 A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 B ˜ t + λ t I 0 λ t ψ t + 1 T t T S t P ^ t t I S t T t T T t a t ψ t + 1 A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 D t d t .
Hence,
X ^ t + 1 t + 1 = A ˜ t B ˜ t α t + D t d t + B ˜ t a t = A ˜ t B ^ 2 t I + ψ t + 1 d i a g P ^ t t , Q ^ t A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 A ˜ t B ^ 2 t 1 d i a g P ^ t t , Q ^ t × col I , λ t ψ t + 1 T t T S t P ^ t t P t t 1 X ^ t t + ψ t + 1 A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 y t + 1 b t + 1 ψ t + 1 A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 B ˜ t + λ t I 0 λ t ψ t + 1 T t T S t P ^ t t I S t T t T T t a t ψ t + 1 A ˜ t B ^ 2 t T C ˜ t + 1 T R t + 1 1 C ˜ t + 1 D t d t + D t d t + B ˜ t a t = I + ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 A ^ t X ^ t t + ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 y t + 1 b t + 1 ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 B ˜ t + λ t A ^ t P t t S t T + B ^ 2 t Q ^ t T t T T t a t ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 D t d t + D t d t + B ˜ t a t ,
where P t + 1 t = A ˜ t B ^ 2 t d i a g P ^ t t , Q ^ t A ˜ t B ^ 2 t T = A ˜ t P ^ t t A ˜ t T + B ^ 2 t Q ^ t B ^ 2 t T .
In the derivation of the above equation, the relation P ^ t t P t t 1 = I λ t ψ t + 1 P ^ t t S t T S t is utilized, which is a direct result of the definition of the matrix. By adding the relation [ I + ψ t + 1 P t + 1 t C t + 1 T R t + 1 1 C t + 1 ] 1 = I ψ t + 1 [ I + ψ t + 1 P t + 1 t C t + 1 T R t + 1 1 C t + 1 ] 1 P t + 1 t C t + 1 T R t + 1 1 C t + 1 to the above equation, we can finally obtain
X ^ t + 1 t + 1 = A ^ t X ^ t t ψ t + 1 I + ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 A ^ t X ^ t t + ψ t + 1 I + ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 P t + 1 t C ˜ t + 1 T R t + 1 1 y t + 1 b t + 1 ψ t + 1 I + ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 B ˜ t a t ψ t + 1 λ t A ^ t P t t S t T + B ^ 2 t Q ^ t T t T T t a t + B ˜ t a t + ψ t + 1 2 λ t I + ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 × A ^ t P t t S t T + B ^ 2 t Q ^ t T t T T t a t ψ t + 1 I + ψ t + 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 P t + 1 t C ˜ t + 1 T R t + 1 1 C ˜ t + 1 D t d t + D t d t = A ^ t X ^ t t + D t d t + B ^ 1 t a t + ψ t + 1 P t + 1 t 1 + ψ t + 1 C ˜ t + 1 T R t + 1 1 C ˜ t + 1 1 × C ˜ t + 1 T R t + 1 1 y t + 1 b t + 1 C ˜ t + 1 A ^ t X ^ t t + D t d t + B ^ 1 t a t .
The proof of Theorem 2 ends here. □

4. Numerical Simulations

In this section, we choose a simple yet representative nonlinear system as the object observed by the sensor since its highly representative nonlinear characteristics can well reflect the superiority of the robust state estimation algorithm designed in this paper. As illustrated in Figure 5, the voltage value v of the oscillation circuit consisting of a double-tunnel diode negative-resistance circuit, as described in [34], is selected as the estimation target. When the negative-resistance circuit satisfies characteristic i = v + 1 3 v 3 , the circuit equation can be rewritten as the following equation:
v ¨ ς ( 1 v 2 ) v ˙ + v = 0 ,
as described in [35], which is known as the Van der Pol equation. Within the above equation, ς = L C , v ˙ = d v d ι = C L d v d t , v ¨ = d 2 v d ι 2 = C L d 2 v d t 2 , where ι = 1 C L . By using the Van der Pol oscillator as a simplified representation, we can concentrate on the fundamental principles and methods of our proposed algorithm, which can then be applied to more complex actual nonlinear systems.
Consider a sensor that monitors the voltage of the Van der Pol oscillator and sends its measurements to an event trigger. The event trigger determines whether to send the data to a remote robust state estimator through a wireless communication network. We take into account the effects of transmission delays and DoS attacks during communication. The entire process is shown in Figure 1. We choose the state vector x = [ x 1 , x 2 ] T = v , v ˙ T , the measurement vector y = x 1 = v , and the system parameter ς = 0.6 . The state equation and the measurement equation are shown below:
x ˙ 1 = x 2 , x ˙ 2 = ς 1 x 1 2 x 2 x 1 , ς = 0.6 , y = x 1 .
By employing the forward Euler method with a sampling interval of T = 0.2 to discretize the above state-space equation and introducing the process noise w t , the measurement noise ϑ t , the packet-arrival parameter ψ t and the number of measurement delays d, we derive the following discrete state-space model:
x t + 1 = f ( x t ) + ω t = x t , 1 + T x t , 2 x t , 2 + ς T 1 x t , 1 2 x t , 2 T x t , 1 + ω t , y t = ψ t [ 1 , 0 ] x t d + ϑ t .
By expanding the state equation using first-order Taylor linearization at x ^ t t , ignoring higher-order terms, and introducing error parameters ε t , we can obtain
x t + 1 = A t x t ( ε t 1 ) + a t + w t , y t = ψ t [ 1 , 0 ] x t d + ϑ t ,
where A t = f ( x ) x | x = x ^ t t and a t = f ( x ^ t t ) A t x ^ t t . We assign a value of 10 2 to the covariance of the process noise and a value of 1 to the covariance of the measurement noise. The initial pseudo-covariance matrix of the state is set to P 0 = I 2 , and the initial state is set to x 0 = [ 0.5 , 0 ] T . We set the number of measurement delays d = 2, which means that there is a delay of two sampling intervals from when the measurement value is sent from the event trigger to when it is received by the remote robust state estimator. More precisely, when utilizing timestamp technology, the number of measurement-delay frames is 2.
The variance of the ensemble-average estimation errors at each sampling instant is calculated through 6 × 10 2 random numerical simulations. The temporal variable, t, is varied from 0 to 2 × 10 2 in the numerical simulations conducted. By evaluating the estimation error using the Euclidean distance between the actual and predicted values, the performance of the two estimation algorithms is compared. The variance of the ensemble-average estimation errors for these 6 × 10 2 random simulations at each sampling instant is computed as follows:
E x t x ^ t | t | | 2 1 600 j = 1 600 x t x ^ j t | t | | 2 ,
where j represents the serial number of the random simulations. The root mean square error of the k-th state component at each time instant is calculated as 1 600 j = 1 600 x t , k x ^ j t | t , k 2 .
The measurement-dropping parameter γ t is represented by a stationary Bernoulli process with an expected rate of ρ = 0.6 . We set the packet transmission rate to a value of 0.85 . The design parameter μ t is assigned a value of 0.86 . In Figure 6a, the variance of the ensemble-average estimation errors with respect to the time variation for the two state estimation algorithms is demonstrated. In order to clarify the differences between the curves, they are partially re-plotted in Figure 6b. It is evident that the overall variance of the estimation errors for both the voltage and its derivative, as obtained by the robust state estimator based on sensitivity penalization, is significantly superior to that of the EKF-based method that utilizes nominal parameter values. This indicates that the remote robust state estimator based on sensitivity penalization can effectively handle linearization errors to some extent. The root mean square error of the states is also shown in Figure 6c,d. For a more intuitive presentation of the results, Figure 6e illustrates the inversion of the packet-sending parameter, with “0” representing packet transmission and “1” denoting no packet transmission. Figure 6f shows the resulting packet-dropping parameter when the transmission network experiences DoS attacks, where “0” indicates packet loss and “1” represents normal packet transmission. This aligns with the characteristics of DoS attacks, specifically that the attack duration is bounded and the packet loss changes over time due to the energy restrictions of the attacker. In Table 1, we quantitatively compare the variance of the estimation errors and the root mean square error for the two different algorithms. By calculating the averages of the variance of the estimation errors and root mean square error in Figure 6 for 200 moments and 600 experiments, we obtain the EEV and RMSE values listed in Table 1. As shown in Table 1, the robust state estimator has a lower variance of the estimation errors of 0.0984 compared to that of the EKF-based method, and the root mean square error of the two state components estimated by the robust state estimator is also lower than that of the EKF-based method. It is obvious that at the same packet-dropping rate, the performance of the robust state estimator designed in this paper is better than that of the EKF-based method.
The variance of the ensemble-average estimation errors of the robust state estimator under two different transmission rates, α = 0.85 and α = 0.55 , is depicted in Figure 7. The analysis of the data reveals that higher transmission rates lead to improved estimation accuracy, although this comes with an associated increase in the transmission burden.

5. Conclusions

In this paper, the problem of event-triggered robust state estimation for nonlinear networked systems with a constant measurement delay against DoS attacks is investigated. We utilize a state augmentation method to transform the measurement-delay model into a formally non-delayed model. Two Bernoulli distributions are employed in the packet-sending and packet-loss processes, respectively, to explicitly indicate whether a packet is sent or lost. A robust state estimator is derived with an explicit packet-arrival parameter by penalizing the sensitivity of estimation errors with respect to linearization errors. For this new robust estimator, an analytical solution akin to the EKF is developed, enabling recursive implementation. Simulation results demonstrate that our proposed method offers appreciably improved estimation accuracy compared to the EKF-based approach. Although our robust state estimation algorithm can improve estimation performance, further studies are required to systematically determine the optimal value for the design parameter μ .

Author Contributions

Conceptualization, M.W. and H.L.; methodology, M.W.; software, M.W.; validation, H.L.; formal analysis, M.W.; investigation, M.W.; resources, M.W. and H.L.; data curation, H.L.; writing—original draft preparation, M.W.; writing—review and editing, M.W.; visualization, H.L.; supervision, H.L.; project administration, H.L.; funding acquisition, H.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China under grant number 61873138 and the Shandong Provincial Natural Science Foundation under grant numbers ZR2019MF063 and ZR2020MF064.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data that support the findings of this study are available from the corresponding author upon reasonable request.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zou, L.; Wang, Z.; Hu, J.; Liu, Y.; Liu, X. Communication-protocol-based analysis and synthesis of networked systems: Progress, prospects and challenges. Int. J. Syst. Sci. 2021, 52, 3013–3034. [Google Scholar] [CrossRef]
  2. Yan, H.; Wang, J.; Zhang, H.; Shen, H.; Zhan, X. Event-Based Security Control for Stochastic Networked Systems Subject to Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 4643–4654. [Google Scholar] [CrossRef]
  3. Fridman, E.; Shaked, U. A descriptor system approach to H control of linear time-delay systems. IEEE Trans. Automat. Contr. 2002, 47, 253–270. [Google Scholar] [CrossRef] [Green Version]
  4. Ding, D.; Wang, Z.; Han, Q.L.; Wei, G. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 779–789. [Google Scholar] [CrossRef]
  5. De Persis, C.; Tesi, P. Input-to-State Stabilizing Control Under Denial-of-Service. IEEE Trans. Automat. Contr. 2015, 60, 2930–2944. [Google Scholar] [CrossRef]
  6. Zhu, M.; Martínez, S. On the Performance Analysis of Resilient Networked Control Systems under Replay Attacks. IEEE Trans. Automat. Contr. 2014, 59, 804–808. [Google Scholar] [CrossRef] [Green Version]
  7. Wood, A.; Stankovic, J. Denial of service in sensor networks. Computer 2002, 35, 54–62. [Google Scholar] [CrossRef] [Green Version]
  8. Cheng, L.; Yan, H.; Zhan, X.; Fan, S.; Shi, K. Stability analysis of networked control systems under DoS attacks in frequency domain via game theory strategy. Int. J. Syst. Sci. 2021, 52, 2934–2946. [Google Scholar] [CrossRef]
  9. Su, L.; Ye, D. Observer-based output feedback H control for cyber–physical systems under randomly occurring packet dropout and periodic DoS attacks. ISA Trans. 2019, 95, 58–67. [Google Scholar] [CrossRef]
  10. Zeng, P.; Deng, F.; Zhang, H.; Gao, X. Event-Based H Control for Discrete-Time Fuzzy Markov Jump Systems Subject to DoS Attacks. IEEE Trans. Fuzzy Syst. 2022, 30, 1853–1863. [Google Scholar] [CrossRef]
  11. Zeng, P.; Deng, F.; Liu, X.; Gao, X. Event-Triggered Resilient L Control for Markov Jump Systems Subject to Denial-of-Service Jamming Attacks. IEEE Trans. Cybern. 2022, 52, 10240–10252. [Google Scholar] [CrossRef] [PubMed]
  12. Liu, K.; Ji, Z. Dynamic Event-Triggered Consensus of General Linear Multi-Agent Systems with Adaptive Strategy. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 3440–3444. [Google Scholar] [CrossRef]
  13. Girard, A. Dynamic Triggering Mechanisms for Event-Triggered Control. IEEE Trans. Automat. Contr. 2015, 60, 1992–1997. [Google Scholar] [CrossRef] [Green Version]
  14. Postoyan, R.; Tabuada, P.; Nešić, D.; Anta, A. A Framework for the Event-Triggered Stabilization of Nonlinear Systems. IEEE Trans. Automat. Contr. 2015, 60, 982–996. [Google Scholar] [CrossRef] [Green Version]
  15. Weerakkody, S.; Mo, Y.; Sinopoli, B.; Han, D.; Shi, L. Multi-Sensor Scheduling for State Estimation With Event-Based, Stochastic Triggers. IEEE Trans. Automat. Contr. 2016, 61, 2695–2701. [Google Scholar] [CrossRef] [Green Version]
  16. Rheaume, F.; Benaskeur, A.R. Forward prediction-based approach to target-tracking with Out-of-Sequence Measurements. In Proceedings of the 2008 47th IEEE Conference on Decision and Control, Cancun, Mexico, 9–11 December 2008; pp. 1326–1333. [Google Scholar] [CrossRef]
  17. Larsen, T.; Andersen, N.; Ravn, O.; Poulsen, N. Incorporation of time delayed measurements in a discrete-time Kalman filter. In Proceedings of the 37th IEEE Conference on Decision and Control (Cat. No.98CH36171), Tampa, FL, USA, 18 December 1998; Volume 4, pp. 3972–3977. [Google Scholar] [CrossRef] [Green Version]
  18. Lu, X.; Zhang, H.; Wang, W.; Teo, K.L. Kalman filtering for multiple time-delay systems. Automatica 2005, 41, 1455–1461. [Google Scholar] [CrossRef]
  19. Choi, M.; Choi, J.; Park, J.; Chung, W.K. State estimation with delayed measurements considering uncertainty of time delay. In Proceedings of the 2009 IEEE International Conference on Robotics and Automation, Kobe, Japan, 12–17 May 2009; pp. 3987–3992. [Google Scholar] [CrossRef]
  20. Choi, M.; Choi, J.; Chung, W. State estimation with delayed measurements incorporating time-delay uncertainty. IET Control Theory Appl. 2012, 6, 2351–2361. [Google Scholar] [CrossRef]
  21. Das, A.; Lewis, F.L. Distributed adaptive control for synchronization of unknown nonlinear networked systems. Automatica 2010, 46, 2014–2021. [Google Scholar] [CrossRef]
  22. Li, H.; Chen, Z.; Wu, L.; Lam, H.K.; Du, H. Event-triggered fault detection of nonlinear networked systems. IEEE Trans. Cybern. 2016, 47, 1041–1052. [Google Scholar] [CrossRef] [Green Version]
  23. Lee, J.H.; Ricker, N.L. Extended Kalman filter based nonlinear model predictive control. Ind. Eng. Chem. Res. 1994, 33, 1530–1541. [Google Scholar] [CrossRef]
  24. Julier, S.J.; Uhlmann, J.K. New extension of the Kalman filter to nonlinear systems. In Signal Processing, Sensor Fusion, and Target Recognition VI; SPIE: Bellingham, WA, USA, 1997; Volume 3068, pp. 182–193. [Google Scholar]
  25. Zhao, L.; Wang, J.; Yu, T.; Chen, K.; Liu, T. Nonlinear state estimation for fermentation process using cubature Kalman filter to incorporate delayed measurements. Chin. J. Chem. Eng. 2015, 23, 1801–1810. [Google Scholar] [CrossRef]
  26. Isaza, J.A.; Rendón, J.E.; Viana, J.P.; Botero, H.A. Nonlinear state estimation for batch process with delayed measurements. In Proceedings of the XVII Latin American Conference of Automatic Control, Medellin, Colombia, 13–15 October 2016; pp. 95–100. [Google Scholar]
  27. Li, X.; Jiang, C.; Du, D.; Li, W.; Fei, M.; Wu, L. A Novel State Estimation Method for Smart Grid Under Consecutive Denial of Service Attacks. IEEE Syst. J. 2023, 17, 513–524. [Google Scholar] [CrossRef]
  28. El Alaoui, L.; Ern, A.; Vohralík, M. Guaranteed and robust a posteriori error estimates and balancing discretization and linearization errors for monotone nonlinear problems. Comput. Methods Appl. Mech. Eng. 2011, 200, 2782–2795. [Google Scholar] [CrossRef] [Green Version]
  29. Julier, S.; Uhlmann, J. Unscented filtering and nonlinear estimation. Proc. IEEE Inst. Electr. Electron. Eng. 2004, 92, 401–422. [Google Scholar] [CrossRef]
  30. Uppal, A.A.; Butt, S.S.; Khan, Q.; Aschemann, H. Robust tracking of the heating value in an underground coal gasification process using dynamic integral sliding mode control and a gain-scheduled modified Utkin observer. J. Process. Control 2019, 73, 113–122. [Google Scholar] [CrossRef]
  31. Kai, X.; Wei, C.; Liu, L. Robust Extended Kalman Filtering for Nonlinear Systems with Stochastic Uncertainties. IEEE Trans. Syst. Man Cybern.—Part A Syst. Hum. 2010, 40, 399–405. [Google Scholar] [CrossRef]
  32. Sayed, A.H. A framework for state-space estimation with uncertain models. IEEE Trans. Automat. Contr. 2001, 46, 998–1013. [Google Scholar] [CrossRef] [Green Version]
  33. Kailath, T.; Sayed, A.; Hassibi, B. Linear Estimation; Prentice Hall: Hoboken, NJ, USA, 2000; Volume 854. [Google Scholar]
  34. Khalil, H.K. Nonlinear Systems Third Edition; Prentice Hall: Hoboken, NJ, USA, 2002; Volume 115. [Google Scholar]
  35. Kandepu, R.; Foss, B.; Imsland, L. Applying the unscented Kalman filter for nonlinear state estimation. J. Process. Control 2008, 18, 753–768. [Google Scholar] [CrossRef]
Figure 1. Framework of the event-triggered nonlinear networked system against DoS attacks.
Figure 1. Framework of the event-triggered nonlinear networked system against DoS attacks.
Sensors 23 06553 g001
Figure 2. Measurement data transmission with fixed delay.
Figure 2. Measurement data transmission with fixed delay.
Sensors 23 06553 g002
Figure 3. Ideal measurement data transmission situation.
Figure 3. Ideal measurement data transmission situation.
Sensors 23 06553 g003
Figure 4. The flow diagram of the system processing.
Figure 4. The flow diagram of the system processing.
Sensors 23 06553 g004
Figure 5. Oscillation circuit consisting of a double-tunnel diode negative-resistance circuit.
Figure 5. Oscillation circuit consisting of a double-tunnel diode negative-resistance circuit.
Sensors 23 06553 g005
Figure 6. State estimation with packet transmission rate α = 0.85 and packet-dropping rate ρ = 0.6 .
Figure 6. State estimation with packet transmission rate α = 0.85 and packet-dropping rate ρ = 0.6 .
Sensors 23 06553 g006
Figure 7. Variance of estimation errors with different transmission rates α .
Figure 7. Variance of estimation errors with different transmission rates α .
Sensors 23 06553 g007
Table 1. Comparison of the variance of the estimation errors and root mean square error.
Table 1. Comparison of the variance of the estimation errors and root mean square error.
EEVRMSE of x 1 RMSE of x 2
EKF-based method0.95850.68910.6814
Robust state estimator0.86010.63360.6556
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, M.; Liu, H. Event-Triggered Robust State Estimation for Nonlinear Networked Systems with Measurement Delays against DoS Attacks. Sensors 2023, 23, 6553. https://doi.org/10.3390/s23146553

AMA Style

Wang M, Liu H. Event-Triggered Robust State Estimation for Nonlinear Networked Systems with Measurement Delays against DoS Attacks. Sensors. 2023; 23(14):6553. https://doi.org/10.3390/s23146553

Chicago/Turabian Style

Wang, Min, and Huabo Liu. 2023. "Event-Triggered Robust State Estimation for Nonlinear Networked Systems with Measurement Delays against DoS Attacks" Sensors 23, no. 14: 6553. https://doi.org/10.3390/s23146553

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop