Next Article in Journal
Beyond Granularity: Enhancing Continuous Sign Language Recognition with Granularity-Aware Feature Fusion and Attention Optimization
Previous Article in Journal
A Multimodal Recurrent Model for Driver Distraction Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

State Estimation for Measurement-Saturated Memristive Neural Networks with Missing Measurements and Mixed Time Delays Subject to Cyber-Attacks: A Non-Fragile Set-Membership Filtering Framework

1
College of Mechanical and Electrical Engineering, Qingdao Agricultural University, Qingdao 266109, China
2
Qingdao Institute of Product Quality Supervision and Inspection, Qingdao 266061, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2024, 14(19), 8936; https://doi.org/10.3390/app14198936
Submission received: 12 September 2024 / Revised: 29 September 2024 / Accepted: 2 October 2024 / Published: 4 October 2024

Abstract

:
This paper is concerned with the state estimation problem based on non-fragile set-membership filtering for a class of measurement-saturated memristive neural networks (MNNs) with unknown but bounded (UBB) noises, mixed time delays and missing measurements (MMs), subject to cyber-attacks under the framework of weighted try-once-discard protocol (WTOD protocol). Considering bandwidth-limited open networks, this paper proposes an improved set-membership filtering based on WTOD protocol to partially solve the problem that multiple sensor-related problems and multiple network-induced phenomena influence the state estimation performance of MNNs. Moreover, this paper also discusses the gain perturbations of the estimator and proposes an improved non-fragile estimation framework based on set-membership filtering, which enhances the robustness of the estimation approach. The proposed estimation framework can effectively estimate the state of MNNs with UBB noises, estimator gain perturbations, mixed time-delays, cyber-attacks, measurement saturations and MMs. This paper first utilizes mathematical induction to provide the sufficient conditions for the existence of the desired estimator, and obtains the estimator gain by solving a set of linear matrix inequalities. Then, a recursive optimization algorithm is utilized to achieve optimal estimation performance. The effectiveness of the theoretical results is verified by comparative numerical simulation examples.

1. Introduction

In circuit theory, the memristor is the fourth novel passive nano-information device, after the three basic circuit components of inductor, capacitor and resistor, which has the functions of memory and resistance. Studies have found that the memory characteristics of memristor can reflect well the excitation and inhibition of synapses in artificial neural networks (ANNs) [1]. Therefore, memristive neural networks (MNNs), which utilize the memristor to replace the synapse in the ANNs, have attracted the extensive attention of scholars. MNNs are extensively employed in intelligent control, signal processing, pattern recognition, etc. Nonetheless, with increasing network size and complexity, various faults and disturbances may occur in MNNs. If these faults and disturbances are not promptly estimated to make the system adjust as early as possible, the performance of the MNNs will decay or even collapse. Therefore, the state estimation of MNNs has gained some attention from academic research communities. For example, corresponding estimation approaches have been designed to estimate various MNNs, such as random delayed MNNs [2], Markov switching MNNs [3] and proportional delayed complex-valued MNNs [4].
Dealing with the state estimation problem has two main kinds of approaches, namely, filter and observer. Among them, the filter has been widely used in the state estimation domain related to MNNs owing to its superior noise resistance [5,6]. Different filtering strategies need to be selected for the different types of noise. Currently, most of the literature on filtering only considers white Gaussian noise and energy-bounded noise in MNNs. White Gaussian noise obeys the Gaussian distribution, and the primary processing techniques include recursive filtering [7], particle filtering [8], etc. Energy-bounded noise has bounded energy, and the primary processing techniques include H filtering [9], energy-to-peak filtering [10], etc. However, system operation may generate unknown but bounded (UBB) noise in reality, such as electromagnetic systems that can produce the UBB noise in electrical engineering, which does not follow either the assumption of a Gaussian distribution or bounded energy. For UBB noise, the traditional state estimation approaches become no longer applicable. Therefore, the set-membership filtering (SMF) was proposed to deal with these kinds of noises [11]. Compared to other filters, the SMF only requires a strict boundary constraint on noise rather than statistical characteristics and can give a group of ellipsoid sets that encompass all possible actual states with a 100% confidence degree. There have been many research results on using SMF to deal with UBB noise. For example, in response to the following various systems with UBB noise, such as multi-sensor network system [12], distributed nonlinear discrete system [13], time-varying system [14], nonlinear system [15] and event-triggered complex networks [16], the corresponding set-membership estimation schemes have been designed to estimate the state of the above systems. In an actual engineering scenario, ref. [17] has proposed a control scheme based on SMF to tackle the heading tracking control problem in an unmanned surface vessel (USV) affected by UBB noise, which guarantees the asymptotic stability of the USV systems. In [18], an SMF has been proposed to track the running trajectory of automatic guided vehicle (AGV) under UBB noise, which decreases the requirement for sensor precision. From the above, we can see that there have been some good research results on SMF. What is noteworthy is that the existing research has not considered some special practical problems fully, such as the uncertainty problems in engineering scenarios.
In fact, in real engineering application scenarios, estimation performance is unavoidably influenced by uncertainties such as actuator degradation, numerical calculation errors and the aging of components. The presence of these uncertainties can cause gain perturbation in the estimator and can result in a decrease in the overall estimation performance, so such an estimator is also called a “fragile” estimator. To ensure the robustness of the estimator, the non-fragility need to be fully considered during the design process. In the past few years, there has been much attention from scholars on the non-fragile set-membership estimation of MNNs. In [19], a non-fragile estimation approach based on SMF for MNNs with logarithmic quantization has been proposed under the framework of Maximum Error First protocol. A non-fragile estimation approach has been proposed for discrete measurement-saturated MNNs based on set-membership filtering under the framework of weighted try-once-discard (WTOD) protocol [20]. In [21], a non-fragile distributed secure SMF framework has been designed to estimate nonlinear systems influenced by channel fading and cyber-attacks. However, it is worth noting that, under the framework of non-fragile estimation based on SMF, the main structure of the linear matrix inequality (LMI) for estimating the error changes significantly when the system is suffering from stochastic cyber-attacks. Therefore, the matrix blocks of the non-fragile parts that deal with the parameter uncertainty and the estimator gain perturbation also need to be changed along with the change of main structure. Based on our knowledge, we have not seen research reports concerning the non-fragile estimation based on SMF for MNNs under stochastic cyber-attacks. Moreover, alongside the aforementioned gain perturbation, the use of the communication network and inferior sensors also brings some detrimental influences on the state estimation problem of MNNs despite its numerous conveniences.
The inferior sensors mentioned above are cheap, but, due to their physical limitations and the influence of intermittent faults, encountering sensor-related problems is inevitable during the measuring process of the system, such as measurement saturations and missing measurements (MMs). The occurrence of these sensor-related problems can influence the estimation performance seriously. Therefore, scholars have conducted research on the problem of set-membership estimation when measurement saturations and MMs exist from different perspectives. For time-varying systems influenced by sensor saturation, refs. [22,23] have proposed corresponding event-based distributed set-membership filters and controllers, respectively. Reference [24] has reviewed various processing approaches for systems influenced by measurement saturation and MMs. For a class of discrete nonlinear systems influenced by measurement saturation and MMs simultaneously, ref. [25] has proposed a distributed filter based on a random access (RA) protocol. A sector-bounded approach has been employed to partition the saturation function into linear and nonlinear components to deal with the saturation phenomena for the sensor-saturated systems; then, an SMF was designed for state estimation in [26]. In [27], a recursive joint state and fault estimation (JSFE) filter based on the Round-Robin (RR) protocol has been designed for a class of nonlinear systems with MMs and random component faults. Reference [28] has studied an H filter problem for a class of uncertain stochastic nonlinear systems with probabilistic MMs, time-delays and external random disturbances. However, currently, most of the literature only considers these sensor-related problems; there exists little research on reducing the influence of these problems on the estimation of performance. How to solve this problem to a certain extent is a research motivation of this paper.
The network communication mentioned above has the advantages of easy maintenance and low modularity, which reduce communication costs during data transmission effectively. However, due to the limited communication capacity of the network and the lack of channel protection measures, various network-induced phenomena are inevitably encountered in the process of data transmission, such as time delays, cyber-attacks and packet loss. Network-induced phenomena can raise the instability factor of the system and reduce the performance of the estimator [29]. Therefore, estimating these phenomena timely and reducing their influence on estimation performance as far as possible has important practical meaning. For a variety of network-induced phenomena that occur in engineering practice, such as various measurement and state value anomalies (state saturation [30], constrained measurement [31], measurement outliers [32]) and various cyber-attacks (malicious attacks that can bypass anomaly detectors [33], deception attack [34], joint false data injection attack [35], replay attack [36], DoS attack [37,38] and mixed-attacks [39]), the corresponding estimation schemes have been designed to reduce the influence of the above phenomena on the estimation performance. Scholars have conducted research on the problem of set-membership estimation with network-induced phenomena from different perspectives. For example, to overcome the communication constraints, refs. [40,41] have designed the corresponding SMF in the case of introducing redundant channels. In view of the incomplete data caused by various factors in the transmission process, refs. [42,43] have used censored measurement to describe this phenomenon and have designed the corresponding SMF. For the actual engineering scenarios, a state estimation approach that utilizes the Kalman filter and recursive systematic convolutional code has been proposed in [44] to effectively estimate the state of the smart grid and detect attacks, which guarantees the normal operation of the smart grid. In [45], a particle filter based on the Paillier encryption–decryption scheme has been proposed for the multi-machine power systems for confronting the potential risk of cyber-attacks, which makes the attacker unable to attack the encrypted data to ensure the precision of state estimation during the operation of the multi-machine power systems.
In fact, several studies have considered the various sensor-related problems and network-induced phenomena mentioned above, and have given hypotheses for corresponding approaches. For MMs, ref. [46] has given the hypothesis that MMs must satisfy the binary exchange sequence of the conditional probability distribution. Reference [27] has given the hypothesis that MMs need to satisfy Bernoulli distribution. Reference [28] has given the hypothesis that the occurrence of different MMs in each sensor node can be described by a diagonal matrix, which is more realistic. Regarding cyber-attacks, many scholars have hypothesized that cyber-attacks obey the hidden Markov model [47]. However, since the Bernoulli distribution can directly indicate whether the attack occurs through the value of the random variable (0 or 1) [48], which is more suitable to describe the deception attack. Therefore, this paper also hypothesizes that the cyber-attacks follow the Bernoulli distribution and uses a diagonal matrix to describe the continuous occurrence of the MMs on different sensor nodes.
From the aforementioned and related literature, we can see that current studies only consider the set-membership estimation of MNNs encountering either various sensor related problems or various network-induced phenomena. As far as we know, we have not yet seen the research results on how to conduct set-membership estimation and reduce the influence on state estimation performance when the MNNs encounter multiple sensor-related problems and multiple network-induced phenomena simultaneously.
To solve the aforementioned difficulties, considering that the communication protocol only allows one sensor node to send the latest data to the estimator during each sampling instant, we propose utilizing network protocol to partially solve the problem that the state estimation performance influenced by the MMs and bandwidth limitation for MNNs. The common communication protocols mainly include RA protocol [49,50,51], RR protocol [52,53] and WTOD protocol [54,55,56,57,58,59,60]. Among them, the WTOD protocol is regarded as the most efficacious protocol [55], which can give the priority to sending the latest data to sensor nodes according to the principle of “most needed” to find the sensor node that has the maximum difference between the measured output at the present sampling instant and that of the preceding sampling instant. Therefore, this paper proposes an improved SMF algorithm based on the WTOD protocol to partially solve the influencing problem of multiple sensor-related problems and multiple network-induced phenomena on estimation performance. The difficulty in doing so is because the introduction of the WTOD protocol increases the complexity and nonlinearity of the system model, which brings significant challenge for the design and performance analysis of the estimator.
In view of the preceding problem and practical requirements, this paper estimates the states of MNNs with mixed time delays, measurement saturations, MMs and gain perturbations of the estimator subject to cyber-attacks under the framework of the WTOD protocol. A non-fragile set-membership estimator is designed. The primary contributions of this paper are threefold: (1) Compared with [20], more sensor-related problems and network-induced phenomena are considered in MNNs, including cyber-attacks and MMs, which makes the established model more realistic; (2) Compared with [27], we propose that using an improved set-membership estimation algorithm based on the WTOD protocol to partially solve the difficulty of set-membership estimation in the presence of network-induced phenomena and sensor-related problems in MNNs, which can reduce both the influence of network congestion under bandwidth limitation and the MMs on state estimation; (3) Considering the introduction of stochastic variables, we improve the traditional non-fragile estimation frameworks in [19,20] to handle the simultaneous occurrence of gain perturbation and parameter uncertainty in MNNs.
The subsequent structure of this paper is organized as follows. Section 2 introduces the MNN model and designs the corresponding non-fragile estimator. The sufficient condition and proof process are provided in Section 3 for the existence of the non-fragile estimator. The parameters of the non-fragile estimator are derived through the solution of a set of LMIs. Section 4 provides the evidence to support the effectiveness and feasibility of the proposed estimation algorithm through the use of numerical examples. Section 5 gives a comprehensive overview of this paper.
Notation. ∗ represents the transposed term of symmetry in the symmetric block matrix. R n x represents n x -dimensional Euclidean space. U 1 and U represent the inverse and 2-norm of the matrix U, respectively. I indicates the identity matrix with proper dimensions. ϕ Z ( ϕ > Z ) means that ϕ Z is positive semi-definite (positive definite). E { · } represents the mathematical expectation. The trace ( N ) is the trace of the matrix N. P { B } is the occurrence probability of the event ‘B’. diag { · } indicates a block diagonal matrix. The superscript “T” denotes the transpose operation. A [ , + ] indicates that the value of every element in A falls within the specified interval [ , + ] , i.e., between the upper bound denoted as + and the lower bound denoted as . The highest value and the lowest value are represented as max { · , · } and min { · , · } , respectively.

2. Problem Formulation

In this section, we first consider a class of discrete measurement-saturated MNNs with mixed time delays in the following [20]:
o ˜ ¯ u + 1 = A ˜ ¯ ( o ˜ ¯ u ) o ˜ ¯ u + B ˜ ¯ ( o ˜ ¯ u ) f ( o ˜ ¯ u ) + D ˜ ¯ ( o ˜ ¯ u ) g ( o ˜ ¯ u τ 1 ) + E ˜ ¯ ( o ˜ ¯ u ) τ 2 i = 1 μ i o ˜ ¯ u i + H ˜ ¯ w W ˜ ¯ u , q ˜ u = Γ ( C ˜ ¯ o ˜ ¯ u ) + H ˜ ¯ v V ˜ ¯ u , o ˜ ¯ u = Ψ ¯ u , u [ τ , 0 ] , τ = max { τ 1 , τ 2 } ,
where o ˜ ¯ u = [ o ˜ ¯ 1 , u , o ˜ ¯ 2 , u , , o ˜ ¯ n x , u ] T R n x is the state vector of n x neurons with initial value Ψ ¯ u . q ˜ u = [ q ˜ 1 , u , q ˜ 2 , u , , q ˜ n y , u ] T R n y is the measurement output of the MNNs. V ˜ ¯ u R n v and W ˜ ¯ u R n w represent the measurement noise and the process noise, respectively. f ( · ) , g ( · ) and Γ ( · ) denote the nonlinear functions. A ˜ ¯ ( o ˜ ¯ u ) = diag n x { a i ( o ˜ ¯ i , u ) } is the self-feedback matrix with suitable dimension. B ˜ ¯ ( o ˜ ¯ u ) = ( b i j ( o ˜ ¯ i , u ) ) n x × n x is the connection weight matrix with suitable dimension. D ˜ ¯ ( o ˜ ¯ u ) = ( d i j ( o ˜ ¯ i , u ) ) n x × n x and E ˜ ¯ ( o ˜ ¯ u ) = ( h i j ( o ˜ ¯ i , u ) ) n x × n x are the delayed connection weight matrices with suitable dimensions. C ˜ ¯ , H ˜ ¯ w and H ˜ ¯ v are the known real-valued matrices with proper dimensions. τ 1 represents the determined constant delay. τ 2 and μ i ( i = 1 , 2 , , τ 2 ) represent the distributed delay, which is caused by the delay accumulation influences of real circuit components and exists in MNNs widely.
Assumption 1.
The process noise W ˜ ¯ u R n w in the first formula in (1) and the measurement noise V ˜ ¯ u R n v in the second formula of (1) are UBB noises, which are restricted to the ellipsoidal sets specified below:
z w u = { W ˜ ¯ u R n w : W ˜ ¯ u T R w , u 1 W ˜ ¯ u 1 } , z v u = { V ˜ ¯ u R n v : V ˜ ¯ u T R v , u 1 V ˜ ¯ u 1 } ,
where R w , u > 0 and R v , u > 0 are known time-varying matrices with proper dimensions.
The saturation function Γ ( · ) : R n y R n y is defined in the following:
Γ ( σ ˜ ¯ ) = Γ 1 ( σ ˜ ¯ 1 ) , Γ 2 ( σ ˜ ¯ 2 ) , , Γ n y ( σ ˜ ¯ n y ) T ,
with Γ t ( σ ˜ ¯ t ) = sign ( σ ˜ ¯ t ) min σ ˜ ¯ t , max , σ ˜ ¯ t , where σ ˜ ¯ t , max denotes the t-th element of saturation level σ ˜ ¯ max and sign ( · ) represents the signum function.
Definition 1
([61]). A nonlinear function η ( · ) and real matrices m 1 and m 2 are given, and m 2 m 1 > 0 .
If the particular condition
η ( χ ) m 1 χ T η ( χ ) m 2 χ 0 ,
holds, then η ( · ) is defined such that it satisfies the sector-bounded condition and belongs to the sector m 1 and m 2 .
According to Definition 2 and Figure 1, the real matrices U ˜ ¯ 1 and U ˜ ¯ are given and 0 U ˜ ¯ 1 < 1 U ˜ ¯ , which guarantees
Γ t ( σ ˜ ¯ t , u ) U ˜ ¯ 1 σ ˜ ¯ t , u T Γ t ( σ ˜ ¯ t , u ) U ˜ ¯ σ ˜ ¯ t , u 0 ,
where Γ t ( · ) is the sector-bounded nonlinear function, which belongs to [ U ˜ ¯ 1 , U ˜ ¯ ] .
In practical engineering, there generally exists a vector ϕ t , max σ ˜ ¯ t , u . The saturation function Γ t ( · ) can be decomposed into two components: the linear and nonlinear parts, that is,
Γ t ( C ˜ ¯ o ˜ ¯ u ) = U ˜ ¯ 1 C ˜ ¯ o ˜ ¯ u + θ ( C ˜ ¯ o ˜ ¯ u ) ,
where θ ( C ˜ ¯ o ˜ ¯ u ) is the sector-bounded nonlinear function belonging to [ 0 , U ˜ ¯ 2 ] , in which U ˜ ¯ 2 U ˜ ¯ U ˜ ¯ 1 . Then, θ ( C ˜ ¯ o ˜ ¯ u ) satisfies:
θ T ( C ˜ ¯ o ˜ ¯ u ) θ ( C ˜ ¯ o ˜ ¯ u ) U ˜ ¯ 2 ( C ˜ ¯ o ˜ ¯ u ) 0 .
Next, according to [2], we can obtain the state-dependent functions:
a i ( o ˜ ¯ i , u ) = s i o ˜ ¯ i , u > r i s i o ˜ ¯ i , u r i , b i j ( o ˜ ¯ i , u ) = b i j o ˜ ¯ i , u > r i b i j o ˜ ¯ i , u r i ,
d i j ( o ˜ ¯ i , u ) = d i j o ˜ ¯ i , u > r i d i j o ˜ ¯ i , u r i , h i j ( o ˜ ¯ i , u ) = h i j o ˜ ¯ i , u > r i h i j o ˜ ¯ i , u r i ,
where r i > 0 , | s i | < 1 , | s i | < 1 , b i j , b i j , d i j , d i j , h i j and h i j are all known scalars.
Denote
a i = min { s i , s i } , a i + = max { s i , s i } , b i j = min { b i j , b i j } , b i j + = max { b i j , b i j } ,
d i j = min { d i j , d i j } , d i j + = max { d i j , d i j } , h i j = min { h i j , h i j } , h i j + = max { h i j , h i j } ,
A = diag n x { a i } , A + = diag n x { a i + } , & = ( b i j ) n x × n x , & + = ( b + i j ) n x × n x ,
υ = ( d i j ) n x × n x , υ + = ( d + i j ) n x × n x , E = ( h i j ) n x × n x , E + = ( h + i j ) n x × n x .
We can obtain that A ˜ ¯ ( o ˜ ¯ u ) [ A , A + ] , B ˜ ¯ ( o ˜ ¯ u ) [ & , & + ] , D ˜ ¯ ( o ˜ ¯ u ) [ υ , υ + ] and E ˜ ¯ ( o ˜ ¯ u ) [ E , E + ] . Next, A ˜ ¯ , B ˜ ¯ , D ˜ ¯ and E ˜ ¯ are defined as follows:
A ˜ ¯ ( A + + A ) / 2 , B ˜ ¯ ( & + + & ) / 2 ,
D ˜ ¯ ( υ + + υ ) / 2 , E ˜ ¯ ( E + + E ) / 2 .
Furthermore, the matrices A ˜ ¯ ( o ˜ ¯ u ) , B ˜ ¯ ( o ˜ ¯ u ) , D ˜ ¯ ( o ˜ ¯ u ) and E ˜ ¯ ( o ˜ ¯ u ) can be denoted as
A ˜ ¯ ( o ˜ ¯ u ) = A ˜ ¯ + Δ A ˜ ¯ u , B ˜ ¯ ( o ˜ ¯ u ) = B ˜ ¯ + Δ B ˜ ¯ u ,
D ˜ ¯ ( o ˜ ¯ u ) = D ˜ ¯ + Δ D ˜ ¯ u , E ˜ ¯ ( o ˜ ¯ u ) = E ˜ ¯ + Δ E ˜ ¯ u ,
where Δ A ˜ ¯ u = i = 1 n x e i g i , u e i T , Δ B ˜ ¯ u = i , j = 1 n x e i t i j , u e j T , Δ D ˜ ¯ u = i , j = 1 n x e i p i j , u e j T , Δ E ˜ ¯ u = i , j = 1 n x e i r i j , u e j T , e k R n x is the column vector with the k-th element being 1 and others being 0, g i , u , t i j , u , p i j , u and r i j , u are unknown scalars and the unknown parameter matrices Δ A ˜ ¯ u , Δ B ˜ ¯ u , Δ D ˜ ¯ u and Δ E ˜ ¯ u can be represented as follows:
Δ A ˜ ¯ u = T ˜ ¯ F 1 , u X ˜ ¯ 1 ( A + A ) / 2 , ( A + A ) / 2 , Δ B ˜ ¯ u = T ˜ ¯ F 2 , u X ˜ ¯ 2 ( & + & ) / 2 , ( & + & ) / 2 , Δ D ˜ ¯ u = T ˜ ¯ F 3 , u X ˜ ¯ 3 ( υ + υ ) / 2 , ( υ + υ ) / 2 , Δ E ˜ ¯ u = T ˜ ¯ F 4 , u X ˜ ¯ 4 ( E + E ) / 2 , ( E + E ) / 2 ,
where T ˜ ¯ and X ˜ ¯ i   ( i = 1 , 2 , 3 , 4 ) are known real-valued matrices. T ˜ ¯ = [ T ˜ ¯ 1 T ˜ ¯ 2 T ˜ ¯ n x ] , X ˜ ¯ i = [ X ˜ ¯ T i 1 X ˜ ¯ T i 2 X ˜ ¯ T i n x ] , T ˜ ¯ i = [ e i e i e i ] n x are known real constant matrices with
X ˜ ¯ 1 j = [ e 1 T e 2 T e j 1 T a i + a i 2 e j T e j + 1 T e n x T ] ,
X ˜ ¯ 2 j = [ b 1 j + b 1 j 2 e 1 T b 2 j + b 2 j 2 e 2 T b n x j + b n x j 2 e n x T ] ,
X ˜ ¯ 3 j = [ d 1 j + d 1 j 2 e 1 T d 2 j + d 2 j 2 e 2 T d n x j + d n x j 2 e n x T ] ,
X ˜ ¯ 4 j = [ h 1 j + h 1 j 2 e 1 T h 2 j + h 2 j 2 e 2 T h n x j + h n x j 2 e n x T ] .
F i , u   ( i = 1 , 2 , 3 , 4 ) are unknown time-varying matrices that are given by
F i , u = diag { F i 1 , u , , F i n x , u } ,
F 1 j , u = diag 0 , , 0 j 1 , g j , u a i + a i 2 1 , 0 , , 0 n x j ,
F 2 j , u = diag t j 1 , u b 1 j + b 1 j 2 1 , , t j n x , u b n x j + b n x j 2 1 ,
F 3 j , u = diag p j 1 , u d 1 j + d 1 j 2 1 , , p j n x , u d n x j + d n x j 2 1 ,
F 4 j , u = diag r j 1 , u h 1 j + h 1 j 2 1 , , r j n x , u h n x j + h n x j 2 1 .
According to the derivation above, we can verify that the matrices F i , u are time-varied and satisfy F i , u T F i , u I .
The schematic diagram of measurement saturation, MMs, WTOD protocol and cyber-attacks is shown in Figure 2.
As shown in Figure 2, MMs can prevent the sensor from sending data to the network, which means that the network will not receive any information from this sensor if the MMs occur in this sensor. Hence, the measurement data that sent by sensors during MMs occur can be expressed as:
q ˜ ¯ u = α u q ˜ u ,
where α u = diag { α u 1 , α u 2 , . . . , α u n y } is the known matrix, α u i { 0 , 1 } is used to indicate whether the MM occurs in the i-th sensor at sampling instant u, α u i = 0 represents the occurrence of the MM at sampling instant u and, on the contrary, α u i = 1 represents that the MM does not occur at sampling instant u.
To alleviate data conflicts caused by limited communication network bandwidth, the WTOD protocol is utilized to schedule the communication between the estimator and the sensor, which only allows a sensor node to transmit the latest data to the estimator during each sampling instant. Zero-order-holders (ZOHs) are used to maintain the information transmitted from other nodes at the previous sampling instant to compensate the loss of real-time data. The node l u { 1 , 2 , , n y } that sends data to the network at sampling instant u is selected according to
l u = arg max 1 i n y ( q ˜ ¯ i , u q ˙ i , u 1 ) T i ( q ˜ ¯ i , u q ˙ i , u 1 ) ,
where q ˙ i , u 1 represents the latest data sent by the sensor node i before sampling instant u, and i > 0 is a known matrix that represents the weight coefficient of the sensor node i. q ˙ u = ( q ˙ 1 , u , q ˙ 2 , u , , q ˙ n y , u ) T represents the actual output after the output of the sensors are scheduled by the WTOD protocol, and the update rule for q ˙ i , u   ( u N + , i n y ) can be formulated as
q ˙ i , u = q ˜ ¯ i , u           i = l u q ˙ i , u 1     i l u
Define Ξ ( l u ) = diag { 1 l u , 2 l u , , n y l u } ; then, q u can be rewritten as
q ˙ u = Ξ l u q ˜ ¯ u + ( 1 Ξ l u ) q ˙ u 1 ,
where i l u { 0 1 } is the Kronecker delta function.
Remark 1.
During the state estimation of MNNs, the sensors send data to the estimator using communication networks at each sampling instant. Nevertheless, the transmission capacity of the network is typically constrained in practical scenarios, which causes network-induced phenomena such as transmission delay or out-of-order. To reduce the occurrence of these phenomena, utilizing the WTOD protocol to reduce the number of data packets transmitted is important. The process of using the WTOD protocol to select sensor nodes is divided into two stages at each instant: the initial stage is to calculate the difference between q ˜ ¯ i , u and q ˙ i , u 1 , and the subsequent stage is to prioritize the nodes through combining the established weight coefficients and the maximal difference acquired during the initial stage. Noteworthy is the fact that the node which has that smallest number of indexes is usually selected when multiple nodes have the same priority.
As one of the most destructive cyber-attacks, bias injection attack refers to the malicious injection of an attack signal into the measurement data transmitted to the estimator, which makes the estimator receive false information. Hence, the measurement data that are subject to cyber-attacks received by the estimator can be expressed as
q u = q ˙ u + β u Ξ l u ρ u ,
where β u { 0 , 1 } is used to indicate whether the bias injection attack occurs at sampling instant u, in which β u = 1 represents the occurrence of the bias injection attack at sampling instant u and β u = 0 represents the networks that are not subject to the bias injection attack at sampling instant u. ρ u represents the signal of bias injection attack and satisfies the following assumption:
E { ρ u T Ω u 1 ρ u } 1 ,
where Ω u is a known scaled positive definite matrix.
To reflect engineering practice better, we assume that the MM is persistent, while the bias injection attack occurs stochastically and follows the Bernoulli distribution:
P { β u = 1 } = β ˜ ¯ , P { β u = 0 } = 1 β ˜ ¯ ,
where β ˜ ¯ [ 0 , 1 ) is a known constant.
Let o u = ( o ˜ ¯ u T q ˙ u 1 T ) T ; then, the augmented form of measurement saturated-MNNs, with MMs and mixed time delays subject to cyber-attacks under the framework of WTOD protocol, can be expressed in the following:
o u + 1 = u A ( o u ) o u + B ( o u ) F ( o u ) + D ( o u ) G ( o u τ 1 ) + E ( o u ) i = 1 τ 2 μ i o u i + u H 1 W u + α u I u θ ( C 1 o u ) q u = α u C 2 o u + α u Ξ l u θ ( C 1 o u ) + α u H 2 W u + β u Ξ l u ρ u o u = Ψ u , u [ τ , 0 ]
where
u = I 0 0 α u , A ( o u ) = A ˜ ¯ ( o ˜ ¯ u ) 0 Ξ l u U ˜ ¯ 1 C ˜ ¯ I Ξ l u ,
B ( o u ) = B ˜ ¯ ( o ˜ ¯ u ) 0 0 0 , F ( o u ) = f ( o ˜ ¯ u ) 0 ,
D ( o u ) = D ˜ ¯ ( o ˜ ¯ u ) 0 0 0 , G ( o u τ 1 ) = g ( o ˜ ¯ u τ 1 ) 0 ,
E ( o u ) = E ˜ ¯ ( o ˜ ¯ u ) 0 0 0 , H 1 = H ˜ ¯ w 0 0 Ξ l u H ˜ ¯ v ,
W u = W ˜ ¯ u V ˜ ¯ u , C 1 = ( C ˜ ¯ 0 ) , C 2 = ( Ξ l u U ˜ ¯ 1 C ˜ ¯ I Ξ l u ) ,
I u = ( 0 Ξ l u ) , H 2 = 0 Ξ l u H ˜ ¯ v .
and Ψ u is the augmented initial value.
By separating unknown matrices Δ A ˜ ¯ u , Δ B ˜ ¯ u , Δ D ˜ ¯ u and Δ E ˜ ¯ u , the matrices A ( o u ) , B ( o u ) , D ( o u ) and E ( o u ) can be decomposed into the following expressions:
A ( o u ) = A + Δ A u , B ( o u ) = B + Δ B u ,
D ( o u ) = D + Δ D u , E ( o u ) = E + Δ E u ,
where
A = A ˜ ¯ 0 Ξ l u U ˜ ¯ 1 C ˜ ¯ I Ξ l u , Δ A u = Δ A ˜ ¯ u 0 0 0 ,
B = B ˜ ¯ 0 0 0 , Δ B u = Δ B ˜ ¯ u 0 0 0 , D = D ˜ ¯ 0 0 0 ,
Δ D u = Δ D ˜ ¯ u 0 0 0 , E = E ˜ ¯ 0 0 0 , Δ E u = Δ E ˜ ¯ u 0 0 0 .
According to (8), the unknown parameter matrices Δ A u , Δ B u , Δ D u and Δ E u can be expressed with the following augmented form:
Δ A u = T F ˙ 1 , u X 1 , Δ B u = T F ˙ 2 , u X 2 , Δ D u = T F ˙ 3 , u X 3 , Δ E u = T F ˙ 4 , u X 4 ,
where T = ( T ˜ ¯ 0 ) T , X 1 = ( X ˜ ¯ 1 0 ) , X 2 = ( X ˜ ¯ 2 0 ) , X 3 = ( X ˜ ¯ 3 0 ) , X 4 = ( X ˜ ¯ 4 0 ) and matrix F ˙ u satisfies F ˙ u T F ˙ u I .
In summary, taking into account the effects of the gain perturbation of the estimator, cyber-attacks, mixed time delays, measurement saturation and MMs in the MNNs, the following estimator is designed:
K u , n = K u + Δ K u o ^ u + 1 = A o ^ u + B F ( o ^ u ) + D G ( o ^ u τ 1 ) + E i = 1 τ 2 μ i o ^ u i + K u , n ( q u α u C 2 o ^ u )
where o ^ u R n y + n x is the estimated value of o u , the matrix K u is the gain of estimator to be determined and Δ K u is the gain perturbation of estimator satisfying
Δ K u = T ^ F ^ u X ^ ,
where F ^ u is an unknown time-varying matrix satisfying F ^ u T F ^ u 1 ; T ^ and X ^ are known real matrices.
Remark 2.
During the process of state estimation, the system may encounter some issues such as actuator degradation, numerical calculation errors and the aging of components, which can cause gain perturbations in the estimator. In engineering practice, even small gain perturbations in the estimator can also lead to decreases in estimation performance. Consequently, researchers have devised non-fragile techniques to enhance the robustness of the estimator. As we all know, non-fragile technologies are mainly implemented through LMI. Noteworthy is the fact that the structure of LMI is changed when the MNNs are subjected to the stochastic cyber-attacks, so the traditional non-fragile estimation framework based on SMF is no longer applicable. To solve this issue, this paper designs a new non-fragile set-membership estimation framework by adjusting the structure of the matrices T ˜ and X ˜ correspondingly, based on Lemma 3 in the following derivation.
Assumption 2.
The initial values Ψ i   ( i [ τ , 0 ] ) belong to the ellipsoid sets given below:
z i = { Ψ i R n x + n y : Ψ i T P i 1 Ψ i 1 } ,
where P i ( i [ τ , 0 ] ) are known positive definite matrices.
The primary aim of this paper is to design a new non-fragile set-membership estimator to estimate the state of measurement-saturated MNNs with MMs and mixed time delays subject to cyber-attacks under the framework of the WTOD protocol, which mainly includes the following two parts:
(1) Obtain the estimator gain matrices K u such that the positive definite matrices P u + 1 and o ^ u + 1 satisfy the constraints of the ellipsoid sets as follows:
z u + 1 = { o u + 1 R n x + n y : ( o u + 1 o ^ u + 1 ) T P u + 1 1 ( o u + 1 o ^ u + 1 ) 1 } ;
(2) Design an optimization algorithm by minimizing the trace of P u + 1 to achieve local optimal estimation performance.
To facilitate subsequent derivation, some lemmas are introduced as follows.
Lemma 1
([61]). Given constant matrices ˜ 1 , ˜ 2 and ˜ 3 satisfying ˜ 1 = ˜ 1 T , ˜ 2 = ˜ 2 T > 0 , then
˜ 1 + ˜ 3 T ˜ 2 1 ˜ 3 < 0 ,
if and only if
˜ 1 ˜ 3 T ˜ 3 ˜ 2 < 0 , ˜ 2 ˜ 3 ˜ 3 T ˜ 1 < 0 .
Lemma 2
([61]). Let q i ( )   ( i = 0 , 1 , 2 , , t ) be quadratic functions of the variable R n x , that is, q i ( ) = T p i , where
p i T = p i .
If there exists i > 0   ( i = 0 , 1 , 2 , , t ) satisfying p 0 i = 1 t i p i 0 , then, one has
q 1 ( ) 0 , q 2 ( ) 0 , , q p ( ) 0 q 0 ( ) 0 .
Lemma 3
([61]). Given matrices γ = γ T , T and X, which are real matrices with appropriate dimensions, the following inequality:
γ + T F u X + X T F u T T T < 0 ,
holds, for all F u satisfying F u T F u 1 , if and only if there exists a positive scalar ι > 0 satisfying
γ + ι 1 T T T + ι X T X < 0 .

3. Main Result

3.1. Estimator Design

The subsequent theorem gives the sufficient conditions for constraining estimation error within desired ellipsoidal regions by employing the LMI approach.
Theorem 1.
Considering the augmented MNNs in (13) and the estimator in (15), the estimation error can still be constrained within the required ellipsoidal region at the sampling instant u + 1 if there is a set of real matrices P u + 1 > 0 , K u , positive scalars φ j   ( j = 1 , 2 , , n y ) , ϶ i   ( i = 1 , 2 , , 8 ) and ι that satisfy the following LMI:
γ = γ ˜ T ˜ ι X ˜ T ι I 0 ι I 0 ,
where
γ ˜ = P u + 1 ε u Λ u , ε u = ε u + ε u , P u + 1 ε u Λ u = P u + 1 ε u Λ u + 0 ε u 0 , ε u = ε u 1 + ε u 2 , ε u = ( ε ˙ u ε ¨ u ) , ε ˙ u = ε 1 , u ε 2 , u 0 Δ E u i = 1 τ 2 μ i L u i Δ D u 0 0 0 0 0 , ε ¨ u = ε 3 , u ε 4 , u ε 5 , u 1 Δ B u 0 0 ε 5 , u 2 0 , ε 1 , u = Δ A u o ^ u + Δ E u i = 1 τ 2 μ i o ^ u i , ε 2 , u = ( Δ A u α u Δ K u C 2 ) L u , ε 3 , u = α u Δ K u Ξ l u , ε 4 , u = α u Δ K u H 2 , ε 5 , u 1 = β ˜ ¯ Δ K u Ξ l u , ε 5 , u 2 = β u Δ K u Ξ l u , Λ u = Λ 1 u + Λ 2 u , Λ 1 u = diag { Λ 11 u , ϶ 1 I , ϶ 2 I , ϶ 3 I , 0 , 0 , ϶ 4 R u 1 , ϶ 5 Ω u 1 , 0 } , Λ 11 u = 1 + ϶ 1 + ϶ 2 + τ 2 ϶ 3 + 2 ϶ 4 + ϶ 5 , Λ 2 u = ϶ 8 Y u ϶ 7 π u ϶ 6 ξ u j = 1 n y φ j Q u T ω ˜ ( Ξ j Ξ l u ) Q u , ε u = ε ˙ ε ¨ , ε ˙ = ε 1 , u ε 2 , u 0 E ( o u ) i = 1 τ 2 μ i o u i 0 0 0 0 , ε ¨ = D ( o u ) ε 3 , u ε 4 , u ε 5 , u 1 B ( o u ) 0 0 0 ε 5 , u 2 0 , ε 1 , u = B F ( o ^ u ) D G ( o ^ u τ 1 ) , ε 2 , u = u A ( o u ) α u K u C 2 L u , ε 3 , u = α u I u α u K u Ξ l u , ε 4 , u = u H 1 α u K u H 2 , ε 5 , u 1 = β ˜ ¯ K u Ξ l u , ε 5 , u 2 = β u K u Ξ l u , β u = β ˜ ¯ ( 1 β ˜ ¯ ) ,
T ˜ = ( T T 0 0 0 0 0 0 0 0 0 ) T , T = T T T T T ^ 0 0 0 0 0 0 T ^ , X ˜ = ( 0 X ) , X = X 11 X 12 X 21 X 22 , X 11 = X 1 o ^ u X 1 L u 0 0 0 0 0 0 0 0 0 0 , X 21 = X 4 i = 1 τ 2 μ i o ^ u i 0 0 X 4 i = 1 τ 2 μ i L u i 0 α u X ^ C 2 L u 0 0 0 0 0 0 , X 12 = 0 0 0 0 0 0 0 0 0 X 2 X 3 0 0 0 0 , X 22 = 0 0 0 0 0 0 α u X ^ Ξ l u α u X ^ H 2 β ˜ ¯ X ^ Ξ l u 0 0 0 0 β u X ^ Ξ l u 0 ,
in which  L u  is a Cholesky factorization of P u = L u L u T .
Proof. 
The mathematical induction is introduced to prove Theorem 1. First, we can know that ( o 0 o ^ 0 ) T P 0 1 ( o 0 o ^ 0 ) 1 from Assumption 2 when the sampling instant u = 0 . Next, we assume that ( o u o ^ u ) T P u 1 ( o u o ^ u ) 1 holds when the sampling instant u 0 . Finally, we need to prove that ( o u + 1 o ^ u + 1 ) T P u + 1 1 ( o u + 1 o ^ u + 1 ) 1 also holds when the sampling instant u + 1 0 . The proof process is shown as follows.
As mentioned in [62], there exists a vector M u with M u 1 satisfying
e u = o u o ^ u = L u M u ,
where L u is given in (20). Therefore, the estimation error can be obtained by the process of calculation as follows:
o u + 1 o ^ u + 1 = u A ( o u ) o u + B ( o u ) F ( o u ) + D ( o u ) G ( o u τ 1 ) + E ( o u ) i = 1 τ 2 μ i o u i + u H 1 W u + α u I 1 u θ ( C 1 o u ) u A o ^ u B F ( o ^ u ) D G ( o ^ u τ 1 ) E i = 1 τ 2 μ i o ^ u i + ( K u + Δ K u ) ( q u α u C 2 o ^ u ) = u A ( o u ) e u + Δ A u o ^ u + B ( o u ) F ( o ^ u ) B F ( o ^ u ) + D ( o u ) G ( o u τ 1 ) D G ( o ^ u τ 1 ) + E ( o u ) i = 1 τ 2 μ i e u i + Δ E u i = 1 τ 2 μ i o ^ u i + ( u H 1 α u ( Δ K u + K u ) H 2 ) W u + ( α u I u α u ( Δ K u + K u ) Ξ l u ) θ ( C 1 o u ) β u ( Δ K u + K u ) Ξ l u ρ u α u ( Δ K u + K u ) C 2 e u .
For convenience, the following notations are defined:
y u = ( y ˙ u y ¨ u ) T , y ˙ u = 1 M u T M u τ 1 T M τ u T G T ( o u τ 1 ) , y ¨ u = θ T ( C 1 o u ) W u T ρ u T F T ( o u ) , M τ u = M u 1 T M u 2 T M u τ 2 T T .
Then, the estimation error can be rewritten as the below compact form:
o u + 1 o ^ u + 1 = ε u y u ,
where
ε u = ( ε ˙ u ε ¨ u ) , ε ˙ u = ε 1 , u ε 2 , u 0 E ( o u ) i = 1 τ 2 μ i L u i D ( o u ) , ε ¨ u = ε 3 , u ε 4 , u ε 5 , u B ( o u ) , ε 1 , u = Δ A u o ^ u B F ( o ^ u ) D G ( o ^ u τ 1 ) + Δ E u i = 1 τ 2 μ i o ^ u i , ε 2 , u = ( u A ( o u ) α u ( Δ K u + K u ) C 2 ) L u , ε 3 , u = α u I u α u ( Δ K u + K u ) Ξ l u , ε 4 , u = u H 1 α u ( Δ K u + K u ) H 2 , ε 5 , u = β u ( Δ K u + K u ) Ξ l u .
Next, the stochastic matrix ε u can be decomposed through a specific process:
ε u = ε u 1 + ε u 2 ,
where
ε u 1 = ( ε ˙ u 1 ε ¨ u 1 ) , ε ˙ u 1 = ε 1 , u ε 2 , u 0 E ( o u ) i = 1 τ 2 μ i L u i D ( o u ) , ε ¨ u 1 = ε 3 , u ε 4 , u ε 5 , u 1 B ( o u ) , ε 5 , u 1 = β ˜ ¯ ( Δ K u + K u ) Ξ l u , ε u 2 = 0 0 0 0 0 0 0 ε 5 , u 2 0 , ε 5 , u 2 = β ˜ u ( Δ K u + K u ) Ξ l u , β u = β ˜ ¯ + β ˜ u ,
Subsequently, y u T ε u T P u + 1 1 ε u y u can be rewritten as a new form:
y u T ε u T P u + 1 1 ε u y u = y u T ( ε u 1 T P u + 1 1 ε u 1 + ε u 2 T P u + 1 1 ε u 2 ) y u = y u T u y u .
Therefore, y u T ε u T P u + 1 1 ε u y u 1 can be rewritten as
y u T u diag { 1 , 0 , . . . , 0 } y u 0 .
According to inequalities (2) and (10), the following constraint conditions can be obtained:
M u 2 1 M u τ 1 2 1 M τ u 2 τ 2 W u T R u 1 W u 2 ρ u T Ω u 1 ρ u 1
which can be rewritten as
y u T diag { 1 , I , 0 , . . . , 0 } y u 0 y u T diag { 1 , 0 , I , 0 , . . . , 0 } y u 0 y u T diag { τ 2 , 0 , 0 , I , 0 , . . . , 0 } y u 0 y u T diag { 2 , 0 , . . . , 0 , R u 1 , 0 , 0 } y u 0 y u T diag { 1 , 0 , . . . , 0 , Ω u 1 , 0 } y u 0
According to Inequalities (5) and (7), one obtains
F ( o u ) J 1 o u T F ( o u ) J 2 o u 0 G ( o u τ 1 ) S 1 o u τ 1 T G ( o u τ 1 ) S 2 o u τ 1 0 θ T ( C 1 o u ) θ ( C 1 o u ) U 2 o u 0
which can be further described as
y u T Y u y u 0 y u T ξ u y u 0 y u T π u y u 0
where
Y u = Y 1 u 0 Y 2 u 0 0 I , Y 1 u = o ^ u T J ˜ 2 o ^ u o ^ u T J ˜ 2 L u L u T J ˜ 2 L u ,
Y 2 u = o ^ u T J ˜ 1 T L u T J ˜ 1 T , J 1 = J ˜ ¯ 1 0 0 0 , J 2 = J ˜ ¯ 2 0 0 0 ,
J ˜ 1 = ( J 1 + J 2 ) / 2 , J ˜ 2 = ( J 1 T J 2 + J 2 T J 1 ) / 2 ,
ξ u = ξ 1 u 0 ξ 2 u 0 0 0 0 I 0 0 , ξ 1 u = o ^ u τ 1 T S ˜ 2 o ^ u τ 1 0 o ^ u τ 1 T S ˜ 2 L u τ 1 0 0 L u τ 1 T S ˜ 2 L u τ 1 ,
ξ 2 u = o ^ u τ 1 T S ˜ 1 T 0 L u τ 1 T S ˜ 1 T , S 1 = S ˜ ¯ 1 0 0 0 , S 2 = S ˜ ¯ 2 0 0 0 ,
S ˜ 1 = ( S 1 + S 2 ) / 2 , S ˜ 2 = ( S 1 T S 2 + S 2 T S 1 ) / 2 , π 1 u = 1 2 o ^ u T U 2 T 1 2 L u T U 2 T ,
U 2 = ( U ˜ ¯ 2 C ˜ ¯ 0 ) , π u = 0 0 π 1 u 0 0 0 0 0 0 0 0 I 0 0 0 0 0 0 0 0 0 .
Next, we can obtain the following formula from (10) that
( q ˜ ¯ u q ˙ u 1 ) T ω ˜ ( Ξ j Ξ l u ) ( q ˜ ¯ u q ˙ u 1 ) 0 ,
where
q ˜ ¯ u q ˙ u 1 = α u U ˜ ¯ 1 C ˜ ¯ o ˜ ¯ u + α u θ ( C ˜ ¯ o ˜ ¯ u ) + α u H ˜ ¯ v V ˜ ¯ u q ˙ u 1 = C 3 o u + θ ( C 1 o u ) + H 3 V u ,
C 3 = ( α u U ˜ ¯ 1 C ˜ ¯ I ) , H 3 = ( 0 α u H ˜ ¯ v ) , q ˜ ¯ u q ˙ u 1 = Q u y u ,
Q u = ( C 3 o ^ u C 3 L u 0 0 0 α u H 3 0 0 ) ,
ω ˜ = diag { ω 1 , ω 2 , , ω n y } .
Inequality (32) is equivalent to
y u T Q u T ω ˜ ( Ξ j Ξ l u ) Q u y u 0 .
Based on Lemma 2, if there exist positive scalars ϶ i   ( i = 1 , 2 , , 8 ) and φ j   ( j = 1 , 2 , , n y ) , such that
u κ 1 ϶ 1 κ 2 ϶ 2 κ 3 ϶ 3 κ 4 ϶ 4 κ 5 ϶ 5 κ 6 ϶ 6 ξ u ϶ 7 π u ϶ 8 Y u j = 1 n y φ j Q u T ω ˜ ( Ξ j Ξ l u ) Q u 0 ,
where
κ 1 = diag { 1 , 0 , . . . , 0 } , κ 2 = diag { 1 , I , 0 , . . . , 0 } , κ 3 = diag { 1 , 0 , I , 0 , . . . , 0 } , κ 4 = diag { τ 2 , 0 , 0 , I , 0 , . . . , 0 } , κ 5 = diag { 2 , 0 , . . . , 0 , R u 1 , 0 , 0 } , κ 6 = diag { 1 , 0 , . . . , 0 , Ω u 1 , 0 } ,
then the inequality (27) holds, and the following condensed form of Inequality (34) holds as well:
u + Λ u 0 ,
where Λ u is given in (20).
The following contents are used to handle the uncertainty of parameters and gain perturbations.
According to Lemma 1, the inequality (35) can be expressed as an LMI:
P u + 1 ε u 0 Λ u 0 ,
which can be decomposed into the following forms:
γ ˜ + 0 ε u 0 0 ,
where γ ˜ and ε u are defined in (20). Then, the subsequent inequality can be derived by combining (14) and (16):
γ ˜ + T ˜ F ˜ u X ˜ + X ˜ T F ˜ u T T ˜ T < 0 ,
where F ˜ u = diag F 1 , u , F 2 , u , F 3 , u , F 4 , u , F ^ , F ^ , T ˜ and X ˜ are defined in (20).
Based on Lemma 3, there exists a positive scalar ι such that
γ ˜ + ι 1 T ˜ T ˜ T + ι X ˜ T X ˜ < 0 .
Then, we can derive from Lemma 3 that Equation (39) is equivalent to (19). The proof of Theorem 1 is ended. □

3.2. Optimization Problem

The estimator gain K u and the matrix P u + 1 > 0 that characterize the shape and direction of the ellipsoid are derived through iterative solutions of the sets of LMIs at each sampling instant. Noteworthy is the fact that, under the calculation framework discussed in the preceding sections, the obtained estimator gain K u could be a set (if existing). To determine the optimal estimator gain from this set, we propose a convex optimization problem: minimize the trace of the matrix P u .
Corollary 1.
If there exist a series of real-valued matrices P u + 1 > 0 and K u , positive scalars φ j ( j = 1 , 2 , , n y ) , ϶ i ( i = 1 , 2 , , 8 ) and ι such that the following optimization problems can be solved:
min P u + 1 > 0 , K u , ϶ i ( i = 1 , 2 , , 8 ) , φ j ( j = 1 , 2 , , n y ) , ι trace ( P u + 1 ) if ( 19 ) holds
then the minimized ellipsoidal regions can be obtained by minimizing the traces of the matrix P u + 1 sequence.
Remark 3.
In this paper, we consider multiple phenomena simultaneously, such as gain perturbation, cyber-attacks, time delays and MMs, which inevitably increase the complexity of the system to some extent. The added complexity may limit the applicability of the estimation framework in real-time systems with limited computational resources. However, we are considering the worst case here, and, in real situations, the considered phenomena occurring at the same time is not common—usually, only one of them occurs. These phenomena occurring in isolation are special cases under the framework of this paper. In this sense, the proposed estimation framework has little influence on the application in real-time systems with limited computational resources.

4. Simulation Example

In this section, we introduce a numerical example with parameters from [20] and an actual engineering example with parameters from [55] to verify the effectiveness of our designed approach.
Consider the MNN system in (13) with the following parameters:
a 1 ( o ˜ ¯ 1 , u ) = 0.84 o ˜ ¯ 1 , u > 1 0.2 o ˜ ¯ 1 , u 1 , a 2 ( o ˜ ¯ 2 , u ) = 0.35 o ˜ ¯ 2 , u > 1 0.65 o ˜ ¯ 2 , u 1 ,
b 11 ( o ˜ ¯ 1 , u ) = 0.8 o ˜ ¯ 1 , u > 1 0.2 o ˜ ¯ 1 , u 1 , b 12 ( o ˜ ¯ 1 , u ) = 0.5 o ˜ ¯ 1 , u > 1 0.7 o ˜ ¯ 1 , u 1 ,
b 21 ( o ˜ ¯ 2 , u ) = 0.85 o ˜ ¯ 2 , u > 1 0.05 o ˜ ¯ 2 , u 1 , b 22 ( o ˜ ¯ 2 , u ) = 0.6 o ˜ ¯ 2 , u > 1 0.8 o ˜ ¯ 2 , u 1 ,
d 11 ( o ˜ ¯ 1 , u ) = 0.2 o ˜ ¯ 1 , u > 1 0.1 o ˜ ¯ 1 , u 1 , d 12 ( o ˜ ¯ 1 , u ) = 0.3 o ˜ ¯ 1 , u > 1 0.12 o ˜ ¯ 1 , u 1 ,
d 21 ( o ˜ ¯ 2 , u ) = 0.5 o ˜ ¯ 2 , u > 1 0.35 o ˜ ¯ 2 , u 1 , d 22 ( o ˜ ¯ 2 , u ) = 0.1 o ˜ ¯ 2 , u > 1 0.06 o ˜ ¯ 2 , u 1 ,
h 11 ( o ˜ ¯ 1 , u ) = 0.2 o ˜ ¯ 1 , u > 1 0.1 o ˜ ¯ 1 , u 1 , h 12 ( o ˜ ¯ 1 , u ) = 0.3 o ˜ ¯ 1 , u > 1 0.12 o ˜ ¯ 1 , u 1 ,
h 21 ( o ˜ ¯ 2 , u ) = 0.5 o ˜ ¯ 2 , u > 1 0.35 o ˜ ¯ 2 , u 1 , h 22 ( o ˜ ¯ 2 , u ) = 0.1 o ˜ ¯ 2 , u > 1 0.06 o ˜ ¯ 2 , u 1 ,
C ˜ ¯ = 1.5 0.8 1.5 0.9 , H ˜ ¯ W = 0.36 0.21 , H ˜ ¯ V = 1.8 1.5 ,
Δ A ˜ ¯ u = 0.006 sin ( 0.6 u ) 0 0 0.003 sin ( 0.6 u ) ,
Δ B ˜ ¯ u = 0.005 sin ( 0.8 u ) 0.005 sin ( 0.8 u ) 0.001 sin ( 0.8 u ) 0.004 sin ( 0.8 u ) ,
Δ D ˜ ¯ u = 0.001 cos ( 0.7 u ) 0.002 cos ( 0.7 u ) 0.005 cos ( 0.7 u ) 0.003 cos ( 0.7 u ) ,
Δ E ˜ ¯ u = 0.01 sin ( 0.7 u ) 0.004 sin ( 0.7 u ) 0.01 sin ( 0.7 u ) 0.004 sin ( 0.7 u ) ,
U ˜ ¯ = 1 0 0 1 , U ˜ ¯ 1 = 0.3 0 0 0.3 ,
T ^ = 0.05 0.1 0 0.05 T ,
F ^ u = sin ( r a n d ( 1 ) 2 π ) , X ^ = 0.05 0.06 ,
τ 1 = 2 , τ 2 = 4 .
μ 1 = 0.4 , μ 2 = 0.5 , μ 3 = 0.2 , μ 4 = 0.3 .
The nonlinear time-delay neuron activation function g ( o ˜ ¯ u τ 1 ) is selected as follows:
g ( o ˜ ¯ u τ 1 ) = 0.1 o ˜ ¯ 1 , u τ 1 tanh ( 0.4 o ˜ ¯ 1 , u τ 1 ) 0.02 o ˜ ¯ 2 , u τ 1 + 0.06 tanh ( o ˜ ¯ 2 , u τ 1 ) T
which belongs to the sector ( S ˜ ¯ 1 , S ˜ ¯ 2 ) with
S ˜ ¯ 1 = 0.3 0 0 0.04 , S ˜ ¯ 2 = 0.1 0 0 0.02 .
The nonlinear neuron activation function f ( o ˜ ¯ u τ 1 ) is selected as follows:
f ( o ˜ ¯ u ) = tanh ( 0.2 o ˜ ¯ 1 , u ) tanh ( 0.1 o ˜ ¯ 2 , u ) T
which belongs to the sector ( J ˜ ¯ 1 , J ˜ ¯ 2 ) with J ˜ ¯ 1 = diag { 0 , 0 } , J ˜ ¯ 2 = diag { 0.1 , 0.2 } .
For the UBB noises W ˜ ¯ u = V ˜ ¯ u = 7 sin ( u 2 π ) and R 1 , u = R 2 , u = 49 . The parameters of bias injection attack are selected as ρ u = 20 , Ω u = 4000 and β ˜ ¯ = 0.05 . The initial conditions are selected as Ψ u = ( 2 2 1 1 ) T , o ^ u = ( 0 0 0 0 ) T and P u = diag { 4 , 4 , 1 , 1 } , where u = 4 , 3 , 2 , 1 . The weight coefficient matrix is ω ˜ = diag { 1 , 0.8 } . The saturation level of sensors is ± 1.8 .
We use MATLAB R2020a for solving the optimization problem in Corollary 1.
Case 1.
The true state and its estimation values of the MNNs without attack and MMs are shown below.
Figure 3 and Figure 4 describe the real values o u ( i ) and the estimation values o ^ u ( i ) ( i = 1 , 2 ) of the MNNs without MMs and cyber-attacks, respectively. From Figure 3 and Figure 4, we can clearly see that, although there exist mixed time delays, measurement-saturation phenomena and UBB noises in the process of state estimation for MNNs, the estimation framework proposed in this paper can still accurately estimate the state of MNNs. Compared with our approach, although the approaches in [27,55] can also estimate the state of the MNNs, the estimation accuracy is relatively low. In addition, we can see that there is a large lag and deviation between the true state and the estimated value obtained by the traditional SMF in [11].
Case 2.
We consider the situation when cyber-attacks and MMs occur; the occurrences of attacks and MMs are shown below.
The occurrences of cyber-attacks and MMs are shown in Figure 5 and Figure 6, respectively.
Under the same parameters, the true state and the estimation values of the MNNs with MMs subject to cyber-attacks are shown below.
The real values o u ( i ) and the estimation values o ^ u ( i ) ( i = 1 , 2 ) of the MNNs with MMs subject to cyber-attacks are shown in Figure 7 and Figure 8, respectively. From Figure 7 and Figure 8, we can see that the estimation framework we proposed in this paper can effectively estimate the true state of MNNs. When the system is threatened by cyber-attacks during transmission, the estimation error can increase accordingly. However, once the attack signal disappears, the estimation performance can recover immediately. In addition, when a sensor node exhibits an MM phenomenon, compared with the approaches based on the RR protocol in [27,55], our proposed algorithm can also reduce the influence of MMs on estimation performance.
The following figures show the sensor nodes selected to send the latest data at each sampling instant based on the WTOD protocol and RR protocol with MMs subject to cyber-attacks.
Figure 9 and Figure 10 show the situation of the sensor nodes sending data under the WTOD protocol and the RR protocol, respectively. From Figure 9 and Figure 10, we can see that only one sensor node sends data to the estimator at each sampling instant, which means that the use of these two protocols can save communication resources and reduce the communication burden when the network bandwidth is limited, in turn avoiding possible data collisions.
From Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, we can obtain that, when using the approaches based on the RR protocol in [27,55] to estimate the MNNs, the estimation performance can be greatly influenced once the sampling instants for the continuous occurrence of MMs exceeds the number of sensor nodes. In contrast, the state estimation results from the estimation framework proposed in this paper are more accurate, significantly less influenced by continuous occurrence of MMs. This is because, if we know that a certain sensor has a high occurrence probability of MMs, we can reduce the data transmission from this sensor to the estimator by changing the weight of the WTOD protocol, so as to reduce the sending of erroneous data to the estimator as much as possible.
Finally, to further confirm the practicability of the proposed estimation framework, we apply this framework to a real engineering problem.
Case 3.
In this case, we consider a network-based test rig that consists of a plant (DC servo system) and a remote controller; the DC servo system is identified to be a third-order system, whose parameters are from [55]:
o ˜ ¯ u + 1 = A o ˜ ¯ u + D o ˜ ¯ u τ 1 + B W ˜ ¯ u q ˜ u = α u ( C o ˜ ¯ u + E V ˜ ¯ u ) o ˜ ¯ u = Ψ ¯ u , u [ τ 1 , 0 ]
A = 1.12 0.213 0.333 1 0 0 0 1 0 , B = 0.8 0 0 , D = 0.2193 0.0219 0.0844 0.2177 0.0032 0.0662 0.1298 0.0087 0.0381 , C = 1 0 0 0 1 0 , E = 0 0.8 , ω ˜ = diag { 1.05 , 1 } , W ˜ ¯ u = 0.5 c o s ( 0.2 u ) , V ˜ ¯ u = 0.5 s i n ( 0.2 u ) , R 1 , u = R 2 , u = 0.25 , P u = diag { 4 , 4 , 4 , 1 , 1 } , Ψ ¯ u = ( 2 2 2 ) , τ 1 = 3 .
The occurrence of MMs is referred to Case 2.
The real values o u ( i ) and the estimation values o ^ u ( i ) ( i = 1 , 2 , 3 ) of the system with MMs and time delays are shown in Figure 11, Figure 12 andFigure 13, respectively.
We compare our estimation framework with the approach proposed in [55]; we can see that our estimation framework can effectively reduce the influence of MMs and time delays on estimation performance. Therefore, Case 3 further verifies the effectiveness of the estimation framework proposed in this paper and its practicability in actual engineering scenarios.

5. Discussion

5.1. The Analysis of Experimental Results

In order to verify the estimation performance of the proposed estimation framework, we compare and calculate the computational load and mean square error (MSE) of the proposed approach and three common approaches for three cases.
The comparative estimation results of Case 1 are shown in Table 1 below.
According to Table 1, we can obtain that, in the absence of MMs and cyber-attacks, the sum of MSE of the approaches in [11,27,55] is higher than that of our approach by 85.22%, 79.78% and 96.34%, respectively, while the difference between their calculation load and our approach is within 3 seconds, except for [11]. Although the approach in [11] is fast, the accuracy is too low. Therefore, the comprehensive comparison shows that our approach is optimal when MNNs are not influenced by MMs and cyber-attacks.
The comparative estimation results of Case 2 are shown in Table 2 below.
According to Table 2, we can conclude that, in the presence of MNNs with MMs and cyber-attacks, the sum of MSE with the approaches in [11,27,55] are 87.93%, 79.78% and 96.91% higher than our approach, respectively. Furthermore, during MMs, their MSE values are 78.33%, 38.92% and 82.55% higher than our approach, respectively. The results show that, even when MNNs are influenced by MMs and cyber-attacks, our approach still has high estimation performance and can significantly reduce the influence of MMs on the estimation performance accuracy.
The comparative estimation results of Case 3 are shown in Table 3 below.
From the practical system case in Table 3, we can see that, compared with the approach in [55], the computational load of our approach is slightly lower, but the sum of MSE values during MM occurrence is 92.24% and 82.76% lower than the approach in [55]. This case also shows that the comprehensive estimation performance of our proposed estimation framework is better and practical.

5.2. Practicability of the Proposed Estimation Framework

In the “Simulation example” section, we verify the practicality of the proposed estimation framework through an engineering example. In fact, both cyber-attacks and MMs may occur in actual networked control systems, such as unmanned aerial vehicle group control systems and intelligent vehicle networking systems [63,64]. The estimation framework proposed in this paper is practical as long as the cyber-attacks obey the Bernoulli distribution.

6. Conclusions

This paper has investigated the non-fragile estimation problem based on set-membership filtering for a class of measurement-saturated MNNs with MMs and mixed time delays subject to stochastic cyber-attacks under the WTOD protocol. The occurrence of stochastic cyber-attacks follows a Bernoulli distribution. First, by utilizing the LMI technology, the estimation error has been ensured to still be limited within the specified ellipsoid despite the above sensor-related problems and network-induced phenomena. Simultaneously, through the set-membership filtering approach and mathematical induction, we have established the sufficient condition for the existence of the estimator, so that one can solve the LMI sequence to obtain the estimator gain. Moreover, by designing a non-fragile set-membership algorithm, the robustness of the estimation algorithm has been ensured under gain perturbation. Second, by solving the trace of the minimization matrix, the local optimal estimator gain has been obtained to achieve the optimal estimation performance at each sampling instant. Finally, numerical simulation examples have been presented to demonstrate the effectiveness of the proposed algorithm.
Although the estimation performance of the proposed estimation framework in this paper has been superior to other estimation frameworks proposed in the literature, when the MMs occur in a sensor node, if we do not know in advance which sensors have a higher probability of MMs, we cannot pre-set the weight values of the WTOD protocol, which greatly increases the probability of the estimator receiving missing data. Therefore, in future research, we should propose a dynamic communication strategy to detect the occurrence of MMs and adjust weights in real time to avoid the influence of MMs on estimation performance. In addition, for the occurrence of cyber-attacks, our estimation framework has still been passive to detect attacks and recover estimation performance. In some engineering scenarios, cyber-attacks influence the estimation performance, which may bring serious consequences to the whole system. Therefore, in the follow-up research, we hope to make improvements in the estimation framework to actively protect data from cyber-attacks.

Author Contributions

Conceptualization, Z.W. and P.W.; methodology, J.L.; software, J.W.; validation, P.L. writing—original draft, Z.W. and P.W.; writing—review and editing, Z.W. and P.W.; supervision, Z.W. and P.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the project of National Natural Science Foundation of China (Grant numbers [32073029]), Shandong Province Modern Agricultural Technology System (Grant numbers [SDAIT-22]), the key project of Shandong Provincial Natural Science Foundation (Grant numbers [ZR2020KC027]), National Key Research and Development Program of China (Grant numbers [2023YFD2400405], [2023YFD2400400]),the Science & Technology Specific Projects in Agricultural High-Tech Industrial Demonstration Area of the YellowRiver Delta (Grant numbers [2022SZX18]) and Shandong Provincial Key R & D Plan (Grant numbers [2022CXGC010611]).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. FAO. Memristive devices and systems. Proc. IEEE 1976, 64, 209–223. [Google Scholar] [CrossRef]
  2. Liu, H.; Wang, Z.; Shen, B.; Alsaadi, F. state estimation for discrete-time memristive recurrent neural networks with stochastic time-delays. Int. J. Gen. Syst. 2016, 45, 633–647. [Google Scholar] [CrossRef]
  3. Li, X.; Zhang, W.; Fang, J.; Li, H. Mixed H/L2L State Estimation for Delayed Memristive Neural Networks with Markov Switching Parameters. Neurocomputing 2019, 340, 342–354. [Google Scholar] [CrossRef]
  4. Zhang, Y.; Zhou, L. State estimation for proportional delayed complex-valued memristive neural networks. Inf. Sci. 2024, 680, 121–150. [Google Scholar] [CrossRef]
  5. Ding, S.; Wang, Z.; Wang, J.; Zhang, H. H state estimation for memristive neural networks with time-varying delays: The discrete-time case. Neural Netw. 2016, 84, 47–56. [Google Scholar] [CrossRef]
  6. Feng, L.; Zhao, L.; Ban, L. H state estimation for discrete memristive neural networks with signal quantization and probabilistic time delay. Syst. Sci. Control Eng. 2021, 9, 764–774. [Google Scholar] [CrossRef]
  7. Xue, Z.; Zhang, Y.; Cheng, C.; Ma, G. Remaining useful life prediction of lithium-ion batteries with adaptive unscented kalman filter and optimized support vector regression. Neurocomputing 2020, 376, 95–102. [Google Scholar] [CrossRef]
  8. Liu, Y.; Wang, Z.; Liu, C.; Coombes, M.; Chen, W. Auxiliary Particle Filtering Over Sensor Networks Under Protocols of Amplify-and-Forward and Decode-and-Forward Relays. IEEE Trans. Signal Inf. Process. Over Netw. 2022, 8, 883–893. [Google Scholar] [CrossRef]
  9. Sheng, L.; Wang, Z.; Zou, L.; Alsaadi, F. Event-Based H State Estimation for Time-Varying Stochastic Dynamical Networks With State- and Disturbance-Dependent Noises. IEEE Trans. Neural Netw. Learn. Syst. 2017, 28, 2382–2394. [Google Scholar] [CrossRef]
  10. Boada, B.L.; Boada, M.J.L.; Diaz, V. A robust observer based on energy-to-peak filtering in combination with neural networks for parameter varying systems and its application to vehicle roll angle estimation. Mechatronics 2018, 50, 196–204. [Google Scholar] [CrossRef]
  11. Schweppe, F. Recursive state estimation: Unknown but bounded errors and system inputs. IEEE Trans. Autom. Control 1968, 13, 22–28. [Google Scholar] [CrossRef]
  12. Zhao, Z.; Wang, Z.; Zou, L.; Liu, H.; Alsaadi, F. Zonotopic multi-sensor fusion estimation with mixed delays under try-once-discard protocol: A set-membership framework. Inf. Fusion 2023, 91, 681–693. [Google Scholar] [CrossRef]
  13. Gao, Y.; Ma, L.; Zhang, M.; Guo, J.; Bo, Y. Distributed Set-Membership Filtering for Nonlinear Time-Varying Systems With Dynamic Coding-Decoding Communication Protocol. IEEE Syst. J. 2022, 16, 2958–2967. [Google Scholar] [CrossRef]
  14. Wei, G.; Liu, S.; Song, Y.; Liu, Y. Probability-guaranteed set-membership filtering for systems with incomplete measurements. Automatica 2015, 60, 12–16. [Google Scholar] [CrossRef]
  15. Ding, D.; Wang, Z.; Han, Q. A Set-Membership Approach to Event-Triggered Filtering for General Nonlinear Systems Over Sensor Networks. IEEE Trans. Autom. Control 2020, 65, 1792–1799. [Google Scholar] [CrossRef]
  16. Zhao, Z.; Wang, Z.; Zou, L.; Chen, Y.; Sheng, W. Event-Triggered Set-Membership State Estimation for Complex Networks: A Zonotopes-Based Method. IEEE Trans. Netw. Sci. Eng. 2022, 9, 1175–1186. [Google Scholar] [CrossRef]
  17. Zhou, X.; Zhang, Y.; Chen, J.; Zheng, X. A quantized set-membership estimation-based heading control method of unmanned surface vessels under unknown-but-bounded wave-induced disturbances. Asian J. Control 2023, 25, 3105–3118. [Google Scholar] [CrossRef]
  18. Yang, H.; Zhang, Y.; Gu, W.; Yang, F.; Liu, Z. Set-membership filtering for automatic guided vehicles with unknown-but-bounded noises. Trans. Inst. Meas. Control 2022, 44, 716–725. [Google Scholar] [CrossRef]
  19. Yang, Y.; Hu, J.; Chen, D.; Wei, Y.; Du, J. Non-fragile Suboptimal Set-membership Estimation for Delayed Memristive Neural Networks with Quantization via Maximum-error-first Protocol. Int. J. Control Autom. Syst. 2020, 18, 1904–1914. [Google Scholar] [CrossRef]
  20. Hu, J.; Yang, Y.; Liu, H.; Chen, D.; Du, J. Non-fragile set-membership estimation for sensor-saturated memristive neural networks via weighted try-once-discard protocol. IET Control Theory Appl. 2020, 14, 1671–1680. [Google Scholar] [CrossRef]
  21. Liu, L.; Ma, L.; Zhang, J.; Bo, Y. Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks. Int. J. Syst. Sci. 2021, 52, 1192–1205. [Google Scholar] [CrossRef]
  22. Ma, L.; Wang, Z.; Lam, H.; Kyriakoulis, N. Distributed event-based set-Membership filtering for a Class of Nonlinear Systems with sensor saturations over sensor networks. IEEE Trans. Cybern. 2017, 47, 3772–3783. [Google Scholar] [CrossRef] [PubMed]
  23. Ma, L.; Wang, Z.; Lam, H. Event-triggered mean-square consensus control for time-varying stochastic multi-agent system with sensor saturations. IEEE Trans. Autom. Control 2017, 62, 3524–3531. [Google Scholar] [CrossRef]
  24. Ding, D.; Han, Q.; Ge, X. Distributed filtering of networked dynamic systems with non-gaussian noises over sensor networks: A survey. Kybernetika 2020, 56, 5–34. [Google Scholar] [CrossRef]
  25. Hu, J.; Li, J.; Kao, Y.; Chen, Y. Optimal distributed filtering for nonlinear saturated systems with random access protocol and missing measurements: The uncertain probabilities case. Appl. Math. Comput. 2022, 418, 235–246. [Google Scholar] [CrossRef]
  26. Yang, F.; Li, Y. Set-membership filtering for systems with sensor saturation. Automatica 2009, 45, 1896–1902. [Google Scholar] [CrossRef]
  27. Song, X.; Rong, L.; Li, B.; Wang, Z.; Li, J. Joint state and fault estimation for nonlinear systems with missing measurements and random component faults under Round-Robin Protocol. Int. J. Electr. Power Energy Syst. 2016, 154, 429–437. [Google Scholar] [CrossRef]
  28. Wei, G.; Wang, Z.; Shu, H. Robust filtering with stochastic nonlinearities and multiple missing measurements. Automatica 2009, 45, 836–841. [Google Scholar] [CrossRef]
  29. Hu, J.; Wang, Z.; Dong, H.; Gao, H. Recent Advances on Recursive Filtering and Sliding Mode Design for Networked Nonlinear Stochastic Systems: A Survey. Math. Probl. Eng. 2013, 32, 24–33. [Google Scholar] [CrossRef]
  30. Shen, B.; Wang, Z.; Wang, D.; Li, Q. State-Saturated Recursive Filter Design for Stochastic Time-Varying Nonlinear Complex Networks Under Deception Attacks. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 3788–3800. [Google Scholar] [CrossRef]
  31. Liu, L.; Ma, L.; Wang, Y.; Zhang, J.; Bo, Y. Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks. J. Frankl.-Inst.-Eng. Appl. Math. 2020, 357, 4983–5003. [Google Scholar] [CrossRef]
  32. Geng, H.; Wang, Z.; Hu, J.; Alsaadi, F.; Cheng, Y. Outlier-resistant sequential filtering fusion for cyber-physical systems with quantized measurements under denial-of-service attacks. Inf. Sci. 2023, 628, 488–503. [Google Scholar] [CrossRef]
  33. Hu, L.; Wang, Z.; Han, Q.; Liu, X. State estimation under false data injection attacks: Security analysis and system protection. Automatica 2018, 87, 176–183. [Google Scholar] [CrossRef]
  34. Zhao, D.; Wang, Z.; Wei, G.; Han, Q. A dynamic event-triggered approach to observer-based PID security control subject to deception attacks. Automatica 2020, 120, 891–900. [Google Scholar] [CrossRef]
  35. Xu, W.; Wang, Z.; Hu, L.; J, J. State estimation under joint false data injection attacks: Dealing with constraints and insecurity. IEEE Trans. Autom. Control 2022, 67, 6745–6753. [Google Scholar] [CrossRef]
  36. Li, T.; Wang, Z.; Zou, L.; Chen, B.; Yu, L. A dynamic encryption-decryption scheme for replay attack detection in cyber-physical systems. Automatica 2023, 151, 34–47. [Google Scholar] [CrossRef]
  37. Wang, X.; Ding, D.; Ge, X.; Han, Q. Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: The adaptive event-triggered case. IEEE/CAA J. Autom. Sin. 2022, 32, 2760–2779. [Google Scholar] [CrossRef]
  38. Xiao, S.; Ge, X.; Han, Q.; Zhang, Y. Secure Distributed Adaptive Platooning Control of Automated Vehicles Over Vehicular Ad-Hoc Networks Under Denial-of-Service Attacks. IEEE Trans. Cybern. 2022, 52, 12003–12015. [Google Scholar] [CrossRef]
  39. Ding, D.; Liu, H.; Dong, H.; Liu, H. Resilient Filtering of Nonlinear Complex Dynamical Networks Under Randomly Occurring Faults and Hybrid Cyber-Attacks. IEEE Trans. Netw. Sci. Eng. 2022, 9, 2341–2352. [Google Scholar] [CrossRef]
  40. Li, M.; Liang, J. State estimation for 2-D uncertain systems with redundant channels and deception attacks: A set-membership method. Appl. Math. Comput. 2023, 457, 3184–3194. [Google Scholar] [CrossRef]
  41. Zhao, Z.; Wang, Z.; Zou, L.; Guo, J. Set-membership filtering for time-varying complex networks with uniform quantisations over randomly delayed redundant channels. Int. J. Syst. Sci. 2020, 51, 3364–3377. [Google Scholar] [CrossRef]
  42. Li, J.; Wei, G.; Ding, D.; Li, Y. Set-membership filtering for discrete time-varying nonlinear systems with censored measurements under Round-Robin protocol. Neurocomputing 2018, 281, 20–26. [Google Scholar] [CrossRef]
  43. Li, X.; Han, F.; Hou, N.; Dong, H.; Liu, H. Set-membership filtering for piecewise linear systems with censored measurements under Round-Robin protocol. Int. J. Syst. Sci. 2020, 51, 1578–1588. [Google Scholar] [CrossRef]
  44. Rana, M.; Li, L.; Su, S. Cyber Attack Protection and Control of Microgrids. IEEE-CAA J. Autom. Sin. 2018, 5, 602–609. [Google Scholar] [CrossRef]
  45. Qu, B.; Wang, Z.; Shen, B.; Dong, H. Secure Particle Filtering With Paillier Encryption-Decryption Scheme: Application to Multi-machine Power Grids. IEEE Trans. Smart Grid 2023, 15, 863–873. [Google Scholar] [CrossRef]
  46. Luan, X.; Shi, Y.; Liu, F. Unscented Kalman Filtering For Greenhouse Climate Control Systems With Missing Measurement. Int. J. Innov. Comput. Inf. Control. 2012, 8, 2173–2180. [Google Scholar]
  47. Befekadu, G.K.; Gupta, V.; Antsaklis, P.J. Risk-Sensitive Control Under Markov Modulated Denial-of-Service (DoS) Attack Strategies. IEEE Trans. Autom. Control 2015, 60, 3299–3304. [Google Scholar] [CrossRef]
  48. Yi, X.; Yu, H.; Wang, P.; Liu, S.; Ma, L. Encoding–decoding-based secure filtering for neural networks under mixed attacks. Neurocomputing 2020, 508, 71–78. [Google Scholar] [CrossRef]
  49. Zou, L.; Wang, Z.; Hu, J.; Gao, H. On H Finite-Horizon Filtering Under Stochastic Protocol: Dealing With High-Rate Communication Networks. IEEE Trans. Autom. Control 2017, 62, 4884–4890. [Google Scholar] [CrossRef]
  50. Zhu, K.; Hu, J.; Liu, Y.; Alotaibi, N.; Alsaadi, F. On L2L output-feedback control scheduled by stochastic communication protocol for two-dimensional switched systems. Int. J. Syst. Sci. 2021, 52, 2961–2976. [Google Scholar] [CrossRef]
  51. Li, J.; Wang, Z.; Dong, H.; Fei, W. Delay-distribution-dependent state estimation for neural networks under stochastic communication protocol with uncertain transition probabilities. Neural Netw. 2020, 130, 143–151. [Google Scholar] [CrossRef] [PubMed]
  52. Li, B.; Wang, Z.; Han, Q.; Liu, H. Distributed Quasiconsensus Control for Stochastic Multiagent Systems Under Round-Robin Protocol and Uniform Quantization. IEEE Trans. Cybern. 2022, 52, 6721–6732. [Google Scholar] [CrossRef] [PubMed]
  53. Li, M.; Liang, J.; Wang, F. Robust set-membership filtering for two-dimensional systems with sensor saturation under the Round-Robin protocol. Int. J. Syst. Sci. 2022, 53, 2773–2785. [Google Scholar] [CrossRef]
  54. Li, X.; Dong, H.; Wang, Z.; Han, F. Set-membership filtering for state-saturated systems with mixed time-delays under weighted try-once-discard protocol. Automatica 2018, 74, 341–348. [Google Scholar] [CrossRef]
  55. Zou, L.; Wang, Z.; Gao, H. Set-membership filtering for time-varying systems with mixed time-delays under Round-Robin and Weighted Try-Once-Discard protocols. Automatica 2016, 74, 341–348. [Google Scholar] [CrossRef]
  56. Shen, Y.; Wang, Z.; Shen, B.; Dong, H. Outlier-resistant recursive filtering for multisensor multirate networked systems under weighted try-once-discard protocol. IEEE Trans. Cybern. 2021, 51, 4897–4908. [Google Scholar] [CrossRef]
  57. Wang, F.; Liang, J.; Lam, J.; Yang, J.; Zhao, C. Robust Filtering for 2-D Systems With Uncertain-Variance Noises and Weighted Try-Once-Discard Protocols. IEEE Trans. Syst. Man-Cybern.-Syst. 2023, 53, 2914–2924. [Google Scholar] [CrossRef]
  58. Zou, L.; Wang, Z.; Hu, J.; Liu, Y.; Liu, X. Communication-protocol-based analysis and synthesis of networked systems: Progress, prospects and challenges. Int. J. Syst. Sci. 2021, 52, 3013–3034. [Google Scholar] [CrossRef]
  59. Yang, H.; Yan, H.; Zhou, J.; Zhang, Y.; Chang, Y. Neural-Network-Based Set-Membership Filtering Under WTOD Protocols via a Novel Event-Triggered Compensation Mechanism. IEEE Trans. Syst. Man, Cybern. Syst. 2024, 54, 2954–2964. [Google Scholar] [CrossRef]
  60. Li, X.; Gong, R.; Zhu, L. Interval Observer Design for Nonlinear Interconnected Systems via Ellipsoid Approach. Int. J. Control Autom. Syst. 2024, 22, 807–815. [Google Scholar] [CrossRef]
  61. Boyd, S.; Ghaoui, L.; Feron, E.; Balakrishnan, V. Linear Matrix Inequalities in System and Control Theory; SIAM: Philadelphia, PA, USA, 1994; Volume 15. [Google Scholar]
  62. Khalil, H. Nonlinear Systems; Prentice Hall: Hoboken, NJ, USA, 2002. [Google Scholar]
  63. Ge, X.; Han, Q.; Wu, Q.; Zhang, X. Resilient and Safe Platooning Control of Connected Automated Vehicles Against Intermittent Denial-of-Service Attacks. IEEE-CAA J. Autom. Sin. 2023, 10, 1234–1251. [Google Scholar] [CrossRef]
  64. Zhang, J.; Ren, Z.; Deng, C.; Wen, B. Adaptive fuzzy global sliding mode control for trajectory tracking of quadrotor UAVs. Nonlinear Dyn. 2019, 97, 609–627. [Google Scholar] [CrossRef]
Figure 1. Schematic diagram of sector-bounded nonlinear saturation function.
Figure 1. Schematic diagram of sector-bounded nonlinear saturation function.
Applsci 14 08936 g001
Figure 2. Schematic diagram of measurement saturation, MMs, WTOD protocol and cyber-attacks.
Figure 2. Schematic diagram of measurement saturation, MMs, WTOD protocol and cyber-attacks.
Applsci 14 08936 g002
Figure 3. True state and its estimated values based on our approach and other approaches from [11,27,55].
Figure 3. True state and its estimated values based on our approach and other approaches from [11,27,55].
Applsci 14 08936 g003
Figure 4. True state and its estimated values based on our approach and other approaches from [11,27,55].
Figure 4. True state and its estimated values based on our approach and other approaches from [11,27,55].
Applsci 14 08936 g004
Figure 5. Occurrences of bias injection attacks.
Figure 5. Occurrences of bias injection attacks.
Applsci 14 08936 g005
Figure 6. Occurrences of MMs on each sensor node.
Figure 6. Occurrences of MMs on each sensor node.
Applsci 14 08936 g006
Figure 7. True state and its estimated values based on our approach and other approaches from [11,27,55].
Figure 7. True state and its estimated values based on our approach and other approaches from [11,27,55].
Applsci 14 08936 g007
Figure 8. True state and its estimated values based on our approach and other approaches from [11,27,55].
Figure 8. True state and its estimated values based on our approach and other approaches from [11,27,55].
Applsci 14 08936 g008
Figure 9. Selected nodes to transmit the latest data under the WTOD protocol.
Figure 9. Selected nodes to transmit the latest data under the WTOD protocol.
Applsci 14 08936 g009
Figure 10. Selected nodes to transmit the latest data under the RR protocol.
Figure 10. Selected nodes to transmit the latest data under the RR protocol.
Applsci 14 08936 g010
Figure 11. True state and its estimated values based on our approach and the approach from [55].
Figure 11. True state and its estimated values based on our approach and the approach from [55].
Applsci 14 08936 g011
Figure 12. True state and its estimated values based on our approach and the approach from [55].
Figure 12. True state and its estimated values based on our approach and the approach from [55].
Applsci 14 08936 g012
Figure 13. True state and its estimated values based on our approach and the approach from [55].
Figure 13. True state and its estimated values based on our approach and the approach from [55].
Applsci 14 08936 g013
Table 1. Estimation performance of Case 1.
Table 1. Estimation performance of Case 1.
Estimation ApproachCalculated Load (s)Sum of the MSE
approach in [27]24.2132.010
approach in [55]19.7331.469
approach in [11]7.4628.134
our approach21.4520.297
Table 2. Estimation performance of Case 2.
Table 2. Estimation performance of Case 2.
Estimation ApproachCalculated Load (s)Sum of the MSEMSE during MMs
approach in [27]31.4622.08161.156
approach in [55]24.4211.31921.698
approach in [11]8.4218.12775.927
our approach26.5970.25113.251
Table 3. Estimation performance of Case 3.
Table 3. Estimation performance of Case 3.
Estimation ApproachCalculated Load (s)Sum of the MSEMSE during MMs
approach in [55]1.8691.27510.970
our approach2.0230.0981.892
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Wang, P.; Wang, J.; Lou, P.; Li, J. State Estimation for Measurement-Saturated Memristive Neural Networks with Missing Measurements and Mixed Time Delays Subject to Cyber-Attacks: A Non-Fragile Set-Membership Filtering Framework. Appl. Sci. 2024, 14, 8936. https://doi.org/10.3390/app14198936

AMA Style

Wang Z, Wang P, Wang J, Lou P, Li J. State Estimation for Measurement-Saturated Memristive Neural Networks with Missing Measurements and Mixed Time Delays Subject to Cyber-Attacks: A Non-Fragile Set-Membership Filtering Framework. Applied Sciences. 2024; 14(19):8936. https://doi.org/10.3390/app14198936

Chicago/Turabian Style

Wang, Ziyang, Peidong Wang, Jiasheng Wang, Peng Lou, and Juan Li. 2024. "State Estimation for Measurement-Saturated Memristive Neural Networks with Missing Measurements and Mixed Time Delays Subject to Cyber-Attacks: A Non-Fragile Set-Membership Filtering Framework" Applied Sciences 14, no. 19: 8936. https://doi.org/10.3390/app14198936

APA Style

Wang, Z., Wang, P., Wang, J., Lou, P., & Li, J. (2024). State Estimation for Measurement-Saturated Memristive Neural Networks with Missing Measurements and Mixed Time Delays Subject to Cyber-Attacks: A Non-Fragile Set-Membership Filtering Framework. Applied Sciences, 14(19), 8936. https://doi.org/10.3390/app14198936

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop