Next Article in Journal
Closed-Boundary Reflections of Shallow Water Waves as an Open Challenge for Physics-Informed Neural Networks
Previous Article in Journal
Enhancing Economic, Resilient, and Sustainable Outcomes Through Supplier Selection and Order Allocation in the Food Manufacturing Industry: A Hybrid Delphi-FAHP-FMOP Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Data-Driven Prescribed Performance Platooning Control Under Aperiodic Denial-of- Service Attacks

1
Shandong Key Laboratory of Industrial Control Technology, School of Automation, Qingdao University, Qingdao 266071, China
2
State Key Laboratory of Synthetical Automation for Process Industries, College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(21), 3313; https://doi.org/10.3390/math12213313
Submission received: 12 September 2024 / Revised: 11 October 2024 / Accepted: 14 October 2024 / Published: 22 October 2024

Abstract

:
This article studies a data-driven prescribed performance platooning control method for nonlinear connected automated vehicle systems (CAVs) under aperiodic denial-of-service (DoS) attacks. Firstly, the dynamic linearization technique is employed to transform the nonlinear CAV system into an equivalent linearized data model. Secondly, to improve the system’s transient performance, a prescribed performance transformation (PPT) scheme is proposed to transform the constrained output into the unconstrained one. In addition, an attack compensation mechanism is designed to reduce the adverse impact. Combining the PPT scheme and the attack compensation mechanism, the data-driven adaptive platooning control scheme is proposed to achieve the vehicular tracking control task. Lastly, the merits of the developed control method are illustrated by an actual simulation.

1. Introduction

With the improvement and maturity of new generation digital technologies such as artificial intelligence, Internet of Things, and 5G mobile communications, connected automated vehicle systems (CAVs) have become a new trend in the development of the automotive industry. For the purpose of dealing with the adverse impact generated by network attacks and event triggering, the authors of [1] develop a resilient event-triggered controller for CAVs. To reduce the resource consumption and pollution emissions, a hybrid model predictive control scheme for CAVs is developed in [2]. The authors of [3] develop a hierarchical collaborative tracking control strategy for CAVs to reduce traffic throughput and vehicle fuel efficiency in a complex traffic environment. In [4], the authors investigate the cooperative tracking control problem of dynamic event triggering for CAVs with various spacing strategies. To enhance the robustness of the vehicle system, the authors of [5] propose a recent robust control scheme by using an integral sliding mode. With the help of the barrier Lyapunov function, the authors of [6] study the fuzzy adaptive tracking control algorithm for heterogeneous CAVs with input saturation to ensure that collisions do not occur and to maintain communication between vehicles. For a vehicle steer-by-wire system under various parameters, the authors of [7] propose a robust control technique. To ensure collision avoidance and comfort assurance conditions, the authors of [8] propose a hierarchical control approach to address the prescribed performance lane-changing control problem for nonlinear vehicle platoons.
It is worth noting that, in practical applications, CAVs can exchange position and speed information with each other through the communication network. However, the communication network is very fragile and susceptible to cyber attacks, which will cause the controlled system to be in an unsafe state. In general, the network attacks can be divided into denial-of-service (DoS) attacks and false data injection (FDI) attacks. Differently from an FDI attack, which injects false attack signals into the system, the manner of DoS attacks is to destroy the information transmission channel, i.e., the data of the system cannot be timely transmitted to the controller. Until now, the safety of a vehicle system has been of wide concern [9,10,11,12,13,14]. The authors of [9] deal with the observer-based security consensus problem under DoS attacks. To deal with arbitrarily large parametric uncertainties, the authors of [10] develop a cooperative robust resilient output regulation control approach for linear uncertain multiagent systems (MASs) under DoS attacks. For mitigating the negative influence of DoS attacks, a novel security tracking control scheme of nonlinear autonomous ground vehicles in [11] is proposed. Due to the interaction information being affected by DoS attacks, the authors of [12] deal with the problem of security cooperative tracking control for nonlinear MASs suffering from DoS attacks. In [13], the authors propose a novel detection method on the basis of the adaptive Kalman filter bank to reduce the effect of FDI attacks. The authors of [14] introduce an adaptive boundary estimation mechanism during the back-stepping controller design process to reduce the adverse influence of FDI attacks. The authors of [15] propose a safe time-varying formation control framework for heterogeneous multiagent systems under the constraints of denial-of-service (DoS) attacks, noncooperative dynamic obstacles, and input saturation.
Although the above results can effectively mitigate the impact of attacks, they are all based on an accurate mathematical model. With the continuous progress of automobile intelligence and electrification, the dynamical modeling of CAVs is becoming more complex. For the purpose of addressing this problem, a model-free adaptive control (MFAC) algorithm is introduced. In the MFAC method [16,17,18,19], complex nonlinear systems can be transformed into the equivalent linear data model through applying the dynamic linearization technique (DLT). In addition, the design of a model-free adaptive controller relies merely on the system’s input and output information, not the architecture of the system itself. Up to now, the MFAC method has been used in a wide variety of applications, such as MASs [20,21], vehicular platooning systems (VPSs) [22,23], and cyber-physical systems (CPSs) [24]. Through employing the DLT, the authors of [20] develop a novel distributed MFAC strategy for MASs suffering from DoS attacks. In [21], a hierarchical distributed MFAC scheme is introduced to address the cooperative tracking control problem. The authors of [22,23] develop a novel MFAC method for nonlinear VPSs. The authors of [24] address the model-free adaptive tracking control problem for a class of discrete-time single-input single-output nonlinear systems under dynamic sparse attacks and measurement disturbances. Although the security cooperative control problem in the application of the MFAC algorithm has made great achievements, the above papers do not consider the safety problem for nonlinear CAVs under aperiodic DoS attacks. This will be one of the driving forces behind our research in this paper.
On the other hand, the above articles only consider the steady-state performance of the system, but do not consider the transient performance. Nevertheless, the transient performance of the system is also very valuable for the system itself. In an actual vehicular platooning control application, for the purpose of restricting the system’s transient performance within the prescribed boundaries and acquire a better tacking control effect, the prescribed performance control (PPC) method is firstly developed in [25] to increase the convergence speed and reduce overshoot. The primary goal of PPC is to limit the error or state of the system to a preset range by applying a strictly increasing function. Until now, the PPC method has gained wide attention [26,27,28]. Unlike the existing observer-based finite/fixed-time control methods, the authors of [26] develop the observer-based finite-time cooperative tracking control scheme for nonlinear MASs, where the time of convergence and the region of convergence can be pre-specified by the authors. Through the aid of back-stepping technology, the authors of [27] develop a novel adaptive tracking control method. The designed controller is able to guarantee the tracking control performance of the system as well as to reduce the communication burden. The authors of [28] propose a novel model-free path tracking controller that realizes appointed-time performance and reduces the communication burden. Until now, the PPC method has received great attention in the field of MFAC [29,30,31,32]. However, it has been noted that there is a fundamental characteristic of the above control methods that do not take into account the chattering generated by the sliding mode control (SMC) method. To this end, for the chatter problem caused by the SMC method, how to design a novel preset performance-based MFAC method that does not use the SMC scheme, especially for nonlinear CAVs, is a problem worthy of attention of this paper.
Enlightened by the previous discussions, this paper develops a data-driven prescribed performance platooning control strategy under aperiodic DoS attacks. Our major contributions in this articles are described below:
(1)
For nonlinear connected automated vehicle system (CAVs) under state constraint and aperiodic DoS attacks, the nonlinear CAV is converted into an equivalent linear data model by using the dynamic linearization technique (DLT). Moreover, to reduce the adverse effect of aperiodic DoS attacks, an attack compensation mechanism based on the latest received data is proposed, which greatly ensures the safe driving of nonlinear CAVs.
(2)
The existing data-driven prescribed performance platooning control methods [29,30,31,32] are based on the sliding mode control framework, which may cause chattering problems. Differently from them, a novel prescribed performance transformation strategy for nonlinear CAVs under aperiodic DoS attacks is developed to complete the vehicular tracking control task.
The rest of this paper is set out in the following. Firstly, the preliminaries and data-driven control algorithm design are shown in Section 2. In Section 3, we present the stability analysis of this paper. Then, the simulation description is presented in Section 4. Ultimately, our conclusion is illustrated in Section 5. To be more clear, Figure 1 is developed to describe each section of this article.

2. Preliminaries and Data-Driven Control Algorithm Design

2.1. Connected Automated Vehicle System Model

In this paper, we consider N + 1 connected automated vehicle systems (CAVs) driving in a platoon, which is made up of N follower vehicles and one leader vehicle; here, the dynamics model of the ith follower vehicle is defined as the following expression:
s i ( k + 1 ) = s i ( k ) + T ϑ i ( k ) + 1 2 T 2 ( u i ( k ) F i ( k ) ) , ϑ i ( k + 1 ) = ϑ i ( k ) + T ( u i ( k ) F i ( k ) ) ,
where T indicates the sampling time. Moreover, s i ( k ) , ϑ i ( k ) , and u i ( k ) with i = { 1 , 2 , , N } represent the position, speed, and the pulling/braking power of the ith follower vehicle, respectively. In addition, F i ( k ) is a nonlinear drag function that includes two terms, namely, a basis function f i ϑ ( ϑ i ( k ) ) associated with velocity and an additional function f i s ( s i ( k ) ) related to the position. Here, the specific forms of f i ϑ ( ϑ i ( k ) ) and f i s ( s i ( k ) ) are defined as the following two equations, respectively:
f i ϑ ( ϑ i ( k ) ) = p 0 ( k ) + p 1 ( k ) ϑ i ( k ) + p 2 ( k ) ϑ i 2 ( k ) f i s ( s i ( k ) ) = q r ( s i ( k ) ) + q c ( s i ( k ) ) + q t ( s i ( k ) )
with p 0 ( k ) , p 1 ( k ) , and p 2 ( k ) denoting the time-varying drag coefficients. Meantime, q r ( · ) , q c ( · ) , and q t ( · ) represent the drag relation to ramps, curves, and tunnels, respectively.
Combining (1) with (2), it is possible to obtain
s i ( k + 1 ) = s i ( k ) + T ϑ i ( k 1 ) + T 2 u i ( k 1 ) + 1 2 T 2 u i ( k ) T 2 F i 1 ( k 1 ) 1 2 F i 2 ( k ) ,
where F i 1 ( k 1 ) = p 0 ( k 1 ) + p 1 ( k 1 ) ϑ i ( k 1 ) + p 2 ( k 1 ) ϑ i 2 ( k 1 ) + q r ( s i ( k 1 ) ) + q c ( s i ( k 1 ) ) + q t ( s i ( k 1 ) ) , and F i 2 ( k ) = p 0 ( k ) + p 1 ( k ) ϑ i ( k ) + p 2 ( k ) ϑ i 2 ( k ) + q r ( s i ( k ) ) + q c ( s i ( k ) ) + q t ( s i ( k ) ) .
Correspondingly, the leader vehicle is able to be modeled in such a way that
s 0 ( k + 1 ) = s 0 ( k ) + T ϑ 0 ( k ) ϑ 0 ( k + 1 ) = ϑ 0 ( k ) + T F 0 ( k )
with s 0 ( k ) and ϑ 0 ( k ) indicating the vehicular position and speed of leader. F 0 ( k ) denotes the nonlinear function.
It can be acquired from (3) that s i ( k + 1 ) = f i ( k ) , in which f i ( · ) denotes an unknown nonlinear function, containing the speeds ϑ i ( k ) , ϑ i ( k 1 ) , positions s i ( k ) , s i ( k 1 ) , and control inputs u i ( k ) , u i ( k 1 ) .
The nonlinear function f i ( k ) of CAVs is able to be transformed to an equivalent linear data model with the CFDL technique through making the following assumptions about the nonlinear CAVs (1).
Assumption 1 
([16]). For unknown nonlinear function f i ( · ) , the partial derivative of the nonlinear function f i ( · ) in relation to the control input u i ( k ) is continous.
Assumption 2 
([18]). Nonlinear CAVs (1) and (4) meet the generalized Lipschitz condition, namely, when Δ u i ( k ) 0 , then one can know that | Δ s i ( k + 1 ) | β ˜ i | Δ u i ( k ) | holds, in which Δ u i ( k ) = u i ( k ) u i ( k 1 ) , Δ s i ( k + 1 ) = s i ( k + 1 ) s i ( k ) , and β ˜ i > 0 represents a constant.
Assumption 3 
([16]). From the perspective of realistic application, the system output increment Δ s 0 ( k ) of the leader vehicle is supposed to be bounded, i.e., | Δ s 0 ( k ) | ϱ 1 with ϱ 1 > 0 being a constant, where Δ s 0 ( k ) = s 0 ( k ) s 0 ( k 1 ) .
Remark 1. 
Assumption 1 represents a basic restrictive condition employed in the nonlinear system [18,19,20]. Assumption 2 is used to illustrate the correlation between the system’s input and output increments.
Lemma 1 
([16]). For nonlinear CAVs, if Assumptions 1 and 2 can be satisfied, and Δ u i ( k ) 0 , then there exists a pseudo partial derivative (PPD) parameter that converts the nonlinear CAVs (1) to the form of the following input and output increments:
Δ s i ( k + 1 ) = ψ i s ( k ) Δ u i ( k ) ,
where ψ i s ( k ) denotes a time-varying and bounded PPD parameter, which satisfies | ψ i s ( k ) | c ¯ i .
Remark 2. 
In Lemma 1, we give the connection between the controller input increment and the output increment, that is to say, the output of CAVs changes identically with the input to CAVs. With the assistance of this one feature, in the following controller design, we use only the input and output information from the nonlinear CAVs.

2.2. Prescribed Performance Control Scheme Design

During the actual vehicle movement, the steady-state and transient performance of nonlinear CAVs play a key role. Here, for the purpose of ensuring the transient performance of nonlinear CAVs and achieve a preset performance under preset conditions, a prescribed performance transformation scheme is shown in this subsection. First of all, the position tracking error of nonlinear CAVs is designed as the following expression:
e i ( k ) = s 0 ( k ) s i ( k ) d i , 0 ,
where d i , 0 indicates the desired security distance between the ith follower and leader. Moreover, from Assumption 3, one can assume that | s 0 ( k ) | s ¯ 0 .
For the output of nonlinear CAVs, the prescribed performance transformed scheme is developed as follows:
Π i ( k ) < s i ( k ) < Π i ( k ) ,
where Π i ( k ) denotes the prescribed performance function.
Here, its specific expression is designed in the following form:
Π i ( k + 1 ) = ( 1 κ i ) Π i ( k ) + κ i Π i ( ) , lim k Π i ( k ) = Π i ( ) ,
where the initial state of Π i ( 0 ) satisfies | Π i ( 0 ) | > | Π i ( ) | > 0 . κ i ( 0 , 1 ) represents the convergent rate.
For the purpose of ensuring that the tracking error e i ( k ) of vehicular position is capable of converging to the preset region, the following prescribed performance control scheme is formulated from (6) and (7):
Π i ( k ) s ¯ 0 + d i , 0 < e i ( k ) < Π i ( k ) + s ¯ 0 d i , 0 .
With a view to minimizing the complexity of the controller design process and strengthen the transient performance of the nonlinear CAVs, the strictly increasing function Υ ( δ i ( k ) ) is able to be introduced to deal with the restricted vehicular tracking control problem (7). To this end, the output signal s i ( k ) is converted into the unconstrained one δ i ( k ) , namely,
s i ( k ) = Π i ( k ) Υ ( δ i ( k ) )
with Υ ( δ i ( k ) ) satisfying the following properties:
(i)
Υ ( δ i ( k ) ) ( 1 , 1 ) for any δ i ( k ) ;
(ii)
lim k + Υ ( δ i ( k ) ) = 1 , and lim k Υ ( δ i ( k ) ) = 1 .
In general, Υ ( δ i ( k ) ) associated with δ i ( k ) is designed as
Υ ( δ i ( k ) ) = e δ i ( k ) e δ i ( k ) e δ i ( k ) + e δ i ( k ) .
Then, the following equation can be acquired from (11):
δ i ( k ) = 1 2 ln Π i ( k ) + s i ( k ) Π i ( k ) s i ( k ) .
Remark 3. 
It is noteworthy that the constrained output s i ( k ) can be converted into the unconstrained one through employing the strictly increasing function Υ ( δ i ( k ) ) . In addition, by adjusting the prescribed region, the position tracking error is also able to converge to the prescribed region (9), which significantly increases the transient performance of nonlinear CAVs.
Substituting s i ( k + 1 ) = f i ( k ) into (12) yields
δ i ( k + 1 ) = 1 2 ln Π i ( k ) + f i ( k ) Π i ( k ) f i ( k ) ,
here, f i ( k ) = f i s i ( k ) , ϑ i ( k ) , u i ( k ) .
By analyzing (13), one can know that δ i ( k + 1 ) denotes a nonlinear function related to the position s i ( k ) , speed ϑ i ( k ) , control input u i ( k ) , and prescribed performance function Π i ( k ) . Therefore, the new nonlinear function can be redeveloped as Φ ( · ) , i.e., δ i ( k + 1 ) = Φ i [ s i ( k ) , ϑ i ( k ) , u i ( k ) , Π i ( k ) ] .
Lemma 2 
([20]). Through using the homeomorphism mapping method, one can know that δ i ( k ) is the unconstrained output generated by the constrained output s i ( k ) , namely, if Assumptions 1 and 2 hold, and Δ u i ( k ) 0 , there exists a PPD parameter that allows the unconstrained output δ i ( k ) to be represented as the unconstrained linear data model below:
Δ δ i ( k + 1 ) = φ i ( k ) Δ u i ( k ) ,
where | φ i ( k ) | φ s * with φ s * > 0 being a constant. Δ δ i ( k + 1 ) = δ i ( k + 1 ) δ i ( k ) .
Remark 4. 
The existing adaptive control schemes include virtual reference feedback tuning, iterative feedback tuning, and unfalsified control, which either require precise information about the system model or ignore, to varying degrees, the effect of linearization of the nonlinear function on the controller design. Differently from them, the model-free adaptive control method has a simple structure, moderate adjustable parameters, easy controller design, and direct use of system input and output data.
One thing worth noting is that it is quite difficult to obtain the real value of φ i ( k ) . To this end, the performance function is defined as the following expression:
J [ φ ^ i ( k ) ] = | Δ δ i ( k ) φ ^ i ( k ) Δ u i ( k 1 ) | 2 + η i | φ ^ i ( k ) φ ^ i ( k 1 ) | 2
with η i > 0 denoting the penalty factor.
Further, the following PPD parameter estimation algorithm can be acquired through minimizing the above performance function (15):
φ ^ i ( k ) = φ ^ i ( k 1 ) + ρ i Δ u i ( k 1 ) [ Δ δ i ( k ) φ ^ i ( k 1 ) Δ u i ( k 1 ) ] Δ u i 2 ( k 1 ) + η i
with ρ i [ 0 , 1 ) denoting the step-size factor.
For the purpose of optimizing system performance, the performance function is described as the following expression:
J [ u i ( k ) ] = | δ 0 ( k ) d i , 0 δ i ( k ) φ ^ i ( k ) Δ u i ( k ) | 2 + λ i | Δ u i ( k ) | 2 ,
where δ 0 ( k ) is the transformed output of the leader.
Similar to the solution of (16), the following formula can be acquired from (17) that
u i ( k ) = u i ( k 1 ) + τ i φ ^ i ( k ) [ δ 0 ( k ) d i , 0 δ i ( k ) ] φ ^ i 2 ( k ) + λ i ,
where the effects of τ i and λ i are the same as ρ i and η i .

2.3. Data-Driven Prescribed Performance Platooning Control Under Aperiodic DoS Attacks

The designed data-driven platooning control scheme of nonlinear CAVs is presented in Figure 2. From observation of Figure 2, it can be derived that the prescribed performance function P i ( k ) is introduced here to guarantee the system’s transient performance. Then, we can observe that the information [ δ i ( k ) , φ ^ i ( k ) ] can be transmitted between the sensor and controller through the vehicle interaction network. Once the attacker launches the attack, the controller is unable to acquire the data from the sensor. An illustration of an aperiodic DoS attack is displayed in Figure 3. Here, T i s N and T i e N are introduced to show the beginning and the ending moment of the ith attack, respectively. Additionally, the red area is used to indicate that the system is attacked, and the green area is used to indicate that the system is not attacked at this time.
Moreover, to verify whether the attack occurs, the DoS attack indicator function ϱ i ( k ) is developed; the specific expression is designed as follows:
ϱ i ( k ) = 1 , k [ T i 1 e , T i s ) , 0 , k [ T i s , T i e ) ,
where [ T i s , T i e ) , and [ T i 1 e , T i s ) represent the ith attack period and attack dormant interval. Based on which, the collection of all attack intervals in [ 0 , k ] can be described as follows:
Λ a ( 0 , k ) = i N [ T i s , T i e ] [ 0 , k ] .
Moreover, the interval of no DoS attacks can be represented by
Λ b ( 0 , k ) = [ 0 , k ] / Λ a ( 0 , k ) ,
where [ 0 , k ] / Λ a ( 0 , k ) represents a set which contains the set [ 0 , k ] and does not contain the set Λ a ( 0 , k ) .
Assumption 4 
([33]). Λ a ( 0 , k ) satisfies the following condition:
| Λ a ( 0 , k ) | Λ 0 + k ϵ ,
where Λ 0 indicates the original attack period parameter, which is used to deal with the situation where the CAV is attacked from the beginning. ϵ > 1 denotes the attack interval coefficient that needs to be designed later.
According to (19), the following attack mechanism can be acquired:
δ i ϱ ( k ) = ϱ i ( k ) δ i ( k ) + ( 1 ϱ i ( k ) ) δ i ϱ ( k 1 ) , φ ^ i ϱ ( k ) = ϱ i ( k ) φ ^ i ( k ) + ( 1 ϱ i ( k ) ) φ ^ i ϱ ( k 1 ) .
According to (16) and (18), and the attack compensation mechanism (22), the prescribed performance-based MFAC scheme for nonlinear CAVs with aperiodic DoS attacks is designed as follows:
φ ^ i ( k ) = φ ^ i ( k 1 ) + ϱ i ( k ) Δ u i ( k 1 ) × ρ i [ Δ δ i ( k ) φ ^ i ( k 1 ) Δ u i ( k 1 ) ] Δ u i 2 ( k 1 ) + η i ,
φ ^ i ( k ) = φ ^ i ( 1 ) , if | φ ^ i ( k ) | ι i , or | Δ u i ( k 1 ) | ι i or s i g n ( φ ^ i ( k ) ) s i g n ( φ ^ i ( 1 ) ) ,
u i ( k ) = u i ( k 1 ) + τ i φ ^ i ϱ ( k ) [ δ 0 ( k ) d i , 0 δ i ϱ ( k ) ] φ ^ i ϱ ( k ) 2 + λ i ,
where ι i represents an arbitrarily small positive constant.
Remark 5. 
It can be acquired that (24b) represents the reset condition of the estimation PPD parameter φ ^ i ( k ) , which means the efficiency and feasibility of the PPD parameter estimation algorithm (24a) can be improved.
Remark 6. 
The existing prescribed performance-based data-driven control method [29,30,31], through constructing the sliding mode function, may cause the chattering problem. To deal with this problem, the prescribed performance function Π i ( k ) of this paper is directly used in the cost functions (15) and (17), based on which, the position tracking error of CAVs can converge to the preset region.
Problem 1. 
For nonlinear CAVs (1), the objective of this article is to propose a prescribed performance-based MFAC strategy consisting of (24a)–(25) subject to aperiodic DoS attacks to guarantee the transformed output δ i ( k ) is uniformly ultimately bounded. Mathematically, it is capable of converging to the following set, i.e., { δ i ( k ) | lim k | δ i ( k ) | δ * } .

3. Stability Analysis

In this part, our main purpose is to analyze the stability of CAVs. In order to present more clearly the control scheme designed in this paper, the whole control algorithm is shown in Algorithm 1.
Algorithm 1 Data-Driven Prescribed Performance Resilient Control Algorithm.
1: Select suitable parameters τ i , λ i , ρ i , η i , ε 1 , and ε 2 .
2: The system’s state is constrained within the prescribed region (7).
3: The constrained state is converted into the unconstrained one (12).
4: The attack compensation mechanism (23) is designed to reduce the impact of attacks.
5: Updating φ ^ i ( k ) by using estimation algorithm (24a) and (24b).
6: Verify the reset conditions:
if  | φ ^ i ( k ) | < ι i or | Δ u i ( k 1 ) | < ι i or s i g n ( φ ^ i ( k ) ) s i g n ( φ ^ i ( 1 ) ) , then  φ ^ i ( k ) = φ ^ i ( 1 ) .
7: Input leader δ 0 ( k ) , safety distance d i , 0 , and compensation mechanism φ ^ i ϱ ( k ) and δ i ϱ ( k ) .
8: Update the control input u i ( k ) with (25) and output it.
The major theorem of this article is presented as follows.
Theorem 1. 
In accordance with Assumptions 1–4, Problem 1 can be addressed with the developed prescribed performance-based model-free adaptive resilient control algorithm subject to aperiodic DoS attacks made of (24a)–(25), if the parameters are chosen to meet τ i [ 0 , 1 ) , λ i > λ m i n > 0 with λ m i n = ( φ s * 2 ) 2 , ρ i [ 0 , 1 ) , η i > 0 , ε 1 ( 0 , 1 ) , ε 2 > 1 , and
1 < ϵ < ln ε 1 ln ε 2 ln ε 1 .
Proof.
Throughout this segment, we will conduct the stability proofs, in which the proofs can be separated into the proceeding two main aspects: (i) proving the boundedness of estimation error of PPD parameter e φ i ( k ) ; (ii) proving that the converted output δ i ( k ) is bounded.
Part I: In the first place, the estimation error of the PPD parameter is defined as e φ i ( k ) = φ ^ i ( k ) φ i ( k ) . Through subtracting φ i ( k ) on both sides of (24a), it is possible to acquire
e φ i ( k ) = φ ^ i ( k 1 ) φ i ( k ) + Δ u i ( k 1 ) × ρ i [ Δ δ i ( k ) φ ^ i ( k 1 ) Δ u i ( k 1 ) ] Δ u i 2 ( k 1 ) + η i = 1 ρ i Δ u i 2 ( k 1 ) Δ u i 2 ( k 1 ) + η i e φ i ( k 1 ) + φ i ( k 1 ) φ i ( k ) .
Taking absolute values for both sides of the above (27), the following expression can be acquired:
| e φ i ( k ) | | 1 ρ i Δ u i 2 ( k 1 ) Δ u i 2 ( k 1 ) + η i | | e φ i ( k 1 ) | + | φ i ( k 1 ) φ i ( k ) | .
In addition, according to the reset condition (24b), one can obtain the minimum value of ρ i Δ u i 2 ( k 1 ) Δ u i 2 ( k 1 ) + η i is ρ i ι i 2 η i + ι i 2 . Based on this, one can obtain
| 1 ρ i Δ u i 2 ( k 1 ) Δ u i 2 ( k 1 ) + η i | 1 ρ i ι i 2 η i + ι i 2 θ i < 1 .
Then, taking into account that the boundedness of φ i ( k ) has been given in Lemma 2, it is possible to infer that | φ i ( k 1 ) φ i ( k ) | 2 φ s * .
Furthermore, considering these points, Equation (28) can be redeveloped as follows:
| e φ i ( k ) | θ i | e φ i ( k 1 ) | + 2 φ s * θ i 2 | e φ i ( k 2 ) | + 2 φ s * ( θ i + 1 ) θ i k 1 | e φ i ( 1 ) | + 2 φ s * ( 1 θ i k 1 ) 1 θ i .
Therefore, according to (28)–(30), we can know that the boundedness of estimation error e φ i ( k ) can be guaranteed. Further, dependent on the description of estimation error e φ i ( k ) = φ ^ i ( k ) φ i ( k ) , we are capable of acquiring that φ ^ i ( k ) is ultimately uniformly bounded.
Part II: In this part, we will verify the transformed output δ i ( k ) is ultimately uniformly bounded. In the first place, the transformed tracking error e δ i ( k ) is determined in such a form that
e δ i ( k ) = δ 0 ( k ) δ i ( k ) d i , 0 .
According to the characteristics of aperiodic DoS, we will prove from the attack interval and non-attack interval, respectively.
(1)
When k [ T i 1 e , T i s ) and ϱ i ( k ) = 1 , namely, the communication channel between the sensor and the controller is not subject to DoS attacks. On account of (14), (25), and (31), we can obtain
e δ i ( k + 1 ) = δ 0 ( k + 1 ) δ i ( k ) φ i ( k ) Δ u i ( k ) d i , 0 = Δ δ 0 ( k + 1 ) + e δ i ( k ) τ i φ i ( k ) φ ^ i ( k ) λ i + φ ^ i 2 ( k ) e δ i ( k ) = 1 τ i φ i ( k ) φ ^ i ( k ) λ i + φ ^ i 2 ( k ) e δ i ( k ) + Δ δ 0 ( k + 1 ) .
Then, taking the absolute value on both sides of (32), it is possible to obtain that
| e δ i ( k + 1 ) | | 1 τ i φ i ( k ) φ ^ i ( k ) λ i + φ ^ i 2 ( k ) | + | Δ δ 0 ( k + 1 ) | .
According to the conditions given in Theorem 1 and Lemma 2, one can acquire that τ i [ 0 , 1 ) , λ i > λ m i n > 0 with λ m i n = ( φ s * 2 ) 2 , and | φ i ( k ) | φ s * . Based on this, the following inequality can hold:
0 < H i < | τ i φ i ( k ) φ ^ i ( k ) λ i + φ ^ i 2 ( k ) | < | τ i φ s * φ ^ i ( k ) 2 λ i φ ^ i ( k ) | < τ i φ s * 2 λ i = τ i < 1 .
Further, it yields
0 < | 1 τ i φ i ( k ) φ ^ i ( k ) λ i + φ ^ i 2 ( k ) | < 1 H i ϖ 1 < 1 .
Furthermore, it follows from (35) that
| e δ i ( k + 1 ) | < ϖ 1 | e δ i ( k ) | + ϱ 1 ,
where | Δ δ 0 ( k + 1 ) | ϱ 1 , in which the boundedness of Δ δ 0 ( k + 1 ) has been given in Assumption 3.
(2)
When k [ T i s , T i e ) and ϱ i ( k ) = 0 , namely, there exist DoS attacks.
According to (31), the following equation is capable of being acquired:
e δ i ( k + 1 ) = Δ δ 0 ( k + 1 ) + e δ i ( k ) φ i ( k ) Δ u i ( k ) .
In addition, through taking absolute values for both sides of the above (37), it can be acquired that
| e δ i ( k + 1 ) | < | e δ i ( k ) | + | Ω i ( k ) | ,
where Ω i ( k ) = Δ δ 0 ( k + 1 ) φ i ( k ) Δ u i ( k ) .
Taking into account the practical limitations of the physical structure of the vehicle, it is impossible to change the actuator too fast in actual application [22,23]. Based on this situation, the controller input increment is supposed to be bounded [34], namely, | Δ u i ( k ) | b ¯ i with b ¯ i > 0 being a constant. Moreover, the boundedness of Δ δ i ( k + 1 ) and φ i ( k ) has already been given before. To this end, it is possible to acquire that Ω i ( k ) is bounded, namely, | Ω i ( k ) | ϱ 2 with ϱ 2 > 0 being a constant.
On the basis of the above analysis, Equation (38) has been redesigned in the following form:
| e δ i ( k + 1 ) | < ϖ 2 | e δ i ( k ) | + ϱ 2 ,
where ϖ 2 > 1 .
According to (36) and (39), and the aperiodic DoS attack compensation mechanism, it is yielded that
| e δ i ( k + 1 ) | < ϖ 1 | e δ i ( k ) | + ϱ 1 , k [ T i 1 e , T i s ) , ϖ 2 | e δ i ( k ) | + ϱ 2 , k [ T i s , T i e ) .
One thing worth noting is that there exist two situations for arbitrary time k, namely, k [ T i 1 e , T i s ) and k [ T i s , T i e ) . We assume that, when k [ T i s , T i e ) , the following specific derivation is capable of being obtained:
| e δ i ( k + 1 ) | < ϖ 2 | e δ i ( k ) | + ϱ 2 < ϖ 2 2 | e δ i ( k 1 ) | + ϖ 2 ϱ 2 + ϱ 2 < < ϖ 2 k T i s + 1 | e δ i ( T i s ) | + n = 0 k T i s ϖ 2 n ϱ 2 < ϖ 2 k T i s + 1 ( ϖ 1 | e δ i ( T i s 1 ) | + ϱ 1 ) + n = 0 k T i s ϖ 2 n ϱ 2 < ϖ 2 k T i s + 1 ( ϖ 1 2 | e δ i ( T i s 2 ) | + ϖ 1 ϱ 1 + ϱ 1 ) + n = 0 k T i s ϖ 2 n ϱ 2 < < ϖ 2 k T i s + 1 ϖ 1 T i s T i 1 e | e δ i ( T i 1 e ) | + n = 0 k T i s ϖ 2 n ϱ 2 + ϖ 2 k T i s + 1 n = 0 T i s T i 1 e 1 ϖ 1 n ϱ 1 < < ϖ 1 | Λ b ( 0 , k ) | ϖ 2 | Λ a ( 0 , k ) | | e δ i ( 0 ) | + n = 1 k ϖ 1 k n × ϖ 1 | Λ a ( n , k ) | ϖ 2 | Λ a ( n , k ) | ϱ s
with ϱ s = max { ϱ 1 , ϱ 2 } .
Moreover, when k [ T i 1 e , T i s ) , we can obtain the same results. In addition, according to (20)–(22), one can acquire that | Λ b ( 0 , k ) | = k | Λ a ( 0 , k ) | and | Λ a ( 0 , k ) | Λ 0 + k ϵ . Based on this, the following inequality can be acquired:
| e δ i ( k + 1 ) | < ϖ 1 k | Λ a ( 0 , k ) | ϖ 2 | Λ a ( 0 , k ) | | e δ i ( 0 ) | + n = 1 k ϖ 1 k n × ϖ 1 | Λ a ( n , k ) | ϖ 2 | Λ a ( n , k ) | ϱ s e ( k | Λ a ( 0 , k ) | ) ln ϖ 1 + | Λ a ( 0 , k ) | ln ϖ 2 | e δ i ( 0 ) | + n = 1 k e ( k n | Λ a ( 0 , k ) | ) ln ϖ 1 + | Λ a ( n , k ) | ln ϖ 2 ϱ s e ( k Λ 0 k ϵ ) ln ϖ 1 + ( Λ 0 + k ϵ ) ln ϖ 2 | e δ i ( 0 ) | + n = 1 k e ( k n Λ 0 k n ϵ ) ln ϖ 1 + ( Λ 0 + k n ϵ ) ln ϖ 2 ϱ s e ( ln ϖ 2 ln ϖ 1 ) Λ 0 + [ ln ϖ 1 + 1 ϵ ( ln ϖ 2 ln ϖ 1 ) ] k | e δ i ( 0 ) | + n = 1 k e ( ln ϖ 2 ln ϖ 1 ) Λ 0 + [ ln ϖ 1 + 1 ϵ ( ln ϖ 2 ln ϖ 1 ) ] ( k n ) ϱ s e ( ln ϖ 2 ln ϖ 1 ) Λ 0 e [ ln ϖ 1 + 1 ϵ ( ln ϖ 2 ln ϖ 1 ) ] k | e δ i ( 0 ) | + e ( ln ϖ 2 ln ϖ 1 ) Λ 0 ϱ s × n = 1 k e [ ln ϖ 1 + 1 ϵ ( ln ϖ 2 ln ϖ 1 ) ] ( k n ) .
According to condition (26) presented in (1), one can obtain that ln ϖ 1 + 1 ϵ ( ln ϖ 2 ln ϖ 1 ) < 0 . Based on this, it follows (42) that the tracking error e δ i ( k ) can be shown to be uniformly bounded, i.e., e δ i ( k ) is capable of converging to the following set: { e δ i ( k ) | | e δ i ( k ) | e ( ln ϖ 2 ln ϖ 1 ) Λ 0 ( | e δ i ( k ) | + ϱ s ) } .
Depending on the principle of homeomorphism mapping, the constrained output Π i ( k ) < s i ( k ) < Π i ( k ) can be transformed into the unconstrained one δ i ( k ) . In addition, in accordance with the boundedness of e δ i ( k ) and δ 0 ( k ) , one can conclude that the transformed output δ i ( k ) is bounded. Furthermore, the boundedness of the constrained output s i ( k ) and tracking error e i ( k ) can be ensured through proving the converted output δ i ( k ) is bounded. □
Remark 7. 
In [35] , the authors propose a new gain adaptation law for a discrete-time sliding mode. This method relaxes the assumption of a known bound and can tackle the uncertainty without any knowledge of the bound of uncertainty while overcoming the over- and under-estimation problems of switching gain. This method is worth learning and following and will be used in our future work.

4. Simulation

In this segment, the designed preset performance-based model-free adaptive tracking control method of nonlinear CAVs subject to aperiodic DoS attacks is illustrated by a real-world simulation example.
The actual connected automated vehicle system is shown in Figure 4, which consists of three followers and one leader. Further, the dynamics model of the leader is designed as
s 0 ( k + 1 ) = s 0 ( k ) + T v 0 ( k ) , ϑ 0 ( k + 1 ) = 2 + 3.3 1 + e 0.0008 k + 5 .
The position dynamics of the follower vehicle is designed as follows [23]:
s i ( k + 1 ) = s i ( k ) + T ϑ i ( k ) + 1 / 2 T 2 ( u i ( k ) 1.2 × 10 4 ϑ i ( k ) 2.4 × 10 6 ϑ i ( k ) 2 3 ϑ i ( k ) 3 5 × 10 5 s i ( k ) 2 ) .
First of all, we will give the various parameters used in the numerical simulation. The specific values of the parameters are presented below. The starting positions of nonlinear CAVs are chosen as s i ( 1 ) = 28.2 20.2 10 0 with i = 0 , 1 , 2 , 3 . The velocity dynamics equations for the follower vehicle are similar to the leader dynamics equations and are omitted here. Similarly, the starting speeds of nonlinear CAVs are chosen as ϑ i ( 1 ) = 2.08 1.7 1.7 1.7 . The sampling time T is selected as T = 0.005 . The starting values of controller input u i ( k ) and PPD parameter φ i ( k ) are respectively chosen as u i ( 1 ) = 0 and φ i ( 1 ) = 2 . In addition, it can be noticed by observing Figure 4 that, in the connected automated vehicle system model, the expected security distance is set to d i , 0 = 6 16 26 . In the following, we will present the controller parameters of nonlinear CAVs, i.e., ρ i = 0.58 0.49 0.51 , η i = 3.31 2.55 3.51 , τ i = 0.83 0.86 0.81 , and λ i = 0.74 0.68 0.72 . Then, the prescribed performance control parameters are set as κ i = 0.0025 , Π i ( ) = 0.50 , and Π i ( 1 ) = 3.5 . In addition, the parameters of attack duration time are selected as ε 1 = 0.9 and ε 2 = 1.3 ; one can obtain that ϵ < 3.49 . Then, we let ϵ = 3.19 and Λ 0 = 10 ; then, we have | Λ a ( 0 , 12000 ) | < 3771 . Therefore, the maximum duration time of DoS attacks is 18.855 s.
For the better highlighting of the superiority of the control scheme designed in this paper, here, a simulation comparison example [23] is used. Under the same controller parameters, model parameters, and aperiodic attacks, the control performance of the position and the speed tracking error can be illustrated through comparison with [23].
First of all, it follows from Figure 5a that the system’s estimated PPD parameter φ ^ i ( k ) of three connected automated vehicles can reach agreement, which indicates that the unknown PPD parameter φ i ( k ) is exactly estimated through utilizing the developed PPD parameter estimation algorithm (24a) and (24b). In addition, the controller input (25) of this paper is exhibited in Figure 5b, which suggests that the system’s controller inputs are progressively more consistent suffering from the influence of DoS attacks.
The comparison between the control scheme developed in this paper and the control scheme in [23] is given in Figure 6 and Figure 7, in which the tracking trajectories of the position s i ( k ) and the position error e i ( k ) for nonlinear CAVs are illustrated. Through careful observation of Figure 6, it is possible to acquire that the follower vehicles can follow the trajectory of leaders in the existence of aperiodic DoS attacks and maintain a security distance between the vehicles, thus ensuring that no potential collision occurs. Nevertheless, collisions between vehicles may occur through using the control method [23]. Additionally, the tracking trajectories of the position tracking error e i ( k ) = s 0 ( k ) s i ( k ) d i , 0 is illustrated in Figure 6. Through careful observation of Figure 6, it is possible to obtain that the position tracking error e i ( k ) is able to quickly converge to the predefined region, namely, the prescribed performance tracking control goal can be realized. However, by looking at Figure 7, it can be noticed that the position tracking error goes beyond the preset boundaries.
Through observing Figure 7, one can conclude, at the initial moment, the initial value of the tracking error of the position is within the preset range. In the proposed method, the position tracking error converges, completing bounded convergence within 60 s and forming a smaller error around 0. However, using the method in [23] would result in the position tracking error exceeding the preset range and eventually converging to a larger error bound within 60 s.
Finally, a numerical comparison is given in Table 1 to demonstrate the superiority of the designed method. By looking at the table it can be obtained that our tracking error has a smaller value and has a shorter convergence time as compared to [23].

5. Conclusions

This paper focuses on the model-free adaptive vehicular tracking control problem for nonlinear CAVs under prescribed performance constraint and aperiodic DoS attacks. The constrained output of nonlinear CAVs is converted to an unconstrained output through utilizing a strictly incremental function. Then, the output of the previous moment is utilized to mitigate the adverse influence generated by aperiodic DoS attacks. On the basis of the above two points, a novel model-free adaptive prescribed performance tracking control strategy is developed. Ultimately, the superiority of the designed control algorithm is presented through simulation. In future work, we will focus on problems for nonlinear CAVs such as sliding mode control, saturation, faults, and collision problems.

Author Contributions

Conceptualization, P.Z. and W.C.; methodology, Z.W. and W.C.; software, P.Z.; validation, Z.W. and W.C.; formal analysis, Z.W.; writing—original draft preparation, W.C.; writing—review and editing, P.Z. and Z.W.; supervision, W.C.; funding acquisition, W.C. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 62273191, Grant U1966202, and Grant 62233015.

Data Availability Statement

Data sharing is not applicable to this article as no datasets were generated or analyzed during the current study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Zhao, N.; Zhao, X.; Xu, N.; Zhang, L. Resilient event-triggered control of connected automated vehicles under cyber attacks. IEEE/CAA J. Autom. Sin. 2023, 10, 2300–2302. [Google Scholar] [CrossRef]
  2. Zhang, X.; Fang, S.; Shen, Y.; Yuan, X.; Lu, Z. Hierarchical velocity optimization for connected automated vehicles with cellular vehicle-to-everything communication at continuous signalized intersections. IEEE Trans. Intell. Transp. Syst. 2023, 25, 2944–2955. [Google Scholar] [CrossRef]
  3. Liu, H.; Zhuang, W.; Yin, G.; Li, Z.; Cao, D. Safety-critical and flexible cooperative on-ramp merging control of connected and automated vehicles in mixed traffic. IEEE Trans. Intell. Transp. 2023, 24, 2920–2934. [Google Scholar] [CrossRef]
  4. Ge, X.; Han, Q.-L.; Zhang, X.-M.; Ding, D. Communication resource-efficient vehicle platooning control with various spacing policies. IEEE/CAA J. Autom. Sin. 2023, 11, 362–376. [Google Scholar] [CrossRef]
  5. Husain, S.S.; Al-Dujaili, A.Q.; Jaber, A.A.; Humaidi, A.J.; Al-Azzawi, R.S. Design of a Robust Controller Based on Barrier Function for Vehicle Steer-by-Wire Systems. World Electr. Veh. J. 2024, 15, 17. [Google Scholar] [CrossRef]
  6. Li, Y.; Zhao, Y.; Tong, S. Adaptive fuzzy control for heterogeneous vehicular platoon systems with collision avoidance and connectivity preservation. IEEE Trans. Fuzzy Syst. 2023, 31, 3934–3943. [Google Scholar] [CrossRef]
  7. Abbas, S.; Husain, S.; Al-Wais, S.; Humaidi, A. Adaptive Integral Sliding Mode Controller (SMC) Design for Vehicle Steer-by-Wire System. SAE Int. J. Veh. Dyn. Stab. NVH 2024, 8, 383–396. [Google Scholar] [CrossRef]
  8. Che, W.-W.; Zhang, L.; Deng, C.; Wu, Z.-G. Hierarchical lane-changing control for vehicle platoons in prescribed performance. Automatica 2025, 171, 111972. [Google Scholar] [CrossRef]
  9. Zhang, S.-Q.; Che, W.-W.; Deng, C. Observer-based event-triggered control for linear mass under a directed graph and dos attacks. J. Control Decis. 2022, 9, 384–396. [Google Scholar] [CrossRef]
  10. Hong, Y.; Su, Y.; Cai, H. Internal Model Based Cooperative Robust Resilient Control Under DoS Attacks With Application to Vehicles Formation. IEEE Trans. Ind. Inform. 2024, 1–11. [Google Scholar] [CrossRef]
  11. Ren, Y.; Xie, X.; Nguyen, A.-T. Security control of autonomous ground vehicles under dos attacks via a novel controller with the switching mechanism. IEEE Trans. Fuzzy Syst. 2024, 32, 3669–3681. [Google Scholar] [CrossRef]
  12. Zhao, N.; Zhang, H.; Shi, P. Observer-based sampled-data adaptive tracking control for heterogeneous nonlinear multi-agent systems under denial-of-service attacks. IEEE Trans. Autom. Sci. Eng. 2024. early access. [Google Scholar] [CrossRef]
  13. Luo, X.; Zhu, M.; Wang, X.; Guan, X. Detection and isolation of false data injection attack via adaptive kalman filter bank. J. Control Decis. 2024, 11, 60–72. [Google Scholar] [CrossRef]
  14. Wang, Y.-M.; Li, Y.-X. Adaptive security control of time-varying constraints nonlinear cyber-physical systems with false data injection attacks. J. Control Decis. 2024, 11, 50–59. [Google Scholar] [CrossRef]
  15. Yan, B.; Ni, J.; Zhong, Y.; Yu, D.; Wang, Z. Collision-Free Formation Control for Heterogeneous Multiagent Systems Under DoS Attacks. IEEE Trans. Cybern. 2024, 54, 6244–6255. [Google Scholar] [CrossRef]
  16. Hou, Z.; Jin, S. Data-driven model-free adaptive control for a class of mimo nonlinear discrete-time systems. IEEE Trans. Neural Netw. 2011, 22, 2173–2188. [Google Scholar]
  17. Bu, X.; Hou, Z.; Zhang, H. Data-driven multiagent systems consensus tracking using model free adaptive control. IEEE Trans. Neural Netw. Learn. Syst. 2017, 29, 1514–1524. [Google Scholar] [CrossRef]
  18. Hou, Z.; Zhu, Y. Controller-dynamic-linearization-based model free adaptive control for discrete-time nonlinear systems. IEEE Trans. Industrial Inform. 2013, 9, 2301–2309. [Google Scholar] [CrossRef]
  19. Hou, Z.; Jin, S. A novel data-driven control approach for a class of discrete-time nonlinear systems. IEEE Trans. Control Syst. 2010, 19, 1549–1558. [Google Scholar] [CrossRef]
  20. Chen, R.Z.; Li, Y.X.; Hou, Z.S. Distributed model-free adaptive control for multi-agent systems with external disturbances and DoS attacks. Inf. Sci. 2022, 613, 309–323. [Google Scholar] [CrossRef]
  21. Deng, C.; Jin, X.-Z.; Wu, Z.-G.; Che, W.-W. Data-driven-based cooperative resilient learning method for nonlinear mass under dos attacks. IEEE Trans. Neural Netw. Learn. Syst. 2023, 35, 12107–12116. [Google Scholar] [CrossRef] [PubMed]
  22. Zhu, P.; Jin, S.; Bu, X.; Hou, Z. Distributed Data-Driven Control for a Connected Autonomous Vehicle Platoon Subjected to False Data Injection Attacks. IEEE Trans. Autom. Sci. Eng. 2023, 21, 7527–7538. [Google Scholar] [CrossRef]
  23. Zhang, P.; Che, W.-W. Data-driven prescribed performance platooning sliding mode control under dos attacks. Int. J. Robust Nonlinear Control 2024, 34, 11581–11603. [Google Scholar] [CrossRef]
  24. Zhou, Q.; Ren, Q.; Ma, H.; Chen, G.; Li, H. Model-Free Adaptive Control for Nonlinear Systems Under Dynamic Sparse Attacks and Measurement Disturbances. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 71, 4731–4741. [Google Scholar] [CrossRef]
  25. Bechlioulis, C.P.; Rovithakis, G.A. Robust adaptive control of feedback linearizable mimo nonlinear systems with prescribed performance. IEEE Trans. Autom. Control 2008, 53, 2090–2099. [Google Scholar] [CrossRef]
  26. Zhang, L.; Che, W.-W.; Chen, B.; Lin, C. Adaptive fuzzy output-feedback consensus tracking control of nonlinear multiagent systems in prescribed performance. IEEE Trans. Cybern. 2022, 53, 1932–1943. [Google Scholar] [CrossRef]
  27. Shi, S.-N.; Li, Y.-X. Event-based adaptive asymptotic tracking control of nonlinear time-varying systems with prescribed performance. J. Control Decis. 2023, 10, 355–364. [Google Scholar] [CrossRef]
  28. Liu, Y.; Wang, X.; Chen, Z.; Li, L. Adaptive Event-Triggered Path Tracking Control with Proximate Appointed-Time Prescribed Performance for Autonomous Ground Vehicles. IEEE Trans. Ind. Electron. 2024, 1–11. [Google Scholar] [CrossRef]
  29. Liu, D.; Yang, G.-H. Data-driven adaptive sliding mode control of nonlinear discrete-time systems with prescribed performance. IEEE Trans. Syst. Man Cybern. Syst. 2017, 49, 2598–2604. [Google Scholar] [CrossRef]
  30. Hou, M.; Wang, Y. Data-driven adaptive terminal sliding mode control with prescribed performance. Asian J. Control 2021, 23, 774–785. [Google Scholar] [CrossRef]
  31. Liu, D.; Zhou, Z.-P.; Li, T.-S. Data-driven bipartite consensus tracking for nonlinear multiagent systems with prescribed performance. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 3666–3674. [Google Scholar] [CrossRef]
  32. Esmaeili, B.; Salim, M.; Baradarannia, M. Predefined performance-based model-free adaptive fractional-order fast terminal sliding-mode control of MIMO nonlinear systems. ISA Trans. 2022, 131, 108–123. [Google Scholar] [CrossRef] [PubMed]
  33. Feng, S.; Tesi, P. Resilient control under denial-of-service: Robust design. Automatica 2017, 79, 42–51. [Google Scholar] [CrossRef]
  34. Xu, D.; Jiang, B.; Shi, P. A novel model-free adaptive control design for multivariable industrial processes. IEEE Trans. Ind. 2014, 61, 6391–6398. [Google Scholar] [CrossRef]
  35. Sharma, N.K.; Roy, S.; Janardhanan, S. New design methodology for adaptive switching gain based discrete-time sliding mode control. Int. J. Control 2021, 94, 1081–1088. [Google Scholar] [CrossRef]
Figure 1. The general block diagram.
Figure 1. The general block diagram.
Mathematics 12 03313 g001
Figure 2. System block diagram of the data-driven platooning control scheme.
Figure 2. System block diagram of the data-driven platooning control scheme.
Mathematics 12 03313 g002
Figure 3. Illustration of aperiodic DoS attack.
Figure 3. Illustration of aperiodic DoS attack.
Mathematics 12 03313 g003
Figure 4. The connected automated vehicle systems.
Figure 4. The connected automated vehicle systems.
Mathematics 12 03313 g004
Figure 5. The trajectories of the estimated PPD parameter φ ^ i ( k ) (a) and controller input u i ( k ) (b) for the nonlinear connected automated vehicle system.
Figure 5. The trajectories of the estimated PPD parameter φ ^ i ( k ) (a) and controller input u i ( k ) (b) for the nonlinear connected automated vehicle system.
Mathematics 12 03313 g005
Figure 6. The trajectories of the position and position error with our method.
Figure 6. The trajectories of the position and position error with our method.
Mathematics 12 03313 g006
Figure 7. The trajectories of the position and position error with the method in [23].
Figure 7. The trajectories of the position and position error with the method in [23].
Mathematics 12 03313 g007
Table 1. The comparison of convergence effect.
Table 1. The comparison of convergence effect.
Comparative ParametersOur MethodMethod in [23]Unit
Tracking error e i ( k ) 0.16 0.23 m
Starting convergence time1038second (s)
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, P.; Wang, Z.; Che, W. Data-Driven Prescribed Performance Platooning Control Under Aperiodic Denial-of- Service Attacks. Mathematics 2024, 12, 3313. https://doi.org/10.3390/math12213313

AMA Style

Zhang P, Wang Z, Che W. Data-Driven Prescribed Performance Platooning Control Under Aperiodic Denial-of- Service Attacks. Mathematics. 2024; 12(21):3313. https://doi.org/10.3390/math12213313

Chicago/Turabian Style

Zhang, Peng, Zhenling Wang, and Weiwei Che. 2024. "Data-Driven Prescribed Performance Platooning Control Under Aperiodic Denial-of- Service Attacks" Mathematics 12, no. 21: 3313. https://doi.org/10.3390/math12213313

APA Style

Zhang, P., Wang, Z., & Che, W. (2024). Data-Driven Prescribed Performance Platooning Control Under Aperiodic Denial-of- Service Attacks. Mathematics, 12(21), 3313. https://doi.org/10.3390/math12213313

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop