Next Article in Journal
A Multiple-Scale Space–Time Collocation Trefftz Method for Two-Dimensional Wave Equations
Previous Article in Journal
A Comprehensive Review on Automated Grading Systems in STEM Using AI Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Estimate-Based Dynamic Memory-Event-Triggered Control for Nonlinear Networked Control Systems Subject to Hybrid Attacks

1
State Grid Laboratory of Power Cyber-Security Protection and Monitoring Technology, China Electric Power Research Institute, Nanjing 210003, China
2
College of Command Control Engineering, Army Engineering University of PLA, Nanjing 210007, China
3
School of Automation, Southeast University, Nanjing 210096, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(17), 2829; https://doi.org/10.3390/math13172829
Submission received: 16 July 2025 / Revised: 15 August 2025 / Accepted: 19 August 2025 / Published: 2 September 2025

Abstract

Within the framework of a dynamic memory-event-triggered mechanism (DMETM), this paper proposes an estimate-based secure control algorithm for nonlinear networked control systems (NNCSs) that suffer from hybrid attacks. Firstly, a sampled-data observer is employed utilizing the output signals to estimate the states. Secondly, due to the limitation of data transmission capacity in NNCSs, a novel DMETM with auxiliary variable is proposed, which effectively leverages the benefits of historical sampled data. In the process of network data transmission, a hybrid attack model that simultaneously considers the impact of both deception and denial of service (DoS) attacks is introduced, which can undermine signal integrity and disrupt data transmission. Then, a memory-event-triggered controller is developed, and the mean square stability of the NNCSs can be ensured by selecting some appropriate values. Finally, a numerical simulation and a practical example are given to illustrate the meaning of the designed dynamic memory-event-triggered control (DMETC) algorithm.

1. Introduction

It is well known that nonlinear networked control systems (NNCSs) gained considerable interest because of their efficient integration of nonlinear dynamics and network communication capabilities. These systems are widely applied in various fields, including industrial automation, smart grids, robotics, and intelligent transportation systems [1,2,3,4]. In general, the use of networked communication facilitates remote control and real-time adjustments, which significantly enhances the system reliability and efficiency [5,6,7]. Despite these advantages, NNCSs can be limited by constrained bandwidth and potential cyber-attacks, which necessitate the development of advanced control strategies to maintain system stability and performance.
The traditional time-triggered mechanism results in the transmission of redundant signals, even when the system has already achieved the desired control objective, thereby causing unnecessary resource consumption. To overcome this issue, an event-triggered mechanism (ETM) that can reduce the signal transmission rate has garnered significant attention from researchers [8,9,10,11]. Recent advancements in event-triggered control have achieved significant results in several areas, including predictive control, H control, and output feedback control [12]. Based on these developments, a memory-event-triggered mechanism is introduced to improve communication resource utilization by utilizing historical sampled data [13,14]. Compared to traditional ETM, the memory-event-triggered scheme can reduce unnecessary data transmission during unexpected system fluctuations and improve data update efficiency when changes are smooth near critical troughs. For example, a memory event-triggered finite-time lane-keeping control strategy was designed for autonomous heavy trucks in [15]. A load frequency control problem of power systems is addressed in [16], where the adaptive-memory ETM was presented to optimize resource utilization. Moreover, dynamic ETM can further reduce bandwidth usage by adjusting the auxiliary variable or dynamic threshold [17,18,19,20]. For instance, a data-driven control of nonlinear systems under dual-channel memory ETM was studied in [21]. An anti-disturbance control method for switched cyber-physical systems was proposed in [22], where DMETM was considered. It should be noted that studying DMETM is crucial for optimizing resource utilization while maintaining system stability and performance.
In NNCSs, data transmission is not only constrained by limited bandwidth resources but also potentially threatened by cyber-attacks, both of which collectively impact the stability and security of the systems. Concerning cyber-attacks, the recent literature introduces most security control methods for NNCSs [23,24,25,26]. Cyber-attacks on NNCSs are generally divided into three main primary types: DoS attacks, replay attacks, and deception attacks [27]. Specifically, DoS attacks aim to disrupt data transmission by intentionally dropping or blocking data packets during the communication process, thereby preventing the normal exchange of information between system components. Replay attacks involve the interception and retransmission of previously captured data packets, which can mislead the system into making incorrect decisions based on outdated information. Deception attacks involve the injection of false or malicious data into the system, potentially leading to severe safety hazards. Despite these advancements, most existing research primarily focuses on addressing a single type of attack, with limited attention given to the more complex and realistic scenario of hybrid attacks, where multiple attack types may occur simultaneously or sequentially [28,29]. For example, the problem of discrete proportion–integration–differentiation control was coped with in [29] for interconnected power systems with hybrid attacks. In [30], a cooperative resilient control strategy was designed for energy storage systems with hybrid attacks, where false data injection and DoS attacks were taken into account.
Based on the above discussion, in the presence of hybrid attacks, two key challenges should be tackled: (1) how to jointly develop a DMETM and observer to estimate the output signals when the full system states are unavailable; (2) how to formulate the estimate-based dynamic memory-event-triggered control (DMETC) approach to obtain the mean square stability of NNCSs when the communication network is subjected to hybrid attacks. To overcome these challenges, an estimate-based DMETC is designed in this paper for NNCSs subject to hybrid attacks. The main contributions are summarized as follows:
  • By virtue of auxiliary variable and past sampled-data, this paper proposes DMETM, which offers a more effective balance between communication utilization and control performance in comparison to the traditional ETM with fixed threshold [8,9,10].
  • This paper considers a hybrid attack model that incorporates both DoS attacks and deception attacks. This control approach is more general than those considered in previous works [26,27], which primarily focused on single-attack scenarios.
  • Both the designed DMETM and memory-event-triggered output feedback controller are formulated in discrete time. This means that only the system output data are necessary for the joint design of the memory-event-triggered controller and the DMETM, which makes the approach more practical and applicable to the actual system.
The structure of this paper is outlined as follows: Section 2 and Section 3 present the problem formulation and the procedure for designing the estimate-based DMETC. Section 4 provides the stability analysis, and Section 5 demonstrates the effectiveness of the designed estimate-based DMETC approach through two examples. Section 6 reaches the conclusion of the designed results.
Notations: N and R stand for the sets of non-negative numbers and real numbers. W R n × m and W T refer to the set of the n × m real matrix and the transpose of W. When W = W T R m × m , λ min ( W ) and λ max ( W ) denote the minimum and the maximum eigenvalues of W, respectively. · and I represent the 2-norm and the identity matrix.

2. Problem Formalization

As illustrated in Figure 1, the proposed estimate-based DMETC framework integrates the plant, the sampled-data state observer, the DMETM, and the memory-event-triggered controller. The DMETM exploits historical sampled data to reduce communication load, while hybrid attacks, including deception and DoS attacks, are modeled on the communication channel to represent threats to signal integrity and reliability.

System Model

Consider an NNCS as follows:
x ˙ i = x i + 1 + f i ( x ˜ i ) , 1 i n 1 , x ˙ n = u + f n x , y = x 1
where x = x 1 , , x n T R n , x ˜ i = x 1 , , x i T R i , u R , and y R refer to the state, control input, and system output; f i , i = 1 , 2 , , n stands for the nonlinear terms.
Motivated by [31], the following assumption on nonlinear uncertain terms is used.
Assumption 1.
For the nonlinear uncertain terms f i ( t ) , i = 1 , 2 , , n , there exists a constant c 0 > 0 such that
| f i ( x ˜ i ) | c 0 x 1 + + x i .
Based on Assumption 1, this paper addresses the estimate-based DMETC issue for system (1) subject to hybrid attacks when only the output signals are available. By establishing sufficient conditions, the mean square stability of the NNCSs can be guaranteed while simultaneously minimizing the number of events to the greatest extent possible.
Define the following variables:
z i = x i ι i 1 , v = u ι n , i = 1 , 2 , , n .
Then, (1) can be further described as
z ˙ = ι A 0 z + ι B 0 v + f ˜ z , y = C 0 z
where z = [ z 1 , , z n ] T , f ˜ z = [ f 1 ι 0 , , f n ι n 1 ] T , A 0 = 0 ( n 1 ) × 1 I ( n 1 ) × ( n 1 ) 0 0 1 × ( n 1 ) , B 0 = 0 ( n 1 ) × 1 1 , C 0 = 1 0 1 × ( n 1 ) .

3. Estimate-Based DMETC Design Against Hybrid Attacks

In this section, the aim of this study is to develop an estimate-based DMETC strategy for NNCSs (3), which includes three parts: (1) A sampled-data observer is presented to estimate the output, and a DMETM with dynamic variable is established to alleviate bandwidth pressure. (2) A hybrid attacks model encompassing DoS and deception attacks is considered, which has an impact on the transmission signals. (3) According to the hybrid attacks and the DMETM, a memory-event-triggered output feedback tracking controller is proposed.

3.1. Sampled-Data Observer Design

Let h, { t k h } k N , and t k , g h = t k h + g h , g = 1 , 2 , be the sampling period, the set of event-triggered instants, and the sampling instants, respectively. Based on (3), a sampled-data observer is built for t [ t k , g h , t k , g + 1 h )
z ^ ˙ ( t ) = ι A 0 z ^ ( t ) + ι B 0 v ( t ) + ι H ( y ( t k , g h ) C 0 z ^ ( t ) )
where z ^ t = [ z ^ 1 ( t ) , , z ^ n ( t ) ] T stands for the estimate of z ( t ) , and H = [ h 1 , , h n ] T refers to the observer parameters.
Define the following estimation error: e i = z i z ^ i , i = 1 , , n . With help of (3) and (4), the estimation error system is expressed as
e ˙ ( t ) = ι A 0 e ( t ) + f ˜ z ( t ) ι H ( y ( t k , g h ) C 0 z ^ ( t ) ) , t [ t k , g h , t k , g + 1 h )
where e = [ e 1 , , e n ] T .

3.2. DMETM Design

By applying the average of historical system output, a DMETM is employed to decide whether the estimated signals should be released to a remote controller. Define
M ( t ) = m = 1 m ˜ θ m ϵ m ( t ) σ ι z ^ ( t k , g h ) η ι γ ( t k , g h ) , ϵ m ( t ) = z ^ ( t k , g h ) z ^ ( t k m + 1 h )
where m ˜ and t k m + 1 h , m = 1 , 2 , , m ˜ stand for the maximum value of the historical event-triggered instant and the past event-triggered instant; θ m denotes the weight of historical signals at instant t k m + 1 h ; σ 0 , η > 0 , γ ( t k , g h ) refers to the dynamic variable and satisfies the following adaptive law:
γ ˙ ( t ) = η ¯ γ ( t ) + σ ι z ^ ( t k , g h ) m = 1 m ˜ θ m ϵ m ( t )
where t [ t k , g h , t k , g + 1 h ) , η ¯ > 0 , and γ ( 0 ) 0 denote the initial condition. Then, the next triggered instant is determined by
t k + 1 h = t k h + min g 1 g h | M ( t ) 0 .
Remark 1.
Different from memoryless ETM [17], the proposed DMETM (7) employs the average value of past data m = 1 m ˜ θ m ϵ m ( t ) with pre-assigned constant historical weights θ m , where more recent event-triggered data are assigned larger weights, and older data receive smaller weights. This design emphasizes the influence of recent information, helping reduce unnecessary data transmissions caused by sudden changes in the system state while avoiding excessive sensitivity to outdated data. It should be noted that the historical information z ^ ( t k m + 1 h ) is utilized in (7) to avoid unnecessary transmissions influenced by external factors.
The subsequent lemma is employed to represent the key characteristics of the auxiliary variable γ ( t ) .
Lemma 1.
Consider the rule (6) with γ ( 0 ) 0 ; if η > 0 and η ¯ > 0 , the sampling period h satisfies
h < 1 η ¯ ln ι η ¯ η + 1 ,
then, for all t [ 0 , ) , γ ( t ) 0 holds.
Proof. 
Based on the DMETM (7) that m = 1 m ˜ θ m ϵ m ( t ) σ ι z ^ ( t k , g h ) + η ι γ ( t k , g h ) , t [ t k , g h , t k , g + 1 h ) . Integrating (6) from t k , g h to t [ t k , g h , t k , g + 1 h ) , one has
γ ( t ) = e η ¯ ( t t k , g h ) γ ( t k , g h ) + t k , g h t e η ¯ ( t v ) d v σ ι z ^ ( t k , g h ) m = 1 m ˜ θ m ϵ m ( t ) e η ¯ ( t t k , g h ) γ ( t k , g h ) t k , g h t e η ¯ ( t v ) d v η γ ( t k , g h ) ι e η ¯ h η ( 1 e η ¯ h ) ι η ¯ γ ( t k , g h ) .
Taking (9) into consideration, it can be obtained that γ ( t ) 0 , where t [ t k , g h , t k , g + 1 h ) . Moreover, since γ ( t ) is a continuous function, γ ( t k , g + 1 h ) = γ ( t k , g + 1 h ) , which implies that γ ( t k , g + 1 h ) 0 . Obviously, it follows that γ ( t ) 0 , t [ 0 , ) . □
Remark 2.
For the proposed DMETM in (7), the inclusion of the dynamic variable γ enables potential noise attenuation, since the γ value can be interpreted as a filtered parameter of the error function ϵ m . Unlike the traditional ETM with a fixed threshold [8,27], the DMETM (7) employs a more sophisticated triggering condition. This condition is inherently more challenging to satisfy due to the presence of the term η ι γ ( t k , g h ) , which is always non-negative. As a result, the DMETM ensures that events are triggered only when significant changes occur, thereby reducing unnecessary transmissions and saving limited network resources.
Remark 3.
In contrast to certain existing memory ETM approaches [13,14], the DMETM (7) in this paper is constructed based on the state estimates rather than relying on full states. The designed DMETM (7) incorporates three adjustable parameters: σ, η, and η ¯ . By setting η = 0 , the designed DMETM (7) simplifies to the conventional ETM [8]. Furthermore, when both σ and η are set to 0, the designed DMETM (7) simplifies to the time-triggered mechanism. Generally, smaller values of σ and η typically result in a higher transmission frequency, thereby improving the control performance. Therefore, it is crucial to carefully adjust these parameters to achieve an optimal trade-off between the transmission rate and the desired control performance.

3.3. Hybrid Attacks

As depicted in Figure 1, the hybrid attacks studied in this paper consist of both deception and DoS attacks. Specifically, the deception attacks can tamper with the transmitted data and damage their integrity, while the DoS attacks can block the packets transmission, resulting in sampled signals being unable to reach the controller. When these two attacks occur simultaneously, the impact of the hybrid attacks exceeds that of a single attack, as it not only compromises the accuracy of the data but also disrupts its transmission.
The transmission signal affected by the hybrid attacks model is presented as
z ˜ ( t k h ) = β k ( t ) [ α k ( t ) z ^ ( t k h ) + ( 1 α k ( t ) ) g ( z ^ ( t k h ) ) ]
where g ( z ^ ( t k h ) ) stands for the nonlinear function created by deception attacks and satisfies g ( z ^ ( t k h ) ) c z ^ ( t k h ) , with c > 0 . α k ( t ) { 0 , 1 } and β k ( t ) { 0 , 1 } denote the Bernoulli distributed variable, with the associated probabilities given by
Pr { α k ( t ) = 1 } = α ¯ k , Pr { α k ( t ) = 0 } = 1 α ¯ k , Pr { β k ( t ) = 1 } = β ¯ k , Pr { β k ( t ) = 0 } = 1 β ¯ k
with 0 α ¯ k < 1 , and 0 β ¯ k < 1 .
Remark 4.
According to (10), if β k ( t ) = 0 , this indicates that the sampled output suffers from DoS attacks. If β k ( t ) = 1 and α k ( t ) = 0 , the estimated signal z ^ ( t k h ) suffers from deception attacks, and the actual signal received by the controller is g ( Z ^ ( t k h ) ) . If β k ( t ) = 1 and α k ( t ) = 1 , this implies that the data are unaffected by the hybrid attacks and can reach the controller on time while maintaining its integrity.

3.4. Output Feedback Controller Design

Based on (4) and (10), the control input v ( t ) is defined by
v ( t ) = ι n u ( t k h ) = ι n m = 1 m ˜ K z ˜ ( t k m + 1 h ) , t [ t k h , t k + 1 h )
where K = [ k 1 , , k n ] denotes the controller parameters to be designed.
With the DMETM (7) and the hybrid attacks model (10) in mind, the event-triggered controller (12) is redesigned as
v ( t ) = m = 1 m ˜ K β k ( t ) α k ( t ) ( z ^ ( t k , g h ) ϵ m ( t ) ) + K β k ( t ) ( 1 α k ( t ) ) g ( z ^ ( t k m + 1 h ) )
where t [ t k , g h , t k , g + 1 h ) .
Then, combining (3) and (5), a closed-loop system is designed as
ρ ˙ ( t ) = ι Ξ 1 ρ ( t ) + ι Ξ 2 m = 1 m ˜ β k ( t ) α k ( t ) ϵ m ( t ) + F ( z ( t ) ) ι Ξ 2 m = 1 m ˜ β k ( t ) ( 1 α k ( t ) ) g ( z ^ ( t k m + 1 h ) ) + ι Ξ 3 β k ( t ) α k ( t ) ρ ( t k , g h ) ) + ι Ξ 4 ( z ( t ) z ( t k , g h ) )
where t [ t k , g h , t k , g + 1 h ) , ρ = [ z T , e T ] T , Ξ 1 = A 0 0 0 A 0 H C 0 , Ξ 2 = B 0 K 0 , Ξ 3 = B 0 K B 0 K , Ξ 4 = 0 H C 0 , F ( z ( t ) ) = f ˜ z ( t ) f ˜ z ( t ) .

4. Stability Analysis

To establish the stability analysis for the NNCSs, the following lemma is presented.
Lemma 2
([31]). Let ϑ : R n × R n R n . Consider the following differential equation:
ϑ ˙ ( j ) = μ ( ϑ ( j ) , ϑ ( j k ) ) , j [ j k , j k + 1 ) , j k = t k h , k N .
If μ ( ϑ ( j ) , ϑ ( j k ) ) satisfies
μ ( ϑ ( j ) , ϑ ( j k ) ) b 1 ( ϑ ( j ) ϑ ( j k ) + ϑ ( j k ) )
where b 1 denotes a positive constant; then, it holds that
μ ( ϑ ( j ) , ϑ ( j k ) ) ( e b 1 ( j j k ) 1 ) ϑ ( j k ) , j [ j k , j k + 1 ) , k N .
According to (14), there exists a positive matrix P = P T R n × n such that Ξ 1 T P + P Ξ 1 = I holds, where Ξ 1 is a Hurwitz matrix. Then, the following theorem is presented to demonstrate the stability of NNCSs (14) under hybrid attacks.
Theorem 1.
Under Assumption 1, consider the NNCSs (3) subject to hybrid attacks and DMETM (7). If ι and h satisfy
ω ¯ = ω 1 λ min ( P ) 2 m ˜ P Ξ 2 β ¯ k ( α ¯ k + c ( 1 α ¯ k ) ) ( σ + η ) 2 σ > 0 ,
h < 1 η ¯ ln ι η ¯ η + 1 , 1 a 2 ln 1 + ω ¯ ω ¯ 1 ,
where a 1 = η Ξ 4 a 2 , a 2 = max { ι Ξ 1 + ι Ξ 2 + c 1 , ι Ξ 1 + σ Ξ 2 + c 1 } ,
ω ¯ 1 = 2 c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ( ι + σ ) ) ( 1 + a 1 ) + 2 ( 2 m ˜ σ P Ξ 2 β ¯ k α ¯ k + ι P Ξ 4 , ω 1 = min { 2 η ¯ , ι 2 c 1 P 2 2 m ˜ σ P Ξ 2 β ¯ k α ¯ k λ max ( P ) 2 2 c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ( ι + σ ) λ max ( P ) } > 0 , ω 2 = 2 ( 2 m ˜ σ P Ξ 2 β ¯ k α ¯ k + ι P Ξ 4 ) ( 1 + a 1 ) ( e a 2 h 1 ) λ min ( P ) + 2 2 c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ( ι + σ ) ( 1 + a 1 ) ( e a 2 h 1 ) λ min ( P ) + 2 m ˜ P Ξ 2 β ¯ k η ( α ¯ k + c ( 1 α ¯ k ) ) + 2 σ 2 ι β ¯ k α ¯ k P Ξ 3 λ min ( P ) ,
then, the system (14) is mean square stable.
Proof. 
For the system (14), construct the following Lyapunov function:
V ( ρ ˜ ) = ρ T P ρ + γ 2
where ρ ˜ = [ ρ T , γ ] T . Taking the mathematical expectation and derivation of V ( ρ ˜ ( t ) ) with respect to the (14) in the time interval t [ t k , g h , t k , g + 1 h ) yields
E { L V ( ρ ˜ ( t ) ) } ι ρ ( t ) 2 + 2 ι ρ T ( t ) P Ξ 2 m = 1 m ˜ β k ( t ) α k ( t ) ϵ m ( t ) + 2 ρ T ( t ) P F ( z ( t ) ) + 2 ι ρ T ( t ) P Ξ 4 ( z ( t ) z ( t k , g h ) ) 2 ι ρ T ( t ) P Ξ 2 m = 1 m ˜ β k ( t ) ( 1 α k ( t ) ) g ( z ^ ( t k m + 1 h ) ) 2 η ¯ γ 2 ( t ) + 2 σ ι z ( t k , g h ) γ ( t ) 2 m = 1 m ˜ θ m ϵ m ( t ) γ ( t ) + 2 ι ρ T ( t ) P Ξ 3 β k ( t ) α k ( t ) ρ ( t k , g h ) ) .
According to the DMETM (7) and Lemma 1, one can get
ι m = 1 m ˜ ϵ m ( t ) m ˜ ( σ z ^ ( t k , g h ) + η γ ( t k , g h ) ) m ˜ ( σ e ( t ) e ( t k , g h ) + σ e ( t ) + σ z ( t ) + σ z ( t ) z ( t k , g h ) + η γ ( t k , g h ) ) 2 m ˜ σ ( ρ ( t ) ρ ( t k , g h ) + ρ ( t ) ) + m ˜ η γ ( t k , g h ) .
Based on the definition of the hybrid attacks model (11), one has
E 2 ι ρ T ( t ) P Ξ 2 m = 1 m ˜ β k ( t ) ( 1 α k ( t ) ) g ( z ^ ( t k m + 1 h ) ) 2 ι c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ρ ( t ) z ^ ( t k h ) 2 ι c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ρ ( t ) ( ϵ m ( t ) + z ^ ( t k , g h ) ) .
By (21), (22) is equivalent to the following inequality:
E 2 ι ρ T ( t ) P Ξ 2 m = 1 m ˜ β k ( t ) ( 1 α k ( t ) ) g ( z ^ ( t k m + 1 h ) ) 2 ι c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ρ ( t ) ( ϵ m ( t ) + z ( t k , g h ) + e ( t k , g h ) ) 2 ι c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ρ ( t ) ( ϵ m ( t ) + 2 ρ ( t ) + 2 ρ ( t ) ρ ( t k , g h ) ) .
With Assumption 1 in mind, one can get
2 ρ T ( t ) P F ( z ( t ) ) 2 c 1 P ρ ( t ) 2
where c 1 = c 0 2 n ( n + 1 ) .
According to Lemma 2 and the Gronwall–Bellman inequality in [32], t [ t k , g h , t k , g + 1 h ) , it holds that
z ( t ) z ( t k , g h ) ρ ( t ) ρ ( t k , g h ) t k , g h t ρ ˙ ( v ) d v ( e a 2 ( t t k , g h ) 1 ) ( ρ ( t k , g h ) + a 1 γ ( t k , g h ) )
where a 1 = η Ξ 4 a 2 , a 2 = max { ι Ξ 1 + ι Ξ 2 + c 1 , ι Ξ 1 + σ Ξ 2 + c 1 } .
For t [ t k , g h , t k , g + 1 h ) , substituting (21)–(25) into (20) results in
E { L V ( ρ ˜ ( t ) ) } ( ι 2 c 1 P ) ρ ( t ) 2 2 η ¯ γ 2 ( t ) + 2 σ ι z ( t k , g h ) γ ( t ) + 2 m ˜ P Ξ 2 β ¯ k α ¯ k ρ ( t ) η γ ( t k , g h ) + 2 σ ( ρ ( t ) ρ ( t k , g h ) + ρ ( t ) ) + 2 ι P Ξ 4 ρ ( t ) ( ρ ( t k , g h ) + a 1 γ ( t k , g h ) ) ( e a 2 h 1 ) + 2 ι β ¯ k α ¯ k P Ξ 3 ρ ( t ) ρ ( t k , g h ) ) + 2 ι c m ˜ β ¯ k ( 1 α ¯ k ) P Ξ 2 ρ ( t ) × ( ϵ m ( t ) + 2 ρ ( t ) + 2 ρ ( t ) ρ ( t k , g h ) ) .
By assigning ι > 2 c 1 P , it follows from (26) that
E { L V ( ρ ˜ ( t ) ) } ω 1 E { V ( ρ ˜ ( t ) ) } + ω 2 E { V ( ρ ˜ ( t ) ) V ( ρ ˜ ( t k , g h ) ) }
where ω 1 and ω 2 are given in Theorem 1.
It can be derived from (27) that
E { L V ( ρ ˜ ( t ) ) } ω 1 2 E { V ( ρ ˜ ( t ) ) } + ω 2 2 E { V ( ρ ˜ ( t k , g h ) ) } , t [ t k , g h , t k , g + 1 h ) .
By integrating V ( ρ ˜ ( t ) ) from t k , g h to t k , g + 1 h , one has
E { V ( ρ ˜ ( t k , g + 1 h ) ) } ω 3 E { V ( ρ ˜ ( t k , g h ) ) }
where ω 3 = ω 2 ω 1 ( 1 e ω 2 2 h ) + e ω 1 2 h .
It can be concluded from (29) that when t k , g h tends to infinity, one can obtain that ρ ˜ ( t k , g + 1 h ) ) asymptotically converges to zero. Furthermore, if the conditions (17) and (18) are met, the NNCSs (3) under hybrid attacks and DMETM (7) have mean square stability. This completes the proof of the theorem. □
Remark 5.
The stability conditions (17) and (18) in Theorem 1 constitute sufficient but not necessary and sufficient conditions for system stability. Hence, these conditions are inherently conservative to some extent. Deriving necessary and sufficient stability conditions for secure control under hybrid attacks is a challenging problem due to the inherent complexity and uncertainty of the NNCSs. Therefore, developing less conservative or tighter stability criteria remains a significant topic for future research.

5. Simulation Example

In this section, a numerical simulation and a practical example of a single-link robot arm system are utilized to demonstrate the superiority of the designed DMETC strategy.
Example 1.
Consider the following system:
x ˙ 1 = x 2 + 2 sin ( x 1 ) x ˙ 2 = u ln ( 1 + x 1 2 ) sin ( t ) x 2 y = x 1
The controller and observer parameters are chosen as K = [ 26 , 31 ] , H = [ 11 , 59 ] T , and ι = 3 . The sampling period is selected as h = 0.002 s . For hybrid attacks, the nonlinear function is set as g ( z ^ ( t k h ) ) = tanh ( 0.6 z ^ ( t k h ) ) , α ¯ k = 0.3 , and β ¯ k = 0.6 . The initial values of the system and observer states are given by x = [ 1 , 1 ] T and z ^ = [ 0 , 0 ] T . For the designed DMETM, σ = 0.2 , η = 0.2 , η ¯ = 0.8 , θ 1 = 0.5 , θ 2 = 0.3 , θ 3 = 0.2 , and γ ( 0 ) = 1 .
The response curves of the state x and observer z ^ are depicted in Figure 2 and Figure 3. Figure 4 presents the event instants and intervals under the Conventional ETM [8], where the numbers of triggered data are 999. The trajectories of the state x are illustrated in Figure 5, from which one can discern that the designed controller stabilizes the system under hybrid attacks. The response curves of observer z ^ are illustrated in Figure 6. Figure 7 presents the event instants and intervals under the DMETM, where the numbers of event are 613. Figure 8 depicts the evolution of the controller.
The effectiveness of the designed DMETC strategy has been validated through a table by comparing it with the time-triggered mechanism and the conventional ETM [8]. The numbers of event-triggered packets under different communication mechanisms are presented in Table 1, in which R refers to the ratio between data packets under different ETMs and the time-triggered numbers. As shown in this table, the proposed DMETM (7) significantly reduces the number of transmission signals compared to the conventional ETM and time-triggered mechanism. Specifically, the proposed DMETM (7) decreases the network bandwidth consumption by 87.74 % compared to the time-triggered method and by 7.72 % compared to the conventional ETM.
Example 2.
Consider the following robot arm system [33]:
x ˙ 1 = x 2 x ˙ 2 = u M g ¯ h ¯ G sin ( x 1 ) J G x 2 y = x 1
where M = 1.1 kg, and h ¯ = 0.6 m stands for the mass and the length of the arm; g ¯ = 9.81   m / s 2 , G = 1 kg· m 2 , and J = 2 N·m·s/rad refer to the gravity acceleration, the viscous friction coefficients, and the moment of inertia, respectively.
The values for the control strategy are selected as follows: the sampling period h = 0.002 s, the observer parameters ι = 2.5 and H = [ 8 , 20 ] T , and the controller parameter K = [ 16 , 5 ] . For hybrid attacks, the nonlinear function is given by g ( z ^ ( t k h ) ) = tanh ( 0.2 z ^ ( t k h ) ) , α ¯ k = 0.5 , and β ¯ k = 0.5 . The initial values are defined by x = [ 0.7 , 0.5 ] T and z ^ = [ 0 , 0 ] T . For the designed DMETM, σ = 0.3 , η = 0.3 , η ¯ = 0.8 , θ 1 = 0.5 , θ 2 = 0.3 , θ 3 = 0.2 , and γ ( 0 ) = 0.9 .
In the absence of hybrid attacks, the trajectory of the state x is shown in Figure 9, and the trajectory of observer z ^ is presented in Figure 10. The event instants and intervals are given in Figure 11, where the event-triggered numbers generated by DMETM are 156. Figure 12 displays the curves of the controller. Figure 13 and Figure 14 depict the trajectories of the state x and observer z ^ under hybrid attacks. Figure 15 shows the event instants and intervals, where the event-triggered packets generated by DMETM are 326. The evolution of the controller is presented in Figure 16. According to Figure 9, Figure 10, Figure 11, Figure 12, Figure 13, Figure 14, Figure 15 and Figure 16, compared with the attack-free scenario, the hybrid attacks inevitably introduce certain performance degradations to the system. Nevertheless, the designed DMETC strategy effectively compensates for these adverse effects, enabling the system to achieve superior steady-state performance even under the influence of hybrid attacks. This highlights the capability of the designed strategy to maintain system stability and performance in the presence of hybrid attacks threats.

6. Conclusions

In this paper, the estimate-based DMETC issue has been presented for a class of NNCSs under hybrid attacks. When only the measurable signals are available, the sampled-data observer has been utilized to estimate the system output. To save the bandwidth resources, the DMETM and the auxiliary variable update law have been developed, which effectively utilize the advantages of historical sampled-data estimates. The hybrid attack model that accounts for the combined effects of both deception and DoS attacks has been put forward to describe the potential threats during network data transmission. Then, the memory-event-triggered output feedback controller has been designed to ensure that the NNCSs can achieve the mean square stability. Finally, the results of two examples have been given, which illustrate that the estimate-based DMETC method can be validated under hybrid attacks. A potential research for future work is to expand the developed DMETC method to disturbance rejection control, and finite-time security control will also be investigated.

Author Contributions

Methodology, B.Z. and M.Y.; Software, Y.W.; Formal analysis, T.Z.; Investigation, M.Y.; Writing—original draft, Z.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Key Research and Development Program of China, grant number 2022YFB3104300.

Data Availability Statement

The original contributions presented in the study are included in the article; further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Song, J.; Wang, Y.; Niu, Y.; Lam, H.; He, S.; Liu, H. Periodic event triggered terminal sliding mode speed control for networked PMSM system: A GA-optimized extended state observer approach. IEEE/ASME Trans. Mechatron. 2022, 27, 4153–4164. [Google Scholar] [CrossRef]
  2. Fu, A.; McCann, J.A. Dynamic decentralized periodic event-triggered control for wireless cyber-physical systems. IEEE Trans. Control Syst. Technol. 2021, 29, 1783–1790. [Google Scholar] [CrossRef]
  3. Wang, L.; Hu, M.; Bian, Y.; Guo, G.; Li, S.; Chen, B.; Zhong, Z. Periodic event-triggered fault detection for safe platooning control of intelligent and connected vehicles. IEEE Trans. Veh. Technol. 2024, 73, 5064–5077. [Google Scholar] [CrossRef]
  4. Wang, F.-Y.; Gao, Y. On frequency sensitivity and mode orthogonality of flexible robotic manipulators. IEEE/CAA J. Autom. Sin. 2016, 3, 394–397. [Google Scholar] [CrossRef]
  5. Zhang, X.-M.; Han, Q.-L.; Yu, X. Survey on recent advances in networked control systems. IEEE Trans. Ind. Inform. 2016, 12, 1740–1752. [Google Scholar] [CrossRef]
  6. Ge, X.H.; Yang, F.W.; Han, Q.-L. Distributed networked control systems: A brief overview. Inf. Sci. 2017, 380, 117–131. [Google Scholar] [CrossRef]
  7. Lu, Q.; Han, Q.-L.; Zhang, B.T.; Liu, D.L.; Liu, S.R. Cooperative control of mobile sensor networks for environmental monitoring: An event-triggered finite-time control scheme. IEEE Trans. Cybern. 2017, 47, 4134–4147. [Google Scholar] [CrossRef]
  8. Yue, D.; Tian, E.; Han, Q.-L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 2013, 58, 475–481. [Google Scholar] [CrossRef]
  9. Peng, C.; Han, Q.-L.; Yue, D. To transmit or not to transmit: A discrete event-triggered communication scheme for networked takagi-sugeno fuzzy systems. IEEE Trans. Fuzzy Syst. 2013, 21, 164–170. [Google Scholar] [CrossRef]
  10. Choi, Y.H.; Yoo, S.J. Decentralized event-triggered tracking of a class of uncertain interconnected nonlinear systems using minimal function approximators. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 1766–1788. [Google Scholar] [CrossRef]
  11. Wu, C.; Zhao, X.; Zhao, N.; Xu, N. Periodic and dynamic periodic event-triggered control for nonlinear cyber-physical systems under DoS attacks via a hybrid system approach. IEEE Trans. Control Netw. Syst. 2024, 11, 221–232. [Google Scholar] [CrossRef]
  12. Liu, J.; Zhang, N.; Li, Y.; Xie, X.; Tian, E.; Cao, J. Learning-based event-triggered tracking control for nonlinear networked control systems with unmatched disturbance. IEEE Trans. Syst. Man Cybern. 2023, 53, 3230–3240. [Google Scholar] [CrossRef]
  13. Gu, Z.; Huang, X.; Sun, X.; Xie, X.; Park, J.H. Memory-event-triggered tracking control for intelligent vehicle transportation systems: A leader-following approach. IEEE Trans. Intell. Transp. Syst. 2024, 25, 4021–4031. [Google Scholar] [CrossRef]
  14. Yan, S.; Gu, Z.; Ahn, C.K. Memory-event-triggered H-infinity filtering of unmanned surface vehicles with communication delays. IEEE Trans. Circuits Syst. I Reg. Pap. 2021, 68, 2463–2467. [Google Scholar]
  15. Ding, F.; Zhu, K.; Liu, J.; Peng, C.; Wang, Y.; Lu, J. Adaptive memory event-triggered output feedback finite-time lane-keeping control for autonomous heavy truck with roll prevention. IEEE Trans. Fuzzy Syst. 2024, 32, 6607–6621. [Google Scholar] [CrossRef]
  16. Wang, Z.; Zhang, H. Adaptive-memory event-triggered load frequency control for multi-input-delay power systems against FDI attacks and sensor faults. IEEE Trans. Circuits Syst. II Exp. Briefs 2024, 71, 4919–4923. [Google Scholar] [CrossRef]
  17. Sun, J.; Yang, J.; Zheng, W.X.; Li, S. Periodic event-triggered control for a class of nonminimum-phase nonlinear systems using dynamic triggering mechanism. IEEE Trans. Circuits Syst. I Reg. Pap. 2022, 69, 1302–1311. [Google Scholar] [CrossRef]
  18. He, W.; Xu, B.; Han, Q.-L.; Qian, F. Adaptive consensus control of linear multiagent systems with dynamic event-triggered strategies. IEEE Trans. Cybern. 2020, 50, 2996–3008. [Google Scholar] [CrossRef]
  19. Ge, X.; Xiao, S.; Han, Q.-L.; Zhang, X.-M.; Ding, D. Dynamic event-triggered scheduling and platooning control co-design for automated vehicles over vehicular ad-hoc networks. IEEE/CAA J. Autom. Sin. 2022, 9, 31–46. [Google Scholar] [CrossRef]
  20. Girard, A. Dynamic triggering mechanisms for event-triggered control. IEEE Trans. Autom. Control 2015, 60, 1992–1997. [Google Scholar] [CrossRef]
  21. Chen, G.; Dong, J. Data-driven control for discrete-time nonlinear systems with dual-channel dynamic event-triggered mechanism. IEEE Trans. Circuits Syst. II Exp. Briefs 2023, 10, 4439–4443. [Google Scholar] [CrossRef]
  22. Zhao, Y.; Qin, X.; Niu, B. Dynamic memory event-triggered anti-disturbance control for switched cyber-physical systems and its application to switched RLC circuit. IEEE Trans. Circuits Syst. I Regul. Pap. 2024, 71, 6034–6043. [Google Scholar] [CrossRef]
  23. Ye, F.; Cheng, Z.; Cao, X.; Chow, M.-Y. A random-weight privacy-preserving algorithm with error compensation for microgrid distributed energy management. IEEE Trans. Inf. Forensics Secur. 2021, 16, 4352–4362. [Google Scholar] [CrossRef]
  24. Yang, M.; Zhai, J. Predictor-based decentralized event-triggered secure control for nonlinear cyber-physical systems under replay attacks and time delay. IEEE Trans. Control Netw. Syst. 2024, 11, 150–160. [Google Scholar] [CrossRef]
  25. Ye, F.; Cao, X.; Cheng, Z.; Chow, M.-Y. CASL: A novel collusion attack against distributed energy management systems. IEEE Trans. Smart Grid 2023, 14, 4717–4728. [Google Scholar] [CrossRef]
  26. Gao, Y.; Niu, B.; Chen, W.; Wang, H.; Mu, C.; Wen, G. Adaptive control of constrained nonlinear CPSs under deception attacks through sensor and actuator networks. IEEE Trans. Circuits Syst. II Exp. Briefs 2024, 71, 1241–1245. [Google Scholar] [CrossRef]
  27. Peng, C.; Sun, H. Switching-like event-triggered control for networked control systems under malicious denial of service attacks. IEEE Trans. Autom. Control 2020, 65, 3943–3949. [Google Scholar] [CrossRef]
  28. Wan, Y.; Long, C.; Deng, R.; Wen, G.; Yu, X.; Huang, T. Distributed event-based control for thermostatically controlled loads under hybrid cyber attacks. IEEE Trans. Cybern. 2021, 52, 5314–5327. [Google Scholar] [CrossRef] [PubMed]
  29. Cheng, Z.; Hu, S.; Yue, D.; Dou, C.; Shen, S. Resilient distributed coordination control of multiarea power systems under hybrid attacks. IEEE Trans. Syst. Man Cybern. 2022, 52, 7–18. [Google Scholar] [CrossRef]
  30. Tang, Q.; Deng, C.; Fan, S.; Wang, Y.; Yue, D.; Wang, B. A novel cooperative resilient control method for energy storage systems under hybrid attacks. IEEE Trans. Ind. Electron. 2025, 72, 3943–3949. [Google Scholar] [CrossRef]
  31. Yang, J.; Sun, J.; Zheng, W.X.; Li, S. Periodic event-triggered robust output feedback control for nonlinear uncertain systems with time-varying disturbance. Automatica 2018, 94, 324–333. [Google Scholar] [CrossRef]
  32. Apostol, T.M. Mathematical Analysis, 2nd ed.; Addison-Wesley: Reading, MA, USA, 1974. [Google Scholar]
  33. Yang, M.; Zhai, J. Observer-based switching-like event-triggered control of nonlinear networked systems against dos attacks. IEEE Trans. Control Netw. Syst. 2022, 9, 1375–1384. [Google Scholar] [CrossRef]
Figure 1. The configuration of estimate-based DMETC for NNCSs under hybrid attacks.
Figure 1. The configuration of estimate-based DMETC for NNCSs under hybrid attacks.
Mathematics 13 02829 g001
Figure 2. Trajectories of system state x under the conventional ETM [8] in Example 1.
Figure 2. Trajectories of system state x under the conventional ETM [8] in Example 1.
Mathematics 13 02829 g002
Figure 3. Trajectories of observer state z ^ under the conventional ETM [8] in Example 1.
Figure 3. Trajectories of observer state z ^ under the conventional ETM [8] in Example 1.
Mathematics 13 02829 g003
Figure 4. Event-triggered instants and intervals under the conventional ETM [8] in Example 1.
Figure 4. Event-triggered instants and intervals under the conventional ETM [8] in Example 1.
Mathematics 13 02829 g004
Figure 5. Trajectories of system state x under the proposed method in Example 1.
Figure 5. Trajectories of system state x under the proposed method in Example 1.
Mathematics 13 02829 g005
Figure 6. Trajectories of observer state z ^ under the proposed method in Example 1.
Figure 6. Trajectories of observer state z ^ under the proposed method in Example 1.
Mathematics 13 02829 g006
Figure 7. Event-triggered instants and intervals under the proposed method in Example 1.
Figure 7. Event-triggered instants and intervals under the proposed method in Example 1.
Mathematics 13 02829 g007
Figure 8. Trajectories of the controller under the proposed method in Example 1.
Figure 8. Trajectories of the controller under the proposed method in Example 1.
Mathematics 13 02829 g008
Figure 9. Trajectories of system state x without hybrid attacks in Example 2.
Figure 9. Trajectories of system state x without hybrid attacks in Example 2.
Mathematics 13 02829 g009
Figure 10. Trajectories of observer state z ^ without hybrid attacks in Example 2.
Figure 10. Trajectories of observer state z ^ without hybrid attacks in Example 2.
Mathematics 13 02829 g010
Figure 11. Event-triggered instants and intervals without hybrid attacks in Example 2.
Figure 11. Event-triggered instants and intervals without hybrid attacks in Example 2.
Mathematics 13 02829 g011
Figure 12. Trajectories of the controller without hybrid attacks in Example 2.
Figure 12. Trajectories of the controller without hybrid attacks in Example 2.
Mathematics 13 02829 g012
Figure 13. Trajectories of system state x under hybrid attacks in Example 2.
Figure 13. Trajectories of system state x under hybrid attacks in Example 2.
Mathematics 13 02829 g013
Figure 14. Trajectories of observer state z ^ under hybrid attacks in Example 2.
Figure 14. Trajectories of observer state z ^ under hybrid attacks in Example 2.
Mathematics 13 02829 g014
Figure 15. Event-triggered instants and intervals under hybrid attacks in Example 2.
Figure 15. Event-triggered instants and intervals under hybrid attacks in Example 2.
Mathematics 13 02829 g015
Figure 16. Trajectories of the controller under hybrid attacks in Example 2.
Figure 16. Trajectories of the controller under hybrid attacks in Example 2.
Mathematics 13 02829 g016
Table 1. Event-triggered numbers under different mechanism.
Table 1. Event-triggered numbers under different mechanism.
MethodEvent-Triggered Packets R
Time-triggered mechanism5000100%
Conventional ETM99919.98%
DMETM (7)61312.26%
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, B.; Zhang, T.; Xi, Z.; Wang, Y.; Yang, M. Estimate-Based Dynamic Memory-Event-Triggered Control for Nonlinear Networked Control Systems Subject to Hybrid Attacks. Mathematics 2025, 13, 2829. https://doi.org/10.3390/math13172829

AMA Style

Zhang B, Zhang T, Xi Z, Wang Y, Yang M. Estimate-Based Dynamic Memory-Event-Triggered Control for Nonlinear Networked Control Systems Subject to Hybrid Attacks. Mathematics. 2025; 13(17):2829. https://doi.org/10.3390/math13172829

Chicago/Turabian Style

Zhang, Bo, Tao Zhang, Zesheng Xi, Yunfan Wang, and Meng Yang. 2025. "Estimate-Based Dynamic Memory-Event-Triggered Control for Nonlinear Networked Control Systems Subject to Hybrid Attacks" Mathematics 13, no. 17: 2829. https://doi.org/10.3390/math13172829

APA Style

Zhang, B., Zhang, T., Xi, Z., Wang, Y., & Yang, M. (2025). Estimate-Based Dynamic Memory-Event-Triggered Control for Nonlinear Networked Control Systems Subject to Hybrid Attacks. Mathematics, 13(17), 2829. https://doi.org/10.3390/math13172829

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop