Next Article in Journal
Experimental and Numerical Study on the Dynamic and Flow Characteristics of a Reciprocating Pump Valve
Next Article in Special Issue
Pareto Optimal Strategy under H Constraint for Discrete-Time Stochastic Systems
Previous Article in Journal
Prediction of Casing Collapse Strength Based on Bayesian Neural Network
Previous Article in Special Issue
Delay-Dependent Stability of Impulsive Stochastic Systems with Multiple Delays
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Sigmoid-like Event-Triggered Security Cruise Control under Stochastic False Data Injection Attacks

1
School of Engineering, Qufu Normal University, Rizhao 276800, China
2
School of Mechatronic Engineering and Automation, Shanghai University, Shanghai 200444, China
*
Author to whom correspondence should be addressed.
Processes 2022, 10(7), 1326; https://doi.org/10.3390/pr10071326
Submission received: 31 May 2022 / Revised: 22 June 2022 / Accepted: 4 July 2022 / Published: 6 July 2022
(This article belongs to the Special Issue Advances in Nonlinear and Stochastic System Control)

Abstract

:
This paper presents a Sigmoid-like event-triggered scheme (Sigmoid-like ETS) for security cruise control systems (CCSs) under stochastic false data injection (FDI) attacks. In order to improve the sensitivity of the ETS, a Sigmoid-like function is first proposed to adjust the event-triggered threshold, dynamically. In what follows, by considering a class of stochastic FDI attacks which obey Bernoulli distribution, the Sigmoid-like event-triggered security control strategy is proposed to ensure both the security and resource saving of the CCSs. Thus, a sufficient stability and stabilization criterion is well derived to present the co-design of an H control and event-triggered parameter. Finally, some simulation experiments are conducted to verify the effectiveness of the proposed Sigmoid-like event-triggered security cruise control for networked vehicles.

1. Introduction

Cruise control is the key technology of autonomous driving, which requires vehicles to cruise at a set velocity and meanwhile keep a safe distance from other cars [1]. The driver does not need to keep his foot on the gas pedal or break pedal, thereby greatly reducing their fatigue. Cruising at a set speed can also improve fuel economy. Therefore, some critical points should be considered in designing cruise control systems (CCSs). For example, the vehicle suddenly accelerating or decelerating can create a bad experience for passengers, and may also cause a pile-up on a congested road [2,3]. Due to the introduction of the in-and-out networks of vehicles, related studies have become more challenging in a complicated networked control environment.
On the one hand, a large amount of information exchange can easily cause signal congestion due to the finite communication resource [4,5]. As a result, the braking system and power system of a vehicle are delayed in response and this puts higher control requirements on CCSs. In fact, an in-vehicle network includes varieties of sensors and actuators, a large number of electronic control units and complicated CAN buses [6]. Numerous data packets exchanged through a shared communication network, which leads to the CCSs, become a typically resource-constrained system. At present, most communication schemes are based on being time-triggered [7]. However, these time-triggered-based schemes cannot utilize limited network resources efficiently and this promotes the event-triggered control scheme which implements control actions as required. Essentially, the design of ETSs considers the sampled-data error (namely threshold) which consists of the last transmitted instant state and the current instant state. Therefore, the event-triggered thresholds’ adjustment will be used to realize the maximize communication efficiency. In recent years, many ETSs have been proposed to address the problem of resource constraint, such as discrete-time ETSs [8,9], adaptive ETSs [10], dynamic ETSs [11], memory-based ETSs [12], distributed ETSs [13], etc. These ETSs play a significant role in resource saving under a networked control environment. However, these ETSs are generally more complicated and a simplified adaptive ETS is expected.
On the other hand, vehicles’ communication is generally vulnerable to cyber attacks, such as denial of service attacks and FDI attacks [14,15]. CCSs are very different from other control systems because they will do harm to human safety once cruise control actions are invalid. Many studies have confirmed that it is easy to disturb a vehicle by injecting maliciously false data into the controller area network (CAN) bus [16,17]. This will lead to a sudden acceleration or deceleration of the vehicle which poses a great threat to the safety of passengers. Based on this observation, one should spare no effort to ensure the stability of a vehicle under cyber attack. In general, an FDI attack is a class of harmful attack which can tamper with the real data in a hidden way and cause wrong control actions. Recently, there have been some studies focusing on security issues around FDI attacks. For example, an unscented Kalman filter based on an SE algorithm with a weighted least square was proposed to identify FDI attacks in [18]. An exhaustive review on the different detection algorithms of FDI attacks is presented in smart grids, and two different solutions for detecting secret cyber-physical attacks are proposed in [19]. However, these studies only focus on FDI attack detection. Recent studies provide some new solutions to FDI attacks and have placed their attention on security control under FDI attacks [20,21,22]. The key idea of security control is that one can guarantee the stability of the control system from the perspective of control strategy design rather than information protection.
Based on the above observations, security control and resource saving the two main limitations of the cruise system, which create a real challenge to the safety of networked autonomous vehicles. Thus, the contributions of this paper can be described in two respects:
  • A novel Sigmoid-like ETS is proposed to cope with the co-design of the control and communication of CCSs. Compared with the traditional static ETSs [23], adaptive ETSs [21,22] and dynamic ETSs [6,11], the proposed Sigmoid-like ETS will guarantee the upper bound of event-triggered thresholds while making full use of the state perception;
  • The security control of CCSs under stochastic FDI attacks is well characterized with the proposed Sigmoid-like ETS. Rather than detecting the FDI attacks in a complicated way [18,19,24], the studied event-triggered security control of CCSs is of H performance even on the condition that the FDI attack detection fails.
The remainder of this article is organized as follows. Section 2 describes the Sigmoid ETS for cruise control as well as the longitudinal vehicle dynamics model and the overall control objectives. Section 3 presents the stabilization criteria and controller design method for networked cruise control systems. In Section 4, some simulation studies are presented to show the advantages of Sigmoid-like ETS. Section 5 draws the final conclusions.

2. Preliminaries

The cruise control of an autonomous vehicle described in this paper is to obtain an expected acceleration and make the vehicle able to cruise at a specific velocity. The longitudinal dynamic model of vehicle is described as follows:
x ˙ p ( t ) = x v ( t ) ; x ˙ v ( t ) = x a ( t ) ; x ˙ a ( t ) = 1 η d x a ( t ) + 1 η d u c ( t ) + 1 η d w η ( t ) ,
where x p ( t ) denotes the position with respect to the origin; x v ( t ) denotes real velocity; x a ( t ) denotes the acceleration produced by the engine; η d > 0 represents the inertia delay of the vehicle powertrain; u c ( t ) denotes the desired control input; and w η ( t ) denotes the generally unmodeled but bounded road disturbance input vector. If the state vector is denoted by x c ( t ) = [ x p ( t ) , x v ( t ) , x a ( t ) ] T , the state space model of CCSs can be written as:
x ˙ c ( t ) = A x c ( t ) + B u c ( t ) + B w η ( t ) ,
where A = 0 1 0 0 0 1 0 0 1 η d , B = 0 0 1 η d .
By considering the fact that the sensors, controllers and actuators communicate through an open communication network, a networked event-triggered CCS is shown in Figure 1. It is clear that the feedback measurements and control actions would be disrupted when there are malicious FDI attacks.
In order to understand the proposed Sigmoid-like event-triggered control more clearly, some assumptions are presented at first.
Assumption 1.
The sampled data are sent to the controller with a constant period h. The sampling set Θ 1 = { 0 , h , 2 h , , k h } is assumed for all k N .
Assumption 2.
The sampled data, whether transmitted or not, are dependent on the designed event-triggered scheme. Then the successful transmitted signals set is Θ 2 = { 0 , t 1 h , t 2 h , , t k h } , where t k N and lim k t k . Obviously, Θ 2 Θ 1 .
Assumption 3.
Zero-order hold (ZOH) converts a discrete control signal into a continuous one during the time interval t [ t k h + η k , t k + 1 h + η k + 1 ) . Here, η k is the packet transmission delay at t k h .
Under the above assumptions, the CCSs’ state feedback form based on the sampled-data control framework is given by:
x ˙ c ( t ) = A x c ( t ) + B u c ( t ) + B w η ( t ) ; z ( t ) = C x c ( t ) + D u c ( t ) ; u c ( t ) = K x c ( t k h ) , t [ t k h + η k , t k + 1 h + η k + 1 ) ,
where z ( t ) R p is a controlled output vector; C and D are suitable constant matrices; and K is the designed controller gain. Assuming v is the expected cruise velocity, then lim t x ˙ c ( t ) = [ v , 0 , 0 ] T .

2.1. Sigmoid-like ETS

In this section, a novel event-triggered scheme with a Sigmoid-like threshold function is first proposed.
Firstly, denote the sampled-data error as:
e ( i k h ) = x c ( i k h ) x c ( t k h ) ,
where x c ( t k h ) is the last transmitted sampling instant state, x c ( i k h ) is the current state, i k h = t k h + l h , l N .
Thus, by virtue of (4), the Sigmoid-like ETS is described as:
t k + 1 h = t k h + min l { l h | e T ( i k h ) Λ e ( i k h ) δ ˜ ( t k h ) ϑ ( t k h ) } ,
where δ ˜ ( t k h ) = ϕ ϵ exp ( a x c ( t k h ) 2 ) + ϵ , ϵ , a and ϕ ϵ are some given constants, | | · | | is the Euclidian norm of a vector, ϑ ( t k h ) = x c T ( t k h ) Λ x c ( t k h ) with Λ = Λ T is a designed positive weighting matrix.
In fact, the Sigmoid-like function δ ˜ ( t k h ) plays an important role in the adjustment of the event-triggered threshold, i.e.,:
  • The δ ˜ ( t k h ) is a monotonic decreasing function along with | | x c ( t k h ) | | 2 ;
  • It is obvious that δ ˜ ( t k h ) ( 0 , ϕ ϵ 1 + ϵ ] is held.
The above two features of the dynamic event-triggered parameter δ ˜ ( t k h ) are beneficial to facilitating the stability analysis with Sigmoid-like ETS. In fact, the event-triggered threshold δ ˜ ( t k h ) can adjust with the change of state x c ( t k h ) . When x c ( t k h ) 2 becomes bigger, implying that the system state has become unstable, a smaller δ ˜ will encourage the ETS (5) to release more packets. On the contrary, it is easy to see that if the system reaches a stable state, that is x c ( t k h ) 2 0 , then the ETS (5) can reach the largest δ ˜ , which means that a fewer packets should be transmitted.
Remark 1.
As a special case, if δ ˜ = ϕ ϵ 1 + ϵ in (5), a static ETS is obtained as in [23].

2.2. Stochastic FDI Attacks

FDI attacks capture real signals in the case where the real transmitted signal x c ( t k h ) is replaced by a false f ( x c ( t k h ) ) , which would lead to non-ideal control actions. Usually, a stochastic-type FDI attack follows the below rules:
Assumption 4.
Energy constraints: With regard to a given matrix S E C , the signals of FDI attacks are supposed to satisfy:
f ( x c ( t k h ) ) 2 S E C x c ( t k h ) 2 ,
where S E C is an upper bound of the nonlinear function f ( x c ( t k h ) ) .
Assumption 5.
Probability constraints: Denote θ s ( t ) is the probability of FDI attacks; it satisfies the following condition:
θ s ( t ) = 1 , F D I a t t a c k i s a c t i v a t e d ; 0 , F D I a t t a c k i s s l e p t ,
with the stochastic properties of θ s ( t ) satisfying:
E ( θ s ( t ) ) = θ , E ( θ s ( t ) θ ) 2 = σ 2 ,
where the probability mean value is θ and the variance of θ s ( t ) is σ 2 , the expectation of stochastic variable is represented by E ( · ) .
Remark 2.
In order to characterize FDI attacks in a more reasonable way, both energy and probability constraints are presented by Assumptions 4 and 5, respectively. For such assumptions, one can refer to [14,20,22], etc.

2.3. Control Objectives

We are now in position to model the issues of the Sigmoid-like event-triggered cruise control. According to [23], the sampling-interval-like subsets [ t k h + η k , t k + 1 h + η k + 1 ) can be expressed as the adjacent sampling interval with:
Θ = l = 0 t k + 1 t k 1 Θ l ,
where Θ l = [ i k h + η k , i k h + h + η k + 1 ) , i k h = t k h + l h .
Then, by defining η ( t ) = t i k h , one can obtain the piecewise-linear function η ( t ) which satisfies η ˙ ( t ) = 1 , 0 η ( t ) h + max { η k , η k + 1 } = η ¯ .
Thus, by considering the FDI attacks, the actual state feedback control actions are written as follows:
u c ( t ) = θ s ( t ) K f ( x c ( t k h ) ) + ( 1 θ s ( t ) ) K x c ( t k h ) .
Under the Sigmoid-like ETS, the CCSs (3) with stochastic FDI attacks can be rewritten in the following form:
x ˙ c ( t ) = A x c ( t ) + θ s ( t ) B K f ( x c ( t k h ) ) + ( 1 θ s ( t ) ) B K x c ( t k h ) + B w η ( t ) subjects to : e T ( i k h ) Φ e ( i k h ) δ ˜ ( t k h ) ϑ ( t k h ) ,
where ψ 0 is defined as the initial state x c ( t 0 ) for all variables t [ t 0 η ¯ , t 0 ) , x c ( t k h ) = x c ( t η ( t ) ) e ( i k h ) .
With respect to the Sigmoid-like event-triggered CCSs (9) under stochastic FDI attacks, the control objectives of this technical note are presented as follows:
  • Under the Sigmoid-like ETS (5) and stochastic FDI attacks (6), the CCSs (9) are asymptotically stable when there is no disturbance ( w η ( t ) = 0 );
  • Under the Sigmoid-like ETS (5) and stochastic FDI attacks (6), the desired H attenuation level with E { | | z ( t ) | | 2 } E { γ | | w η ( t ) | | 2 } is held under its zero initial condition.
For facilitating the further analysis and synthesis of the CCSs (9), the definition named infinitesimal operator L is well defined to derive the main results of this paper.
Definition 1
([25]). For a given function V : C F 0 B ( [ η ¯ , 0 ] , R n ) × S , its infinitesimal operator L is defined as:
L ( V ( t , x t ) ) = lim Δ 0 + 1 Δ [ E { V ( x t + Δ ) | x t } V ( x t ) ] ,
where x t = { x ( t + θ ) : η ¯ θ 0 } for t 0 .

3. Main Results

In this part, the criterions of stability and stabilization for Sigmoid-like event-triggered CCSs (9) under stochastic FDI attacks (6) are carefully derived. In addition, an algorithm is presented to implement the controller gain and event-triggered parameter co-design.
Theorem 1.
For some designed positive scalars σ, η ¯ , ϕ ϵ 1 + ϵ , θ and γ, if there exist real positive matrices Z , H , R and Λ with suitable dimensions, such that the LMIs hold
Ξ 11 Ξ 21 T Ξ 31 T Ξ 21 Ξ 22 0 Ξ 31 0 Ξ 33 < 0 , R U T U R > 0 ,
where
Ξ 11 = [ ( 1 , 1 ) = A T Z + Z A + H R , ( 1 , 6 ) = Z B , ( 1 , 2 ) = ( 1 θ ) Z B K + R T U T , ( 1 , 3 ) = U T , ( 1 , 4 ) = ( 1 θ ) Z B K , ( 1 , 5 ) = θ Z B K , ( 2 , 2 ) = ϕ ϵ 1 + ϵ Λ 2 R + U + U T , ( 3 , 2 ) = R U , ( 3 , 3 ) = H R , ( 4 , 2 ) = ϕ ϵ 1 + ϵ Λ , ( 4 , 4 ) = ϕ ϵ 1 + ϵ Λ Λ , ( 5 , 5 ) = θ Z , ( 6 , 6 ) = γ 2 I ] ; Ξ 21 = η ¯ R col { I 1 , I 2 } , Ξ 22 = diag { R , R } ; Ξ 31 = C DK 0 DK 0 0 θ Z S E C 0 0 0 0 0 ; Ξ 33 = diag { I , Z } ; I 1 = [ A , ( 1 θ ) B K , 0 , ( 1 θ ) B K , θ B K , B ] , I 2 = [ 0 , σ B K , 0 , σ B K , σ B K , 0 ] .
Then, CCSs (9) under the stochastic FDI attacks are mean-square asymptotically stable with an H index γ.
Proof. 
Consider a Lyapunov–Krasovskii functional candidate as:
V ( t , x c ) = x c T ( t ) Z x c ( t ) + t η ¯ t x c T ( ν ) H x c ( ν ) d ν + η ¯ t η ¯ t ν t x ˙ c T ( u ) R x ˙ c ( u ) d u d ν .
By using the infinitesimal operator in Definition 1 for V ( t , x c ) , t Θ l , then the mathematical expectation of it can be obtained as:
E { L ( V ( t , x c ) ) } = 2 x c T ( t ) Z I 1 ϝ ( t ) + x c T ( t ) H x c ( t ) x c T ( t η ¯ ) H x c ( t η ¯ ) + η ¯ 2 E { x ˙ c T ( t ) R x ˙ c ( t ) } η ¯ t η ¯ t x ˙ c T ( ν ) R x ˙ c ( ν ) d ν z T ( t ) z ( t ) + γ 2 w η T ( t ) w η ( t ) + z T ( t ) z ( t ) γ 2 w η T ( t ) w η ( t ) ,
where
ϝ T ( t ) [ x c T ( t ) , x c T ( t η ( t ) ) , x c T ( t η ¯ ) , e T ( t ) , f T ( x ) , w η T ( t ) ] ,
E { x ˙ c T ( t ) R x ˙ c ( t ) } = ϝ T ( t ) ( I 1 T R I 1 + I 2 T R I 2 ) ϝ ( t ) .
Furthermore, according to [26], when positive matrix R satisfies U R = R U T U R > 0 , then the cross item in (13) can be dealt with in the following.
η ¯ t η ¯ t x ˙ c T ( ν ) R x ˙ c ( ν ) d ν ς T ( t ) U R ς ( t ) ,
where
ς T ( t ) = [ x c T ( t ) x c T ( t η ( t ) ) , x c T ( t η ( t ) ) x c T ( t η ¯ ) ] .
Applying Schur complement lemma, e T ( i k h ) Λ e ( i k h ) ϕ ϵ 1 + ϵ ϑ ( t k h ) < 0 and Assumption 4, which satisfies θ f T ( x c ( t k h ) ) Z f ( x c ( t k h ) ) θ x c T ( t ) S E C T Z S E C x c ( t ) 0 to (13), the following relationship is held,
E { L ( V ( t ) ) } z T ( t ) z ( t ) + γ 2 w η T ( t ) w η ( t ) ,
by taking H performance into consideration.
Because E { V ( t ) } is continuous in time, then one could integrate the Equation (15) from 0 to + , then:
E { V ( + ) } V ( 0 ) 0 + ( γ 2 w η T ( ν ) w η ( ν ) z T ( ν ) z ( ν ) ) d ν .
In the case of V ( 0 ) = 0 , from (16) the final results are obtained as:
0 + z T ( ν ) z ( ν ) d ν 0 + γ 2 w η T ( ν ) w η ( ν ) d ν ,
which implies that z ( t ) 2 γ w η ( t ) 2 for any non-zero w η ( t ) L 2 [ 0 , ) .
If there is no disturbance, under the condition (11), the CCSs (9) are mean-square asymptotically stable. This completes the proof. □
Remark 3.
Obviously, all the event-triggered thresholds given by Sigmoid-like ETS (5) will be confined within ( 0 , ϕ ϵ 1 + ϵ ] , thus, mean-square asymptotic stability is guaranteed during the proof. In addition, due to Sigmoid-like ETS (5), the threshold can be determined immediately rather than by adding an extra evolution calculation; this is very different from other adaptive ETSs such as [21,22].
On the basis of Theorem 1, the state feedback controller gain as well as event-triggered parameter to CCSs (9) are presented in Theorem 2.
Theorem 2.
For some designed positive scalars σ, η ¯ , ϕ ϵ 1 + ϵ , θ and γ, if there exist real positive matrices X, H ˜ , R ˜ , Λ ˜ and Y with suitable dimensions, such that the LMIs hold
Ξ ˜ 11 Ξ ˜ 21 T Ξ ˜ 31 T Ξ ˜ 21 Ξ ˜ 22 0 Ξ ˜ 31 0 Ξ ˜ 33 < 0 , R ˜ U ˜ T U ˜ R ˜ > 0 ,
where
Ξ ˜ 11 = [ ( 1 , 1 ) = A X + X A T + H ˜ R ˜ , ( 1 , 6 ) = B , ( 1 , 2 ) = ( 1 θ ) B Y + R ˜ T U ˜ T , ( 1 , 3 ) = U ˜ T , ( 1 , 4 ) = ( 1 θ ) B Y , ( 1 , 5 ) = θ B Y , ( 2 , 2 ) = ϕ ϵ 1 + ϵ Λ ˜ 2 R ˜ + U ˜ + U ˜ T , ( 3 , 2 ) = R ˜ U ˜ , ( 3 , 3 ) = H ˜ R ˜ , ( 4 , 2 ) = ϕ ϵ 1 + ϵ Λ ˜ , ( 4 , 4 ) = ϕ ϵ 1 + ϵ Λ ˜ Λ ˜ , ( 5 , 5 ) = θ X , ( 6 , 6 ) = γ 2 I ] ; Ξ ˜ 21 = η ¯ col { I ˜ 1 , I ˜ 2 } , Ξ ˜ 22 = diag { ρ 2 R ˜ 2 ρ X , ρ 2 R ˜ 2 ρ X } ; Ξ ˜ 31 = C X D Y 0 D Y 0 0 θ S E C X 0 0 0 0 0 ; Ξ ˜ 33 = diag { I , X } ; I ˜ 1 = [ A X , ( 1 θ ) B Y , 0 , ( 1 θ ) B Y , θ B Y , B ] , I ˜ 2 = [ 0 , σ B Y , 0 , σ B Y , σ B Y , 0 ] .
Then, the state feedback controller gain to CCSs (9) can be obtained by K = Y X 1 while H performance γ is achieved.
Proof. 
Define X = Z 1 , H ˜ = X H X , R ˜ = X R X , Λ ˜ = X Λ X , U ˜ = X U X . Then, pre- and post-multiplying LMIs (11) left matrix with diag { X , X , X , X , X , I , R 1 , R 1 , I , X } , and right matrix with diag { X , X } , respectively. Next, we utilize X R ˜ 1 X ρ 2 R ˜ 2 ρ X to cope with the nonlinear terms X R ˜ 1 X . Based on the above analysis, we can get the controller gain K . This completes the proof. □
At the end of this section, the Algorithm 1 to find the controller K of CCSs (9) is presented in brief.
Algorithm 1: Find the controller gain K , event-triggered parameter ϕ ϵ 1 + ϵ and
weighting matrix Λ
1: Set the positive scalars ϵ , η ¯ and the initial event-triggered parameter ϕ ϵ . Give the
   increasing step Δ > 0 and an optimization target t o p t < 0 ;
2: While t o p t < 0 ;
3: ϕ ϵ = ϕ ϵ + Δ ;
4: Solve LMIs (18), if there is a feasible solution X, H ˜ , R ˜ and Λ ˜ satisfying LMIs (18),
   go to the next step. Otherwise, return S t e p 1;
5: Return ϕ ϵ Δ and calculate K , Λ .

4. Simulation Examples

To verify the proposed Sigmoid-like event-triggered security control strategy, we conducted the following simulation experiments by using Matlab (R2018b) in Win10 OS with 8 GHz Intel Core i5 CPU, 4 GB RAM.

4.1. Parameters Setting

  • System parameters:
    Set the vehicle to cruise with different velocities: 5 m/s, 10 m/s, 15 m/s. In the system (3), the disturbance is w η ( t ) = 0.01 e t , t [ 0 , 30 ] s, and the other parameters are η d = 0.5 s, σ = 0.16 s, η ¯ = 0.2 s, ρ = 0.63 , γ = 200 , the initial state x c ( 0 ) = [ 0.5 ; 0 ; 1 ] ;
  • FDI attack parameters:
    The probability of FDI attack is θ with f ( x c ( t k h ) ) 2 S E C x c ( t k h ) 2 and f ( x c ( t k h ) ) = [ tanh ( 0.2 x 1 ( t k h ) ) ; tanh ( 0.1 x 2 ( t k h ) ) ; tanh ( 0.2 x 3 ( t k h ) ) ] , where the weighting matrix S E C = diag{ 0.2   0.1   0.2 };
  • Event-triggered parameters:
    The event-triggered related parameter ϵ = 1 , δ ˜ ( 0 ) = 0 , a = 0.01 (a is in Sigmoid-like function).

4.2. Discussions of Simulation Results

In what follows, the following two cases are shown to compare our main results.
  • Case I: FDI-free case
If there are no FDI attacks, we set θ = 0 , the other parameters are the same as above, the controller gain can be solved from Theorem 2.
K ¯ = 1.0373 1.7486 0.8822 ,
with respect to weighting matrix
Λ ¯ = 75.3100 31.3757 154.0642 31.3757 114.8064 230.9179 154.0642 230.9179 764.1387 .
Figure 2 and Figure 3 represent the cruising response with different velocities, positions and accelerations of the vehicle, as well as release intervals when v = 10 m/s. The following results are easily achieved: (1) Figure 2a shows the vehicle tracking path with 5 m/s in a stable way. Figure 3a shows it can cruise at different velocities in a more stable way. Then the proposed Sigmoid-like ETS can realize a favorable balance between the cruising accuracy and the passenger experience; (2) Figure 2d shows 75 packets are allowed to transmit and the average release interval is 0.3824 s. The sampled-data are transmitted only when the CCSs are in a worse case. Figure 3d shows that 110 packets are transmitted and the average release interval is 0.2664 s. Both static ETS and Sigmoid-like ETS can achieve mean-square asymptotic stability; however, the proposed Sigmoid-like ETS shows a better control performance by sending more packets. All these enhancements are due to the change of dynamic event-triggered parameter δ ˜ ( t k h ) , as can be see in Figure 3e.
  • Case II: FDI attack case
If there are random FDI attacks appearing in CCSs (3), we create the following control experiment. It is obvious to see from Figure 4 that CCSs cannot be stable in [23]. Then, one can apply the designed feedback gain K and weighting matrix Λ to the experiment system (9) by Theorem 2. According to Algorithm 1, one can find ϕ ϵ = 0.01 and the corresponding controller gain is:
K = 0.7885 1.7248 0.7910 ,
with respect to weighting matrix
Λ = 18.5638 11.6150 45.2334 11.6150 84.6116 185.6069 45.2334 185.6069 461.4976 .
In order to see the overall change process more clearly, set a longer simulation time of 60 s.
It can be observed from Figure 5 and Figure 6 that: (1) The proposed Sigmoid-like ETS can guarantee the security (mean square asymptotic stability) of cruise control under FDI attacks. On the contrary, the static ETS is seriously disturbed by the FDI attacks; (2) Figure 5d and Figure 6d show that 117, 155 packets are transmitted and the average release interval is 0.5072 , 0.3742 s, respectively. It clear to see that more packets are transmitted under the proposed Sigmoid-like ETS. As we know, a greater number of packets transmission and shorter release intervals are more beneficial to improving control performance. Therefore, the proposed Sigmoid-like ETS releases more packets to make up for the loss of control performance under FDI attacks by adjusting the event-triggered parameter δ ˜ ( t k h ) , see Figure 6e.
For different FDI attack probabilities θ , Table 1 lists the static ETS packets transmitted number N and average transmission period T, the proposed Sigmoid-like ETS packets transmitted number N ˜ and average transmission period T ˜ . It can be seen that the Sigmoid-like ETS scheme sends a large number of packets especially when θ is greater than 0.5 . In Figure 7, instead, the systems achieve unprecedented stability under high-probability attacks θ = 0.7 since the transmission frequency can be adaptively changed to compensate for the influence of FDI attacks. Higher frequency attacks induce the Sigmoid-like ETS scheme to release a great number of packets, see Figure 7d. Obviously, the static ETS cannot stabilize the systems with fewer packets. Theorem 2 can solve the controller gain K until θ = 0.8 , which suggests the upper bound of mean-square asymptotic stability.

5. Conclusions

A novel Sigmoid-like ETS for networked cruise control under FDI attacks has been proposed in this paper. Based on the proposed Sigmoid-like ETS, the mean-square asymptotical stability and stabilization criteria for the CCSs under a class of stochastic FDI attacks have been well derived by Lyapunov theory and the LMIs technique. In fact, both resource-saving and the security of the CCSs can be guaranteed by using the proposed controller algorithm. Finally, some simulation experiments have been shown to verify the proposed Sigmoid-like ETS. Although the proposed event-triggered controller has some advantages, the proposed Sigmoid-like event-triggered scheme does not guarantee an optimal control performance for CCSs; this is left for our future work.

Author Contributions

Conceptualization, P.Z. and H.S.; methodology, C.P.; software, P.Z.; validation, P.Z.; formal analysis, H.S.; investigation, C.T.; writing—original draft preparation, P.Z.; writing—review and editing, H.S. and C.T.; visualization, P.Z.; supervision, C.P. and H.S.; project administration, H.S.; funding acquisition, C.P., H.S. and C.T. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grants 62103229, 61833011, 62173218, 62173206, the Natural Science Foundation of Shandong Province under Grant ZR2021QF026, the China Postdoctoral Science Foundation under Grant 2021M692024, 2021M691849, the International Corporation Project of Shanghai Science and Technology Commission under Grant 21190780300, the National Key R & D Program of China under Grant 2021YFE0193900.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

We would like to thank anonymous reviewers for constructive suggestions to improve the quality of this paper.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Plessen, M.; Bernardini, D.; Esen, H.; Bemporad, A. Spatial-based predictive control and geometric corridor planning for adaptive cruise control coupled with obstacle avoidance. IEEE Trans. Control Syst. Technol. 2018, 26, 38–50. [Google Scholar] [CrossRef]
  2. Dey, K.; Yan, L.; Wang, X.; Wang, Y.; Shen, H.; Chowdhury, M.; Yu, L.; Qiu, C.; Soundararaj, V. A review of communication, driver characteristics, and controls aspects of cooperative adaptive cruise control. IEEE Trans. Intell. Transp. Syst. 2016, 17, 491–509. [Google Scholar] [CrossRef]
  3. Zhu, Y.; Zhao, D.; Zhong, Z. Adaptive optimal control of heterogeneous CACC system with uncertain dynamics. IEEE Trans. Control Syst. Technol. 2019, 27, 1772–1779. [Google Scholar] [CrossRef]
  4. Dolk, V.; Heemels, M. Event-triggered control systems under packet losses. Automatica 2017, 80, 143–155. [Google Scholar] [CrossRef]
  5. Zhang, X.; Wang, Y.; Geng, G.; Yu, J. Delay-optimized multicast tree packing in software-defined networks. IEEE Trans. Serv. Comput. 2021, 1–14. [Google Scholar] [CrossRef]
  6. Ge, X.; Ahmad, I.; Han, Q.-L.; Wang, J.; Zhang, X.-M. Dynamic event-triggered scheduling and control for vehicle active suspension over controller area network. Mech. Syst. Sig. Process. 2021, 152, 107481. [Google Scholar] [CrossRef]
  7. Peng, C.; Tian, Y.; Yue, D. Output feedback control of discrete-time systems in networked environments. IEEE Trans. Syst. Man Cybern. A Syst. Humans 2011, 41, 185–190. [Google Scholar] [CrossRef] [Green Version]
  8. Heemels, W.; Donkers, M. Model-based periodic event-triggered control for linear systems. Automatica 2013, 49, 698–711. [Google Scholar] [CrossRef]
  9. Xu, W.; Ho, D.; Zhong, J.; Chen, B. Event/self-triggered control for leader-following consensus over unreliable network with DoS attacks. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 3137–3149. [Google Scholar] [CrossRef]
  10. Peng, C.; Yang, M.; Zhang, J. Network-based H control for T-S fuzzy systems with an adaptive event-triggered communication scheme. Fuzzy Sets Syst. 2017, 329, 61–76. [Google Scholar] [CrossRef]
  11. Dolk, V.; Borgers, D.; Heemels, W.P.M.H. Output-based and decentralized dynamic event-triggered control with guaranteed Lp- gain performance and Zeno-freeness. IEEE Trans. Autom. Control 2017, 62, 34–49. [Google Scholar] [CrossRef]
  12. Wang, K.; Tian, E.; Liu, J.; Wei, L.; Yue, D. Resilient control of networked control systems under deception attacks: A memory-event-triggered communication scheme. Int. J. Robust Nonlinear Control 2020, 30, 1534–1548. [Google Scholar] [CrossRef]
  13. Guo, G.; Ding, L.; Han, Q.-L. A distributed event-triggered transmission strategy for sampled-data consensus of multi-agent systems. Automatica 2014, 50, 1489–1496. [Google Scholar] [CrossRef]
  14. Gu, Z.; Park, J.; Yue, D.; Wu, Z.; Xie, X. Event-triggered security output feedback control for networked interconnected systems subject to cyber-attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6197–6206. [Google Scholar] [CrossRef]
  15. Sun, H.-T.; Peng, C.; Ding, F. Self-discipline predictive control of autonomous vehicles against denial of service attacks. Asian J. Control 2022, 1–14. [Google Scholar] [CrossRef]
  16. Takemori, K.; Mizoguchi, S.; Kawabata, H.; Kubota, A. In-vehicle network security using secure element. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 2016, E99.A, 208–216. [Google Scholar] [CrossRef]
  17. Sun, H.-T.; Peng, C.; Tan, C. Self-discipline predictive control against large-scale packet dropouts using input delay approach. Int. J. Syst. Sci. 2022, 53, 934–947. [Google Scholar] [CrossRef]
  18. Zivkovic, N.; Saric, A. Detection of false data injection attacks using unscented Kalman filter. J. Mod. Power Syst. Clean Energy 2018, 6, 847–859. [Google Scholar] [CrossRef] [Green Version]
  19. Deng, R.; Zhuang, P.; Liang, H. CCPA: Coordinated cyber-physical attacks and countermeasures in smart grid. IEEE Trans. Smart Grid 2017, 8, 2420–2430. [Google Scholar] [CrossRef]
  20. Tian, E.; Peng, C. Memory-based event-triggering H load frequency control for power systems under deception attacks. IEEE Trans. Cybern. 2020, 50, 4610–4618. [Google Scholar] [CrossRef]
  21. Sun, H.; Peng, C.; Yue, D.; Wang, Y.; Zhang, T. Resilient load frequency control of cyber-physical power systems under QoS-dependent event-triggered communication. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 2113–2122. [Google Scholar] [CrossRef]
  22. Liu, J.; Gu, Y.; Zha, L.; Liu, Y.; Cao, J. Event-triggered H load frequency control for multiarea power systems under hybrid cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1665–1678. [Google Scholar] [CrossRef]
  23. Peng, C.; Yang, T. Event-triggered communication and H control co-design for networked control systems. Automatica 2013, 49, 1326–1332. [Google Scholar] [CrossRef]
  24. Musleh, A.; Chen, G.; Dong, Z. A survey on the detection algorithms for false data injection attacks in smart grids. IEEE Trans. Smart Grid 2019, 11, 2218–2234. [Google Scholar] [CrossRef]
  25. Liu, J.; Xia, J.; Tian, E.; Fei, S. Hybrid-driven-based H filter design for neural networks subject to deception attacks. Appl. Math. Comput. 2018, 320, 157–174. [Google Scholar] [CrossRef]
  26. Han, Q.-L. Absolute stability of time-delay systems with sector-bounded nonlinearity. Automatica 2005, 41, 2171–2176. [Google Scholar] [CrossRef]
Figure 1. The networked cruise control systems.
Figure 1. The networked cruise control systems.
Processes 10 01326 g001
Figure 2. Simulation results under static ETS ( δ ˜ ( t k h ) 0.01 ): velocities (a); positions (b); accelerations (c); and release intervals with v 2 (d).
Figure 2. Simulation results under static ETS ( δ ˜ ( t k h ) 0.01 ): velocities (a); positions (b); accelerations (c); and release intervals with v 2 (d).
Processes 10 01326 g002
Figure 3. Simulation results under Sigmoid-like ETS: velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); evolution of δ ˜ ( t k h ) (e).
Figure 3. Simulation results under Sigmoid-like ETS: velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); evolution of δ ˜ ( t k h ) (e).
Processes 10 01326 g003
Figure 4. Simulation results under Sigmoid-like ETS and FDI attacks ( θ = 0.2 ) in [23]: velocities (a); positions (b); accelerations (c).
Figure 4. Simulation results under Sigmoid-like ETS and FDI attacks ( θ = 0.2 ) in [23]: velocities (a); positions (b); accelerations (c).
Processes 10 01326 g004
Figure 5. Simulation results under static ETS and FDI attacks ( θ = 0.2 ): velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); signals after FDI attacks (e).
Figure 5. Simulation results under static ETS and FDI attacks ( θ = 0.2 ): velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); signals after FDI attacks (e).
Processes 10 01326 g005
Figure 6. Simulation results under Sigmoid-like ETS and FDI attacks ( θ = 0.2 ): velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); evolution of δ ˜ ( t k h ) (e); signals after FDI attacks (f).
Figure 6. Simulation results under Sigmoid-like ETS and FDI attacks ( θ = 0.2 ): velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); evolution of δ ˜ ( t k h ) (e); signals after FDI attacks (f).
Processes 10 01326 g006
Figure 7. Simulation results under Sigmoid-like ETS and FDI attacks ( θ = 0.7 ): velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); evolution of δ ˜ ( t k h ) (e); signals after FDI attacks (f).
Figure 7. Simulation results under Sigmoid-like ETS and FDI attacks ( θ = 0.7 ): velocities (a); positions (b); accelerations (c); release intervals with v 2 (d); evolution of δ ˜ ( t k h ) (e); signals after FDI attacks (f).
Processes 10 01326 g007
Table 1. Packets number N, N ˜ and average transmission period T, T ˜ with different θ .
Table 1. Packets number N, N ˜ and average transmission period T, T ˜ with different θ .
θ N N ˜ T T ˜
0.2751140.38240.2599
0.3721110.33210.2508
0.4631180.45630.2536
0.5611580.46330.1271
0.6694180.40460.0710
0.77123570.41890.0126
0.8----
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zhang, P.; Sun, H.; Peng, C.; Tan, C. Sigmoid-like Event-Triggered Security Cruise Control under Stochastic False Data Injection Attacks. Processes 2022, 10, 1326. https://doi.org/10.3390/pr10071326

AMA Style

Zhang P, Sun H, Peng C, Tan C. Sigmoid-like Event-Triggered Security Cruise Control under Stochastic False Data Injection Attacks. Processes. 2022; 10(7):1326. https://doi.org/10.3390/pr10071326

Chicago/Turabian Style

Zhang, Pengfei, Hongtao Sun, Chen Peng, and Cheng Tan. 2022. "Sigmoid-like Event-Triggered Security Cruise Control under Stochastic False Data Injection Attacks" Processes 10, no. 7: 1326. https://doi.org/10.3390/pr10071326

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop