Next Article in Journal
Physics-Informed Neural Networks for Unmanned Aerial Vehicle System Estimation
Previous Article in Journal
Multi-UAV Obstacle Avoidance and Formation Control in Unknown Environments
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Guaranteed Performance Resilient Security Consensus Control for Nonlinear Networked Control Systems Under Asynchronous DoS Cyber Attacks and Applications on Multi-UAVs Networks

1
Air Traffic Control and Navigation College, Air Force Engineering University, Xi’an 710051, China
2
Institute of Systems Engineering, Academy of Military Sciences, Beijing 100101, China
3
Equipment Management and Unmanned Aerial Vehicle Engineering College, Air Force Engineering University, Xi’an 710051, China
*
Authors to whom correspondence should be addressed.
Drones 2024, 8(12), 715; https://doi.org/10.3390/drones8120715
Submission received: 11 September 2024 / Revised: 8 October 2024 / Accepted: 16 October 2024 / Published: 29 November 2024

Abstract

:
This paper investigates the guaranteed performance resilient security consensus control of nonlinear networked control systems (NCSs) subject to asynchronous denial-of-service (DoS) cyber attacks, where the communication channel disruptions and recoveries occur randomly. The main works of this paper are outlined as follows: (1) a rigorous quantitative modeling of asynchronous DoS cyber attacks is formulated, leveraging connectivity analysis and the graph theory; (2) an innovative guaranteed performance function is introduced, which imposes constraints on the system’s convergence behavior while alleviating restrictions on initial tracking errors; (3) to address the challenge of estimating unmeasurable system states arising from the output-feedback scheme, a novel fuzzy state observer is devised; and (4) based on the aforementioned designs, a switching guaranteed performance resilient security consensus controller is proposed. This controller is tailored to the network connectivity characteristics of NCSs, ensuring resilient convergence of the system despite asynchronous DoS attacks. Notably, consensus tracking errors are maintained within predefined performance bounds. The experiment results of numerical simulation and hardware-in-the-loop simulation of multiple unmanned aerial vehicles (multi-UAVs) networks illustrate the effectiveness and practicality of proposed control scheme.

1. Introduction

Recently, owing to their profound practical significance and associated extensive engineering applications, networked control systems (NCSs), exemplified by distributed power grid systems and multi-UAV (unmanned aerial vehicle) networks, have garnered significant attention, with the development of wireless communication protocols, network architectures, distributed control and computation, and advanced real-time embedded systems. As a result, the NCS domain has witnessed a proliferation of groundbreaking theoretical methodologies and engineering application research outcomes. For example, Jafari et al. [1] proposed an intelligent adaptive control strategy for unmanned aerial systems using an artificial neural network, considering system uncertainties and external disturbances. To achieve the task of controlling collective behavior, Iudice et al. [2] proposed a pinning control scheme for networked dynamical systems, where the conditions guaranteeing that all the nodes in a given strongly connected component of the network achieve bounded convergence to the trajectory of the pinner are derived. Sun et al. [3] developed a disturbance rejection control framework for NCSs subject to large input and output delays using a subpredictor-based extended state observer. To achieve the output feedback tracking of NCSs, Mu et al. [4] investigated an output tracking predictive control strategy where two-channel random communication constraints are considered. To efficiently reduce unnecessary communication transmissions, Yu et al. [5] introduced a periodic event-triggered control protocol for NCSs subject to large transmission delays, in which the transmitted signal may arrive at the destination node after the next transmission occurs. For complex switching networks in power systems, Cui et al. [6] proposed an adaptive funnel synchronization control scheme with a prespecified funnel boundary to ensure that the output is maintained within prescribed constrained regions. To achieve the joint channel access and power control optimization in large-scale UAV networks, a hierarchical mean field game approach was constructed by Chen et al. [7], in which the fast optimization approach is presented for networks with limited computing capability. However, it is imperative to acknowledge that the aforementioned state-of-the-art consensus control design methodologies pertaining to NCSs are fundamentally grounded in the assumption of a secure communication environment, devoid of any cyber attacks. In practical engineering application, the NCSs are vulnerable to various kinds of risk factors such as DoS cyber attacks, posing significant threats to system security and stability. With the aim of mitigating the impact of DoS cyber attacks on communication networks, several research studies have been conducted recently. For instance, Wu et al. [8] proposed a sampled-data-based secure control approach for NCSs under random DoS cyber attacks, where the probability of attack occurrence and the resultant number of maximum allowable consecutive packet dropouts was successfully calculated. Wan et al. [9] proposed an event-triggered secure consensus control strategy for DC microgrids under DoS cyber attacks, with a Zeno-free event-triggered aperiodic communication strategy designed to relieve the communication burden of the controller. Considering hidden DoS cyber attacks, represented by strong concealment of attack behavior, Jiao et al. [10] developed an observed-mode-dependent nonfragile control scheme for NCSs, which can stabilize the system even if actual attack modes are unavailable. For switched nonlinear systems subject to DoS cyber attacks, Xie et al. [11] proposed a secure switching event-triggered adaptive out-feedback control method. Furthermore, Fan et al. [12] proposed a resilient cooperative optimization control method for fuzzy nonlinear multi-agent systems (MASs) subject to DoS cyber attacks. Despite the myriad of groundbreaking accomplishments achieved in both theoretical and practical realms within the domain of resilient security control, there remains a notable scarcity of pertinent findings pertaining to resilient security consensus strategies for nonlinear NCSs under the challenge of asynchronous DoS cyber attacks, which is the first inspiration of this paper.
On the other hand, the stability and collaborative performance of NCSs serve as critical criteria for assessing control effectiveness. In various practical applications, predefined transient performance and optimum steady-state tracking precision also raise many concerns. Considering this perspective, the effective enhancement of the system’s convergence performance represents a focal research topic within this field. Prescribed performance control (PPC) is an effective method to ensure the prescribed convergence performance, providing a novel design concept to guarantee the desired transient steady-state performance of the NCSs. In the field of prescribed performance consensus control, numerous representative results have been reported. Bu et al. [13] proposed a PPC methodology called fragility-avoidance PPC for waverider vehicles with sudden disturbances based on fuzzy neural approximation. For strict-feedback systems with mismatched uncertainties, Mao et al. [14] developed an adaptive fuzzy control technique to provide global prescribed performance with prescribed-time convergence. Considering integer-order nonlinear systems, an adaptive fractional backstepping control framework was designed by Li et al. [15] to achieve the prescribed performance convergence, which describes the convergence rate and largest overshoot of the output error into a unitary framework. Li et al. [16] investigated the reinforcement learning-based adaptive fuzzy optimization PPC problem for a third-order nonlinear vehicle platoon. With the aid of prescribed performance technique, the designed quadratic spacing errors can be ensured to remain within a preset region. To guarantee the flexible prescribed performance and low transmission burdens of strict-feedback systems, Li et al. [17] proposed a dual-channel event-triggered robust adaptive control strategy, where the triggering mechanism is considered for the control law and the parameter estimator simultaneously. It is worth noting that although the above-mentioned methodologies achieve the PPC objective effectively, all of the involved dynamics are only single-agent systems. Recently, there has also been some progress in the field of PPC for networked systems. To list a few relevant studies, Liu et al. [18] addressed the issue of decentralized adaptive event-triggered fault-tolerant synchronization tracking control for multiple unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs) with prescribed performance subject to actuator faults and external disturbances. Yu et al. [19] proposed a reinforcement learning-based fractional-order adaptive fault-tolerant formation control for networked UAVs with prescribed performance. For multiple QUAVs, Cui et al. [20] developed an event-triggered distributed fixed-time adaptive attitude control with prescribed performance. Chen et al. [21] proposed a human-in-the-loop consensus tracking control method for UAV systems via an improved prescribed performance approach. Moreover, for high-order nonlinear multiagent systems under directed communication topology and unknown control directions, Li et al. [22] constructed a prescribed performance global consensus tracking control method. In [23], the authors investigated the prescribed performance output-feedback cooperative control of multiagent systems with nonparametric uncertainties. However, the conventional PPC strategy, as advocated in the aforementioned literature, is inherently limited to NCSs or MASs operating within continuous and unperturbed communication networks. In scenarios where these networks are subjected to malicious attacks orchestrated by hackers or adversaries, leading to the disruption of communication links, the efficacy of control strategies is jeopardized, potentially culminating in the failure of these strategies and, ultimately, the collapse of the entire system. Therefore, the performance constrained resilient security consensus control is still worthy of further study and exploration, which is another inspiration of this work.
Inspired by the preceding discourse, this paper delves into the guaranteed performance resilient security consensus control for nonlinear networked control systems (NCSs) in the scenario of asynchronous DoS cyber attacks. Moreover, the practical applications of the constructed control framework are further investigated based on multi-UAV networks. The key contributions of this work can be summarized as follows:
  • Different from state-of-the-art consensus tracking control schemes [24,25,26], which obtain the system states using sensor measurements, a more practical attack pattern-based fuzzy state observer strategy is proposed in this paper to effectively estimate the inaccessible system information under the output-feedback framework, even in the scenario of asynchronous DoS cyber attacks.
  • Compared with existing prescribed performance consensus control methodologies [27,28], which impose stringent constraints on the initial system states, the constricted improved guaranteed performance consensus control framework, which significantly alleviates restrictions on initial conditions, is applied for the first time to an NCS suffering asynchronous DoS cyber attacks. Technically, a pioneering performance function is presented with the constrained error system eventually converted into the equivalent unconstrained counterpart, thereby rendering it inherently immune to initial consensus tracking errors. Further, a new barrier Lyapunov function embedded with the characteristics of DoS signals is built, based on which the consensus tracking accuracy and the settling time can be preset arbitrarily according to engineering requirements.
  • Owing to the existence of DoS cyber attacks, the consensus strategy in [29,30] becomes inapplicable. To overcome this obstacle, a novel guaranteed performance resilient security consensus control scheme for nonlinear NCSs is proposed for the first time, where the resilient controller can be switched according to the attack patterns. Further, the sufficient conditions of resilient convergence of the NCSs are formulated by the linear matrix inequalities (LMIs) related to the DoS cyber attack strength parameters using the Lyapunov stability proof process.

2. Problem Formulation and Preliminaries

In this section, the considered security control problem is introduced. Then, the model of asynchronous DoS cyber attacks is presented. In addition, the basic graph theory and several useful mathematical lemmas are given.

2.1. Dynamical Model of Nonlinear NCSs

Consider a nonlinear networked control system (NCS) consisting of N follower agents, i = 1 , 2 , , N , and one leader agent. The  i th follower is modeled by
x ˙ i , m t = x i , m + 1 t + f i , m x ¯ i , m t + d i , m t x ˙ i , n i t = u i t + f i , n i x ¯ i , n i t + d i , n i t y i t = x i , 1 t , m = 1 , 2 , n i 1
where x ¯ i , m = [ x i , 1 , , x i , m ] R m ( m N 1 : n ) represents the system state vector; f i , m ( x ¯ i , m ( t ) ) : R m R denotes the unknown continuous function; d i , m ( t ) represents the external disturbances satisfying | d i , m ( t ) | d i where d i > 0 is an unknown constant; and u i ( t ) R denotes the control input signal for the i th follower. In this paper, we consider the scenario that only the outputs of followers y i are available for control protocol design.

2.2. Basic Graph Theory

The topology of an NCS under asynchronous DoS attacks can be represented as a directed graph G = ( V , E , A ) , in which V is the node set, E is the edge set, and  A = { a i j } R N × N is the adjacency matrix that denotes the communication between nodes. If node ν i has access to the information of node ν j without attack, a i j > 0 , else, a i j = 0 . The Laplacian matrix is given by L = D A , where the indegree matrix D = diag { d 1 , , d N } with d i = j = 1 N a i j . The information exchange matrix is represented by L ¯ = L + B , where B = diag { b 1 , , b N } denotes the weight of the edge from leader to follower agent ν i .

2.3. Mathematical Preliminaries

Lemma 1.
[20]: For x R , y R , p R , q R , if  p > 1 , q > 1 , and  ( p 1 ) ( q 1 ) = 1 , then for any a > 0 , one has x y a p p | x | p + 1 q a q | y | q .
Lemma 2.
[23]: For unknown function f ( x ) defined on a compact set Ω, there exists a fuzzy logic system (FLS) such that sup x Ω f ( x ) θ * ϕ ( x ) δ , where γ * = [ γ 1 * , , γ m * ] denotes the ideal weight vector with m > 1 being the number of fuzzy rules. ϕ ( x ) = [ ϕ 1 ( x ) , , ϕ m ( x ) ] T / k = 1 m ϕ k ( x ) is the fuzzy basis function, which is chosen as the Gaussian function ϕ k ( x ) = exp [ ( x μ k ) ( x μ k ) / η k 2 ] , where  μ k = [ μ k , 1 , , μ k , n ] and η k represent the center vector and width, respectively. Moreover, δ denotes the approximation error.

2.4. Asynchronous DoS Attacks

The data sensor of the i th agent measures the neighbors’ real-time output signals y j , j N . Due to the open communication environment, the network may be attacked by malicious adversaries or hackers. In this work, we consider the random occurrence of asynchronous DoS cyber attacks, which may disrupt communication transmissions within channels. In contrast to the security control strategies executed under synchronous DoS attacks or periodic DoS attacks in state-of-the-art works, we present a more general and practical resilient security control method, in which the asynchronous DoS attack pattern is considered, and  the disconnection and restoration of the communication channels is random. We define the set of resulting topologies as G ¯ = G 1 , , G M . Then, we have G ¯ = G ¯ S G ¯ U and P = P S P U , where G ¯ S and G ¯ U represent the sets of connected graphs and unconnected graphs, respectively. In addition, P = P S P U represents the set of all possible topology combinations, where P S denotes the set of secure topologies and P U denotes the set of topologies under attack.
We define 0 < τ 0 < τ 1 < < τ M σ ( 0 , t ) as the attack topology switching instants, with  M σ ( 0 , t ) being the number of switches during ( 0 , t ) . According to the above analysis, two types of DoS attacks can be summarized:
Definition 1.
Connectivity-Sustained DoS Attack: The network connectivity is sustained and there exists at least one directed spanning tree (see Figure 1a).
Definition 2.
Connectivity-Broken DoS Attack: The network connectivity is broken with no directed spanning tree among the network topology (see Figure 1b,c).
We set the activation duration of a specific topology G s , s P under asynchronous DoS attacks as Ξ s [ τ , t ) , which can be calculated by
Ξ s [ τ , t ) = σ ( τ l ) = s τ l , τ l + 1 τ , t
where τ represents the initial time of the observation interval, τ l denotes the specific time instant within the interval, and  σ ( τ l ) represents the topology switching signal at time τ l , indicating the active topology during the DoS attack.
Moreover, from a practical point of view, the DoS attack strength is usually limited, which can be described by following assumptions:
Assumption 1.
(DoS Duration): There exist constants T U 1 and ρ U > 0 such that
Ξ ¯ s ( τ , t ) t τ T U + ρ U , s P U ,
where | Ξ ¯ s ( τ , t ) | , s P U denotes the total period of the connectivity-broken DoS attack.
Assumption 2.
(DoS Frequency): There exist constants τ U 0 and η U > 0 such that
n ¯ s ( τ , t ) t τ τ U + η U , s P U ,
where | n ¯ s ( τ , t ) | , s P U denotes the attack frequency, and  τ 0 , t 0 , with  τ t .
Remark 1.
The above assumptions about the strength of DoS attack signals are obviously reasonable because the attack resources are limited in practical engineering control, which is the consensus in the field of attack-oriented security control. The constraints on DoS duration (3) and DoS frequency (4) are widely considered in resilient security control designs [9,11,12].
Control Objective: The control objective of this paper is to design a resilient security guaranteed performance control framework such that the distributed consensus of nonlinear NCSs (1) is achieved in spite of asynchronous DoS cyber attacks. Meanwhile, the consensus tracking errors are guaranteed to be restrained within the pre-designated performance bounds. The control design process is depicted in Figure 2.

3. Adaptive Guaranteed Performance Resilient Security Consensus Control Design

In this section, a novel guaranteed performance function is proposed, which relaxes the restriction on initial tracking errors. Moreover, a fuzzy state observer is designed to estimate the unavailable states of the network. Then, a fuzzy-adaptive guaranteed performance resilient security consensus control protocol is proposed.

3.1. An Improved Guaranteed Performance Function

Definition 3.
Performance Scalar Function: A continuous function ϑ i ( t ) is called a performance scalar function if it satisfies the following properties:
(i) 
ϑ i ( t ) is at least second-order differentiable;
(ii) 
0 t T p , ϑ i ( t ) is an increasing function with ϑ i ( T p ) = 1 / ρ i ;
(iii) 
T p t + , ϑ i ( t ) = 1 / ρ i is a constant, where  0 < ρ i < 1 is a preassigned performance parameter, and  T p denotes the prescribed settling time.
In this paper, the improved performance scalar function is designed as
ϑ i t = 1 1 ρ i T p t T p k 1 e k 2 t + ρ i , t < T p 1 ρ i , t T p
where k 1 > 0 and k 2 > 0 are constants to adjust the decay rate.
In the following, we further design the guaranteed performance function based on the performance scalar function (5).
The guaranteed performance function is defined as
ζ i t = η i ϑ i 2 t 1 , i = 1 , 2 , , N
where η i > 0 is a design parameter. Moreover, taking the time derivative of ζ i ( t ) yields that ζ ˙ i ( t ) = η i / ϑ i 2 ( t ) 1 . From (5), ϑ i ( t ) is increasing; thus ζ i ( t ) , is a decreasing function from ζ i ( 0 ) = + to ζ i ( T p ) = ρ i η i / 1 ρ i 2 .
The control objective is to develop a control protocol such that the local consensus errors of all followers is constrained within the performance bounds, i.e.,  ζ i ( t ) < e i < ζ i ( t ) , which implies that
< e i < , t = 0 η i ϑ i 2 t 1 < e i < η i ϑ i 2 t 1 , 0 < t < T p ρ i η i 1 ρ i 2 < e i < ρ i η i 1 ρ i 2 , t T p .
Based on the guaranteed performance function (6), the following error transformation function is further introduced:
ξ i e i = e i e i 2 + η i , i = 1 , 2 , , N
which satisfies that ζ i ( ξ i ( e i ) ) = e i , i.e.,  ξ i ( e i ) is the inverse function of ζ i ( t ) . According to (5) and (6), it can be derived that the objective ζ i ( t ) < e i < ζ i ( t ) can be achieved by ensuring 1 / ϑ i ( t ) < ξ i ( e i ) < 1 / ϑ i ( t ) .
Remark 2.
Compared with existing performance constrained control strategies [27,28], the proposed improved guaranteed performance function (6) is more advanced and practical from the perspective of convergence speed and relaxing initial condition. Concretely, (1) the decay rate of the performance function ϑ i ( t ) can be adjusted by tuning the design parameters k 1 and k 2 . The large k 1 , small k 2 , and small T p lead to fast convergence; and (2) the proposed guaranteed performance function relaxes the restriction on the initial consensus errors. ϑ i ( 0 ) = 1 implies that ϑ i ( 0 ) = + , which extends the initial boundary to the entire performance domain. Thus, the initial states of the system can be arbitrarily assigned without the need to satisfy initial performance constraints.

3.2. Fuzzy State Observer Design

Note that only the first-order state x i , 1 (i.e., output signal y i ) is accessible, and the others, i.e., x i , m , k = 2 , , n i , are unavailable. Thus, the network state information x i , m , k = 2 , , n i cannot be directly used for control design. Given this consideration, a fuzzy state observer is designed to estimate x i , m under asynchronous DoS cyber attack conditions.
Based on the aforementioned discussions, the fuzzy state observer for the i th follower, i = 1 , 2 , , N is designed as
x ^ ˙ i , m = x ^ i , k + 1 + γ ^ i , m ϕ i , m τ i , m i , m y ^ i y i x ^ ˙ i , n i = u i + γ ^ i , n i ϕ i , n i τ i , n i i , n i y ^ i y i y ^ i = x ^ i , 1 , m = 1 , 2 , n i
where γ ^ i , m is the estimation of the ideal fuzzy weight parameter vector γ i , m * , which satisfies that γ ^ i , m = γ i , m * γ ˜ i , m , with  γ ˜ i , m being the estimated error, and  τ i , m = [ x i , 1 , x ^ i , 2 , , x ^ i , m ] .
The selection principle of the design parameters i , m , k N 1 : n i is given as follows.
Firstly, we define the observer gain matrix as
A i = i , 1 , I n 1 i , n i 0 , i = 1 , 2 , , N .
If t Ξ s ( τ , t ) , s P S , i.e., the topology of the NCS (1) maintains connectivity under the asynchronous DoS attacks, then the gain matrix A i is selected to be Hurwitz, i.e., there exists a positive definite symmetric matrix P S , i such that A i P S , i + P S , i A i < k i s Q S , i for any positive definite symmetric matrix Q S , i and design parameter k i > 0 , to be determined later. Conversely, if  t Ξ s ( τ , t ) , s P U , i.e., the NCS (1) is suffering from connectivity-broken DoS attacks, then the gain matrix A i is Hurwitz, i.e., there exists a positive definite symmetric matrix P U , i such that A i P U , i + P U , i A i < k i a Q U , i for any positive definite symmetric matrix Q U , i .
For the i th follower agent, the unknown function f i , m ( x ¯ i , m ) is approximated by the following fuzzy logic system:
f i , m x ¯ i , m = γ i , m * ϕ i , m x ¯ i , m + δ i , m = γ i , m * ϕ i , m τ i , m + δ ¯ i , m
where δ ¯ i , m = γ i , m * ( ϕ i , m ( τ i , m ) ϕ i , m ( x ¯ i , m ) ) + δ i k .
We define the fuzzy estimation error as ω i , m = x i , m x ^ i , m , i = 1 , 2 , , N ,where ω i , n i + 1 = 0 . Then, the total observation error for the i th follower, i = 1 , 2 , , N , is defined as ω i = [ ω i , 1 , , ω i , n i ] . Considering both the cases of connection-sustained and connection-broken DoS cyber attacks, we choose the switching Lyapunov function as
V i , 0 = ω i s P S , i ω i s , t Ξ s ( τ , t ) , s P S ω i a P U , i ω i a , t Ξ s ( τ , t ) , s P U .
where ω i s represents the fuzzy estimation error associated with the secure state of the system, and  ω i u represents the fuzzy estimation error associated with the attacked state of the system.
Invoking (1), (9), and (12), one has ω ˙ i , m = ω i , k + 1 + γ ˜ i , m ϕ i , m τ i , m + d i , m i , m ω i , 1 + δ ¯ i , m , which leads to
V ˙ i , 0 < k i s ω i s Q S , i ω i s + 2 ω i s P S , i Γ i s + Σ i s , s P S k i a ω i a Q U , i ω i a + 2 ω i a P U , i Γ i a + Σ i a , s P U
where Γ i = [ Γ i , 1 , Γ i , 2 , Γ i , n i ] with Γ i , m = γ ˜ i , m ϕ i , m ( τ i , m ) , and  Σ i = [ Σ i , 1 , , Σ i , n i ] with Σ i , m = d i , m + δ ¯ i , m . From (13), the quadratic terms k i s ω i s Q S , i ω i s and k i a ω i a Q U , i ω i a in V ˙ i , 0 make the Lyapunov function decrease and increase when t Ξ s ( τ , t ) , s P S , and  t Ξ s ( τ , t ) , s P U , respectively. Therefore, there may exist resilient fluctuation of the system performance when the network is suffering from connectivity-broken DoS attacks. The resilience analysis of the system will be discussed in subsequent sections. By using Lemma 1 and noting ϕ i , m ( τ i , m ) ϕ i , m ( τ i , m ) 1 , we can derive 2 ω i s P i γ i s ω i s ω i s + P i , S 2 m = 1 n i γ ˜ i , m s γ ˜ i , m s , and  2 ω i s P i , S Σ i s ω i s ω i s + P i , S 2 m = 1 n i ( d i , m s + δ ¯ i , m s ) 2 .
When t Ξ s ( τ , t ) , s P S , the network still maintains connectivity in spite of the DoS attack signals. Thus, it is concluded from (13) that
V ˙ i , 0 s k i s λ min Q S , i 2 ω i s ω i s + P S , i 2 M = 1 n i d i , m s + δ ¯ i , m s 2 + P S , i 2 m = 1 n i γ ˜ i , m s γ ˜ i , m s .
When t Ξ s ( τ , t ) , s P U , the connectivity is broken by asynchronous DoS attacks, and it can be concluded from (13) that
V ˙ i , 0 a k i a λ min Q U , i + 2 ω i a ω i a + P U , i 2 m = 1 n i d i , m a + δ ¯ i , m a 2 + P U , i 2 m = 1 n i γ ˜ i , m a γ ˜ i , m a .
Then, combining (14) and (15) yields
V ˙ i , 0 κ S , i ω i s ω i s + P S , i 2 m = 1 n i ς i , m s 2 + γ ˜ i , m s γ ˜ i , m s , s P S κ U , i ω i a ω i a + P U , i 2 m = 1 n i ς i , m u 2 + γ ˜ i , m a γ ˜ i , m a ,   s P U .
where the observer parameter satisfies ( k i s λ min ( Q S , i ) 2 ) < κ S , i , and  ( k i a λ min ( Q U , i ) + 2 ) > κ U , i , and  ς i , m = d i , m + δ ¯ i , m is a positive constant.

3.3. Guaranteed Performance Resilient Security Controller Design

Information transmission within the communication channel is interrupted under DoS cyber attacks, which may lead to network collapse. Therefore, the existing common consensus design approaches are no longer valid in the face of malicious DoS cyber attacks. The attack compensator signal is introduced to reestablish the transmission of information during the DoS-active period using the latest successfully captured control signal, which is formulated as
y j a = y j T i j , l a , t [ T i j , l a , T i j , l s ) y j t , t [ T i j , l s , T i j , l + 1 a )
where T i j , l a and T i j , l s represent the beginning instant and ending instant of the l th DoS attack active interval for the specific communication channel ( i , j ) .
To further achieve the demand of guaranteed performance convergence, we introduce the coordinate transformation as ξ ¯ i ( t ) = ϑ i ( t ) ξ i ( e i ) . Then, the performance-constrained consensus tracking error is defined as
s i , m = ξ ¯ i t 1 ξ ¯ i 2 t , m = 1 x ^ i , m β i , m , m = 2 , 3 , , n i
where the attack-oriented local consensus tracking error e i is given as e i = j = 1 N a i j ( y i y j a ) + b i ( y i y r a ) . The update of the filter β i , m is driven by
β ˙ i , m t = β i , m t + α i , m 1 t q i , m , m = 2 , 3 , , n i β i , m 0 = α i , m 1 0
where q i , m is a positive filter parameter, and α i , m 1 denotes the virtual control signal which will be determined later. Moreover, the filtering error is defined as ε i , m = β i , m α i , m 1 .
In the following, we will present the derivation process of the resilient security guaranteed performance controller step by step using the backstepping design method.
Step 1: By invoking (18), it can be deduced that
s ˙ i , 1 = 1 + ξ ¯ i 2 t 1 ξ ¯ i 2 t 2 ξ ¯ ˙ i t = Δ ζ i a ξ ¯ i ξ ¯ ˙ i t .
From the definition of ξ ¯ i ( t ) , we have ξ ¯ ˙ i t = ϑ ˙ i ( t ) ξ i ( e i ) + ϑ i ( t ) ξ ˙ i ( e i ) . Then, by considering above-mentioned results, one can derive that
ξ ˙ i e i = η i e i 2 + η i e i 2 + η i e ˙ i = Δ ζ i b e i e ˙ i .
The design process of the guaranteed performance resilient security consensus controller will be divided into two parts in light of the attack patterns.
When the network topology remains connected under asynchronous DoS attacks, i.e.,  t Ξ s ( τ , t ) , s P S , noting that the compensation signal y j a = y j ( T i j , l a ) is a constant during [ T i j , l a , T i j , l s ) , combining (1) and (20) leads to e ˙ i s = ( d i + b i ) ( ω i , 2 s + s i , 2 s + ε i , 2 s + α i , 1 s + f i , 1 s ( x ¯ i , 1 ) + d i , 1 s )   q N i , s s a i q ( ω q , 2 s + x ^ q , 2 s + f q , 1 s ( x ¯ q , 1 ) + d i , 1 s ) b i y ˙ r a , with N i , s being the neighbors of the i th follower where channel ( i , j ) is not attacked, from which we further derive
s ˙ i , 1 s = ϕ i , 1 s [ ω i , 2 s + s i , 2 s + ε i , 2 s + α i , 1 s + f i , 1 s x ¯ i , 1 b i d i + b i y ˙ r a + d ¯ i , 1 s q N i , s a i q d i + b i ω q , 2 s + x ^ q , 2 s + f q , 1 s x ¯ q , 1 ] + ϕ i , 2 s
where the functions ϕ i , 1 s , ϕ i , 1 s , and  d i , 1 are given as ϕ i , 1 s = ζ i a ϑ i ( t ) ζ i b ( d i + b i ) , ϕ i , 2 s = ζ i a ϑ ˙ i ( t ) ξ i ( e i ) , and  d ¯ i , 1 s = d i , 1 s q N i , s a i q d i + b i d q , 1 s . Moreover, the unknown nonlinear function is approximated by the fuzzy logic system, which will be illustrated in detail later.
We define the candidate Lyapunov function as V i , 1 s = V i , 0 s + 1 2 s i , 1 s 2 + m = 0 1 1 2 r i , m s γ ˜ i , m s γ ˜ i , m s , where r i , m s is a positive design parameter. According to Young’s inequality, it holds that s i , 1 s ϕ i , 1 s ( ω i , 2 s + ε i , 2 s + δ i , 0 s + δ i , 1 s + d ¯ i , 1 s q N i , s a i q d i + b i ω q , 2 s )   5 + | N i , s | 2 s i , 1 s 2 ϕ i , 1 s 2 + 1 2 ( ω i , 2 s 2 + ε i , 2 s 2 + Δ i , 1 s 2 + q N i , s ( a i q d i + b i ) 2 ω q , 2 s 2 ) , where Δ i , 1 s = δ i , 0 s 2 + δ i , 1 s 2 + d ¯ i , 1 s 2 , and  | N i , s | represents the number of followers that send state information to the i th follower while the communication channel ( i , j ) is not under attack. Then, combining (11), (13), and (22) yields
V ˙ i , 1 s = V ˙ i , 0 s + s i , 1 s [ ϕ i , 1 s ( s i , 2 s + 5 + N i , s 2 s i , 1 s ϕ i , 1 s b i d i + b i y ˙ r a + α i , 1 s q N i , s a i q d i + b i x ^ q , 2 s + m = 0 1 γ ^ i , m s ϕ i , m s τ i , m s ) + ϕ i , 2 s ] + 1 2 ω i , 2 s 2 + ε i , 2 s 2 + Δ i , 1 s 2 + q N i , s a i j d i + b i 2 ω q , 2 s 2 m = 0 1 1 r i , m s γ ˜ i , m s γ ^ ˙ i , m s r i , m s s i , 1 s ϕ i , 1 s ϕ i , m s τ i , m s .
The first-order virtual control signal is designed as
α i , 1 s = c i , 1 s s i , 1 s ϕ i , 1 s m = 0 1 γ ^ i , m s ϕ i , m s τ i , m s 5 + N i , s 2 s i , 1 s ϕ i , 1 s + q N i , s a i q d i + b i x ^ q , 2 s + b i d i + b i y ˙ r a ϕ i , 2 s ϕ i , 1 s , i = 1 , 2 , , N
where c i , 1 s is a positive design parameter.
Moreover, the fuzzy parameter adaptive law is designed as
γ ^ ˙ i , m s = r i , m s s i , 1 s ϕ i , 1 s ϕ i , m s τ i , m s σ i , m s γ ^ i , m s , m = 0 , 1
where σ i , m s is a positive design parameter.
Then, substituting (24) and (25) into (23), we have
V ˙ i , 1 s κ S , i ω i s ω i s + P S , i 2 m = 1 n i γ ˜ i , m s γ ˜ i , m s c i , 1 s s i , 1 s 2 + m = 0 1 σ i , m s r i , m s γ ˜ i , m s γ ^ i , m s + s i , 1 s ϕ i , 1 s s i , 2 s + 1 2 ε i , 2 s 2 + Δ ¯ i , 1 s + 1 2 ω i , 2 s 2 + q N i , s a i q d i + b i 2 ω q , 2 s 2
where Δ ¯ i , 1 s = Δ i , 1 s + P S , i 2 m = 1 n i ς i , m s 2 .
When the network connectivity is disrupted by connectivity-broken DoS cyber attacks, i.e.,  t Ξ s ( τ , t ) , s P U , the control design process is similar to the case of connectivity-sustained DoS cyber attacks. The virtual control signal for s P U is given by
α i , 1 a = c i , 1 a s i , 1 a ϕ i , 1 a m = 0 1 γ ^ i , m a ϕ i , m a τ i , m a 5 + N i , s 2 s i , 1 a ϕ i , 1 a + q N i , s a i q d i + b i x ^ q , 2 a + b i d i + b i y ˙ r a ϕ i , 2 a ϕ i , 1 a , i = 1 , 2 , , N .
Using protocols (25) and (27) leads to
V ˙ i , 1 a κ U , i ω i a ω i a + P U , i 2 m = 1 n i γ ˜ i , m a γ ˜ i , m a + c i , 1 a s i , 1 a 2 + m = 0 1 σ i , m a r i , m a γ ˜ i , m a γ ^ i , m a + s i , 1 a ϕ i , 1 a s i , 2 a + 1 2 ε i , 2 a 2 + Δ ¯ i , 1 a + 1 2 ω i , 2 a 2 + q N i , s a i q d i + b i 2 ω q , 2 a 2
where Δ ¯ i , 1 a = Δ i , 1 a + P U , i 2 m = 1 n i ς i , m a 2 .
Step m ( 2 m < n i ) : When the network remains connected with t Ξ s ( τ , t ) , s P S , the  m th candidate Lyapunov function is chosen as
V i , m s = V i , m 1 s + 1 2 s i , m s 2 + 1 2 ε i , m s 2 + 1 2 r i , m s γ ˜ i , m s γ ˜ i , m s
where r i , m s is a positive design parameter.
From the definition of s i , m in (18), the fuzzy observer (9), and the first-order filter (19), it holds that
s ˙ i , m s = x ^ i , m + 1 s + γ ^ i , m s ϕ i , m s τ i , m s i , m s y ^ i y i β ˙ i , m s .
Moreover, according to the definition of the filter, one has
ε ˙ i , m s = β i , m s t + α i , m 1 s t q i , m s α ˙ i , m 1 s t = ε i , m s q i , m s D i , m s
where D i , m s is a continuous function bounded by | D i , m s | D ¯ i , m s on a compact set Ω D i , m .
Combining (29)–(31), it can be deduced that
V ˙ i , m s = V ˙ i , m 1 s s i , m s γ ˜ i , m s ϕ i , m s τ i , m s 1 q i , m s ε i , m s 2 D i , m s ε i , m s + s i , m s s i , m + 1 s + ε i , m + 1 s + α i , m s + γ ^ i , m s ϕ i , m s τ i , m s i , m s y ^ i y i β ˙ i , m s 1 r i , m s γ ˜ i , m s γ ^ ˙ i , m s r i , m s s i , m s ϕ i , m s τ i , m s .
Using Young’s inequality, one has
s i , m s ε i , m + 1 s s i , m s 2 2 + ε i , m + 1 s 2 2
s i , m s γ ˜ i , m s ϕ i , m s τ i , m s 1 2 s i , m s 2 + 1 2 γ ˜ i , m s γ ˜ i , m s
D i , m s ε i , m s 1 2 D ¯ i , m s 2 + 1 2 ε i , m s 2 .
Submitting (33)–(35) into (32), we have
V ˙ i , m s V ˙ i , m 1 s + 1 2 s i , m s 2 + 1 2 γ ˜ i , m s γ ˜ i , m s + 1 2 s i , m s 2 + 1 2 ε i , m + 1 s 2 + 1 2 D ¯ i , m s 2 + 1 2 ε i , m s 2 + s i , m s s i , m + 1 s + α i , m s + γ ^ i , m s ϕ i , m s τ i , m s i , m s y ^ i y i β ˙ i , m s ε i , m s 2 q i , m s 1 r i , m s γ ˜ i , m s γ ^ ˙ i , m s r i , m s s i , m s ϕ i , m s τ i , m s .
The m th -order virtual control signal is designed as
α i , m s = c i , m s + 1 s i , m s + i , m s y ^ i y i + β ˙ i , m s γ ^ i , m s ϕ i , m s τ i , m s Q i , m s
where c i , m s is a positive design parameter, and
Q i , m s = s i , 1 s ϕ i , 1 s , m = 2 s i , m 1 s , m = 3 , 4
Moreover, the adaptive law of fuzzy parameter γ ^ i , m s is given as
γ ^ ˙ i , m s = r i , m s s i , 1 s ϕ i , m s τ i , m s σ i , m s γ ^ i , m s , m = 2 , 3 ,
where σ i , m is a positive constant.
Substituting (37)–(39) into (36), one can derive that
V ˙ i , m s κ S , i ω i s ω i s + P S , i 2 m = 1 n i γ ˜ i , m s γ ˜ i , m s + r = 0 m σ i , r s r i , r s γ ˜ i , r s γ ^ i , r s + ε i , m + 1 s 2 2 r = 2 m 1 q i , r s 1 2 ε i , r s 2 r = 1 m c i , r s s i , r s 2 + s i , r s s i , m + 1 s + r = 2 m 1 2 γ ˜ i , r s γ ^ i , r s + 1 2 q N i , s a i q d i + b i 2 ω q , 2 s 2 + Δ ¯ i , m s .
where the function Δ ¯ i , m s = Δ ¯ i , m 1 s + 1 2 D ¯ i , m s 2 .
Accordingly, when the network becomes unconnected under asynchronous DoS cyber attack, where t Ξ s ( τ , t ) , s P U , the  m th -order virtual control signal is further given as
α i , m a = c i , m a 1 s i , m a + i , m a y ^ i y i + β ˙ i , m a γ ^ i , m a ϕ i , m a τ i , m a Q i , m a
Then, defining Δ ¯ i , m a = Δ ¯ i , m 1 a + 1 2 D ¯ i , m a 2 and using (39) and (41) leads to
V ˙ i , m a κ U , i ω i a ω i a + P U , i 2 m = 1 n i γ ˜ i , m a γ ˜ i , m a + r = 0 m k i , r a r i , r a γ ˜ i , r a γ ^ i , r a + ε i , m + 1 a 2 2 r = 2 m 1 q i , r a 1 2 ε i , r a 2 r = 1 m c i , r a s i , r a 2 + s i , r s i , m + 1 a + r = 2 m 1 2 γ ˜ i , r a γ ^ i , r a + 1 2 q N i , s a i q d i + b i 2 ω q , 2 a 2 + Δ ¯ i , m a
Step n i : Similarly, when the network remains connected under DoS cyber attack, where t Ξ s ( τ , t ) , s P S , the  n i th candidate Lyapunov function is chosen as V i , n i s = V i , n i 1 s + 1 2 s i , n i s 2 + 1 2 ε i , n i s 2 + 1 2 r i , n i s γ ˜ i , n i s γ ˜ i , n i s , with r i , n i s being a positive design parameter. Using Young’s inequality, it holds that s i , n i s γ ˜ i , n i s ϕ i , n i s ( τ i , n i s ) 1 2 s i , n i s 2 + 1 2 γ ˜ i , n i s γ ˜ i , n i s and D i , n i s ε i , n i s 1 2 D ¯ i , n i s 2 + 1 2 ε i , n i s 2 , which implies
V ˙ i , n i s V ˙ i , n i 1 s + 1 2 s i , n i s 2 + 1 2 γ ˜ i , n i s γ ˜ i , n i s + 1 2 D ¯ i , n i s 2 + 1 2 ε i , n i s 2 1 q i , n i s ε i , n i s 2 + s i , n i s u i s + γ ^ i , n i s ϕ i , n i s τ i , n i s i , n i s y ^ i y i β ˙ i , n i s 1 r i , n i s γ ˜ i , n i s γ ^ ˙ i , n i s r i , n i s s i , n i s ϕ i , n i s τ i , n i s .
The guaranteed performance resilient security consensus controller of the i th follower for the case of connectivity-sustained DoS attacks with t Ξ s ( τ , t ) , s P S is designed as
u i s = c i , n i s + 1 2 s i , n i s + i , n i s y ^ i y i + β ˙ i , n i s γ ^ i , n i s ϕ i , m s τ i , n i s s i , n i 1 s
where c i , n i s is a positive design parameter.
Accordingly, the adaptive law of fuzzy parameter γ ^ i , n i s is given as
γ ^ ˙ i , n i s = r i , n i s s i , 1 s ϕ i , n i s τ i , n i s σ i , n i s γ ^ i , n i s
where σ i , n i s is a positive design parameter.
Substituting (44) and (45) into (43), we have
V ˙ i , n i s κ S , i ω i s ω i s + P S , i 2 m = 1 n i γ ˜ i , m s γ ˜ i , m s + r = 0 n i σ i , r s r i , r s γ ˜ i , r s γ ^ i , r s r = 2 n i 1 q i , r s 1 2 ε i , r s 2 r = 1 n i c i , r s s i , r s 2 + r = 2 n i 1 2 γ ˜ i , r s γ ^ i , r s + Δ ¯ i , n i s + 1 2 q N i , s a i q d i + b i 2 ω q , 2 s 2
where the function Δ ¯ i , n i s = Δ ¯ i , n i 1 s + 1 2 D ¯ i , n i s 2 .
When the network connectivity is disrupted by asynchronous DoS cyber attacks, where t Ξ s ( τ , t ) , s P U , the resilient security consensus controller is formulated as
u i a = c i , n i a 1 2 s i , n i a + i , n i a y ^ i y i + β ˙ i , n i a γ ^ i , n i a ϕ i , m a τ i , n i a s i , n i 1 a .
Similarly, by executing (45) and (47), we can obtain the following Lyapunov derivative inequality for the case of t Ξ s ( τ , t ) , s P U :
V ˙ i , n i a κ U , i ω i a ω i a + P U , i 2 m = 1 n i γ ˜ i , m a γ ˜ i , m a + r = 0 n i σ i , r a r i , r a γ ˜ i , r a γ ^ i , r a r = 2 n i 1 q i , r a 1 2 ε i , r a 2 + r = 1 n i c i , r a s i , r a 2 + r = 2 n i 1 2 γ ˜ i , r a γ ^ i , r a + Δ ¯ i , n i a + 1 2 q N i , s a i q d i + b i 2 ω q , 2 a 2
where the function Δ ¯ i , n i a = Δ ¯ i , n i 1 a + 1 2 D ¯ i , n i a 2 .
Remark 3.
It should be emphasized that V i , 1 is actually a barrier Lyapunov function due to the presence of the term 1 2 s i , 1 2 coupled with the performance-constrained consensus tracking error s i , 1 . From (18), it holds that 1 2 s i , 1 2 = ξ ¯ i 2 t / 2 1 ξ ¯ i 2 t , which implies the transformed performance function ξ i ( t ) must be bounded by 1 / ϑ i ( t ) < ξ i ( e i ) < 1 / ϑ i ( t ) , given that ξ ¯ i ( t ) = ϑ i ( t ) ξ i ( e i ) . Then, according to the equivalent transformation, we can derive that the performance function satisfies ζ i ( t ) < e i < ζ i ( t ) . Thus, the constructed Lyapunov candidate is a barrier Lyapunov function. Additionally, the barrier Lyapunov function is switched with the real-time attack pattern: when t Ξ s ( τ , t ) , s P S , V i , 1 = V i , 1 s , and when t Ξ s ( τ , t ) , s P U , V i , 1 = V i , 1 u .

4. Network Resilient Stability Analysis

Theorem 1.
For NCSs (1) under the directed network topology graph G , if the system evolution is driven by the fuzzy state observer (9), the attack pattern oriented resilient security consensus controllers (44) and (47), and the fuzzy parameter adaptive laws (25), (30), and (40), and there exist symmetric positive-definite matrices P S , i > 0 , P U , i > 0 , i = 1 , , N such that the following inequalities hold:
P S , i < μ P U , i , P U , i < μ S U , i
s 1 1 T U > a τ U + ln μ τ U
k i s Q S , i * * P S , i I * A i , s 0 I < 0 , k a Q U , i * * P U , i I * A i , a 0 I < 0
where μ = max { ( [ λ max ( P U , i ) ] / [ λ min ( P S , i ) ] ) , ( [ λ max ( P S , i ) ] / [ λ min ( P U , i ) ] ) } , with  λ max ( · ) and λ min ( · ) being the maximum and minimum eigenvalues of a matrix, then the following control objectives can be achieved in spite of asynchronous DoS cyber attacks:
(1) 
All the closed-loop control signals of the NCSs (1) are bounded;
(2) 
The consensus tracking error e i is always guaranteed to be limited in a prescribed performance bound in spite of asynchronous DoS cyber attacks, i.e.,  ζ i ( t ) < e i < ζ i ( t ) ;
(3) 
The consensus tracking error e i eventually converges to a small constant domain within a predetermined settling time T p , i.e.,  ρ i η i 1 ρ i 2 < e i < ρ i η i 1 ρ i 2 , when t T p .
Proof. 
Firstly, by using the Schur complement Lemma [15], we can derive that condition (51) is equivalent to the fuzzy adaptive observer gain conditions. Then, consider the composite Lyapunov function as
V ( t ) = i = 1 N V i , n i ( t ) .
When t Ξ s ( τ , t ) , s P S , from (46), it is deduced that
V ˙ s ( t ) i = 1 N P S , i 2 m = 1 n i γ ˜ i , m s γ ˜ i , m s + m = 0 n i σ i , m s r i , m s γ ˜ i , m s γ ^ i , m s + m = 2 n i 1 2 γ ˜ i , m s γ ^ i , m s i = 1 N κ S , i 1 2 q N i , s a i q d i + b i 2 ω i s 2 + i = 1 N Δ ¯ i , n i s i = 1 N m = 2 n i 1 q i , m s 1 2 ε i , m s 2 + m = 1 n i c i , m s s i , m s 2 .
We choose the observer gain parameter i , m such that κ S , i 1 2 j N i , s ( a i j / ( d i + b i ) ) 2 > 0 . Then, by using γ ^ i , m s = γ ^ i , m s γ ˜ i , m s and Young’s inequality, we have σ i , m s / r i , m s γ ˜ i , m s γ ^ i , m s σ i , m s / 2 r i , m s ( γ i , m s γ i , m s γ ˜ i , m s γ ˜ i , m s ) , which implies
P S , i 2 m = 1 n i γ ˜ i , m s γ ˜ i , m s + m = 0 n i σ i , m s r i , m s + m = 2 n i 1 2 γ ˜ i , m s γ ^ i , m s m = 0 n i σ i , m s 2 r i , m s γ i , m s γ i , m s σ i , m s 2 r i , m s Φ i , m s γ ˜ i , m s γ ˜ i , m s
where the coefficient Φ i , m s is determined by Φ i , m s = 0 for m = 0 , Φ i , m s = P S , i 2 for m = 1 , and  Φ i , m s = P S , i 2 + 1 / 2 for m 2 . In the following, we will present the selection principle of control parameters and derive the Lyapunov stability condition.
We define s = ( κ S , i 1 2 j N i , s ( a i j d i + b i ) 2 ) / λ ( P S , i ) . Then, the design parameters q i , m s , c i , m s , r i , m s , and  σ i , m s for i N 1 : N and m N 1 : n i are chosen by
1 2 q i , m s < s 2 c i , m s < s 2 r i , m s Φ i , m s σ i , m s < s .
Substituting (54) and (55) into (53) yields
V ˙ s ( t ) s V s ( t ) + q s
where q s = i = 1 N ( Δ ¯ i , n i s + m = 0 n i σ i , m s 2 r i , m s γ i , m s γ i , m s ) .
Similarly, when the network connectivity is broken, where t Ξ s ( τ , t ) , s P U , we define a = ( κ U , i + 1 2 j N i , s ( a i j d i + b i ) 2 ) / λ ( P U , i ) , and for i = 1 , , N , j = 1 , , n i . Then, the design parameters q i , m a , c i , m a , r i , m a , and  σ i , m a for i N 1 : N and m N 1 : n i are chosen by
1 2 q i , m a < a 2 c i , m a < a 2 r i , m a Φ i , m a σ i , m a < a .
Furthermore, by selecting the coefficient Φ i , m a to satisfy Φ i , m a = 0 for m = 0 , Φ i , m a = P U , i 2 for m = 1 , and  Φ i , m a = P U , i 2 + 1 / 2 for m 2 , one has
V ˙ a ( t ) a V a ( t ) + q a
where q a = i = 1 N ( Δ ¯ i , n i a + m = 0 n i k i , m 2 r i , m γ i , m T γ i , m ) . From the perspective of Lyapunov stability,  (56) implies that the system is convergent when the network topology remains connected under asynchronous DoS cyber attack with the term s V s ( t ) , while (58) indicates that divergence of the ystem is possible under connectivity-broken DoS cyber attack with the term a V s ( t ) . Next, we consider the global resilient stability of the system.
Combining (56) and (58), the evolution of the Lyapunov derivative V ˙ ( t ) can be further described as
V ˙ ( t ) = V ˙ s ( t ) , t Ξ s ( τ , t ) , s P S V ˙ a ( t ) , t Ξ s ( τ , t ) , s P U .
In the following, we will further analyze the resilient stability of the system based on (59). When an NCS (1) is subjected to a connectivity-broken asynchronous DoS cyber attacks, where t Ξ s ( τ , t ) , s P U , it can be deduced that
V ( t ) V T r b + e σ r t T r b + q s + q a T r b t e σ r ( t τ ) d τ μ V T r b e σ r t T r b + q s + q a T r t e σ r ( t τ ) d τ
where [ T r b , T r e ) is the r th connectivity-broken interval; T r b and T r b + are the left limit and right limit of T r b , respectively; and σ r is a constant associated with s or a.
For the r th connectivity-broken DoS cyber attack interval [ T r b , T r e ) , the following inequalities can be derived by using the recursive method:
V ( t ) μ n ( 0 , t ) e σ r t T r b + + σ 0 T 1 b 0 V ( 0 ) + q s + q a 0 T 1 b μ n T 1 b , t e σ m t T m b + + σ 0 T 1 b τ d τ + q s + q a T 1 b T 2 b μ n T 2 b , t e σ m t T m b + + σ 0 T 2 b τ d τ + + q s + q a T r b t e σ r ( t τ ) d τ .
Moreover, from the definition of the connectivity-sustained interval Ξ S ( τ , t ) and connectivity-broken interval Ξ U ( τ , t ) , the following inequalities hold:
V ( t ) μ n ( 0 , t ) e s Ξ S ( 0 , t ) u Ξ U ( 0 , t ) V ( 0 ) + q s + q a 0 t μ n τ , t e s Ξ S ( τ , t ) a Ξ U ( τ , t ) d τ e s Ξ S ( 0 , t ) a Ξ U ( 0 , t ) n ( 0 , t ) ln μ V ( 0 ) + q s + q a 0 t e s Ξ S ( τ , t ) a Ξ U ( τ , t ) n ( τ , t ) ln μ d τ .
According to Assumption 1, one has | Ξ U ( τ , t ) | ( t τ ) / T U + ρ U , and  | Ξ s ( τ , t ) | ( t τ ) ( 1 1 / T U ) ρ U . Moreover, Assumption 2 satisfies that n ( τ , t ) ( t τ ) / τ U + η U . Thus, (62) can be further presented as
V ( t ) e s Ξ S ( 0 , t ) a Ξ U ( 0 , t ) n ( 0 , t ) ln μ V ( 0 ) + q s + q a 0 t e s Ξ S ( τ , t ) a Ξ U ( τ , t ) n ( τ , t ) ln μ d τ e s ( t 0 ) ( 1 1 T U ) ρ U a t 0 T U + ρ U t 0 τ U + η U ln μ V ( 0 ) + q s + q a 0 t e s ( t τ ) ( 1 1 T U ) ρ U a t τ T U + ρ U t τ τ U + η U ln μ d τ = e s 1 1 T U a τ U ln μ τ U t + δ ˜ 0 , t V ( 0 ) + q s + q a 0 t e s 1 1 T U a τ U ln μ τ U t + δ ˜ τ , t d τ
where δ ˜ ( τ , t ) is given as δ ˜ ( τ , t ) = s ( τ τ T U + ρ U ) a ( τ τ U + ρ U ) + ln μ ( τ τ U + η U ) .
Then, according to condition (50), we have
s 1 1 T U a τ U ln μ τ U > 0
which implies there exists a constant ρ > 0 such that
V ( t ) e δ ˜ 0 , t e ρ t V ( 0 ) + q s + q a e δ ˜ τ , t 0 t e ρ t τ d τ e δ ˜ 0 , t e ρ t V ( 0 ) + q s + q a e δ ˜ τ , t ρ .
It should be noted that δ ˜ ( τ , t ) is only related to the initial time instant τ , and is unconcerned with evolution time t. Therefore, δ ˜ ( τ , t ) is a constant once the initial instant τ is determined. In this sense, noting the form of the composite Lyapunov function (59), inequality (65) indicates that all the closed-loop signals ω i , m , s i , m , ε i , m , and  γ ˜ i , m are bounded for i = 1 , , N , m = 1 , , n i . s i , 1 is bounded, which leads to the boundedness of e i , and further indicates the boundedness of x i , 1 from e i = j = 1 N a i j ( y i y j a ) + b i ( y i y r a ) . Recalling the fact that the observation error ω i , m = x i , m x ^ i , m , the estimated state x ^ i , m is thus bounded. Similarly, the boundedness of ε i , m and γ ˜ i , m lead to the boundedness of the filter signal β i , m and the adaptive parameter γ i , m . Furthermore, repeating the above steps for m = 2 , , n i , it is concluded that all the closed-loop signals are bounded.
From the above-mentioned boundedness analysis, all the closed-loop signals remain bounded throughout the entire time horizon. Based on this, the characteristic of guaranteed performance of the proposed control method is discussed. Revisiting the definition of s i , m given in (18), it is shown that the performance-constrained consensus tracking error s i , 1 ± when ξ ¯ i t ± 1 . Then, noting that s i , 1 is bounded, there must exist a positive constant ϖ i such that ξ ¯ i t ϖ i < 1 , t 0 .
Recalling the definition of ϑ i ( t ) , one has
1 ϑ i t < ϖ i ϑ i t ξ i e i < ϖ i ϑ i t < 1 ϑ i t .
Then, noting ζ i ( ξ i ( e i ) ) = e i , (66) leads to ζ i ( t ) < e i < ζ i ( t ) , which implies that
η i ϑ i 2 t 1 < e i < η i ϑ i 2 t 1 .
Furthermore, when t T p , ϑ i ( t ) = 1 ρ i , which indicates that
ρ i η i 1 ρ i 2 < e i < ρ i η i 1 ρ i 2 , t T p .
According to [31], considering Lemma 1 for  y ¯ = [ y 1 , , y N ] and y ¯ r = [ y r , , y r ] , the relationship between the local synchronization error and the actual tracking error is formulated as y ¯ y ¯ r e / λ min ( L + B ) . Thus. one has | y i y r | e / λ min ( L + B ) , with  L and B being the Laplacian matrix and leader–follower communication matrix of the network graph  G , respectively. Moreover, it is known that the conservative lower bound of λ min ( L + B ) depends on the scale of the network N. Therefore, since the local tracking error e i is guaranteed to be bounded in the specified performance bounds, it is obtained that y i y r converges to a predefined range. This completes the proof of Theorem 1.    □
Remark 4.
Compared to existing distributed attack mitigation strategies, such as [32], we introduce an innovative security consensus strategy with guaranteed performance resilience (Algorithm 1). Furthermore, our research broadens the scope by incorporating unpredictable asynchronous DoS attacks, with time-varying network topology and possible multiple inoperative nodes. In this sense, the proposed scheme advances current methodologies by effectively addressing asynchronous attack challenges and providing a resilient control framework with guaranteed convergence performance.
Remark 5.
The computational complexity of the proposed control strategy can be measured from the following dimensions: (1) the complexity for state observation is O ( R · n ) , where R is the number of fuzzy rules and n is the dimension of the system states; (2) the complexity for error transformation is O ( m ) , where m is the dimension of the error system; (3) the complexity for control law design is given as O ( u ) , where u is the dimension of the control input; and (4) the complexity for solving the LMI is O ( p 3 ) , where p is the dimension of the LMI, as it typically involves eigenvalue decomposition of matrices. Thus, the overall computational complexity of our method can be estimated as O ( R · n + m + u + p 3 ) , which is of polynomial order complexity.
Remark 6.
Network resilience analysis: it should be emphasized that the possible divergence when V ˙ a ( t ) a V a ( t ) + q a does not mean that the system is out of control for the followers without connectivity during the attack-active intervals. The divergence of the system is not growing at will, and the consensus tracking error can be still guaranteed to remain within the performance boundaries by appropriately selecting the control parameters satisfying the conditions, which ensures that the exponential term s ( 1 1 / T U ) a / τ U ln μ / τ U remains positive. As for the global resilient stability, DoS cyber attacks result in an elevation in V ( t ) (performance bounce). The attack strength boundary condition (50) ensures a decrease in the upper boundary of V ( t ) (performance recovery). The Lyapunov function experiences an increase during the interval [ τ i , τ i + 1 ) for i P U , and a decrease for i P S . The constraints imposed on the strength of attacks serve to regulate the escalation of V ( t ) , ensuring that V ( t ) 0 over time. This is to say that the system may diverge at a specific attack interval (still within the performance boundary), but it maintains globally resilient stability across the entire time horizon. The evolution of V ( t ) under connectivity-broken DoS attack is depicted in Figure 3.
Algorithm 1: Guaranteed performance resilient security consensus control algorithm for nonlinear NCSs under asynchronous DoS cyber attack.
1:
Initialize: Network scale N; prescribed performance parameters ρ i , k 1 , k 2 , η i , and        T p , for  i = 1 , 2 , , N ; DoS cyber attack strength parameters T U , ρ U , τ U , and  η U .
2:
Estimation of unknown network states:
3:
Derive x ^ i , m by executing the fuzzy state observer (9);
4:
Guaranteed performance resilient security consensus control:
5:
 for t = t v , v v T ( t 0 = 0 )
6:
    Determine the network connectivity of G s according to current DoS cyber attack pattern using depth-first search (DFS):
7:
       for node v i , i = 0 , i N
8:
          Visiting and mark all accessible neighbor nodes v j , j N i ;
9:
             if there exists node not visited
10:
                Connectivity-broken DoS cyber attack;
11:
             else if all the nodes are visited at least once
12:
                Connectivity-sustained DoS cyber attack;
13:
             end if
14:
             i = i + 1 , go to and repeat step 8;
15:
       end for
16:
    if  t Ξ s ( τ , t ) , s P S :
17:
       Regulate the NCSs by using controller u i s in (44);
18:
    else if  t Ξ s ( τ , t ) , s P U :
19:
       Regulate the NCSs by using resilient security controller u i a in (47);
20:
    end if
21:
    Drive the fuzzy parameters update by adaptive law (25), (30), and (40);
22:
    v = v + 1 , go to and repeat step 5;
23:
end for
Remark 7.
Although the proposed method achieves a resilient security consensus for nonlinear NCSs, there are still several limitations that cannot be ignored: (1) The distributed resilient security control of NCSs, especially large scaled networks, relies on massive data transmission, which may lead to a heavy communication load; (2) various attack patterns, such as deception attacks, replay attacks, or composite attacks are not taken into account; and (3) the proposed methodology may only be applicable to other dynamics, such as switching systems or stochastic systems.

5. Simulation Results

In this section, several comparative experiments are presented to show the effectiveness and superiority of the proposed guaranteed performance resilient security consensus control scheme under asynchronous DoS cyber attacks.

5.1. Experiment I: Effectiveness Verification

This is a numerical simulation experiment aimed at verifying the effectiveness of the proposed guaranteed performance resilient security consensus control method. Consider the nonlinear NCSs depicted in Figure 4, which contains a leader (labeled 0) and four followers (labeled 1–4), which can be described as
x ˙ i , 1 t = x i , 2 t + f i , 1 x ¯ i , 1 t + d i , 1 t x ˙ i , 2 t = u i t + f i , 2 x ¯ i , 2 t + d i , 2 t y i t = x i , 1 t , i = 1 , 2 , 3 , 4
where the unknown nonlinear functions are given as f i , 1 ( x ¯ i , 1 ( t ) ) = 0.5 x i , 1 3 sin ( 1.5 x i , 1 ) and f i , 2 ( x ¯ i , 2 ( t ) ) = 0.6 x i , 1 e x i , 2 2 + 1.5 x i , 2 3 , and d i , 1 ( t ) = e 0.8 t + sin ( 0.2 t ) , d i , 2 ( t ) = cos ( 0.5 t ) are external time-varying disturbances. The control objective is to guarantee the prescribed transient consensus control performance of tracking errors within the predefined performance bounds under the developed resilient security control strategy in spite of asynchronous DoS cyber attacks.
The communication relationships between the leader and four followers are given as B = diag { 3 , 0 , 0 , 0 } , and the initial network communication topology G 0 is described by the following Laplacian matrix:
A = 0 0 0 0 1 0 0 0.5 0 0.6 0 0.8 1 0 0 0 .
The output signal of the leader agent is chosen as y r = 0.5 sin ( 1.5 t ) + 0.5 cos ( 0.5 t ) . The simulation time horizon is set as 20 s with the sampling step length Δ t = 0.005 s. The initial conditions of te system state are selected as: x 1 , 1 ( 0 ) = 0.65 , x 1 , 2 ( 0 ) = 0.2 , x 2 , 1 ( 0 ) = 0.3 , x 2 , 2 ( 0 ) = 0.2 , x 3 , 1 ( 0 ) = 0.45 , x 3 , 2 ( 0 ) = 0.2 , x 4 , 1 ( 0 ) = 0.7 , x 4 , 2 ( 0 ) = 0.2 , and x 5 , 1 ( 0 ) = 0.2 . Moreover, the initial values of the fuzzy state observer are the same as those given for the system states. Assume that the NCS (86) is required to achieve the prescribed performance with the synchronization consensus error | e i ( t ) | 0.1 within 5 s, which implies that the performance parameters are chosen as T p = 5 s, ρ i = 0.1 , k 1 = 0.7 , and k 2 = 0.4 , and the guaranteed performance function is determined as
ϑ i t = 1 0.7 5 t 5 0.7 e 0.4 t + 0.1 , t < 5   s 10 , t 5   s .
The observer gain parameters are listed as i , 1 = 10 and i , 2 = 5 , where i = 1 , 2 , , 5 . Assume that Q S , i = 10 I , Q U , i = 15 I ; then, by solving the inequalities (51) using the MATLAB2024a YALIP toolbox, it is derived that
P S , i = 3.0 5.0 5.0 10.6 , P U , i = 4.5 7.5 7.5 15.9
which are obviously positive-definite, and the resilient conditions A i , s P S , i + P S , i A i , s < k i s Q S , i and A i , a P U , i + P U , i A i , s < k i a Q U , i are satisfied.
As for the asynchronous DoS cyber attacks, communication interruptions in each transmission channel are random and independent. All resulted attack topology combinations are shown as Figure 3, where G 0 , G 1 , G 3 are connectivity-broken, and G 2 is connectivity-sustained. The attack parameters are set as T U = 3.5 s, ρ U = 0.8 , τ U = 5 , and η U = 2 , from which it is further calculated that | Ξ ¯ s ( τ , t ) | t τ T U + ρ U = 6.51 s, and | n ¯ s ( τ , t ) | t τ τ U + η U = 6 . Based on the above attack strength conditions, the attack intervals are assumed to be G 0 : [ 0 s , 4.2 s ] [ 5.3 s , 7.8 s ] , G 1 : [ 8.2 s , 12.5 s ] [ 13.1 s , 15.5 s ] , G 2 : [ 4.2 s , 5.3 s ] [ 7.8 s , 8.2 s ] [ 12.5 s , 13.1 s ] [ 15.5 s , 15.8 s ] [ 16.4 s , 17.2 s ] , and G 3 : [ 15.8 s , 16.4 s ] [ 17.2 s , 20 s ] . Moreover, the resilient security consensus control parameters are listed in Table 1.
In addition, the initial values of the fuzzy state observer are all chosen as zero, and the weight vector of FLSs are initialized as γ ^ i , m ( 0 ) = col ( 0.3 , 0.3 50 ) for i = 1 , 2 , , N , m = 0 , 1 , 2 . The fuzzy membership function is selected as
μ G i l ω i = exp ω i + 3 0.025 l 2 120 .
In order to more intuitively show the effectiveness of the proposed guaranteed performance control scheme, a comparison was made with the resilient security consensus control approach in [26] where the guaranteed performance is not taken into account. The simulation results are depicted in Figure 5, Figure 6, Figure 7 and Figure 8. As shown in Figure 5, the consensus tracking errors of every follower are convergent to the prescribed performance bounds under the proposed control scheme. In contrast, the consensus tracking errors may exceed the performance bounds under the method in [26] without considering the convergence performance. Thus, the effectiveness of the proposed guaranteed performance resilient security consensus control scheme is verified. Figure 6 gives the evolution of the fuzzy adaptive parameters γ i , m ( t ) of the designed adaptive law. Figure 7 shows the resilient security control input signals u i ( t ) . The fuzzy approximation of unknown dynamics is shown in Figure 8, which illustrates the estimation ability of the FLS-based approximator, even under asynchronous DoS cyber attack.

5.2. Experiment II: Resilient Analysis

In this experiment, we are committed to illustrating the resilient convergence of NCSs under asynchronous DoS cyber attack by performing a comparison with the traditional fuzzy adaptive consensus tracking control strategy proposed in [15], where the DoS cyber attack is not taken into account.
Firstly, the system dynamics are given as (69) with f i , 1 ( x ¯ i , 1 ( t ) ) = 3.2 x 1 , 1 cos ( 0.3 x 1 , 1 ) , f i , 2 ( x ¯ i , 2 ( t ) ) = 2.5 cos ( x 1 , 2 ) e 1.8 t 1.8 x 1 , 2 , and d i , 1 ( t ) = e 0.2 t + cos ( 0.3 t ) and d i , 2 ( t ) = sin ( 0.6 t ) . The leader–followers communication relationship B = diag { 3 , 0 , 0 , 0 , 0 } , and the initial network communication topology G 0 , is the same as in Experiment I.
The output signal of the leader agent is chosen as y r ( t ) = 2.5 cos ( 1.5 t ) + 1.5 sin ( 0.5 t ) . The simulation time is determined as 30   s with a sampling step length of Δ t = 0.002 s. The initial conditions of the system state are selected as: x 1 , 1 ( 0 ) = 2.3 , x 1 , 2 ( 0 ) = 2.2 , x 2 , 1 ( 0 ) = 2.9 , x 2 , 2 ( 0 ) = 1.2 , x 3 , 1 ( 0 ) = 2.5 , x 3 , 2 ( 0 ) = 3.3 , x 4 , 1 ( 0 ) = 2.6 , and x 4 , 2 ( 0 ) = 1.8 . The performance bounds are determined as | e i ( t ) | 0.5 within 8 s, which implies that the performance parameters are chosen as T p = 8 s, ρ i = 0.5 , k 1 = 0.5 , and k 2 = 0.5 , and the guaranteed performance function is determined as
ϑ i t = 1 0.5 8 t 8 0.5 e 0.5 t + 0.5 , t < 8   s 2 , t 8   s .
The attack parameters are set as T U = 5.5 s, ρ U = 0.6 , τ U = 10 , and η U = 5 , which implies that | Ξ ¯ s ( τ , t ) | t τ T U + ρ U = 4.24 s, | n ¯ s ( τ , t ) | t τ τ U + η U = 8 . Based on the above attack strength conditions, the attack intervals are assumed to be: G 0 : [ 0 s , 2.5 s ] [ 4.2 s , 7.1 s ] [ 8.8 s , 11.3 s ] , G 1 : [ 12.5 s , 15.2 s ] [ 15.9 s , 18.3 s ] , G 2 : [ 2.5 s , 4.2 s ] [ 7.1 s , 8.8 s ] [ 11.3 s , 12.5 s ] [ 15.2 s , 15.9 s ] [ 18.3 s , 20.6 s ] [ 24.1 s , 26.2 s ] [ 28.3 s , 28.8 s ] , and G 3 : [ 20.6 s , 24.1 s ] [ 26.2 s , 28.3 s ] [ 28.8 s , 30 s ] . The resilient security control parameters are also selected as in Table 1. Moreover, the FLSs parameters are chosen to be the same as in Experiment 1.
The comparative simulation results are given in Figure 9 and Figure 10. As depicted in Figure 9, the consensus tracking errors are always constrained within the prescribed performance function under the proposed resilient security control scheme. Conversely, guaranteed performance convergence cannot by achieved by using the traditional adaptive consensus controller presented in [15]. Figure 10 shows the control input signals of proposed method and the approach in [15], which also illustrates the effectiveness of the designed resilient security control protocol under asynchronous DoS cyber attacks. The resilient recovery guarantees that the consensus tracking errors converge when the DoS signal is inactive.

5.3. Experiment III: Practical Application

To further verify the effectiveness of the proposed approach in practical engineering applications, a hardware-in-the-loop simulation of a multi-UAV network is conducted. The network consists of four follower UAVs (labeled 1–4) and one leader UAV (labeled 0). The resultant communication topology and UAV simulation experimental platform are depicted in Figure 11 and Figure 12. The experimental validation is carried out based on the UAVs simulation experimental platform. Using Simulink modeling and MATLAB programming, the designed resilient security control protocol is implemented. Then, the control signals are converted into C language codes that can be downloaded via Pixhawk. Pixhawk is responsible for executing the developed control algorithm and sending the generated pulsewidth modulation (PWM) signals to the real-time simulator, while the network flight situation is presented in the flight visualization modules.
The system dynamic of each UAV among the network is formulated as:
x ˙ i = V i cos θ i cos ϕ i y ˙ i = V i cos θ i sin ϕ i z ˙ i = V i sin θ i V ˙ i = T i D i / m i g sin θ i θ ˙ i = g cos θ i V i + a θ i V i ϕ ˙ i = a ϕ i V i cos θ i , i = 1 , 2 , , N
where p i = x i , y i , z i and V i are the position vector and velocity value, respectively. The control input signals are represented a T i = T i D i / m i , a ϕ i = L i sin ϕ i / m i , a θ i = L i cos ϕ i / m i where T i , D i , L i are thrust, drag force and lift, and θ i and ϕ i are the flight path angle and heading angle. Based on the above discussions, the velocity vector is v i = [ v x i , v y i , v z i ] T , where v x i = V i cos θ i cos ϕ i , v y i = V i cos θ i sin ϕ i , and v z i = V i sin θ i .
Then, dynamic (75) can be further expressed as
p ˙ i = v i v ˙ i = R i u i + G i i = 1 , 2 , , N
where the system matrix R i = cos ϕ i cos θ i sin ϕ i sin θ i cos ϕ i sin ϕ i cos θ i cos ϕ i sin ϕ i sin θ i sin θ i 0 cos θ i , G i = [ 0 , 0 , g ] T and the input vector u i = [ a T i , a ϕ i ,   a θ i ] T .
The communication relationships between the leader and followers are given as B = diag { 3 , 0 , 2 , 0 } , and the initial network communication topology G 0 is described by following Laplacian matrix: A = [ 0 0 0 0 ; 1 0 0 0 ; 0.8 0.6 0 0 ; 0 1 0 0 ] . The reference flight trajectory can be derived according to following leader dynamics:
x ˙ r = V r cos θ r cos ϕ r y ˙ r = V r cos θ r sin ϕ r z ˙ r = V r sin θ r .
where the reference velocity, flight path angle, and heading angle signals of the leader are given as V r ( t ) = 10   m / s when t 4   s , V r ( 30 ) = 20   m / s with the transfer function T ( s ) = 1 17 s + 1 , θ r ( t ) = 0   rad when t 4   s , θ r ( 6 ) = π / 6   rad with the transfer function T ( s ) = 1 5 s + 1 , θ r ( 10 ) = π / 6   rad with the transfer function T ( s ) = 1 2 s + 1 , θ r ( 30 ) = 0   rad with the transfer function T ( s ) = 1 2 s + 1 , and ϕ r ( t ) = 0   rad when 0   s t 30   s , which implies that the formation is desired to perform a diving motion.
With regard to the formation scenario, in the initial stage before flight, the formation has not yet been established, and all UAVs can be positioned anywhere in space. As time progresses, driven by the designed resilient security control scheme, the UAVs will gradually stabilize and eventually converge to a desired formation state, i.e., the formation tracking error e p i = j = 1 N a i j ( p i p j ) + b i ( p i p r ) will converge within a small region given as e p i 2 q s + q a e δ ˜ τ , t / ρ by executing the proposed consensus control algorithm.
Part I: Scenario of only one inoperative UAV under attack. The initial state values of each UAV, their physical parameters, and the attack strength parameters are chosen as given in Table 2. According to the presented attack strength parameters, we have | Ξ ¯ s ( τ , t ) | t τ T U + ρ U = 16.20 s, and | n ¯ s ( τ , t ) | t τ τ U + η U = 8 . Based on the above attack strength conditions, the attack intervals are assumed to be: G 0 (initial topology): [ 0 s , 3.7 s ] [ 5.5 s , 9.2 s ] [ 11.4 s , 17 , 3 s ] ; G 1 (connectivity-sustained DoS): [ 19.2 s , 24.5 s ] [ 25.6 s , 30 s ] ; and G 2 (connectivity-broken DoS): [ 3.7 s , 5.5 s ] [ 9.2 s , 11.4 s ] [ 17.3 s , 19.2 s ] [ 24.5 s , 25.6 s ] . The resilient security control parameters are presented in Table 3. As for the guaranteed performance control objective, the parameter selections relating to the performance function for the UAVs’ flight states V i , θ i , and ϕ i are set as η v i = 5 , T p , v i = 8 s, η θ i = 0.3 , T p , θ i = 8 s, and η ϕ i = 0.03 , T p , ϕ i = 8 s, respectively. Obviously, the network maintains connectivity under attack pattern one ( G 1 ), and the connectivity is broken under attack pattern two ( G 2 ), while only UAV 4 is inoperative.
The simulation results are presented in Figure 13, Figure 14, Figure 15 and Figure 16. Figure 13 depicts the formation, tracking the flight trajectories of the multi-UAV network. Figure 14 shows the evolution of flight velocities, flight path angles, and heading angles of the network, which implies that the system states can track the reference signals well in spite of asynchronous DoS attacks. Furthermore, the evolution of consensus tracking errors is given in Figure 15 where the prescribed performance bounds are never exceeded, which illustrates the effectiveness of the proposed resilient security guaranteed performance consensus tracking control scheme for multi-UAV networks. Moreover, Figure 16 depicts the curves of the control input signals of all follower UAVs.
Part II: Scenario of multiple inoperative UAVs under attack. To further verify the effectiveness of the proposed resilient security control scheme under the scenario of multiple inoperative UAVs under asynchronous DoS cyber attack, another hardware-in-the-loop simulation of a multi-UAV network is presented. The simulation platform settings, UAV system parameters, attack strength parameters, and design parameters are selected to be the same as those in part I given above. We consider the attack topology combinations of the network as ( G 0 , G 1 , G 3 ), where the connectivity-broken DoS cyber attack pattern G 3 contains three broken communication edges ( ( 1 , 2 ) , ( 2 , 3 ) , ( 3 , 4 ) ) and two inoperative UAVs (UAV 2, UAV 4). The attack intervals are assumed to be: G 0 (initial topology): [ 0 s , 2.5 s ] [ 4.2 s , 8.3 s ] [ 9.5 s , 15.3 s ] ; G 1 (attack pattern 1): [ 17.5 s , 22.6 s ] [ 24.2 s , 27.8 s ] [ 28.3 s , 30 s ] ; and G 2 (attack pattern 3): [ 2.5 s , 4.2 s ] [ 8.3 s , 9.5 s ] [ 15.3 s , 17.5 s ] [ 22.6 s , 24.2 s ] [ 27.8 s , 28.3 s ] . The simulation results are depicted in Figure 17. Due to the page limitation, here we only presents the curves of consensus tracking errors. As shown in Figure 17, the resilient stability of the network is achieved and the system states of all UAVs (flight velocity V i ( t ) , flight path angle θ i ( t ) , and heading angle ψ i ( t ) ) are still guaranteed to fall within the prescribed performance boundaries, which illustrates the effectiveness of the proposed security control strategy considering the scenario of multiple inoperative UAVs under attack.

6. Conclusions

This paper studied the guaranteed performance resilient security consensus control of nonlinear NCSs under asynchronous DoS cyber attack. First of all, an improved guaranteed performance function is designed to constrain the system consensus errors within the prescribed performance bounds, where the restrictions on initial system values are successfully removed. It was proven that the developed resilient security control method was immune to the attack signals. The constructed fuzzy state observer can effectively estimate the unmeasurable system states, based on which a fuzzy-adaptive guaranteed performance resilient security consensus tracking controller is proposed using a Lyapunov function-based backstepping design framework. Moreover, a sufficient condition of resilient stability under asynchronous DoS cyber attack was derived. Numerical simulations and the hardware-in-the-loop simulation of multi-UAV networks have further demonstrated the validity of the proposed guaranteed performance resilient security control strategy. In the future, we will further focus on reducing the communication burden, and consider more types of attacks and dynamics.

Author Contributions

Conceptualization, C.Z. and Y.W.; methodology, C.Z.; software, C.Z. and Y.S.; validation, C.F. and C.Z.; formal analysis, Y.S.; investigation, C.F.; resources, C.Z., Y.W. and Y.S.; data curation, C.F.; writing—original draft preparation, C.Z.; writing—review and editing, Y.W.; visualization, C.Z. and C.F.; supervision, Y.S.; project administration, Y.W.; funding acquisition, Y.W. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Data available on request from the authors.

Acknowledgments

The authors thank the editor and anonymous reviewers for their helpful comments on improving the quality of this paper. They would also like to thank their laboratory team members for their technical support.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Jafari, M.; Xu, H. Intelligent control for unmanned aerial systems with system uncertainties and disturbances using artificial neural network. Drones 2018, 2, 30. [Google Scholar] [CrossRef]
  2. Iudice, F.; Garofalo, F.; De Lellis, P. Bounded partial pinning control of network dynamical systems. IEEE Trans. Control Netw. Syst. 2023, 10, 238–248. [Google Scholar] [CrossRef]
  3. Sun, J.; Zeng, Z. Disturbance rejection control for networked control systems using subpredictor-based extended state observer. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 3629–3639. [Google Scholar] [CrossRef]
  4. Mu, T.; Pang, Z.; Guo, H.; Liu, G.; Han, Q. Output tracking predictive control of uncertain networked control systems. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 3141–3145. [Google Scholar] [CrossRef]
  5. Yu, H.; Chen, T. Periodic event-triggered networked control systems subject to Large transmission delays. IEEE Trans. Autom. Control 2023, 68, 63–79. [Google Scholar] [CrossRef]
  6. Cui, E.; Gao, X.; Jing, Y.; Sun, Y. Adaptive funnel synchronization control for complex switching networks in power systems. IEEE Trans. Netw. Sci. Eng. 2024, 11, 299–312. [Google Scholar] [CrossRef]
  7. Chen, R.; Chen, J.; Wang, H.; Tong, X.; Xu, Y.; Qi, N.; Xu, Y. Joint channel access and power control optimization in large-scale UAV networks: A hierarchical mean field game approach. IEEE Trans. Veh. Technol. 2023, 72, 1982–1996. [Google Scholar] [CrossRef]
  8. Wu, J.; Peng, C.; Zhang, J.; Tian, E. A sampled-data-based secure control approach for networked control systems under random DoS attacks. IEEE Trans. Cybern. 2024, 54, 4841–4851. [Google Scholar] [CrossRef]
  9. Wan, K.; Chen, Y.; Zhao, J.; Yu, M. Event-triggered secure consensus control for DC microgrids under DoS attacks. IEEE Trans. Ind. Electron. 2024; early access. [Google Scholar] [CrossRef]
  10. Jiao, S.; Xu, S. Observed-mode-dependent nonfragile control of networked control systems under hidden DoS attacks. IEEE Trans. Control Netw. Syst. 2024, 11, 139–149. [Google Scholar] [CrossRef]
  11. Xie, H.; Zhong, G.; Yang, D.; Guo, Y.; Zhao, X. Secure control for switched nonlinear systems with DoS attacks: A switching event-triggered adaptive output-feedback control method. IEEE Trans. Control Netw. Syst. 2024, 11, 139–149. [Google Scholar] [CrossRef]
  12. Fan, S.; Yue, D.; Yan, H.; Xie, X.; Deng, C. Resilient cooperative optimization control for fuzzy nonlinear MASs under DoS attacks. IEEE Trans. Fuzzy Syst. 2024, 32, 3903–3913. [Google Scholar] [CrossRef]
  13. Bu, X.; Hua, C.; Lv, M.; Wu, Z. Flight control of waverider vehicles with fragility-avoidance prescribed performance. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 5248–5261. [Google Scholar]
  14. Mao, B.; Wu, X.; Liu, H.; Xu, Y.; Lu, J. Adaptive fuzzy tracking control with global prescribed-time prescribed performance for uncertain strict-feedback nonlinear systems. IEEE Trans. Cybern. 2024; early access. [Google Scholar] [CrossRef]
  15. Li, X.; Wen, C.; Deng, C. Prescribed performance-based adaptive fractional backstepping control of integer-order nonlinear systems. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 4391–4402. [Google Scholar] [CrossRef]
  16. Li, K.; Li, Y. Fuzzy adaptive optimization prescribed performance control for nonlinear vehicle platoon. IEEE Trans. Fuzzy Syst. 2024, 32, 360–372. [Google Scholar]
  17. Li, L.; Zhao, K.; Zhang, Z.; Song, Y. Dual-channel event-triggered robust adaptive control of strict-feedback system with flexible prescribed performance. IEEE Trans. Autom. Control. 2024, 69, 1752–1759. [Google Scholar] [CrossRef]
  18. Liu, S.; Jiang, B.; Mao, Z.; Zhang, Y. Decentralized adaptive event-triggered fault-tolerant synchronization tracking control of multiple UAVs and UGVs with prescribed performance. IEEE Trans. Veh. Technol. 2024, 73, 9656–9665. [Google Scholar] [CrossRef]
  19. Yu, Z.; Li, J.; Xu, Y.; Zhang, Y.; Jiang, B.; Su, C. Reinforcement learning-based fractional-order adaptive fault-tolerant formation control of networked fixed-wing UAVs with prescribed performance. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 3365–3379. [Google Scholar] [CrossRef]
  20. Cui, G.; Xu, H.; Yu, J.; Lam, H. Event-triggered distributed fixed-time adaptive attitude control with prescribed performance for multiple QUAVs. IEEE Trans. Autom. Sci. Eng. 2023; early access. [Google Scholar] [CrossRef]
  21. Chen, L.; Liang, H.; Pan, Y.; Li, T. Human-in-the-loop consensus tracking control for UAV systems via an improved prescribed performance approach. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 8380–8391. [Google Scholar]
  22. Li, Z.; Wang, Y.; Song, Y.; Ao, W. Global consensus tracking control for high-order nonlinear multiagent systems with prescribed performance. IEEE Trans. Cybern. 2023, 53, 6529–6537. [Google Scholar] [CrossRef]
  23. Lin, Z.; Liu, Z.; Su, C.; Wang, Y.; Chen, C.; Zhang, Y. Adaptive fuzzy prescribed performance output-feedback cooperative control for uncertain nonlinear multiagent systems. IEEE Trans. Fuzzy Syst. 2023, 31, 4459–4470. [Google Scholar]
  24. Yao, D.; Gorbachev, S.; Dou, C.; Xie, X.; Yue, D. Adaptive tracking consensus control of nonlinear multiagent systems with predefined accuracy under disturbance observer. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 4267–4278. [Google Scholar] [CrossRef]
  25. Long, M.; Su, H.; Zeng, Z. Distributed observer-based leader-follower consensus of multiple euler-lagrange systems. IEEE Trans. Neural Netw. Learn. Syst. 2024, 35, 157–168. [Google Scholar] [CrossRef] [PubMed]
  26. Narayanan, G.; Ali, M.; Zhu, Q.; Priya, B.; Thakur, G. Fuzzy observer-based consensus tracking control for fractional-order multi-agent systems under cyber-attacks and its application to electronic circuits. IEEE Trans. Netw. Sci. Eng. 2023, 10, 698–708. [Google Scholar]
  27. Hu, W.; Hou, Y.; Chen, Z.; Yang, C.; Gui, W. Event-triggered consensus of multiagent systems with prescribed performance. IEEE Trans. Autom. Control. 2024, 69, 5462–5469. [Google Scholar]
  28. Hou, Y.; Cheng, B. Event-Based H consensus of double-integrator multi-agent systems: A prescribed performance control approach. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 2129–2133. [Google Scholar] [CrossRef]
  29. Liu, Y.; Yang, G. Neural Learning-based fixed-time consensus tracking control for nonlinear multiagent systems with directed communication networks. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 639–652. [Google Scholar] [CrossRef]
  30. Shang, Y.; Chen, B.; Lin, C. Consensus tracking control for distributed nonlinear multiagent systems via adaptive neural backstepping approach. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 2436–2444. [Google Scholar] [CrossRef]
  31. Wang, N.; Wen, G.; Wang, Y.; Zhang, F.; Zemouche, A. Fuzzy adaptive cooperative consensus tracking of high-order nonlinear multiagent networks with guaranteed performances. IEEE Trans. Cybern. 2022, 52, 8838–8850. [Google Scholar]
  32. Doostmohammadian, M.; Zarrabi, H.; Rabiee, R.; Khan, U.; Charalambous, T. Distributed detection and mitigation of biasing attacks over multi-agent networks. IEEE Trans. Netw. Sci. Eng. 2021, 8, 3465–3477. [Google Scholar] [CrossRef]
Figure 1. Schematic of possible network topologies under different DoS attack modes: (a) CS-DoS attack; (b) CB-DoS attack with isolated leader; (c) CB-DoS attack with isolated follower (The blue nodes indicate agents not involved in the attacks, the browns nodes indicate the agent affected by the attacks, and the nodes marked with a green shadow represent the isolated agents.)
Figure 1. Schematic of possible network topologies under different DoS attack modes: (a) CS-DoS attack; (b) CB-DoS attack with isolated leader; (c) CB-DoS attack with isolated follower (The blue nodes indicate agents not involved in the attacks, the browns nodes indicate the agent affected by the attacks, and the nodes marked with a green shadow represent the isolated agents.)
Drones 08 00715 g001
Figure 2. Design framework of guaranteed performance resilient security consensus control scheme (GPC: guaranteed performance control).
Figure 2. Design framework of guaranteed performance resilient security consensus control scheme (GPC: guaranteed performance control).
Drones 08 00715 g002
Figure 3. Sketch of the evolution of V ( t ) under asynchronous DoS attack. (a) The value of V ( t ) decreases during DoS-inactive intervals. Conversely, it may increase during DoS-active intervals. (b) Over the entire time horizon, V ( t ) exhibits a resilient attenuation trend, and eventually achieves globally resilient stability by using the proposed control strategy.
Figure 3. Sketch of the evolution of V ( t ) under asynchronous DoS attack. (a) The value of V ( t ) decreases during DoS-inactive intervals. Conversely, it may increase during DoS-active intervals. (b) Over the entire time horizon, V ( t ) exhibits a resilient attenuation trend, and eventually achieves globally resilient stability by using the proposed control strategy.
Drones 08 00715 g003
Figure 4. Possible network topology of the NCS under synchronous DoS cyber attacks, where G 0 , G 1 , G 3 represent a connectivity-sustained DoS cyber attack, and G 2 represents a connectivity-broken DoS cyber attack (0: Leader, 1–4: follower agents).
Figure 4. Possible network topology of the NCS under synchronous DoS cyber attacks, where G 0 , G 1 , G 3 represent a connectivity-sustained DoS cyber attack, and G 2 represents a connectivity-broken DoS cyber attack (0: Leader, 1–4: follower agents).
Drones 08 00715 g004
Figure 5. Curves of consensus tracking errors e i ( t ) with guaranteed control performance ζ i ( t ) [26].
Figure 5. Curves of consensus tracking errors e i ( t ) with guaranteed control performance ζ i ( t ) [26].
Drones 08 00715 g005
Figure 6. Curves of fuzzy adaptive parameters γ ^ i , m .
Figure 6. Curves of fuzzy adaptive parameters γ ^ i , m .
Drones 08 00715 g006
Figure 7. Curves of resilient security consensus controller u i ( t ) .
Figure 7. Curves of resilient security consensus controller u i ( t ) .
Drones 08 00715 g007
Figure 8. Fuzzy approximation of unknown nonlinear functions F i , m ( t ) .
Figure 8. Fuzzy approximation of unknown nonlinear functions F i , m ( t ) .
Drones 08 00715 g008
Figure 9. Curves of consensus tracking errors e i ( t ) with guaranteed control performance ζ i ( t ) under proposed method and [15].
Figure 9. Curves of consensus tracking errors e i ( t ) with guaranteed control performance ζ i ( t ) under proposed method and [15].
Drones 08 00715 g009
Figure 10. Curves of resilient security consensus controller u i ( t ) under proposed method and [15].
Figure 10. Curves of resilient security consensus controller u i ( t ) under proposed method and [15].
Drones 08 00715 g010
Figure 11. Network topologies of the multi-UAV network (Blue nodes: follower UAVs, Red node: Leader UAV, yellow dashed lines: normal communication links, and white dashed lines: attacked communication links) and the software/hardware relationships.
Figure 11. Network topologies of the multi-UAV network (Blue nodes: follower UAVs, Red node: Leader UAV, yellow dashed lines: normal communication links, and white dashed lines: attacked communication links) and the software/hardware relationships.
Drones 08 00715 g011
Figure 12. The constructed semi-physical hardware-in-the-loop simulation platform.
Figure 12. The constructed semi-physical hardware-in-the-loop simulation platform.
Drones 08 00715 g012
Figure 13. Flight trajectories of the follower UAVs among the distributed formation.
Figure 13. Flight trajectories of the follower UAVs among the distributed formation.
Drones 08 00715 g013
Figure 14. Curves of formation flight states of all UAVs under asynchronous DoS attacks: flight velocity V i ( t ) , flight path angle θ i ( t ) , and heading angle ψ i ( t ) (Part I).
Figure 14. Curves of formation flight states of all UAVs under asynchronous DoS attacks: flight velocity V i ( t ) , flight path angle θ i ( t ) , and heading angle ψ i ( t ) (Part I).
Drones 08 00715 g014
Figure 15. Curves of consensus tracking errors of all UAVs under asynchronous DoS attacks: flight velocity V i ( t ) , flight path angle θ i ( t ) , and heading angle ψ i ( t ) (Part I).
Figure 15. Curves of consensus tracking errors of all UAVs under asynchronous DoS attacks: flight velocity V i ( t ) , flight path angle θ i ( t ) , and heading angle ψ i ( t ) (Part I).
Drones 08 00715 g015
Figure 16. Curves of resilient security consensus control signal vectors u i = [ a T i , a ϕ i , a θ i ] T (Part I).
Figure 16. Curves of resilient security consensus control signal vectors u i = [ a T i , a ϕ i , a θ i ] T (Part I).
Drones 08 00715 g016
Figure 17. Curves of consensus tracking errors of all UAVs under asynchronous DoS attacks: flight velocity V i ( t ) , flight path angle θ i ( t ) , and heading angle ψ i ( t ) (Part II).
Figure 17. Curves of consensus tracking errors of all UAVs under asynchronous DoS attacks: flight velocity V i ( t ) , flight path angle θ i ( t ) , and heading angle ψ i ( t ) (Part II).
Drones 08 00715 g017
Table 1. Design parameters of resilient security consensus control scheme in Experiment I.
Table 1. Design parameters of resilient security consensus control scheme in Experiment I.
c i , 1 s c i , 1 a c i , 2 s c i , 2 a r i , 0 s r i , 0 a r i , 1 s r i , 1 a r i , 2 s
0.50.32.21.60.80.50.70.70.4
r i , 2 a k i , 0 s k i , 0 a k i , 1 s k i , 1 a k i , 2 s k i , 2 a q i , 1 q i , 2
0.23.54.52.52.71.41.855
Table 2. Initial states, physical parameters, and attack strength parameters in Experiment III.
Table 2. Initial states, physical parameters, and attack strength parameters in Experiment III.
Initial state values of the network
V i ( 0 ) θ i ( 0 ) ϕ i ( 0 ) p 10 p 20 p 30 p 40
10 m/s0 rad0 rad [ 5 m , 5 m , 606 m ] T [ 36 m , 33 m , 606 m ] T [ 25 m , 27 m , 596 m ] T [ 56 m , 26 m , 595 m ] T
Physical parameters of UAV system
m 1 m 2 m 3 m 4 g Δ t γ i
20.64 kg 27.35 kg 25.09 kg 32.25 kg 9.8 m / s 2 0.001  s3
Attack strength parameters
h T U ρ U τ U η U Ξ ¯ U min n ¯ U min
0.001 s3 s6.25216.2 s8
Table 3. Design parameters of resilient security consensus control scheme in Experiment III.
Table 3. Design parameters of resilient security consensus control scheme in Experiment III.
c i , 1 s c i , 1 a c i , 2 s c i , 2 a r i , 0 s r i , 0 a r i , 1 s r i , 1 a r i , 2 s
0.80.73.33.90.70.70.40.40.6
r i , 2 a k i , 0 s k i , 0 a k i , 1 s k i , 1 a k i , 2 s k i , 2 a q i , 1 q i , 2
0.66.56.57.27.25.53.588
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhou, C.; Wang, Y.; Sun, Y.; Fu, C. Guaranteed Performance Resilient Security Consensus Control for Nonlinear Networked Control Systems Under Asynchronous DoS Cyber Attacks and Applications on Multi-UAVs Networks. Drones 2024, 8, 715. https://doi.org/10.3390/drones8120715

AMA Style

Zhou C, Wang Y, Sun Y, Fu C. Guaranteed Performance Resilient Security Consensus Control for Nonlinear Networked Control Systems Under Asynchronous DoS Cyber Attacks and Applications on Multi-UAVs Networks. Drones. 2024; 8(12):715. https://doi.org/10.3390/drones8120715

Chicago/Turabian Style

Zhou, Chuhan, Ying Wang, Yun Sun, and Chaoqi Fu. 2024. "Guaranteed Performance Resilient Security Consensus Control for Nonlinear Networked Control Systems Under Asynchronous DoS Cyber Attacks and Applications on Multi-UAVs Networks" Drones 8, no. 12: 715. https://doi.org/10.3390/drones8120715

APA Style

Zhou, C., Wang, Y., Sun, Y., & Fu, C. (2024). Guaranteed Performance Resilient Security Consensus Control for Nonlinear Networked Control Systems Under Asynchronous DoS Cyber Attacks and Applications on Multi-UAVs Networks. Drones, 8(12), 715. https://doi.org/10.3390/drones8120715

Article Metrics

Back to TopTop