1. Introduction
Networked systems have achieved successful applications in various fields, including civil infrastructure, environmental monitoring, intelligent transportation, and smart grids [
1]. The performance of various components within a networked system is contingent upon the accuracy of data transmission over the communication network, which is determined by the capabilities of the measurement and data transmission technologies employed. Recent advancements have shown a proclivity toward wireless shared communication networks over wired or dedicated networks [
2]. Although the adoption of multi-purpose communication networks can reduce maintenance costs and provide flexibility in system architecture design, it also introduces new challenges. Open wireless communication networks, in particular, are vulnerable to network attacks and delays as opposed to separate dedicated network communication channels [
2,
3]. For this reason, an increasing number of studies focus on the security of wireless networked systems.
Deception attacks, denial-of-service (DoS) attacks, and replay attacks are among the most prevalent forms of attack in networked systems [
4,
5,
6]. Due to the ease of implementation, DoS attacks have become one of the most common threats to networked systems. These attacks interfere with communication channels between sensors and robust state estimators, disrupting the availability of resources and resulting in packet dropping [
7]. Various results have been published for the security of networked systems under DoS attacks. The measurement of missing phenomena caused by DoS attacks can be modeled using two fundamental methods: a binary switching sequence or a Markov chain. The security control of networked switched systems under the threat of DoS attacks during the transmission of output information from sensors to controllers is investigated in [
8]. By assuming that DoS attacks follow a Bernoulli distribution, an event-triggered sampling mechanism is proposed to reduce the communication burden while preserving satisfactory performance. In [
9], two independent Bernoulli distributions are used to model periodic DoS attacks and random packet dropout for cyber-physical systems. In [
10], an aperiodic DoS attack is introduced, characterized by its duration and frequency, and a switched fuzzy Markov jump closed-loop system is established. An event-triggered scheme that incorporates membership functions is proposed to address the mismatched behavior between the membership functions of a fuzzy system and its fuzzy controller. The problem of event-triggered resilient
control for the Markov closed-loop jump system subject to DoS attacks is considered in [
11], where criteria are proposed to ensure the
control performance of the system.
In the literature mentioned above, network communication is considered to be continuous, leading to a waste of communication resources. By reducing unnecessary data transmissions, an event-triggered mechanism helps reduce network traffic or congestion and mitigate network-related phenomena such as transmission delays and packet loss, thereby satisfying the basic quality-of-service requirements in the design of networked system estimators. An event-triggered mechanism can achieve a balance between the desired system estimation performance and resource utilization efficiency. In [
12], a dynamic event-triggered strategy is proposed, which offers greater flexibility in setting the event-trigger threshold. The application of a node-based adaptive strategy eliminates the need for global information in the investigation of consensus for multi-agent systems. In [
13], a new dynamic event-triggered mechanism is introduced for event-triggered control systems, featuring the inclusion of an internal dynamic variable. A general framework for the event-triggered stabilization of nonlinear systems using hybrid system tools is presented in [
14]. This framework encompasses a wide range of existing event-triggered control techniques and provides a basis for their generalization and revision. The use of deterministic event triggers to schedule sensors destroys the Gaussian property of the state, rendering it computationally intractable to obtain an exact minimum mean-squared-error estimate. In response, a stochastic event-triggered sensor schedule for state estimation is introduced in [
15], which is designed to preserve the Gaussianity of the system. Time delays are a common occurrence in complex networks due to factors such as network traffic congestion and the finite speed of signal transmission over links. The preponderance of the existing literature on the control and state estimation of systems with delays pertains to delays in inputs or actuators. Nonetheless, in networked systems, delays can also originate from sensor measurements or communication networks. The delay of most sensors and communication networks is similar or slightly modified due to their acquisition environment, acquisition algorithm, and transmission environment. Considering that subtle changes have less impact in the discrete domain, it is reasonable to assume that the measurement delay is constant. The decision-making process of a controller within a networked system depends on data from sensor measurements, and any delay in measurements or network transmission can adversely affect the system’s performance. Therefore, it is crucial to have an accurate real-time estimator capable of providing an accurate state of the system in the presence of delays.
Measurement delay in state estimation is a well-known issue, often referred to as the time-varying measurement problem, the time-delayed measurement problem, or the out-of-sequence measurement (OOSM) problem. Four distinct approaches exist for addressing problems with known delays: prediction, extrapolation, re-organized innovation, and state augmentation. Prediction, when applied within the Kalman filter algorithm, provides a solution to the one-step delayed OOSM problem. In [
16], a method for forward prediction of OOSMs that does not rely on retrodiction is proposed. The tracklet is predicted forward and de-correlated from the actual track using a track de-correlation method similar to the information filter approach before being fused with the actual track. This method, referred to as forward-prediction fusion and de-correlation, has been shown to compare favorably to retrodiction-based algorithms while requiring less data storage in most cases. The extrapolation approach is a second viable method for addressing time-delayed measurement problems. In [
17], a method involving the “extrapolation” of measurements to the current moment using past and present estimates of the Kalman filter is proposed, and the optimal gain of the extrapolated measurements is determined. Re-organized innovation is derived based on the projection in Hilbert space and an innovation analysis method. In [
18], a system with
l-time delayed measurements is studied using re-organized innovation analysis. State augmentation is an effective approach for tackling the time-delayed measurement problem. The approach involves utilizing the delayed measurement to estimate the state of the corresponding past moment and deriving the current state prediction from this corrected past state. The key to this approach lies in augmenting the state vector in a skillful manner and establishing a correlation between the augmented state vector, which includes the corresponding past state, and the delayed measurement. An augmented state Kalman filter is proposed in [
19] to address the state estimation problem with time-delayed measurements. The uncertainty of the delay time is resolved based on its probability distribution. In [
20], the problem of state estimation in the presence of delay uncertainty is studied and uncertain delay is represented as a probability density function. The proposed estimator addresses the impact of uncertain delayed measurements by incorporating an augmented state Kalman filter.
State estimation, commonly employed in automatic control and signal processing, refers to the process of estimating the internal state of a dynamic system based on available measurement data. Many conditions in the dynamic and measurement processes of real networked systems are nonlinear [
21,
22]. As a result, various estimation methods for nonlinear systems have been proposed, including the extended Kalman filter (EKF) [
23], unscented Kalman filter (UKF) [
24], cubature Kalman filter [
25], and so on. Ref. [
26] presents a method for nonlinear state estimation of biomass in a batch bioprocess, which employs the EKF with a sample-state augmentation method to incorporate delayed measurements. A dynamic state estimation algorithm is proposed in [
27], which employs Holt’s two-parameter exponential smoothing and extended Kalman filtering techniques. The recursion formula for parameter identification, state prediction, and state filtering incorporates the statistical characteristics of data packet losses caused by DoS attacks. However, all these techniques assume that the system model is accurate and do not account for linearization errors.
The EKF is an efficient method for state estimation of a nonlinear state-space model, which is an expanded version of the standard Kalman filter. However, this approach may suffer performance degradation if there are considerable linearization errors caused by first-order linear approximations. To enhance estimation performance, various methods have been developed to address linearization errors. In [
28], an adaptive loop is proposed that repeatedly executes a nonlinear solver on a fixed mesh until the linearization error estimate falls below the discretization error estimate. The mesh is then adaptively refined and the loop continues. In order to overcome the limitations imposed by linearization, the unscented transformation is introduced in [
29] as a method for conveying mean and covariance information through nonlinear transformations. It is more precise, simpler to implement, and requires the same order of calculations as linearization. A robust tracking technique for the heating value in an underground coal gasification process is presented in [
30], which utilizes dynamic integral sliding-mode control and a gain-scheduled modified Utkin observer. This control scheme can effectively handle parametric uncertainties, measurement noise, and water influx disturbance. A robust EKF is developed in [
31] to provide an optimized upper bound on the state estimation error covariance, even in the face of model uncertainties and linearization errors. It possesses robustness against process noises, measurement noises, linearization errors, and model uncertainties.
Although there is extensive research on nonlinear systems, as indicated by the above analysis, few papers in the public domain specifically address methods for simultaneously overcoming constant measurement delays, DoS attacks, and linearization errors in nonlinear systems. In this paper, we concentrate on the event-triggered robust state estimation for nonlinear networked systems with constant measurement delays against DoS attacks. The robust state estimation algorithm is investigated based on the connection between the Kalman filter and the regularized least-squares problem. To reduce the transmission burden on the communication network, an event-triggered mechanism is implemented in the estimation process and a binary variable is used to represent the packet-sending parameter. Packet loss resulting from DoS attacks that jam communication networks is characterized by a Bernoulli distribution. Subsequently, a packet-arrival parameter that contains information about both the packet-sending and packet-loss parameters is explicitly included in the improved cost function. We meticulously design a specific state augmentation method to address constant measurement delays and modify the cost function of the regularized least-squares problem to account for linearization errors. An analytic expression for the robust state estimator is obtained, which is recursively implementable and has a form similar to the EKF. Furthermore, we design numerical simulations to confirm the efficacy of the proposed event-triggered robust state estimator.
The remainder of this paper is organized as follows. In
Section 2, we present our model of packet loss due to DoS attacks and the packet transmission of the event trigger, as well as introduce an event-triggered nonlinear system model with a constant measurement delay under DoS attack conditions. In
Section 3, a time-delay model is transformed into a formally non-time-delay model using a state augmentation method, an improved event-triggered model with a fixed measurement delay under DoS attacks is obtained, and a robust state estimation algorithm that employs a sensitivity penalty for the nonlinear networked system is proposed. In
Section 4, we present numerical examples that demonstrate the efficacy of the estimator proposed in this paper. Finally,
Section 5 summarizes the work of this paper.
Notations: denotes the set of natural numbers, including zero. denotes the n-dimensional Euclidean space. denotes the norm with weighted coefficients . The Euclidean norm for real vectors is denoted by . represents the expectation of a random vector or matrix and represents the probability of *. denotes the variance of *. indicates the operation bracket of the stacking vector or matrix. is a block diagonal matrix.
2. Problem Formulation
We present a nonlinear networked system structure for even-triggered remote robust state estimation with a measurement delay against DoS attacks, as depicted in
Figure 1. It consists of six main parts: a process, a sensor, an event trigger, a wireless network, an attacker, and a remote robust state estimator. The sensor continuously sends measurement values to the event trigger, where the event-triggered transmission mechanism decides if transmission to the remote state estimator over the wireless communication network is necessary. In addition to the packet loss caused by DoS attacks from network attackers, the wireless communication network also experiences transmission delays due to its structure, as shown in
Figure 2.
If a sensor takes a measurement at the same instant that the measurement value is available in a filter, a general filtering algorithm such as the EKF can generate a consistent and correct estimation result. This ideal scenario is represented in
Figure 3, where there is no time delay in the system. In contrast, in a delayed networked system, the time at which the sensor sends out the measurement value and the time at which it is received by the remote state estimator do not coincide, as shown in
Figure 2.
An event-triggered transmission strategy is an effective method for reducing communication rates and alleviating bandwidth pressure on wireless communication networks. We consider a noisy measurement channel
where
and
denote the state vector and measurement output, respectively.
represents the effect of communication noise.
is a nonlinear function and is assumed to be continuously differentiable. Let
represent a packet-sending parameter, which is a binary variable taking the value of 1 if the data packet
is transmitted at time instant
t, and 0 otherwise. This relationship can be expressed as follows:
where the vectors
.
denotes the number of time instants elapsed since the last transmission of the sensor, i.e.,
is such that
and
. The positive real
has to be chosen to ensure that it satisfies the following transmission rate constraint:
where the transmission rate
. For any given desired transmission rate
, the threshold
can be readily determined by
, where
is the cumulative distribution function of an
random variable with
m degrees of freedom.
In a wireless networked system, the inherent openness of the wireless communication network makes it vulnerable to malicious network attacks such as DoS attacks—one of the most common and typical types of network attacks. When a DoS attack occurs, network congestion can lead to the loss or even continuous loss of sensor measurement data packets. This packet loss is time-varying due to the limited power of DoS attacks, which affects the state estimation results and endangers the safe operation of the system. Let
represent a packet-dropping parameter, which is determined depending on whether the communication channel is congested by an attacker using DoS attack techniques. We assume that the sequence of
is independent and identically distributed, forming a Bernoulli process, which is used to illustrate the stochastic property of packet sequential loss. Therefore, the packet-dropping parameter
can be expressed as follows:
predicts the occurrence of packet loss caused by DoS attacks at time instant t, which receives a value of 1 when the data packet is successfully delivered and a value of 0 when the communication channel is congested due to DoS attacks. The packet-dropping rate is represented by .
For the convenience of representation and calculation, let
represent a packet-arrival parameter, which can be expressed as follows:
This parameter represents whether the remote state estimator has received the packet from the event trigger. At time instant t when the remote robust state estimator successfully receives the packet, ; otherwise, . In practical engineering, the packet-arrival parameter can be achieved through timestamp technology.
Consider an event-triggered nonlinear networked system
with a constant measurement delay under DoS attacks. The plant dynamics and its output measurements received by a remote robust state estimator are assumed to be describable using the following discrete model:
where
represents the time index. The variable
indicates the number of time-delayed frames of the measurement signal, which is known and time-invariant.
is a known external input signal. The vector
denotes the process noises.
, which is nonlinear, is assumed to possess continuous differentiability. It is assumed that
,
, and
are uncorrelated random vectors, with
and
,
, where
,
, and
are known positive definite matrices, and
represents the Kronecker delta function, which equals 1 when
and 0 whenever
.
is the packet-arrival parameter, which is equal to 1 or 0, and needs to be adjusted according to whether the data packet arrives or not.
3. Design of the Robust State Estimator
We perform the three-step operation shown in
Figure 4 on nonlinear system
to further design the robust state estimation algorithm.
In the same manner as with the EKF, we first perform a first-order Taylor approximation to the nonlinear system
. By linearizing the nonlinear function
in Equation (5) and the function
in Equation (6) at the posterior estimate and the prior estimate, respectively, and omitting higher-order infinitesimals, we can approximate the nonlinear system as follows:
The matrices in the above equation are defined as
which are known Jacobian matrices at the
t-th sampled instant. We abbreviate
and
to
and
, respectively.
represents the state estimate based on the measurement output
.
Linearization errors can severely degrade the performance of the EKF, particularly when heavily weighted. To mitigate these problems, it is necessary to implement specific considerations and employ an estimation algorithm that is robust to linearization errors. By combining the known terms of the system
and taking into account linearization errors in state estimations, we revise the system
as the following system:
where
and
, which are known values at the
t-th sampled instant. We abbreviate
and
to
and
, respectively. In addition,
and
denote the differences between the true value of the plant state vector and its posterior and prior estimates at time t, respectively. To be more precise,
is composed of
and
is composed of
, which corresponds to the true value of the plant state vector.
In order to make the corresponding estimation problem mathematically tractable, the elements of the state estimation errors, namely
and
,
, are assumed to be independent of each other. Specifically, the matrices
and
are defined in the same manner as
and
in Equation (
9). In other words, the definitions of these matrices are identical to those of
and
, respectively.
By expanding
at
, we obtain
where
denotes the
j-th component of
,
. Furthermore, we obtain
where
. The system matrices
and
are differentiable at every time instant with respect to every element of
and
, respectively.
Since conventional state estimators such as the EKF are not directly applicable to systems with time delays, we implement state augmentation to transform the measurement-delay system into a system without time delays in its form.
Theorem 1. Under the assumption that the number of measurement-delay frames is known and constant, we construct the augmented state , where . We transform the system into the following equivalent model: where Proof of Theorem 1. Thus, the system
can be re-expressed as the following system:
By combining
and
, and calculating
, we can obtain
Combining Equations (
17)–(
20) and (
25) yields
From (
21), we can deduce that
By combining (
26) and (
27), we can obtain the system
. The proof of Theorem 1 ends here. □
State augmentation is a straightforward yet potent method that entails modifications to the parameter matrix. This transformation results in the system with no measurement delay in its form and an increase in the system dimension from n to . The proposed state augmentation method indirectly establishes a correlation between the delayed measurements and the current state. As the time delay becomes larger, the system requires more computational resources to process and handle the delay. More specifically, the computational burden of the system does indeed increase correspondingly with the increase in the measurement delay. However, in practical engineering applications, the degree of the time delay is typically not excessive, minimizing the impact of this issue. During the derivation of the state estimator, the number of time-delayed frames, denoted as d, is required as it is included in both the coefficient matrix and the augmented state .
According to [
32], the Kalman filter can be interpreted as the solution of a regularized least-squares (RLS) problem, which for the system
can be expressed as
where
. The objective of the RLS problem is to ameliorate the estimation through the inclusion of new measurements; however, its effectiveness may be constrained by linearization errors.
Considering the appreciable deterioration of estimation performance because of linearization errors, which are generally unavoidable, and the pockets of sensor measurement data that do not arrive due to malicious network attacks and event triggers, we improve the cost function of the RLS problem as follows:
where
. When disregarding the linearization error, we can obtain the cost function of the RLS problem, which is Equation (
28). However, a large linearization error can reduce the estimation accuracy of the estimator and even cause a divergence of the estimation values. To improve the estimation performance of the state estimator when there is a large linearization error in the system and to enhance the robustness of the estimator, we add penalties for sensitivity to the linearization error by adding the corresponding differential terms in Equation (
28). The basic principle is that the deviation of the innovation process from its nominal value reflects the contribution of the linearization error to the prediction error of the Kalman filter concerning the equipment output. These deviations usually have complex expressions, making it difficult to mathematically handle the corresponding estimation problem. To streamline processing, we conduct a first-order approximation of the deviations via linearization around the origin. In Equation (
29),
is a design parameter reflecting a trade-off between nominal estimation accuracy and penalization on the first-order approximation of deviations of the innovation process. Furthermore,
is explicitly utilized and is generally obtainable in communications following the receipt of
. To enable access to this information, the only requirement is the incorporation of an indication code or timestamp into the communication channel. In the event that the measurement is successfully conveyed, as denoted by
, this cost function signifies that given the arrival of new information concerning
at time instant
, its estimate should be updated in a robust fashion. If the remote robust state estimator is unable to receive the sensor measurement data packets, as denoted by
, then
will be devoid of any information pertaining to the plant output. A recursive robust estimation algorithm can be derived through the application of this construction procedure.
Theorem 2. Assume that both and are invertible, and is defined as . The state vector of the nonlinear system can be estimated based on and Equations (28) and (29) using the following recursive process. - (1)
Linearization.where we abbreviate , , and as , , and , respectively. - (2)
Parameter modification.where we abbreviate , , , , and as , , , , and , respectively. - (3)
Time-update step: update of the state predictions and pseudo-covariance matrix of the prediction errors. - (4)
Measurement-update step: update of the state estimation, pseudo-covariance matrix, and estimator gain.where denotes the j-th component of vector .
To demonstrate the theoretical results presented in this paper, the following well-known results from matrix analysis and linear estimations, as described in [
33], are required.
Lemma 1. Assuming arbitrary matrices A, B, C, and D with dimensions that are compatible, it is postulated that all matrix inverses necessary for the calculations are present. Then, Proof of Theorem 2. In the interest of brevity, we define the vectors and as and , respectively. Furthermore, we define the matrices , , , , and as (37)–(41), respectively.
It should be noted that for all
, the following is satisfied:
It can be easily shown, based on the definition of the cost function
, that
It should be noted that
is a convex function and
. The optimal value of
, denoted as
, which minimizes
, is determined by its first-order derivative condition. That is,
We can directly utilize the inverse application of the matrix inversion in Lemma (57b) to obtain the following equation:
Then, from Lemma 1 and the definitions of the matrices
and
, we can immediately obtain the following relation:
By substituting this relation into (
62), it can be further proved that
Hence,
where
.
In the derivation of the above equation, the relation
is utilized, which is a direct result of the definition of the matrix. By adding the relation
to the above equation, we can finally obtain
The proof of Theorem 2 ends here. □
4. Numerical Simulations
In this section, we choose a simple yet representative nonlinear system as the object observed by the sensor since its highly representative nonlinear characteristics can well reflect the superiority of the robust state estimation algorithm designed in this paper. As illustrated in
Figure 5, the voltage value
v of the oscillation circuit consisting of a double-tunnel diode negative-resistance circuit, as described in [
34], is selected as the estimation target. When the negative-resistance circuit satisfies characteristic
, the circuit equation can be rewritten as the following equation:
as described in [
35], which is known as the Van der Pol equation. Within the above equation,
,
,
, where
. By using the Van der Pol oscillator as a simplified representation, we can concentrate on the fundamental principles and methods of our proposed algorithm, which can then be applied to more complex actual nonlinear systems.
Consider a sensor that monitors the voltage of the Van der Pol oscillator and sends its measurements to an event trigger. The event trigger determines whether to send the data to a remote robust state estimator through a wireless communication network. We take into account the effects of transmission delays and DoS attacks during communication. The entire process is shown in
Figure 1. We choose the state vector
, the measurement vector
, and the system parameter
. The state equation and the measurement equation are shown below:
By employing the forward Euler method with a sampling interval of
to discretize the above state-space equation and introducing the process noise
, the measurement noise
, the packet-arrival parameter
and the number of measurement delays
d, we derive the following discrete state-space model:
By expanding the state equation using first-order Taylor linearization at
, ignoring higher-order terms, and introducing error parameters
, we can obtain
where
and
. We assign a value of
to the covariance of the process noise and a value of 1 to the covariance of the measurement noise. The initial pseudo-covariance matrix of the state is set to
, and the initial state is set to
. We set the number of measurement delays d = 2, which means that there is a delay of two sampling intervals from when the measurement value is sent from the event trigger to when it is received by the remote robust state estimator. More precisely, when utilizing timestamp technology, the number of measurement-delay frames is 2.
The variance of the ensemble-average estimation errors at each sampling instant is calculated through
random numerical simulations. The temporal variable,
t, is varied from 0 to
in the numerical simulations conducted. By evaluating the estimation error using the Euclidean distance between the actual and predicted values, the performance of the two estimation algorithms is compared. The variance of the ensemble-average estimation errors for these
random simulations at each sampling instant is computed as follows:
where
j represents the serial number of the random simulations. The root mean square error of the
k-th state component at each time instant is calculated as
.
The measurement-dropping parameter
is represented by a stationary Bernoulli process with an expected rate of
. We set the packet transmission rate to a value of
. The design parameter
is assigned a value of
. In
Figure 6a, the variance of the ensemble-average estimation errors with respect to the time variation for the two state estimation algorithms is demonstrated. In order to clarify the differences between the curves, they are partially re-plotted in
Figure 6b. It is evident that the overall variance of the estimation errors for both the voltage and its derivative, as obtained by the robust state estimator based on sensitivity penalization, is significantly superior to that of the EKF-based method that utilizes nominal parameter values. This indicates that the remote robust state estimator based on sensitivity penalization can effectively handle linearization errors to some extent. The root mean square error of the states is also shown in
Figure 6c,d. For a more intuitive presentation of the results,
Figure 6e illustrates the inversion of the packet-sending parameter, with “0” representing packet transmission and “1” denoting no packet transmission.
Figure 6f shows the resulting packet-dropping parameter when the transmission network experiences DoS attacks, where “0” indicates packet loss and “1” represents normal packet transmission. This aligns with the characteristics of DoS attacks, specifically that the attack duration is bounded and the packet loss changes over time due to the energy restrictions of the attacker. In
Table 1, we quantitatively compare the variance of the estimation errors and the root mean square error for the two different algorithms. By calculating the averages of the variance of the estimation errors and root mean square error in
Figure 6 for 200 moments and 600 experiments, we obtain the EEV and RMSE values listed in
Table 1. As shown in
Table 1, the robust state estimator has a lower variance of the estimation errors of 0.0984 compared to that of the EKF-based method, and the root mean square error of the two state components estimated by the robust state estimator is also lower than that of the EKF-based method. It is obvious that at the same packet-dropping rate, the performance of the robust state estimator designed in this paper is better than that of the EKF-based method.
The variance of the ensemble-average estimation errors of the robust state estimator under two different transmission rates,
and
, is depicted in
Figure 7. The analysis of the data reveals that higher transmission rates lead to improved estimation accuracy, although this comes with an associated increase in the transmission burden.