Next Article in Journal
Blockchain Factors in the Design of Smart-Media for E-Healthcare Management
Previous Article in Journal
Video Game-Based Trunk Exercises for Rehabilitation in Chronic Stroke Survivors: A Mixed-Methods Feasibility Study
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework

by
Ziyang Wang
,
Peng Lou
,
Yudong Wang
,
Juan Li
* and
Jiasheng Wang
*
College of Mechanical and Electrical Engineering, Qingdao Agricultural University, Qingdao 266109, China
*
Authors to whom correspondence should be addressed.
Sensors 2024, 24(21), 6834; https://doi.org/10.3390/s24216834
Submission received: 5 September 2024 / Revised: 21 October 2024 / Accepted: 22 October 2024 / Published: 24 October 2024
(This article belongs to the Section Vehicular Sensing)

Abstract

:
This paper investigates the motion state estimation problem of the unmanned surface vehicle (USV) steering system in wireless sensor networks based on the binary coding scheme (BCS). In response to the presence of bandwidth constraints and mixed cyber-attacks in USV communication networks, this paper proposes an improved set-membership state estimation algorithm based on BCS. This algorithm partially addresses the problem of degraded performance in USV steering motion state estimation caused by mixed cyber-attacks and bandwidth constraints. Furthermore, this paper proposes a robust resilient filtering framework considering the possible occurrence of unknown but bounded (UBB) noises, model parameter uncertainties, and estimator gain perturbations in practical scenarios. The proposed framework can accurately estimate the sway velocity, yaw velocity, and roll velocity of the USV under the concurrent presence situation of mixed cyber-attacks, communication capacity constraints, UBB noises, model parameter uncertainties, and estimator gain perturbations. This paper first utilizes mathematical induction to provide the sufficient conditions for the existence of the desired estimator, and obtains the estimator gain by solving a set of linear matrix inequalities. Then, a recursive optimization algorithm is utilized to achieve optimal estimation performance. Finally, the effectiveness of the proposed estimation algorithm is verified through a simulation experiment.

1. Introduction

With the development of networked system and communication technology, the utilization of unmanned surface vehicles (USVs) is becoming increasingly significant in the supervision of marine ranches. Acquiring the real-time state of USV steering motion is crucial for enabling functions such as vigilant patrolling and intelligent obstacle avoidance. The states (or variables) of USV steering motion mainly include rudder angle, yaw velocity, roll velocity, and sway velocity, which can provide references for USV to make navigation decisions and path planning. However, direct measurement of these data requires the use of expensive sensors, which are highly susceptible to corrosion and failure in sea environments, resulting in the inability of USVs to function [1]. To address this problem, the use of soft measuring techniques to estimate the state of USV steering motion has attracted research interest in both academia and industry [2,3,4].
In fact, state estimation has been a research hotspot in various fields such as fault diagnosis [5,6,7], control engineering [8,9,10], and signal processing [11,12,13] during the last few decades. Among these hotspots, USV is one of the research subjects, attracting a growing interest from researchers. For example, in [14], an augmented state adaptive Kalman estimator was designed to estimate the state and disturbances of an underactuated USV. In the case of a USV experiencing packet loss and delays, a fault-detection filter based on an observer was designed to estimate possible faults and disturbances of the USV [15]. It is important to point out that the current findings regarding state estimation of the USV are mostly obtained based on the assumption that the noise belongs to L 2 [ 0 , ) or follows Gaussian distribution [16,17,18]. However, in practical operation, USVs are subject to disturbances from wind and waves, and these disturbances have statistical characteristics that are unknown but bounded (UBB). In response to these practical situations, the traditional state estimation approaches, such as Kalman filtering and H filtering, become inapplicable. While set-membership filtering has unique advantages in dealing with UBB noise, its application in USVs is very limited. We have only seen two published research results [19,20], and these existing studies have not yet considered the problems of uncertainty in real sea conditions.
It is well known that uncertainty widely exists in practical systems. For USVs, on one hand, the steering motion model of the USV overlooks certain minor factors during the modeling process, resulting in a certain degree of uncertainty in the model itself. On the other hand, as the USV’s hull is immersed in seawater for extended periods, the components on the USV are inevitably subjected to corrosion from seawater and sea breeze, leading to performance degradation and aging phenomena, which can cause perturbations in model parameters, subsequently introducing perturbations in the estimator gains for state estimation [21]. The occurrence of these two situations can deteriorate the estimation performance of the USV system’s motion state. Therefore, the resilience of state estimation as a practical requirement when designing estimators. In recent years, the problem of resilient/non-fragile set-membership estimation for various systems has gained significant attention from scholars. For instance, In [22], a approach based on non-fragile set-membership estimator was proposed to estimate the quantized discrete-time memristive neural networks with mixed time-delay under the maximum error first protocol, which can effectively reduce the influence of estimator gain perturbations on estimation performance. In [20], a resilient set-membership estimation approach based on the Try-Once-Discard (TOD) protocol was proposed for the discrete model of USV steering motion with uncertain parameters, which ensures that the estimation errors are confined to predetermined ellipsoidal regions even in the presence of uncertain parameters. In practice, although USVs may simultaneously experience estimator gain perturbations and parameter uncertainties, based on our knowledge, we have not seen research results that consider estimator gain perturbations and parameter uncertainty simultaneously, let alone designing corresponding resilient/non-fragile algorithms. In addition to the aforementioned uncertainty problems, the application of wireless communication networks brings communicative conveniences for USV, while also presenting potential threats [23,24].
One potential threat of network communication is that, due to the open and unprotected nature of USV communication networks, unauthorized individuals such as illegal fishermen or competitors can easily obstruct the normal transmission of data by carrying out cyber-attacks, which may cause the USV estimation performance to deteriorate. Therefore, the timely detection and correction of potential cyber-attacks in measurement data of USV have gained increasing attention. For example, in [15], a fault-detection filter based on the elastic event-triggered mechanism was proposed to mitigate the influence of Denial of Service (DoS) attacks on the USV while reducing the communication burden. In [25], an event-based distributed edge-triggered extended state observer was designed to estimate the underactuated USV subjected to DoS attacks, which enables the timely detection of cyber-attacks and the quick recovery of the USV’s position and speed information when the attacks disappear. However, it is worth noting that, on the one hand, considering the types (e.g., bias injection attack [26], replay attack [27], DoS attack [28], and mixed attacks [29]) and features (e.g., intermittency [30], probability [31], and occasionality [32]) of cyber-attacks are various, it is challenging to consistently detect them correctly. On the other hand, considering the complex and variable nature of real sea conditions, even if an attack signal is detected correctly, it may still cause some irreversible influences on the estimation performance if it is not handled in a timely manner. Therefore, unlike the existing “passive” solutions to cyber-attack problems, a seemingly natural idea is to select an “active” solution to mitigate the influence of the cyber-attacks on communication channels, thereby enhancing the state estimation performance of USVs in response to cyber-attacks. This is also one of the original intentions in this study.
Another potential threat of network communication is that, due to bandwidth constraints in channels, network-induced phenomena such as missing measurements and time-delays may occur during data transmission, leading to a decrease in the overall performance of the estimator [33,34,35,36,37,38]. Various approaches have been proposed to reduce the communication burden, thereby avoiding the occurrence of the aforementioned network-induced phenomena [19,20,39,40,41]. For instance, in the problems of USV heading tracking under wave disturbances, a coding scheme based on logarithmic quantization was proposed to reduce communication burden and mitigate data conflicts [19]. In [20], a collective state estimation algorithm based on the TOD scheduling protocol was proposed for USV steering motion in bandwidth-constrained networks, which allows only a sensor node with the maximum difference from the previous values to send the latest data to the networks at each transmission time, thereby reducing communication burden while ensuring that estimation errors are confined within predetermined ellipsoidal regions. From the aforementioned literature and related studies, it can be observed that existing studies either utilize various network protocols and triggering mechanisms to schedule sensors or employ coding scheme based on logarithmic quantization to compress data in the channels. These approaches effectively reduce the communication burden to a certain extent, but in practical engineering, the quality of the transmitted data is difficult to guarantee due to reasons such as excessive number of sensor nodes, improper triggering threshold setting and overly complex logarithmic quantization processes. Additionally, it is also challenging for these existing approaches to effectively mitigate the influence brought by cyber-attacks. Therefore, the main motivation of this study is to select a suitable solution for the steering motion state estimation problem of USV with communication channels influenced by the mixed cyber-attacks and bandwidth constraints, which ensures the quality of the data transmitted, while not only “actively” mitigating the influence of cyber-attacks on communication channels, but also reducing the communication burden.
To address the above-mentioned problem, considering the robustness and simplicity of binary data in transmission [42,43,44,45,46], we propose to utilize binary coding scheme (BCS) to encode the data, thereby mitigating the influence of bandwidth constraints and cyber-attacks on the state estimation performance of USV steering motion. In addition, to cope with the potentially changing of network bandwidth, a binary bit string length selection strategy has been proposed and introduced into BCS. As a popular active security measure, BCS has gained extensive application in networked systems for the purpose of ensuring dependable data transmission [39,47,48,49]. However, when it comes to the USV steering motion, the state estimation problem based on the BCS has not received sufficient attention under the framework of set-membership estimation, this is mainly due to the following challenge: the implementation of the BCS enhances the complexity of the model, which poses significant challenges to the designs and performance analysis of the estimator.
Based on the above discussions and practical requirements, this paper proposes a robust resilient filtering framework for the problem of USV steering motion state estimation based on BCS under the situations of mixed cyber-attacks, channel bandwidth constraints, UBB noises, parameter uncertainties, and estimator gain perturbations. The primary contributions of this paper are: (1) it is proposed that applying the BCS to the communication channel of the USV, which is threatened by cyber-attacks and bandwidth constraints, to reduce the communication burden, actively mitigate the influences of cyber-attacks on data transmission; (2) the considered mixed cyber-attacks consist of the bias injection attack and DoS attack, where the DoS attack is continuous and bias injection attack are stochastic, which better reflects the actual situation of the engineering; (3) the uncertainty problems, such as parameter uncertainties and estimator gain perturbations, are considered simultaneously, and a new framework of resilient set-membership estimation is designed for both cases.
The subsequent sections of this paper are organized in the following way: Section 2 gives the modeling of the USV steering motion model, the specific steps of the BCS and the design of the resilient set-membership state estimator, respectively. Section 3 provides sufficient conditions for the existence of the desired estimator by examining the solvability of a set of recursive Linear Matrix Inequations (LMIs) and obtains the locally optimal estimator gain by a recursive optimization algorithm. Section 4 verifies the algorithm’s effectiveness via a simulation experiment. Section 5 gives the conclusion of the paper.
Notation.  R h × n denotes the h × n real constant matrix. R n denotes the n-dimensional Euclidean space. P { β o = 1 } = β means the probability of the stochastic variable β o = 1 occurring is β . “T”denotes the transpose of a matrix. The notation S Z ( S > Z ) means that S Z is positive semi-definite (positive definite), where S and Z are the symmetric matrices. d i a g { } indicates a diagonal matrix. Other notations used are quite standard.

2. Problem Formulation

2.1. Modeling of the USV Steering Motion Model

In practical situations, we can analyze the USV steering motion from six degrees of freedom: yaw, pitch, roll, heave, sway, and surge. If we consider the asymmetrical motion [16], we can only focus on three main degrees of freedom: roll, yaw, and sway. The influence of pitch, heave, and surge can be treated as the disturbance. Then, we can obtain basic equations for sway, yaw, and roll based on Newton’s second law:
i x x k d 2 F k d t 2 = k k , r o l l i z z k d 2 H k d t 2 = n k , y a w M y k d 2 y k d t 2 = f y k ,    s w a y
where y k , x k and z k denote the transverse axis (directed to starboard), normal axis (directed from top to bottom), and longitudinal axis (directed from aft to fore), respectively; n k and k k denote the moments with respect to the z k and x k axes, respectively; i z z k and i x x k denote the moments of inertia with respect to the x k and z k axes, respectively; M y k denotes the effective mass of the marine vehicle in the y k direction; F k , H k , and f y k denote the roll angle, the heading angle, and the force in the y k direction, respectively.
By translating the equations in (1) to the coordinate system presented in Figure 1, where G in Figure 1 denotes the center of gravity, adopting Taylor expansion and Laplace transformation, and disregarding some hydrodynamic effects, one can achieve the following transfer functions for the models of the hydrodynamics forces:
θ ( s ) = X d v 1 + T v s u ( s ) ψ ( s ) = 1 1 + T r s [ X d r u ( s ) + X v r θ ( s ) + W ( s ) ] φ ( s ) = ω n 2 s s 2 + 2 ω n 𝜕 s + ω n 2 [ X d p u ( s ) + X v p θ ( s ) + V ( s ) ]
where θ ( s ) , ψ ( s ) , φ ( s ) , and u ( s ) denote the Laplace transformation of θ ( t ) , ψ ( t ) , φ ( t ) , and u ( t ) , respectively; u ( t ) denotes the rudder angle, which can be seen as the input, controlled by control devices, θ ( t ) , ψ ( t ) , and φ ( t ) denote the sway velocity caused by the rudder motion alone, the heading angle, and the roll angle, respectively, W ( s ) and V ( s ) represent the disturbances of waves and winds on ψ ( s ) and φ ( s ) under complex sea conditions, 𝜕 is the damping ratio, T v and T r are the time constants, and μ is the natural frequency. X d v , X d r , X v r , X d p , and X v p denote the known gains of transfer functions, which are linearly related to the forward speed (determined by the propeller), and given in Section 4.
Applying the inverse Laplace transform, the physical model (1) can be transformed into the state-space model in continuous time. Furthermore, forward Euler formula is unitized to convert the continuous-time model into the following discrete-time model [20]:
S o + 1 = B 1 S o + B 2 t = 0 o S t + C u o + D W o , Z o = E t = 0 o S t + G V o ,
where S o = [ θ o ψ o φ o ] T R n represents the discrete-time state vector and Z o = [ π o ϕ o ] T R m represents the measurement output in which π o and ϕ o denote the heading angle and the roll angle, respectively. W o and V o are process noise and measurement noise, respectively. u o R n denotes the rudder angle. Transition matrices B 1 , B 2 , C, D, E, and G are determined as:
B 1 = Δ t T v + 1 0 0 Δ t T r X v r Δ t T v + 1 0 μ 2 Δ t X v p 0 2 𝜕 μ Δ t + 1 , B 2 = diag { 0 , 0 , μ 2 ( Δ t ) 2 } , C = Δ t T v X d v Δ t T r X d r μ 2 Δ t X d p , D = 0 0 Δ t T r 0 0 μ 2 Δ t , E = 0 Δ t 0 0 0 Δ t .
Assumption A1.
In order to simulate the disturbances caused by waves and wind in real environments, this paper defines W o and V o as unknown but bounded noises, which satisfy the following ellipsoid sets:
W o T R 1 , o 1 W o 1 , V o T R 2 , o 1 V o 1 ,
where R 1 , o and R 2 , o are known positive definite matrices.
Remark 1.
In most practical situations, noise in USV motion is often difficult to identify accurately and has persistent influences. For example, wave disturbance is an irregular random sequence influenced by factors such as water density, hull length, wind force and tide, with extremely complex properties. However, in different cases, researchers can roughly estimate the possible peaks and troughs of wave disturbances and thus use them as boundary conditions. These boundary conditions can be transformed into ellipsoidal sets.
Remark 2.
In fact, the framework proposed in this paper is applicable not only to UBB noise, but also to other cases with bounded noise (including non-Gaussian noise with bounded amplitude). For unbounded noise, only estimation approaches that deal with unbounded noise can be used, such as particle filtering.
Next, the parameter uncertainties are considered in the state-space model (2), which is rewritten as:
S o + 1 = ( B 1 + Δ B 1 o ) S o + ( B 2 + Δ B 2 o ) t = 0 o S t + ( C + Δ C o ) u o + D W o ,
with
Δ B 1 o = M Q o F 1 , Δ B 2 o = M Q o F 2 , Δ C o = M Q o F 3 ,
where M R n × g , F 1 R h × n , F 2 R h × n , and F 3 R h × 1 are known real constant matrices. Q o R g × h is a norm bounded uncertain matrix and satisfies:
Q o T Q o I .

2.2. Binary Coding Scheme

Figure 2 illustrates the structure of the BCS. To accommodate the restricted bandwidth of the communication channel, the data sent by the sensors are initially quantized using a probability quantizer. Subsequently, the quantized data are converted into binary bit strings of finite length by the encoder. The binary bit strings are then transmitted to the decoder through a memoryless binary symmetric channels (BSC) and recovered by the decoder. Finally, the recovered data are forwarded to the estimator. The specific steps and formula derivations are outlined below:
Suppose Z o = [ ϖ , ϖ ] , ϖ > 0 need to be defined based on actual engineering conditions.
In traditional BCS, the length of the binary bit string is fixed. However, the operation environment of USV is complex and changeable. For example, when the steering motion data of USV are transmitted through the network channel, the network channel may need to transmit other data at the same time, which leads to part of the bandwidth being occupied. In this case, if we continue to transmit data in the original way, it may cause channel blockage, and then lead to the occurrence of time delays and missing measurements. Therefore, to solve this problem, we propose a dynamic selection strategy for the length of a binary bit string based on the original BCS. The introduction of this strategy can change the length of the binary bit string in real time, so as to effectively reduce the communication burden and alleviate the network blocking problem. The specific process of coding and decoding is as follows:
In order to encode the measured output Z o into binary strings with a growth degree of p o , the interval [ ϖ , ϖ ] needs to be divided into 2 p o 1 uniform intervals, each uniform interval with the following length:
κ o = 2 ϖ 2 p o 1
In addition, the 2 p o points defined as uniformly distributed are:
N = { n 1 , n 2 , , n 2 p o } ,
where n i = ϖ + ( i 1 ) κ o , ( i = 1 , 2 , , 2 p o ) .
A probability quantizer is used to pre-process the measurement data. When n i Z o n i + 1 , the quantized measurement output Z ¯ o is taken as follows:
Prob { Z ¯ o = n i } = 1 δ o , Prob { Z ¯ o = n i + 1 } = δ o ,
where δ o = Z o n i κ o ( 0 δ o 1 ) . Then, the quantization error is defined as follows:
H 1 o = Z ¯ o Z o .
According to (9), random variable H 1 o satisfies:
P { H 1 o = δ o κ o } = 1 δ o P { H 1 o = ( 1 δ o ) κ o } = δ o
Further, utilizing the formula Z ¯ o = ϖ + i = 0 p o J i , o 2 i 1 κ o , the encoder is able to convert the quantized measurement output into binary strings consisting of a set of bits:
J o = { J 1 , o ,   J 2 , o ,   ,   J p o , o } ,   J i , o { 0 ,   1 }
.
Next, the encoder transmits binary strings to the decoder through memoryless BSC. It should be emphasized that during the transmission binary strings, the presence of complex surface weather conditions can introduce channel noises in the memoryless BSC, which can potentially cause each bit in the binary strings to flip with a certain probability. Therefore, the binary strings received by the decoder can be modeled as follows:
Y o = { Y 1 , o , Y 2 , o , , Y p o , o } , Y i , o { 0 , 1 } ,
where Y i , o = ( 1 λ i , o ) J i , o + λ i , o ( 1 J i , o ) with
λ i , o = 1 the i - th binary bit is flipped , 0 the i - th binary bit is not flipped .
The random variable λ i , o satisfies:
P { λ i , o = 1 } = ε , P { λ i , o = 0 } = 1 ε ,
where ε [ 0 , 1 ] represents the flipping probability. For the sake of further analysis, we give the assumption that λ i , o are white and mutually independent. Subsequently, the decoder recovers the original signal using the following formula:
Z ^ o = ϖ + i = 0 p o Y i , o 2 i 1 κ o
Lemma 1
([44]). Assuming that the probability of flipping is ε during signal transmission via a memoryless BSC, then, the signal received by the decoder satisfies:
{ Z ^ o } = ( 1 2 ε ) Z ¯ o , V { Z ^ o } = ϖ 2 χ ,
where χ = 4 ε ( 1 ε ) ( 2 2 p o 1 ) 3 ( 2 2 p o 1 ) 2 .
Considering Lemma 1, there is a certain degree of distortion between the signal Z ^ o recovered by the decoder and the signal Z o sent from the sensors. Therefore, the following formula is used to compensate for the distortion:
Z ˜ o = 1 1 2 ε Z ^ o .
The equivalent error, which is generated by signal transmission through memoryless BSC, is represented in the following form:
H 2 o = Z ˜ o Z ¯ o .
The expectation and variance in H 2 o obtained from Lemma 1 are as follows:
{ H 2 o } = 0 , V { H 2 o } = ϖ 2 χ ( 1 2 ε ) 2 .
Combining the formulas (10) and (15), the recovered measurement output can be written as:
Z ˜ o = Z o + H 1 o + H 2 o .
Due to the open and unprotected nature of the networks, unauthorized individuals, such as illegal fishermen or competitors, can easily carry out cyber-attacks on the communication channels with the aim of sabotage. Moreover, in order to maximize the level of destruction, unauthorized individuals often combine multiple attack methods to launch mixed cyber-attacks against communication channels. To better reflect real scenarios, this paper assumes that communication channels are subjected to mixed cyber-attacks consisting of bias injection attack and DoS attack. As a result, the actual data outputted by the decoder are as follows:
Z o = α o ( Z ˜ o + β o ρ o ) ,
where α o { 0 , 1 } and β o { 0 , 1 } represent the occurrence of DoS attack and bias injection attack, respectively. In engineering practice, due to the difficulty of a single DoS attack signal having a significant influence on the system, attackers often carry out continuous DoS attacks. Therefore, this paper pre-sets DoS attacks to occur continuously. α o = 0 indicates that the channels are subjected to DoS attacks. α o = 1 indicates that the channels are not subjected to DoS attacks. On the contrary, bias injection attacks occur stochastically and follow the Bernoulli distribution:
P { β o = 1 } = β , P { β o = 0 } = 1 β ,
where β o = 1 indicates that the channels are subjected to bias injection attacks. β o = 0 indicates that the channels are not subjected to bias injection attacks. ρ o represents an injection attack signal that meets the following conditions:
E { ρ o T ω 1 ρ o } 1 .

2.3. Design Objective

Considering the mixed cyber-attacks, BCS, parameter uncertainties and estimator gain perturbations, the resilient set-membership estimator is designed as follows:
K f , o = K o + Δ K o , S ^ o + 1 = B 1 S ^ o + B 2 t = 0 o S ^ t + C u o + K f , o ( Z o α o E t = 0 o S ^ t ) ,
where S ^ o R n is the estimate of the vector S o , K o is the gain matrix of estimator to be determined in the following content, and Δ K o represents the estimator gain perturbation and satisfies:
Δ K o = M ^ Q ^ o F ^ ,
where Q ^ o is an unknown time-varying matrix satisfies Q ^ o T Q ^ o I , M ^ , and F ^ are known real matrices of proper dimensions.
Assumption 2.
When o = 0 , the estimate error is confined to the ellipsoidal region shown below:
( S o S ^ o ) T P o 1 ( S o S ^ o ) 1 ,
where P o is the positive define matrix.
Remark 3.
In practice, some uncertainty errors may be introduced in measuring the initial state of the system due to some unknown uncertainties (such as hydrodynamic effects and noises) in the initial state. However, by knowing the bounds of these parameters in advance, we can make specific assumptions about the state and thus treat these uncertainty errors as similar to the UBB noise described in Assumptions A1.
This paper has two objectives. The first objective is to look for the estimator gain matrix K j ( j = 1 , 2 , , n ) , so that the P j and S ^ j are limited within the following ellipsoidal region:
( S j S ^ j ) T P j 1 ( S j S ^ j ) 1 ,
The second objective is to minimize the above ellipsoid in the sense of trace.
To facilitate subsequent derivation, at the end of this chapter, we introduce several lemmas:
Lemma 2
([50]). For constant matrices 1 , 2 , and 3 satisfying 1 = 1 T and 2 = 2 T > 0 , then:
1 + 3 T 2 1 3 0 .
If and only if
1 3 T 3 2 0 , 2 3 3 T 1 0 ,
Lemma 3
([50]). Let z 0 ( η ) , z 1 ( η ) , , z p ( η ) be quadratic functions of η R n : z i ( η ) = η H i η with H i = H i T .
Then, the following implication:
z 1 ( η ) 0 , , z p ( η ) 0 z 0 ( η ) 0
can be guaranteed if there are positive scalars 0 , 1 , , p satisfying:
H 0 i = 0 p i H i 0 .
Lemma 4
([50]). For given matrices & = & T , ℜ and ε with appropriate dimensions, if and only if there is a positive scalar ϱ satisfying + ϱ 1 T + ϱ ε T ε < 0 for all M o satisfying M o T M o I , the following inequality:
& + M o ε + ε T M o T T < 0
holds.

3. Main Result

3.1. Design of Robust Set-Membership Estimator

In this section, we achieve the first objective by the subsequent theorem: obtaining sufficient conditions for the estimation errors to be limited within specified ellipsoidal regions at each transmission time.
Theorem 1.
Considering the USV models (4), suppose positive-definite matrix P 0 is given, and limited in ellipsoid (23), the first objective can be achieved if there is a set of matrices P o + 1 , K o , scalar ζ and σ i ( i = 1 , 2 , , 7 ) such that:
Υ = Υ ˜ M ˜ ζ F ˜ T ζ I 0 ζ I 0 ,
where
Υ ˜ = P o + 1 Φ o Λ o , Λ o = d i a g { σ 1 I , σ 2 I , σ 3 R 1 , o 1 , σ 4 R 2 , o 1 , σ 5 I , σ 6 I , σ 7 ω 1 , Λ 2 o } Λ 2 o = 1 + σ 1 + o σ 2 + σ 3 + σ 4 + m κ o 2 σ 5 + m ϖ 2 ( 1 2 ε ) 2 σ 6 + σ 7 , Φ o = [ Φ o ( 1 ) T Φ ˜ o ( 2 ) T ] , Φ o ( 1 ) = [ Φ 1 o Φ 2 o D ( Δ K o + K o ) α o G ( Δ K o + K o ) α o ( Δ K o + K o ) α o ( Δ K o + K o ) α o β ¯ Φ 3 o ] , Φ ˜ o ( 2 ) = [ 0 0 0 0 0 0 ( K o + Δ K o ) α o β ˜ 0 ] , β ˜ = β ¯ ( 1 β ¯ ) , Φ 1 o = ( B 1 o + Δ B 1 o ) L o ,
Φ 2 o = ( B 2 o + Δ B 2 o ( K o + Δ K o ) α o E ) L τ o , Φ 3 o = Δ B 1 o S ^ o + Δ B 2 o t = 0 o S ^ t + Δ C u o , L τ o = [ L 0 L 1 L 2 L 3 L o ] , M ˜ = [ M ˜ 1 T 0 0 0 0 0 0 0 0 ] T , M ˜ 1 = M M M M ^ 0 0 0 0 0 M ^ , F ˜ = [ 0 F ] , F = F 1 F 2 , F 1 = F 1 L o 0 0 0 0 F 2 L τ o 0 0 0 0 0 0 0 F ^ α o E L τ o 0 F ^ α o G 0 0 0 0 , F 2 = 0 0 0 F 1 S ^ o 0 0 0 F 2 t = 0 o S ^ t 0 0 0 F 3 u o F ^ α o F ^ α o F ^ α o β ¯ 0 0 0 F ^ α o β ˜ 0 ,
in which L o is the Cholesky factorization of P o = L o T L o .
Proof. 
According to Assumption 2, we know ( S 0 S ^ 0 ) T P 0 1 ( S 0 S ^ 0 ) 1 . Next, we assume that ( S i S ^ i ) T P i 1 ( S i S ^ i ) 1 , i { 1 , 2 , , o } . Finally, by using mathematical induction, we need to prove that ( S i + 1 S ^ i + 1 ) T P i + 1 1 ( S i + 1 S ^ i + 1 ) 1 , ensuring that the estimation errors are always confined within specific ellipsoidal regions.
To begin with, we calculate the estimation error and express it in the following form:
e o + 1 = S o + 1 S ^ o + 1 = Δ B 2 o + B 2 o ( Δ K o + K o ) α o E t = 0 o e t ( Δ K o + K o ) α o G V o + Δ C o u o + ( Δ B 1 o + B 1 o ) e o + D W o ( Δ K o + K o ) α o H 1 o ( Δ K o + K o ) α o H 2 o ( Δ K o + K o ) α o β o ρ o Δ B 1 o S ^ o Δ B 2 o t = 0 o S ^ t .
On the basis of [51], there is a vector μ o satisfying μ o T μ o I such that
S o S ^ o = L o μ o .
Therefore, we rewrite the estimation error as follows:
e o + 1 = S o + 1 S ^ o + 1 = Φ o ξ o ,
where
Φ o = ( Φ 1 o Φ 2 o D ( Δ K o + K o ) α o G ( Δ K o + K o ) α o ( Δ K o + K o ) α o ( Δ K o + K o ) α o β o Φ 3 o ) , ξ o = ( μ o T μ τ o T W o T V o T H 1 o T H 2 o T ρ o T I T ) T , μ τ o = ( μ 0 T μ 1 T μ 2 T μ 3 T μ o T ) T ,
where Φ 1 o , Φ 2 o , and Φ 3 o are given in (25).
Next, we can decompose the stochastic matrix Φ o as follows:
Φ o = Φ o ( 1 ) + Φ ˜ o ( 2 ) ,
where
Φ ˜ o ( 2 ) = ( 0 0 0 0 0 0 ( K o + Δ K o ) α o β o 0 ) , β o = β o β ¯ .
Then, we can acquire:
E { ( S o S ^ o ) T P o + 1 1 ( S o S ^ o ) } = E { ξ o T Φ o T P o + 1 1 Φ o ξ o } = ξ o T ( Φ o ( 1 ) T P o + 1 1 Φ o ( 1 ) + Φ ˜ o ( 2 ) T P o + 1 1 Φ ˜ o ( 2 ) ) ξ o = ξ o T Ψ o ξ o .
From (3), (11), (16), (20), and (27), we can acquire:
W o T R 1 , o 1 W o 1 , V o T R 2 , o 1 V o 1 , ρ o T ω 1 ρ o 1 , H 1 o T H 1 o m κ o 2 , H 2 o T H 2 o m ϖ 2 ( 1 2 ε ) 2 , μ o T μ o 1 , μ τ o T μ τ o o ,
which can be rewritten with ξ o as follows:
ξ o T diag { I , 0 , 0 , 0 , 0 , 0 , 0 , 1 } ξ o 0 , ξ o T diag { 0 , I , 0 , 0 , 0 , 0 , 0 , o } ξ o 0 , ξ o T diag { 0 , 0 , R 1 , o 1 , 0 , 0 , 0 , 0 , 1 } ξ o 0 , ξ o T diag { 0 , 0 , 0 , R 2 , o 1 , 0 , 0 , 0 , 1 } ξ o 0 , ξ o T diag { 0 , 0 , 0 , 0 , I , 0 , 0 , m κ o 2 } ξ o 0 , ξ o T diag { 0 , 0 , 0 , 0 , 0 , I , 0 , m ϖ 2 ( 1 2 ε ) 2 } ξ o 0 , ξ o T diag { 0 , 0 , 0 , 0 , 0 , 0 , ω 1 , 1 } ξ o 0 .
According to Lemma 3, if there is a set of positive scalars σ i ( i = 1 , 2 , , 7 ) that:
Ψ o σ 1 diag { I , 0 , 0 , 0 , 0 , 0 , 0 , 1 } σ 2 diag { 0 , I , 0 , 0 , 0 , 0 , 0 , o } σ 3 diag { 0 , 0 , R 1 , o 1 , 0 , 0 , 0 , 0 , 1 } σ 4 diag { 0 , 0 , 0 , R 2 , o 1 , 0 , 0 , 0 , 1 } σ 5 diag { 0 , 0 , 0 , 0 , I , 0 , 0 , m κ o 2 } σ 6 diag { 0 , 0 , 0 , 0 , 0 , I , 0 , m ϖ 2 ( 1 2 ε ) 2 } σ 7 diag { 0 , 0 , 0 , 0 , 0 , 0 , ω 1 , 1 } diag { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 1 } 0 ,
Then, the inequality ξ o T ( Ψ o diag { 0 , 0 , 0 , 0 , 0 , 0 , 0 , 1 } ) ξ o 0 holds and (32) can be expressed in an alternative form:
Ψ o Λ o 0 ,
where Λ o is given in (25).
Based on Lemma 2, we can deduce that (33) is equal to LMI as follows:
Υ ˜ = P o + 1 Φ o Λ o 0 .
This also means that, without considering parameter uncertainty and estimator gain perturbation, the estimation error can be limited within a specified ellipsoidal region at each transmission time.
The following content is used to establish the framework of resilient estimation, which can handle the influence caused by parameter uncertainties and estimator gain perturbations. Due to Φ o = Φ o + Φ o , Υ ˜ can be decomposed by:
P o + 1 Φ o Λ o = P o + 1 Φ o Λ o + 0 Φ o 0 ,
where
Φ o = [ Φ o ( 1 ) T Φ ˜ o ( 2 ) T ] , Φ o ( 1 ) = ( Δ B 1 o L o Φ 2 o 0 Δ K o α o G Δ K o α o Δ K o α o Δ K o α o β ¯ Φ 3 o ) , Φ 2 o = ( Δ B 2 o Δ K o α o E ) L τ o , Φ 3 o = Δ B 1 o S ^ o + Δ B 2 o t = 0 o S ^ t + Δ C u o , Φ ˜ o ( 2 ) = 0 0 0 0 0 0 Δ K o α o β ˜ 0 .
Then, combining (5) and (22), we can obtain that:
Υ ˜ + M ˜ Q ˜ o F ˜ + F ˜ T Q ˜ o T M ˜ T < 0 ,
where M ˜ and F ˜ are given in (25) and Q ˜ o = diag { Q o , Q o , Q o , Q ^ o , Q ^ o } . According to Lemma 4, there is a positive scalar ζ such that:
Υ ˜ + ζ 1 M ˜ M ˜ T + ζ F ˜ T F ˜ < 0 ,
Then, according to Lemma 4, it can be deduced that the inequality (37) is equivalent to (25), and the proof of Theorem 1 is completed.    □

3.2. Optimization Problem

By solving the set of aforementioned LMIs iteratively, the estimator gain (if it exists) can be obtained. However, the resulting estimator gain may be a set rather than a single value. To obtain the optimal estimator gain within this set, in the sense of trace, we minimize the ellipsoidal constraint P o . Corollary 1. If there are non-negative scalars σ i ( i = 1 ,   2   , ,   7 ) , ζ , and a set of matrices K o , such that the following optimization problem is solvable:
Corollary 1.
If there are non-negative scalars σ i ( i = 1 , 2 , , 7 ) , ζ, and a set of matrices K o such that the following optimization problem is solvable:
min P o + 1 > 0 , K o , σ i ( i = 1 , 2 , , 7 ) , ζ trace ( P o + 1 )   if   ( 25 )   holds
then a minimized ellipsoidal region (in the sense of trace) is guaranteed, and an optimal estimator gain can be obtained at each transmission time.
The pseudocode for proposed estimation framework is shown in Algorithm 1.
Algorithm 1: Set-membership estimation framework for USV steering motion
  • Input Data: Initial motion state S 0 , initial motion estimation S ^ 0 , initial ellipsoid
  •        parameters P 0 , total simulation time o max , rudder angle u 0 , the upper and
  •        lower limits of quantification ± ϖ .
  • Output: Estimation value S ^ i ( i [ 1 , o max ] ) of motion state.
  • Generate S 0 , S ^ 0 , P 0 , o max , u 0 , ± ϖ ;
  •        for o = 1 : o max
  •    step 1: Generate process noise W o ;
  •    step 2: Generate measurement noise V o ;
  •    step 3: Calculate real motion state S o and its measurement Z o ;
  •    step 4: Select the length of a binary bit string p o ;
  •    step 5: Perform the binary coding for Z o , which includes quantization,
  •        encoding, transmission and decoding;
  •    step 6: Calculate decoded measurement Z o ;
  •    step 7: Acquire the optimal estimator gain K o by solving optimization
  •        problem Corollary 1 subjected to LMIs (25);
  •    step 8: Calculate the estimation value S ^ o + 1 based on S ^ o , K o , and Z o .
  •   end
The flow chart for proposed estimation framework is shown in Figure 3.

4. Simulation Experiment

4.1. Numerical Simulation

According to (1), in the USV steering motion, the values of various parameters are obtained from [20] and shown below:
ω n = 2.3 ( rad / s ) , X v p = 0.25 S , X d p = 0.003 S 2 X v r = 0.58 ( m / s ) , X d v = 0.018 S , X d v = 0.01 S T r = 2 / S , T v = 1.8 / S , S = 5 ( m / s ) , 𝜕 = 0.48 + 0.15 S Δ t = 0.1 s , o max = 85 ,
where Δ t is the sampling interval, S is the constant forward speed, and o max is the maximum transmission time. Therefore, the state transition matrices B 1 , B 2 , C, D, E, and G are calculated as:
B 1 = 0.7222 0 0 0.145 0.75 0 0.6612 0 0.4342 , C = 0.0139 0.0225 0.0397 , B 2 = diag { 0 , 0 , 0.0529 } , E = 0 0.1 0 0 0 0.1 , G = 0.7 0.8 , D = 0 0 0.25 0 0 0.529 .
The parameter uncertainties are defined as:
F 1 = 0.01 0.01 0.05 , F 2 = 0.02 0.03 0.02 F 3 = 0.01 , Q o = sin ( r a n d ( 1 ) 2 π ) , M = 0.01 0.02 0.01 T .
The estimator gain perturbations are defined as:
F ^ = 0.15 0.05 0.1 , Q ^ o = sin ( r a n d ( 1 ) 2 π ) , M ^ = 0.1 0.05 T .
The initial values are defined as:
S 0 = [ 0 0 0 ] T , S ^ 0 = [ 0.3 0.3 0.3 ] T , P 0 = diag { 0.09 , 0.09 , 0.09 } .
The parameters of process noises and measurement noises are defined as W o = 0.1 sin ( r a n d ( 1 ) 2 π ) , V o = 0.3 sin ( r a n d ( 1 ) 2 π ) , R 1 , o = 0.01 , and R 2 , o = 0.09 . The parameters of mixed cyber-attacks are defined as β ¯ = 0.05 , ρ o = 2 sin ( o ) , ω = 4 , and α i = 0 ( i = 30 , 31 , 32 , 33 , 40 , 41 , 42 , 43 ) . The parameters of BCS are defined as ϖ = 0.4 , ε = 0.01 . The rudder angle is defined as u o = 4 s i n ( 0.8 o ) .
Remark 4.
In our study for the USV, the parameter selection involves the key factors such as the rudder angle, speed, and noise. The selection of these parameters should be appropriately adjusted according to the context of the research problem, such as the role, working environment, and performance characteristics of the USV. The relevant literature and corresponding sea condition information should be reviewed to determine the best parameter setting for different situations. For the selection of estimator gain, as discussed in the previous section, the estimator gain obtained by solving LMIs (25) may be a set. Therefore, in this paper, we need to solve an optimization problem (Corollary 1) that can obtain the local optimal estimator gain.
MATLAB R2020a is used to calculate LMIs in Theorem 1, and the optimization problem (38) can be solved by the MATLAB function (sedumi).
Case 1. In the following, we consider the case which DoS attack and bias injection attack occurs during the estimation process, and we compare the proposed estimation framework with the traditional set-membership estimation framework [52].
In case 1, the length of the binary bit string is set to p o = 6 ( o [ 0 , 85 ] ) because the network bandwidth is not occupied by other data.
The schematic diagram which illustrates the occurrence of mixed cyber-attacks and the simulation results from three degrees of freedom are shown as follows:
Figure 4 illustrates the occurrence of mixed cyber-attacks. Considering that DoS attacks in real scenarios occur continuously, we pre-set the occurrence of the DoS attacks, and simulate the occurrence of bias injection attacks according to Bernoulli sequence distribution.
Figure 5, Figure 6 and Figure 7 demonstrate the real state of the sway velocity, yaw velocity, and roll velocity, and their estimation values. From Figure 5, Figure 6 and Figure 7, we can see that although there are some influencing factors in the system, such as UBB noises, mixed cyber-attacks, model parameter uncertainties, estimator gain perturbations, and significant initial differences between the real state value and its estimation value. Moreover, the data in the channels need to be quantitated, encoded, and transmitted, which may cause certain errors. The improved resilient set-membership estimation framework is still capable of accurately estimate the sway velocity and yaw velocity. For the roll velocity, although the mixed cyber-attacks can have certain influences on the estimation performance, the improved resilient set-membership estimation framework can restore the estimation performance in a short time after the attack disappears.
Figure 5 and Figure 6 show that our proposed framework has good estimation performance. This is because according to [20], due to the unique dynamics and constraints of USV, as long as the algorithm is designed properly, noises and disturbances cannot have a greater influence on the sway velocity and yaw velocity estimation performance of USV. And combing with [43], we can see that the effective combination of BCS and set-membership filtering can give full play to their respective characteristics. Therefore, the influence of various errors caused by cyber-attacks and BCS on the estimation performance is reduced effectively.
In contrast, there is a large lag and deviation between the true state and the estimated value obtained by the traditional set-membership estimation framework under the same parameters, it should be noted that, due to the lack of BCS during data transmission, the estimation performance of the traditional set-membership estimation framework is easily influenced by mixed cyber-attacks, the emergence of attacks can lead to an increasing deviation between estimated values and true values under the traditional set-membership estimation framework, and the deviation not decrease with the disappearance of attacks. More importantly, in the actual transmission process, transmitting data directly without quantization can increase the communication burden, leading to packet loss, missing measurement, which can greatly reduce the estimation performance.
Figure 8 demonstrates the sum of mean square error (MSE) in case 1, which effectively denotes the high estimation accuracy of our approach.
Case2. For the complex operation environment of USV, we assume that part of the channel bandwidth is occupied during the time periods of [ 0 , 20 ] and [ 40 , 85 ] . Therefore, we need to adjust the binary bit string length of the data transmission in time to adapt to the changes in the channel bandwidth during the estimation process.
In addition, in order to comprehensively evaluate the effectiveness of our approach, in addition to the DoS attack and bias injection attack mentioned above, we also consider some other common types of cyber-attacks, such as replay attack and eavesdropping attack. Since the occurrence of replay attacks is difficult to describe by Bernoulli distribution [27], we therefore set those occurrences in advance to: Z ˜ 15 = Z ˜ 10 , Z ˜ 35 = Z ˜ 28 , Z ˜ 55 = Z ˜ 50 , eavesdropping attacks are constant. The occurrence of cyber-attacks and occupation of channel bandwidth are shown in Figure 9:
For this complex situation, we compare our approach with traditional set-membership estimation framework under BCS with a dynamically selected binary bit string length strategy, after knowing that the channel bandwidth is occupied, we adjust the binary bit string length accordingly, specifically p o = 4 ( o [ 0 , 20 ] ) , p o = 6 ( o [ 21 , 40 ] ) , p o = 2 ( o [ 41 , 85 ] ) , and the simulation results are as follows:
Figure 10, Figure 11 and Figure 12 demonstrate the real state of the sway velocity, yaw velocity, and roll velocity, and their estimation values. Figure 13 demonstrates the sum of MSE in case 2. From Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13, we can see that as the length of the transmitted data decreases, the quantization error of the data also increases accordingly, and the estimation accuracy of the traditional approach is also greatly influenced. In contrast, our approach can reduce the influence of quantization error on the estimation accuracy, so as to effectively estimate the steering motion state of the USV. Moreover, our approach can effectively resist the influence of reply attacks on estimation performance. Finally, it should be noted that although the occurrence of eavesdropping attacks cannot be avoided, the data are encoded in binary before entering the network, and the principle of BCS is similar to encryption and decryption, and the upper and lower limits of quantification are the keys. Therefore, if the attackers do not know the specific key, they can only steal the binary array from the network, but cannot obtain the real value.

4.2. The Analysis of Experimental Results

In order to verify the estimation performance of the proposed estimation framework, we compare and calculate the computational load and MSE of the proposed approach and the traditional approach. The comparative estimation results of Case 1 are shown in Table 1 below.
According to Table 1, the MSE of the sway velocity, yaw velocity, and roll velocity of the traditional approach are higher than that of our approach by 93.00%, 73.32%, and 93.95%, respectively, and the calculated load of the traditional approach is higher than that of our approach by 4.38%.
The comparative estimation results of Case 2 are shown in Table 2 below.
According to Table 2, the MSE of the sway velocity, yaw velocity, and roll velocity of the traditional approach are higher than that of our approach by 44.76%, 73.64%, and 61.35%, respectively, and the calculated load of the traditional approach is higher than that of our approach by 5.01%. Therefore, the comprehensive comparison shows that our approach is optimal for the USV steering motion state estimation.

5. Conclusions

This paper has proposed a resilient set-membership state estimation algorithm based on BCS for the steering motion of USV under unknown but bounded noises. During the estimation process, the data of USV steering motion has been transmitted to the estimator by sensors via communication channels. These channels were bandwidth-constrained and subjected to cyber-attacks. Therefore, the BCS has been applied in communication channels, which not only saves communication resources but also ensures data quality while reducing the security risks caused by cyber-attacks. In addition, in order to simulate real sea conditions, this paper has considered the problems of parameter uncertainties and estimator gain perturbations. Thus, a resilient estimation framework has been designed to handle those problems. In the design process, the sufficient conditions for the existence of a resilient set-membership estimator have been established via the use of convex optimization method and mathematical induction method, which have ensured that the estimation error at each transmission time has been limited within a certain ellipsoidal region. Meanwhile, the estimator gain has been derived by iterative solution of a sequence of LMIs. Finally, the effectiveness of the established framework has been verified through a numerical simulation example.
There is a gap between theory and practice in our proposed estimation framework. Therefore, in our future research, we will take the following measures to bridge this gap, and apply estimation framework to practical projects after the theory is mature: (1) continuously calibrate the physical model of the system through a large amount of experimental data to ensure that it accurately reflects the actual characteristics of the USV; (2) introduce multi-source sensor fusion technology to improve the accuracy and robustness of the state estimation; (3) continuously adjust and optimize parameters of algorithms according to the feedback results of field tests.
Future research includes two aspects: on the one hand, this paper proposes the BCS with a dynamically selected binary bit string length strategy, and this scheme can also be used for remote estimation of other autonomous vehicles; on the other hand, we can upgrade the algorithm to estimate all kinds of faults that may exist in USV.

Author Contributions

Conceptualization, J.L., Z.W. and Y.W.; methodology, J.L.; software, J.W.; validation, P.L.; writing—original draft, Z.W. and Y.W.; writing—review and editing, J.L. and Z.W.; supervision, J.L. and Z.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the project of National Natural Science Foundation of China (Grant numbers [32073029]), Shandong Province Modern Agricultural Technology System (Grant numbers [SDAIT-22]), the key project of Shandong Provincial Natural Science Foundation (Grant numbers [ZR2020KC027]), National Key Research and Development Program of China (Grant numbers [2023YFD2400405], [2023YFD2400400]), the Science & Technology Specific Projects in Agricultural High-Tech Industrial Demonstration Area of the YellowRiver Delta (Grant numbers [2022SZX18]) and Shandong Provincial Key R & D Plan (Grant numbers [2022CXGC010611]).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding authors.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Goulon, C.; Meaux, O.L.; Vincent-Falquet, R.; Guillard, J. Hydroacoustic Autonomous boat for Remote fish detection in LakE (HARLE), an unmanned autonomous surface vehicle to monitor fish populations in lakes. Limnol. Oceanogr.-Methods 2021, 19, 280–292. [Google Scholar] [CrossRef]
  2. Song, L.; Chen, H.; Xiong, W.; Dong, Z.; Hu, K. Method of Emergency Collision Avoidance for Unmanned Surface Vehicle (USV) based on Motion Ability Database. Pol. Marit. Res. 2019, 26, 55–67. [Google Scholar] [CrossRef]
  3. Xiong, Y.; Zhu, H.; Pan, L.; Wang, J. Research on Intelligent Trajectory Control Method of Water Quality Testing Unmanned Surface Vessel. J. Mar. Sci. Eng. 2022, 10, 55–67. [Google Scholar] [CrossRef]
  4. Abrougui, H.; Nejim, S.; Hachicha, S.; Zaoui, C.; Dallagi, H. Modeling, parameter identification, guidance and control of an unmanned surface vehicle with experimental results. Ocean Eng. 2021, 241, 42–53. [Google Scholar] [CrossRef]
  5. Cai, M.; He, X.; Zhou, D. Performance-improved finite-time fault-tolerant control for linear uncertain systems with intermittent faults: An overshoot suppression strategy. Int. J. Syst. Sci. 2022, 53, 3408–3425. [Google Scholar] [CrossRef]
  6. Wen, P.; Li, X.; Hou, N.; Mu, S. Distributed recursive fault estimation with binary encoding schemes over sensor networks. Syst. Sci. Control Eng. 2022, 10, 417–427. [Google Scholar] [CrossRef]
  7. Song, X.; Rong, L.; Li, B.; Wang, Z.; Li, J. Joint state and fault estimation for nonlinear systems with missing measurements and random component faults under Round-Robin Protocol. Int. J. Electr. Power Energy Syst. 2023, 154, 109–437. [Google Scholar] [CrossRef]
  8. Ciuonzo, D.; Aubry, A.; Carotenuto, V. Rician MIMO Channel- and Jamming-Aware Decision Fusion. IEEE Trans. Signal Process. 2017, 65, 3866–3880. [Google Scholar] [CrossRef]
  9. Bao, G.; Ma, L.; Yi, X. Recent advances on cooperative control of heterogeneous multi-agent systems subject to constraints: A survey. Syst. Sci. Control Eng. 2022, 10, 539–551. [Google Scholar] [CrossRef]
  10. Li, W.; Niu, Y.; Cao, Z. Event-triggered sliding mode control for multi-agent systems subject to channel fading. Int. J. Syst. Sci. 2022, 53, 1233–1244. [Google Scholar] [CrossRef]
  11. Caballero-Aguila, R.; Hermoso-Carazo, A.; Linares-Pérez, J. Networked fusion estimation with multiple uncertainties and time-correlated channel noise. Inf. Fusion 2022, 53, 1233–1244. [Google Scholar] [CrossRef]
  12. Wang, F.; Liang, J.; Lam, J.; Yang, J.; Zhao, C. Robust Filtering for 2-D Systems with Uncertain-Variance Noises and Weighted Try-Once-Discard Protocols. IEEE Trans. Syst. Man Cybern.-Syst. 2023, 53, 2914–2924. [Google Scholar] [CrossRef]
  13. Li, X.; Feng, S.; Hou, N.; Wang, R.; Li, H.; Gao, M. Surface microseismic data denoising based on sparse autoencoder and Kalman filter. Syst. Sci. Control Eng. 2022, 10, 616–628. [Google Scholar] [CrossRef]
  14. Li, G.; Liu, Z.; Zhang, J.; Zheng, L. Robust predictive control for anti-rolling path following of underactuated surface vessels using adaptive Kalman filter. Int. J. Adv. Robot. Syst. 2019, 16, 324–328. [Google Scholar] [CrossRef]
  15. Fei, Z.; Wang, X.; Wang, Z. Event-Based Fault Detection for Unmanned Surface Vehicles Subject to Denial-of-Service Attacks. IEEE Trans. Syst. Man Cybern.-Syst. 2022, 52, 3326–3336. [Google Scholar] [CrossRef]
  16. Wang, Y.; Han, Q. Network-Based Fault Detection Filter and Controller Coordinated Design for Unmanned Surface Vehicles in Network Environments. IEEE Trans. Ind. Inform. 2016, 52, 1753–1765. [Google Scholar] [CrossRef]
  17. Sharma, S.; Sutton, R. A genetic algorithm based nonlinear guidance and control system for an uninhabited surface vehicle. J. Mar. Eng. Technol. 2013, 12, 29–40. [Google Scholar] [CrossRef]
  18. Wang, Y.; Han, Q. Network-Based Heading Control and Rudder Oscillation Reduction for Unmanned Surface Vehicles. IEEE Trans. Control Syst. Technol. 2017, 25, 1609–1620. [Google Scholar] [CrossRef]
  19. Zhou, X.; Zhang, Y.; Chen, J.; Zheng, X. A quantized set-membership estimation-based heading control method of unmanned surface vessels under unknown-but-bounded wave-induced disturbances. Asian J. Control 2023, 25, 3105–3118. [Google Scholar] [CrossRef]
  20. Chen, H.; Li, Y.; Liu, C.; Xiao, Z.; Rao, H. Set-Membership State Estimation for Unmanned Surface Vehicle Steering Motion with Try-Once-Discard Protocol. IEEE Sens. J. 2023, 23, 14592–14600. [Google Scholar] [CrossRef]
  21. Hu, J.; Yang, Y.; Liu, H.; Chen, D.; Du, J. Non-fragile set-membership estimation for sensor-saturated memristive neural networks via weighted try-once-discard protocol. IET Control Theory Appl. 2020, 14, 1671–1680. [Google Scholar] [CrossRef]
  22. Yang, Y.; Hu, J.; Chen, D.; Wei, Y.; Du, J. Non-fragile Suboptimal Set-membership Estimation for Delayed Memristive Neural Networks with Quantization via Maximum-error-first Protocol. Int. J. Control Autom. Syst. 2020, 18, 1904–1914. [Google Scholar] [CrossRef]
  23. Wu, W.; Peng, Z.; Wang, D.; Liu, L.; Han, Q. Network-Based Line-of-Sight Path Tracking of Underactuated Unmanned Surface Vehicles with Experiment Results. IEEE Trans. Cybern. 2022, 52, 10937–10947. [Google Scholar] [CrossRef] [PubMed]
  24. Deng, L.; Guo, T.; Wang, H.; Chi, Z.; Wu, Z.; Yuan, R. Obstacle Detection of Unmanned Surface Vehicle Based on Lidar Point Cloud Data. In Proceedings of the OCEANS 2022, Hampton Roads, VA, USA , 17–20 October 2022; Volume 23, pp. 1–8. [Google Scholar] [CrossRef]
  25. Gao, S.; Peng, Z.; Liu, L.; Wang, D.; Han, Q. Fixed-Time Resilient Edge-Triggered Estimation and Control of Surface Vehicles for Cooperative Target Tracking Under Attacks. IEEE Trans. Intell. Veh. 2023, 8, 14592–14600. [Google Scholar] [CrossRef]
  26. Liu, L.; Ma, L.; Zhang, F.; Bo, Y. Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks. Int. J. Syst. Sci. 2021, 52, 1192–1205. [Google Scholar] [CrossRef]
  27. Liu, L.; Ma, L.; Wang, Y.; Zhang, J.; Bo, Y. Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks. J. Frankl. Inst.-Eng. Appl. Math. 2023, 357, 4983–5003. [Google Scholar] [CrossRef]
  28. Li, X.; Wei, G.; Wang, L. Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach. Inf. Sci. 2021, 547, 49–67. [Google Scholar] [CrossRef]
  29. Yi, X.; Yu, H.; Wang, P.; Liu, S.; Ma, L. Encoding–decoding-based secure filtering for neural networks under mixed attacks. Neurocomputing 2022, 508, 71–78. [Google Scholar] [CrossRef]
  30. Qu, Y.; Pang, K. State estimation for a class of artificial neural networks subject to mixed attacks: A set-membership method. Neurocomputing 2020, 411, 239–246. [Google Scholar] [CrossRef]
  31. Ding, D.; Wang, Z.; Han, Q.; Wei, G. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks. IEEE Trans. Syst. Man Cybern.-Syst. 2018, 48, 779–789. [Google Scholar] [CrossRef]
  32. Ding, D.; Han, Q.; Xiang, Y.; Ge, H.; Zhang, X. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674–1683. [Google Scholar] [CrossRef]
  33. Qian, W.; Wang, L.; Chen, Z. Local Consensus of Nonlinear Multiagent Systems with Varying Delay Coupling. IEEE Trans. Syst. Man Cybern.-Syst. 2018, 48, 2462–2469. [Google Scholar] [CrossRef]
  34. Qian, W.; Gao, Y.; Yang, Y. Global Consensus of Multiagent Systems with Internal Delays and Communication Delays. IEEE Trans. Syst. Man Cybern.-Syst. 2019, 49, 1961–1970. [Google Scholar] [CrossRef]
  35. Shen, B.; Wang, Z.; Wang, D.; Luo, J.; Pu, H.; Peng, Y. Finite-horizon filtering for a class of nonlinear time-delayed systems with an energy harvesting sensor. Automatica 2019, 100, 144–152. [Google Scholar] [CrossRef]
  36. Shen, B.; Wang, Z.; Tan, H. Guaranteed cost control for uncertain nonlinear systems with mixed time-delays: The discrete-time case. Eur. J. Control 2018, 40, 62–67. [Google Scholar] [CrossRef]
  37. Dong, H.; Wang, Z.; Gao, H. Robust H Filtering for a Class of Nonlinear Networked Systems with Multiple Stochastic Communication Delays and Packet Dropouts. IEEE Trans. Signal Process. 2010, 58, 1957–1966. [Google Scholar] [CrossRef]
  38. Hu, J.; Wang, Z.; Liu, S.; Gao, H. A variance-constrained approach to recursive state estimation for time-varying complex networks with missing measurements. Automatica 2016, 64, 155–162. [Google Scholar] [CrossRef]
  39. Hou, N.; Wang, Z.; Shen, Y.; Liu, H.; Dong, H. A non-fragile approach to fault estimation for a class of multi-rate systems under binary encoding schemes. Int. J. Robust Nonlinear Control 2023, 34, 751–772. [Google Scholar] [CrossRef]
  40. Gao, Y.; Ma, L.; Zhang, M.; Guo, J.; Bo, Y. Distributed Set-Membership Filtering for Nonlinear Time-Varying Systems with Dynamic Coding-Decoding Communication Protocol. IEEE Syst. J. 2022, 16, 2958–2967. [Google Scholar] [CrossRef]
  41. Qu, B.; Wang, Z.; Shen, B.; Dong, H.; Zhang, X. Secure Particle Filtering with Paillier Encryption–Decryption Scheme: Application to Multi-Machine Power Grids. IEEE Trans. Smart Grid 2024, 15, 863–873. [Google Scholar] [CrossRef]
  42. Li, X.; Song, J.B.; Hou, N.; Dai, D.; Yang, F. Finite-horizon distributed set-membership filtering with dynamical bias and DoS attacks under binary encoding schemes. Inf. Sci. 2023, 641, 412–421. [Google Scholar] [CrossRef]
  43. Liu, Q.; Wang, Z. Moving-Horizon Estimation for Linear Dynamic Networks with Binary Encoding Schemes. IEEE Trans. Autom. Control 2021, 66, 1763–1770. [Google Scholar] [CrossRef]
  44. Chen, S.; Ma, L.; Ma, Y. Distributed set-membership filtering for nonlinear systems subject to round-robin protocol and stochastic communication protocol over sensor networks. Neurocomputing 2020, 385, 13–21. [Google Scholar] [CrossRef]
  45. Zou, L.; Wang, Z.; Gao, H. Set-membership filtering for time-varying systems with mixed time-delays under Round-Robin and Weighted Try-Once-Discard protocols. Automatica 2016, 74, 341–348. [Google Scholar] [CrossRef]
  46. Zou, L.; Wang, Z.; Shen, B.; Dong, H. Moving horizon estimation over relay channels: Dealing with packet losses. Automatica 2023, 155, 123–131. [Google Scholar] [CrossRef]
  47. Hou, N.; Wang, Z.; Dong, H.; Hu, J.; Liu, X. Sensor Fault Estimation for Nonlinear Complex Networks with Time Delays Under Saturated Innovations: A Binary Encoding Scheme. IEEE Trans. Netw. Sci. Eng. 2022, 9, 4171–4183. [Google Scholar] [CrossRef]
  48. Liu, Q.; Wang, Z.; Dong, H.; Jiang, C. Remote Estimation for Energy Harvesting Systems Under Multiplicative Noises: A Binary Encoding Scheme with Probabilistic Bit Flips. IEEE Trans. Autom. Control 2022, 68, 343–354. [Google Scholar] [CrossRef]
  49. Wang, S.; Wang, Z.; Dong, H.; Shen, B.; Chen, Y. Quadratic filtering for discrete time-varying non-Gaussian systems under binary encoding schemes. Automatica 2023, 158, 731–745. [Google Scholar] [CrossRef]
  50. Yaz, E. Linear Matrix Inequalities In System And Control Theory. Proc. IEEE 1998, 86, 2473–2474. [Google Scholar] [CrossRef]
  51. Ghaoui, L.; Calafiore, G. Robust filtering for discrete-time systems with bounded noise and parametric uncertainty. IEEE Trans. Autom. Control 2001, 46, 1084–1089. [Google Scholar] [CrossRef]
  52. Milanese, M.; Vicino, A. Estimation theory for nonlinear models and set membership uncertainty. Automatica 1991, 27, 403–408. [Google Scholar] [CrossRef]
Figure 1. Motion coordinate system of USV.
Figure 1. Motion coordinate system of USV.
Sensors 24 06834 g001
Figure 2. Structure of BCS.
Figure 2. Structure of BCS.
Sensors 24 06834 g002
Figure 3. Flow chart of proposed estimation framework.
Figure 3. Flow chart of proposed estimation framework.
Sensors 24 06834 g003
Figure 4. Occurrences of bias injection attacks and DoS attacks.
Figure 4. Occurrences of bias injection attacks and DoS attacks.
Sensors 24 06834 g004
Figure 5. Real state of sway velocity and its estimation value.
Figure 5. Real state of sway velocity and its estimation value.
Sensors 24 06834 g005
Figure 6. Real state of yaw velocity and its estimation value.
Figure 6. Real state of yaw velocity and its estimation value.
Sensors 24 06834 g006
Figure 7. Real state of roll velocity and its estimation value.
Figure 7. Real state of roll velocity and its estimation value.
Sensors 24 06834 g007
Figure 8. Sum of MSE from different approaches.
Figure 8. Sum of MSE from different approaches.
Sensors 24 06834 g008
Figure 9. Occurrences of attacks and occupation of channel bandwidth.
Figure 9. Occurrences of attacks and occupation of channel bandwidth.
Sensors 24 06834 g009
Figure 10. Real state of sway velocity and its estimation value.
Figure 10. Real state of sway velocity and its estimation value.
Sensors 24 06834 g010
Figure 11. Real state of yaw velocity and its estimation value.
Figure 11. Real state of yaw velocity and its estimation value.
Sensors 24 06834 g011
Figure 12. Real state of roll velocity and its estimation value.
Figure 12. Real state of roll velocity and its estimation value.
Sensors 24 06834 g012
Figure 13. Sum of MSE from different approaches.
Figure 13. Sum of MSE from different approaches.
Sensors 24 06834 g013
Table 1. Estimation performance of case 1.
Table 1. Estimation performance of case 1.
Estimation ApproachCalculated Load (s)MSE of the Sway VelocityMSE of the Yaw VelocityMSE of the Roll Velocity
Traditional approach8.9502.01740.804058.4744
Our approach8.5740.14140.21433.3266
Table 2. Estimation performance of case 2.
Table 2. Estimation performance of case 2.
Estimation ApproachCalculated Load (s)MSE of the Sway VelocityMSE of the Yaw VelocityMSE of the Roll Velocity
Traditional approach9.3520.25580.82591.6437
Our approach8.9060.14140.21440.6446
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Z.; Lou, P.; Wang, Y.; Li, J.; Wang, J. Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework. Sensors 2024, 24, 6834. https://doi.org/10.3390/s24216834

AMA Style

Wang Z, Lou P, Wang Y, Li J, Wang J. Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework. Sensors. 2024; 24(21):6834. https://doi.org/10.3390/s24216834

Chicago/Turabian Style

Wang, Ziyang, Peng Lou, Yudong Wang, Juan Li, and Jiasheng Wang. 2024. "Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework" Sensors 24, no. 21: 6834. https://doi.org/10.3390/s24216834

APA Style

Wang, Z., Lou, P., Wang, Y., Li, J., & Wang, J. (2024). Motion State Estimation with Bandwidth Constraints and Mixed Cyber-Attacks for Unmanned Surface Vehicles: A Resilient Set-Membership Filtering Framework. Sensors, 24(21), 6834. https://doi.org/10.3390/s24216834

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop