Next Article in Journal
Balancing the Water-Carbon Trade-Off: Development of a Bi-Level Source-Grid-Load Synergistic Optimization Model for Multi-Regional Electric Power System
Previous Article in Journal
Design, Implementation, and Control of a Wheel-Based Inverted Pendulum
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Event-Based Dynamic Output Feedback Control for Unmanned Marine Vehicle Systems under Denial-of-Service Attack

1
Keyi College of Zhejiang Sci-Tech University, Shangyu 312369, China
2
School of Information Science and Engineering, Zhejiang Sci-Tech University, Hangzhou 310018, China
3
Department of Systems and Computer Engineering, Carleton University, Ottawa, ON K1S 5B6, Canada
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(3), 515; https://doi.org/10.3390/electronics13030515
Submission received: 16 December 2023 / Revised: 16 January 2024 / Accepted: 17 January 2024 / Published: 26 January 2024
(This article belongs to the Section Systems & Control Engineering)

Abstract

:
An event-based dynamic output feedback control (DOFC) strategy for unmanned marine vehicle (UMV) systems is considered in this work. Whole UMV systems are composed of a UMV closed-loop system, a land-based control unit and the communication network. To increase the effectiveness of data transmission in the network channel and better enable the control unit against an attack, an adaptive event-triggered mechanism (AETM) is applied. Moreover, a quantizer is installed between the sampler and the control unit. The quantizer further reduces the communication burden. The occurrence of an aperiodic denial-of-service (DoS) attack is considered in the channel from the control unit to the UMV system. A sufficient criterion for ensuring the global exponential stability of a system with an expected H disturbance attenuation index is obtained. The co-design of the dynamic output feedback controller and the AETM is derived. The effectiveness of the proposed approach is verified in the given illustrative simulation. The simulation results indicate that the reduction percentages of the yaw angle amplitudes and yaw velocity accumulative error of the UMV system with the control strategy proposed in this paper are 43.2% and 45.9%, respectively, which are a 0.3% and 5.8% improvement in both metrics compared to the previously published work.

1. Introduction

In recent years, Artificial Intelligence, Cloud Computing, Big Data and other internet fields have developed rapidly [1]. All these rapid developments are inextricably linked to wireless network technology. The networked control systems (NCSs) became a hot area of research due to their practical applications. It enables the remote control in a networked environment [2,3,4,5,6]. With the significant advantages of a lower cost of design and easier maintenance, NCSs are widely used in an unmanned marine vehicle (UMV). The networked UMV is often used for its practical applications in the fields of military or non-military missions, management of fishery resources, marine environmental monitoring or cleaning and the exploration of oil and gas [7]. With the exploitation of the oceans, the analysis of UMV systems has emerged as a hot subject of investigation. UMV systems are inevitably subject to the effects of climate, waves and other uncertainties when carrying out tasks. As a result, plentiful control methods are proposed to guarantee the performance of the UMV systems, such as sliding mode control [8,9], formation control [10,11,12], trajectory tracking control [13,14,15], neural network control [16,17] and so on.
In reference [18], the coordinated path tracking problem for UMV systems with directional topologies based on distributed control is investigated. A guidance method-based finite-time line of sight is introduced to track the desired path for an independent UMV. In [19], a dynamic output feedback control (DOFC) strategy is designed for UMV tracking problems with delay and packet loss. To resist disturbances, in reference [20], a coordinated tracking control strategy of UMV systems with unknown dynamics and external disturbances is studied. A wavelet neural network-based distributed tracking controller is introduced to accurately estimate unknown dynamics and external disturbances. A dwell control method for UMV systems is presented in [21] to counteract the effects of an unknown size and orientation disturbances. An adaptive law for slow changes to gently alter the navigation of the vehicle is proposed to minimize positioning errors. In addition to the above-mentioned interference from environmental factors, UMV systems are vulnerable to cyber attack due to the open nature of the wireless network. Generally, there exist two main categories of cyber attacks on NCSs. One is the denial-of-service (DoS) attack that blocks data transmission and the other is the deception attack that injects false information into the transmitted data [22,23]. The network-based Takagi–Sugeno (T-S) fuzzy UMV systems under a DoS attack are studied and a semi-Markovian jumping system description of the DoS attack phenomenon is presented in [24]. In reference [25], a hybrid attack including a DoS attack and deception attack is investigated. A model based on the T-S fuzzy system with random switching is proposed to defend against the hybrid attack.
More critically, traditional time-triggered control completes the sampling task within a fixed sampling period where the sampling method inevitably wastes the network resources. The network channel is congested in severe cases and further causes packet loss and transmission delay. The event-triggered mechanism (ETM) is first proposed in [26]. It gradually became a hot research topic in the past few decades and a significant number of achievements have emerged [27,28,29]. In reference [30], the problem of the event-triggered dynamic localization of switched UMV systems is investigated. A novel weighted ETM that considers the switching characteristics is studied. The containment problem of networked underactuated UMV systems is investigated in [31]. To guide the UMV systems toward the corresponding points of reference, an event-triggered control scheme is designed for individual UMVs based on the observational data. This method effectively reduces the communication burden. In reference [32], a novel robust adaptive fault-tolerant control strategy and an improved multiplied ETM for UMV systems are introduced. An estimation model with a parsimonious form is used to design the ETM. As can be seen from the above research results, saving network resources is particularly important. As the quantizer can moderately compress the signal before transmission, the network bandwidth occupied by the signal transmission is significantly reduced [33,34]. It improves the utilization rate of communication resources. However, to the best of our knowledge, rare work on the problem of an adaptive event-triggered mechanism (AETM) and quantitative mechanism-based DOFC for UMV systems in the presence of a DoS attack is performed yet. Therefore, the main motivation of this paper is to shorten such a gap by initiating a systematic study.
Based on the above discussions and considering that the state vectors of the UMV system may not be all measurable due to the various complex environmental factors, a DOFC strategy based on the ETM and the quantitative mechanism is investigated in this paper. The measurement data from the sampler are processed by the event-triggered unit and the quantitative unit. The processed measurement data are then sent to the land-based control unit. The calculated control signal is eventually transmitted to the UMV closed-loop system through the communication channel. The occurrence of an aperiodic DoS attack is considered in the transmission channel of the control signal. In addition, an AETM is adopted. The threshold parameter for the trigger condition is adjusted online via the AETM. Through the construction of the Lyapunov functional, the conditions of global exponential stability for the UMV systems are obtained. Finally, the effectiveness of the proposed methods is verified via simulation. The main contributions are summarized in the following points:
(i)
A novel closed-loop system model of networked UMV systems with an event-triggered unit and a quantizer is established. The impact of the network-induced delay, external disturbance and aperiodic DoS attack are involved.
(ii)
A quantitative mechanism is installed on the basis of the adaptive event-triggered unit, which can further save the network resources. And an environment accompanied by a more severe cyber attack is considered.
This paper is organized as follows. In Section 2, the modeling of the closed UMV systems are obtained. And a dynamic output feedback controller based on the AETM and quantitative mechanism under an aperiodic DoS attack is designed. Section 3 gives the sufficient criterion for ensuring the global exponential stability of the system with an expected H disturbance attenuation index and the design method of the controller. A numerical simulation to verify the effectiveness of the proposed control strategy is given in Section 4. In Section 5, the conclusions and future work are shown.

Notation

Throughout this paper, the notations as follows are used: R n denotes the n-dimensional Euclidean space; · 2 denotes the Euclidean vector norm; P > 0 means that the matrix P is real symmetric positive definite; I is the identity matrix with appropriate dimension; the symbol * denotes the symmetric term in a matrix; s y m ( P ) denotes P + P T ; and λ min A and λ max A denote the minimum or maximum eigenvalue of the matrix A , respectively.

2. Preliminaries and Problem Formulation

2.1. Networked Modeling for the UMV System

The main work is performed in this section to model the UMV. The usual model for describing the marine vehicle dynamics is the first-order Nomoto model. The model of a nominally higher-order state space is comparable to it [35]. Consequently, a three-degrees-of-freedom UMV that is supplied with thrusters is served as a reference model for the target plant. In Figure 1, a structural diagram of the considered UMV system is shown with the ground-mounted frame and the body-mounted frame. Here, x 0 , y 0 and z 0 indicate the vertical, horizontal and normal axes in the frame, respectively. The earth-fixed reference frames are represented as x, y and z.
The body-fixed equation for the UMV is described as below:
M v ˙ + N v ( t ) + G η ( t ) = u ( t )
where v ( t ) = α ( t ) β ( t ) γ ( t ) T represents the velocity vector. The velocity of the surge, sway and yaw is denoted as α ( t ) , β ( t ) and γ ( t ) , respectively. η ( t ) = x f ( t ) y f ( t ) φ f ( t ) T denotes a vector containing the position and angle, where x f ( t ) and y f ( t ) represent positions, and φ f represents the yaw angle. The control input vector is denoted as u ( t ) = u 1 ( t ) u 2 ( t ) u 3 ( t ) T . The forces of the surge and sway are denoted as u 1 ( t ) and u 2 ( t ) and the moment in yaw is denoted as u 3 ( t ) , respectively; M is the matrix of inertia and it satisfies M = M T > 0 . Matrix N indicates damping. And matrix G indicates the mooring forces. The function η ( t ) is satisfied as
η ˙ = K ( ψ ( t ) ) v ( t )
where K ( ψ ( t ) ) = cos ( ψ ( t ) ) sin ( ψ ( t ) ) 0 sin ( ψ ( t ) ) cos ( ψ ( t ) ) 0 0 0 1 .
The UMV may stop or anchor when executing tasks. We assume the yaw angle ψ ( t ) is sufficiently small. As the result, sin ( ψ ( t ) ) 0 and cos ( ψ ( t ) ) 1 can be obtained. Then, the matrix K ( ψ ( t ) ) I is obtained. We give some definitions as M 1 G = A 1 , M 1 N = A , B = M 1 and v ( t ) = x ( t ) . It is such that the system (1) is expressed as:
x ˙ ( t ) = A x ( t ) + B u ( t ) A 1 g ( t , x ( t ) )
where g ( t , x ( t ) ) = η ( t ) , and it represents a vector-valued function of state vector x ( t ) , which is nonlinear. Inevitable disturbances such as wind and waves are denoted as ω ˜ ( t ) . The system (3) is then obtained as
x ˙ ( t ) = A x ( t ) + B u ( t ) + ω ˜ ( t ) A 1 g ( t , x ( t ) )
As mentioned above, there is a high degree of uncertainty when marine vehicles operate on the ocean. The main objective is to mitigate the yaw velocity error amplitude. It is accomplished by keeping the state x ( t ) track as an anticipated reference as accurately as possible. Through a combination of items ω ˜ ( t ) and A 1 g ( t , x ( t ) ) , Equation (4) is rewritten as:
x ˙ ( t ) = A x ( t ) + B u ( t ) + ω ^ ( t )
where ω ^ ( t ) = ω ˜ A 1 g ( t , x ( t ) ) .
For the given reference state x r ( t ) , the tracking error e ( t ) is then expressed as e ( t ) = x ( t ) x r ( t ) . Based on the definition of e ( t ) and Equation (5), we have:
e ˙ ( t ) = A e ( t ) + B u ( t ) + ω ( t )
where ω ( t ) = ω 1 ( t ) ω 2 ( t ) ω 3 ( t ) T = A x r ( t ) + ω ^ ( t ) .
The controlled output z ( t ) is described as:
z ( t ) = C z e ( t )
where C z is the output matrix with C z = 0 0 1 .
From the above Equations (6) and (7), one can obtain that:
e ˙ ( t ) = A e ( t ) + B u ( t ) + ω ( t ) z ( t ) = C z e ( t ) , e ( t 0 ) = e 0
where e ( t ) R n and u ( t ) R u represent the error state and the control input, respectively. ω ( t ) R w represents the uncertain disturbance and it belongs to L 2 0 , . e 0 R n represents the initial vector of the error state. The constant matrices A and B of appropriate dimensions are known.
In this section, a dynamic error system for the UMV is established. The entire networked UMV system is illustrated in Figure 2. It integrates a UMV system, a control unit and the communication network. The data packets are transmitted from the sampler to the control unit via the communication network. And the successful transmission of the sampling signal is determined by an ETM. In addition, a quantitative mechanism is also considered to further reduce communication resources. As the communication channel is vulnerable to a cyber attack, the considered DOS attack is a common type that can severely jam the communication channel. And the UMV closed-loop system cannot successfully receive the control signal during the interval that the DoS attack signal occurs.

2.2. Aperiodic DoS Attack

The occurrence of an aperiodic DoS attack is integrated into the network channel between the land-based control unit and the UMV system. The nth DoS attack interval is represented as S n l n , l n + δ n , ( n N , l n 0 , l 0 = 0 ) . During this interval, the network channel allows for data packet transmission and the attack signal is inactive [36]. Similarly, we define T n l n + δ n , l n + 1 as the nth DoS attack interval, and the attack signal during this time interval is active. Released data packets from the control unit cannot be transmitted to the UMV system. It should be noted that δ n > 0 represents the sleeping length of the attack signal. We can obtain that the occurrence of the attack within a period appears at the time instant l n + δ n until the end of the time instant l n + 1 , which satisfies l n + 1 > l n + δ n . In addition, the DoS attack signal is aperiodic. It indicates that there are variations in sleeping length δ n . With the above discussions, the aperiodic attack signal is defined by a piecewise function as follows to represent whether the attack is active or not:
D o S = 0 , t S n 1 , t T n
where the constant 0 in the piecewise function (9) indicates that the DoS attack signal is inactive, and the value of 1 indicates that the DoS attack signal is active.
Note that if the DoS attack lasts long enough, the closed-loop system will be unstable and difficult to meet the desired performance indicators. To limit the dwell time and frequency of the attack signal, the assumptions are introduced to aid in the theoretical derivation.
Assumption A1
([36]). There are two positive scalars δ min , ϑ max , which satisfy δ min inf n N δ n for S n , ϑ max sup n N l n + 1 l n δ n for T n , respectively.
Assumption A2
([36]). The frequency of the DoS attack signal transition from active to inactive is defined as N t ( 0 , t ) during the time interval 0 , t . It is expressed as N t ( 0 , t ) = c a r d n N | t > l n + δ n , and the symbol c a r d indicates the number of items contained in the set. Given a parameter τ D R > 0 , arbitrary k ^ R 0 , the DoS frequency constraint is satisfied by the sequence of the attack signal given by T n for all t R 0 , and the following condition is guaranteed:
N t ( 0 , t ) k ^ + t τ D
With the consideration of a DoS attack, the error dynamic system is obtained as:
e ˙ ( t ) = A e ( t ) + B u ( t ) + ω ( t ) , t S n e ˙ ( t ) = A e ( t ) + ω ( t ) , t T n z ( t ) = C z e ( t ) , e ( t 0 ) = e 0
Remark 1.
According to Assumptions 1 and 2, the lower sleep length boundary δ min , the upper attacking length boundary ϑ max and the DoS attack frequency N t ( 0 , t ) are defined. The scalar τ D in the constraint frequency condition is the average dwell time. In addition, the upper sleeping length boundary is defined as δ max sup n N δ n .

2.3. The Adaptive Event-Triggered Communication Mechanism

Due to a large number of data packets being transmitted from the sampler to the land-based control unit, the network channel is inevitably blocked. The considered ETM in the UMV systems cannot only reduce the amount of data traffic in the channel but also protect against a DoS attack. The sampling period of the sampler is defined as h. And it satisfies 0 < h < δ n . We define a sampled packet ( k , y ( k h ) ) , which contains the released sampled signal y ( k h ) , k 1 , 2 , and the corresponding marker k. The packets are transmitted from the event-triggered unit to the quantizer via the channel after encapsulation. When the kth data packet is transmitted successfully, we define this moment as t k , t N + and one can obtain that t 1 < t 2 < < t k < .
It should be noted that an ETM with a dynamic threshold is investigated in this paper. It compares the last successfully released packet ( t k , y ( t k h ) ) , t k l with the current packet ( t k + d , y ( t k h + d h ) ) , d 1 , 2 , to make the decision whether to transmit the current packet. In reference [37], the current packet is released from the event-triggered unit and updates the trigger time instant if the condition (11) holds:
t k + 1 h = inf t k h + d h > t k h | g ( t k + d ) h > 0
where g ( ( t k + d ) h ) = y ( ( t k + d ) h ) y ( t k h ) T Φ y ( ( t k + d ) h ) y ( t k h ) σ ( ( t k + d ) h ) y ( t k h ) T Φ y ( t k h ) ; the item σ ( ( t k + d ) h ) represents the threshold parameter, which is dynamic and variable, and the weighting matrix Φ satisfies Φ > 0 , which is determined in the next section. And the threshold parameter σ is satisfied with the condition (12):
σ ( ( k + 1 ) h ) = ( 1 κ σ ( ( k + 1 ) h ) σ ( k h ) r ( k h )
where r ( k h ) = ( y ( t k + k ) h ) y ( t k h ) T Φ ( y ( t k + k ) h ) y ( t k h ) , ( t k + k ) h t k h , t k + 1 h , κ > 0 is a given constant.
Lemma 1
([19]). For the condition (12) of the dynamic threshold parameter, an initial threshold σ 0 0 , 1 is given that satisfies the condition below
0 σ ( k h ) σ 0 1
for all k N . And σ ( k h ) represents a sequence consisting of threshold parameters at different moments.
Remark 2.
It should be mentioned that the event-triggered condition is only related to the current sample signal and the previous trigger signal. The current data packets are passed to the control unit when the trigger condition (11) is fulfilled. The control signal is updated once. In addition, the threshold parameter in (11) is not always fixed and its value is dynamically adjusted based on condition (12).
Nevertheless, the condition of the ETM (11) has some limitations. When the DoS attack occurs, condition (11) cannot be used directly. In this situation, the time instant of the event trigger is redefined as:
t k , n h = { t k h satisfying ( 11 ) | t k h S n } { l n }
The quantitative unit receives packets released by the event-triggered unit, which is defined as y ¯ ( t ) = y ( t k , n h ) .

2.4. The Quantitative Mechanism

A quantizer is considered to be installed in the communication channel between the sampler and the control unit. The measurement output signal y ¯ t is quantized by the quantizer Q y ¯ t before being transmitted. And it is redefined as y ˜ ( t ) . The static logarithmic and time-invariant quantizer [38] is investigated to process the signal in this paper. The quantitative level is given as:
U = ± u m , u = ρ m u 0 , m = 0 , ± 1 , ± 2 , ± u 0 0
where 0 < ρ < 1 represents the quantification density and u 0 > 0 . The quantification function Q ( · ) is defined as (16):
Q ( ν ) = u m , 1 1 + δ y u m < υ < 1 1 δ y u m 0 , ν = 0 Q ( ν ) , ν < 0
where δ y = 1 ρ 1 + ρ .
The quantizer Q y ¯ t is denoted as the following form:
Q y ¯ t = Q y ¯ 1 t , Q y ¯ 2 t , , Q y ¯ n t T
For the quantification effects, we deal with the quantification errors with the help of the sector constraint method introduced in [38], where the quantizer is remodeled as:
Q y ¯ t y ¯ ( t ) = Δ y y ¯ ( t )
where Δ y = d i a g Δ y 1 , Δ y 2 , , Δ y n , Δ y * δ y * , δ y * .
Based on the above discussions, the quantified data packets y ˜ ( t ) are expressed as (19):
y ˜ ( t ) = ( I + Δ y ) y ¯ ( t ) = ( I + Δ y ) y ( t k , n h )
A network-induced delay in the communication channel is inevitable. The networked delay is represented as τ k , n , which occurs at time instant t k , n . It satisfies condition 0 τ t k , n τ ¯ . Thus, the controller successfully receives the released data packets at time t k , n h + τ t k , n and holds until time t k + 1 , n h + τ t k + 1 , n .
We make the following definition K k , n = t k , n h + τ t k , n , t k + 1 , n h + τ t k + 1 , n , from Equation (14), and we have t 0 , n h 0 , and k C ( n ) 0 , 1 , , k ( n ) , where k ( n ) = sup k N | t k , n h n + δ n , if t k ( n ) h h n + δ n , and there must exist a time instant t k ( n ) + 1 satisfying t k ( n ) + 1 h > h n + δ n . In addition, the event interval K k , n is divided into the forms as follows:
K k , n = d = 0 d k ζ d
where
d k = t k + 1 , n t k , n 1 ζ 0 = t k , n h + τ t k , n , t k , n h + h + τ t k , n ζ d = t k , n h + d h + τ t k , n , t k , n h + ( d + 1 ) h + τ t k , n ζ d k = t k , n h + d k h + τ t k , n , t k + 1 , n h + τ t k + 1 , n
The delay of the time instant t and error function are defined as τ k , n ( t ) and η k , n ( t ) , respectively. And the following equations are obtained:
τ k , n ( t ) = t t k , n h d h
η k , n = y t k , n h y t k , n + d h
From Equations (16)–(18), we can obtain that the differentiable piecewise linear function τ k , n ( t ) satisfies the condition as follows:
0 τ t k , n τ t k , n ( t ) max τ t k , n , τ t k + 1 , n + h τ m + h τ M
where t m denotes the networked delay upper bound. And τ M denotes the boundary parameter. It is related to the sampling period h and the networked delay τ k , n . Thus, one can obtain that:
y ¯ ( t ) = y ( t k , n h ) = y ( t k , n h + d h ) + η k , n ( t )
The signal received by the controller is described as:
y ˜ ( t ) = ( I + Δ y ) y ¯ ( t ) = ( I + Δ y ) [ y ( t τ k , n ( t ) ) + η k , n ( t ) ]

2.5. The Investigated Dynamic Output Feedback Control Strategy

The dynamic output feedback controller is considered as follows:
x ˙ c ( t ) = A c x c ( t ) + B c y ˜ ( t ) + D c x c ( t τ k , n ( t ) ) u ( t ) = C c x c ( t ) , t S n K k , n 0 , t T n
where x c ( t ) R n represents the state vector of the controller. Matrices A c , B c , C c and D c are controller gains with appropriate dimensions.
We define x ˜ ( t ) = c o l e ( t ) , x c ( t ) . By combining the error dynamic system (10), the trigger time instant condition (11) and the system (27), an extended state-space equation is obtained as:
x ˜ ˙ ( t ) = A ˜ 1 x ˜ ( t ) + B ˜ 1 x ˜ ( t τ k , n ( t ) ) + B ˜ 2 η k , n ( t ) + B ˜ ω ω ( t ) , t S n K K , N A ˜ 2 x ˜ ( t ) + B ˜ 1 x ˜ ( t τ k , n ( t ) ) + B ˜ 2 η k , n ( t ) + B ˜ ω ω ( t ) , t T n z ( t ) = C ˜ x ˜ ( t )
where A ˜ 1 = A B C c 0 A c , B ˜ 1 = 0 0 ( I + y ) B c C D c , B ˜ 2 = 0 ( I + y ) B c , B ˜ ω = I 0 , A ˜ 2 = A 0 0 A c , C ˜ = C z 0 .
From Equations (11), (13) and (14) above, for t S n K k , n , the inequality as follows is obtained:
η k , n T ( t ) Φ η k , n ( t ) σ 0 Θ T Φ Θ
where Θ = η k , n ( t ) + C H x ˜ ( t τ k , n ( t ) ) and matrix H is selected as I 0 T .
The model of the dynamic output feedback controller and an extended state-space equation are given in this section. For analyzing the global exponential stability of the system (27) in the next section, some preparations are given below.
Definition 1
([36]). The global exponential stability of system (27) with ω ( t ) = 0 is guaranteed, if there exist positive scalars μ > 0 and ρ > 0 , which satisfy:
x ˜ ( t ) μ ρ t 0 τ
for t 0 , where 0 τ = sup τ t 0 x ˜ ( t ) , x ˜ ˙ ( t ) , and ρ denotes the decay rate.
Lemma 2
([39]). Given a matrix Y , which is positive definite symmetric and it satisfies Y > 0 , a scalar a, arbitrary vector x , the inequality as the following form
a t a t x ˙ T ( s ) Y x ˙ ( s ) d s Ξ 1 T Y Ξ 1 + Ξ 1 T Z Ξ 2 + Ξ 1 T Z T Ξ 2 Ξ 2 T Y Ξ 2
holds, where Ξ 1 = x ( t τ ( t ) ) x ( t ) and Ξ 2 = x ( t a ) x ( t τ ( t ) ) and Z denotes a real matrix, which satisfies
Y Z * Y 0
Lemma 3
([40]). Given a matrix U , which is positive definite symmetric and it satisfies U > 0 , the inequality as the following form
P Q + ( P Q ) T P U P T + Q T U 1 Q
holds, where P and Q are real matrices with appropriate dimensions.

3. Main Result

A lemma is first introduced to help with the subsequent theoretical analysis. The H performance and the exponential stability of the system (27) are analyzed, and the design of the controller (26) is given. Based on the previous descriptions, the construction of a piecewise Lyapunov functional is expressed as:
V ( t ) = V 1 ( t ) , t S n K k , n V 2 ( t ) , t T n
where V i ( t ) = x ˜ T ( t ) P i x ˜ ( t ) + t τ M t x ˜ T ( s ) ζ i R i x ˜ ( s ) d s + τ M τ M 0 t + θ t x ˜ T ( s ) ζ i Z i x ˜ ( s ) d s d θ and ζ i = e 2 ( 1 ) i α i ( t s ) .
Lemma 4
([28]). Given the parameters δ m i n , ϑ m a x and τ D R > 0 of the DoS attack, and the boundary parameter τ M > 0 , consider the system (27) without disturbance ω ( t ) under DoS attack (9) and the controller (26). If for the given constants α i 0 , + , σ 0 ( 0 , 1 ) , there are some symmetric positive definite matrices P i , R i , Z i , ( i = 1 , 2 ) and Φ with appropriate dimensions. Thus, along the trajectories of the system (27), the following inequalities are obtained:
V ( t ) = e 2 α 1 ( t l n ) V ( l n ) , t S n e 2 α 2 ( t l n δ n ) V ( l n + δ n ) , t T n
Based on the above lemmas and definition, the stability analysis of the system (27) is given below.

3.1. The Analysis of Stability

Theorem 1.
Given the fixed parameters δ m i n , ϑ m a x , τ D R of the DoS attack, and the boundary parameter τ M > 0 , consider the system (27) without disturbance ω ( t ) and the controller (26). If for the given scalars σ 0 ( 0 , 1 ) , α i 0 , + , there are some symmetric positive definite matrices P i , R i , Z i , ( i 1 , 2 ) and Φ of appropriate dimensions, the conditions as follows are satisfied.
P 1 μ 2 P 2 , P 2 μ 1 e 2 ( α 1 + α 2 ) τ M P 1 , R i μ 3 i R 3 i , Z i μ 3 i Z 3 i ,
0 < ε 2 α 1 δ m i n 2 ( α 1 + α 2 ) τ M 2 α 2 ϑ m a x ln ( μ 1 μ 2 ) τ D .
Thus, the system (27) under aperiodic DoS attack (9) is globally exponentially stable (GES) with the decay rate ρ ε / 2 .
Proof 
Based on Lemma 4, for t 0 , the inequalities as follows
V 1 ( t ) e 2 α 1 ( t l n ) V 1 ( l n ) , t S n V 2 ( t ) e 2 α 2 ( t l n δ n ) V 2 ( l n + δ n ) , t T n
When t l n , combining inequalities (34), we can obtain:
V ( ( l n ) + ) = x ˜ T ( ( l n ) + ) P 1 x ˜ ( ( l n ) + ) + l n τ M l n x ˜ T ( s ) e α 1 ( l n s ) R 1 x ˜ ( s ) d s + τ M τ M 0 l n + θ l n x ˜ ˙ T ( s ) e α 1 ( l n s ) Z 1 x ˜ ˙ ( s ) d s d θ μ 2 x ˜ T ( l n ) P 2 x ˜ ( l n ) + l n τ M l n x ˜ T ( s ) e 2 α 2 ( l n s ) R 2 x ˜ ( s ) d s + τ M τ M 0 l n + θ l n x ˜ ˙ T ( s ) e α 2 ( l n s ) Z 2 x ˜ ˙ ( s ) d s d θ ]
Similarly, when t l n + d n , the inequality e 2 α 1 ( t s ) e 2 α 1 τ M e 2 α 2 ( t s ) 2 ( α 1 + α 2 ) τ M can be obtained for s t τ M , t . The following inequality is obtained:
V 2 l n + δ n ) + μ 1 e 2 ( α 1 + α 2 ) τ M x ˜ T ( l n + δ n ) P 1 x ˜ ( l n + δ n ) + l n + δ n τ M l n + δ n μ 1 e 2 ( α 1 + α 2 ) τ M x ˜ T ( s ) e 2 α 1 ( l n + δ n s ) R 1 x ˜ ( s ) d s + τ M τ M 0 l n + δ n + θ l n + δ n μ 1 e 2 ( α 1 + α 2 ) τ M x ˜ ˙ T ( s ) e 2 α 1 ( l n + δ n s ) Z 2 x ˜ ˙ ( s ) d s d θ = μ 1 e 2 ( α 1 + α 2 ) τ M V 1 l n + δ n = μ 1 e 2 ( α 1 + α 2 ) τ M V 1 ( l n + δ n )
From the inequalities above, one can obtain that:
V 1 l n μ 2 V 2 l n V 2 l n + δ n μ 1 e 2 ( α 1 + α 2 ) τ M V 1 ( l n + δ n )
  • For t S n , it is well known from Assumption 1 and Equations (36) and (37) that
    V 1 ( t ) e 2 α 1 ( t l n ) V 1 ( l n ) μ 2 e 2 α 1 ( t l n ) V 2 ( l n ) e g 1 V 1 ( 0 ) e f 1 V 1 ( 0 )
    where g 1 = 2 n ( α 1 + α 2 ) τ M + 2 α 2 [ ( l n l n 1 δ n 1 ) + ( l n 1 l n 2 δ n 2 ) + + ( l 1 l 0 δ 0 ) ] 2 α 1 ( δ n 1 + δ n 2 + + δ 0 ) + n ln ( μ 1 μ 2 ) , f 1 = 2 n ( α 1 + α 2 ) τ M + 2 α 2 n ϑ max 2 α 1 n δ min + n ln ( μ 1 μ 2 ) .
By combining Assumption 2 and Condition (35), one can obtain that:
V 1 ( t ) V 1 ( 0 ) e ϖ 1 e 2 ρ t
where ϖ 1 = 2 ( α 1 + α 2 ) τ M + 2 α 2 ϑ max 2 α 1 δ min + ln ( μ 1 μ 2 ) k ^ .
2.
For t T n , the following conclusion is obtained in the same way
V 2 ( t ) e 2 α 2 ( t l n δ n ) V 2 ( l n + δ n ) μ 1 e 2 α 2 ( t l n δ n ) + 2 ( α 1 + α 2 ) τ M V 1 ( ( l n + δ n ) ) 1 μ 2 e g 2 V 1 ( 0 ) 1 μ 2 e f 2 V 1 ( 0 )
where g 2 = 2 ( n + 1 ) ( α 1 + α 2 ) τ M + 2 α 2 [ ( l n + 1 l n δ n ) + ( l n l n 1 δ n 1 ) + + ( l 1 l 0 δ 0 ) ] 2 α 1 ( δ n + δ n 1 + + δ 0 ) + ( n + 1 ) ln ( μ 1 μ 2 ) , f 2 = 2 ( n + 1 ) ( α 1 + α 2 ) τ M + 2 α 2 ( n + 1 ) ϑ max 2 α 1 ( n + 1 ) δ min + ( n + 1 ) ln ( μ 1 μ 2 ) .
By combining Assumption 2 and Condition (35), one can obtain that:
V 2 ( t ) 1 μ 2 V 1 ( 0 ) e ϖ 2 e 2 ρ t
where ϖ 2 = 2 ( α 1 + α 2 ) τ M + 2 α 2 ϑ max 2 α 1 δ min + ln ( μ 1 μ 2 ) ( k ^ + 1 ) .
Make the following definitions: a max e ϖ 1 , 1 μ 2 e ϖ 2 , b 1 λ min ( P i ) , b 2 λ max ( P i ) , b 3 b 2 + τ M λ max ( R 1 ) + τ M 2 2 λ max ( Z 1 ) .
From inequalities (38) and (39), we have
V ( t ) a e 2 ρ t V 1 ( 0 )
Alternatively, because
V ( t ) b 1 x ˜ ( t ) 2 , V 1 ( 0 ) b 3 0 h 2
Finally, combining inequalities (40) and (41), we have
x ˜ ( t ) a b 3 b 1 e ρ t 0 h
which proves the system (27) is GES with decay rate ρ . □
Remark 3.
The value of n in the above proof is related to N t ( 0 , t ) , which is defined in Assumption 2. Furthermore, a large decay rate ρ is required to ensure the desirable system performance. From the condition (35), we know that the decay rate ρ is related to the DoS attack parameters δ min and ϑ max and the average dwell time τ D . Thus, the smaller the degree of the DOS attack, the larger the value of ρ obtained.

3.2. The Analysis of H Performance

Theorem 2.
Given fixed parameters δ m i n , ϑ m a x , τ D R > 0 for the DoS attack, and the boundary parameter τ M , and the controller (26). If for the given scalars γ ( 0 , + ) , μ i ( 0 , + ) , α i 0 , + and σ 0 ( 0 , 1 ) there are some symmetric positive definite matrices P i , R i , Z i , Φ > 0 and matrix Y i , ( i 1 , 2 ) of appropriate dimensions, with (34), the matrix inequalities as follows
Σ 1 Σ 21 Σ 31 Σ 41 Σ 5 Σ 6 * Φ 0 B ˜ 2 T I 0 * * γ 2 I B ˜ ω T 0 0 * * * Σ 71 0 0 * * * * Σ 8 0 * * * * * I < 0
Σ 2 Σ 22 Σ 32 Σ 42 Σ 5 Σ 6 * Φ 0 B ˜ 2 T I 0 * * γ 2 I B ˜ ω T 0 0 * * * Σ 72 0 0 * * * * Σ 8 0 * * * * * I < 0
hold, where
Σ 1 = u 1 T sym ( P 1 A ˜ 1 + R 1 + 2 α 1 P 1 ) u 1 + u 1 T sym ( P 1 B ˜ 1 ) u 2 u 3 T e 2 α 1 τ M R 1 u 3 + e 2 α 1 τ M ( u 2 u 1 ) T Z 1 ( u 2 u 1 ) ( u 3 u 2 ) T Z 1 ( u 3 u 2 ) + ( u 2 u 1 ) T Y 1 ( u 3 u 2 ) + ( u 3 u 2 ) T Y 1 T ( u 2 u 1 ) , Σ 2 = u 1 T sym ( P 2 A ˜ 2 + R 2 + 2 α 2 P 2 ) u 1 + u 1 T sym ( P 2 B ˜ 1 ) u 2 u 3 T R 1 u 3 + ( u 2 u 1 ) T Z 2 ( u 2 u 1 ) ( u 3 u 2 ) T Z 2 ( u 3 u 2 ) + ( u 2 u 1 ) T Y 2 ( u 3 u 2 ) + ( u 3 u 2 ) T Y 2 T ( u 2 u 1 ) ,
Σ 21 = u 1 T P 1 B ˜ 2 , Σ 31 = u 1 T P 1 B ˜ ω , Σ 41 = u 1 T A ˜ 1 T + u 2 T B ˜ 1 T , Σ 5 = u 2 T H T C T , Σ 6 = u 1 T H T C z T , Σ 71 = ( τ M 2 Z 1 ) 1 , Σ 8 = ( σ 0 Φ ) 1 , Σ 22 = u 1 T P 2 B ˜ 2 , Σ 32 = u 1 T P 2 B ˜ ω , Σ 42 = u 1 T A ˜ 2 T + u 2 T B ˜ 1 T , Σ 72 = ( τ M 2 Z 2 ) 1 , u 1 = I 2 n 0 2 n × 4 n , u 1 = 0 2 n × 2 n I 2 n 0 2 n × 2 n , u 1 = 0 2 n × 4 n I 2 n .
The system (27) under the aperiodic DoS attack is GES with a prescribed H attenuation index γ ˜ = F 2 F 1 γ , where F 1 = min μ 2 1 , 1 and F 2 = max μ 2 1 e 2 α 1 δ max , e 2 α 2 ϑ max , respectively.
Proof 
(Proof). Based on the construction of the piecewise Lyapunov functional in (32). For analyzing the H performance of system (27) for any nonzero ω ( t ) , the inequalities as follows need to be guaranteed:
For t S n K k , n :
V ˙ 1 ( t ) + 2 α 1 V 1 ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) 0
For t T n :
V ˙ 2 ( t ) 2 α 2 V 2 ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) 0
In accordance with the Lyapunov functional in (32), we have
V ˙ 1 ( t ) = 2 x ˜ T ( t ) P 1 x ˜ ˙ ( t ) + x ˜ ( t ) T R 1 x ˜ ( t ) x ˜ T ( t τ M ) e 2 α 1 τ M R 1 x ˜ ( t τ M ) 2 α 1 t τ M t x ˜ T ( s ) e 2 α 1 ( t s ) R 1 x ˜ ( s ) d s + τ M 2 x ˜ ˙ T ( t ) Z 1 x ˜ ˙ ( t ) τ M t τ M t x ˜ ˙ ( s ) e 2 α 1 ( t s ) Z 1 x ˜ ( s ) d s 2 α 1 τ M τ M 0 t + θ t x ˜ ˙ ( s ) e 2 α 1 ( t s ) Z 1 x ˜ ( s ) d s d θ 2 x ˜ T ( t ) P 1 x ˜ ˙ ( t ) + x ˜ T ( t ) R 1 x ˜ ( t ) x ˜ T ( t τ M ) e 2 α 1 τ M R 1 x ˜ ( t τ M ) 2 α 1 t τ M t x ˜ T ( s ) e 2 α 1 ( t s ) R 1 x ˜ ( s ) d s + τ M 2 x ˜ ˙ T ( t ) Z 1 x ˜ ˙ ( t ) τ M e 2 α 1 τ M t τ M t x ˜ ˙ ( s ) Z 1 x ˜ ( s ) d s 2 α 1 τ M τ M 0 t + θ t x ˜ ˙ ( s ) e 2 α 1 ( t s ) Z 1 x ˜ ( s ) d s d θ
Based on Lemma 2 and inequality (47). Define ( t ) = x ˜ , x ˜ ( t τ k , n ( t ) ) , x ˜ ( t τ M ) . The inequality (45) is converted to the following form:
V ˙ 1 ( t ) + 2 α 1 V 1 ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) T ( t ) u 1 T sym ( P 1 A ˜ 1 ) + R 1 + 2 α 1 P 1 u 1 + u 1 T sym ( P 1 B ˜ 1 ) u 2 u 3 T e 2 α 1 τ M R 1 u 3 + e 2 α 1 τ M ( u 2 u 1 ) T Z 1 ( u 2 u 1 ) ( u 3 u 2 ) T Z 1 ( u 3 u 2 ) + ( u 2 u 1 ) T Y 1 ( u 3 u 2 ) + ( u 3 u 2 ) T Y 1 T ( u 2 u 1 ) ( t ) + τ M 2 x ˜ ˙ T ( t ) Z 1 x ˜ ˙ ( t ) + z T ( t ) z ( t ) γ 2 ω T ( t ) ω ( t ) + η k , n T ( t ) Φ η k , n ( t ) η k , n T ( t ) Φ η k , n ( t )
By the Schur complement and inequality (28), inequality (45) is converted to matrix inequality (43), and the establishment of condition (43) guarantees that inequality (45) holds. In the same way, if condition (44) is guaranteed, then condition (46) holds.
From condition (35), the following inequality is obtained:
μ 2 1 e 2 α 1 δ min μ 1 e 2 ( α 1 + α 2 ) τ M + 2 α 2 ϑ max 0
Defining F ^ 1 ( n ) = μ 2 1 e 2 α 1 ( t l n ) and F ^ 2 ( n ) = e 2 α 2 ( t l n + 1 ) , for t 0 , l n + 1 , the following inequality is derived:
k = 0 n l k l k + δ k F ^ 1 ( k ) γ 2 ω T ( t ) ω ( t ) z T ( t ) z ( t ) d t + k = 0 n l k + δ k l k + 1 F ^ 2 ( k ) γ 2 ω T ( t ) ω ( t ) z T ( t ) z ( t ) d t > 0
For t l k , l k + d k , we have
1 e 2 α 1 ( t l k ) e 2 α 1 δ k e 2 α 1 δ max
For t l k + d k , l k + 1 , we have
1 e 2 α 2 ( l k + 1 t ) e 2 α 2 ( l k + 1 l k δ k ) e 2 α 2 ϑ max
Defining F 1 = min μ 2 1 , 1 and F 2 = max μ 2 1 e 2 α 1 δ max , e 2 α 2 ϑ max , for t 0 , l n + 1 and with the zero initial condition, the inequality as follows is obtained:
k = 0 n l k l k + 1 F 1 z T ( t ) z ( t ) d t k = 0 n l k l k + 1 F 2 γ 2 ω T ( t ) ω ( t ) d t
which is equivalent to
0 l n + 1 z T ( t ) z ( t ) d t F 2 F 1 γ 2 0 l n + 1 ω T ( t ) ω ( t ) d t
Based on the results of the above discussions, we know that when l n + 1 , one can obtain that
0 z T ( t ) z ( t ) d t F 2 F 1 γ 2 0 ω T ( t ) ω ( t ) d t
This means that z ( t ) 2 γ ˜ ω ( t ) 2 for ω ( t ) L 2 0 , , where γ ˜ = F 2 F 1 γ .
Consequently, the H performance and the exponential stability are guaranteed for the system (27) under aperiodic DoS attack. □
Remark 4.
The sufficient criterion for ensuring the global exponential stability of system (27) with a desired H disturbance attenuation index is given in the above theorems. However, the matrix parameters of the controller (26) are unknown. These unknown matrices appear in the matrix inequality in a nonlinear manner, and these matrices cannot be derived by solving matrix inequalities through the above theorems. To address such a problem, a new theorem as follows is proposed to satisfy the gain matrix design requirements for the designed controller.
Theorem 3.
Given fixed parameters δ m i n , ϑ m a x , τ D R > 0 of the DoS attack, and the boundary parameter τ M > 0 , an appropriate scalar δ y , and matrices ϕ, T n , ( n = 1 , 2 , 3 ) , consider the controller (26). If for the given scalars α i 0 , + , μ i ( 0 , + ) , γ ( 0 , + ) and σ 0 ( 0 , 1 ) there are some symmetric positive definite matrices R ˜ i > 0 , Z ˜ i > 0 , U ˜ i > 0 , Φ > 0 , X > 0 , matrices Y ˜ i , S i , W i j , ( i = 1 , 2 ; j = 1 , 2 , , 5 ) with appropriate dimensions and scalars ε 1 > 0 , ε 2 > 0 , with (34), the matrix inequalities as follows
Υ 1 = Υ ˜ 1 Ψ 11 T Ψ 21 T * ε 1 I 0 * * ε 1 I < 0
Υ 2 = Υ ˜ 2 Ψ 12 T Ψ 21 T * ε 2 I 0 * * ε 2 I < 0
hold, where
Υ ˜ 1 = Σ ˜ 1 u 1 T Π 13 u 1 T Π 14 Π 11 Π 12 u 1 T Π 15 * Φ 0 Π 13 T I 0 * * γ 2 I Π 14 T 0 0 * * * Ω ˜ 14 0 0 * * * * Ω ˜ 5 0 * * * * * I < 0
Υ ˜ 2 = Σ ˜ 2 u 1 T Π 23 u 1 T Π 24 Π 21 Π 12 u 1 T Π 15 * Φ 0 Π 23 T I 0 * * γ 2 I Π 24 T 0 0 * * * Ω ˜ 24 0 0 * * * * Ω ˜ 5 0 * * * * * I < 0
Ψ 11 = 0 δ y S 1 T u 1 0 0 δ y S 1 T 0 0 ,
Ψ 21 = B c C X C u 2 B c 0 0 0 0 ,
Ψ 12 = 0 δ y S 2 T u 1 0 0 δ y S 2 T 0 0 ,
Σ ˜ 1 = u 1 T sym XA T + W 14 B T W 11 A T A T U 1 + R ˜ 1 + 2 α 1 X I I U 1 u 1 + u 1 T sym 0 0 W 15 T W 13 C u 2 u 3 T e 2 α 1 τ M R ˜ 1 u 3 + e 2 α 1 τ M ( u 2 u 1 ) T Z ˜ 1 ( u 2 u 1 ) ( u 3 u 2 ) T Z ˜ 1 ( u 3 u 2 ) + ( u 2 u 1 ) T Y ˜ 1 ( u 3 u 2 ) + ( u 3 u 2 ) T Y ˜ 1 T ( u 2 u 1 ) ,
Σ ˜ 2 = u 1 T sym XA T + W 24 B T W 21 A T A T U 2 + R ˜ 2 2 α 2 X I I U 2 u 1 + u 1 T sym 0 0 W 25 T W 23 C u 2 u 3 T R ˜ 2 u 3 + ( u 2 u 1 ) T Z ˜ 2 ( u 2 u 1 ) ( u 3 u 2 ) T Z ˜ 2 ( u 3 u 2 ) + ( u 2 u 1 ) T Y ˜ 2 ( u 3 u 2 ) + ( u 3 u 2 ) T Y ˜ 2 T ( u 2 u 1 ) ,
Π 11 = u 1 T X A T + W 14 B T W 11 A T A T U 1 + u 2 T 0 W 15 0 C T W 13 T Π 12 = u 2 T X C T C , Π 13 = u 2 T 0 W 13 , Π 14 = u 2 T I K U 1 U 1 K , Π 15 = u 2 T X C z T C z T ,
Ω ˜ 14 = 1 τ M 2 T 1 Z ˜ 1 T 1 T T 1 G 1 T G 1 T 1 T , Ω ˜ 5 = T 2 Φ T 2 T σ 0 1 2 T 2 T σ 0 1 2 T 2 ,
Π 21 = u 1 T X A T W 21 A T A T U 2 + u 2 T 0 W 25 0 C T W 23 T , Π 23 = u 2 T 0 W 23 , Π 24 = u 2 T I K U 2 U 2 K ,
Ω ˜ 24 = 1 τ M 2 T 3 Z ˜ 2 T 3 T T 3 G 2 T G 2 T 3 T ,
and
Z ˜ i Y ˜ i * Z ˜ i 0 ,
G i = X I I U i 0 ,
and the globally exponential stability is guaranteed for the system (27) with the H attenuation level γ ˜ under aperiodic DoS attack. And the matrix parameters of the controller (26) are obtained as the following equations:
A c = S 1 1 ( W 11 W 12 U 1 ) T N T B c = S 1 1 W 13 C c = W 14 T N T D c = S 1 1 ( W 15 S T C T W 13 T ) T N T
Proof 
First, two matrices are defined as the following form:
Γ 1 = X I N T 0 , Γ 2 i = I U i 0 S i T
and one can obtain that
P i = Γ 2 i Γ 1 1 = U i S i * N 1 X ( U i X 1 ) X N T > 0
Define Z ˜ i = Γ 1 T Z i Γ 1 , R ˜ i = Γ 1 T R i Γ 1 , Y ˜ i = Γ 1 T Y i Γ 1 and Z i > 0 , Φ > 0 , by Lemma 3, the following inequalities are obtained
( τ M 2 Z 1 ) 1 1 τ M 2 T 1 Z ˜ 1 T 1 T T 1 G 1 T G 1 T 1 T ( σ 0 Φ ) 1 T 2 Φ T 2 T T 2 T σ 0 1 2 T 2 σ 0 1 2 ( τ M 2 Z 2 ) 1 1 τ M 2 T 3 Z ˜ 2 T 3 T T 3 G 2 T G 2 T 3 T
Let Q = d i a g Γ 1 T , I , I , Γ 2 i T , I , I , ( i = 1 , 2 ) , and then left-multiplying inequality (43) by Q and right-multiplying by the transpose of Q, respectively. And convert the resulting matrix inequality into the following form
Υ 1 ˜ + L ˜ 1 T Δ y L ˜ 2 + L ˜ 2 T Δ y T L ˜ 1 < 0
where Υ ˜ 1 = Σ ˜ 1 u 1 T Π 13 u 1 T Π 14 Π 11 Π 12 u 1 T Π 15 * Φ 0 Π 13 T I 0 * * γ 2 I Π 14 T 0 0 * * * Ω ˜ 14 0 0 * * * * Ω ˜ 5 0 * * * * * I , L ˜ 1 = 0 S 1 T u 1 0 0 0 0 S 1 T 0 0 ,   L ˜ 2 = B c C X u 2 B c C u 2 B c 0 0 0 0 0 0 .
By the lemma in [41], there exists a scalar ε 1 > 0 such that
Υ ˜ 1 + ε 1 L ˜ 1 T Δ y 2 L ˜ 1 + ε 1 1 L ˜ 2 T L ˜ 2 < 0
where Δ y 2 < δ y 2 .
By using the Schur complement, condition (52) is obtained. Similarly, condition (53) can also be obtained. This means conditions (54) and (55) are satisfied. It provides further evidence that conditions (43) and (44) are guaranteed and the system (27) is of a prescribed H performance level γ ˜ .
On the other hand, define some variables W i j , ( i = 1 , 2 ; j = 1 , 2 , , 5 ) so that the dynamic output feedback controller gain matrices are given by the equations as follows:
A c = S 1 1 ( W 11 W 12 U 1 ) T N T B c = S 1 1 W 13 C c = W 14 T N T D c = S 1 1 ( W 15 S T C T W 13 T ) T N T
The proof is completed. □

4. Simulation and Analysis

The effectiveness of the designed controller (26) for the network-based UMV systems under the aperiodic DoS attack is demonstrated within this section. The network-based UMV system matrix parameters [42] are given as:
M = 1.0852 0 0 0 2.0575 0.4087 0 0.4087 0.2153 , N = 0.0865 0 0 0 0.0762 0.0151 0 0.0151 0.031 , G = 0.0389 0 0 0 0.0266 0 0 0 0 .
For the formulas A = M 1 N , B = M 1 , the matrix parameters are obtained as:
A = 0.0797 0 0 0 0.0818 0.0577 0 0.2254 0.2535 , B = 0.9215 0 0 0 0.7802 1.4811 0 1.4811 7.4562 .
It is clear that matrix C z in Section 2 is selected as C z = 0 0 1 and C is selected as C = I . The matrices T n , ϕ in Theorem 3 are selected as the identity matrices with appropriate dimensions. For the parameters of the DoS attack, we assume that ϑ max = 0.7 s , δ min = 1.8 s and τ D = 1.15 s . The whole operating time is set to t = 30 s . Select μ 1 = μ 2 = 1.04 , α 1 = 0.018 , α 2 = 0.043 , τ M = 0.1 s , l = 0.05 s , γ = 2 , κ = 2 and ρ = 0.1 . And the initial threshold for the AETM is given as σ 0 = 0.05 .
The vector e 0 = 0.2 0.15 0.2 T is selected as the initial value of system (10). The reference signals are given as α ( t ) = β ( t ) = 0 , and the piecewise constant function γ ( t ) is described as:
γ ( t ) = 0.2 , t 0 , 5 s 10 , 15 s 20 , 25 s 0.2 , t 5 , 10 s 15 , 20 s 25 , 30 s
The disturbance ω 1 ( t ) , ω 2 ( t ) and ω 3 ( t ) in the surge, sway and yaw motions are
ω 1 ( t ) = 0.51 F 1 ( s ) N 1 ( t ) + I 1 A x r ω 2 ( t ) = cos ( 3 t ) e 2.4 t + I 2 A x r ω 3 ( t ) = 0.45 F 2 ( s ) N 2 ( t ) + I 3 A x r
where F 1 ( s ) and F 2 ( s ) denote the shaping filters described by F 1 = K ω 1 s s 2 + 2 ϱ 1 ζ 1 s + ζ 1 2 and F 2 = K ω 2 s s 2 + 2 ϱ 2 ζ 2 s + ζ 2 2 , respectively; The wave strength coefficients are denoted as K ω 1 and K ω 2 , for which K ω 1 = 0.2 and K ω 2 = 0.6 . The damping coefficients are selected as ϱ 1 = 0.5 and ϱ 2 = 1.6 , respectively. The encountering wave frequencies are defined as ζ 1 and ζ 2 where ζ 1 = 0.7 and ζ 2 = 0.1 . The band-limited white noise is denoted as N 1 ( t ) and N 2 ( t ) with the noise powers as 2 and 1.8. In addition, I 1 = 1 0 0 , I 2 = 0 1 0 , I 3 = 0 0 1 . Because the definition of the yaw velocity error leads to the same amplitude of oscillation for the yaw velocity and yaw velocity error, only the yaw velocity error and yaw angle are investigated in the simulations in this paper.
The matrix parameters of the controller (26) are obtained by solving linear matrix inequalities (LMIs) (52) and (53) in Theorem 3 as follows:
A c = 0.0275 0 0 0 0.0380 0.2742 0 0.2098 1.4254 , B c = 0.1138 0 0 0 0.1098 0.0248 0 0.0215 0.1452 , C c = 239.1 0 0 0 229.69 137.3 0 441.3 150.5 , D c = 0.823 0 0 0 0.6979 0.1483 0 0.0973 0.9530 .
To demonstrate the effectiveness of the DOFC strategy, the response results with and without the controller are investigated separately in this section. The simulation results and the comparison with reference [19] are shown in Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10.
As shown in Figure 3, the square wave with a value of 1 means that the aperiodic DoS attack signal is active and 0 means that the aperiodic DoS attack signal is inactive. Different from the DoS attack signal in reference [19], the lower bound δ min is set to a smaller value of 1.5 s and the upper bound ϑ max is set to a larger value of 0.7 s. The yaw angle response is shown in Figure 4 and the yaw velocity error response is shown in Figure 6. The comparison responses of the reference are shown in Figure 5 and Figure 7, respectively. It is clear that the yaw velocity error amplitude and the yaw angle amplitude are greatly mitigated by the action of the considered controller under the more severe cyber attack environment. The response of the yaw moment is shown in Figure 8. The responses of the sway velocity and surge velocity are shown in Figure 9 and Figure 10. The amplitude of the sway velocity is also significantly reduced compared to the reference.
To give a more visual indication of the effect of the DOFC strategy on system (27), the percentage reduction in the yaw angle and yaw velocity error is represented as:
R y a = 1 A y a yaw angle under control A y a yaw angle without control × 100 % R y v e = 1 A C y v e yaw velocity error under control A C y v e yaw velocity error without control × 100 %
where A y a represents the oscillation amplitudes of the yaw angle, and A C y v e represents the accumulative error of the yaw velocity error. The percentage reduction in the yaw angle amplitudes and the yaw velocity accumulative error is denoted as R P y a and R P y v e , respectively.
As can be seen from Table 1, the proposed DOFC strategy based on the ETM and the quantitative mechanism has tangible effectiveness in reducing the value of the yaw velocity accumulative error. As the quantizer can moderately compress the signal before transmission, the network bandwidth occupied by the signal transmission is significantly reduced. The amplitude of the yaw angle oscillations is also reduced. And a significant improvement in effectiveness is obtained compared to the reference [19].
The variation in threshold σ is shown in Figure 11. The trigger time instant and the release time interval of the AETM are illustrated in Figure 12 and Figure 13.
Only 232 times are triggered during the whole simulation process. It saves 61.3 % of the communication resources.
To demonstrate the strengths of the AETM in this work, two different transmission schemes are presented for comparison, i.e., the fixed threshold ETM in [36] and the AETM in [43] are given. The relevant quantitative comparison results of the data are given in Table 2, Table 3 and Table 4, respectively.
The comparison of the number of triggers under different mechanisms is shown in Table 2. The comparison results of the yaw angle oscillation amplitude and the yaw velocity error accumulative error under different initial thresholds are given in Table 3 and Table 4. It can be seen from the results that compared with reference [36], the system performance is better when we have fewer trigger times. And we greatly reduce the number of triggers under the similar system performance compared with reference [43].
The performance of the system is significantly influenced by the threshold parameter σ . Thus, different cases of the initial threshold σ 0 are provided in Table 5. The selection rule of parameter σ 0 is followed by condition (13), where A y a , R P y a , A C y v e and R P y v e represent the same meanings as in Table 1.
As shown in Table 5 and Figure 14 and Figure 15, when the parameter σ 0 increases, the performance of the system will decrease, but at the same time, fewer data are transmitted. It should be noted that if σ 0 is too large, the stability of system (27) is hard to guarantee. For this reason, the advantages and disadvantages associated with its variation should be considered when selecting the triggering threshold parameter.

5. Conclusions

To guarantee the desired performance of the UMV systems under aperiodic DoS attack, a DOFC strategy with the ETM and the quantitative mechanism is investigated in this paper. Some uncertainties such as external interference and network-induced delay are considered in the UMV systems. For the purpose of reducing the communication burden and optimizing data transmission, an AETM and a quantizer are incorporated into the communication channel between the sampler and the control unit. And sufficient conditions for the global exponential stability of the system with H disturbance attenuation are given; the matrix parameters of the controller are obtained in terms of the LMIs.
The simulation results and the performance analysis demonstrated that the proposed scheme has tangible effectiveness for reducing the amplitude and deviation of the UMV systems. A conventional switching system to model acyclic DoS attacks is discussed in this paper, and the attack signal is subject to conditional restrictions of inequality (35). Markovian jump systems, semi-Markovian systems and other methods provide a new perspective for modeling the DoS attack signal. Within the proposed generic framework, the research directions can be expanded to hybrid attacks, network attack detection and so on, which are reserved for our future work. On the other hand, the reinforcement learning method gradually has become a research issue in the UMV field now. Applying reinforcement learning to a UMV is an effective method to solve the unknown dynamics for the system. In the future, reinforcement learning will be applied to model prediction of a UMV to solve the uncertainty problem of the systems.

Author Contributions

Methodology, writing—original draft, C.W.; simulation, validation, W.X.; writing—review and editing, conceptualization, J.G.; formal analysis, P.W.; investigation, P.X.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science Foundation of China under Grant 62073296, the Zhejiang Province Natural Science Foundation of China under Grant LZ23F030010, and Keyi College of Zhejiang Sci-Tech University Academy of Science Project Foundation under Grant KY2022006.

Data Availability Statement

The data presented in this study are available on request from the corresponding author.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Nieto-Hidalgo, M.; Gallego, A.J.; Gil, P.; Pertusa, A. Two-Stage Convolutional Neural Network for Ship and Spill Detection Using SLAR Images. IEEE Trans. Geosci. Remote Sens. 2018, 56, 5217–5230. [Google Scholar] [CrossRef]
  2. Zhang, D.; Liu, G. Predictive control for networked high-order fully actuated systems subject to communication delays and external disturbances. ISA Trans. 2023, 139, 425–435. [Google Scholar] [CrossRef]
  3. Wang, W.; Wang, Y.; Liu, X.; Zhiwei, L. Quantized control for networked switched systems under denial-of-service attacks via a barrier event-triggered mechanism. Nonlinear Anal. Hybrid Syst. 2023, 49, 101343. [Google Scholar] [CrossRef]
  4. Chen, P.; Wu, J.; Tian, E. Stochastic Event-Triggered H Control for Networked Systems Under Denial of Service Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 4200–4210. [Google Scholar] [CrossRef]
  5. Zhang, L.; Nguang, S.; Yan, S. Event-triggered H∞ control for networked control systems under denial-of-service attacks. Trans. Inst. Meas. Control 2021, 43, 1077–1087. [Google Scholar] [CrossRef]
  6. Wang, H.; Dong, Z.; Qi, S.; Zhang, Z.; Zhang, H. Trajectory-tracking control of an underactuated unmanned surface vehicle based on quasi-infinite horizon model predictive control algorithm. Trans. Inst. Meas. Control 2022, 44, 2709–2718. [Google Scholar] [CrossRef]
  7. Wang, N.; Qian, C.; Sun, J.; Liu, Y. Adaptive Robust Finite-Time Trajectory Tracking Control of Fully Actuated Marine Surface Vehicles. IEEE Trans. Control Syst. Technol. 2016, 24, 1454–1462. [Google Scholar] [CrossRef]
  8. Hao, L.; Yu, Y.; Li, T.; Li, H. Quantized Output-Feedback Control for Unmanned Marine Vehicles With Thruster Faults via Sliding-Mode Technique. IEEE Trans. Cybern. 2022, 52, 9363–9376. [Google Scholar] [CrossRef] [PubMed]
  9. Li, X.; Pan, H.; Deng, Y.; Han, S.; Yu, H. Finite-time event-triggered sliding mode predictive control of unmanned underwater vehicles without velocity measurements. Ocean Eng. 2023, 276, 114210. [Google Scholar] [CrossRef]
  10. Huang, C.; Xu, H.; Batista, P.; Zhang, X.; Guedes Soares, C. Fixed-time leader-follower formation control of underactuated unmanned surface vehicles with unknown dynamics and ocean disturbances. Eur. J. Control 2023, 70, 100784. [Google Scholar] [CrossRef]
  11. Tang, C.; Zhang, H.T.; Wang, J. Flexible Formation Tracking Control of Multiple Unmanned Surface Vessels for Navigating Through Narrow Channels with Unknown Curvatures. IEEE Trans. Ind. Electron. 2023, 70, 2927–2938. [Google Scholar] [CrossRef]
  12. Ma, Y.; Zhu, P.; Zhu, G.; Yan, X. Cooperative towing for double unmanned surface vehicles connected with a floating rope via vertical formation and adaptive moment control. Ocean Eng. 2023, 279, 114486. [Google Scholar] [CrossRef]
  13. Qin, H.; Chen, X.; Sun, Y. Adaptive state-constrained trajectory tracking control of unmanned surface vessel with actuator saturation based on RBFNN and tan-type barrier Lyapunov function. Ocean Eng. 2022, 253, 110966. [Google Scholar] [CrossRef]
  14. Wan, L.; Cao, Y.; Sun, Y.; Hongde, Q. Fault-tolerant trajectory tracking control for unmanned surface vehicle with actuator faults based on a fast fixed-time system. ISA Trans. 2022, 130, 79–91. [Google Scholar] [CrossRef] [PubMed]
  15. Wang, Y.; Jiang, B.; Wu, Z.; Xie, S.; Peng, Y. Adaptive Sliding Mode Fault-Tolerant Fuzzy Tracking Control With Application to Unmanned Marine Vehicles. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6691–6700. [Google Scholar] [CrossRef]
  16. Tang, F. Coverage path planning of unmanned surface vehicle based on improved biological inspired neural network. Ocean Eng. 2023, 278, 114354. [Google Scholar] [CrossRef]
  17. Zhang, G.; Dong, X.; Liu, J.; Zhang, X. Nussbaum-type function based robust neural event-triggered control of unmanned surface vehicle subject to cyber and physical attacks. Ocean Eng. 2023, 270, 113664. [Google Scholar] [CrossRef]
  18. Li, M.; Guo, C.; Yu, H. Global finite-time control for coordinated path following of multiple underactuated unmanned surface vehicles along one curve under directed topologies. Ocean Eng. 2021, 237, 109608. [Google Scholar] [CrossRef]
  19. Ye, Z.; Zhang, D.; Wu, Z. Adaptive event-based tracking control of unmanned marine vehicle systems with DoS attack. J. Frankl. Inst. 2021, 358, 1915–1939. [Google Scholar] [CrossRef]
  20. Liang, X.; Qu, X.; Hou, Y.; Li, Y.; Zhang, R. Distributed coordinated tracking control of multiple unmanned surface vehicles under complex marine environments. Ocean Eng. 2020, 205, 107328. [Google Scholar] [CrossRef]
  21. Qu, Y.; Cai, L. Nonlinear station keeping control for underactuated unmanned surface vehicles to resist environmental disturbances. Ocean Eng. 2022, 246, 110603. [Google Scholar] [CrossRef]
  22. Deng, Y.; Yin, X.; Hu, S. Event-triggered predictive control for networked control systems with DoS attacks. Inf. Sci. 2021, 542, 71–91. [Google Scholar] [CrossRef]
  23. Lian, J.; Han, Y. Switching-Like Event-Triggered Control for Networked Markovian Jump Systems Under Deception Attack. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 3271–3275. [Google Scholar] [CrossRef]
  24. Ye, Z.; Zhang, D.; Yan, H.; Wu, Z. A semi-Markovian jumping system approach to secure DPC of nonlinear networked unmanned marine vehicle systems with DoS attack. J. Frankl. Inst. 2023, 360, 12552–12575. [Google Scholar] [CrossRef]
  25. Ye, Z.; Zhang, D.; Wu, Z.; Yan, H. A3C-Based Intelligent Event-Triggering Control of Networked Nonlinear Unmanned Marine Vehicles Subject to Hybrid Attacks. IEEE Trans. Intell. Transp. Syst. 2021, 23, 12921–12934. [Google Scholar] [CrossRef]
  26. Arzen, K.E. A simple event-based PID controller. Proc. IFAC World Congr. 1999, 32, 8687–8692. [Google Scholar]
  27. Han, X.; Zhao, X.; Sun, T.; Xu, N.; Zong, G. Event-Triggered Optimal Control for Discrete-Time Switched Nonlinear Systems With Constrained Control Input. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 7850–7859. [Google Scholar] [CrossRef]
  28. Li, Y.; Yang, G. Adaptive Neural Control of Pure-Feedback Nonlinear Systems With Event-Triggered Communications. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 6242–6251. [Google Scholar] [CrossRef]
  29. Hu, S.; Yue, D.; Xie, Y.; Ma, Y.; Yin, Y. Stabilization of Neural-Network-Based Control Systems via Event-Triggered Control With Nonperiodic Sampled Data. IEEE Trans. Neural Netw. Learn. Syst. 2018, 29, 573–585. [Google Scholar] [CrossRef]
  30. Ma, L.; Wang, Y.; Han, Q. Event-Triggered Dynamic Positioning for Mass-Switched Unmanned Marine Vehicles in Network Environments. IEEE Trans. Cybern. 2022, 52, 3159–3171. [Google Scholar] [CrossRef]
  31. Li, M.; Guo, C.; Yu, H.; Yuan, Y. Event-triggered containment control of networked underactuated unmanned surface vehicles with finite-time convergence. Ocean Eng. 2022, 246, 110548. [Google Scholar] [CrossRef]
  32. Zhang, G.; Chu, S.; Huang, J.; Zhang, W. Robust adaptive fault-tolerant control for unmanned surface vehicle via the multiplied event-triggered mechanism. Ocean Eng. 2022, 249, 110755. [Google Scholar] [CrossRef]
  33. Li, Z.; Xiong, J. Event-triggered fuzzy filtering for nonlinear networked systems with dynamic quantization and stochastic cyber attacks. ISA Trans. 2022, 121, 53–62. [Google Scholar] [CrossRef] [PubMed]
  34. Zhao, Z.; Yi, X.; Ma, L.; Bai, X. Quantized recursive filtering for networked systems with stochastic transmission delays. ISA Trans. 2022, 127, 99–107. [Google Scholar] [CrossRef] [PubMed]
  35. Kahveci, N.; Ioannou, P. Adaptive steering control for uncertain ship dynamics and stability analysis. Automatica 2013, 49, 685–697. [Google Scholar] [CrossRef]
  36. Ma, Y.; Nie, Z.; Hu, S.; Li, Z.; Malekian, R.; Sotelo, M. Fault Detection Filter and Controller Co-Design for Unmanned Surface Vehicles Under DoS Attacks. IEEE Trans. Intell. Transp. Syst. 2021, 22, 1422–1434. [Google Scholar] [CrossRef]
  37. Ge, X.; Han, Q. Distributed formation control of networked multi-agent systems using a dynamic event-triggered communication mechanism. IEEE Trans. Ind. Electron. 2017, 64, 8118–8127. [Google Scholar] [CrossRef]
  38. Fu, M.; Xie, L. The sector bound approach to quantized feedbackcontrol. IEEE Trans. Autom. Control 2005, 50, 1698–1711. [Google Scholar]
  39. Ge, X.; Han, Q. Distributed event-triggered H filtering over sensor networks with communication delays. Inf. Sci. 2015, 291, 128–142. [Google Scholar] [CrossRef]
  40. Zhang, X.; Han, Q. Event-triggered dynamic output feedback control for networked control systems. IET Control Theory Appl. 2014, 8, 226–234. [Google Scholar] [CrossRef]
  41. Xu, S.; Dooren, P.V.; Stefan, R.; Lam, J. Robust stability and stabilization for singular systems with state delay and parameter uncertainty. IEEE Trans. Autom. Control 2002, 47, 1122–1128. [Google Scholar]
  42. Wang, Y.; Han, Q. Network-based modelling and dynamic output feedback control for unmanned marine vehicles in network environments. Automatica 2018, 91, 43–53. [Google Scholar] [CrossRef]
  43. Wang, H.; Xue, A. Adaptive event-triggered H∞ filtering for discrete-time delayed neural networks with randomly occurring missing measurements. Signal Process. 2018, 153, 221–230. [Google Scholar] [CrossRef]
Figure 1. The reference frames are Earth-fixed and body-fixed.
Figure 1. The reference frames are Earth-fixed and body-fixed.
Electronics 13 00515 g001
Figure 2. Networked structure for the UMV systems.
Figure 2. Networked structure for the UMV systems.
Electronics 13 00515 g002
Figure 3. The signal of DoS attack ( δ min = 1.5 s, ϑ max = 0.7 s).
Figure 3. The signal of DoS attack ( δ min = 1.5 s, ϑ max = 0.7 s).
Electronics 13 00515 g003
Figure 4. The yaw angle response.
Figure 4. The yaw angle response.
Electronics 13 00515 g004
Figure 5. The yaw angle response in reference.
Figure 5. The yaw angle response in reference.
Electronics 13 00515 g005
Figure 6. The yaw velocity error response.
Figure 6. The yaw velocity error response.
Electronics 13 00515 g006
Figure 7. The yaw velocity error response in reference.
Figure 7. The yaw velocity error response in reference.
Electronics 13 00515 g007
Figure 8. The yaw moment response.
Figure 8. The yaw moment response.
Electronics 13 00515 g008
Figure 9. The surge velocity response.
Figure 9. The surge velocity response.
Electronics 13 00515 g009
Figure 10. The sway velocity response.
Figure 10. The sway velocity response.
Electronics 13 00515 g010
Figure 11. The adaptive threshold of event-triggered mechanism.
Figure 11. The adaptive threshold of event-triggered mechanism.
Electronics 13 00515 g011
Figure 12. The trigger time instant of adaptive event-triggered mechanism.
Figure 12. The trigger time instant of adaptive event-triggered mechanism.
Electronics 13 00515 g012
Figure 13. The release time interval of adaptive event-triggered mechanism.
Figure 13. The release time interval of adaptive event-triggered mechanism.
Electronics 13 00515 g013
Figure 14. The response of yaw angle in different initial thresholds.
Figure 14. The response of yaw angle in different initial thresholds.
Electronics 13 00515 g014
Figure 15. The response of yaw velocity error in different initial thresholds.
Figure 15. The response of yaw velocity error in different initial thresholds.
Electronics 13 00515 g015
Table 1. The comparison of the system performance under two strategies.
Table 1. The comparison of the system performance under two strategies.
A ya RP ya AC yve RP yve
No control (Reference [19])1.6805-6.3338-
No control1.6808-6.3868-
With control (Reference [19])0.960242.9%3.795740.1%
With control0.955443.2%3.458045.9%
Table 2. Comparison of the number of triggers under different event-triggered mechanisms.
Table 2. Comparison of the number of triggers under different event-triggered mechanisms.
Threshold Parameter σ 0 0.050.10.60.8
Reference [36]2321746560
Reference [43]3022369686
This work2321746458
Table 3. Comparison of the yaw angle oscillation amplitudes under different event-triggered mechanisms.
Table 3. Comparison of the yaw angle oscillation amplitudes under different event-triggered mechanisms.
Threshold Parameter σ 0 0.050.10.60.8
Reference [36]0.97950.98481.20821.2317
Reference [43]0.97120.97761.19701.2073
This work0.97950.98481.20541.2119
Table 4. Comparison of the yaw velocity error accumulative error under different event-triggered mechanisms.
Table 4. Comparison of the yaw velocity error accumulative error under different event-triggered mechanisms.
Threshold Parameter σ 0 0.050.10.60.8
Reference [36]3.47093.52634.27394.4751
Reference [43]3.45743.49923.86274.0627
This work3.46803.52134.04284.4620
Table 5. System performance indexes at five specific initial thresholds σ 0 .
Table 5. System performance indexes at five specific initial thresholds σ 0 .
A ya RP ya AC yve RP yve Trigger Times
No control1.6808-6.3868-600
σ 0 = 0.01 0.924945.0%3.429646.3%395
σ 0 = 0.05 0.954443.2%3.468045.9%232
σ 0 = 0.1 0.959542.9%3.521344.9%175
σ 0 = 0.3 0.965842.5%3.704142.0%99
σ 0 = 0.6 1.142032.1%4.042836.7%69
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, C.; Xie, W.; Gao, J.; Wu, P.; Liu, P.X. Adaptive Event-Based Dynamic Output Feedback Control for Unmanned Marine Vehicle Systems under Denial-of-Service Attack. Electronics 2024, 13, 515. https://doi.org/10.3390/electronics13030515

AMA Style

Wang C, Xie W, Gao J, Wu P, Liu PX. Adaptive Event-Based Dynamic Output Feedback Control for Unmanned Marine Vehicle Systems under Denial-of-Service Attack. Electronics. 2024; 13(3):515. https://doi.org/10.3390/electronics13030515

Chicago/Turabian Style

Wang, Chunping, Wendong Xie, Jinfeng Gao, Ping Wu, and Peter X. Liu. 2024. "Adaptive Event-Based Dynamic Output Feedback Control for Unmanned Marine Vehicle Systems under Denial-of-Service Attack" Electronics 13, no. 3: 515. https://doi.org/10.3390/electronics13030515

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop