Next Article in Journal
Modeling and Analyzing Reaction Systems in Maude
Previous Article in Journal
A Novel Authentication Scheme Based on Verifiable Credentials Using Digital Identity in the Context of Web 3.0
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Change Control for Supply Chain Systems via Dynamic Event Triggered Using Reinforcement Learning under DoS Attacks

Department of Control Engineering, School of Automation, Beijing Information Science & Technology University, Beijing 100192, China
*
Author to whom correspondence should be addressed.
Electronics 2024, 13(6), 1136; https://doi.org/10.3390/electronics13061136
Submission received: 13 February 2024 / Revised: 13 March 2024 / Accepted: 18 March 2024 / Published: 20 March 2024

Abstract

:
In this paper, a distributed secure change control scheme for supply chain systems is presented under denial-of-service (DoS) attacks. To eliminate the effect of DoS attacks on supply chain systems, a secure change compensation is designed. A distributed policy iteration method is established to approximate the coupled Hamilton–Jacobi–Isaacs (HJI) equations. Based on the established reinforce–critic–actor (RCA) structure using reinforcement learning (RL), the reinforced signals, performance indicators, and disturbance input are proposed to update the traditional time-triggered mechanism, and the control input is proposed to update the dynamic event-triggered mechanism (DETM). Stability is guaranteed based on the Lyapunov method under secure change control. The simulation results for supply chain systems show the effectiveness of the secure change control scheme and verify the results.

1. Introduction

The production and manufacturing of enterprises are closely connected, thus forming a multi-connected network supply chain system, which is usually a complex network system composed of manufacturers, distributors, and retailers [1]. The control of the supply chain production inventory system has always been an important task of enterprise management. The supply chain production inventory system is designed by the traditional single-level sub-chain system, but for large enterprises, the production inventory system is a network system composed of multi-level sub-chains, which is more in line with the research on modern supply chain systems. Therefore, multi-agent is widely used in research on supply chain systems [2,3,4]. The control theory has been widely used in supply chain management. In [5,6], the supply chain is controlled by synovial control. In [7], the dynamic supply chain is designed via fuzzy robust control. In [8,9], the multi-agent supply chain is tracked and controlled at a fixed time. In addition, distributed model predictive control has been applied to supply chain inventory management [10,11]. However, the modern supply chain inventory system is faced with many challenges, such as the difficulty in accurately obtaining system dynamics information and accurately constructing system structure, etc. Therefore, there is an urgent need to develop data-driven methods that rely only on data instead of models. In addition, unexpected network attacks will seriously damage the normal production operation of enterprises and damage the security of the system. How to develop a security scheme to deal with major network events, and realizing the security control of the supply chain production and inventory system is an important means to prevent enterprises from suffering heavy economic losses.
From the perspective of control research on supply chain production inventory systems, firstly, based on the precise mathematical dynamics model of the system [12], all designs are based on the static mechanism model and [13] matrix inequalities are used to optimize and solve the controller, but this method relies on the precise dynamics information of the system. Secondly, with the rapid development of information technology, the manufacturing industry is developing rapidly towards intelligent production and manufacturing [14]. From the perspective of the agent, the inventory–production–modeling integrated architecture of the supply chain system is presented in [15]. Intelligent manufacturing is composed of interconnected enterprises, machines, and human and physical systems through the basic network of the industrial Internet. This enables comprehensive sensing, dynamic transmission, and real-time analysis of industrial data and then intelligent control and scientific decision-making to improve the efficient allocation of manufacturing resources. During the operation of supply chain systems, a large amount of input and process data are generated, which are recorded and kept by the system equipment for the subsequent data-driven design [16]. The operation and execution of the current large-scale intelligent industrial system and machinery and equipment ensure the smooth circulation of the large-scale industrial Internet. The accurate transmission of the Internet equipment determines the normal operation of the machine equipment, and the machine equipment and the industrial Internet transmission information medium are usually connected through the data; for large enterprises, the network structure is more complex, data transmission is extremely large and dense, and the transmission equipment requirements are higher. Therefore, determining how to save transmission data resources for enterprises and reduce the pressure of communication load is an important problem to be solved in the supply chain system, and it is also an important task of this study.
With the development of big data, artificial intelligence, and digital twins, modern supply chain systems have become intelligent systems integrating production equipment, robots, and the industrial Internet [17]. The intelligent system of a large-scale network will be subject to unexpected external events, which will lead to supply chain disruption. Therefore, change control in the face of emergencies has become an important issue in supply chain design. The authors of [18] developed a recovery control algorithm for supply chain disruptions. For a non-linear supply chain system, in [19], faced with the influence of demand disturbance and unexpected events, the feasible solution of the Takagi–Sugeno fuzzy system is given by using linear matrix inequality. However, network security events will lead to supply chain system transmission interruption; these security events will directly attack the information data of the system and destroy the security operation of the whole supply chain system, resulting in major security accidents. Therefore, the problem of security change control has been paid more and more attention by enterprises. It has become an important task of the inventory control of supply chain systems to design security change plans for the system and ensure that the system can respond to emergencies quickly and in a timely manner. At present, secure change control has been widely explored and studied in the field of multi-agent. For aperiodic persistent network attacks [20], an estimator is established to compensate for the state under network attacks, and a double-ended event-triggered mechanism is proposed to ensure the consistency of system security. A new adaptive dynamic event-triggered mechanism was proposed and the maximum duration of a network attack was deduced to achieve security consensus in [21]. Model-free adaptive control is applied to the secure control as an effective data-driven method. For an aperiodic network attack, the compensation scheme under network attack is given by [22]. For periodic network attacks, an emergency compensation scheme was proposed at the time of network attacks and an observer was used to estimate the output in [23]. Adaptive dynamic programming (ADP) has been widely developed and studied for solving optimal controllers. RL has been utilized to tackle the optimal control problem for multi-agent systems, such as tracking control [24,25]. After this, refs. [26,27] both unitized event-triggered ADP to address optimal control problems. Although the adaptive dynamic programming technique can be used to approach the optimal controller in the above paper, the external disturbance is not considered enough. For the supply chain system, the external uncertain demand is usually unknown, and it will gradually amplify along the reverse direction of the product side of the system, which is the bullwhip effect. Therefore, weakening the adverse impact of the bullwhip effect on the supply chain system has become another important task in the design of this system. Effective methods to weaken the bullwhip effect are proposed in [28,29]. However, ADP is rarely applied to the design of supply chain systems, and a large number of studies have found that the dynamic event triggering method can reduce the communication load pressure and save the communication load between supply chains. Therefore, we studied the supply chain inventory control based on the combination of adaptive dynamic planning technology and the dynamic event triggering mechanism.
The previous works focused on supply chain systems under DoS attacks can be used to detect and mitigate the impact through Machine Learning (ML), Deep Learning (DL), and reinforcement learning. In the attack detection for supply chain systems, leverage evolutionary and DL approaches to detect cyber-attacks in a cloud-based Supply Chain Management environment are proposed in [30]. A Machine Learning approach for network anomaly detection and constructing data-driven models to detect distributed DoS attacks on industry is presented in [31]. A federated learning-based efficient detection model named DFF-SC4N is addressed in [32] to identify intrusions from supply chain 4.0 networks. In the prediction detection for supply chain systems, Logistic Regression, Decision Tree, Naïve Bayes, and Random Forest classification algorithms are considered to learn a dataset for performance accuracies and threat predictions based on the CSC resilience design principles in [33]. However, RL is the only ML technique that can learn without any dataset. It is considered that supply chain systems only have initial permission or arbitrary data, so secure control for supply chain systems can be achieved.
Inspired by the large amount of research mentioned above, we carried out the following work. Firstly, the problem of the bullwhip effect caused by uncertain market demand is considered, and the idea of a zero-sum differential game is introduced into the supply chain system. Secondly, a goal-heuristic dynamic programming adaptive reinforcement learning method combined with the dynamic event triggering mechanism is designed. The dynamic event-triggering mechanism is then compared with a static event-triggering scheme [34,35]. The dynamic triggering scheme is adopted to further reduce the number of triggers. Finally, due to the packet loss caused by DoS attacks, an emergency compensation scheme is designed to realize the security change control of the supply chain systems, and a Lyapunov proof based on emergency compensation under DoS attacks is given. The simulation results fully demonstrate the effectiveness of the proposed method. The contributions of this paper are as follows:
(1)
For the supply chain production inventory system, the production input and uncertain demand are regarded as two sides of a zero-sum game. Based on the HJI equation, the RCA network online learning structure is established.
(2)
On this basis, a dynamic event-triggered mechanism is proposed, and appropriate internal parameters of the dynamic event-triggered mechanism are selected to reduce the number of iterations of the neural network, so as to realize the dynamic event triggering tracking control of each sub-chain of the supply chain to the main chain.
(3)
A secure change control scheme under DoS attack is proposed to ensure the normal operation of the supply chain production inventory system. The simulation analysis carried out proves that the proposed security change scheme can achieve effective change control.
The structure of the rest of this paper is organized as follows. Section 2 provides some preliminary knowledge. In Section 3, the dynamic event triggering mechanism and stability analysis are given. The learning structure of the neural network is presented in Section 4, the proposed method is verified by simulation, and Section 5 provides the summary and future research direction of this paper.

2. Preliminaries

2.1. Algebraic Graph Theory

In this paper, we consider a communication topology G = ( V , , A ) consisting of a vertex set V = { v 1 , v 2 , , v N } . V × V is an edge set, which indicates that v i can obtain state information directly from v j . A = [ a i j ] is a weighted adjacency matrix with element a i j , a i j > 0 if and only if ( v i , v j ) , and a i j = 0 otherwise. The in-degree matrix defines a diagonal matrix D = diag { d 1 , d 2 , , d n } with d i j N i a i j , and the Laplacian matrix L can be defined as L = D A . The connected matrix of the leader is defined as a diagonal matrix = d i a g { b 1 , b 2 , , b n } where b i > 0 if v i can receive the information leader and b i = 0 otherwise.

2.2. Problem Formulation

We consider a supply chain system consisting of N subchains and a chain leader. The dynamics are described as:
{ x i ( k + 1 ) = A x i ( k ) + B u i ( k ) + D ω ^ i ( k ) y i ( k ) = C x i ( k )
where i = 1 , 2 , , N , x i ( k ) R n is the production inventory status for the subchain i at k . u i ( k ) R n is the productivity for the subchain i at k . ω ^ i R n is the market demand for subchain i at k , and d i R n is the constant market. The production inventory, productivity, and market can be regarded as the state variable, the control input, and external disturbances for control theory. A , B , and D represent the unknown system matrix.
The chain leader is the tracking target of the other subchains. The dynamics of the chain leader are described as:
x 0 ( k + 1 ) = A x 0 ( k ) + D d i
where x 0 ( k ) R n is the production inventory status for the chain leader at k .
Definition 1.
The design goal of the supply chain production inventory system is to design a distributed minimum control strategy  u i ( k )  and maximum disturbance strategy  ω i ( k ) , so that the inventory status of all subchains can follow the inventory status of the chain leader  x i ( 0 ) , that is:
lim k x i ( k ) x 0 ( k ) = 0
Definition 2.
For the supply chain production inventory system, there exists a bullwhip suppression parameter, which makes the following bullwhip effect suppression conditions valid, that is:
k = 0 e i Τ ( k ) Q i i e i ( k ) + k = 0 u i Τ ( k ) R i i u i ( k ) γ 2 k = 0 ω i Τ ( k ) T i i ω i ( k )
Assumption 1.
The directed communication topology contains a spanning tree with the root node.
Assumption 2.
There exists a positive constant m such that:
f i ( e i ( k ) , u i ( k s i ) , ω i ( k ) ) m e i ( k ) + m ϵ i ( k )
Lemma 1.
([24]). According to Assumption 1, L + is a positive definite matrix (non-singular). Then, the consensus error is bounded by:
ξ ( k ) e ( k ) / λ min ( L + )
where λ min ( L + )  is the minimum singular value of  ( L + ) .
The local neighborhood error of subchain i is defined as:
e i ( k ) = j N i a i j ( x i ( k ) x j ( k ) ) + b i ( x i ( k ) x 0 ( k ) )
The global consensus error vector is given by:
e ( k ) = ( ( L + ) I n ) ( x ( k ) x ¯ 0 ( k ) )
where e ( k ) = [ e 1 Τ ( k ) , e 2 Τ ( k ) , , e N Τ ( k ) ] Τ R N n , x ( k ) = [ x 1 Τ ( k ) , x 2 Τ ( k ) , , x N Τ ( k ) ] Τ R N n , x ¯ 0 ( k ) = ( 1 I n ) x 0 ( k ) R N n .
Then, the global synchronization error vector is written as:
ξ ( k ) = x ( k ) x ¯ 0 ( k )
where ξ ( k ) = [ ξ 1 Τ ( k ) , ξ 2 Τ ( k ) , , ξ N Τ ( k ) ] Τ R N n .
The dynamic of the local neighborhood error for subchain i is obtained as:
e i ( k + 1 ) = A e i ( k ) + ( d i + b i ) B u i ( k ) j N i B u j ( k ) + ( d i + b i ) D ω i ( k ) j = 1 N a i j D ω j ( k ) = f i ( e i ( k ) , u i ( k ) , ω i ( k ) )

3. Results

3.1. The Secure Change Consensus Control Scheme

The purpose of DoS attacks is to decrease the supply chain systems’ performance by blocking the useful information transmitted between the sensor and the controller. DoS attacks cause packet dropouts in communication channels, resulting in production equipment being unable to operate normally. The supply chain systems cannot be designed according to the objective control scheme. The structure of the secure change control for supply chain systems is shown in Figure 1. The data packets received by the controller can be transformed into the following form:
e ˜ d i ( k ) = α i ( k ) e i ( k )
where α i ( k ) represents whether the DoS attacks are successful in the communication channels. If the DoS attacks are successful, α i ( k ) = 1 ; otherwise, α i ( k ) = 0 . The probability of DoS attacks conforms to a Bernoulli distribution, P { α i ( k ) = 1 } = β i , P { α i ( k ) = 0 } = 1 β i .
To eliminate the effects of DoS attacks, the secure change scheme is designed as:
e ˜ d i ( k ) = ( 1 α i ( k ) ) e i ( k ) + α i ( k ) e i ( k 1 )
The internal dynamic variable θ ˜ d i ( k ) under the secure change satisfies
θ ˜ d i ( k ) = ( 1 α i ( k ) ) θ i ( k ) + α i ( k ) θ i ( k 1 )
To improve the tracking performance of the supply chain system, the local internal performance signals can be described as:
P i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) = m = k α m k r i ( e i ( m ) , u i ( m ) , u i ( m ) , ω i ( m ) , ω i ( m ) )
where α ( 0 , 1 ) is the discount factor, u i ( k ) = { u j ( k ) | j N i } is the control input of the i subchain’s neighbors, and ω ^ i ( k ) = { ω ^ j ( k ) | j N i } is the disturbance input of the i subchain’s neighbors. The external reinforcement signal is given by:
r i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) = e i Τ ( k ) Q i i e i ( k ) + u i Τ ( k ) R i i u i ( k ) + j N i u j Τ ( k ) R i j u j ( k ) γ 2 ω i Τ ( k ) T i i ω i ( k ) γ 2 j N i ω j Τ ( k ) T i j ω j ( k )
where R i i > 0 , R i j > 0 , T i i > 0 , T i j > 0 are all positive symmetric weighting matrices.
Then, the local performance function can be defined as:
J i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) = l = k { e i Τ ( k ) Q i i e i ( k ) + u i Τ ( k ) R i i u i ( k ) + j N i u j Τ ( k ) R i j u j ( k ) γ 2 j N i ω j Τ ( k ) T i j ω j ( k ) γ 2 ω i Τ ( k ) T i i ω i ( k ) }
Given the admissible control input u i and disturbance input ω i , we define the local value function V i ( e i ( k ) ) as:
V i ( e i ( k ) ) = t = k η t k P i ( e i ( t ) , u i ( t ) , u i ( t ) , ω i ( t ) , ω j ( t ) )
where η ( 0 , 1 ) is the discount factor.
According to Equation (16), the Bellman equation is given by:
V i ( e i ( k ) ) = P i ( u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) )
Based on the Bellman optimality principle, the optimal value function V i ( e i ( k ) ) of subchain i satisfies the following H J I equation:
V i ( e i ( k ) ) = min u i max ω i { P i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) } = max ω i min u i { P i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) }
where the local internal reinforcement signals can be rewritten as:
P i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) = r i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + α P i ( e i ( k + 1 ) , u i ( k + 1 ) , u i ( k + 1 ) , ω i ( k + 1 ) , ω i ( k + 1 ) )
Then, the optimal control pair can be expressed as:
u i ( k ) = arg min u i { P i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) }
ω i ( k ) = arg max ω i { P i ( e i ( k ) , u i ( k ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) }
For subchain i , we denote { k s i } s = 0 as the incrementally triggering sequence.
The local neighbor error is rewritten by:
e i ( k ) = e i ( k s i )
The control input of subchain i is rewritten by:
u i ( k ) = u i ( k s i ) , k [ k s i , k s + 1 i )
Then, we define the error variable ϵ i ( k ) as:
ϵ i ( k ) = e i ( k s i ) e i ( k ) , k [ k s i , k s + 1 i )
Once the event is triggered, ϵ i ( k ) = 0 .
According to the H J I equation under the dynamic event-triggered mechanism, the optimal control pair can be rewritten as:
V i ( e i ( k ) ) = min u i max ω i { P i ( e i ( k ) , u i ( k s i ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) } = max ω i min u i { P i ( e i ( k ) , u i ( k s i ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) }
The optimal control input under the dynamic event-triggered mechanism is rewritten as:
u i ( k ) = arg min u i { P i ( e i ( k ) , u i ( k s i ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) }
The optimal disturbance input under the traditional time-triggered mechanism is rewritten as:
ω i ( k ) = arg max ω i { P i ( e i ( k ) , u i ( k s i ) , u i ( k ) , ω i ( k ) , ω i ( k ) ) + η V i ( e i ( k + 1 ) ) }

3.2. Stability Analysis

For subchain i , the dynamic event-triggered mechanism is given by:
2 m 2 ϵ i ( k ) 2 ( 1 2 m 2 ) e i ( k ) 2 + ρ i θ i ( k )
where 0 < ρ i < 1 , 0 < m < 2 2 , and θ i ( k ) satisfy:
θ i ( k + 1 ) = ( 1 λ i ) θ i ( k ) + ξ i ( ( 1 2 m 2 ) e i ( k ) 2 ( 2 m 2 ) ϵ i ( k ) 2 )
where 0 < ( 1 ξ i ) ρ i < λ i < 1 , 0 < ξ i < 1 .
Lemma 2.
For the dynamic event-triggered mechanism, it satisfies:
θ i ( k ) > 0
Proof of Lemma 2.
According to (28) and (29), one has
( 2 m 2 ) ϵ i ( k ) 2 ( 1 2 m 2 ) e i ( k ) 2 ρ i θ i ( k )
Based on (29), one has
θ i ( k + 1 ) ( 1 λ i ξ i ρ i ) θ i ( k ) , , ( 1 λ i ξ i ρ i ) k + 1 θ i ( 0 ) ( 1 ρ i ) k + 1 θ i ( 0 )
It is clear that θ i ( 0 ) > 0 , ( 1 λ i ξ i ρ i ) > 0 ; therefore, θ i ( k ) > 0 . This completes the proof. □
Theorem 1.
Suppose that Assumption 1 and Assumption 2 hold. Supply chain systems (1) and (2) could achieve secure change consensus under the dynamic event-triggered mechanisms (28) and (29) under DoS attacks.
Proof of Theorem 1.
In order to guarantee the stability of the designed systems, consider the following Lyapunov function for k [ k s i , k s + 1 i )
L i ( k ) = L 1 i ( k ) + L 2 i ( k )
where L 1 i ( k ) = e ˜ d i Τ ( k ) e ˜ d i ( k ) , L 2 i ( k ) = θ ˜ d i ( k ) . □
(1)
If DoS attacks do not occur at two continuous sampling times k and times k + 1 , it is assumed that α i ( k ) = α i ( k + 1 ) = 0
The difference of L 1 i ( k ) can be calculated as follows:
Δ L 1 i ( k ) = L 1 i ( k + 1 ) L 1 i ( k ) = e i Τ ( k + 1 ) e i ( k + 1 ) e i Τ ( k ) e i ( k ) ( e i ( k + 1 ) 2 e i ( k ) 2 )
According to Assumption 2 and the Cauchy–Schwarz inequality equation, one has
Δ L 1 i ( k ) = L 1 i ( k + 1 ) L 1 i ( k ) e i ( k + 1 ) 2 e i ( k ) 2 ( m e i ( k ) + m ϵ i ( k ) ) 2 e i ( k ) 2 2 m 2 e i ( k ) 2 + 2 m 2 ϵ i ( k ) 2 e i ( k ) 2
The difference of L 2 i ( k ) can be calculated as follows:
Δ L 2 i ( k ) = L 2 i ( k + 1 ) L 2 i ( k ) = θ i ( k + 1 ) θ i ( k ) = λ i θ i ( k ) + ξ i ( ( 1 2 m 2 ) e i ( k ) 2 ( 2 m 2 ) ϵ i ( k ) 2 )
Then,
Δ L i ( k ) = Δ L 1 i ( k ) + Δ L 2 i ( k ) ( 1 ξ i ) ( 2 m 2 ϵ i ( k ) 2 ( 1 2 m 2 ) e i ( k ) 2 ) λ i θ i ( k )
According to the dynamic event-triggered mechanism, it can be rewritten as:
Δ L i ( k ) = Δ L 1 i ( k ) + Δ L 2 i ( k ) ( 1 ξ i ) ( 2 m 2 ϵ i ( k ) 2 ( 1 2 m 2 ) e i ( k ) 2 ) λ i θ i ( k ) ( 1 ξ i ) ρ i θ i ( k ) λ i θ i ( k ) [ ( 1 ξ i ) ρ i λ i ] θ i ( k ) < 0
The secure consensus for the supply chain system is achieved.
(2)
If DoS attacks occur at sampling time k and do not occur at sampling time k + 1 , it is assumed that α i ( k ) = 0 , α i ( k + 1 ) = 1 .
The difference of L 1 i ( k ) can be calculated as follows:
Δ L 1 i ( k ) = e d i Τ ( k + 1 ) e d i ( k + 1 ) e d i Τ ( k ) e d i ( k ) = e i Τ ( k ) e i ( k ) e i Τ ( k ) e i ( k ) = 0
The difference of Δ L 2 i ( k ) can be calculated as follows:
Δ L 2 i ( k ) = θ d i ( k + 1 ) θ d i ( k ) = θ i ( k ) θ i ( k ) = 0
The secure consensus for the supply chain systems is achieved.
(3)
If DoS attacks do not occur at sampling time k and occur at sampling time k + 1 , it is assumed that α i ( k ) = 1 , α i ( k + 1 ) = 0 . We discuss two situations in the next section.
When the triggering mechanisms are satisfied at k 1 , the difference of Δ L 1 i ( k ) can be calculated as follows:
Δ L 1 i ( k ) = e i Τ ( k + 1 ) e i Τ ( k + 1 ) e i Τ ( k 1 ) e i Τ ( k 1 ) ( m e i ( k ) + m ϵ i ( k ) ) 2 e i ( k 1 ) 2 2 m 2 e i ( k ) 2 + 2 m 2 ϵ i ( k ) 2 e i ( k 1 ) 2 ( 2 m 2 1 ) e i ( k ) 2 + 2 m 2 ϵ i ( k ) 2 + e i ( k ) 2 e i ( k 1 ) 2 ( 2 m 2 1 ) e i ( k ) 2 + 2 m 2 ϵ i ( k ) 2 + ( 2 m 2 1 ) e i ( k 1 ) 2 + 2 m 2 ϵ i ( k 1 ) 2
The difference of Δ L 2 i ( k ) can be calculated as follows:
Δ L 2 i ( k ) = L 2 i ( k + 1 ) L 2 i ( k ) = θ i ( k + 1 ) θ i ( k 1 ) = θ i ( k + 1 ) θ i ( k ) + θ i ( k ) θ i ( k 1 ) = λ i θ i ( k ) + ξ i ( ( 1 2 m 2 ) e ( k ) 2 ( 2 m 2 ) ϵ i ( k ) 2 ) λ i θ i ( k 1 ) + ξ i ( ( 1 2 m 2 ) e ( k 1 ) 2 ( 2 m 2 ) ϵ i ( k 1 ) 2 ) = λ i θ i ( k ) + ξ i ( ( 1 2 m 2 ) e i ( k ) 2 ( 2 m 2 ) ϵ i ( k ) 2 ) λ i θ i ( k 1 ) + ξ i ( ( 1 2 m 2 ) e ( k 1 ) 2 ( 2 m 2 ) ϵ i ( k 1 ) 2 )
Therefore, combining (42) and (43) can further give:
Δ L i ( k ) = Δ L 1 i ( k ) + Δ L 2 i ( k ) ( ( 1 ξ i ) ρ i λ i ) θ i ( k ) + ( ( 1 ξ i ) ρ i λ i ) θ i ( k 1 )
According to 0 < ( 1 ξ i ) ρ i < λ i and θ i ( k ) > 0 , θ i ( k 1 ) > 0 , one can obtain Δ L i ( k ) < 0 . The secure consensus for the supply chain system is achieved.
When the triggering mechanisms are dissatisfied at k 1 , the difference of Δ L 1 i ( k ) can be calculated as follows:
Δ L 1 i ( k ) = e i Τ ( k + 1 ) e i Τ ( k + 1 ) e i Τ ( k 1 ) e i Τ ( k 1 ) ( m e i ( k ) + m ϵ i ( k ) ) 2 e i ( k 1 ) 2 2 m 2 e i ( k ) 2 + 2 m 2 ϵ i ( k ) 2 e i ( k 1 ) 2 ( 2 m 2 1 ) e i ( k ) 2 + 2 m 2 ϵ i ( k ) 2 + e i ( k ) 2 e i ( k 1 ) 2 ( 2 m 2 1 ) e i ( k ) 2 + 2 m 2 ϵ i ( k ) 2 + ( 2 m 2 1 ) e i ( k 1 ) 2 + 2 m 2 ϵ i ( k 1 ) 2
The difference of Δ L 2 i ( k ) can be calculated as follows:
Δ L 2 i ( k ) = L 2 i ( k + 1 ) L 2 i ( k ) = θ i ( k + 1 ) θ i ( k 1 ) = θ i ( k + 1 ) θ i ( k ) + θ i ( k ) θ i ( k 1 ) = λ i θ i ( k ) + ξ i ( ( 1 2 m 2 ) e ( k ) 2 ( 2 m 2 ) ϵ i ( k ) 2 ) λ i θ i ( k 1 ) + ξ i ( ( 1 2 m 2 ) e ( k 1 ) 2 ( 2 m 2 ) ϵ i ( k 1 ) 2 ) = λ i θ i ( k ) + ξ i ( ( 1 2 m 2 ) e i ( k ) 2 ( 2 m 2 ) ϵ i ( k ) 2 ) λ i θ i ( k 1 ) + ξ i ( ( 1 2 m 2 ) e ( k 1 ) 2 ( 2 m 2 ) ϵ i ( k 1 ) 2 )
It is noted that ϵ i ( k 1 ) 2 = 0 ; thus, the Lyapunov function Δ L i ( k ) is calculated as:
Δ L i ( k ) = Δ L 1 i ( k ) + Δ L 2 i ( k ) ( ( 1 ξ i ) ρ i λ i ) θ i ( k ) λ i θ i ( k 1 ) + ( 1 ξ i ) ( 2 m 2 1 ) e i ( k 1 ) 2
Since 0 < ( 1 ξ i ) ρ i < λ i , λ i > 0 , 0 < ξ i < 1 , 0 < m < 2 2 , we have Δ L i ( k ) < 0 , and the secure consensus control for supply chain systems could be achieved.
(4)
If DoS attacks occur at two continuous sampling times k and k + 1 , it is assumed that α i ( k ) = α i ( k + 1 ) = 1 . We also discuss two situations in the next section.
When the triggering mechanisms are satisfied at k 1 , the difference of Δ L 1 i ( k ) can be calculated as follows:
Δ L 1 i ( k ) = e i Τ ( k ) e i ( k ) e i Τ ( k 1 ) e i ( k 1 ) ( 2 m 2 1 ) e i ( k 1 ) 2 + 2 m 2 ϵ i ( k ) 2
The difference of Δ L 2 i ( k ) can be calculated as follows
Δ L 2 i ( k ) = θ i ( k ) θ i ( k 1 ) = λ i θ i ( k 1 ) + ξ i ( ( 1 2 m 2 ) e i ( k 1 ) 2 ( 2 m 2 ) ϵ i ( k 1 ) 2 )
From (43) and (44), it follows that:
Δ L i ( k ) = Δ L 1 i ( k ) + Δ L 2 i ( k ) ( ( 1 ξ i ) ρ i λ i ) θ i ( k 1 )
Based on 0 < ( 1 ξ i ) ρ i < λ i and θ i ( k 1 ) > 0 , it yields that Δ L i ( k ) < 0 . The secure consensus for the supply chain system is achieved. Thus, this completes the proof.
When the triggering mechanisms are dissatisfied at k 1 , the difference of Δ L 1 i ( k ) can be calculated as follows.
Δ L 1 i ( k ) = e i Τ ( k ) e i ( k ) e i Τ ( k 1 ) e i ( k 1 ) ( 2 m 2 1 ) e i ( k 1 ) 2 + 2 m 2 ϵ i ( k 1 ) 2
The difference of Δ L 2 i ( k ) can be calculated as follows:
Δ L 2 i ( k ) = θ i ( k ) θ i ( k 1 ) = λ i θ i ( k 1 ) + ξ i ( ( 1 2 m 2 ) e i ( k 1 ) 2 ( 2 m 2 ) ϵ i ( k 1 ) 2 )
Since ϵ i ( k 1 ) 2 = 0 , the difference of Δ L i ( k ) can thus be calculated as follows:
Δ L i ( k ) = θ i ( k ) θ i ( k 1 ) = λ i θ i ( k 1 ) ( 1 ξ i ) ( ( 1 2 m 2 ) e i ( k 1 ) 2 )
Based on θ i ( k 1 ) > 0 , it yields that Δ L i ( k ) < 0 . The secure consensus for the supply chain systems is achieved. Thus, this completes the proof.

3.3. Neural Network-Based Dynamic Event-Triggered Mechanism under DoS Attacks

The RCA structure is shown in Figure 2. It can be seen that all training processes use our methods, and the learning process is introduced in the next section.

3.3.1. Reinforce NN Learning Network Secure Change Design

For subchain i , we define the local internal reinforcement approximates as:
P ^ i ( Z ˜ g i ( k ) ) = ψ g i ( W g 2 i Τ ψ g i ( W g 1 i Τ Z ˜ g i ( k ) ) )
where Z ˜ g i ( k ) is the reinforced network secure change; it consists of e ˜ d i ( k ) , u i ( k s i ) , u i ( k s i ) , ω i ( k ) , and ω i ( k ) . W g 1 i denotes the weights between the input layer and the hidden layer, and W g 2 i denotes the weights between the hidden layer and the output layer.
When training the reinforced NN, the error function of the reinforced NN is defined as:
δ ˜ g i ( k ) = α P ^ i ( Z ˜ g i ( k ) ) P ^ i ( Z ˜ g i ( k 1 ) ) + r ˜ i ( k 1 )
The loss function is to minimize the following objective function:
E ˜ g i ( k ) = 1 2 δ ˜ g i Τ ( k ) δ ˜ g i ( k )
The weights W g 2 i updating the rules for subchain i are expressed as:
W g 2 i ( k + 1 ) = W g 2 i ( k ) μ g i ( E ˜ g i W g 2 i )
Based on the chain backpropagation rules, we derive:
W g 2 i ( k + 1 ) = W g 2 i ( k ) μ g i ( E ˜ g i ( k ) δ ˜ g i ( k ) δ ˜ g i ( k ) P ^ i ( Z ˜ g i ( k ) ) P ^ i ( Z ˜ g i ( k ) ) W g 2 i ( k ) ) = W g 2 i ( k ) 1 2 μ g i α δ ˜ g i ( k ) ( 1 P ^ i 2 ( Z ˜ g i ( k ) ) ) ϕ g i ( k )
where 0 < μ g i < 1 is the learning rate of the reinforced NN, ϕ g i ( k ) = ψ g i ( W g 1 i Τ Z ˜ g i ( k ) ) .

3.3.2. Critic NN Learning Network Secure Change Design

For subchain i , we define the critic network approximates as:
V ^ i ( Z ˜ c i ( k ) ) = W c 2 i Τ ψ c i ( W c 1 i Τ Z ˜ c i ( k ) )
where Z ˜ c i ( k ) is the critic network secure change; it consists of e ˜ d i ( k ) , u i ( k s i ) , u i ( k s i ) , ω i ( k ) , ω i ( k ) , and P ^ i ( Z ˜ g i ( k ) ) . W c 1 i denotes the weights between the input layer and the hidden layer, and W c 2 i denotes the weights between the hidden layer and the output layer.
The error of the critic network is obtained:
δ ˜ g i ( k ) = α P ^ i ( Z ˜ g i ( k ) ) P ^ i ( Z ˜ g i ( k 1 ) ) + r ˜ i ( k 1 )
The objective function of the critic network to be minimized is:
E ˜ c i ( k ) = 1 2 δ ˜ c i Τ ( k ) δ ˜ c i ( k )
The weights W c 2 i updating the rules for subchain i are given by:
W c 2 i ( k + 1 ) = W c 2 i ( k ) μ c i ( E ˜ c i ( k ) W c 2 i ( k ) )
Based on the chain backpropagation rules, we derive:
W c 2 i ( k + 1 ) = W c 2 i ( k ) μ c i ( E ˜ c i ( k ) δ ˜ c i ( k ) δ ˜ c i ( k ) V ^ i ( Z ˜ c i ( k ) ) V ^ i ( Z ˜ c i ( k ) ) W c 2 i ( k ) )     = W c 2 i ( k ) μ c i η δ ˜ c i ( k ) ψ c i ( W c 1 i Τ Z ˜ c i ( k ) )
where 0 < μ c i < 1 is the learning rate of the reinforced NN.

3.3.3. Actor NN Learning Network Secure Change Design

For subchain i , we define the optimal control input under the dynamic event-triggered mechanism as:
u ^ i ( k ) = ψ a i ( W a 2 i Τ ψ a i ( W a 1 i Τ Z ˜ a i ( k ) ) )
where Z ˜ a i ( k ) is the actor network secure change for optimal control input; it consists of e d i ( k s i ) . W a 1 i denotes the weights between the input layer and the hidden layer, and W a 2 i denotes the weights between the hidden layer and the output layer.
The error of the actor network secure change for optimal control input is obtained:
δ a i ( k ) = V ^ i ( Z ˜ c i ( k ) ) U c
The objective function of the actor network to be minimized is:
E ˜ a i ( k ) = 1 2 δ ˜ a i Τ ( k ) δ ˜ a i ( k )
The weights W c 2 i updating the rules for subchain i are expressed as:
W a 2 i ( k + 1 ) = W a 2 i ( k ) μ a i ( E ˜ a i ( k ) W a 2 i ( k ) )
Based on the chain backpropagation rules, we derive:
W a 2 i ( k + 1 ) = W a 2 i ( k ) μ a i ( E ˜ a i ( k ) V ^ i ( Z ˜ c i ( k ) ) V ^ i ( Z ˜ c i ( k ) ) u ^ i ( k ) u ^ i ( k ) W a 2 i ( k ) ) = W a 2 i ( k ) 1 4 μ a i ϕ a i ( k ) W c 2 i Τ ( k ) C 1 ( k ) ( 1 u ^ i 2 ( k ) ) [ W c 2 i Τ ( k ) ψ c i ( W c 1 i Τ Z ˜ c i ( k ) ) ]
where 0 < μ a i < 1 is the learning rate of the actor network secure change for optimal control input, ϕ a i ( k ) = ψ a i ( W a 1 i Τ Z ˜ a i ( k ) ) , C 1 ( k ) = ψ c i ( W c 1 i Τ Z ˜ c i ( k ) ) / u ^ i ( k ) .
For subchain i , we define the worst-case disturbance input under the traditional time-triggered mechanism as:
ω ^ i ( k ) = ψ a i ( W d 2 i Τ ψ a i ( W d 1 i Τ Z ˜ d i ( k ) ) )
where Z ˜ d i ( k ) is the actor network secure change for the worst-case disturbance input; it consists of e ˜ d i ( k ) . W d 1 i denotes the weights between the input layer and the hidden layer, and W d 2 i denotes the weights between the hidden layer and the output layer.
The error function of the actor network secure change for the worst-case disturbance input and objective function are the same results as in (57) and (58).
The weights W d 2 i updating the rules for subchain i are expressed as:
W d 2 i ( k + 1 ) = W d 2 i ( k ) μ d i ( E ˜ d i ( k ) W d 2 i ( k ) )
Based on the chain backpropagation rules, we derive:
W d 2 i ( k + 1 ) = W d 2 i ( k ) μ d i ( E ˜ a i ( k ) V ^ i ( Z ˜ c i ( k ) ) V ^ i ( Z ˜ c i ( k ) ) ω ^ i ( k ) ω ^ i ( k ) W d 2 i ( k ) ) = W d 2 i ( k ) 1 4 μ d i ϕ d i ( k ) W c 2 i Τ ( k ) C 2 ( k ) ( 1 ω ^ i 2 ( k ) ) [ W c 2 i Τ ( k ) ψ c i ( W c 1 i Τ Z ˜ c i ( k ) ) ]
where 0 < μ a i < 1 is the learning rate of the actor network secure change for the worst-case disturbance input, ϕ d i ( k ) = ψ d i ( W d 1 i Τ Z ˜ d i ( k ) ) , C 2 ( k ) = ψ c i ( W c 1 i Τ Z ˜ c i ( k ) ) / ω ^ i ( k ) .

4. Simulation

In this section, we consider a supply chain system to testify to the validity of the proposed results. We consider a supply chain system with four subchains and one chain leader. The system matrices are A = [ 0.7 0 0 0.8 ] , B = [ 1 1 0 1 ] , and D = [ 0 1 ] . The topology of the communication network is illustrated in Figure 3. The four subchains are denoted 1 2 3 4 and one chain leader is 0.
We can obtain the edge matrix with a 21 = a 31 = a 42 = 1 and the pinning gain with b 1 = b 2 = 1 , b 3 = b 4 = 0 . The weight matrices are selected as Q i i = I 2 × 2 , R 21 = R 31 = R 42 = 1 , R 11 = R 22 = R 33 = R 44 = 1 . We set the initial production inventory status as x 0 ( 0 ) = [ 1.5 , 1.5 ] Τ , x 1 ( 0 ) = [ 1 , 1 ] Τ , x 2 ( 0 ) = [ 1 , 1.2 ] Τ , x 3 ( 0 ) = [ 0.5 , 1.2 ] Τ , and x 4 ( 0 ) = [ 0.8 , 0.9 ] Τ . The initial productions are chosen as u 1 ( 0 ) = [ 0.3 , 0.1 ] Τ , u 2 ( 0 ) = [ 0.5 , 0.2 ] Τ , u 3 ( 0 ) = [ 0.1 , 0.3 ] Τ , and u 4 ( 0 ) = [ 0.2 , 0.4 ] Τ . The initial demand market is chosen as ω i ( 0 ) = 0.1 . The attenuation level of the bullwhip effect γ is chosen as γ = 1 and the constant demand market d = 0.1 .
In the training process, we select the discount factors α = η = 0.9 and the learning rates μ g i = μ c i = μ a i = μ d i = 0.04 . Next, we choose dynamic event-triggered parameters m 2 = 0.1 , λ i = 0.2 , ρ i = 0.1 , and ξ i = 0.3 and the initial internal dynamic variable θ 1 ( 0 ) = 1 , θ 2 ( 0 ) = 2 , θ 3 ( 0 ) = 3 , and θ 4 ( 0 ) = 4 . The parameters of DoS attacks are chosen as β i = β 2 = β 3 = β 4 = 0.5 . The initial weights are selected randomly in ( 0 , 1 ) .
The results are shown in Figure 4 and Figure 5. The production inventory status of the four subchains and chain leaders under the proposed secure change control scheme can be seen.
The weight curves of the reinforced neural network, the critic neural network, and the actor neural network are shown in Figure 6, Figure 7, Figure 8 and Figure 9. It can be observed that the weights are convergent at k = 5 a day. Due to the supply chain system still operating using the RCA structure under DoS attacks, the subchains cannot track the supply leaders. Thus, in Figure 4 and Figure 5, it can be seen that the production inventory status of all subchains and supply leaders demonstrates that synchronization is achieved around k = 60  a day under DoS attacks.
Figure 10 and Figure 11 depict that the inventory status errors eventually converge to zero around k = 60 a day. It can be seen that the internal dynamic variable θ i is always positive and convergent in Figure 12. The trigger instants of the four subchains are shown in Figure 13. The trajectories of triggering errors ε i ( k ) 2  along with the dynamic event-triggering threshold are shown in Figure 14. The instants under DoS attacks can be seen in Figure 15a,b.

5. Conclusions

In this paper, supply chain systems are provided by a new data-driven method based on the established RCA structure. The problems of unknown demand and the dynamic model can be solved by this method under Dos attacks. The secure change control problem for supply chain systems under DoS attacks is solved under the dynamic event-triggered mechanism. The proposed method requires no system model information, only the inventory status, production input, and disturbance input. Firstly, to alleviate the influence of DoS attacks, a structure of secure change control for supply chain systems is designed. A secure change mechanism is used to store the latest received data packets based on the structure. Then, a dynamic event-triggered mechanism is proposed for supply chain systems using RL. In addition, an RCA structure of secure change control for supply chain systems is provided. The dynamic event-triggered mechanism is applied to reduce the number of production input updates. The stability proof is provided by using the Lyapunov function under DoS attacks. Finally, the simulation results verify that the subchains can be tracked by the chain leaders using an RCA structure under DoS attacks. The weight curves of the network are eventually convergent.
It is worth noting that the proposed method can be applied not only to linear supply chain systems to achieve secure change tracking control but also to non-linear supply chain systems. However, considering that actual supply chain systems’ DoS attacks are usually aperiodic and unpredictable, supply chain systems’ aperiodic denial of service attacks under network attack events may be developed and studied in future work.

Author Contributions

Conceptualization, L.F. and Q.L.; methodology, B.Z.; software, B.Z.; validation, Q.L., S.X. and L.F.; formal analysis, B.Z. and L.F.; writing—original draft preparation, B.Z.; writing—review and editing, L.F. and B.Z.; visualization, S.X.; supervision, Q.L.; project administration, L.F. and Q.L.; funding acquisition, L.F., S.X. and Q.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Key Research and Development Program of China (No.2020YFB1708200) and in part by the Project of Cultivation for Young Topnotch Talents of Beijing Municipal Institutions under Grant BPHR202203231 and the R&D Program of Beijing Municipal Education Commission (KM202210009011). The corresponding author of this paper is Lingling Fan. This work was supported by the National Natural Science Foundation (NNSF) of China under Grant 62103057.

Data Availability Statement

Data are contained within the article.

Conflicts of Interest

The authors declare that there are no conflicts of interest.

References

  1. Gharaei, A.; Jolai, F. A multi-agent approach to the integrated production scheduling and distribution problem in multi-factory supply chain. Appl. Soft Comput. 2018, 65, 577–589. [Google Scholar] [CrossRef]
  2. Yang, N.; Ding, Y.; Leng, J.; Zhang, L. Supply chain information collaborative simulation model integrating multi-agent and system dynamics. Promet-Traffic Transp. 2022, 34, 711–724. [Google Scholar] [CrossRef]
  3. Henriques, R.d.S. Multi-agent system approach applied to a manufacturer’s supply chain using global objective function and learning concepts. J. Intell. Manuf. 2019, 30, 1009–1019. [Google Scholar] [CrossRef]
  4. Dharmapriya, S.; Kiridena, S.; Shukla, N. Multiagent Optimization Approach to Supply Network Configuration Problems with Varied Product-Market Profiles. IEEE Trans. Eng. Manag. 2022, 69, 2707–2722. [Google Scholar] [CrossRef]
  5. Xu, X.; Lee, S.-D.; Kim, H.-S.; You, S.-S. Management and optimisation of chaotic supply chain system using adaptive sliding mode control algorithm. Int. J. Prod. Res. 2021, 59, 2571–2587. [Google Scholar] [CrossRef]
  6. Cuong, T.N.; Kim, H.-S.; Nguyen, D.A.; You, S.-S. Nonlinear analysis and active management of production-distribution in nonlinear supply chain model using sliding mode control theory. Appl. Math. Model. 2021, 97, 418–437. [Google Scholar] [CrossRef]
  7. Zhang, S.; Zhang, C.; Zhang, S.; Zhang, M. Discrete Switched Model and Fuzzy Robust Control of Dynamic Supply Chain Network. Complexity 2018, 2018, 3495096. [Google Scholar] [CrossRef]
  8. Sun, T.-C.; Yousefpour, A.; Karaca, Y.; Alassafi, M.O.; Ahmad, A.M.; Li, Y.-M. Dynamical investigation and distributed consensus tracking control of a variable-order fractional supply chain network using a multi-agent neural network-based control method. Fractals-Complex Geom. Patterns Scaling Nat. Soc. 2022, 30, 2240168. [Google Scholar] [CrossRef]
  9. Shi, L.; Guo, W.; Wang, L.; Bekiros, S.; Alsubaie, H.; Alotaibi, A.; Jahanshahi, H. Stochastic Fixed-Time Tracking Control for the Chaotic Multi-Agent-Based Supply Chain Networks with Nonlinear Communication. Electronics 2023, 12, 83. [Google Scholar] [CrossRef]
  10. Fu, D.; Zhang, H.T.; Dutta, A.; Chen, G. A Cooperative Distributed Model Predictive Control Approach to Supply Chain Management. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 4894–4904. [Google Scholar] [CrossRef]
  11. Fu, D.; Zhang, H.T.; Yu, Y.; Ionescu, C.M.; Aghezzaf, E.H.; Keyser, R.D. A Distributed Model Predictive Control Strategy for the Bullwhip Reducing Inventory Management Policy. IEEE Trans. Ind. Inform. 2019, 15, 932–941. [Google Scholar] [CrossRef]
  12. Boccadoro, M.; Martinelli, F.; Valigi, P. Supply Chain Management by H-Infinity Control. IEEE Trans. Autom. Sci. Eng. 2008, 5, 703–707. [Google Scholar] [CrossRef]
  13. Li, Q.K.; Lin, H.; Tan, X.; Du, S. H∞ Consensus for Multiagent-Based Supply Chain Systems under Switching Topology and Uncertain Demands. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 4905–4918. [Google Scholar] [CrossRef]
  14. Wang, Q.; Shang, J. Analysis of the quality improvement path of supply chain management under the background of Industry 4.0. Int. J. Technol. Manag. 2023, 91, 1–18. [Google Scholar] [CrossRef]
  15. Long, Q.; Zhang, W. An integrated framework for agent based inventory-production-transportation modeling and distributed simulation of supply chains. Inf. Sci. 2014, 277, 567–581. [Google Scholar] [CrossRef]
  16. Liu, C.; Cai, W.; Zhang, C.; Wei, F. Data-driven intelligent control system in remanufacturing assembly for production and resource efficiency. Int. J. Adv. Manuf. Technol. 2023, 128, 3531–3544. [Google Scholar] [CrossRef]
  17. Xu, L.; Mak, S.; Brintrup, A. Will bots take over the supply chain? Revisiting agent-based supply chain automation. Int. J. Prod. Econ. 2021, 241, 108279. [Google Scholar] [CrossRef]
  18. Chen, J.; Kang, H.; Wang, H. A Product-Design-Change-Based Recovery Control Algorithm for Supply Chain Disruption Problem. Electronics 2023, 12, 2552. [Google Scholar] [CrossRef]
  19. Wei, Z.; Liu, Y.; Wu, Y.; Chen, W.; Li, Q.-K. T-S fuzzy model based event-triggered change control for product and supply chain systems. Int. J. Syst. Sci. 2023, 55, 426–439. [Google Scholar] [CrossRef]
  20. Yang, Y.; Li, Y.; Yue, D.; Tian, Y.C.; Ding, X. Distributed Secure Consensus Control with Event-Triggering for Multiagent Systems under DoS Attacks. IEEE Trans. Cybern. 2021, 51, 2916–2928. [Google Scholar] [CrossRef] [PubMed]
  21. Du, S.; Sheng, H.; Ho, D.W.C.; Qiao, J. Secure Consensus of Multiagent Systems with DoS Attacks via Fully Distributed Dynamic Event-Triggered Control. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 6588–6597. [Google Scholar] [CrossRef]
  22. Ma, Y.S.; Che, W.W.; Deng, C.; Wu, Z.G. Model-Free Adaptive Resilient Control for Nonlinear CPSs with Aperiodic Jamming Attacks. IEEE Trans. Cybern. 2023, 53, 5949–5956. [Google Scholar] [CrossRef]
  23. Ma, Y.S.; Che, W.W.; Deng, C.; Wu, Z.G. Distributed Model-Free Adaptive Control for Learning Nonlinear MASs under DoS Attacks. IEEE Trans. Neural Netw. Learn. Syst. 2023, 34, 1146–1155. [Google Scholar] [CrossRef]
  24. Zhang, H.; Jiang, H.; Luo, Y.; Xiao, G. Data-Driven Optimal Consensus Control for Discrete-Time Multi-Agent Systems with Unknown Dynamics Using Reinforcement Learning Method. IEEE Trans. Ind. Electron. 2017, 64, 4091–4100. [Google Scholar] [CrossRef]
  25. Zhong, X.; He, H. GrHDP Solution for Optimal Consensus Control of Multiagent Discrete-Time Systems. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 2362–2374. [Google Scholar] [CrossRef]
  26. Li, T.; Yang, D.; Xie, X.; Zhang, H. Event-Triggered Control of Nonlinear Discrete-Time System with Unknown Dynamics Based on HDP(λ). IEEE Trans. Cybern. 2022, 52, 6046–6058. [Google Scholar] [CrossRef]
  27. Peng, Z.; Luo, R.; Hu, J.; Shi, K.; Ghosh, B.K. Distributed Optimal Tracking Control of Discrete-Time Multiagent Systems via Event-Triggered Reinforcement Learning. IEEE Trans. Circuits Syst. I Regul. Pap. 2022, 69, 3689–3700. [Google Scholar] [CrossRef]
  28. Ponte, B.; Pino, R.; de la Fuente, D. Multiagent Methodology to Reduce the Bullwhip Effect in a Supply Chain. In Proceedings of the International Joint Conference on Computational Intelligence (IJCCI), Barcelona, Spain, 5–7 October 2012; pp. 1–21. [Google Scholar]
  29. Wang, X.; Ding, D.; Ge, X.; Han, Q.L. Supplementary Control for Quantized Discrete-Time Nonlinear Systems under Goal Representation Heuristic Dynamic Programming. IEEE Trans. Neural Netw. Learn. Syst. 2022, 35, 3202–3214. [Google Scholar] [CrossRef]
  30. Chauhdary, S.H.; Alkatheiri, M.S.; Alqarni, M.A.; Saleem, S. An efficient evolutionary deep learning-based attack prediction in supply chain management systems. Comput. Electr. Eng. 2023, 109, 108768. [Google Scholar] [CrossRef]
  31. Abosuliman, S.S. Deep learning techniques for securing cyber-physical systems in supply chain 4.0. Comput. Electr. Eng. 2023, 107, 108637. [Google Scholar] [CrossRef]
  32. Khan, I.A.; Moustafa, N.; Pi, D.; Hussain, Y.; Khan, N.A. DFF-SC4N: A Deep Federated Defence Framework for Protecting Supply Chain 4.0 Networks. IEEE Trans. Ind. Inform. 2023, 19, 3300–3309. [Google Scholar] [CrossRef]
  33. Yeboah-Ofori, A.; Swart, C.; Opoku-Boateng, F.A.; Islam, S. Cyber resilience in supply chain system security using machine learning for threat predictions. Contin. Resil. Rev. 2022, 4, 1–36. [Google Scholar] [CrossRef]
  34. Song, R.; Liu, L.; Xia, L.; Lewis, F.L. Online Optimal Event-Triggered H∞ Control for Nonlinear Systems with Constrained State and Input. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 131–141. [Google Scholar] [CrossRef]
  35. Zhang, Y.; Zhao, B.; Liu, D.; Zhang, S. Event-Triggered Control of Discrete-Time Zero-Sum Games via Deterministic Policy Gradient Adaptive Dynamic Programming. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 4823–4835. [Google Scholar] [CrossRef]
Figure 1. The structure of the secure change control for supply chain systems.
Figure 1. The structure of the secure change control for supply chain systems.
Electronics 13 01136 g001
Figure 2. The RCA structure of the secure change control for supply chain systems.
Figure 2. The RCA structure of the secure change control for supply chain systems.
Electronics 13 01136 g002
Figure 3. The topology of the communication network.
Figure 3. The topology of the communication network.
Electronics 13 01136 g003
Figure 4. The production inventory status x 1 i .
Figure 4. The production inventory status x 1 i .
Electronics 13 01136 g004
Figure 5. The production inventory status x 2 i .
Figure 5. The production inventory status x 2 i .
Electronics 13 01136 g005
Figure 6. The curves of the weights W g 2 .
Figure 6. The curves of the weights W g 2 .
Electronics 13 01136 g006
Figure 7. The curves of the weights W c 2 .
Figure 7. The curves of the weights W c 2 .
Electronics 13 01136 g007
Figure 8. The curves of the weights W a 21 .
Figure 8. The curves of the weights W a 21 .
Electronics 13 01136 g008
Figure 9. The curves of the weights W d 21 .
Figure 9. The curves of the weights W d 21 .
Electronics 13 01136 g009
Figure 10. The inventory status errors of x 1 i .
Figure 10. The inventory status errors of x 1 i .
Electronics 13 01136 g010
Figure 11. The inventory status errors of x 2 i .
Figure 11. The inventory status errors of x 2 i .
Electronics 13 01136 g011
Figure 12. The internal dynamic variable θ i .
Figure 12. The internal dynamic variable θ i .
Electronics 13 01136 g012
Figure 13. The trigger instants of the four subchains.
Figure 13. The trigger instants of the four subchains.
Electronics 13 01136 g013
Figure 14. The trajectories of triggering errors ε i ( k ) 2 along with the dynamic event-triggering threshold.
Figure 14. The trajectories of triggering errors ε i ( k ) 2 along with the dynamic event-triggering threshold.
Electronics 13 01136 g014
Figure 15. (a). DoS attack instants of subchains 1 and 2. (b). DoS attack instants of subchains 3 and 4.
Figure 15. (a). DoS attack instants of subchains 1 and 2. (b). DoS attack instants of subchains 3 and 4.
Electronics 13 01136 g015
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Fan, L.; Zhang, B.; Xiong, S.; Li, Q. Secure Change Control for Supply Chain Systems via Dynamic Event Triggered Using Reinforcement Learning under DoS Attacks. Electronics 2024, 13, 1136. https://doi.org/10.3390/electronics13061136

AMA Style

Fan L, Zhang B, Xiong S, Li Q. Secure Change Control for Supply Chain Systems via Dynamic Event Triggered Using Reinforcement Learning under DoS Attacks. Electronics. 2024; 13(6):1136. https://doi.org/10.3390/electronics13061136

Chicago/Turabian Style

Fan, Lingling, Bolin Zhang, Shuangshuang Xiong, and Qingkui Li. 2024. "Secure Change Control for Supply Chain Systems via Dynamic Event Triggered Using Reinforcement Learning under DoS Attacks" Electronics 13, no. 6: 1136. https://doi.org/10.3390/electronics13061136

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop