Next Article in Journal
Application of Anti-Solvent Crystallization for High-Purity Potash Production from K-Feldspar Leaching Solution
Next Article in Special Issue
Modeling and Control for Beam Pumping Units: An Overview
Previous Article in Journal
A Comprehensive Review on Discriminant Analysis for Addressing Challenges of Class-Level Limitations, Small Sample Size, and Robustness
Previous Article in Special Issue
IoT-Based Data Mining Framework for Stability Assessment of the Laser-Directed Energy Deposition Process
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Monitoring and Reconstruction of Actuator and Sensor Attacks for Lipschitz Nonlinear Dynamic Systems Using Two Types of Augmented Descriptor Observers

Research Centre for Digitalization and Intelligent Diagnosis to New Energies, College of Electrical and Information Engineering, Northeast Petroleum University, Daqing 163318, China
*
Author to whom correspondence should be addressed.
Processes 2024, 12(7), 1383; https://doi.org/10.3390/pr12071383
Submission received: 5 June 2024 / Revised: 25 June 2024 / Accepted: 27 June 2024 / Published: 2 July 2024
(This article belongs to the Special Issue Monitoring and Control of Processes in the Context of Industry 4.0)

Abstract

:
Fault data injection attacks may lead to a decrease in system performance and even a malfunction in system operation for an automatic feedback control system, which has motive to develop an effective method for rapidly detecting such attacks so that appropriate measures can be taken correspondingly. In this study, a secure descriptor estimation technique is proposed for continuous-time Lipschitz nonlinear cyber physical systems affected by actuator attacks, sensor attacks, and unknown process uncertainties. Specifically, by forming a new state vector composed of original system states and sensor faults, an equivalent descriptor dynamic system is built. A proportional and derivate sliding-mode observer is presented so that the system states, sensor attack, and actuator attack can be reconstructed successfully. The observer gains are obtained by using linear matrix inequality to secure robustly stable estimation error dynamics. Moreover, a robust descriptor fast adaptive observer estimator is presented as a complement. Finally, the efficacy levels of the proposed design approaches are validated using a vertical take-off and landing aircraft system. Comparison studies are also carried out to assess the tracking performances of the proposed algorithms.

1. Introduction

With the continuous development of industrial systems, cyber–physical systems (CPSs) have received more and more attention by integrating control, communication and information technology. The term CPS was firstly pioneered by Helen Gill, who explained basic theory in a workshop organized by the USNSF in 2006 [1]. In general, a cyber–physical system is defined as the integration of computation, communication, and control to achieve the desired performance of a physical process [2]. CPSs bridge cyber space and physical space, which can realize a remote control of multiple tasks. In comparison to traditional control systems, CPSs offer advantages such as high flexibility, stable and reliable operation, easy installation, and low maintenance costs [3]. However, due to the close interaction of information between physical components and cyber space, such systems are vulnerable to malicious attacks. For instance, in March 2000, the control system of a sewage treatment plant in Queensland, Australia, suffered a remote intrusion, resulting in a large amount of sewage being directly discharged, leading to a severe environmental disaster. A uranium enrichment plant was attacked by the malicious Stuxnet worm, causing the destruction of many centrifuges in June 2010 [4]. Therefore, security has become a big concern, and there is high demand for security in CPSs.
CPSs are now widely applied in various industries such as power systems, intelligent transportation, aerospace, chemical production and so forth, which play crucial roles in ensuring the normal operation of society. It is noted that there is an increasing variety of attack types targeting CPSs, primarily categorized into two types: DOS (Denial-of-Service) attacks and deception attacks (also called false data injection (FDI) attacks). DOS attacks involve attempts by attackers to temporarily or permanently disrupt services of devices connected to the internet, rendering legitimate users unable to access network resources. Deceptive data injection attacks are typically achieved by tampering with system data or packets, such as directly sending false packets to target nodes or injecting false data into original packets. In this paper, like most methods about CPS, we believe that the quality of service (QoS) of the developed communication network is adequate, that is, we assume that the signal transmission speed is very fast, and the impact of delay in the transmission process can be ignored to ensure that CPS operates under ideal conditions [5,6,7]. Hence, the architecture of a cyber–physical system attacked via a false data injection attack can be depicted by Figure 1. It is worth noting that a replay attack can be considered a specific type of deceptive data injection attack, where only past data can be replayed [8]. Recent literature focusing on the security of CPSs can mainly be categorized into two areas: attack detection and secure state estimation. In terms of methods, they are primarily classified into model-based [9,10,11,12,13] and deep learning-based approaches [14,15,16,17]. Secure state estimation is an intriguing and powerful technology that not only enables attack detection but also facilitates attack identification. Observer-based state estimation methods play a crucial role in attack detection and identification. Common secure state estimation methods include the Kalman filter method [18,19], sliding-mode estimation method [20,21], adaptive estimation methods [22,23], and proportional integral observer methods [24,25].
However, the current literature mostly concentrates on linear systems, and it either focuses on sensor attacks [26] or actuator attacks [27] or does not consider the influence of noise [28,29]. Furthermore, it is worth noting that many systems in engineering can be modeled as descriptor systems, where the nonlinear components of the system can be characterized in Lipschitz form, at least locally [30]. Descriptor system theory has been successfully applied in estimation and control for regular dynamics systems, and some pioneering works can be found in [31,32,33]. Compared with diagnosis and identification of physical faults, the attack reconstruction has limited results that need to be further investigated. Attack reconstruction is an advanced diagnosis strategy that can detect, isolate, and identify attacks at the same time.
In this study, Lipschitz nonlinear systems subjected to both actuator and sensor data injection attacks are investigated, and the contributions and innovations of this paper are highlighted as follows:
(i).
By forming an extended state vector composed of system states and sensor attacks, a descriptor dynamic system is established that is equivalent to original regular dynamic systems.
(ii).
Using proportional and derivative gain, the descriptor dynamic system is transformed into an augmented regular dynamic system, with sensor attacks as internal states but leaving actuator attacks as external unknown inputs.
(iii).
For the equivalent regular dynamic system obtained in (ii), a sliding-mode observer is designed to form an augmented descriptor observer, which can achieve the simultaneous reconstruction of system states, sensor attacks, and actuator attacks.
(iv).
The robust performance of the dynamics in the estimation error equation can be ensured by using the linear matrix inequality technique.
(v).
An augmented descriptor adaptive observer technique is presented as well for achieving a robust simultaneous reconstruction of system states, sensor attacks, and actuator attacks.
(vi).
The proposed algorithms are off-line design and on-line implementation, indicating an excellent real-time performance.
(vii).
The two proposed novel attack estimation techniques are validated by an engineering-oriented example, and the performances of the two reconstruction techniques are analyzed and compared.
The remaining parts of this paper are organized as follows. Preliminaries and problem formulation are given Section 2. In Section 3, a novel augmented sliding-mode observer is presented for the secure estimation of actuator and sensor attacks. In Section 4, an adaptive descriptor augmented estimation technique is addressed for the simultaneous reconstruction of actuator and sensor attacks. Simulation studies and comparisons are shown in Section 5. The paper ends with conclusions in Section 6.

2. Preliminaries and Problem Formulation

Consider a continuous time dynamic system subjected to actuator attacks, sensor attacks, and unknown interference in the form of
x ˙ t = A x t + B u t + G Φ x ( t ) + B a f a t + B d d ( t ) y t = C x t + D s f s t
where x ( t ) R n is the state vector, u ( t ) R m is the control input vector, Φ ( x ( t ) ) is a Lipschitz nonlinear function, y ( t ) R p is the measured output vector, d ( t )   R d is the unknown but bounded external disturbance vector and d δ , and f a ( t ) R q and f s ( t ) R r are the malicious actuator attack and sensor attack signals injected against the CPS, respectively. A , B , G , C , B a , B d , and D s are known matrices with appropriate dimensions. D s is assumed to be full rank of column.
Cyber–physical systems (CPSs) are often susceptible to attacks such as Denial-of-Service (DoS), false data injection attacks, and replay attacks. Among these, false data injection attacks have received significant attention due to their severe impact and the challenges associated with their detection. In this type of attack, adversaries can either directly transmit false data to the target location or modify data transmitted between different parts of the network, intentionally misleading the system, affecting its stability, and potentially causing severe damage to the system. In this paper, we focus on the monitoring and reconstruction problems related to such attacks.
Assumption 1. 
For any  x 1 ( t ) , x 2 ( t ) R n , there is a constant  γ > 0  such that
Φ x 1 t Φ x 2 t γ x 1 t x 2 t
Then, the nonlinear function Φ x ( t ) is Lipschitz.
Assume Φ x ( t ) = 0 when x t = 0 . Therefore, from (2), one can have
Φ x t γ x t
Assumption 2. 
The actuator fault and its derivative are assumed to be bounded, that is,  f a ( t ) α  and  f ˙ a ( t ) β ,  where  α  and  β  are assumed to be positive scalars.
Remark 1. 
Under Assumption 1, the nonlinear term  Φ x ( t )  is globally Lipschitz. It is noticed that in engineering practice, many nonlinear systems are locally Lipschitz in a region. The proposed methods can be easily extended to locally Lipschitz nonlinear systems (e.g., see [30]).

3. State and Attack Estimation Using Augmented Descriptor Sliding-Mode Techniques

In this section, to estimate the system state, actuator attacks, and sensor attacks while simultaneously mitigating the impacts of unknown disturbances, a new robust reconstruction technique is proposed by integrating augmented descriptor system approach and sliding-mode observer method.

3.1. Augmented Descriptor System Approach

Motivated by [31,32,33], we can define x a t = x ( t ) f s ( t ) . Therefore, we can identify an augmented descriptor system in the following form:
E x ˙ a t = A a x a t + B u a u t + G a Φ x ( t ) + B f a f a t + B d a d t + K D s f s t y t = C a x a t = C a 1 x a t + D s f s t
where
E = I 0 0 0 ,   A a = A 0 0 D s ,   B u a = B 0 ,   G a = G 0 ,   B f a = B a 0 , B d a = B d 0 ,   K = 0 I ,   C a = C D s ,   C a 1 = C 0 .
In terms of (5) and (6), the augmented descriptor system can be simplified to
E x ˙ a t = A a K C a 1 x a t + B u a u t + G a Φ x ( t ) + B f a f a t + B d a d t + K y t
Let S = E + K C a , then S = I 0 0 0 + 0 I C D s = I 0 C D s ,
Adding K C a x ˙ a t to both sides of Equation (6), we obtain
S x ˙ a t = A a K C a 1 x a t + B u a u t + G a Φ x t + B f a f a t + B d a d t + K y t + K y ˙ t
From S = I 0 C D s , we can obtain a left-inverse as follows:
S + = I 0 D s T D s 1 D s T C D s T D s 1 D s T
so that S + S = I .
By left-multiplying both sides of Equation (7) by S + , we can obtain
x ˙ a t = S + A a K C a 1 x a t + S + B u a u t + S + G a Φ x ( t ) + S + B f a f a t + S + B d a d t + S + K y t + S + K y ˙ t
Let
A e = S + A a K C a 1 ,   B e = S + B u a ,   G e = S + G a , B f e = S + B f a ,   B d e = S + B d a ,   K e = S + K .
Then, Equation (9) can be rewritten as
x ˙ a t = A e x a t + B e u t + G e Φ x t + B f e f a t + B d e d t + K e y t + K e y ˙ t
Let
ξ t = x a t K e y t
Equation (11) becomes
ξ ˙ t = A e x a t + B e u t + G e Φ x t + B f e f a t + B d e d t + K e y t
Substituting x a t = ξ t + K e y t into (13), we have
ξ ˙ t = A e ξ t + B e u t + G e Φ x t + B f e f a t + B d e d t + K e + A e K e y t
As a result, the augmented equivalent system above has been obtained by using descriptor system theory and transformation.

3.2. Augmented Sliding-Mode Observer

For the augmented system (14), a sliding-mode observer in the following form can be constructed:
ξ ^ ˙ t = A e ξ ^ t + B e u t + G e Φ x ^ t + B f e ν + K e + A e K e y t + L ( y ( t ) y ^ ( t ) ) x ^ a t = ξ ^ t + K e y t y ^ t = C a x ^ a
where ξ ^ ( t ) R n + r is estimate of the state ξ t ,   x ^ a t R n + r is the estimate of the augmented state x a t R n + r , and ν is the sliding-mode term to be designed. L R ( n + r ) × p is the gain to be solved.
Derived from Equation (15), one has
x ^ ˙ a t = A e x ^ a t + B e u t + G e Φ x ^ t + B f e ν + K e y t + L ( y ( t ) y ^ ( t ) ) + K e y ˙ t
Let
e a t = x a t x ^ a t                  
Φ r ( t ) = Φ x t Φ x ^ t
ν = ρ F e y F e y             i f   F e y 0   0                                 i f   F e y = 0
where ρ ρ 0 + α is the sliding-mode gain to be designed, α is the upper bound of f a ( t ) , ρ 0 is the positive scalar, F R q × p is the gain matrix to be solved, and e y is the output estimation error, which is y t y ^ t = C a e a ( t ) .
Subtracting (16) from (11), we can obtain
e ˙ a t = ( A e L C a ) e a t + G e Φ r ( t ) + B f e f a t ν + B d e d t

3.3. Stability Analysis

Lemma 1 
([25]). For any positive scalar  μ  and real constant matrices  x , y R n , the following inequality holds:
2 x T y μ x T x + 1 μ y T y
Lemma 2 
([34]). Given a symmetric matrix,  S = S 11 S 12 S 12 T S 22 . S < 0 if and only if  S 22 < 0 and  S 11 S 12 S 22 1 S 12 T < 0 .
The above lemma is known as the Schur complement lemma, which is useful for the design of the observer gains in this paper.
Theorem 1. 
For system (4), there exists an augmented sliding-mode observer in the form of (15) such that the estimation error dynamics in (20) is robustly stable and satisfies the robust performance index  e a T f r d ( t ) T f . If there exist a symmetric positive definite matrix  P ,  positive scalars  μ  and  r , and a matrix  Y  for a given positive constant  γ , the following inequality holds:
P B f e = C a T F T
P A e Y C a + A e T P C a T Y T + ( μ γ 2 + 1 ) I P B d e P G e B d e T P r 2 I 0 G e T P 0 μ I < 0
The observer gain can be calculated by L = P 1 Y , where e a T f = ( 0 T f e a T t e a t d t ) 1 2 , d T f = ( 0 T f d T ( t ) d ( t ) d t ) 1 2 .
Proof. 
(i).
Asymptotic stability when d = 0 .
Define a Lyapunov function candidate of the error dynamic system (20) as
V ( e a ) = e a T P e a
In terms of (20), one has
V ˙ e a = e a T P A e L C a + A e L C a T P e a + 2 e a T P G e Φ r t + 2 e a T P B f e f a t ν + 2 e a T P B d e d t .
From Equations (19) and (22), and noticing that f a α and ρ ρ 0 + α , we can obtain
e a T P B f e f a t ν = e a T P B f e f a t e a T P B f e ρ F e y F e y e a T P B f e f a t e a T C a T F T ρ F e y F e y = e a T P B f e f a t ρ F e y T F e y F e y e a T P B f e f a t ρ F e y = e a T P B f e f a t ρ F C a e a = e a T P B f e f a t ρ B f e T P e a = α ρ e a T P B f e ρ 0 e a T P B f e 0
Furthermore, from Assumption 1 and Lemma 1, it can be deduced that
2 e a T P G e Φ r t 1 μ G e T P e a T G e T P e a + μ γ 2 e a T e a
Substituting the results of Equation (26) and Equation (27) into (25), one can have
V ˙ e a e a T P A e L C a + A e L C a T P + 1 μ P G e G e T P + μ γ 2 I e a + 2 e a T P B d e d t
Noting that Y = P L and using Schur complement shown in Lemma 2 to (23), we have
Ω = P A e L C a + A e L C a T P + 1 μ P G e G e T P + ( μ γ 2 + 1 ) I P B d e B d e T P r 2 I < 0
which means
P A e L C a + A e L C a T P + 1 μ P G e G e T P + μ γ 2 I < 0
From (28) and (30), we can obtain V ˙ e a < 0 when d = 0 . Therefore, the estimation error dynamics in (20) is asymptotically stable when d = 0 .
(ii).
Robust stability when d 0 .
Let
Γ = 0 T f ( e a T e a r 2 d t T d t ) d t
By using (28) and (31), one has
Γ = 0 T f ( e a T e a r 2 d t T d t + V ˙ e a ) d t 0 T f V ˙ e a d t = 0 T f e a T I + P A e L C a + A e L C a T P + 1 μ P G e G e T P + μ γ 2 I e a + 2 e a T P B d e d t r 2 d t T d t d t 0 T f V ˙ e a d t = 0 T f e a T d t T Ω e a d t d t 0 T f V ˙ e a d t
where Ω is defined in (29).
Under zero initial condition e a 0 = 0 , one has
0 T f V ˙ e a d t = e a T T f P e a T f e a T 0 P e a 0 = V e ξ T f 0 .
Since Ω < 0 and 0 T f V ˙ e a d t 0 , from (32), we have Γ 0 , indicating e a T f r d t T f . As a result, the robust performance index is satisfied. □

3.4. Accessibility Analysis of Sliding Surface in Finite Time

To ensure the rapid response of the system to sliding-mode inputs, assist in the quick recovery of the system to the desired state when subjected to disturbances or external perturbations, and enhance the system’s robustness, it is necessary to determine the gain ρ in the sliding term of Equation (19), ensuring that the state error system moves onto the sliding surface s within a finite time.
Theorem 2. 
Consider a siding mode surface  s = e a t : e a t = 0 . For a given positive scalar  σ , if the gain  ρ 0  satisfies
ρ 0 λ m i n P B f e 1 P A e L C a + γ P G e θ + δ P B d e + σ
 the error dynamic system (20) can reach the sliding surface within a finite time.
Proof. 
 
Define a Lyapunov function candidate as
V s = s T P s
In terms of (19), and noting that ρ ρ 0 + α and f a α , one has
V ˙ s = 2 s T P s ˙ = 2 e a T P A e L C a e a t + G e Φ r t + B f e f a t ν + B d e d t 2 e a T P A e L C a e a t + G e Φ r t + B f e f a t ρ B f e F e y F e y + B d e d t = 2 e a T P A e L C a e a t + G e Φ r t + B f e f a t ρ B f e F C a e a t F C a e a t + B d e d t 2 e a T P A e L C a e a t + γ P G e e a t + δ P B d e + 2 α ρ e a T P B f e 2 e a T P A e L C a e a t + γ P G e e a t + δ P B d e 2 ρ 0 e a T P B f e
If the optimization problem in Theorem 1 has a feasible solution, the dynamic state error e a t is bounded, i.e., s u p e a t θ , t [ 0 , ) , where θ is a smaller positive scalar.
Then, from (36), one can have
V ˙ s 2 e a T P A e L C a + γ P G e θ + δ P B d e 2 ρ 0 λ m i n P B f e e a T 2 e a T P A e L C a + γ P G e θ + δ P B d e ρ 0 λ m i n P B f e
When ρ 0 λ m i n P B f e 1 P A e L C a + γ P G e θ + δ P B d e + σ holds, we have
V ˙ s 2 σ e a T 2 σ λ m i n ( P 1 ) V s
As a result, the error dynamic system can reach the sliding surface within a finite time. This completes the proof. □

3.5. Robust State and Attack Estimation

When the error dynamic system moves to the sliding-mode surface, e a t = e ˙ a t = 0 ; then, the error equation of (21) can be abbreviated as
B f e ν e q f a t = G e Φ r t + B d e d t
where ν e q is the equivalent output signal of ν .
Note that B f e ν f a t Υ , where Υ = γ G e θ + δ B d e . When Υ is minimized as much as possible, we can obtain f ^ a t = ν e q , and then
f ^ a t = ν e q = ρ F e y F e y + ϖ
where, ϖ > 0 is a small positive scalar that can reduce vibration during the sliding-mode motion process.
With the observer in the form of Equation (15) and the augmented state x a t = x ( t ) T f s ( t ) T , we can easily obtain estimates of state and sensor attack signals, namely
x ^ t = I n 0 n × r x ^ a t f ^ s t = 0 r × n I r × r x ^ a t
Remark 2. 
From Equation (40), the proposed attack signal reconstruction scheme is not limited by the type of attack signal, meaning it is applicable to step-type, sinusoidal, and other types of attack signals.

3.6. Design Procedure of Robust SMO for FDI Estimation

The design procedure of the addressed robust sliding-model observer can be summarized as below:
(i).
Construct the descriptor augmented system in the form of (4). Calculate the augmented matrices E , A a , B u a , G a , B f a , B d a , C a , and C a 1 in terms of (5).
(ii).
Select the gain K = 0 I , so that S = E + K C a is nonsingular. Calculate the matrices   A e , B e , G e , B f e , B d e , and K e in terms of (10).
(iii).
Compute the observer gain L = P 1 Y , where P and Y can be obtained by solving Equations (22) and (23).
(iv).
Select the sliding-mode term ρ to ensure that the error dynamic system (20) can reach the sliding surface within a finite time.
(v).
Establish the estimator in the form of (15), where the parameters are available from steps (i)–(iv). Carry out the real-time estimation to obtain the estimated vector x ^ a t . As a result, the reconstructed signals for system state, sensor attack, and actuator attack vectors can be readily formulated as follows:
x ^ t = I n 0 n × r x ^ a t f ^ s t = 0 r × n I r × r x ^ a t f ^ a t = ν e q = ρ F e y F e y + ϖ

4. State and Attack Estimation Using Augmented Adaptive Observers

4.1. Design of an Adaptive Augmented Observer

Based on descriptor augmented system (4) and equivalent regular dynamic system (14), we can design an augmented adaptive observer in the following form:
ξ ^ ˙ t = A e ξ ^ t + B e u t + G e Φ x ^ t + B f e f ^ a t + K e + A e K e y t + L F y t y ^ t y ^ t = C a x ^ a t x ^ a t = ξ ^ t + K e y t
f ^ ˙ a t = Γ R e y t + e ˙ y t
where ξ ^ t R n + r is the estimate of the vector ξ ( t ) in (14), x ^ a t R n + r is the estimated value of the augmented state x a t R n + r , and f ^ a t is the estimate of the actuator attack signal. L F R ( n + r ) × p is the gain to be solved; Γ is the adaptive learning rate to be designed. e y t is the output error, i.e., e y t = y t y ^ t = C a e a ( t )
From (43), we have
x ^ ˙ a t = A e x ^ a t + B e u t + G e Φ a x ^ t + B f e f ^ a t + K e y t + L F y t y ^ t + K e y ˙ t
Define
e f ( t ) = f a t f ^ a t
By subtracting Equation (45) from Equation (11), we can obtain
e ˙ a t = ( A e L F C a ) e a t + G e Φ r ( t ) + B f e e f ( t ) + B d e d t

4.2. Robust Stability Analysis

Theorem 3. 
For the dynamic system (4), there is an augmented adaptive observer in the shape of (43) and (44) such that the estimation error dynamics in (47) is robustly stable with the robust performance index  e a T f ϵ d t T f + ϵ f ˙ a ( t ) T f ; if there exist a symmetric positive definite matrix  Q ;  positive scalars  ϵ ,  η 1 ,  η 2 ,  and  η 3 ;    and suitable matrices  Y F  and  R    such that for a given positive constant  γ , the following inequality holds 
B f e T Q = R C a
Γ m = Γ m 11 A e T Q B f e + C a T Y F T B f e Q B d e 0 0 Q G e 0 * η 1 I 2 B f e T Q B f e B f e T Q B d e 0 0 0 B f e T Q G e * * ϵ 2 I 0 0 0 0 * * * ϵ 2 I Γ 1 0 0 * * * * η 1 I 0 0 * * * * * η 2 I 0 * * * * * * η 3 I < 0
Γ m 11 = A e T Q + Q A e C a T Y F T Y F C a + 1 + η 2 γ 2 + η 3 γ 2 I
The observer gain can be calculated by L F = Q 1 Y F .
Proof. 
(i).
Asymptotic stability when d = 0 and f ˙ a = 0 .
Define a Lyapunov function candidate of the error dynamic system (47) as
V F e a , e f = e a T Q e a + e f T Γ 1 e f
Using (47) and (51), one has
V ˙ F e a , e f = e a T Q A e L F C a + A e L F C a T Q e a + 2 e a T Q G e Φ r t + 2 e a T Q B f e e f t + 2 e a T Q B d e d t + 2 e f T t Γ 1 e ˙ f t
From Equation (44), we can deduce that
2 e f T t Γ 1 e ˙ f t = 2 e f T t Γ 1 f ˙ a t f ^ ˙ a t = 2 e f T t Γ 1 f ˙ a t 2 e f T t R e y t + e ˙ y t = 2 e f T t Γ 1 f ˙ a t 2 e f T t R C a e a 2 e f T t R C a e ˙ a ( t )
Substituting (47) and (53) into (52) and using (48), one can have
V ˙ F e a , e f = e a T Q A e L F C a + A e L F C a T Q e a + 2 e a T Q G e Φ r t + 2 e a T Q B d e d t + 2 e f T t Γ 1 f ˙ a t 2 e f T t B f e T Q A e L F C a e a t 2 e f T t B f e T Q G e Φ r t 2 e f T t B f e T Q B f e e f t 2 e f T t B f e T Q B d e d t
Using Lemma 1, we can obtain
2 e f T t Γ 1 f ˙ a t η 1 e f T t e f t + 1 η 1 f ˙ a t T Γ T Γ 1 f ˙ a t
2 e a T Q G e Φ r t 1 η 2 e a T Q G e G e T Q e a + η 2 γ 2 e a T e a
2 e f T t B f e T Q G e Φ r t 1 η 3 e f T t B f e T Q G e G e T Q B f e e f t + η 3 γ 2 e a T e a
Substituting (55)–(57) into (54), one can have
V ˙ F e a , e f = e a T Q A e L F C a + A e L F C a T Q + 1 η 2 Q G e G e T Q + η 2 γ 2 I + η 3 γ 2 I e a + 2 e a T Q B d e d t + e f T t η 1 I + 1 η 3 e f T t B f e T Q G e G e T Q B f e e f t 2 B f e T Q B f e e f t 2 e f T t B f e T Q A e L F C a e a t 2 e f T t B f e T Q B d e d t + 1 η 1 f ˙ a t T Γ T Γ 1 f ˙ a t
Letting Y F = Q L F , and applying the Schur complement to (50), we have
Π = Π 11 A e L F C a T Q B f e Q B d e 0 * η 1 I + 1 η 3 B f e T Q G e G e T Q B f e 2 B f e T Q B f e B f e T Q B d e 0 * * ϵ 2 I 0 * * * ϵ 2 I + 1 η 1 Γ T Γ 1 < 0
Π 11 = I + Q A e L F C a + A e L F C a T Q + 1 η 2 Q G e G e T Q + η 2 γ 2 I + η 3 γ 2 I
It is clear that (59) indicates
Π 11 m A e L F C a T Q B f e * η 1 I + 1 η 3 B f e T Q G e G e T Q B f e 2 B f e T Q B f e < 0
where
Π 11 m = Q A e L F C a + A e L F C a T Q + 1 η 2 Q G e G e T Q + η 2 γ 2 I + η 3 γ 2 I
Therefore, (61) means V ˙ F e a , e f < 0 when d = 0 and f ˙ a = 0 . Therefore, the estimation error dynamics (47) is asymptotically stable when d = 0 and f ˙ a = 0 .
(ii).
Robust stability when d 0 and f ˙ a 0 .
Let
Θ = 0 T f ( e a T e a ϵ 2 d t T d t ϵ 2 f ˙ a t T f ˙ a t ) d t
By using (58) and (63), one has
Θ = 0 T f ( e a T e a ϵ 2 d t T d t f ˙ a t T f ˙ a t + V ˙ F ( e a ) ) d t 0 T f V ˙ F e a d t = 0 T f e a T I + Q A e L F C a + A e L F C a T Q + 1 η 2 Q G e G e T Q + η 2 γ 2 I + η 3 γ 2 I e a + 2 e a T Q B d e d t + e f T t η 1 I + 1 η 3 e f T t B f e T Q G e G e T Q B f e e f t 2 B f e T Q B f e e f t 2 e f T t B f e T Q A e L F C a e a t 2 e f T t B f e T Q B d e d t + 1 η 1 f ˙ a t T Γ T Γ 1 f ˙ a t ϵ 2 d t T d t ϵ 2 f ˙ a t T f ˙ a t d t 0 T f V ˙ F e a d t = 0 T f ζ T Π ζ d t 0 T f V ˙ F ( e a ) d t
where
ζ = e a t e f t d t f ˙ a t
and Π is defined as shown on the left-hand side of (59). As Π < 0 and 0 T f V F ˙ e a d t 0 ,   from (64), we have Θ 0 , indicating e a T f ϵ d t T f + ϵ f ˙ a ( t ) T f . As a result, the robust performance index is satisfied. The proof is completed. □

4.3. Robust State and Attack Reconstruction

From Equation (44), we can easily obtain
f ^ a t = t f t Γ R e y t + e ˙ y t d t
where t f denotes the instant when the attack occurs.
The state and sensor attack signals can be reconstructed as follows:
x ^ t = I n 0 n × r x ^ a t f ^ s t = 0 r × n I r × r x ^ a t

4.4. Design Procedure for the Reconstruction of the Attack Signals

The design procedure of the proposed robust fast adaptive observer for attack signal reconstruction can be highlighted as shown:
(i).
Build the augmented system as shown in (4). Calculate the augmented matrices E , A a , B u a , G a , B f a , B d a , C a , and C a 1 in terms of (5).
(ii).
Select the gain K = 0 I , so that the matrix S = E + K C a is nonsingular. Calculate the changed matrix A e , B e , G e , B f e , B d e , and K e in terms of (10).
(iii).
Select the adaptive learning rate Γ
(iv).
Compute L F = Q 1 Y F , where Q and Y F can be obtained by solving Equations (48) and (49).
(v).
Establish estimators (43) and (44) where the parameters are available from steps (i)–(iv) and apply real-time simulation to identify the estimated vector x ^ a t . Hence, the estimated signals for the system state, sensor attack, and actuator attack vectors can be readily formulated as follows:
x ^ t = I n 0 n × r x ^ a t f ^ s t = 0 r × n I r × r x ^ a t f ^ a ( t ) = t f t Γ R e y t + e ˙ y t d t

5. Simulation Study

In this section, considering the linearized longitudinal dynamic system of the VTOL aircraft [35] to validate the effectiveness of the proposed method, we assume that the system is subjected to nonlinear dynamics, unknown disturbances, actuator attacks, and sensor attacks simultaneously. Therefore, the state-space dynamic expression can be described as shown in (1), where the states x ( t ) include horizontal velocity, vertical velocity, pitch rate, and pitch angle. The system parameters are as follows:
A = 9.9477 0.7476 0.2632 5.0337 52.1659 2.7452 5.5532 24.4221 26.0922 2.6361 4.1975 19.2774 0 0 1.0000 0 B = 0.4422 0.1761 3.5446 7.5922 5.5200 4.4900 0 0 , G = 0 0.1 0 0 ,   B a = 0.1761 7.5922 4.4900 0 , C = 1 0 0 0 0 1 0 0 0 0 1 0 0 1 1 1 , B d = 0.01 0 0.02 0 0 0.01 0 0.01 ,   Φ x ( t ) = s i n ( x 4 ) ,   D s = 1 0 0 0 0 0 0 1 .
From the parameter matrices mentioned above, the augmented matrices E and A e , B e , G e , B f e , B d e , K e in the form of Equations (5) and (10) can be calculated.
In this simulation, the disturbance signals d t = d 1 T t d 2 T t T are depicted in Figure 2, which are high-frequency signals corrupted by band-limited white noises.
(i).
Robust augmented sliding-mode observer
To evaluate the performance of the estimator, one can consider the following actuator time-varying attack signal f a ( t ) and sensor attack signals f s 1 ( t ) and f s 2 ( t ) :
f a t = s i n 2 ( 0.5 t ) ,                             12.5 < t 30 cos 5 t ,                                       40 < t 50 cos 10 t ,                                 60 < t 80 0 ,                                                                             e l s e
f s 1 ( t ) = 0.25 y 1 ( t ) ,                                                               15 < t 55 s q u a r e   w a v e   s i g n a l ,                                   60 < t 77.5 0 ,                                                                                                         e l s e            
f s 2 ( t ) = 1 ,                                                                                                                                   10 < t 30 0.01 t 2 + 0.5 t 30 ,                                                       30 < t 50 0.2 ( t 50 ) ,                                                                                         50 < t 75 0 ,                                                                                                                                                 e l s e                  
By solving (22) and (23), the gains are calculated as
L = 4.2916 25.7162 11.9250 5.0171   3.1577 48.3240 24.7412 53.6838 1.1818 17.5667 7.3616 3.1981 9.1213 14.1767 20.9020 4.0719 4.9909 24.4892 14.8587 13.5067 29.0488 88.2902 11.4565 3.0402
F = 0.0000 3.5095 1.3120 0.5494 .
Therefore, utilizing the estimator in the form of Equation (15) with the gains provided above, we can obtain curves for the states, attacks, and their respective estimates. Figure 3, Figure 4, Figure 5 and Figure 6 display the system states and their estimates, and Figure 7, Figure 8 and Figure 9 exhibit the attacks and their estimates. One can see that the estimated curves track the system states and attacks excellently.
(ii).
Adaptive augmented observer
To assess the performance of the estimator, we use the same attack signals as used in (i) above (e.g., see Equations (70)–(72)).
To solve LMIs (48) and (49), the following gains can be obtained:
L F = 3.8377 16.2173 28.3712 9.9091 10.2563 3.3335 5.4297 1.0501   4.7222 2.2512 5.8988 0.0564 0.3313 13.8613 22.5174 9.4375 3.3490 12.6870 22.4017 8.3864 16.3518 16.8364 29.4332 9.1642 ,
R = 0.0000 59.1527 101.5045 10.5879 .
Therefore, utilizing the estimator in the form of (43) and the gains obtained above, we can obtain the curves for the states, attacks, and their respective estimates. Figure 10, Figure 11, Figure 12 and Figure 13 show the states and their estimates, in which we can see that the estimated curves track the system states well, but the dynamic variations at initial time are relatively large. Figure 14, Figure 15 and Figure 16 exhibit the attacks and their estimates where the sensor attack signals in Figure 15 and Figure 16 are well tracked. It is noted that in Figure 14, the estimation curve can trace the actuator attack signal generally well, but there are significant dynamic response processes with noteworthy variations in the estimated actuator signal.
(iii).
Comparison study
For comparison studies, the algorithm proposed in reference [36] is simulated here.
Let x ¯ = x f ˙ a f ˙ s f a f s , system (1) can be augmented to the following form:
x ¯ ˙ t = A ¯ x ¯ t + B ¯ u t + G ¯ Φ ¯ x t + B ¯ d d t y t = C ¯ x ¯ t
where
A ¯ = A 0 4 × 1 0 4 × 2 B a 0 4 × 2 0 1 × 4 0 0 1 × 2 0 0 1 × 2 0 2 × 4 0 2 × 1 0 2 × 2 0 2 × 1 0 2 × 2 0 1 × 4 1 0 1 × 2 0 0 1 × 2 0 2 × 4 0 2 × 1 I 2 0 2 × 1 0 2 × 2 ,   B ¯ = B 0 1 × 2 0 2 × 2 0 1 × 2 0 2 × 2 ,     B ¯ d = B d 0 1 × 2 0 2 × 2 0 1 × 2 0 2 × 2 , C ¯ = C 0 4 × 1 0 4 × 2 0 4 × 1 D s ,   Φ ¯ x t = Φ s x t 0 0 0 0 ,   Φ s x t = 0 0.1 s i n ( x 4 ) 0 0 .
The nonlinear augmented unknown input observer is given in the form of
z ¯ ˙ t = R ¯ z ¯ t + T ¯ B ¯ u t + T ¯ Φ ¯ x ^ t + K ¯ y t x ¯ ^ t =   z ¯ t + H ¯   y t
Using Theorem 3 from the literature [36], one can obtain the gains of the UIO-augmented observer. The simulated curves of the attacks and their estimates are depicted in Figure 17, Figure 18 and Figure 19. One can see that the augmented UIO approach can track step signals, slope signals, and parabola signals excellently. The UIO approach can also track the effectiveness of the loss signal and square wave signal generally well, but there are some spikes caused by abrupt changes from other attack signals. The UIO method can track the low-frequency sinusoidal signals well, but the tracking performance reduces as the frequency of the signal increases.
By comparing Figure 7, Figure 8 and Figure 9 in (i), Figure 14, Figure 15 and Figure 16 in (ii), and Figure 17, Figure 18 and Figure 19 in (iii), one can summarize the comments in Table 1.

6. Conclusions

In this paper, two simultaneous estimation techniques for state and false data injection attacks on the Lipschitz nonlinear systems affected by actuator attacks, sensor attacks, and unknown input disturbances have been proposed based on descriptor system theory, sliding-mode estimation, and adaptive estimation techniques. The robust stability conditions of the system have been analyzed based on the Lyapunov stability and linear matrix inequality methods. The proposed algorithms have been validated using simulation and comparison studies. The proposed algorithms have provided new insights into the reconstruction of multiple attacks, improving the safety and reliability of industrial systems.

Author Contributions

Conceptualization, Z.-W.G.; writing—original draft preparation, H.W. and Z.-W.G.; writing—revision, Z.-W.G.; supervision, Z.-W.G.; project administration, Z.-W.G. and Y.L.; Software, H.W. and Y.L.; validation, H.W. and Z.-W.G.; formal analysis, H.W. and Z.-W.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Starting Research Fund for Talents (13051202202) of Northeast Petroleum University, the Featured Research Team Fund from the Fundamental Research Grant of Heilongjiang Province (2023TSTD-03) and the Innovative Talent Scheme of NNSFC (10230026).

Data Availability Statement

No new data were created in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Singh, S.; Yadav, N.; Chuarasia, P.K. A review on cyber physical system attacks: Issues and challenges. In Proceedings of the 2020 International Conference on Communication and Signal Processing (ICCSP), Chennai, India, 28–30 July 2020; pp. 1133–1138. [Google Scholar]
  2. Mahmoud, M.S.; Hamdan, M.M.; Baroudi, U.A.N. Modeling and control of cyber-physical systems subject to cyber attacks: A survey of recent advances and challenges. Neurocomputing 2019, 338, 101–115. [Google Scholar] [CrossRef]
  3. Sánchez, H.S.; Rotondo, D.; Escobet, T.; Puig, V.; Quevedo, J. Bibliographical review on cyber attacks from a control oriented perspective. Annu. Rev. Control 2019, 48, 103–128. [Google Scholar] [CrossRef]
  4. Pasqualetti, F.; Dörfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control 2013, 58, 2715–2729. [Google Scholar] [CrossRef]
  5. Baroumand, S.; Zaman, A.; Mihaylova, L. Attack detection and fault-tolerant control of interconnected cyber-physical systems against simultaneous replayed time-delay and false-data injection attacks. IET Control Theory Appl. 2023, 17, 527–541. [Google Scholar] [CrossRef]
  6. Sadeghikhorami, L.; Varadharajan, V.; Safavi, A.A. A novel secure observer-based controller and attack detection scheme for Networked Control Systems. Inf. Sci. 2021, 575, 185–205. [Google Scholar] [CrossRef]
  7. Dong, K.; Yang, G.-H.; Wang, H. Estimator-based event-triggered output synchronization for heterogeneous multi-agent systems under denial-of-service attacks and actuator faults. Inf. Sci. 2024, 657, 119955. [Google Scholar] [CrossRef]
  8. Zhang, D.; Wang, Q.-G.; Feng, G.; Shi, Y.; Vasilakos, A. A survey on attack detection, estimation and control of industrial cyber–physical systems. ISA Trans. 2021, 116, 1–16. [Google Scholar] [CrossRef]
  9. Guo, Z.; Shi, D.; Quevedo, D.E.; Shi, L. Secure state estimation against integrity attacks: A Gaussian mixture model approach. IEEE Trans. Signal Process. 2018, 67, 194–207. [Google Scholar] [CrossRef]
  10. Gao, Y.; Sun, G.; Liu, J.; Shi, Y.; Wu, L. State estimation and self-triggered control of CPSs against joint sensor and actuator attacks. Automatica 2020, 113, 108687. [Google Scholar] [CrossRef]
  11. Lv, M.; Lv, Y.; Yu, W.; Meng, H. Finite-Time Attack Detection and Secure State Estimation for Cyber-Physical Systems. IEEE/CAA J. Autom. Sin. 2023, 10, 2032–2034. [Google Scholar] [CrossRef]
  12. Lv, Y.; Lu, J.; Liu, Y.; Zhang, L. A class of stealthy attacks on remote state estimation with intermittent observation. Inf. Sci. 2023, 639, 118964. [Google Scholar] [CrossRef]
  13. Kazemi, Z.; Safavi, A.A.; Arefi, M.M.; Naseri, F. Finite-time secure dynamic state estimation for cyber–physical systems under unknown inputs and sensor attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 52, 4950–4959. [Google Scholar] [CrossRef]
  14. Liu, G.; Zhao, H.; Fan, F.; Liu, G.; Xu, Q.; Nazir, S. An enhanced intrusion detection model based on improved kNN in WSNs. Sensors 2022, 22, 1407. [Google Scholar] [CrossRef] [PubMed]
  15. Xiao, Y.; Xing, C.; Zhang, T.; Zhao, Z. An intrusion detection model based on feature reduction and convolutional neural networks. IEEE Access 2019, 7, 42210–42219. [Google Scholar] [CrossRef]
  16. Almalaq, A.; Albadran, S.; Mohamed, M.A. Deep machine learning model-based cyber-attacks detection in smart power systems. Mathematics 2022, 10, 2574. [Google Scholar] [CrossRef]
  17. Wang, Z.; Li, Z.; Wang, J.; Li, D. Network intrusion detection model based on improved BYOL self-supervised learning. Secur. Commun. Netw. 2021, 9486949. [Google Scholar] [CrossRef]
  18. Liu, Y.; Yang, G.-H. Event-triggered distributed state estimation for cyber-physical systems under DoS attacks. IEEE Trans. Cybern. 2020, 52, 3620–3631. [Google Scholar] [CrossRef]
  19. Zhang, J.; Sun, J. Optimal cooperative multiple-attackers scheduling against remote state estimation of cyber-physical systems. Syst. Control Lett. 2020, 144, 104771. [Google Scholar] [CrossRef]
  20. Liu, Z.; Chen, X.; Yu, J. Adaptive sliding mode security control for stochastic Markov jump cyber-physical nonlinear systems subject to actuator failures and randomly occurring injection attacks. IEEE Trans. Ind. Inform. 2022, 19, 3155–3165. [Google Scholar] [CrossRef]
  21. Yang, H.; Yin, S.; Han, H.; Sun, H. Sparse actuator and sensor attacks reconstruction for linear cyber-physical systems with sliding mode observer. IEEE Trans. Ind. Inform. 2021, 18, 3873–3884. [Google Scholar] [CrossRef]
  22. Yan, J.-J.; Yang, G.-H. Adaptive fault estimation for cyber-physical systems with intermittent DoS attacks. Inf. Sci. 2021, 547, 746–762. [Google Scholar] [CrossRef]
  23. An, L.; Yang, G.-H. Secure state estimation against sparse sensor attacks with adaptive switching mechanism. IEEE Trans. Autom. Control 2017, 63, 2596–2603. [Google Scholar] [CrossRef]
  24. Dong, L.; Xu, H.; Zhang, L.; Li, Z.; Chen, Y. Adjustable proportional-integral multivariable observer-based FDI attack dynamic reconstitution and secure control for cyber-physical systems. Appl. Math. Comput. 2023, 443, 127762. [Google Scholar] [CrossRef]
  25. Wang, X.; Ding, D.; Dong, H.; Yi, X. PI-based security control against joint sensor and controller attacks and applications in load frequency control. IEEE Trans. Syst. Man Cybern. Syst. 2022, 53, 970–980. [Google Scholar] [CrossRef]
  26. Huo, J.-R.; Li, X.-J. False data injection attacks on sensors against state estimation in cyber-physical systems. J. Frankl. Inst. 2023, 360, 6110–6130. [Google Scholar] [CrossRef]
  27. He, K.; Li, T.; Long, Y.; Park, J.H.; Chen, C.P. Secure state estimation and actuator attack reconstruction for cyber-physical systems based on sliding-mode observer. Int. J. Robust Nonlinear Control 2023, 33, 8508–8523. [Google Scholar] [CrossRef]
  28. Zhao, Z.; Xu, Y. Performance based attack detection and security analysis for cyber-physical systems. Int. J. Robust Nonlinear Control 2023, 33, 3267–3284. [Google Scholar] [CrossRef]
  29. Keijzer, T.; Ferrari, R.M.; Sandberg, H. Secure State Estimation under Actuator and Sensor Attacks using Sliding Mode Observers. IEEE Control Syst. Lett. 2023, 7, 2071–2076. [Google Scholar] [CrossRef]
  30. Gao, Z. Estimation and compensation for Lipschitz nonlinear discrete-time systems subjected to unknown measurement delays. IEEE Trans. Ind. Electron. 2015, 62, 5950–5961. [Google Scholar] [CrossRef]
  31. Gao, Z. Fault estimation and fault-tolerant control for discrete-time dynamic systems. IEEE Trans. Ind. Electron. 2015, 62, 3874–3884. [Google Scholar] [CrossRef]
  32. Gao, Z.; Ding, S.X. Actuator fault robust estimation and fault-tolerant control for a class of nonlinear descriptor systems. Automatica 2007, 43, 912–920. [Google Scholar] [CrossRef]
  33. Gao, Z.; Wang, H. Descriptor observer approaches for multivariable systems with measurement noises and application in fault detection and diagnosis. Syst. Control Lett. 2006, 55, 304–313. [Google Scholar] [CrossRef]
  34. Boyd, S.; El Ghaoui, L.; Feron, E.; Balakrishnan, V. Linear Matrix Inequalities in System and Control Theory; Society for Industrial and Applied Mathematics (SIAM): Philadelphia, PA, USA, 1994. [Google Scholar]
  35. Han, J.; Liu, X.; Wei, X.; Zhang, H.; Hu, X. Adjustable dimension descriptor observer based fault estimation of nonlinear system with unknown input. Appl. Math. Comput. 2021, 396, 125899. [Google Scholar] [CrossRef]
  36. Gao, Z.; Liu, X.; Chen, M.Z.Q. Unknown input observer-based robust fault estimation for systems corrupted by partially decoupled disturbances. IEEE Trans. Ind. Electron. 2015, 63, 2537–2547. [Google Scholar] [CrossRef]
Figure 1. The schematic diagram of the CPS architecture subjected to attacks.
Figure 1. The schematic diagram of the CPS architecture subjected to attacks.
Processes 12 01383 g001
Figure 2. Input disturbance signals.
Figure 2. Input disturbance signals.
Processes 12 01383 g002
Figure 3. State x 1 ( t ) and its estimate: augmented sliding-mode technique.
Figure 3. State x 1 ( t ) and its estimate: augmented sliding-mode technique.
Processes 12 01383 g003
Figure 4. State x 2 ( t ) and its estimate: augmented sliding-mode technique.
Figure 4. State x 2 ( t ) and its estimate: augmented sliding-mode technique.
Processes 12 01383 g004
Figure 5. State x 3 ( t ) and its estimate: augmented sliding-mode technique.
Figure 5. State x 3 ( t ) and its estimate: augmented sliding-mode technique.
Processes 12 01383 g005
Figure 6. State x 4 ( t ) and its estimate: augmented sliding-mode technique.
Figure 6. State x 4 ( t ) and its estimate: augmented sliding-mode technique.
Processes 12 01383 g006
Figure 7. Actuator attack signal and its estimate: augmented sliding-mode technique.
Figure 7. Actuator attack signal and its estimate: augmented sliding-mode technique.
Processes 12 01383 g007
Figure 8. The first sensor attack signal and its estimate: augmented sliding-mode technique.
Figure 8. The first sensor attack signal and its estimate: augmented sliding-mode technique.
Processes 12 01383 g008
Figure 9. The second sensor attack signal and its estimate: augmented sliding-mode technique.
Figure 9. The second sensor attack signal and its estimate: augmented sliding-mode technique.
Processes 12 01383 g009
Figure 10. State x 1 ( t ) and its estimate: augmented adaptive technique.
Figure 10. State x 1 ( t ) and its estimate: augmented adaptive technique.
Processes 12 01383 g010
Figure 11. State x 2 ( t ) and its estimate: augmented adaptive technique.
Figure 11. State x 2 ( t ) and its estimate: augmented adaptive technique.
Processes 12 01383 g011
Figure 12. State x 3 ( t ) and its estimate: augmented adaptive technique.
Figure 12. State x 3 ( t ) and its estimate: augmented adaptive technique.
Processes 12 01383 g012
Figure 13. State x 4 ( t ) and its estimate: augmented adaptive technique.
Figure 13. State x 4 ( t ) and its estimate: augmented adaptive technique.
Processes 12 01383 g013
Figure 14. Actuator attack signal and its estimate: augmented adaptive technique.
Figure 14. Actuator attack signal and its estimate: augmented adaptive technique.
Processes 12 01383 g014
Figure 15. The first sensor attack signal and its estimate: augmented adaptive technique.
Figure 15. The first sensor attack signal and its estimate: augmented adaptive technique.
Processes 12 01383 g015
Figure 16. The second sensor attack signal and its estimate: augmented adaptive technique.
Figure 16. The second sensor attack signal and its estimate: augmented adaptive technique.
Processes 12 01383 g016
Figure 17. Actuator attack signal and its estimate: augmented UIO.
Figure 17. Actuator attack signal and its estimate: augmented UIO.
Processes 12 01383 g017
Figure 18. The first sensor attack signal and its estimate: augmented UIO.
Figure 18. The first sensor attack signal and its estimate: augmented UIO.
Processes 12 01383 g018
Figure 19. The second sensor attack signal and its estimate: augmented UIO.
Figure 19. The second sensor attack signal and its estimate: augmented UIO.
Processes 12 01383 g019
Table 1. Comparison among three attack estimation methods.
Table 1. Comparison among three attack estimation methods.
Attack SignalProposed Sliding-Mode TechniqueProposed Adaptive TechniqueExisting Augmented UIO Technique [36]
First sensor attack signal (a combination of measurement effectives loss and square waveform signals)Tracks wellTracks wellTracks well
Second sensor attack signal (a combination of step, slope, and parabola signals)Tracks wellTracks wellTracks well with quick response speed
Actuator signal (a combination of low-frequency and high-frequency periodic signals)Tracks low-frequency and high-frequency signals excellently, and the tracking performance is best among the three methodsTracks low-frequency signal well and traces high-frequency signal acceptably but with significant dynamic response time. There are evident variations at starting points when following the signal and its subsequent waveform changeTracks low-frequency signal well, but the estimation performance reduces as the frequency increases. There are some spikes at the time instants when other signals change abruptly
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, H.; Gao, Z.-W.; Liu, Y. Monitoring and Reconstruction of Actuator and Sensor Attacks for Lipschitz Nonlinear Dynamic Systems Using Two Types of Augmented Descriptor Observers. Processes 2024, 12, 1383. https://doi.org/10.3390/pr12071383

AMA Style

Wang H, Gao Z-W, Liu Y. Monitoring and Reconstruction of Actuator and Sensor Attacks for Lipschitz Nonlinear Dynamic Systems Using Two Types of Augmented Descriptor Observers. Processes. 2024; 12(7):1383. https://doi.org/10.3390/pr12071383

Chicago/Turabian Style

Wang, Hao, Zhi-Wei Gao, and Yuanhong Liu. 2024. "Monitoring and Reconstruction of Actuator and Sensor Attacks for Lipschitz Nonlinear Dynamic Systems Using Two Types of Augmented Descriptor Observers" Processes 12, no. 7: 1383. https://doi.org/10.3390/pr12071383

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop