Next Article in Journal
Anomalous Thermally Induced Deformation in Kelvin–Voigt Plate with Ultrafast Double-Strip Surface Heating
Next Article in Special Issue
Alternate Admissibility LMI Criteria for Descriptor Fractional Order Systems with 0 < α < 2
Previous Article in Journal
An Improved Marine Predators Algorithm-Tuned Fractional-Order PID Controller for Automatic Voltage Regulator System
Previous Article in Special Issue
Depth Image Enhancement Algorithm Based on Fractional Differentiation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

A Finite-Dimensional Control Scheme for Fractional-Order Systems under Denial-of-Service Attacks

1
School of Information and Electrical Engineering, Hunan University of Science and Technology, Xiangtan 411201, China
2
School of Automation, Guangdong Polytechnic Normal University, Guangzhou 510450, China
3
Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
These authors are co-first authors.
Fractal Fract. 2023, 7(7), 562; https://doi.org/10.3390/fractalfract7070562
Submission received: 1 July 2023 / Revised: 17 July 2023 / Accepted: 18 July 2023 / Published: 21 July 2023

Abstract

:
In this article, the security control problem of discrete-time fractional-order networked systems under denial-of-service (DoS) attacks is considered. A practically applicable finite-dimensional control strategy will be developed for fractional-order systems that possess nonlocal characteristics. By employing the Lyapunov method, it is theoretically proved that under the proposed controller, the obtained closed-loop fractional system is globally input-to-state stable (ISS), even in the presence of DoS attacks. Finally, the effectiveness of the designed control method is demonstrated by the numerical example.

1. Introduction

The utilization of fractional-order calculus, due to its distinctive nonlocal features, is highly advantageous in precisely representing the dynamic characteristics of a multitude of real-world phenomena or systems that have infinite memory; see, for instance, [1,2,3].
The research and development of fractional-order systems and their associated controls have recently been garnering increased interest [4,5,6]. It has been proposed that fractional-order differential equations can more accurately capture the rheological constitutive equation (RCE) for the viscoelasticity of polymer materials, as evidenced in [1,5]. In [7], a full-cell model of fractional order with a distinct physical interpretation was developed. Two studies [8,9], utilize fractional-order methods to simulate lithium-ion batteries. Several recent works regarding the application of fractional systems can be found in, for example, [10,11,12,13]. For the continuous-time case, the concept of a proportional integral derivative ( P I D ) controller of fractional order was initially presented in [14]. The linear fractional-order systems’ stability is discussed in [15]. Sampled-data control schemes for linear fractional-order systems that take the unique properties of fractional-order calculus into account are investigated in [16,17,18]. The fractional-order Lyapunov direct stability analysis method employed in [19] yields Mittag–Leffler stable conditions for nonlinear fractional-order systems. In [20,21,22,23], the development of adaptive backstepping-based controllers for fractional-order uncertain nonlinear systems subject to unknown disturbances is reported. An adaptive fractional controller is developed for high-order nonlinear integer uncertain systems in [24]. By truncating the fractional operator, which is infinite-dimensional, refs. [25,26,27,28] propose the finite-dimensional control approaches for fractional-order systems in the discrete-time domain based on the truncated approximated finite-dimensional systems. Further improvement was then made in [29,30,31], where the finite-dimensional approximation errors were considered in designing a controller by treating them as the additive uncertainty terms, thus ensuring practical asymptotic stability of the actual fractional-order systems.
Attacks on communication links in a networked control system can be divided into two categories: denial-of-service (DoS) attacks and deception attacks. An interruption of communication between networks leads to a DoS attack [32], whereas deception attacks usually involve altering the data that are sent [33]. This article focuses on DoS attacks. Nowadays, some controllers have been created to mitigate the impact of DoS attacks on integer-order systems [34,35,36,37,38]. In [37,38], event-triggered resilient cooperative control schemes are proposed for continuous-time multiagent systems under DoS attacks, such that the controlled multiagent systems can achieve secure consensus exponentially. As for discrete-time multiagent systems in the presence of aperiodic sampling and random DoS attacks, a distributed output-feedback control scheme is developed to reach output consensus by assuming that the sampling process is nonuniform and the consecutive attack duration is upper-bounded [36]. Despite this, there are a limited number of published security control studies for fractional-order systems in the literature. References [39,40] analyze the control problem for continuous-time fractional-order multiagent systems and complex networks that are vulnerable to DoS attacks, respectively. Reference [41] studies the control of discrete-time fractional-order multiagent systems under DoS attacks, disregarding the nonlocal characteristics of fractional-order calculus when designing the control scheme. As of yet, the topic of DoS attacks and their effects on discrete-time fractional-order networked systems has not been explored in depth, which provides the impetus for this work.
In spite of the aforementioned discussion, in this work, we analyze the discrete-time fractional-order systems in which the plant and controller are connected via the network, while the attacker attempts to disrupt the control system’s stability by hindering communication between the sensors and controller (measurement channel). The main contributions of this work are outlined in the following:
1.
The development of a safety control protocol for discrete-time fractional-order systems subject to external disturbance and DoS attacks is investigated in this article, with the unique properties of fractional-order calculus being taken into account.
2.
The controller proposed is finite-dimensional, which makes it possible to calculate the control input with only a limited number of prior system states, making it suitable for practical use.
3.
A sufficient condition is provided to guarantee the global stability of the closed-loop system, resulting in the system output eventually settling at an ultimate bound around the origin.
This article is organized as follows: Section 2 presents the problem statement. The controller design procedure is given in Section 3. In Section 4, the proposed control strategy will be examined by simulation example, and finally, Section 5 provides the conclusions of this work.

2. Problem Formulation

Consider a discrete-time linear fractional system described as follows:
{ 0 Δ k + 1 α z ( k + 1 ) = A z ( k ) + B u ( k ) + B ω ω ( k ) y ( k ) = C 2 z ( k ) , z ( 0 ) = z 0
where z ( k ) R n is the state vector at time step k N 0 , 0 Δ k + 1 α z ( k + 1 ) = 0 Δ k + 1 α 1 z 1 ( k + 1 ) , , 0 Δ k + 1 α n z n ( k + 1 ) T , u ( k ) R m is the control input, y ( k ) R p is the measurement output, ω ( k ) R r is the exogenous disturbance signal bounded as ω ( k ) q ω with q ω > 0 and A , B , B ω and C 2 are known real matrices with appropriate dimensions. In accordance with Remark 4 in [18], the state, control signal, and disturbance before the initial time are considered to be all equal to zero in this work, i.e., z ( q ) = 0 , u ( q ) = 0 and ω ( q ) = 0 , q < 0 .
Remark 1.
For discrete-time fractional systems, several existing works [25,26,27,28,29,30,31] focus on the control problem. Nevertheless, none of these present studies concern the influence of attacks when designing control schemes, which highlights the advantages of our work where a safety control strategy is proposed for discrete-time fractional systems.
According to [42], the Grünwald–Letnikov (GL) fractional-order difference of a discrete-variable bounded function f ( k ) : N 0 R is defined as
0 Δ k α f ( k ) = j = 0 k ( 1 ) j α j f ( k j ) , α R + , k N 0 ,
where
α j = 1 j = 0 α ( α 1 ) ( α j + 1 ) j ! j > 0 for all j N 0 .
Define c j ( α ) = ( 1 ) j α j , and due to the fact that | c j ( α ) | α j j ! , for any α R + , the sequence { c j ( α ) } j N 0 is absolutely summable.
For the i-th state ( i = 1 , 2 , , n ) , we have
0 Δ k + 1 α i z i ( k + 1 ) = j = 0 k + 1 c j ( α i ) z i ( k + 1 j ) ,
in which α i is the fractional-order corresponding to z i . Equation (4) can be rewritten as
z i ( k + 1 ) = 0 Δ k + 1 α i z i ( k + 1 ) j = 1 k + 1 c j ( α i ) z i ( k + 1 j ) ,
and hence, the evolution of z ( k + 1 ) can be expressed as
z ( k + 1 ) = A z ( k ) + B u ( k ) + B ω ω ( k ) j = 1 k + 1 F j ( α ) z ( k + 1 j )
where F j ( α ) = diag c j ( α 1 ) , c j ( α 2 ) , , c j ( α n ) R n . Alternatively, (6) can be presented as
z ( k + 1 ) = j = 0 k A j z ( k j ) + B u ( k ) + B ω ω ( k )
in which A 0 = A F 1 ( α ) and A j = F j + 1 ( α ) for j 1 . As a result, the linear discrete-time fractional-order system (1) can be described as
z ( k + 1 ) = j = 0 k A j z ( k j ) + B u ( k ) + B ω ω ( k ) y ( k ) = C 2 z ( k ) , z ( 0 ) = z 0 .
Notation.  I n indicates an identity matrix with a dimension equal to n. R + , R , N 0 , N , and Z , respectively, represent the set of non-negative reals, reals, non-negative integers, positive integers, and integer numbers. The identity function is denoted by I d , i.e., I d ( z ) = z . z _ = sup j Z z ( j ) and z _ [ j 1 , j 2 ] is defined as:
z _ [ j 1 , j 2 ] = max j 1 j j 2 z ( j ) , i f   j 1 j 2 0 , i f   j 1 > j 2 .
It can be seen from the expression of the GL fractional-order difference of function f ( k ) given in (2) that the cumulative term used to implement the fractional-order difference will increase as k increases. Different from the controller proposed in [43], which is a linear weighted combination of all the past states of the observer, which will consequently result in the computational explosion as time goes by, a finite-dimensional controller that contains finite steps of recent states is considered in this work.
Reformulate (8) as
z ^ ( k + 1 ) = A ^ L z ^ ( k ) + B ^ u ( k ) + B ^ ω ω ^ ( k ) y ( k ) = C ^ 2 z ^ ( k ) ,
where L N 0 , z ^ ( k ) = z T ( k ) , z T ( k 1 ) , , z T ( k L ) T R ( L + 1 ) n is the recent-finite-steps state vector, ω ^ ( k ) = ω T ( k ) , z T ( k L 1 ) , , z T ( 0 ) T R r + ( k L ) n , and A ^ L , B ^ , B ^ ω and C ^ 2 are defined as
A ^ L = A 0 A 1 A L 1 A L I n 0 0 0 0 0 I n 0 , B ^ = B 0 0 , B ^ ω = B ω A L + 1 A k 1 A k 0 0 0 0 0 0 0 0 , C ^ 2 T = C 2 0 0 .
Assumption 1.
The pair ( A ^ L , B ^ ) is stabilizable.
Assumption 2.
No DoS attacks occur at initial time k = 0 .
Remark 2.
Assumption 1 is needed for the existence of the positive matrices P and Q that will be applied during the controller design in Section 3. As will be mentioned in Section 3, under the influence of DoS attacks, in this paper, the latest received state will be utilized for control until receiving the next successfully transmitted state, and thus, Assumption 2 is required for avoiding the whole control system becoming open-loop at the beginning of the control stage.
The openness of network communication in networked control makes it susceptible to cyberattacks. This study investigates the effects of aperiodic DoS attacks on the measurement channel. A graphical illustration of the total networked fractional-order system under our proposed control law is depicted in Figure 1.
Suppose that a DoS attack occurs in the measurement channel at the instant a i [ k L , k ) , where i denotes the i-th attack event. The control objective of this work is to design a finite-dimensional controller that the corresponding closed-loop fractional-order system (1) is globally input-to-state stable (ISS) under DoS attacks, i.e., for arbitrary initial condition z 0 R n , the closed-loop state satisfies
z ( k ) β a ( z 0 , k ) + γ a ( q ω ) , k N 0 ,
where function β a is a KL -function and γ a is a K -function. Detailed definitions of the KL -function, K -function, and K -function [44] are given below.
A continuous function γ : R + R + is a K -function if it is strictly increasing and γ ( 0 ) = 0 . A continuous function β : R + × R + R + is a KL -function if for each fixed t 0 , function β ( · , t ) is a K -function, and for each fixed s 0 , function β ( s , · ) is decreasing and β ( s , t ) 0 as t .

3. Controller Design

Define the difference vector as
e ^ ( k ) = z ^ ( k ) a z ^ ( k )
where z ^ ( k ) a stands for the recent-finite-steps state vector under DoS attacks that is utilized for controller design. In this work, if a DoS attack occurs at the current time instant, or in other words, no information is available for the controller currently, then the latest received state will be used for controlling until the next successful state information transmission. The controller is designed as
u ( k ) = K L z ^ ( k ) a
with control matrix K L R m × ( L + 1 ) n .
Theorem 1.
Consider the closed-loop discrete-time fractional-order system consisting of the system (1) and controller (12). Under Assumptions 1 and 2, for L N 0 that satisfies 0 < h Ψ max i ϕ α i ( L ) k < 1 ( i = 1 , , n ) , where h Ψ and ϕ α i ( L ) k will be defined later, then the obtained closed-loop fractional system under DoS attacks is ensured to be globally ISS, with (10) being satisfied.
Proof. 
With the controller designed in (12), the evolution of the recent-finite-steps state in the closed-loop system can be expressed as
z ^ ( k + 1 ) = A ^ L z ^ ( k ) + B ^ K L z ^ ( k ) a + B ^ ω ω ^ ( k ) a = A ^ L z ^ ( k ) + B ^ K L z ^ ( k ) + B ^ K L e ^ ( k ) + ω ¯ ( k ) a = Φ z ^ ( k ) + B ^ K L e ^ ( k ) + ω ¯ ( k ) a
where ω ^ ( k ) a is the ω ^ ( k ) under DoS attacks, ω ¯ ( k ) a = B ^ ω ω ^ ( k ) a and Φ = A ^ L + B ^ K L . According to Assumption 1, for any positive definite matrix Q, Φ T P Φ P + Q = 0 holds for a positive definite matrix P.
Let the Lyapunov function be W ( k ) = z ^ T ( k ) P z ^ ( k ) , then
W ( k + 1 ) = z ^ T ( k + 1 ) P z ^ ( k + 1 ) = z ^ T ( k ) ( P Q ) z ^ ( k ) + 2 z ^ T ( k ) Φ T P B ^ K L e ^ ( k ) + 2 z ^ T ( k ) Φ T P ω ¯ ( k ) a + e ^ T ( k ) K L T B ^ T P B ^ K L e ^ ( k ) + 2 e ^ T ( k ) K L T B ^ T P ω ¯ ( k ) a + ω ¯ ( k ) a T P ω ¯ ( k ) a = W ( k ) z ^ T ( k ) Q z ^ ( k ) + 2 z ^ T ( k ) Φ T P B ^ k L e ^ ( k ) + 2 z ^ T ( k ) Φ T P ω ¯ ( k ) a + e ^ T ( k ) K L T B ^ T P B ^ K L e ^ ( k ) + 2 e ^ T ( k ) K L T B ^ T P ω ¯ ( k ) a + ω ¯ ( k ) a T P ω ¯ ( k ) a .
From (14), we obtain
W ( k + 1 ) W ( k ) λ min ( Q ) z ^ ( k ) 2 + 2 Φ T P B ^ K L z ^ ( k ) e ^ ( k ) + 2 Φ T P z ^ ( k ) ω ¯ ( k ) a + [ K L T B ^ T P B ^ K L ] e ^ ( k ) 2 + 2 P B ^ K L e ^ ( k ) ω ¯ ( k ) a + P ω ¯ ( k ) a 2 .
The following inequality should be guaranteed to ensure closed-loop system stability:
e ^ ( k ) σ z ^ ( k ) + σ ω ¯ ( k ) a ,
where σ R + is a suitable designed parameter. Substituting (16) into (15), we have
W ( k + 1 ) W ( k ) λ min ( Q ) z ^ ( k ) 2 + 2 Φ T P B ^ K L σ z ^ ( k ) 2 + 2 Φ T P B ^ K L σ z ^ ( k ) ω ¯ ( k ) a + 2 Φ T P z ^ ( k ) ω ¯ ( k ) a + [ K L T B ^ T P B ^ K L ] σ 2 [ z ^ ( k ) 2 + ω ¯ ( k ) a 2 + 2 z ^ ( k ) ω ¯ ( k ) a ] + 2 P B ^ K L σ z ^ ( k ) ω ¯ ( k ) a + 2 P B ^ K L σ ω ¯ ( k ) a 2 + P ω ¯ ( k ) a 2 .
Let ζ 1 = λ min ( Q ) , ζ 2 = 2 Φ T P B ^ K L , ζ 3 = 2 Φ T P , ζ 4 = λ max ( K L T B ^ T P B ^ K L ) , ζ 5 = 2 P B ^ K L , η 2 = λ max ( P ) , then
W ( k + 1 ) W ( k ) ζ 1 z ^ ( k ) 2 + ζ 2 σ z ^ ( k ) 2 + ζ 2 σ z ^ ( k ) ω ¯ ( k ) a + ζ 3 z ^ ( k ) ω ¯ ( k ) a + ζ 4 σ 2 z ^ ( k ) 2 + ζ 4 σ 2 ω ¯ ( k ) a 2 + ζ 5 σ z ^ ( k ) ω ¯ ( k ) a + ζ 5 σ ω ¯ ( k ) a 2 + η 2 ω ¯ ( k ) a 2 + 2 ζ 4 σ 2 z ^ ( k ) ω ¯ ( k ) a = ( ζ 1 ζ 2 σ ζ 4 σ 2 ) z ^ ( k ) 2 + ( ζ 2 σ + ζ 3 + ζ 5 σ + 2 ζ 4 σ 2 ) z ^ ( k ) ω ¯ ( k ) a + ( ζ 4 σ 2 + ζ 5 σ + η 2 ) ω ¯ ( k ) a 2 .
Choosing σ that satisfies ζ 1 ζ 2 σ ζ 4 σ 2 > 0 and letting ζ 6 = ζ 1 ζ 2 σ ζ 4 σ 2 , ζ 7 = ζ 2 σ + ζ 3 + ζ 5 σ + 2 ζ 4 σ 2 , ζ 8 = ζ 4 σ 2 + ζ 5 σ + η 2 , ζ 9 = ζ 7 2 2 ζ 6 + ζ 8 , then
W ( k + 1 ) W ( k ) ζ 6 z ^ ( k ) 2 + ζ 7 z ^ ( k ) ω ¯ ( k ) a + ζ 8 ω ¯ ( k ) a 2 .
Since for any positive real scalar δ , the following inequality holds:
z ^ ( k ) ω ¯ ( k ) a z ^ ( k ) 2 2 δ + δ ω ¯ ( k ) a 2 2 ,
Thus, (19) becomes
W ( k + 1 ) W ( k ) ζ 6 z ^ ( k ) 2 + ζ 7 2 δ z ^ ( k ) 2 + ζ 7 δ 2 ω ¯ ( k ) a 2 + ζ 8 ω ¯ ( k ) a 2 .
Let δ = ζ 7 ζ 6 , then we obtain
W ( k + 1 ) W ( k ) ζ 6 z ^ ( k ) 2 + ζ 6 2 z ^ ( k ) 2 + ζ 7 2 2 ζ 6 ω ¯ ( k ) a 2 + ζ 8 ω ¯ ( k ) a 2 = ζ 6 2 z ^ ( k ) 2 + ζ 9 ω ¯ ( k ) a 2 .
Define μ 1 ( z ^ ( k ) ) = λ min ( P ) z ^ ( k ) 2 , μ 2 ( z ^ ( k ) ) = λ max ( P ) z ^ ( k ) 2 , μ 3 ( z ^ ( k ) ) = ζ 6 2 z ^ ( k ) 2 , μ 4 ( W ( k ) ) = μ 3 μ 2 1 ( W ( k ) ) = ζ 6 2 η 2 W ( k ) , μ 5 ( ω ¯ ( k ) a ) = ζ 9 ω ¯ ( k ) a 2 ; therefore we obtain
μ 1 ( z ^ ( k ) ) W ( k ) μ 2 ( z ^ ( k ) ) ,
and
W ( k + 1 ) W ( k ) μ 3 ( z ^ ( k ) ) + μ 5 ( ω ¯ ( k ) a ) μ 4 ( W ( k ) ) + μ 5 ( ω ¯ ( k ) a ) .
Given that μ 1 , μ 2 , μ 3 , μ 5 K , it is evident that the function W ( k ) is an ISS–Lyapunov function, implying the existence of a KL -function β a : R + × R + R + and a K -function γ a : R + × R + such that
z ^ ( k 0 + k ) β a ( z ^ ( k 0 ) , k ) + γ a ( ω ¯ a _ [ k 0 , k 0 + k 1 ] ) ,
where k 0 , k 0 . Let μ ^ 4 ( ω ¯ a ) be any K -lower bound of μ 4 K such that I d μ ^ 4 K . Hence, we can have μ ^ 4 ( ω ¯ a ) = h ^ 4 ω ¯ a , where h ^ 4 = min ( ζ 6 2 η 2 , θ ^ a ) with θ ^ a ( 0 , 1 ) . Let ρ 1 ( ω ¯ a ) = h ρ ω ¯ a with h ρ ( 0 , 1 ) , then according to [44], (25) holds with γ a = μ 1 1 γ ^ a where γ ^ a ( ω ¯ a ) = ζ 9 h ^ 4 h ρ ω ¯ a 2 and β a ( s , t ) = μ 1 1 ( β ^ a ( μ 2 ( s ) ) , t ) for a KL -function β ^ a : R + × R + R + ; therefore, (25) can be written as
z ^ ( k 0 + k ) β a ( z ^ ( k 0 ) , k ) + ζ 9 h ^ 4 h ρ λ min ( P ) ω ¯ a _ [ k 0 , k 0 + k 1 ] = β a ( z ^ ( k 0 ) , k ) + h Ψ ω ¯ a _ [ k 0 , k 0 + k 1 ]
with h Ψ = ζ 9 h ^ 4 h ρ λ min ( P ) .
Since F j + 1 ( α ) = diag c j + 1 ( α 1 ) , c j + 1 ( α 2 ) , , c j + 1 ( α n ) , its maximum norm can be obtained as
F j + 1 ( α ) = max i | c j + 1 ( α i ) | max i α i j + 1 ( j + 1 ) ! .
For simplicity, the maximum norm of matrix F will be expressed as F . Thus, the following inequality can be derived as
ω ¯ ( k ) a B ω q ω + j = L + 1 k A j z ( k j ) a B ω q ω + j = L + 1 k A j z _ = B ω q ω + j = L + 1 k F j + 1 ( α ) z _ B ω q ω + j = L + 1 k max i α i j + 1 ( j + 1 ) ! z _ = B ω q ω + max i ϕ α i ( L ) k z _
where ϕ α i ( L ) k = j = L + 1 k α i j + 1 ( j + 1 ) ! . Combining (26) with (28) results in
z ^ _ β a ( z ^ ( 0 ) , 0 ) + h Ψ B ω q ω + h Ψ max i ϕ α i ( L ) k z _ .
Due to the fact that z _ z ^ _ , from (29), we obtain
z ^ _ β a ( z ^ ( 0 ) , 0 ) + h Ψ B ω q ω + h Ψ max i ϕ α i ( L ) k z ^ _ .
Consider L N 0 that satisfies 0 < h Ψ max i ϕ α i ( L ) k < 1 and define d z = 1 h Ψ max i ϕ α i ( L ) k 1 β a ( z ^ ( 0 ) , 0 ) + h Ψ B ω q ω ; it then further implies z ^ _ d z . Hence, (28) becomes
ω ¯ ( k ) a B ω q ω + max i ϕ α i ( L ) k d z .
Furthermore, (26) turns into
z ^ ( k ) β a ( z ^ ( 0 ) , k ) + h Ψ [ B ω q ω + max i ϕ α i ( L ) k d z ] = β a ( z ^ ( 0 ) , k ) + p z
where p z = h Ψ B ω q ω + max i ϕ α i ( L ) k d z and β a : R + × R + R + is a KL -function.
For any scalar M N , the boundedness inequality of ω ¯ a can be written as
ω ¯ ( k ) a B ω q ω + j = L + 1 L + 1 + M A j z ( k j ) a + j = L + 2 + M k A j z ( k j ) a B ω q ω + j = L + 1 L + 1 + M A j z _ [ k L 1 M , k L 1 ] + j = L + 2 + M k A j z _ [ 0 , k L 2 M ] B ω q ω + j = L + 1 L + 1 + M A j z _ [ k L 1 M , k L ] + max i ϕ α i ( L + 1 + M ) k d z B ω q ω + j = L + 1 L + 1 + M max i α i j + 1 ( j + 1 ) ! z _ [ k L 1 M , k L ] + max i ϕ α i ( L + 1 + M ) k d z B ω q ω + max i ψ L α i ( M ) z _ [ k L 1 M , k L ] + max i ϕ α i ( L + 1 + M ) k d z
where ψ L α i ( M ) = j = L + 1 L + 1 + M α i j + 1 ( j + 1 ) ! . Consider for constant p l 0 and function β a l : R + × R + R + , l N 0 such that for any r , s R + , β a l ( r , s ) is bounded and β a l ( r , s ) 0 as s , the following inequality holds:
z ^ ( k ) β a l ( z ^ ( 0 ) , k ) + p l .
Step 1 ( l = 0 ): Let β a 0 ( r , s ) = β a ( r , s ) and p 0 = p z , from (32) we then obtain
z ^ ( k ) β a 0 ( z ^ ( 0 ) , k ) + p 0 .
Step 2 ( l > 0 ): For a v l R that satisfies v l 0 , min { 1 , κ χ χ p l } , where κ ( χ , 1 ) and χ = h Ψ max i ϕ α i ( L ) k , it then indicates χ ( p l + v l ) κ p l . Choosing v l + 1 ( 0 , κ v l ) , there then exists a k l = k l ( v l + 1 ) that for k k l , z _ [ k L , k ] z ^ ( k ) p l + v l + 1 2 . This further implies that for any M l N , there exists a k k ¯ l = k l + M l + 2 such that z _ [ k L 1 M l , k L ] p l + v l + 1 2 holds. After combining with (33), we obtain
ω ¯ ( k ) a B ω q ω + max i ψ L α i ( M l ) ( p l + v l + 1 2 ) + max i ϕ α i ( L + 1 + M l ) k d z , for k k ¯ l .
By selecting M l that satisfies h Ψ max i ϕ α i ( L + 1 + M l ) k d z χ v l + 1 2 , from (26), we obtain
z ^ ( k ¯ l + k ) β a ( z ^ ( k ¯ l ) , k ) + h Ψ [ max i ψ L α i ( M l ) ( p l + v l + 1 2 ) + B ω q ω + max i ϕ α i ( L + 1 + M l ) k d z ] .
Since for L , M l N 0 , ψ L α i ( M l ) ϕ α i ( L ) k ; hence,
z ^ ( k ¯ l + k ) β a ( z ^ ( k ¯ l ) , k ) + h Ψ B ω q ω + h Ψ max i ϕ α i ( L ) k ( p l + v l + 1 2 ) + χ v l + 1 2 β a ( z ^ ( k ¯ l ) , k ) + h Ψ B ω q ω + χ ( p l + v l + 1 2 ) + χ v l + 1 2 β a ( z ^ ( k ¯ l ) , k ) + h Ψ B ω q ω + χ ( p l + v l ) β a ( z ^ ( k ¯ l ) , k ) + h Ψ B ω q ω + κ p l .
Thus, combining with (34) gives
z ^ ( k ) β a ( l + 1 ) ( z ^ ( 0 ) , k ) + κ p l + h Ψ B ω q ω
where
β a ( l + 1 ) ( r , k ) = β a l ( r , k ) + ( 1 κ ) p l h Ψ B ω q ω , k [ 0 , k ¯ l 1 ] min { β a l ( r , k ) + ( 1 κ ) p l h Ψ B ω q ω , β a ( z ^ ( k ¯ l ) , k k ¯ l ) } , k [ k ¯ l , + )
which recursively satisfies that β a ( l + 1 ) ( r , k ) 0 as k , and it can be noticed from (34) that the state will finally converge to p l . Also, (39) can be written as z ^ ( k ) β a ( l + 1 ) ( z ^ ( 0 ) , k ) + p l + 1 , where
p l + 1 = κ p l + h Ψ B ω q ω = κ κ p l 1 + h Ψ B ω q ω + h Ψ B ω q ω = κ κ ( κ p l 2 + h Ψ B ω q ω ) + h Ψ B ω q ω + h Ψ B ω q ω = = κ l + 1 p 0 + h Ψ B ω q ω ( j = 0 l κ j ) .
As a result, (34) indicates
z ^ ( k ) β a ( z ^ ( 0 ) , k ) + p
where β a ( z ^ ( 0 ) , k ) 0 as k and
p = lim l p l = h Ψ B ω q ω κ 1 κ .
In light of Assumption 2, z ^ ( 0 ) = z ( 0 ) and z ( k ) z ^ ( k ) ; thus,
z ( k ) β a ( z ( 0 ) , k ) + h Ψ B ω q ω κ 1 κ = β a ( z ( 0 ) , k ) + γ a ( q ω )
where γ a ( r ) = c γ a r with c γ a = h Ψ B ω κ 1 κ . Therefore, under DoS attacks, the closed-loop fractional-order system (1) with controller (12) is globally ISS, and the control objective is achieved.
Remark 3.
Although there has been considerable research into secure control for integer-order systems [32,35,37,38], comparatively little attention has been given to systems in fractional-order systems, and even less to those in the discrete-time domain. This research is the first to address the security control of discrete-time fractional-order systems under DoS attacks while taking into account the memory and heredity effects of fractional calculus.
Remark 4.
References [39,40] respectively investigate the control problem for fractional-order multi-agent systems and complex networks which are vulnerable to DoS attacks in the continuous-time domain. The control issue of discrete-time fractional-order multi-agent systems under DoS attacks is studied in [41], yet the non-local characteristics of fractional-order calculus are ignored when designing the control scheme. Different from such mentioned works, the control for discrete-time fractional systems under the effect of DoS attacks that rigorously consider the unique hereditary and infinite memory properties of fractional calculus is addressed in this work for the first time.

4. Numerical Example

Consider the fractional-order discrete-time system shown in (1) with
A = 1 1 1 1 , B = 1 1 , B ω = 0 0 0 1 , C 2 = 1 1 ,
0 Δ k + 1 α z ( k + 1 ) = 0 Δ k + 1 0.1 z 1 ( k + 1 ) , 0 Δ k + 1 0.4 z n ( k + 1 ) T ( k N 0 ) , z 0 = [ 0.1 , 0.5 ] T , and the external disturbance ω ( k ) is an uniformly distributed random signal with q ω = 0.02 . The numerical example and its visualized results are both implemented in MATLAB. Details of technical implementation can refer to [16,17,18,45].
The results of the open-loop fractional-order system without control input, depicted in Figure 2, demonstrate its instability, as evidenced by the outputs z 1 and z 2 . By choosing L = 1 , σ = 0.1 , and K L = [ 1 , 0.01 , 0.01 , 0.05 ] T , we can notice that even under the influence of DoS attacks, the closed-loop system is ISS under our proposed controller, as presented in Figure 3 and Figure 4. Furthermore, it is presented in Figure 3 that under the proposed control input, both system outputs can be driven to zero instead of just being bounded, as illustrated in the proof of Theorem 1, which further indicates an interesting future work to explore the design of security control law for fractional-order systems to achieve asymptotic stability. Moreover, as displayed in Figure 5 and Figure 6 where K L = [ 1 , 0.01 ] T and L = 0 , it is worth noting that with a proper selection of design parameters, the global stability of the closed-loop system in the presence of DoS attacks can be ensured under our proposed controller, even if only the current state is considered in designing the control strategy. Consequently, the effectiveness of the investigated control strategy is verified by the simulation results.

5. Conclusions

The security control issue for discrete-time fractional-order linear systems under DoS attacks is addressed in this work. A finite-dimensional controller, which requires merely the information of a finite number of the previous state, and hence is practically useful, is proposed in this article. Our proposed control law is verified by numerical simulation, ensuring the global input-to-state stability of the associated closed-loop system. In practice, it is possible that the system matrices could not be known precisely, which consequently implies an interesting future topic for considering the study of adaptive finite-dimensional control for fractional systems under attack by introducing adaptive techniques in our work to estimate system uncertainties.

Author Contributions

Conceptualization, X.L.; Methodology, X.L.; Validation, X.L.; Formal analysis, X.L.; Investigation, X.L.; Writing—original draft, X.L.; Writing—review & editing, Y.Z., X.L. and C.D.; Visualization, Y.Z. and X.L.; Supervision, C.D.; Funding acquisition, Y.Z. and X.W. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the National Natural Science Foundation of China (62203164, 62203165), and the Scientific Research Fund of Hunan Provincial Education Department (Outstanding Young Project) (21B0499).

Data Availability Statement

The data presented in this study may be available on request from the corresponding author.

Conflicts of Interest

The authors declare no potential conflicts of interest with respect to the research, authorship, finance, and/or publication of this article.

References

  1. Koeller, R. Applications of fractional calculus to the theory of viscoelasticity. J. Appl. Mech. 1984, 51, 299–307. [Google Scholar] [CrossRef]
  2. Friedrich, C. Relaxation and retardation functions of the Maxwell model with fractional derivatives. Rheol. Acta 1991, 30, 151–158. [Google Scholar] [CrossRef]
  3. Cao, H.; Deng, Z.; Li, X.; Yang, J.; Qin, Y. Dynamic modeling of electrical characteristics of solid oxide fuel cells using fractional derivatives. Int. J. Hydrogen Energy 2010, 35, 1749–1758. [Google Scholar] [CrossRef]
  4. Hammouch, Z.; Mekkaoui, T. Circuit design and simulation for the fractional-order chaotic behavior in a new dynamical system. Complex Intell. Syst. 2018, 4, 251–260. [Google Scholar] [CrossRef]
  5. Butzer, P.L.; Westphal, U.; Hilfer, R.; West, B.J.; Grigolini, P.; Zaslavsky, G.M.; Douglas, J.F.; Schiessel, H.; Friedrich, C.; Blumen, A.; et al. Applications of Fractional Calculus in Physics; World Scientific: Singapore, 2000; Volume 35. [Google Scholar]
  6. Liu, L.; Xue, D.; Zhang, S. General type industrial temperature system control based on fuzzy fractional-order PID controller. Complex Intell. Syst. 2021, 9, 2585–2597. [Google Scholar] [CrossRef]
  7. Guo, D.; Yang, G.; Feng, X.; Han, X.; Lu, L.; Ouyang, M. Physics-based fractional-order model with simplified solid phase diffusion of lithium-ion battery. J. Energy Storage 2020, 30, 101404. [Google Scholar] [CrossRef]
  8. Wang, Y.; Li, M.; Chen, Z. Experimental study of fractional-order models for lithium-ion battery and ultra-capacitor: Modeling, system identification, and validation. Appl. Energy 2020, 278, 115736. [Google Scholar] [CrossRef]
  9. Zou, C.; Zhang, L.; Hu, X.; Wang, Z.; Wik, T.; Pecht, M. A review of fractional-order techniques applied to lithium-ion batteries, lead-acid batteries, and supercapacitors. J. Power Sources 2018, 390, 286–296. [Google Scholar] [CrossRef] [Green Version]
  10. Hakkar, N.; Dhayal, R.; Debbouche, A.; Torres, D.F. Approximate controllability of delayed fractional stochastic differential systems with mixed noise and impulsive effects. Fractal Fract. 2023, 7, 104. [Google Scholar] [CrossRef]
  11. Johnson, M.; Vijayakumar, V. An analysis on the optimal control for fractional stochastic delay integrodifferential systems of order 1 < γ < 2. Fractal Fract. 2023, 7, 284. [Google Scholar] [CrossRef]
  12. Kavitha, K.; Vijayakumar, V. An analysis regarding to approximate controllability for Hilfer fractional neutral evolution hemivariational inequality. Qual. Theory Dyn. Syst. 2022, 21, 80. [Google Scholar] [CrossRef]
  13. Guechi, S.; Dhayal, R.; Debbouche, A.; Malik, M. Analysis and optimal control of φ-Hilfer fractional semilinear equations involving nonlocal impulsive conditions. Symmetry 2021, 13, 2084. [Google Scholar] [CrossRef]
  14. Podlubny, I. Fractional-order systems and PIλDμ-controllers. IEEE Trans. Autom. Control 1999, 44, 208–214. [Google Scholar] [CrossRef]
  15. Chen, Y.; Petráš, I.; Xue, D. Fractional order control—A tutorial. In Proceedings of the 2009 American Control Conference, St. Louis, MO, USA, 10–12 June 2009; pp. 1397–1411. [Google Scholar] [CrossRef]
  16. Li, X.; Wen, C.; Liu, X.K. Sampled-data control based consensus of fractional-order multi-agent systems. IEEE Control Syst. Lett. 2021, 5, 133–138. [Google Scholar] [CrossRef]
  17. Li, X.; Wen, C.; Liu, X.K. Finite-dimensional sampled-data control of fractional-order systems. IEEE Control Syst. Lett. 2022, 6, 181–186. [Google Scholar] [CrossRef]
  18. Li, X.; Wen, C.; Li, X.; Deng, C. Stabilization for a general class of fractional-order systems: A sampled-data control method. IEEE Trans. Circuits Syst. I Regul. Pap. 2022, 69, 4643–4653. [Google Scholar] [CrossRef]
  19. Li, Y.; Chen, Y.; Podlubny, I. Mittag–Leffler stability of fractional order nonlinear dynamic systems. Automatica 2009, 45, 1965–1969. [Google Scholar] [CrossRef]
  20. Liu, H.; Pan, Y.; Li, S.; Chen, Y. Adaptive fuzzy backstepping control of fractional-order nonlinear systems. IEEE Trans. Syst. Man Cybern. Syst. 2017, 47, 2209–2217. [Google Scholar] [CrossRef]
  21. Li, X.; Wen, C.; Zou, Y. Adaptive backstepping control for fractional-order nonlinear systems with external disturbance and uncertain parameters using smooth control. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 7860–7869. [Google Scholar] [CrossRef]
  22. Li, X.; He, J.; Wen, C.; Liu, X.K. Backstepping-based adaptive control of a class of uncertain incommensurate fractional-order nonlinear systems With external disturbance. IEEE Trans. Ind. Electron. 2022, 69, 4087–4095. [Google Scholar] [CrossRef]
  23. Li, X.; Li, X.; Xing, L. Backstepping-based adaptive control for uncertain fractional-order nonlinear systems. In Proceedings of the 2021 IEEE 16th Conference on Industrial Electronics and Applications (ICIEA), Chengdu, China, 1–4 August 2021; pp. 12–17. [Google Scholar] [CrossRef]
  24. Li, X.; Wen, C.; Li, X.; He, J. Adaptive fractional-order backstepping control for a general class of nonlinear uncertain integer-order systems. IEEE Trans. Ind. Electron. 2023, 70, 7246–7256. [Google Scholar] [CrossRef]
  25. Kaczorek, T. Practical stability of positive fractional discrete-time linear systems. Bull. Pol. Acad. Sci. Tech. Sci. 2008, 56, 313–317. [Google Scholar]
  26. BusłOwicz, M.; Kaczorek, T. Simple conditions for practical stability of positive fractional discrete-time linear systems. Int. J. Appl. Math. Comput. Sci. 2009, 19, 263–269. [Google Scholar] [CrossRef] [Green Version]
  27. Guermah, S.; Djennoune, S.; Bettayeb, M. A new approach for stability analysis of linear discrete-time fractional-order systems. In New Trends in Nanotechnology and Fractional Calculus Applications; Springer: Dordrecht, The Netherlands, 2010; pp. 151–162. [Google Scholar] [CrossRef]
  28. Guermah, S.; Djennoune, S.; Bettayeb, M. Discrete-time fractional-order systems: Modeling and stability issues. In Advances in Discrete Time Systems; InTech: London, UK, 2012; pp. 183–212. [Google Scholar] [CrossRef] [Green Version]
  29. Sopasakis, P.; Ntouskas, S.; Sarimveis, H. Robust model predictive control for discrete-time fractional-order systems. In Proceedings of the 2015 23rd Mediterranean Conference on Control and Automation (MED), Torremolinos, Spain, 16–19 June 2015; pp. 384–389. [Google Scholar] [CrossRef] [Green Version]
  30. Sopasakis, P.; Sarimveis, H. Stabilising model predictive control for discrete-time fractional-order systems. Automatica 2017, 75, 24–31. [Google Scholar] [CrossRef] [Green Version]
  31. Alessandretti, A.; Pequito, S.; Pappas, G.J.; Aguiar, A.P. Finite-dimensional control of linear discrete-time fractional-order systems. Automatica 2020, 115, 108512. [Google Scholar] [CrossRef] [Green Version]
  32. Deng, C.; Wen, C.; Zou, Y.; Wang, W.; Li, X. A hierarchical security control framework of nonlinear CPSs against DoS attacks with application to power sharing of AC microgrids. IEEE Trans. Cybern. 2022, 52, 5255–5266. [Google Scholar] [CrossRef]
  33. Cárdenas, A.A.; Amin, S.; Sastry, S. Research challenges for the security of control systems. In Proceedings of the 3rd Conference on Hot Topics in Security, San Jose, CA, USA, 29 July 2008; pp. 1–6. [Google Scholar]
  34. De Persis, C.; Tesi, P. Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 2015, 60, 2930–2944. [Google Scholar] [CrossRef]
  35. Zhao, L.; Yang, G.H. Adaptive fault-tolerant control for nonlinear multi-agent systems with DoS attacks. Inf. Sci. 2020, 526, 39–53. [Google Scholar] [CrossRef]
  36. Zhang, D.; Liu, L.; Feng, G. Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and DoS attack. IEEE Trans. Cybern. 2019, 49, 1501–1511. [Google Scholar] [CrossRef]
  37. Feng, Z.; Hu, G. Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans. Control Syst. Technol. 2020, 28, 741–752. [Google Scholar] [CrossRef]
  38. Chang, B.; Mu, X.; Yang, Z.; Fang, J. Event-based secure consensus of muti-agent systems under asynchronous DoS attacks. Appl. Math. Comput. 2021, 401, 126120. [Google Scholar] [CrossRef]
  39. Narayanan, G.; Ali, M.S.; Alsulami, H.; Stamov, G.; Stamova, I.; Ahmad, B. Impulsive security control for fractional-order delayed multi-agent systems with uncertain parameters and switching topology under DoS attack. Inf. Sci. 2022, 618, 169–190. [Google Scholar] [CrossRef]
  40. Bai, J.; Wu, H.; Cao, J. Secure synchronization and identification for fractional complex networks with multiple weight couplings under DoS attacks. Comput. Appl. Math. 2022, 41, 187. [Google Scholar] [CrossRef]
  41. Narayanan, G.; Ali, M.S.; Ahamad, S. Cyber secure consensus of discrete-time fractional-order multi-agent systems with distributed delayed control against attacks. In Proceedings of the 2021 IEEE International Conference on Systems, Man, and Cybernetics (SMC), Melbourne, Australia, 17–20 October 2021; pp. 2191–2196. [Google Scholar] [CrossRef]
  42. Ostalczyk, P. Discrete Fractional Calculus: Applications in Control and Image Processing; World Scientific: Hackensack, NJ, USA, 2016; Volume 4. [Google Scholar]
  43. Chatterjee, S.; Romero, O.; Pequito, S. A separation principle for discrete-time fractional-order dynamical systems and its implications to closed-loop neurotechnology. IEEE Control Syst. Lett. 2019, 3, 691–696. [Google Scholar] [CrossRef] [Green Version]
  44. Jiang, Z.P.; Wang, Y. Input-to-state stability for discrete-time nonlinear systems. Automatica 2001, 37, 857–869. [Google Scholar] [CrossRef]
  45. Mendes, E.M.; Salgado, G.H.; Aguirre, L.A. Numerical solution of Caputo fractional differential equations with infinity memory effect at initial condition. Commun. Nonlinear Sci. Numer. Simul. 2019, 69, 237–247. [Google Scholar] [CrossRef]
Figure 1. Framework of closed-loop fractional-order networked systems under DoS attacks.
Figure 1. Framework of closed-loop fractional-order networked systems under DoS attacks.
Fractalfract 07 00562 g001
Figure 2. System output z 1 and z 2 without control effort.
Figure 2. System output z 1 and z 2 without control effort.
Fractalfract 07 00562 g002
Figure 3. System output z 1 and z 2 with DoS attacks under the proposed control law where L = 1 .
Figure 3. System output z 1 and z 2 with DoS attacks under the proposed control law where L = 1 .
Fractalfract 07 00562 g003
Figure 4. Control input u with L = 1 .
Figure 4. Control input u with L = 1 .
Fractalfract 07 00562 g004
Figure 5. System output z 1 and z 2 with DoS attacks under the proposed control law where L = 0 .
Figure 5. System output z 1 and z 2 with DoS attacks under the proposed control law where L = 0 .
Fractalfract 07 00562 g005
Figure 6. Control input u with L = 0 .
Figure 6. Control input u with L = 0 .
Fractalfract 07 00562 g006
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zou, Y.; Li, X.; Deng, C.; Wu, X. A Finite-Dimensional Control Scheme for Fractional-Order Systems under Denial-of-Service Attacks. Fractal Fract. 2023, 7, 562. https://doi.org/10.3390/fractalfract7070562

AMA Style

Zou Y, Li X, Deng C, Wu X. A Finite-Dimensional Control Scheme for Fractional-Order Systems under Denial-of-Service Attacks. Fractal and Fractional. 2023; 7(7):562. https://doi.org/10.3390/fractalfract7070562

Chicago/Turabian Style

Zou, Ying, Xinyao Li, Chao Deng, and Xiaowen Wu. 2023. "A Finite-Dimensional Control Scheme for Fractional-Order Systems under Denial-of-Service Attacks" Fractal and Fractional 7, no. 7: 562. https://doi.org/10.3390/fractalfract7070562

APA Style

Zou, Y., Li, X., Deng, C., & Wu, X. (2023). A Finite-Dimensional Control Scheme for Fractional-Order Systems under Denial-of-Service Attacks. Fractal and Fractional, 7(7), 562. https://doi.org/10.3390/fractalfract7070562

Article Metrics

Back to TopTop