1
|
Meng X, Chen Y, Bai J, Guo Y. Distributed filtering for nonlinear time-varying systems with Byzantine attacks and innovation constraints: A FlexRay scheduling mechanism. ISA TRANSACTIONS 2025:S0019-0578(25)00182-X. [PMID: 40234151 DOI: 10.1016/j.isatra.2025.04.005] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/28/2024] [Revised: 03/26/2025] [Accepted: 04/04/2025] [Indexed: 04/17/2025]
Abstract
This paper focuses on the distributed filtering problem for a special type of time-varying systems undergoing stochastic nonlinearities, Byzantine attacks and innovation constraints within the finite-horizon l2-l∞ framework. Taking into account limited network resources, a FlexRay scheduling mechanism incorporating the Round-Robin and weighted try-once-discard protocols is deployed to orchestrate transmission behaviors between sensors and remote filters. A Byzantine attack model is introduced with which the Byzantine nodes falsify the measurements by injecting certain perturbations before sharing them with neighboring nodes. The main purpose of this study is to design a distributed filter for the considered system model such that a finite-horizon l2-l∞ performance is satisfied for the filtering error dynamics. By applying the stochastic analysis method, a sufficient condition is firstly derived to guarantee the existence of desired distributed filter that ensures the prescribed performance index, following which proper filter parameters are designed by solving a set of matrix inequalities. Subsequently, a recursive distributed filtering algorithm is presented, which is friendly for online implementation. Finally, a numerical example is carried out to illustrate the validity of the obtained theoretical results.
Collapse
Affiliation(s)
- Xueyang Meng
- School of Automation, Hangzhou Dianzi University, Hangzhou 310018, China.
| | - Yun Chen
- School of Automation, Hangzhou Dianzi University, Hangzhou 310018, China.
| | - Jianjun Bai
- School of Automation, Hangzhou Dianzi University, Hangzhou 310018, China.
| | - Yunfei Guo
- School of Automation, Hangzhou Dianzi University, Hangzhou 310018, China.
| |
Collapse
|
2
|
Shen Y, Wang Z, Dong H, Liu H, Chen Y. Set-Membership State Estimation for Multirate Nonlinear Complex Networks Under FlexRay Protocols: A Neural-Network-Based Approach. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2025; 36:4922-4933. [PMID: 38598399 DOI: 10.1109/tnnls.2024.3377537] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 04/12/2024]
Abstract
In this article, the set-membership state estimation problem is investigated for a class of nonlinear complex networks under the FlexRay protocols (FRPs). In order to address practical engineering requirements, the multirate sampling is taken into account which allows for different sampling periods of the system state and the measurement. On the other hand, the FRP is deployed in the communication network from sensors to estimators in order to alleviate the communication burden. The underlying nonlinearity studied in this article is of a general nature, and an approach based on neural networks is employed to handle the nonlinearity. By utilizing the convex optimization technique, sufficient conditions are established in order to restrain the estimation errors within certain ellipsoidal constraints. Then, the estimator gains and the tuning scalars of the neural network are derived by solving several optimization problems. Finally, a practical simulation is conducted to verify the validity of the developed set-membership estimation scheme.
Collapse
|
3
|
Wang J, Fan F, Yu Y, Du S, Guo X. Robust model predictive control for polytopic uncertain systems via a high-rate network with the FlexRay protocol. PeerJ Comput Sci 2025; 11:e2580. [PMID: 39896019 PMCID: PMC11784757 DOI: 10.7717/peerj-cs.2580] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 05/24/2024] [Accepted: 11/13/2024] [Indexed: 02/04/2025]
Abstract
In this article, the robust model predictive control (RMPC) problem is investigated for a class of polytopic uncertain systems over high-rate networks whose signal exchanges are scheduled by the FlexRay protocol (FRP). During signal measurement, a high-rate network is applied to broadcast the data from the sensors to the controller efficiently. The FRP including the characteristics of event-triggered mechanism and the time-triggered mechanism is embedded into the high-rate network to regulate the data transmission in a circular period which can improve the flexibility of data transmission. With the aid of the Round-Robin and Try-Once-Discard protocols, a new expression of the measurement model is formulated by the use of certain data holding strategies. Subsequently, taking both high-rate networks and FRP into account, sufficient conditions are obtained by solving a time-varying terminal constraint set of an auxiliary optimization problem. In addition, an algorithm including both off-line and on-line parts is provided to find a sub-optimal solution. Lastly, two numerical simulations are carried out to substantiate the validity of the proposed RMPC strategy which is based on FRP and a high-rate network.
Collapse
Affiliation(s)
- Jianhua Wang
- Huzhou Key Laboratory of Intelligent Sensing and Optimal Control for Industrial Systems, School of Engineering, Huzhou University, Huzhou, Zhejiang, China
| | - Fuqiang Fan
- Huzhou Key Laboratory of Intelligent Sensing and Optimal Control for Industrial Systems, School of Engineering, Huzhou University, Huzhou, Zhejiang, China
| | - Yanye Yu
- Huzhou Key Laboratory of Intelligent Sensing and Optimal Control for Industrial Systems, School of Engineering, Huzhou University, Huzhou, Zhejiang, China
| | - Shuxin Du
- Huzhou Key Laboratory of Intelligent Sensing and Optimal Control for Industrial Systems, School of Engineering, Huzhou University, Huzhou, Zhejiang, China
| | - Xiaorui Guo
- Huzhou Key Laboratory of Intelligent Sensing and Optimal Control for Industrial Systems, School of Engineering, Huzhou University, Huzhou, Zhejiang, China
| |
Collapse
|
4
|
Zhang B, Huang J, Wang J, Su Y, Li J, Wang X, Chen YH, Wang Y, Zhong Z. Can software-defined vehicles never roll over: A perspective of active structural transformation. FUNDAMENTAL RESEARCH 2024; 4:1063-1071. [PMID: 39431139 PMCID: PMC11489496 DOI: 10.1016/j.fmre.2023.12.024] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Journal Information] [Subscribe] [Scholar Register] [Received: 01/07/2023] [Revised: 12/02/2023] [Accepted: 12/04/2023] [Indexed: 10/22/2024] Open
Abstract
The revolution of physical structure is highly significant for future software defined vehicles (SDV). Active structural transformation is a promising feature of the next generation of vehicle physical structure. It can enhance the dynamic performance of vehicles, thus providing safer and more comfortable ride experiences, such as the ability to avoid rollover in critical situations. Based on the active structural transformation technology, this study proposes a novel approach to improve the dynamic performance of a vehicle. The first analytical motion model of a vehicle with active structural transformation capability is established. Then, a multi-objective optimization problem with the adjustable parameters as design variables is abstracted and solved with an innovative scenario specific optimization method. Simulation results under different driving scenarios revealed that the active transformable vehicle applying the proposed method could significantly improve the handling stability without sacrificing the ride comfort, compared with a conventional vehicle with a fixed structure. The proposed method pipeline is defined by the software and supported by the hardware. It fully embodies the characteristics of SDV, and inspires the improvement of multiple types of vehicle performance based on the concept of "being defined by software" and the revolution of the physical structure.
Collapse
Affiliation(s)
- Bowei Zhang
- School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
| | - Jin Huang
- School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
| | - Jianping Wang
- Department of Computer Science, City University of Hong Kong, CYC-6223 Hong Kong, China
| | - Yanzhao Su
- School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
| | - Jiaxing Li
- School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
| | - Xiangyu Wang
- School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
| | - Ye-Hwa Chen
- The George W. Woodruff School of Mechanical Engineering, Georgia Institute of Technology, Atlanta, GA 30332, USA
| | | | - Zhihua Zhong
- School of Vehicle and Mobility, Tsinghua University, Beijing 100084, China
| |
Collapse
|
5
|
Hallaji E, Razavi-Far R, Saif M. DLIN: Deep Ladder Imputation Network. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:8629-8641. [PMID: 33661751 DOI: 10.1109/tcyb.2021.3054878] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Abstract
Many efforts have been dedicated to addressing data loss in various domains. While task-specific solutions may eliminate the respective issue in certain applications, finding a generic method for missing data estimation is rather complex. In this regard, this article proposes a novel missing data imputation algorithm, which has supreme generalization ability for a vast variety of applications. Making use of both complete and incomplete parts of data, the proposed algorithm reduces the effect of missing ratio, which makes it suitable for situations with very high missing ratios. In addition, this feature enables model construction on incomplete training sets, which is rarely addressed in the literature. Moreover, the nonparametric nature of this new algorithm brings about supreme flexibility against all variations of missing values and data distribution. We incorporate the advantages of denoising autoencoders and ladder architecture into a novel formulation based on deep neural networks. To evaluate the proposed algorithm, a comparative study is performed using a number of reputable imputation techniques. In this process, real-world benchmark datasets from different domains are selected. On top of that, a real cyber-physical system is also evaluated to study the generalization ability of the proposed algorithm for distinct applications. To do so, we conduct studies based on three missing data mechanisms, namely: 1) missing completely at random; 2) missing at random; and 3) missing not at random. The attained results indicate the superiority of the proposed method in these experiments.
Collapse
|
6
|
Xiong W, Yu X, Liu C, Wen G, Wen S. Simplifying Complex Network Stability Analysis via Hierarchical Node Aggregation and Optimal Periodic Control. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2021; 32:3098-3107. [PMID: 32730207 DOI: 10.1109/tnnls.2020.3009436] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
In this study, the stability of a hierarchical network with delayed output is discussed by applying a kind of optimal periodic control. To reduce the number of the nodes of the original hierarchical network, an aggregation algorithm is first presented to take some nodes with the same information as an aggregated node. Furthermore, the stability of the original hierarchical network can be guaranteed by the optimal periodic control of the aggregated hierarchical network. Then, an optimal control scheme is proposed to reduce the bandwidth waste in information transmission. In the control scheme, the time sequence is separated into two parts: the deterministic segment and the dynamic segment. With the optimal control scheme, two targets are achieved: 1) the outputs of the original and aggregated hierarchical system are both asymptotically stable and 2) the nodes with slow convergent rate can catch up with the convergence speeds of other nodes.
Collapse
|
7
|
Sun K, Karimi HR, Qiu J. Finite-time fuzzy adaptive quantized output feedback control of triangular structural systems. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.12.059] [Citation(s) in RCA: 16] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
8
|
A periodic iterative learning scheme for finite-iteration tracking of discrete networks based on FlexRay communication protocol. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.10.017] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/21/2022]
|
9
|
Guo Z, Zhang Y, Zhao X, Song X. CPS-Based Self-Adaptive Collaborative Control for Smart Production-Logistics Systems. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:188-198. [PMID: 32086226 DOI: 10.1109/tcyb.2020.2964301] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
Discrete manufacturing systems are characterized by dynamics and uncertainty of operations and behavior due to exceptions in production-logistics synchronization. To deal with this problem, a self-adaptive collaborative control (SCC) mode is proposed for smart production-logistics systems to enhance the capability of intelligence, flexibility, and resilience. By leveraging cyber-physical systems (CPSs) and industrial Internet of Things (IIoT), real-time status data are collected and processed to perform decision making and optimization. Hybrid automata is used to model the dynamic behavior of physical manufacturing resources, such as machines and vehicles in shop floors. Three levels of collaborative control granularity, including nodal SCC, local SCC, and global SCC, are introduced to address different degrees of exceptions. Collaborative optimization problems are solved using analytical target cascading (ATC). A proof of concept simulation based on a Chinese aero-engine manufacturer validates the applicability and efficiency of the proposed method, showing reductions in waiting time, makespan, and energy consumption with reasonable computational time. This article potentially enables manufacturers to implement CPS and IIoT in manufacturing environments and build up smart, flexible, and resilient production-logistics systems.
Collapse
|
10
|
Zhang XM, Han QL, Ge X, Ding L. Resilient Control Design Based on a Sampled-Data Model for a Class of Networked Control Systems Under Denial-of-Service Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:3616-3626. [PMID: 31841435 DOI: 10.1109/tcyb.2019.2956137] [Citation(s) in RCA: 81] [Impact Index Per Article: 16.2] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
This article is concerned with designing resilient state feedback controllers for a class of networked control systems under denial-of-service (DoS) attacks. The sensor samples system states periodically. The DoS attacks usually prevent those sampled signals from being transmitted through a communication network. A logic processor embedded in the controller is introduced to not only receive sampled signals but also capture information on the duration time of each DoS attack. Note that the duration time of DoS attacks is usually both lower and upper bounded. Then the closed-loop system is modeled as an aperiodic sampled-data system closely related to both lower and upper bounds of duration time of DoS attacks. By introducing a novel looped functional, which caters for the N -order canonical Bessel-Legendre inequalities, some N -dependent stability criteria are presented for the resultant closed-loop system. It is worth pointing out that a number of identity formulas are uncovered, which enable us to apply the notable free-weighting matrix approach to derive less conservative stability criteria. A linear-matrix-inequality-based criterion is provided to design stabilizing state-feedback controllers against DoS attacks. A satellite control system is given to demonstrate the effectiveness of the proposed method.
Collapse
|
11
|
Guo L, Yu H, Hao F. Event-triggered control for stochastic networked control systems against Denial-of-Service attacks. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.03.045] [Citation(s) in RCA: 10] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
12
|
Li J, Wang Q. Control system of trajectory tracking of discretely-actuated manipulator based on computed torque method. JOURNAL OF INTELLIGENT & FUZZY SYSTEMS 2020. [DOI: 10.3233/jifs-179829] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/15/2022]
Affiliation(s)
- Jinghong Li
- Faculty of Mechanical Engineering and Automation, Zhejiang Sci-Tech University, Hangzhou, China
- Faculty of Mechanical, Shanghai Dianji University, Shanghai, China
| | - Qiang Wang
- Faculty of Mechanical, Shanghai Dianji University, Shanghai, China
| |
Collapse
|
13
|
Li F, Tang Y. False Data Injection Attack for Cyber-Physical Systems With Resource Constraint. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:729-738. [PMID: 30307888 DOI: 10.1109/tcyb.2018.2871951] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
Cyber-security is of the fundamental importance for cyber-physical systems (CPSs), since CPSs are vulnerable to cyber attack. In order to make the defensive measures better, one needs to understand the behavior from the view of an attacker. In this paper, the problem of false data injection attack on remote state estimation with resource constraints is studied in two cases, where the first case is that the attacker adds a Gaussian noise to the innovation, while the other is that the attacker employs a Gaussian noise to replace the innovation. In addition, the attacker is assumed to has a resource constraint, i.e., he/she cannot attack all the sensors, at the same time should decide which sensors to attack. By using the matrix theory, the optimal attack strategy problem, which aims to maximize the trace of the remote estimation error covariance, is converted into a convex optimization problem that can be solved. Thus, an optimal attack strategy is given to illustrate which sensors should be attacked. An example is given to show the effectiveness of the theoretical results.
Collapse
|