Svoboda | Graniru | BBC Russia | Golosameriki | Facebook
Next Article in Journal
A Linear Stabilized Incompressible Magnetohydrodynamic Problem with Magnetic Pressure
Next Article in Special Issue
Fractional Neutral Integro-Differential Equations with Nonlocal Initial Conditions
Previous Article in Journal
Gaussian Graphical Model Estimation and Selection for High-Dimensional Incomplete Data Using Multiple Imputation and Horseshoe Estimators
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Event-Triggered Adaptive Neural Prescribed Performance Tracking Control for Nonlinear Cyber–Physical Systems against Deception Attacks

1
School of Information Technology, Zhejiang Financial College, Hangzhou 310018, China
2
School of Information and Control Engineering, Qingdao University of Technology, Qingdao 266525, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(12), 1838; https://doi.org/10.3390/math12121838
Submission received: 14 May 2024 / Revised: 7 June 2024 / Accepted: 8 June 2024 / Published: 13 June 2024
(This article belongs to the Special Issue Nonlinear Dynamics and Control: Challenges and Innovations)

Abstract

:
This paper investigates the problem of the adaptive neural network tracking control of nonlinear cyber–physical systems (CPSs) subject to unknown deception attacks with prescribed performance. The considered system is under the influence of unknown deception attacks on both actuator and sensor networks, making the research problem challenging. The outstanding contribution of this paper is that a new anti-deception attack-prescribed performance tracking control scheme is proposed through a special coordinate transformation and funnel function, combined with backstepping and bounded estimation methods. The transient performance of the system can be ensured by the prescribed performance control scheme, which makes the indicators of the controlled system, such as settling time and tracking accuracy, able to be pre-assigned offline according to the task needs, and the applicability of the prescribed performance is tested by selecting different values of the settling time (0.5 s, 1 s, 1.5 s, 2 s, 2.5 s, and 3 s). In addition, to save the computational and communication resources of the CPS, this paper uses a finite-time differentiator to approximate the virtual control law differentiation to avoid “complexity explosion” and a switching threshold event triggering mechanism to save the communication resources for data transmission. Finally, the effectiveness of the proposed control strategy is further verified by an electromechanical system simulation example.

1. Introduction

The CPS is a type of control system that combines physical components with network communications and computers, and has strong advantages in realizing dynamic control, real-time sensing and information services for large-scale engineering systems, which are widely used in industrial control systems, distributed power systems, intelligent transport systems and other key infrastructure fields [1,2,3]. Through the combination of adaptive techniques and backstepping, the control tracking theory of nonlinear systems has been widely developed [4,5,6], and many excellent research studies have emerged in the field of the tracking control of CPSs [7,8,9].
Transmitting data over shared network communication channels provides some benefits to traditional control systems, such as scalability, flexibility and efficiency. However, this also makes the system vulnerable to adversarial attacks such as denial-of-service (Dos) attacks, deception attacks [10,11] and replay attacks. The Dos attack is a type of attack that disables a control system by blocking the communication channel so that the control system is missing real-time data [12]. Replay attacks damage system stability by maliciously transmitting the same data repeatedly [13]. Among them, the deception attack is a type of attack in which an attacker maliciously injects false data into the network system [14]. Without addressing these cyber-attacks, system performance will deteriorate and even lead to disaster. Therefore, it is crucial to design effective security control algorithms for CPSs subjected to cyber-attacks to ensure overall stability, and deception attacks are one of the important attacks that need to be further investigated. So far, many studies on CPSs with deception attacks have existed [15,16,17,18]. Specifically, the literature [15] addresses the problem of sensor deception attacks on uncertain linear systems by designing an adaptive scheme. A new terminal integral adaptive sliding film control method is proposed in the literature [16] for linear systems subject to injection spoofing attacks. The adaptive control of nonlinear CPSs subjected to disinformation injection attacks has been studied in the literature [17] and the unknown time-varying gain problem has been dealt with using the Nussbaum function. The problem of adaptive security control for nonlinear CPSs subject to unknown deception attacks has been studied in the literature [18]. However, results on the tracking control of CPSs subjected to double deception attacks on sensor and actuator networks are scarce.
Cyber–physical systems typically have multiple control loops sharing available computing and communication resources. Therefore, efficient use of the only resources available is a central issue in the control design of CPSs. The use of time-triggered conventional digital control techniques may lead to a huge waste of communication resources and unnecessarily high workloads when computational and communication resources are allocated to other tasks [19]. In contrast, in systems that use an event-triggered mechanism (ETM), control inputs are updated only irregularly at certain moments, reducing the computational and communication burden [20,21,22]. A lot of research has emerged that addresses saving communication resources [23,24,25,26]. A fixed threshold ETM control strategy is proposed in reference [23]. A relative threshold ETM in which the threshold value varies with the control input signal has been designed in reference [25]. Although adopting the relative threshold ETM strategy can further save communication resources while obtaining better control accuracy, the trigger threshold is directly related to the control input; once the control input suddenly becomes larger, it is easy to cause a sudden jump of the control input, resulting in the controlled system being affected by a strong pulse. Therefore, in this paper, the switching threshold ETM strategy is selected to save the computational and communication resources of CPSs.
On the other hand, in the control of many practical complex systems, such as process control, there are not only the necessary stability requirements for the controlled system but also very high requirements for transient performance in terms of the quality of task completion or operation [27,28]. Therefore, control design to achieve pre-specified performance metrics, such as tracking error convergence rate, settling time, etc., is more in line with the current concepts of intelligent control system design. In order to solve the above problems, scholars have conducted an in-depth study of prescribed performance control in [29,30,31]. It is worth noting that the use of backstepping in the design of control strategies will lead to a “explosion of complexity” due to the repeated differentiation of the virtual control law [32]. Therefore, it would be interesting to avoid the “complexity explosion” phenomenon while achieving the prescribed performance control.
Inspired by the above discussion, this paper proposes an event-triggered adaptive prescribed performance tracking control for nonlinear CPSs of sensor and actuator networks subject to deception attacks. Compared with the existing results, the contributions of this article are summarized below:
  • Compared to reference [17,18], which only considers the case where sensors or actuators are subject to deception attacks, this paper investigates the problem of adaptive security control for CPSs where both sensor and actuator networks are subject to unknown deception attacks.
  • By introducing a performance funnel function in the control design, the adaptive prescribed performance control scheme proposed in this paper ensures that the system is stable under deception attacks for a prescribed finite period of time and the tracking error converges to a prescribed region.
  • Finally, while using the ETM strategy to save CPSs communication resources, computational resources are saved by avoiding “complexity explosion” by approximating the virtual control law using finite-time differentiators.
The rest of this paper is described below. Section 2 provides an introduction to the problem description and preparatory knowledge. Section 3 presents the controller design and stability analysis. Section 4 gives the simulations and the result analysis. Finally, Section 5 analyzes and concludes the paper.

2. Preliminaries

The main symbols used in this paper are shown in Table 1.
Consider nonlinear CPSs modeled as
x ˙ i = g i x ¯ i x i + 1 + f i x ¯ i + d i t x ˙ n = g n x ¯ n u + f n x ¯ n + d n t
where x ¯ i = x 1 , x 2 , , x i T R i and x i t are state variables of the system, and g i , f i represent the unknown smooth functions that are nonlinear. d i t R m is the external disturbance vector. u R and y = x 1 mean the input and output of the system, respectively.
In this work, we assume that the controlled system is subject to a deception attack through the sensor network and actuator networks, which is shown in Figure 1. The state measurements after the deception attack are denoted as x ˜ i = x i + o i t x i = λ i t x i , where λ i t = 1 + o i t , i = 1 , 2 , , n . o i t represents the uncertain time-varying attack signals, and x ˜ i is available.
On the other hand, it is assumed that the control signal of the controlled system is subject to a deception attack at an unknown moment when the control signal is transmitted in the network channel. The model of deception attack is expressed as
u ˜ = u , t 0 , T d β t u + w t ζ x , t T d ,
where u ˜ is the control signal value after the deception attack and u is the true control signal generated by the controller. T d represents the moment when the actuator network is subjected to a deception attack. β t and w t are time-varying functions, ζ x is the nonlinear function. Likewise, there are four positive constants β m , β M , w ¯ and ζ ¯ satisfying 0 < β m β t β M , w ˙ t w ¯ and ζ x ζ ¯ .
Remark 1.
In CPSs, when an attacker can monitor state information through a network channel, they are able to inject malicious data into real information, which is called a deception attack. After a deception attack, the original state information x i is no longer directly usable, and the controller u has changed to u ˜ due to the injection of false data. Moreover, the injection of false information introduces time-varying gain parameters to the system state and control inputs, and these can damage system performance or even lead to instability. Therefore, dealing with these time-varying gain parameters and spuriously injected information is a challenging task.
Assumption 1
([33]). For the attack gain λ i t , we assume that λ i t must be positive. There exist some known positive constants λ ¯ and λ 0 satisfying λ i t λ ¯ , λ ˙ i λ i 1 λ 0 .
Assumption 2.
The reference trajectory y d R and its first- and second-order derivatives are available.
Assumption 3.
Functions g i t are bounded. Supposing that there are constants a i , there exists 0 < g i m g i x ¯ i < , i = 1 , 2 , n .
Remark 2.
From Assumption 2, it is obtained that the following property exists with respect to the attack gain λ i t : there exist two positive constants λ m and λ M , satisfying λ m λ i λ i + 1 1 λ M .
Definition 1
([34,35]). For given accuracy bound μ T s and convergence time T s > 0 , a time-varying smooth function μ μ T S , T s , t defined for t R 0 and abbreviated as μ t , is called a finite-time performance funnel function if the following hold:
  • μ t > 0 for all t 0 ;
  • μ t belong to W 1 , , where W 1 , represents the class of bounded functions with bounded derivatives;
  • lim t T s μ t = μ T s and μ t = μ T s holds for all t T s .
By building a controller such that the error e t always evolves within the funnel μ t , the desired transient performance can be achieved in a prescribed time. The evolution of the tracking error of the controlled system in the prescribed performance control with the performance funnel is shown schematically in Figure 2. In this paper, the following performance functions μ t will be used to implement the prescribed performance control tasks:
μ t = μ 0 a a κ t 1 a + μ T s , t 0 , T s μ T s , t T s , +
where μ T s , μ 0 a , a are positive design parameters and a = m / n with n m , n , m are positive odd and even integers, respectively. In addition, μ 0 a + μ T s = μ 0 is the initial value, T s = a b is the settling time and μ T S represents the predefined tracking accuracy.
Lemma 1
([36]). Let h Z be an unknown continuous function over a compact set Ω Z R m for  ε > 0 , and l > 0 being the NN node number, there exists a radial basis function(RBF) NN, satisfying the following:
h Z = ϕ T R Z + δ Z , δ Z ε
where ϕ T = arg min ϕ R n sup Z Ω Z h Z ϕ T R Z , Z = Z 1 , , Z l R l denotes the input vector and ϕ = ϕ 1 , ϕ 2 , , ϕ l T represents the ideal weight vectors. δ Z indicates the approaching error and R Z = R 1 Z , , R l Z T represents the vectors of RBF basis functions, which can be shown as follows:
R i Z = exp Z c r , i 2 σ N N , i 2
in which c i = c i 1 , c i 2 , , c i l T and σ N N , i are the center and breadth of the RBF NN radial basis function, respectively. The structure of NN used in this paper is depicted in Figure 3.
Lemma 2
([37]). For any scalar positive function σ t and any variable z R , the following inequality holds:
0 z z 2 z 2 + σ 2 t σ t
Lemma 3
(Young’s Inequality): If there exist > 0 , > 0 and some positive constants p , m 1 , m 2 and m 1 1 m 2 1 = 1 , then
p m 1 m 1 m 1 + 1 m 2 p m 2 m 2 , , R n
Lemma 4
([38]). For any real variables ζ R and a positive constant τ, the following inequality holds:
0 ζ ζ tanh ζ τ 0.2785 τ

3. Controller Design and Stability Analysis

This section is devoted to the design of a dynamic event-triggered adaptive control algorithm that ensures that the system tracking error e t = y y d remains within a predefined funnel and converges asymptotically. In order to obtain the ideal control performance, we define the following state transformation as:
s 1 t = tan π e t 2 μ t
Thus, we have
e t = 2 π μ t arctan s 1 t
From (10), we have
e ˙ t = 2 π μ ˙ t arctan s 1 t + 2 π μ t s ˙ 1 t 1 + s 1 2 t
We can further obtain
s ˙ 1 t = h 1 e ˙ t 2 π μ ˙ t arctan s 1 t
where h 1 = π 1 + e 1 2 t / 2 μ t > 0 is a known smooth function. From (9), it can be concluded that the tracking error can be within the range μ t < e t < μ t . Before realizing the desired control task, the following coordinate transformations are defined:
z 1 = s 1 t z i = x ˜ i α i 1

3.1. Controller Design

Step 1: Consider the presence of a deception attack, where x ˜ 1 = λ 1 t x 1 is the only state information available, and hence e t = x ˜ 1 y d . By  (1), (12) and (13), one has
z ˙ 1 = h 1 λ ˙ 1 x 1 + λ 1 x ˙ 1 y ˙ d 2 π h 1 μ ˙ t arctan e 1 t = h 1 λ ˙ 1 λ 1 1 x ˜ 1 + λ 1 g 1 x 2 + f 1 x ¯ 1 + d 1 t y ˙ d 2 π h 1 μ ˙ t arctan e 1 t = h 1 λ ˙ 1 λ 1 1 x ˜ 1 + λ 1 λ 2 1 g 1 z 2 + α 1 + λ 1 f 1 x ¯ 1 + λ 1 d 1 t y ˙ d 2 π h 1 μ ˙ t arctan e 1 t
Construct the first Lyapunov function candidate as
V 1 = 1 2 z 1 2 + 1 2 γ 1 θ ˜ 1 2
It can be verified that V 1 is positive definite and continuously differentiable and thus a valid Lyapunov function candidate. The time derivative of V 1 along (14) is
V ˙ 1 = λ 1 λ 2 1 g 1 z 1 h 1 z 2 + α 1 + z 1 h 1 h Z + λ 1 d 1 t 2 π z 1 h 1 μ ˙ t arctan e 1 t 1 γ 1 θ ˜ 1 θ ^ ˙ 1
where h 1 Z = λ ˙ λ 1 x ˜ 1 + λ 1 f 1 x ¯ 1 y ˙ d . Since the unknown functions appear in h Z , they are approached by an RBF NN as follows:
h 1 Z = ϕ 1 T R 1 Z + δ 1 Z , δ 1 Z ε 1
To deal with the unknown external interference terms of the controlled system, define θ 1 = sup t 0 Θ 1 t with Θ 1 = ϕ 1 T , λ 1 d ¯ 1 + ε 1 T . Moreover, let ξ 1 = R 1 Z , 1 T R l + 1 .
Then, by invoking Lemma 4,
z 1 h 1 ϕ T R Z + λ 1 d 1 t + δ Z = z 1 h 1 Θ 1 T ξ 1 z 1 h 1 θ 1 ξ 1 z 1 θ 1 h 1 ξ 1 tanh z 1 h 1 ξ 1 τ 1 + 0.2785 θ 1 τ 1
where ξ 1 is the Euclidean norm of ξ 1 .
Adding and subtracting z 1 h 1 α ¯ 1 on the right-hand side of (16), and substituting (17) and (18) into (16) leads to
V ˙ 1 λ 1 λ 2 1 g 1 z 1 h 1 z 2 + α 1 2 π z 1 h 1 μ ˙ t arctan e 1 t 1 γ 1 θ ˜ 1 θ ^ ˙ 1 + z 1 θ 1 h 1 ξ 1 tanh z 1 h 1 ξ 1 τ 1 + 0.2785 θ 1 τ 1 + z 1 h 1 α ¯ 1 z 1 h 1 α ¯ 1
where α ¯ 1 = k 1 z 1 + θ ^ 1 ξ 1 tanh z 1 h 1 ξ 1 τ 1 2 π μ ˙ t arctan e 1 t , θ ^ 1 denotes the estimate of the uncertain parameter θ 1 and θ ˜ 1 = θ 1 θ ^ 1 . Then, one can obtain
V ˙ 1 k 1 z 1 2 χ 2 1 γ 1 θ ˜ 1 θ ^ ˙ 1 γ 1 z 1 h 1 ξ 1 tanh z 1 h 1 ξ 1 τ 1 + λ 1 λ 2 1 g 1 z 1 h 1 z 2 + z 1 h 1 α ¯ 1 + λ 1 λ 2 1 g 1 z 1 h 1 α 1 + 0.2785 θ 1 τ 1
Choose the first virtual control law α 1 and the adaptive update law for θ ^ 1 as
α 1 = z 1 h 1 α ¯ 1 2 g m 1 z 1 h 1 α ¯ 1 2 + σ 1 2
θ ^ ˙ 1 = γ 1 z 1 h 1 ξ 1 tanh z 1 h 1 ξ 1 τ 1 γ 11 θ ^ 1
where g m 1 = min g 1 m λ m with λ m is sourced from Remark 2, and  γ 11 are positive design constants. According to Lemma 2, one has
z 1 h 1 α ¯ 1 + λ 1 λ 2 1 g 1 z 1 h 1 α 1 z 1 h 1 α ¯ 1 z 1 h 1 z 1 h 1 α ¯ 1 2 z 1 h 1 α ¯ 1 2 + σ 1 2 σ 1
Substituting (21)–(23) into (20), it follows that
V ˙ 1 k 1 z 1 2 + γ 11 γ 1 θ ˜ 1 θ ^ 1 + λ 1 λ 2 1 g 1 z 1 h 1 z 2 + σ 1 + 0.2785 θ 1 τ 1
Step i 2 i n 1 : The finite-time differentiator that is used to approximate the first-order derivative of α i 1 is constructed as follows:
ω ˙ i 1 , 1 = ω i 1 , 2 κ 1 s i g ω i 1 , 1 α i 1 1 2 ω ˙ i 1 , 2 = κ 2 s i g n ω i 1 , 1 α i 1
where κ 1 , κ 2 are the design positive parameter of the finite-time differentiator. According to literature [39], if the initial deviations ω i 1 , 1 0 α i 1 0 and ω i 1 , 2 0 α ˙ i 1 0 are bounded, the differentiator can give α i 1 with any precision. Consequently, we have ω i 1 , 2 t α ˙ i 1 = ε i 1 , α with bounded estimation error ε i 1 , α , i.e., we can find ε i 1 M such that ε i 1 , α ε i 1 M .
By (1), (13) and  x ˜ i = λ i t x i , the dynamics of z i can be expressed as
z ˙ i = λ ˙ i x i + λ i g i λ i + 1 1 x ˜ i + 1 + f i x ¯ i + d i t α ˙ i 1 = λ ˙ i λ i 1 x ˜ i + λ i λ i + 1 1 g i z i + 1 + α i + λ i f i x ¯ i + λ i d i t α ˙ i 1
To address the impact of the unknown function f i x ¯ i in z i on the design of the adaptive controller, define h i Z = λ ˙ i λ i 1 x ˜ i + λ i f i x ¯ i . Then, by Lemma 1, it follows that
h i Z = ϕ i T R i Z + δ i Z , δ i Z ε i
With respect to the time-varying uncertainties, for  i 3 , define
Θ i = ϕ i T , λ i d ¯ i + ε i , ε i 1 M , λ M g i 1 T , ξ i = R i Z , 1 , 1 , z i 1 T
where λ M is sourced from Remark 2. Choose the ith Lyapunov function candidate as
V i = V i 1 + 1 2 z i 2 + 1 2 γ 1 θ ˜ i 2
With the help of (28), the time derivative of V i along (26) satisfies
V ˙ i V ˙ i 1 + λ i λ i + 1 1 g i z i z i + 1 + α i λ i 1 λ i 1 g i 1 z i 1 z i z i ω i 1 , 2 + z i Θ i ξ i 1 γ i θ ˜ θ ^ ˙
where, for  i = 2 , the third term on the right-hand side of (30) is λ 1 λ 2 1 g 1 z 1 h 1 z 2 and the bound estimation exists in the following form:
Θ 2 = ϕ 2 T , λ 2 d ¯ 2 + ε 2 , ε 1 M , λ M g 1 T , ξ 2 = R 2 Z , 1 , 1 , z 1 h 1 T
Note that Θ i is bounded for all t 0 . To deal with the bounded time-varying uncertainties, define θ i = sup t 0 Θ i . By Lemma 4, it can be deduced that
z i Θ i ξ i z i θ i ξ i z i θ i ξ i tanh z i ξ i τ i + 0.2785 θ i τ i
Adding and subtracting z i α ¯ i on the right-hand side of (30) and substituting (32) into (30), we arrive at
V ˙ i V ˙ i 1 + λ i λ i + 1 1 g i z i z i + 1 + α i λ i 1 λ i 1 g i 1 z i 1 z i z i ω i 1 , 2 + z i θ i ξ i tanh z i ξ i τ i + 0.2785 θ i τ i 1 γ i θ ˜ θ ^ ˙ + z i α ¯ i z i α ¯ i
where α ¯ i = k i z i + θ ^ i ξ i tanh z i ξ i τ i ω i 1 , 2 . Considering the definition θ ˜ i = θ i θ ^ i , one obtains
V ˙ i V ˙ i 1 k i z i 2 + λ i λ i + 1 1 g i z i z i + 1 + α i + z i α ¯ i λ i 1 λ i 1 g i 1 z i 1 z i 1 γ i θ ˜ θ ^ ˙ γ i z i ξ i tanh z i ξ i τ i + 0.2785 θ i τ i
Let the ith α i and the update law for θ ^ i be designed as
α i = z i α ¯ i 2 g m i z i α ¯ i 2 + σ i 2
θ ^ ˙ i = γ i z i ξ i tanh z i ξ i τ i γ i 1 θ ^ i
where g m i = min g i m λ m and γ i 1 are positive design constants.
By Lemma 4, it can be deduced that
z i α ¯ i + λ i λ i + 1 1 g i z i α i z i α ¯ i z i z i α ¯ i 2 z i α ¯ i 2 + σ i 2 σ i
Substituting (35)–(37) into (34), we can obtain
V ˙ i j = 1 i k j z j 2 + j = 1 i γ j 1 γ j θ ˜ j θ ^ j + λ i λ i + 1 1 g i z i z i + 1 + j = 1 i σ j + 0.2785 θ j τ j
Step n: Similar to step i, we construct the following differentiator to estimate α ˙ n 1 :
ω ˙ n 1 , 1 = ω n 1 , 2 κ 1 s i g ω n 1 , 1 α n 1 1 2 ω ˙ n 1 , 2 = κ 2 s i g n ω n 1 , 1 α n 1
where κ 1 , κ 2 are the design positive parameters of the finite-time differentiator. With similar reasoning to step i, we have ω n 1 , 2 t α ˙ i 1 = ε n 1 , α with bounded estimation error ε n 1 , α , i.e., we can find ε n 1 M such that ε n 1 , α ε n 1 M .
Taking (1), (9) and (13) into consideration, and using the similar definitions of Θ n and ξ n in (28) for i = n , the dynamics of z n can be expressed as
z ˙ n = λ n g n β t u + h n Z + λ n d n t α ˙ n 1
To address the impact of the unknown function, define the unknown nonlinear function h n Z as h n Z = λ ˙ n λ n 1 x ˜ n + λ n f n x ¯ n + w t ζ x , which can be approximated by RBF NNs as h n Z = ϕ n T R n Z + δ n Z with δ n Z ε n .
To overcome the problem of limited network resources, the following switching threshold event triggering control strategy is used to save communication resources. Switching threshold ETM can switch the threshold according to the size of the control input signal to ensure better control performance. Then, the switching threshold ETM trigger mechanism is defined as
u t = u r t k , t k t < t k + 1
t k + 1 = inf t t k E u t δ u t + m k , 1 , u t D inf t t k E u t m k , 2 , u t > D
where E u t = u t u r t represents the measurement error. D, m k and δ 0 , 1 is the designed positive parameter. When the above triggering rule (42) is satisfied, the time will be marked as t k + 1 and the control input u t k + 1 will be applied to the controlled system. During the time interval t t k , t k + 1 , the control signal will hold as a constant, i.e.,  u r t k .
Remark 3.
The switching threshold event triggering policy used in this paper provides better flexibility in balancing communication resource effectiveness and system performance compared to the fixed threshold strategy [26] and relative threshold strategy [24]. When the magnitude of the system control input is small, e.g.,  u t D , using a relative thresholding strategy results in higher control accuracy and better system performance while saving communication resources. However, when the control input u t becomes large, the measurement error E u t also becomes large, which can easily cause a sudden jump in the control input, resulting in the controlled system being subjected to a strong pulse input. Since the threshold value of the fixed threshold strategy is a constant, its measurement error is constantly limited to a constant value, which prevents sudden pulse jumps. Therefore, to ensure the system performance, the fixed threshold strategy is used when the amplitude of the input signal is u t > D .
Then, consider the last Lyapunov function candidate as
V n = V n 1 + 1 2 z n 2 + 1 2 γ n θ ˜ n 2
Then, the derivative of V n satisfies
V ˙ n V ˙ n 1 + λ n g n z n β t u z n ω n 1 , 2 + z n Θ n ξ n λ n 1 λ n 1 g n 1 z n 1 z n 1 γ n θ ˜ n θ ^ ˙ n
where Θ n and ξ n are expressed as
Θ n = ϕ n T , λ n d ¯ n + ε n , ε n 1 M , λ M g n 1 T , ξ n = R n Z , 1 , 1 , z n 1 T
Define θ n = sup t 0 Θ n ; by Lemma 4, it can be deduced that
z n Θ n ξ n z n θ n ξ n z n θ n ξ n tanh z n ξ n τ n + 0.2785 θ n τ n
Design the following intermediate control command α n and the adaptive law for the closed-loop control system
α n = z n α ¯ n 2 z n α ¯ n 2 + σ n 2
θ ^ ˙ n = γ n z n ξ n tanh z n ξ n τ n γ n 1 θ ^ n
Now, design the switching threshold event trigger controller as follows:
u r = 1 + δ α n g m n tanh z n α n τ + m ¯ k tanh z n m ¯ k τ
where g m n = min g n m λ m β m and m ¯ k m k / 1 δ k
Add and subtract z n α ¯ n with α ¯ n = k n z n + θ ^ n ξ n tanh z n ξ n τ n ω n 1 , 2 on the right-hand side of (44) and substitute (46) and (48) into (44). Then, by invoking Lemma 2, one has
V ˙ n j = 1 n k j z j 2 + j = 1 n γ j 1 γ j θ ˜ j θ ^ j + z n α ¯ n + λ n g n z n β t u + j = 1 n 1 0.2785 θ j τ j + σ j + 0.2785 θ n τ n

3.2. Stability Analysis

The effect of the proposed event-triggered adaptive neural prescribed performance control scheme on the stability of the closed-loop control system is given by the following theorem.
Theorem 1.
Consider nonlinear CPSs with unknown deception attacks and the dynamic event-based adaptive neural ETM control solution (49), together with the intermediate control laws (35) and (21), adaptive laws (22), (36) and (48). If Assumptions 1–3 are satisfied and the function μ t is appropriately selected to satisfy Definition 1, with the assistance of the dynamic event triggering mechanism and the finite-time differentiator, the following statements hold:
  • All signals in the closed-loop control system are bounded.
  • The Zeno behavior caused by the DETM can be avoided.
  • The prescribed tracking performance of the controlled system is guaranteed, i.e., the tracking error can be controlled within a predefined accuracy range Ω e = e t R e t < μ T s in a predefined time T s , where μ T s and T s are both customizable by the user.
Proof. 
Next, we define the following parameters:
δ k = δ k , 1 , u t D 0 , u t > D , m k = m k , 1 , u t D m k , 1 , u t > D
Noting that there exist two time-varying functions satisfying ψ k , i 1 , i = 1 , 2 , the following holds
u r t = 1 + ψ k , 1 δ k u t + ψ k , 2 m k , t t k , t k + 1
Then, (52) can be rewritten as follows:
u t = u r t 1 + ψ k , 1 δ k ψ k , 2 m k 1 + ψ k , 1 δ k
Substituting (53) into (50), one can obtain
V ˙ n j = 1 n k j z j 2 + j = 1 n γ j 1 γ j θ ˜ j θ ^ j + z n α ¯ n + j = 1 n 1 0.2785 θ j τ j + σ j + λ n g n z n β t u r t 1 + ψ k , 1 δ k ψ k , 2 m k 1 + ψ k , 1 δ k + 0.2785 θ n τ n
According to (49) and ψ k , i 1 , i = 1 , 2 , one obtains
λ n g n z n β t u r t 1 + ψ k , 1 δ k λ n g n z n β t u r t 1 + δ k
λ n g n z n β t ψ k , 2 m k 1 + ψ k , 1 δ k λ n g n z n β t m k 1 δ k
With the help of (49), (55), (56), and Lemma 4, one obtains
λ n g n z n β t u r t 1 + ψ k , 1 δ k ψ k , 2 m k 1 + ψ k , 1 δ k z n α n λ n g n z n β t m ¯ k + λ n g n z n β t m k 1 δ k + 0.557 τ
Substituting (57) into (54) and considering that m ¯ k m k / 1 δ k , one has
V ˙ n j = 1 n k j z j 2 + j = 1 n γ j 1 γ j θ ˜ j θ ^ j + z n α ¯ n z n z n α ¯ n 2 z n α ¯ n 2 + σ n 2 + j = 1 n 1 0.2785 θ j τ j + σ j + 0.2785 θ n τ n + 0.557 τ j = 1 n k j z j 2 + j = 1 n γ j 1 γ j θ ˜ j θ ^ j + Λ
where Λ = j = 1 n 0.2785 θ j τ j + σ j + 0.557 τ .
Via Lemma 3 (Young’s inequality), we obtain
j = 1 n γ j 1 γ j θ ˜ j θ ^ j j = 1 n γ j 1 2 γ j θ ˜ j 2 + j = 1 n γ j 1 2 γ j θ j 2
Substituting (59) into (58) and invoking Lemma 2 yields
V ˙ n j = 1 n k j z j 2 j = 1 n γ j 1 γ j θ ˜ j 2 + b C V n + b
where b = j = 1 n γ j 1 2 γ j θ j 2 + Λ and C = min 2 k i , γ i 1 .
Integrating both sides of (60) in regard to time yields
V n V n 0 b C exp C t + b C
According to (61), one can obtain that V n b C as t and V n is bounded. Additionally, in accordance with (43), it can be further obtained that z i , θ ˜ i is bounded. Because  θ ^ i denotes the estimate of the uncertain parameter θ i , and  θ ˜ = θ θ ^ , one has that θ ^ i is bounded. From (21), (35) and (47), it follows that α i are bounded because they are composed of z i and θ ^ i . Since the desired trajectory y d is a continuous bounded function, and  x ˜ i = λ i t x i , the boundedness of x ˜ i can be inferred from the boundedness of z i . The boundedness of the controller u r t from (49) can be deduced, too. Thus, we prove the boundedness of all closed-loop signals of the system.
Second, we will show that the Zeno behavior does not occur. According to DETP (41) and (42), for  t t k , t k + 1 , the control command u t is in the holding phase, i.e.,  u t is a constant. Accordingly, taking the derivative of measurements error E u t produces
d E u t d t = d d t E u t · E u t 1 2 = u ˙ t u ˙ r t u ˙ r t
Since u ˙ r t is a function containing x ˙ i L , z ˙ i L and θ ^ ˙ i L , it follows that u ˙ r t L . There is a positive constant I 0 satisfying u ˙ r t I 0 . Then, it is easily verified that
E u t = t k t k + 1 E ˙ u t d t t k t k + 1 I 0 d t I 0 t k + 1 t k
From the ETM designed at (42), we have
t k + 1 t k max δ u t + m k , 1 , m k , 2 I 0
According to inequality (64), it can be found that there exists a lower bound for the nonzero execution interval. Therefore, there is not the Zeno phenomenon under the proposed control solution, i.e., the Zeno behavior can be avoided.
Finally, we demonstrate that the prescribed tracking performance of the controlled system can be guaranteed. Earlier, we established that z 1 is always bounded, which means that e 1 t is bounded for t t 0 , . According to (9), it can be shown that the output tracking error e t = y t y d t always evolves within the prescribed performance funnel (3), i.e.,  e t μ t . By recalling the definition of μ t , one can obtain e t μ T s , t T s . Thus, with the performance funnel function μ t , the tracking error e t can be constrained to a prescribed precision region μ T s , μ T s within prescribed finite time T s , where both μ T s and T s are fully customizable.    □
In order to clarify the design methodology of the adaptive prescribed performance control scheme in this paper, the algorithm design steps are given in Algorithm 1.
Algorithm 1 Adaptive Prescribed Performance Control Algorithm Design Procedure
  • Preliminary: Selecting and modeling system models and deception attacks. Design of funnel functions and coordinate transformations for backstepping.
  • Controller design stage: Using the backstepping method, the virtual controllers and adaptive laws are designed for the first, second and ith steps, respectively. Then, the final controller is derived from the previous i-step.
  • Design the event triggering mechanism and integrate it with the controller.
  • The design parameters are selected and the control scheme is thoroughly tested and validated using the simulation module of MATLAB.

4. Simulation Results

In the above formulation of the paper, the research work presented has been completed. In this section, the simulation examples will be used to verify the effectiveness of the proposed control strategy. The following electromechanical systems are considered to demonstrate the effectiveness and superiority of the developed control scheme in the physical system, shown in Figure 4:
M q ¨ + B q ˙ + N sin q = I L I ˙ + R I = V ε K B q ˙
where M = J K τ + m L 0 2 3 K τ + M 0 L 0 2 K τ + 2 M 0 R 0 2 5 K τ , N = m L 0 G 2 K τ + M 0 L 0 G K τ , B = B 0 K τ . G represents the gravity coefficient, I t is the motor armature current, and q t represents the angular position of the motor (i.e., the position of the load). V ε represents the input control voltage. By designing the input voltage, the desired motion of the motor driving the load can be realized. The detailed explanation and values of the parameters of the electromechanical system are shown in Table 2.
Remark 4.
Figure 4 illustrates a conceptualized model of a small CPS that incorporates electromechanical systems, network communications and a computer operating system. The sensor part of the system is responsible for detecting and transmitting information about the state of the electromechanical system, such as armature current, motor angular position and angular velocity. The computer system utilizes the system status information to calculate the quantized value of the control input and transmits it to the programmable DC power supply module, which delivers the corresponding voltage value to the electromechanical system. Both sensor information and control input information are transmitted via network communication, thus completing the construction of the CPSs. It is worth noting that transmitting data in a shared network communication channel is vulnerable to adversarial cyber-attacks.
Via a coordinate transformation x 1 = q , x 2 = q ˙ , x 3 = I , the above kinetic model can be rewritten in the following form:
x ˙ 1 = x 2 x ˙ 2 = N M sin x 1 B M x 2 + 1 M x 3 + d 2 t x ˙ 3 = K B L x 2 R L x 3 + 1 L u + d 3 t
The deception attack signals suffered by the sensor network are chosen as λ 1 = 1 + 0.2 sin ( t ) , λ 2 = 1 + 0.1 cos ( t ) , λ 3 = 1 + 0.05 sin ( t ) cos ( t ) .
In order to further validate the effectiveness of the control scheme designed in this paper when the actuator and sensor networks are subject to spoofing attacks and to comprehensively evaluate the performance of the proposed control method, we consider the following three different scenarios for illustration.

4.1. Control Performance Analysis and Validation

In this section, we verify and analyze the performance of the control scheme designed in this paper, and the controller parameters are designed as g m 1 = 1 , g m 2 = 1 , g m 3 = 2 , k 1 = 12 , k 2 = 15 , k 3 = 25 , γ 1 = 4 , γ 2 = 5 , γ 3 = 2 , γ 11 = 5 , γ 21 = 8 , γ 31 = 15 , τ 1 = τ 2 = τ 3 = 0.1 , σ 1 = σ 2 = σ 3 = 0.001 . According to Definition 1, we design a prescribed-time funnel performance constraint function μ t as the form of (3), with its parameters set as φ 0 = 4 , a = 0.5 , κ = 4 , μ T s = 0.1 . External interference to the system is taken as d 2 t = 0.2 sin 2 t , d 3 t = 0.35 cos 1.2 t . The initial values of the adaptive parameters are chosen as θ ^ 1 0 , θ ^ 2 0 , θ ^ 3 0 T = 0.5 , 0.1 , 0.5 T . The actuator model subject to the deception attack is shown as
u ˜ = u , 0 t < 4 ( 0.5 + 0.2 sin ( t ) ) u + 2 x 1 x 2 + 15 , t 4
In order to fully evaluate the performance of the proposed control scheme, simulations were performed using two representative initial points x 0 = 0.2 , 0.1 , 0.1 T and x 0 = 0.3 , 0.2 , 0.1 T , which are labeled as Initial condition 1 and Initial condition 2. The control objective in this subsection is to make the system output y asymptotically track the desired target trajectory y d = 0.5 sin t + 0.5 sin 0.5 t and to ensure that the tracking error e t enters the preset accuracy range 0.1 , 0.1 within a specified time T s = 2 .
The simulation results in this subsection are presented in Figure 5, Figure 6 and Figure 7. Figure 5 illustrates the schematic evolution of the system output y and tracking trajectory y d as well as the tracking error e t under different initial conditions. From Figure 5, it can be seen that the controlled system can still ensure good tracking performance under deception attacks, and the tracking error can enter the predefined accuracy range within the prescribed time. Figure 6 depicts the trajectories of the system states x 2 and x 3 and the adaptive laws θ ^ 1 , θ ^ 2 and θ ^ 3 for different initial values. Figure 7 depicts the trajectory of the control inputs u t , u r t in both scenarios.

4.2. Prescribed Performance Analysis under Different Predefined-Time Values

The objective of this part is to validate the effectiveness of the proposed control scheme in terms of the prescribed performance. The validity of the prescribed performance is verified by setting different values of the prescribed time and performing simulation experiments on system (66). In order to accurately demonstrate the performance of the proposed control scheme at different prescribed times, we set up six scenarios, which are T s = 0.5 s ; T s = 1 s ; T s = 1.5 s ; T s = 2 s ; T s = 2.5 s ; and T s = 3 s . In this subsection, the actuator model subjected to deception attacks is updated to further reflect the effectiveness of the control scheme against deception attacks, in the following new form:
u ˜ = u , 0 t < 2.8 ( 0.4 + 0.2 sin ( t ) ) u + 5 x 1 2 x 2 + 0.8 sin t , t 2.8
In this subsection, the six cases consider to be common a single system initial value x 0 = 0.4 , 0.2 , 0.3 T , and the other design parameters are kept as the same values as in the previous section. The simulation results are shown in Figure 8, where we can clearly see that each of the system outputs tracks the desired trajectory signals within the corresponding prescribed time, and the tracking error also enters the predefined region within the corresponding time.

4.3. Comparison Analysis

To further conserve communication resources, reduce the frequency of data transmission, and prevent sudden pulse jumps in the control input, this paper uses a switching threshold event triggering mechanism. In this subsection, we choose the traditional fixed-threshold ETM to compare with the switching threshold ETM strategy in this paper, and choose the traditional ETM strategy as follows:
u t = v t k , t k t < t k + 1 , t k + 1 = inf t R g k u v 0
In order to demonstrate the adaptability of the proposed control scheme for different desired target trajectories, the desired trajectories and the initial values of the system are set: y d = 2 sin 0.5 t + cos 2 t , x 0 = 0.6 , 0 , 0.1 T . The associated controller and adaptive parameter values are the same as in the previous subsection, and the simulation sampling period is 0.002 s .
The simulation results are displayed in Figure 9, Figure 10 and Figure 11. The comparisons of system outputs and tracking errors using two different event triggering mechanisms under the same control parameters are shown in Figure 9. From Figure 9, it can be seen that under the two different triggering mechanisms, there is only a very slight change in the system output and output tracking error, i.e., the effect of ETM on the system performance is limited. Therefore, it is reasonable to pursue a smaller number of triggers to save more communication resources while ensuring system performance. The time intervals for different event triggering strategies are given in Figure 10. As can be seen from Figure 11, the switching threshold ETM can further save communication resources compared to the conventional ETM. From the above simulation results, it can be concluded that the switching threshold ETM can further reduce the data transmission frequency while ensuring the control performance. Finally, the adaptive prescribed performance anti-deception attack control strategy designed in this paper is compared with the already existing related techniques as shown in Table 3.

5. Conclusions and Future Work

In this paper, we design a prescribed performance adaptive neural tracking control scheme for CPSs with unknown deception attacks on sensor and actuator networks. Combining backstepping and adaptive techniques overcomes controller design difficulties due to unknown nonlinear functions and deception attacks. The prescribed performance control scheme designed in this paper allows offline predefined system metrics such as settling time and tracking error in an environment subjected to deception attacks, and this characterization is verified by selecting a variety of different settling time values (0.5 s, 1 s, 1.5 s, 2 s, 2.5 s, and 3 s). Through verification, the switching threshold ETM used in this paper can ensure good system performance while further saving communication resources compared to the traditional fixed threshold ETM.
In real-world scenarios, CPSs typically contain multiple control loops. Moreover, it is an interesting challenge to validate the control scheme in this paper on a hardware platform due to its specificity. Therefore, in future work, we will explore the validation of security control strategies for large CPSs against multiple cyber-attacks on hardware platforms.

Author Contributions

Conceptualization, Y.L. (Yinguang Li) and C.L.; methodology, Y.L. (Yinguang Li); software, Y.L. (Yinguang Li); validation, C.L., Y.L. (Yinguang Li) and Y.L. (Yang Li); formal analysis, C.L.; investigation, Y.L. (Yinguang Li) and J.Z.; writing—original draft preparation, Y.L. (Yinguang Li); writing—review and editing, J.Z. and Y.L. (Yang Li); visualization, C.L.; supervision, J.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported in part by the National Natural Science Foundation (62203247) of China.

Data Availability Statement

No data were used for the research described in the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, Z.; Zhao, J. Resilient adaptive control of switched nonlinear cyber-physical systems under uncertain deception attacks. Inf. Sci. 2021, 543, 398–409. [Google Scholar] [CrossRef]
  2. Bi, Y.; Wang, T.; Qiu, J.; Li, M.; Wei, C.; Yuan, L. Adaptive Decentralized Finite-Time Fuzzy Secure Control for Uncertain Nonlinear CPSs Under Deception Attacks. IEEE Trans. Fuzzy Syst. 2023, 31, 2568–2580. [Google Scholar] [CrossRef]
  3. Wu, J.; He, F.; He, X.; Li, J. Dynamic Event-Triggered Fuzzy Adaptive Control for Non-strict-Feedback Stochastic Nonlinear Systems with Injection and Deception Attacks. Int. J. Fuzzy Syst. 2023, 25, 1144–1155. [Google Scholar] [CrossRef]
  4. Li, Y.; Zhu, Q.; Zhang, J. Distributed adaptive fixed-time neural networks control for nonaffine nonlinear multiagent systems. Sci. Rep. 2022, 12, 8459. [Google Scholar] [CrossRef] [PubMed]
  5. Li, W.; Shi, F.; Li, W.; Yang, S.; Wang, Z.; Li, J. Review on Cooperative Control of Multi-Agent Systems. Int. J. Appl. Math. Control Eng. 2024, 7, 10–17. [Google Scholar] [CrossRef]
  6. Han, H.; Wang, P.; Deng, Z. Research of Global Stabilization for Nonlinear Systems Based on Bounded Sampled-Data Control. Int. J. Appl. Math. Control. 2024, 7, 48–55. [Google Scholar] [CrossRef]
  7. Gao, Z.; Zhao, N.; Zhao, X.; Niu, B.; Xu, N. Event-triggered prescribed performance adaptive secure control for nonlinear cyber physical systems under denial-of-service attacks. Commun. Nonlinear Sci. Numer. Simul. 2024, 131, 107793. [Google Scholar] [CrossRef]
  8. Ma, Y.S.; Che, W.W.; Deng, C. Dynamic event-triggered model-free adaptive control for nonlinear CPSs under aperiodic DoS attacks. Inf. Sci. 2022, 589, 790–801. [Google Scholar] [CrossRef]
  9. Ma, Y.S.; Che, W.W.; Deng, C.; Wu, Z.G. Model-Free Adaptive Resilient Control for Nonlinear CPSs with Aperiodic Jamming Attacks. IEEE Trans. Cybern. 2023, 53, 5949–5956. [Google Scholar] [CrossRef] [PubMed]
  10. Chen, W.D.; Niu, B.; Wang, H.Q.; Li, H.T.; Wang, D. Adaptive Event-Triggered Control for Non-Strict Feedback Nonlinear CPSs with Time Delays against Deception Attacks and Actuator Faults. IEEE Trans. Autom. Sci. Eng. 2023, 1–11. [Google Scholar] [CrossRef]
  11. Liu, S.; Wang, X.; Niu, B.; Song, X.; Wang, H.; Zhao, X. Adaptive Resilient Output Feedback Control Against Unknown Deception Attacks for Nonlinear Cyber-Physical Systems. IEEE Trans. Circuits Syst. II Express Briefs 2024. [Google Scholar] [CrossRef]
  12. Li, T.; Chen, B.; Yu, L.; Zhang, W.A. Active Security Control Approach against DoS Attacks in Cyber-Physical Systems. IEEE Trans. Autom. Control 2021, 66, 4303–4310. [Google Scholar] [CrossRef]
  13. Huang, J.; Zhao, L.; Wang, Q.G. Adaptive control of a class of strict feedback nonlinear systems under replay attacks. ISA Trans. 2020, 107, 134–142. [Google Scholar] [CrossRef] [PubMed]
  14. Yang, Y.; Huang, J.; Su, X.; Deng, B. Adaptive control of cyber-physical systems under deception and injection attacks. J. Frankl. Inst. 2021, 358, 6174–6194. [Google Scholar] [CrossRef]
  15. Tansel Yucelen, W.M.H.; Feron, E.M. Adaptive control architectures for mitigating sensor attacks in cyber-physical systems. Cyber-Phys. Syst. 2016, 2, 24–52. [Google Scholar] [CrossRef]
  16. Li, M.; Chen, Y.; Zhang, Y.; Liu, Y. Adaptive sliding-mode tracking control of networked control systems with false data injection attacks. Inf. Sci. 2022, 585, 194–208. [Google Scholar] [CrossRef]
  17. Ren, X.X.; Yang, G.H. Adaptive control for nonlinear cyber-physical systems under false data injection attacks through sensor networks. Int. J. Robust Nonlinear Control 2020, 30, 65–79. [Google Scholar] [CrossRef]
  18. Zhao, N.; Tian, Y.; Zhang, H.; Herrera-Viedma, E. Fuzzy-based adaptive event-triggered control for nonlinear cyber-physical systems against deception attacks via a single parameter learning method. Inf. Sci. 2024, 657, 119948. [Google Scholar] [CrossRef]
  19. Girard, A. Dynamic Triggering Mechanisms for Event-Triggered Control. IEEE Trans. Autom. Control 2015, 60, 1992–1997. [Google Scholar] [CrossRef]
  20. Zhang, X.; Tan, J.; Wu, J.; Chen, W. Event-triggered-based fixed-time adaptive neural fault-tolerant control for stochastic nonlinear systems under actuator and sensor faults. Nonlinear Dyn. 2022, 108, 2279–2296. [Google Scholar] [CrossRef]
  21. Zhang, H.; Chen, H.; Xiong, L.; Zhang, Y. Dynamic Event-Triggered Control for Delayed Nonlinear Markov Jump Systems under Randomly Occurring DoS Attack and Packet Loss. Mathematics 2024, 12, 1064. [Google Scholar] [CrossRef]
  22. Chen, K.; Gu, Y.; Huang, W.; Zhang, Z.; Wang, Z.; Wang, X. Fixed-Time Adaptive Event-Triggered Guaranteed Performance Tracking Control of Nonholonomic Mobile Robots under Asymmetric State Constraints. Mathematics 2024, 12, 1471. [Google Scholar] [CrossRef]
  23. Chen, J.; Hua, C.; Guan, X. Fast data-driven iterative event-triggered control for nonlinear networked discrete systems with data dropouts and sensor saturation. J. Frankl. Inst. 2020, 357, 8364–8382. [Google Scholar] [CrossRef]
  24. Ma, H.; Li, H.; Lu, R.; Huang, T. Adaptive event-triggered control for a class of nonlinear systems with periodic disturbances. Sci. China Inf. Sci. 2020, 63, 150212. [Google Scholar] [CrossRef]
  25. Li, Z.; Yan, H.; Zhang, H.; Lam, H.K.; Wang, M. Aperiodic Sampled-Data-Based Control for Interval Type-2 Fuzzy Systems via Refined Adaptive Event-Triggered Communication Scheme. IEEE Trans. Fuzzy Syst. 2021, 29, 310–321. [Google Scholar] [CrossRef]
  26. Li, B.; Xia, J.; Zhang, H.; Shen, H.; Wang, Z. Event-triggered adaptive fuzzy tracking control for stochastic nonlinear systems. J. Frankl. Inst. 2020, 357, 9505–9522. [Google Scholar] [CrossRef]
  27. Bu, X. Prescribed performance control approaches, applications and challenges: A comprehensive survey. Asian J. Control 2023, 25, 241–261. [Google Scholar] [CrossRef]
  28. Chen, L.; Liang, H.; Pan, Y.; Li, T. Human-in-the-Loop Consensus Tracking Control for UAV Systems via an Improved Prescribed Performance Approach. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 8380–8391. [Google Scholar] [CrossRef]
  29. Cheng, F.; Niu, B.; Zhang, L.; Chen, Z. Prescribed Performance-Based Low-Computation Adaptive Tracking Control for Uncertain Nonlinear Systems with Periodic Disturbances. IEEE Trans. Circuits Syst. II Express Briefs 2022, 69, 4414–4418. [Google Scholar] [CrossRef]
  30. Zhang, L.; Che, W.W.; Deng, C.; Wu, Z.G. Prescribed Performance Control for Multiagent Systems via Fuzzy Adaptive Event-Triggered Strategy. IEEE Trans. Fuzzy Syst. 2022, 30, 5078–5090. [Google Scholar] [CrossRef]
  31. Liang, H.; Zhang, Y.; Huang, T.; Ma, H. Prescribed Performance Cooperative Control for Multiagent Systems with Input Quantization. IEEE Trans. Cybern. 2020, 50, 1810–1819. [Google Scholar] [CrossRef] [PubMed]
  32. Li, Y.; Zhang, J.; Li, Y. Command filter-based adaptive neural tracking control of nonlinear systems with multiple actuator constraints and disturbances. Complex Eng. Syst. 2024, 4. [Google Scholar] [CrossRef]
  33. Gao, Y.; Niu, B.; Chen, W.; Wang, H.; Mu, C.; Wen, G. Adaptive Control of Constrained Nonlinear CPSs Under Deception Attacks Through Sensor and Actuator Networks. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 1241–1245. [Google Scholar] [CrossRef]
  34. Sui, S.; Chen, C.L.P.; Tong, S. A Novel Adaptive NN Prescribed Performance Control for Stochastic Nonlinear Systems. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 3196–3205. [Google Scholar] [CrossRef] [PubMed]
  35. Zhang, Z.; Dong, Y.; Duan, G. Global asymptotic fault-tolerant tracking for time-varying nonlinear complex systems with prescribed performance. Automatica 2024, 159, 111345. [Google Scholar] [CrossRef]
  36. Zhang, J.; Li, Y. Adaptive RBF Neural Network Tracking Control of Stochastic Nonlinear Systems with Actuators and State Constraints. Mathematics 2024, 12, 1378. [Google Scholar] [CrossRef]
  37. Chen, M.; Wang, H.; Liu, X. Adaptive Practical Fixed-Time Tracking Control with Prescribed Boundary Constraints. IEEE Trans. Circuits Syst. I Regul. Pap. 2021, 68, 1716–1726. [Google Scholar] [CrossRef]
  38. Yuan, X.; Chen, B.; Lin, C. Neural Adaptive Fixed-Time Control for Nonlinear Systems with Full-State Constraints. IEEE Trans. Cybern. 2023, 53, 3048–3059. [Google Scholar] [CrossRef] [PubMed]
  39. Zhang, Y.; Niu, B.; Zhao, X.; Duan, P.; Wang, H.; Gao, B. Global Predefined-Time Adaptive Neural Network Control for Disturbed Pure-Feedback Nonlinear Systems with Zero Tracking Error. IEEE Trans. Neural Netw. Learn. Syst. 2023, 34, 6328–6338. [Google Scholar] [CrossRef]
Figure 1. System architecture under sensor and actuator attacks.
Figure 1. System architecture under sensor and actuator attacks.
Mathematics 12 01838 g001
Figure 2. Schematic illustration of the tracking error evolution.
Figure 2. Schematic illustration of the tracking error evolution.
Mathematics 12 01838 g002
Figure 3. Neural network structure.
Figure 3. Neural network structure.
Mathematics 12 01838 g003
Figure 4. Schematic of electromechanical system.
Figure 4. Schematic of electromechanical system.
Mathematics 12 01838 g004
Figure 5. Trajectories of y t and e t under different initial conditions.
Figure 5. Trajectories of y t and e t under different initial conditions.
Mathematics 12 01838 g005
Figure 6. Trajectories of x 2 , x 3 and adaptive law under different initial conditions.
Figure 6. Trajectories of x 2 , x 3 and adaptive law under different initial conditions.
Mathematics 12 01838 g006
Figure 7. Curves of u t and u r t under different initial conditions.
Figure 7. Curves of u t and u r t under different initial conditions.
Mathematics 12 01838 g007
Figure 8. Trajectories of y t and e t under different settling times.
Figure 8. Trajectories of y t and e t under different settling times.
Mathematics 12 01838 g008
Figure 9. Trajectories of y t and e t under different ETM.
Figure 9. Trajectories of y t and e t under different ETM.
Mathematics 12 01838 g009
Figure 10. Event-triggered time intervals.
Figure 10. Event-triggered time intervals.
Mathematics 12 01838 g010
Figure 11. Comparison of the number of events triggered.
Figure 11. Comparison of the number of events triggered.
Mathematics 12 01838 g011
Table 1. Notations.
Table 1. Notations.
SymbolDefinitionSymbolDefinition
Absolute value R n Real n-dimension space
R + Set of non-negative real numbers x T The transpose of matrix x
f i Abbreviation for f i x ¯ i g i Abbreviation for g i x ¯ i
Ω Z Compact set
Table 2. Parameter table for electromechanical systems.
Table 2. Parameter table for electromechanical systems.
DescriptionValueDescriptionValue
J (rotor inertia) 1.625 × 10 3 Kg · m 2 m (link mass) 0.506 Kg
M 0 (load mass) 0.434 Kg L 0 (link length) 0.305 m
R 0 (radius of the load) 0.023 m R (armature resistance) 5.0 Ω
K B (back-emf coefficient) 0.9 N · m / A L (armature inductance) 25 × 10 3 H
B 0 (coefficient of viscous friction) 16.25 × 10 3 N · m · s / rad K τ (electromechanical conversion coefficient) 0.9 N · m / A
Table 3. Comparison with existing technology.
Table 3. Comparison with existing technology.
Research LiteratureComparison
Refs. [18,33]The settling time of the controlled system is not available for offline predefinition.
Refs. [11,18]The case of simultaneous deception attacks on actuator and sensor networks was not investigated.
Refs. [3,10]Failure to address the “complexity explosion” problem.
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Li, C.; Li, Y.; Zhang, J.; Li, Y. Event-Triggered Adaptive Neural Prescribed Performance Tracking Control for Nonlinear Cyber–Physical Systems against Deception Attacks. Mathematics 2024, 12, 1838. https://doi.org/10.3390/math12121838

AMA Style

Li C, Li Y, Zhang J, Li Y. Event-Triggered Adaptive Neural Prescribed Performance Tracking Control for Nonlinear Cyber–Physical Systems against Deception Attacks. Mathematics. 2024; 12(12):1838. https://doi.org/10.3390/math12121838

Chicago/Turabian Style

Li, Chunyan, Yinguang Li, Jianhua Zhang, and Yang Li. 2024. "Event-Triggered Adaptive Neural Prescribed Performance Tracking Control for Nonlinear Cyber–Physical Systems against Deception Attacks" Mathematics 12, no. 12: 1838. https://doi.org/10.3390/math12121838

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop