Next Article in Journal
Restoring the Fluctuation–Dissipation Theorem in Kardar–Parisi–Zhang Universality Class through a New Emergent Fractal Dimension
Next Article in Special Issue
Entropy-Based Methods for Motor Fault Detection: A Review
Previous Article in Journal
Three-Dimensional Reconstruction Pre-Training as a Prior to Improve Robustness to Adversarial Attacks and Spurious Correlation
Previous Article in Special Issue
Fault Diagnosis of Rotating Machinery Using Kernel Neighborhood Preserving Embedding and a Modified Sparse Bayesian Classification Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Differential Entropy-Based Fault-Detection Mechanism for Power-Constrained Networked Control Systems

by
Alejandro J. Rojas
Departamento de Ingeniería Eléctrica, Universidad de Concepción, Concepción 4070409, Chile
Entropy 2024, 26(3), 259; https://doi.org/10.3390/e26030259
Submission received: 17 January 2024 / Revised: 4 March 2024 / Accepted: 12 March 2024 / Published: 14 March 2024

Abstract

:
In this work, we consider the design of power-constrained networked control systems (NCSs) and a differential entropy-based fault-detection mechanism. For the NCS design of the control loop, we consider faults in the plant gain and unstable plant pole locations, either due to natural causes or malicious intent. Since the power-constrained approach utilized in the NCS design is a stationary approach, we then discuss the finite-time approximation of the power constraints for the relevant control loop signals. The network under study is formed by two additive white Gaussian noise (AWGN) channels located on the direct and feedback paths of the closed control loop. The finite-time approximation of the controller output signal allows us to estimate its differential entropy, which is used in our proposed fault-detection mechanism. After fault detection, we propose a fault-identification mechanism that is capable of correctly discriminating faults. Finally, we discuss the extension of the contributions developed here to future research directions, such as fault recovery and control resilience.

1. Introduction

Control theory developed mainly after World War II. The ideas proposed in this research area are typically related to proportional-integral-differential (PID) control design, state feedback optimal control, optimal observers, and model predictive control (MPC); see [1]. At the turn of the twenty-first century and soon thereafter, the next step was taken under the networked control system (NCS) paradigm, which has evolved into multiagent consensus control [2], cybersecurity [3,4], and data-driven control [5]. Since then, control theorists and control practitioners have remained highly active in this research area, such as by combining control and information theories [6,7] or linear optimal control and communication theory; examples include [8,9,10]. The last few years have also seen an increase in event-triggered NCS solutions [11,12,13], that is, asynchronous control closed-loop solutions, which aim to increase the efficiency of specifically limited communication resources while achieving a set of given objectives (stability, performance, robustness, or a combination of these). These and other NCS results are the foundation of better control.
An approach to NCS introduced early on by [9] imposes a power constraint, P , on the channel input power and then characterizes the channel model by its channel signal-to-noise ratio (SNR). The proposed SNR approach is then used to study the design constraints on closed-loop stability, especially for cases in which the controlled plant model under analysis is unstable. The SNR limitations presented in [9], which are fundamental in nature, deal with unstable single-input–single-output (SISO) LTI plant models, characterizing the initial bound on the channel SNR required to achieve feedback-loop stability for a single-channel model in the closed loop. A mean square analysis to address the probabilistic nature of the communication network was also used, in a different context of synchronization, in [14]. An NCS extension of the setup proposed in [9] is presented in Figure 1; in this paper, we consider a memoryless additive white Gaussian noise (AWGN) communication channel for the communication network, which operates simultaneously over two paths: the direct path between the controller and the plant and the feedback path between the plant and the controller.
A vast amount of literature also exists on the topic of fault detection and diagnostics, including many published books [15,16,17,18,19] and review articles [20,21]. A fault occurs when there is an anomalous behavior, either by chance or maliciously induced, in a physical plant; it is then important to detect, identify, and if possible recover from this fault. There are different formulations for the problems of fault detection and fault identification for linear time-invariant (LTI) models, which can be roughly categorized as approximate (such as synthesizing fault-detection filters subject to noise) and exact formulations (such as the null-space method).
The variability inherent in NCSs due to the inclusion of stochastic processes in the communication of relevant closed-loop signals might also be caused by variations in the plant model parameters. These parameter variations can be interpreted as faults; thus, a fault mechanism is needed that can detect these changes, identify them, and, through the residuals (see Figure 1), identify the new faulty parameter values to then adapt the controller’s design to achieve fully fault-tolerant closed loop control. A two-part survey on fault diagnosis and fault-tolerant techniques in control can be found in [22,23]. In contrast, the author of [24] offers a complete survey on the topics of fault detection and fault-tolerant control for NCSs. Another survey on fault diagnosis for NCSs can be found in [25], which aims to reduce performance degradation due to communication features. In [26], a fault-detection filter subject to limited transmission through a network with time-varying latency and fading was successfully designed. A Bayesian approach was used instead in [27] for NCS fault diagnosis in an irrigation canal application, while in [28] the authors used a Markov jumping linear system (MJLS) approach for the design of a residual generator. NCS robust fault-tolerant control is also an alternative, which was subsequently considered, for example, in [29]; faults were modeled as MJLSs with incomplete transition probabilities, and LMI-based sufficient conditions were then used to ensure stability. Task allocation in a multiagent setting was presented in [30] to ensure fault tolerance through cooperation between healthy and faulty agents instead of focusing on recovering nominal performance; see also [31]. Finally, a nonlinear MPC solution subject to random network delays and packet dropout was used for fault-tolerant design control in [32].
Our first contribution is the optimal design of the control loop for a first-order unstable plant model, which applies generally due to the nature of the NCS setup. The optimal controller minimizes the sum of the powers for the network input signals u ( k ) (also the controller output) and y ( k ) (also the plant model output) in the steady state; see Figure 1. Our second contribution is a fault-detection mechanism based on the estimation of the differential entropy of the controller output signal u, as shown in Figure 1. Our third contribution is a fault-identification mechanism for the value of the plant model gain and unstable poles, once a fault has been detected, based on the controller output signal u and the received output signal y r . We present a simulated example to illustrate these contributions.
This paper is organized as follows. Section 2 presents the general assumptions, introducing the plant and AWGN channel models. Here, we also present the definition of the power of a signal in the steady state. In Section 3, we propose the optimal controller design for the power-constrained NCS control loop. In Section 4, we define the finite-time power estimation and the power constraint-based fault-detection criterion. Section 5 introduces the proposed fault-identification mechanism. In Section 6, we demonstrate the use of both the fault-detection and fault-identification mechanisms based on a simulation example. Finally, in Section 7, we summarize the present work and possible future research avenues.

2. Preliminaries

2.1. Plant, Channel, and Network Models

We next give the descriptions of the plant, channel, and network models under study.
  • Plant Model: The plant model, G ( z ) , can be described by a general model given by
    G ( z ) = G s ( z ) K p z ρ
    where K p R + , ρ > 1 , and G s ( z ) is a stable, minimum-phase transfer function (i.e., all its poles and zeros are inside the unit circle).
  • Channel Models: The AWGN channel model is described by a channel input power constraint, P, and an identically independently distributed additive Gaussian noise process, n, with zero mean and variance, σ 2 .
  • Network Model: We define the network as two AWGN channel models with an encoder and decoders, one of which is on the direct path between the controller and the plant models and one of which is on the feedback path between the plant and the controller models; see Figure 2. Depending on the channel location, we identify the additive noises as n u and n y , both of which are identically independently distributed additive Gaussian noise processes with zero means and variances, σ n u 2 and σ n y 2 , respectively. Finally, the powers of the channel input signals are denoted as u P o w 2 and y P o w 2 .
Furthermore, the setpoint signal, r o , in Figure 2 is assumed to be a constant known value.
Remark 1.
The decision to use AWGN channel models to characterize the proposed network model implies that we are considering the channel input constraints and the channel additive noises as the main network features. Other network features, such as transmission delays, quantization, and packet losses, can also be considered, but this would require the use of channel models in addition to the proposed AWGN channel model and would make the characterization of the differential entropy of the control signal, u ( k ) , which is the basis of the proposed fault-detection mechanism, more involved due to the effect of the closed loop.

2.2. Stationary Power of a Linear Time-Invariant System Output Signal

Definition 1.
From [33], we denote the power spectral density of a signal s ( k ) as S s e j ω T s .
Definition 2.
The H 2 norm of a discrete-time linear time-invariant system H is defined as
H 2 = 1 2 π π π | H ( e j ω T s ) | 2 d ω
Lemma 1
(Stationary power of an LTI system output signal). For a discrete-time linear time-invariant system H with a weakly stationary stochastic process n ( k ) at the input, mean μ n , and spectral density
S n ( e j ω T s ) = σ n 2
the variance of the noise can be determined. Ref. [34] shows that if H is stable (here, it is assumed to be stable if all its poles are inside the unit circle), then
μ s = H ( 1 ) μ n S s ( e j ω T s ) = H ( e j ω T s ) H ( e j ω T s ) S n ( e j ω T s )
and the steady-state power of the output signal is then
s P o w 2 : = lim k E s 2 = H 2 ( 1 ) μ n 2 + 1 2 π π π S s e j ω T s d ω = H 2 ( 1 ) μ n 2 + H 2 2 σ n 2
Proof. 
Since n ( k ) is a weakly stationary stochastic process and H is stable, s is also a weakly stationary stochastic process. If we define s = μ s + s ¯ , where s ¯ is a weakly stationary stochastic process with zero mean, then we have
E s 2 = μ s 2 + E s ¯ 2
Since, by its definition, the covariance function of s ¯ is equal to the covariance function of s, and because the power spectral density is the Fourier transform of the covariance function, we have that S s ( e j ω T s ) = S s ¯ ( e j ω T s ) . As we take the limit k , we obtain
s P o w 2 = μ s 2 + s ¯ P o w 2
From [34], we have (4), which, when replaced with the above expression, yields (5), which concludes this proof. □
In the next section, we use the introduced assumptions and Lemma 1 to propose the design of the NCS control loop in Figure 2.

3. Networked Control System Design

We start this section with the following lemma, which references a result from [35]; from this lemma, we begin to construct our optimal controller design proposal.
Lemma 2
(sum of convex functions). Let f i , i = 1 , , n be given convex functions and γ i be given positive scalars. Then, the function
F = γ 1 f 1 + + γ n f n
is also a convex function.
Proof. 
See [35]. □
We continue by establishing the working choices for the encoder and decoder blocks in Figure 2. The presence of these blocks is intrinsic to the NCS setup, and it is one of the reasons these types of systems require an extension, not just an application, of classic control theory results.
Lemma 3
(Encoder and decoder design). The encoder and decoder blocks in Figure 2 for the subsequent NCS design are selected as
E u = 1 , D u = G s 1 ( z ) , E y = 1 , D y = 1
where G s ( z ) is the stable, minimum-phase part of the proposed plant model; see Section 2.1.
Remark 2.
We observe that, by using Lemma 3 in Figure 2, we can focus entirely on the first-order unstable part of the plant model.
In the next lemma, we introduce some intermediate results that consider the controller, C ( z ) , to be a proportional controller; that is, C ( z ) = K c for K c R , which will be required for the optimal controller design K c * .
Lemma 4
(Convexity of closed-loop squared norms). The following squared H 2 norms are convex functions of K c , the proportional controller:
T 2 2 = K c 2 K p 2 1 ρ K c K p 2 S C 2 2 = K c 2 + K c 4 K p 2 1 ρ K c K p 2 S G 2 2 = K p 2 1 ρ K c K p 2
where T = K c K p / ( z ρ + K c K p ) is the closed-loop complementary sensitivity and S = 1 T = ( z ρ ) / ( z ρ + K c K p ) is the closed-loop sensitivity.
Proof. 
We start this proof with the squared H 2 norm of T. For a proportional controller and the simplified plant model, K p / ( z ρ ) , the complementary sensitivity is
T ( z ) = K c K p z ρ + K c K p
The squared H 2 norm of the above transfer function is then
T 2 2 = K c 2 K p 2 1 ( ρ K c K p ) 2
To obtain its critical points, we take the derivative of K c and solve
T 2 2 K c = 2 K c K p 2 ( 1 ( 1 K c K p ) ) 2 2 K c 2 K p 3 ( ρ K c K p ) ( 1 ( 1 K c K p ) 2 ) 2 = 0
After grouping the powers of K c in the numerator, we obtain
T 2 2 K c = 2 K c K p 2 ( 1 ρ 2 ) + 2 K c 2 K p 3 ρ ( 1 ( 1 K c K p ) 2 ) 2 = 0
One critical point is K c = 0 , but this solution is outside the region of K c values that ensures closed-loop stability and is thus not considered. The other critical point is K c * = ( ρ 2 1 ) / ( K p ρ ) . The second derivative is
2 T 2 2 K c 2 K c = K c * = ( 2 K p ( 1 ρ 2 ) + 4 K c * K p 3 ρ ) ( 1 ( 1 K c * K p ) 2 ) + 0 ( 1 ( 1 K c * K p ) 2 ) 3 = 2 K p 2 ρ 2 ( ρ 2 1 ) 2 > 0
Thus, K c * , the only valid critical point, is a minimum, proving that T 2 2 is a convex function. Now, for S C 2 2 , we have that
S C 2 2 = ( 1 T ) K c 2 2 = K c T K c 2 2 = K c 2 + K c 2 T 2 2
Thus, since K c 2 is a convex function of K c , we focus on the remaining part, K c 2 T 2 2 :
K c 2 T 2 2 K c = 2 K c 5 K p 4 + 6 K c 4 K p 3 ρ + 4 K c 3 K p 2 ( 1 ρ 2 ) ( 1 ( ρ K c K p ) 2 ) 2 = 0
The value K c = 0 is a critical point with a multiplicity of three, but again, it is outside the range of values required for closed-loop stability for K c . The other two potential solutions are
K c 1 * = ρ + ρ 2 ρ 2 + 8 K p , K c 2 * = ρ + ρ 2 + ρ 2 + 8 K p
but we observe that K c 2 * is outside the stability region. The second derivative at K c = K c 1 yields
2 K c 2 T 2 2 K c 2 K c = K c 1 * = 10 ( K c 1 * ) 4 K p 4 + 24 ( K c 1 * ) 3 K p 3 ρ + 12 ( K c 1 * ) 2 K p 2 ( 1 ρ 2 ) ( 1 ( ρ K c 1 * K p ) 2 ) ( 1 ( ρ K c 1 * K p ) 2 ) 3
Simplifying, we obtain
3 ρ 2 K p > K c 1 * 2 K c 1 * K p + 3 ρ > 0 2 ( K c 1 * ) 2 K p 2 + 3 K c 1 * K p ρ > 0 2 ( K c 1 * ) 2 K p 2 + 3 K c 1 * K p ρ + 3 [ ( K c 1 * ) 2 K p 2 + 3 K c 1 * K p ρ + 2 ( 1 ρ 2 ) = 0 ] > 0 5 ( K c 1 * ) 2 K p 2 + 12 K c 1 * K p ρ + 6 ( 1 ρ 2 ) > 0 10 ( K c 1 * ) 2 K p 2 + 24 K c 1 * K p ρ + 12 ( 1 ρ 2 ) > 0
Therefore, we determine that the numerator and thus the overall second partial derivative 2 K c 2 T 2 2 / K c 2 at K c = K c 1 * are positive and that the only critical point value, K c 1 * , is a minimum, which proves that K c 2 T 2 2 is a convex function of K c in the stability region; through Lemma 2, S C 2 2 is also a convex function of K c in the stability region. Finally, we focus on the term S G 2 2 . For the last squared H 2 norm expression, S G 2 2 , we have
S G 2 2 K c = K p 3 ( ρ K c K p ) ( 1 ( ρ K c K p ) 2 ) 2 = 0
The only critical point in this case is given by K c * = ρ / K p , which lies inside the K c stability region for the closed loop; when replaced in the second partial derivative, it results in
2 S G 2 2 K c 2 K c = K c * = 2 K p 4 > 0
Thus, the critical point, K c * , is a minimum, and the function S G 2 2 is convex in the K c stability region for the closed loop; this concludes the proof. □
We next use the results just obtained to show the convexity, in terms of the proportional controller, of the power expression for the NCS input signals u and y; see Figure 2.
Lemma 5
(Channel input powers). For the setup depicted in Figure 2 with K r = T 1 ( 1 ) , the channel input powers are
u P o w 2 = ( 1 ρ ) 2 K p 2 r o 2 + T 2 2 σ n u 2 + S C 2 2 σ n y 2 y P o w 2 = r o 2 + S G 2 2 σ n u 2 + T 2 2 σ n y 2
and they are both convex functions of K c , the proportional controller.
We are now ready to use all the previous intermediate results to present the optimal design of the proportional controller, which minimizes the sum of the channel input powers.
Proof. 
According to Figure 2 and Lemma 3, the signals at the respective channel inputs are
u = z ρ K p r o T ( z ) n u S ( z ) C ( z ) n y y = r o + S ( z ) G ( z ) n u T ( z ) n y
We then apply Lemma 1 for z = u and for z = y and obtain the expressions in Equation (9). Finally, since all the squared H 2 elements of Equation (9) are convex functions of K c as in Lemma 4, together with Lemma 2, it is shown that the channel input powers in Equation (9) are convex functions of K c , which concludes this proof. □
Theorem 1
(NCS controller design). The proportional controller, K c , is designed so that
K c * = a r g m i n K c η u P o w 2 + ( 1 η ) y P o w 2
with 0 < η < 1 , and its optimal value is the unique solution, in the K c stability region ( ρ 1 ) / K p , ( ρ + 1 ) / K p for the closed loop, of the following polynomial:
a 4 K c 4 + a 3 K c 3 + a 2 K c 2 + a 1 K c + a 0 = 0 a 4 = 2 K p 3 ρ a 3 = 9 K p 2 ρ 2 η σ n y 2 a 2 = 2 K p 3 ρ η σ n u 2 + 2 K p 3 ρ ( 1 η ) + ( 8 K p ρ 8 K p ρ 3 ) η σ n y 2 a 1 = 2 K p 2 ( 1 ρ 2 ) η + K p 2 ( 1 η ) σ n u 2 + 2 K p 2 ( 1 ρ 2 ) ( 1 η ) + ( 1 ρ 2 ) 2 η σ n y 2 a 0 = 2 K p 3 ρ ( 1 η ) σ n u 2
Proof. 
From Lemma 5, we have that
η u P o w 2 + ( 1 η ) y P o w 2 = η ( 1 ρ ) 2 K p 2 r o 2 + T 2 2 σ n u 2 + S C 2 2 σ n y 2 + ( 1 η ) r o 2 + S G 2 2 σ n u 2 + T 2 2 σ n y 2
According to Lemma 2, this is a convex function of K c , thus characterizing the critical point of the above functional results in obtaining the optimal K c * that minimizes the linear combination of channel input powers. We then take the partial derivative of K c , which results in the polynomial a 4 K c 4 + a 3 K c 3 + a 2 K c 2 + a 1 K c + a 0 = 0 , with coefficients defined as in (11). Since the proposed functional is convex in K c , there is only one critical point in the K c stability region for the closed loop, which concludes this proof. □
Remark 3.
If the plant pole ρ (see (1)) is stable, that is, if | ρ | < 1 , then the minimal channel input powers u P o w 2 and y P o w 2 will be zero, and the optimal controller K c * from Theorem 1 will also then be equal to zero, nevertheless resulting in a stable closed loop (although it is technically open if the controller is zero). The fault-detection and fault-identification mechanisms described in the next sections will be applicable as long as a non-zero suboptimal controller is in place for ρ < 1 to effectively close the loop.
Remark 4.
Due to the standing assumptions regarding r o , the choice of K r in Figure 2, and the relationship between stationary power and signal variance, we have that the NCS controller design proposed in Theorem 1, which minimizes the network input power, can also be interpreted as a minimal-input-entropy controller design.
The optimal controller design from Theorem 1 results in a stable closed loop, and we now wish to extend its analysis to the case with faults on the two main parameters involved in the optimal controller design, namely, the gain, K p , and the plant unstable pole, ρ . We obtain two contributions: a fault-detection mechanism and a fault-identification mechanism. Therefore, we continue by presenting the proposed fault-detection mechanism in the next section.

4. Fault-Detection Mechanism

The signal u is assumed to be available because it is the result of signal processing through the controller, as shown in Figure 1. On the other hand, the availability of the signal y r requires the assumption of an added sensor at the output of the AWGN channel over the feedback path. Moreover, due to the presence of the channel additive processes n u and n y , we cannot consider the instant values of the relevant signals u and y r , as shown in Figure 1, as representative values. We therefore address this issue by using the average estimates of u and y r instead, as shown in the next lemma.
Lemma 6
(Finite time estimate). The averaged signal is obtained as
u 1 ( k ) = k L + 1 k u ( k ) L
where L satisfies
σ u 1 2 ( L ) < ϵ
for a user-defined tolerance value ϵ.
Proof. 
Lemma 5 shows that
μ u = lim k E { u } = K p 1 ρ r o
In a stationary state, we then have that u 1 , as defined in (12), will approach μ u as L and σ u 1 2 ( L ) 0 since μ u is a constant value, which shows that there will always be a suitable finite value of L for any given choice of tolerance ϵ , which concludes this proof. □
Remark 5.
The use of the previous lemma extends in exactly the same way for signal y r , for which y r 1 represents the L average. However, such a signal is only required for the fault-identification mechanism that we propose in the next section.
Remark 6.
The application of Lemma 6 is based on a Monte Carlo simulation of the NCS-designed control closed loop in steady state with no faults. The selected value of L, through the choice of ϵ, will be a user-selected trade-off between the successful rejection of the noise processes (the larger the L value is, the better) and the responsiveness to the presence of faults (the smaller the L value is, the better).
We now present our proposed fault-detection mechanism in the following theorem.
Theorem 2
(fault-detection mechanism). Given the setup in Figure 2 for the NCS defined by Lemma 3, with the controller designed as in Theorem 1, the fault flag signal, F F ( k ) , is defined as
F F ( k ) = 1 , h ^ ( u ) h ( u ) > δ 0 , h ^ ( u ) h ( u ) δ
where
h ^ ( u ) = 1 2 log 2 2 π e u 2 u 1 2
is the estimated differential entropy of the signal u ( k ) , with the time estimate u 1 defined in Lemma 6 and u 2 defined as
u 2 ( k ) = k L + 1 k u 2 ( k ) L
Additionally,
h ( u ) = 1 2 log 2 2 π e T 2 2 σ n u 2 + S C 2 2 σ n y 2
is the theoretical differential entropy of the signal u ( k ) in the steady state when no fault is present. The fault level, δ, is user defined, and it is selected as 2 σ h ^ , which is twice the standard deviation of the estimated differential entropy of u ( k ) when no fault is present.
Proof. 
From [36] and the fact that the signal u ( k ) in Figure 2 is a filtered sum of the driving Gaussian processes n u and n y , we have
h ( u ) = 1 2 log 2 2 π e σ u 2
where σ u 2 is the variance of the signal u. From Lemma 5, we have
σ u 2 = E { u 2 } μ u 2 = T 2 2 σ n u 2 + S C 2 2 σ n y 2
which results in the proposed expression for h ( u ) presented in (17). □
Remark 7.
We observe that the selection of δ in Theorem 2 is a compromise between false negative errors (not detecting a fault when one is present) and false positive errors (detecting a fault when one is not present). If the selected δ value is smaller, then more false positive errors will be detected. If the selected δ value is greater, then more false negative errors will be detected.
Remark 8.
The use of differential entropy for the proposed fault-detection mechanism is motivated by the presence of the AWGN channel and is also a reasonable choice because it introduces a logarithmic scale (base 2 in this case) for the channel input variance, which can otherwise report very large excursions when subjected to faults, as we will observe in the following sections. Moreover, if we select η = 1 in Theorem 1 for the NCS controller design, we can then address the minimal h ( u ) in (17).
After a fault has been detected by means of Theorem 2, the next step is to estimate its value, that is, to identify it. The next section focuses on this goal.

5. Fault-Identification Mechanism

The faults that the control loop might be subject to are involved in the plant model gain, K p , or the unstable pole ρ . Additionally, due to the NCS nature of the proposed closed control loop in Figure 2, for the fault-identification mechanism we only stipulate that we have access to the signals u and y r . That is, we only stipulate access to signals on the controller side of the network (otherwise, transmission through a communication channel would be required); see Figure 1.
As a first step in identifying the detected faults, as described in the previous section, we consider the online estimation of the plant parameters K p and ρ .
Lemma 7
(Plant parameter estimation). From Figure 1, assuming the online availability of signals u ( k ) and y r ( k ) and a selected value of L from Lemma 6, we obtain
α ( k ) = y r 1 ( k ) K r r o β ( k ) = u 2 ( k ) u 1 ( k ) 2 ( K c * ) 2 σ n y 2 ( σ n u 2 + ( K c * ) 2 σ n y 2 ) α ( k )
and the plant parameter estimates are
K ^ p ( k ) = 2 α ( k ) β ( k ) K c * α 2 ( k ) + β ( k ) ρ ^ ( k ) = 1 + 2 β ( k ) α ( k ) 1 α 2 ( k ) + β ( k )
Proof. 
We first observe that
y r 1 ( k ) T ( 1 ) K r r o
where y r 1 ( k ) is the L-length finite-time estimation of the steady-state value of y r . From this, we obtain
α ( k ) = y r 1 ( k ) K r r o
On the other hand, we have
u 2 ( k ) u 1 2 ( k ) ( K c * ) 2 σ n y 2 σ n u 2 + ( K c * ) 2 σ n y 2 T 2 2
and thus
u 2 ( k ) u 1 2 ( k ) ( K c * ) 2 σ n y 2 σ n u 2 + ( K c * ) 2 σ n y 2 ( K c 2 ) K p 2 1 ρ c 2 = α ( k ) β ( k )
With these two intermediate results, after algebraic manipulation we obtain the estimate expressions in (19), which concludes this proof. □
We now use Lemma 7, together with the fault-detection mechanism from the previous section, to identify the fault. We provide this result in the next theorem.
Theorem 3
(fault-identification mechanism). The values of the plant fault parameters are identified as
F K p ( k ) = K ^ p ( k ) , | K p K ^ p ( k ) | 2 σ K p F F = 1 K p , | K p K ^ p ( k ) | < 2 σ K p F F = 1 K p , F F = 0
for the plant parameter, K p , where σ K p is the standard deviation of the plant gain estimation when no fault is present and
F ρ ( k ) = ρ ^ ( k ) , | ρ ρ ^ ( k ) | 2 σ ρ F F = 1 ρ , | ρ ρ ^ ( k ) | < 2 σ ρ F F = 1 ρ , F F = 0
for the plant parameter ρ, where σ ρ is the standard deviation of the unstable plant pole estimation when no fault is present.
Proof. 
Fault identification is the result of intersecting the estimated plant parameters K ^ p and r h o ^ from Lemma 7 with the fault flag signal F F ( k ) from Theorem 2. Whether the fault is due to K p , ρ , or a change in the values of both K p and ρ , the type of fault will be identified as long as the excursion in the value of the faulty parameter exceeds twice the standard deviation of the estimated parameter value when no fault is present. That is, we use the same approach proposed in Theorem 2, but now we validate the fault on either or both plant parameters. □
We have now finalized the theoretical development of this work, and we proceed in the next section to illustrate the proposed contributions through a simulation example summarizing all the previous key points.

6. Example

In this section, we develop an example to illustrate the contributions developed in the previous sections. We consider the plant model
G ( z ) = 2 z 3
That is, we assume for simplicity here, without loss of generality, that G s ( z ) = 1 . The setpoint signal is r o = 0.5 , and the channel additive noise variances are selected as σ n u 2 = σ n y 2 = 0.3 . The NCS proportional controller design from Theorem 1, with an equal weight η = 0.5 to equally weight the power contribution of each channel input, results in K c * = 1.2921 . The plant model parameters, and thus the closed control loop, are subject to the following changes for K p :
K p f 1 = 0.3 · 10 3 k + 3.5 5001 k < 6000 1.7 6001 k < 11000 0.3 · 10 3 k 1.6 11001 k < 12000 K p f 2 = 0.7 · 10 3 k 18.3 29001 k < 30000 2.7 30001 k < 35000 0.7 · 10 3 k + 27.2 35001 k < 36000
For ρ ,
ρ f 1 = 1.2 · 10 3 k + 23.4 17001 k < 18000 1.8 18001 k < 23000 1.2 · 10 3 k 25.8 23001 k < 24000 ρ f 2 = 10 3 k 26 29001 k < 30000 4 30001 k < 35000 10 3 k + 39 35001 k < 36000
We then propose a first fault on the value of K p starting at k = 5001 and lasting until k = 12,000, a second fault due to ρ starting at k = 17,001 and lasting until k = 24,000, and a third and final fault due to a simultaneous change in the values of K p and ρ starting at k = 29,001 and ending at k = 36,000.
The first step is the selection of L as a compromise between the rejection of the two noise processes and responsiveness to the faults. In Figure 3, we show a Monte Carlo simulation of two hundred simulations of u 1 at k o = 3000 for each value of L, in steps of ten. The red dashed line is the steady-state predicted value, μ u , and the black dash-dotted lines are the variances of the two hundred simulations at each value of L around the mean value. As predicted, the variance decreases as L increases. From Figure 3, the choice of L = 300 is considered a good compromise, and it is the value used in the following steps. The proposed selection is compatible with a tolerance value of ϵ = 0.04 .
As a second step, focusing on Theorem 2, we provide the estimate h ^ ( u ) (solid green line) and propose from the same figure a choice of δ that is twice the standard deviation of the observed h ^ ( u ) , which in this case amounts to δ = 0.12 . Therefore, any increase in the estimated differential entropy, u ^ , of more than 0.12 from the base value, h ( u ) , represented by the red dashed line in Figure 4, is registered as a fault.
We now test the proposed fault-detection mechanism for the designed NCS closed control loop, with the faults described in (21) and (22). In Figure 5, the three proposed faults can be clearly observed. With the selected value of δ , there will be small instances of false negative errors for K p f 1 around k = 8600 and for ρ f 1 around k = 19,600. However, no false negative errors are present for simultaneous faults K p f 2 and ρ f 2 . The choice of δ also triggers some instances of false positive errors around k = 1000 , k = 16,000, k = 25,000, and k = 39,000. This is the expected trade-off between false positive errors and false negative errors for any fault-detection mechanism.
The next step is to couple the fault-detection mechanism of Theorem 2 with the fault-identification mechanism from Theorem 3. The result for K p , subject to the proposed faults, is shown in Figure 6. We observe that the inclusion of further discrimination by means of the estimated standard deviation σ K p , represented by the black dashed line, reduces the effect of false negative errors and false positive errors. Moreover, during the second fault, starting at k = 17,001, which is due only to a change in ρ , the introduction of the σ K p -based discriminant in Theorem 3 allows the plant model gain to remain at the correct value, K p = 2 .
We conclude the example by reviewing the estimation of the unstable plant pole value, ρ , subject to the faults in Figure 7 (green solid line). As we can see, the introduction of the standard deviation discriminant, σ ρ , was not as successful as for the plant model gain in avoiding a noisy estimation during the first fault starting at k = 5001 , even though this first fault is only due to a change in the value of k p . Moreover, during the second fault, due only to a change in the value of the unstable plant pole, a false negative error is still present in the proposed identification at approximately k = 20,000. Nevertheless, some instances of false negative errors were suppressed between the first and second faults and at the end of the simulation run.
Finally, we observe that Figure 6 and Figure 7 together demonstrate accurate detection and identification of the faults we introduced into the closed control loop.

7. Conclusions

In this work, we propose an optimal NCS design subject to a network of simultaneous power-constrained AWGN channels over direct and feedback paths. The optimal controller design is then the foundation of a differential entropy estimation fault-detection mechanism. The use of differential entropy is justified by the presence of the AWGN channel and is also reasonable since it introduces a logarithmic scale on the channel over the direct-path input variance, which can otherwise result in very large excursions when subjected to faults, as observed in the provided example. The last contribution is a fault-identification mechanism restricted to the signals available on the controller side of the network, namely, u and y r . A limitation of the proposed fault-detection method is the trade-off imposed by the choice of L. The smaller the value of L is, the larger the value of δ is because of u 1 and u 2 , and vice versa. Since the value of δ determines the sensitivity of the fault-detection mechanism, an experienced user must strike the right compromise between these two design parameters. Additionally, as a future research direction, the imposed side restriction signal availability, due to the NCS nature of the closed control loop, can be explored to improve the use of signals on the plant side of the network in the design of a fault-detection/identification mechanism. Finally, once the faults are successfully identified, they should be used for retuning the optimal controller in an adaptive scheme that allows for fault recovery.

Funding

This research was funded by ANID Fondecyt Regular grant number 1230777 and ANID Basal Project AC3E grant number FB0008.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The author declares no conflicts of interest.

References

  1. Levine, W.S.E. The Control Handbook; CRC Press: Boca Raton, FL, USA, 1996. [Google Scholar]
  2. Du, B.; Xu, Q.; Zhang, J.; Tang, Y.; Wang, L.; Yuan, R.; Yuan, Y.; An, J. Periodic Intermittent Adaptive Control with Saturation for Pinning Quasi-Consensus of Heterogeneous Multi-Agent Systems with External Disturbances. Entropy 2023, 25, 1266. [Google Scholar] [CrossRef]
  3. Cetinkaya, A.; Ishii, H.; Hayakawa, T. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses. Entropy 2019, 21, 210. [Google Scholar] [CrossRef]
  4. Qin, C.; Wu, Y.; Zhang, J.; Zhu, T. Reinforcement Learning-Based Decentralized Safety Control for Constrained Interconnected Nonlinear Safety-Critical Systems. Entropy 2023, 25, 1158. [Google Scholar] [CrossRef] [PubMed]
  5. Zhang, Y.; Jia, Y.; Chai, T.; Wang, D.; Dai, W.; Fu, J. Data-Driven PID Controller and Its Application to Pulp Neutralization Process. IEEE Trans. Control. Syst. Technol. 2018, 26, 828–841. [Google Scholar] [CrossRef]
  6. Nair, G.; Evans, R. Stabilizability of stochastic linear systems with finite feedback data rates. SIAM J. Control Optim. 2004, 43, 413–436. [Google Scholar] [CrossRef]
  7. Martins, N.; Dahleh, M. Feedback Control in the Presence of Noisy Channels: “Bode-Like” Fundamental Limitations of Performance. IEEE Trans. Autom. Control 2008, 53, 1604–1615. [Google Scholar] [CrossRef]
  8. Elia, N. When Bode Meets Shannon: Control Oriented Feedback Communication Schemes. IEEE Trans. Autom. Control 2004, 49, 1477–1488. [Google Scholar] [CrossRef]
  9. Braslavsky, J.; Middleton, R.; Freudenberg, J. Feedback Stabilisation over Signal-to-Noise Ratio Constrained Channels. IEEE Trans. Autom. Control 2007, 52, 1391–1403. [Google Scholar] [CrossRef]
  10. Rojas, A. Signal-to-noise ratio fundamental limitations in the discrete-time domain. Syst. Control Lett. 2012, 61, 55–61. [Google Scholar] [CrossRef]
  11. da Silva, J., Jr.; Lages, W.; Sbarbaro, D. Event-triggered PI control design. In Proceedings of the 19th IFAC World Congress, Cape Town, South Africa, 24–29 August 2014; pp. 6947–6952. [Google Scholar]
  12. Campos-Delgado, D.U.; Rojas, A.J.; Luna-Rivera, J.M.; Gutiérrez, C.A. Event-triggered feedback for power allocation in wireless networks. IET Control Theory Appl. 2015, 9, 2066–2074. [Google Scholar] [CrossRef]
  13. Ma, Y.; Gu, C.; Liu, Y.; Yu, L.; Tang, W. Event-Triggered Bounded Consensus Tracking for Second-Order Nonlinear Multi-Agent Systems with Uncertainties. Entropy 2023, 25, 1335. [Google Scholar] [CrossRef]
  14. Zhao, J.; Wang, Y.; Gao, P.; Li, S.; Peng, Y. Synchronization of Complex Dynamical Networks with Stochastic Links Dynamics. Entropy 2023, 25, 1457. [Google Scholar] [CrossRef] [PubMed]
  15. Gertler, J. Fault Detection and Diagnosis in Engineering Systems; Marcel Dekker: New York, NY, USA, 1998. [Google Scholar]
  16. Chen, J.; Patton, R.J. Robust Model-Based Fault Diagnosis for Dynamic Systems; Kluwer Academic Publishers: London, UK, 1999. [Google Scholar]
  17. Blanke, M.; Kinnaert, M.; Lunze, J.; Staroswiecki, M. Diagnosis and Fault-Tolerant Control; Springer: Berlin, Germany, 2003. [Google Scholar]
  18. Saberi, A.; Stoorvogel, A.A.; Sannuti, P. Filtering Theory: With Applications to Fault Detection, Isolation, and Estimation; Birkhauser: Basel, Switzerland, 2007. [Google Scholar]
  19. Varga, A. Solving Fault Diagnosis Problems: Linear Synthesis Techniques; Studies in Systems, Decision and Control; Springer: Berlin/Heidelberg, Germany, 2017. [Google Scholar]
  20. Ding, S.X.; Frank, P.M.; Ding, E.L.; Jeinsch, T. A unified approach to the optimizaton of fault detection systems. Int. J. Adapt. Control Signal Process. 2000, 14, 725–745. [Google Scholar] [CrossRef]
  21. Saberi, A.; Stoorvogel, A.A.; Sannuti, P.; Niemann, H. Fundamental problems in fault detection and identification. Int. J. Robust Nonlinear Control 2000, 10, 1209–1236. [Google Scholar] [CrossRef]
  22. Gao, Z.; Cecati, C.; Ding, S.X. A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part I: Fault Diagnosis with Model-Based and Signal-Based Approaches. IEEE Trans. Ind. Electron. 2015, 62, 3757–3767. [Google Scholar] [CrossRef]
  23. Gao, Z.; Cecati, C.; Ding, S.X. A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part II: Fault Diagnosis with Knowledge-Based and Hybrid/Active Approaches. IEEE Trans. Ind. Electron. 2015, 62, 3768–3774. [Google Scholar] [CrossRef]
  24. Ding, S. A survey of fault-tolerant networked control system design. In Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, Mexico City, Mexico, 29–31 August 2012; pp. 874–885. [Google Scholar]
  25. Aubrun, C.; Sauter, D.; Yame, J. Fault diagnosis of networked control systems. Int. J. Appl. Math. Comput. Sci. 2008, 18, 525–537. [Google Scholar] [CrossRef]
  26. Ren, W.; Sun, S.; Hou, N.; Kang, C. Event-triggered non-fragile h infinity fault detection for discrete time-delayed nonlinear systems with channel fadings. J. Frankl. Inst. 2018, 355, 436–457. [Google Scholar] [CrossRef]
  27. Lami, Y.; Lefevre, L.; Lagreze, A.; Genon-Catalot, D. A Bayesian Approach for Fault Diagnosis in an Irrigation Canal. In Proceedings of the 24th International Conference on System Theory, Control and Computing, Sinaia, Romania, 8–10 October 2020; pp. 328–335. [Google Scholar]
  28. Li, W.; Zhu, Z.; Ding, X. On Fault Detection Design of Networked Control Systems. In Proceedings of the 8th IFAC Symposium on Fault Detection, Supervision and Safety of Technical Processes, Barcelona, Spain, 30 June–3 July 2009; pp. 792–797. [Google Scholar]
  29. Bahreini, M.; Zarei, J. Robust fault-tolerant control for networked control systems subject to random delays via static-output feedback. ISA Trans. 2019, 86, 153–162. [Google Scholar] [CrossRef]
  30. Schenk, K.; Lunze, J. Fault-Tolerant Task Allocation in Networked Control Systems. In Proceedings of the 28th Mediterranean Conference on Control and Automation, Saint-Raphael, France, 15–18 September 2020; pp. 313–318. [Google Scholar]
  31. Wang, B.; Zhang, B.; Su, R. Optimal Tracking Cooperative Control for Cyber-Physical Systems: Dynamic Fault-Tolerant Control and Resilient Management. IEEE Trans. Ind. Inform. 2021, 17, 158–167. [Google Scholar] [CrossRef]
  32. Wang, T.; Gao, H.; Qiu, J. A Combined Fault-Tolerant and Predictive Control for Network-Based Industrial Processes. IEEE Trans. Ind. Electron. 2016, 63, 2529–2536. [Google Scholar] [CrossRef]
  33. Rojas, A.; Braslavsky, J.; Middleton, R. Fundamental limitations in control over a communication channel. Automatica 2008, 12, 3147–3151. [Google Scholar] [CrossRef]
  34. Åström, K. Introduction to Stochastic Control Theory; Academic Press: Cambridge, MA, USA, 1970. [Google Scholar]
  35. Bertesekas, D.P. Convex Optimzation Theory; Athena Scientific: Nashua, NH, USA, 2009. [Google Scholar]
  36. Cover, T.; Thomas, J. Elements of Information Theory; John Wiley & Sons: Hoboken, NJ, USA, 1991. [Google Scholar]
Figure 1. NCS SISO feedback loop with residual generator and fault-detection stages.
Figure 1. NCS SISO feedback loop with residual generator and fault-detection stages.
Entropy 26 00259 g001
Figure 2. NCS SISO feedback loop with an AWGN network.
Figure 2. NCS SISO feedback loop with an AWGN network.
Entropy 26 00259 g002
Figure 3. Monte Carlo simulation of u 1 ( k o ) as a function of L for k o = 3000 (blue dots), predicted mean value μ u (red dashed line), and variance of u 1 ( k o ) as a function of L (black dash-dotted line).
Figure 3. Monte Carlo simulation of u 1 ( k o ) as a function of L for k o = 3000 (blue dots), predicted mean value μ u (red dashed line), and variance of u 1 ( k o ) as a function of L (black dash-dotted line).
Entropy 26 00259 g003
Figure 4. Estimated differential entropy of the signal u ( k ) , when no faults are present, for the selected value of L = 300 (green solid line), no-fault theoretical value (red dashed line), and no-fault theoretical value plus two standard deviations (black dash-dotted lines).
Figure 4. Estimated differential entropy of the signal u ( k ) , when no faults are present, for the selected value of L = 300 (green solid line), no-fault theoretical value (red dashed line), and no-fault theoretical value plus two standard deviations (black dash-dotted lines).
Entropy 26 00259 g004
Figure 5. Estimated differential entropy of the signal u ( k ) , when faults in (21) and (22) are present, for the selected value of L = 300 (green solid line), no-fault theoretical value (red dashed line), and no-fault theoretical value plus two standard deviations (black dash-dotted lines).
Figure 5. Estimated differential entropy of the signal u ( k ) , when faults in (21) and (22) are present, for the selected value of L = 300 (green solid line), no-fault theoretical value (red dashed line), and no-fault theoretical value plus two standard deviations (black dash-dotted lines).
Entropy 26 00259 g005
Figure 6. Estimated value of the plant gain parameter K p for the selected value of L = 300 (green solid line), true parameter value (red dashed line), standard deviation σ k p (black dash-dotted line), and reported fault flag (black solid line at the bottom).
Figure 6. Estimated value of the plant gain parameter K p for the selected value of L = 300 (green solid line), true parameter value (red dashed line), standard deviation σ k p (black dash-dotted line), and reported fault flag (black solid line at the bottom).
Entropy 26 00259 g006
Figure 7. Estimated value of the plant gain parameter, ρ , for the selected value of L = 300 (green solid line), true parameter value (red dashed line), standard deviation σ ρ (black dash-dotted line), and reported fault flag (black solid line at the bottom).
Figure 7. Estimated value of the plant gain parameter, ρ , for the selected value of L = 300 (green solid line), true parameter value (red dashed line), standard deviation σ ρ (black dash-dotted line), and reported fault flag (black solid line at the bottom).
Entropy 26 00259 g007
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rojas, A.J. Differential Entropy-Based Fault-Detection Mechanism for Power-Constrained Networked Control Systems. Entropy 2024, 26, 259. https://doi.org/10.3390/e26030259

AMA Style

Rojas AJ. Differential Entropy-Based Fault-Detection Mechanism for Power-Constrained Networked Control Systems. Entropy. 2024; 26(3):259. https://doi.org/10.3390/e26030259

Chicago/Turabian Style

Rojas, Alejandro J. 2024. "Differential Entropy-Based Fault-Detection Mechanism for Power-Constrained Networked Control Systems" Entropy 26, no. 3: 259. https://doi.org/10.3390/e26030259

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop