Next Article in Journal
Neural Network Sliding Model Control of Radial Translation for Magnetically Suspended Rotor (MSR) in Control Moment Gyro
Previous Article in Journal
Ferroelectret Polypropylene Foam-Based Piezoelectric Energy Harvester for Different Seismic Mass Conditions
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Integrated Security Control for Nonlinear CPS with Actuator Fault and FDI Attack: An Active Attack-Tolerant Approach

1
College of Intelligent Manufacturing, Longdong University, Qingyang 745000, China
2
College of Electrical and Information Engineering, Lanzhou University of Technology, Lanzhou 730050, China
*
Author to whom correspondence should be addressed.
Actuators 2023, 12(5), 216; https://doi.org/10.3390/act12050216
Submission received: 10 April 2023 / Revised: 10 May 2023 / Accepted: 17 May 2023 / Published: 22 May 2023
(This article belongs to the Section Control Systems)

Abstract

:
This paper investigated the co-design problem of less conservative integrated security control and communication for a nonlinear cyber-physical system (CPS) with an actuator fault and false data injection (FDI) attacks. Firstly, considering the efficient utilisation and allocation of computing and communication resources, an integrated framework was proposed from the perspective of active defence against FDI attacks. Secondly, the actuator fault and FDI attacks were augmented as a vector, and a robust observer was proposed to estimate the system state, actuator fault and FDI attacks. Furthermore, based on the obtained estimation results and the location of the FDI attack in the dual-end network, we designed an integrated security control strategy of active attack tolerance and active fault tolerance and, by constructing Lyapunov–Krasovskii functions and using time-delay system theory and the affine Bessel–Legendre inequality, a less conservative co-design method for integrated security control and network communication resource saving was developed. Finally, a simulation experiment of a quadruple tank was carried out to demonstrate the effectiveness of the proposed method.

1. Introduction

A cyber-physical system (CPS) integrates information processing, real-time data transmission and remote precision control, and is widely used in large-scale critical systems such as smart factories, micro-grids and health management [1]. These systems play a decisive role in social production and daily life. However, the complexity and networking of CPS components mean that it is exposed to certain risks and challenges. Large-scale distributed physical components are not only more prone to fault-inducing factors, but complex and open network environments are also more vulnerable to malicious attacks. The issues of how to optimise, distribute and efficiently utilise multi-agents and network communication resources in a CPS to make it highly reliable are also extremely challenging topics of research [2]. In view of this, the co-design problem of integrated security control and communication resource saving for a CPS with physical faults and under cyber-attacks, giving a system with an excellent performance while saving network resources, is of profound scientific and engineering significance.
Both the CPS and the networked control system (NCS) are complex control systems, and have similarities in terms of their system frameworks, unit functions and application fields. An NCS can therefore be regarded as a sub-type of a CPS. As a product of the deep integration of physical space and cyber space, CPS security research includes the fault tolerance of the physical layer, attack tolerance of the network layer and joint handling [3,4]. There are many methods used to study the security of a CPS from the control point of view, such as fault-tolerant control [5,6], resilient consistency control [7,8,9], fault diagnosis [10] and life prediction [11,12], where fault-tolerant control theory is an important cornerstone for dealing with physical faults in a CPS. In the past decade or so, scholars have carried out extensive research into three aspects of this field: passive fault-tolerant control [13], active fault-tolerant control [14] and active–passive fault-tolerant control [15,16], and the results have been remarkable. FDI attacks are a common class of cyber attacks in CPS, and scholars have mainly studied for FDI attacks involving stability analysis [17,18,19], resilient control [20,21,22], attack detection [23,24,25], e.g., using a data-driven approach in [26], secure state estimation [27,28,29] and so on. However, there are doubtless more prospective applications that deal with FDI attacks from a defensive perspective. These can therefore be classified into passive attack tolerance and active attack tolerance based on methods of defence, and this study also uses this classification.
In the existing literature, research on integrated security control for CPS faults coexisting with attacks has only reported some preliminary results [30,31,32,33,34]. In [30], the co-design problem of active fault tolerance/passive attack tolerance and communication was studied in a CPS under a discrete event-triggered communication scheme. Based on this, in [31], an active–passive attack-tolerant control strategy was proposed for actuator FDI attack active compensation combined with sensor FDI attack passive robustness. This is a previous research study by the current authors. In [32], an intelligent generalised predictive controller was used to detect and identify faults and attacks on the NCS, and design fault and attack tolerance for faults and attacks, respectively. In [33], the co-design problem of a fault detector and estimator was adopted for a class of discrete random CPSs under the framework of an event-triggered transmission scheme. In [34], a new co-design controller mechanism was constructed to ensure the security and reliability of a CPS.
In summary, we can see that although research into CPS security control has achieved many results, there are still numerous problems. Firstly, situations in which both faults and attacks often occur simultaneously are unavoidable in a practical CPS, but research has been scarce on integrated security control for a CPS with faults and attacks, and this has been especially lacking with respect to active countermeasures against cyber-attacks. Moreover, most of the real systems are nonlinear, and nonlinear CPSs are even less studied. This paper therefore first considered the integrated security problem in a nonlinear CPS with an actuator fault and FDI attacks, i.e., the issue of how to design the observer and controller to make the coordination of CPS fault tolerance and attack tolerance possible, which is one of the motivations for carrying out research work.
Secondly, despite the large number of agents integrated into the CPS, the explosive data growth caused by increased perceived demand means that the network communication and central control unit are stretched, and few studies in the existing literature have considered the optimal allocation and efficient use of multi-agent resources; in particular, there is a lack of studies on the co-design between security control performance and communication resource saving for CPSs. Thus, this paper investigated the co-design of integrated security control and communication for nonlinear CPSs based on a discrete event-triggered communication scheme (DETCS) [35] to achieve a balance between control requirements and resource constraints, which is another motivation for conducting this research work.
Inspired by [36], this paper firstly designed an augmented observer to estimate the states, attacks and faults online, and then developed a security controller with active compensation and passive robustness for different FDI attacks. Finally, we achieved the co-design goals involving control and communication. The main contributions of this paper can be summarised as follows:
(1) In order to save computational resources while observing FDI attacks both in the side of the actuator and sensor network, the robust observer was moved to the control unit, and the integrated security control framework was established, which provides the conditions for the co-design of the subsequent control and communication.
(2) With the help of the active fault-tolerant control idea and method, an integrated security control strategy of active attack tolerance and active fault tolerance was proposed, and a closed-loop CPS model that integrates trigger conditions, actuator faults and FDI attacks was established, which lays a foundation for collaboratively solving the problem of integrated security controller feedback gain and the event trigger matrix.
(3) By constructing the Lyapunov–Krasovskii functions using the time-delay system theory, the affine Bessel–Legendre inequality and linear matrix inequality (LMI) techniques, less conservative design methods for a robust observer and a security controller were developed. Finally, this paper achieved a compromise between the CPS control performance and communication constraints in an active manner.
This paper is organised as follows. Section 2 presents a problem formulation. Section 3 and Section 4 develop a robust observer and an integrated security controller, respectively. A simulation experiment of a quadruple tank is presented in Section 5. Section 6 concludes this paper.

2. Problem Formulation

2.1. Framework of Integrated Security Control

In order to actively defend against FDI attacks and actuator faults, and to reasonably optimise the allocation of the computing power of each unit while taking into account the conservation of network communication resources and the efficient operation of the system, the integrated security control framework for a nonlinear CPS was constructed as shown in Figure 1.
As can be seen from Figure 1, the framework mainly includes a nonlinear controlled plant, intelligent sensing units (sensor, sampler, event generator), execution units (zero-order hold, actuator), control units (observer, integrated security controller) and communication networks. It should be emphasised that, in this paper, we assume that there are corresponding FDI attacks on the communication networks at both ends of the controller.
Different from reference [30,31], in this paper, in order to reduce the computational burden of the intelligent sensing unit, the observer in the original intelligent sensing unit was moved to the control unit. The advantage of this layout is that it not only reduces the computational load of the intelligent sensing unit but also makes full use of the stronger computational capability of the control unit, especially the active attack tolerance strategy, which can be used for both dual-ended FDI attacks, so that the attack tolerance capability of the system is further enhanced.
The data transmission process is as follows. Firstly, the sampler samples the sensor measurement value with equal period h and sends the sampled value to the event generator, which will determine whether the current sampled value meets the trigger condition. If it does, the sampled value will be transmitted to the control unit via the sensor side network; otherwise, it will be discarded. Secondly, the observer observe the system state, actuator fault and attacks in real time, and the integrated security controller calculates the corresponding control quantities based on the estimation results and sends the control quantities to the execution unit via the execution side network according to the pre-designed control algorithm. Finally, ZOH holds the control quantity in a non-uniform period and transmits the result of the hold to the actuator, and then the actuator applies this control quantity to the controlled plant.

2.2. System Description

The nonlinear controlled plant with FDI attacks and an actuator fault is as follows:
{ x ˙ ( t ) = i = 1 r ξ i ( θ ( t ) ) { A i x ( t ) + B i u ¯ ( t ) + E f i f ( t ) + E w i w ( t ) } y ( i k h ) = i = 1 r ξ i ( θ ( t ) ) { C i x ( i k h ) + E v i v ( i k h ) }                        
where ξ i ( θ ( t ) ) = a i ( θ ( t ) ) / i = 1 N a i ( θ ( t ) ) , ξ i ( θ ( t ) ) represents the weight ratio of each fuzzy rule, a i ( θ ( t ) ) = j = 1 N M i j ( θ j ( t ) ) , and M i j ( θ j ( t ) ) is the membership function of θ j ( t ) with respect to M i j . It is assumed that a i ( θ ( t ) ) 0   ( i = 1 , 2 , , N ) and i = 1 N a i ( θ ( t ) ) > 0 ; then, ξ i ( θ ( t ) ) 0 and  i = 1 N ξ i ( θ ( t ) ) = 1 , A i , B i , E f i , E w i , C i , E v i are the known matrices with appropriate dimension. x ( t ) R n is the system state, u ¯ ( t ) R m is the control input (the system has been subjected to an actuator-side FDI attack), w ( t ) R n w and v ( i k ) R n v denote disturbance and measurement noise, respectively, y ( i k h ) R p is the sampled value of the sensor measurement output, { i k h , k = 0 , 1 , 2 , } is the corresponding sampling moment, f ( t ) R n f is a continuously time-varying actuator fault and satisfies the derivative norm bounded constraint, i.e., f ˙ ( t ) 2 f 1 , and 2 is the L 2 norm of the vector. The FDI attacks compromise the data integrity of the CPS by tampering with the measurement data injected into the sensor or actuator.
Inspired by reference [35], this paper designed the following trigger conditions to determine whether the current measured sample value needs to be transmitted:
[ y ( i k h ) y ( t k h ) ] T Φ [ y ( i k h ) y ( t k h ) ] σ y T ( i k h ) Φ y ( i k h )
where σ [ 0 , 1 ) is the event trigger parameter, Φ is the positive symmetric matrix to be designed and y ( t k h ) R p is the sampling value of the measurement output that meets the trigger condition at the last moment and has been transmitted to the control unit. It can be seen that each sampling time satisfies i k h = t k h + l h , l { 0 , 1 , , j M * } ,   j M * = min { j |   t k h + ( j + 1 ) h t k + 1 h } . The data filtering logic of the event trigger mechanism can be interpreted as follows. If trigger condition (2) is met, the current measurement output sample value is transmitted to the control unit; otherwise, it is automatically discarded.
As can be seen from the description of the above event trigger conditions, the measured sampling data filtered by the event generator will be transmitted in a non-uniform period, the transmission interval is [ t k h , t k + 1 h ) and the transmission period is T k = t k + 1 h t k h .
It can be seen from the foregoing analysis that, for either the constant periodic observer estimation or non-uniform transmission period control, this paper deals with the design problem of a data sampling system [37] that includes a continuous controlled plant and discrete estimation or control. For such a system, the preferred analytical method is time-delay system theory [38]. It is necessary to analyse and define the delay intervals for this system.
We define the time-delay function:
τ 1 ( t ) = t t k h ,     t [ t k h , t k + 1 h )
where 0 τ 1 ( t ) < h 1 = h , h 1 is the upper bound of the delay function. In addition, τ ˙ ( t ) = 1 .

3. Design of Robust Observer

3.1. Establishment of Augmented Error System

When the double-ended network is subject to an FDI attack, the following description can be obtained:
{ u ¯ ( t k h ) = u ( t k h ) + E a a a ( t k h ) y ¯ ( t k h ) = y ( t k h ) + E s a s ( t k h )  
where a a ( t k h ) and a s ( t k h ) denote the attack values of continuous time-varying FDI attacks a a ( t ) , a s ( t ) in the side of the actuator and sensor network, respectively. u ( t k h ) denotes the actual control amount calculated by the controller, whereas u ¯ ( t k h ) denotes the control input value after being attacked by the actuator FDI attack. y ( t k h ) indicates the sampled value of the measurement output received by the control unit when it is not attacked by the sensor-side network, whereas y ¯ ( t k h ) indicates the sampled value of the measurement output actually received by the control unit after it is attacked by the sensor-side network.
In addition, E a , E s is the attack weighting matrix of appropriate dimensions, consistent with the continuous time-varying fault, and it is assumed that continuous time-varying FDI attacks satisfy the derivative norm bounded condition: a ˙ a ( t ) 2 < a ,   a ˙ s ( t ) 2 < s . 2 is the L 2 norm of the vector.
According to the delay function defined in Equation (3), Equation (4) is converted into:
{ u ¯ ( t ) = u ( t ) + E a a a ( t τ 1 ( t ) ) y ¯ ( t ) = y ( t τ 1 ( t ) ) + E s a s ( t τ 1 ( t ) ) + E v v ( t τ 1 ( t ) )  
Combining Equation (1) with Equation (5), the equation of state can be obtained in the following:
{ x ˙ ( t ) = i = 1 r ξ i ( θ ( t ) ) { A i x ˙ ( t ) + B i u ( t ) + E ¯ 1 f ¯ ( t ) + E w i w ( t ) } y ¯ ( t ) = i = 1 r ξ i ( θ ( t ) ) { C i x ( t τ 1 ( t ) ) + E ¯ 2 f ¯ ( t ) + E v i v ( t τ 1 ( t ) ) }                        
where f ¯ ( t ) = [ f T ( t )     a a T ( t τ 1 ( t ) )     a s T ( t τ 1 ( t ) ) ] T is the augmented fault vector, t [ t k h , t k + 1 h ) , E ¯ 1 = [ E f i B i E a 0 ] , E ¯ 2 = [ 0 0 Ε s ] .  A robust H observer is designed as follows:
{ x ^ ˙ ( t ) = i = 1 r j = 1 r ξ i ( θ ( t ) ) ξ j ( θ ( t ) ) { A i x ^ ( t ) + B i u ( t ) + E ¯ 1 f ¯ ^ ( t ) L j [ y ¯ ^ ( t ) y ¯ ( t ) ] } y ¯ ^ ( t ) = i = 1 r ξ i ( θ ( t ) ) [ C i x ^ ( t ) + E ¯ 2 f ¯ ^ ( t ) ]   f ¯ ^ ˙ ( t ) = j = 1 r ξ j ( θ ( t ) ) { F j [ y ¯ ^ ( t ) y ¯ ( t ) ] }
where  L j ,   F j are the state and augmented fault estimation gain matrices to be designed. The designed generalised observer in Equation (7) is essentially a Luenberger observer, and it is characterised by a decoupled estimation of state, fault and attacks. Using it, the state, fault and attacks of the system can be estimated simultaneously.
Define: e x ( t ) = x ^ ( t ) x ( t ) , e f ¯ ( t ) = f ¯ ^ ( t ) f ¯ ( t ) , e y ¯ ( t ) = y ¯ ^ ( t ) y ¯ ( t ) .
Combining Equation (6) with Equation (7), the following augmented error equation can be obtained:
{ e ˙ x ( t ) = i = 1 r j = 1 r ξ i ( θ ( t ) ) ξ j ( θ ( t ) ) [ A i e x ( t ) + E ¯ 1 e f ¯ ( t ) L j C i e x ( t τ 1 ( t ) ) L j E ¯ 2 e f ¯ ( t ) + L j E v i v ( t τ 1 ( t ) ) E w i w ( t ) ] e ˙ f ¯ ( t ) = i = 1 r j = 1 r ξ i ( θ ( t ) ) ξ j ( θ ( t ) ) [ F j C i e x ( t τ 1 ( t ) ) F j E 2 e f ¯ ( t ) + F j E v i v ( t τ 1 ( t ) ) f ¯ ˙ ( t ) ]
For the convenience of analysis, further define: e ¯ ( t ) = [ e x T ( t )     e f ¯ T ( t ) ] T ; then, the following augmented error system can be obtained according to Equation (8):
e ¯ ˙ ( t ) = i = 1 r j = 1 r ξ i ( θ ( t ) ) ξ j ( θ ( t ) ) [ A ¯ i e ¯ ( t ) B ¯ i e ¯ ( t τ 1 ( t ) )     E ¯ w i w ¯ ( t ) + L ¯ j E v i v ( t τ 1 ( t ) ) ]  
where
A ¯ i = [ A i E ¯ 1 0 0 ] , B ¯ i = L ¯ j C ¯ i ,   L ¯ j = [ L j F j ] ,   C ¯ i = [ C i E ¯ 2 ] ,   E ¯ w i = [ E w i 0 0 I ] ,   w ¯ ( t ) = [ w ( t ) f ¯ ˙ ( t ) ] .

3.2. Design Method of Robust Observer

Theorem 1: 
Under DETCS, for a nonlinear augmented error system in Equation (9) with actuator faults and FDI attacks, if there exist a symmetric positive definite matrix  P  and the appropriate dimensions matrices  X , Y j , and given positive numbers γ 1 , γ 2 , s 1 , s 2 , s 3 , h 1 such that the following matrix inequality is satisfied:
[ Π 11 Π 12 Π 13 Π 14 0 * Π 22 Π 23 Π 24 h 1 s 1 C ¯ i T Y j T * * Π 33 Π 34 0 * * * Π 44 0 * * * * h 1 s 1 P ] < 0  
  [ Π 11 ( 1 ) Π 12 ( 1 ) Π 13 ( 1 ) Π 14 ( 1 ) X * Π 22 ( 1 ) Π 23 ( 1 ) Π 24 ( 1 ) X * * Π 33 ( 1 ) Π 34 ( 1 ) X * * * Π 44 ( 1 ) X * * * * 15 s 1 23 h 1 P ] < 0
[ Π 11 + I Π 12 Π 13 Π 14 Π 15 Π 16 0 * Π 22 Π 23 Π 24 Π 25 Π 26 h 1 s 1 C ¯ i T Y j T * * Π 33 Π 34 0 0 0 * * * Π 44 0 0 0 * * * * γ 1 2 I Π 56 h 1 s 1 E v i T Y j T * * * * * Π 66 0 * * * * * * h 1 s 1 P ] < 0  
[ Π 11 ( 1 ) + I Π 12 ( 1 ) Π 13 ( 1 ) Π 14 ( 1 ) Π 15 ( 1 ) Π 16 ( 1 ) X * Π 22 ( 1 ) Π 23 ( 1 ) Π 24 ( 1 ) 0 0 X * * Π 33 ( 1 ) Π 34 ( 1 ) 0 0 X * * * Π 44 ( 1 ) 0 0 X * * * * γ 1 2 I 0 0 * * * * * γ 2 2 I 0 * * * * * * 15 s 1 23 h 1 P ] < 0  
then the error system in Equation (9) is asymptotically stable and has performance index  H  as in Equation (14). The observer gain matrix  L j  and fault estimation gain matrix  F j  can be obtained from  L ¯ j = [ L j F j ] = P 1 Y j .
e ¯ ( t ) 2 2 γ 1 2 w ¯ ( t ) 2 2 + γ 2 2 k = 0 ( t k + 1 h t k h ) v ( t k h ) 2 2
where
Π 11 = P A ¯ i + A ¯ i T P s 2 P + h 1 s 2 ( P A ¯ i + A ¯ i T P ) + h 1 s 1 A ¯ i T P A ¯ i 3 X 3 X T , Π 12 = Y j C ¯ i + s 2 P h 1 s 2 Y j C ¯ i h 1 s 2 A ¯ i T P h 1 s 1 A ¯ i T Y j C ¯ i + X 3 X T , Π 13 = 2 X 3 X T , Π 14 = 6 X 3 X T , Π 15 = Y E v i + h 1 s 2 Y j E v i + h 1 s 1 A ¯ i T Y j E v i , Π 16 = P E ¯ w i h 1 s 2 P E ¯ w i h 1 s 1 A ¯ i T P E ¯ w i , Π 22 = s 2 P + h 1 s 2 ( Y j C ¯ i + C ¯ i T Y j T ) + h 1 s 3 P + X + X T , Π 23 = 2 X + X T , Π 24 = 6 X + X T , Π 25 = h 1 s 2 Y j E v i , Π 26 = h 1 s 2 P E ¯ w i + h 1 s 1 C ¯ i T Y j T E ¯ w i ,   Π 33 = 2 ( X + X T ) , Π 34 = 6 X + X T , Π 44 = 2 ( X + X T ) , Π 56 = h 1 s 1 E v i T Y j T E ¯ w i , Π 66 = γ 2 2 I + h 1 s 1 E ¯ w i T P E ¯ w i , Π 11 ( 1 ) = P A ¯ i + A ¯ i T P s 2 P 3 X 3 X T , Π 12 ( 1 ) = Y j C ¯ i + s 2 P + X 3 X T , Π 13 ( 1 ) = 2 X 3 X T , Π 14 ( 1 ) = 6 X 3 X T , Π 15 ( 1 ) = Y j E v i , Π 16 ( 1 ) = P E ¯ w i , Π 22 ( 1 ) = h 1 s 3 P s 2 P + X + X T , Π 23 ( 1 ) = 2 X + X T , Π 24 ( 1 ) = 6 X + X T , Π 33 ( 1 ) = 2 ( X + X T ) , Π 34 ( 1 ) = 6 X + 2 X T ,   Π 44 ( 1 ) = 6 ( X + X T ) .
Proof: 
We constructed the following Lyapunov–Krasovskii function:
V ( t ) = e ¯ T ( t ) P e ¯ ( t ) + ( h 1 τ 1 ( t ) ) φ 1 T ( t ) S φ 1 ( t ) + ( h 1 τ 1 ( t ) ) τ 1 ( t ) e ¯ T ( t                     τ 1 ( t ) ) Q e ¯ ( t τ 1 ( t ) ) + ( h 1 τ 1 ( t ) ) t τ 1 ( t ) t e ¯ ˙ T ( s ) R e ¯ ˙ ( t ) d s  
where φ 1 ( t ) = e ¯ ( t ) e ¯ ( t t 1 ( t ) ) P , Q , R , S  are positive definite matrices.
Firstly, considering w ¯ ( t ) = 0 , v ( t k h ) = 0 , we will prove that the error system in Equation (9) is asymptotically stable. Differentiating V 1 ( t ) along the trajectory of the system in Equation (9), we obtain:
V ˙ ( t ) = 2 e ¯ T ( t ) P e ¯ ˙ ( t ) φ 1 T ( t ) S φ 1 ( t ) + 2 ( h 1 τ 1 ( t ) ) φ 1 T ( t ) S e ¯ ˙ ( t )       + 2 ( h 1 τ 1 ( t ) ) e ¯ T ( t τ 1 ( t ) ) Q e ¯ ( t τ 1 ( t ) ) h 1 e ¯ T ( t τ 1 ( t ) ) Q e ¯ ( t τ 1 ( t ) )               t τ 1 ( t ) t e ¯ ˙ T ( s ) R e ¯ ˙ ( t ) d s + ( h 1 τ 1 ( t ) ) e ¯ ˙ T ( s ) R e ¯ ˙ ( t )
Using the affine Bessel–Legendre inequality in [39] to deal with the integral term  t τ 1 ( t ) t e ¯ ˙ T ( s ) R e ¯ ˙ ( t ) d s of V ˙ 1 ( t ) , we can obtain
t τ 1 ( t ) t e ¯ ˙ T ( s ) R e ¯ ˙ ( t ) d s ψ 1 T ( t ) Θ ψ 1 ( t )
where
ψ 1 ( t ) = [ e ¯ T ( t ) e ¯ T ( t τ 1 ( t ) ) 1 τ 1 ( t ) Ω 0 T 1 τ 1 ( t ) Ω 1 T ] T ,   Ω 0 = t τ 1 t e ¯ ( s ) d s , Ω 1 = t τ 1 t ( 2 s t + τ 1 τ 1 1 ) e ¯ ( s ) d s ,   Θ = X H 2 + H 2 T X T τ 1 X R ¯ 1 X T ,   R ¯ 1 = diag { R 1 1 3 R 1 1 5 R 1 } , H 2 = [ I I 0 0 I I 2 I 0 I I 0 6 I ] .
Substituting the inequality in Equation (17) into V ˙ 1 ( t ) , we define
M 11 = [ I 0 0 0 ] , M 12 = [ A ¯ i B ¯ i 0 0 ] , M 13 = [ 0 I 0 0 ] , M 14 = [ I I 0 0 ] .
and then e ¯ ( t ) = M 11 ψ 1 ( t ) , e ¯ ˙ ( t ) = M 12 ψ 1 ( t ) , e ¯ ( t τ 1 ( t ) ) = M 13 ψ 1 ( t ) , φ 1 ( t ) = M 14 ψ 1 ( t ) .  Then, we can also obtain
V ˙ ( t ) ψ 1 T ( t ) [ Σ 11 + ( h 1 τ 1 ( t ) ) Σ 12 + τ 1 ( t ) Σ 13 ] ψ 1 ( t ) < 0
where
Σ 11 = 2 M 11 T P M 12 M 14 T S M 14 h 1 M 13 T Q M 13 ( X H 2 + H 2 T X T ) ,   Σ 12 = 2 M 14 T S M 12 + 2 M 13 T Q M 13 + M 12 T R M 12 , Σ 13 = X R ¯ X T .
If Σ 11 + ( h 1 τ 1 ( t ) ) Σ 12 + τ 1 ( t ) Σ 13 < 0 , then V ˙ ( t ) < 0 , meaning that the error system in Equation (9) is asymptotically stable. It can be seen from the linear convex combination lemma [40] that the necessary and sufficient condition for Σ 11 + ( h 1 τ 1 ( t ) ) Σ 12 + τ 1 ( t ) Σ 13 < 0 is:
Σ 11 + h 1 Σ 12 < 0 ,   Σ 11 + h 1 Σ 13 < 0
When w ¯ ( t ) 0 , v ( t k h ) 0   , considering the following H performance index function under zero initial conditions,
J 1 = V ˙ ( t ) + e ¯ T ( t ) e ¯ ( t ) ( γ 1 2 w ¯ T ( t ) w ¯ ( t ) + γ 2 2 v T ( t k h ) v ( t k h ) ) < 0
We define
e ¯ ( t ) = M 21 ψ ¯ 1 ( t ) , e ¯ ˙ ( t ) = M 22 ψ ¯ 1 ( t ) , e ¯ ( t τ 1 ( t ) ) = M 23 ψ ¯ 1 ( t ) , φ 1 ( t ) = M 24 ψ ¯ 1 ( t ) , ψ 1 ( t ) = M 25 ψ ¯ 1 ( t ) ,   [ v T ( t k h ) w ¯ T ( t ) ] T = M 26 ψ ¯ 1 ( t ) .
where
ψ ¯ 1 ( t ) = [ e ¯ T ( t )       e ¯ T ( t τ 1 ( t ) )       1 τ 1 ( t ) Ω 0 T       1 τ 1 ( t ) Ω 1 T     v T ( t k h )       w T ( t ) ] T , M 21 = [ I 0 0 0 0 0 ] ,   M 22 = [ A ¯ i B ¯ i 0 0 L ¯ j E ¯ w i ] , M 23 = [ 0 I 0 0 0 0 ] ,     M 24 = [ I I 0 0 0 0 ] , M 25 = [ I 0 0 0 0 0 0 I 0 0 0 0 0 0 I 0 0 0 0 0 0 I 0 0 ] ,     M 26 = [ 0 0 0 0 I 0 0 0 0 0 0 I ] .
Furthermore, we can obtain
J 1 ψ ¯ 1 T ( t ) [ Σ 21 + ( h 1 τ 1 ( t ) ) Σ 22 + τ 1 ( t ) Σ 23 ] ψ ¯ 1 ( t ) < 0
where
Σ 21 = 2 M 21 T P M 22 M 24 T S M 24 h 1 M 23 T Q M 23 + M 21 T M 21 M 25 T ( X H 2 + H 2 T X T ) M 25 γ 1 2 M 26 T M 26 , Σ 22 = 2 M 24 T S M 22 + 2 M 23 T Q M 23 ,   Σ 23 = M 25 T X R ¯ X T M 25 .
It can be seen from the linear convex combination lemma that J 1 < 0 is equivalent to
Σ 21 + h 1 Σ 22 < 0 , Σ 21 + h 1 Σ 23 < 0
The inequalities in Equations (18) and (22) are nonlinear. Here, we define R = s 1 P , S = s 2 P ,   Q = s 3 P ,   Y j = P L ¯ j . We can then expand and apply the Schur complement lemma to obtain Equations (10)–(13), i.e., these inequalities can be converted to linear matrix inequalities. Furthermore, we can use the LMI toolbox to find a feasible solution in which the parameters L ¯ j , F j to be designed can be obtained by solving L ¯ j = P 1 Y j .
We can obtain the following inequality by integrating Equation (21) between 0 and  + :
V ( + ) V ( 0 ) < 0 + e ¯ T ( t ) e ¯ ( t ) d t + γ 1 2 0 + w ¯ T ( t ) w ¯ ( t ) d t + γ 2 2 k = 0 ( t k + 1 h t k h ) v T ( t k h ) v ( t k h )
Then, the following inequality can be obtained:
0 + e ¯ T ( t ) e ¯ ( t ) d t < γ 1 2 0 + w ¯ T ( t ) w ¯ ( t ) d t + γ 2 2 k = 0 ( t k + 1 h t k h ) v T ( t k h ) v ( t k h )
i.e., e ¯ ( t ) 2 2 γ 1 2 w ¯ ( t ) 2 2 + γ 2 2 k = 0 ( t k + 1 h t k h ) v ( t k h ) 2 2 .
The relevant H performance index is therefore verified. □
Remark 1: 
Compared with Jensen’s inequality and Wirtinger’s inequality, the affine Bessel–Legendre inequality used in this paper has three advantages: (i) it significantly reduces the matrix variables and the computational complexity; (ii) because our method is less conservative, it increases the solution space; and (iii) it can be transformed into Jensen’s inequality and Wirtinger’s inequality by changing the parameter N, meaning that the method used in this paper is more general.
Remark 2: 
In the proof of Theorem 1, the constructed Lyapunov–Krasovskii function is a general expression for a time-varying delay. Even if the sampling period is non-uniform, the above Lyapunov–Krasovskii function is still applicable.

4. Design of Integrated Security Controller

4.1. Establishment of Closed-Loop Nonlinear CPS Model

Based on the system state estimation x ^ ( t k h ) and augmented fault estimation f ¯ ^ ( t k h ) obtained above, where f ¯ ^ ( t k h ) = [ f ^ T ( t k h )     a ^ a T ( t k h )     a ^ s T ( t k h ) ] T , the integrated security control strategy can be described as:
u ( t k h ) = i = 1 r j = 1 r ξ i ( θ ( t ) ) ξ j ( θ ( t ) ) [ K j x ^ ( t k h ) B j + E f i f ^ ( t k h ) E a a ^ a ( t k h ) ]
where K j is the controller gain matrix to be designed, and B j + meets ( I B i B j + ) E f i = 0 . In addition, f ^ ( t k h ) = [ I     0     0 ] f ¯ ^ ( t k h ) ,   a ^ a ( t k h ) = [ 0     I     0 ] f ¯ ^ ( t k h ) , a ^ s ( t k h ) = [ 0     0     I ] f ¯ ^ ( t k h ) can be regarded as the separation of the FDI attack on the sensor-side network. The first term in Equation (25) indicates that this controller uses the state feedback control strategy based on the state observer, whereas the last two terms indicate active compensation for the actuator fault and FDI attack on the actuator-side network. Combined with the delay function in Equation (3), the integrated security control strategy in Equation (25) can be described as:
u ( t ) = i = 1 r j = 1 r ξ i ( θ ( t ) ) ξ j ( θ ( t ) ) [ K j x ^ ( t τ 1 ( t ) ) B j + E f i f ^ ( t τ 1 ( t ) ) E a a ^ a ( t τ 1 ( t ) ) ]
Further combining Equations (1), (7) and (26), the nonlinear CPS closed-loop model can be described as
x ˙ ( t ) = i = 1 r j = 1 r ξ i ( θ ( t ) ) ξ j ( θ ( t ) ) [ A i x ( t ) B i K j x ( t τ 1 ( t ) ) B i K j e x ( t τ 1 ( t ) )     E f i e f ( t τ 1 ( t ) ) + τ 1 ( t ) E f i f ˙ ( t ) B i E a e a ( t τ 1 ( t ) ) + τ 1 ( t ) B i E a a ˙ a ( t ) + E w i w ( t ) ]  

4.2. Co-Design of Integrated Security Control and Communication

Theorem 2. 
Under DETCS, for the system in Equation (27) with an actuator fault and FDI attacks, certain positive constants γ 3 , σ , n 1 , n 2 , n 3 , m 1 , m 2 , m 3 , m 4 , m 5 , m 6 , h 1 and σ [ 0 , 1 ) , if there exist a symmetric positive definite matrix  P ¯  and the appropriate dimensions matrices  Φ , K ¯ j , Q 1 , Q 2 , Q 3 , Q 4 , Q 5 , Q 6 , Q ¯ 1 , Q ¯ 2 , Q ¯ 3 , Q ¯ 4 ,  such that the following matrix inequalities hold:
[ Π 11 ( 2 ) Π 12 ( 2 ) Π 13 ( 2 ) Π 14 ( 2 ) 0 0 * Π 22 ( 2 ) Π 23 ( 2 ) Π 24 ( 2 ) Π 25 ( 2 ) h 2 n 2 K j T * * Π 33 ( 2 ) Π 34 ( 2 ) 0 0 * * * Π 44 ( 2 ) 0 0 * * * * Π 55 ( 2 ) 0 * * * * * h 2 n 2 P ] < 0
[ Π 11 ( 3 ) Π 12 ( 3 ) Π 13 ( 3 ) Π 14 ( 3 ) X ¯ 0 * Π 22 ( 3 ) Π 23 ( 3 ) Π 24 ( 3 ) X ¯ Π 26 ( 3 ) * * Π 33 ( 3 ) Π 34 ( 3 ) X ¯ 0 * * * Π 44 ( 3 ) X ¯ 0 * * * * 15 n 2 23 h 2 P 0 * * * * * Π 66 ( 3 ) ] < 0
[ Π 11 ( 2 ) + I Π 12 ( 2 ) Π 13 ( 2 ) Π 14 ( 2 ) Π 15 ( 2 ) Π 16 ( 2 ) Π 17 ( 2 ) Π 18 ( 2 ) 0 0 0 0 * Π 22 ( 2 ) Π 23 ( 2 ) Π 24 ( 2 ) h 1 n 1 K ¯ j Π 26 ( 2 ) Π 27 ( 2 ) Π 28 ( 2 ) 0 0 h 1 2 4 ( m 3 + m 6 ) K ¯ j T h 1 n 2 K j T * * Π 33 ( 2 ) Π 34 ( 2 ) 0 0 0 0 0 0 0 0 * * * Π 44 ( 2 ) 0 0 0 0 0 0 0 0 * * * * γ 3 2 I Π 56 ( 2 ) Π 57 ( 2 ) Π 58 ( 2 ) 0 0 h 1 2 4 ( m 3 + m 6 ) K ¯ j T h 1 n 2 K j T * * * * * Π 66 ( 2 ) Π 67 ( 2 ) Π 68 ( 2 ) 0 0 0 0 * * * * * * Π 77 ( 2 ) Π 78 ( 2 ) 0 0 0 0 * * * * * * * Π 88 ( 2 ) 0 0 0 0 * * * * * * * * σ Φ 0 0 0 * * * * * * * * * Φ 0 0 * * * * * * * * * * h 1 2 4 ( m 3 + m 6 ) P ¯ 0 * * * * * * * * * * * h 1 n 2 P ¯ * ] < 0
[ Π 11 ( 3 ) + I Π 12 ( 3 ) Π 13 ( 3 ) Π 14 ( 3 ) Π 15 ( 3 ) Π 16 ( 3 ) Π 17 ( 3 ) Π 18 ( 3 ) 0 0 X ¯ 0 * Π 22 ( 3 ) Π 23 ( 3 ) Π 24 ( 3 ) 0 Π 26 ( 3 ) Π 27 ( 3 ) Π 28 ( 3 ) 0 0 X ¯ h 1 2 4 ( m 3 + m 6 ) K ¯ j T * * Π 33 ( 3 ) Π 34 ( 3 ) 0 0 0 0 0 0 X ¯ 0 * * * Π 44 ( 3 ) 0 0 0 0 0 0 X ¯ 0 * * * * γ 3 2 I Π 56 ( 3 ) Π 57 ( 3 ) Π 58 ( 3 ) 0 0 0 h 1 2 4 ( m 3 + m 6 ) K ¯ j T * * * * * Π 66 ( 3 ) Π 67 ( 3 ) Π 68 ( 3 ) 0 0 0 0 * * * * * * Π 77 ( 3 ) Π 78 ( 3 ) 0 0 0 0 * * * * * * * Π 88 ( 3 ) 0 0 0 0 * * * * * * * * σ Φ 0 0 0 * * * * * * * * 0 Φ 0 0 * * * * * * * * 0 0 15 n 2 23 h 1 P ¯ 0 * * * * * * * * 0 0 * h 1 2 4 ( m 3 + m 6 ) P ¯ ] < 0
[ Q 2 E f i T P ¯ T * Q 1 ] > 0 , [ Q 4 E f i T S ¯ * Q 3 ] > 0 , [ Q 6 E f i T R ¯ * Q 5 ] > 0 , [ Q ¯ 2 E a T B i T P ¯ T * Q ¯ 1 ] > 0 , [ Q ¯ 4 E a T B i T S ¯ * Q ¯ 3 ] > 0 , [ Q ¯ 6 E a T B i T R ¯ * Q ¯ 5 ] > 0
then system (27) is asymptotically stable and has performance index H  as given in Equation (33). The security controller gain  K j = ( P ¯ B i ) + K ¯ j  and event trigger matrix  Φ  can also be co-obtained, and the attack and fault compensation matrix  B j +  satisfies  ( I B i B j + ) E f i = 0 .
x ( t ) 2 2   γ 3 2 [ w ( t ) 2 2   + k = 0 + ( t k + 1 h t k h ) ( e x ( t k h ) 2 2 + e f ( t k h ) 2 2 + e a ( t k h ) 2 2 ) ]
where
Π 11 ( 2 ) = P ¯ A i + A i T P ¯ n 1 P ¯ + h 1 2 4 ( m 2 + m 5 ) P ¯ + h 1 n 2 A i T P ¯ A + h 1 2 4 ( m 3 + m 6 ) A i T P ¯ A i + h 1 n 1 ( P ¯ A i + A i T P ¯ ) 3 X ¯ 3 X ¯ T , Π 12 ( 2 ) = K ¯ j + n 1 P ¯ h 1 2 4 ( m 2 + m 5 ) P ¯ h 1 n 2 A i T K ¯ j h 1 2 4 ( m 3 + m 6 ) A i T K ¯ j j h 1 n 1 K ¯ j + X ¯ h 1 n 1 A i T P ¯ 3 X ¯ T , Π 13 ( 2 ) = 2 X ¯ 3 X ¯ T , Π 14 ( 2 ) = 6 X ¯ 3 X ¯ T , Π 15 ( 2 ) = K ¯ j h 2 2 4 ( m 3 + m 6 ) A i T K ¯ j h 1 n 2 A i T K ¯ j h 1 n 1 K ¯ j ,   Π 16 ( 2 ) = P ¯ E f i h 1 2 4 ( m 3 + m 6 ) A i T P ¯ E f i h 1 n 2 A i T P ¯ E f i h 1 n 1 P ¯ E f i , Π 17 ( 2 ) = P ¯ B i E a h 1 2 4 ( m 3 + m 6 ) A i T P ¯ B i E a h 1 n 1 P ¯ B i E a h 1 n 2 A i T P ¯ B i E a , Π 18 ( 2 ) = P ¯ E w i + h 1 2 4 ( m 3 + m 6 ) A i T P ¯ E w i + h 1 n 2 A i T P ¯ E w i + h 1 n 1 P ¯ E w i . Π 22 ( 2 ) = n 1 P ¯ + h 1 n 3 P ¯ + h 2 2 4 ( m 2 + m 5 ) P ¯ + h 1 n 1 ( K ¯ j + K ¯ j T ) + X ¯ + X ¯ T , Π 23 ( 2 ) = 2 X ¯ + X ¯ T , Π 24 ( 2 ) = 6 X ¯ + X ¯ T , Π 25 ( 2 ) = h 2 2 4 ( m 3 + m 6 ) K j T , Π 26 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] K ¯ j T E f i + h 1 n 1 P ¯ E f i , Π 27 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] K ¯ j T B i E a + h 1 n 1 P ¯ B i E a , Π 28 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) E w i h 1 n 1 P ¯ E w i , Π 33 ( 2 ) = 2 ( X ¯ + X ¯ T ) , Π 34 ( 2 ) = 6 X ¯ + 2 X ¯ T , Π 44 ( 2 ) = 6 ( X ¯ + X ¯ T ) , Π 55 ( 2 ) = h 2 2 4 ( m 3 + m 6 ) P ¯ , Π 56 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] K ¯ j T E f i , Π 57 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] K ¯ j T B i E a , Π 58 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) h 1 n 2 ] K ¯ j T E w i , Π 66 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] E f i T P ¯ E f i γ 3 2 I , Π 67 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] E f i T P ¯ B i E a , Π 68 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) h 1 n 2 ] E f i T P ¯ E w i , Π 77 ( 2 ) = γ 3 2 I + [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] E a T B i T P ¯ B i E a , Π 78 ( 2 ) = [ h 1 2 4 ( m 3 + m 6 ) h 1 n 2 ] E a T B i T P ¯ E w i , Π 88 ( 2 ) = γ 3 2 I + [ h 1 2 4 ( m 3 + m 6 ) + h 1 n 2 ] E w i T P ¯ E w i . Π 11 ( 3 ) = P ¯ A i + A i T P ¯ n 1 P ¯ + h 1 2 4 ( m 2 + m 5 ) P ¯ + h 1 2 4 ( m 3 + m 6 ) A i T P ¯ A i 3 X ¯ 3 X ¯ T + ( m 1 + m 4 ) P ¯ , Π 12 ( 3 ) = K ¯ j + n 1 P ¯ h 1 2 4 ( m 2 + m 5 ) P ¯ h 1 2 4 ( m 3 + m 6 ) A j T K ¯ j + X ¯ 3 X ¯ T , Π 13 ( 3 ) = 2 X ¯ 3 X ¯ T , Π 14 ( 3 ) = 6 X ¯ 3 X ¯ T , Π 15 ( 3 ) = K ¯ j h 1 2 4 ( m 3 + m 6 ) A i T K ¯ j , Π 16 ( 3 ) = P ¯ E f i h 1 2 4 ( m 3 + m 6 ) A i T P ¯ E f i , Π 17 ( 3 ) = P ¯ B i E a h 1 2 4 ( m 3 + m 6 ) A i T P ¯ B i E a , Π 18 ( 3 ) = P ¯ E w i + h 1 2 4 ( m 3 + m 6 ) A i T P ¯ E w i , Π 22 ( 3 ) = n 1 P ¯ + h 2 2 4 ( m 2 + m 5 ) P ¯ + h 1 n 3 P ¯ + h 1 n 1 ( K ¯ j + K ¯ j T ) + X ¯ + X ¯ T , Π 23 ( 3 ) = 2 X ¯ + X ¯ T , Π 24 ( 3 ) = 6 X ¯ + X ¯ T , Π 26 ( 3 ) = h 2 2 4 ( m 3 + m 6 ) K j T , Π 27 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) K ¯ j T B i E a , Π 28 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) K ¯ j T E w i , Π 33 ( 3 ) = 2 ( X ¯ + X ¯ T ) , Π 34 ( 3 ) = 6 X ¯ + 2 X ¯ T , Π 44 ( 3 ) = 6 ( X ¯ + X ¯ T ) , Π 56 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) K ¯ j T E f i , Π 57 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) K ¯ j T B i E a , Π 58 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) K ¯ j T E w i ,   Π 66 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) E f i T P ¯ E f i γ 3 2 I , Π 67 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) E f i T P ¯ B i E a , Π 68 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) E f i T P ¯ E w i , Π 77 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) E a T B i T P ¯ B i E a γ 3 2 I , Π 78 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) E a T B i T P ¯ E w i , Π 88 ( 3 ) = h 1 2 4 ( m 3 + m 6 ) E w i T P ¯ E w i γ 3 2 I .
Proof: 
The proof of Theorem 2 is similar to that of Theorem 1 and will not be repeated here. □

5. Simulation and Analysis

In order to verify the feasibility and effectiveness of the proposed method, simulation experiments were carried out using a model of a quadruple tank [41]. The model consists of four interconnected water tanks and two pumps. The schematic diagram of the quadruple-tank model is shown in Figure 2. In this simulation, x 1 , x 2 , x 3 , x 4 represent the variations in the water levels in each of the four tanks, respectively, and the observations of the variation are indicated by y 1 , y 2 , y 3 , y 4 , respectively. The inputs u ( t ) are the voltage values to the two pumps that provide water to the four tanks. The model parameters are as follows:
A 1 = [ 0.016 0 0.042 0 0 0.011 0 0.033 0 0 0.042 0 0 0 0 0.033 ] , A 2 = [ 0.022 0 0.061 0 0 0.018 0 0.049 0 0 0.064 0 0 0 0 0.049 ] , A 3 = [ 0.031 0 0.053 0 0 0.021 0 0.067 0 0 0.083 0 0 0 0 0.061 ] , A 4 = [ 0.039 0 0.106 0 0 0.0276 0 0.0826 0 0 0.107 0 0 0 0 0.0827 ] , B 1 = [ 0.083 0 0 0.063 0 0.048 0.031 0 ] , B 2 = [ 0.1246 0 0 0.093 0 0.071 0.045 0 ] , B 3 = [ 0.165 0 0 0.125 0 0.097 0.063 0 ] , B 4 = [ 0.2076 0 0 0.1576 0 0.13 0.0776 0 ] , C 1 = d i a g { 0.5 0.5 0.5 0.5 } , C 2 = d i a g { 0.48 0.48 0.48 0.48 } , C 3 = d i a g { 0.46 0.46 0.46 0.46 } , C 4 = d i a g { 0.52 0.52 0.52 0.52 } , E f 1 = [ 0.083 0 0 0.031 ] T , E f 2 = [ 0.1246 0 0 0.0464 ] T , E f 3 = [ 0.167 0 0 0.061 ] T , E f 4 = [ 0.2076 0 0 0.0774 ] T , E v 1 = [ 0.015 0 0.015 0.015 ] T , E v 2 = [ 0.0224 0 0.0224 0.0224 ] T , E v 3 = [ 0.030 0 0.025 0.027 ] T , E v 4 = [ 0.0374 0 0.031 0.0326 ] T .
A continuous time-varying fault was applied as follows:
f ( t ) = { 0 ,                                                                                                       t 200 2 + 2 sin 0.01 π ( t 200 ) ,                   200 < t 800
Assume that the actuator-side FDI attack a a ( t ) and the sensor-side FDI attack a s ( t ) are:
a a ( t ) = { 0 ,                                                                                                                       t 400 1.5 + 1.5 sin 0.01 π ( t 100 ) ,                   400 < t 800 , a s ( t ) = { 0 ,                                                                                                                       t 400 1.5 + 1.5 sin 0.01 π ( t 100 ) ,                   400 < t 800 a a ( t ) = { 0 ,                                                                                                                       t 400 1.5 + 1.5 sin 0.01 π ( t 400 ) ,                   400 < t 800 , a s ( t ) = { 0 ,                                                                                                                       t 400 1.5 + 1.5 sin 0.01 π ( t 400 ) ,                   400 < t 800
The simulation assumes that the disturbances w ( t ) and noise v ( i k ) are independent white noise processes or sequences that obey N ( 0.1 , 0.01 ) . We set the initial state x ( 0 ) = [ 4     4     2     2 ] T , the sampling period h = 0.1   s , and set E s = [ 1 1 1 1 ] T , E a = [ 1 1 ] T , σ = 0.005 .

5.1. The Values of the Correlation Matrices

Using Theorem 1, we set γ 1 = 3 ,   γ 2 = 5 , s 1 = 3 ,   s 2 = 2 , s 3 = 0.01 with the help of the Linear Matrix Inequality solver in the LMI toolbox. Then, the robust H observer gain matrices L j and F j were obtained as follows:
L 1 = [ 4.4492 0.3047 2.6222 2.1310 2.2558 1.7964 1.5927 2.4586 1.9100 0.3392 0.1144 2.1343 1.9401 0.2778 2.6108 0.3935 ] , L 2 = [ 4.6891 0.2351 2.6466 2.2772 2.5864 1.1881 1.0018 2.7719 2.0246 0.2399 0.0121 2.2520 2.0502 0.1947 2.6131 0.3686 ] , L 3 = [ 4.7322 0.6839 3.1409 2.2750 2.8477 1.1955 1.1952 2.8478 2.0814 0.3708 0.1480 2.3041 2.0578 0.4381 2.9276 0.4318 ] , L 4 = [ 4.0988 0.6492 2.7855 1.9617 2.4919 1.0127 0.9779 2.5257 1.7857 0.3335 0.1215 1.9971 1.7704 0.3871 2.5626 0.4058 ] , F 1 = [ 12.0961 4.5681 33.1856 25.6568 20.1348 1.0458 1.5564 22.7288 0.9225 0.1801 0.8008 1.0283 ] , F 2 = [ 12.0644 2.9610 36.3127 27.2078 21.2384 0.8304 1.8503 23.9117 1.0383 0.5068 0.4899 1.1282 ] , F 3 = [ 11.0602 0.0847 39.7896 28.8128 21.7328 2.2804 0.6483 24.6552 1.1248 0.5569 0.5404 1.1143 ] , F 4 = [ 9.5867 0.0230 35.4283 25.8167 18.7670 2.3510 0.3978 21.5079 1.1097 0.5618 0.5178 1.1166 ] .
Based on Theorem 2, we set n 1 = 0.1 , n 2 = 2 , n 3 = 0.5 , m 1 = m 2 = m 3 = m 4   = m 5 = m 6 = 0.1 , γ 3 = 2 ,  and the security controller gain matrix K j and the event trigger matrix Φ can also be co-obtained as follows:
Φ = d i a g { 7.9371 7.9371 7.9371 7.9371 } , K 1 = [ 6.3327 1.8456 1.1539 24.2643 0.2564 0.1090 6.1547 2.3506 ] , K 2 = [ 4.4910 1.2740 0.7919 16.5059 0.1860 0.0782 4.1440 1.6222 ] , K 3 = [ 3.0391 0.9366 0.5540 11.8244 0.0966 0.0555 3.0249 1.1272 ] , K 4 = [ 2.5078 0.7810 0.4301 9.5323 0.0768 0.0463 2.2549 0.8530 ] .

5.2. Estimation of System State, FDI Attacks and Actuator Fault

The system states and their estimation; the errors in the state estimation, the fault and its estimation; the error in the fault estimation, the FDI attacks and their estimation; and the errors in the FDI attacks estimation are shown in Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, respectively.
From these figures, it can be seen that the system state has some fluctuations when FDI attacks and the actuator fault are first added, and remains stable after 500 s, and the system state estimation error only fluctuates between ± 0.03 in Figure 3 and Figure 4. In Figure 5 and Figure 6, the actuator fault estimates only fluctuate between ± 0.1 . In Figure 7, Figure 8, Figure 9 and Figure 10, the estimation error of the actuator FDI attack fluctuates between ± 0.5 , and the sensor side FDI attack fluctuates between ± 0.1 . This shows that the augmented observer designed using the method in this paper can estimate the system states, FDI attacks and actuator fault in a timely and accurate way, and that the designed controller is able to keep the system stable quickly under the dual threat of the actuator fault and FDI attacks.

5.3. Comparison and Analysis

The output response curve of the system when the active attack and fault-tolerant control strategy of this paper is used is given in Figure 11. In order to show the superiority of the active attack-tolerant strategy, the output response curves of the system when using the method in [31] is given in Figure 12 with the same parameters as selected in this paper. The study in [31] still adopted active fault-tolerant control for faults but adopted an active-passive attack-tolerant strategy for FDI attacks (that is, active compensation for actuator FDI attacks and passive tolerance for sensor FDI attack).
Comparing Figure 11 with Figure 12, it can be seen that, from the dynamic performance point of view, the system output decays to the equilibrium position faster when using the method of this paper for the time t < 200 s . From the steady-state performance point of view, the system output eventually stays within the ± 0.5 error band when using the method in [31], whereas the system output obtained by the method proposed in this paper eventually stays in the ± 0.1 error band. Obviously, the steady-state error of the system output in [31] is relatively larger than that in this paper. Therefore, the integrated security control strategy of active tolerance for FDI attacks on the double-ended network proposed in this paper is more advantageous in improving the system performance, thus giving the CPS a higher level of security control.
Further, Table 1 shows the data transmission amounts under DETCS with different attack tolerance strategies.
In Table 1, n denotes the data transmission volume, n ¯ denotes the data transmission rate and h ¯ denotes the average data transmission period. In 800 s, 1125 data need to be transmitted under DETCS with active attack tolerance proposed in this paper, the data transmission rate is 14.1% and the average transmission period is 0.711 s. In contrast, the active–passive attack tolerance strategy proposed in [31] requires the transmission of 1249 data, with a data transmission rate of 15.6% and an average transmission period of 0.641 s. This further reveals that the active attack tolerance strategy is not only more effective than the active–passive attack tolerance method for integrated defence against FDI attacks and actuator faults, but also saves more network communication resources, thus enhancing the compromise between integrated security control and saving communication resources.

6. Conclusions

We investigated the problem of the co-design of integrated security control and communication for a nonlinear CPS experiencing an actuator fault and FDI attacks. Firstly, we proposed a framework for a nonlinear CPS with active fault tolerance and active attack tolerance under DETCS. We then established a closed-loop CPS fault/attacks model. Secondly, using time-delay system theory, the affine Bessel–Legendre inequality and the LMI technique, we derived less conservative design methods for the observer and controller, and achieved the co-design goals of integrated security control and network communication. Finally, a simulation experiment of a quadruple tank was conducted to illustrate that the proposed method can estimate the system states, actuator faults and FDI attacks quickly and accurately. The proposed approach can also save network communication resources while ensuring an excellent performance of the CPS.
The next research direction is using data-driven intelligent algorithms to achieve anomaly detection and the effective identification and separation of attacks and faults in the system, and then combining them with mechanism-based methods.

Author Contributions

Conceptualization, N.H. and N.Z.; methodology, W.L.; software, L.Z. and Y.L.; validation, L.Z., N.H. and N.Z; formal analysis, L.Z. and Y.L.; investigation, L.Z. and W.L.; resources, L.Z., N.H. and N.Z.; data curation, N.H. and N.Z; writing—original draft preparation, L.Z.; writing—review and editing, L.Z.; visualization, L.Z.; supervision, L.Z.; project administration, L.Z.; funding acquisition, L.Z. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the National Natural Science of China grant number 62163022, and Youth Science and Technology Fund of Gansu Province grant numbers 21JR1RM339, 21JR7RM192.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhang, D.; Wang, Q.G.; Feng, G.; Shi, Y.; Vasilakos, A.V. A survey on attack detection, estimation and control of industrial cyber-physical systems. ISA Trans. 2021, 116, 1–16. [Google Scholar] [CrossRef]
  2. Peng, C.; Sun, H.; Yang, M.; Wang, Y.L. A survey on security communication and control for smart grids under malicious cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1554–1569. [Google Scholar] [CrossRef]
  3. Ding, D.; Han, Q.L.; Xiang, Y.; Ge, X.; Zhang, X.M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2019, 275, 1674–1683. [Google Scholar] [CrossRef]
  4. Zhang, K.; Keliris, C.; Polycarpou, M.M.; Parisini, T. Discrimination between replay attacks and sensor faults for cyber-physical systems via event-triggered communication. Eur. J. Control. 2021, 62, 47–56. [Google Scholar] [CrossRef]
  5. Zhao, J.; Wang, X.; Liang, Z.; Li, W.; Wang, X.; Wong, P.K. Adaptive event-based robust passive fault tolerant control for nonlinear lateral stability of autonomous electric vehicles with asynchronous constraints. ISA Trans. 2021, 127, 310–323. [Google Scholar] [CrossRef] [PubMed]
  6. Wang, X.; Fei, Z.; Wang, Z.; Liu, X. Event-triggered fault estimation and fault-tolerant control for networked control systems. J. Frankl. Inst. 2019, 356, 4420–4441. [Google Scholar] [CrossRef]
  7. Shang, Y. Resilient group consensus in heterogeneously robust networks with hybrid dynamics. Math. Methods Appl. Sci. 2020, 44, 1456–1469. [Google Scholar] [CrossRef]
  8. Shang, Y. Resilient tracking consensus over dynamic random graphs: A linear system approach. Eur. J. Appl. Math. 2022, 34, 408–423. [Google Scholar] [CrossRef]
  9. Shang, Y. Median-Based Resilient Consensus Over Time-Varying Random Networks. IEEE Trans. Circuits Syst. II Express Briefs 2021, 69, 1203–1207. [Google Scholar] [CrossRef]
  10. Zhang, J.; Zhang, K.; An, Y.; Luo, H.; Yin, S. An Integrated Multitasking Intelligent Bearing Fault Diagnosis Scheme Based on Representation Learning Under Imbalanced Sample Condition. IEEE Trans. Neural Netw. Learn. Syst. 2023, 1–12. [Google Scholar] [CrossRef]
  11. Zhang, J.; Huang, C.; Chow, M.-Y.; Li, X.; Tian, J.; Luo, H.; Yin, S. A Data-model Interactive Remaining Useful Life Prediction Approach of Lithium-ion Batteries Based on PF-BiGRU-TSAM. IEEE Trans. Ind. Inform. 2023, 1–11. [Google Scholar] [CrossRef]
  12. Zhang, J.; Li, X.; Tian, J.; Jiang, Y.; Luo, H.; Yin, S. A variational local weighted deep sub-domain adaptation network for remaining useful life prediction facing cross-domain condition. Reliab. Eng. Syst. Saf. 2023, 231, 108986. [Google Scholar] [CrossRef]
  13. Li, Y.J.; Li, W. Co-design between α/H∞ fault-tolerant control of networked control system and network communication. J. Jilin Univ. (Eng. Technol. Ed.) 2016, 46, 2010–2020. [Google Scholar]
  14. Qiu, A.; Zhang, J.; Jiang, B.; Gu, J. Event-triggered sampling and fault-tolerant control co-design based on fault diagnosis observer. J. Syst. Eng. Electron. 2018, 29, 176–186. [Google Scholar] [CrossRef]
  15. Wang, J.; Li, S.Z.; Li, W. Hybrid active-passive robust fault-tolerant control for a networked control system based on an event-triggered scheme. Inf. Control. 2017, 46, 144–152. [Google Scholar]
  16. Xu, F.; Tan, J.; Wang, X.; Puig, V.; Liang, B.; Yuan, B. Mixed active/passive robust fault detection and isolation using set-theoretic unknown input observers. IEEE Trans. Autom. Sci. Eng. 2017, 15, 863–871. [Google Scholar] [CrossRef]
  17. Zuo, Z.Q.; Cao, X.; Wang, Y.J. Security control of multi-agent systems under false data injection attacks. Neurocomputing 2020, 404, 240–246. [Google Scholar] [CrossRef]
  18. Lei, L.; Yang, W.; Yang, C. Event-based distributed state estimation over a WSN with false data injection attack. IFAC Pap. 2016, 49, 286–290. [Google Scholar] [CrossRef]
  19. Huang, X.; Dong, J.X. A robust dynamic compensation approach for cyber-physical systems against multiple types of actuator attacks. Appl. Math. Comput. 2020, 380, 125–284. [Google Scholar] [CrossRef]
  20. An, L.W.; Yang, G.H. Improved adaptive resilient control against sensor and actuator attacks. Inf. Sci. 2018, 423, 145–156. [Google Scholar] [CrossRef]
  21. Sun, Z.; Xue, W.; Liu, J.; Chen, F.; Lu, X. Adaptive event-triggered resilient control of industrial cyber physical systems under asynchronous data injection attack. J. Frankl. Inst. 2022, 359, 3000–3023. [Google Scholar] [CrossRef]
  22. Chen, C.; Chen, Y.; Zhao, J.; Zhang, K.; Ni, M.; Ren, B. Data-Driven Resilient Automatic Generation Control Against False Data Injection Attacks. IEEE Trans. Ind. Inform. 2021, 17, 8092–8101. [Google Scholar] [CrossRef]
  23. Tang, B.; Yan, J.; Kay, S.; He, H. Detection of false data injection attacks in smart grid under colored gaussian noise. In Proceedings of the 2016 IEEE Conference on Communications and Network Security (CNS), Philadelphia, PA, USA, 17–19 October 2016; pp. 172–179. [Google Scholar]
  24. Xiong, X.; Hu, S.; Sun, D.; Hao, S.; Li, H.; Lin, G. Detection of false data injection attack in power information physical system based on SVM-GAB algorithm. Energy Rep. 2022, 8, 1156–1164. [Google Scholar] [CrossRef]
  25. Pang, Z.H.; Fan, L.Z.; Sun, J.; Liu, K.; Liu, G.P. Detection of stealthy false data injection attacks against networked control systems via active data modification. Inf. Sci. 2021, 546, 192–205. [Google Scholar] [CrossRef]
  26. Wu, S.; Jiang, Y.; Luo, H.; Zhang, J.; Yin, S.; Kaynak, O. An integrated data-driven scheme for the defense of typical cyber–physical attacks. Reliab. Eng. Syst. Saf. 2022, 220, 108257. [Google Scholar] [CrossRef]
  27. Hu, L.; Wang, Z.; Han, Q.L.; Liu, X. State estimation under false data injection attacks: Security analysis and system protection. Automatica 2018, 87, 176–183. [Google Scholar] [CrossRef]
  28. Li, F.F.; Tang, Y. False data injection attack for cyber-physical systems with resource constraint. IEEE Trans. Cybern. 2020, 50, 729–738. [Google Scholar] [CrossRef]
  29. Ao, W.; Song, Y.; Wen, C.; Lai, J. Finite time attack detection and supervised secure state estimation for CPSs with malicious adversaries. Inf. Sci. 2018, 451–452, 67–82. [Google Scholar] [CrossRef]
  30. Li, W.; Shi, Y.H.; Li, Y.J. Research on secure control and communication for cyber-physical systems under cyber-attacks. Trans. Inst. Meas. Control. 2019, 41, 3421–3437. [Google Scholar] [CrossRef]
  31. Zhao, L.; Li, W. Co-design of dual security control and communication for nonlinear CPS under FDI attacks. Meas. Control. 2022, 55, 767–782. [Google Scholar] [CrossRef]
  32. Yaseen, A.A.; Bayart, M. Cyber-attack detection with fault accommodation based on intelligent generalized predictive control. IFAC Pap. 2017, 50, 2601–2608. [Google Scholar] [CrossRef]
  33. Li, Y.J.; Wu, Q.E.; Peng, L. Simultaneous event-triggered fault detection and estimation for stochastic systems subject to deception attacks. Sensors 2018, 18, 321. [Google Scholar] [CrossRef]
  34. Ye, D.; Luo, S.P. A co-design methodology for cyber-physical systems under actuator fault and cyber attack. J. Frankl. Inst. 2019, 356, 1856–1879. [Google Scholar] [CrossRef]
  35. Peng, C.; Han, Q.-L.; Yue, D. To Transmit or Not to Transmit: A Discrete Event-Triggered Communication Scheme for Networked Takagi–Sugeno Fuzzy Systems. IEEE Trans. Fuzzy Syst. 2012, 21, 164–170. [Google Scholar] [CrossRef]
  36. Lu, A.Y.; Yang, G.H. Event-triggered secure observer-based control for cyber-physical systems under adversarial attacks. Inf. Sci. 2017, 420, 96–109. [Google Scholar] [CrossRef]
  37. Xiao, H.Q.; He, Y.; Wu, M.; Xiao, S.P. H∞ output tracking control for sampled-data networked control systems in T-S fuzzy model. Acta Autom. Sin. 2015, 41, 661–668. [Google Scholar]
  38. Liu, K.; Fridman, E. Wirtinger’s inequality and Lyapunov-based sampled-data stabilization. Automatica 2012, 48, 102–108. [Google Scholar] [CrossRef]
  39. Lee, W.I.; Lee, S.Y.; Park, P.G. Affine bessel-legendre inequality: Application to stability analysis for systems with time-varying delays. Automatica 2018, 93, 535–539. [Google Scholar] [CrossRef]
  40. Park, P.G.; Ko, J.W.; Jeong, C. Reciprocally convex approach to stability of systems with time-varying delays. Automatica 2011, 47, 235–238. [Google Scholar] [CrossRef]
  41. Johansson, H.K. The quadruple-tank process: A multivariable laboratory process with an adjustable zero. IEEE Trans. Control. Syst. Technol. 2000, 8, 456–465. [Google Scholar] [CrossRef]
Figure 1. Integrated security control framework for nonlinear CPS.
Figure 1. Integrated security control framework for nonlinear CPS.
Actuators 12 00216 g001
Figure 2. Schematic diagram of the quadruple-tank model.
Figure 2. Schematic diagram of the quadruple-tank model.
Actuators 12 00216 g002
Figure 3. States and their estimation.
Figure 3. States and their estimation.
Actuators 12 00216 g003
Figure 4. Estimation error of system states.
Figure 4. Estimation error of system states.
Actuators 12 00216 g004
Figure 5. Continuous time-varying fault and its estimation.
Figure 5. Continuous time-varying fault and its estimation.
Actuators 12 00216 g005
Figure 6. Fault estimation error.
Figure 6. Fault estimation error.
Actuators 12 00216 g006
Figure 7. Actuator FDI attack and its estimation.
Figure 7. Actuator FDI attack and its estimation.
Actuators 12 00216 g007
Figure 8. Estimation error of the actuator FDI attack.
Figure 8. Estimation error of the actuator FDI attack.
Actuators 12 00216 g008
Figure 9. Sensor FDI attack and its estimation.
Figure 9. Sensor FDI attack and its estimation.
Actuators 12 00216 g009
Figure 10. Estimation errors of the sensor FDI attack.
Figure 10. Estimation errors of the sensor FDI attack.
Actuators 12 00216 g010
Figure 11. System output response curve with active attack tolerance in this paper.
Figure 11. System output response curve with active attack tolerance in this paper.
Actuators 12 00216 g011
Figure 12. System output response curve with active–passive attack tolerance in [31].
Figure 12. System output response curve with active–passive attack tolerance in [31].
Actuators 12 00216 g012
Table 1. Comparison of data transmission in active and active–passive attack tolerance control.
Table 1. Comparison of data transmission in active and active–passive attack tolerance control.
Methodsn n ¯ h ¯
Active attack tolerance
in this paper
112514.1%0.711 s
Active–passive attack
tolerance in [31]
124915.6%0.641 s
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhao, L.; Li, W.; Li, Y.; Han, N.; Zheng, N. Integrated Security Control for Nonlinear CPS with Actuator Fault and FDI Attack: An Active Attack-Tolerant Approach. Actuators 2023, 12, 216. https://doi.org/10.3390/act12050216

AMA Style

Zhao L, Li W, Li Y, Han N, Zheng N. Integrated Security Control for Nonlinear CPS with Actuator Fault and FDI Attack: An Active Attack-Tolerant Approach. Actuators. 2023; 12(5):216. https://doi.org/10.3390/act12050216

Chicago/Turabian Style

Zhao, Li, Wei Li, Yajie Li, Nani Han, and Naiqin Zheng. 2023. "Integrated Security Control for Nonlinear CPS with Actuator Fault and FDI Attack: An Active Attack-Tolerant Approach" Actuators 12, no. 5: 216. https://doi.org/10.3390/act12050216

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop