Next Article in Journal
Robust Design of Deep Drawing Process through In-Line Feedback Control of the Draw-In
Next Article in Special Issue
Mobile Charging Sequence Scheduling for Optimal Sensing Coverage in Wireless Rechargeable Sensor Networks
Previous Article in Journal
A Novel Three-Phase Switched-Capacitor Five-Level Multilevel Inverter with Reduced Components and Self-Balancing Ability
Previous Article in Special Issue
A Novel Disturbance Rejection Control of Roll Channel for Small Air-to-Surface Missiles
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks

1
School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing 100083, China
2
Shunde Innovation School, University of Science and Technology Beijing, Foshan 528399, China
3
Institute of Optics and Electronics, Chinese Academy of Sciences, Chengdu 610209, China
4
Key Laboratory of Knowledge Automation for Industrial Processes of Ministry of Education, Beijing 100083, China
*
Authors to whom correspondence should be addressed.
Appl. Sci. 2023, 13(3), 1716; https://doi.org/10.3390/app13031716
Submission received: 23 December 2022 / Revised: 23 January 2023 / Accepted: 26 January 2023 / Published: 29 January 2023

Abstract

:
With the continuous development of the networked society, the ability of cyber attackers is becoming increasingly intelligent, posing a huge threat to complex cyber–physical networks (CCPNs). Therefore, how to design a security strategy for CCPNs under attack has become an urgent problem to be solved, which promotes our work. The problem of the distributed event-triggered synchronization of CCPNs in the presence of denial-of-service (DoS) attacks is investigated in this paper. Firstly, a distributed event-triggered controller is designed such that all nodes of networks are synchronized without DoS attacks by relieving the communication occupancy rate of limited bandwidths. Meanwhile, Zeno and singular triggering behaviors are excluded to illustrate the effectiveness of the proposed event-triggered strategy. Secondly, in view of the continuous switching of CCPNs topologies caused by DoS attacks, an event-triggered control (ETC) strategy is proposed to ensure the synchronization of CCPNs under DoS attacks. Meanwhile, the frequency and duration of tolerable DoS attacks that can ensure the stability of the systems are calculated. Finally, two examples are given to illustrate the effectiveness of the proposed method.

1. Introduction

With the development of complex dynamical network theory and its application in recent years, complex dynamical networks (CDNs) have become a hot research topic in many fields [1]. CDNs are composed of many nodes and edges, which are used to represent different individuals and connections between individuals. In particular, it is of great importance to investigate the connection of edges and the communication of nodes. In recent years, CDNs have been widely used to simulate many large-scale practical complex projects [2,3,4,5,6]. Many topics on CDNs have been discussed, including synchronization, propagation dynamics and fault diagnosis, control and network model [7,8,9,10,11,12,13], etc. On the other hand, complex cyber–physical networks (CCPNs) as a special type of CDNs have received extensive attention. CCPNs are multi-dimensional complex systems consisting of computing network and physical environment, which realize the integrated design of computing communication and physical systems. Therefore, it has a wide application prospect, such as medical science, transportation networks, electric power grid and manufacturing [14,15,16,17,18,19,20]. Many interesting issues on CCPNs have been intensively investigated in the literature. Specially, the synchronization problem of CCPNs has been discussed in [21,22,23,24,25].
Due to high dependence on networks, CCPNs are faced with many cyber attack threats. Typical cyber attacks main contain false data injection (FDI) attacks and denial-of-service (DoS) attacks [15,21,26,27]. Attackers use cyber attacks to interfere with the information space of the system or destroy data, which can affect the physical space of the system and even destroy the whole system. In particular, DoS attacks can block the transmission links of networks such that the transmission information received by actuators and sensors can be corrupted, thereby affecting the system performance. Many research studies have been reported on the security of cyber–physical systems (CPSs) under DoS attacks. For example, the event-triggered secure control for multi-agent systems with DoS attacks was investigated in [28,29,30,31,32,33], in which a multi-robot model was proposed in [30], keeping all six robots in a line and achieving the consensus of their position and velocity under the designed event-triggered control (ETC) strategy. The distributed controller was designed for CPSs with communication delays against attacks in [34,35,36]. Unfortunately, the above existing results only discussed the convergence of the systems based on the controller and did not investigate the strong coupling between individuals within the systems. That is, the security synchronization control has not been fully investigated for CCPNs, which have highly coupled nodes and intricate communication links, making it difficult to solve. This motivates the present work.
In this paper, a distributed event-triggered control strategy is proposed for CCPNs to update the state transmission under DoS attacks, which relieves the communication occupancy rate of limited bandwidths and achieves synchronization of all the nodes. The following are the contributions of this paper:
(1) A distributed controller is designed to achieve all nodes of CCPNs are synchronized under DoS attacks, which uses two combinational measurements of isolated node and follower nodes.
(2) An ETC strategy is proposed to save communication resources under DoS attacks. Different from [25,28,30,36], triggering behavior and Zeno behavior are both excluded in this paper, which avoids continuous triggering in each verification cycle and guarantees that certain data are still transmitted after a successful transmission attempt.
(3) A resilient event-triggering mechanism is constructed to tolerate packet loss and topologies change under DoS attacks. Attack duration and frequency can be calculated to describe attack behavior based on piecewise Lyapunov functions.
Notation: L represents the Laplacian matrix of graph G = ν , ε , A . Γ P = θ P P , and θ P represents the eigenvalue of matrix P.

2. Problem Formulation and Preliminaries

The CCPNs with N nodes are described as follows:
x ˙ i ( t ) = A x i ( t ) + j = 1 N g i j Γ x j ( t ) + B u i ( t )
where x i t = x i 1 t , x i 2 t , , x i n t T n is the state vector of node i, and u i q is the control input of node i. A n × n , B n × q are constant matrices. Γ and G = g k l N × N are inner-coupling matrix and outer-coupling matrix, respectively. g k l = g l k = 1 , if node k and node l k l are connected; otherwise, g k l = g l k = 0 k l . And l = 1 , l k N g k l = g k k .
Let x N + 1 ( t ) be the isolated node whose dynamics are given as follows: x ˙ N + 1 ( t ) = A x N + 1 ( t ) . Denote the tracking error as
δ i t = x i t x N + 1 t
For node i, designing a distributed ETC protocol is as follows:
u i t = K ξ ^ i t k i , t t k i , t k + 1 i
ξ ^ i t k i = j = 1 N a i j x j ( t k i ) x i t k i + b i x N + 1 t k i x i t k i
where t k i k N denotes the event-triggering time sequence for node i. If node i can obtain information from the isolated node, then b i = 1 ; otherwise b i = 0 .
Definition 1.
All nodes of CCPNs (1) are said to be synchronized if the following condition is satisfied:
lim t x i ( t ) x N + 1 ( t ) = 0
The proposed attack model in this paper is a time-constrained DoS attack, which mainly attacks the nodes and communication links of the systems in the physical layer. The attack behavior is described below. J s = j s i j , j s i j + Δ s i j , s N defines the s-th DoS time interval, where the DoS attack begins at j s i j and Δ s i j > 0 represents the attack duration of the s-th attack. Then, one can obtain
Θ a t 1 , t 2 = t 1 , t 2 Θ a i , j t 1 , t 2
and
Θ s t 1 , t 2 = t 1 , t 2 \ Θ a t 1 , t 2
where Θ a i , j t 1 , t 2 = t 1 , t 2 s = 1 J s i , j is a set in which the DoS attacks are active. Θ a t 1 , t 2 and Θ s t 1 , t 2 denote the sets that the DoS attacks are active and dormant, respectively.
Figure 1 is a demonstration of a CCPN with six nodes under DoS attacks, in which node 6 is the isolated node. As shown in Figure 1, the malicious attacks are active at t 0 , and the systems are repaired at t ˜ 0 . The system transmission channel can be restored at time t 1 . That is, the communication graphs are discontinuous between t ˜ 0 to t 1 . The communication topologies of networks can be restored to the initial state at t 2 .
Remark 1.
DoS attacks destroy the nodes or communication edges of networks such that communication links fail or nodes do not work normally. Meanwhile, without loss of generality, suppose that at least one communication link or one node in dynamic network systems is attacked at time t 2 l i j for l = 0 , 1 , , N . t 2 l + 1 i j is the time instant when the attack has been completely restored and the entirely topology network has been restored. It is worth noticing that the CCPNs are paralyzed during t t 2 l i j , t 2 l + 1 i j , and the CCPNs work well during t t 2 l + 1 i j , t 2 l + 1 i j .
Define Λ * as the continuous impact of DoS attacks to ensure that the sampling and transmission of nodes are successful. Then the time interval of s-th attack is re-denoted as follows:
J ˜ s i , j = j s i j , j s i j + Δ s i j + Λ * , s N
Θ ˜ a t 1 , t 2 = t 1 , t 2 J ˜ s i , j
and
Θ ˜ s t 1 , t 2 = t 1 , t 2 \ Θ ˜ a t 1 , t 2
we propose the following equations to characterize the case that the topologies are still connected under the DoS attacks
Θ c t 1 , t 2 = t t 1 , t 2 θ min H ¯ σ t > 0
where σ t is a switching signal and topologies are supposed to be completely normal when σ t = 0 . Finally, the characteristics of DoS attacks are rewritten as
Θ ˜ a t 1 , t 2 = Θ ˜ a t 1 , t 2 \ Θ c t 1 , t 2
and
Θ ˜ s t 1 , t 2 = t 1 , t 2 \ Θ ˜ a t 1 , t 2
Definition 2
([30] (Attack Frequency)). Define F a T 1 , T 2 as the frequency of DoS attacks, satisfying
F a T 1 , T 2 = N a T 1 , T 2 T 2 T 1
where N a T 1 , T 2 is the number of DoS attacks occurring over [ T 1 , T 2 ) , and T 2 > T 1 > t 0 .
Definition 3
([30] (Attack Duration)). Define T a T 1 , T 2 as the total time of DoS attacks over [ T 1 , T 2 ) , satisfying
T 0 + T 2 T 1 τ a T a T 1 , T 2
where T 0 > 0 , τ a > 0 , T 2 > T 1 > t 0 .
Remark 2.
It is noted that the transmission channel between nodes may be clogged instead of being removed under DoS attacks. On one hand, to exclude the communication topologies that are still normal under DoS attacks, (11) and (12) are designed to ensure that communication topologies of CCPNs are destroyed under DoS attacks. On the other hand, different from the DoS attack interval defined in [30], the attack interval is designed as (8) in this paper, which includes diversified DoS attack opponents that destroy communication links or nodes or both. In other words, the directed spanning tree of communication networks becomes disconnected under DoS attacks.
In this paper, we design an event-triggered distributed controller to guarantee that all nodes of CCPNs are synchronized. The synchronization error can be defined as e i t = x i t k i x i t . The virtual DoS period is divided into two parts: t 2 l i j , t 2 l + 1 i j t 2 l + 1 i j , t 2 t + 1 i j . The topologies are paralyzed by attacks of adversaries during t t 2 l i j , t 2 l + 1 i j and the communication topologies are assumed to be complete and σ t = 0 during t t 2 l + 1 i j , t 2 t + 1 i j .
Then, the control law for node i is designed as
u i t = F ξ ^ i 1 t , t t 2 l i j , t 2 l + 1 i j K ξ ^ i 2 t , t t 2 l + 1 i j , t 2 l + 1 i j
where
ξ ^ i 1 t k i = j = 1 N a i j σ t x j t k i x i t k i + b i σ t x N + 1 t k i x i t k i
ξ ^ i 2 t k i = j = 1 N a i j 0 x j t k i x i t k i + b i 0 x N + 1 t k i x i t k i
and t k i is the updated state transmission sequence for each node i based on the ETC strategy. x i ( t k i ) = x ^ i ( t ) is the latest transmission state, and x N + 1 ( t k i ) = x N + 1 ( t ) . t k i of each node satisfies the following triggering condition:
F e i t , ξ ^ i t k i = 0
Remark 3.
An event-triggered transmission strategy is proposed to save communication resources in this paper. Equation (17) states that the state-triggering time of each node is independent and not affected by other nodes. In addition, the event-triggering condition in [30] only satisfies a specified inequality, and the selection of parameters has a significant impact on the stability of the systems. On the contrary, the event-triggering condition (17) obtained on the basis of the system stability in this paper can better ensure the performance of systems. For each node i, if t k i satisfies the update condition (17), the x ^ i ( t ) will update at event-triggering instant t k i .
Then, the error systems can be written as
t t 2 l i j , t 2 l + 1 i j , δ ˙ i t = A δ i t + B F j = 1 N a i j σ t x j t k i x i t k i + b i σ t x N + 1 t k i x i t k i
and
t t 2 l + 1 i j , t 2 l + 1 i j , δ ˙ i t = A δ i t + B K j = 1 N a i j 0 x j t k i x i t k i + b i 0 x N + 1 t k i x i t k i
Let x ˙ N + 1 t k i = x ˙ N + 1 t , and from the system (18) and (19), we have
δ ˙ t = I N A + G Γ H ¯ σ t B F δ t H ¯ σ t B F e t , t t 2 l i j , t 2 l + 1 i j I N A + G Γ H B K δ t H B K e t , t t 2 l + 1 i j , t 2 l + 1 i j
where δ ( t ) = c o l ( δ 1 ( t ) , δ 2 ( t ) , , δ N ( t ) ) , e ( t ) = c o l ( e 1 ( t ) , e 2 ( t ) , , e N ( t ) ) , H = L + B , H ¯ σ t = L σ t + B σ t , B = d i a g b 1 , b 2 , , b N , B σ t = d i a g b 1 σ t , b 2 σ t , , b N σ t .
The goal of this paper is to design an event-triggered distributed control law (3) such that CCPNs (1) under DoS attacks are stable and the normal transmission of information is guaranteed.
The following lemma is needed in the sequel.
Lemma 1
([25]). For positive definite matrix M n × n and symmetric matrix N n × n , the following inequalities hold
θ min M 1 N x T T x x T N x θ max M 1 N x T M x
θ min N x T x x T N x θ max N x T x

3. Main Results

We propose an ETC data update strategy to guarantee that all nodes of CCPNs are synchronized in this section. Then, we solve the topologies change caused by DoS attacks by a distributed controller.
Theorem 1.
The all nodes of CCPNs (1) without DoS attacks can be synchronized based on the event-triggered distributed controller (14) with K = B T P satisfying
A T P + P A 2 ε min P Γ 2 ε min P B B T P + ε min I N < 0
and the triggering function
F e i , ξ ^ i 2 = e i γ i q 1 q 2 ρ q 2 ρ 1 + q 3 ξ ^ i 2
Moreover, the event-triggering time is defined as
τ k i = inf t > t k i F e i , ξ ^ i 2 = 0 , k = 1 , 2 ,
where ρ > 0 , 0 < γ i < 1 and q 1 q 2 ρ > 0 , ε min = max θ G , θ H ,
  • 0 < ε 1 < ε min , ε min = ε 1 + ε 2 , q 1 = min ε 1 Γ min H 2 ,
  • q 2 = max Γ max H 1 2 ε 1 I N I N 2 P B B T P > 0 ,
  • q 3 = max Γ max I N 2 P B B T P ε 1 > 0 .
Proof. 
The following Lyapunov function is constructed for systems (19)
V a t = δ T I N P δ
From (16), one can obtain
ξ ^ i 2 t = j = 1 N a i j 0 x j t k i x i t k i + b i 0 x N + 1 t k i x i t k i   = H I N x i ( t k i ) x N + 1 ( t )
and
δ i t = x i ( t k i ) e i t x N + 1 t
Combining (25) and (26), we have
δ = H 1 I N ξ ^ 2 e
The time derivatives of (24) yield
V ˙ a t = 2 δ T I N P δ ˙   = 2 δ T I N P I N A + G Γ H B K δ H B K e   = δ T A T P + P A + G 2 P Γ H 2 P B B T P δ δ T H 2 P B B T P e   ε min δ T δ δ T H 2 P B B T P e   ε 1 + ε 2 ξ ^ 2 T H 2 I N ξ ^ 2 + 2 ξ ^ 2 T H 1 I N e + e T e   e T I N 2 P B B T P ξ ^ 2 + e T I N 2 P B B T P e   ε 1 ξ ^ 2 T H 2 I N ξ ^ 2 + 2 ε 1 ξ ^ 2 T H 1 I N e ε 1 e T e   e T I N 2 P B B T P ξ ^ 2 + e T I N 2 P B B T P e ε 2 δ T δ
Combine with M T N M N , M T N 1 2 h M 2 + h 2 N 2 , then we have
ε 1 ξ ^ 2 T H 2 I N ξ ^ 2 q 1 ξ ^ 2 2 , ε 1 e T e + e T I N 2 P B B T P e q 3 e 2 2 ε 1 ξ ^ 2 T H 1 I N e e T I N 2 P B B T P ξ ^ 2 2 q 2 e ξ ^ 2
Inequality (28) can be rewritten as
V ˙ a t q 1 ξ ^ 2 2 + 2 q 2 e ξ ^ 2 + q 3 e 2 ε 2 δ T δ   q 1 ξ ^ 2 2 + 2 q 2 1 2 ρ e 2 + ρ 2 ξ ^ 2 2 + q 3 e 2 ε 2 δ T δ   i = 1 N q 1 q 2 ρ ξ ^ i 2 2 q 2 ρ + q 3 e i 2 ε 2 δ T δ
We have V ˙ a t < 0 , and we can obtain
q 1 q 2 ρ > 0 , e i 2 < γ i q 1 q 2 ρ q 2 ρ 1 + q 3 ξ ^ i 2 2
Then, we have
V ˙ a t α V a t
where α = ε 2 θ min P . By Lyapunov stability theory and Definition 1, one can obtain that all nodes of CCPNs (1) are synchronized under the distributed controller (14) without DoS attacks. The proof is completed. □
The Zeno and singular triggering behaviors are the most common failure behaviors in the ETC strategy, in which the Zeno behavior is defined as multiple transmissions in a continuous time, and singular triggering behavior is defined as no further trigger after a single trigger. The Zeno and singular triggering behaviors can cause the proposed event-triggered strategy to be ineffective, so these two behaviors must be excluded to ensure the efficient transmission of system information. Then, the following Lemmas show that Zeno behavior is excluded and no node exhibits singular triggering behavior.
Lemma 2.
For CCPNs (1) without DoS attacks, under the event-triggered controller (14), all nodes will not have Zeno behavior if the inter-event time intervals satisfy
τ > max b 1 , b 2 1 ln γ i q 1 q 2 ρ q 2 ρ 1 + q 3 + 1
where b 1 = Γ max I N B K , and
  • b 2 = max Γ max I N A + H B K + Γ max H B K + G Γ + I N A .
Proof. 
Let e i t = x i t k i x i t , then we obtain
e ˙ i t = A x i t k i A x i t j = 1 N g i j Γ x i t B u i t = A x i t k i x i t   j = 1 N g i j Γ x i t B K j = 1 N a i j 0 x j t k i x i t k i B K b i 0 x N + 1 t x i t k i   = A x i t k i x i t j = 1 N g i j Γ x i t B K j = 1 N a i j 0 x j t x i t   B K j = 1 N a i j 0 e j t e i t B K b i 0 x N + 1 t x i t + B K b i 0 e i t
The system (34) can be rewritten as
e ˙ = I N A G Γ + H B K e H B K δ
We have
d d t e i ξ ^ i 2 e ˙ i ξ ^ i 2 + e i ξ ^ ˙ i 2 ξ ^ i 2 2
It follows from (36) that
e ˙ i I N A + G Γ + H B K e i H B K δ i
From (36) and (37), it yields
d d t e i ξ ^ i 2 I N A + G Γ + H B K e i ξ ^ i 2 H B K δ i ξ ^ i 2 + e i ξ ^ ˙ i 2 ξ ^ i 2 2
I N A + H B K e i ξ ^ i 2 + I N B K + G Γ e i ξ ^ i 2 + H B K e i ξ ^ i 2 + I N A e i ξ ^ i 2
Let y = e i ξ ^ i 2 , and then we have
y ˙ max b 1 , b 2 1 + y
It is concluded that y ϕ t , ϕ 0 , where ϕ t , ϕ 0 is the solution of ϕ ˙ = max b 1 , b 2 1 + ϕ satisfying ϕ t , ϕ 0 = ϕ 0 . From (39), we have
ϕ t , ϕ 0 = e max b 1 , b 2 t 1
It yields from (22), that
y = e i ξ ^ i 2 ϕ τ , 0 = e max b 1 , b 2 τ 1
Combining (40) and (41), we can obtain
τ > max b 1 , b 2 1 ln γ i q 1 q 2 ρ q 2 ρ 1 + q 3 + 1
which means that Zeno behavior does not occur. □
Lemma 3.
For CCPNs (1) without DoS attacks, under the event-triggered controller (14), no node exhibits singular triggering behavior.
Proof. 
From (4) and (16), we have
ξ ^ i 2 t ξ i 2 t = j = 1 N a i j 0 x j t k i x i t k i + b i 0 x N + 1 t k i x i t k i   j = 1 N a i j 0 x j ( t ) x i t + b i 0 x N + 1 t x i t   = j = 1 N a i j 0 e j ( t ) e i t b i 0 e i t
Then, one can obtain
ξ ^ 2 ξ 2 = H I N e
Combining the event-triggering condition e i γ i q 1 q 2 ρ q 2 ρ 1 + q 3 ξ ^ i 2 and (44), it yields
ξ ^ i 2 t k i ξ i 2 t Γ max H I N γ i q 1 q 2 ρ q 2 ρ 1 + q 3 e i t = σ c i e i t
where c i = γ i q 1 q 2 ρ q 2 ρ 1 + q 3 , σ = Γ max H I N , σ c i = c ˜ i , and
ν 1 = ξ ^ i 2 t k i 1 + c ˜ i ξ i 2 t ξ ^ i 2 t k i 1 c ˜ i = ν 2
From (25), we have
ξ i 2 t = j = 1 N a i j 0 x j ( t ) x i t + b i 0 x N + 1 t x i t       = j = 1 N a i j 0 δ j ( t ) δ i t b i 0 δ i t ξ 2 t = H I N δ ξ i 2 σ δ i V a t θ min P
It is obvious to show that ξ i 2 t always stays between ν 1 and ν 2 from (46), and V a t strictly decreases to zero from (17) and (32), that is, ξ i 2 t will eventually decrease to ν 1 based on (46) and (47). The proof is completed. □
Remark 4.
Lemmas 2 and 3 present the feasibility of the event-triggered strategy proposed in this paper, which means that every node of the systems is effectively transmitted under this transmission strategy. It is obvious to obtain that γ i can affect the convergence rate from (30). Different from [25,28,30,36], singular triggering behavior of is excluded in Lemma 3. It means that there exists the instant t k + 1 i after the current triggering time t k i so that at least one event will be triggered. That is, Lemma 3 excludes the singular triggering behavior that there is no transmission attempt for a long time to ensure that the proposed distributed ETC scheme is effective.
The communication topologies of CCPNs (1) are easily changed by DoS attacks. However, there are few results focusing on switching topologies of CCPNs caused by DoS attacks, which motivates us to discuss this issue.
Theorem 2.
For systems (18) with the distributed controller (14) and (15) and the event-triggering condition (22) and (23), if there exists a symmetric matrix Q and F = B T Q such that the following inequalities are satisfied
Ψ σ t H ¯ σ t H ¯ σ t T Ψ σ t 0
0 < Ψ σ t β 1 I N
and
2 Q A + A T Q + β 2 Q Γ < β 3 Q
where Ψ σ t Ψ 1 , Ψ 2 , , Ψ w , β 2 = θ max Ψ σ t G θ min Ψ σ t , β 3 > 0 , and Ψ 1 , Ψ 2 , , Ψ w are the positive definite matrices, then the following inequality can be obtained:
V b t e β 3 t t 2 l i j V b t 2 l i j
Proof. 
Constructing the following Lyapunov function
V b t = δ T Ψ σ t Q δ
The time-derivative trajectory of (52) yields
V ˙ b t = 2 δ T Ψ σ t Q I N A + G Γ H ¯ σ t B F δ H ¯ σ t B F e   = 2 δ T Ψ σ t Q I N A + G Γ δ 2 δ T Ψ σ t Q H ¯ σ t B F δ   2 δ T Ψ σ t Q H ¯ σ t B F e = 2 δ T Ψ σ t Q A + A T Q δ   + 2 δ T Ψ σ t G Q Γ δ δ T Ψ σ t H ¯ σ t + H ¯ σ t T Ψ σ t Q B B T Q δ   δ T Ψ σ t H ¯ σ t + H ¯ σ t T Ψ σ t Q B B T Q e
By Lemma 1 and (53), we can obtain
V ˙ b t 2 δ T Ψ σ t Q A + A T Q δ + 2 δ T Ψ σ t θ max Ψ σ t G θ min Ψ σ t Q Γ   = 2 δ T Ψ σ t Q A + A T Q + θ max Ψ σ t G θ min Ψ σ t Q Γ δ   = 2 δ T Ψ σ t Q A + A T Q + β 2 Q Γ δ
From the condition of (50) in Theorem 2, (54) is equivalent to
V ˙ b t β 3 V b t
Then, the following inequality holds:
V b t e β 3 t t 2 l i j V b t 2 l i j
The proof is completed. □
Theorem 3.
If DoS attacks satisfy Definitions 1 and 2 with T 0 > 0 , and conditions (14), (17) and (23) hold, then all nodes of CCPNs (1) are synchronized under DoS attacks provided that the following two conditions are satisfied:
(1) θ 1 * 0 , β 3 , and the frequency of DoS attacks F a t 0 , t satisfies
F a t 0 , t = N a t 0 , t t t 0 θ 1 * 2 ln μ + α + β 3 Δ *
(2) τ a 0 , for T 0 > 0 such that
τ a > α + β 3 α + θ 1 *
where β 3 > 0 , μ = max θ max ( P ) / θ min ( Q ) , θ max ( Q ) / θ min ( P ) .
Proof. 
Construct the following piecewise Lyapunov function for the CCPNs (1):
V = V b , t j m i j , j m i j + Δ m i j + Λ * V a , t j m i j + Δ m i j + Λ * , j m + 1 i j
A m = j m i j , j m i j + Δ m i j + Λ * represents the m-th attack is activated. For any t A m , from (51), one can obtain
V t e β 3 t j m i j V b j m i j
S m = j m i j + Δ m i j + Λ * , j m + 1 i j represents the m-th attack is dormant. For any t S m , from (32), it follows that
V t e α t j m i j Δ m i j Λ * V a j m i j + Δ m i j + Λ *
According to (60), one can obtain
V b j m i j + Δ m i j + Λ * e β 3 Δ m i j + Λ * V b j m i j
From (60)–(62), then we have
V t e α t j m i j Δ m i j Λ * e β 3 Δ m i j + Λ * V b j m i j   μ e α Θ ˜ s j m i j + Δ m i j + Λ * , t e β 3 Θ ˜ a j m i j , t V b j m i j   μ 2 e α Θ ˜ s j m i j , t e β 3 Θ ˜ a j m i j , t V a j m i j   μ 2 e α Θ ˜ s j m 1 i j , t e β 3 Θ ˜ a j m i j , t V a j m 1 i j + Δ m 1 i j + Λ *           μ 2 N a t 0 , t e α Θ ˜ s t 0 , t e β 3 Θ ˜ a t 0 , t V t 0
For all t > t 0 , Θ ˜ a t 0 , t Θ ˜ a t 0 , t Θ a t 0 , t + 1 + N a t 0 , t Λ * , and Θ ˜ s t 0 , t = t t 0 Θ ˜ a t 0 , t . Therefore, we have
α t t 0 Θ ˜ a t 0 , t + β 3 Θ ˜ a t 0 , t = α t t 0 + α + β 3 Θ a t 0 , t + 1 + N a t 0 , t Λ *
Combining (63) and (64), we have
V t μ 2 N a t 0 , t e α Θ ˜ s t 0 , t e β 3 Θ ˜ a t 0 , t V t 0   e α + β 3 T 0 + Λ * e α t t 0 e α + β 3 τ a t t 0 e 2 ln μ + α + β 3 Λ * N a t 0 , t V t 0
From (57), (58) and (60) can be rewritten as
V t e α + β 3 T 0 + Λ * e θ 1 t t 0 V t 0
where θ 1 = α α + β 3 τ a θ 1 * > 0 . This is equivalent to all nodes of CCPNs (1) being synchronized in the presence of DoS attacks. The proof is completed. □
Remark 5.
The synchronization problem was investigated on an assumption that each node maintains communication connection with other nodes in [37]. On the contrary, these assumptions can be removed in this paper, and the triggering time of each node is not affected by each other. In addition, the frequency and duration of DoS attacks are accurately characterized in Theorem 3. In this respect, the designed parameter μ needs to satisfy the fixed constraints to ensure that μ N a ( t 0 , t ) is converged.

4. Numerical Examples

Example 1.
Consider the CCPNs as shown in Figure 2, which have five nodes (node 5 is an isolated node). The parameters are chosen as follows:
A = 5 4 7 3 7 4 2 7 9 , G = 1 1 0 0 0 1 1 0 0 0 1 1 1 0 0 1 , B = 0.4 1.7 0.3 ,
Γ = d i a g ( 0.1 , 0.1 , 0.1 ) , ε min = 7.236 , ε 1 = 1 , γ i = 0.5 , q 1 = 6.8541 , q 2 = 5.2361 , q 3 = 2.7058 , ε 2 = 6.236 , α = 19.9552 .
When the complex cyber–physical networks are not attacked by DoS attacks, one can obtain the H matrix by the communication topologies as shown in Figure 2.
H = 3 1 0 1 1 1 0 0 0 1 2 1 0 0 1 2 .
By Theorem 1, we obtain the controller gain K and Lyapunov variable P as follows:
K = 2.4163 8.8224 4.9069 ,
P = 1.0221 0.5332 0.5421 0.5332 0.9725 0.7241 0.5421 0.7241 1.1136 .
The initial states of nodes are x 1 = 2 0.5 0.5 T , x 2 = 2 3 4 T , x 3 = 2 3 3 T ,   x 4 = 3.5 0.5 1 T .
As shown in Figure 3, the trajectories of error states between follower nodes and the isolated node approach zero when the DoS attacks are dormant. Figure 4 and Figure 5 show the trajectories of synchronization errors based on the ETC strategy and transmission errors of nodes, which prove that all nodes of the systems are synchronized with the distributed controller. The transmission attempts of nodes based on the ETC strategy are shown in Figure 6. It means that each node’s triggering rules are independent. It can be seen from Figure 3, Figure 4 and Figure 6 that the proposed ETC strategy saves communication resources and reduces the unnecessary transmission of the systems while ensuring the convergence effect. The above simulation results show that when the external attacks are zero, the system realizes the synchronization of all nodes based on the distributed event-triggered controller, which verifies the validity of Theorem 1 in this paper.
When the systems are attacked by the DoS attacks, it is supposed that two edges can be attacked separately or simultaneously. Figure 7b–d show several network topologies generated by DoS attacks. Figure 8 shows the DoS signal, where mode 0 denotes DoS dormancy and mode 1 denotes DoS activation. Suppose that three topologies caused by DoS attacks are shown as in Figure 8. We have
H 1 ¯ = 2 1 0 0 1 1 0 0 0 0 1 1 0 0 0 1 , H 2 ¯ = 2 1 0 0 1 1 0 0 0 1 2 1 0 0 1 2 ,
H 3 ¯ = 3 1 0 1 1 1 0 0 0 0 1 1 0 0 1 2 .
The parameters are chosen as β 1 = 15 , β 2 = 0.3843 , β 3 = 1 . By Theorem 2, we obtain the controller gain F and Lyapunov variable Q as follows:
F = 0.7125 6.5357 5.1397 ,
Q = 0.7845 0.6392 0.9091 0.6392 2.8395 2.7592 0.9091 2.7592 3.4799 .
Then, we obtain θ max ( P ) = 2.2434 , θ min ( P ) = 0.3125 , θ max ( Q ) = 6.1641 , θ min ( Q ) = 0.3172 , μ = 19.7251 . Let θ 1 * = 0.8448 , then, one can obtain
F a t 0 , t = N a t 0 , t t t 0 θ 1 * 2 ln μ + α + β 3 Λ * = 0.316 , τ a > α + β 3 α + θ 1 * = 1.001 .
This means that the DoS attacks cannot occur more than 0.316 s during a unit of time and duration smaller than 1.001 s. Figure 9 shows the trajectories of error states between follower nodes and the isolated node converge to zero under DoS attacks. Figure 10 and Figure 11 show the trajectories of synchronization errors based on the ETC strategy and transmission errors of nodes, which prove that all nodes of the systems are synchronized with the distributed controller. It can be seen from Figure 9 and Figure 10 that the proposed ETC strategy saves communication resources and reduces unnecessary transmission of the systems while ensuring the convergence effect. The above simulation results show that as long as the dwell time and attack frequency of DoS attacks satisfy the upper limit constraints calculated in this paper, the complex cyber–physical networks can achieve the synchronization of all nodes with the designed ETC strategy, which also verifies the effectiveness of Theorem 3 to calculate the tolerable attacks.
Example 2.
In order to verify the superiority of the proposed method, we consider the security control problem solved in [38]. The parameters borrowed from [38] are as follows:
A = 0 1 2 1 , B = 1 0 0 2 , H = 3 1 1 1 3 1 1 1 3 ,
H 1 ¯ = 2 1 0 1 3 1 0 1 2 , H 2 ¯ = 1 0 0 0 2 1 0 1 2 .
The DoS attack behavior and topologies are the same as [38], as shown in Figure 12 and Figure 13. Other parameters are chosen as follows:
ε min = 5.231 , ε 1 = 1 , γ min = 0.43 , q 1 = 4.783 , q 2 = 6.893 , q 3 = 2.785 , α = 7.981 , β 1 = 13 , β 2 = 0.2983 , θ 1 * = 0.5897 , β 3 = 18 .
By Theorems 1 and 3, one can obtain the controller gains K and F as follows:
K = 1.6521 0.7893 0.0672 2.0972 , F = 1.7624 0.9821 0.0762 0.9879 .
and
F a t 0 , t = N a t 0 , t t t 0 θ 1 * 2 ln μ + α + β 3 Λ * = 0.1087 , τ a > α + β 3 α + θ 1 * = 4.1253 .
This means that the DoS attacks cannot occur more than 0.1087 s during a unit of time and duration smaller than 4.1253 s. The initial values of the error systems borrowed from [38] is e ( 0 ) = 0.25 0.09 0.09 T .
Figure 14 shows the trajectories of synchronization errors based on the ETC strategy. It is easy to see that all nodes of the systems are synchronized under the distributed controller after 110 s compared with 600 s in [38], which verifies the superiority of the results. The above simulation results show that as long as the dwell time and attack frequency of DoS attacks satisfy the upper limit constraints calculated in this paper, the complex cyber–physical networks can achieve the synchronization of all nodes by the designed ETC strategy.

5. Conclusions

This paper addressed the distributed event-triggered synchronization problem of CCPNs in the presence of DoS attacks. A distributed event-triggered controller using two combined measurements was designed to achieve synchronization and save the limited communication resources. In addition, the Zeno and singular triggering behaviors of the proposed event triggering strategy were excluded to ensure the effectiveness of states transmission. Since DoS attacks can generate many communication topologies, sufficient conditions for synchronization under finite energy attack are obtained by using a piecewise Lyapunov function. We will focus on the problem of attack detection and resilient control of CCPNs under mixed attacks in future work.

Author Contributions

Methodology, X.H. and D.-W.D.; validation, Y.X. and D.-W.D.; Writing—original draft preparation, X.H.; Writing—review and editing, Y.X. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Postdoctoral Research Foundation of Shunde Innovation School, University of Science and Technology Beijing under Grant 2021BH010.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Watts, D.; Strogatz, S. Collective dynamical of small-world networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef] [PubMed]
  2. Dong, Q.; Shi, S.L.; Ma, Y.C. Non-fragile synchronization of complex dynamical networks with hybrid delays and stochastic disturbance via sampled-data control. ISA Trans. 2020, 105, 174–189. [Google Scholar] [CrossRef]
  3. Liu, X.Y.; Chen, T.P.; Cao, J.D.; Lu, W.L. Dissipativity and quasi-synchronization for neural networks with discontinuous activations and parameter mismatches. Neural Netw. 2011, 24, 1013–1021. [Google Scholar] [CrossRef] [PubMed]
  4. He, X.L.; Shi, P.; Lim, C.C. Stochastic synchronization of complex networks via aperiodically intermittent noise. J. Frankl. Inst. 2020, 357, 13872–13888. [Google Scholar] [CrossRef]
  5. Kaviarasan, B.; Sakthivel, R.; Lim, Y. Synchronization of complex dynamical networks with uncertain inner coupling and successive delays based on passivity theory. Neurocomputing 2016, 186, 127–138. [Google Scholar] [CrossRef]
  6. Hu, C.; Yu, J.; Jiang, H.J.; Teng, Z.D. Exponential synchronization of complex networks with finite distributed delays coupling. IEEE Trans. Neural Netw. 2011, 22, 1999–2010. [Google Scholar]
  7. Huang, X.J.; Ma, Y.C. Improved results on synchronization of Markovian jump complex dynamical networks via sampled-data controller and convex combination. Int. J. Syst. Sci. 2019, 50, 2764–2775. [Google Scholar] [CrossRef]
  8. Huang, X.J.; Ma, Y.C. Finite-time H sampled-data synchronization for Markovian jump complex networks with time-varying delays. Neurocomputing 2018, 296, 82–99. [Google Scholar] [CrossRef] [Green Version]
  9. Wang, J.; Zhang, H.; Wang, Z.; Wang, B. Local exponential synchronization in complex dynamical networks with time-varying delay and hybrid coupling. Appl. Math. Comput. 2013, 225, 16–32. [Google Scholar] [CrossRef]
  10. Liu, X.Y.; Ho, D.W.C.; Song, Q.; Xu, W.Y. Finite/fixed-time pinning synchronization of complex networks with stochastic disturbances. IEEE Trans. Cybern. 2019, 49, 2398–2403. [Google Scholar] [CrossRef]
  11. Zhang, G.C.; Xia, Y.Q.; Li, X.F.; He, S.P. Multievent-triggered sliding-Mode control for a class of complex dynamic network. IEEE Trans. Control. Netw. Syst. 2022, 9, 835–844. [Google Scholar] [CrossRef]
  12. Shen, M.Q.; Yan, S.; Zhang, G.M. A new approach to event-triggered static output feedback control of networked control systems. ISA Trans. 2016, 65, 468–474. [Google Scholar] [CrossRef]
  13. Chadha, G.S.; Panambilly, A.; Schwung, A.; Ding, S.X. Bidirectional deep recurrent neural networks for process fault classification. ISA Trans. 2020, 106, 330–342. [Google Scholar] [CrossRef] [PubMed]
  14. Lian, J.; Li, C.; Xia, B. Sampled-data control of switched linear systems with application to an F-18 Aircraft. IEEE Trans. Ind. Electron. 2016, 64, 1332–1340. [Google Scholar] [CrossRef]
  15. Humayed, A.; Lin, J.Q.; Li, F.J.; Luo, B. Cyber-physical systems security-a survey. IEEE Internet Things J. 2017, 4, 1802–1831. [Google Scholar] [CrossRef]
  16. Dai, W.B.; Dubinin, V.; Christensen, J.; Vyatkin, V.; Guan, X.P. Toward self-manageable and adaptive industrial cyber-physical systems with knowledge-driven autonomic service management. IEEE Trans. Ind. Inform. 2017, 13, 725–736. [Google Scholar] [CrossRef]
  17. Gatouillat, A.; Badr, Y.; Massot, B.; Sejdic, E. Internet of medical things: A review of recent contributions dealing with cyber-physical systems in medicine. IEEE Internet Things J. 2018, 5, 3810–3822. [Google Scholar] [CrossRef] [Green Version]
  18. Li, H.S.; Lai, L.F.; Poor, H.V. Multicase routing for decentralized control of cyber physical systems with an application in smart grid. IEEE J. Sel. Areas Commun. 2012, 30, 1097–1107. [Google Scholar] [CrossRef]
  19. Liu, J.L.; Yin, T.T.; Shen, M.Q.; Xie, X.P.; Cao, J. State estimation for cyber–physical systems with limited communication resources, sensor saturation and denial-of-service attacks. ISA Trans. 2020, 104, 101–114. [Google Scholar] [CrossRef]
  20. Lu, A.-Y.; Yang, G.-H. Inpu-to-state stabilizing control for cyber-physical systems with multiple transmission under denial of service. IEEE Trans. Autom. Control. 2018, 63, 1813–1820. [Google Scholar] [CrossRef]
  21. Song, Z.Q.; Liu, Y.F.; Tan, M.C. Robust pinning synchronization of complex cyberphysical networks under mixed attacks strategies. Int. J. Robust Nonlinear Control. 2019, 29, 1265–1278. [Google Scholar] [CrossRef]
  22. Wen, G.H.; Yu, W.W.; Yu, X.H.; Lv, J.H. Complex cyber-physical networks: From cybersecurity to security control. J. Syst. Sci. Complex. 2017, 30, 46–67. [Google Scholar] [CrossRef]
  23. Wang, P.J.; Wen, G.H.; Yu, X.H.; Yu, W.W.; Wan, Y. Synchronization of resilient complex networks under attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 99, 1116–1127. [Google Scholar] [CrossRef]
  24. Dong, X.; Liu, X.J. Robust and secure time-synchronization against sybil attacks for sensor networks. IEEE Trans. Ind. Inform. 2015, 6, 1482–1491. [Google Scholar] [CrossRef]
  25. Wang, S.B.; Cao, Y.T.; Huang, T.W.; Chen, Y.R.; Wen, S.P. Event-triggered distributed control for synchronization of multiple memristive neural networks under cyber-physical attacks. Inf. Sci. 2020, 518, 361–375. [Google Scholar] [CrossRef]
  26. Liu, Y.H. Secure control of networked switched systems with random DoS attacks via event-triggered approach. Int. J. Control Autom. Syst. 2020, 18, 2572–2579. [Google Scholar] [CrossRef]
  27. Gao, L.S.; Li, F.Q.; Fu, J.Q. Event-triggered output feedback resilient control for NCSs under deception attacks. Int. J. Control Autom. Syst. 2020, 18, 2220–2228. [Google Scholar] [CrossRef]
  28. Wu, Z.G.; Xu, Y.; Lu, R.Q.; Wu, Y.Q.; Huang, T.W. Event-triggered control for consensus of multiagent systems with fixed/switching topologies. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 1736–1746. [Google Scholar] [CrossRef]
  29. Peng, C.; Sun, H.T. Switching-like event-triggered control for networks control systems under malicious denial of service attacks. IEEE Trans. Autom. Control 2020, 65, 3943–3949. [Google Scholar] [CrossRef]
  30. Feng, Z.; Hu, G.Q. Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans. Control Syst. Technol. 2020, 20, 741–752. [Google Scholar] [CrossRef]
  31. Xu, Y.; Fang, M.; Shi, P.; Wu, G.Z. Event-based secure consensus of mutiagent systems against DoS attacks. IEEE Trans. Cybern. 2020, 50, 3468–3476. [Google Scholar] [CrossRef] [PubMed]
  32. Ye, D.; Chen, M.M.; Yang, H.J. Distributed adaptive event-triggered fault-tolerant consensus of multiagent systems with general linear dynamics. IEEE Trans. Cybern. 2019, 49, 757–767. [Google Scholar] [CrossRef] [PubMed]
  33. Li, W.; Zhang, H.; Wang, W.; Cao, Z. Fully distributed event-triggered time-varying formation control of multi-agent systems subject to mode-switching denial-of-service attacks. Appl. Math. Comput. 2022, 414, 126645. [Google Scholar] [CrossRef]
  34. Deng, C.; Wen, C.Y. MAS-based distributed resilient control for a class of cyber-physical systems with communication delays under DoS attacks. IEEE Trans. Cybern. 2021, 51, 2347–2358. [Google Scholar] [CrossRef] [PubMed]
  35. Wan, Y.; Cao, J.D. Distributed observer-based cyber security control of complex dynamical networks. IEEE Trans. Circuits Syst. I Regul. Pap. 2017, 64, 2966–2975. [Google Scholar] [CrossRef]
  36. Feng, Z.; Hu, G.Q. Distributed secure average consensus for linear multi-agent systems under DoS attacks. In Proceedings of the 2017 American Control Conference (ACC), Seattle, WA, USA, 24–26 May 2017; pp. 2261–2266. [Google Scholar]
  37. Wen, G.H.; Yu, W.W.; Hu, G.Q.; Cao, J.D.; Yu, X.H. Pinning synchronization of directed networks with switching topologies: A multiple Lyapunov function approach. IEEE Trans. Neural Netw. Learn. Syst. 2015, 26, 3239–3250. [Google Scholar] [CrossRef]
  38. Tian, Y.; Tian, S.; Li, H.Q.; Han, Q.; Wang, X.N. Event-Triggered Security Consensus for Multi-Agent Systems with Markov Switching Topologies under DoS Attacks. Energies 2022, 15, 5353. [Google Scholar] [CrossRef]
Figure 1. The evolution of DoS attacks.
Figure 1. The evolution of DoS attacks.
Applsci 13 01716 g001
Figure 2. Fixed topology.
Figure 2. Fixed topology.
Applsci 13 01716 g002
Figure 3. Tracking error trajectories of nodes without DoS attacks.
Figure 3. Tracking error trajectories of nodes without DoS attacks.
Applsci 13 01716 g003
Figure 4. Tracking error trajectories of nodes with event-triggered protocol without DoS attacks.
Figure 4. Tracking error trajectories of nodes with event-triggered protocol without DoS attacks.
Applsci 13 01716 g004
Figure 5. Error trajectories of nodes without DoS attacks.
Figure 5. Error trajectories of nodes without DoS attacks.
Applsci 13 01716 g005
Figure 6. Transmission attempts of follower nodes.
Figure 6. Transmission attempts of follower nodes.
Applsci 13 01716 g006
Figure 7. Switching topologies.
Figure 7. Switching topologies.
Applsci 13 01716 g007
Figure 8. DoS signal and switching signal.
Figure 8. DoS signal and switching signal.
Applsci 13 01716 g008
Figure 9. Tracking error trajectories of nodes under DoS attacks.
Figure 9. Tracking error trajectories of nodes under DoS attacks.
Applsci 13 01716 g009
Figure 10. Tracking error trajectories of nodes with event-triggered protocol under DoS attacks.
Figure 10. Tracking error trajectories of nodes with event-triggered protocol under DoS attacks.
Applsci 13 01716 g010
Figure 11. Error trajectories of nodes under DoS attacks.
Figure 11. Error trajectories of nodes under DoS attacks.
Applsci 13 01716 g011
Figure 12. DoS attack signal.
Figure 12. DoS attack signal.
Applsci 13 01716 g012
Figure 13. Topologies of systems.
Figure 13. Topologies of systems.
Applsci 13 01716 g013
Figure 14. Error trajectories of nodes under DoS attacks.
Figure 14. Error trajectories of nodes under DoS attacks.
Applsci 13 01716 g014
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Huang, X.; Xia, Y.; Ding, D.-W. Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks. Appl. Sci. 2023, 13, 1716. https://doi.org/10.3390/app13031716

AMA Style

Huang X, Xia Y, Ding D-W. Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks. Applied Sciences. 2023; 13(3):1716. https://doi.org/10.3390/app13031716

Chicago/Turabian Style

Huang, Xiaojie, Yunxia Xia, and Da-Wei Ding. 2023. "Distributed Event-Triggered Synchronization for Complex Cyber–Physical Networks under DoS Attacks" Applied Sciences 13, no. 3: 1716. https://doi.org/10.3390/app13031716

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop