1. Introduction
In recent years, Artificial Intelligence, Cloud Computing, Big Data and other internet fields develop rapidly [
1]. All these rapid developments are inextricably linked to wireless network technology. The networked control systems (NCSs) become a hot area of research due to its practical applications. It enables the remote control in a networked environment [
2,
3,
4,
5,
6]. As the significant advantages of lower cost of design and easier maintenance, NCSs are widely used in unmanned marine vehicle (UMV). The networked UMV is often used for its practical applications in the fields of military or non-military missions, management of fishery resources, marine environmental monitoring or cleaning, the exploration of oil and gas [
7]. With the exploitation of the oceans, the analysis of UMV systems is emerged as a hot subject of investigation. UMV systems are inevitably subject to the effects of climate, waves and other uncertainties when carrying out tasks. As a result, plentiful control methods are proposed to guarantee the performance of the UMV systems, such as, sliding mode control [
8,
9], formation control [
10,
11,
12], trajectory tracking control [
13,
14,
15], neural network control [
16,
17] and so on.
In reference [
18], the coordinated path tracking problem for UMV systems with directional topologies based on distributed control is investigated. A guidance method based finite-time line-of-slight is introduced to track the desired path for independent UMV. In [
19], a dynamic output feedback control (DOFC) strategy is designed for UMV tracking problems with delay and packet loss. To resist disturbances, in reference [
20], a coordinated tracking control strategy of UMV systems with unknown dynamics and external disturbances is studied. A wavelet neural network-based distributed tracking controller is introduced to accurately estimate unknown dynamics and external disturbances. A dwell control method for UMV systems is presented in [
21] to counteract the effects of unknown size and orientation disturbances. An adaptive law for slow changes to gently alter the navigation of the vehicle is proposed to minimise positioning errors. In addition to the above-mentioned interference from environmental factors, UMV systems are vulnerable to cyber attavk as the open nature of the wireless network. Generally, there exist two main categories of cyber attack on NCSs. One is the denial-of-service (DoS) attack that blocks data transmission and the other is the deception attack that injects false information into the transmitted data [
22,
23]. The network-based Takagi-Sugeno (T-S) fuzzy UMV systems under DoS attack are studied and a semi-Markovian jumping system description of the DoS attack phenomenon is presented in [
24]. In reference [
25], hybrid attack including DoS attack and deception attack is investigated. A model which based on the T-S fuzzy system with random switching is proposed to defend against the hybrid attack.
More critically, traditional time-triggered control completes the sampling task within a fixed sampling period where sampling method inevitably wastes the network resources. The network channel is congested in severe cases and further causes packet loss and transmission delay. The event-triggered mechanism (ETM) is first proposed in [
26]. It gradually becomes a hot research topic in past few decades and a significant number of achievements are emerged [
27,
28,
29]. In reference [
30], the problem of event-triggered dynamic localisation of switched UMV systems is investigated . A novel weighted ETM that considers the switching characteristics is studied. The containment problem of networked under actuated UMV systems is investigated in [
31]. To guide the UMV systems toward the corresponding points of reference, an event-triggered control scheme is designed for individual UMV based on the observational data. This method effectively reduces the communication burden. In reference [
32], a novel robust adaptive fault-tolerant control strategy and an improved multiplied ETM for UMV systems are introduced. An estimation model with a parsimonious form is used to design the ETM. As can be seen from the above research results, saving network resources is particularly important. As the quantizer can moderately compress the signal before transmission, the network bandwidth occupied by the signal transmission is significantly reduced [
33,
34]. It improves the utilization rate of communication resources. However, to the best of our knowledge, rare work on the problem of adaptive event-triggered mechanism (AETM) and quantitative mechanism based DOFC for UMV systems in the presence of DoS attack is performed yet. Therefore, the main motivation of this paper to shorten such a gap by initiating a systematic study.
Based on the above discussions and considering that the state vectors of the UMV system may not be all measurable due to the various complex environmental factors, a DOFC strategy which based on the ETM and the quantitative mechanism is investigated in this paper. The measurement data from the sampler is processed by the event-triggered unit and the quantitative unit. The processed measurement data is then sent to the land-based control unit. The calculated control signal is eventually transmitted to the UMV closed-loop system through the communication channel. The occurrence of aperiodic DoS attack is considered in the transmission channel of the control signal. In addition, an AETM is adopted. The threshold parameter for trigger condition is adjusted online by AETM. Through the construction of the Lyapunov functional, the conditions of global exponential stability for the UMV systems are obtained. Finally, the effectiveness of the proposed methods is verified by simulation. The main contributions are summarized in the following points:
- (i)
A novel closed loop system model of networked UMV systems with an event-triggered unit and a quantizer is established. The impact of network induced delay, external disturbance and aperiodic DoS attack are involved.
- (ii)
A quantitative mechanism is installed on the basis of adaptive event-triggered unit which can further save the network resources. And an environment accompanied by more severe cyber attack is considered.
The paper is organized as follows. In section 2, the modeling of the closed UMV systems are obtained. And a dynamic output feedback controller based on AETM and quantitative mechanism under aperiodic DoS attack is designed.
Section 3 gives the sufficient criterion for ensuring global exponential stability of system with an expected
disturbance attenuation index and the design method of controller. A numerical simulation to verify the effectiveness of the proposed control strategy is given in
Section 4. In section 5, conclusions and future work are shown.
1.1. Notation
Throughout this paper, the notation as follows is used: denotes the n-dimensional Euclidean space, denotes the Euclidean vector norm, means that the matrix is real symmetric positive definite, is the identity matrix with appropriate dimension, the symbol ∗ denotes the symmetric term in a matrix, denotes , and denotes the minimum or maximum eigenvalue of the matrix , respectively.
4. Simulation and analysis
The effectiveness of the designed controller (26) for the network-based UMV systems under the aperiodic DoS attack is demonstrated within this section. The network-based UMV systems matrix parameters [
42] are given as:
For the formulas as
,
, such that the matrix parameters are obtained as:
It is clear that matrix in section 2 is selected as and is selected as . The matrices , in theorem 3 are selected as the identity matrices with appropriate dimensions. For the parameters of DoS attack, we assume that , , . The whole operating time is set to . Select , , , , , , , . And the initial threshold for the AETM is given as .
The vector
is select as the initial value of system (10). The reference signals are given as
, and the piecewise constant function
is described as:
The disturbance
,
and
in surge, sway and yaw motions are
where
and
denote the shaping filters described by
and
, respectively; The wave strength coefficients are denoted as
and
which
and
. The damping coefficients ares selected as
and
, respectively. The encountering wave frequencies are defined as
and
where
and
; The band-limited white noise is denoted as
and
with the noise powers are 2 and 1.8; In addition,
,
,
. Since the definition of yaw velocity error leads to the same amplitude of oscillation for yaw velocity and yaw velocity error, only yaw velocity error and yaw angle are investigated in the simulations of this paper.
The matrix parameters of the controller (26) are obtained by solving linear matrix inequalities (LMIs) (52) and (53) in Theorem 3 as follows:
As shown in
Figure 3, the square wave with a value of 1 means that the aperiodic DoS attack signal is active and 0 means that the aperiodic DoS attack signal is inactive. Different from the DoS attack signal in reference [
19], the lower bound
is set to a smaller value of
and the upper bound
is set to a larger value of
. The yaw angle response is shown in
Figure 4 and the yaw velocity error response is shown in
Figure 6. The comparison responses of the reference are shown in
Figure 5 and
Figure 7, respectively. It is clear that the yaw velocity error amplitude and the yaw angle amplitude are greatly mitigated by the action of the considered controller under the more severe cyber attack environment. The response of yaw moment is shown in
Figure 8. The responses of sway velocity and surge velocity are shown in
Figure 9 and
Figure 10. The amplitude of the sway velocity is also significantly reduced compared to the reference.
To give a more visual indication of the effect of DOFC strategy on system (27), the percentage reduction in yaw angle and yaw velocity error is represented as:
where
represents the oscillation amplitudes of yaw angle,
represents the accumulative error of yaw velocity error. The percentage reduction in the yaw angle amplitudes and the yaw velocity accumulative error is denoted as
and
, respectively. As can be seen from Table 1, the proposed DOFC strategy based the ETM and the quantitative mechanism has tangible effectiveness in reducing the value of yaw velocity accumulative error. The amplitude of yaw angle oscillations is also reduced. And significant improvement in effectiveness compared to the reference.
Table 1.
The comparison of the system performance under two strategies.
Table 1.
The comparison of the system performance under two strategies.
|
|
|
|
|
No control(Reference [19]) |
1.6805 |
- |
6.3338 |
- |
No control |
1.6808 |
- |
6.3868 |
- |
With control(Reference [19]) |
0.9602 |
42.9% |
3.7957 |
40.1% |
With control |
0.9554 |
43.2% |
3.4580 |
45.9% |
The variation of threshold
is shown in
Figure 11. The trigger time instant and the release time interval of AETM are illustrated in
Figure 12 and
Figure 13.
Only 232 times are triggered during the whole simulation process. It saves of communication resources.
To demonstrate the strengths of the AETM in this work, two different transmission schemes are presented for comparison, i.e., fixed threshold ETM in [
43] and AETM in [
44] is given. The relevant quantitative comparison results of the data are given in Tables 2–4, respectively.
The comparison of the number of triggers under different mechanisms is shown in Table 2. The comparison results of the yaw angle oscillation amplitude and the yaw velocity error accumulative error under different initial thresholds are given in Tables 3 and 4. It can be seen from the results that compared with reference [
43], the system performance is better when we have fewer trigger times. And we greatly reduce the number of triggers under the similar system performance compared with reference [
44].
Table 2.
Comparison of the number of triggers under different event-triggered mechanisms.
Table 2.
Comparison of the number of triggers under different event-triggered mechanisms.
Threshold parameter
|
0.05 |
0.1 |
0.6 |
0.8 |
Reference [43] |
232 |
174 |
65 |
60 |
Reference [44] |
302 |
236 |
96 |
86 |
This work |
232 |
174 |
64 |
58 |
Table 3.
Comparison of the yaw angle oscillation amplitudes under different event-triggered mechanisms.
Table 3.
Comparison of the yaw angle oscillation amplitudes under different event-triggered mechanisms.
Threshold parameter
|
0.05 |
0.1 |
0.6 |
0.8 |
Reference [43] |
0.9795 |
0.9848 |
1.2082 |
1.2317 |
Reference [44] |
0.9712 |
0.9776 |
1.1970 |
1.2073 |
This work |
0.9795 |
0.9848 |
1.2054 |
1.2119 |
Table 4.
Comparison of the yaw velocity error accumulative error under different event-triggered mechanisms.
Table 4.
Comparison of the yaw velocity error accumulative error under different event-triggered mechanisms.
Threshold parameter
|
0.05 |
0.1 |
0.6 |
0.8 |
Reference [43] |
3.4709 |
3.5263 |
4.2739 |
4.4751 |
Reference [44] |
3.4574 |
3.4992 |
3.8627 |
4.0627 |
This work |
3.4680 |
3.5213 |
4.0428 |
4.4620 |
The performance of the system is significantly influenced by the threshold parameter . Such that, different cases of initial threshold are provided in Table 5. The selection rule of parameter is followed by condition (13), where , , and represent the same meanings as in Table 1.
Table 5.
System performance indexes at five specific initial thresholds .
Table 5.
System performance indexes at five specific initial thresholds .
|
|
|
|
|
Trigger times |
No control |
1.6808 |
- |
6.3868 |
- |
600 |
|
0.9249 |
45.0% |
3.4296 |
46.3% |
395 |
|
0.9544 |
43.2% |
3.4680 |
45.9% |
232 |
|
0.9595 |
42.9% |
3.5213 |
44.9% |
175 |
|
0.9658 |
42.5% |
3.7041 |
42.0% |
99 |
|
1.1420 |
32.1% |
4.0428 |
36.7% |
69 |
As shown in Table 5 and
Figure 14 and
Figure 15, when the parameter
increases, the performance of the system will decrease, but at the same time less data is transmitted. It should be noted that if
is too large, the stability of system (27) is hard to be guaranteed. For this reason, the advantages and disadvantages associated with its variation should be considered when selecting the triggering threshold parameter.