[go: up one dir, main page]

CN119310951B - Safe decentralized control method and system under switching event triggered control strategy - Google Patents

Safe decentralized control method and system under switching event triggered control strategy Download PDF

Info

Publication number
CN119310951B
CN119310951B CN202411847217.6A CN202411847217A CN119310951B CN 119310951 B CN119310951 B CN 119310951B CN 202411847217 A CN202411847217 A CN 202411847217A CN 119310951 B CN119310951 B CN 119310951B
Authority
CN
China
Prior art keywords
switching event
subsystem
matrix
controller
event
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN202411847217.6A
Other languages
Chinese (zh)
Other versions
CN119310951A (en
Inventor
张义军
胡永豪
余涛
孙长银
胥成林
汪雪建
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Anhui University
Original Assignee
Anhui University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Anhui University filed Critical Anhui University
Priority to CN202411847217.6A priority Critical patent/CN119310951B/en
Publication of CN119310951A publication Critical patent/CN119310951A/en
Application granted granted Critical
Publication of CN119310951B publication Critical patent/CN119310951B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B19/00Programme-control systems
    • G05B19/02Programme-control systems electric
    • G05B19/418Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM]
    • G05B19/41845Total factory control, i.e. centrally controlling a plurality of machines, e.g. direct or distributed numerical control [DNC], flexible manufacturing systems [FMS], integrated manufacturing systems [IMS] or computer integrated manufacturing [CIM] characterised by system universality, reconfigurability, modularity
    • GPHYSICS
    • G05CONTROLLING; REGULATING
    • G05BCONTROL OR REGULATING SYSTEMS IN GENERAL; FUNCTIONAL ELEMENTS OF SUCH SYSTEMS; MONITORING OR TESTING ARRANGEMENTS FOR SUCH SYSTEMS OR ELEMENTS
    • G05B2219/00Program-control systems
    • G05B2219/30Nc systems
    • G05B2219/33Director till display
    • G05B2219/33273DCS distributed, decentralised controlsystem, multiprocessor

Landscapes

  • Engineering & Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Manufacturing & Machinery (AREA)
  • Quality & Reliability (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Automation & Control Theory (AREA)
  • Data Exchanges In Wide-Area Networks (AREA)

Abstract

本发明的一种切换事件触发控制策略下的安全分散控制方法及系统,是一种切换事件触发控制策略的网络化互联大型系统的安全分散控制方法,该事件触发机制通过有效缓解系统的通信压力,确保在遭受外部扰动或拒绝服务攻击时,系统仍能保持稳定运行和安全性。由于事件触发机制的性质,本发明通过构造一种基于可切换的事件触发机制,应用在每个互联的子系统中;再通过协同设计事件触发通信参数、安全控制器控制规律。本发明能够使得互联的大型系统在应对拒绝服务与扰动具有性能水平,能够保证控制性能,获得更高的通信效率。本发明可适用于无人互联系统、智能电网的安全控制与通信优化工作等。

The present invention discloses a method and system for secure decentralized control under a switching event-triggered control strategy. It is a method for secure decentralized control of a large-scale networked interconnected system under a switching event-triggered control strategy. The event trigger mechanism effectively alleviates the communication pressure of the system, ensuring that the system can maintain stable operation and security when subjected to external disturbances or denial of service attacks. Due to the nature of the event trigger mechanism, the present invention constructs a switchable event trigger mechanism and applies it to each interconnected subsystem; and then collaboratively designs event-triggered communication parameters and security controller control rules. The present invention enables large-scale interconnected systems to have security in dealing with denial of service and disturbances. The performance level can ensure control performance and obtain higher communication efficiency. The present invention can be applied to the security control and communication optimization of unmanned interconnected systems and smart grids.

Description

Safety decentralized control method and system under switching event triggering control strategy
Technical Field
The invention relates to the technical field of research in network communication and system control, in particular to a control method based on a switching event trigger mechanism and a networked interconnection system.
Background
In recent years, the popularity of large-scale systems has made network communications more complex and critical. However, as networks evolve, network security issues are also growing, including DoS (denial of service) attacks. DoS attacks can cause interruption of the system's communication, severely affecting the system's operation and stability. Therefore, how to effectively combat DoS attacks is one of the important challenges in the field of network communications today.
In practical engineering, the technology can be widely applied to various large-scale systems, especially those facing serious network security threats. For example, the technology can be used for improving the communication efficiency of the intelligent traffic system and enhancing the resistance of the system to DoS attacks so as to ensure the stable operation of the traffic system. The intelligent power system, in the interconnected power system, can be applied to improve the communication efficiency of the system and ensure the stability of the system, thereby improving the operation efficiency and the safety of the power system.
Disclosure of Invention
The invention provides a communication Scheme (SETC) based on an event triggering mechanism, which aims to handle DoS attacks in a large-scale system of network interconnection. The scheme adopts a distributed control strategy, improves the communication efficiency by means of an event triggering mechanism, and ensures the safety and stability of the system under the DoS attack. The switching event triggering mechanism enables the system to rapidly and accurately cope with DoS attack, reduces communication burden, improves efficiency and ensures stable operation of a large-scale system.
In order to achieve the above purpose, the present invention adopts the following technical scheme:
a control method based on a switching event trigger mechanism and a networked interconnection system control method comprise the following steps:
S100, establishing a state space model of each subsystem of the networked interconnection large-scale system;
S200, establishing a mathematical model of the energy-limited denial of service attack to which each subsystem can be subjected;
S300, designing a constraint condition matrix of a controller with robust stability performance by adopting a Lyapunov stability analysis method according to a system model with switching event triggering strategy parameters, network communication random delay and packet loss caused by denial of service attack Then to matrixDecoupling is carried out, and the decoupling is converted into a linear matrix inequality form, so that the linear matrix inequality form can be solved in computer software, and event triggering strategy parameters and controller rules which meet the system performance are calculated;
s400, finally, inputting and triggering strategy parameters by the collaborative design controller, and solving based on the conditions of the steps S100-S300, so as to realize safe decentralized control under the switching event triggering control strategy.
On the other hand, the invention discloses a safety decentralized control system based on a switching event triggering control strategy, which is based on an interconnected network large system and comprises the following modules:
The switching event triggering unit is used for judging whether the data packet is lost in the transmission process, so as to determine whether to switch the event triggering mechanism in S301;
The system calculating unit is used for calculating the controller gain and the event triggering parameter of the system based on the switching event triggering mechanism under the condition that the system is attacked by denial of service, so that the system can keep stable controller gain and the event triggering parameter, and then the controller gain and the event triggering parameter of the system are calculated according to a state space equation of the networked interconnected large system and the switching event triggering mechanism;
And the networked interconnection large system decentralized control unit is used for finally designing the decentralized controller input and triggering the safe decentralized control of the control strategy based on the switching event under the denial of service attack.
According to the technical scheme, the safety decentralized control method based on the switching event triggering control strategy has the following advantages compared with the prior art:
firstly, the invention establishes a detailed state space model for each subsystem of the interconnected large system and considers the influence factors of interconnection among the subsystems, so that the models can more accurately reflect the dynamic characteristics and state changes of the large networked system.
Furthermore, the invention adopts a switching event triggering control strategy, the scheme ensures the control performance, can obtain higher communication efficiency under non-DoS attack, and can reduce the influence caused by DoS attack during DoS attack. Not only saves communication resources, but also achieves the expected control performance index.
By integrating SETC and the networked interconnection large system into a unified time delay system framework, more flexible and reliable safety control can be realized, and the method is applicable to various control systems and application scenes. Whether industrial control, robotic control, or intelligent transportation systems.
Finally, the algorithm in the invention is simple and easy to operate and realize, saves communication resources and has stronger network attack resistance.
Drawings
FIG. 1 is a flow chart of the method of the present invention;
FIG. 2 is a mechanical system of four interconnected vehicles according to an embodiment of the present invention;
FIG. 3 is a schematic diagram of a four-trolley tracking simulation in accordance with an embodiment of the present invention;
fig. 4 is a diagram illustrating a data transmission scenario under a handover event trigger mechanism according to an embodiment of the present invention.
Detailed Description
For the purpose of making the objects, technical solutions and advantages of the embodiments of the present invention more apparent, the technical solutions of the embodiments of the present invention will be clearly and completely described below with reference to the accompanying drawings in the embodiments of the present invention, and it is apparent that the described embodiments are some embodiments of the present invention, but not all embodiments of the present invention.
As shown in fig. 1, the method for secure decentralized control under the handover event trigger control policy according to the present embodiment includes:
S100, establishing a state space model of each subsystem of the networked interconnection large-scale system.
S200, establishing a mathematical model of the energy-limited denial of service attack to which each subsystem can be subjected.
S300, designing a constraint condition matrix of a controller with robust stability performance by adopting a Lyapunov stability analysis method according to a system model with switching event triggering strategy parameters, network communication random delay and packet loss caused by denial of service attackAnd then toThe matrix is decoupled and converted into a linear matrix inequality, so that the matrix can be solved in computer software, and event trigger strategy parameters and controller rules meeting system performance are calculated. In the specific calculation method, please refer to steps S301 and S302.
S400, finally, inputting and triggering strategy parameters by the collaborative design controller, and based on the conditions of the steps S100-S300.
The following is a specific description of the above steps:
first, defining a state space model of each subsystem of the networked interconnection large-scale system as follows:
wherein, Is the state of subsystem i; Is the measurement output of subsystem i; is an external disturbance of subsystem i; is the control input to subsystem i; is the controllable output of subsystem i, Is a fixed coefficient matrix; The method is an interconnection coupling function of a large-scale networked interconnection system;
the embodiment of the invention mainly aims at realizing the safe decentralized control of the switching event trigger control strategy of the networked interconnected large system under the condition of denial of service attack.
Note that the symbolsRepresenting a set of positive integers, a symbolRepresenting symmetric terms, symbols in a symmetric matrixRepresentation matrixIs a transpose of (a).
The method comprises the following specific steps:
s100, defining a constraint term of an interconnection coupling function based on an interconnection system model, wherein the constraint inequality is that ;
Wherein, The coupling strength is related to the actual system model.
S200 builds a mathematical model of an energy limited denial of service attack that each subsystem may be subjected to.
First, it is defined that each subsystem of a networked interconnected large system may be subject to an energy-limited denial of service attack. An energy-limited denial of service attack refers to an attack that begins at a particular point in time and lasts for a certain period of time, and can be described in terms of time intervals as follows:
Wherein the method comprises the steps of Indicating the nth DoS attack interval,Symbol representing time when DoS attacker is in active stateIndicating the duration.
For S300, designing constraint condition matrix of controller with robust stability performance by Lyapunov stability analysis method according to system model with switching event triggering strategy parameters and network communication random delay and packet loss caused by denial of service attack. Then toThe matrix is decoupled and converted into a linear matrix inequality, so that the matrix can be solved in computer software, and event trigger strategy parameters and controller rules meeting the system performance are calculated.
The method specifically comprises the following steps:
s301, designing a switching event trigger mechanism
Wherein the method comprises the steps ofIs the time of the future trigger-off,Is the time of the most recent trigger-up,,Is the current sampling instant of time at which the sample is to be taken,The symbol inf represents a maximum lower bound of the setRepresenting the sampling interval of the current system, symbolIndicating that the parameter is being triggered,Representing a weight matrix, symbolsIs a given trigger parameter, the mechanism will use character confirmation detection technology to detect when data is transmitted, and presume that the data is transmitted at the current moment, when detecting that the current moment is lost due to denial of service attack, the mechanism will set the packet loss flag parameter ACK to 1 to indicate that the packet is lost, and switch to use the event trigger condition corresponding to ACK=0When the successful transmission at the current moment is detected, the packet loss flag parameter ACK is set to 0 to indicate the successful transmission, and the event triggering condition when the corresponding ACK=1 is switched to be used
S302, designing a controller based on an event trigger mechanism as follows
Wherein the method comprises the steps ofIs the i-th subsystem trigger state,Is the gain of the controller to be designed,,Is a communication induced delay;
S303, will Dividing into smaller intervals and further designing the controller
Wherein the method comprises the steps of,When (when)Conditions whenIs true whenConditions whenEstablishment of the sign,Is a communication delay function and satisfies the relation,Is the lower limit of the communication delay and,An upper limit of communication delay;
S304, according to the event trigger mechanism and controller rule designed in S301-S303, when positive definite matrix exists And normal numberA condition matrix can be designedThe following relationship is satisfied:
,
wherein,
S305, condition matrix according to 304Decoupling it when a positive definite matrix is present,And normal numberSo that it satisfies the following relationship:,
wherein,
For S400, finally designing the controller input, based on the conditions of the steps S100-S300, further realizing the safe decentralized control under the switching event triggering control strategy;
The method specifically comprises the following steps:
s401, based on steps S100-S300, setting given event triggering parameters according to the required performance indexes Constant ofSubstituting the decoupled condition matrix (see S305 matrix) given in S305 to obtain the controller gain of each subsystemWeight matrix of event trigger mechanism
On the other hand, the embodiment of the invention also discloses a safety decentralized control system under the switching event triggering control strategy, which is based on an interconnected network large system and comprises the following modules:
The switching event triggering unit is used for judging whether the data packet is lost in the transmission process, so as to determine whether to switch the event triggering mechanism in S301;
The system calculating unit is used for calculating the controller gain and the event triggering parameter of the system based on the switching event triggering mechanism under the condition that the system is attacked by denial of service, so that the system can keep stable controller gain and the event triggering parameter, and then the controller gain and the event triggering parameter of the system are calculated according to a state space equation of the networked interconnected large system and the switching event triggering mechanism;
And the networked interconnection large system decentralized control unit is used for finally designing the decentralized controller input and triggering the safe decentralized control of the control strategy based on the switching event under the denial of service attack.
Wherein the switching event triggering unit based on the character confirmation detection technology:
s301, designing a switching event trigger mechanism
Wherein, the system computing unit, the processing step includes:
S305, condition matrix according to 304 Decoupling it when a positive definite matrix is present,And normal numberSo that it satisfies the following relationship:
,
To give event trigger parameters Constant ofSubstituting the decoupled condition matrix (see S305 matrix) given in S305 to obtain the controller gain of each subsystemWeight matrix of event trigger mechanism
The networked interconnection large system distributed control unit comprises the following specific processing steps:
s302, designing a controller based on an event trigger mechanism as follows
S303, willDividing into smaller intervals and further designing the controller
The invention can be applied to various related fields, such as intelligent power grids, unmanned systems and large-scale networked control systems, and can effectively relieve communication pressure and maintain the technical problems of stability and safety of the system when disturbance exists outside and a communication channel is attacked by denial of service.
In the present embodiment, experimental examples are used to verify the proposed design method. Considering the mechanical system of four interconnected vehicles in fig. 2, in combination with the disturbance, the ith vehicle model:
in combination with the actual physical meaning, the following state space matrix parameters are given:
assume that the current sampling time, the communication delay lower line and the communication delay upper limit of the system are respectively
Given parameters And system performance indexSubstituting into S305, solving to obtain the following controller gainEvent trigger weight matrix:
The simulation result of the denial of service attack contained under the available switching event trigger mechanism is shown in fig. 3 and 4, and the simulation data can be used for reducing the transmission quantity of the data packet under the denial of service attack, and saving communication resources while maintaining the expected control performance.
In conclusion, the invention has clear thought, more reasonable structure and more science, achieves synchronization at the exponential rate, and can further shorten the convergence time. The algorithm designed by the invention has high speed, and is simple and easy to operate.
The embodiment of the application also provides electronic equipment, which comprises a processor, a communication interface, a memory and a communication bus, wherein the processor and the communication interface, and the memory are communicated with each other through the communication bus;
A memory for storing a computer program;
The processor is configured to implement the secure decentralized control method of the switching event trigger control policy when executing a program stored in the memory, where the method includes:
and establishing a state space model of each subsystem of the networked interconnection large-scale system, and restraining interconnection items.
A mathematical model of an energy limited denial of service attack that each subsystem may be subjected to is built.
According to the system model with switching event triggering strategy parameters and network communication random delay and packet loss caused by denial of service attack, adopting a Lyapunov stability analysis method to design a constraint condition matrix of a controller with robust stability performance. Then toThe matrix is decoupled and converted into a linear matrix inequality, so that the matrix can be solved in computer software, and event trigger strategy parameters and controller rules meeting the system performance are calculated.
And finally, inputting and triggering strategy parameters by the collaborative design controller, and solving based on the conditions of the steps S100-S300, so as to realize safe decentralized control under the switching event triggering control strategy.
It may be understood that the system provided by the embodiment of the present invention corresponds to the method provided by the embodiment of the present invention, and explanation, examples and beneficial effects of the related content may refer to corresponding parts in the above method.
The communication bus mentioned by the above electronic device may be a peripheral component interconnect standard (english: PERIPHERAL COMPONENT INTERCONNECT, abbreviated as PCI) bus or an extended industry standard architecture (english: extended Industry Standard Architecture, abbreviated as EISA) bus, etc. The communication bus may be classified as an address bus, a data bus, a control bus, or the like. For ease of illustration, the figures are shown with only one bold line, but not with only one bus or one type of bus.
The communication interface is used for communication between the electronic device and other devices.
The Memory may include random access Memory (RAM, english: random Access Memory) or nonvolatile Memory (NVM, english: non-Volatile Memory), such as at least one disk Memory. Optionally, the memory may also be at least one memory device located remotely from the aforementioned processor.
The processor may be a general-purpose processor, including a central Processing unit (Central Processing Unit, abbreviated as CPU), a network processor (Network Processor, abbreviated as NP), a digital signal processor (DIGITAL SIGNAL Processing, abbreviated as DSP), an application specific integrated Circuit (AppLication SPECIFIC INTEGRATED Circuit, abbreviated as ASIC), a Field-Programmable gate array (GATE ARRAY, abbreviated as FPGA), or other Programmable logic devices, discrete gate or transistor logic devices, or discrete hardware components.
In yet another embodiment of the present application, a computer readable storage medium is provided, in which a computer program is stored, the computer program, when executed by a processor, implements the steps of the secure decentralized control method under the above-mentioned handover event trigger control policy.
In yet another embodiment of the present application, a computer program product containing instructions that, when run on a computer, cause the computer to perform the method of secure decentralized control under any of the switching event triggered control policies of the above embodiments is also provided.
In the above embodiments, it may be implemented in whole or in part by software, hardware, firmware, or any combination thereof. When implemented in software, may be implemented in whole or in part in the form of a computer program product. The computer program product includes one or more computer instructions. When loaded and executed on a computer, produces a flow or function in accordance with embodiments of the present application, in whole or in part. The computer may be a general purpose computer, a special purpose computer, a network of computers, or other programmable devices. The computer instructions may be stored in or transmitted from one computer-readable storage medium to another, for example, by wired (e.g., coaxial cable, optical fiber, digital Subscriber Line (DSL)), or wireless (e.g., infrared, wireless, microwave, etc.). The computer readable storage medium may be any available medium that can be accessed by a computer or a data storage device such as a server, data center, etc. that contains an integration of one or more available media. The usable medium may be a magnetic medium (e.g., floppy disk, hard disk, magnetic tape), an optical medium (e.g., DVD), or a semiconductor medium (e.g., solid state disk SoLid STATE DISK (SSD)), etc.
It is noted that relational terms such as first and second, and the like are used solely to distinguish one entity or action from another entity or action without necessarily requiring or implying any actual such relationship or order between such entities or actions. Moreover, the terms "comprises," "comprising," or any other variation thereof, are intended to cover a non-exclusive inclusion, such that a process, method, article, or apparatus that comprises a list of elements does not include only those elements but may include other elements not expressly listed or inherent to such process, method, article, or apparatus. Without further limitation, an element defined by the phrase "comprising one does not exclude the presence of other like elements in a process, method, article, or apparatus that comprises an element.
The foregoing embodiments are merely for illustrating the technical solution of the present invention, but not for limiting the same, and although the present invention has been described in detail with reference to the foregoing embodiments, it will be understood by those skilled in the art that modifications may be made to the technical solution described in the foregoing embodiments or equivalents may be substituted for parts of the technical features thereof, and that such modifications or substitutions do not depart from the spirit and scope of the technical solution of the embodiments of the present invention in essence.

Claims (9)

1.一种切换事件触发控制策略下的安全分散控制方法,基于网络化互联大型系统,其特征在于:包括以下步骤:1. A safe decentralized control method under a switching event triggered control strategy, based on a networked interconnected large-scale system, characterized in that it includes the following steps: S100、建立网络化互联大型系统的每个子系统状态空间模型;S100, establish a state space model for each subsystem of a large networked interconnected system; S200、建立每个子系统均可能受到的能量有限的拒绝服务攻击的数学模型;S200, establishing a mathematical model of energy-limited denial-of-service attacks that each subsystem may be subjected to; S300、根据带有切换事件触发策略参数以及具有网络通信随机延迟、拒绝服务攻击导致丢包的系统模型,采用李雅普诺夫稳定性分析方法设计具有鲁棒稳定性能的控制器的约束条件矩阵;然后对矩阵进行解耦,转为线性矩阵不等式形式,使其可以在计算机软件中进行求解,计算出满足系统性能的事件触发策略参数与控制器规律;S300, based on the system model with switching event triggering strategy parameters and random network communication delays and packet loss caused by denial of service attacks, the constraint matrix of the controller with robust stability performance is designed using the Lyapunov stability analysis method ; Then the matrix Decouple and convert into linear matrix inequality form so that it can be solved in computer software to calculate the event trigger strategy parameters and controller rules that meet the system performance; S400、最终协同设计控制器输入与触发策略参数,基于步骤S100-S300的条件进行求解,进而实现切换事件触发控制策略下的安全分散控制。S400 , finally collaboratively designing controller input and trigger strategy parameters, solving them based on the conditions of steps S100 - S300 , and thereby achieving safe decentralized control under the switching event triggered control strategy. 2.根据权利要求1所述的一种切换事件触发控制策略下的安全分散控制方法,其特征在于:所述S100具体包括,2. The method for safe decentralized control under a switching event-triggered control strategy according to claim 1, characterized in that: S100 specifically includes: 首先定义如下网络化互联大型系统的每个子系统状态空间模型:First, define the state space model of each subsystem of the networked interconnected large system as follows: 其中,是子系统i的状态;是子系统i的测量输出;是子系统i的外部扰动;是子系统i的控制输入;是子系统i的可控输出,是固定的系数矩阵;是大型网络化互联系统的互联耦合函数;in, is the state of subsystem i; is the measured output of subsystem i; is the external disturbance of subsystem i; is the control input of subsystem i; is the controllable output of subsystem i, is a fixed coefficient matrix; It is the interconnection coupling function of a large networked interconnected system; 基于网络化互联大型系统的每个子系统状态空间模型,定义一个互联耦合函数的约束项,其约束不等式为Based on the state space model of each subsystem of the networked interconnected large system, a constraint term of the interconnection coupling function is defined, and its constraint inequality is: ; 其中,为耦合强度,与实际系统模型有关。in, is the coupling strength, which is related to the actual system model. 3.根据权利要求2所述的一种切换事件触发控制策略下的安全分散控制方法,其特征在于:所述S200具体包括,3. The method for safe decentralized control under a switching event-triggered control strategy according to claim 2, characterized in that: S200 specifically includes: 首先定义如下网络化互联大型系统的每个子系统可能受到能量有限的拒绝服务攻击;能量受限的拒绝服务攻击是指在特定的时间点开始攻击并持续一定时间的攻击,能量受限的拒绝服务攻击用时间间隔来描述如下的数学模型:First, it is defined that each subsystem of a large networked interconnected system may be subject to a limited energy denial of service attack; an energy-limited denial of service attack is an attack that starts at a specific time point and lasts for a certain period of time. The energy-limited denial of service attack is described by the following mathematical model using a time interval: 其中表示第n个DoS攻击间隔,表示DoS攻击者处于活动状态的时刻,符号表示持续时间。in Indicates the nth DoS attack interval, Indicates the moment when the DoS attacker is active, symbol Indicates duration. 4.根据权利要求3所述的一种切换事件触发控制策略下的安全分散控制方法,其特征在于:所述S300具体包括,4. The method for safe decentralized control under a switching event-triggered control strategy according to claim 3, characterized in that: S300 specifically includes: S301,设计切换事件触发机制S301, design switching event trigger mechanism 其中是未来触发时刻,是最近触发时刻,是当前采样时刻,;符号inf表示一个集合最大的下界;符号表示当前系统的采样间隔;符号表示正触发参数,表示权重矩阵;符号是给定的触发参数;该机制会使用字符确认检测技术会在数据传输时进行检测,假设当前时刻在进行数据传输,当检测到当前时刻受到拒绝服务攻击而丢包时,将丢包标志参数ACK置1表示检测到分组丢失,并切换使用对应ACK=0时的事件触发条件,当检测到当前时刻传输成功时,将丢包标志参数ACK置0表示传输成功,并切换使用对应ACK=1时的事件触发条件in It is the future trigger moment. is the most recent triggering moment, , is the current sampling time, ; The symbol inf represents the maximum lower bound of a set; the symbol Indicates the sampling interval of the current system; symbol Indicates the positive trigger parameter, represents the weight matrix; symbol is a given trigger parameter; this mechanism will use character confirmation detection technology to detect during data transmission. Assuming that data transmission is in progress at the current moment, when it is detected that the current moment is subject to a denial of service attack and packet loss, the packet loss flag parameter ACK is set to 1 to indicate that packet loss is detected, and the corresponding event trigger condition when ACK=0 is switched. When the current transmission is detected to be successful, the packet loss flag parameter ACK is set to 0 to indicate successful transmission, and the event trigger condition corresponding to ACK=1 is switched to ; S302,基于事件触发机制设计如下的控制器 S302, design the following controller based on the event trigger mechanism 其中是第i个子系统触发状态,是要设计的控制器增益,是通信诱导延迟;in is the trigger state of the ith subsystem, is the controller gain to be designed, , It is communication-induced delay; S303,将划分为更小的区间并更进一步设计控制器S303, Divide into smaller sections and further design the controller 其中,当时,条件成立,当时,条件成立;符号为通信延迟函数且满足关系是通信延迟的下限,通信延迟的上限;in , ,when When, conditions Established, when When, conditions Establishment; Symbol , is a communication delay function and satisfies the relationship , is the lower bound of the communication delay, Upper limit on communication delay; S304,依据S301-S303设计的事件触发机制及控制器规律,当存在正定矩阵和正常数,设计一个条件矩阵满足如下关系:S304, according to the event trigger mechanism and controller rules designed in S301-S303, when there is a positive definite matrix and a positive constant , design a conditional matrix Satisfies the following relationship: , 其中,in, ; S305,依据304给出的条件矩阵,对其进行解耦,当存在正定矩阵,和正常数,使得其满足如下关系:S305, based on the conditional matrix given in 304 , decouple it, when there is a positive definite matrix , and a positive constant , so that it satisfies the following relationship: , 其中,in, . 5.根据权利要求4所述的一种切换事件触发控制策略下的安全分散控制方法,其特征在于:所述S400具体包括,5. The method for safe decentralized control under a switching event-triggered control strategy according to claim 4, characterized in that: S400 specifically includes: S401,根据所需要的性能指标,基于步骤S100-S300,将给定的事件触发参数及常数代入S305中所给的解耦后的条件矩阵,得到各子系统的控制器增益,事件触发机制的权重矩阵S401, according to the required performance indicators, based on steps S100-S300, the given event trigger parameters and constant Substitute the decoupled condition matrix given in S305 to obtain the controller gains of each subsystem , the weight matrix of the event triggering mechanism . 6.一种切换事件触发控制策略下的安全分散控制系统,用于实现权利要求1-5所述的切换事件触发控制策略下的安全分散控制方法,其特征在于:包括以下模块:6. A safe decentralized control system under a switching event triggered control strategy, used to implement the safe decentralized control method under a switching event triggered control strategy according to claims 1-5, characterized in that it comprises the following modules: 基于字符确认检测技术的切换事件触发单元,用于判断数据包在传输过程中是否丢包,从而决定是否对S301中的事件触发机制进行切换;A switching event triggering unit based on character confirmation detection technology is used to determine whether a data packet is lost during transmission, thereby determining whether to switch the event triggering mechanism in S301; 系统计算单元,用于计算让系统受到拒绝服务攻击的情况下,基于切换事件触发机制,使得系统能保持稳定的控制器增益及事件触发参数,然后根据网络化互联大系统状态空间方程、切换事件触发机制,计算出系统的控制器增益及事件触发参数;The system calculation unit is used to calculate the controller gain and event trigger parameters that can keep the system stable based on the switching event trigger mechanism when the system is attacked by denial of service, and then calculate the controller gain and event trigger parameters of the system based on the state space equation of the networked interconnected large system and the switching event trigger mechanism; 网络化互联大系统分散控制单元,用于最终设计分散式控制器输入,拒绝服务攻击下基于切换事件触发控制策略的安全分散控制。The distributed control unit of the networked interconnected large system is used to finally design the distributed controller input and the secure distributed control based on the switching event triggering control strategy under the denial of service attack. 7.根据权利要求6所述的一种切换事件触发控制策略下的安全分散控制系统,其特征在于:7. A safe distributed control system under a switching event triggered control strategy according to claim 6, characterized in that: 所述基于字符确认检测技术的切换事件触发单元执行以下步骤:The switching event triggering unit based on the character confirmation detection technology performs the following steps: S301,设计切换事件触发机制S301, design switching event trigger mechanism 8.根据权利要求6所述的一种切换事件触发控制策略下的安全分散控制系统,其特征在于:所述系统计算单元处理步骤包括:8. A safe distributed control system under a switching event triggered control strategy according to claim 6, characterized in that: the system computing unit processing steps include: 依据S304给出的条件矩阵,对其进行解耦,当存在正定矩阵,和正常数,使得其满足如下关系:According to the conditional matrix given in S304 , decouple it, when there is a positive definite matrix , and a positive constant , so that it satisfies the following relationship: , 将给定的事件触发参数及常数代入S305中所给的解耦后的条件矩阵,可得到各子系统的控制器增益,事件触发机制的权重矩阵The given event trigger parameter and constant Substituting the decoupled condition matrix given in S305, the controller gains of each subsystem can be obtained: , the weight matrix of the event triggering mechanism . 9.根据权利要求6所述的一种切换事件触发控制策略下的安全分散控制系统,其特征在于:所述网络化互联大系统分散控制单元具体处理步骤包括:9. A safe distributed control system under a switching event-triggered control strategy according to claim 6, characterized in that: the specific processing steps of the distributed control unit of the networked interconnected large system include: S302,基于事件触发机制设计如下的控制器 S302, design the following controller based on the event trigger mechanism S303,将划分为更小的区间并更进一步设计控制器S303, Divide into smaller sections and further design the controller .
CN202411847217.6A 2024-12-16 2024-12-16 Safe decentralized control method and system under switching event triggered control strategy Active CN119310951B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202411847217.6A CN119310951B (en) 2024-12-16 2024-12-16 Safe decentralized control method and system under switching event triggered control strategy

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202411847217.6A CN119310951B (en) 2024-12-16 2024-12-16 Safe decentralized control method and system under switching event triggered control strategy

Publications (2)

Publication Number Publication Date
CN119310951A CN119310951A (en) 2025-01-14
CN119310951B true CN119310951B (en) 2025-03-25

Family

ID=94186950

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202411847217.6A Active CN119310951B (en) 2024-12-16 2024-12-16 Safe decentralized control method and system under switching event triggered control strategy

Country Status (1)

Country Link
CN (1) CN119310951B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN120184986B (en) * 2025-04-08 2025-10-03 大连职业技术学院(大连开放大学) Control method for stable output of interconnected power system
CN120508073A (en) * 2025-07-18 2025-08-19 安徽大学 Networked interconnected system secure distributed control method and system

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119148526A (en) * 2024-09-13 2024-12-17 厦门大学 Self-adaptive event triggering safety control method for multi-agent system under spoofing attack

Family Cites Families (7)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8001601B2 (en) * 2006-06-02 2011-08-16 At&T Intellectual Property Ii, L.P. Method and apparatus for large-scale automated distributed denial of service attack detection
CN110865616B (en) * 2019-11-07 2020-09-25 河南农业大学 Design method of event trigger zone memory DOF controller under random FDI attack
CN111830976B (en) * 2020-07-01 2021-03-23 武汉理工大学 Unmanned ship control method based on switching T-S fuzzy system under DoS attack
CN113573317A (en) * 2021-07-29 2021-10-29 咪咕文化科技有限公司 Filter design method and device of network singular system in satellite system
CN113885333B (en) * 2021-11-01 2022-09-27 东南大学 DoS attack resisting image encryption method based on complex network event trigger synchronization control
CN115314251B (en) * 2022-07-06 2023-10-31 北京科技大学 Elastic event triggering control method and device for random jump information physics system
CN116800463A (en) * 2023-01-28 2023-09-22 曲阜师范大学 A switching adaptive event triggering control method, system and storage medium

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN119148526A (en) * 2024-09-13 2024-12-17 厦门大学 Self-adaptive event triggering safety control method for multi-agent system under spoofing attack

Also Published As

Publication number Publication date
CN119310951A (en) 2025-01-14

Similar Documents

Publication Publication Date Title
CN119310951B (en) Safe decentralized control method and system under switching event triggered control strategy
US11899786B2 (en) Detecting security-violation-associated event data
US8739284B1 (en) Systems and methods for blocking and removing internet-traversing malware
CN113015167B (en) Encrypted flow data detection method, system, electronic device and storage medium
CN113741309A (en) Dual-dynamic event trigger controller model design method based on observer
CN115314251B (en) Elastic event triggering control method and device for random jump information physics system
CN119846960A (en) Method and system for designing network control by utilizing genetic algorithm and self-adaptive event triggering
CN113556343A (en) DDoS attack defense method and device based on browser fingerprint identification
CN117395043A (en) Evaluation method, device, equipment and storage medium of cross-domain attack path
Wen et al. Adaptive event‐triggered dissipative filter design for semi‐Markov jump systems under hybrid network attacks
Zhang et al. Adaptive sliding mode control for uncertain nonlinear switched system under probabilistic replay attacks: The output feedback approach
Huang et al. Observer‐based event‐triggered security control for nonlinear networked control systems with cyber attacks
Zhang et al. Observer‐based event‐triggered H∞ H _ ∞ control of networked switched systems under hybrid attacks
CN118158148A (en) Industrial control system communication path selection method, device, equipment and medium
CN115051825B (en) Malicious software propagation defense method for heterogeneous equipment of Internet of things
Li et al. Event‐triggered delayed impulsive control for quasi‐synchronization of complex dynamic systems with packet loss and parameter mismatch
CN116980899A (en) Wireless sensor intrusion detection method and system based on evolution game
CN116962194A (en) Network topology construction method, device, equipment and storage medium
CN115277065A (en) An adversarial attack method and device in the detection of abnormal traffic in the Internet of Things
CN116743406A (en) A network security early warning method, device, storage medium and computer equipment
Surkov Comparison of authorization protocols for large requests in the operation queue environment
CN117997612B (en) Data encryption transmission method and system for preventing advanced persistent threat attack
Surkov et al. Authentication and Request Processing Model in High Load Modes for IoT Components.
CN120508073A (en) Networked interconnected system secure distributed control method and system
CN118972165B (en) Zero trust threat detection method, device and system

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant