Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

State estimation method for non-linear networked system under spoofing attack

A technology for nonlinear systems and system states, applied in general control systems, control/regulation systems, instruments, etc., to achieve the effects of saving network bandwidth resources, improving communication capabilities, and reducing burdens

Active Publication Date: 2021-06-22
WINGIN BUSINESS-INTELLIGENCE ACAD NANJING CO LTD +2
View PDF6 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

State estimation is also a challenging problem

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • State estimation method for non-linear networked system under spoofing attack
  • State estimation method for non-linear networked system under spoofing attack
  • State estimation method for non-linear networked system under spoofing attack

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0075] The present invention will be further described below in conjunction with the accompanying drawings.

[0076] Such as figure 1 The state estimation method of nonlinear networked system under spoofing attack includes the following steps:

[0077] Step S1, establishing a nonlinear system model and a system state estimator model;

[0078] Specifically, the nonlinear system model is as follows:

[0079]

[0080] where x(t)∈R n is the state variable, y(t)∈R m is the measurement output, z(t)∈R p is the signal to be estimated, w(t)∈R q is an external disturbance, and obeys w(t)∈[L 2 0, ∞); A, A w , C, L are constant matrices; α(t) is a random variable whose value is {0, 1}, and the probability distribution satisfies: h(x) is a nonlinear function;

[0081] The state estimation system model is established as follows:

[0082]

[0083] in, is the estimated value of the system state x(t), is the estimated value of the signal z(t) to be estimated, is the real...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a state estimation method for a non-linear networked system under a spoofing attack. The method comprises the following steps of: establishing a non-linear system model and a system state estimator model, introducing an event triggering mechanism, and establishing a network attack model based on the influence of the spoofing attack on network transmission data; designing a nonlinear system state estimator model under the spoofing attack and event triggering mechanism; utilizing a Lyapunov stability theory to obtain a sufficiency condition for ensuring the mean square stability of a system index; and finally, solving a linear matrix inequality to obtain event triggering parameters and state estimator gain. According to the method of the invention, the bandwidth can be effectively saved, the network load is reduced, the communication capability of a transmission channel is improved, the network bandwidth resource can be efficiently saved, and the network load is reduced; meanwhile, the event triggering mechanism and a quantization mechanism are introduced, so that the burden of network transmission can be effectively reduced.

Description

technical field [0001] The invention relates to the technical field of network control, and mainly relates to a method for estimating the state of a non-linear networked system subject to spoofing attacks. Background technique [0002] With the continuous development of network society, network communication resources are becoming more and more important and precious. How to make reasonable and effective use of network resources while maintaining system transmission performance is a problem worthy of in-depth study. In recent years, due to its unique advantages, the event trigger mechanism is considered to be an effective method to save network resources. The main idea is that only when the corresponding trigger conditions are met, the current data can be transmitted, otherwise the data packet is discarded. In the past few years, many different event-triggered schemes have been applied to corresponding engineering systems, such as sensor networks, multi-agent systems, and so...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): G05B13/04
CPCG05B13/042
Inventor 曹杰查利娟刘金良丁达申冬琴毛波
Owner WINGIN BUSINESS-INTELLIGENCE ACAD NANJING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products