Abstract
This study focuses on the secure stability issue of networked control systems (NCSs) under injection cyber-attacks (ICAs), which have important research value of applications for network security. Firstly, a more general Lyapunov–Krasovskii functional (LKF) is constructed based on the time-delay phenomenon in systems. Secondly, a novel boundary looped function (BLF) is developed depending on the sampling period, fully considering delay and sampling information, and the initial constraints of the criteria on the matrices are effectively relaxed. In addition, appropriate integral inequalities are used, making the obtained criteria less conservative in this paper. Then, a new event-trigger mechanism (ETM) controller under ICAs is designed to control the asymptotical stability (AS) of NCSs. Finally, a numerical experiment verifies the correctness and feasibility of the theory.
1. Introduction
As one of the greatest inventions in the 21st century, the popularity of the Internet has brought significant changes and influences on people’s production and lives. With the further development of the Internet, the emergence of big data better reflects the advantages of the Internet. Better handling of big data and better transmission of data have become a hot direction for future research [1, 2]. Data transmission is ultimately reflected in network communication applications (see Figure 1). Thus, network communication technology has been widely used in industrial and military fields. It is a current trend to add components of control systems to these applications through the Internet [3–5].

However, in control theory, signal transmission usually relies on network communication techniques. Therefore, this brings the control system into contact with the Internet [6, 7]. Signal transmission between the components of NCSs can be carried out through the network. When we design and implement the corresponding control system, we can reduce the influence of the signal transmission between the components of NCSs through the network [8]. This approach allows NCSs to reduce their complexity and overall cost-effectiveness. Unnecessary wiring between components is eliminated, which effectively reduces the NCS complexity and overall cost. Therefore, NCSs have become one of the hot issues of current research [9, 10]. In [8], Zhang proposed a novel robust event-triggered fault-tolerant automatic steering control strategy for autonomous land vehicles to achieve path tracking and vehicle lateral motion control under in-vehicle network delay. In [9], the problem of fault-tolerant sampled-data control for an NCS with random time delays and actuator faults was investigated. In [10], the authors studied the application of NCSs to high-speed trains.
On the one hand, the data on the NCS can be effectively shared, which facilitates the fusion of all the information in an ample actual physical space. This way, if the system needs to be upgraded or changed, sensors, controllers, and actuators will need to be added or removed without significant changes to the system architecture [11]. Most importantly, connecting cyber-space to physical space makes real-time control feasible. Therefore, this makes the NCSs gradually tend to control artificial intelligence and the arrival of the era when everything is connected [12]. On the other hand, the transmission of signals in the communication process of the network is not always secure. Normal loss or delay of signals in network communications is a common phenomenon. We think this phenomenon is acceptable and can be controlled. There has been a malicious attack or sabotage of communication equipment or control systems. We believe this behavior is a cyber-attack, and the person that launched the cyber-attack is a hacker [13]. At present, common cyber-attacks are mainly divided into the following categories: random cyber-attacks [14–16], deception cyber-attacks [17–19], jamming attacks [20, 21], and DoS attacks [22–24]. Thus, effectively countering and defending against hacker attacks is also one of the hot topics. In [15], Liu focused on the controller design problem of NCSs, and a hybrid-triggering communication strategy was employed to save the limited communication resources. In [18], the authors investigated the memory sample-data control issue of the T-S fuzzy NCSs with multiple asynchronous deception attacks. In [21], the event-based controller synthesis problem of NCSs under resilient event-triggering communication schemes and periodic DoS jamming attacks was studied. In [24], Feng aimed to explore the tradeoffs between system resilience and network bandwidth capacity.
Based on the above discussion, this paper mainly studies the security issues of NCSs. When hackers attack the system, the ETM controller we designed can effectively ensure the stability of the system. Compared with existing works [25–27], the main contributions of this paper are as follows:(1)According to the advent of the Internet and the big data era, the security issues of NCSs are being studied. A new ICA is proposed to study the communication security of the system.(2)A more general LKF is constructed by utilizing the time-delay phenomenon inside the system. According to the characteristics of the sampling period, the constructed LKF contains more sampling information. In addition, the positive definiteness constraint on the initial matrices is further relaxed.(3)For ICAs launched by hackers, we designed an ETM controller to ensure the AS of the NCS.
2. Preliminaries
In this article, we research the following NCSs:where is the current state vector of the system; is the signal to control the input; and and are constant matrices.
The control signals are represented as follows:where is the injection attack function.
Remark 1. The popularity of the Internet has made the processing of big data more efficient and faster. Therefore, studying the control of the system based on network communication has become a hot topic of research. There are always some signal fluctuations in the communication process of the control signal. Normal signal fluctuations of the control signal are acceptable. However, some abnormal signals are often injected into the system to destroy the systems’ performance, which we call ICAs. As shown in Figure 2, the sensor communicates with the actuator through network communication with signal transmission. During this process, the system may be maliciously attacked by hackers. Therefore, this paper designs a suitable ETM controller for the communication security of NCSs to ensure the system’s regular operation.
Then, the controller can be designed aswhere is a controller gain matrix.
In this framework, the sensor is time-triggered while the controller, the zero-order hold (ZOH), and the actuator are event-triggered.
We will illustrate our proposed security-orient resilient triggering strategy as follows:where and . is the latest transmitted signal at the latest triggering time . The sampling interval is divided into . satisfies , where , , and . We define and , in which . From the definitions of and , we can obtain .
Then, we can obtainFrom equations (1) and (5), the closed-loop system as follows:

Assumption 1. ([19]). Any and meets the Lipschitz condition with the following form:where is the upper bound of .
Lemma 1 (see [28]). Given and integrate over the interval , we know the matrix inequality holds:where and .
3. Main Results
Theorem 1. Given positive scalars , , , , and , system (6) is AS; if there exist symmetric matrices , and , , then any matrices , , and with appropriate dimensions satisfy the following LMIs:where other symbols and associated equations are expressed in Appendix B.
Proof. Construct a suitable LKF as follows:where , , , , , , and are listed in Appendix A.Then, we can obtain the derivative of as follows:By using Lemma 1, we haveThus, we know that the following inequality holds:Based on system (6), for any matrices , , and , we have the following equation:According to Assumption 1, we have the following equation:Considering the rules of the designed event-triggered schemes, the following equation holds:According to equations (13)–(22), the following equation hold:By using the LCCM, for all, are established. Then, using the Schur complement lemma, we know that (23) is equivalent toTherefore, it follows . Finally, system (6) tends to AS.
Remark 2. Compared with existing works [26, 27, 29], this paper constructs a more general LKF for the time-delay phenomenon in systems: (1) when , the constructed LKF will degenerate into being independent of time delay and (2) when , the LKF contains correct time-delay information and time-delay derivative information. This method can introduce more information storage and reduce the conservativeness of the criterion.
Remark 3. Different from the traditional BLFs, constructed in this paper contains more sampling moments information and . When holds, there is no constraint on the matrices . The BLF constructed in this paper is a promotion and enhancement of the BLF in [30].
Remark 4. In this paper, we construct and . Compared with the LKF in reference [30], and contain the sampling period information and time-delay information. Then, we obtain tighter upper bounds by scaling with appropriate integral inequalities, which ensures that the criterion is less conservative.
Remark 5. This paper analyzes the performance of the computer in the process of solving the LMIs. The computational complexity of Theorem 1 is . Then, based on Intel(R) Core(TM) i7-8700 CPU@3.20 GHz 3.19 GHz, pairs of large-scale LMIs are calculated.
Theorem 2. Given scalars , , , , , , and , system (6) is AS; if there exist symmetric matrices , , , and , any matrices , , and with appropriate dimensions satisfy the following LMIs:where other symbols and associated equations are expressed in Appendix C.
Proof. the matrices are defined as and .
Then, other matrices are defined as follows:Premultiplying and postmultiplying (9) and (10) by and , then according to Schur complement, we can derive the LMIs (25) and (26). The proof process is consistent with Theorem 1.
4. Illustrative Example
Example 1. Consider a NCS, the parameters are as follows [25]:
4.1. Case A: The System Is in Normal State
In this case, our research system is operating normally in a safe state. When , , and , we solve for maximum acceptable sampling periods (MASPs) by using Theorem 2. It can be seen from Table 1 that the MASPs under different are better than reference [25]. When , the solved in this paper is 24.2521% higher than the result of reference [25].
To verify the validity of the criterion, we solve the controller gain matrix is by using the Yalmip toolbox in Matlab. Then, we set , , and ; furthermore, the stability of the system is verified by plotting the state trajectory images of the system.
In Figure 3, we can see that with the increase in time, the running trajectory of the system will fluctuate. But it eventually converges on a steady state. This means that the controller we designed is suitable. In order to more intuitively reflect the effect of the controller designed in this paper, we also draw Figure 4 of the running trajectory of the system when the controller fails.


In addition, the release time distribution and control signal input are shown in Figures 5 and 6, respectively.


4.2. Case B: The System Is in Abnormal State
In this case, we conducted a simulation experiment, as in Case A. When , , , and , the MASPs solved by using Matlab are shown in Table 2. Table 2 shows that the performance of the system is reduced when the system is attacked. However, the method proposed in this paper can still ensure the stability of the system. Assuming , we solve when the system is running normally. However, solve for when ICAs constrain the system. By comparing the results, we know that although 11.3806% reduces the performance, our criterion is still less conservative than the results in reference [25].
Then, when the controller gain is . Setting , , and , the initial condition is . We assume that the attack function injected by the hacker is . When the system is subjected to ICAs, we plot the state trajectory of the system in Figure 7. Compared with the normal running trajectory in Figure 3, we can see that the system oscillates more obviously and can still reach a stable state eventually. Furthermore, the trajectory of the system in the case of controller failure is plotted in Figure 8.


Finally, we plot the release time distribution of the system in Figure 9 and the control signal input in Figure 10.


5. Conclusion
This paper has considered the secure stability issue of NCSs under ICAs, which have important research value of applications for network security. Firstly, a more general LKF has been constructed based on the time-delay phenomenon in the system. Secondly, a novel BLF has been developed depending on the sampling period, fully considering time delay and sampling information, and the initial constraints on the criterion on the matrices have been effectively relaxed. In addition, appropriate integral inequalities have been used, making the criteria less conservative in this paper. Then, a new ETM controller under ICAs has been designed to control the AS of NCSs. Finally, a numerical experiment has verified the correctness and feasibility of the theory. In the future, we extend this method and safety control strategy to T-S fuzzy systems, switching systems, Markov hopping systems, and some other systems.
Appendix
A
B
C
Notations
: | n-Dimensional Euclidean space |
: | real matrices |
: | Identity matrix |
: | real symmetric matrices |
: | Denote that is a real positive definite matrix |
, and diag : | Block diagonal matrix. |
Data Availability
The data used to support this study are available from the corresponding author upon request.
Conflicts of Interest
The authors declare that there are no conflicts of interest.
Acknowledgments
This work was supported by the National Natural Science Foundation of China (n61703060, 12061088, 61802036, and 61873305), the Sichuan Science and Technology Program (21YYJC0469), the Project funded by the China Postdoctoral Science Foundation (2020M683274 and 2021T140092), the Open Research Project of the State Key Laboratory of Industrial Control Technology, Zhejiang University, China (ICT2021B38), and Guangdong Basic and Applied Basic Research Foundation (2021A1515011692). This study was supported by a grant from the Science and Technology Department of Sichuan Province (2020YFG0300) and an open project fund of Intelligent Terminal Key Laboratory of Sichuan Province (2019–2020)+SCITLAB-0002.