Introduction
In recent years, the control issues of time-delay systems have been an attractive research topic due to its significant value in theory and practice (see [1]–[6] and reference therein). Wu and Wang [2] developed a novel predictor for discrete-time linear systems with input delay and external disturbance. The creative idea in [2] is to make full use of available information to construct an estimation of the future state. Min et al. [6] proposed a relaxed result for stabilizing unknown high-order stochastic nonlinear systems by removing the growth assumption. Furthermore, by combining with the intelligent approximation technique, the adaptive fuzzy or neural network (NN) control approaches have been developed to handle the control problems of unknown nonlinear time-delay systems [7]–[10]. To mention a few, Wang et al. [8] developed an adaptive output-feedback control scheme for a class of stochastic nonlinear time-delay systems with nonlower-triangular form. Ma et al. [11] addressed the event-triggered adaptive output-feedback control issue of nonstrict-feedback nonlinear systems with time-varying state delays and input delay for the first time, where the ISS assumption was fully removed. Furthermore, the dynamic surface control (DSC) method and the command filtered backstepping technique were employed to avoid the problem of “explosion of complexity” in [12]–[15], which reduced the computational burden greatly. Still, it is worth noting that the aforementioned results only guaranteed the asymptotic stability of the closed-loop system (CLS), which means that the closed-loop convergence can be ensured as time goes to infinity. However, numerous real systems are required to reach steady state within a finite time under a specified operating condition. Therefore, establishing an adaptive finite-time control scheme for more general nonlinear time-delay systems remains an open and challenging problem.
When a control system suffers the various inferences caused by human-made or natural factors such as cyberattacks and sensor/actuator failures, poor performance and instability may be inevitable. To this end, the reliability of the control system design has been a research topic with important significance and practical value. The existing resilient control schemes were mainly divided into two categories: fault-tolerant control against sensor/actuator faults and secure control against malicious cyberattacks. Regarding the first one, many remarkable achievements have been obtained for different kinds of linear/nonlinear systems [16]–[21]. Wu et al. [17] designed an observer-based adaptive fault-tolerant controller for nonlinear systems with nonstrict-feedback form, where the bounds of the actuation effectiveness and stuck faults are assumed to be available in advance for facilitating controller design. Song et al. [21] proposed a non-PDC method for nonlinear PDE systems, where a novel event-triggered mechanism was developed to reduce the transmission burden of sensor networks. Correspondingly, considerable attention has been paid to the secure control problem of cyber-physical systems (CPSs) due to the importance of network security (see [22]–[25] and reference therein). However, these methods proposed in the aforementioned achievements were focused on linear systems and robust control problem. More specifically, only a few studies were conducted for the adaptive secure control problem of nonlinear CPSs [26]–[28]. By combining with backstepping control framework and linear matrix inequality technique, An and Yang [26] developed an adaptive fuzzy resilient decentralized control method against denial-of-service attacks. In [27], a new coordinate transformation was established to handle false data injection attacks. However, the derivatives of virtual control laws were required for designing controller in [26] and [27]. This also means that the proposed methods may be hard to be implemented when the nonlinear systems with high dimensions were considered. Consequently, the DSC method was adopted in [28] to cope with this issue, where attacks compensator was constructed to eliminate the negative effects caused by deception attacks. Nevertheless, the results obtained in [28] based on the assumption that the attack weight was strictly required to be positive, which increased the conservatism of the proposed method to a certain extent. What’s more, it is necessary to emphasize that all aforementioned results paid attention to the asymptotic secure control problem. To our knowledge, the adaptive finite-time control problem for nonlinear time-delay systems with cyberattacks has not been investigated yet, which is still a challenging problem.
Recently, the command filtered backstepping technique, initially proposed by Farrell et al. [29], provides one effective solution to reduce the computational complexity of the traditional backstepping design. To this end, this technique has been widely employed to fulfill the controller design in the backstepping control framework (see [30]–[33] and reference therein). However, there is no result reported on command filter-based adaptive secure control problem for nonlinear time-delay systems with cyberattacks. On the other hand, it has been recognized that the FO control provides a new solution for enhancing the degree of freedom of controller design and improving system performance due to the unique advantage of historical memory in fractional calculus [34]–[36]. Although various FO control strategies have been established by integrating with FO characteristics and IO control methods so far, to the author’s best knowledge, there were a few available results on command filter-based adaptive finite-time resilient control for nonlinear systems with unknown cyberattacks and actuator faults.
Inspired by the above discussion, this work aims to develop a novel adaptive finite-time resilient control scheme for nonlinear time-delay systems with unknown false data injection attacks and actuator faults. The main novelties of this work are summarized as follows.
This work makes the first attempt to investigate the command filter-based adaptive finite-time resilient control problem for a class of nonlinear time-delay systems with unknown false data injection attacks and actuator faults. Compared with the existing literature [23], [24], [27], [28], a class of more general nonlinear time-delays systems were investigated in this article, where the unknown false data injection attacks and actuator faults are considered simultaneously. Noted that the system model considered in [23], [24], [27], and [28] can be viewed as a special case of this work. Obviously, the presented results provide a unified framework for addressing the adaptive resilient control problem of nonlinear time-delay systems with strict-feedback form.
Different from [28] and [37], the conservative assumption that the sign of attack weight is strictly required to be positive can be fully removed based on the Nussbaum gain technique. Besides, the bounds of the actuation effectiveness and stuck faults are not required in this article. Moreover, by integrating with the command-filtered backstepping technique and fractional calculus, a modified fractional-order command filter (FOCF) is developed such that the computational burden of the existing methods in [26] and [27] is greatly relaxed and filter performance is obviously improved in comparison to [28] and [37].
The methods proposed in [23], [24], and [26]–[28] were concentrated on the asymptotic stability of the CLS. Distinct from these results, the finite-time stability of the controlled system with faster response and higher control precision can be guaranteed by using the proposed method in this work.
Preliminaries and System Description
A. Nonlinear System Model
In this article, we focus on a class of nonlinear time-delay systems with unknown false data injection attacks and actuator faults described by \begin{align*} \begin{cases} \displaystyle {\dot {x}_{i}}={x_{i+1}}+f_{i}\left ({\bar {x}_{i}}\right)+g_{i}\left ({\bar {x}_{i,\tau \left ({t}\right)}}\right)+d_{i}\left ({t}\right) \\ \displaystyle {\dot {x}_{n}}=\sum _{j=1}^{p}b_{j}u_{j}+f_{n}\left ({x}\right)+g_{n}\left ({\bar {x}_{n,\tau \left ({t}\right)}}\right)+d_{n}\left ({t}\right)\\ \displaystyle \check {x}_{j}=x_{l}+A_{l,s}\left ({x_{l},t}\right), ~i=1,\ldots,n-1;\quad l=1,\ldots,n \end{cases} \tag{1}\end{align*}
\begin{align*}&u_{j}\left ({t}\right)=l_{jm}v_{j}+\bar {u}_{jd,m}, \quad t\in \left [{t_{jm,s}, t_{jm,e}}\right) \tag{2}\\&l_{jm}\bar {u}_{jd,m}=0, \quad j=1,2,\ldots,p \tag{3}\end{align*}
with\bar {u}_{jd,m}=0 . This case stands for the actuator undergoes the partial loss of effectiveness. For instance,0 < l_{jm} < 1 means that the 30% actuator is normally operating after losing 70% effectiveness.l_{jm}=0.3 . In this case, the input of the actuator equal to its output, i.e.,\bar {u}_{jd,m}=0, l_{jm}=1 . It also reflects that the actuator works normally.u_{j}(t)=v_{j} . This situation means that the bias fault occurs.\bar {u}_{jd,m}\neq 0, l_{jm}=1 . In this situation,\bar {u}_{jd,m}\neq 0, l_{jm}=0 is stuck at an unknown constantu_{j} such that it cannot be influenced by the control signal\bar {u}_{jd,m} . This also implies that the actuator suffers from the total loss of effectiveness.v_{j}
Our control goal is to establish a novel adaptive resilient control framework for nonlinear time-delay systems subject to unknown false data injection attacks and actuator faults as shown in Fig. 1 while ensuring that the finite-time stability of the CLS can be achieved.
B. RBF Neural Networks
To fulfill the predefined control goal, RBF NNs shall be adopted to estimate the unknown nonlinearities. It is proved that [40]–[43] that with enough NNs nodes number, the continuous item \begin{equation*} F_{i}\left ({\triangle _{i}}\right)=\theta _{i}^{\ast T}\varphi _{i}\left ({\Delta _{i}}\right)+o_{i} \end{equation*}
\begin{equation*} \varphi _{ik}\left ({\Delta _{ik}}\right)=\frac {1}{\sqrt {2\pi }b_{ik}}\exp \left [{-\frac {\left ({\Delta _{i}-c_{ik}}\right)^{T}\left ({\Delta _{i}-c_{ik}}\right)}{b_{ik}^{2}}}\right]\end{equation*}
Assumption 1 ([44]):
Assumption 2 ([28]):
The unknown time-varying signal
Assumption 3 ([38]):
For up to
Remark 1:
Noted that Assumptions 1 has been widely utilized in the existing results about adaptive NN control for nonlinear systems. As similarly discussed in [44], Assumption 1 is not restricted according to the inherent property of Gaussian BFs. What’s more, these unknown upper bounds are required only for analytical purpose, which are not involved in controller design. For Assumptions 2,
C. Nussbaum Function
In this article, the Nussbaum function scheme is adopted to overcome the difficulty in control design caused by the unknown attacks. According to [45], for \begin{align*}&\lim _{\tau \rightarrow \infty }\sup \frac {1}{\tau }\int _{0}^{\tau }N\left ({\xi }\right)d\xi =+\infty \\&\lim _{\tau \rightarrow \infty }\inf \frac {1}{\tau }\int _{0}^{\tau }N\left ({\xi }\right)d\xi =-\infty.\end{align*}
Nowadays, it is recognized that a lot of continuous functions can be regarded as the Nussbaum-type function, such as
Lemma 1 ([45]):
Assume that \begin{equation*} V\left ({t}\right)\le m_{1}+e^{-m_{2}t}\int _{0}^{t}\left ({g\left ({\varsigma }\right)N\left ({\xi }\right)+1}\right)\dot {\xi }e^{m_{2}\varsigma }d\varsigma\end{equation*}
Definition 1:
[46] The fractional derivative of order \begin{equation*} D^{\alpha }f\left ({t}\right)=\frac {1}{\Gamma \left ({1-\alpha }\right)}\int _{t_{0}}^{t}\frac {f^{\prime }\left ({\tau }\right)}{\left ({t-\tau }\right)^{\alpha }}d\tau\end{equation*}
Lemma 2 ([30]):
For any real numbers
Lemma 3 ([47]):
For any real variables \begin{equation*} |z_{1}|^{\varsigma _{1}}|z_{2}|^{\varsigma _{2}}\le \frac {\varsigma _{1}}{\varsigma _{1}+\varsigma _{2}}\iota |z_{1}|^{\varsigma _{1} + \varsigma _{2}}+\frac {\varsigma _{2}}{\varsigma _{1}+\varsigma _{2}}\iota ^{\frac {-\varsigma _{1}}{\varsigma _{2}}}|z_{2}|^{\varsigma _{1}+\varsigma _{2}}.\end{equation*}
Lemma 4 ([48]):
Let \begin{equation*} |g\left ({\varsigma _{1},\varsigma _{2}}\right)|\le C\left ({\varsigma _{1}}\right)+D\left ({\varsigma _{2}}\right).\end{equation*}
Remark 2:
According to Lemma 4, for time-delay terms \begin{equation*} |g_{j}\left ({\bar {x}_{j,\tau \left ({t}\right)}}\right)|\le \sum _{m=1}^{j}\psi _{j,m}\left ({x_{m}\left ({t-\tau _{m}\left ({t}\right)}\right)}\right). \tag{4}\end{equation*}
Main Results
This section will propose a command-filtered-based adaptive finite-time resilient control scheme for nonlinear time-delay system (1).
A. Adaptive Finite-Time Resilient Control Design
According to the description of the investigated false data injection attacks, we have \begin{equation*} x_{i}\left ({t}\right)=\beta \left ({t}\right)\check {x}_{i}\left ({t}\right) \tag{5}\end{equation*}
To handle the unknown attacks, a new change of coordinates is defined as \begin{align*} \begin{cases} \displaystyle s_{1}=x_{1} \\ \displaystyle s_{i}=x_{i}-\beta \vartheta _{i-1}^{f},\quad \left ({i=2,\ldots,n}\right) \end{cases} \tag{6}\end{align*}
Remark 3:
Influenced by the malicious attacks from attackers, it is worthy to point out that the original state of the system
It follows from (6) that:\begin{align*} \begin{cases} \displaystyle \check {s}_{1}=\check {x}_{1} \\ \displaystyle \check {s}_{i}=\check {x}_{i}-\vartheta _{i-1}^{f},\quad \left ({i=2,\ldots,n}\right) \end{cases} \tag{7}\end{align*}
\begin{align*} \begin{cases} \displaystyle D^{\alpha }{\lambda }_{i-1,1}=\ell _{i-1,1}\\ \displaystyle \ell _{i-1,1}=-\alpha _{i-1,1}\lceil \lambda _{i-1,1}-\eta _{i-1}\rfloor ^{\beta _{1}}\\ \displaystyle \qquad \qquad \quad -\,\alpha _{i-1,2}\lceil \lambda _{i-1,1}-\eta _{i-1}\rfloor ^{\beta _{2}}+\lambda _{i-1,2}\\ \displaystyle D^{\alpha }{\lambda }_{i-1,2}=-\alpha _{i-1,3}\lceil \lambda _{i-1,1}-\eta _{i-1}\rfloor ^{\beta _{3}} \end{cases} \tag{8}\end{align*}
Remark 4:
Due to the unique property of historical memory in fractional calculus, it has been recognized that the FO control provides a possible solution for obtaining higher control accuracy and the degree of freedom for control system design in comparison to the IO counterpart. Therefore, we make the first attempt to develop an FOCF to obtain the filtered signals of virtual control laws in this work. Different from most of the existing results [34], [49], the proposed FOCF not only overcomes the computational complexity of traditional recursive control method but also improves the filter performance. To show the difference between the proposed filter and the existing results, a comparison result is presented by using three filters, including the common integer-order filter (IOF) adopted in [49], the extended fractional-order filter (FOF) adopted in [34] and [50], and the modified FOCF proposed in (8). Defining the signal
Define the filter error \begin{align*} \begin{cases} \displaystyle \dot {\gamma }_{i}=-a_{i1}\gamma _{i}-a_{i2}\gamma _{i}^{2q-1}-\Theta \left ({\check {s}_{i},\gamma _{i},\epsilon _{i}}\right)\gamma _{i}+\epsilon _{i} \\ \displaystyle \dot {\gamma }_{n}=-a_{n1}\gamma _{n}-a_{n2}\gamma _{n }^{2q-1},\quad \left ({i=1,\ldots,n-1}\right) \end{cases} \tag{9}\end{align*}
Design the virtual control function and adaptive laws as \begin{align*} \eta _{i}=&-k_{i}\check {s}_{i}+N\left ({\xi _{i}}\right)\bar {\eta }_{i}+\gamma _{i} \tag{10}\\ \bar {\eta }_{i}=&\frac {\check {s}_{i}\hat {\hbar }_{i}\varphi _{i}^{T}\left ({\check {\Delta }_{i}}\right)\varphi _{i}\left ({\check {\Delta }_{i}}\right)}{2\sigma _{i}^{2}}+2c_{i}\check {s}_{i}+\frac {\hat {\Gamma }_{i}\check {s}_{i}}{\sqrt {\check {s}_{i}^{2}+\varpi _{1}^{2}}} \tag{11}\\ \dot {\hat {\hbar }}_{i}=&\frac {1}{2\sigma _{i}^{2}}\check {s}_{i}^{2}\varphi _{i}^{T}\left ({\check {\triangle }_{i}}\right)\varphi _{i}\left ({\check {\triangle }_{i}}\right)-\rho _{i,1}\hat {\hbar }_{i} \tag{12}\\ \dot {\hat {\Gamma }}_{i}=&\frac {\check {s}_{i}^{2}}{\sqrt {\check {s}_{i}^{2}+\varpi _{1}^{2}}}-\rho _{i,2}\hat {\Gamma }_{i}, ~~i=1,\ldots,n \tag{13}\end{align*}
\begin{align*} v_{j}=&N\left ({\xi _{n+1}}\right)\bar {\eta }_{n+1} \tag{14}\\ \bar {\eta }_{n+1}=&\check {s}_{n}\hat {\chi }_{2}\eta _{n}^{2}+\hat {\chi }_{1}\tanh \left ({\frac {\hat {\chi }_{1}\check {s}_{n}}{\varpi _{2}}}\right) \tag{15}\\ \dot {\hat {\chi }}_{1}=&|\check {s}_{n}|-\rho _{n+1,1}\hat {\chi }_{1} \tag{16}\\ \dot {\hat {\chi }}_{2}=&\check {s}_{n}^{2}\eta _{n}^{2}-\rho _{n+1,2}\hat {\chi }_{2} \tag{17}\end{align*}
Step 1:
According to (1) and (6), the derivative of
is calculated ass_{1} \begin{equation*} \dot {s}_{1}=s_{2}+\beta \left ({\eta _{1}+\epsilon _{1}}\right)+f_{1}\left ({\bar {x}_{1}}\right)+g_{1}\left ({\bar {x}_{1,\tau \left ({t}\right)}}\right)+d_{1}\left ({t}\right). \tag{18}\end{equation*} View Source\begin{equation*} \dot {s}_{1}=s_{2}+\beta \left ({\eta _{1}+\epsilon _{1}}\right)+f_{1}\left ({\bar {x}_{1}}\right)+g_{1}\left ({\bar {x}_{1,\tau \left ({t}\right)}}\right)+d_{1}\left ({t}\right). \tag{18}\end{equation*}
Select the following Lyapunov function:\begin{equation*} V_{1}=\frac {1}{2}s_{1}^{2}+\frac {1}{2}\tilde {\hbar }_{1}^{2}+\frac {1}{2}\gamma _{1}^{2}+\frac {1}{2}\tilde {\Gamma }_{1}^{2}+W_{1} \tag{19}\end{equation*}
Then, it can be deduced that \begin{align*} \dot {V}_{1}\le&-s_{1}^{2q}+ \frac {1}{2}s_{1}^{2}+\frac {1}{2}s_{2}^{2}+\left ({1-2\tanh ^{2}\left ({\frac {s_{1}}{\iota _{1}}}\right)}\right)\Phi _{1} \\&+\,s_{1}\beta \eta _{1}+\check {s}_{1}\left [{F_{1}\left ({x_{1},s_{1},\beta }\right)+D_{1}}\right]+s_{1}\beta \epsilon _{1} \\&+\,s_{1}g_{1}\left ({\bar {x}_{1,\tau \left ({t}\right)}}\right)-\tilde {\hbar }_{1}\dot {\hat {\hbar }}_{1}+\gamma _{1}\dot {\gamma }_{1}-\tilde {\Gamma }_{1}\dot {\hat {\Gamma }}_{1}+\dot {W}_{1} \tag{20}\end{align*}
Remark 5:
According to (22), it is easily found that the term
Using the NN approximation technique, one can obtain \begin{align*}&\dot {W}_{1}\le -b_{11}W_{1}+\Phi _{1}-\psi _{1,1}^{2}\left ({x_{1,\tau _{1}\left ({t}\right)}}\right) \tag{21}\\&s_{1}g_{1}\left ({\bar {x}_{1,\tau \left ({t}\right)}}\right)\le \frac {1}{4}s_{1}^{2}+\psi _{1,1}^{2}\left ({x_{1,\tau _{1}\left ({t}\right)}}\right). \tag{22}\end{align*}
Invoking (20)–(22) yields \begin{align*} \dot {V}_{1}\le&-s_{1}^{2q}+\frac {3}{4}s_{1}^{2}+\frac {1}{2}s_{2}^{2}+s_{1}\beta \eta _{1}+\check {s}_{1}\left ({\theta _{1}^{\ast T}\varphi _{1}\left ({\check {\Delta }_{1}}\right)+D_{1}}\right) \\[2pt]&+\,\check {s}_{1}\Psi _{1}+s_{1}\beta \epsilon _{1}-\tilde {\hbar }_{1}\dot {\hat {\hbar }}_{1}+\gamma _{1}\dot {\gamma }_{1}-\tilde {\Gamma }_{1}\dot {\hat {\Gamma }}_{1}-b_{11}W_{1} \\[2pt]&+\,\left ({1-2\tanh ^{2}\left ({\frac {s_{1}}{\iota _{1}}}\right)}\right)\Phi _{1} \tag{23}\end{align*}
Based on Assumptions 1 and 2, one gets that
Using Lemma 7 and Young’s inequality, we have \begin{align*}&\hspace {-0.5pc}\check {s}_{1}\left ({\theta _{1}^{\ast T}\varphi _{1}\left ({\check {\Delta }_{1}}\right)+D_{1}}\right)\le \frac {\check {s}_{1}^{2}\hbar _{1}\varphi _{1}^{T}\left ({\check {\Delta }_{1}}\right)\varphi _{1}\left ({\check {\Delta }_{1}}\right)}{2\sigma _{1}^{2}}+\frac {1}{2}\sigma _{1}^{2} \\&+\,\varpi _{1}\Gamma _{1}+\frac {\Gamma _{1}\check {s}_{1}^{2}}{\sqrt {\check {s}_{1}^{2}+\varpi _{1}^{2}}} \tag{24}\end{align*}
Defining \begin{align*} \dot {V}_{1}\le&-b_{11}W_{1}-\bar {k}_{1}s_{1}^{2}-s_{1}^{2q}+\frac {1}{2}s_{2}^{2}+\left ({g_{1}\left ({t}\right)N\left ({\xi _{1}}\right)+1}\right)\dot {\xi }_{1} \\&+\,\rho _{1,1}\tilde {\hbar }_{1}\hat {\hbar }_{1}+\rho _{1,2}\tilde {\Gamma }_{1}\hat {\Gamma }_{1}-\bar {a}_{11}\gamma _{1}^{2}-a_{12}\gamma _{1}^{2q}-\bar {a}_{13}\epsilon _{1}^{2} \\&+\,\left ({1-2\tanh ^{2}\left ({\frac {s_{1}}{\iota _{1}}}\right)}\right)\Phi _{1}+\zeta _{1} \tag{25}\end{align*}
For the terms \begin{align*} \rho _{1,1}\tilde {\hbar }_{1}\hat {\hbar }_{1}\le&-\bar {\rho }_{1,1}\tilde {\hbar }_{1}^{2}+\bar {\rho }_{1,1}\hbar _{1}^{2} \tag{26}\\ \rho _{1,2}\tilde {\Gamma }_{1}\hat {\Gamma }_{1}\le&-\bar {\rho }_{1,2}\tilde {\Gamma }_{1}^{2}+\bar {\rho }_{1,2}\Gamma _{1}^{2} \tag{27}\end{align*}
Furthermore, defining \begin{equation*} \left ({\frac {1}{2}\tilde {\hbar }_{1}^{2}}\right)^{q}\le \left ({1-q}\right)\varrho +\frac {1}{2}\tilde {\hbar }_{1}^{2}. \tag{28}\end{equation*}
Similarly, one has \begin{align*} \left ({\frac {1}{2}\tilde {\Gamma }_{1}^{2}}\right)^{q}\le&\left ({1-q}\right)\varrho +\frac {1}{2}\tilde {\Gamma }_{1}^{2} \tag{29}\\ W_{1}^{q}\le&\left ({1-q}\right)\varrho +W_{1}. \tag{30}\end{align*}
It follows from the inequalities (25)–(30) that:\begin{align*} \dot {V}_{1}\le&-\bar {k}_{1}s_{1}^{2}-s_{1}^{2q}+\frac {1}{2}s_{2}^{2}+\left ({g_{1}\left ({t}\right)N\left ({\xi _{1}}\right)+1}\right)\dot {\xi }_{1} \\&-\,\bar {a}_{11}\gamma _{1}^{2}-a_{12}\gamma _{1}^{2q}-\bar {a}_{13}\epsilon _{1}^{2}-\frac {\bar {\rho }_{1,1}}{2}\tilde {\hbar }_{1}^{2}-\frac {\bar {\rho }_{1,2}}{2}\tilde {\Gamma }_{1}^{2} \\&-\,\bar {\rho }_{1,1}\left ({\frac {1}{2}\tilde {\hbar }_{1}^{2}}\right)^{q}-\bar {\rho }_{1,2}\left ({\frac {1}{2}\tilde {\Gamma }_{1}^{2}}\right)^{q}-\bar {b}_{11}W_{1} \\&-\,b_{12}W_{1}^{q}+\left ({1-2\tanh ^{2}\left ({\frac {s_{1}}{\iota _{1}}}\right)}\right)\Phi _{1}+\bar {\zeta }_{1} \tag{31}\end{align*}
Step \begin{align*}&\hspace {-0.5pc}\dot {s}_{i}=s_{i+1}+\beta \eta _{i}+\beta \epsilon _{i}+f_{i}\left ({\bar {x}_{i}}\right)+g_{i}\left ({\bar {x}_{i,\tau \left ({t}\right)}}\right) \\&+\,d_{i}\left ({t}\right)-\dot {\beta }\vartheta _{i-1}^{f}-\beta \dot {\vartheta }_{i-1}^{f} \tag{32}\end{align*}
Select the following Lyapunov function:\begin{equation*} V_{i}=V_{i-1}+\frac {1}{2}s_{i}^{2}+\frac {1}{2}\tilde {\hbar }_{i}^{2}+\frac {1}{2}\gamma _{i}^{2}+\frac {1}{2}\tilde {\Gamma }_{i}^{2}+W_{i} \tag{33}\end{equation*}
Then, it is calculated that \begin{align*} \dot {V}_{i}\le&\dot {V}_{i-1}-s_{i}^{2q}+ \frac {1}{2}s_{i}^{2}+\frac {1}{2}s_{i+1}^{2}-2\tanh ^{2}\left ({\frac {s_{i}}{\iota _{i}}}\right)\Phi _{i} \\&+\,s_{i}\beta \left ({\eta _{i}+\epsilon _{i}}\right)+\check {s}_{i}\left [{F_{i}\left ({\bar {x}_{i},s_{i},\beta,\dot {\beta },\vartheta _{i-1}^{f},\dot {\vartheta }_{i-1}^{f}}\right)+D_{i}}\right] \\&+\,s_{i}g_{i}\left ({\bar {x}_{i,\tau \left ({t}\right)}}\right)-\tilde {\hbar }_{i}\dot {\hat {\hbar }}_{i}+\gamma _{i}\dot {\gamma }_{i}-\tilde {\Gamma }_{i}\dot {\hat {\Gamma }}_{i}+\dot {W}_{i} \tag{34}\end{align*}
Similarly, one can obtain \begin{align*} \dot {W}_{i}\le&-b_{i1}W_{i}+\Phi _{i}-\sum _{j=1}^{i}\psi _{i,j}^{2}\left ({x_{j,\tau _{j}\left ({t}\right)}}\right) \tag{35}\\ s_{i}g_{i}\left ({\bar {x}_{i,\tau \left ({t}\right)}}\right)\le&\frac {1}{4}s_{i}^{2}+\sum _{j=1}^{i}\psi _{i,j}^{2}\left ({x_{j,\tau _{j}\left ({t}\right)}}\right). \tag{36}\end{align*}
Using (35) and (36), (34) can be written as \begin{align*} \dot {V}_{i}\le&\dot {V}_{i-1}\!-\!s_{i}^{2q}\!+\!\frac {3}{4}s_{i}^{2}+\frac {1}{2}s_{i+1}^{2}+s_{i}\beta \eta _{i}+\check {s}_{i}\left ({\theta _{i}^{\ast T}\varphi _{i}\left ({\check {\Delta }_{i}}\right)\!+\!D_{i}}\right) \\&+\check {s}_{i}\Psi _{i}+s_{i}\beta \epsilon _{i}-\tilde {\hbar }_{i}\dot {\hat {\hbar }}_{i}+\gamma _{i}\dot {\gamma }_{i}-\tilde {\Gamma }_{i}\dot {\hat {\Gamma }}_{i} \\&-b_{i1}W_{i}+\left ({1-2\tanh ^{2}\left ({\frac {s_{i}}{\iota _{i}}}\right)}\right)\Phi _{i} \tag{37}\end{align*}
Furthermore, the following equality holds:\begin{align*}&\hspace {-0.5pc}\check {s}_{i}\left ({\theta _{i}^{\ast T}\varphi _{i}\left ({\check {\Delta }_{i}}\right)+D_{i}}\right)\le \frac {\check {s}_{i}^{2}\hbar _{i}\varphi _{i}^{T}\left ({\check {\Delta }_{i}}\right)\varphi _{i}\left ({\check {\Delta }_{i}}\right)}{2\sigma _{i}^{2}}+\frac {1}{2}\sigma _{i}^{2} \\&+\,\varpi _{1}\Gamma _{i}+\frac {\Gamma _{i}\check {s}_{i}^{2}}{\sqrt {\check {s}_{i}^{2}+\varpi _{1}^{2}}}. \tag{38}\end{align*}
Using Assumptions 1 and 2 again, one gets that
Defining \begin{align*} \dot {V}_{i}\le&-\sum _{j=1}^{i}\left ({\bar {k}_{j}s_{j}^{2}+s_{j}^{2q}}\right)+\sum _{j=1}^{i}\left ({g_{j}\left ({t}\right)N\left ({\xi _{j}}\right)+1}\right)\dot {\xi }_{j}+\frac {1}{2}s_{i+1}^{2} \\&-\sum _{j=1}^{i}\left [{\bar {a}_{j1}\gamma _{j}^{2}+a_{j2}\gamma _{j}^{2q}+\bar {a}_{j3}\epsilon _{j}^{2}+\frac {\bar {\rho }_{j,1}}{2}\tilde {\hbar }_{j}^{2}}\right. \\&\qquad \qquad \left.{+\frac {\bar {\rho }_{j,2}}{2}\tilde {\Gamma }_{j}^{2}+\bar {\rho }_{j,1}\left ({\frac {1}{2}\tilde {\hbar }_{j}^{2}}\right)^{q}+\bar {\rho }_{j,2}\left ({\frac {1}{2}\tilde {\Gamma }_{j}^{2}}\right)^{q}}\right] \\&+\sum _{j=1}^{i}\left [{\bar {\zeta }_{j}-\bar {b}_{j1}W_{j}-b_{j2}W_{j}^{q}+\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j}}\right] \\\tag{39}\end{align*}
Step \begin{align*}&\hspace {-0.5pc}\dot {s}_{n}=\sum _{j=1}^{p}b_{j}l_{jm}v_{j}+w^{T}\phi +f_{n}\left ({\bar {x}_{n}}\right)+g_{n}\left ({\bar {x}_{n,\tau \left ({t}\right)}}\right) \\&+\,d_{n}\left ({t}\right)-\dot {\beta }\vartheta _{n-1}^{f}-\beta \dot {\vartheta }_{n-1}^{f} \tag{40}\end{align*}
\begin{align*} w=\left [{ \begin{matrix} b_{1}\bar {u}_{1d,m}\left ({t}\right) \\ b_{2}\bar {u}_{2d,m}\left ({t}\right) \\ \vdots \\ b_{p}\bar {u}_{pd,m}\left ({t}\right) \end{matrix} }\right], \phi =\left [{ \begin{matrix} 1 \\ 1 \\ \vdots \\ 1 \end{matrix} }\right].\end{align*}
To handle the unknown actuator faults and facilitate the design of the actual control signal, we define \begin{align*} V_{n}=V_{n-1}+\frac {1}{2}s_{n}^{2}+\frac {1}{2}\tilde {\hbar }_{n}^{2}+\frac {1}{2}\gamma _{n}^{2}+\frac {1}{2}\tilde {\Gamma }_{n}^{2} +\tilde {\chi }_{1}^{2}+\tilde {\chi }_{2}^{2}+W_{n} \\ \tag{41}\end{align*}
Furthermore, introducing a new variable \begin{align*} \dot {V}_{n}\le&\dot {V}_{n-1}-s_{n}^{2q}+s_{n}\left ({\sum _{j=1}^{p}b_{j}l_{jm}v_{j}+\beta \eta _{n}-\beta \eta _{n}}\right) \\&+\,s_{n}w^{T}\phi -2\tanh ^{2}\left ({\frac {s_{n}}{\iota _{n}}}\right)\Phi _{n}+\check {s}_{n} \\&\left [{D_{n}+F_{n}\left ({\bar {x}_{n},s_{n},\beta,\dot {\beta },\vartheta _{n-1}^{f},\dot {\vartheta }_{n-1}^{f}}\right)}\right]+s_{n}g_{n}\left ({\bar {x}_{n,\tau \left ({t}\right)}}\right) \\&-\,\tilde {\hbar }_{n}\dot {\hat {\hbar }}_{n}+\gamma _{n}\dot {\gamma }_{n}-\tilde {\Gamma }_{n}\dot {\hat {\Gamma }}_{n}-\sum _{j=1}^{2}\tilde {\chi }_{j}\dot {\hat {\chi }}_{j}+\dot {W}_{n} \tag{42}\end{align*}
Following the same procedure with Step 1, one has
Similarly, we have \begin{align*}&\dot {W}_{n}\le -b_{n1}W_{n}+\Phi _{n}-\sum _{j=1}^{n}\psi _{n,j}^{2}\left ({x_{j,\tau _{j}\left ({t}\right)}}\right) \tag{43}\\&s_{n}g_{n}\left ({\bar {x}_{n,\tau \left ({t}\right)}}\right)\le \frac {1}{4}s_{n}^{2}+\sum _{j=1}^{n}\psi _{n,j}^{2}\left ({x_{j,\tau _{j}\left ({t}\right)}}\right). \tag{44}\end{align*}
Invoking (42)–(44) gets \begin{align*} \dot {V}_{n}\le&\dot {V}_{n-1}-s_{n}^{2q}+s_{n}\left ({\sum _{j=1}^{p}b_{j}l_{jm}v_{j}+\beta \eta _{n}-\beta \eta _{n}}\right) \\&+\,\check {s}_{n}\left ({\theta _{n}^{\ast T}\varphi _{n}\left ({\check {\Delta }_{n}}\right)+D_{n}}\right)+s_{n}w^{T}\phi +\check {s}_{n}\Psi _{n} \\&-\,\tilde {\hbar }_{n}\dot {\hat {\hbar }}_{n}+\gamma _{n}\dot {\gamma }_{n}-\tilde {\Gamma }_{n}\dot {\hat {\Gamma }}_{n}-\sum _{j=1}^{2}\tilde {\chi }_{j}\dot {\hat {\chi }}_{j} \\&-\,b_{n1}W_{n}+\left ({1-2\tanh ^{2}\left ({\frac {s_{n}}{\iota _{n}}}\right)}\right)\Phi _{n} \tag{45}\end{align*}
Similarly, one gets that
Furthermore, it is easily derived that \begin{align*}&\hspace {-2pc}\check {s}_{n}\left ({\theta _{n}^{\ast T}\varphi _{n}\left ({\check {\Delta }_{n}}\right)+D_{n}}\right) \\\le&\frac {\check {s}_{n}^{2}\hbar _{n}\varphi _{n}^{T}\left ({\check {\Delta }_{n}}\right)\varphi _{n}\left ({\check {\Delta }_{n}}\right)}{2\sigma _{n}^{2}}+\frac {1}{2}\sigma _{n}^{2} \\&+\,\varpi _{1}\Gamma _{n}+\frac {\Gamma _{n}\check {s}_{n}^{2}}{\sqrt {\check {s}_{n}^{2}+\varpi _{1}^{2}}} \tag{46}\\ s_{n}w^{T}\phi\le&\tilde {\chi }_{1}|\check {s}_{n}|\!+\!\hat {\chi }_{1}\check {s}_{n}\tanh \left ({\frac {\hat {\chi }_{1}\check {s}_{n}}{\varpi _{2}}}\right)\!+\!0.2785\varpi _{2}. \tag{47}\end{align*}
Defining \begin{align*} \dot {V}_{n}\le&\dot {V}_{n-1}-\left ({k_{n}-\frac {1}{2}}\right)s_{n}^{2}-s_{n}^{2q}+\left ({g_{n}\left ({t}\right)N\left ({\xi _{n}}\right)+1}\right)\dot {\xi }_{n} \\&+\,\rho _{n,1}\tilde {\hbar }_{n}\hat {\hbar }_{n}+\rho _{n,2}\tilde {\Gamma }_{n}\hat {\Gamma }_{n}-\bar {a}_{n1}\gamma _{n}^{2}-a_{n2}\gamma _{n}^{2q} \\&-\,\sum _{j=1}^{2}\tilde {\chi }_{j}\dot {\hat {\chi }}_{j}+\tilde {\chi }_{1}|\check {s}_{n}|+\hat {\chi }_{1}\check {s}_{n}\tanh \left ({\frac {\hat {\chi }_{1}\check {s}_{n}}{\varpi _{2}}}\right) \\&+\,s_{n}\left ({\sum _{j=1}^{p}b_{j}l_{jm}v_{j}-\beta \eta _{n}}\right)+\zeta _{n}-b_{n1}W_{n} \\&+\,\left ({1-2\tanh ^{2}\left ({\frac {s_{n}}{\iota _{n}}}\right)}\right)\Phi _{n} \tag{48}\end{align*}
Furthermore, the inequality (48) can be rewritten as \begin{align*} \dot {V}_{n}\le&-\sum _{j=1}^{n}\left ({\bar {k}_{j}s_{j}^{2}+s_{j}^{2q}}\right)+\sum _{j=1}^{n}\left ({g_{j}\left ({t}\right)N\left ({\xi _{j}}\right)+1}\right)\dot {\xi }_{j} \\[-4pt]&-\,\sum _{j=1}^{n}\left [{\bar {a}_{j1}\gamma _{j}^{2}+a_{j2}\gamma _{j}^{2q}+\frac {\bar {\rho }_{j,1}}{2}\tilde {\hbar }_{j}^{2}+\bar {\rho }_{j,1}\left ({\frac {1}{2}\tilde {\hbar }_{j}^{2}}\right)^{q}}\right. \\[-4pt]&\qquad \qquad \left.{+\frac {\bar {\rho }_{j,2}}{2}\tilde {\Gamma }_{j}^{2}+\bar {\rho }_{j,2}\left ({\frac {1}{2}\tilde {\Gamma }_{j}^{2}}\right)^{q}}\right]-\sum _{j=1}^{n-1}\bar {a}_{j3}\epsilon _{j}^{2}+\tilde {\chi }_{1}|\check {s}_{n}| \\[-4pt]&-\,\sum _{j=1}^{2}\tilde {\chi }_{j}\dot {\hat {\chi }}_{j}+\hat {\chi }_{1}\check {s}_{n}\tanh \left ({\frac {\hat {\chi }_{1}\check {s}_{n}}{\varpi _{2}}}\right)+\sum _{j=1}^{n-1}\bar {\zeta }_{j} +\underline {\zeta }_{n}\\[-4pt]&+\sum _{j=1}^{n}\left [{\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j}-\bar {b}_{j1}W_{j}-b_{j2}W_{j}^{q}}\right] \\[-4pt]&+\,s_{n}\left ({\sum _{j=1}^{p}b_{j}l_{jm}v_{j}-\beta \eta _{n}}\right) \tag{49}\end{align*}
Defining \begin{align*} \dot {V}_{n}\le&-\sum _{j=1}^{n}\left ({\bar {k}_{j}s_{j}^{2}+s_{j}^{2q}}\right)+\sum _{j=1}^{n+1}\left ({g_{j}\left ({t}\right)N\left ({\xi _{j}}\right)+1}\right)\dot {\xi }_{j} \\[-4pt]&-\,\sum _{j=1}^{n}\left [{\bar {a}_{j1}\gamma _{j}^{2}+a_{j2}\gamma _{j}^{2q}+\frac {\bar {\rho }_{j,1}}{2}\tilde {\hbar }_{j}^{2}+\bar {\rho }_{j,1}\left ({\frac {1}{2}\tilde {\hbar }_{j}^{2}}\right)^{q}}\right. \\[-4pt]&\qquad \qquad \left.{+\frac {\bar {\rho }_{j,2}}{2}\tilde {\Gamma }_{j}^{2}+\bar {\rho }_{j,2}\left ({\frac {1}{2}\tilde {\Gamma }_{j}^{2}}\right)^{q}}\right] \\[-4pt]&-\,\sum _{j=1}^{n-1}\bar {a}_{j3}\epsilon _{j}^{2}-\frac {\bar {\rho }_{n+1,1}}{2}\tilde {\chi }_{1}^{2} \\[-4pt]&-\frac {\bar {\rho }_{n+1,2}}{2}\tilde {\chi }_{2}^{2}-\bar {\rho }_{n+1,1}\left ({\frac {1}{2}\tilde {\chi }_{1}^{2}}\right)^{q}-\bar {\rho }_{n+1,2}\left ({\frac {1}{2}\tilde {\chi }_{2}^{2}}\right)^{q} \\[-4pt]&+\sum _{j=1}^{n}\left [{\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j}-\bar {b}_{j1}W_{j}}\right. \\[-4pt]&\qquad \qquad \qquad \left.{-b_{j2}W_{j}^{q}+\bar {\zeta }_{j}\vphantom {\left [{\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j}-\bar {b}_{j1}W_{j}}\right.}}\right] \tag{50}\end{align*}
By choosing the appropriate design parameters, the inequality (50) can be rewritten as \begin{align*}&\hspace {-0.5pc}\dot {V}_{n} \le -\kappa _{1}V_{n}-\kappa _{2}V_{n}^{q}+\sum _{j=1}^{n+1}\left ({g_{j}\left ({t}\right)N\left ({\xi _{j}}\right)+1}\right)\dot {\xi }_{j} \\[-2pt]&+\,\sum _{j=1}^{n}\left [{\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j}+\bar {\zeta }_{j}}\right] \tag{51}\end{align*}
According to the aforementioned analysis, we can derive the main result in the following theorem.
Theorem 1:
Consider nonlinear time-delay system (1) under unknown false data injection attacks and actuator faults under Assumption 1–3, the proposed adaptive resilient control scheme, including the FO filter (8), compensation function (9), the intermediate control law (10)–(11), the actual control law (14) and (15), and the adaptive laws (12), (13), (16), and (17), can ensure that the following properties hold.
All the resulting closed-loop signals are semiglobal practical finite-time stable (SGPFT).
The stabilization error will converge to an arbitrary small neighborhood of the origin within a finite time
\begin{align*} T_{f}\le&\max \left \{{ \frac {1}{\nu \kappa _{1}(1-q)}\ln \frac {\nu \kappa _{1}V_{n}^{1-q}(0)+\kappa _{2}}{\kappa _{2}} }\right. \\[-2pt]&\qquad \qquad \left.{\frac {1}{\kappa _{1}(1-q)}\ln \frac {\kappa _{1}V_{n}^{1-q}(0)+\nu \kappa _{2}}{\nu \kappa _{2}}}\right \}.\end{align*} View Source\begin{align*} T_{f}\le&\max \left \{{ \frac {1}{\nu \kappa _{1}(1-q)}\ln \frac {\nu \kappa _{1}V_{n}^{1-q}(0)+\kappa _{2}}{\kappa _{2}} }\right. \\[-2pt]&\qquad \qquad \left.{\frac {1}{\kappa _{1}(1-q)}\ln \frac {\kappa _{1}V_{n}^{1-q}(0)+\nu \kappa _{2}}{\nu \kappa _{2}}}\right \}.\end{align*}
Proof:
The term \begin{align*} \sum _{j=1}^{n}\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j}=&\sum _{s_{i}\in \Pi _{s_{i}}}^{}\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j} \\[-2pt]&+\,\sum _{s_{i}\bar {\in }\Pi _{s_{i}}}^{}\left ({1-2\tanh ^{2}\left ({\frac {s_{j}}{\iota _{j}}}\right)}\right)\Phi _{j}. \\[-2pt]\tag{52}\end{align*}
According to (51) and (52), using [51, Lemma 3] yields \begin{equation*} \dot {V}_{n} \le -\kappa _{1}V_{n}-\kappa _{2}V_{n}^{q}+\sum _{j=1}^{n+1}\left ({g_{j}\left ({t}\right)N\left ({\xi _{j}}\right)+1}\right)\dot {\xi }_{j}+\Lambda \tag{53}\end{equation*}
Furthermore, applying Lemma 1, it can be obtained that \begin{equation*} \dot {V}_{n} \le -\kappa _{1}V_{n}-\kappa _{2}V_{n}^{q}+\bar {\Lambda }. \tag{54}\end{equation*}
Following the similar procedure with [30, Corollary 1], it can be concluded that all signals in the CLS are SGPFS. According to (53), it is easily obtained that \begin{equation*} \left \{{\lim _{t\rightarrow T_{f}}|V_{n}\le \min \left \{{\frac {\bar {\Lambda }}{\left ({1-\nu }\right)\kappa _{1}}, \left [{\frac {\bar {\Lambda }}{\left ({1-\nu }\right)\kappa _{2}}}\right]^{\frac {1}{q}} }\right \} }\right \} \tag{55}\end{equation*}
\begin{equation*} |s_{i}|\le \min \left \{{\sqrt {\frac {2\bar {\Lambda }}{\left ({1-\nu }\right)\kappa _{1}}}, \sqrt {2\left [{\frac {\bar {\Lambda }}{\left ({1-\nu }\right)\kappa _{2}}}\right]^{\frac {1}{q}}} }\right \} \tag{56}\end{equation*}
\begin{align*}&\hspace {-0.5pc}T_{f}\le \max \left \{{ \frac {1}{\nu \kappa _{1}\left ({1-q}\right)}\ln \frac {\nu \kappa _{1}V_{n}^{1-q}(0)+\kappa _{2}}{\kappa _{2}} }\right.\\[-2pt]&\left.{\frac {1}{\kappa _{1}\left ({1-q}\right)}\ln \frac {\kappa _{1}V_{n}^{1-q}(0)+\nu \kappa _{2}}{\nu \kappa _{2}}}\right \}\end{align*}
Remark 6:
Similar studies about the adaptive resilient control problems for nonlinear systems have been investigated in [18], [19], [23], [24], [27], and [28]. In [23], [24], [27], and [28], the obtained results were mainly focused on the asymptotic stability of the CLS. However, there is no result reported on the finite-time stability of nonlinear time-delay systems (1). Although some adaptive NN finite-time resilient control methods have been developed in [18] and [19], it worth noting that these methods are just valid for actuator faults, not suitable for handling unknown cyberattacks. What is more, the bounds of the actuation effectiveness and stuck faults are not required in this work different from [18] and [19].
Remark 7:
It worth pointing out that the investigated resilient control problem reduces to fault-tolerant control problem of nonlinear time-delay systems with sensor faults when
Simulation Studies
In this section, two simulation examples are provided to illustrate the effectiveness of the developed method in theory and application.
A. Numerical Example
Example 1:
We consider the following nonlinear system:\begin{align*} \begin{cases} \displaystyle \dot {x}_{1}=x_{2}+f_{1}\left ({\bar {x}_{1}}\right)+g_{1}\left ({\bar {x}_{1,\tau \left ({t}\right)}}\right)+d_{1}\left ({t}\right) \\ \displaystyle \dot {x}_{2}=\sum _{j=1}^{2}b_{j}u_{j}+f_{2}\left ({\bar {x}_{2}}\right)+g_{2}\left ({\bar {x}_{2,\tau \left ({t}\right)}}\right)+d_{2}\left ({t}\right)\\ \displaystyle \check {x}_{i}=x_{i}+A_{i,s}\left ({x_{i}\left ({t}\right),t}\right), \quad i=1,2 \end{cases} \tag{57}\end{align*}
\begin{align*} u_{1}=&\begin{cases} \displaystyle v_{1}, & t\in \left [{8\,\text {m}, 8\,\text {m}+4}\right)\\ \displaystyle \bar {u}_{1d,m}, & t\in \left [{8\,\text {m}+4, 8\,\text {m}+8}\right) \end{cases} \\ u_{2}=&\begin{cases} \displaystyle v_{2}, & t\in \left [{4\,\text {m}, 4\,\text {m}+2}\right)\\ \displaystyle l_{jm}v_{2}, & t\in \left [{4\,\text {m}+2, 4\,\text {m}+4}\right) \end{cases}\end{align*}
In the light of the NN design, the BF of NNs
Trajectory of adaptive parameters
B. Application to chemical reactor system
Example 2:
Consider a two-stage chemical reactor system with delayed recycle streams, as shown in Fig. 7. Assume that two reactors are continuous stirred tanks reactors with a constant temperature and the feeder encounters the unknown sensor attacks and actuator faults. Then, the mass balance equation that governs the reactors is given by \begin{align*} \begin{cases} \displaystyle \dot {x}_{1}=\frac {1-F_{R2}}{V_{1}}x_{2}-\frac {1}{T_{1}}x_{1}-\frac {1}{T_{1}}x_{1}\left ({t-\tau _{1}\left ({t}\right)}\right)\\ \displaystyle \qquad \,\,-Q_{1}x_{1}+d_{1}\left ({t}\right) \\ \displaystyle \dot {x}_{2}= \sum _{j=1}^{2}\frac {F_{RF}^{j}}{V_{2}}u_{j}-Q_{2}x_{2}-\frac {1}{T_{2}}x_{2}^{2}-\frac {2E}{T_{2}}x_{2}\\ \displaystyle \qquad \,\,+\frac {F_{R1}}{V_{2}}x_{1}\left ({t-\tau _{1}\left ({t}\right)}\right)+\frac {F_{R2}}{V_{2}}x_{2}\left ({t-\tau _{2}\left ({t}\right)}\right)+d_{2}\left ({t}\right)\\ \displaystyle \check {x}_{i}=x_{i}+A_{i,s}\left ({x_{i}\left ({t}\right),t}\right),\quad i=1,2 \end{cases} \tag{58}\end{align*}
The state delays \begin{align*} u_{1}=&\begin{cases} \displaystyle \bar {u}_{1d,m}, & t\in \left [{6\,\text {m}, 6\,\text {m}+3}\right)\\ \displaystyle v_{1}, & t\in \left [{6\,\text {m}+3, 6\,\text {m}+6}\right) \end{cases} \\ u_{2}=&\begin{cases} \displaystyle l_{jm}v_{2}, & t\in \left [{10\,\text {m}, 10\,\text {m}+5}\right)\\ \displaystyle v_{2}, & t\in \left [{10\,\text {m}+5, 10\,\text {m}+10}\right) \end{cases}\end{align*}
Case 1:
The sign of
is positive. Define the unknown sensor attacks as\beta (t)=(1+\lambda (t))^{-1} andA_{1,s}=(-0.5-0.25\cos (t))x_{1} . The control parameters and initial conditions are selected as:A_{2,s}=(-0.5-0.25\cos (t))x_{2} , and other design parameters can be referred to Example 1. The simulation results are shown in Figs. 8–11. Fig. 8 shows the state trajectory of the system (58). The boundedness of the adaptive parametersk_{1}=5, k_{2}=5, c_{1}=c_{2}=0.1, and [x_{1}(0), x_{2}(0)] =[{1,-1.4}] , and\hat {\hbar }_{i},\hat {\Gamma }_{i}, \hat {\chi }_{i} and Nussbaum parameter\xi _{j} is shown in Figs. 9 and 10. Fig. 11 shows the curve of control signal. From Fig. 8, it can be seen that the proposed resilient controller against unknown attacks and actuator faults can guarantee that the system states reach to zero with a faster convergence rate.N(\xi _{j}) (i=1,2;j=1,2,3) Case 2:
The sign of
is negative. Define the unknown sensor attacks as\beta (t)=(1+\lambda (t))^{-1} andA_{1,s}=(-1.2-0.1\cos (t))x_{1} . Figs. 12–15 show the control performance of the proposed control scheme. The trajectory of the system statesA_{2,s}=(-1.2-0.1\cos (t))x_{2} andx_{1} is shown in Fig. 12. It is obvious that the system states can be effectively stabilized within a finite time. The time responses of the adaptive parametersx_{2} , and\hat {\hbar }_{i},\hat {\Gamma }_{i}, \hat {\chi }_{i} and Nussbaum parameter\xi _{j} are shown in Figs. 13 and 14, respectively. Fig. 15 plots the curve of control signalsN(\xi _{j}) (i=1,2;j=1,2,3) andu_{1} . From Figs. 12–15, it can be concluded that the boundedness of all closed-loop signals can be ensured by using the proposed adaptive resilient controller. What is more, Figs. 8 and 12 show that the predefined control objective can be achieved whether the sign of weightu_{2} is positive or negative.\beta
Trajectory of parameters
Trajectory of parameters
Remark 8:
Some similar studies have been carried out for a class of cyber-physics systems in the existing literature [28], [37]. In [28] and [37], the weight
Conclusion
This work develops an adaptive finite-time resilient control method for nonlinear time-delay systems with unknown false data injection attacks and actuator failures. A new coordinate transformation is established to eliminate the negative effects caused by the false data injection attacks. Furthermore, the Nussbaum gain technique and a modified FOCF backstepping approach are adopted to handle the unknown time-varying weight and overcome the issue of “explosion of complexity” existing in the traditional recursive design procedure. Finally, the simulation results show the effectiveness of the presented method. However, it worthy to note that the proposed method cannot provide an optimal solution for control design distinct from [54]–[58]. Inspired by these results, developing an adaptive optimal resilient control scheme for nonlinear systems with cyberattacks will be one of our future research work.
ACKNOWLEDGMENT
The authors would like to sincerely thank the editor and anonymous reviewers for their valuable comments and suggestions that are helpful for improving this work.