System recovery of MIMO nonlinear systems against false data injection attack

View article
PeerJ Computer Science

Introduction

The integration of computation, communication and control units has led to the birth and rapid development of a new generation of intelligent systems (Khan et al., 2025b; Alsinai et al., 2025), i.e., the cyber-physical systems (CPSs), which have been increasingly used in transportation systems, smart grids, power systems, remote surveillance and other fields (Cheng, Shi & Sinopoli, 2017). Due to the openness of information exchange and the complexity of physical dynamics, the long-time running of CPSs may cause security problems (Alrslani et al., 2025). Security vulnerabilities of CPSs provide the malicious attackers with the opportunity to implement them with ulterior motives (Khan et al., 2025a).

Generally, the cyberattacks can be broadly categorized as three main categories: denial-of-service (DoS) attacks, replay attacks and false data injection (FDI) attacks. DoS attackers obstruct the communication between networked agents (Wang et al., 2025). Relay attackers record and cover the communication data to degrade the system performances (Markantonakis et al., 2024). Different from them, FDI attacks, which intend to tamper transmitted data packages causing false feedback information, are more dangerous and complicated (Li, Shi & Chen, 2018). For this reason, the researches on CPSs under FDI attacks recently become one of the main topics.

In the past decade, fruitful results have been made for CPSs under attacks on attack strategy design (Zhang & Ye, 2020b; Zhang, Ye & Shi, 2022), attack detection (Alfriehat et al., 2024; Tanyıldız et al., 2025), secure estimation (Sun & Yang, 2025) and secure control (Yang et al., 2024; Khan et al., 2025c). To name a few, based on self-generated FDI attacks, Zhang & Ye (2020b) proposed a necessary and sufficient condition for attack parameters such that FDI attacks can achieve complete stealthiness. Subsequently, they investigated decentralized FDI attacks that destabilize the estimation error dynamics but eliminate their influences on the residual in each sensor node. Pasqualetti, Dörfler & Bullo (2013) designed centralized and distributed attack detection and identification monitors for continuous-time descriptor systems. In addition, secure estimation and secure control have also received great attention, especially in recent years. In An & Yang (2019), with the help of a constrained set partitioning approach, a state estimation scheme was proposed for discrete-time linear CPSs to relieve the computational complexity on the premise of the estimation correctness. Besides, they also investigated the secure control problem for nonlinear interconnected systems against intermittent DoS attacks (An & Yang, 2018a). Although these approaches proved their efficiency in attack design, attack detection, secure estimation and secure control, they ignored the impact of the attack on the system itself and did not consider how to recover the system. Actually, depending on desired precision and safety criticality of a system, changes in the transient response can be highly undesirable (Chakrabortty & Arcak, 2007, 2009). This inspired research on performance recovery (Atassi & Khalil, 1999).

In the past dozen years, performance recovery for nonlinear control has begun to attract attention in the literature, where the controller recovers the nominal transient trajectory in the presence of plant uncertainties and external disturbances. Such results for certain nonlinear control designs were proved in Back & Shim (2007, 2009), Chakrabortty & Arcak (2007, 2009), where singular perturbation methods are adopted to prove performance recovery. However, disturbance and its derivative are assumed to be bounded in Back & Shim (2007, 2009), and the uncertainty is assumed to be a sufficiently smooth function in Chakrabortty & Arcak (2007, 2009). Additionally, the tracking problem was studied in Freidovich & Khalil (2008) for a partially feedback linearizable single-input-single-output (SISO) nonlinear system with stable zero dynamics, where the closed-loop system under the observer-based controller recovers the performance of the nominal linear model as the observer gain becomes sufficiently high. However, the disturbance and its derivative are required to be bounded. An extension of Freidovich & Khalil (2008) to multi-input multi-output (MIMO) nonlinear systems was presented in Wang, Isidori & Su (2015) where the system is required to have a well-defined vector relative degree. After that, in order to relax the condition on vector relative degree, Wu et al. (2019) investigated the performance recovery for MIMO nonlinear systems under the (substantially weak) assumption of invertibility. One should note that the uncertainty is required to be a smooth function in Wang, Isidori & Su (2015), Wu et al. (2019). Despite these efforts on performance recovery for nonlinear systems, a common drawback of them is that the disturbances or uncertainties are differentiable, even smooth. For the attack signal, it is deliberately designed by hackers to harm the system. Thus, the attack signal may be a discontinuous and fast changing signal. This feature makes the existing results on performance recovery cannot be applied to CPSs under FDI attacks without assumption on its derivative, and to our knowledge, there is still no result available on system recovery problem of CPSs under attacks. This motivates the present study.

To more intuitively demonstrate the necessity of researching the system recovery problem for MIMO nonlinear systems under attack, Table 1 compares the proposed approach with existing methods.

Table 1:
Comparisons between the proposed approach and the existing relevant methods.
Methods Robustness Strengths or weaknesses
Secure control, e.g., Back & Shim (2007, 2009) Enhancing the robustness of the controller /
Back & Shim (2007, 2009) Performance recovery Disturbance and its derivative are assumed to be bounded
Chakrabortty & Arcak (2007, 2009) Performance recovery Uncertainty is assumed to be a sufficiently smooth function
Freidovich & Khalil (2008) Performance recovery Disturbance and its derivative are required to be bounded
Wang, Isidori & Su (2015), Wu et al. (2019) Performance recovery Uncertainty is required to be a smooth function
Our approach System recovery (enhancing the robustness of the plant) Only boundedness of the attack is required
DOI: 10.7717/peerj-cs.3280/table-1

This article deals with the system recovery problem for a class of MIMO nonlinear systems subject to FDI attacks without assumption on its derivative. The system under consideration has a vector relative degree and a trivial zero dynamics, which can be transformed into a linear one by means of feedback-linearizing design. Then, a recursive attack-compensation input signal is constructed skillfully and added into the system input to almost fully compensate the attack, so that the system can be almost fully recovered. Compared to the existing results, our approach consists of the following main contributions and advantages: (i) A new perspective is provided for designing attack compensation scheme by compensating for the state deviation caused by the attack, which is helpful for designing an attack-compensated signal to recover the system. In fact, unlike the existing methods that enhance the robustness of control algorithms (e.g., Yang et al., 2024), the proposed method enhances the robustness of the plant itself; (ii) The existing results on CPSs mainly focus on attack design, attack detection, state estimation and secure control, but do not consider the state deviation of the system caused by the attack. In contrast, this article systematically investigates the recovery of CPSs under attacks for the first time; (iii) A common limitation of performance recovery for nonlinear system is that disturbances or uncertainties are required to be differentiable, even smooth (Back & Shim, 2007, 2009; Chakrabortty & Arcak, 2007, 2009; Freidovich & Khalil, 2008; Wang, Isidori & Su, 2015; Wu et al., 2019). Unlike disturbances and uncertainties, the attacks under consideration are not restricted to be differentiable or smooth.

Notations: Let O(T) represent the infinitesimal of the same order as T. For a matrix A, let A denote its transpose and λmin(A) denote its minimum eigenvalue. Lfh(x)hxf(x) is called the Lie Derivative of h with respect to f. For any positive integer r, Ar denotes a shift matrix of r×r dimension, Br[0,,0,1]Rd, and Cr[1,0,,0]R1×d. For a matrix b, the notation b+ represents the pseudo-inverse.

Problem statement

Consider the system recovery problem of the following MIMO nonlinear systems under FDI attack,

x˙=f(x)+g(x)(u+ua),y=h(x),where xRn, uRm and yRq denote the state vector, the control input and the output, respectively. f(x), g(x)=[g1(x),,gm(x)] and h(x)=[h1(x),,hq(x)]=[y1,,yq] are known smooth mappings with f(0)=0 and h(0)=0. The vector uaRm denotes the norm bounded FDI attack (Zhang & Ye, 2020b; Zhang, Ye & Shi, 2022), which is injected into the system by a malicious attacker.

Remark 1. Although ua represents an attack in this article, it can also be used to represent actuator faults, process faults, additive uncertainties, unknown inputs, external disturbances, or a combination of them (Arab et al., 2025).

Definition 1. (Isidori, 1985) A multivariable nonlinear system of the form Eq. (1) has a vector relative degree {r1,,rq} at a point x0 if the following two conditions hold:

(i) for all 1jm, k<ri1, 1iq, and for all x in a neighborhood of x0, the following Lie Derivative

LgjLfkhi(x)=0

holds where Lfkhi(x)LfLfk1hi(x).

(ii) the q×m matrix

b(x)=[Lg1Lfr11h1(x)LgmLfr11h1(x)Lg1Lfr21h2(x)LgmLfr21h2(x)Lg1Lfrq1hq(x)LgmLfrq1hq(x)]

is row full rank at x=x0.

Assumption 1. The system Eq. (1) has a vector relative degree {r1,,rq} for all xRn, and has a trivial zero dynamics.

Under Assumption 1, with the help of the Structure Algorithm (Teel & Praly, 1995; Freidovich & Khalil, 2008), there exist a diffeomorphism

Φ(x)=[h1(x)Lfh1(x)Lfr11h1(x)hq(x)Lfhq(x)Lfrq1hq(x)]which brings the system Eq. (1) to the system modeled by equations of the normal form:

{x˙1,i=x1,i+1,1ir11x˙1,r1=a1(x)+b1(x)(u+ua)y1=x1,1{x˙2,i=x2,i+1,1ir21x˙2,r2=a2(x)+b2(x)(u+ua)y2=x2,1{x˙k,i=xk,i+1,1irk1x˙k,rk=ak(x)+bk(x)(u+ua)yk=xk,1with k=3,,q, r1+r2++rq=n, where bk(x) is the k-th row of b(x) and Φ(x)=[x1,1,,x1,r1,, xq,1,,xq,rq].

Assumption 2. There exists a positive constant number bmax such that

b(x)bmax.

Remark 2. For Assumption 1, some practical systems are capable of meeting it, such as high-speed train system (Zhang et al., 2024; Xie et al., 2025) and near-space vehicle system (Yao, Tao & Jiang, 2016). In addition, Assumption 2 can be found in Back & Shim (2007), Freidovich & Khalil (2008), Wang, Isidori & Su (2015), and this assumption is necessary to ensure the boundness of the signal b(x)ua which is injected into the nominal system by the attacker.

By feedback linearization, the input u of the system Eq. (5), which is also the input of the system Eq. (1), is designed against the attack as

u=b+(x)[a(x)+v+vc]=b+(x)[a(x)+v]ud+b+(x)vcucwith a(x)=[a1(x),,aq(x)], where ud denotes the desired input (or called reference input) which is designed according to the nominal model, and uc is the attack-compensation signal which is added into the system input and will be designed skillfully to almost fully compensate the attack ua.

Under the above system input Eq. (7), the input-output model Eq. (5) will be transformed into the following linear one

ξ˙=Aξ+B[v+(vc+a)],y=Cξ,where ab(x)ua, ξ[x1,1,,x1,r1,,xq,1,,xq,rq], Ablkdiag(Ar1,,Arq), Bblkdiag(Br1,, Brq), Cblkdiag(Cr1, ,Crq), and the operator blkdiag() builds a block diagonal matrix from its argument. Furthermore, one can check that a is bounded under Assumption 2.

For convenience of expression, let xn, ξn and yn denote the nominal values of x, ξ and y respectively (i.e., the values in the attack-free system or called the values in the nominal system). That is, xn, ξn and y satisfy

x˙n=f(xn)+g(xn)u,ξ˙n=Aξn+Bv,yn=Cξnwith xn(t0)=x(t0) and ξn(t0)=ξ(t0).

Design objective: The purpose of this article is to design the additional attack-compensation input uc in Eq. (7) for the MIMO nonlinear system Eq. (1) such that the mapping relationship between the desired input ud and system states x is almost the same as the one in the nominal system. In other words, the attack is almost fully compensated such that the system under consideration is almost recovered.

For the linear system Eq. (8), since CB=0 which violates the observer matching condition (Corless & Tu, 1998), the attack-related term a is hard to be estimated and compensated effectively by the existing results. Fortunately, this system has another obvious feature which makes it possible to almost completely compensate for the attacks-related term a. That is, all states of the linear system Eq. (8) are derivatives of the output, i.e., xi,j=yi(j1) for all i=1,,q and j=1,,ri. Many approaches (e.g., high-gain approximate differentiators (Kalsi et al., 2010) and sliding mode exact differentiator (Floquet, Edwards & Spurgeon, 2007)) have been proposed to obtain the estimation of system states. As in Kalsi et al. (2010), the following lemma is established to obtain the system states with any arbitrary accuracy.

Lemma 1. (Kalsi et al., 2010) Consider the linear system Eq. (8). For the following high-gain observer Eq. (10) under Assumptions 1–2 and the boundness of ξ, there exist a positive constant βi and a finite time Ti(ε) such that ζiβiε for tt0+Ti(ε) where t0 denotes the start time of the system Eq. (1). Moreover, limε0+Ti(ε)=0.

{x˙i,h=Arixi,h+Briv+li(yiyi,h)yi,h=Crixi,h

with li[αi,1/ε,,αi,ri/εri], where xi,h[xi,1,h,,xi,ri,h] denotes the estimation of xi[xi,1,,xi,ri], ε(0,1) and αi,j are selected such that the roots of sri+αi,1sri1++αi,ri=0 have negative real part. ζi=[ζi,1,,ζi,ri] is defined with ζi,j=(xi,jxi,j,h)/εrij.

Obviously, one can see easily from Lemma 1 that xi,j can be replaced by xi,j,h with any arbitrary accuracy. For this reason and the convenience of description, it is reasonable to assume that ξ is available for system recovery design. Also, the system input Eq. (7) can be rewritten as

u=b+(Φ1(ξ))[a(Φ1(ξ))+v]ud+b+(Φ1(ξ))vcucwhere Φ1() represents the inverse operator of Φ().

In order to show the proposed system recovery strategy more clearly, its block diagram is drawn in Fig. 1. The proposed attack-compensation strategy has the following obvious feature: it is an inner-loop controller so that it can be added on the existing closed-loop system working in harmony with a pre-designed outer-loop controller.

Block diagram of the proposed system recovery strategy.

Figure 1: Block diagram of the proposed system recovery strategy.

System recovery design in a recursive fashion

Define an auxiliary variable η=[η1,,ηq] with

ηii,1yi+i,2yi(1)++i,ri1yi(ri2)+yi(ri1),for all 1iq, where the parameters i,1,,i,ri1 are selected such that the roots of the equation i,1+i,2s++i,ri1sri2+sri1=0 have negative real parts.

Obviously, η can be rewritten as

η=Lξwhere Lblkdiag(L1,,Lq) with Li[i,1,,i,ri1,1].

According to the knowledge of calculus, η meets

η(t)=LeA(tt0)ξ(t0)+t0tLeA(tτ)B[v(τ)+vc(τ)+a(τ)]dτwhere t0 denotes the start time of the system under consideration.

Before analyzing the impact of attacks on the original nonlinear system Eq. (1), we first analyze the impact of attacks on auxiliary variable η which will provide great convenience for analyzing the original system. So let’s start now. If vc(t) can fully compensate for the impact of the attack on the auxiliary variable η, the following condition must be satisfied obviously.

t0tLeA(tτ)B[vc(τ)+a(τ)]dτ0,tt0that is, vc(t)+a(t)0,tt0. In other words, a(t) is required to be known in real-time a priori. Nevertheless, this condition is too strict for many practical systems, and thus, the following problem will naturally be encountered: whether the impact of the attack on the auxiliary variable η can be compensated by removing the aforementioned restriction? The answer happens to be yes, and we will show that the impact of the attack on η can almost completely compensated by a skillfully designed attack-compensation input signal vc(t).

The design process of the attack-compensation input signal includes the following two steps.

Step 1: Removing the strict requirements of real-time.

In order to eliminate the strict requirement of real-time, small time-delay will be adopted to replace real-time. In details, for the auxiliary variable η in Eq. (14), we divide the whole time-domain of the right-hand side into interval segments with period T>0, as follows

η(nT+t0)=LeA(nT)ξ(t0)+t0nT+t0LeA(nT+t0τ)Bv(τ)dτ+t0nT+t0LeA(nT+t0τ)B[vc(τ)+a(τ)]dτ=LeA(nT)ξ(t0)+t0nT+t0LeA(nT+t0τ)Bv(τ)dτ+t0T+t0LeA(nT+t0τ)Bvc(τ)dτ+T+t02T+t0LeA(nT+t0τ)Bvc(τ)dτ++kT+t0(k+1)T+t0LeA(nT+t0τ)Bvc(τ)dτ++(n1)T+t0nT+t0LeA(nT+t0τ)Bvc(τ)dτ+t0T+t0LeA(nT+t0τ)Ba(τ)dτ+T+t02T+t0LeA(nT+t0τ)Ba(τ)dτ++kT+t0(k+1)T+t0LeA(nT+t0τ)Ba(τ)dτ++(n1)T+t0nT+t0LeA(nT+t0τ)Ba(τ)dτwhere n represents any positive integer and the positive constant T is called the period of compensation signal. Also, T is a small positive constant which denotes the small time-delay.

To remove the strict requirement of real-time, one way is to adopt vc(t) in the interval t[kT+t0,(k+1)T+t0) for compensating the impact of a(t) on auxiliary variable η in the interval t[(k1)T+t0,kT+t0) (please see Fig. 2). Obviously, by choosing a small T, the attack can still be compensated timely to avoid the continuous impact of the attack on the auxiliary variable η. According to this design thinking, k{0,1,2,}, let

kT+t0(k+1)T+t0LeA(nT+t0τ)Bvc(τ)dτ+(k1)T+t0kT+t0LeA(nT+t0τ)Ba(τ)dτ=0.

Block diagram of the attack-compensation strategy based on a small time-delay.

Figure 2: Block diagram of the attack-compensation strategy based on a small time-delay.

Under Eq. (17), one has

η(nT+t0)=LeA(nT)ξ(t0)+t0nT+t0LeA(nT+t0τ)Bv(τ)dτ+(n1)T+t0nT+t0LeA(nT+t0τ)a(τ)dτ.

Obviously, when T is small enough, η(nT+t0)LeA(nT)ξ(t0)+t0nT+t0LeA(nT+t0τ)Bv(τ)dτ. One can see that, at time instants t=nT+t0,nN, the auxiliary variable η is almost the same as the one in the nominal system (when the system is not attacked). Thus, at time instants t=nT+t0,nN, the attack-compensation input signal vc(t) defined in Eq. (17) can almost eliminate the impact of a(t) on the auxiliary variable η with a small time-delay T. It should be pointed out that the same result can be guaranteed for the interval (nT+t0,(n+1)T+t0),nN which will be proved in the next section.

By some mathematical calculation, Eq. (17) can be rewritten for all k{0,1,2,} as

eA(nk)TkT+t0(k+1)T+t0LeA(kT+t0τ)Bvc(τ)dτ+eA(nk)T(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτ=0which is equivalent to

0TLeAτBvc(kT+t0+τ)dτ+(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτ=0.

Let vc(kT+t0+τ)=BeAτLv¯c(k),τ(0,T). By substituting it into Eq. (20), one has

v¯c(k)=(0TLeAτBBeAτLdτ)1(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτwhere we have used the fact that 0TLeAτBBeAτLdτ is invertible since the pair (A,B) is controllable and L is row full rank. Therefore, it is pretty easy to obtain for all k{0,1,2,} and τ(0,T) that

vc(kT+t0+τ)=BeAτL(0TLeAτBBeAτLdτ)1(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτwhich is equivalent to

vc(τ)=BeA(kT+t0τ)L(0TLeAτBBeAτLdτ)1(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτholds for all k{0,1,2,} and τ(kT+t0,(k+1)T+t0). Unfortunately, (k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτ in Eq. (23) is not directly implementable if the attack signal is unknown. In the following Step 2, we will propose an alternative approach to solve the above problem.

Step 2: An alternative approach for solving the term (k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτ.

It is easy to get from Eq. (8) that

(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτ=Lξ(kT+t0)LeATξ((k1)T+t0)(k1)T+t0kT+t0LeA(kT+t0τ)B[v(τ)+vc(τ)]dτ.

With the help of Steps 1–2, and by combining Eqs. (23) and (24), one can obtain the following causal and implementable recursive attack-compensation input signal

vc(t)=BeA(kT+t0t)L(0TLeAτBBeAτLdτ)1[Lξ(kT+t0)LeATξ((k1)T+t0)(k1)T+t0kT+t0LeA(kT+t0τ)B(v(τ)+vc(τ))dτ]which holds for all k{0,1,2,} and t(kT+t0,(k+1)T+t0).

Remark 3. The term of 0TLeAτBBeAτLdτ is an infinitesimal of the same order as T. Thus, ill-conditioned matrix inversion will not be occurred in the calculation process of (0TLeAτBBeAτLdτ)1.

Remark 4. One can see from Eq. (23) that vc(t)0 when a(t)0, which implies that uc0 when ua0. Therefore, the attack-compensation input signal will be disappeared and doesn’t change any system dynamics when the system is not attacked. This reflects one of the merits of the proposed method: it is easy to implement in practical systems.

Note that, the boundness of ξ is required to be satisfied a priori of the high-gain observer Eq. (10) in Lemma 1. This condition is quite easy to satisfy, as will be proved in the following.

Theorem 1. Consider the linear system Eq. (8), and the attack-compensation input signal Eq. (25). Under the assumptions that the FDI attack signal is norm-bounded and v stabilizes the following system Eq. (28), then ξ and vc are both uniformly bounded.

Proof On the one hand, for t(kT+t0,(k+1)T+t0), one can see from Eq. (23) that

vc(t)maxτ[0,T]BeAτL{Tminτ[0,T]||LeAτBBeAτL}1Tmaxτ[0,T]LeAτB×maxτ[(k1)T+t0,kT+t0]a(t)=maxτ[0,T]BeAτL×maxτ[0,T]LeAτBminτ[0,T]LeAτBBeAτLmaxτ[(k1)T+t0,kT+t0]a(t)which implies that the signal vc(t) is uniformly bounded. Also, one can further check that

limT0minτ[0,T]LeAτBBeAτL=1.

On the other hand, let’s consider the linear system Eq. (8), which can be rewritten as

ξ˙=Aξ+Bv+dwhere the pair (A,B) is controllable, and dB(vc+a) is bounded since vc and a are both bounded. Thus, according to Lyapunov stability theorem, it is pretty easy to see that ξ is uniformly bounded when v stabilizes the system Eq. (28).

Stability analysis

In this section, the stability of the original nonlinear system Eq. (1) with the system input Eq. (11) will be established.

Let ηn denote the nominal value of the signal η. That is,

ηn=Lξnwith ηn(t0)=η(t0).

Now, let us analyze the impact of the attacks on the auxiliary variable η.

Theorem 2. Consider the linear system Eq. (8), and the attack-compensation input signal Eq. (25). Under Assumptions 1–2 and the assumption that v stabilizes the system Eq. (28), then there exists an upper bound of η~(t) which is an infinitesimal of the same order as T, where η~(t)η(t)ηn(t) denotes the deviation caused by the attack. Also, η~(t) can be arbitrary small when a small enough period T is selected.

Proof The proof is divided into the following two cases: (1) t=kT+t0; and (2) t(kT+t0,(k+1)T+t0).

Case 1: t=kT+t0. It is quite natural to obtain from Eqs. (8), (9), (14) and (29) that

η~(kT+t0)=LeA(kT)ξ~(t0)+(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτ=(k1)T+t0kT+t0LeA(kT+t0τ)Ba(τ)dτT×maxτ[0,T]LeAτB×maxτ[(k1)T+t0,kT+t0]a(t)where ξ~ξξn.

Case 2: t(kT+t0,(k+1)T+t0). One can see from Eqs. (14) and (29) that

η~(t)=LeA(tt0)ξ~(t0)+t0tLeA(tτ)B[vc(τ)+a(τ)]dτ=t0t0+TLeA(tτ)Bvc(τ)dτ++kT+t0(k+1)T+t0LeA(tτ)Bvc(τ)dτt(k+1)T+t0LeA(tτ)Bvc(τ)dτ+t0T+t0LeA(tτ)Ba(τ)dτ++(k1)T+t0kT+t0LeA(tτ)Ba(τ)dτ+kT+t0tLeA(tτ)Ba(τ)dτ=t(k+1)T+t0LeA(tτ)Bvc(τ)dτ+kT+t0tLeA(tτ)Ba(τ)dτ

Therefore, with the help of Eq. (23), the deviation η~(t) satisfies

η~(t)t(k+1)T+t0LeA(tτ)Bvc(τ)dτ+kT+t0tLeA(tτ)Ba(τ)dτt(k+1)T+t0LeA(tτ)Bvc(τ)dτ+Tmaxτ[0,T]LeAτB×maxτ[kT+t0,(k+1)T+t0]a(τ)where the first term on the right-hand side of the above inequality for t(kT+t0,(k+1)T+t0) obeys that

t(k+1)T+t0LeA(tτ)Bvc(τ)dτ=t(k+1)T+t0LeA(tτ1)BBeA(kT+t0τ1)L×(0TLeAτBBeAτLdτ)1(k1)T+t0kT+t0LeA(kT+t0τ2)Ba(τ2)dτ2dτ1t(k+1)T+t0LeA(tτ1)BBeA(kT+t0τ1)Ldτ1(0TLeAτBBeAτLdτ)1×(k1)T+t0kT+t0LeA(kT+t0τ2)Ba(τ2)dτ2maxτ1,τ2[0,T]||LeAτ1BBeAτ2Lmaxτ[0,T]LeAτB×maxτ[(k1)T+t0,kT+t0]a(τ)||T20TLeAτBBeAτLdτ1.

Combining Eqs. (32) and (33), one can conclude that

η~(t)T×maxτ[0,T]LeAτB×maxτ[kT+t0,(k+1)T+t0]a(τ)+T2Δ1(T)×maxτ1,τ2[0,T]LeAτ1BBeAτ2L×maxτ[0,T]LeAτB×maxτ[(k1)T+t0,kT+t0]a(τ)holds for t(kT+t0,(k+1)T+t0), where Δ(T)||0TLeAτBBeAτLdτ||.

To sum up, one can conclude from Cases 1-2 that the deviation η~(t) satisfies

η~(t)Tmaxτ[0,T]LeAτB×maxτ[(k1)T+t0,(k+1)T+t0]a(τ)+T2Δ(T)1×maxτ1,τ2[0,T]LeAτ1BBeAτ2L×maxτ[0,T]LeAτB×maxτ[(k1)T+t0,kT+t0]a(τ)=O(T)where we have used the fact that Δ(T)=O(T), and a=b(x)ua is bounded under Assumption 2. The right-hand side of the above inequality is an infinitesimal of the same order as T, and thus η~(t) can be arbitrary small when a small enough period T is chosen. Hence, the proof is completed.

In the sequel, let us analyze the impact of attacks on the linear system Eq. (8).

Theorem 3. Consider the linear system Eq. (8), and the attack-compensation input signal Eq. (25). Under assumptions of Theorem 2, then there exists an upper bound of x~i,j(t) which is an infinitesimal of the same order as T, where x~i,j(t)xi,j(t)xi,j,n(t) denotes the state deviation caused by the attack and xi,j,n(t) represents the nominal value of xi,j(t) (i.e., the value in the attack-free system). Also, x~i,j(t) can be arbitrary small when a small enough T is selected.

Proof It is can be seen easily form Eqs. (9), (12) and (29) that

η~i(t)i,1y~i(t)+i,2y~i(1)(t)++i,ri1y~i(ri2)(t)+y~i(ri1)(t)holds for 1iq, where y~i(j)(t)yi(j)(t)yn,i(j)(t)=x~i,j+1(t) with y~i(j)(t0)=0.

Also, Eq. (36) can be rewritten as

ddt[y~i(t)y~i(1)(t)y~i(ri2)(t)]=[010000100001i,1i,2i,3i,ri1]A¯i[y~i(t)y~i(1)(t)y~i(ri2)(t)]+[001]B¯iη~i(t)where A¯i is Hurwitz since i,1,,i,ri1 are selected such that the roots of the equation i,1+i,2s++i,ri1sri2+sri1=0 have negative real parts. One can see from Eq. (37) that [y~i(t),,y~(ri2)(t)]=t0teA¯i(tτ)B¯iη~i(τ)dτ. Since A¯i is Hurwitz, it is always exists an invertible matrix Pi such that A¯i=PiΛiPi1, where Λi denotes the diagonal matrix with the eigenvalue of A¯i on its main diagonal. Thus, one has

[x~i,1(t),,x~i,ri1(t)]=[y~i(t),y~i(1)(t),,y~i(ri2)(t)]t0tPieΛi(tτ)Pi1B¯iη~i(τ)dτPiPi1maxtt0η~i(t)t0teΛi(tτ)dτ=PiPi1maxtt0η~i(t)t0teλmin(A¯i)(tτ)dτPiPi1λmin(A¯i)maxtt0η~i(t)=O(T)where λmin(A¯i) denotes the minimum eigenvalue of A¯i and we have used the fact that η~(t)=O(T).

Furthermore, one can see from Eq. (36) that

x~i,ri(t)=y~i(ri1)(t)η~i(t)+i,1y~i(t)+i,2y~i(1)(t)++i,ri1y~i(ri2)(t)maxtt0η~i(t)+[i,1,,i,ri1][y~i(t),y~i(1)(t),,y~i(ri2)(t)]{1+PiPi1λmin(A¯i)[i,1,,i,ri1]}maxtt0η~i(t)=O(T).

To sum up, it is easy to get that x~i,j(t) is an infinitesimal of the same order as T, and thus x~i,j(t) can be arbitrary small when a small enough T is chosen.

Next, let us analyze the impact of attacks on the original nonlinear system Eq. (1).

Theorem 4. Consider the original nonlinear system Eq. (1), and the system input Eq. (11) with the attack-compensation input signal Eq. (25). Under assumptions of Theorem 2, then there exists an upper bound of x~ which is an infinitesimal of the same order as T, where x~xxn denotes the state deviation caused by the attack. Furthermore, the system is almost fully recovered when a small enough T is selected.

Proof One can see from Assumption 1 that there exists a diffeomorphism Φ(x) such that

ξ=Φ(x),ξn=Φ(xn)and thus

x~=Φ1(ξ)Φ1(ξn)Γξ~where Γ denotes the Lipschitz constant of the differentiable function Φ1() in the compact set Ω{ξ,ξn}.

It is worth noting that, ξ~=ξξn =[x~1,1,,x~1,r1,,x~q,1,,x~q,rq], together with Theorem 3, one has

ξ~=O(T).

Naturally, x~=O(T), which means that the system states under attacks can approximate the nominal states with arbitrary accuracy when a small enough T is selected.

In addition, let udn denote the nominal value of the desired input ud=b+(Φ1(ξ))[a(Φ1(ξ))+v]. That is, udnb+(Φ1(ξn))[a(Φ1(ξn))+v. Similarity, based on the facts that f(x),g(x),h(x) are smooth functions and ξ~=O(T), it is easy to prove that ududn=O(T) when T is small enough.

To sum up the above arguments, one can conclude that

limT0(ud,x)=(udn,xn).

Thus, the mapping relationship between the desired input ud and system states x is almost the same as the one in the nominal system when T is small enough. In other words, the system is almost fully recovered when T is small enough.

Remark 5. Compared with the existing results on the secure control of CPSs (Deng & Wen, 2020; Xu et al., 2019; Feng & Hu, 2019; Zhang & Ye, 2020a; Yang et al., 2020; Wang et al., 2020; Yang, Li & Yue, 2020; Zhang, Shen & Han, 2019; Shao & Ye, 2020; An & Yang, 2018a; Su & Ye, 2018; Hu et al., 2019; Chen et al., 2021; Wu et al., 2021; Gu et al., 2021; Huang & Dong, 2020; He et al., 2021; Chen et al., 2022b; Farivar et al., 2019; Chen et al., 2022a; Lu & Yang, 2017; He et al., 2020; An & Yang, 2018b; Ao, Song & Wen, 2018; Zhou et al., 2020; Chen et al., 2022b), there are several merits of the proposed system recovery scheme: (i) the proposed method can be well applied to the existing methods, because the system can be almost fully recovered; (ii) the proposed approach not only can ensure a good enough performance, but also does not require any knowledge of attack’s model and other strict-preconditions; (iii) the proposed approach helps to ensure state performances and state constraints, since the proposed attack-compensation approach can ensure that the trajectory of the system states is almost not affected by the attack.

Remark 6. In existing results for nonlinear systems (Back & Shim, 2007, 2009; Chakrabortty & Arcak, 2007, 2009; Freidovich & Khalil, 2008; Wang, Isidori & Su, 2015; Wu et al., 2019), performance recovery was investigated for compensating the disturbances or uncertainties. A common limitation of these results is that the disturbances or uncertainties are required to be differentiable, even smooth. However, the proposed method is not subject to this limitation; and unlike the disturbances and uncertainties, the attacks under consideration are not restricted to be differentiable or smooth. Furthermore, this article systematically studies the system recovery of CPSs under attacks for the first time.

Remark 7. Generally speaking, the smaller the value of the positive parameter T, the better the system recovery performance tends to be. In addition, T can be any positive constant, with zero as its lower bound.

Remark 8. As shown in this article, the proposed approach can nearly completely restore the attacked system to its attack-free state, ensuring that the original system’s control method remains effective under attacks. This also means that, unlike the existing methods that enhance the robustness of control algorithms (e.g., Yang et al., 2024), the proposed method enhances the robustness of the plant itself. Furthermore, we plan to apply the proposed method to microgrid systems.

Simulation studies

Consider the following attitude dynamic equations of a near-space vehicle at a velocity of 3.16 Mach and at an altitude of 97,167 ft (Yao, Tao & Jiang, 2016):

x˙=f(x)+g(x)(u+ua),y=h(x),where x=[x1,x2,x3,x4,x5,x6]=[γ,ω], γ=[μ,β,α], ω=[p,q,r] and

f(x)=[Ξ(γ)ωJ1Ω(ω)Jω],Ω(ω)=[0rqr0pqp0],h(x)=[x1x2x3],Ξ(γ)=[cos(α)0sin(α)sin(α)0cos(α)010],J=[5544860230020113694902300201376852]

g(x)=[0000000000.28830.28830.86540.08570.08570.52630.09590.09590.20790000000000.865400.00250.52630.00980.00730.20790.00450.0051],and μ,β,α,p,q,r represent the bank angle, the sideslip angle, the angle of attack, the roll rate, the pitch rate and the yaw rate, respectively. It can be verified from Definition 1 that this system has a vector relative degree {r1,r2,r3}={2,2,2}, which means that the system can be exactly feedback linearized. Define the following diffeomorphism

Φ(x)=[x1cos(x3)x4+sin(x3)x6x2sin(x3)x4cos(x3)x6x3x5]which brings the system Eq. (1) to the system modeled by Eq. (5), where

a1(x)=[0,0,cos(x3)x6sin(x3)x4,cos(x3),0,sin(x3)]f(x)a2(x)=[0,0,cos(x3)x4+sin(x3)x6,sin(x3),0,cos(x3)]f(x)a3(x)=[0,0,0,0,1,0]f(x)and

b1(x)=[0.2883cos(x3)0.0959sin(x3),0.2883cos(x3)+0.0959sin(x3),0.8654cos(x3)+0.2079sin(x3),0.8654cos(x3)0.2079sin(x3),0.0045sin(x3),0.0025cos(x3)0.0051sin(x3)]b2(x)=[0.2883sin(x3)+0.0959cos(x3),0.2883sin(x3)0.0959cos(x3),0.8654sin(x3)0.2079cos(x3),0.8654sin(x3)+0.2079cos(x3),0.0045cos(x3),0.0025sin(x3)+0.0051cos(x3)]b3(x)=[0.0857,0.0857,0.5263,0.5263,0.0098,0.0073].

In the simulation, the parameters are specified as T=104s, x(0)=[2,0.3,5,3,0.3,10], L=[1,1,0,0,0,0;0,0,1,1,0,0; 0,0,0,0,1,1], and the attack signal ua(t) is randomly selected from [0,2],t0 which is shown in Fig. 3.

Profiles of the attack signal 
$ {u_{a}}$ua
 where 
$ {u_{ai}}$uai
 represents the 
${i}$i
-th element of 
$ {u_{a}}$ua
.

Figure 3: Profiles of the attack signal ua where uai represents the i-th element of ua.

The system input u in Eq. (44) is chosen as

u=b+(Φ1(ξ))[a(Φ1(ξ))+v]ud+b+(Φ1(ξ))vcucwhere vc is defined in Eq. (25) with v=Kξ, where K is chosen as

K=[11.732100000011.732100000011.7321]such that A + BK is Hurwitz.

The simulation results of the nonlinear system, which is jointly controlled by the desired input ud and the attack-compensation input uc, are demonstrated in Fig. 4. In addition, the state trajectories of the nonlinear system, which is only controlled by the desired input ud=b+(Φ1(ξ))[a(Φ1(ξ))+v], are depicted in Fig. 5.

Profiles of system states under the desired input 
$ {u_{d}}$ud
 and the attack-compensation input 
$ {u_{ c}}$uc
.

Figure 4: Profiles of system states under the desired input ud and the attack-compensation input uc.

Profiles of system states under the desired input 
$ {u_{d}}$ud
.

Figure 5: Profiles of system states under the desired input ud.

It is shown from Fig. 4 that the system states almost converge to zero when the system controlled by the proposed attack-compensation approach. On the contrary, if the desired input designed for the nominal model is applied to the system under FDI attack, the behavior of the system degrades severely, as shown in Fig. 5. The simulation results demonstrate that very satisfactory compensation performances are achieved by the proposed attack-compensation approach for the system even in the presence of the attack, and much better performances can be achieved than the desired-input-based control, which verify that the proposed attack-compensation scheme is very effective to cope with the attack.

To display the effect of system recovery, the desired input and its nominal input are drawn in Fig. 6, and the actual system state and its nominal state are drawn in Fig. 7.

Desired input 
$ {u_{dn}}$udn
 in the nominal system and the desired input 
$ {u_{d}}$ud
 in the actual system.

Figure 6: Desired input udn in the nominal system and the desired input ud in the actual system.

System states in the nominal system controlled by the desired input 
$ {u_{dn}}$udn
 and the ones in the actual system controlled by the desired input 
$ {u_{d}}$ud
 and the attack-compensation input 
$ {u_{ c}}$uc
.

Figure 7: System states in the nominal system controlled by the desired input udn and the ones in the actual system controlled by the desired input ud and the attack-compensation input uc.

It can be seen from Figs. 6, 7 that the mapping relationship between the desired input ud and system states x is almost the same as udn and xn in the nominal system. In other words, the system is almost fully recovered (that is because the recursive attack-compensation input signal added into the system input can almost fully compensate the attack).

In addition, the attack-compensation input signal uc(t) is presented in Fig. 8, which shows that uc(t) is the same order of magnitude as the attack signal ua.

Profiles of compensation signal 
$ {u_{ c}}$uc
.

Figure 8: Profiles of compensation signal uc.

To provide a more intuitive and clear description of the system recovery performance of the proposed approach, the root mean squared error (RMSE) index is used. Table 2 lists the RMSE and mean absolute error (MAE) values for state deviation caused by the attack, where μ~μμn, β~ββn, α~(t)α(t)αn(t), p~(t)p(t)pn(t), q~(t)q(t)qn(t) and r~(t)r(t)rn(t). The results demonstrate that the proposed strategy achieves superior system recovery performance.

Table 2:
Statistical results of root mean square error (RMSE).
Indices under the proposed approach RSME of μ~(t) RSME of β~(t) RSME of α~(t) RSME of p~(t) RSME of q~(t) RSME of r~(t)
Values 1.0608×1010 1.7125×1011 2.8589×109 5.4717×109 2.2806×109 1.0228×109
Indices without the proposed approach RSME of μ~(t) RSME of β~(t) RSME of α~(t) RSME of p~(t) RSME of q~(t) RSME of r~(t)
Values 0.0026 0.0042 1.1961 0.2099 0.0358 0.3036
DOI: 10.7717/peerj-cs.3280/table-2

Conclusions

In this article, the system recovery problem has been studied for MIMO nonlinear systems under FDI attack. With the help of feedback-linearizing design technique, the nonlinear system has been transformed into a linear one. In order to obtain the system states, a high-gain approximate differentiator has been utilized. After that, a recursive attack-compensation input signal has been skillfully designed and added into the system input to almost fully recover the system. It has been proved that an upper bound of the state deviation caused by the attack is an infinitesimal of the same order as the period of the attack-compensation input signal, and thus the system can be almost fully recovered when a small enough period is selected.

Supplemental Information

Step 1 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-1

Step 2 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-2

Step 3 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-3

Step 4 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-4

Step 5 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-5

Step 6 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-6

Step 7 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-7

Step 8 of the algorithm flow.

DOI: 10.7717/peerj-cs.3280/supp-8