Nothing Special   »   [go: up one dir, main page]

Next Article in Journal
Data-Driven Packet Loss Estimation for Node Healthy Sensing in Decentralized Cluster
Next Article in Special Issue
New Fault Recognition Method for Rotary Machinery Based on Information Entropy and a Probabilistic Neural Network
Previous Article in Journal
A Compact and Low Power RO PUF with High Resilience to the EM Side-Channel Attack and the SVM Modelling Attack of Wireless Sensor Networks
Previous Article in Special Issue
Characterization of System Status Signals for Multivariate Time Series Discretization Based on Frequency and Amplitude Variation
You seem to have javascript disabled. Please note that many of the page functionalities won't work as expected without javascript enabled.
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks

1
Key Laboratory of Advanced Process Control for Light Industry (Ministry of Education), Jiangnan University, Wuxi 214122, China
2
School of Electrical and Information Engineering, Zhengzhou University of Light Industry, Zhengzhou 450002, China
*
Author to whom correspondence should be addressed.
Sensors 2018, 18(2), 321; https://doi.org/10.3390/s18020321
Submission received: 24 December 2017 / Revised: 19 January 2018 / Accepted: 21 January 2018 / Published: 23 January 2018
(This article belongs to the Special Issue Sensors for Fault Detection)

Abstract

:
In this paper, a synthesized design of fault-detection filter and fault estimator is considered for a class of discrete-time stochastic systems in the framework of event-triggered transmission scheme subject to unknown disturbances and deception attacks. A random variable obeying the Bernoulli distribution is employed to characterize the phenomena of the randomly occurring deception attacks. To achieve a fault-detection residual is only sensitive to faults while robust to disturbances, a coordinate transformation approach is exploited. This approach can transform the considered system into two subsystems and the unknown disturbances are removed from one of the subsystems. The gain of fault-detection filter is derived by minimizing an upper bound of filter error covariance. Meanwhile, system faults can be reconstructed by the remote fault estimator. An recursive approach is developed to obtain fault estimator gains as well as guarantee the fault estimator performance. Furthermore, the corresponding event-triggered sensor data transmission scheme is also presented for improving working-life of the wireless sensor node when measurement information are aperiodically transmitted. Finally, a scaled version of an industrial system consisting of local PC, remote estimator and wireless sensor node is used to experimentally evaluate the proposed theoretical results. In particular, a novel fault-alarming strategy is proposed so that the real-time capacity of fault-detection is guaranteed when the event condition is triggered.

1. Introduction

Wireless sensor networks (WSNs) have grown rapidly in the past decades and found wide applications in the areas of industrial process, smart building, health care and battlefield surveillance, etc. [1,2]. In those applications, data-transmission usually communicates over a wireless channel. Replacing old batteries without energy of wireless sensors is always a costly operation or even impossible [3]. In addition, the capacity of a wireless channel normally varies with external environment. This time-varying property can impact the overall dynamic system performance. Consequently, less data-transmission between the sensor and the remote state estimator (or actuator) can significantly prolong the lifetime of the sensors. Event-triggered transmission schemes provide an inspiring opportunity to a trade-off between energy efficiency and system performance.
In parallel with the quiet evolution of WSNs technologies, the network security problem has recently become an emerging topic of research from the defenders’ perspectives. Due to the unprotected and shared property of a wireless communication link, the exchanged information can be easily exploited by adversaries. It is worth mentioning that a deception attack is one of the most dangerous attack behaviors which can maliciously degrade network reliability through arbitrarily injecting the false data information. Using the techniques of variance-constrained and Lyapunov stability theories, some excellent results concerning security control and estimation problems have been reported in [4,5,6]. For instant, a security-guaranteed filter was designed in [4] for nonlinear stochastic time-delay systems with randomly occurring sensor saturations and deception attacks, where a new concept of mean-square security domain was introduced to quantify the security degree. In [5], a variance-constrained distributed filtering was presented for time-varying systems subject to multiplicative noises and deception attacks over sensor networks. Reference [6] addressed a problem of observer-based event-triggered consensus control for a class of discrete-time multi-agent systems with lossy sensors and cyber-attacks, where a dynamic output feedback controller was derived such that the prescribed security in probability was guaranteed while obtaining an upper bound of the quadratic cost criterion.
For the purpose of increasing the safety and reliability in modern dynamical system, model-based fault diagnosis has been promising research and application topics. In the model-based fault diagnosis, the observer-based strategy is often viewed as one of the most effective methods for fault diagnosis. So far, the issues of observer-based fault diagnosis for dynamic system have received a great deal of attentions from many researchers, and lots of outstanding results were made: [7,8,9,10,11,12,13,14,15,16,17]. Similar to event-triggered control and estimation problems [18,19,20], the event-triggered data transmission scheme could also be applied to fault diagnosis purposes. An event-triggered fault-detection filter was established in [21] for discrete-time systems with nonlinear perturbation subject to transmission delay, where the designed filter parameters were given through solving some linear matrix inequalities. Literature [22] studied fault detection and isolation using event-triggered sensor data transmission strategy. Its feature was that the proposed fault detection filter was presented based on l 1 , H and H , and further applied to underwater robotic platforms. A polynomial fuzzy fault-detection filter was designed in [23] for nonlinear discrete-time systems under an event-triggered data transmission framework, where the asymptotically stable of the polynomial fault-detection residual system was guaranteed while satisfying the desired performance criteria.
The aforementioned studies have proposed some results to show the effectiveness of event-triggered scheme in fault diagnosis. However, an event-triggered fault detection and estimation problem have not been fully investigated yet especially when the system is subject to deception attacks in a possibly random way. On the other hand, the sensibility and real-time capacity of fault detection were neglected in the existing literature. Due to the considered event-triggered scheme adopting an aperiodic fashion to data-transmission, remote fault-detection filter can not detect in real time when a fault occurs. Furthermore, a fault-detection residual may further become insensitive, because unknown disturbances and faults are often coupled in practical systems, it is difficult to distinguish among them. Therefore, the purpose of the paper is to solve the problems we discussed. The main contributions of this paper are summarized as follows:
(1) A synthesized design of fault-detection filter and fault estimator with an event-triggered sensor data transmission scheme in discrete-time stochastic systems is proposed, for the first time, to deal with the phenomena of both unknown disturbances and randomly occurring deception attacks, which reflects the reality closely. The design of the fault-detection filter and the fault estimator is simple due to the utilization of reduce-order subsystems.
(2) Using the coordinate transformation approach, the desired fault-detection residual is sensitive only to faults while insensitive to disturbances. An upper bound of the fault-detection filtering error covariance is minimized at each iteration with proper filtering parameters computed via a recursive algorithm. In particular, the proposed fault-alarming strategy cannot be influenced by the impact of event-triggered data transmission to ensure a real-time capacity of fault detection.
(3) System faults can be robustly estimated using the designed event-triggered remote fault estimator at the same time. Two upper bounds of the state and fault estimation error covariance matrices are obtained in form of Riccati-like difference equations by utilizing the mathematical induction approach. The explicit forms of the fault estimator gains are obtained to minimize such upper bounds through a recursive algorithm. Furthermore, the corresponding event-triggered scheme is given to trade the computation for communication.
(4) A simulation testbed where the terminal voltages of a three-cell battery string are estimated is implemented. Estimation accuracy, fault-alarming strategy and battery life are given for verifying the effectiveness of the proposed theoretical algorithms.
Nomenclature: Prob x means the occurrence probability of the event x. E ( · ) , V a r ( · ) and t r ( · ) denote the mathematical expectation, variance and the trace of a matrix, respectively. N and R denote the sets of natural and real numbers, respectively. R m × n denotes the sets of m by n real-valued matrices, whereas R n is short for R n × 1 . R + n × n and R + + n × n are the sets of n × n positive semi-definite and positive definite matrices, respectively. When X R + n × n , it is simply denoted as X 0 or X > 0 if X R + + n × n . For X R m × n , X T denotes the transpose of X and X denotes the Euclidean norm of X. “I” denotes a identity matrix with appropriate dimensions. Furthermore, the terms state observer and state estimator are used synonymously in this paper.

2. Problem Statement

2.1. System Model

Consider the following stochastic linear system defined on k 0 , N 1 :
x k + 1 = A x k + W w k + F ˜ f k + D d k y ¯ k = C x k + V v k + F ¯ f k
In above equations, the constant subscript “k” is a discrete-time index, system state x k is a n-dimensional vector. The variables y ¯ k R p is the sensor’s measurement signals. The additional terms, fault signals f k is a q-dimensional vector to be detected as well as estimated, and d k is bounded external disturbances with dimension of s. The process noises w k and the measurement noises v k are assumed white and zero-mean sequences with known variance: E w k w k T = Q w 0 , E v k v k T = R v > 0 and E x 0 x 0 T = P 0 > 0 , respectively. The adopted mathematical model of randomly occurring deception attacks is described by
y ¯ a , k = y ¯ k + β k y k = y ¯ k + α k y ¯ a , k
where the variables y ¯ a , k R p and y k R p are the attack signals sent by adversaries and the received measurement signals by the remote estimator, respectively. The non-zero β k satisfying β k β is an arbitrary limited magnitude signal where the bound β is a known positive scalar that can be estimated through statistical tests or specified by security requirements. The random variable α k is a Bernoulli distributed white sequence with the following probabilities
Prob α k = 1 = α and Prob α k = 0 = α 1 = 1 α
As can be seen from (2), it is clear that if a deception attack occurs, i.e., α k = 1 , the remote estimator can only obtain the signals β k sent by attackers. If α k = 0 , the actual measurement signals y ¯ k are sent to the remote estimator. In other words, the actual measurement signals received by remote estimator can be rewritten as follows
y k = 1 α k y ¯ k + α k β k
Throughout this paper, the noise signals w k , v k and the stochastic variable α k are assumed mutually independent. It is further supposed that the matrices A, C, F ˜ , F ¯ , W, D and V with appropriate dimensions are known. Furthermore, an event-triggered transmission decision variable γ k determines whether the current measurement information is sent to the remote estimator or not. When γ k = 1 indicates that y k is sent out and γ k = 0 , otherwise. Therefore, only when γ k = 1 , the remote estimator knows the exact value y k . Clearly, the corresponding event only happens at each time instant.
Remark 1.
In practice, attack detectors are usually viewed as a soft barrier, and there exists some network constraints that should be faced by the adversaries. Such constraints include network load, network congestion, and network transmission rate that are typically randomly fluctuated [5]. This kind of random characteristic from network constraints should be taken into consideration if a comprehensive yet realistic deception attack model is to be established. In addition, such a random nature brings a new challenge when designing our fault-detection filter and fault estimator.
For the above system, two assumptions are first introduced as follows.
Assumption 1.
[24]
r a n k C × D = r a n k D
Assumption 2.
[11]
For every complex number ζ with nonnegative real part,
r a n k A ζ I F ˜ D C 0 0 = n + r a n k F ˜ + r a n k D

2.2. Transforming of the System into Two Subsystems

Inspired by [11,24,25], we will adopt the coordinate transformation approach to transform the system into two subsystems: the first subsystem will free from disturbances, but subject to system faults. For the first subsystem, a fault-detection residual based on the derived fault-detection filter will only sensitive to faults; inversely, the desired fault estimator of the second subsystem will include disturbances and system faults, which will robust to disturbances. The transformation results are briefly presented below.
According to [11], Assumption 1 is equivalent to the existence of two non-singular matrices T and S such that
x = T 1 x ˜ 1 x ˜ 2 , and y = S 1 y ˜ 1 y ˜ 2
respectively, so that the system can be accordingly transformed into
x ˜ k + 1 1 = A ˜ 11 x ˜ k 1 + A ˜ 12 x ˜ k 2 + W ˜ 1 w k + F ˜ 1 f k x ˜ k + 1 2 = A ˜ 22 x ˜ k 2 + A ˜ 21 x ˜ k 1 + W ˜ 2 w k + F ˜ 2 f k + D ˜ d d k y k 1 = 1 α k C ˜ 11 x ˜ k 1 + 1 α k V ˜ 1 v k + 1 α k F ¯ 1 f k + α k S 1 β k y k 2 = 1 α k C ˜ 22 x ˜ k 2 + 1 α k V ˜ 2 v k + 1 α k F ¯ 2 f k + α k S 2 β k
where
T A T 1 = A ˜ 11 A ˜ 12 A ˜ 21 A ˜ 22 , T W = W ˜ 1 W ˜ 2 , T F ˜ = F ˜ 1 F ˜ 2
S C T 1 = C ˜ 11 0 0 C ˜ 22 , S V = V ˜ 1 V ˜ 2 , S F ¯ = F ¯ 1 F ¯ 2 , S = S 1 S 2
Matrix D ˜ d has full rank and C ˜ 22 is invertible. It was shown in [11] that the pair ( C ˜ 11 , A ˜ 11 ) was detectable if and only if Assumption 2 was satisfied. Two subsystems given by (8) can be rewritten separately as
The 1st subsystem:
x ˜ k + 1 1 = A ˜ 11 x ˜ k 1 + A ˜ 12 x ˜ k 2 + W ˜ 1 w k + F ˜ 1 f k y k 1 = 1 α k C ˜ 11 x ˜ k 1 + 1 α k V ˜ 1 v k + 1 α k F ¯ 1 f k + α k S 1 β k
The 2nd subsystem:
x ˜ k + 1 2 = A ˜ 22 x ˜ k 2 + A ˜ 21 x ˜ k 1 + W ˜ 2 w k + F ^ 2 f d , k y k 2 = 1 α k C ˜ 22 x ˜ k 2 + 1 α k V ˜ 2 v k + 1 α k F 2 f d , k + α k S 2 β k
where F ^ 2 = F ˜ 2 D ˜ d , F 2 = F ¯ 2 0 and f d , k = f k d k .
Remark 2.
From the Formula (11) and (12), it can be easily seen that the 1st subsystem is not included disturbances, as well as the 2nd subsystem contains both. For the 1st subsystem, a fault-detection filter and fault-alarming strategy will be designed under an event-triggered data transmission framework; for the 2nd subsystem, an event-triggered fault estimator will be derived.
Before giving the main results, the following lemma, which will be useful in this paper, needs to be introduced.
Lemma 1.
(Lemma 1 [26]) For any two matrices X and Y with appropriate dimensions, the inequality X Y T + Y X T τ X X T + τ 1 Y Y T holds where τ > 0 is a constant scalar.

3. Event-Triggered Fault-Detection Strategy Based on Reduce-Order Filter

In this section, a fault-detection system will be presented involving a residual generator, a residual evaluator and fault-alarming strategy under an event-triggered data transmission framework.

3.1. Residual Generator

For the residual generation, the following reduce-order filter is constructed as follows
x ˜ ^ k + 1 1 = A ˜ 11 x ˜ ^ k 1 + A ˜ 12 x ˜ ^ k 2 + K k 1 y ˜ k 1 y ˜ ^ k 1 y ˜ ^ k 1 = α 1 C ˜ 11 x ˜ ^ k 1
where x ˜ ^ k i and y ˜ ^ k i indicate estimated state and output estimation values for each i = 1 and 2, respectively. The matrix K k 1 is the filtering gain to be determined. Denote state estimation errors for each i = 1 and 2 as
e k i = x ˜ k i x ˜ ^ k i
Then, the corresponding error dynamics of the 1st subsystem without system faults are calculated by subtracting the filtering (13) from the 1st subsystem (11)
e k + 1 1 = x ˜ k + 1 1 x ˜ ^ k + 1 1 = A ˜ 11 α 1 K k 1 C ˜ 11 e k 1 + A ˜ 12 e k 2 + W ˜ 1 w k 1 α k K k 1 V ˜ 1 v k α k K k 1 S 1 β k α k α K k 1 C ˜ 11 x ˜ k 1
Further, let us define error covariance P k i for each i = 1 and 2 as
P k i = E x ˜ k i x ˜ ^ k i x ˜ k i x ˜ ^ k i T
The purpose of this section is to design a form (13) of fault-detection filter for the 1st subsystem (11) subject to deception attacks. More specifically, we are interested in looking for the filtering parameter K k 1 such that the following requirements are met simultaneously:
(1) A form (13) of fault-detection filter such that an upper bound of the filter error convariance P k 1 is derived, i.e., there exists a sequence of positive-definite matrices P ¯ k 1 0 k N 1 that satisfies
E x ˜ k 1 x ˜ ^ k 1 x ˜ k 1 x ˜ ^ k 1 T P ¯ k 1
(2) The sequence of upper bound P ¯ k 1 is minimized by the desired filtering gain K k 1 through a recursive scheme.
Now, an upper bound of the filtering error convariance is presented for our proposed fault-detection filter in the following theorem.
Theorem 1.
For the 1st subsystem (11) subject to deception attacks in the fault-free case and given τ j j = 1 , 2 , a n d 3 , the filtering error covariance satisfies the following form:
P k + 1 1 P ¯ k + 1 1
where
P ¯ k + 1 1 = 1 + τ 1 + τ 2 α A ˜ 11 α 1 K k 1 C ˜ 11 P ¯ k 1 A ˜ 11 α 1 K k 1 C ˜ 11 T + 1 + τ 1 1 + τ 3 α A ˜ 12 P ¯ k 2 A ˜ 12 T + α + τ 2 1 α + τ 3 1 α β 2 K k 1 S 1 S 1 T K k 1 T + W ˜ 1 Q w W ˜ 1 T + α 2 K k 1 C ˜ 11 P ¯ k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T C ˜ 11 T K k 1 T + α 1 K k 1 D ˜ v 1 R v D ˜ v 1 T K k 1 T
α 1 = 1 α , α 2 = E α k α 2 = α 1 α and the initial condition P ¯ 0 1 = P 0 1 .
Proof. 
Based on the error dynamics of the 1st subsystem (15) and the definition of the filtering error covariance (16), the expression for the error covariance matrix of the 1st subsystem can be expanded as
P k + 1 1 = E x ˜ k 1 x ˜ ^ k 1 x ˜ k 1 x ˜ ^ k 1 T = E A ˜ 11 α 1 K k 1 C ˜ 11 e k 1 + A ˜ 12 e k 2 + W ˜ 1 w k 1 α k K k 1 V ˜ 1 v k α k K k 1 S 1 β k α k α C ˜ 11 K k 1 x ˜ k 1 × A ˜ 11 α 1 K k 1 C ˜ 11 e k 1 + A ˜ 12 e k 2 + W ˜ 1 w k 1 α k K k 1 V ˜ 1 v k α k K k 1 S 1 β k α k α C ˜ 11 K k 1 x ˜ k 1 T = A ˜ 11 α 1 K k 1 C ˜ 11 P k 1 A ˜ 11 α 1 K k 1 C ˜ 11 T + A ˜ 12 P k 2 A ˜ 12 T + W ˜ 1 Q w W ˜ 1 T + α 1 K k 1 V 1 ˜ R v V ˜ 1 T K k 1 T + α K k 1 S 1 β k β k T S 1 T K k 1 T + A ˜ 11 α 1 K k 1 C ˜ 11 E e k 1 e k 2 T A ˜ 12 T + A ˜ 12 E e k 2 e k 1 T A ˜ 11 α 1 K k 1 C ˜ 11 T α A ˜ 11 α 1 K k 1 C ˜ 11 E e k 1 β k T S 1 T K k 1 T α K k 1 S 1 E β k e k 1 T A ˜ 11 α 1 K k 1 C ˜ 11 T α A ˜ 12 E e k 2 β k T S 1 T K k 1 T α K k 1 S 1 E β k e k 2 T A ˜ 12 T + α 2 K k 1 C ˜ 11 E x ˜ k 1 x ˜ k 1 T C ˜ 11 T K k 1 T
where α 1 = 1 α , α 2 = E α k α 2 = α 1 α . Noticing the fact that E x ˜ k 1 x ˜ k 1 T = P k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T , we have
P k + 1 1 = A ˜ 11 α 1 K k 1 C ˜ 11 P k 1 A ˜ 11 α 1 K k 1 C ˜ 11 T + A ˜ 12 P k 2 A ˜ 12 T + W ˜ 1 Q w W ˜ 1 T + α 1 K k 1 V ˜ 1 R v V ˜ 1 T K k 1 T + α K k 1 S 1 β k β k T S 1 T K k 1 T + A ˜ 11 α 1 K k 1 C ˜ 11 E e k 1 e k 2 T A ˜ 12 T + A ˜ 12 E e k 2 e k 1 T A ˜ 11 α 1 K k 1 C ˜ 11 T α A ˜ 11 α 1 K k 1 C ˜ 11 E e k 1 β k T S 1 T K k 1 T α K k 1 S 1 E β k e k 1 T A ˜ 11 α 1 K k 1 C ˜ 11 T α A ˜ 12 E e k 2 β k T S 1 T K k 1 T α K k 1 S 1 E β k e k 2 T A ˜ 12 T + α 2 K k 1 C ˜ 11 P k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T C ˜ 11 T K k 1 T
To obtain an upper bound of P k + 1 1 , the following parts of this theorem can be proved by mathematical induction. According to the initial condition, we have P ¯ 0 1 P 0 1 . Assume that P ¯ k 1 P k 1 , and then P ¯ k + 1 1 P k + 1 1 need to be proved. With the help of Lemma 1, it follows from (21) that
P k + 1 1 1 + τ 1 + τ 2 α A ˜ 11 α 1 K k 1 C ˜ 11 P k 1 A ˜ 11 α 1 K k 1 C ˜ 11 T + 1 + τ 1 1 + τ 3 α A ˜ 12 P k 2 A ˜ 12 T + α + τ 2 1 α + τ 3 1 α K k 1 S 1 β k β k T S 1 T K k 1 T + W ˜ 1 Q w W ˜ 1 T + α 2 K k 1 C ˜ 11 P k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T C ˜ 11 T K k 1 T + α 1 K k 1 V ˜ 1 R v V ˜ 1 T K k 1 T
Combining inequality β k β into Formula (22) leads to
P k + 1 1 1 + τ 1 + τ 2 α A ˜ 11 α 1 K k 1 C ˜ 11 P ¯ k 1 A ˜ 11 α 1 K k 1 C ˜ 11 T + 1 + τ 1 1 + τ 3 α A ˜ 12 P ¯ k 2 A ˜ 12 T + α + τ 2 1 α + τ 3 1 α β 2 K k 1 S 1 S 1 T K k 1 T + W ˜ 1 Q w W ˜ 1 T + α 2 K k 1 C ˜ 11 P ¯ k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T C ˜ 11 T K k 1 T + α 1 K k 1 V ˜ 1 R v V ˜ 1 T K k 1 T = P ¯ k + 1 1
which implies that inequality (18) is true. ☐
So far, the upper bound of the filtering error covariance has been presented in the above results. We are now in a position to derive the desired filtering gain K k 1 through minimizing this upper bound at every time instant.
Theorem 2.
Consider the 1st subsystem (11) with deception attacks in the fault-free case. For given τ j j = 1 , 2 , a n d 3 , the filtering gain is given by
K k 1 = α 1 1 + τ 1 + τ 2 α 2 A ˜ 11 P ¯ k 1 C ˜ 11 T × α 1 2 1 + τ 1 + τ 2 α 2 C ˜ 11 P ¯ k 1 C ˜ 11 T + α + τ 2 1 + τ 3 1 β 2 S 1 S 1 T + α 1 D ˜ v 1 R v D ˜ v 1 T + X ˜ 1
where X ˜ = α 2 C ˜ 11 P ¯ k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T C ˜ 11 T . The obtained upper bound P ¯ k + 1 1 of the filtering error covariance P k + 1 1 on the 1st subsystem is minimized at each time instant.
Proof. 
The filtering gain described by (13) is optimal in the sense that minimizes the upper bound of filtering error covariance. Notice that the first, second and third terms on the upper bound (19) are quadratic in K k 1 . The matrix differentiation formula can be applied to Formula (19), and differentiate t r P ¯ k + 1 1 with respect to K k 1 . The result is
t r P ¯ k + 1 1 K k 1 = 2 α 1 1 + τ 1 + τ 2 α A ˜ 11 α 1 K k 1 C ˜ 11 P ¯ k 1 C ˜ 11 T + 2 α + τ 2 1 α + τ 3 1 α β 2 K k 1 S 1 S 1 T + 2 α 1 K k 1 V ˜ 1 R v V ˜ 1 T + 2 α 2 K k 1 C ˜ 11 P ¯ k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T C ˜ 11 T
Now, set the derivative equal to zero and solve for the optimal gain. The following form can be derived:
K k 1 = α 1 1 + τ 1 + τ 2 α 2 A ˜ 11 P ¯ k 1 C ˜ 11 T × α 1 2 1 + τ 1 + τ 2 α 2 C ˜ 11 P ¯ k 1 C ˜ 11 T + α + τ 2 1 + τ 3 1 β 2 S 1 S 1 T + α 1 D ˜ v 1 R v D ˜ v 1 T + X ˜ 1
where X ˜ = α 2 C ˜ 11 P ¯ k 1 + x ˜ ^ k 1 x ˜ ^ k 1 T C ˜ 11 T . ☐
Remark 3.
In the Theorems 1 and 2, the constructed fault-detection filter has been presented for stochastic systems against randomly occurring deception attacks. The available information of the deception attacks has been reflected in our proposed filtering design including α, α 1 , α 2 and β. In addition, three scalars τ 1 , τ 2 and τ 3 have been introduced to enhance the flexibility in our fault-detection filter.
Remark 4.
Theorem 2 provides the optimal gain K k 1 without system faults, which is similar to the discrete-time standard Kalman filter [27]. Consequently, when the 1st subsystem is healthy, the mean-square filtering error is minimized so as to ensure accurate estimation; otherwise, the filtering error will be bigger than the system without fault to achieve the purpose of fault alarming.

3.2. Fault-Alarming Strategy

Prior to presenting a novel fault-alarming strategy, a fault indicating signal (i.e., residual), can be generated using the output estimation of the 1st subsystem as follows
r k = E y ˜ k 1 y ˜ ^ k 1
where y ˜ ^ k 1 = α 1 C ˜ 11 x ˜ ^ k 1 . Once a fault occurs, the residual and the filtering error dynamics of the proposed fault-detection filtering become:
r k = α 1 C ˜ 11 e k 1 α k α C ˜ 11 x ˜ k 1 + 1 α k V ˜ 1 v k + α k S 1 β k + 1 α k F ¯ 1 f k e k + 1 1 = A ˜ 11 α 1 K k 1 C ˜ 11 e k 1 + A ˜ 12 e k 2 + W ˜ 1 w k 1 α k K k 1 V ˜ 1 v k α k K k 1 S 1 β k α k α C ˜ 11 x ˜ k 1 + F ˜ 1 f k 1 α k K k 1 F ¯ 1 f k
Now, our event-triggered fault-alarming strategy is presented in Figure 1 and Algorithm 1. As shown in Figure 1, the remote estimation of a system is based on the measurements taken by a battery-powered sensor. The remote estimator receives the measurements through a wireless channel. A copy of remote estimator and event generator (which is also called event-triggered data transmission scheme) determines whether the current measurement information is sent to the remote estimator or not. When an event occurs i.e., γ k = 1 , the remote estimator receives the measurement, otherwise γ k = 0 . A local estimator runs the fault-detection residual of the above 1st subsystem that we defined. Clearly, if the system is free from faults ( f k 0 ), then lim t E r k 0 ; conversely, if a fault occurs in the system ( F ˜ 1 f k 0 and F ¯ 1 f k 0 ), then lim t E r k 0 to achieve fault alarming. Furthermore, a copy of remote estimator, event generator and local estimator are supposed to be integrated in an embedded system which is presented in the experimental verification.
Algorithm 1 Event-triggered fault detection.
Step 1: Design a bank of fault-detection filter of the form (13).
Step 2: Compute the fault-detection residuals r k , and choose a threshold δ f which can be chosen as small as possible theoretically.
Step 3: If r k < δ f , there exists no fault and the corresponding fault-alarming is turned off.
Step 4: If γ k = 1 , the current measurements can be sent to the remote estimator.
Step 5: else γ k = 0 , the remote estimator cannot receive the measurements to achieve energy saving.
Step 6: end if
Step 7: else r k δ f , a fault has occured and the corresponding fault alarming is turned on. For the purpose of detecting system fault in the remote estimator, the current sensor measurements is sent to the remote estimator without entering the event-triggered decision.
Step 8: end if
Step 9: end
As discussed in Algorithm 1, if r k < δ f , it implies that the system is free from fault; and then, the event-triggered data transmission scheme can be utilized to achieve energy conversation. On the other hand, if r k δ f , it is claimed that the system is faulty. The current sensor information is sent to the remote estimator manually without entering event-triggered decision. The delay issue of fault-alarming can be effectively solved, although such strategy may reduce working-life of battery slightly.

4. Co-Design Scheme of Fault Estimator and Event-Triggered Generator

After a fault occurs, a fault estimator for subsystem (12) is constructed as follows:
x ˜ ^ k + 1 2 = A ˜ 22 x ˜ ^ k 2 + A ˜ 21 x ˜ ^ k 1 + F ^ 2 f ^ k + K k 2 y ˜ p , k 2 y ˜ ^ k 2 f ^ k + 1 = f ^ k + K k 3 y ˜ p , k 2 y ˜ ^ k 2 y ˜ ^ k 2 = α 1 C ˜ 22 x ˜ ^ k 2 + F 2 f ^ k
where x ˜ ^ k 2 is an estimated state and the matrices K k i ( i = 2 and 3) are estimator’s gains with appropriate dimensions to be designed. Fault estimation signal f ^ k + 1 is updated by the estimated information f ^ k as well as output estimation error ˜ ^ y k 2 . The previous measurement information y ˜ p , k 2 is transmitted from sensor to remote fault estimator module when no new measurement information is transmitted. In the event generator module described in Figure 1, sensor information is not transmitted at each time instant, rather this is done only at the transmission times that are denoted by k s and s N . As a result, measurements sent to the remote fault estimator module can be expressed as y ˜ p , k i = y ˜ k s i (i = 1 and 2), k k s , k s + 1 and k N where k s + 1 > k s .
Remark 5.
It is worth mentioning that our fault estimator utilizes the previous received measurement information y ˜ p , k 2 because of implementation of event generator. As discussed in Algorithm 1, the current measurement information is sent to the remote estimator without entering the event-triggered decision when a fault occurs. However, such a remote fault estimator can ensure that the undetected faults are also estimated if the event condition is triggered.
Denote fault estimation error and the corresponding error covariance as
e f , k = f d , k f ^ k
P f , k = E e f , k e f , k T
Then, the error dynamics of the 2nd subsystem can be formulated as
e k + 1 2 = x ˜ k + 1 2 x ˜ ^ k + 1 2 = A ˜ 22 α 1 K k 2 C ˜ 22 e k 2 + A ˜ 21 e k 1 + F ^ 2 α 1 K k 2 F 2 e f , k + W ˜ 2 w k K k 2 δ k 1 α k K k 2 V ˜ 2 v k α k K k 2 S 2 β k + α k α K k 2 C ˜ 22 x ˜ k 2 + α k α K k 2 F 2 f d , k
where δ k = y ˜ k 2 y ˜ p , k 2 .
e f , k + 1 = f d , k + 1 f ^ k + 1 = f d , k + 1 f d , k + f d , k f ^ k K k 3 y ˜ p , k 2 y ˜ ^ k 2 = f d , k + 1 f d , k + f d , k f ^ k α 1 K k 3 C ˜ 22 e k 2 1 α k K k 3 V ˜ 2 v k α k K k 3 S 2 β k + α k α K k 3 C ˜ 22 x ˜ k 2 K k 3 δ k + α k α K k 3 F 2 f d , k α 1 K k 3 F 2 e f , k
which can be rewritten as
e f , k + 1 = Δ f k + I α 1 K k 3 F 2 e f , k α 1 K k 3 C ˜ 22 e k 2 1 α k K k 3 V ˜ 2 v k α k K k 3 S 2 β k + α k α K k 3 C ˜ 22 x ˜ k 2 K k 3 δ k + α k α K k 3 F 2 f d , k
where Δ f k = f d , k + 1 f d , k .
Remark 6.
Literature [28,29] assumed that the fault difference item was too small to be neglected, because the sampling interval were supposed to be sufficiently small. However, in many practical cases, faults might generate a great amplitude change of at a certain time, especially when time-varying faults occur. Hence, the paper considers the effect on the estimation performance, which reduces the conservatism of our fault estimator.
Similar to the design of fault-detection filter gain, the gains K k 2 , K k 3 and the corresponding event-triggered data transmission scheme can be derived such that upper bounds of state and fault estimation error covariance are minimized at each time step. Before proceeding further, the following assumption is made.
Assumption 3.
[11] For a small positive constant b d , the inequality f k + 1 d k + 1 f k d k b d holds, where · is the Euclidean norm.
Now, it is ready to give the upper bounds of both the covariance matrix P k 2 of estimation error and the fault estimation error covariance P f , k in the following theorem.
Theorem 3.
For given positive scalars δ e , τ j j = 4 , , 15 and ρ j j = 1 , , 12 , the state estimation error covariance P k 2 and fault estimation error covariance P f , k have the following upper bounds P ¯ k 2 and P ¯ f , k with initial conditions P ¯ 0 2 = P 0 2 and P ¯ f , 0 = P f , 0 , respectively, where
P ¯ k + 1 2 = 1 + τ 4 + τ 5 + τ 6 + τ 7 α A ˜ 22 α 1 K k 2 C ˜ 22 P ¯ k 2 A ˜ 22 α 1 K k 2 C ˜ 22 T + 1 + τ 4 1 + τ 8 + τ 9 + τ 10 α A ˜ 21 P ¯ k 1 A ˜ 21 T + 1 + τ 5 1 + τ 8 1 + τ 11 + τ 12 α F ^ 2 α 1 K k 2 F 2 P f , k ¯ F ^ 2 α 1 K k 2 F 2 T + 1 + τ 6 1 + τ 9 1 + τ 11 1 + τ 13 α δ e 2 K k 2 K k 2 T + α + τ 7 1 α + τ 10 1 α + τ 12 1 α + τ 13 1 α K k 2 S 2 β 2 S 2 T K k 2 T + W ˜ 2 Q w W ˜ 2 T + 1 α K k 2 V ˜ 2 R v V ˜ 2 T K k 2 T + 1 + τ 14 1 α 2 K k 2 C ˜ 22 P ¯ k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T C ˜ 22 T K k 2 T + 1 + τ 14 α 2 K k 2 F 2 1 + τ 15 P ¯ f , k + 1 + τ 15 1 f ^ k f ^ k T F 2 T K k 2 T
and
P ¯ f , k + 1 = 1 + ρ 1 + ρ 2 α 1 + ρ 3 α + ρ 4 I α 1 K k 3 F 2 P ¯ f , k I α 1 K k 3 F 2 T + 1 + ρ 1 1 + ρ 5 α 1 + ρ 6 α + ρ 7 b d 2 I + α 1 2 + ρ 2 1 α 1 + ρ 5 1 α 1 + ρ 8 α α 1 + ρ 9 α 1 K k 3 C ˜ 22 P ¯ k 2 C ˜ 22 T K k 3 T + α + ρ 3 1 α + ρ 6 1 α + ρ 8 1 α α 1 + ρ 10 α β 2 K k 3 S 2 S 2 T K k 3 T + 1 + ρ 4 1 + ρ 7 1 + ρ 9 1 α 1 + ρ 10 1 α δ e 2 K k 3 K k 3 T + 1 + ρ 11 α 2 K k 3 C ˜ 22 P ¯ k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T C ˜ 22 T K k 3 T + 1 + ρ 11 1 α 2 K k 3 F 2 1 + ρ 12 P ¯ f , k + 1 + ρ 12 1 f ^ k f ^ k T F 2 T K k 3 T + 1 α K k 3 V ˜ 2 R v V ˜ 2 T K k 3 T
Furthermore, the event condition satisfies that
y ˜ k 2 y ˜ p , k 2 δ e
Proof. 
First, recall from the definition of state estimation error covariance (16), P k 2 can be calculated as follows
P k + 1 2 = E x ˜ k 2 x ˜ ^ k 2 x ˜ k 2 x ˜ ^ k 2 T = E A ˜ 22 α 1 K k 2 C ˜ 22 e k 2 + A ˜ 21 e k 1 + F ^ 2 α 1 K k 2 F 2 e f , k + W ˜ 2 w k K k 2 δ k 1 α k K k 2 V ˜ 2 v k α k K k 2 S 2 β k + α k α K k 2 C ˜ 22 x ˜ k 2 + α k α K k 2 F 2 f d , k × A ˜ 22 α 1 K k 2 C ˜ 22 e k 2 + A ˜ 21 e k 1 + F ^ 2 α 1 K k 2 F 2 e f , k + W ˜ 2 w k K k 2 δ k 1 α k K k 2 V ˜ 2 v k α k K k 2 S 2 β k + α k α K k 2 C ˜ 22 x ˜ k 2 + α k α K k 2 F 2 f d , k T = A ˜ 22 α 1 K k 2 C ˜ 22 P k 2 A ˜ 22 α 1 K k 2 C ˜ 22 T + A ˜ 21 P k 1 A ˜ 21 T + F ^ 2 α 1 K k 2 F 2 P f , k F ^ 2 α 1 K k 2 F 2 T + W ˜ 2 Q w W ˜ 2 T + K k 2 δ k δ k T K k 2 T + 1 α K k 2 V ˜ 2 R v V ˜ 2 T K k 2 T + α K k 2 S 2 β k β k T S 2 T K k 2 T
+ A ˜ 22 α 1 K k 2 C ˜ 22 E e k 2 e k 1 T A ˜ 21 T + A ˜ 21 E e k 1 e k 2 T A ˜ 22 α 1 K k 2 C ˜ 22 T + A ˜ 22 α 1 K k 2 C ˜ 22 E e k 2 e f , k T F ^ 2 α 1 K k 2 F 2 T + F ^ 2 α 1 K k 2 F 2 E e f , k e k 2 T A ˜ 22 α 1 K k 2 C ˜ 22 A ˜ 22 α 1 K k 2 C ˜ 22 E e k 2 δ k T K k 2 T K k 2 E δ k e k 2 T A ˜ 22 α 1 K k 2 C ˜ 22 T α A ˜ 22 α 1 K k 2 C ˜ 22 E e k 2 β k T S 2 T K k 2 T α K k 2 S 2 E β k e k 2 T A ˜ 22 α 1 K k 2 C ˜ 22 T + A ˜ 21 E e k 1 e f , k T F ^ 2 α 1 K k 2 F 2 T + F ^ 2 α 1 K k 2 F 2 E e f , k e k 1 T A ˜ 21 T A ˜ 21 E e k 1 δ k T K k 2 T K k 2 E δ k e k 1 T A ˜ 21 T α A ˜ 21 E e k 1 β k T S 2 T K k 2 T α K k 2 S 2 E β k e k 1 T A ˜ 21 T F ^ 2 α 1 K k 2 F 2 E e f , k δ k T K k 2 T K k 2 E δ k e f , k T F ^ 2 α 1 K k 2 F 2 T α F ^ 2 α 1 K k 2 F 2 E e f , k β k T S 2 T K k 2 T α K k 2 S 2 E β k e f , k T F ^ 2 T + α K k 2 E δ k β k T S 2 T K k 2 T + α K k 2 S 2 E β k δ k T K k 2 T + α 2 K k 2 C ˜ 22 E x ˜ k 2 x ˜ k 2 T C ˜ 22 T K k 2 T + α 2 K k 2 F 2 E f d , k f d , k T F 2 T K k 2 T + α 2 K k 2 C ˜ 22 E x ˜ k 2 f d , k T F 2 T K k 2 T + α 2 K k 2 F 2 E f d , k x ˜ k 2 T C ˜ 22 T K k 2 T
By using the result of Lemma 1, the above equation can be simplified as
P k + 1 2 1 + τ 4 + τ 5 + τ 6 + τ 7 α A ˜ 22 α 1 K k 2 C ˜ 22 P k 2 A ˜ 22 α 1 K k 2 C ˜ 22 T + 1 + τ 4 1 + τ 8 + τ 9 + τ 10 α A ˜ 21 P k 1 A ˜ 21 T + 1 + τ 5 1 + τ 8 1 + τ 11 + τ 12 α F ^ 2 α 1 K k 2 F 2 P f , k F ^ 2 α 1 K k 2 F 2 T + 1 + τ 6 1 + τ 9 1 + τ 11 1 + τ 13 α K k 2 δ k δ k T K k 2 T + α + τ 7 1 α + τ 10 1 α + τ 12 1 α + τ 13 1 α K k 2 S 2 β k β k T S 2 T K k 2 T + W ˜ 2 Q w W ˜ 2 T + 1 α K k 2 V ˜ 2 R v V ˜ 2 T K k 2 T + 1 + τ 14 1 α 2 K k 2 C ˜ 22 E x ˜ k 2 x ˜ k 2 T C ˜ 22 T K k 2 T + 1 + τ 14 α 2 K k 2 F 2 1 + τ 15 P f , k + 1 + τ 15 1 f ^ k f ^ k T F 2 T K k 2 T
Considering that E x ˜ k 2 x ˜ k 2 T = P k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T and β k β , (39) can be further reduced as
P k + 1 2 1 + τ 4 + τ 5 + τ 6 + τ 7 α A ˜ 22 α 1 K k 2 C ˜ 22 P k 2 A ˜ 22 α 1 K k 2 C ˜ 22 T + 1 + τ 4 1 + τ 8 + τ 9 + τ 10 α A ˜ 21 P k 1 A ˜ 21 T + 1 + τ 5 1 + τ 8 1 + τ 11 + τ 12 α F ^ 2 α 1 K k 2 F 2 P f , k F ^ 2 α 1 K k 2 F 2 + 1 + τ 6 1 + τ 9 1 + τ 11 1 + τ 13 α K k 2 δ k δ k T K k 2 T + α + τ 7 1 α + τ 10 1 α + τ 12 1 α + τ 13 1 α K k 2 S 2 β 2 S 2 T K k 2 T + W ˜ 2 Q w W ˜ 2 T + 1 α K k 2 V ˜ 2 R v V ˜ 2 T K k 2 T + 1 + τ 14 1 α 2 K k 2 C ˜ 22 P k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T C ˜ 22 T K k 2 T + 1 + τ 14 α 2 K k 2 F 2 1 + τ 15 P f , k + 1 + τ 15 1 f ^ k f ^ k T F 2 T K k 2 T
If the event condition is satisfied, i.e., y ˜ k 2 y ˜ p , k 2 δ e , we have
P k + 1 2 1 + τ 4 + τ 5 + τ 6 + τ 7 α A ˜ 22 α 1 K k 2 C ˜ 22 P k 2 A ˜ 22 α 1 K k 2 C ˜ 22 T + 1 + τ 4 1 + τ 8 + τ 9 + τ 10 α A ˜ 21 P k 1 A ˜ 21 T + 1 + τ 5 1 + τ 8 1 + τ 11 + τ 12 α F ^ 2 α 1 K k 2 F 2 P f , k F ^ 2 α 1 K k 2 F 2 T + 1 + τ 6 1 + τ 9 1 + τ 11 1 + τ 13 α δ e 2 K k 2 K k 2 T + α + τ 7 1 α + τ 10 1 α + τ 12 1 α + τ 13 1 α K k 2 S 2 β 2 S 2 T K k 2 T + W ˜ 2 Q w W ˜ 2 T + 1 α K k 2 V ˜ 2 R v V ˜ 2 T K k 2 T + 1 + τ 14 1 α 2 K k 2 C ˜ 22 P k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T C ˜ 22 T K k 2 T + 1 + τ 14 α 2 K k 2 F 2 1 + τ 15 P f , k + 1 + τ 15 1 f ^ k f ^ k T F 2 T K k 2 T
Next, let us calculate the error covariance of fault estimation as follows
P f , k + 1 = E e f , k + 1 e f , k + 1 T = E Δ f k + I α 1 K k 3 F 2 e f , k α 1 K k 3 C ˜ 22 e k 2 1 α k K k 3 V ˜ 2 v k α k K k 3 S 2 β k K k 3 δ k + α k α K k 3 C ˜ 22 x ˜ k 2 + α k α K k 3 F 2 f d , k × Δ f k + I α 1 K k 3 F 2 e f , k α 1 K k 3 C ˜ 22 e k 2 1 α k K k 3 V ˜ 2 v k α k K k 3 S 2 β k K k 3 δ k + α k α K k 3 C ˜ 22 x ˜ k 2 + α k α K k 3 F 2 f d , k T = I α 1 K k 3 F 2 P f , k I α 1 K k 3 F 2 T + Δ f k Δ f k T + α 1 2 K k 3 C ˜ 22 P k 2 C ˜ 22 T K k 3 T + 1 α K k 3 V ˜ 2 R v V ˜ 2 T K k 3 T + α K k 3 S 2 β k β k T S 2 T K k 3 T + K k 3 δ k δ k T K k 3 T + α 2 K k 3 C ˜ 22 E x ˜ k 2 x ˜ k 2 T C ˜ 22 T K k 3 T + α 2 K k 3 F 2 E f d , k f d , k T F 2 T K k 3 T + α 2 K k 3 C ˜ 22 E x ˜ k 2 f d , k T F 2 T K k 3 T + α 2 K k 3 F 2 E f d , k x ˜ k 2 T C ˜ 22 T K k 3 T + E Δ f k e f , k T I α 1 K k 3 F 2 T + E I α 1 K k 3 F 2 e f , k Δ f k T α 1 E Δ f k e k 2 T C ˜ 22 T K k 3 T α 1 K k 3 C ˜ 22 E e k 2 Δ f k T α E Δ f k β k T S 2 T K k 3 T α K k 3 S 2 E β k Δ f k T E Δ f k δ k T K k 3 T α 1 I α 1 K k 3 F 2 E e f , k e k 2 T C ˜ 22 T K k 3 T α 1 K k 3 C ˜ 22 E e k 2 e f , k T I α 1 K k 3 F 2 T α I α 1 K k 3 F 2 E e f , k β k T S 2 T K k 3 T α K k 3 S 2 E β k e f , k T I α 1 K k 3 F 2 T I α 1 K k 3 F 2 E e f , k δ k T K k 3 T K k 3 E δ k e f , k T I α 1 K k 3 F 2 T + α 1 α K k 3 C ˜ 22 E e k 2 β k T S 2 T K k 3 T + α 1 α K k 3 S 2 E β k e k 2 T C ˜ 22 T K k 3 T + α 1 K k 3 C ˜ 22 E e k 2 δ k T K k 3 T K k 3 E δ k Δ f k T + α 1 K k 3 E δ k e k 2 T C ˜ 22 T K k 3 T + α K k 3 S 2 E β k δ k T K k 3 T + α K k 3 E δ k β k T S 2 T K k 3 T
Similar to the derivations of (39), (40) and (41), the upper bound of P f , k + 1 can be given by
P f , k + 1 1 + ρ 1 + ρ 2 α 1 + ρ 3 α + ρ 4 I α 1 K k 3 F 2 P f , k I α 1 K k 3 F 2 T + 1 + ρ 1 1 + ρ 5 α 1 + ρ 6 α + ρ 7 b d 2 I + α 1 2 + ρ 2 1 α 1 + ρ 5 1 α 1 + ρ 8 α α 1 + ρ 9 α 1 K k 3 C ˜ 22 P k 2 C ˜ 22 T K k 3 T + α + ρ 3 1 α + ρ 6 1 α + ρ 8 1 α α 1 + ρ 10 α β 2 K k 3 S 2 S 2 T K k 3 T + 1 + ρ 4 1 + ρ 7 1 + ρ 9 1 α 1 + ρ 10 1 α δ e 2 K k 3 K k 3 T + 1 + ρ 11 α 2 K k 3 C ˜ 22 P k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T C ˜ 22 T K k 3 T + 1 + ρ 11 1 α 2 K k 3 F 2 1 + ρ 12 e f , k e f , k T + 1 + ρ 12 1 f ^ k f ^ k T F 2 T K k 3 T + 1 α K k 3 V ˜ 2 R v V ˜ 2 T K k 3 T
where Δ f k Δ f k T b d 2 I . Subsequently, by employing the mathematical induction approach, it is not difficult to verify that
P f , k + 1 P ¯ f , k + 1 and P k + 1 2 P ¯ k + 1 2
which completes the proof of upper bounds of state and fault estimation error covariance matrices. ☐
In what follows, the explicit forms of the fault estimator gains will be given via minimizing the obtained upper bounds P ¯ f , k + 1 and P ¯ k + 1 2 at each time step.
Theorem 4.
For the addressed subsystem (12) suffering from deception attacks, the gains of the proposed fault estimator (29) are given by
K k 2 = α 1 τ ˜ 1 A ˜ 22 P ¯ k 2 C ˜ 22 T + α 1 τ ˜ 2 F ^ 2 P ¯ f , k F 2 T α 1 2 τ ˜ 1 C ˜ 22 P ¯ k 2 C ˜ 22 T + α 1 2 τ ˜ 2 F 2 P ¯ f , k F 2 T + τ ˜ 3 δ e 2 I + τ ˜ 4 S 2 β 2 S 2 T + 1 α V ˜ 2 R v V ˜ 2 T + 1 + τ 14 α 2 M ˜ 1 + 1 + τ 14 1 α 2 M ˜ 2 1
K k 3 = ρ ˜ 1 α 1 P ¯ f , k F 2 T ρ ˜ 1 α 1 2 F 2 P ¯ f , k F 2 T + ρ ˜ 2 C ˜ 22 P ¯ k 2 C ˜ 22 T + ρ ˜ 3 S 2 β 2 S 2 T + ρ ˜ 4 δ e 2 I + 1 + ρ 11 α 2 M ˜ 2 + 1 + ρ 11 1 α 2 M ˜ 3 + 1 α V ˜ 2 R v V ˜ 2 T 1
where τ ˜ 1 = 1 + τ 4 + τ 5 + τ 6 + τ 7 α , τ ˜ 2 = 1 + τ 5 1 + τ 8 1 + τ 11 + τ 12 α , τ ˜ 3 = 1 + τ 6 1 + τ 9 1 + τ 11 1 + τ 13 α , τ ˜ 4 = 1 + τ 13 1 + τ 7 1 + τ 10 1 + τ 12 1 α , M ˜ 1 = F 2 1 + τ 15 P ¯ f , k + 1 + τ 15 1 f ^ k f ^ k T F 2 T , M ˜ 2 = C ˜ 22 P ¯ k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T C ˜ 22 T , ρ ˜ 1 = 1 + ρ 1 + ρ 2 α 1 + ρ 3 α + ρ 4 , ρ ˜ 2 = α 1 2 + ρ 2 1 α 1 + ρ 5 1 α 1 + ρ 8 α α 1 + ρ 9 α 1 , ρ ˜ 3 = α + ρ 3 1 α + ρ 6 1 α + ρ 8 1 α α 1 + ρ 10 α , ρ ˜ 4 = 1 + ρ 4 1 + ρ 7 1 + ρ 9 1 α 1 + ρ 10 1 α and M ˜ 3 = F 2 1 + ρ 12 P ¯ f , k + 1 + ρ 12 1 f ^ k f ^ k T F 2 T .
With the aid of estimator gains (45) and (46), the obtained upper bounds P ¯ k + 1 2 and P ¯ f , k + 1 of the state and fault estimation error-covariance matrices in (38) and (42) can separately be minimized at each time step.
Proof. 
According to Theorem 3, the design of gains K k 2 and K k 3 needs to be minimized by t r P ¯ k + 1 2 and t r P ¯ f , k + 1 , respectively. For this purpose, taking the derivatives of t r P ¯ k + 1 2 and t r P ¯ f , k + 1 with respect to K k 2 and K k 3 , respectively; and then, getting the derivatives be zero, we obtain
t r P ¯ k + 1 2 K k 2 = 2 α 1 τ ˜ 1 A ˜ 22 α 1 K k 2 C ˜ 22 P ¯ k 2 C ˜ 22 T 2 α 1 τ ˜ 2 F ^ 2 α 1 K k 2 F 2 P ¯ f , k F 2 T + 2 τ ˜ 3 δ e 2 K k 2 + 2 τ ˜ 4 K k 2 S 2 β 2 S 2 T + 2 1 α K k 2 V ˜ 2 R v V ˜ 2 T + 2 1 + τ 14 α 2 K k 2 M ˜ 1 + 2 1 + τ 14 1 α 2 K k 2 M ˜ 2 = 0
where τ ˜ 1 = 1 + τ 4 + τ 5 + τ 6 + τ 7 α , τ ˜ 2 = 1 + τ 5 1 + τ 8 1 + τ 11 + τ 12 α , τ ˜ 3 = 1 + τ 6 1 + τ 9 1 + τ 11 1 + τ 13 α , τ ˜ 4 = 1 + τ 13 1 + τ 7 1 + τ 10 1 + τ 12 1 α , M ˜ 1 = F 2 1 + τ 15 P ¯ f , k + 1 + τ 15 1 f ^ k f ^ k T F 2 T and M ˜ 2 = C ˜ 22 P ¯ k 2 + x ˜ ^ k 2 x ˜ ^ k 2 T C ˜ 22 T .
t r P ¯ f , k + 1 K k 3 = 2 ρ ˜ 1 α 1 I α 1 K k 3 F 2 P ¯ f , k F 2 T + 2 ρ ˜ 2 K k 3 C ˜ 22 P ¯ k 2 C ˜ 22 T + 2 ρ ˜ 3 K k 3 S 2 β 2 S 2 T + 2 ρ ˜ 4 δ e 2 K k 3 + 2 1 + ρ 11 α 2 K k 3 M ˜ 2 + 2 1 + ρ 11 1 α 2 K k 3 M ˜ 3 + 2 1 α K k 3 V ˜ 2 R v V ˜ 2 T
where ρ ˜ 1 = 1 + ρ 1 + ρ 2 α 1 + ρ 3 α + ρ 4 , ρ ˜ 2 = α 1 2 + ρ 2 1 α 1 + ρ 5 1 α 1 + ρ 8 α α 1 + ρ 9 α 1 , ρ ˜ 3 = α + ρ 3 1 α + ρ 6 1 α + ρ 8 1 α α 1 + ρ 10 α , ρ ˜ 4 = 1 + ρ 4 1 + ρ 7 1 + ρ 9 1 α 1 + ρ 10 1 α and M ˜ 3 = F 2 1 + ρ 12 P ¯ f , k + 1 + ρ 12 1 f ^ k f ^ k T F 2 T . Then, we have
α 1 2 τ ˜ 1 K k 2 C ˜ 22 P ¯ k 2 C ˜ 22 T + α 1 2 τ ˜ 2 K k 2 F 2 P ¯ f , k F 2 T + τ ˜ 3 δ e 2 K k 2 + τ ˜ 4 K k 2 S 2 β 2 S 2 T + 1 α K k 2 V ˜ 2 R v V ˜ 2 T + 1 + τ 14 α 2 K k 2 M ˜ 1 + 1 + τ 14 1 α 2 K k 2 M ˜ 2 = α 1 τ ˜ 1 A ˜ 22 P ¯ k 2 C ˜ 22 T + α 1 τ ˜ 2 F ^ 2 P ¯ f , k F 2 T
ρ ˜ 1 α 1 2 K k 3 F 2 P ¯ f , k F 2 T + ρ ˜ 2 K k 3 C ˜ 22 P ¯ k 2 C ˜ 22 T + ρ ˜ 3 K k 3 S 2 β 2 S 2 T + ρ ˜ 4 δ e 2 K k 3 + 1 + ρ 11 α 2 K k 3 M ˜ 2 + 1 + ρ 11 1 α 2 K k 3 M ˜ 3 + 1 α K k 3 V ˜ 2 R v V ˜ 2 T = ρ ˜ 1 α 1 P ¯ f , k F 2 T
which can be further calculated as follows
K k 2 = α 1 τ ˜ 1 A ˜ 22 P ¯ k 2 C ˜ 22 T + α 1 τ ˜ 2 F ^ 2 P ¯ f , k F 2 T α 1 2 τ ˜ 1 C ˜ 22 P ¯ k 2 C ˜ 22 T + α 1 2 τ ˜ 2 F 2 P ¯ f , k F 2 T + τ ˜ 3 δ e 2 I + τ ˜ 4 S 2 β 2 S 2 T + 1 α V ˜ 2 R v V ˜ 2 T + 1 + τ 14 α 2 M ˜ 1 + 1 + τ 14 1 α 2 M ˜ 2 1
K k 3 = ρ ˜ 1 α 1 P ¯ f , k F 2 T ρ ˜ 1 α 1 2 F 2 P ¯ f , k F 2 T + ρ ˜ 2 C ˜ 22 P ¯ k 2 C ˜ 22 T + ρ ˜ 3 S 2 β 2 S 2 T + ρ ˜ 4 δ e 2 I + 1 + ρ 11 α 2 M ˜ 2 + 1 + ρ 11 1 α 2 M ˜ 3 + 1 α V ˜ 2 R v V ˜ 2 T 1
Hence, the desired filter gain matrices can be obtained via (51) and (52). In addition, the upper bounds P ¯ k + 1 2 and P ¯ f , k + 1 of the state and fault estimation error-covariance matrices are recursively calculated by Riccati-like difference Equations (35) and (36), respectively. ☐
Based on the results derived, the complete algorithm of the event-triggered remote fault estimation is concluded in Algorithm 2.
Algorithm 2 Recursive algorithm of the event-triggered remote fault estimation.
Set the initial conditions P ¯ 0 1 , P ¯ 0 2 , P ¯ f , 0 , x ˜ ^ 0 1 , x ˜ ^ 0 2 , γ 0 = 1 and k = 0 ;
  1:
while k N 1 do
  2:
    Calculate P ¯ k 1 , P ¯ k 2 and P ¯ f , k sequentially according to (19), (35) and (36);
  3:
    Calculate K k 1 , K k 2 and K k 3 in terms of (24), (45) and (46);  
  4:
    if y ˜ k 2 y ˜ p , k 2 δ e then
  5:
         γ k = 0 , the remote fault estimator cannot receive the current measurement information to achieve energy conversation;
  6:
        State estimation step:
  7:
         x ˜ ^ k + 1 1 = A ˜ 11 x ˜ ^ k 1 + A ˜ 12 x ˜ ^ k 2 + K k 1 y ˜ p , k 1 y ˜ ^ k 1 ;
  8:
         y ˜ ^ k 1 = α 1 C ˜ 11 x ˜ ^ k 1 ;
  9:
         x ˜ ^ k + 1 2 = A ˜ 22 x ˜ ^ k 2 + A ˜ 21 x ˜ ^ k 1 + F ^ 2 f ^ k + K k 2 y ˜ p , k 2 y ˜ ^ k 2 ;
10:
        Fault estimation step:
11:
         f ^ k + 1 = f ^ k + K k 3 y ˜ p , k 2 y ˜ ^ k 2 ;
12:
         y ˜ ^ k 2 = α 1 C ˜ 22 x ˜ ^ k 2 + F 2 f ^ k ;
13:
    else
14:
         γ k = 1 , the current measurement information can be allowed to send out to ensure robust estimation;
15:
        State estimation step:
16:
         x ˜ ^ k + 1 1 = A ˜ 11 x ˜ ^ k 1 + A ˜ 12 x ˜ ^ k 2 + K k 1 y ˜ k 1 y ˜ ^ k 1 ;
17:
         x ˜ ^ k + 1 2 = A ˜ 22 x ˜ ^ k 2 + A ˜ 21 x ˜ ^ k 1 + F ^ 2 f ^ k + K k 2 y ˜ k 2 y ˜ ^ k 2 ;
18:
        Fault estimation step:
19:
         f ^ k + 1 = f ^ k + K k 3 y ˜ k 2 y ˜ ^ k 2 ;
20:
         y ˜ ^ k 2 = α 1 C ˜ 22 x ˜ ^ k 2 + F 2 f ^ k ;
21:
    end if
22:
end while
Remark 7.
The scalars β, δ e and b d , reflected in the state and fault estimation error covariance upper bounds (35) and (36), represent the available items of randomly occurring deception attacks, event condition and fault difference, respectively. it is easily shown that the state and fault estimation error-covariance bounds are dependent on these scalars which means that bigger scalars β, δ e and b d could lead to bigger upper bounds. It can be noted that the derivations of event-triggered state estimator for the 1st subsystem is not included in the proof of Theorems 3 and 4. They are omitted because their derivations are similar to the derivations of fault estimator for the 2nd subsystem, which have little influence on our main results. Furthermore, the performance of the proposed fault estimator coincides with that of the time-driven estimator for δ e = 0 . Hence, the derivation of event-triggered fault estimator is omitted, when γ k = 1 .
Remark 8.
From the event condition in (37), it is clear that the proposed event-triggered sensor data-transmission scheme is based on a send-on-delta regulation [30,31], namely, only when the measurement values change more than a predetermined threshold, the sensors transmit their sampling data to remote data centers for processing. Neither the approximated probability density functions of states conditional on measurements nor the assumption on the distribution of δ k is required in the presented fault estimator. In addition, the implementation of event-triggered scheme cannot bring too much computational burden, which is proved in the next section. The design of fault-detection filter and fault estimator are simple because they are based on reduced-order subsystems. In other words, the applicability and feasibility of the event-triggered fault estimator are enhanced.

5. Experimental Verification

5.1. Experimental Setup

To evaluate the performance of the designed fault-detection strategy and event-triggered fault estimator, a simulation platform, representing a scaled version of an industrial system, is implemented, where the terminal voltages of a three-cell battery string are observed over a wireless channel. As shown in Figure 2, the dynamic system which worked in a local personal computer which collocated with a sensor node communicates wirelessly with a remote estimator. We now describe the details of the components of our system.
Figure 3 shows that hardwares of wireless sensor node that consist of an STM8S micro-controller, USR-C322 transceiver and a rechargeable polymer lithium-ion battery. The reason why we choose the wireless transceiver is that it can use a low power consumption pattern. Indeed, most wireless modules belong to the characteristic of high performance in the mainstream market. Despite the fact that event-triggered transmission mechanism can make the wireless modules sleep, it still consumes the energy similarly as it works. Luckily, this problem has been successfully solved through choosing USR-C322. Then, it makes the module enter a “status of deep sleep” and stop working completely. Moreover, STM8S microcontroller has embedded 32 Kbyte Flash, 2 Kbyte RAM, 16-bit advanced control timer and abundant communication interfaces that allow us to use them as a sensor node. The selection of STM8S microcontroller implies that the implementation of event-triggered scheme cannot bring too much computational burden. More information about the hardwares of the node can be found in [32,33].
Now, the proposed theoretical results is applied to a linear continuous-time system of the three-cell battery string presented in [11]. After discretisation with sampling period T = 1 s , the discrete-time system can be described as the system (1) with following parameters
A = 0.6026 0 0 0 0.6026 0 0 0 0.6026 , C = 1 0 0 0 1 0 0 0 1 , B = 0.1795 5.2484 0.0225 0.1795 5.2484 0.0225 0.1795 5.2484 0.0225
W = 3 1 1 , V = 0 1 1 , D = 2 1 1 , F ¯ = F ˜ = 3 2 1
where x k = V k 1 V k 2 V k 3 and V k i are the terminal voltage of each cell of the ith cell. Control input of this batter system u k = Z 1 C u in which Z is state of charge and the current C u = 3 A . Considering the main technical specifications of voltage sensors, the following parameters are chosen as Q w = 0.2915 and R v = 0.3606 . For k = 0 , 1 , N 1 and N = 100 , the unknown disturbances d k are supposed to be a random noise uniformly distributed in 0.32 , 0.32 .
In order to transform the original system, the following transform matrices S and T are used as
S = T = 1 0 2 0 1 2 0 0 1
Then, we have
T A T 1 = 0.6026 0 0 0 0.6026 0 0 0 0.6026 , T B = 0.1795 5.2484 0.0225 0.1795 5.2484 0.0225 0.1795 5.2484 0.0225
T W = 1 3 1 , T D = 0 1 1 , T F ˜ = S F ¯ = 1 0 1 , S C T 1 = 1 0 0 0 1 0 0 0 1 , S V = 2 1 1
The probability of deception attacks, the upper bound of fault difference item and the event-triggered transmission threshold are selected respectively as: α = 2 % , b d = 0.45 and δ e = 0.017 . Furthermore, τ j j = 1 , , 15 are chosen as 1, β and ρ j j = 1 , , 12 are determined as 0.15.

5.2. Experimental Results

The experiment consisting of four parts are designed to verify the effectiveness of the obtained theoretical results: (A) the performance on the remote state estimation without faults and fault-detection strategy; (B) the accuracy on the remote fault estimation and comparsion between a learning observer [11,34] and our proposed algorithm; (C) the analysis on the energy-saving trend of a 50 mAh polymer lithium-ion battery and (D) the effect on remote event-triggered fault estimator with the increased probabilities of deception attacks.
Experiment 1.
In the first experiment, the information sent by attacker is β k = 0.1 e 0.5 k 0.13 sin k 0 T , which is also applied to the subsequent experiments. The performance on remote state estimation with fault-free condition and fault-alarming strategy are verified in Figure 4, Figure 5, Figure 6 and Figure 7. As shown in Figure 4, Figure 5 and Figure 6, the estimated voltages by an event-triggered state estimator (ETSE) approximately closes to the measured trajectories and the estimated voltages by a time-driven state estimator (TDSE), leading to a accurate state estimation result. Next, assume that a unknown fault is created as follows:
f k = 0 k < 19 0.1 k o t h e r w i s e
In Figure 7, the red line at 0.5 V is the threshold δ f that we selected for fault alarming. When a fault occurs at 20 s, fault-detection residual r k is quickly diverging. Comparatively, the residual r k with no fault still remains a convergence status. It is clear that fault can be detected immediately via the proposed fault-alarming strategy.
Experiment 2.
Here, the effectiveness of event-triggered fault estimator (11) is evaluated in the presence of randomly occurring deception attacks. Let us consider a constant fault and a time-varying fault are respectively supposed as
f k = 5 k < 50 5 o t h e r w i s e and f k = 0.7 sin 0.5 k k < 50 sin 0.5 k 0.5 o t h e r w i s e
The estimation trajectories of constant and time-varying faults using the presented event-triggered fault estimator (ETFE) and time-driven fault estimator (TDFE) are depicted in Figure 8 and Figure 9. It is observed that the proposed estimation algorithm has the ability to robustly construct constant and time-varying faults. Further, to compare the fault estimation performance clearly, the square error f d , k f ^ k T × f d , k f ^ k on actual time-varying fault described in (59), the estimated fault computed by a periodic learning observer (LO) and our fault estimation algorithm over 1000 Monte Carlo runs are demonstrated in Figure 10. The corresponding communication behaviors of event-triggered sensor transmission scheme are also presented in Figure 10. It is indicated that the square error using the proposed estimation algorithm is slightly larger than the learning observer. From these figures, it can be concluded that the estimation performance is not decreased obviously although the obtained event-triggered strategy reduces the transmission times relatively.
Experiment 3.
In order to investigate the proposed event-triggered transmission scheme which influences the battery life, we use a 50 mAh Polymer Lithium-Ion battery to complete our third experiment. As shown in Figure 11, the batteries have been fully charged when we get ready to run the procedure, while the wireless sensor nodes have not worked in Figure 12 since the batteries were run out. The relationship between time and 50 mAh battery voltages is given in Figure 13, which is shown to compare with periodic data transmission mechanism, the proposed event-triggered sensor data transmission scheme can prolong about 11.8% battery life.
Experiment 4.
In the final experiment, the effect on remote fault estimator accuracy is examined in the presence of the increased probabilities of deception attacks. Similar to the second experiment, the square estimation error f d , k f ^ k T × f d , k f ^ k on actual time-varying fault borrowed from (59), the estimated fault calculated by the proposed fault estimation algorithm are given in Figure 14. It can be found that a bigger attack probability results in a bigger error bound, which implies that estimation performance degrades slightly as the attack probability increases.

6. Conclusions and Future Work

This paper presented a synthesized design of two types of estimators to simultaneously event-triggered fault detection and fault estimation for a class of discrete-time stochastic systems subject to subject to unknown disturbances and randomly occurring deception attacks. The unknown disturbances were removed from the 1st subsystem using a coordinate transformation approach so as to ensure the sensitivity of fault detection. An upper bound of fault-detection filtering error covariance matrix was recursively calculated by a Riccati-type difference equation. The explicit form of the fault-detection filtering gain was obtained to minimize such upper bound through a recursive algorithm. In order to achieve real-time capacity of fault-detection, a novel fault-alarming framework was considered which could effectively solve a time-delay issue of fault alarming when an event condition was triggered. Similar to the design of fault-detection filter, fault estimator was designed so as to derive the upper bounds of state and fault estimation error covariance matrices and minimize them at each time step. At the end of paper, a simulation platform, where the terminal voltages of a three-cell battery string was estimated over a wireless channel, was verified to the feasibility and effectiveness of the proposed theoretical results. In the future, the proposed results will be extended to some more practical cases including more general time-varying nonlinear systems and multi-sensor scheduling problems.

Acknowledgments

This work is supported by National 973 Program (No. 613237); Henan Province Outstanding Youth on Science and Technology Innovation (No. 164100510017), respectively.

Author Contributions

In this work, Yunji Li conceived and designed, performed, and analyzed the experiments and wrote the paper under the guidance of QingE Wu. Li Peng provided some suggestions on the background, introduction, and conclusion.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Pandey, A.; Tripathi, R.C. A Survey on Wireless Sensor Networks Security. Int. J. Comput. Appl. 2010, 3, 43–49. [Google Scholar] [CrossRef]
  2. Tubaishat, M.; Madria, S. Sensor networks: An overview. IEEE Potentials 2003, 22, 20–23. [Google Scholar] [CrossRef]
  3. Rawat, P.; Singh, K.D.; Chaouchi, H.; Bonnin, J.M. Wireless sensor networks: A survey on recent developments and potential synergies. J. Supercomput. 2014, 68, 1–48. [Google Scholar] [CrossRef]
  4. Wang, D.; Wang, Z.; Shen, B.; Alsaadi, F.E. Security-guaranteed filtering for discrete-time stochastic delayed systems with randomly occurring sensor saturations and deception attacks. Int. J. Robust Nonlinear Control 2017, 27, 1194–1208. [Google Scholar] [CrossRef]
  5. Ma, L.; Wang, Z.; Han, Q.L.; Lam, H.K. Variance-Constrained Distributed Filtering for Time-Varying Systems with Multiplicative Noises and Deception Attacks over Sensor Networks. IEEE Sens. J. 2017, 17, 2279–2288. [Google Scholar] [CrossRef]
  6. Ding, D.; Wang, Z.; Ho, D.W.C.; Wei, G. Observer-Based Event-Triggering Consensus Control for Multiagent Systems with Lossy Sensors and Cyber-Attacks. IEEE Trans. Cybern. 2017, 47, 1936–1947. [Google Scholar] [CrossRef]
  7. Jia, Q.; Chen, W.; Zhang, Y.; Li, H. Fault reconstruction and fault-tolerant control via learning observers in Takagi-Sugeno fuzzy descriptor systems with time delays. IEEE Trans. Ind. Electron. 2015, 62, 3885–3895. [Google Scholar] [CrossRef]
  8. Zhang, Y.; Chen, W.; Chen, X.; Jia, Q. Robust fault reconstruction via learning observers in linear parameter-varying systems subject to loss of actuator effectiveness. IET Control Theory Appl. 2014, 8, 42–50. [Google Scholar] [CrossRef]
  9. Chen, W.; Saif, M. An iterative learning observer for fault detection and accommodation in nonlinear time-delay systems. Int. J. Robust Nonlinear Control 2006, 16, 1–19. [Google Scholar] [CrossRef]
  10. Alavi, S.M.M.; Saif, M. Fault detection in nonlinear stable systems over lossy networks. IEEE Trans. Control Syst. Technol. 2013, 21, 2129–2142. [Google Scholar] [CrossRef]
  11. Chen, W.; Chen, W.T.; Saif, M.; Li, M.F.; Wu, H. Simultaneous Fault Isolation and Estimation of Lithium-Ion Batteries via Synthesized Design of Luenberger and Learning Observers. IEEE Trans. Control Syst. Technol. 2014, 22, 290–298. [Google Scholar] [CrossRef]
  12. Li, F.; Shi, P.; Lim, C.C.; Wu, L. Fault detection filtering for nonhomogeneous markovian jump systems via fuzzy approach. IEEE Trans. Fuzzy Syst. 2017. [Google Scholar] [CrossRef]
  13. Chadli, M.; Abdo, A.; Ding, S.X. H-/H fault detection filter design for discrete-time Takagi-Sugeno fuzzy system. Automatica 2013, 49, 1996–2005. [Google Scholar] [CrossRef]
  14. Chibani, A.; Chadli, M.; Peng, S.; Braiek, N.B. Fuzzy fault detection filter design for t-s fuzzy systems in finite frequency domain. IEEE Trans. Fuzzy Syst. 2017. [Google Scholar] [CrossRef]
  15. Youssef, T.; Chadli, M.; Karimi, H.R.; Wang, R. Actuator and sensor faults estimation based on proportional integral observer for TS fuzzy model. J. Franklin Inst. 2017, 354, 2524–2542. [Google Scholar] [CrossRef]
  16. Shi, P.; Zhang, Y.; Chadli, M.; Agarwal, R.K. Mixed H-Infinity and Passive Filtering for Discrete Fuzzy Neural Networks With Stochastic Jumps and Time Delays. IEEE Trans. Neural Networks Learn. Syst. 2016, 27, 903–909. [Google Scholar] [CrossRef]
  17. Chibani, A.; Chadli, M.; Braiek, N.B. A sum of squares approach for polynomial fuzzy observer design for polynomial fuzzy systems with unknown inputs. Int. J. Control Autom. Syst. 2016, 14, 323–330. [Google Scholar] [CrossRef]
  18. Meng, X.; Chen, T. Optimal sampling and performance comparison of periodic and event based impulse control. IEEE Trans. Autom. Control 2012, 57, 3252–3259. [Google Scholar] [CrossRef]
  19. Guinaldo, M.; Fábregas, E.; Farias, G.; Dormido-Canto, S.; Chaos, D.; Sánchez, J.; Dormido, S. A mobile robots experimental environment with event-based wireless communication. Sensors 2013, 13, 9396–9413. [Google Scholar] [CrossRef]
  20. Chen, T.; Meng, X. Event triggered robust filter design for discrete-time systems. IET Control Theory Appl. 2014, 8, 104–113. [Google Scholar] [CrossRef]
  21. Liu, J.; Yue, D. Event-based fault detection for networked systems with communication delay and nonlinear perturbation. J. Franklin Inst. 2013, 350, 2791–2807. [Google Scholar] [CrossRef]
  22. Hajshirmohamadi, S.; Davoodi, M.; Meskin, N.; Sheikholeslam, F. Event-triggered fault detection and isolation for discrete-time linear systems. IET Control Theory Appl. 2016, 10, 526–533. [Google Scholar] [CrossRef]
  23. Li, H.; Chen, Z.; Wu, L.; Lam, H.-K.; Du, H. Event-Triggered Fault Detection of Nonlinear Networked Systems. IEEE Trans. Cybern. 2017, 47, 1041–1052. [Google Scholar] [CrossRef]
  24. Corless, M.; Tu, J. State and input estimation for a class of uncertain systems. Automatica 1998, 34, 757–764. [Google Scholar] [CrossRef]
  25. Chen, W.; Chowdhury, F.N. A synthesized design of sliding-mode and Luenberger observers for early detection of incipient faults. Int. J. Adapt. Control Signal Process. 2010, 24, 1021–1035. [Google Scholar] [CrossRef]
  26. Mao, J.; Ding, D.; Song, Y.; Liu, Y.; Alsaadi, F.E. Event-based recursive filtering for time-delayed stochastic nonlinear systems with missing measurements. Signal Process. 2017, 134, 158–165. [Google Scholar] [CrossRef]
  27. Simon, D. Optimal State Estimation: Kalman, H, and Nonlinear Approaches; John Wiley & Sons, Inc.: Hoboken, NJ, USA, 2006; ISBN 0471708585. [Google Scholar]
  28. Chang, J.L. Applying discrete-time proportional integral observers for state and disturbance estimations. IEEE Trans. Autom. Control 2005, 51, 814–818. [Google Scholar] [CrossRef]
  29. Hu, J.; Liu, S.; Ji, D.; Li, S. On co-design of filter and fault estimator against randomly occurring nonlinearities and randomly occurring deception attacks. Int. J. Gen. Syst. 2016, 45, 619–632. [Google Scholar] [CrossRef]
  30. Heemels, W.P.M.H.; Johansson, K.H.; Tabuada, P. An introduction to event-triggered and self-triggered control. In Proceedings of the IEEE Conference on Decision and Control, Maui, HI, USA, 10–13 December 2012; pp. 3270–3285. [Google Scholar]
  31. Miskowicz, M. Send-On-Delta Concept: An Event-Based Data Reporting Strategy. Sensors 2006, 6, 49–63. [Google Scholar] [CrossRef]
  32. USR-C322 Instructions, USR IOT Experts. Available online: http://www.usriot.com/p/ti-wifi-module/ (accessed on 30 November 2017).
  33. STM8S105 Instructions, STMicroelectronics. Available online: http://www2.st.com/content/st_com/en/products/ (accessed on 30 November 2017).
  34. Chen, W.; Chowdhury, F.N. Simultaneous identification of time-varying parameters and estimation of system states using iterative learning observers. Int. J. Syst. Sci. 2007, 38, 39–45. [Google Scholar] [CrossRef]
Figure 1. A block diagram of event-triggered fault-alarming strategy.
Figure 1. A block diagram of event-triggered fault-alarming strategy.
Sensors 18 00321 g001
Figure 2. The components of our system.
Figure 2. The components of our system.
Sensors 18 00321 g002
Figure 3. The components of our wireless sensor node.
Figure 3. The components of our wireless sensor node.
Sensors 18 00321 g003
Figure 4. Estimated and measured voltages for the 1st battery cell.
Figure 4. Estimated and measured voltages for the 1st battery cell.
Sensors 18 00321 g004
Figure 5. Estimated and measured voltages for the 2nd battery cell.
Figure 5. Estimated and measured voltages for the 2nd battery cell.
Sensors 18 00321 g005
Figure 6. Estimated and measured voltages for the 3rd battery cell.
Figure 6. Estimated and measured voltages for the 3rd battery cell.
Sensors 18 00321 g006
Figure 7. Fault-detection residual of the 1st subsystem.
Figure 7. Fault-detection residual of the 1st subsystem.
Sensors 18 00321 g007
Figure 8. Fault estimation of the constant fault.
Figure 8. Fault estimation of the constant fault.
Sensors 18 00321 g008
Figure 9. Fault estimation of the time-varying fault.
Figure 9. Fault estimation of the time-varying fault.
Sensors 18 00321 g009
Figure 10. The evolution of square error and the corresponding event-triggered communication behaviors.
Figure 10. The evolution of square error and the corresponding event-triggered communication behaviors.
Sensors 18 00321 g010
Figure 11. The initial voltages of Polymer Lithium-Ion batteries.
Figure 11. The initial voltages of Polymer Lithium-Ion batteries.
Sensors 18 00321 g011
Figure 12. The final voltages of Polymer Lithium-Ion batteries.
Figure 12. The final voltages of Polymer Lithium-Ion batteries.
Sensors 18 00321 g012
Figure 13. The relationship between time and voltages.
Figure 13. The relationship between time and voltages.
Sensors 18 00321 g013
Figure 14. The evolution of square estimation error with the increased probabilities of deception attacks.
Figure 14. The evolution of square estimation error with the increased probabilities of deception attacks.
Sensors 18 00321 g014

Share and Cite

MDPI and ACS Style

Li, Y.; Wu, Q.; Peng, L. Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks. Sensors 2018, 18, 321. https://doi.org/10.3390/s18020321

AMA Style

Li Y, Wu Q, Peng L. Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks. Sensors. 2018; 18(2):321. https://doi.org/10.3390/s18020321

Chicago/Turabian Style

Li, Yunji, QingE Wu, and Li Peng. 2018. "Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks" Sensors 18, no. 2: 321. https://doi.org/10.3390/s18020321

APA Style

Li, Y., Wu, Q., & Peng, L. (2018). Simultaneous Event-Triggered Fault Detection and Estimation for Stochastic Systems Subject to Deception Attacks. Sensors, 18(2), 321. https://doi.org/10.3390/s18020321

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop