{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T03:07:16Z","timestamp":1761102436596,"version":"build-2065373602"},"reference-count":55,"publisher":"MDPI AG","issue":"23","license":[{"start":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T00:00:00Z","timestamp":1606694400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["No. 61603175 and No. 61963028"],"award-info":[{"award-number":["No. 61603175 and No. 61963028"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sensors"],"abstract":"<jats:p>This paper studies the problem of DoS attack defense based on static observer-based event-triggered predictive control in networked control systems (NCSs). First, under the conditions of limited network bandwidth resources and the incomplete observability of the state of the system, we introduce the event-triggered function to provide a discrete event-triggered transmission scheme for the observer. Then, we analyze denial-of-service (DoS) attacks that occur on the network transmission channel. Using the above-mentioned event-triggered scheme, a novel class of predictive control algorithms is designed on the control node to proactively save network bandwidth and compensate for DoS attacks, which ensures the stability of NCSs. Meanwhile, a closed-loop system with an observer-based event-triggered predictive control scheme for analysis is created. Through linear matrix inequality (LMI) and the Lyapunov function method, the design of the controller, observer and event-triggered matrices is established, and the stability of the scheme is analyzed. The results show that the proposed solution can effectively compensate DoS attacks and save network bandwidth resources by combining event-triggered mechanisms. Finally, a smart grid simulation example is employed to verify the feasibility and effectiveness of the scheme\u2019s defense against DoS attacks.<\/jats:p>","DOI":"10.3390\/s20236866","type":"journal-article","created":{"date-parts":[[2020,11,30]],"date-time":"2020-11-30T20:10:22Z","timestamp":1606767022000},"page":"6866","update-policy":"https:\/\/doi.org\/10.3390\/mdpi_crossmark_policy","source":"Crossref","is-referenced-by-count":13,"title":["Observer-Based Event-Triggered Predictive Control for Networked Control Systems under DoS Attacks"],"prefix":"10.3390","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5222-037X","authenticated-orcid":false,"given":"Weifan","family":"Lu","sequence":"first","affiliation":[{"name":"The Department of Mathematics, School of Science, Nanchang University, Nanchang 330031, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2165-601X","authenticated-orcid":false,"given":"Xiuxia","family":"Yin","sequence":"additional","affiliation":[{"name":"The Department of Mathematics, School of Science, Nanchang University, Nanchang 330031, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8543-3355","authenticated-orcid":false,"given":"Yichuan","family":"Fu","sequence":"additional","affiliation":[{"name":"The Faculty of Engineering and Environment, University of Northumbria at Newcastle, Newcastle upon Tyne NE1 8ST, UK"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5464-3288","authenticated-orcid":false,"given":"Zhiwei","family":"Gao","sequence":"additional","affiliation":[{"name":"The Faculty of Engineering and Environment, University of Northumbria at Newcastle, Newcastle upon Tyne NE1 8ST, UK"}]}],"member":"1968","published-online":{"date-parts":[[2020,11,30]]},"reference":[{"key":"ref_1","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MVT.2013.2269187","article-title":"5G on the horizon: Key challenges for the radio-access network","volume":"8","author":"Demestichas","year":"2013","journal-title":"IEEE Veh. Technol. Mag"},{"key":"ref_2","doi-asserted-by":"crossref","first-page":"94","DOI":"10.1109\/MCOM.2017.1600951","article-title":"Network slicing in 5G: Survey and challenges","volume":"55","author":"Foukas","year":"2017","journal-title":"IEEE Commun. Mag"},{"key":"ref_3","doi-asserted-by":"crossref","unstructured":"Park, B., Nah, J., Choi, J.Y., Yoon, I.J., and Park, P. (2019). Robust wireless sensor and actuator networks for networked control systems. Sensors, 19.","DOI":"10.3390\/s19071535"},{"key":"ref_4","doi-asserted-by":"crossref","unstructured":"Galeano-Brajones, J., Carmona-Murillo, J., Valenzuela-Vald\u00e9s, J.F., and Luna-Valero, F. (2020). Detection and mitigation of dos and ddos attacks in iot-based stateful sdn: An experimental approach. Sensors, 20.","DOI":"10.3390\/s20030816"},{"key":"ref_5","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1109\/TSG.2014.2314494","article-title":"Stability analysis of networked control in smart grids","volume":"6","author":"Singh","year":"2014","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_6","doi-asserted-by":"crossref","first-page":"106","DOI":"10.1109\/TSG.2015.2474815","article-title":"Contribution of distribution network control to voltage stability: A case study","volume":"8","author":"Aristidou","year":"2015","journal-title":"IEEE Trans. Smart Grid"},{"key":"ref_7","doi-asserted-by":"crossref","first-page":"1156","DOI":"10.1002\/rnc.4815","article-title":"Security distributed state estimation for nonlinear networked systems against dos attacks","volume":"30","author":"Liu","year":"2020","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"ref_8","doi-asserted-by":"crossref","unstructured":"Yousef, K.M.A., Almajali, A., Ghalyon, S.A., Dweik, W., and Mohd, B.J. (2018). Analyzing cyber-physical threats on robotic platforms. Sensors, 18.","DOI":"10.3390\/s18051643"},{"key":"ref_9","doi-asserted-by":"crossref","first-page":"403","DOI":"10.1049\/ip-cta:20050178","article-title":"Networked control system: A brief survey","volume":"153","author":"Yang","year":"2006","journal-title":"IEEE Proc. Control Theory Appl."},{"key":"ref_10","doi-asserted-by":"crossref","first-page":"2527","DOI":"10.1109\/TIE.2009.2035462","article-title":"Networked control system: Overview and research trends","volume":"57","author":"Gupta","year":"2009","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_11","doi-asserted-by":"crossref","first-page":"4265","DOI":"10.3390\/s8074265","article-title":"Cross-layer adaptive feedback scheduling of wireless control systems","volume":"8","author":"Xia","year":"2008","journal-title":"Sensors"},{"key":"ref_12","doi-asserted-by":"crossref","first-page":"1837","DOI":"10.1016\/S0005-1098(03)00186-9","article-title":"On the model-based control of networked systems","volume":"39","author":"Montestruque","year":"2003","journal-title":"Automatica"},{"key":"ref_13","doi-asserted-by":"crossref","first-page":"1554","DOI":"10.1109\/TSMC.2018.2884952","article-title":"A survey on security communication and control for smart grids under malicious cyber attacks","volume":"49","author":"Peng","year":"2019","journal-title":"IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_14","doi-asserted-by":"crossref","first-page":"1481","DOI":"10.1137\/12087623X","article-title":"Stochastic hybrid systems with renewal transitions: Moment analysis with application to networked control systems with delays","volume":"51","author":"Antunes","year":"2013","journal-title":"SIAM J. Control Optim."},{"key":"ref_15","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/JAS.2019.1911651","article-title":"Networked control systems: A survey of trends and techniques","volume":"7","author":"Zhang","year":"2020","journal-title":"IEEE\/CAA J. Autom. Sin.."},{"key":"ref_16","doi-asserted-by":"crossref","first-page":"366","DOI":"10.1109\/TAC.2016.2555484","article-title":"Periodic event-triggered synchronization of linear multi-agent systems with communication delays","volume":"62","author":"Garcia","year":"2017","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_17","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1016\/j.ins.2015.07.047","article-title":"Distributed networked control systems: A brief overview","volume":"380","author":"Ge","year":"2017","journal-title":"Inf. Sci."},{"key":"ref_18","doi-asserted-by":"crossref","first-page":"1110","DOI":"10.1109\/TCYB.2017.2771560","article-title":"An overview of recent advances in event-triggered consensus of multiagent systems","volume":"48","author":"Ding","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref_19","doi-asserted-by":"crossref","first-page":"3084","DOI":"10.1137\/16M1069390","article-title":"On triggering control of single-input linear systems under pulse-width modulated dos signals","volume":"54","author":"Shisheh","year":"2016","journal-title":"SIAM J. Control Optim."},{"key":"ref_20","doi-asserted-by":"crossref","first-page":"2930","DOI":"10.1109\/TAC.2015.2416924","article-title":"Input-to-state stabilizing control under denial-of-service","volume":"60","author":"De","year":"2015","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_21","doi-asserted-by":"crossref","first-page":"42","DOI":"10.1016\/j.automatica.2017.01.031","article-title":"Resilient control under denial-of-service: Robust design","volume":"79","author":"Feng","year":"2017","journal-title":"Automatica"},{"key":"ref_22","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1016\/j.sysconle.2016.07.007","article-title":"Networked control of nonlinear systems under denial-of-service","volume":"96","author":"De","year":"2016","journal-title":"Syst. Control Lett."},{"key":"ref_23","doi-asserted-by":"crossref","unstructured":"Feng, S., Tesi, P., and De Persis, C. (2017, January 12\u201315). Towards stabilization of distributed systems under denial-of-service. Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control (CDC), Melbourne, VIC, Australia.","DOI":"10.1109\/CDC.2017.8264453"},{"key":"ref_24","doi-asserted-by":"crossref","first-page":"2434","DOI":"10.1109\/TAC.2016.2612818","article-title":"Networked control under random and malicious packet losses","volume":"62","author":"Cetinkaya","year":"2017","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_25","doi-asserted-by":"crossref","first-page":"2352","DOI":"10.1049\/iet-cta.2016.0601","article-title":"Optimal joint control and triggering strategies against denial of service attacks: A zero-sum game","volume":"11","author":"Zhao","year":"2017","journal-title":"IET Control Theory Appl."},{"key":"ref_26","doi-asserted-by":"crossref","first-page":"3616","DOI":"10.1109\/TCYB.2019.2956137","article-title":"Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks","volume":"50","author":"Zhang","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"ref_27","doi-asserted-by":"crossref","first-page":"1952","DOI":"10.1109\/TCYB.2019.2903817","article-title":"Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks","volume":"50","author":"Hu","year":"2020","journal-title":"IEEE Trans. Cybern."},{"key":"ref_28","doi-asserted-by":"crossref","first-page":"1807","DOI":"10.1109\/TCYB.2016.2570860","article-title":"Consensus of multiagent systems subject to partially accessible and overlapping markovian network topologies","volume":"47","author":"Ge","year":"2017","journal-title":"IEEE Trans. Cybern."},{"key":"ref_29","doi-asserted-by":"crossref","first-page":"586","DOI":"10.1109\/TAC.2010.2057951","article-title":"Event-triggering in distributed networked control systems","volume":"56","author":"Wang","year":"2010","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_30","doi-asserted-by":"crossref","first-page":"4391","DOI":"10.1109\/TAC.2018.2817160","article-title":"Event-triggered leader-following consensus for nonlinear multiagent systems subject to actuator saturation using dynamic output feedback method","volume":"63","author":"You","year":"2018","journal-title":"IEEE Trans. Autom. Control"},{"key":"ref_31","doi-asserted-by":"crossref","first-page":"2002","DOI":"10.1109\/TCYB.2018.2813423","article-title":"Self-triggered leader-following consensus for high-order nonlinear multiagent systems via dynamic output feedback control","volume":"49","author":"You","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref_32","doi-asserted-by":"crossref","first-page":"905","DOI":"10.1109\/TIE.2010.2051932","article-title":"Control over imperfect networks: Model-based predictive networked control systems","volume":"58","author":"Onat","year":"2011","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_33","doi-asserted-by":"crossref","first-page":"610","DOI":"10.1080\/00207179.2012.751628","article-title":"Networked min\u2013max model predictive control of constrained nonlinear systems with delays and packet dropouts","volume":"86","author":"Li","year":"2013","journal-title":"Int. J. Control"},{"key":"ref_34","doi-asserted-by":"crossref","first-page":"1400","DOI":"10.1109\/TCYB.2015.2448031","article-title":"Design and performance analysis of incremental networked predictive control systems","volume":"46","author":"Pang","year":"2015","journal-title":"IEEE Trans. Cybern."},{"key":"ref_35","unstructured":"Hu, S., Cheng, Z., Yue, D., Dou, C., and Xue, Y. (2019). Bandwidth allocation-based switched dynamic triggering control against dos attacks. IEEE Trans. Syst. Man Cybern. Syst."},{"key":"ref_36","doi-asserted-by":"crossref","first-page":"3572","DOI":"10.1002\/rnc.3281","article-title":"Model-based event-triggered predictive control for networked systems with communication delays compensation","volume":"25","author":"Yin","year":"2015","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"ref_37","doi-asserted-by":"crossref","unstructured":"Amullen, E.M., Shetty, S., and Keel, L.H. (August, January 31). Model-based resilient control for a multi-agent system against denial of service attacks. Proceedings of the 2016 World Automation Congress (WAC), Rio Grande, Puerto Rico.","DOI":"10.1109\/WAC.2016.7582963"},{"key":"ref_38","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1080\/00207721.2019.1691751","article-title":"Model-based event-triggered dynamic output predictive control of networked uncertain systems with random delay","volume":"51","author":"Zhang","year":"2020","journal-title":"Int. J. Syst. Sci."},{"key":"ref_39","doi-asserted-by":"crossref","first-page":"1033","DOI":"10.1109\/TNNLS.2017.2650238","article-title":"Model-based adaptive event-triggered control of strict-feedback nonlinear systems","volume":"29","author":"Li","year":"2017","journal-title":"IEEE Trans. Neural Netw. Learn. Syst."},{"key":"ref_40","doi-asserted-by":"crossref","first-page":"4797","DOI":"10.1002\/rnc.4654","article-title":"Robust event-triggered model predictive control for cyber-physical systems under denial-of-service attacks","volume":"29","author":"Sun","year":"2019","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"ref_41","doi-asserted-by":"crossref","unstructured":"Yin, X.X., Yue, D., and Hu, S. (November, January 29). Observer-based control for networked systems with event-triggering predictive scheme. Proceedings of the IECON 2014-40th Annual Conference of the IEEE Industrial Electronics Society, Dallas, TX, USA.","DOI":"10.1109\/IECON.2014.7049223"},{"key":"ref_42","doi-asserted-by":"crossref","unstructured":"Peng, C., and Sun, H. (2020). Switching-like event-triggered control for networked control systems under malicious denial of service attacks. IEEE Trans. Autom. Control.","DOI":"10.14736\/kyb-2020-2-0340"},{"key":"ref_43","doi-asserted-by":"crossref","first-page":"1495","DOI":"10.1109\/TCST.2012.2208967","article-title":"Design and stability analysis of networked predictive control systems","volume":"21","author":"Zhang","year":"2012","journal-title":"IEEE Trans. Control Syst. Technol."},{"key":"ref_44","doi-asserted-by":"crossref","first-page":"4817","DOI":"10.1109\/TCSI.2019.2930572","article-title":"Event-based security control for state-dependent uncertain systems under hybrid-attacks and its application to electronic circuits","volume":"66","author":"Liu","year":"2019","journal-title":"IEEE Trans. Circuits Syst. I Regul. Pap."},{"key":"ref_45","doi-asserted-by":"crossref","first-page":"642","DOI":"10.3390\/s8042642","article-title":"High sensitivity mems strain sensor: Design and simulation","volume":"8","author":"Mohammed","year":"2008","journal-title":"Sensors"},{"key":"ref_46","doi-asserted-by":"crossref","first-page":"1484","DOI":"10.1002\/rnc.4447","article-title":"Probabilistic-constrained filtering for a class of nonlinear systems with improved static event-triggered communication","volume":"29","author":"Tian","year":"2019","journal-title":"Int. J. Robust Nonlinear Control"},{"key":"ref_47","doi-asserted-by":"crossref","unstructured":"Cao, R., Wu, J., Long, C., and Li, S. (2015, January 15\u201318). Stability analysis for networked control systems under denial-of-service attacks. Proceedings of the 2015 54th IEEE Conference on Decision and Control (CDC), Osaka, Japan.","DOI":"10.1109\/CDC.2015.7403400"},{"key":"ref_48","doi-asserted-by":"crossref","first-page":"277","DOI":"10.1016\/j.jfranklin.2018.04.001","article-title":"Security-based resilient event-triggered control of networked control systems under denial of service attacks","volume":"356","author":"Sun","year":"2019","journal-title":"J. Frankl. Inst."},{"key":"ref_49","doi-asserted-by":"crossref","first-page":"4271","DOI":"10.1109\/TCYB.2018.2861834","article-title":"Resilient event-triggered controller synthesis of networked control systems under periodic dos jamming attacks","volume":"49","author":"Hu","year":"2018","journal-title":"IEEE Trans. Cybern."},{"key":"ref_50","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1016\/j.isatra.2019.05.008","article-title":"Observer-based output feedback h\u221e control for cyber\u2013physical systems under randomly occurring packet dropout and periodic dos attacks","volume":"95","author":"Su","year":"2019","journal-title":"ISA Trans."},{"key":"ref_51","doi-asserted-by":"crossref","first-page":"975","DOI":"10.1109\/59.119237","article-title":"Radial distribution test feeders","volume":"6","author":"Kersting","year":"1991","journal-title":"IEEE Trans. Power Syst."},{"key":"ref_52","doi-asserted-by":"crossref","first-page":"4920","DOI":"10.1109\/TII.2019.2963294","article-title":"Resilient model predictive control of cyber\u2013physical systems under dos attacks","volume":"16","author":"Sun","year":"2020","journal-title":"IEEE Trans. Ind. Inform."},{"key":"ref_53","doi-asserted-by":"crossref","first-page":"1282","DOI":"10.1109\/TIE.2007.893073","article-title":"Networked predictive control of systems with random network delays in both forward and feedback channels","volume":"54","author":"Liu","year":"2007","journal-title":"IEEE Trans. Ind. Electron."},{"key":"ref_54","first-page":"481","article-title":"Predictive controller design of networked systems with communication delays and data loss","volume":"57","author":"Liu","year":"2010","journal-title":"IEEE Trans. Circuits Syst. II Express Briefs"},{"key":"ref_55","doi-asserted-by":"crossref","unstructured":"Zhang, D., Lin, Z., and Gao, Z. (2018). A novel fault detection with minimizing the noise-signal ratio using reinforcement learning. Sensors, 18.","DOI":"10.3390\/s18093087"}],"container-title":["Sensors"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/23\/6866\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T10:39:57Z","timestamp":1760179197000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.mdpi.com\/1424-8220\/20\/23\/6866"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,30]]},"references-count":55,"journal-issue":{"issue":"23","published-online":{"date-parts":[[2020,12]]}},"alternative-id":["s20236866"],"URL":"https:\/\/doi.org\/10.3390\/s20236866","relation":{},"ISSN":["1424-8220"],"issn-type":[{"type":"electronic","value":"1424-8220"}],"subject":[],"published":{"date-parts":[[2020,11,30]]}}}