1. Introduction
With the development of networked system and communication technology, the utilization of unmanned surface vehicles (USVs) is becoming increasingly significant in the supervision of marine ranches. Acquiring the real-time state of USV steering motion is crucial for enabling functions such as vigilant patrolling and intelligent obstacle avoidance. The states (or variables) of USV steering motion mainly include rudder angle, yaw velocity, roll velocity, and sway velocity, which can provide references for USV to make navigation decisions and path planning. However, direct measurement of these data requires the use of expensive sensors, which are highly susceptible to corrosion and failure in sea environments, resulting in the inability of USVs to function [1]. To address this problem, the use of soft measuring techniques to estimate the state of USV steering motion has attracted research interest in both academia and industry [2,3,4].
In fact, state estimation has been a research hotspot in various fields such as fault diagnosis [5,6,7], control engineering [8,9,10], and signal processing [11,12,13] during the last few decades. Among these hotspots, USV is one of the research subjects, attracting a growing interest from researchers. For example, in [14], an augmented state adaptive Kalman estimator was designed to estimate the state and disturbances of an underactuated USV. In the case of a USV experiencing packet loss and delays, a fault-detection filter based on an observer was designed to estimate possible faults and disturbances of the USV [15]. It is important to point out that the current findings regarding state estimation of the USV are mostly obtained based on the assumption that the noise belongs to or follows Gaussian distribution [16,17,18]. However, in practical operation, USVs are subject to disturbances from wind and waves, and these disturbances have statistical characteristics that are unknown but bounded (UBB). In response to these practical situations, the traditional state estimation approaches, such as Kalman filtering and filtering, become inapplicable. While set-membership filtering has unique advantages in dealing with UBB noise, its application in USVs is very limited. We have only seen two published research results [19,20], and these existing studies have not yet considered the problems of uncertainty in real sea conditions.
It is well known that uncertainty widely exists in practical systems. For USVs, on one hand, the steering motion model of the USV overlooks certain minor factors during the modeling process, resulting in a certain degree of uncertainty in the model itself. On the other hand, as the USV’s hull is immersed in seawater for extended periods, the components on the USV are inevitably subjected to corrosion from seawater and sea breeze, leading to performance degradation and aging phenomena, which can cause perturbations in model parameters, subsequently introducing perturbations in the estimator gains for state estimation [21]. The occurrence of these two situations can deteriorate the estimation performance of the USV system’s motion state. Therefore, the resilience of state estimation as a practical requirement when designing estimators. In recent years, the problem of resilient/non-fragile set-membership estimation for various systems has gained significant attention from scholars. For instance, In [22], a approach based on non-fragile set-membership estimator was proposed to estimate the quantized discrete-time memristive neural networks with mixed time-delay under the maximum error first protocol, which can effectively reduce the influence of estimator gain perturbations on estimation performance. In [20], a resilient set-membership estimation approach based on the Try-Once-Discard (TOD) protocol was proposed for the discrete model of USV steering motion with uncertain parameters, which ensures that the estimation errors are confined to predetermined ellipsoidal regions even in the presence of uncertain parameters. In practice, although USVs may simultaneously experience estimator gain perturbations and parameter uncertainties, based on our knowledge, we have not seen research results that consider estimator gain perturbations and parameter uncertainty simultaneously, let alone designing corresponding resilient/non-fragile algorithms. In addition to the aforementioned uncertainty problems, the application of wireless communication networks brings communicative conveniences for USV, while also presenting potential threats [23,24].
One potential threat of network communication is that, due to the open and unprotected nature of USV communication networks, unauthorized individuals such as illegal fishermen or competitors can easily obstruct the normal transmission of data by carrying out cyber-attacks, which may cause the USV estimation performance to deteriorate. Therefore, the timely detection and correction of potential cyber-attacks in measurement data of USV have gained increasing attention. For example, in [15], a fault-detection filter based on the elastic event-triggered mechanism was proposed to mitigate the influence of Denial of Service (DoS) attacks on the USV while reducing the communication burden. In [25], an event-based distributed edge-triggered extended state observer was designed to estimate the underactuated USV subjected to DoS attacks, which enables the timely detection of cyber-attacks and the quick recovery of the USV’s position and speed information when the attacks disappear. However, it is worth noting that, on the one hand, considering the types (e.g., bias injection attack [26], replay attack [27], DoS attack [28], and mixed attacks [29]) and features (e.g., intermittency [30], probability [31], and occasionality [32]) of cyber-attacks are various, it is challenging to consistently detect them correctly. On the other hand, considering the complex and variable nature of real sea conditions, even if an attack signal is detected correctly, it may still cause some irreversible influences on the estimation performance if it is not handled in a timely manner. Therefore, unlike the existing “passive” solutions to cyber-attack problems, a seemingly natural idea is to select an “active” solution to mitigate the influence of the cyber-attacks on communication channels, thereby enhancing the state estimation performance of USVs in response to cyber-attacks. This is also one of the original intentions in this study.
Another potential threat of network communication is that, due to bandwidth constraints in channels, network-induced phenomena such as missing measurements and time-delays may occur during data transmission, leading to a decrease in the overall performance of the estimator [33,34,35,36,37,38]. Various approaches have been proposed to reduce the communication burden, thereby avoiding the occurrence of the aforementioned network-induced phenomena [19,20,39,40,41]. For instance, in the problems of USV heading tracking under wave disturbances, a coding scheme based on logarithmic quantization was proposed to reduce communication burden and mitigate data conflicts [19]. In [20], a collective state estimation algorithm based on the TOD scheduling protocol was proposed for USV steering motion in bandwidth-constrained networks, which allows only a sensor node with the maximum difference from the previous values to send the latest data to the networks at each transmission time, thereby reducing communication burden while ensuring that estimation errors are confined within predetermined ellipsoidal regions. From the aforementioned literature and related studies, it can be observed that existing studies either utilize various network protocols and triggering mechanisms to schedule sensors or employ coding scheme based on logarithmic quantization to compress data in the channels. These approaches effectively reduce the communication burden to a certain extent, but in practical engineering, the quality of the transmitted data is difficult to guarantee due to reasons such as excessive number of sensor nodes, improper triggering threshold setting and overly complex logarithmic quantization processes. Additionally, it is also challenging for these existing approaches to effectively mitigate the influence brought by cyber-attacks. Therefore, the main motivation of this study is to select a suitable solution for the steering motion state estimation problem of USV with communication channels influenced by the mixed cyber-attacks and bandwidth constraints, which ensures the quality of the data transmitted, while not only “actively” mitigating the influence of cyber-attacks on communication channels, but also reducing the communication burden.
To address the above-mentioned problem, considering the robustness and simplicity of binary data in transmission [42,43,44,45,46], we propose to utilize binary coding scheme (BCS) to encode the data, thereby mitigating the influence of bandwidth constraints and cyber-attacks on the state estimation performance of USV steering motion. In addition, to cope with the potentially changing of network bandwidth, a binary bit string length selection strategy has been proposed and introduced into BCS. As a popular active security measure, BCS has gained extensive application in networked systems for the purpose of ensuring dependable data transmission [39,47,48,49]. However, when it comes to the USV steering motion, the state estimation problem based on the BCS has not received sufficient attention under the framework of set-membership estimation, this is mainly due to the following challenge: the implementation of the BCS enhances the complexity of the model, which poses significant challenges to the designs and performance analysis of the estimator.
Based on the above discussions and practical requirements, this paper proposes a robust resilient filtering framework for the problem of USV steering motion state estimation based on BCS under the situations of mixed cyber-attacks, channel bandwidth constraints, UBB noises, parameter uncertainties, and estimator gain perturbations. The primary contributions of this paper are: (1) it is proposed that applying the BCS to the communication channel of the USV, which is threatened by cyber-attacks and bandwidth constraints, to reduce the communication burden, actively mitigate the influences of cyber-attacks on data transmission; (2) the considered mixed cyber-attacks consist of the bias injection attack and DoS attack, where the DoS attack is continuous and bias injection attack are stochastic, which better reflects the actual situation of the engineering; (3) the uncertainty problems, such as parameter uncertainties and estimator gain perturbations, are considered simultaneously, and a new framework of resilient set-membership estimation is designed for both cases.
The subsequent sections of this paper are organized in the following way: Section 2 gives the modeling of the USV steering motion model, the specific steps of the BCS and the design of the resilient set-membership state estimator, respectively. Section 3 provides sufficient conditions for the existence of the desired estimator by examining the solvability of a set of recursive Linear Matrix Inequations (LMIs) and obtains the locally optimal estimator gain by a recursive optimization algorithm. Section 4 verifies the algorithm’s effectiveness via a simulation experiment. Section 5 gives the conclusion of the paper.
Notation. denotes the real constant matrix. denotes the n-dimensional Euclidean space. means the probability of the stochastic variable occurring is . “T”denotes the transpose of a matrix. The notation means that is positive semi-definite (positive definite), where S and Z are the symmetric matrices. indicates a diagonal matrix. Other notations used are quite standard.
2. Problem Formulation
2.1. Modeling of the USV Steering Motion Model
In practical situations, we can analyze the USV steering motion from six degrees of freedom: yaw, pitch, roll, heave, sway, and surge. If we consider the asymmetrical motion [16], we can only focus on three main degrees of freedom: roll, yaw, and sway. The influence of pitch, heave, and surge can be treated as the disturbance. Then, we can obtain basic equations for sway, yaw, and roll based on Newton’s second law:
(1)
where , and denote the transverse axis (directed to starboard), normal axis (directed from top to bottom), and longitudinal axis (directed from aft to fore), respectively; and denote the moments with respect to the and axes, respectively; and denote the moments of inertia with respect to the and axes, respectively; denotes the effective mass of the marine vehicle in the direction; , , and denote the roll angle, the heading angle, and the force in the direction, respectively.By translating the equations in (1) to the coordinate system presented in Figure 1, where G in Figure 1 denotes the center of gravity, adopting Taylor expansion and Laplace transformation, and disregarding some hydrodynamic effects, one can achieve the following transfer functions for the models of the hydrodynamics forces:
where , , , and denote the Laplace transformation of , , , and , respectively; denotes the rudder angle, which can be seen as the input, controlled by control devices, , , and denote the sway velocity caused by the rudder motion alone, the heading angle, and the roll angle, respectively, and represent the disturbances of waves and winds on and under complex sea conditions, 𝜕 is the damping ratio, and are the time constants, and is the natural frequency. , , , , and denote the known gains of transfer functions, which are linearly related to the forward speed (determined by the propeller), and given in Section 4.Applying the inverse Laplace transform, the physical model (1) can be transformed into the state-space model in continuous time. Furthermore, forward Euler formula is unitized to convert the continuous-time model into the following discrete-time model [20]:
(2)
where represents the discrete-time state vector and represents the measurement output in which and denote the heading angle and the roll angle, respectively. and are process noise and measurement noise, respectively. denotes the rudder angle. Transition matrices , , C, D, E, and G are determined as:In order to simulate the disturbances caused by waves and wind in real environments, this paper defines and as unknown but bounded noises, which satisfy the following ellipsoid sets:
(3)
where and are known positive definite matrices.In most practical situations, noise in USV motion is often difficult to identify accurately and has persistent influences. For example, wave disturbance is an irregular random sequence influenced by factors such as water density, hull length, wind force and tide, with extremely complex properties. However, in different cases, researchers can roughly estimate the possible peaks and troughs of wave disturbances and thus use them as boundary conditions. These boundary conditions can be transformed into ellipsoidal sets.
In fact, the framework proposed in this paper is applicable not only to UBB noise, but also to other cases with bounded noise (including non-Gaussian noise with bounded amplitude). For unbounded noise, only estimation approaches that deal with unbounded noise can be used, such as particle filtering.
Next, the parameter uncertainties are considered in the state-space model (2), which is rewritten as:
(4)
with(5)
where , , , and are known real constant matrices. is a norm bounded uncertain matrix and satisfies:(6)
2.2. Binary Coding Scheme
Figure 2 illustrates the structure of the BCS. To accommodate the restricted bandwidth of the communication channel, the data sent by the sensors are initially quantized using a probability quantizer. Subsequently, the quantized data are converted into binary bit strings of finite length by the encoder. The binary bit strings are then transmitted to the decoder through a memoryless binary symmetric channels (BSC) and recovered by the decoder. Finally, the recovered data are forwarded to the estimator. The specific steps and formula derivations are outlined below:
Suppose , need to be defined based on actual engineering conditions.
In traditional BCS, the length of the binary bit string is fixed. However, the operation environment of USV is complex and changeable. For example, when the steering motion data of USV are transmitted through the network channel, the network channel may need to transmit other data at the same time, which leads to part of the bandwidth being occupied. In this case, if we continue to transmit data in the original way, it may cause channel blockage, and then lead to the occurrence of time delays and missing measurements. Therefore, to solve this problem, we propose a dynamic selection strategy for the length of a binary bit string based on the original BCS. The introduction of this strategy can change the length of the binary bit string in real time, so as to effectively reduce the communication burden and alleviate the network blocking problem. The specific process of coding and decoding is as follows:
In order to encode the measured output into binary strings with a growth degree of , the interval needs to be divided into uniform intervals, each uniform interval with the following length:
(7)
In addition, the points defined as uniformly distributed are:
(8)
where , .A probability quantizer is used to pre-process the measurement data. When , the quantized measurement output is taken as follows:
(9)
where . Then, the quantization error is defined as follows:(10)
According to (9), random variable satisfies:
(11)
Further, utilizing the formula , the encoder is able to convert the quantized measurement output into binary strings consisting of a set of bits:
.Next, the encoder transmits binary strings to the decoder through memoryless BSC. It should be emphasized that during the transmission binary strings, the presence of complex surface weather conditions can introduce channel noises in the memoryless BSC, which can potentially cause each bit in the binary strings to flip with a certain probability. Therefore, the binary strings received by the decoder can be modeled as follows:
where withThe random variable satisfies:
(12)
where represents the flipping probability. For the sake of further analysis, we give the assumption that are white and mutually independent. Subsequently, the decoder recovers the original signal using the following formula:(13)
([44]). Assuming that the probability of flipping is ε during signal transmission via a memoryless BSC, then, the signal received by the decoder satisfies:
where .Considering Lemma 1, there is a certain degree of distortion between the signal recovered by the decoder and the signal sent from the sensors. Therefore, the following formula is used to compensate for the distortion:
(14)
The equivalent error, which is generated by signal transmission through memoryless BSC, is represented in the following form:
(15)
The expectation and variance in obtained from Lemma 1 are as follows:
(16)
Combining the formulas (10) and (15), the recovered measurement output can be written as:
(17)
Due to the open and unprotected nature of the networks, unauthorized individuals, such as illegal fishermen or competitors, can easily carry out cyber-attacks on the communication channels with the aim of sabotage. Moreover, in order to maximize the level of destruction, unauthorized individuals often combine multiple attack methods to launch mixed cyber-attacks against communication channels. To better reflect real scenarios, this paper assumes that communication channels are subjected to mixed cyber-attacks consisting of bias injection attack and DoS attack. As a result, the actual data outputted by the decoder are as follows:
(18)
where and represent the occurrence of DoS attack and bias injection attack, respectively. In engineering practice, due to the difficulty of a single DoS attack signal having a significant influence on the system, attackers often carry out continuous DoS attacks. Therefore, this paper pre-sets DoS attacks to occur continuously. indicates that the channels are subjected to DoS attacks. indicates that the channels are not subjected to DoS attacks. On the contrary, bias injection attacks occur stochastically and follow the Bernoulli distribution:(19)
where indicates that the channels are subjected to bias injection attacks. indicates that the channels are not subjected to bias injection attacks. represents an injection attack signal that meets the following conditions:(20)
2.3. Design Objective
Considering the mixed cyber-attacks, BCS, parameter uncertainties and estimator gain perturbations, the resilient set-membership estimator is designed as follows:
(21)
where is the estimate of the vector , is the gain matrix of estimator to be determined in the following content, and represents the estimator gain perturbation and satisfies:(22)
where is an unknown time-varying matrix satisfies , , and are known real matrices of proper dimensions.When , the estimate error is confined to the ellipsoidal region shown below:
(23)
where is the positive define matrix.In practice, some uncertainty errors may be introduced in measuring the initial state of the system due to some unknown uncertainties (such as hydrodynamic effects and noises) in the initial state. However, by knowing the bounds of these parameters in advance, we can make specific assumptions about the state and thus treat these uncertainty errors as similar to the UBB noise described in Assumptions A1.
This paper has two objectives. The first objective is to look for the estimator gain matrix , so that the and are limited within the following ellipsoidal region:
(24)
The second objective is to minimize the above ellipsoid in the sense of trace.
To facilitate subsequent derivation, at the end of this chapter, we introduce several lemmas:
Lemma 2([50]). For constant matrices , , and satisfying and , then:
If and only if
Lemma 3([50]). Let be quadratic functions of : with .
Then, the following implication:
can be guaranteed if there are positive scalars satisfying:Lemma 4([50]). For given matrices , ℜ and ε with appropriate dimensions, if and only if there is a positive scalar ϱ satisfying for all satisfying , the following inequality:
holds.3. Main Result
3.1. Design of Robust Set-Membership Estimator
In this section, we achieve the first objective by the subsequent theorem: obtaining sufficient conditions for the estimation errors to be limited within specified ellipsoidal regions at each transmission time.
Considering the USV models (4), suppose positive-definite matrix is given, and limited in ellipsoid (23), the first objective can be achieved if there is a set of matrices , , scalar ζ and such that:
(25)
where
in which is the Cholesky factorization of .
According to Assumption 2, we know . Next, we assume that , . Finally, by using mathematical induction, we need to prove that , ensuring that the estimation errors are always confined within specific ellipsoidal regions.
To begin with, we calculate the estimation error and express it in the following form:
(26)
On the basis of [51], there is a vector satisfying such that
Therefore, we rewrite the estimation error as follows:
(27)
where where , , and are given in (25).Next, we can decompose the stochastic matrix as follows:
(28)
whereThen, we can acquire:
(29)
From (3), (11), (16), (20), and (27), we can acquire:
(30)
which can be rewritten with as follows:(31)
According to Lemma 3, if there is a set of positive scalars that:
(32)
Then, the inequality holds and (32) can be expressed in an alternative form:(33)
where is given in (25).Based on Lemma 2, we can deduce that (33) is equal to LMI as follows:
(34)
This also means that, without considering parameter uncertainty and estimator gain perturbation, the estimation error can be limited within a specified ellipsoidal region at each transmission time.
The following content is used to establish the framework of resilient estimation, which can handle the influence caused by parameter uncertainties and estimator gain perturbations. Due to can be decomposed by:
(35)
whereThen, combining (5) and (22), we can obtain that:
(36)
where and are given in (25) and . According to Lemma 4, there is a positive scalar such that:(37)
Then, according to Lemma 4, it can be deduced that the inequality (37) is equivalent to (25), and the proof of Theorem 1 is completed. □3.2. Optimization Problem
By solving the set of aforementioned LMIs iteratively, the estimator gain (if it exists) can be obtained. However, the resulting estimator gain may be a set rather than a single value. To obtain the optimal estimator gain within this set, in the sense of trace, we minimize the ellipsoidal constraint . Corollary 1. If there are non-negative scalars , , and a set of matrices , such that the following optimization problem is solvable:
Corollary 1.If there are non-negative scalars , ζ, and a set of matrices such that the following optimization problem is solvable:
(38)
then a minimized ellipsoidal region (in the sense of trace) is guaranteed, and an optimal estimator gain can be obtained at each transmission time.The pseudocode for proposed estimation framework is shown in Algorithm 1.
Algorithm 1: Set-membership estimation framework for USV steering motion |
|
The flow chart for proposed estimation framework is shown in Figure 3.
4. Simulation Experiment
4.1. Numerical Simulation
According to (1), in the USV steering motion, the values of various parameters are obtained from [20] and shown below:
where is the sampling interval, S is the constant forward speed, and is the maximum transmission time. Therefore, the state transition matrices , , C, D, E, and G are calculated as:The parameter uncertainties are defined as:
The estimator gain perturbations are defined as:
The initial values are defined as:
The parameters of process noises and measurement noises are defined as , , , and . The parameters of mixed cyber-attacks are defined as , , , and . The parameters of BCS are defined as , . The rudder angle is defined as .
In our study for the USV, the parameter selection involves the key factors such as the rudder angle, speed, and noise. The selection of these parameters should be appropriately adjusted according to the context of the research problem, such as the role, working environment, and performance characteristics of the USV. The relevant literature and corresponding sea condition information should be reviewed to determine the best parameter setting for different situations. For the selection of estimator gain, as discussed in the previous section, the estimator gain obtained by solving LMIs (25) may be a set. Therefore, in this paper, we need to solve an optimization problem (Corollary 1) that can obtain the local optimal estimator gain.
MATLAB R2020a is used to calculate LMIs in Theorem 1, and the optimization problem (38) can be solved by the MATLAB function (sedumi).
Case 1. In the following, we consider the case which DoS attack and bias injection attack occurs during the estimation process, and we compare the proposed estimation framework with the traditional set-membership estimation framework [52].
In case 1, the length of the binary bit string is set to because the network bandwidth is not occupied by other data.
The schematic diagram which illustrates the occurrence of mixed cyber-attacks and the simulation results from three degrees of freedom are shown as follows:
Figure 4 illustrates the occurrence of mixed cyber-attacks. Considering that DoS attacks in real scenarios occur continuously, we pre-set the occurrence of the DoS attacks, and simulate the occurrence of bias injection attacks according to Bernoulli sequence distribution.
Figure 5, Figure 6 and Figure 7 demonstrate the real state of the sway velocity, yaw velocity, and roll velocity, and their estimation values. From Figure 5, Figure 6 and Figure 7, we can see that although there are some influencing factors in the system, such as UBB noises, mixed cyber-attacks, model parameter uncertainties, estimator gain perturbations, and significant initial differences between the real state value and its estimation value. Moreover, the data in the channels need to be quantitated, encoded, and transmitted, which may cause certain errors. The improved resilient set-membership estimation framework is still capable of accurately estimate the sway velocity and yaw velocity. For the roll velocity, although the mixed cyber-attacks can have certain influences on the estimation performance, the improved resilient set-membership estimation framework can restore the estimation performance in a short time after the attack disappears.
Figure 5 and Figure 6 show that our proposed framework has good estimation performance. This is because according to [20], due to the unique dynamics and constraints of USV, as long as the algorithm is designed properly, noises and disturbances cannot have a greater influence on the sway velocity and yaw velocity estimation performance of USV. And combing with [43], we can see that the effective combination of BCS and set-membership filtering can give full play to their respective characteristics. Therefore, the influence of various errors caused by cyber-attacks and BCS on the estimation performance is reduced effectively.
In contrast, there is a large lag and deviation between the true state and the estimated value obtained by the traditional set-membership estimation framework under the same parameters, it should be noted that, due to the lack of BCS during data transmission, the estimation performance of the traditional set-membership estimation framework is easily influenced by mixed cyber-attacks, the emergence of attacks can lead to an increasing deviation between estimated values and true values under the traditional set-membership estimation framework, and the deviation not decrease with the disappearance of attacks. More importantly, in the actual transmission process, transmitting data directly without quantization can increase the communication burden, leading to packet loss, missing measurement, which can greatly reduce the estimation performance.
Figure 8 demonstrates the sum of mean square error (MSE) in case 1, which effectively denotes the high estimation accuracy of our approach.
Case2. For the complex operation environment of USV, we assume that part of the channel bandwidth is occupied during the time periods of and . Therefore, we need to adjust the binary bit string length of the data transmission in time to adapt to the changes in the channel bandwidth during the estimation process.
In addition, in order to comprehensively evaluate the effectiveness of our approach, in addition to the DoS attack and bias injection attack mentioned above, we also consider some other common types of cyber-attacks, such as replay attack and eavesdropping attack. Since the occurrence of replay attacks is difficult to describe by Bernoulli distribution [27], we therefore set those occurrences in advance to: , , , eavesdropping attacks are constant. The occurrence of cyber-attacks and occupation of channel bandwidth are shown in Figure 9:
For this complex situation, we compare our approach with traditional set-membership estimation framework under BCS with a dynamically selected binary bit string length strategy, after knowing that the channel bandwidth is occupied, we adjust the binary bit string length accordingly, specifically , , , and the simulation results are as follows:
Figure 10, Figure 11 and Figure 12 demonstrate the real state of the sway velocity, yaw velocity, and roll velocity, and their estimation values. Figure 13 demonstrates the sum of MSE in case 2. From Figure 9, Figure 10, Figure 11, Figure 12 and Figure 13, we can see that as the length of the transmitted data decreases, the quantization error of the data also increases accordingly, and the estimation accuracy of the traditional approach is also greatly influenced. In contrast, our approach can reduce the influence of quantization error on the estimation accuracy, so as to effectively estimate the steering motion state of the USV. Moreover, our approach can effectively resist the influence of reply attacks on estimation performance. Finally, it should be noted that although the occurrence of eavesdropping attacks cannot be avoided, the data are encoded in binary before entering the network, and the principle of BCS is similar to encryption and decryption, and the upper and lower limits of quantification are the keys. Therefore, if the attackers do not know the specific key, they can only steal the binary array from the network, but cannot obtain the real value.
4.2. The Analysis of Experimental Results
In order to verify the estimation performance of the proposed estimation framework, we compare and calculate the computational load and MSE of the proposed approach and the traditional approach. The comparative estimation results of Case 1 are shown in Table 1 below.
According to Table 1, the MSE of the sway velocity, yaw velocity, and roll velocity of the traditional approach are higher than that of our approach by 93.00%, 73.32%, and 93.95%, respectively, and the calculated load of the traditional approach is higher than that of our approach by 4.38%.
The comparative estimation results of Case 2 are shown in Table 2 below.
According to Table 2, the MSE of the sway velocity, yaw velocity, and roll velocity of the traditional approach are higher than that of our approach by 44.76%, 73.64%, and 61.35%, respectively, and the calculated load of the traditional approach is higher than that of our approach by 5.01%. Therefore, the comprehensive comparison shows that our approach is optimal for the USV steering motion state estimation.
5. Conclusions
This paper has proposed a resilient set-membership state estimation algorithm based on BCS for the steering motion of USV under unknown but bounded noises. During the estimation process, the data of USV steering motion has been transmitted to the estimator by sensors via communication channels. These channels were bandwidth-constrained and subjected to cyber-attacks. Therefore, the BCS has been applied in communication channels, which not only saves communication resources but also ensures data quality while reducing the security risks caused by cyber-attacks. In addition, in order to simulate real sea conditions, this paper has considered the problems of parameter uncertainties and estimator gain perturbations. Thus, a resilient estimation framework has been designed to handle those problems. In the design process, the sufficient conditions for the existence of a resilient set-membership estimator have been established via the use of convex optimization method and mathematical induction method, which have ensured that the estimation error at each transmission time has been limited within a certain ellipsoidal region. Meanwhile, the estimator gain has been derived by iterative solution of a sequence of LMIs. Finally, the effectiveness of the established framework has been verified through a numerical simulation example.
There is a gap between theory and practice in our proposed estimation framework. Therefore, in our future research, we will take the following measures to bridge this gap, and apply estimation framework to practical projects after the theory is mature: (1) continuously calibrate the physical model of the system through a large amount of experimental data to ensure that it accurately reflects the actual characteristics of the USV; (2) introduce multi-source sensor fusion technology to improve the accuracy and robustness of the state estimation; (3) continuously adjust and optimize parameters of algorithms according to the feedback results of field tests.
Future research includes two aspects: on the one hand, this paper proposes the BCS with a dynamically selected binary bit string length strategy, and this scheme can also be used for remote estimation of other autonomous vehicles; on the other hand, we can upgrade the algorithm to estimate all kinds of faults that may exist in USV.
Conceptualization, J.L., Z.W. and Y.W.; methodology, J.L.; software, J.W.; validation, P.L.; writing—original draft, Z.W. and Y.W.; writing—review and editing, J.L. and Z.W.; supervision, J.L. and Z.W. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding authors.
The authors declare no conflicts of interest.
Footnotes
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.
Estimation performance of case 1.
Estimation Approach | Calculated Load (s) | MSE of the Sway Velocity | MSE of the Yaw Velocity | MSE of the Roll Velocity |
---|---|---|---|---|
Traditional approach | 8.950 | 2.0174 | 0.8040 | 58.4744 |
Our approach | 8.574 | 0.1414 | 0.2143 | 3.3266 |
Estimation performance of case 2.
Estimation Approach | Calculated Load (s) | MSE of the Sway Velocity | MSE of the Yaw Velocity | MSE of the Roll Velocity |
---|---|---|---|---|
Traditional approach | 9.352 | 0.2558 | 0.8259 | 1.6437 |
Our approach | 8.906 | 0.1414 | 0.2144 | 0.6446 |
References
1. Goulon, C.; Meaux, O.L.; Vincent-Falquet, R.; Guillard, J. Hydroacoustic Autonomous boat for Remote fish detection in LakE (HARLE), an unmanned autonomous surface vehicle to monitor fish populations in lakes. Limnol. Oceanogr.-Methods; 2021; 19, pp. 280-292. [DOI: https://dx.doi.org/10.1002/lom3.10422]
2. Song, L.; Chen, H.; Xiong, W.; Dong, Z.; Hu, K. Method of Emergency Collision Avoidance for Unmanned Surface Vehicle (USV) based on Motion Ability Database. Pol. Marit. Res.; 2019; 26, pp. 55-67. [DOI: https://dx.doi.org/10.2478/pomr-2019-0025]
3. Xiong, Y.; Zhu, H.; Pan, L.; Wang, J. Research on Intelligent Trajectory Control Method of Water Quality Testing Unmanned Surface Vessel. J. Mar. Sci. Eng.; 2022; 10, pp. 55-67. [DOI: https://dx.doi.org/10.3390/jmse10091252]
4. Abrougui, H.; Nejim, S.; Hachicha, S.; Zaoui, C.; Dallagi, H. Modeling, parameter identification, guidance and control of an unmanned surface vehicle with experimental results. Ocean Eng.; 2021; 241, pp. 42-53. [DOI: https://dx.doi.org/10.1016/j.oceaneng.2021.110038]
5. Cai, M.; He, X.; Zhou, D. Performance-improved finite-time fault-tolerant control for linear uncertain systems with intermittent faults: An overshoot suppression strategy. Int. J. Syst. Sci.; 2022; 53, pp. 3408-3425. [DOI: https://dx.doi.org/10.1080/00207721.2022.2083261]
6. Wen, P.; Li, X.; Hou, N.; Mu, S. Distributed recursive fault estimation with binary encoding schemes over sensor networks. Syst. Sci. Control Eng.; 2022; 10, pp. 417-427. [DOI: https://dx.doi.org/10.1080/21642583.2022.2063203]
7. Song, X.; Rong, L.; Li, B.; Wang, Z.; Li, J. Joint state and fault estimation for nonlinear systems with missing measurements and random component faults under Round-Robin Protocol. Int. J. Electr. Power Energy Syst.; 2023; 154, pp. 109-437. [DOI: https://dx.doi.org/10.1016/j.ijepes.2023.109437]
8. Ciuonzo, D.; Aubry, A.; Carotenuto, V. Rician MIMO Channel- and Jamming-Aware Decision Fusion. IEEE Trans. Signal Process.; 2017; 65, pp. 3866-3880. [DOI: https://dx.doi.org/10.1109/TSP.2017.2686375]
9. Bao, G.; Ma, L.; Yi, X. Recent advances on cooperative control of heterogeneous multi-agent systems subject to constraints: A survey. Syst. Sci. Control Eng.; 2022; 10, pp. 539-551. [DOI: https://dx.doi.org/10.1080/21642583.2022.2074169]
10. Li, W.; Niu, Y.; Cao, Z. Event-triggered sliding mode control for multi-agent systems subject to channel fading. Int. J. Syst. Sci.; 2022; 53, pp. 1233-1244. [DOI: https://dx.doi.org/10.1080/00207721.2021.1995527]
11. Caballero-Aguila, R.; Hermoso-Carazo, A.; Linares-Pérez, J. Networked fusion estimation with multiple uncertainties and time-correlated channel noise. Inf. Fusion; 2022; 53, pp. 1233-1244. [DOI: https://dx.doi.org/10.1016/j.inffus.2019.07.008]
12. Wang, F.; Liang, J.; Lam, J.; Yang, J.; Zhao, C. Robust Filtering for 2-D Systems with Uncertain-Variance Noises and Weighted Try-Once-Discard Protocols. IEEE Trans. Syst. Man Cybern.-Syst.; 2023; 53, pp. 2914-2924. [DOI: https://dx.doi.org/10.1109/TSMC.2022.3219919]
13. Li, X.; Feng, S.; Hou, N.; Wang, R.; Li, H.; Gao, M. Surface microseismic data denoising based on sparse autoencoder and Kalman filter. Syst. Sci. Control Eng.; 2022; 10, pp. 616-628. [DOI: https://dx.doi.org/10.1080/21642583.2022.2087786]
14. Li, G.; Liu, Z.; Zhang, J.; Zheng, L. Robust predictive control for anti-rolling path following of underactuated surface vessels using adaptive Kalman filter. Int. J. Adv. Robot. Syst.; 2019; 16, pp. 324-328. [DOI: https://dx.doi.org/10.1177/1729881419877269]
15. Fei, Z.; Wang, X.; Wang, Z. Event-Based Fault Detection for Unmanned Surface Vehicles Subject to Denial-of-Service Attacks. IEEE Trans. Syst. Man Cybern.-Syst.; 2022; 52, pp. 3326-3336. [DOI: https://dx.doi.org/10.1109/TSMC.2021.3064884]
16. Wang, Y.; Han, Q. Network-Based Fault Detection Filter and Controller Coordinated Design for Unmanned Surface Vehicles in Network Environments. IEEE Trans. Ind. Inform.; 2016; 52, pp. 1753-1765. [DOI: https://dx.doi.org/10.1109/TII.2016.2526648]
17. Sharma, S.; Sutton, R. A genetic algorithm based nonlinear guidance and control system for an uninhabited surface vehicle. J. Mar. Eng. Technol.; 2013; 12, pp. 29-40. [DOI: https://dx.doi.org/10.1080/20464177.2013.11020276]
18. Wang, Y.; Han, Q. Network-Based Heading Control and Rudder Oscillation Reduction for Unmanned Surface Vehicles. IEEE Trans. Control Syst. Technol.; 2017; 25, pp. 1609-1620. [DOI: https://dx.doi.org/10.1109/TCST.2016.2617321]
19. Zhou, X.; Zhang, Y.; Chen, J.; Zheng, X. A quantized set-membership estimation-based heading control method of unmanned surface vessels under unknown-but-bounded wave-induced disturbances. Asian J. Control; 2023; 25, pp. 3105-3118. [DOI: https://dx.doi.org/10.1002/asjc.3017]
20. Chen, H.; Li, Y.; Liu, C.; Xiao, Z.; Rao, H. Set-Membership State Estimation for Unmanned Surface Vehicle Steering Motion with Try-Once-Discard Protocol. IEEE Sens. J.; 2023; 23, pp. 14592-14600. [DOI: https://dx.doi.org/10.1109/JSEN.2023.3279399]
21. Hu, J.; Yang, Y.; Liu, H.; Chen, D.; Du, J. Non-fragile set-membership estimation for sensor-saturated memristive neural networks via weighted try-once-discard protocol. IET Control Theory Appl.; 2020; 14, pp. 1671-1680. [DOI: https://dx.doi.org/10.1049/iet-cta.2020.0219]
22. Yang, Y.; Hu, J.; Chen, D.; Wei, Y.; Du, J. Non-fragile Suboptimal Set-membership Estimation for Delayed Memristive Neural Networks with Quantization via Maximum-error-first Protocol. Int. J. Control Autom. Syst.; 2020; 18, pp. 1904-1914. [DOI: https://dx.doi.org/10.1007/s12555-019-0422-9]
23. Wu, W.; Peng, Z.; Wang, D.; Liu, L.; Han, Q. Network-Based Line-of-Sight Path Tracking of Underactuated Unmanned Surface Vehicles with Experiment Results. IEEE Trans. Cybern.; 2022; 52, pp. 10937-10947. [DOI: https://dx.doi.org/10.1109/TCYB.2021.3074396] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/34033573]
24. Deng, L.; Guo, T.; Wang, H.; Chi, Z.; Wu, Z.; Yuan, R. Obstacle Detection of Unmanned Surface Vehicle Based on Lidar Point Cloud Data. Proceedings of the OCEANS 2022; Hampton Roads, VA, USA , 17–20 October 2022; Volume 23, pp. 1-8. [DOI: https://dx.doi.org/10.1109/OCEANS47191.2022.9977340]
25. Gao, S.; Peng, Z.; Liu, L.; Wang, D.; Han, Q. Fixed-Time Resilient Edge-Triggered Estimation and Control of Surface Vehicles for Cooperative Target Tracking Under Attacks. IEEE Trans. Intell. Veh.; 2023; 8, pp. 14592-14600. [DOI: https://dx.doi.org/10.1109/TIV.2022.3184076]
26. Liu, L.; Ma, L.; Zhang, F.; Bo, Y. Distributed non-fragile set-membership filtering for nonlinear systems under fading channels and bias injection attacks. Int. J. Syst. Sci.; 2021; 52, pp. 1192-1205. [DOI: https://dx.doi.org/10.1080/00207721.2021.1872118]
27. Liu, L.; Ma, L.; Wang, Y.; Zhang, J.; Bo, Y. Distributed set-membership filtering for time-varying systems under constrained measurements and replay attacks. J. Frankl. Inst.-Eng. Appl. Math.; 2023; 357, pp. 4983-5003. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2020.01.029]
28. Li, X.; Wei, G.; Wang, L. Distributed set-membership filtering for discrete-time systems subject to denial-of-service attacks and fading measurements: A zonotopic approach. Inf. Sci.; 2021; 547, pp. 49-67. [DOI: https://dx.doi.org/10.1016/j.ins.2020.07.041]
29. Yi, X.; Yu, H.; Wang, P.; Liu, S.; Ma, L. Encoding–decoding-based secure filtering for neural networks under mixed attacks. Neurocomputing; 2022; 508, pp. 71-78. [DOI: https://dx.doi.org/10.1016/j.neucom.2022.08.041]
30. Qu, Y.; Pang, K. State estimation for a class of artificial neural networks subject to mixed attacks: A set-membership method. Neurocomputing; 2020; 411, pp. 239-246. [DOI: https://dx.doi.org/10.1016/j.neucom.2020.06.020]
31. Ding, D.; Wang, Z.; Han, Q.; Wei, G. Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks. IEEE Trans. Syst. Man Cybern.-Syst.; 2018; 48, pp. 779-789. [DOI: https://dx.doi.org/10.1109/TSMC.2016.2616544]
32. Ding, D.; Han, Q.; Xiang, Y.; Ge, H.; Zhang, X. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing; 2018; 275, pp. 1674-1683. [DOI: https://dx.doi.org/10.1016/j.neucom.2017.10.009]
33. Qian, W.; Wang, L.; Chen, Z. Local Consensus of Nonlinear Multiagent Systems with Varying Delay Coupling. IEEE Trans. Syst. Man Cybern.-Syst.; 2018; 48, pp. 2462-2469. [DOI: https://dx.doi.org/10.1109/TSMC.2017.2684911]
34. Qian, W.; Gao, Y.; Yang, Y. Global Consensus of Multiagent Systems with Internal Delays and Communication Delays. IEEE Trans. Syst. Man Cybern.-Syst.; 2019; 49, pp. 1961-1970. [DOI: https://dx.doi.org/10.1109/TSMC.2018.2883108]
35. Shen, B.; Wang, Z.; Wang, D.; Luo, J.; Pu, H.; Peng, Y. Finite-horizon filtering for a class of nonlinear time-delayed systems with an energy harvesting sensor. Automatica; 2019; 100, pp. 144-152. [DOI: https://dx.doi.org/10.1016/j.automatica.2018.11.010]
36. Shen, B.; Wang, Z.; Tan, H. Guaranteed cost control for uncertain nonlinear systems with mixed time-delays: The discrete-time case. Eur. J. Control; 2018; 40, pp. 62-67. [DOI: https://dx.doi.org/10.1016/j.ejcon.2017.11.006]
37. Dong, H.; Wang, Z.; Gao, H. Robust H∞ Filtering for a Class of Nonlinear Networked Systems with Multiple Stochastic Communication Delays and Packet Dropouts. IEEE Trans. Signal Process.; 2010; 58, pp. 1957-1966. [DOI: https://dx.doi.org/10.1109/TSP.2009.2038965]
38. Hu, J.; Wang, Z.; Liu, S.; Gao, H. A variance-constrained approach to recursive state estimation for time-varying complex networks with missing measurements. Automatica; 2016; 64, pp. 155-162. [DOI: https://dx.doi.org/10.1016/j.automatica.2015.11.008]
39. Hou, N.; Wang, Z.; Shen, Y.; Liu, H.; Dong, H. A non-fragile approach to fault estimation for a class of multi-rate systems under binary encoding schemes. Int. J. Robust Nonlinear Control; 2023; 34, pp. 751-772. [DOI: https://dx.doi.org/10.1002/rnc.6999]
40. Gao, Y.; Ma, L.; Zhang, M.; Guo, J.; Bo, Y. Distributed Set-Membership Filtering for Nonlinear Time-Varying Systems with Dynamic Coding-Decoding Communication Protocol. IEEE Syst. J.; 2022; 16, pp. 2958-2967. [DOI: https://dx.doi.org/10.1109/JSYST.2021.3063357]
41. Qu, B.; Wang, Z.; Shen, B.; Dong, H.; Zhang, X. Secure Particle Filtering with Paillier Encryption–Decryption Scheme: Application to Multi-Machine Power Grids. IEEE Trans. Smart Grid; 2024; 15, pp. 863-873. [DOI: https://dx.doi.org/10.1109/TSG.2023.3271949]
42. Li, X.; Song, J.B.; Hou, N.; Dai, D.; Yang, F. Finite-horizon distributed set-membership filtering with dynamical bias and DoS attacks under binary encoding schemes. Inf. Sci.; 2023; 641, pp. 412-421. [DOI: https://dx.doi.org/10.1016/j.ins.2023.02.081]
43. Liu, Q.; Wang, Z. Moving-Horizon Estimation for Linear Dynamic Networks with Binary Encoding Schemes. IEEE Trans. Autom. Control; 2021; 66, pp. 1763-1770. [DOI: https://dx.doi.org/10.1109/TAC.2020.2996579]
44. Chen, S.; Ma, L.; Ma, Y. Distributed set-membership filtering for nonlinear systems subject to round-robin protocol and stochastic communication protocol over sensor networks. Neurocomputing; 2020; 385, pp. 13-21. [DOI: https://dx.doi.org/10.1016/j.neucom.2019.11.056]
45. Zou, L.; Wang, Z.; Gao, H. Set-membership filtering for time-varying systems with mixed time-delays under Round-Robin and Weighted Try-Once-Discard protocols. Automatica; 2016; 74, pp. 341-348. [DOI: https://dx.doi.org/10.1016/j.automatica.2016.07.025]
46. Zou, L.; Wang, Z.; Shen, B.; Dong, H. Moving horizon estimation over relay channels: Dealing with packet losses. Automatica; 2023; 155, pp. 123-131. [DOI: https://dx.doi.org/10.1016/j.automatica.2023.111079]
47. Hou, N.; Wang, Z.; Dong, H.; Hu, J.; Liu, X. Sensor Fault Estimation for Nonlinear Complex Networks with Time Delays Under Saturated Innovations: A Binary Encoding Scheme. IEEE Trans. Netw. Sci. Eng.; 2022; 9, pp. 4171-4183. [DOI: https://dx.doi.org/10.1109/TNSE.2022.3196264]
48. Liu, Q.; Wang, Z.; Dong, H.; Jiang, C. Remote Estimation for Energy Harvesting Systems Under Multiplicative Noises: A Binary Encoding Scheme with Probabilistic Bit Flips. IEEE Trans. Autom. Control; 2022; 68, pp. 343-354. [DOI: https://dx.doi.org/10.1109/TAC.2022.3170540]
49. Wang, S.; Wang, Z.; Dong, H.; Shen, B.; Chen, Y. Quadratic filtering for discrete time-varying non-Gaussian systems under binary encoding schemes. Automatica; 2023; 158, pp. 731-745. [DOI: https://dx.doi.org/10.1016/j.automatica.2023.111268]
50. Yaz, E. Linear Matrix Inequalities In System And Control Theory. Proc. IEEE; 1998; 86, pp. 2473-2474. [DOI: https://dx.doi.org/10.1109/JPROC.1998.735454]
51. Ghaoui, L.; Calafiore, G. Robust filtering for discrete-time systems with bounded noise and parametric uncertainty. IEEE Trans. Autom. Control; 2001; 46, pp. 1084-1089. [DOI: https://dx.doi.org/10.1109/9.935060]
52. Milanese, M.; Vicino, A. Estimation theory for nonlinear models and set membership uncertainty. Automatica; 1991; 27, pp. 403-408. [DOI: https://dx.doi.org/10.1016/0005-1098(91)90090-O]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2024 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper investigates the motion state estimation problem of the unmanned surface vehicle (USV) steering system in wireless sensor networks based on the binary coding scheme (BCS). In response to the presence of bandwidth constraints and mixed cyber-attacks in USV communication networks, this paper proposes an improved set-membership state estimation algorithm based on BCS. This algorithm partially addresses the problem of degraded performance in USV steering motion state estimation caused by mixed cyber-attacks and bandwidth constraints. Furthermore, this paper proposes a robust resilient filtering framework considering the possible occurrence of unknown but bounded (UBB) noises, model parameter uncertainties, and estimator gain perturbations in practical scenarios. The proposed framework can accurately estimate the sway velocity, yaw velocity, and roll velocity of the USV under the concurrent presence situation of mixed cyber-attacks, communication capacity constraints, UBB noises, model parameter uncertainties, and estimator gain perturbations. This paper first utilizes mathematical induction to provide the sufficient conditions for the existence of the desired estimator, and obtains the estimator gain by solving a set of linear matrix inequalities. Then, a recursive optimization algorithm is utilized to achieve optimal estimation performance. Finally, the effectiveness of the proposed estimation algorithm is verified through a simulation experiment.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer