Event-Triggered State Estimation and Control for Networked Nonlinear Systems under Dynamic Sparse Attacks

Guangdeng Chen, Qi Zhou, Hongyi Li, Deyin Yao, Choon Ki Ahn

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)


In this article, we investigate the problem of event-triggered state estimation and tracking control for a class of nonlinear networked control systems subject to measurement disturbances and dynamic sparse attacks, where an attacker can select and manipulate some of the measurements in a time-varying manner. First, a voting-based secure event-triggered mechanism is constructed to reduce the transmission of measurement data under attack. Second, considering the effect of the measurement disturbances, two output estimation algorithms are proposed to estimate the actual system output from the transmitted data. Subsequently, according to the event-triggered estimated output, a filtered observer with low sensitivity to disturbances is constructed to estimate the continuous-time system states. Finally, a novel finite-time compensation system that can compensate for both filtering errors and input saturation is constructed, and a tracking controller is designed to ensure that the system output converges to a neighborhood of the desired output. Several comparative simulations based on a manipulator system with motor dynamics are performed to verify the effectiveness of the proposed method.

Original languageEnglish
Pages (from-to)1947-1958
Number of pages12
JournalIEEE Transactions on Network Science and Engineering
Issue number2
Publication statusPublished - 2024 Mar 1

Bibliographical note

Publisher Copyright:
© 2013 IEEE.


  • Compensated control
  • event-triggered control
  • input saturation
  • sparse attack
  • state estimation

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Networks and Communications
  • Computer Science Applications


Dive into the research topics of 'Event-Triggered State Estimation and Control for Networked Nonlinear Systems under Dynamic Sparse Attacks'. Together they form a unique fingerprint.

Cite this