Differential Entropy-Based Fault-Detection Mechanism for Power-Constrained Networked Control Systems. (2024)

Link/Page Citation

Author(s): Alejandro J. Rojas

1. Introduction

Control theory developed mainly after World War II. The ideas proposed in this research area are typically related to proportional-integral-differential (PID) control design, state feedback optimal control, optimal observers, and model predictive control (MPC); see [1]. At the turn of the twenty-first century and soon thereafter, the next step was taken under the networked control system (NCS) paradigm, which has evolved into multiagent consensus control [2], cybersecurity [3,4], and data-driven control [5]. Since then, control theorists and control practitioners have remained highly active in this research area, such as by combining control and information theories [6,7] or linear optimal control and communication theory; examples include [8,9,10]. The last few years have also seen an increase in event-triggered NCS solutions [11,12,13], that is, asynchronous control closed-loop solutions, which aim to increase the efficiency of specifically limited communication resources while achieving a set of given objectives (stability, performance, robustness, or a combination of these). These and other NCS results are the foundation of better control.

An approach to NCS introduced early on by [9] imposes a power constraint, P, on the channel input power and then characterizes the channel model by its channel signal-to-noise ratio (SNR). The proposed SNR approach is then used to study the design constraints on closed-loop stability, especially for cases in which the controlled plant model under analysis is unstable. The SNR limitations presented in [9], which are fundamental in nature, deal with unstable single-input–single-output (SISO) LTI plant models, characterizing the initial bound on the channel SNR required to achieve feedback-loop stability for a single-channel model in the closed loop. A mean square analysis to address the probabilistic nature of the communication network was also used, in a different context of synchronization, in [14]. An NCS extension of the setup proposed in [9] is presented in Figure 1; in this paper, we consider a memoryless additive white Gaussian noise (AWGN) communication channel for the communication network, which operates simultaneously over two paths: the direct path between the controller and the plant and the feedback path between the plant and the controller.

A vast amount of literature also exists on the topic of fault detection and diagnostics, including many published books [15,16,17,18,19] and review articles [20,21]. A fault occurs when there is an anomalous behavior, either by chance or maliciously induced, in a physical plant; it is then important to detect, identify, and if possible recover from this fault. There are different formulations for the problems of fault detection and fault identification for linear time-invariant (LTI) models, which can be roughly categorized as approximate (such as synthesizing fault-detection filters subject to noise) and exact formulations (such as the null-space method).

The variability inherent in NCSs due to the inclusion of stochastic processes in the communication of relevant closed-loop signals might also be caused by variations in the plant model parameters. These parameter variations can be interpreted as faults; thus, a fault mechanism is needed that can detect these changes, identify them, and, through the residuals (see Figure 1), identify the new faulty parameter values to then adapt the controller’s design to achieve fully fault-tolerant closed loop control. A two-part survey on fault diagnosis and fault-tolerant techniques in control can be found in [22,23]. In contrast, the author of [24] offers a complete survey on the topics of fault detection and fault-tolerant control for NCSs. Another survey on fault diagnosis for NCSs can be found in [25], which aims to reduce performance degradation due to communication features. In [26], a fault-detection filter subject to limited transmission through a network with time-varying latency and fading was successfully designed. A Bayesian approach was used instead in [27] for NCS fault diagnosis in an irrigation canal application, while in [28] the authors used a Markov jumping linear system (MJLS) approach for the design of a residual generator. NCS robust fault-tolerant control is also an alternative, which was subsequently considered, for example, in [29]; faults were modeled as MJLSs with incomplete transition probabilities, and LMI-based sufficient conditions were then used to ensure stability. Task allocation in a multiagent setting was presented in [30] to ensure fault tolerance through cooperation between healthy and faulty agents instead of focusing on recovering nominal performance; see also [31]. Finally, a nonlinear MPC solution subject to random network delays and packet dropout was used for fault-tolerant design control in [32].

Our first contribution is the optimal design of the control loop for a first-order unstable plant model, which applies generally due to the nature of the NCS setup. The optimal controller minimizes the sum of the powers for the network input signals u(k) (also the controller output) and y(k) (also the plant model output) in the steady state; see Figure 1. Our second contribution is a fault-detection mechanism based on the estimation of the differential entropy of the controller output signal u, as shown in Figure 1. Our third contribution is a fault-identification mechanism for the value of the plant model gain and unstable poles, once a fault has been detected, based on the controller output signal u and the received output signal y[sub.r]. We present a simulated example to illustrate these contributions.

This paper is organized as follows. Section 2 presents the general assumptions, introducing the plant and AWGN channel models. Here, we also present the definition of the power of a signal in the steady state. In Section 3, we propose the optimal controller design for the power-constrained NCS control loop. In Section 4, we define the finite-time power estimation and the power constraint-based fault-detection criterion. Section 5 introduces the proposed fault-identification mechanism. In Section 6, we demonstrate the use of both the fault-detection and fault-identification mechanisms based on a simulation example. Finally, in Section 7, we summarize the present work and possible future research avenues.

2. Preliminaries

2.1. Plant, Channel, and Network Models

We next give the descriptions of the plant, channel, and network models under study.

Plant Model: The plant model, G(z), can be described by a general model given by (1)G(z)=G[sub.s](z)Kp/z-? where K[sub.p]?R[sup.+], ?>1, and G[sub.s](z) is a stable, minimum-phase transfer function (i.e., all its poles and zeros are inside the unit circle).

Channel Models: The AWGN channel model is described by a channel input power constraint, P, and an identically independently distributed additive Gaussian noise process, n, with zero mean and variance, s[sup.2].

Network Model: We define the network as two AWGN channel models with an encoder and decoders, one of which is on the direct path between the controller and the plant models and one of which is on the feedback path between the plant and the controller models; see Figure 2. Depending on the channel location, we identify the additive noises as n[sub.u] and n[sub.y], both of which are identically independently distributed additive Gaussian noise processes with zero means and variances, s[sub.nu][sup.2] and s[sub.ny][sup.2], respectively. Finally, the powers of the channel input signals are denoted as ?u?[sub.Pow][sup.2] and ?y?[sub.Pow][sup.2].

Furthermore, the setpoint signal, r[sub.o], in Figure 2 is assumed to be a constant known value.

Remark1.

The decision to use AWGN channel models to characterize the proposed network model implies that we are considering the channel input constraints and the channel additive noises as the main network features. Other network features, such as transmission delays, quantization, and packet losses, can also be considered, but this would require the use of channel models in addition to the proposed AWGN channel model and would make the characterization of the differential entropy of the control signal, u(k), which is the basis of the proposed fault-detection mechanism, more involved due to the effect of the closed loop.

2.2. Stationary Power of a Linear Time-Invariant System Output Signal

Definition1.

From [33], we denote the power spectral density of a signal s(k) as Ssej?Ts.

Definition2.

The H2 norm of a discrete-time linear time-invariant system H is defined as (2)? H ?[sub.2]=[square root of 1/2 p?[sub.- p][sup.p]| H ( e j ? T s ) |[sup.2]d?]

Lemma1

(Stationary power of an LTI system output signal).For a discrete-time linear time-invariant system H with a weakly stationary stochastic process n(k) at the input, mean µn, and spectral density (3)S[sub.n](e[sup.j?Ts])=s[sub.n][sup.2]the variance of the noise can be determined. Ref. [34] shows that if H is stable (here, it is assumed to be stable if all its poles are inside the unit circle), then (4)µ[sub.s]=H(1)µ[sub.n]S[sub.s](e[sup.j?Ts])=H(e[sup.j?Ts])H(e[sup.-j?Ts])S[sub.n](e[sup.j?Ts]) and the steady-state power of the output signal is then (5)?s?[sub.Pow][sup.2]:=limk?8E{s[sup.2]}=H[sup.2](1)µ[sub.n][sup.2]+1/2p?[sub.-p][sup.p]S[sub.s](e[sup.j?Ts])d? =H[sup.2](1)µ[sub.n][sup.2]+?H?[sub.2][sup.2]s[sub.n][sup.2]

Proof.

Since n(k) is a weakly stationary stochastic process and H is stable, s is also a weakly stationary stochastic process. If we define s=µ[sub.s]+s¯, where s¯ is a weakly stationary stochastic process with zero mean, then we have E{s[sup.2]}=µ[sub.s][sup.2]+E{s¯[sup.2]}

Since, by its definition, the covariance function of s¯ is equal to the covariance function of s, and because the power spectral density is the Fourier transform of the covariance function, we have that S[sub.s](e[sup.j?Ts])=S[sub.s¯](e[sup.j?Ts]). As we take the limit k?8, we obtain ?s?[sub.Pow][sup.2]=µ[sub.s][sup.2]+?s¯?[sub.Pow][sup.2]

From [34], we have (4), which, when replaced with the above expression, yields (5), which concludes this proof. ?

In the next section, we use the introduced assumptions and Lemma 1 to propose the design of the NCS control loop in Figure 2.

3. Networked Control System Design

We start this section with the following lemma, which references a result from [35]; from this lemma, we begin to construct our optimal controller design proposal.

Lemma2

(sum of convex functions).Let fi,i=1,?,n be given convex functions and ?i be given positive scalars. Then, the function (6)F=?[sub.1]f[sub.1]+?+?[sub.n]f[sub.n]is also a convex function.

Proof.

See [35]. ?

We continue by establishing the working choices for the encoder and decoder blocks in Figure 2. The presence of these blocks is intrinsic to the NCS setup, and it is one of the reasons these types of systems require an extension, not just an application, of classic control theory results.

Lemma3

(Encoder and decoder design).The encoder and decoder blocks in Figure 2 for the subsequent NCS design are selected as (7)E[sub.u]=1, D[sub.u]=G[sub.s][sup.-1](z),E[sub.y]=1, D[sub.y]=1 where Gs(z) is the stable, minimum-phase part of the proposed plant model; see Section 2.1.

Remark2.

We observe that, by using Lemma 3 in Figure 2, we can focus entirely on the first-order unstable part of the plant model.

In the next lemma, we introduce some intermediate results that consider the controller, C(z), to be a proportional controller; that is, C(z)=K[sub.c] for K[sub.c]?R, which will be required for the optimal controller design K[sub.c][sup.*].

Lemma4

(Convexity of closed-loop squared norms).The following squared H2 norms are convex functions of Kc, the proportional controller: (8)?T?[sub.2][sup.2]=Kc2Kp2/1-?-KcKp2?SC?[sub.2][sup.2]=K[sub.c][sup.2]+Kc4Kp2/1-?-KcKp2?SG?[sub.2][sup.2]=Kp2/1-?-KcKp2 where T=KcKp/(z-?+KcKp) is the closed-loop complementary sensitivity and S=1-T=(z-?)/(z-?+KcKp) is the closed-loop sensitivity.

Proof.

We start this proof with the squared H[sub.2] norm of T. For a proportional controller and the simplified plant model, K[sub.p]/(z-?), the complementary sensitivity is T(z)=KcKp/z-?+KcKp

The squared H[sub.2] norm of the above transfer function is then ?T?[sub.2][sup.2]=Kc2Kp2/1-(?-KcKp)2

To obtain its critical points, we take the derivative of K[sub.c] and solve ??T?22/?Kc=2KcKp2(1-(1-KcKp))2-2Kc2Kp3(?-KcKp)/(1-(1-KcKp)2)2=0

After grouping the powers of K[sub.c] in the numerator, we obtain ??T?22/?Kc=2KcKp2(1-?2)+2Kc2Kp3?/(1-(1-KcKp)2)2=0

One critical point is K[sub.c]=0, but this solution is outside the region of K[sub.c] values that ensures closed-loop stability and is thus not considered. The other critical point is K[sub.c][sup.*]=(?[sup.2]-1)/(K[sub.p]?). The second derivative is ?2?T?22?Kc2[sub.Kc=Kc*]=(2Kp(1-?2)+4Kc*Kp3?)(1-(1-Kc*Kp)2)+0/(1-(1-Kc*Kp)2)3=2Kp2?2/(?2-1)2>0

Thus, K[sub.c][sup.*], the only valid critical point, is a minimum, proving that ?T?[sub.2][sup.2] is a convex function. Now, for ?SC?[sub.2][sup.2], we have that ?SC?[sub.2][sup.2]=?(1-T)Kc?[sub.2][sup.2]=?Kc-TKc?[sub.2][sup.2]=K[sub.c][sup.2]+K[sub.c][sup.2]?T?[sub.2][sup.2]

Thus, since K[sub.c][sup.2] is a convex function of K[sub.c], we focus on the remaining part, K[sub.c][sup.2]?T?[sub.2][sup.2]: ?Kc2?T?22/?Kc=-2Kc5Kp4+6Kc4Kp3?+4Kc3Kp2(1-?2)/(1-(?-KcKp)2)2=0

The value K[sub.c]=0 is a critical point with a multiplicity of three, but again, it is outside the range of values required for closed-loop stability for K[sub.c]. The other two potential solutions are K[sub.c1][sup.*]=?+?2-?2+8/Kp, K[sub.c2][sup.*]=?+?2+?2+8/Kp but we observe that K[sub.c2][sup.*] is outside the stability region. The second derivative at K[sub.c]=K[sub.c1] yields ?2Kc2?T?22?Kc2[sub.Kc=Kc1*]=-10(Kc1*)4Kp4+24(Kc1*)3Kp3?+12(Kc1*)2Kp2(1-?2)(1-(?-Kc1*Kp)2)/(1-(?-Kc1*Kp)2)3

Simplifying, we obtain 3?/2Kp>K[sub.c1][sup.*]-2K[sub.c1][sup.*]K[sub.p]+3?>0-2(Kc1*)[sup.2]K[sub.p][sup.2]+3K[sub.c1][sup.*]K[sub.p]?>0-2(Kc1*)[sup.2]K[sub.p][sup.2]+3K[sub.c1][sup.*]K[sub.p]?+3[-(Kc1*)[sup.2]K[sub.p][sup.2]+3K[sub.c1][sup.*]K[sub.p]?+2(1-?[sup.2])?=0]>0-5(Kc1*)[sup.2]K[sub.p][sup.2]+12K[sub.c1][sup.*]K[sub.p]?+6(1-?[sup.2])>0-10(Kc1*)[sup.2]K[sub.p][sup.2]+24K[sub.c1][sup.*]K[sub.p]?+12(1-?[sup.2])>0

Therefore, we determine that the numerator and thus the overall second partial derivative ?[sup.2]K[sub.c][sup.2]?T?[sub.2][sup.2]/?K[sub.c][sup.2] at K[sub.c]=K[sub.c1][sup.*] are positive and that the only critical point value, K[sub.c1][sup.*], is a minimum, which proves that K[sub.c][sup.2]?T?[sub.2][sup.2] is a convex function of K[sub.c] in the stability region; through Lemma 2, ?SC?[sub.2][sup.2] is also a convex function of K[sub.c] in the stability region. Finally, we focus on the term ?SG?[sub.2][sup.2]. For the last squared H[sub.2] norm expression, ?SG?[sub.2][sup.2], we have ??SG?22/?Kc=-Kp3(?-KcKp)/(1-(?-KcKp)2)2=0

The only critical point in this case is given by K[sub.c][sup.*]=?/K[sub.p], which lies inside the K[sub.c] stability region for the closed loop; when replaced in the second partial derivative, it results in ?2?SG?22?Kc2[sub.Kc=Kc*]=2K[sub.p][sup.4]>0

Thus, the critical point, K[sub.c][sup.*], is a minimum, and the function ?SG?[sub.2][sup.2] is convex in the K[sub.c] stability region for the closed loop; this concludes the proof. ?

We next use the results just obtained to show the convexity, in terms of the proportional controller, of the power expression for the NCS input signals u and y; see Figure 2.

Lemma5

(Channel input powers).For the setup depicted in Figure 2 with Kr=T-1(1), the channel input powers are (9)?u?[sub.Pow][sup.2]=(1-?)2/Kp2r[sub.o][sup.2]+?T?[sub.2][sup.2]s[sub.nu][sup.2]+?SC?[sub.2][sup.2]s[sub.ny][sup.2]?y?[sub.Pow][sup.2]=r[sub.o][sup.2]+?SG?[sub.2][sup.2]s[sub.nu][sup.2]+?T?[sub.2][sup.2]s[sub.ny][sup.2]and they are both convex functions of Kc, the proportional controller.

We are now ready to use all the previous intermediate results to present the optimal design of the proportional controller, which minimizes the sum of the channel input powers.

Proof.

According to Figure 2 and Lemma 3, the signals at the respective channel inputs are u=z-?/Kpr[sub.o]-T(z)n[sub.u]-S(z)C(z)n[sub.y]y=r[sub.o]+S(z)G(z)n[sub.u]-T(z)n[sub.y]

We then apply Lemma 1 for z=u and for z=y and obtain the expressions in Equation (9). Finally, since all the squared H[sub.2] elements of Equation (9) are convex functions of K[sub.c] as in Lemma 4, together with Lemma 2, it is shown that the channel input powers in Equation (9) are convex functions of K[sub.c], which concludes this proof. ?

Theorem1

(NCS controller design).The proportional controller, Kc, is designed so that (10)K[sub.c][sup.*]=argminK[sub.c] ??u?[sub.Pow][sup.2]+(1-?)?y?[sub.Pow][sup.2]with 0<?<1, and its optimal value is the unique solution, in the Kc stability region (?-1)/Kp,(?+1)/Kp for the closed loop, of the following polynomial: (11)a[sub.4]K[sub.c][sup.4]+a[sub.3]K[sub.c][sup.3]+a[sub.2]K[sub.c][sup.2]+a[sub.1]K[sub.c]+a[sub.0]=0 a[sub.4]=-2K[sub.p][sup.3]?a[sub.3]=9K[sub.p][sup.2]?[sup.2]?s[sub.ny][sup.2]a[sub.2]=2K[sub.p][sup.3]??s[sub.nu][sup.2]+[2K[sub.p][sup.3]?(1-?)+(8K[sub.p]?-8K[sub.p]?[sup.3])?]s[sub.ny][sup.2]a[sub.1]=2K[sub.p][sup.2][(1-?[sup.2])?+K[sub.p][sup.2](1-?)]s[sub.nu][sup.2]+2[K[sub.p][sup.2](1-?[sup.2])(1-?)+(1-?2)[sup.2]?]s[sub.ny][sup.2]a[sub.0]=-2K[sub.p][sup.3]?(1-?)s[sub.nu][sup.2]

Proof.

From Lemma 5, we have that ??u?[sub.Pow][sup.2]+(1-?)?y?[sub.Pow][sup.2]=?[(1-?)2/Kp2r[sub.o][sup.2]+?T?[sub.2][sup.2]s[sub.nu][sup.2]+?SC?[sub.2][sup.2]s[sub.ny][sup.2]]+ (1-?)[r[sub.o][sup.2]+?SG?[sub.2][sup.2]s[sub.nu][sup.2]+?T?[sub.2][sup.2]s[sub.ny][sup.2]]

According to Lemma 2, this is a convex function of K[sub.c], thus characterizing the critical point of the above functional results in obtaining the optimal K[sub.c][sup.*] that minimizes the linear combination of channel input powers. We then take the partial derivative of K[sub.c], which results in the polynomial a[sub.4]K[sub.c][sup.4]+a[sub.3]K[sub.c][sup.3]+a[sub.2]K[sub.c][sup.2]+a[sub.1]K[sub.c]+a[sub.0]=0, with coefficients defined as in (11). Since the proposed functional is convex in K[sub.c], there is only one critical point in the K[sub.c] stability region for the closed loop, which concludes this proof. ?

Remark3.

If the plant pole ? (see (1)) is stable, that is, if |?|<1, then the minimal channel input powers ?u?Pow2 and ?y?Pow2 will be zero, and the optimal controller Kc* from Theorem 1 will also then be equal to zero, nevertheless resulting in a stable closed loop (although it is technically open if the controller is zero). The fault-detection and fault-identification mechanisms described in the next sections will be applicable as long as a non-zero suboptimal controller is in place for ?<1 to effectively close the loop.

Remark4.

Due to the standing assumptions regarding ro, the choice of Kr in Figure 2, and the relationship between stationary power and signal variance, we have that the NCS controller design proposed in Theorem 1, which minimizes the network input power, can also be interpreted as a minimal-input-entropy controller design.

The optimal controller design from Theorem 1 results in a stable closed loop, and we now wish to extend its analysis to the case with faults on the two main parameters involved in the optimal controller design, namely, the gain, K[sub.p], and the plant unstable pole, ?. We obtain two contributions: a fault-detection mechanism and a fault-identification mechanism. Therefore, we continue by presenting the proposed fault-detection mechanism in the next section.

4. Fault-Detection Mechanism

The signal u is assumed to be available because it is the result of signal processing through the controller, as shown in Figure 1. On the other hand, the availability of the signal y[sub.r] requires the assumption of an added sensor at the output of the AWGN channel over the feedback path. Moreover, due to the presence of the channel additive processes n[sub.u] and n[sub.y], we cannot consider the instant values of the relevant signals u and y[sub.r], as shown in Figure 1, as representative values. We therefore address this issue by using the average estimates of u and y[sub.r] instead, as shown in the next lemma.

Lemma6

(Finite time estimate).The averaged signal is obtained as (12)u[sub.1](k)=?k-L+1ku(k)/L where L satisfies (13)s[sub.u1][sup.2](L)<? for a user-defined tolerance value ?.

Proof.

Lemma 5 shows that µ[sub.u]=limk?8E{u}=Kp/1-?r[sub.o]

In a stationary state, we then have that u[sub.1], as defined in (12), will approach µ[sub.u] as L?8 and s[sub.u1][sup.2](L)?0 since µ[sub.u] is a constant value, which shows that there will always be a suitable finite value of L for any given choice of tolerance ?, which concludes this proof. ?

Remark5.

The use of the previous lemma extends in exactly the same way for signal yr, for which yr1 represents the L average. However, such a signal is only required for the fault-identification mechanism that we propose in the next section.

Remark6.

The application of Lemma 6 is based on a Monte Carlo simulation of the NCS-designed control closed loop in steady state with no faults. The selected value of L, through the choice of ?, will be a user-selected trade-off between the successful rejection of the noise processes (the larger the L value is, the better) and the responsiveness to the presence of faults (the smaller the L value is, the better).

We now present our proposed fault-detection mechanism in the following theorem.

Theorem2

(fault-detection mechanism).Given the setup in Figure 2 for the NCS defined by Lemma 3, with the controller designed as in Theorem 1, the fault flag signal, FF(k), is defined as (14)FF(k)={1,|h^(u)-h(u)|>d0,|h^(u)-h(u)|=d where (15)h^(u)=1/2log[sub.2][2pe(u[sub.2]-u[sub.1][sup.2])] is the estimated differential entropy of the signal u(k), with the time estimate u1 defined in Lemma 6 and u2 defined as (16)u[sub.2](k)=?k-L+1ku2(k)/L

Additionally, (17)h(u)=1/2log[sub.2][2pe(? T ?[sub.2][sup.2]s[sub.n u][sup.2]+? S C ?[sub.2][sup.2]s[sub.n y][sup.2])] is the theoretical differential entropy of the signal u(k) in the steady state when no fault is present. The fault level, d, is user defined, and it is selected as 2sh^, which is twice the standard deviation of the estimated differential entropy of u(k) when no fault is present.

Proof.

From [36] and the fact that the signal u(k) in Figure 2 is a filtered sum of the driving Gaussian processes n[sub.u] and n[sub.y], we have h(u)=1/2log[sub.2][2pes[sub.u][sup.2]] where s[sub.u][sup.2] is the variance of the signal u. From Lemma 5, we have s[sub.u][sup.2]=E{u[sup.2]}-µ[sub.u][sup.2]=?T?[sub.2][sup.2]s[sub.nu][sup.2]+?SC?[sub.2][sup.2]s[sub.ny][sup.2] which results in the proposed expression for h(u) presented in (17). ?

Remark7.

We observe that the selection of d in Theorem 2 is a compromise between false negative errors (not detecting a fault when one is present) and false positive errors (detecting a fault when one is not present). If the selected d value is smaller, then more false positive errors will be detected. If the selected d value is greater, then more false negative errors will be detected.

Remark8.

The use of differential entropy for the proposed fault-detection mechanism is motivated by the presence of the AWGN channel and is also a reasonable choice because it introduces a logarithmic scale (base 2 in this case) for the channel input variance, which can otherwise report very large excursions when subjected to faults, as we will observe in the following sections. Moreover, if we select ?=1 in Theorem 1 for the NCS controller design, we can then address the minimal h(u) in (17).

After a fault has been detected by means of Theorem 2, the next step is to estimate its value, that is, to identify it. The next section focuses on this goal.

5. Fault-Identification Mechanism

The faults that the control loop might be subject to are involved in the plant model gain, K[sub.p], or the unstable pole ?. Additionally, due to the NCS nature of the proposed closed control loop in Figure 2, for the fault-identification mechanism we only stipulate that we have access to the signals u and y[sub.r]. That is, we only stipulate access to signals on the controller side of the network (otherwise, transmission through a communication channel would be required); see Figure 1.

As a first step in identifying the detected faults, as described in the previous section, we consider the online estimation of the plant parameters K[sub.p] and ?.

Lemma7

(Plant parameter estimation).From Figure 1, assuming the online availability of signals u(k) and yr(k) and a selected value of L from Lemma 6, we obtain (18)a(k)=yr1(k)/Krroß(k)=u2(k)-u1(k)2-(Kc*)2sny2/(snu2+(Kc*)2sny2)a(k) and the plant parameter estimates are (19)K^[sub.p](k)=2a(k)ß(k)/Kc*a2(k)+ß(k) ?^(k)=1+2ß(k)a(k)-1/a2(k)+ß(k)

Proof.

We first observe that y[sub.r1](k)˜T(1)K[sub.r]r[sub.o] where y[sub.r1](k) is the L-length finite-time estimation of the steady-state value of y[sub.r]. From this, we obtain a(k)=yr1(k)/Krro

On the other hand, we have u2(k)-u12(k)-(Kc*)2sny2/snu2+(Kc*)2sny2˜?T?[sub.2][sup.2] and thus u2(k)-u12(k)-(Kc*)2sny2/snu2+(Kc*)2sny2˜(Kc2)Kp2/1-?c2=a(k)ß(k)

With these two intermediate results, after algebraic manipulation we obtain the estimate expressions in (19), which concludes this proof. ?

We now use Lemma 7, together with the fault-detection mechanism from the previous section, to identify the fault. We provide this result in the next theorem.

Theorem3

(fault-identification mechanism).The values of the plant fault parameters are identified as F[sub.Kp](k)={K^[sub.p](k),|K[sub.p]-K^[sub.p](k)|=2s[sub.Kp]?FF=1K[sub.p],|K[sub.p]-K^[sub.p](k)|<2s[sub.Kp]?FF=1K[sub.p],FF=0 for the plant parameter, Kp, where sKp is the standard deviation of the plant gain estimation when no fault is present and F[sub.?](k)={?^(k),|?-?^(k)|=2s[sub.?]?FF=1?,|?-?^(k)|<2s[sub.?]?FF=1?,FF=0 for the plant parameter ?, where s? is the standard deviation of the unstable plant pole estimation when no fault is present.

Proof.

Fault identification is the result of intersecting the estimated plant parameters K^[sub.p] and rho^ from Lemma 7 with the fault flag signal FF(k) from Theorem 2. Whether the fault is due to K[sub.p], ?, or a change in the values of both K[sub.p] and ?, the type of fault will be identified as long as the excursion in the value of the faulty parameter exceeds twice the standard deviation of the estimated parameter value when no fault is present. That is, we use the same approach proposed in Theorem 2, but now we validate the fault on either or both plant parameters. ?

We have now finalized the theoretical development of this work, and we proceed in the next section to illustrate the proposed contributions through a simulation example summarizing all the previous key points.

6. Example

In this section, we develop an example to illustrate the contributions developed in the previous sections. We consider the plant model (20)G(z)=2/z-3

That is, we assume for simplicity here, without loss of generality, that G[sub.s](z)=1. The setpoint signal is r[sub.o]=0.5, and the channel additive noise variances are selected as s[sub.nu][sup.2]=s[sub.ny][sup.2]=0.3. The NCS proportional controller design from Theorem 1, with an equal weight ?=0.5 to equally weight the power contribution of each channel input, results in K[sub.c][sup.*]=1.2921. The plant model parameters, and thus the closed control loop, are subject to the following changes for K[sub.p]:(21)K[sub.pf1]={-0.3·10[sup.-3]k+3.55001=k<60001.76001=k<110000.3·10[sup.-3]k-1.611001=k<12000K[sub.pf2]={0.7·10[sup.-3]k-18.329001=k<300002.730001=k<35000-0.7·10[sup.-3]k+27.235001=k<36000

For ?, (22)?[sub.f1]={-1.2·10[sup.-3]k+23.417001=k<180001.818001=k<230001.2·10[sup.-3]k-25.823001=k<24000?[sub.f2]={10[sup.-3]k-2629001=k<30000430001=k<35000-10[sup.-3]k+3935001=k<36000

We then propose a first fault on the value of K[sub.p] starting at k=5001 and lasting until k= 12,000, a second fault due to ? starting at k= 17,001 and lasting until k= 24,000, and a third and final fault due to a simultaneous change in the values of K[sub.p] and ? starting at k= 29,001 and ending at k= 36,000.

The first step is the selection of L as a compromise between the rejection of the two noise processes and responsiveness to the faults. In Figure 3, we show a Monte Carlo simulation of two hundred simulations of u[sub.1] at k[sub.o]=3000 for each value of L, in steps of ten. The red dashed line is the steady-state predicted value, µ[sub.u], and the black dash-dotted lines are the variances of the two hundred simulations at each value of L around the mean value. As predicted, the variance decreases as L increases. From Figure 3, the choice of L=300 is considered a good compromise, and it is the value used in the following steps. The proposed selection is compatible with a tolerance value of ?=0.04.

As a second step, focusing on Theorem 2, we provide the estimate h^(u) (solid green line) and propose from the same figure a choice of d that is twice the standard deviation of the observed h^(u), which in this case amounts to d=0.12. Therefore, any increase in the estimated differential entropy, u^, of more than 0.12 from the base value, h(u), represented by the red dashed line in Figure 4, is registered as a fault.

We now test the proposed fault-detection mechanism for the designed NCS closed control loop, with the faults described in (21) and (22). In Figure 5, the three proposed faults can be clearly observed. With the selected value of d, there will be small instances of false negative errors for K[sub.pf1] around k=8600 and for ?[sub.f1] around k= 19,600. However, no false negative errors are present for simultaneous faults K[sub.pf2] and ?[sub.f2]. The choice of d also triggers some instances of false positive errors around k=1000, k= 16,000, k= 25,000, and k= 39,000. This is the expected trade-off between false positive errors and false negative errors for any fault-detection mechanism.

The next step is to couple the fault-detection mechanism of Theorem 2 with the fault-identification mechanism from Theorem 3. The result for K[sub.p], subject to the proposed faults, is shown in Figure 6. We observe that the inclusion of further discrimination by means of the estimated standard deviation s[sub.Kp], represented by the black dashed line, reduces the effect of false negative errors and false positive errors. Moreover, during the second fault, starting at k= 17,001, which is due only to a change in ?, the introduction of the s[sub.Kp]-based discriminant in Theorem 3 allows the plant model gain to remain at the correct value, K[sub.p]=2.

We conclude the example by reviewing the estimation of the unstable plant pole value, ?, subject to the faults in Figure 7 (green solid line). As we can see, the introduction of the standard deviation discriminant, s[sub.?], was not as successful as for the plant model gain in avoiding a noisy estimation during the first fault starting at k=5001, even though this first fault is only due to a change in the value of k[sub.p]. Moreover, during the second fault, due only to a change in the value of the unstable plant pole, a false negative error is still present in the proposed identification at approximately k= 20,000. Nevertheless, some instances of false negative errors were suppressed between the first and second faults and at the end of the simulation run.

Finally, we observe that Figure 6 and Figure 7 together demonstrate accurate detection and identification of the faults we introduced into the closed control loop.

7. Conclusions

In this work, we propose an optimal NCS design subject to a network of simultaneous power-constrained AWGN channels over direct and feedback paths. The optimal controller design is then the foundation of a differential entropy estimation fault-detection mechanism. The use of differential entropy is justified by the presence of the AWGN channel and is also reasonable since it introduces a logarithmic scale on the channel over the direct-path input variance, which can otherwise result in very large excursions when subjected to faults, as observed in the provided example. The last contribution is a fault-identification mechanism restricted to the signals available on the controller side of the network, namely, u and y[sub.r]. A limitation of the proposed fault-detection method is the trade-off imposed by the choice of L. The smaller the value of L is, the larger the value of d is because of u[sub.1] and u[sub.2], and vice versa. Since the value of d determines the sensitivity of the fault-detection mechanism, an experienced user must strike the right compromise between these two design parameters. Additionally, as a future research direction, the imposed side restriction signal availability, due to the NCS nature of the closed control loop, can be explored to improve the use of signals on the plant side of the network in the design of a fault-detection/identification mechanism. Finally, once the faults are successfully identified, they should be used for retuning the optimal controller in an adaptive scheme that allows for fault recovery.

Data Availability Statement

Data is contained within the article.

Conflicts of Interest

The author declares no conflicts of interest.

Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

References

1. W.S.E. Levine, CRC Press: Boca Raton, FL, USA, 1996,

2. B. Du; Q. Xu; J. Zhang; Y. Tang; L. Wang; R. Yuan; Y. Yuan; J. An Periodic Intermittent Adaptive Control with Saturation for Pinning Quasi-Consensus of Heterogeneous Multi-Agent Systems with External Disturbances., 2023, 25, 1266. DOI: https://doi.org/10.3390/e25091266.

3. A. Cetinkaya; H. Ishii; T. Hayakawa An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses., 2019, 21, 210. DOI: https://doi.org/10.3390/e21020210.

4. C. Qin; Y. Wu; J. Zhang; T. Zhu Reinforcement Learning-Based Decentralized Safety Control for Constrained Interconnected Nonlinear Safety-Critical Systems., 2023, 25, 1158. DOI: https://doi.org/10.3390/e25081158. PMID: https://www.ncbi.nlm.nih.gov/pubmed/37628188.

5. Y. Zhang; Y. Jia; T. Chai; D. Wang; W. Dai; J. Fu Data-Driven PID Controller and Its Application to Pulp Neutralization Process., 2018, 26,pp. 828-841. DOI: https://doi.org/10.1109/TCST.2017.2695981.

6. G. Nair; R. Evans Stabilizability of stochastic linear systems with finite feedback data rates., 2004, 43,pp. 413-436. DOI: https://doi.org/10.1137/S0363012902402116.

7. N. Martins; M. Dahleh Feedback Control in the Presence of Noisy Channels: “Bode-Like” Fundamental Limitations of Performance., 2008, 53,pp. 1604-1615. DOI: https://doi.org/10.1109/TAC.2008.929361.

8. N. Elia When Bode Meets Shannon: Control Oriented Feedback Communication Schemes., 2004, 49,pp. 1477-1488. DOI: https://doi.org/10.1109/TAC.2004.834119.

9. J. Braslavsky; R. Middleton; J. Freudenberg Feedback Stabilisation over Signal-to-Noise Ratio Constrained Channels., 2007, 52,pp. 1391-1403. DOI: https://doi.org/10.1109/TAC.2007.902739.

10. A. Rojas Signal-to-noise ratio fundamental limitations in the discrete-time domain., 2012, 61,pp. 55-61. DOI: https://doi.org/10.1016/j.sysconle.2011.09.010.

11. J. da Silva; W. Lages; D. Sbarbaro Event-triggered PI control design.,pp. 6947-6952.

12. D.U. Campos-Delgado; A.J. Rojas; J.M. Luna-Rivera; C.A. Gutiérrez Event-triggered feedback for power allocation in wireless networks., 2015, 9,pp. 2066-2074. DOI: https://doi.org/10.1049/iet-cta.2014.1266.

13. Y. Ma; C. Gu; Y. Liu; L. Yu; W. Tang Event-Triggered Bounded Consensus Tracking for Second-Order Nonlinear Multi-Agent Systems with Uncertainties., 2023, 25, 1335. DOI: https://doi.org/10.3390/e25091335.

14. J. Zhao; Y. Wang; P. Gao; S. Li; Y. Peng Synchronization of Complex Dynamical Networks with Stochastic Links Dynamics., 2023, 25, 1457. DOI: https://doi.org/10.3390/e25101457. PMID: https://www.ncbi.nlm.nih.gov/pubmed/37895577.

15. J. Gertler, Marcel Dekker: New York, NY, USA, 1998,

16. J. Chen; R.J. Patton, Kluwer Academic Publishers: London, UK, 1999,

17. M. Blanke; M. Kinnaert; J. Lunze; M. Staroswiecki, Springer: Berlin, Germany, 2003,

18. A. Saberi; A.A. Stoorvogel; P. Sannuti, Birkhauser: Basel, Switzerland, 2007,

19. A. Varga, Springer: Berlin/Heidelberg, Germany, 2017,. Studies in Systems, Decision and Control

20. S.X. Ding; P.M. Frank; E.L. Ding; T. Jeinsch A unified approach to the optimizaton of fault detection systems., 2000, 14,pp. 725-745. DOI: https://doi.org/10.1002/1099-1115(200011)14:7<725::AID-ACS618>3.0.CO;2-Q.

21. A. Saberi; A.A. Stoorvogel; P. Sannuti; H. Niemann Fundamental problems in fault detection and identification., 2000, 10,pp. 1209-1236. DOI: https://doi.org/10.1002/1099-1239(20001215)10:14<1209::AID-RNC524>3.0.CO;2-C.

22. Z. Gao; C. Cecati; S.X. Ding A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part I: Fault Diagnosis with Model-Based and Signal-Based Approaches., 2015, 62,pp. 3757-3767. DOI: https://doi.org/10.1109/TIE.2015.2417501.

23. Z. Gao; C. Cecati; S.X. Ding A Survey of Fault Diagnosis and Fault-Tolerant Techniques—Part II: Fault Diagnosis with Knowledge-Based and Hybrid/Active Approaches., 2015, 62,pp. 3768-3774. DOI: https://doi.org/10.1109/TIE.2015.2417501.

24. S. Ding A survey of fault-tolerant networked control system design.,pp. 874-885.

25. C. Aubrun; D. Sauter; J. Yame Fault diagnosis of networked control systems., 2008, 18,pp. 525-537. DOI: https://doi.org/10.2478/v10006-008-0046-3.

26. W. Ren; S. Sun; N. Hou; C. Kang Event-triggered non-fragile h infinity fault detection for discrete time-delayed nonlinear systems with channel fadings., 2018, 355,pp. 436-457. DOI: https://doi.org/10.1016/j.jfranklin.2017.11.015.

27. Y. Lami; L. Lefevre; A. Lagreze; D. Genon-Catalot A Bayesian Approach for Fault Diagnosis in an Irrigation Canal.,pp. 328-335.

28. W. Li; Z. Zhu; X. Ding On Fault Detection Design of Networked Control Systems.,pp. 792-797.

29. M. Bahreini; J. Zarei Robust fault-tolerant control for networked control systems subject to random delays via static-output feedback., 2019, 86,pp. 153-162. DOI: https://doi.org/10.1016/j.isatra.2018.10.034.

30. K. Schenk; J. Lunze Fault-Tolerant Task Allocation in Networked Control Systems.,pp. 313-318.

31. B. Wang; B. Zhang; R. Su Optimal Tracking Cooperative Control for Cyber-Physical Systems: Dynamic Fault-Tolerant Control and Resilient Management., 2021, 17,pp. 158-167. DOI: https://doi.org/10.1109/TII.2020.2965538.

32. T. Wang; H. Gao; J. Qiu A Combined Fault-Tolerant and Predictive Control for Network-Based Industrial Processes., 2016, 63,pp. 2529-2536. DOI: https://doi.org/10.1109/TIE.2016.2515073.

33. A. Rojas; J. Braslavsky; R. Middleton Fundamental limitations in control over a communication channel., 2008, 12,pp. 3147-3151. DOI: https://doi.org/10.1016/j.automatica.2008.05.014.

34. K. Åström, Academic Press: Cambridge, MA, USA, 1970,

35. D.P. Bertesekas, Athena Scientific: Nashua, NH, USA, 2009,

36. T. Cover; J. Thomas, John Wiley & Sons: Hoboken, NJ, USA, 1991,

Figures

Figure 1: NCS SISO feedback loop with residual generator and fault-detection stages. [Please download the PDF to view the image]

Figure 2: NCS SISO feedback loop with an AWGN network. [Please download the PDF to view the image]

Figure 3: Monte Carlo simulation of u[sub.1](k[sub.o]) as a function of L for k[sub.o]=3000 (blue dots), predicted mean value µ[sub.u] (red dashed line), and variance of u[sub.1](k[sub.o]) as a function of L (black dash-dotted line). [Please download the PDF to view the image]

Figure 4: Estimated differential entropy of the signal u(k), when no faults are present, for the selected value of L=300 (green solid line), no-fault theoretical value (red dashed line), and no-fault theoretical value plus two standard deviations (black dash-dotted lines). [Please download the PDF to view the image]

Figure 5: Estimated differential entropy of the signal u(k), when faults in (21) and (22) are present, for the selected value of L=300 (green solid line), no-fault theoretical value (red dashed line), and no-fault theoretical value plus two standard deviations (black dash-dotted lines). [Please download the PDF to view the image]

Figure 6: Estimated value of the plant gain parameter K[sub.p] for the selected value of L=300 (green solid line), true parameter value (red dashed line), standard deviation s[sub.kp] (black dash-dotted line), and reported fault flag (black solid line at the bottom). [Please download the PDF to view the image]

Figure 7: Estimated value of the plant gain parameter, ?, for the selected value of L=300 (green solid line), true parameter value (red dashed line), standard deviation s[sub.?] (black dash-dotted line), and reported fault flag (black solid line at the bottom). [Please download the PDF to view the image]

Author Affiliation(s):

Departamento de Ingeniería Eléctrica, Universidad de Concepción, Concepción 4070409, Chile; [emailprotected]

DOI: 10.3390/e26030259

COPYRIGHT 2024 MDPI AG
No portion of this article can be reproduced without the express written permission from the copyright holder.

Copyright 2024 Gale, Cengage Learning. All rights reserved.


Differential Entropy-Based Fault-Detection Mechanism for Power-Constrained Networked Control Systems. (2024)
Top Articles
Latest Posts
Article information

Author: Tuan Roob DDS

Last Updated:

Views: 5643

Rating: 4.1 / 5 (42 voted)

Reviews: 81% of readers found this page helpful

Author information

Name: Tuan Roob DDS

Birthday: 1999-11-20

Address: Suite 592 642 Pfannerstill Island, South Keila, LA 74970-3076

Phone: +9617721773649

Job: Marketing Producer

Hobby: Skydiving, Flag Football, Knitting, Running, Lego building, Hunting, Juggling

Introduction: My name is Tuan Roob DDS, I am a friendly, good, energetic, faithful, fantastic, gentle, enchanting person who loves writing and wants to share my knowledge and understanding with you.