*Result*: Disturbance rejection event-triggered robust nonlinear model predictive control for underactuated unmanned surface vehicle against DoS attacks without velocity measurements.

Title:
Disturbance rejection event-triggered robust nonlinear model predictive control for underactuated unmanned surface vehicle against DoS attacks without velocity measurements.
Authors:
Feng, Na1 (AUTHOR) 383740833@qq.com, Wu, Defeng1,2,3 (AUTHOR) defeng@jmu.edu.cn, Yu, Hongliang1,2 (AUTHOR) yu1202@hotmail.com, You, Zheng1,2 (AUTHOR) 202361000023@jmu.edu.cn, Tu, Wanli1,2 (AUTHOR) wanlitu@163.com
Source:
ISA Transactions. Dec2025:Part A, Vol. 167, p194-205. 12p.
Database:
Supplemental Index

*Further Information*

*This paper presents a disturbance rejection event-triggered nonlinear model predictive control (DR-ETNMPC) method for underactuated unmanned surface vehicle (USV) subject to denial-of-service (DoS) attacks and lacking velocity measurements. A nonlinear extended state observer (NESO) is employed to estimate both unknown velocities and lumped disturbances, while a disturbance rejection nonlinear model predictive controller (DRNMPC) is designed to enforce actuator saturation constraints. To reduce computational load of the DRNMPC, an event-triggered mechanism is introduced, and a DoS attack defense mechanism is introduced to guarantee that the USV maintains high-precision tracking performance under DoS attacks. Rigorous analysis is conducted to ensure recursive feasibility and closed-loop stability. Simulation results verify the method's effectiveness and superiority, demonstrating notable improvements in both control precision and computational efficiency. • A disturbance rejection nonlinear model predictive controller (DRNMPC) is proposed, enhancing robustness and practicality for underactuated USV system. • An event-triggered mechanism integrated with DRNMPC effectively reduces computational load. • A resilient control strategy with a DoS defense mechanism mitigates the impact of controller-to-actuator signal interruptions caused by DoS attacks. [ABSTRACT FROM AUTHOR]*