Resilient interval observer-based coordination control for multi-agent systems under stealthy attacks

被引:7
作者
Luo, Miaohong [1 ]
Su, Housheng [1 ]
Zeng, Zhigang [1 ]
机构
[1] Huazhong Univ Sci & Technol, Sch Artificial Intelligence & Automat, Image Proc & Intelligent Control Key Lab, Educ Minist China, Luoyu Rd 1037, Wuhan 430074, Peoples R China
基金
中国国家自然科学基金;
关键词
Coordination control; Uncertainty; Stealthy attacks; Interval observer; Multi-agent systems; CONSENSUS; SYNCHRONIZATION; DESIGN;
D O I
10.1016/j.automatica.2024.111781
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, the coordination control problem of multi -agent systems (MASs) subjected to stealthy attacks and uncertainties is considered, where the uncertainties refer to unknown external disturbances and initial states. We consider a scenario in which the sensors are maliciously attacked, rendering the traditional interval observer's bounds ineffective for estimating the system states. By solving the linear programming problem, the maximum destructive attack sequences are generated. A distributed resilient interval observer composed of a resilient framer and a control protocol is designed, in which the construction of control protocol for each agent depends on the framer information of its own and its neighbors. It is demonstrated by the cooperativity theory and the Lyapunov stability theory that the distributed resilient interval observer can not only realize interval -valued state estimation for each agent but also drive the cooperative behavior of MASs. In addition, the observer gain matrix is selected and optimized by solving a semi -definite programming problem to provide tighter bounds for each agent. Meanwhile, the bounds of stealthy attacks are calculated. Finally, through a simulation example, the superiority of the distributed resilient interval observer and the effectiveness of the resilient interval observer -based consensus control algorithms are validated. (c) 2024 Published by Elsevier Ltd.
引用
收藏
页数:10
相关论文
共 33 条
[1]   Optimal Attack Strategies Subject to Detection Constraints Against Cyber-Physical Systems [J].
Chen, Yuan ;
Kar, Soummya ;
Moura, Jose M. F. .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (03) :1157-1168
[2]  
Degue KH, 2018, IEEE DECIS CONTR P, P4559, DOI 10.1109/CDC.2018.8619635
[3]   Stealthy attacks and attack-resilient interval observers? [J].
Degue, Kwassi Holali ;
Le Ny, Jerome ;
Efimov, Denis .
AUTOMATICA, 2022, 146
[4]   Complex network synchronizability: Analysis and control [J].
Duan, Zhisheng ;
Chen, Guanrong ;
Huang, Lin .
PHYSICAL REVIEW E, 2007, 76 (05)
[5]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[6]   Synchronization of discrete-time multi-agent systems on graphs using Riccati design [J].
Hengster-Movric, Kristian ;
You, Keyou ;
Lewis, Frank L. ;
Xie, Lihua .
AUTOMATICA, 2013, 49 (02) :414-423
[7]  
Horn R.A., 1985, Matrix Analysis
[8]  
Isermann R., 2005, FAULT DIAGNOSIS SYST
[9]  
Karafyllis I, 2011, COMMUN CONTROL ENG, P1, DOI 10.1007/978-0-85729-513-2
[10]   Interval observer design and control of uncertain non-homogeneous heat equations [J].
Kharkovskaia, Tatiana ;
Efimov, Denis ;
Fridman, Emilia ;
Polyakov, Andrey ;
Richard, Jean-Pierre .
AUTOMATICA, 2020, 111