Resilient Output Formation-Tracking of Heterogeneous Multi-Agent Systems Against Composite Attacks: A Fully-Distributed Event-Triggered Framework

被引:4
作者
Gong, Xin [1 ]
Yu, Tao [2 ,3 ]
Wen, Guanghui [4 ]
Feng, Zhiguang [5 ]
Huang, Tingwen [6 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Cyber & Sci Engn, Nanjing 210096, Peoples R China
[3] Univ Calif Riverside, Dept Elect & Comp Engn, Riverside, CA 92521 USA
[4] Southeast Univ, Dept Syst Sci, Sch Math, Nanjing 211189, Peoples R China
[5] Harbin Engn Univ, Coll Automat, Harbin 150009, Peoples R China
[6] Shenzhen Univ Adv Technol, Fac Comp Sci & Control Engn, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Event detection; Protocols; Electronic mail; Topology; Digital twins; Decentralized control; Symmetric matrices; Resilience; Optimization; Multi-agent systems; Composite attacks; fully-distributed event-triggered protocol; heterogeneous agent dynamics; resilient formation-tracking; MICROGRIDS; PROTOCOLS;
D O I
10.1109/TCSI.2024.3519726
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study investigates the problem of designing countermeasures for resilient output time-varying formation-tracking of multi-agent systems (MASs) in a composite hazardous scenario consisting of various kinds of attacks, such as actuation attacks and denial-of-service (DoS) attacks. Combined with the digital twins concept, the above problem is decoupled into a DoS attack defense scheme on the Digital Twins Layer (DTL) and an actuation attack defense scheme on the Cyber-Physical Layer (CPL) by introducing a DTL with higher security and privacy. On the DTL, a novel Zeno-free event-triggered protocol with sampling state information, equipped with the backup topology countermeasure, is used to suppress the threat of DoS attacks. Note that the resilient protocol against DoS attacks is fully-distributed, which does not need prior knowledge of network algebraic connectivity and thus possesses sufficient scalability to large-scale networks. Moreover, the event-triggered mechanism can completely avoid Zeno phenomena by introducing a strict lower bound for the time interval between cascading triggered events. On the CPL, this study introduces a decentralized, adaptive, and resilient control strategy to address actuation attacks exhibiting exponentially unbounded destructiveness. It is proven that all followers can reach uniformly ultimately bounded convergence by the proposed two-layered control protocols. The effectiveness and resilience of the proposed algorithm are validated through a numerical simulation example.
引用
收藏
页数:14
相关论文
共 42 条
[1]   Cooperative Data Sensing and Computation Offloading in UAV-Assisted Crowdsensing With Multi-Agent Deep Reinforcement Learning [J].
Cai, Ting ;
Yang, Zhihua ;
Chen, Yufei ;
Chen, Wuhui ;
Zheng, Zibin ;
Yu, Yang ;
Dai, Hong-Ning .
IEEE TRANSACTIONS ON NETWORK SCIENCE AND ENGINEERING, 2022, 9 (05) :3197-3211
[2]   Networked Microgrids for Grid Resilience, Robustness, and Efficiency: A Review [J].
Chen, Bo ;
Wang, Jianhui ;
Lu, Xiaonan ;
Chen, Chen ;
Zhao, Shijia .
IEEE TRANSACTIONS ON SMART GRID, 2021, 12 (01) :18-32
[3]   Distributed Control of Multi-Functional Grid-Tied Inverters for Power Quality Improvement [J].
Chen, Jianbo ;
Yue, Dong ;
Dou, Chunxia ;
Li, Ye ;
Hancke, Gerhard P. ;
Weng, Shengxuan ;
Guerrero, Josep M. ;
Ding, Xiaohua .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS I-REGULAR PAPERS, 2021, 68 (02) :918-928
[4]   Adaptive Event-Triggered Control for Non-Strict Feedback Nonlinear CPSs With Time Delays Against Deception Attacks and Actuator Faults [J].
Chen, Wen-Di ;
Niu, Ben ;
Wang, Huan-Qing ;
Li, Hai-Tao ;
Wang, Ding .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, 21 (03) :4106-4116
[5]   Event-based robust stabilization of uncertain networked control systems under quantization and denial-of-service attacks [J].
Chen, Xiaoli ;
Wang, Youguo ;
Hu, Songlin .
INFORMATION SCIENCES, 2018, 459 :369-386
[6]   Fully Distributed Event-Triggered Protocols for Linear Multiagent Networks [J].
Cheng, Bin ;
Li, Zhongkui .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (04) :1655-1662
[7]  
Chicone Carmen, 2006, Texts in Applied Mathematics, DOI DOI 10.1007/0-387-35794-7
[8]  
De La Torre G, 2014, IEEE DECIS CONTR P, P5367, DOI 10.1109/CDC.2014.7040228
[9]  
De Persis C., 2013, IFAC Proc., V46, P247
[10]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944