Resilient Output Formation-Tracking of Heterogeneous Multi-Agent Systems Against Composite Attacks: A Fully-Distributed Event-Triggered Framework

被引:4
作者
Gong, Xin [1 ]
Yu, Tao [2 ,3 ]
Wen, Guanghui [4 ]
Feng, Zhiguang [5 ]
Huang, Tingwen [6 ]
机构
[1] Southeast Univ, Sch Cyber Sci & Engn, Nanjing 210096, Peoples R China
[2] Southeast Univ, Sch Cyber & Sci Engn, Nanjing 210096, Peoples R China
[3] Univ Calif Riverside, Dept Elect & Comp Engn, Riverside, CA 92521 USA
[4] Southeast Univ, Dept Syst Sci, Sch Math, Nanjing 211189, Peoples R China
[5] Harbin Engn Univ, Coll Automat, Harbin 150009, Peoples R China
[6] Shenzhen Univ Adv Technol, Fac Comp Sci & Control Engn, Shenzhen 518055, Peoples R China
基金
中国国家自然科学基金;
关键词
Event detection; Protocols; Electronic mail; Topology; Digital twins; Decentralized control; Symmetric matrices; Resilience; Optimization; Multi-agent systems; Composite attacks; fully-distributed event-triggered protocol; heterogeneous agent dynamics; resilient formation-tracking; MICROGRIDS; PROTOCOLS;
D O I
10.1109/TCSI.2024.3519726
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This study investigates the problem of designing countermeasures for resilient output time-varying formation-tracking of multi-agent systems (MASs) in a composite hazardous scenario consisting of various kinds of attacks, such as actuation attacks and denial-of-service (DoS) attacks. Combined with the digital twins concept, the above problem is decoupled into a DoS attack defense scheme on the Digital Twins Layer (DTL) and an actuation attack defense scheme on the Cyber-Physical Layer (CPL) by introducing a DTL with higher security and privacy. On the DTL, a novel Zeno-free event-triggered protocol with sampling state information, equipped with the backup topology countermeasure, is used to suppress the threat of DoS attacks. Note that the resilient protocol against DoS attacks is fully-distributed, which does not need prior knowledge of network algebraic connectivity and thus possesses sufficient scalability to large-scale networks. Moreover, the event-triggered mechanism can completely avoid Zeno phenomena by introducing a strict lower bound for the time interval between cascading triggered events. On the CPL, this study introduces a decentralized, adaptive, and resilient control strategy to address actuation attacks exhibiting exponentially unbounded destructiveness. It is proven that all followers can reach uniformly ultimately bounded convergence by the proposed two-layered control protocols. The effectiveness and resilience of the proposed algorithm are validated through a numerical simulation example.
引用
收藏
页数:14
相关论文
共 42 条
[11]   Time-Varying Formation Tracking for UAV Swarm Systems With Switching Directed Topologies [J].
Dong, Xiwang ;
Li, Yangfan ;
Lu, Chuang ;
Hu, Guoqiang ;
Li, Qingdong ;
Ren, Zhang .
IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS, 2019, 30 (12) :3674-3685
[12]   Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks [J].
Fawzi, Hamza ;
Tabuada, Paulo ;
Diggavi, Suhas .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) :1454-1467
[13]   Resilient Time-Varying Formation-Tracking of Multi-UAV Systems Against Composite Attacks: A Two-Layered Framework [J].
Gong, Xin ;
Basin, Michael V. ;
Feng, Zhiguang ;
Huang, Tingwen ;
Cui, Yukang .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2023, 10 (04) :969-984
[14]   Competitive Interaction Design of Cooperative Systems Against Attacks [J].
Gusrialdi, Azwirman ;
Qu, Zhihua ;
Simaan, Marwan A. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (09) :3159-3166
[15]   Fully Distributed Cooperative Fault-Tolerant Output Regulation of Linear Heterogeneous MASs: A Dynamic Memory Event-Triggered Distributed Observer Approach [J].
Hou, Qinghua ;
Dong, Jiuxiang .
IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING, 2024, 21 (03) :4548-4560
[16]   Consensus of Linear Multi-Agent Systems by Distributed Event-Triggered Strategy [J].
Hu, Wenfeng ;
Liu, Lu ;
Feng, Gang .
IEEE TRANSACTIONS ON CYBERNETICS, 2016, 46 (01) :148-157
[17]  
Huang J., 2004, NONLINEAR OUTPUT REG
[18]   An Adaptive Control Architecture for Mitigating Sensor and Actuator Attacks in Cyber-Physical Systems [J].
Jin, Xu ;
Haddad, Wassim M. ;
Yucelen, Tansel .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (11) :6058-6064
[19]   Stuxnet: Dissecting a Cyberwarfare Weapon [J].
Langner, Ralph .
IEEE SECURITY & PRIVACY, 2011, 9 (03) :49-51
[20]   Fully distributed event-triggered consensus protocols for multi-agent systems with physically interconnected network [J].
Li, Weihua ;
Zhang, Huaguang ;
Sun, Shaoxin ;
Zhang, Juan .
NEUROCOMPUTING, 2020, 418 :191-199