Interaction network-based resilient consensus of connected vehicles against cyber-attacks

被引:3
作者
Liu, Yonggui [1 ,4 ]
Li, Zeming [1 ]
Guo, Ge [2 ,3 ]
机构
[1] South China Univ Technol, Sch Automat Sci & Engn, Key Lab Autonomous Syst & Network Control, Guangzhou, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang, Peoples R China
[3] Northeastern Univ Qinhuangdao, Sch Control Engn, Qinhuangdao, Peoples R China
[4] South China Univ Technol, Sch Automat Sci & Engn, Key Lab Autonomous Syst & Network Control, Guangzhou 510640, Peoples R China
基金
中国国家自然科学基金;
关键词
SYSTEMS;
D O I
10.1049/cth2.12394
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The paper investigates a consensus problem of connected vehicle systems (CVSs) under cyber-attacks. In real application, dynamics and amplitude of cyber attacks are unknown and stochastic. From the defender's perspective, the neighbouring matrix based on threshold defence mechanism is designed to exclude exogenous and large enough attacks. For cyber-attacks whose amplitude lies in the measurement range, the dynamics is assumed to be an unknown nonlinear function of the states of the attacks and the vehicles. Based on such attack model, the neighbouring matrix and the control protocols of the vehicles, a state space model is first established for the CVSs. Then, an interaction network between the platoon layer in the original CVSs and the hidden layer in the virtual systems is constructed. By designing competitive interact matrices, stability of the overall system is ensured such that the state errors converge into a bounded range when the platoon layer suffers from cyber-attacks. The results still hold for the worst case, for example, both the platoon layer and the hidden layer are attacked simultaneously. The effectiveness and superiority of the method are illustrated by simulations.
引用
收藏
页码:744 / 756
页数:13
相关论文
共 50 条
[1]   ALGORITHM - SOLUTION OF MATRIX EQUATION AX+XB = C [J].
BARTELS, RH ;
STEWART, GW .
COMMUNICATIONS OF THE ACM, 1972, 15 (09) :820-&
[2]  
Berman A., 1994, NONNEGTIVE MATRICES
[3]  
Biron ZA, 2017, P AMER CONTR CONF, P4971, DOI 10.23919/ACC.2017.7963725
[4]  
Dadras S., 2015, P 10 ACM S INFORM CO, P167, DOI DOI 10.1145/2714576.2714619
[5]   MAS-Based Distributed Resilient Control for a Class of Cyber-Physical Systems With Communication Delays Under DoS Attacks [J].
Deng, Chao ;
Wen, Changyun .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (05) :2347-2358
[6]   Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05) :779-789
[7]   Distributed fault estimation with randomly occurring uncertainties over sensor networks [J].
Dong, Hongli ;
Wang, Zidong ;
Bu, Xianye ;
Alsaadi, Fuad E. .
INTERNATIONAL JOURNAL OF GENERAL SYSTEMS, 2016, 45 (05) :662-674
[8]  
Gharesifard B., 2012, IFAC Proc., V45, P234
[9]  
Gusrialdi Azwirman, 2014, 2014 American Control Conference, P1456, DOI 10.1109/ACC.2014.6858789
[10]   Competitive Interaction Design of Cooperative Systems Against Attacks [J].
Gusrialdi, Azwirman ;
Qu, Zhihua ;
Simaan, Marwan A. .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (09) :3159-3166