Distributed robust-multivariate-observer-based FDI attacks estimation for nonlinear multi-agent systems with directed graphs

被引:6
作者
Dong, Lewei [1 ,2 ]
Xu, Huiling [1 ,3 ]
Park, Ju H. [2 ,4 ]
Li, Zhengcai [1 ]
机构
[1] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing, Peoples R China
[2] Yeungnam Univ, Dept Elect Engn, Gyongsan, South Korea
[3] Nanjing Univ Sci & Technol, Sch Math & Stat, Nanjing 210094, Peoples R China
[4] Yeungnam Univ, Dept Elect Engn, Gyongsan 38541, South Korea
基金
中国国家自然科学基金; 新加坡国家研究基金会;
关键词
cyber-physical systems; distributed robust multivariate observer; false data injection attacks; nonlinear multi-agent systems; unknown disturbances; DATA-INJECTION ATTACKS; FAULT ESTIMATION; DESIGN;
D O I
10.1002/rnc.6949
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article investigates the distributed robust estimation problem for false data injection (FDI) attacks in nonlinear multi-agent systems with directed graphs. To approximate the realistic attack scenario, the case where both the actuator network channel and sensor network channel suffering from FDIs are considered, and the attack signals contain time-varying circumstances. A novel distributed robust-multivariate-observer (DRMO) strategy is developed such that the online estimation of FDI attack dynamics can be realized with the partially unknown nonlinear dynamics, attack transient increments, and disturbances impact being eliminated. The designed DRMO scheme only depends on the received compromised/uncompromised measurement output information on the account that whole state information cannot be measured directly. Finally, two simulation examples, including a network of four one-link flexible joint manipulator systems with comparisons to existing methods, are given to show the effectiveness of the proposed scheme.
引用
收藏
页码:11351 / 11373
页数:23
相关论文
共 49 条
[1]  
[Anonymous], 2002, Robust Control: An LMI Approach
[2]   Adaptive cyber-physical system attack detection and reconstruction with application to power systems [J].
Ao, Wei ;
Song, Yongdong ;
Wen, Changyun .
IET CONTROL THEORY AND APPLICATIONS, 2016, 10 (12) :1458-1468
[3]   Data-injection attacks in stochastic control systems: Detectability and performance tradeoffs [J].
Bai, Cheng-Zong ;
Pasqualetti, Fabio ;
Gupta, Vijay .
AUTOMATICA, 2017, 82 :251-260
[4]  
Cao Y., 2022, IEEE T NEURAL NETW L
[5]   H infinity design with pole placement constraints: An LMI approach [J].
Chilali, M ;
Gahinet, P .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1996, 41 (03) :358-367
[6]   A survey on security control and attack detection for industrial cyber-physical systems [J].
Ding, Derui ;
Han, Qing-Long ;
Xiang, Yang ;
Ge, Xiaohua ;
Zhang, Xian-Ming .
NEUROCOMPUTING, 2018, 275 :1674-1683
[7]   Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects [J].
Dong, Lewei ;
Xu, Huiling ;
Wei, Xinjiang ;
Hu, Xin .
ISA TRANSACTIONS, 2022, 123 :1-13
[8]   Elegant antidisturbance fault-tolerant control for stochastic systems with multiple heterogeneous disturbances [J].
Dong, Lewei ;
Wei, Xinjiang ;
Hu, Xin ;
Zhang, Huifeng ;
Han, Jian ;
Liu, Xiuhua .
INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2020, 30 (06) :2533-2549
[9]  
Eslami A., 2022, INT J CONTROL
[10]   Distributed Joint Attack Detection and Secure State Estimation [J].
Forti, Nicola ;
Battistelli, Giorgio ;
Chisci, Luigi ;
Li, Suqi ;
Wang, Bailu ;
Sinopoli, Bruno .
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (01) :96-110