Resilient Control Design of the Third-Order Discrete-Time Connected Vehicle Systems Against Cyber-Attacks

被引:5
|
作者
Li, Zeming [1 ]
Li, Ziyuan [2 ]
Liu, Yonggui [2 ]
机构
[1] South China Univ Technol, Sch Mech & Automot Engn, Guangzhou 510640, Peoples R China
[2] South China Univ Technol, Coll Automat Sci & Engn, Key Lab Autonomous Syst & Network Control, Minist Educ, Guangzhou 510640, Peoples R China
来源
IEEE ACCESS | 2020年 / 8卷
基金
中国国家自然科学基金;
关键词
Vehicle dynamics; Mathematical model; Stability analysis; Multi-agent systems; Security; Acceleration; Resists; Vehicle platoon; resilient control; consensus; cyber-attacks; interaction network; SUFFICIENT CONDITIONS; PHYSICAL SYSTEMS; CONSENSUS; ALGORITHM; MECHANISMS; NETWORKS; SUBJECT; SAFETY; AGENTS;
D O I
10.1109/ACCESS.2020.3019274
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the consensus problems of the third-order discrete-time Connected Vehicle Systems (CVSs) under cyber-attacks. First, the necessary and sufficient conditions for consensus of third-order discrete-time CVSs are derived in the absence of attacks by using algebraic graph and matrix theory. Then the interaction network framework between the original CVSs in the vehicle platoon layer and a virtual system in the hidden layer is established to resist cyber-attacks. Since sufficiently large attacks can be excluded from CVSs through a threshold defense mechanism, such potential attacks considered are bounded and generated by any linear or non-linear finite L2-gain exogenous dynamics system. It is proved that the stability of CVSs can be ensured and the state errors converge to a bounded range whether the attacks exist only in the vehicle platoon layer or in the overall systems (including the vehicle platoon layer and the hidden layer) by using the Lyapunov stability method. Finally, a simulation example containing several scenarios demonstrates the effectiveness and superiority of the proposed methods.
引用
收藏
页码:157470 / 157481
页数:12
相关论文
共 50 条
  • [31] Stabilization for discrete-time Markovian jumping LPV systems with cyber attacks
    Zhang, Ning
    Xia, Mcngyuan
    Qi, Wcnhai
    2023 2ND CONFERENCE ON FULLY ACTUATED SYSTEM THEORY AND APPLICATIONS, CFASTA, 2023, : 591 - 595
  • [32] Secure Filter for Discrete-Time Delayed Systems Subject to Cyber Attacks
    Hamdan M.M.
    Mahmoud M.S.
    Cyber-Physical Systems, 2022, 8 (03) : 210 - 232
  • [33] Secure Consensus Control for Connected Vehicle Systems With Resilient Predictors Against Denial-of-Service Attacks
    Liu, Yonggui
    Li, Ziyuan
    Li, Qinxue
    Xie, Xuhuan
    IEEE ACCESS, 2024, 12 : 41908 - 41917
  • [34] Observer-Based PID Security Control for Discrete Time-Delay Systems Under Cyber-Attacks
    Zhao, Di
    Wang, Zidong
    Ho, Daniel W. C.
    Wei, Guoliang
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (06): : 3926 - 3938
  • [35] Secure Consensus Control for Connected Vehicle Systems With Resilient Predictors Against Denial-of-Service Attacks
    Liu, Yonggui
    Li, Ziyuan
    Li, Qinxue
    Xie, Xuhuan
    IEEE Access, 2024, 12 : 41908 - 41917
  • [36] Event-triggered Consensus of Third-order Discrete-time Multi-agent Systems
    Dong T.
    Li X.-L.
    Zhao D.-D.
    Zidonghua Xuebao/Acta Automatica Sinica, 2019, 45 (07): : 1366 - 1372
  • [37] Resilient Memory Event-Triggered Finite-Time Bounded for Networked Control Systems with Multiple Cyber-Attacks
    Murugesan, Sathishkumar
    Liu, Yen-Chen
    2021 AMERICAN CONTROL CONFERENCE (ACC), 2021, : 2713 - 2719
  • [38] Discrete-time resilient-distributed secondary control strategy against unbounded attacks in polymorphic microgrid
    Wang, Fuzhi
    Shan, Qihe
    Zhu, Jun
    Xiao, Geyang
    FRONTIERS IN ENERGY RESEARCH, 2022, 10
  • [39] The Consensus for Discrete-Time Heterogeneous Networked Systems Consisting of Second-Order Agents and Third-Order Agents
    Zhao, Huanyu
    Fei, Shumin
    IEEE ACCESS, 2018, 6 : 14204 - 14211
  • [40] Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks
    Fu, Weiming
    Qin, Jiahu
    Shi, Yang
    Zheng, Wei Xing
    Kang, Yu
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (07) : 4868 - 4877