Resilient Consensus of Discrete-Time Complex Cyber-Physical Networks Under Deception Attacks

被引:105
作者
Fu, Weiming [1 ]
Qin, Jiahu [1 ]
Shi, Yang [2 ]
Zheng, Wei Xing [3 ]
Kang, Yu [4 ,5 ]
机构
[1] Univ Sci & Technol China, Dept Automat, Hefei 230027, Peoples R China
[2] Univ Victoria, Dept Mech Engn, Victoria, BC V8W 3P6, Canada
[3] Western Sydney Univ, Sch Comp Engn & Math, Sydney, NSW 2751, Australia
[4] Univ Sci & Technol China, Inst Adv Technol, Dept Automat, State Key Lab Fire Sci, Hefei 230027, Peoples R China
[5] Chinese Acad Sci, Key Lab Technol Geospatial Informat Proc & Applic, Beijing 100190, Peoples R China
基金
中国国家自然科学基金;
关键词
Complex cyber-physical networks; deception attacks; resilient consensus; robust graph; trusted edges; MULTIAGENT UNCERTAIN SYSTEMS; SYNCHRONIZATION; INFORMATION; TRACKING;
D O I
10.1109/TII.2019.2933596
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article considers the resilient consensus problems of discrete-time complex cyber-physical networks under $F$-local deception attacks. A resilient consensus algorithm, where extreme values received are removed by each node, is first introduced. By utilizing the presented algorithm, a necessary and sufficient condition to ensure resilient consensus in the absence of trusted edges is then provided by means of network robustness. We further generalize the notion of network robustness and present the necessary and sufficient condition for the achievement of resilient consensus in the presence of trusted edges. In addition, we show that through appropriately assigning the trusted edges, the resilient consensus can be reached under arbitrary communication network. Finally, the validity of the theoretical findings is demonstrated by simulation examples.
引用
收藏
页码:4868 / 4877
页数:10
相关论文
共 33 条
  • [1] Abbas W, 2014, INT SYMP RESIL CONTR
  • [2] Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus
    Abbas, Waseem
    Laszka, Aron
    Koutsoukos, Xenofon
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (04): : 2036 - 2048
  • [3] [Anonymous], 2009, Wall Str. J
  • [4] Cardenas Alvaro A., 2008, 2008 28th International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P495, DOI 10.1109/ICDCS.Workshops.2008.40
  • [5] False Data Injection Attacks With Limited Susceptance Information and New Countermeasures in Smart Grid
    Deng, Ruilong
    Liang, Hao
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2019, 15 (03) : 1619 - 1628
  • [6] Resilient consensus of second-order agent networks: Asynchronous update rules with delays
    Dibaji, Seyed Mehran
    Ishii, Hideaki
    [J]. AUTOMATICA, 2017, 81 : 123 - 132
  • [7] Observer-Based Event-Triggering Consensus Control for Multiagent Systems With Lossy Sensors and Cyber-Attacks
    Ding, Derui
    Wang, Zidong
    Ho, Daniel W. C.
    Wei, Guoliang
    [J]. IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (08) : 1936 - 1947
  • [8] Real-Time Modeling for Direct Load Control in Cyber-Physical Power Systems
    Facchinetti, Tullio
    Della Vedova, Marco L.
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2011, 7 (04) : 689 - 698
  • [9] Distributed consensus tracking for multi-agent systems under two types of attacks
    Feng, Zhi
    Hu, Guoqiang
    Wen, Guanghui
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2016, 26 (05) : 896 - 918
  • [10] Gang Xiong, 2015, IEEE/CAA Journal of Automatica Sinica, V2, P320