1
|
Zhang J, Yang D, Li W, Zhang H, Li G, Gu P. Resilient Output Control of Multiagent Systems With DoS Attacks and Actuator Faults: Fully Distributed Event-Triggered Approach. IEEE TRANSACTIONS ON CYBERNETICS 2024; 54:7681-7690. [PMID: 38935465 DOI: 10.1109/tcyb.2024.3404010] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/29/2024]
Abstract
This article investigates the fully distributed resilient practical leader-follower bipartite output consensus (LFBOC) problem for heterogeneous linear multiagent systems (MASs) with denial-of-service (DoS) attacks and actuator faults. To estimate the leader matrix and state in the presence of DoS attacks, two novel adaptive event-triggered observers are proposed based on newly developed lemmas, and then the adaptive event-triggered fault-tolerant controller without chattering behavior is developed to solve the LFBOC problem. Different from most existing resilient practical LFBOC working with DoS attacks and actuator faults, our method does not rely on any global information, event-triggered communication between neighbors and discrete update controllers are implemented simultaneously. Finally, an example is presented to well illustrate the effectiveness of developed method.
Collapse
|
2
|
Wang Y, Han L, Li X, Ren Z. Time-varying formation tracking for multi-agent systems with maneuvering leader under DDoS attacks and actuator faults. ISA TRANSACTIONS 2024; 144:38-50. [PMID: 37977887 DOI: 10.1016/j.isatra.2023.11.016] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/17/2023] [Revised: 10/03/2023] [Accepted: 11/10/2023] [Indexed: 11/19/2023]
Abstract
Time-varying formation tracking problems for multi-agent systems (MASs) under distributed Denial-of-Service (DDoS) attacks and actuator faults are studied. To deal with the hybrid threats at the cyber and physical layers, an estimator-based fault-tolerant hierarchical control scheme is introduced, which is applicable to channel-wise asynchronous communication. Sufficient conditions for formation tracking of maneuvering leader with ultimately bounded error are obtained, and the particular case of periodic communication and attacks with constrained duration and frequency is further analyzed. Comparative physical simulations based on ROS and Gazebo are first conducted to show the resilience of our scheme against the threats. Finally, an experimental platform containing DJI Tello quadrotors and a self-developed ground control station is built, based on which practical experiments with four quadrotors are carried out to evaluate the effectiveness and engineering practicability of the proposed control framework.
Collapse
Affiliation(s)
- Yue Wang
- Sino-French Engineer School, Beihang University, Beijing, 100191, PR China
| | - Liang Han
- Sino-French Engineer School, Beihang University, Beijing, 100191, PR China.
| | - Xiaoduo Li
- Sino-French Engineer School, Beihang University, Beijing, 100191, PR China
| | - Zhang Ren
- School of Automation Science and Electronic Engineering, Beihang University, Beijing, 100191, PR China
| |
Collapse
|
3
|
Deng C, Gao W, Wen C, Chen Z, Wang W. Data-Driven Practical Cooperative Output Regulation Under Actuator Faults and DoS Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:7417-7428. [PMID: 37074886 DOI: 10.1109/tcyb.2023.3263480] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 05/03/2023]
Abstract
This article addresses the resilient practical cooperative output regulation problem (RPCORP) for multiagent systems subjected to both denial-of-service (DoS) attacks and actuator faults. Fundamentally different from the existing solutions to RPCORPs, the system parameters considered in this article are unknown to each agent, and a novel data-driven control approach is introduced to handle such an issue. The solution starts with developing resilient distributed observers for each follower in the presence of DoS attacks. Then, a resilient communication mechanism and a time-varying sampling period are introduced to, respectively, ensure the neighbor state is available as soon as attacks disappear and to avoid targeted attacks launched by intelligent attackers. Furthermore, a model-based fault-tolerant and resilient controller is designed based on the Lyapunov approach and the output regulation theory. In order to remove the reliance on system parameters, we leverage a new data-driven algorithm to learn controller parameters via the collected data. Rigorous analysis shows that the closed-loop system can resiliently achieve practical cooperative output regulation. Finally, a simulation example is given to illustrate the effectiveness of the achieved results.
Collapse
|
4
|
Cao Z, Wang Z, Niu Y, Song J, Liu H. Sliding Mode Control for Sampled-Data Systems Subject to Deception Attacks: Handling Randomly Perturbed Sampling Periods. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:7034-7047. [PMID: 36194718 DOI: 10.1109/tcyb.2022.3202486] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/16/2023]
Abstract
In this article, the sliding mode control problem is addressed for a class of sampled-data systems subject to deception attacks. The sampling periods undergo component-wise random perturbations that are governed by a Markovian chain. The component of the sampled output is transmitted via an individual communication channel that is vulnerable to deception attacks, and Bernoulli-distributed stochastic variables are utilized to characterize the random occurrence of the deception attacks initiated by the adversaries. A sliding mode controller is designed to drive the state into the sliding domain around the specified sliding surface, and sufficient conditions are derived to guarantee the exponentially ultimate boundedness of the resultant closed-loop system in the mean-square sense. Furthermore, an optimization problem is established to pursue locally optimal control performance. Finally, a simulation example is given to verify the effectiveness and advantages of the developed controller design approach.
Collapse
|
5
|
Wan Y, Cao J. A Brief Survey of Recent Advances and Methodologies for the Security Control of Complex Cyber-Physical Networks. SENSORS (BASEL, SWITZERLAND) 2023; 23:4013. [PMID: 37112353 PMCID: PMC10145193 DOI: 10.3390/s23084013] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 02/14/2023] [Revised: 04/08/2023] [Accepted: 04/13/2023] [Indexed: 06/19/2023]
Abstract
Complex cyber-physical networks combine the prominent features of complex networks and cyber-physical systems (CPSs), and the interconnections between the cyber layer and physical layer usually pose significant impacts on its normal operation. Many vital infrastructures, such as electrical power grids, can be effectively modeled as complex cyber-physical networks. Given the growing importance of complex cyber-physical networks, the issue of their cybersecurity has become a significant concern in both industry and academic fields. This survey is focused on some recent developments and methodologies for secure control of complex cyber-physical networks. Besides the single type of cyberattack, hybrid cyberattacks are also surveyed. The examination encompasses both cyber-only hybrid attacks and coordinated cyber-physical attacks that leverage the strengths of both physical and cyber attacks. Then, special focus will be paid to proactive secure control. Reviewing existing defense strategies from topology and control perspectives aims to proactively enhance security. The topological design allows the defender to resist potential attacks in advance, while the reconstruction process can aid in reasonable and practical recovery from unavoidable attacks. In addition, the defense can adopt active switching-based control and moving target defense strategies to reduce stealthiness, increase the cost of attacks, and limit the attack impacts. Finally, conclusions are drawn and some potential research topics are suggested.
Collapse
Affiliation(s)
- Ying Wan
- Department of Systems Science, School of Mathematics, Southeast University, Nanjing 210096, China
| | - Jinde Cao
- Department of Systems Science, School of Mathematics, Southeast University, Nanjing 210096, China
- Yonsei Frontier Lab, Yonsei University, Seoul 03722, Republic of Korea
| |
Collapse
|
6
|
Zou L, Wang Z, Han QL, Yue D. Tracking Control Under Round-Robin Scheduling: Handling Impulsive Transmission Outliers. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:2288-2300. [PMID: 34673500 DOI: 10.1109/tcyb.2021.3115459] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
In this article, the tracking control problem is investigated for a type of linear networked systems subject to the round-Robin (RR) protocol scheduling and impulsive transmission outliers (ITOs). The communication between the controller and sensors is implemented through a shared network, on which the signal transmissions are scheduled by the RR protocol. The considered ITOs are modeled by a sequence of impulsive signals whose amplitudes (i.e., the norms of all impulsive signals) and interval lengths (i.e., the duration between all adjacent impulsive signals) are greater than two known thresholds, respectively. The occurrence moment for each ITO is first examined by using a certain outlier detection approach, and then a novel parameter-dependent tracking controller is proposed to protect the tracking performance from ITOs by removing the "harmful" signals (i.e., the transmitted signals contaminated by ITOs). Sufficient conditions are presented to ensure the exponentially ultimate boundedness of the resulted tracking error, and the controller gain matrices are subsequently designed by solving a constrained optimization problem. Finally, a simulation example is provided to demonstrate the effectiveness of our developed outlier-resistant tracking control scheme.
Collapse
|
7
|
Du S, Xu W, Qiao J, Ho DWC. Resilient Output Synchronization of Heterogeneous Multiagent Systems With DoS Attacks Under Distributed Event-/Self-Triggered Control. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2023; 34:1169-1178. [PMID: 34410931 DOI: 10.1109/tnnls.2021.3105006] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
This article investigates the resilient output synchronization problem of a class of linear heterogeneous multiagent systems subjected to denial-of-service (DoS) attacks. Two types of control mechanisms, namely, event- and self-triggered control mechanisms, are presented so as to cut down unnecessary information transmission. Both of these two mechanisms are distributed, and thus, only local information of each agent and its neighboring agents is adopted for the event condition design. The DoS attacks are considered to be aperiodic, and the quantitative relationship between the attributes of the DoS attacks and the synchronization is also revealed. It is shown that the output synchronization can be achieved exponentially in the presence of DoS attacks under the proposed control mechanisms. The validness of the provided mechanisms is certified by a simulation example.
Collapse
|
8
|
Liu D, Ye D. Secure synchronization against link attacks in complex networks with event-triggered coupling. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.01.077] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 01/21/2023]
|
9
|
Sun Y, Li L, Ho DWC. Quantized Synchronization Control of Networked Nonlinear Systems: Dynamic Quantizer Design With Event-Triggered Mechanism. IEEE TRANSACTIONS ON CYBERNETICS 2023; 53:184-196. [PMID: 34260372 DOI: 10.1109/tcyb.2021.3090999] [Citation(s) in RCA: 6] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
This article investigates the quantized control issue for synchronizing a networked nonlinear system. Due to limited energy and channel resources, the event-triggered control (ETC) method and input quantization are simultaneously taken into account in this article. First, a dynamic quantizer, which discretely adjusts its parameters online and possesses a finite quantization range, is introduced to achieve exact synchronization, rather than quasisynchronization. Next, a new distributed Zeno-free ETC strategy is proposed based on the dynamic quantizer. Then, two different situations, that is, the quantizer is designed with/without the network topology information, are, respectively, discussed. Synchronization criteria are, respectively, derived under such two circumstances by using the Lyapunov method. Finally, numerical examples are provided to show the effectiveness of the theoretical results.
Collapse
|
10
|
Cheng L, Yuan Y. Adaptive multi-player pursuit-evasion games with unknown general quadratic objectives. ISA TRANSACTIONS 2022; 131:73-82. [PMID: 35562307 DOI: 10.1016/j.isatra.2022.04.040] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/15/2020] [Revised: 03/16/2022] [Accepted: 04/22/2022] [Indexed: 06/15/2023]
Abstract
In this paper, an adaptive parameter estimation scheme is investigated for a class of multi-player pursuit-evasion games subject to unknown objectives with linear feedback and cross terms in control strategy. In virtue of the adaptive method, each player updates controller strategies to estimate opponent's control parameters before getting the Nash equilibrium solution. Moreover, the sufficient condition is provided to guarantee stability of the proposed adaptive procedure. Meanwhile, the stability behavior of closed-loop Nash strategy with adaptive estimator is guaranteed by the contraction mapping method. Finally, a simulation of an all-against-one game with one escaper and three pursuers is carried out to demonstrate the effectiveness of the proposed methodology.
Collapse
Affiliation(s)
- Lei Cheng
- The School of Astronautics, Northwestern Polytechnical University, Xi'an 710072, China.
| | - Yuan Yuan
- The School of Astronautics, Northwestern Polytechnical University, Xi'an 710072, China.
| |
Collapse
|
11
|
He W, Mo Z. Secure Event-Triggered Consensus Control of Linear Multiagent Systems Subject to Sequential Scaling Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:10314-10327. [PMID: 33909578 DOI: 10.1109/tcyb.2021.3070356] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Abstract
This article investigates secure consensus of linear multiagent systems under event-triggered control subject to a scaling deception attack. Different from probabilistic models, a sequential scaling attack is considered, in which specific attack properties, such as the attack duration and frequency, are defined. Moreover, to alleviate the utilization of communication resources, distributed static and dynamic event-triggered control protocols are proposed and analyzed, respectively. This article aims at providing a resilient event-triggered framework to defend a kind of sequential scaling attack by exploring the relationship among the attack duration and frequency, and event-triggered parameters. First, the static event-triggered control is studied, and sufficient consensus conditions are derived, which impose constraints on the attack duration and frequency. Second, a state-based auxiliary variable is introduced in the dynamic event-triggered scheme. Under the proposed dynamic event-triggered control, consensus criteria involving triggering parameters, attack constraints, and system matrices are obtained. It proves that the Zeno behavior can be excluded. Moreover, the impacts of the scaling factor, triggering parameters, and attack properties are discussed. Finally, the effectiveness of the proposed event-triggered control mechanisms is validated by two examples.
Collapse
|
12
|
Li S, Liang K, He W. Fully distributed event-triggered secure consensus of general linear multi-agent systems under sequential scaling attacks. ISA TRANSACTIONS 2022; 127:146-155. [PMID: 35525607 DOI: 10.1016/j.isatra.2022.04.018] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/28/2021] [Revised: 03/23/2022] [Accepted: 04/12/2022] [Indexed: 06/14/2023]
Abstract
In this article, the secure consensus problem is studied for a general linear multi-agent system, where a fully distributed event-triggered scheme is introduced to increase the feasibility and improve the scalability of the control protocol. Firstly, an edge-based sequential scaling attack is formulated with constraints on the attack duration and the frequency, which includes multiplicative deception attacks and DoS attacks as a particular situation when the scaling factor is equal to 0. Then a fully distributed event-triggered control protocol is designed, in which the global information is no longer needed. Sufficient conditions related to triggering parameters, the scaling factor, the attack duration and attack frequency are derived ensuring the asymptotic consensus of MAS. Furthermore, the impact of the triggering parameters and the scaling factor on the attack duration and the attack frequency are also discussed. The Zeno behavior is proved not to happen. Finally, two simulation examples based on unmanned intelligent vehicles are conducted to verify the results.
Collapse
Affiliation(s)
- Shifen Li
- Key Laboratory of Smart Manufacturing in Energy Chemical Process, Ministry of Education East China University of Science and Technology, Shanghai 200237, China.
| | - Kun Liang
- Key Laboratory of Smart Manufacturing in Energy Chemical Process, Ministry of Education East China University of Science and Technology, Shanghai 200237, China.
| | - Wangli He
- Key Laboratory of Smart Manufacturing in Energy Chemical Process, Ministry of Education East China University of Science and Technology, Shanghai 200237, China.
| |
Collapse
|
13
|
Wen P, Dong H, Huo F, Li J, Lu X. Observer-based PID control for actuator-saturated systems under binary encoding scheme. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.05.035] [Citation(s) in RCA: 6] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|
14
|
Tan X, Xiang C, Cao J, Xu W, Wen G, Rutkowski L. Synchronization of Neural Networks via Periodic Self-Triggered Impulsive Control and Its Application in Image Encryption. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:8246-8257. [PMID: 33531321 DOI: 10.1109/tcyb.2021.3049858] [Citation(s) in RCA: 9] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Abstract
In this article, a periodic self-triggered impulsive (PSTI) control scheme is proposed to achieve synchronization of neural networks (NNs). Two kinds of impulsive gains with constant and random values are considered, and the corresponding synchronization criteria are obtained based on tools from impulsive control, event-driven control theory, and stability analysis. The designed triggering protocol is simpler, easier to implement, and more flexible compared with some previously reported algorithms as the protocol combines the advantages of the periodic sampling and event-driven control. In addition, the chaotic synchronization of NNs via the presented PSTI sampling is further applied to encrypt images. Several examples are also utilized to illustrate the validity of the presented synchronization algorithm of NNs based on PSTI control and its potential applications in image processing.
Collapse
|
15
|
Liu XY, Che WW. Event-based distributed secondary voltage tracking control of microgrids under DoS attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.07.012] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
16
|
Sun YC, Yang GH. Event-Triggered Distributed State Estimation for Multiagent Systems Under DoS Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:6901-6910. [PMID: 33232261 DOI: 10.1109/tcyb.2020.3034456] [Citation(s) in RCA: 10] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article investigates the problem of event-triggered distributed state estimation for linear multiagent systems under denial-of-service (DoS) attacks. In contrast to the previous studies where the agents have access to the measurements of their own states, an estimation algorithm is provided based on the measurements relative to the adjacent agents, and the considered DoS attacks jam each channel independently while the attack durations are constrained. To estimate the states and effectively schedule the information transmissions over the network possibly subject to malicious attacks, a prediction-based switching observer scheme with an event-triggered communication strategy is proposed, and the invalidation problem of the event-triggering mechanism caused by the DoS attacks is solved. Based on the decay rates of the Lyapunov function corresponding to different transmission modes, sufficient conditions for the stability of the estimation error dynamics are presented in the presence of DoS attacks. Finally, the effectiveness of the proposed strategy is demonstrated by simulation results.
Collapse
|
17
|
Deng C, Yue D, Che WW, Xie X. Cooperative Fault-Tolerant Control for a Class of Nonlinear MASs by Resilient Learning Approach. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2022; PP:670-679. [PMID: 35675248 DOI: 10.1109/tnnls.2022.3176392] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/15/2023]
Abstract
In this article, a learning-based resilient fault-tolerant control method is proposed for a class of uncertain nonlinear multiagent systems (MASs) to enhance the security and reliability against denial-of-service (DoS) attacks and actuator faults. With the framework of cooperative output regulation, the developed algorithm consists of designing a distributed resilient observer and a decentralized fault-tolerant controller. Specifically, by using the data-driven method, an online resilient learning algorithm is first presented to learn the unknown exosystem matrix in the presence of DoS attacks. Then, a distributed resilient observer is proposed working against DoS attacks. In addition, based on the developed observer, a decentralized adaptive fault-tolerant controller is designed to compensate for actuator faults. Moreover, the convergence of error systems is shown by using the Lyapunov stability theory. The effectiveness of our result is examined by a simulation example.
Collapse
|
18
|
Deng C, Wen C, Zou Y, Wang W, Li X. A Hierarchical Security Control Framework of Nonlinear CPSs Against DoS Attacks With Application to Power Sharing of AC Microgrids. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:5255-5266. [PMID: 33147161 DOI: 10.1109/tcyb.2020.3029045] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
In this article, we investigate the distributed resilient observers-based decentralized adaptive control problem for cyber-physical systems (CPSs) with time-varying reference trajectory under denial-of-service (DoS) attacks. The considered CPSs are modeled as a class of nonlinear multi-input uncertain multiagent systems, which can be used to model an AC microgrid system consisting of distributed generators. When the communication to a subsystem from one of its neighbors is attacked by a DoS attack, the transmitted information is unavailable and the existing distributed adaptive methods used to estimate the bound of the n th-order derivative of the reference trajectory become nonapplicable. To overcome this difficulty, we first design a new distributed estimator for each subsystem to ensure that the magnitude of the state of the estimator is larger than the bound of the n th-order derivative of the reference trajectory after a finite time. By employing the estimator state, a distributed observer with a switching mechanism is proposed. Then, a new block backstepping-based decentralized adaptive controller is developed. Based on the DoS communication duration property, convex design conditions of observer parameters are derived with the Lebesgue integral theory and the average dwell time method. It is proved that the output tracking errors will approach a compact set with the developed method. Finally, the design method is successfully applied to show the effectiveness of the proposed method to solve the power sharing problem for AC microgrids.
Collapse
|
19
|
Wang Y, Lu J, Liang J. Security Control of Multiagent Systems Under Denial-of-Service Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:4323-4333. [PMID: 33095732 DOI: 10.1109/tcyb.2020.3026083] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
Security control aims to guarantee the consensus of multiagent systems (MASs) in the presence of the denial-to-service attacker. Most of the existing distributed controllers are invalid during the attack interval due to the paralyzed communication channels. In order to overcome this difficulty, a novel hybrid distributed control protocol is designed. Here, the controller uses the latest information saved in the buffers in the presence of malicious attacks, which will further enhance the security of MASs. Some sufficient conditions on the coupled strength and attack parameters are derived to achieve the leader-following consensus of MASs. Furthermore, we estimate the upper bounds of denial-of-service (DoS) frequency and DoS duration which the MASs can tolerate before losing consensus. Notice that we also reduce the computational complexity via the property of the Kronecker product. Besides, an observer-based model is proposed and the corresponding consensus criterion is established to reduce the effects of attackers on the controller. Finally, the efficiency of our theoretical results is illustrated by a numerical example.
Collapse
|
20
|
Wang H, Wen G, Yu W, Yu X. Designing Event-Triggered Observers for Distributed Tracking Consensus of Higher-Order Multiagent Systems. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:3302-3313. [PMID: 32784146 DOI: 10.1109/tcyb.2020.3010947] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
In this article, the asymptotic tracking consensus problem of higher-order multiagent systems (MASs) with general directed communication graphs is addressed via designing event-triggered control strategies. One common assumption utilized in most existing results on such tracking consensus problem that the inherent dynamics of the leader are the same as those of the followers is removed in this article. In particular, two cases that the dynamics of the leader are subjected, respectively, to bounded input and unknown nonlinearity are considered. To do this, distributed event-triggered observers are first constructed to estimate the state information of the leader. Then, local event-triggered tracking control protocols are designed for each follower to complete the goal of tracking consensus. One distinguishing feature of the present distributed observers lies in the fact that they could avoid the continuous monitoring for the states of the neighbors' observer states. It is also worth pointing out that the present tracking consensus control strategies are fully distributed as no global information related to the directed communication graph is involved in designing the strategies. Two simulation examples are finally presented to verify the efficiency of the theoretical results.
Collapse
|
21
|
Amini A, Asif A, Mohammadi A. A Unified Optimization for Resilient Dynamic Event-Triggering Consensus Under Denial of Service. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:2872-2884. [PMID: 33006935 DOI: 10.1109/tcyb.2020.3022568] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article proposes a resilient framework for optimized consensus using a dynamic event-triggering (DET) scheme, where the multiagent system (MAS) is subject to denial-of-service (DoS) attacks. When initiated by an adversary, DoS blocks the local and neighboring communication channels in the network. A distributed DET scheme is utilized to limit transmissions between the neighboring agents. A novel convex optimization approach is proposed that simultaneously co-designs all unknown control and DET parameters. The optimization is based on the weighted sum approach and increases the interevent interval for a predefined consensus convergence rate. In the presence of DoS, the proposed co-design framework is beneficial in two ways: 1) the desired level of resilience to DoS is included as a given (desired) input and 2) the upper bound for guaranteed resilience associated with the proposed co-design approach is less conservative (larger) compared to those obtained from other analytical solutions. A structured tradeoff between relevant features of the MAS, namely, the consensus convergence rate, frequency of event triggerings, and level of resilience to DoS attacks, is established. Simulations based on nonholonomic mobile robots quantify the effectiveness of the proposed implementation.
Collapse
|
22
|
Gao R, Yang GH. Distributed multi-rate sampled-data H∞ consensus filtering for cyber-physical systems under denial-of-service attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2021.12.046] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
23
|
Chen S, Ho DW. Information-based distributed extended Kalman filter with dynamic quantization via communication channels. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2021.10.066] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/26/2022]
|
24
|
Wang P, Wen G, Huang T, Yu W, Ren Y. Observer-Based Consensus Protocol for Directed Switching Networks With a Leader of Nonzero Inputs. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:630-640. [PMID: 32287033 DOI: 10.1109/tcyb.2020.2981518] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
We aim to address the consensus tracking problem for multiple-input-multiple-output (MIMO) linear networked systems under directed switching topologies, where the leader is subject to some nonzero but norm bounded inputs. First, based on the relative outputs, a full-order unknown input observer (UIO) is designed for each agent to track the full states' error among neighboring agents. With the aid of such an observer, a discontinuous feedback protocol is subtly designed. And it is proven that consensus tracking can be achieved in the closed-loop networked system if the average dwell time (ADT) for switching among different interaction graph candidates is larger than a given positive threshold. By using the boundary layer technique, a continuous feedback protocol is skillfully designed and employed. It is shown that the consensus error converges into a bounded set under the designed continuous protocol. Second, as part of the full states' error can be constructed via the agents' outputs, a reduced-order UIO is thus designed based on which discontinuous and continuous feedback protocols are, respectively, proposed. By using the stability theory of the switched systems, it is proven that the consensus error converges asymptotically to 0 under the designed discontinuous protocol, and converges into a bounded set under the designed continuous protocol. Finally, the obtained theoretical results are validated through simulations.
Collapse
|
25
|
Wu Y, Zhang H, Wang Z, Huang C. Distributed Event-Triggered Consensus of General Linear Multiagent Systems Under Directed Graphs. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:608-619. [PMID: 32275639 DOI: 10.1109/tcyb.2020.2981210] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article investigates the consensus problem of general linear multiagent systems under directed communication graphs with event-triggered mechanisms. First, a novel distributed static event-triggered mechanism with a state-dependent threshold is proposed to solve the consensus problem, both with a positive lower bound on the average time interval of the communication among agents and updates of controllers. Thus, the Zeno behavior is excluded for communication among agents and controller updates. Next, to further reduce the frequencies of communication among agents and updates of controllers, a distributed dynamic event-triggered mechanism is introduced. By applying the static and dynamic mechanisms, the problem can be addressed with the reduced use of system resources compared with that in most existing control algorithms. Finally, numerical simulations are presented to verify the effectiveness of the results.
Collapse
|
26
|
Wan Y, Long C, Deng R, Wen G, Yu X, Huang T. Distributed Event-Based Control for Thermostatically Controlled Loads Under Hybrid Cyber Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:5314-5327. [PMID: 32203050 DOI: 10.1109/tcyb.2020.2978274] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
In building-microgrid communities, renewable generation and time-varying load usually cause power fluctuations, which influence the ancillary support to the main grid. Thermostatically controlled loads (TCLs) can be utilized to compensate such power variations due to their aggregated and controllable power consumptions. Meanwhile, one basic requirement for the users' side of TCLs is to realize the fair sharing of power states and comfort states. This article proposes a distributed event-based control strategy, where information of neighboring TCLs is exchanged only when a dynamic event-triggered condition is satisfied, and thus it intelligently determines the necessary transmission frequency to save communication resources. From a cybersecurity perspective, the communication network of TCLs may be subject to hybrid attacks, for example, denial-of-service (DoS) and false data-injection (FDI) attacks. During DoS attack intervals, no information can be communicated even through the event-triggered condition is satisfied. Furthermore, the control inputs may also be tampered by FDI attacks. By utilizing the Lyapunov stability and hybrid control theories, sufficient conditions regarding the attack parameters are derived such that fair sharing of power states and comfort states of all involved TCLs can be achieved exponentially. The exclusion of Zeno behaviors is proved and a corollary for ideal communication situations is also deduced. Finally, simulation examples with various attack parameters are conducted to verify the effectiveness of the main results.
Collapse
|
27
|
Lu AY, Yang GH. Stability Analysis for Cyber-Physical Systems Under Denial-of-Service Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:5304-5313. [PMID: 32413936 DOI: 10.1109/tcyb.2020.2986008] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article investigates the stability analysis problem for cyber-physical systems (CPSs) under denial-of-service (DoS) attacks. Based on the real-time data characterizing the suffered DoS attack, a necessary and sufficient condition for the closed-loop stability in the presence of DoS attacks is provided. Besides, by transforming stability analysis the system under DoS into stability analysis of an auxiliary system, novel sufficient conditions for the closed-loop stability, which can be verified more easily than the necessary and sufficient condition, are provided. Based on the proposed conditions, an online stability monitoring strategy, which triggers an alarm if the closed-loop stability is not guaranteed, is proposed. Finally, two examples are given to illustrate the effectiveness of the proposed strategy.
Collapse
|
28
|
Chen J, Shi Y. Stochastic model predictive control framework for resilient cyber-physical systems: review and perspectives. PHILOSOPHICAL TRANSACTIONS. SERIES A, MATHEMATICAL, PHYSICAL, AND ENGINEERING SCIENCES 2021; 379:20200371. [PMID: 34398650 DOI: 10.1098/rsta.2020.0371] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Accepted: 02/08/2021] [Indexed: 06/13/2023]
Abstract
In the era of Industrial 4.0, the next-generation control system regards the cyber-physical system (CPS) as the core ingredient thanks to the comprehensive integration of physical systems, online computation, networking and control. A reliable, stable and resilient CPS should pledge robustness and safety. A significant concern in CPS development arises from security issues since the CPS is vulnerable to physical constraints, ubiquitous uncertainties and malicious cyber attacks. The integration of the stochastic model predictive control (MPC) framework and the resilient mechanism is a possible approach to guarantee robustness in the presence of stochastic uncertainties and enable resilience against cyber attacks. This review paper aims to offer a detailed overview of existing stochastic MPC algorithms and their CPS applications. More specifically, we first review existing stochastic MPC algorithms for both linear and nonlinear systems subject to probabilistic constraints. We then discuss how to extend the stochastic MPC framework to incorporate resilience mechanisms for constrained CPS under various malicious attacks. Finally, we present an architectural stochastic MPC-based framework for resilient CPS and identify future research challenges. This article is part of the theme issue 'Towards symbiotic autonomous systems'.
Collapse
Affiliation(s)
- Jicheng Chen
- Department of Mechanical Engineering, University of Victoria, Victoria, British Columbia, Canada V8W 3P6
| | - Yang Shi
- Department of Mechanical Engineering, University of Victoria, Victoria, British Columbia, Canada V8W 3P6
| |
Collapse
|
29
|
|
30
|
Li L, Sun Y, Wang M, Huang W. Synchronization of Coupled Memristor Neural Networks with Time Delay: Positive Effects of Stochastic Delayed Impulses. Neural Process Lett 2021. [DOI: 10.1007/s11063-021-10600-z] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
31
|
Chen W, Ding D, Dong H, Wei G, Ge X. Finite-Horizon H∞ Bipartite Consensus Control of Cooperation-Competition Multiagent Systems With Round-Robin Protocols. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:3699-3709. [PMID: 32191904 DOI: 10.1109/tcyb.2020.2977468] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
This article focuses on the finite-horizon H∞ bipartite consensus control problem for a class of discrete time-varying cooperation-competition multiagent systems (DTV-CCMASs) with the round-robin (RR) protocol. The cooperation-competition relationship among agents is characterized by a signed graph, whose edges are with positive or negative connection weights. Specifically, a positive weight corresponds to an allied relationship between two agents and a negative one means an adversary relationship. The data exchange between each agent and its neighbors is orchestrated by an RR protocol, where only one neighboring agent is authorized to transmit the data packet at each time instant, and therefore, the data collision is prevented. This article aims to design a bipartite consensus controller for DTV-CCMASs with the RR protocol such that the predetermined H∞ bipartite consensus is satisfied over a given finite horizon. A sufficient condition is first established to guarantee the desired H∞ bipartite consensus by resorting to the completing square method. With the help of an auxiliary cost combined with the Moore-Penrose pseudoinverse method, a design scheme of the bipartite consensus controller is obtained by solving two coupled backward recursive Riccati difference equations (BRRDEs). Finally, a simulation example is given to verify the effectiveness of the proposed scheme of the bipartite consensus controller.
Collapse
|
32
|
Xiong W, Yu X, Liu C, Wen G, Wen S. Simplifying Complex Network Stability Analysis via Hierarchical Node Aggregation and Optimal Periodic Control. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2021; 32:3098-3107. [PMID: 32730207 DOI: 10.1109/tnnls.2020.3009436] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
In this study, the stability of a hierarchical network with delayed output is discussed by applying a kind of optimal periodic control. To reduce the number of the nodes of the original hierarchical network, an aggregation algorithm is first presented to take some nodes with the same information as an aggregated node. Furthermore, the stability of the original hierarchical network can be guaranteed by the optimal periodic control of the aggregated hierarchical network. Then, an optimal control scheme is proposed to reduce the bandwidth waste in information transmission. In the control scheme, the time sequence is separated into two parts: the deterministic segment and the dynamic segment. With the optimal control scheme, two targets are achieved: 1) the outputs of the original and aggregated hierarchical system are both asymptotically stable and 2) the nodes with slow convergent rate can catch up with the convergence speeds of other nodes.
Collapse
|
33
|
Yang Y, Li Y, Yue D, Tian YC, Ding X. Distributed Secure Consensus Control With Event-Triggering for Multiagent Systems Under DoS Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:2916-2928. [PMID: 32324585 DOI: 10.1109/tcyb.2020.2979342] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
Consensus control of multiagent systems (MASs) has applications in various domains. As MASs work in networked environments, their security control becomes critically desirable in response to various cyberattacks, such as denial of service (DoS). Efforts have been made in the development of both time- and event-triggered consensus control of MASs. However, there is a lack of precise calculation of control input during the attacking periods. To address this issue, a distributed secure consensus control with event triggering is developed for linear leader-following MASs under DoS attacks. It is designed with a dual-terminal event-triggered mechanism, which schedules information transmission through two triggered functions for each follower: one on the measurement channel (sensor-to-controller) and the other on the control channel (controller-to-actuator). To deal with DoS attacks, the combined states in the triggered functions are replaced by their estimations from an observer. Sufficient conditions are established for the duration and frequency of DoS attacks. To remove continuous monitoring of the measurement errors, a self-triggered secure control scheme is further developed, which combines the system states and other information at past triggered instants. Theoretical analysis shows that the followers in MASs under DoS attacks are able to track the leader and meanwhile the Zeno behavior is excluded. Case studies are conducted to demonstrate the effectiveness of our distributed secure consensus control of MASs.
Collapse
|
34
|
Deng C, Wen C. MAS-Based Distributed Resilient Control for a Class of Cyber-Physical Systems With Communication Delays Under DoS Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:2347-2358. [PMID: 32149704 DOI: 10.1109/tcyb.2020.2972686] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
In this article, we investigate the distributed resilient control problem for a class of cyber-physical systems with communication delays under denial-of-service (DoS) attacks. In contrast to the previous DoS attacks results based on multiagent systems (MASs), a new distributed resilient control approach is proposed for more general heterogeneous linear MASs with nonuniform communication delays. Two types of sampled-based observers are, respectively, proposed. Namely, adaptive distributed observers are designed by introducing a buffer mechanism to eliminate the heterogeneous behavior caused by communication delays while adaptive distributed resilient observers are designed by introducing resilient mechanisms to resist the DoS attacks. Furthermore, a time-varying sampling period sequence is provided to prevent the attacker from identifying the sampling period of the system. Based on the developed resilient observers, a controller is developed. It is proved that the considered problem can be solved by the developed method. Finally, a numerical example is given to illustrate the effectiveness of the obtained result.
Collapse
|
35
|
Liu S, Wang Z, Chen Y, Wei G. Dynamic event-based state estimation for delayed artificial neural networks with multiplicative noises: A gain-scheduled approach. Neural Netw 2020; 132:211-219. [PMID: 32916602 DOI: 10.1016/j.neunet.2020.08.023] [Citation(s) in RCA: 17] [Impact Index Per Article: 3.4] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/03/2020] [Revised: 08/12/2020] [Accepted: 08/24/2020] [Indexed: 11/24/2022]
Abstract
This study is concerned with the state estimation issue for a kind of delayed artificial neural networks with multiplicative noises. The occurrence of the time delay is in a random way that is modeled by a Bernoulli distributed stochastic variable whose occurrence probability is time-varying and confined within a given interval. A gain-scheduled approach is proposed for the estimator design to accommodate the time-varying nature of the occurrence probability. For the sake of utilizing the communication resource as efficiently as possible, a dynamic event triggering mechanism is put forward to orchestrate the data delivery from the sensor to the estimator. Sufficient conditions are established to ensure that, in the simultaneous presence of the external noises, the randomly occurring time delays with time-varying occurrence probability as well as the dynamic event triggering communication protocol, the estimation error is exponentially ultimately bounded in the mean square. Moreover, the estimator gain matrices are explicitly calculated in terms of the solution to certain easy-to-solve matrix inequalities. Simulation examples are provided to show the validity of the proposed state estimation method.
Collapse
Affiliation(s)
- Shuai Liu
- College of Science, University of Shanghai for Science and Technology, Shanghai 200093, China
| | - Zidong Wang
- Department of Computer Science, Brunel University London, Uxbridge, Middlesex, UB8 3PH, United Kingdom.
| | - Yun Chen
- Institute of Information and Control, Hangzhou Dianzi University, Hangzhou 310018, China
| | - Guoliang Wei
- College of Science, University of Shanghai for Science and Technology, Shanghai 200093, China.
| |
Collapse
|
36
|
Zhang TY, Ye D. Distributed Secure Control Against Denial-of-Service Attacks in Cyber-Physical Systems Based on K-Connected Communication Topology. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:3094-3103. [PMID: 32142466 DOI: 10.1109/tcyb.2020.2973303] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
In this article, the security problem in cyber-physical systems (CPSs) against denial-of-service (DoS) attacks is studied from the perspectives of the designs of communication topology and distributed controller. To resist the DoS attacks, a new construction algorithm of the k -connected communication topology is developed based on the proposed necessary and sufficient criteria of the k -connected graph. Furthermore, combined with the k -connected topology, a distributed event-triggered controller is designed to guarantee the consensus of CPSs under mode-switching DoS (MSDoS) attacks. Different from the existing distributed control schemes, a new technology, that is, the extended Laplacian matrix method, is combined to design the distributed controller independent on the knowledge and the dwell time of DoS attack modes. Finally, the simulation example illustrates the superiority and effectiveness of the proposed construction algorithm and a distributed control scheme.
Collapse
|
37
|
Zhang ZH, Liu D, Deng C, Fan QY. A dynamic event-triggered resilient control approach to cyber-physical systems under asynchronous DoS attacks. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2020.01.047] [Citation(s) in RCA: 26] [Impact Index Per Article: 5.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/25/2022]
|
38
|
A whale optimization algorithm-trained artificial neural network for smart grid cyber intrusion detection. Neural Comput Appl 2019. [DOI: 10.1007/s00521-019-04453-w] [Citation(s) in RCA: 26] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
|