1
|
Sawiński A, Chudzik P, Tatar K. Cascade Sliding Mode Control for Linear Displacement Positioning of a Quadrotor. SENSORS (BASEL, SWITZERLAND) 2025; 25:883. [PMID: 39943520 PMCID: PMC11821230 DOI: 10.3390/s25030883] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Figures] [Subscribe] [Scholar Register] [Received: 12/09/2024] [Revised: 01/22/2025] [Accepted: 01/28/2025] [Indexed: 02/16/2025]
Abstract
This paper contains an example of a simulation implementation of sliding mode control algorithms for the problem of adjusting the linear position of a quadrotor. A mathematical model of the drone was proposed, which was then implemented in a simulation environment. The method of designing sliding mode controllers using the Lyapunov method in order to improve stability was presented. A cascade system based entirely on sliding mode control algorithms is introduced. The article ends with a comparative analysis of simulation test results of classical control systems and controllers based on sliding mode control.
Collapse
Affiliation(s)
| | | | - Karol Tatar
- Institute of Automatic Control, Faculty of Electrical, Electronic, Computer and Control Engineering, Lodz University of Technology, 90-924 Łódź, Poland; (A.S.); (P.C.)
| |
Collapse
|
2
|
Zhang DY, Li XJ. Secure Consensus Control of Multiagent Systems Under DoS Attacks: A Switching-Scheme-Based Active Defense Method. IEEE TRANSACTIONS ON CYBERNETICS 2024; 54:7404-7415. [PMID: 39365714 DOI: 10.1109/tcyb.2024.3467272] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/06/2024]
Abstract
This article studies the secure consensus control problem of multiagent systems (MASs) with a nonzero input leader subject to denial-of-service (DoS) attacks. The introduction of backup topologies makes it possible for MASs to actively defend against DoS attacks. Subsequently, a novel active defense method consisting of two types of state observers, an adaptive topology switching mechanism, and switching controllers is proposed, which can ensure the leader-follower bound consensus even if DoS attacks hinder the interaction between agents. Within such a defense framework, the switching mechanism, driven by the predefined performance index and designed monitoring function, can automatically search for a healthy communication graph among backup topologies. Concurrently, the observer-based switching control strategy will be modified to match the corresponding topology, in which the universal observer and controller parameters in different topologies are obtained by solving linear matrix inequalities. It should be highlighted that the developed defense scheme not only removes the limitations of existing results on the duration and frequency of DoS attacks but also ensures the same upper bound of consensus error before and after DoS attacks. Finally, several simulation examples for different systems illustrate the efficiency and superiority of the theoretical results.
Collapse
|
3
|
Yang C, Liu Q. Secure consensus for PDEs-based multiagent systems under DoS attacks via boundary control approach. ISA TRANSACTIONS 2024; 154:1-13. [PMID: 39179480 DOI: 10.1016/j.isatra.2024.08.014] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/22/2024] [Revised: 06/02/2024] [Accepted: 08/12/2024] [Indexed: 08/26/2024]
Abstract
This paper focuses on secure consensus for leader-following multiagent systems (MASs) modeled by partial differential equations (PDEs) under denial of service (DoS) attacks. To mitigate the negative effects of DoS attacks, which can paralyze communication and cause agents to fail to receive valid control inputs, a buffer region is established in the communication channels among agents to temporarily store messages from neighbors. Additionally, since the states of the leader and followers are not always measurable, observers are used to estimate these states. To address these challenges, this paper proposes two boundary controllers to ensure leader-following consensus in both measurable and unmeasurable states. One controller is based on original boundary information, while the other utilizes observation information from both the leader and followers. To the best of our knowledge, this is the first attempt to use buffers to solve a class of PDEs-based MASs under DoS attacks. Furthermore, the boundary control approach has the potential to significantly reduce the number of actuators required, thereby lowering control costs. Finally, we present two numerical examples to validate the feasibility of the proposed methods.
Collapse
Affiliation(s)
- Chuanhai Yang
- School of Cyber Science and Engineering, Southeast University, Nanjing 210096, China.
| | - Qingshan Liu
- School of Mathematics, Frontiers Science Center for Mobile Information Communication and Security, Southeast University, Nanjing 210096, China; Purple Mountain Laboratories, Nanjing 211111, China.
| |
Collapse
|
4
|
Ma Y, Li Z, Cao Y, Xie X. Secure output consensus for multi-agent systems under edge-based event-trigger against denial-of-service. ISA TRANSACTIONS 2024; 151:33-40. [PMID: 38876951 DOI: 10.1016/j.isatra.2024.05.053] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/25/2023] [Revised: 05/22/2024] [Accepted: 05/31/2024] [Indexed: 06/16/2024]
Abstract
This paper is concerned with the secure output consensus problem for the heterogeneous multi-agent systems under the event-triggered scheme in the presence of the denial-of-service attack. Without detecting the attack, the hold-input controller update strategy is adopted when some transmission data may be lost due to the effect of the attack. Based on the tolerable duration of the attack, a novel edge-based event-triggered scheme is developed. The scheme can avoid continuous communication and exclude Zeno behavior. With the aid of the switched system theory, output consensus is preserved. An example shows the effectiveness.
Collapse
Affiliation(s)
- Yajing Ma
- School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, PR China; Provincial Engineering Research Center for New Energy Vehicle Intelligent Control and Simulation Test Technology of Sichuan, Chengdu 610039, PR China
| | - Zhanjie Li
- Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing 210023, PR China.
| | - Ye Cao
- State Key Laboratory for Manufacturing Systems Engineering, and School of Electronic and Information Engineering, Xi'an Jiaotong University, Xi'an 710049, PR China
| | - Xiangpeng Xie
- School of Internet of Things, Nanjing University of Posts and Telecommunications, Nanjing 210003, PR China; Institute of Advanced Technology, Nanjing University of Posts and Telecommunications, Nanjing 210023, PR China
| |
Collapse
|
5
|
Wang J, Wang W, Liang X. Finite-horizon optimal secure tracking control under denial-of-service attacks. ISA TRANSACTIONS 2024; 149:44-53. [PMID: 38692974 DOI: 10.1016/j.isatra.2024.04.025] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/29/2023] [Revised: 04/23/2024] [Accepted: 04/23/2024] [Indexed: 05/03/2024]
Abstract
The finite-horizon optimal secure tracking control (FHOSTC) problem for cyber-physical systems under actuator denial-of-service (DoS) attacks is addressed in this paper. A model-free method based on the Q-function is designed to achieve FHOSTC without the system model information. First, an augmented time-varying Riccati equation (TVRE) is derived by integrating the system with the reference system into a unified augmented system. Then, a lower bound on malicious DoS attacks probability that guarantees the solutions of the TVRE is provided. Third, a Q-function that changes over time (time-varying Q-function, TVQF) is devised. A TVQF-based method is then proposed to solve the TVRE without the need for the knowledge of the augmented system dynamics. The developed method works backward-in-time and uses the least-squares method. To validate the performance and features of the developed method, simulation studies are conducted in the end.
Collapse
Affiliation(s)
- Jian Wang
- Key Laboratory of Marine Intelligent Equipment and System Ministry of Education, Shanghai Jiao Tong University, Shanghai, 200240, PR China
| | - Wei Wang
- School of Information Engineering, Zhongnan University of Economics and Law, Wuhan 430073, PR China; School of Electrical and Information Engineering, Tianjin University, Tianjin, 300072, PR China.
| | - Xiaofeng Liang
- Key Laboratory of Marine Intelligent Equipment and System Ministry of Education, Shanghai Jiao Tong University, Shanghai, 200240, PR China
| |
Collapse
|
6
|
Shi T, Zhu F. Secure control scheme for CPSs under DoS attacks via multiple transmission channels and unknown input observer. ISA TRANSACTIONS 2023; 141:143-156. [PMID: 37451920 DOI: 10.1016/j.isatra.2023.06.040] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/22/2022] [Revised: 06/16/2023] [Accepted: 06/30/2023] [Indexed: 07/18/2023]
Abstract
The paper investigates the secure control problems for cyber-physical systems (CPSs) when the transmission channels suffer from Denial-of-Service (DoS) attacks based on switching observer and unknown input reconstruction (UIR). Firstly, an augmented system whose system state consists of the original system state and the measurement noises is set up, and the preconditions for the original system and augmented system are discussed in detail. Secondly, a full-order observer is constructed to generate the estimations of the augmented system state. Besides, based on the state estimation, an algebraic UIR method is developed and the UIR decouples the control input signal successfully. Thirdly, under the situation that some transmission channels suffer from DoS attacks, an observer-based secure controller is designed based on state estimation feedback and UIR feedback in view of a switching system. The stability of the switching system is analyzed as well. Finally, to verify the effectiveness of the proposed protocols, two simulation examples and the comparison with existing methods are given.
Collapse
Affiliation(s)
- Tianbiao Shi
- The College of Electronics and Information Engineering, Tongji University, Shanghai, 201804, China
| | - Fanglai Zhu
- The College of Electronics and Information Engineering, Tongji University, Shanghai, 201804, China.
| |
Collapse
|
7
|
Resilient State Containment of Multi-Agent Systems against Composite Attacks via Output Feedback: A Sampled-Based Event-Triggered Hierarchical Approach. Inf Sci (N Y) 2023. [DOI: 10.1016/j.ins.2023.01.125] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 02/05/2023]
|
8
|
Wang S, Yin X, Zhang Y, Li P, Wen H. Event-Triggered Cognitive Control for Networked Control Systems Subject to DoS Attacks and Time Delay. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2022. [DOI: 10.1007/s13369-022-07068-x] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 11/02/2022]
|
9
|
Yang Y. Switching cluster synchronization control of networked harmonic oscillators subject to denial-of-service attacks. ISA TRANSACTIONS 2022; 127:239-250. [PMID: 35221093 DOI: 10.1016/j.isatra.2022.02.002] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/02/2021] [Revised: 02/03/2022] [Accepted: 02/04/2022] [Indexed: 06/14/2023]
Abstract
This paper is concerned with the average cluster synchronization control problem of networked harmonic oscillators under denial-of-service (DoS) attacks. Different from some existing DoS attack models that often necessitate specific statistical characteristics, only the worse-case duration bound of the DoS attacks is required during the control design procedure, which represents the least a priori knowledge of realistic DoS attacks. Then, a novel switching cluster synchronization control scheme, which leverages a position-based feedback control protocol under a non-small delay and a position velocity-based feedback control protocol with a small delay, is developed such that the above two control protocols are selected based on the occurrence of the DoS attacks. Via formulating the resultant synchronization system as a switched time-delay system, a complete-type Lyapunov-Krasovskii functional (LKF) method is further proposed to establish sufficient controller design criteria associated with the duration and frequency of attacks for both synchronous and asynchronous DoS attacks among clusters. Furthermore, an iterative algorithm is designed to calculate the control gain matrices by solving a set of nonlinear matrix inequalities (NLMIs). Finally, a multi-vehicle cooperative control system is presented to demonstrate the validity of the proposed control scheme.
Collapse
Affiliation(s)
- Yanping Yang
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitized Textile and Fashion Technology, Ministry of Education, Donghua University, Shanghai 201620, China.
| |
Collapse
|
10
|
Gao R, Yang GH. Distributed multi-rate sampled-data H∞ consensus filtering for cyber-physical systems under denial-of-service attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2021.12.046] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|