1
|
Liu Y, Liu C, Wang X, Lan J, Ren X. Encryption-decryption-based distributed fault-tolerant consensus tracking control for multi-agent systems. ISA TRANSACTIONS 2024:1-9. [PMID: 39214754 DOI: 10.1016/j.isatra.2024.08.015] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 02/21/2024] [Revised: 08/08/2024] [Accepted: 08/16/2024] [Indexed: 09/04/2024]
Abstract
This study investigates fault-tolerant consensus tracking for discrete-time multi-agent systems (MASs) subject to external eavesdropping threats and additive actuator faults. First, actuator faults are modeled by difference equations, and decentralized observers are constructed to estimate actuator faults as well as system states. To offset fault-induced effects, ensure secure communication, and alleviate communication congestion, neighboring encrypted state information based on the encryption-decryption strategy (EDS) and estimated fault are integrated into a distributed active fault-tolerant consensus tracking control (FCTC) protocol. Through the properties of compatible norms, criteria for the controller, observer, and dynamic encryption key in EDS are derived to achieve leader-following consensus (LFC) of MASs with bias and drift actuator faults. Simulation results confirm the validity of the encryption-decryption-based distributed FCTC strategy.
Collapse
Affiliation(s)
- Yiliu Liu
- School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China
| | - Chun Liu
- School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China.
| | - Xiaofan Wang
- School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China
| | - Jianglin Lan
- James Watt School of Engineering, University of Glasgow, Glasgow, G12 8QQ, United Kingdom
| | - Xiaoqiang Ren
- School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China
| |
Collapse
|
2
|
Zarei MS, Atrianfar H. A hierarchical framework for distributed resilient control of islanded AC microgrids under false data injection attacks. ISA TRANSACTIONS 2023; 139:191-204. [PMID: 37055263 DOI: 10.1016/j.isatra.2023.03.044] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 06/28/2022] [Revised: 02/06/2023] [Accepted: 03/31/2023] [Indexed: 06/19/2023]
Abstract
In this paper, we propose a control scheme to ensure the microgrid control layers are resilient to cyberattacks. The studied microgrid consists of several distributed generation (DG) units and we consider the hierarchical control structure that is common for microgrids. The use of communication channels among DGs has made microgrids more vulnerable and this is where cybersecurity issues arise. In this work we added three algorithms, reputation-based, Weighted Mean Subsequence Reduced (W-MSR) and Resilient Consensus Algorithm with Trusted Nodes (RCA-T), to the secondary control layer of the microgrid and made them resilient to false data injection (FDI) attacks. In reputation-based control, some procedures are used for detecting the attacked DGs and isolating them from the others. W-MSR and RCA-T are Mean Subsequence Reduced (MSR)-based algorithms that fade the effect of attacks without finding them. These algorithms use a simple strategy that ignores some extreme values of neighboring agents, so an attacker can simply get ignored. Our analysis of the reputation-based algorithm is based on scrambling matrices, so the communication graph can switch in a prescribed set. In each of the above cases, to evaluate the performance of the designed controllers, in addition to theoretical analysis, we evaluated and compared the controllers using simulation.
Collapse
Affiliation(s)
- Mahdi Sadegh Zarei
- Electrical Engineering Department, Amirkabir University of Technology (Tehran Polytechnic), Tehran, Iran.
| | - Hajar Atrianfar
- Electrical Engineering Department, Amirkabir University of Technology (Tehran Polytechnic), Tehran, Iran; Center of Excellence on Control and Robotics, Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran.
| |
Collapse
|
3
|
Zuo S, Yue D. Resilient Output Formation Containment of Heterogeneous Multigroup Systems Against Unbounded Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:1902-1910. [PMID: 32603303 DOI: 10.1109/tcyb.2020.2998333] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article studies the attack-resilient output formation containment of general high-order heterogeneous multigroup systems under unknown unbounded attacks. The multigroup systems consist of cooperative heterogeneous leaders and followers, as well as adversarial attackers. Potential attacks on the multigroup systems consist of unknown unbounded signals generated from the attackers and injected distributedly into the actuator, the local state feedback, and communication channels of each agent to destabilize the synchronization dynamics. In contrast to the existing literature dealing with bounded disturbances, noises, and faults, which are caused unintentionally, this article studies the unknown unbounded attacks that are intentionally designed to jeopardize the system. The control objective is to make each follower's output trajectory reach the uniformly ultimately bounded (UUB) convergence to the time-varying formation reference, that is, the centroid of the multiple leaders' output trajectories while keeping a predefined time-varying offset with respect to it. Fully distributed attack-resilient control protocols are proposed, without requiring any global information. Lyapunov techniques are used to analyze the stability and UUB synchronization result of the overall closed-loop system. Comparative simulation examples are given to validate the proposed results.
Collapse
|
4
|
Guo Y, Tang H. An improved consensus algorithm for MAS with directed topology and binary-valued communication. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2021.10.057] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/20/2022]
|
5
|
Bonczek PJ, Peddi R, Gao S, Bezzo N. Detection of Nonrandom Sign-Based Behavior for Resilient Coordination of Robotic Swarms. IEEE T ROBOT 2022. [DOI: 10.1109/tro.2021.3139592] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/07/2022]
|
6
|
|
7
|
Sahoo S, Peng JCH. A Localized Event-Driven Resilient Mechanism for Cooperative Microgrid Against Data Integrity Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:3687-3698. [PMID: 32452784 DOI: 10.1109/tcyb.2020.2989225] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article investigates the impact of data integrity attacks (DIAs) on cooperative economic dispatch of distributed generators (DGs) in an ac microgrid. To establish resiliency against such attacks and ensure optimal operation, a localized event-driven attack-resilient scheme is proposed. Most of the existing works examine neighboring information to infer the presence of DIAs, where the detection is limited to events such as multiple link failures. Two kinds of DIAs are considered in this article-namely, fault and random attacks, which are segregated based on the final values of consensus updates. First, to improve the robustness of the detection theory, a localized resilient control update is designed by modeling each DG with a reference incremental cost. Second, event-driven control signal is generated for the local incremental cost and held upon the detection of attacks, to prevent malicious data from propagating to the neighboring nodes. The proposed strategy acts immediately upon the detection of DIA to ensure maximization in the economic profit. Furthermore, the proposed detection approach is theoretically verified and validated using simulation conditions.
Collapse
|
8
|
Yassaie N, Hallajiyan M, Sharifi I, Talebi HA. Resilient control of multi-microgrids against false data injection attack. ISA TRANSACTIONS 2021; 110:238-246. [PMID: 33069373 DOI: 10.1016/j.isatra.2020.10.030] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 01/10/2020] [Revised: 09/19/2020] [Accepted: 10/05/2020] [Indexed: 06/11/2023]
Abstract
A multi-microgrid system, including several microgrids and distributed energy resources, is always threatened by numbers of faults and attacks as a consequence of which malfunctioning can occur on a large scale. Thus, minimizing the effects of such disruptions is of paramount importance. This paper addresses the problem of mitigating a multi-microgrid system that faces false data injection and replay attacks by considering the multi-microgrid as a multi-agent system in which each microgrid as an agent represents a node in a weighted directed graph. The problem of consensus among normal agents is studied when microgrids and their communications are attacked. The malicious agents become isolated with the help of Weighted Mean Subsequence Reduced (W-MSR) algorithms in which all normal agents neglect the extreme values received from their neighbors. The proposed controller is able to maintain the system's desired performance when false data is injected into the system, or valid data is received with time-delays. Finally, numerical examples and simulation results are provided.
Collapse
Affiliation(s)
- Negar Yassaie
- Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran.
| | | | - Iman Sharifi
- Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran.
| | - H A Talebi
- Department of Electrical Engineering, Amirkabir University of Technology, Tehran, Iran.
| |
Collapse
|
9
|
Mousavinejad E, Ge X, Han QL, Yang F, Vlacic L. Resilient Tracking Control of Networked Control Systems Under Cyber Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:2107-2119. [PMID: 31722506 DOI: 10.1109/tcyb.2019.2948427] [Citation(s) in RCA: 12] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
This article is concerned with the resilient tracking control of a networked control system under cyber attacks. The attacker is an active adversary whose aim is to severely degrade the tracking performance of the system by launching deception attacks on the sensor-to-controller communication channels and denial-of-service attacks on the controller-to-plant channels, respectively. First, a concept of resilient set-membership tracking control is presented, through which the system's true state is guaranteed to reside in a bounding ellipsoidal set of the reference state regardless of the existence of attacks and unknown-but-bounded (UBB) noises. Second, in the case that full information of the system's state is not implicitly trusted in the presence of attacks, a resilient set-membership estimation strategy is provided to secure the state estimates against the deception attacks. Furthermore, based on a recursive computation of a reference state ellipsoid and confidence state estimation ellipsoids, a convex optimization algorithm in terms of recursive linear matrix inequalities is proposed to obtain the gain parameters for both the desired resilient state estimator and the tracking controller. Finally, the effectiveness of the proposed method is illustrated through an Internet-based three-tank system.
Collapse
|
10
|
Petrillo A, Pescape A, Santini S. A Secure Adaptive Control for Cooperative Driving of Autonomous Connected Vehicles in the Presence of Heterogeneous Communication Delays and Cyberattacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:1134-1149. [PMID: 31995510 DOI: 10.1109/tcyb.2019.2962601] [Citation(s) in RCA: 15] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
The development of autonomous connected vehicles, moving as a platoon formation, is a hot topic in the intelligent transportation system (ITS) research field. It is on the road and deployment requires the design of distributed control strategies, leveraging secure vehicular ad-hoc networks (VANETs). Indeed, wireless communication networks can be affected by various security vulnerabilities and cyberattacks leading to dangerous implications for cooperative driving safety. Control design can play an important role in providing both resilience and robustness to vehicular networks. To this aim, in this article, we tackle and solve the problem of cyber-secure tracking for a platoon that moves as a cohesive formation along a single lane undergoing different kinds of cyber threats, that is, application layer and network layer attacks, as well as network induced phenomena. The proposed cooperative approach leverages an adaptive synchronization-based control algorithm that embeds a distributed mitigation mechanism of malicious information. The closed-loop stability is analytically demonstrated by using the Lyapunov-Krasovskii theory, while its effectiveness in coping with the most relevant type of cyber threats is disclosed by using PLEXE, a high fidelity simulator which provides a realistic simulation of cooperative driving systems.
Collapse
|
11
|
Cheng J, Wu Y, Xiong L, Cao J, Park JH. Resilient asynchronous state estimation of Markov switching neural networks: A hierarchical structure approach. Neural Netw 2020; 135:29-37. [PMID: 33341512 DOI: 10.1016/j.neunet.2020.12.002] [Citation(s) in RCA: 13] [Impact Index Per Article: 3.3] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Received: 04/20/2020] [Revised: 08/17/2020] [Accepted: 12/03/2020] [Indexed: 11/28/2022]
Abstract
This paper deals with the issue of resilient asynchronous state estimation of discrete-time Markov switching neural networks. Randomly occurring signal quantization and packet dropout are involved in the imperfect measured output. The asynchronous switching phenomena appear among Markov switching neural networks, quantizer modes and filter modes, which are modeled by a hierarchical structure approach. By resorting to the hierarchical structure approach and Lyapunov functional technique, sufficient conditions are achieved, and asynchronous resilient filters are derived such that filtering error dynamic is stochastically stable. Finally, two examples are included to verify the validity of the proposed method.
Collapse
Affiliation(s)
- Jun Cheng
- College of Mathematics and Statistics, Guangxi Normal University, Guilin, 541006, China; School of Information Science and Engineering, Chengdu University, Chengdu 610106, China.
| | - Yuyan Wu
- College of Mathematics and Statistics, Guangxi Normal University, Guilin, 541006, China.
| | - Lianglin Xiong
- School of Mathematics and Computer Science, Yunnan Minzu University, Kunming 650500, China.
| | - Jinde Cao
- School of Mathematics, Southeast University, Nanjing 21189, China; Yonsei Frontier Lab, Yonsei University, Seoul 03722, China.
| | - Ju H Park
- Department of Electrical Engineering, Yeungnam University, Gyeongsan 38541, South Korea.
| |
Collapse
|
12
|
Modares H, Kiumarsi B, Lewis FL, Ferrese F, Davoudi A. Resilient and Robust Synchronization of Multiagent Systems Under Attacks on Sensors and Actuators. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:1240-1250. [PMID: 30908252 DOI: 10.1109/tcyb.2019.2903411] [Citation(s) in RCA: 9] [Impact Index Per Article: 2.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
Abstract
Resilient and robust distributed control protocols for multiagent systems under attacks on sensors and actuators are designed. A distributed H∞ control protocol is designed to attenuate the disturbance or attack effects. However, the H∞ controller is too conservative in the presence of attacks. Therefore, it is augmented with a distributed adaptive compensator to mitigate the adverse effects of attacks. The proposed controller can make the synchronization error arbitrarily small in the presence of faulty attacks, and satisfy global L2 -gain performance in the presence of malicious attacks or disturbances. A significant advantage of the proposed method is that it requires no restriction on the number of agents or agents' neighbors under attacks on sensors and/or actuators, and it recovers even compromised agents under attacks on actuators. Simulation examples verify the effectiveness of the proposed method.
Collapse
|
13
|
Moghadam R, Modares H. Resilient Autonomous Control of Distributed Multiagent Systems in Contested Environments. IEEE TRANSACTIONS ON CYBERNETICS 2019; 49:3957-3967. [PMID: 30130241 DOI: 10.1109/tcyb.2018.2856089] [Citation(s) in RCA: 12] [Impact Index Per Article: 2.4] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
An autonomous and resilient controller is proposed for leader-follower multiagent systems under uncertainties and cyber-physical attacks. The leader is assumed nonautonomous with a nonzero control input, which allows changing the team behavior or mission in response to the environmental changes. A resilient learning-based control protocol is presented to find optimal solutions to the synchronization problem in the presence of attacks and system dynamic uncertainties. An observer-based distributed H∞ controller is first designed to prevent propagating the effects of attacks on sensors and actuators throughout the network, as well as to attenuate the effect of these attacks on the compromised agent itself. Nonhomogeneous game algebraic Riccati equations are derived to solve the H∞ optimal synchronization problem and off-policy reinforcement learning (RL) is utilized to learn their solution without requiring any knowledge of the agent's dynamics. A trust-confidence-based distributed control protocol is then proposed to mitigate attacks that hijack the entire node and attacks on communication links. A confidence value is defined for each agent based solely on its local evidence. The proposed resilient RL algorithm employs the confidence value of each agent to indicate the trustworthiness of its own information and broadcast it to its neighbors to put weights on the data they receive from it during and after learning. If the confidence value of an agent is low, it employs a trust mechanism to identify compromised agents and remove the data it receives from them from the learning process. The simulation results are provided to show the effectiveness of the proposed approach.
Collapse
|
14
|
Huang J, Wu Y, Chang L, Tao M, He X. Resilient consensus with switching networks and heterogeneous agents. Neurocomputing 2019. [DOI: 10.1016/j.neucom.2019.03.018] [Citation(s) in RCA: 4] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
|
15
|
Zhang D, Liu L, Feng G. Consensus of Heterogeneous Linear Multiagent Systems Subject to Aperiodic Sampled-Data and DoS Attack. IEEE TRANSACTIONS ON CYBERNETICS 2019; 49:1501-1511. [PMID: 29993621 DOI: 10.1109/tcyb.2018.2806387] [Citation(s) in RCA: 48] [Impact Index Per Article: 9.6] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/08/2023]
Abstract
In this paper, the robust output consensus problem for a class of heterogeneous linear multiagent systems (MASs) in presence of aperiodic sampling and random deny-of-service (DoS) attack is investigated. A novel distributed output-feedback control strategy is proposed so that the controlled MAS achieves the objective of output consensus in spite of aperiodic sampling and DoS attack. By assuming that the sampling process is nonuniform and the consecutive attack duration is upper bounded, the closed-loop control system is first described as a discrete-time switched stochastic delay system. Some sufficient conditions are then obtained for the solvability of the secure consensus problem. Furthermore, a constructive design procedure for the proposed controller is then presented. Finally, a simulation example is introduced to illustrate the effectiveness of controller design.
Collapse
|
16
|
Resilient control design for consensus of nonlinear multi-agent systems with switching topology and randomly varying communication delays. Neurocomputing 2018. [DOI: 10.1016/j.neucom.2018.05.054] [Citation(s) in RCA: 25] [Impact Index Per Article: 4.2] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/16/2022]
|
17
|
Lu R, Tao J, Shi P, Su H, Wu ZG, Xu Y. Dissipativity-Based Resilient Filtering of Periodic Markovian Jump Neural Networks With Quantized Measurements. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2018; 29:1888-1899. [PMID: 28422698 DOI: 10.1109/tnnls.2017.2688582] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
Abstract
The problem of dissipativity-based resilient filtering for discrete-time periodic Markov jump neural networks in the presence of quantized measurements is investigated in this paper. Due to the limited capacities of network medium, a logarithmic quantizer is applied to the underlying systems. Considering the fact that the filter is realized through a network, randomly occurring parameter uncertainties of the filter are modeled by two mode-dependent Bernoulli processes. By establishing the mode-dependent periodic Lyapunov function, sufficient conditions are given to ensure the stability and dissipativity of the filtering error system. The filter parameters are derived via solving a set of linear matrix inequalities. The merits and validity of the proposed design techniques are verified by a simulation example.
Collapse
|
18
|
Ding D, Han QL, Xiang Y, Ge X, Zhang XM. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018. [DOI: 10.1016/j.neucom.2017.10.009] [Citation(s) in RCA: 489] [Impact Index Per Article: 81.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
19
|
Wei Y, Liu GP. Consensus Tracking of Heterogeneous Discrete-Time Networked Multiagent Systems Based on the Networked Predictive Control Scheme. IEEE TRANSACTIONS ON CYBERNETICS 2017; 47:2173-2184. [PMID: 28534803 DOI: 10.1109/tcyb.2017.2674698] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/07/2023]
Abstract
This paper studies the problem of consensus tracking for heterogeneous discrete-time networked multiagent systems (NMASs) with network-induced communication delay. By introducing the networked predictive control scheme, novel consensus tracking protocols are designed to ensure that states of the NMASs follow the external reference signal. One of the agents is defined as the leader agent, all the other agents are defined as the followers, and the external reference signal is always known by the leader agent, both cases where the external reference signal is available and unavailable to the follower agents are discussed in this paper. The necessary and sufficient conditions for the novel consensus tracking protocols are proposed based on algebraic and graph theory. Numerical examples are given to validate the theoretical results.
Collapse
|
20
|
Feng Z, Wen G, Hu G. Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2017; 47:1273-1284. [PMID: 27093715 DOI: 10.1109/tcyb.2016.2544062] [Citation(s) in RCA: 47] [Impact Index Per Article: 6.7] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
This paper studies a distributed secure consensus tracking control problem for multiagent systems subject to strategic cyber attacks modeled by a random Markov process. A hybrid stochastic secure control framework is established for designing a distributed secure control law such that mean-square exponential consensus tracking is achieved. A connectivity restoration mechanism is considered and the properties on attack frequency and attack length rate are investigated, respectively. Based on the solutions of an algebraic Riccati equation and an algebraic Riccati inequality, a procedure to select the control gains is provided and stability analysis is studied by using Lyapunov's method.. The effect of strategic attacks on discrete-time systems is also investigated. Finally, numerical examples are provided to illustrate the effectiveness of theoretical analysis.
Collapse
|
21
|
Zhang L, Yin X, Ning Z, Ye D. Robust Filtering for a Class of Networked Nonlinear Systems With Switching Communication Channels. IEEE TRANSACTIONS ON CYBERNETICS 2017; 47:671-682. [PMID: 26890947 DOI: 10.1109/tcyb.2016.2523811] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
This paper is concerned with the problem of robust filter design for a class of discrete-time networked nonlinear systems. The Takagi-Sugeno fuzzy model is employed to represent the underlying nonlinear dynamics. A multi-channel communication scheme that involves a channel switching phenomenon described by a Markov chain is proposed for data transmission. Two typical communication imperfections, network-induced time-varying delays and packet dropouts are considered in each channel. The objective of this paper is to design an admissible filter such that the filter error system is stochastically stable and ensures a prescribed disturbance attenuation level bound. Based on the Lyapunov-Krasovskii functional method and matrix inequality techniques, sufficient conditions on the existence of the desired filter are obtained. A numerical example is provided to illustrate the effectiveness of the proposed design approach.
Collapse
|
22
|
Criado N, Such JM. Norm Monitoring Under Partial Action Observability. IEEE TRANSACTIONS ON CYBERNETICS 2017; 47:270-282. [PMID: 26800560 DOI: 10.1109/tcyb.2015.2513430] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
In the context of using norms for controlling multiagent systems, a vitally important question that has not yet been addressed in the literature is the development of mechanisms for monitoring norm compliance under partial action observability. This paper proposes the reconstruction of unobserved actions to tackle this problem. In particular, we formalize the problem of reconstructing unobserved actions, and propose an information model and algorithms for monitoring norms under partial action observability using two different processes for reconstructing unobserved actions. Our evaluation shows that reconstructing unobserved actions increases significantly the number of norm violations and fulfilments detected.
Collapse
|
23
|
He J, Zhou M, Cheng P, Shi L, Chen J. Consensus Under Bounded Noise in Discrete Network Systems: An Algorithm With Fast Convergence and High Accuracy. IEEE TRANSACTIONS ON CYBERNETICS 2016; 46:2874-2884. [PMID: 26552102 DOI: 10.1109/tcyb.2015.2491368] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
Most existing works investigate consensus with noise following a certain distribution, e.g., Gaussian distribution, with fixed expectation and variance, which may not be satisfied in practical applications. This paper investigates the discrete system consensus under bounded noise, which is important and practical problem. We first provide necessary and sufficient conditions for the convergence of consensus under bounded noise. To be more general, we derive an analytical bound to show the max-min difference between the nodes' states when the general consensus algorithm converges to a stable state. Then, a novel consensus algorithm, fast consensus under bounded noise (FCBN), is proposed to eliminate the accumulative error caused by the bounded noise. It is proved that FCBN has a faster convergence speed and a higher consensus accuracy than general consensus algorithms. Extensive simulations demonstrate the effectiveness of the proposed algorithm.
Collapse
|
24
|
Han Z, Wang L, Lin Z, Zheng R. Formation Control With Size Scaling Via a Complex Laplacian-Based Approach. IEEE TRANSACTIONS ON CYBERNETICS 2016; 46:2348-2359. [PMID: 26441460 DOI: 10.1109/tcyb.2015.2477107] [Citation(s) in RCA: 6] [Impact Index Per Article: 0.8] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
We consider the control of formations of a leader-follower network, where the objective is to steer a team of multiple mobile agents into a formation of variable size. We assume that the shape description of the formation is known to all the agents, which is captured by a complex-valued Laplacian associated with the sensing graph, but the size scaling of the formation is not known or only known to two agents, called the leaders in the network. A distributed linear control strategy is developed in this paper such that the agents converge to the desired formation shape, for which the size of the formation is determined by the two leaders. Moreover, in order to make all agents in a formation move with a common velocity, the distributed control law also incorporates a velocity consensus component, which is implemented with the help of a communication network that may, in general, be of different topology from the sensing graph. Both the setup of single-integrator kinematics and the one of double-integrator dynamics are addressed in the same framework except that the acceleration control in the double-integrator setup has an extra damping term.
Collapse
|
25
|
Zhang L, Zhang H. A Survey on Security and Privacy in Emerging Sensor Networks: From Viewpoint of Close-Loop. SENSORS 2016; 16:443. [PMID: 27023559 PMCID: PMC4850957 DOI: 10.3390/s16040443] [Citation(s) in RCA: 8] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 02/20/2016] [Revised: 03/15/2016] [Accepted: 03/22/2016] [Indexed: 11/24/2022]
Abstract
Nowadays, as the next generation sensor networks, Cyber-Physical Systems (CPSs) refer to the complex networked systems that have both physical subsystems and cyber components, and the information flow between different subsystems and components is across a communication network, which forms a closed-loop. New generation sensor networks are found in a growing number of applications and have received increasing attention from many inter-disciplines. Opportunities and challenges in the design, analysis, verification and validation of sensor networks co-exists, among which security and privacy are two important ingredients. This paper presents a survey on some recent results in the security and privacy aspects of emerging sensor networks from the viewpoint of the closed-loop. This paper also discusses several future research directions under these two umbrellas.
Collapse
Affiliation(s)
- Lifu Zhang
- Wenzhou Vocational & Technical College, Wenzhou 325000, China.
| | - Heng Zhang
- Huaihai Institute of Technology, Lianyungang 222000, China.
| |
Collapse
|
26
|
Su S, Lin Z, Garcia A. Distributed Synchronization Control of Multiagent Systems With Unknown Nonlinearities. IEEE TRANSACTIONS ON CYBERNETICS 2016; 46:325-338. [PMID: 26684259 DOI: 10.1109/tcyb.2015.2402192] [Citation(s) in RCA: 24] [Impact Index Per Article: 3.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/05/2023]
Abstract
This paper revisits the distributed adaptive control problem for synchronization of multiagent systems where the dynamics of the agents are nonlinear, nonidentical, unknown, and subject to external disturbances. Two communication topologies, represented, respectively, by a fixed strongly-connected directed graph and by a switching connected undirected graph, are considered. Under both of these communication topologies, we use distributed neural networks to approximate the uncertain dynamics. Decentralized adaptive control protocols are then constructed to solve the cooperative tracker problem, the problem of synchronization of all follower agents to a leader agent. In particular, we show that, under the proposed decentralized control protocols, the synchronization errors are ultimately bounded, and their ultimate bounds can be reduced arbitrarily by choosing the control parameter appropriately. Simulation study verifies the effectiveness of our proposed protocols.
Collapse
|
27
|
Chan WKV, Chen CLP. Consensus Control With Failure--Wait or Abandon? IEEE TRANSACTIONS ON CYBERNETICS 2016; 46:75-84. [PMID: 25794406 DOI: 10.1109/tcyb.2015.2394471] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
Abstract
This paper introduces and solves a decision-making problem under the context of consensus control with failure. We study an optimal consensus control problem in which n autonomous agents try to arrive at a target at the same time. One of the agents suddenly fails and the rest n - 1 agents can either wait or abandon the failed agent. If they wait, they must slow down and delay the consensus time. If they abandon the failed agent, they can reach consensus earlier at the cost of losing one agent at consensus. This cost is an added delay to the consensus time. The decision problem is to decide whether to wait or abandon and, if abandon, when? To solve this problem, we derive analytical expressions and establish structural properties for target distance functions. We use numerical examples and simulation examples to demonstrate the applications of the derived formulas and results.
Collapse
|
28
|
Carboni D, Williams RK, Gasparri A, Ulivi G, Sukhatme GS. Rigidity-Preserving Team Partitions in Multiagent Networks. IEEE TRANSACTIONS ON CYBERNETICS 2015; 45:2640-2653. [PMID: 25561600 DOI: 10.1109/tcyb.2014.2378552] [Citation(s) in RCA: 3] [Impact Index Per Article: 0.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/04/2023]
Abstract
Motivated by the strong influence network rigidity has on collaborative systems, in this paper, we consider the problem of partitioning a multiagent network into two sub-teams, a bipartition, such that the resulting sub-teams are topologically rigid. In this direction, we determine the existence conditions for rigidity-preserving bipartitions, and provide an iterative algorithm that identifies such partitions in polynomial time. In particular, the relationship between rigid graph partitions and the previously identified Z-link edge structure is given, yielding a feasible direction for graph search. Adapting a supergraph search mechanism, we then detail a methodology for discerning graphs cuts that represent valid rigid bipartitions. Next, we extend our methods to a decentralized context by exploiting leader election and an improved graph search to evaluate feasible cuts using only local agent-to-agent communication. Finally, full algorithm details and pseudocode are provided, together with simulation results that verify correctness and demonstrate complexity.
Collapse
|