1
|
Yan S, Qian H, Ding P, Chu S, Wang H. Finite-time tolerant containment control for IT2 T-S fuzzy network multi-agent systems with actuator faults, packet dropouts and DoS attacks. ISA TRANSACTIONS 2023; 137:199-209. [PMID: 36849291 DOI: 10.1016/j.isatra.2023.01.036] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 09/06/2022] [Revised: 01/26/2023] [Accepted: 01/27/2023] [Indexed: 06/04/2023]
Abstract
This article studies finite-time tolerant containment control issue for uncertain nonlinear networked multi-agent systems (MASs) with actuator faults, denial-of-service (DoS) attacks and packet dropouts, under the framework of interval type-2 (IT2) Takagi-Sugeno (T-S) fuzzy method. Firstly, based on establishing the actuator fault models and introducing Bernoulli random distribution to represent the packet dropouts phenomenon, the IT2 T-S fuzzy network MASs under actuator faults and packet dropouts are constructed as switchable systems according to the attack situations on the communication channels. Secondly, the slack matrix with more information of lower and upper membership functions is introduced in the stability analysis to reduce conservatism. And on basis of Lyapunov stability theory and average dwell-time method, finite-time tolerant containment control protocol is proposed, which makes the follower' states converge to the convex hull controlled by the leaders in finite time. Finally, the effectiveness of the control protocol designed in this article is verified by numerical simulation.
Collapse
Affiliation(s)
- Shuya Yan
- College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin, 150001, China.
| | - Huaming Qian
- College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin, 150001, China.
| | - Peng Ding
- College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin, 150001, China.
| | - Shuai Chu
- College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin, 150001, China.
| | - Huilin Wang
- College of Intelligent Systems Science and Engineering, Harbin Engineering University, Harbin, 150001, China.
| |
Collapse
|
2
|
Ma YS, Che WW, Deng C, Wu ZG. Distributed Model-Free Adaptive Control for Learning Nonlinear MASs Under DoS Attacks. IEEE TRANSACTIONS ON NEURAL NETWORKS AND LEARNING SYSTEMS 2023; 34:1146-1155. [PMID: 34428158 DOI: 10.1109/tnnls.2021.3104978] [Citation(s) in RCA: 5] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
This article addresses the distributed model-free adaptive control (DMFAC) problem for learning nonlinear multiagent systems (MASs) subjected to denial-of-service (DoS) attacks. An improved dynamic linearization method is proposed to obtain an equivalent linear data model for learning systems. To alleviate the influence of DoS attacks, an attack compensation mechanism is developed. Based on the equivalent linear data model and the attack compensation mechanism, a novel learning-based DMFAC algorithm is developed to resist DoS attacks, which provides a unified framework to solve the leaderless consensus control, the leader-following consensus control, and the containment control problems. Finally, simulation examples are shown to illustrate the effectiveness of the developed DMFAC algorithm.
Collapse
|
3
|
Chen T, Wang F, Xia C, Chen Z. Containment control for second-order multi-agent systems with intermittent sampled position data under directed topologies. Knowl Based Syst 2022. [DOI: 10.1016/j.knosys.2022.109892] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/14/2022]
|
4
|
Ma YS, Che WW, Deng C, Wu ZG. Observer-Based Event-Triggered Containment Control for MASs Under DoS Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:13156-13167. [PMID: 34464285 DOI: 10.1109/tcyb.2021.3104178] [Citation(s) in RCA: 8] [Impact Index Per Article: 4.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/13/2023]
Abstract
This article studies the observer-based event-triggered containment control problem for linear multiagent systems (MASs) under denial-of-service (DoS) attacks. In order to deal with situations where MASs states are unmeasurable, an improved separation method-based observer design method with less conservativeness is proposed to estimate MASs states. To save communication resources and achieve the containment control objective, a novel observer-based event-triggered containment controller design method based on observer states is proposed for MASs under the influence of DoS attacks, which can make the MASs resilient to DoS attacks. In addition, the Zeno behavior can be eliminated effectively by introducing a positive constant into the designed event-triggered mechanism. Finally, a practical example is presented to illustrate the effectiveness of the designed observer and the event-triggered containment controller.
Collapse
|
5
|
Chen J, Gan M, Zhu Q, Narayan P, Liu Y. Robust Standard Gradient Descent Algorithm for ARX Models Using Aitken Acceleration Technique. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:9646-9655. [PMID: 33755573 DOI: 10.1109/tcyb.2021.3063113] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/12/2023]
Abstract
A robust standard gradient descent (SGD) algorithm for ARX models using the Aitken acceleration method is developed. Considering that the SGD algorithm has slow convergence rates and is sensitive to the step size, a robust and accelerative SGD (RA-SGD) algorithm is derived. This algorithm is based on the Aitken acceleration method, and its convergence rate is improved from linear convergence to at least quadratic convergence in general. Furthermore, the RA-SGD algorithm is always convergent with no limitation of the step size. Both the convergence analysis and the simulation examples demonstrate that the presented algorithm is effective.
Collapse
|
6
|
Yang Y. Switching cluster synchronization control of networked harmonic oscillators subject to denial-of-service attacks. ISA TRANSACTIONS 2022; 127:239-250. [PMID: 35221093 DOI: 10.1016/j.isatra.2022.02.002] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/02/2021] [Revised: 02/03/2022] [Accepted: 02/04/2022] [Indexed: 06/14/2023]
Abstract
This paper is concerned with the average cluster synchronization control problem of networked harmonic oscillators under denial-of-service (DoS) attacks. Different from some existing DoS attack models that often necessitate specific statistical characteristics, only the worse-case duration bound of the DoS attacks is required during the control design procedure, which represents the least a priori knowledge of realistic DoS attacks. Then, a novel switching cluster synchronization control scheme, which leverages a position-based feedback control protocol under a non-small delay and a position velocity-based feedback control protocol with a small delay, is developed such that the above two control protocols are selected based on the occurrence of the DoS attacks. Via formulating the resultant synchronization system as a switched time-delay system, a complete-type Lyapunov-Krasovskii functional (LKF) method is further proposed to establish sufficient controller design criteria associated with the duration and frequency of attacks for both synchronous and asynchronous DoS attacks among clusters. Furthermore, an iterative algorithm is designed to calculate the control gain matrices by solving a set of nonlinear matrix inequalities (NLMIs). Finally, a multi-vehicle cooperative control system is presented to demonstrate the validity of the proposed control scheme.
Collapse
Affiliation(s)
- Yanping Yang
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitized Textile and Fashion Technology, Ministry of Education, Donghua University, Shanghai 201620, China.
| |
Collapse
|
7
|
Li J, Dong H, Shen Y, Hou N. Encoding-decoding strategy based resilient state estimation for bias-corrupted stochastic nonlinear systems. ISA TRANSACTIONS 2022; 127:80-87. [PMID: 35636987 DOI: 10.1016/j.isatra.2022.04.048] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/03/2021] [Revised: 04/26/2022] [Accepted: 04/26/2022] [Indexed: 06/15/2023]
Abstract
This paper is concerned with the resilient state estimation problem for a type of stochastic nonlinear systems, in which the possible dynamical bias is considered that is depicted by a dynamical equation. In pursuit of enhancing the robustness of the propagated data, a binary encoding strategy (BES) is exploited in the binary symmetric channel (BSC). While the random bit errors caused by the channel noise may take place during the propagation of the binary bit string via the memoryless BSC. To characterize the occurrence of the bit errors, a series of Bernoulli distributed random variables is adopted. More specifically, in order to deal with the possible gain fluctuation of the estimator in the execution process, a resilient state estimator is employed. This paper intends to put forward a novel resilient estimation scheme under the BES, which can assure that the estimation error dynamics is exponentially ultimately bounded in mean square. A sufficient criterion is first acquired for the existence of the expected resilient estimator and the estimator parameter is achieved by solving a convex optimization problem. Finally, an illustrative simulation example is provided to verify the validity of the theoretical results.
Collapse
Affiliation(s)
- Jiahui Li
- Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China
| | - Hongli Dong
- Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China.
| | - Yuxuan Shen
- Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China
| | - Nan Hou
- Artificial Intelligence Energy Research Institute, Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Northeast Petroleum University, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China
| |
Collapse
|
8
|
Sun J, Shen B, Liu Y. A resilient outlier-resistant recursive filtering approach to time-delayed spatial-temporal systems with energy harvesting sensors. ISA TRANSACTIONS 2022; 127:41-49. [PMID: 35074210 DOI: 10.1016/j.isatra.2021.12.040] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/24/2021] [Revised: 12/31/2021] [Accepted: 12/31/2021] [Indexed: 06/14/2023]
Abstract
This paper is concerned with a resilient outlier-resistant recursive filtering problem for a class of time-delayed spatial-temporal systems (STSs) with energy harvesting sensors. We consider a situation that the sensors are able to harvest energy from external environments and consume certain energy when the measurements are transmitted to filters. When the energy of the sensor is insufficient to maintain the normal communication between the sensors and the filters, the measurement will be regarded as missing. For the sake of obtaining a satisfactory filtering performance, the innovations influenced by the measurement outliers is constrained by introducing a saturation function in the filter. Furthermore, the resilient issue of the designed recursive filter is considered to resist the fluctuations of the filter parameters. Under the effects of sensor energy constraints, measurement outliers as well as parameter fluctuations, a resilient outlier-resistant recursive filter is designed where an upper bound (UB) is first obtained on the filtering error covariance (FEC). Then, by resorting to a matrix recursive equation, such a UB is minimized by the filter gain matrix. Finally, we exhibit a numerical example to verify the effectiveness of the proposed resilient outlier-resistant recursive filter scheme for time-delayed STSs.
Collapse
Affiliation(s)
- Jie Sun
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Shanghai 201620, China
| | - Bo Shen
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Shanghai 201620, China.
| | - Yufei Liu
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Shanghai 201620, China
| |
Collapse
|
9
|
Bu X, Song J, Huo F, Yang F. Dynamic event-triggered resilient state estimation for time-varying complex networks with Markovian switching topologies. ISA TRANSACTIONS 2022; 127:50-59. [PMID: 35667902 DOI: 10.1016/j.isatra.2022.05.012] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/03/2021] [Revised: 05/07/2022] [Accepted: 05/08/2022] [Indexed: 06/15/2023]
Abstract
This paper addresses a resilient state estimation problem for an array of nonlinear complex networks with switching topologies under the dynamic event-triggered mechanism (ETM). To reduce the unnecessary data delivery, the dynamic ETM is introduced to schedule the data delivery from sensors to estimators. The model of the switched complex networks is established by adopting a Markov chain which is better to reflect the characteristics of practical complex networks. A set of novel estimators is obtained by using the properties of Kronecker product combining with the Lyapunov-Krasovskii method, and some easy-to-check conditions are derived such that the dynamics of state estimation error satisfies the prescribed H∞ performance index. In addition, the parameters of the designed resilient state estimators can be acquired by solving a series of convex optimization problems. In the end, a simulation example is given to demonstrate the validity of the proposed theoretical results in this paper.
Collapse
Affiliation(s)
- Xianye Bu
- School of Electrical Engineering and Information, Northeast Petroleum University, Daqing 163318, China; Artificial Intelligence Energy Research Institute of Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China
| | - Jinbo Song
- School of Electrical Engineering and Information, Northeast Petroleum University, Daqing 163318, China; Artificial Intelligence Energy Research Institute of Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China
| | - Fengcai Huo
- Artificial Intelligence Energy Research Institute of Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China.
| | - Fan Yang
- Artificial Intelligence Energy Research Institute of Northeast Petroleum University, Daqing 163318, China; Heilongjiang Provincial Key Laboratory of Networking and Intelligent Control, Daqing 163318, China; SANYA Offshore Oil & Gas Research Institute, Northeast Petroleum University, Sanya 572024, China
| |
Collapse
|
10
|
Xie M, Song Y, Shen S. Event-based consensus control for multi-agent systems against joint sensor and actuator attacks. ISA TRANSACTIONS 2022; 127:156-167. [PMID: 35148887 DOI: 10.1016/j.isatra.2022.01.027] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/17/2021] [Revised: 01/22/2022] [Accepted: 01/22/2022] [Indexed: 06/14/2023]
Abstract
The paper focuses on the observer-based consensus control issue for a class of discrete-time multi-agent systems suffering from the joint actuator and sensor attacks. An event-triggered communication rule with the adaptive threshold update is introduced to reduce the communication burden. A PI-type controller with a finite-time window integral loop is constructed to achieve bounded consensus in the mean-square sense (BCMS). With the help of common properties of Laplace matrices, the closed-loop multi-agent system is converted into an easy-to-analyze pattern. In light of such a pattern, a sufficient condition is derived to realize the desired consensus by the stochastic analysis. Furthermore, the expected gains of the controller and the observer are determined by resorting to matrix inequalities in combination with the cone complementarity linearization algorithm. Finally, a numerical example and a simulation of the platooning vehicle are proposed to illustrate the effectiveness of the proposed control scheme.
Collapse
Affiliation(s)
- Meiling Xie
- Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China
| | - Yan Song
- Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, China.
| | - Shigen Shen
- Department of Computer Science and Engineering, Shaoxing University, Shaoxing 312000, China
| |
Collapse
|
11
|
Ma L, Wang YL, Fei MR, Pan QK. Cross-dimensional formation control of second-order heterogeneous multi-agent systems. ISA TRANSACTIONS 2022; 127:188-196. [PMID: 35277265 DOI: 10.1016/j.isatra.2022.02.036] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/01/2021] [Revised: 02/18/2022] [Accepted: 02/19/2022] [Indexed: 06/14/2023]
Abstract
This paper is concerned with the cross-dimensional formation control of a second-order multi-dimensional heterogeneous multi-agent system. Agents are first separated into several groups according to their position/velocity vector dimensions. Then the cross-dimensional formation control problem is formulated such that agents in the same group form a time-varying formation in their own dimension and agents in different groups cooperatively move in multiple dimensions. This can make follower agents in different dimensions cooperatively track a leader. Moreover, a cross-dimensional formation protocol is designed based on full or partial information of neighboring agents. For higher-dimensional agents, full information of lower-dimensional neighbors is adopted. For lower-dimensional ones, only partial information of higher-dimensional neighbors is used. Furthermore, a necessary and sufficient condition for the second-order heterogeneous multi-agent system to achieve cross-dimensional formation is provided. Accordingly, a criterion for designing cross-dimensional formation protocol is further derived. Finally, under an undirected graph, a lower-dimensional protocol design criterion is obtained if there is no data exchange between lower- and higher-dimensional followers. The effectiveness of the obtained results is demonstrated through cross-dimensional target enclosing performance analysis for multiple robots and quadrotors.
Collapse
Affiliation(s)
- Lang Ma
- Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, 200444, China; School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China.
| | - Yu-Long Wang
- Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, 200444, China; School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China.
| | - Min-Rui Fei
- Shanghai Key Laboratory of Power Station Automation Technology, Shanghai University, Shanghai, 200444, China; School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China.
| | - Quan-Ke Pan
- School of Mechatronic Engineering and Automation, Shanghai University, Shanghai, 200444, China.
| |
Collapse
|
12
|
Jia C, Hu J, Liu H, Du J, Feng S. Recursive state estimation for a class of nonlinear uncertain coupled complex networks subject to random link failures and packet disorders. ISA TRANSACTIONS 2022; 127:88-98. [PMID: 35034783 DOI: 10.1016/j.isatra.2021.12.036] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/06/2021] [Revised: 12/17/2021] [Accepted: 12/30/2021] [Indexed: 06/14/2023]
Abstract
This paper is concerned with the recursive state estimation (RSE) problem under minimum mean-square error sense for a class of nonlinear complex networks (CNs) with uncertain inner coupling, random link failures and packet disorders. Firstly, a set of random variables obeying the Bernoulli distribution is adopted to characterize whether there are connections between different network units, i.e., there is no random link failure when the random variable is equal to 1, otherwise the random link failure occurs. In addition, the inner coupling strength is assumed to be varying within a given interval and the phenomenon of packet disorders caused by the random transmission delay (RTD) is also taken into account. In our study, the nonlinearity satisfies the continuously differentiable condition, which can be linearized by resorting to the Taylor expansion. The focus of the addressed RSE problem is on the design of an RSE approach in the mean-square error sense such that, for all uncertain inner coupling, random link failures and packet disorders, a suboptimal upper bound of the state estimation error covariance is obtained and minimized by parameterizing the state estimator gain with explicit expression form. Furthermore, a sufficient condition with respect to the uniform boundedness of state estimation error in mean-square sense is elaborated. Finally, a numerical experiment is introduced to demonstrate the validity of the presented RSE approach.
Collapse
Affiliation(s)
- Chaoqing Jia
- Department of Mathematics, Harbin University of Science and Technology, Harbin 150080, China; Heilongjiang Provincial Key Laboratory of Optimization Control and Intelligent Analysis for Complex Systems, Harbin University of Science and Technology, Harbin 150080, China
| | - Jun Hu
- Department of Mathematics, Harbin University of Science and Technology, Harbin 150080, China; Heilongjiang Provincial Key Laboratory of Optimization Control and Intelligent Analysis for Complex Systems, Harbin University of Science and Technology, Harbin 150080, China; School of Automation, Harbin University of Science and Technology, Harbin 150080, China.
| | - Hongjian Liu
- School of Mathematics and Physics, Anhui Polytechnic University, Wuhu 241000, China
| | - Junhua Du
- Department of Mathematics, Harbin University of Science and Technology, Harbin 150080, China; College of Science, Qiqihar University, Qiqihar 161006, China
| | - Shuyang Feng
- School of Automation, Harbin University of Science and Technology, Harbin 150080, China
| |
Collapse
|
13
|
Yang Y, Chen D, Yue W, Liu Q. Secure predictor-based neural dynamic surface control of nonlinear cyber-physical systems against sensor and actuator attacks. ISA TRANSACTIONS 2022; 127:120-132. [PMID: 35304004 DOI: 10.1016/j.isatra.2022.02.030] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [MESH Headings] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/25/2021] [Revised: 02/16/2022] [Accepted: 02/16/2022] [Indexed: 06/14/2023]
Abstract
This paper addresses a secure predictor-based neural dynamic surface control (SPNDSC) issue for a cyber-physical system in a nontriangular form suffering from both sensor and actuator deception attacks. To avoid the algebraic loop problem, only partial states are employed as input vectors of neural networks (NNs) for approximating unknown dynamics, and compensation terms are further developed to offset approximation errors from NNs. With introduction of nonlinear gain functions and attack compensators, adverse effects of an intelligent adversary are alleviated effectively. Furthermore, we present stability analysis and prove the ultimate boundedness of all signals in the closed-loop system. The effectiveness of the proposed control strategy is illustrated by two examples.
Collapse
Affiliation(s)
- Yang Yang
- College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing, 210023, PR China.
| | - Didi Chen
- College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing, 210023, PR China
| | - Wenbin Yue
- China North Vehicle Research Institute, Beijing, 100072, PR China
| | - Qidong Liu
- College of Automation & College of Artificial Intelligence, Nanjing University of Posts and Telecommunications, Nanjing, 210023, PR China
| |
Collapse
|
14
|
Ju Y, Tian X, Wei G. Fault tolerant consensus control of multi-agent systems under dynamic event-triggered mechanisms. ISA TRANSACTIONS 2022; 127:178-187. [PMID: 35067352 DOI: 10.1016/j.isatra.2022.01.005] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 10/01/2021] [Revised: 01/04/2022] [Accepted: 01/04/2022] [Indexed: 06/14/2023]
Abstract
In this paper, the fault-tolerant consensus control (FTCC) problem is studied for multi-agent systems (MASs) with the dynamic event-triggered mechanism (DETM). To ease the communication burden, DETM governed by an additional internal dynamical variable is introduced. A novel fault-tolerant controller is presented to mitigate system performance degradation caused by failures, where a simple fault compensator is constructed through a protocol-based observer. Then, some sufficient conditions are established to examine the bounded consensus while optimizing the predetermined quadratic cost criterion. In addition, the explicit expression of the desired controller is also parameterized through orthogonal decomposition. Finally, two simulation results are made for the sake of verifying the effectiveness of the developed FTCC scheme, the fault compensation test as well as the quadratic cost one.
Collapse
Affiliation(s)
- Yamei Ju
- The Shanghai Key Lab of Modern Optical System, Department of Control Science and Engineering, University of Shanghai for Science and Technology, Shanghai 200093, PR China
| | - Xin Tian
- College of Science, University of Shanghai for Science and Technology, Shanghai 200093, PR China.
| | - Guoliang Wei
- Business School, University of Shanghai for Science and Technology, Shanghai 200093, PR China
| |
Collapse
|
15
|
Huang J, Gao C, He X. Privacy-preserving state estimation with unreliable channels. ISA TRANSACTIONS 2022; 127:4-12. [PMID: 35871100 DOI: 10.1016/j.isatra.2022.05.035] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/31/2021] [Revised: 05/25/2022] [Accepted: 05/25/2022] [Indexed: 06/15/2023]
Abstract
A co-design problem of privacy-preserving encoding and filtering is concerned in this paper. A remote legal user estimates states of a dynamic system by the received innovation messages. However, the communication channel is neither reliable nor secure. The messages may be missing during the transmission and have a risk of being intercepted by an eavesdropper. Therefore, in this work, an encoding scheme together with an MMSE estimation algorithm are designed for preserving information privacy and meanwhile guaranteeing estimation performance. We introduce a novel encoding approach using a weighted innovation with a public key to achieve privacy security as well as low computational expense. A filtering algorithm is designed under such an encoding mechanism. And the performance of the filter and the encoding method is analyzed. The feasibility of the encoding approach and the filtering algorithm is illustrated through numerical examples of an unstable system and a stable ballistic roll rate estimation system.
Collapse
Affiliation(s)
- Jie Huang
- Department of Automation, Tsinghua University, Beijing 100084, PR China
| | - Chen Gao
- Department of Automation, Tsinghua University, Beijing 100084, PR China
| | - Xiao He
- Department of Automation, Tsinghua University, Beijing 100084, PR China.
| |
Collapse
|
16
|
Wang W, Geng Y, Sun J, Xu H, Sheng L. Sensor fault detection and minimum detectable fault analysis for dynamic point-the-bit rotary steerable system. ISA TRANSACTIONS 2022; 127:108-119. [PMID: 34972545 DOI: 10.1016/j.isatra.2021.12.019] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 11/01/2021] [Revised: 12/15/2021] [Accepted: 12/15/2021] [Indexed: 06/14/2023]
Abstract
In this paper, the sensor fault detection problem considering the drilling disturbances is studied for the dynamic point-the-bit rotary steerable system. Firstly, the DPRSS is modeled as a linear system with the drilling disturbances, including unknown inputs, measurement noises, and model perturbations. Then, a finite-frequency zonotopic fault detection observer is proposed. The finite-frequency range H- performance and the P-radius criterion are considered to design the observer gains such that the residuals are sensitive to sensor faults and robust against the drilling disturbances simultaneously. Subsequently, the calculation method of minimum detectable faults is presented for the proposed sensor fault detection mechanism. Finally, simulations and experiments are presented to illustrate the effectiveness of the proposed methods.
Collapse
Affiliation(s)
- Weiliang Wang
- College of Control Science and Engineering, China University of Petroleum (East China), Qingdao 266580, China
| | - Yanfeng Geng
- College of Control Science and Engineering, China University of Petroleum (East China), Qingdao 266580, China.
| | - Jian Sun
- College of Control Science and Engineering, China University of Petroleum (East China), Qingdao 266580, China
| | - Huijie Xu
- College of Control Science and Engineering, China University of Petroleum (East China), Qingdao 266580, China
| | - Li Sheng
- College of Control Science and Engineering, China University of Petroleum (East China), Qingdao 266580, China
| |
Collapse
|
17
|
Shan Y, Pan A, Liu H. A switching event-triggered resilient control scheme for primary and secondary levels in AC microgrids. ISA TRANSACTIONS 2022; 127:216-228. [PMID: 35282875 DOI: 10.1016/j.isatra.2022.02.039] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Subscribe] [Scholar Register] [Received: 12/04/2021] [Revised: 02/22/2022] [Accepted: 02/22/2022] [Indexed: 06/14/2023]
Abstract
In microgrid hierarchical control, primary control to stabilize system and secondary control to eliminate frequency/voltage deviations are both necessary for islanded microgrids. In this paper, a switching event-triggered (SET) resilient control scheme for microgrid primary and secondary levels has been proposed. First, droop control and model predictive control (MPC) are used for power sharing and driving signal generation respectively on primary level. An SET control method to trigger different MPC cost functions is proposed to balance output voltage quality and switching frequency. Then, distributed consensus and pinning control based method is used on secondary level. An SET mechanism to dynamically adjust secondary ratios to coordinate the transient deviation and response speed is proposed. Next, to deal with severe accidents, a resilient control scheme integrating primary and secondary levels is designed to maintain the system sound operation and improve the system immunity. Finally, the effectiveness of the proposed control scheme has been demonstrated by simulation with comprehensive scenarios.
Collapse
Affiliation(s)
- Yinghao Shan
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Donghua University, Shanghai 201620, China
| | - Anqi Pan
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Donghua University, Shanghai 201620, China.
| | - Huashan Liu
- College of Information Science and Technology, Donghua University, Shanghai 201620, China; Engineering Research Center of Digitized Textile and Apparel Technology, Ministry of Education, Donghua University, Shanghai 201620, China
| |
Collapse
|
18
|
Sun W, Lv X, Qiu M. Distributed Estimation for Stochastic Hamiltonian Systems With Fading Wireless Channels. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:4897-4906. [PMID: 33119519 DOI: 10.1109/tcyb.2020.3023547] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article introduces a distributed estimator design problem for the stochastic Hamiltonian systems under fading wireless channels. The phenomenon that the channel outputs are related to the target state and the estimation of the adjacent state is considered to facilitate the implementation of distributed state estimation. Furthermore, the fixed undirected graph simplifies the analysis of the system. By resorting to fading channels and the graph theory, the main goal of the addressed problem is to design estimators to estimate the target state of the Hamiltonian system and guarantee the exponential stability in the mean-square sense of the estimation system. Based on the stochastic analysis method and the structural properties of the Hamiltonian system, sufficient conditions are obtained for the existence of the designed estimator gain for each sensor. Two examples are given to indicate the effectiveness of the theoretical claim.
Collapse
|
19
|
Song H, Ding D, Dong H, Han QL. Distributed Maximum Correntropy Filtering for Stochastic Nonlinear Systems Under Deception Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:3733-3744. [PMID: 32936760 DOI: 10.1109/tcyb.2020.3016093] [Citation(s) in RCA: 10] [Impact Index Per Article: 5.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
This article focuses on the distributed maximum correntropy filtering issue for general stochastic nonlinear systems subject to deception attacks. The considered nonlinear functions consist of a determined one and a stochastic one, and the stochastic signals sent by deception attacks with identified statistic characteristics could be non-Gaussian. The corresponding calculation formulas of both the filter gains and the upper bound of the filter error covariance are proposed by means of the Taylor series expansion and the fixed-point iterative update rule, where the weighted maximum correntropy criterion is utilized to take the place of traditional minimum covariance indexes. Such an upper bound is only dependent on the local information, neighbor information, and the identified statistics of deception attacks and, therefore, the developed filtering scheme realizes the requirement of distributed calculation. Furthermore, a simplified version is obtained by removing weights in the correntropy criterion. Finally, an illustrative example is given to verify the effectiveness of developed distributed maximum correntropy filtering subject to deception attacks.
Collapse
|
20
|
Ning Z, Wang T, Zhang K. Dynamic event-triggered security control and fault detection for nonlinear systems with quantization and deception attack. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2022.02.019] [Citation(s) in RCA: 5] [Impact Index Per Article: 2.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/05/2022]
|
21
|
Finite-time synchronization of the drive-response networks by event-triggered aperiodic intermittent control. Neurocomputing 2022. [DOI: 10.1016/j.neucom.2022.02.037] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/19/2022]
|
22
|
Yang B, Qiu Q, Han QL, Yang F. Received Signal Strength Indicator-Based Indoor Localization Using Distributed Set-Membership Filtering. IEEE TRANSACTIONS ON CYBERNETICS 2022; 52:727-737. [PMID: 32305949 DOI: 10.1109/tcyb.2020.2983544] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.5] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/11/2023]
Abstract
Most of the existing localization schemes necessitate a priori statistical characteristic of measurement noise, which may be unrealistic in practical applications. This article addresses the problem of indoor localization by implementing distributed set-membership filtering based on a received signal strength indicator (RSSI) under unknown-but-bounded process and measurement noises. First, the transmit power and the path-loss exponent are estimated by a novel least-squares curve fitting (LSCF) method in RSSI-based localization. Since the localization process of trilateration is susceptible to inaccuracy caused by the noise-affected distance measurements, a convex optimization method is then developed to obtain the state ellipsoid estimation under the unknown-but-bounded noises. Third, a recursive algorithm is established to compute the global ellipsoid that guarantees to locate the true target at every time step. Finally, experimental validation is presented to demonstrate the accuracy and effectiveness of the proposed set-membership filtering method for indoor localization.
Collapse
|
23
|
Zhang Q, Yin X, Hu S. A two-event-generator scheme for event-triggered control of uncertain NCSs under deception attacks. Inf Sci (N Y) 2022. [DOI: 10.1016/j.ins.2021.10.062] [Citation(s) in RCA: 2] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/17/2022]
|
24
|
Wan Y, Long C, Deng R, Wen G, Yu X, Huang T. Distributed Event-Based Control for Thermostatically Controlled Loads Under Hybrid Cyber Attacks. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:5314-5327. [PMID: 32203050 DOI: 10.1109/tcyb.2020.2978274] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
In building-microgrid communities, renewable generation and time-varying load usually cause power fluctuations, which influence the ancillary support to the main grid. Thermostatically controlled loads (TCLs) can be utilized to compensate such power variations due to their aggregated and controllable power consumptions. Meanwhile, one basic requirement for the users' side of TCLs is to realize the fair sharing of power states and comfort states. This article proposes a distributed event-based control strategy, where information of neighboring TCLs is exchanged only when a dynamic event-triggered condition is satisfied, and thus it intelligently determines the necessary transmission frequency to save communication resources. From a cybersecurity perspective, the communication network of TCLs may be subject to hybrid attacks, for example, denial-of-service (DoS) and false data-injection (FDI) attacks. During DoS attack intervals, no information can be communicated even through the event-triggered condition is satisfied. Furthermore, the control inputs may also be tampered by FDI attacks. By utilizing the Lyapunov stability and hybrid control theories, sufficient conditions regarding the attack parameters are derived such that fair sharing of power states and comfort states of all involved TCLs can be achieved exponentially. The exclusion of Zeno behaviors is proved and a corollary for ideal communication situations is also deduced. Finally, simulation examples with various attack parameters are conducted to verify the effectiveness of the main results.
Collapse
|
25
|
Wang Y, Lam J, Lin H. Differentially private average consensus with general directed graphs. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2021.06.016] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/29/2022]
|
26
|
Synchronization of nonidentical complex dynamical networks with unknown disturbances via observer-based sliding mode control. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2021.05.042] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/24/2022]
|
27
|
Lin C, Hu B, Huang W, Niu T. Robust distributed adaptive consensus for discrete-time multiagent systems with uncertain topologies. Neurocomputing 2021. [DOI: 10.1016/j.neucom.2021.03.126] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.7] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/25/2022]
|
28
|
Chen W, Ding D, Dong H, Wei G, Ge X. Finite-Horizon H∞ Bipartite Consensus Control of Cooperation-Competition Multiagent Systems With Round-Robin Protocols. IEEE TRANSACTIONS ON CYBERNETICS 2021; 51:3699-3709. [PMID: 32191904 DOI: 10.1109/tcyb.2020.2977468] [Citation(s) in RCA: 3] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/10/2023]
Abstract
This article focuses on the finite-horizon H∞ bipartite consensus control problem for a class of discrete time-varying cooperation-competition multiagent systems (DTV-CCMASs) with the round-robin (RR) protocol. The cooperation-competition relationship among agents is characterized by a signed graph, whose edges are with positive or negative connection weights. Specifically, a positive weight corresponds to an allied relationship between two agents and a negative one means an adversary relationship. The data exchange between each agent and its neighbors is orchestrated by an RR protocol, where only one neighboring agent is authorized to transmit the data packet at each time instant, and therefore, the data collision is prevented. This article aims to design a bipartite consensus controller for DTV-CCMASs with the RR protocol such that the predetermined H∞ bipartite consensus is satisfied over a given finite horizon. A sufficient condition is first established to guarantee the desired H∞ bipartite consensus by resorting to the completing square method. With the help of an auxiliary cost combined with the Moore-Penrose pseudoinverse method, a design scheme of the bipartite consensus controller is obtained by solving two coupled backward recursive Riccati difference equations (BRRDEs). Finally, a simulation example is given to verify the effectiveness of the proposed scheme of the bipartite consensus controller.
Collapse
|
29
|
Event-based resilient filtering for stochastic nonlinear systems via innovation constraints. Inf Sci (N Y) 2021. [DOI: 10.1016/j.ins.2020.08.007] [Citation(s) in RCA: 13] [Impact Index Per Article: 4.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/20/2022]
|
30
|
Jia J, Zeng Z. LMI-based criterion for global Mittag-Leffler lag quasi-synchronization of fractional-order memristor-based neural networks via linear feedback pinning control. Neurocomputing 2020. [DOI: 10.1016/j.neucom.2020.05.074] [Citation(s) in RCA: 8] [Impact Index Per Article: 2.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
31
|
Liu Y, Li T, Shan Q, Yu R, Wu Y, Chen C. Online optimal consensus control of unknown linear multi-agent systems via time-based adaptive dynamic programming. Neurocomputing 2020. [DOI: 10.1016/j.neucom.2020.04.119] [Citation(s) in RCA: 6] [Impact Index Per Article: 1.5] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/24/2022]
|
32
|
Zhang Q, Liu K, Xia Y, Ma A. Optimal Stealthy Deception Attack Against Cyber-Physical Systems. IEEE TRANSACTIONS ON CYBERNETICS 2020; 50:3963-3972. [PMID: 31071059 DOI: 10.1109/tcyb.2019.2912622] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Abstract] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 06/09/2023]
Abstract
This paper studies the problem of designing the optimal deception attack to maximize a utility function with the Kullback-Leibler divergence adopted as a detection constraint. The utility function reflects the goal of pulling the state away from the origin, increasing the cost of the controller and decreasing the cost of the attacker. To analyze the stealthiness of the attack, the attack signal is decomposed into two parts, one of which is strict stealthy. The necessary and sufficient condition is derived for the case that the strict stealthy attack cannot lead to an unbounded benefit. In this case, the linear transformation of the optimal attack is proved to be a Gaussian distribution. With the mean value and covariance of the Gaussian distribution as variables, the original problem is transformed into a new problem which may not be convex. A suboptimal attack policy is provided and the upper bound for the loss of benefit when using the suboptimal attack is also given. A numerical example of unmanned ground vehicle is illustrated to verify the effectiveness of the proposed attack policy.
Collapse
|
33
|
Sun Y, Mao J, Liu H, Ding D. Distributed recursive filtering for discrete time-delayed stochastic nonlinear systems based on fuzzy rules. Neurocomputing 2020. [DOI: 10.1016/j.neucom.2019.04.083] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.3] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
|
34
|
Adaptive resilient control of a class of nonlinear systems based on event-triggered mechanism. Neurocomputing 2020. [DOI: 10.1016/j.neucom.2020.04.061] [Citation(s) in RCA: 4] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/22/2022]
|
35
|
Lü H, He W, Han QL, Ge X, Peng C. Finite-time containment control for nonlinear multi-agent systems with external disturbances. Inf Sci (N Y) 2020. [DOI: 10.1016/j.ins.2019.05.049] [Citation(s) in RCA: 43] [Impact Index Per Article: 10.8] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/16/2022]
|
36
|
Synchronous optimal control method for nonlinear systems with saturating actuators and unknown dynamics using off-policy integral reinforcement learning. Neurocomputing 2019. [DOI: 10.1016/j.neucom.2019.04.036] [Citation(s) in RCA: 5] [Impact Index Per Article: 1.0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/18/2022]
|