Weiwei Zhan;Zhiqiang Miao;Jianxin Zeng;Yanjie Chen;Zheng-Guang Wu;Wei He;Yaonan Wang
{"title":"Resilient Formation Control Based on Watermarks for Networked Quadrotors Under Deception Attacks","authors":"Weiwei Zhan;Zhiqiang Miao;Jianxin Zeng;Yanjie Chen;Zheng-Guang Wu;Wei He;Yaonan Wang","doi":"10.1109/TVT.2025.3541455","DOIUrl":null,"url":null,"abstract":"This article addresses the problem of formation control of networked AAVs under deception attacks. A lightweight resilient formation control framework based on watermarks is proposed to achieve the desired formation configuration without extra monitoring attack status. Since deception attacks are covert, the shared information is watermarked before transmission to establish the protocol among networked AAVs. To facilitate the resilient formation controller design, a decoder is first developed to decipher the inverse transformation of deception attacks, where the watermark is the criterion for approximating the inverse transformation. The Gauss error function is introduced to eliminate some unrealistic input commands under deception attacks, obtaining the predefined input performance. Then, a resilient formation controller is developed to guarantee the global boundedness of all signals within the inner-loop and outer-loop system, while the formation error converges to a small neighborhood of zero by solving the linear matrix inequality. Two challenging deception attack examples in simulations and experiments are conducted to verify the effectiveness and performance of the proposed resilient formation control framework.","PeriodicalId":13421,"journal":{"name":"IEEE Transactions on Vehicular Technology","volume":"74 6","pages":"8839-8850"},"PeriodicalIF":7.1000,"publicationDate":"2025-02-13","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Vehicular Technology","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10884712/","RegionNum":2,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
This article addresses the problem of formation control of networked AAVs under deception attacks. A lightweight resilient formation control framework based on watermarks is proposed to achieve the desired formation configuration without extra monitoring attack status. Since deception attacks are covert, the shared information is watermarked before transmission to establish the protocol among networked AAVs. To facilitate the resilient formation controller design, a decoder is first developed to decipher the inverse transformation of deception attacks, where the watermark is the criterion for approximating the inverse transformation. The Gauss error function is introduced to eliminate some unrealistic input commands under deception attacks, obtaining the predefined input performance. Then, a resilient formation controller is developed to guarantee the global boundedness of all signals within the inner-loop and outer-loop system, while the formation error converges to a small neighborhood of zero by solving the linear matrix inequality. Two challenging deception attack examples in simulations and experiments are conducted to verify the effectiveness and performance of the proposed resilient formation control framework.
期刊介绍:
The scope of the Transactions is threefold (which was approved by the IEEE Periodicals Committee in 1967) and is published on the journal website as follows: Communications: The use of mobile radio on land, sea, and air, including cellular radio, two-way radio, and one-way radio, with applications to dispatch and control vehicles, mobile radiotelephone, radio paging, and status monitoring and reporting. Related areas include spectrum usage, component radio equipment such as cavities and antennas, compute control for radio systems, digital modulation and transmission techniques, mobile radio circuit design, radio propagation for vehicular communications, effects of ignition noise and radio frequency interference, and consideration of the vehicle as part of the radio operating environment. Transportation Systems: The use of electronic technology for the control of ground transportation systems including, but not limited to, traffic aid systems; traffic control systems; automatic vehicle identification, location, and monitoring systems; automated transport systems, with single and multiple vehicle control; and moving walkways or people-movers. Vehicular Electronics: The use of electronic or electrical components and systems for control, propulsion, or auxiliary functions, including but not limited to, electronic controls for engineer, drive train, convenience, safety, and other vehicle systems; sensors, actuators, and microprocessors for onboard use; electronic fuel control systems; vehicle electrical components and systems collision avoidance systems; electromagnetic compatibility in the vehicle environment; and electric vehicles and controls.