{"title":"Output Formation Containment for Multiagent Systems Under Multipoint Multipattern FDI Attacks: A Resilient Impulsive Compensation Control Approach","authors":"Hongjun Chu;Sergey Gorbachev;Dong Yue;Chunxia Dou","doi":"10.1109/TCYB.2023.3319647","DOIUrl":null,"url":null,"abstract":"The increasing number of devices and frequent interactions of agents from networked multiagent systems (MASs) exacerbate the risks of potential cyber attacks, especially the different point attacks and multiple pattern attacks. This article considers the output formation-containment problem for MASs under multipoint multipattern false data injection (FDI) attacks. The multipoint describes the attacks simultaneously occurring on the sensors, actuators, and communication channels; the multipattern captures that sensor and actuator attack signals are both continuous deterministic variables, and the communication channel attack signals are intermittent random variables, obeying the Bernoulli distribution. For such compromised MASs, a novel hybrid protocol is proposed, which integrates a state observer, an attack estimator, an impulsive interactor and a compensation controller. Thereinto, the state observer and the attack estimator are constructed to recover the unmeasured system states and the unknown FDI attack signals, respectively; the impulsive interactor is designed to guarantee that the neighbor’s signals are transmitted only at impulsive instants, and meanwhile the channel attacks are randomly launched; using the recovered signals, the compensation controller is devised to alleviate the effect of attacks. A sufficient condition is identified, under which the output formation containment is achieved with cooperative uniform ultimate boundedness (UUB). Finally, simulation results are carried out to validate the effectiveness and advantages of the proposed approach.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"54 4","pages":"2606-2617"},"PeriodicalIF":9.4000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10288393/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The increasing number of devices and frequent interactions of agents from networked multiagent systems (MASs) exacerbate the risks of potential cyber attacks, especially the different point attacks and multiple pattern attacks. This article considers the output formation-containment problem for MASs under multipoint multipattern false data injection (FDI) attacks. The multipoint describes the attacks simultaneously occurring on the sensors, actuators, and communication channels; the multipattern captures that sensor and actuator attack signals are both continuous deterministic variables, and the communication channel attack signals are intermittent random variables, obeying the Bernoulli distribution. For such compromised MASs, a novel hybrid protocol is proposed, which integrates a state observer, an attack estimator, an impulsive interactor and a compensation controller. Thereinto, the state observer and the attack estimator are constructed to recover the unmeasured system states and the unknown FDI attack signals, respectively; the impulsive interactor is designed to guarantee that the neighbor’s signals are transmitted only at impulsive instants, and meanwhile the channel attacks are randomly launched; using the recovered signals, the compensation controller is devised to alleviate the effect of attacks. A sufficient condition is identified, under which the output formation containment is achieved with cooperative uniform ultimate boundedness (UUB). Finally, simulation results are carried out to validate the effectiveness and advantages of the proposed approach.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.