Output Formation Containment for Multiagent Systems Under Multipoint Multipattern FDI Attacks: A Resilient Impulsive Compensation Control Approach

IF 9.4 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Cybernetics Pub Date : 2023-10-20 DOI:10.1109/TCYB.2023.3319647
Hongjun Chu;Sergey Gorbachev;Dong Yue;Chunxia Dou
{"title":"Output Formation Containment for Multiagent Systems Under Multipoint Multipattern FDI Attacks: A Resilient Impulsive Compensation Control Approach","authors":"Hongjun Chu;Sergey Gorbachev;Dong Yue;Chunxia Dou","doi":"10.1109/TCYB.2023.3319647","DOIUrl":null,"url":null,"abstract":"The increasing number of devices and frequent interactions of agents from networked multiagent systems (MASs) exacerbate the risks of potential cyber attacks, especially the different point attacks and multiple pattern attacks. This article considers the output formation-containment problem for MASs under multipoint multipattern false data injection (FDI) attacks. The multipoint describes the attacks simultaneously occurring on the sensors, actuators, and communication channels; the multipattern captures that sensor and actuator attack signals are both continuous deterministic variables, and the communication channel attack signals are intermittent random variables, obeying the Bernoulli distribution. For such compromised MASs, a novel hybrid protocol is proposed, which integrates a state observer, an attack estimator, an impulsive interactor and a compensation controller. Thereinto, the state observer and the attack estimator are constructed to recover the unmeasured system states and the unknown FDI attack signals, respectively; the impulsive interactor is designed to guarantee that the neighbor’s signals are transmitted only at impulsive instants, and meanwhile the channel attacks are randomly launched; using the recovered signals, the compensation controller is devised to alleviate the effect of attacks. A sufficient condition is identified, under which the output formation containment is achieved with cooperative uniform ultimate boundedness (UUB). Finally, simulation results are carried out to validate the effectiveness and advantages of the proposed approach.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"54 4","pages":"2606-2617"},"PeriodicalIF":9.4000,"publicationDate":"2023-10-20","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10288393/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The increasing number of devices and frequent interactions of agents from networked multiagent systems (MASs) exacerbate the risks of potential cyber attacks, especially the different point attacks and multiple pattern attacks. This article considers the output formation-containment problem for MASs under multipoint multipattern false data injection (FDI) attacks. The multipoint describes the attacks simultaneously occurring on the sensors, actuators, and communication channels; the multipattern captures that sensor and actuator attack signals are both continuous deterministic variables, and the communication channel attack signals are intermittent random variables, obeying the Bernoulli distribution. For such compromised MASs, a novel hybrid protocol is proposed, which integrates a state observer, an attack estimator, an impulsive interactor and a compensation controller. Thereinto, the state observer and the attack estimator are constructed to recover the unmeasured system states and the unknown FDI attack signals, respectively; the impulsive interactor is designed to guarantee that the neighbor’s signals are transmitted only at impulsive instants, and meanwhile the channel attacks are randomly launched; using the recovered signals, the compensation controller is devised to alleviate the effect of attacks. A sufficient condition is identified, under which the output formation containment is achieved with cooperative uniform ultimate boundedness (UUB). Finally, simulation results are carried out to validate the effectiveness and advantages of the proposed approach.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
多点多模式FDI攻击下多智能体系统的输出形成抑制:一种弹性脉冲补偿控制方法。
网络多智能体系统(MAS)中设备数量的增加和智能体的频繁交互加剧了潜在网络攻击的风险,尤其是不同点攻击和多模式攻击。本文研究了MAS在多点多模式虚假数据注入(FDI)攻击下的输出信息包容问题。多点描述了同时发生在传感器、执行器和通信信道上的攻击;多模式捕捉到传感器和执行器攻击信号都是连续的确定变量,通信信道攻击信号是间歇性随机变量,服从伯努利分布。针对这种折衷的MAS,提出了一种新的混合协议,该协议集成了状态观测器、攻击估计器、脉冲交互器和补偿控制器。其中,状态观测器和攻击估计器分别用于恢复未测量的系统状态和未知的FDI攻击信号;脉冲交互器的设计保证了邻居的信号只在脉冲瞬间传输,同时信道攻击是随机发起的;利用恢复的信号,设计了补偿控制器来减轻攻击的影响。确定了一个充分条件,在该条件下,输出编队包含具有协同一致最终有界性(UUB)。最后,通过仿真验证了该方法的有效性和优越性。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Transactions on Cybernetics
IEEE Transactions on Cybernetics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, CYBERNETICS
CiteScore
25.40
自引率
11.00%
发文量
1869
期刊介绍: The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.
期刊最新文献
Visual-Inertial-Acoustic Sensor Fusion for Accurate Autonomous Localization of Underwater Vehicles Aeroengine Bearing Time-Varying Skidding Assessment With Prior Knowledge-Embedded Dual Feedback Spatial-Temporal GCN Interval Secure Event-Triggered Mechanism for Load Frequency Control Active Defense Against DoS Attack Bayesian Transfer Filtering Using Pseudo Marginal Measurement Likelihood Granular Computing for Machine Learning: Pursuing New Development Horizons
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1