Abstract
This paper considers the secure control problem for a class of uncertain nonlinear multi-agent systems. To deal with the uncertainties, the adaptive laws are designed in an iterative manner. Furthermore, the auxiliary variables and Nussbaum-type functions are introduced to handle the effects caused by the attacks. By developing a common Lyapunov function, a secure control method is designed to guarantee the asymptotical consensus of the considered systems against cyber attacks. Finally, we present an example to validate the effectiveness.
Access provided by Autonomous University of Puebla. Download conference paper PDF
Similar content being viewed by others
Keywords
1 Introduction
In modern industrial process, physical components are connected with each other by network communication channels, such as transportation networks, UAVs, and formation of robots [1,2,3,4]. The connection by shared networks brings efficiency to control systems, but there are many vulnerabilities that could be maliciously exploited by hackers or attackers [5]. Therefor, it is paramountly important to pay more attention to the safety issue against malicious cyber attacks.
In the recent developments, denial-of-service (DoS) attacks and deception attacks are identified as two typical cyber attack and have been the subject of comprehensive research [6, 7]. To handle the complex cyber attacks, many control schemes have been developed. In [8, 9], the attack compensators and a dynamic surface-based resilient adaptive strategy were constructed to mitigate the effects of state-dependent actuator attacks. In [10], the Bernoulli distributed random model was introduced to characterize cyber attack, and a dynamic protocol was designed to guarantee the security against deception attacks. For a Lipschitz-type system, [11] used a pinning method and measured the attack through a stochastic variable to achieve the synchronization under deception attacks.
In practice, switched nonlinear multi-agent systems (SNMASs) provide an general framework for modeling the man-made process involving switching behaviors [12]. Considering the importance from both theoretical and practical points of view, many results on control synthesis for the NMASs have been proposed. In the existing results, a large amount of effort has been made to solve the consensus problem of SNMASs, such as [13,14,15]. In [16], an adaptive robust fault-tolerant consensus protocol was designed for nonlinear fractional-order SNMASs with general directed topology. In [17, 18], for MASs under fixed and switching topologies, the distributed event-triggered consensus was achieved when only the triggered information is available.
However, in the aforementioned results, the case that the control coefficients, and the constant parameters are required to be known. In addition, the time disturbances are ignored [19,20,21]. It is noted that many actual plants have uncertain natures, for example the automotive industry manufacturing process [22,23,24]. But, due to the difficulties caused by the unknown control coefficients, constant parameters, and time disturbances, the important secure control of uncertain NMASs in presence of cyber attacks has not been taken into account. This motivates the study.
2 Preliminaries
Consider the NMAS where the j-th agent is modeled as
where \(\zeta _j=(\zeta _{j,1},\ldots ,\zeta _{j,n})^T\in R^{n}\), \(z_i\in R\), \(u_j\in R\), \(j=1,2,\cdots ,N\), are the state, output and input of the j-th agent, respectively. \(\sigma _j:[0,\infty )\rightarrow \{1, 2, \cdots , m\}\) is the switching signal. The control coefficient \(b_j\), the constant parameter \(\theta _j\) and the time disturbance \(r_{j,s}\) are all unknown. Assume \(|r_{j,s}| \le r_0\) with \(r_0\) being a positive constant. The nonlinear term \(f_{j,s+1}^{i}:R^{s}\rightarrow R\) with \(f_{j,s}^{i}(0)=0\) is smooth. Consider the following sensor deception attack \(\nu _j(\zeta _{j,s},t)\) on the data information,
where \(\breve{\zeta }_{j,s}(t)\) is the obtained information of the j-th agent.
Assumption 1
The attacks \(\nu _j(\zeta _{j,s},t)\), \(j=1,2,\cdots ,n\), are modeled as \(\nu _j(\zeta _{j,s},t)= \delta (t) \zeta _{j,s}\), where signals \(\delta (t)\) are unknown. Denote \(\varrho (t)=(1+ \delta (t))\) and \(\zeta _{j,s}=\varrho (t)^{-1} \breve{\zeta }_{j,s}\). For \(j=1,2,\cdots ,n\), there are uncertain constants \(\varrho _0\), \(\bar{\varrho }_1\) and \(\bar{\varrho }_2\) such that \(|\dot{\varrho }(t)\varrho ^{-1}(t)| \le \varrho _0\) and \(0<\bar{\varrho }_1\le |\varrho (t)| \le \bar{\varrho }_2\).
Lemma 1
[25, 26]. For the vectors \(\zeta \), y with suitable dimension, and the real-valued continuous function \(f(y,\zeta )\), there are smooth functions \(\psi (y)\) and \(\bar{f}(\zeta )\) such that \(|f(\zeta , y)| \le \psi (y)\bar{f}(\zeta )\).
By Lemma 1, there exist functions \(\psi _{j,s}(\breve{\zeta }_{j,1},\cdots ,\breve{\zeta }_{j,s})\) and constant \(\varpi \) such that
3 Main Result
3.1 Design of Consensus Protocol
Step 1: For \(j=1,\cdots ,N\), introduce the auxiliary variables as
where \(\breve{z}_i = \breve{\zeta }_{j,1}\), \(\eta _j(0)=\breve{\zeta }_j(0)\). Choose the Lyapunov function candidate as
where \(\tilde{\varrho } = \varrho - \hat{\varrho }\), \(\tilde{\vartheta } = \vartheta - \hat{\vartheta }\), and \(\hat{\varrho }\), \(\hat{\vartheta }\) are the estimation of \(\varrho _0\), \(\vartheta \), respectively. By taking \(\vartheta =\bar{\varrho }\varpi \max _{j=1,2,\cdots ,N}{|\theta _j|}\) and by using (3), one can calculate that
Construct the virtual protocol \(\breve{\zeta }_{j,2}^*\) as
where \(\mu _{j,1}\) a positive constant, \( \bar{\omega }_{\varrho ,j,1}=\frac{z_{j,1}\breve{\zeta }_{j,1}^2}{\sqrt{(z_{j,1}\breve{\zeta }_{j,1})^2 + \pi ^2}}, \bar{\omega }_{\theta ,j,1}=\frac{z_{j,1} \psi _{j,1}^2}{\sqrt{(z_{j,1} \psi _{j,1})^2 + \pi ^2}}. \) Then, it follows from (4)–(7) that
where \(\omega _{\varrho ,1} = \sum _{j=1}^N z_{j,1} \bar{\omega }_{\varrho ,j,1}\), \( \omega _{\theta ,1} =\sum _{j=1}^N z_{j,1}\bar{\omega }_{\theta ,j,1} \) and \(c_1\) is a positive constant.
Step s \((2\le s \le n-1)\): Construct the auxiliary variable \(z_{j,s}= \breve{\zeta }_{j,s} - \breve{\zeta }_{j,s}^*\) with \(\breve{\zeta }_{j,s}^*\) being the virtual protocol. By (1), the following inequality holds,
Choose the Lyapunov function candidate as
Similar to step 1, one can design the virtual protocol \(\breve{\zeta }_{j,s+1}^*\) such that
where \(c_s \) is some a positive constant, \(\omega _{\theta ,s}\) and \(\omega _{\varrho ,s}\) are some functions.
Step n: At the finial step, the Lyapunov function is constructed as
Design the control protocol as
and the adaptive laws as
where \(\mathcal {C}_j(\xi _j) = \cosh (g_1\xi _j)\sin \big (\frac{\xi _j}{g_2^j}\big ), j=1,2,\cdots ,N, \) with \(g_1>0\) and \(g_2>0\), and the structures of \(\breve{\zeta }_{j,n+1}^*\), \(\omega _{\varrho ,n}\), \(\omega _{\theta ,n}\) are same as that in previous steps. Then, after calculation, we can obtain that
where \(c_n>0\) is a constant.
3.2 Consensus Analysis
Theorem 1
For the SNMASs (1), consider the cyber attacks (2) with Assumption 1. The consensus protocol (13) and the adaptive laws (14), guarantee the asymptotical consensus of all outputs under arbitrary switching.
Proof: Integrating both sides of (15), it is deduced that
where \(c>0\) is a constant. By (16) and Barbalat’s Lemma, we have \(\lim _{t\rightarrow \infty }z_{j,s}(t)=0\). Denote \(\eta =(\eta _1,\cdots ,\eta _N)^T\), \(z_1=(z_{1,1},\cdots ,z_{N,1})\), \(\zeta _1=(\zeta _{1,1},\cdots ,\zeta _{N,1})^T\) and \(\varsigma =P^{-1} \eta \). Then, we obtain that
where \(P=[1_N;v_2;\cdots ;v_N]\) and \(L_A= P J P^{-1}\). \(J=\mathrm {diag}\{0,J_1\}\) is the Jordan canonical form. Let \(\bar{\varsigma }= (\varsigma _2,\cdots ,\varsigma _N)\). By using Barbalat’s Lemma, it follows from (17) that \(\lim _{t\rightarrow \infty }|\bar{\varsigma }|=0\). Furthermore, we can deduce that
which means that the output of agents reach consensus asymptotically under arbitrary switching.
4 An Illustrative Example
To illustrate the effectiveness, this section presents a numerical simulation. Consider the following uncertain SNMAS whose communication graph is shown in Fig. 1.
where \(j=1,2,3,4\), \(\sigma _j:[0,\infty )\rightarrow M= \{1,2\}\). \(f^i_{j,1}\), \(f^i_{j,2}\), \(f^i_{j,3}\) and \(f^i_{j,4}\), \(i\in {1,2}\), are selected as \(f^1_{1,1} = \sin (\zeta _{1,1})\theta _1\), \(f^2_{1,1} =\frac{\zeta _{1,1}\theta _1}{10 + \zeta _{1,1}^2}\), \(f^1_{2,1} = \sin (\zeta _{2,1})\theta _2\), \(f^2_{2,1} = \zeta _{2,1}\theta _2\), \(f^1_{3,1} =\zeta _{3,1}\sin (\zeta _{3,1})\), \(f^2_{3,1} =\zeta _{3,1}^2\), \(f^1_{4,1} =\zeta _{4,1}\), \(f^2_{4,1} =1-\cos (\zeta _{4,1}^2)\), \(r_{1,1}=r_{2,1}=r_{3,1}=r_{4,1}=0.1\sin (t)\).
According to the design method in Sect. 3, we design the consensus protocol and the adaptive laws as follows
where \(z_{j,1}=\breve{\zeta }_{j,1} - \eta _{j}\), \(\breve{\zeta }_{j,2}^* =-\mu _{j,1}z_{j,1} + \dot{\eta }_j - \hat{\varrho } \bar{\omega }_{\varrho ,j,1} - \hat{\vartheta } \bar{\omega }_{\theta ,j,1}\), \(\omega _{\varrho ,1} = \sum _{j=1}^N z_{j,1} \bar{\omega }_{\varrho ,j,1}\), \( \omega _{\theta ,1} =\sum _{j=1}^N z_{j,1}\bar{\omega }_{\theta ,j,1} \), \(\bar{\omega }_{\varrho ,j,1}=\frac{z_{j,1}\breve{\zeta }_{j,1}^2}{\sqrt{(z_{j,1}\breve{\zeta }_{j,1})^2 + \pi ^2}}\), \(\bar{\omega }_{\theta ,j,1}=\frac{z_{j,1} \psi _{j,1}^2}{\sqrt{(z_{j,1} \psi _{j,1})^2 + \pi ^2}}\), \(\psi _{1,1}= 2\), \(\psi _{2,1}= |\breve{\zeta }_{2,1}|\), \(\psi _{3,1}= 2 \breve{\zeta }_{3,1}^2 + 1\), \(\psi _{4,1}= |\breve{\zeta }_{4,1}| + 1\).
For Simulation, the parameters are selected as \(\theta _1=\theta _2=0.2\), \(\theta _3=\theta _4=1\), \(b_1=0.9\), \(b_2=b_3=0.6\), \(b_4=-0.5\), \(\mu _{1,1}=2\), \(\mu _{2,1}=5\), \(\mu _{3,1}=2\), \(\mu _{4,1}=4\), \(g_1=20\), \(g_2=0.26\), \(a=1\), \(\delta =0.5+0.2\sin (t)\), \((\zeta _{1,1}(0),\zeta _{2,1}(0),\zeta _{3,1}(0),\zeta _{4,1}(0))=(-0.2, 0.5, 0.1,0.2)\), and the other initial states are set as zero. The switching signal is described in Fig. 2. For convenience, we let \(z_y=(y_1-y_2,y_2-y_3,y_3-y_4)\), and we will make a comparison to the control scheme in [24].
Figures 3 and 4 show the simulation results. Figure 3 shows the consensus error \(\Vert z_y\Vert \) using the methods in the paper. It can be seen that the proposed control method can effectively deal with the cyber attacks of the uncertain MAS. Figure 4 show the adaptive laws of agents. The asymptotical consensus control objective is achieved under the proposed adaptive method.
5 Conclusion
This paper has established a consensus method for uncertain NMASs against cyber attacks. We introduce Nussbaum-type functions and auxiliary variables to handle the uncertainties and cyber attacks. How to extend the designed consensus protocol to the cases of more general cyber attacks is worthy of further study.
References
Cao, Y., Ren, W.: Finite-time consensus for multi-agent networks with unknown inherent nonlinear dynamics. Automatica 50(10), 2648–2656 (2014)
Ding, L., Han, Q.-L., Ge, X., Zhang, X.-M.: An overview of recent advances in event-triggered consensus of multiagent systems. IEEE Trans. Cybern. 48(4), 1110–1123 (2018)
Zhang, Z., Mishra, Y., Dou, C., Yue, D., Zhang, B., Tian, Y.-C.: Delay-tolerant predictive power compensation control for photovoltaic voltage regulation. IEEE Trans. Indust. Inform. 17(7), 4545–4554 (2021)
Li, Z., Zhao, J.: Output feedback stabilization for a general class of nonlinear systems via sampled-data control. Int. J. Robust Nonlinear Control 28(7), 2853–2867 (2018)
Fei, Y., Shi, P., Lim, C.-C.: Neural network adaptive dynamic sliding mode formation control of multi-agent systems. Int. J. Syst. Sci. 51(11), 2025–2040 (2020)
De Persis, C., Tesi, P.: Networked control of nonlinear systems under denial-of-service. Syst. Control Lett. 96, 124–131 (2016)
Mahmoud, M.S., Hamdan, M.M., Baroudi, U.A.: Secure control of cyber physical systems subject to stochastic distributed dos and deception attacks. Int. J. Syst. Sci. 51(9), 1653–1668 (2020)
Zha, L., Liu, J., Cao, J.: Resilient event-triggered consensus control for nonlinear muti-agent systems with dos attacks. J. Franklin Inst. 356(13), 7071–7090 (2019)
Ma, Y., Li, Z., Zhao, J.: Output consensus for switched multi-agent systems with bumpless transfer control and event-triggered communication. Inf. Sci. 544, 585–598 (2021)
Zhao, D., Wang, Z., Wei, G., Han, Q.L.: A dynamic event-triggered approach to observer-based PID security control subject to deception attacks. Automatica 120, 109128 (2020)
He, W., Mo, Z., Han, Q., Qian, F.: Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks. IEEE/CAA J. Autom. Sinica 7(5), 1326–1334 (2020)
Ma, Y., Zhao, J.: Distributed integral-based event-triggered scheme for cooperative output regulation of switched multi-agent systems. Inf. Sci. 457, 208–221 (2018)
Yang, H., Han, Q.L., Ge, X., Ding, L., Zhou, D.: Fault-tolerant cooperative control of multiagent systems: a survey of trends and methodologies. IEEE Trans. Ind. Inform. 16(1), 4–17 (2020)
Yuan, C., Wu, F.: Cooperative output regulation of multi-agent systems with switched leader dynamics. Int. J. Syst. Sci. 49(7), 1463–1477 (2018)
Li, Z., Ma, Y., Zhao, J.: Control design of switched nonlinear systems: an intermittent compensation switching strategy. SIAM J. Control. Optim. 58(6), 3684–3708 (2020)
Gong, P., Lan, W., Han, Q.-L.: Robust adaptive fault-tolerant consensus control for uncertain nonlinear fractional-order multi-agent systems with directed topologies. Automatica 117, 109011 (2020)
Chen, W., Hu, J., Wu, Z., Yu, X., Chen, D.: Finite-time memory fault detection filter design for nonlinear discrete systems with deception attacks. Int. J. Syst. Sci. 51(8), 1464–1481 (2020)
Ma, Y., Zhao, J.: Distributed event-triggered consensus using only triggered information for multi-agent systems under fixed and switching topologies. IET Control Theory Appl. 12(9), 1357–1365 (2018)
Li, Z., Zhao, J.: Fuzzy adaptive robust control for stochastic switched nonlinear systems with full-state-dependent nonlinearities. IEEE Trans. Fuzzy Syst. 28(9), 2035–2047 (2020)
Zhang, Z., Dou, C., Yue, D., Zhang, B.: Predictive voltage hierarchical controller design for islanded microgrids under limited communication. IEEE Trans. Circuits Syst. I Regul. Pap. 69(2), 933–945 (2021). https://doi.org/10.1109/TCSI.2021.3117048
Li, Z., Yue, D., Ma, Y., Zhao, J.: Neural-networks-based prescribed tracking for nonaffine switched nonlinear time-delay systems. IEEE Trans. Cybern. (2021). https://doi.org/10.1109/TCYB.2020.3042232
Li, Z., Zhao, J.: Co-design of controllers and a switching policy for nonstrict feedback switched nonlinear systems including first-order feedforward paths. IEEE Trans. Autom. Control 64(4), 1753–1760 (2019)
Zhao, J., Hill, D.J.: Dissipativity theory for switched systems. IEEE Trans. Autom. Control 53(4), 941–953 (2008)
Huang, J., Song, Y., Wang, W., Wen, C., Li, G.: Fully distributed adaptive consensus control of a class of high-order nonlinear systems with a directed topology and unknown control directions. IEEE Trans. Cybern. 48(8), 2349–2356 (2018)
Wei, L., Qian, C.: Adaptive control of nonlinearly parameterized systems: the smooth feedback case. IEEE Trans. Autom. Control 47(8), 1249–1266 (2002)
Li, Z., Zhao, J.: Adaptive consensus of non-strict feedback switched multi-agent systems with input saturation. IEEE/CAA J. Autom. Sinica 8(11), 1752–1761 (2021)
Acknowledgement
This work was supported in part by National Natural Science Foundation of China under Grants 62103199, 62103201, in part by the Natural Science Foundation of Jiangsu Province under Grant BK20210590, in part by the College Science Research Program of Jiangsu Province under Grant 21KJB510043, and in part by the Research Grants of the Nanjing University of Posts and Telecommunications (NY220158 and NY220177).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2023 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
Ma, Y., Li, Z., Yang, S. (2023). Secure Control of Uncertain Multi-agent Systems Under Cyber Attacks. In: Ren, Z., Wang, M., Hua, Y. (eds) Proceedings of 2021 5th Chinese Conference on Swarm Intelligence and Cooperative Control. Lecture Notes in Electrical Engineering, vol 934. Springer, Singapore. https://doi.org/10.1007/978-981-19-3998-3_15
Download citation
DOI: https://doi.org/10.1007/978-981-19-3998-3_15
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-19-3997-6
Online ISBN: 978-981-19-3998-3
eBook Packages: EngineeringEngineering (R0)