{"title":"Resilient Formation Tracking for Networked Swarm Systems Under Malicious Data Deception Attacks","authors":"Yishi Liu, Wenxin Li, Xiwang Dong, Zhang Ren","doi":"10.1002/rnc.7777","DOIUrl":null,"url":null,"abstract":"<div>\n \n <p>A distributed time-varying formation tracking method for a leader-following networked swarm system in the presence of malicious deception attacks is proposed in this paper. Both state and output equations are injected with false data by adversaries to prevent formation tracking information transmission. The real-time attack estimations are provided by an anomaly estimator. To design an event-triggered secure formation tracking protocol, a state predictor is utilized to provide neighboring states. The attack estimations and neighboring error are considered in the secure control protocol, which is adjusted using the Lyapunov stability theorem. A simulation result is shown to validate that the proposed method can accomplish the desired formation tracking under deception attacks.</p>\n </div>","PeriodicalId":50291,"journal":{"name":"International Journal of Robust and Nonlinear Control","volume":"35 6","pages":"2043-2052"},"PeriodicalIF":3.2000,"publicationDate":"2024-12-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Robust and Nonlinear Control","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1002/rnc.7777","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
A distributed time-varying formation tracking method for a leader-following networked swarm system in the presence of malicious deception attacks is proposed in this paper. Both state and output equations are injected with false data by adversaries to prevent formation tracking information transmission. The real-time attack estimations are provided by an anomaly estimator. To design an event-triggered secure formation tracking protocol, a state predictor is utilized to provide neighboring states. The attack estimations and neighboring error are considered in the secure control protocol, which is adjusted using the Lyapunov stability theorem. A simulation result is shown to validate that the proposed method can accomplish the desired formation tracking under deception attacks.
期刊介绍:
Papers that do not include an element of robust or nonlinear control and estimation theory will not be considered by the journal, and all papers will be expected to include significant novel content. The focus of the journal is on model based control design approaches rather than heuristic or rule based methods. Papers on neural networks will have to be of exceptional novelty to be considered for the journal.