{"title":"针对多种网络威胁的无人机非合作编队跟踪:双网络方法","authors":"Qing Meng;Xiaohong Nian;Yong Chen;Fuxi Niu","doi":"10.1109/TII.2024.3495762","DOIUrl":null,"url":null,"abstract":"In this article, we investigate the problem of unmanned aerial vehicles (UAVs) formation tracking in the presence of multiple cyber-threats. In this scenario, UAVs have private, potentially conflicting objectives, and their communication networks and local feedback mechanisms are vulnerable to sabotage and eavesdropping by malicious attackers. To address this real-world challenge, we propose a control scheme based on a twin-network structure. Specifically, we construct a virtual twin layer interconnected with the physical layer to design a resilient estimator that fortifies information exchange among UAVs under threats. In addition, by coupling the states from the twin layer and time-varying signals as masks, we achieve privacy protection for critical information. Furthermore, leveraging reliable data provided by the resilient estimator, we design a cooperative controller based on gradient-optimization to update the UAVs' positions. Using Lyapunov theory, we prove that the position of all UAVs converge to a dynamic Nash equilibrium. Finally, we conduct experimental studies to validate the effectiveness of the proposed control scheme.","PeriodicalId":13301,"journal":{"name":"IEEE Transactions on Industrial Informatics","volume":"21 3","pages":"2174-2183"},"PeriodicalIF":9.9000,"publicationDate":"2024-12-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Noncooperative Formation Tracking of UAVs Against Multiple Cyber-Threats: A Twin-Network Approach\",\"authors\":\"Qing Meng;Xiaohong Nian;Yong Chen;Fuxi Niu\",\"doi\":\"10.1109/TII.2024.3495762\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"In this article, we investigate the problem of unmanned aerial vehicles (UAVs) formation tracking in the presence of multiple cyber-threats. In this scenario, UAVs have private, potentially conflicting objectives, and their communication networks and local feedback mechanisms are vulnerable to sabotage and eavesdropping by malicious attackers. To address this real-world challenge, we propose a control scheme based on a twin-network structure. Specifically, we construct a virtual twin layer interconnected with the physical layer to design a resilient estimator that fortifies information exchange among UAVs under threats. In addition, by coupling the states from the twin layer and time-varying signals as masks, we achieve privacy protection for critical information. Furthermore, leveraging reliable data provided by the resilient estimator, we design a cooperative controller based on gradient-optimization to update the UAVs' positions. Using Lyapunov theory, we prove that the position of all UAVs converge to a dynamic Nash equilibrium. Finally, we conduct experimental studies to validate the effectiveness of the proposed control scheme.\",\"PeriodicalId\":13301,\"journal\":{\"name\":\"IEEE Transactions on Industrial Informatics\",\"volume\":\"21 3\",\"pages\":\"2174-2183\"},\"PeriodicalIF\":9.9000,\"publicationDate\":\"2024-12-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Industrial Informatics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10791329/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Industrial Informatics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10791329/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Noncooperative Formation Tracking of UAVs Against Multiple Cyber-Threats: A Twin-Network Approach
In this article, we investigate the problem of unmanned aerial vehicles (UAVs) formation tracking in the presence of multiple cyber-threats. In this scenario, UAVs have private, potentially conflicting objectives, and their communication networks and local feedback mechanisms are vulnerable to sabotage and eavesdropping by malicious attackers. To address this real-world challenge, we propose a control scheme based on a twin-network structure. Specifically, we construct a virtual twin layer interconnected with the physical layer to design a resilient estimator that fortifies information exchange among UAVs under threats. In addition, by coupling the states from the twin layer and time-varying signals as masks, we achieve privacy protection for critical information. Furthermore, leveraging reliable data provided by the resilient estimator, we design a cooperative controller based on gradient-optimization to update the UAVs' positions. Using Lyapunov theory, we prove that the position of all UAVs converge to a dynamic Nash equilibrium. Finally, we conduct experimental studies to validate the effectiveness of the proposed control scheme.
期刊介绍:
The IEEE Transactions on Industrial Informatics is a multidisciplinary journal dedicated to publishing technical papers that connect theory with practical applications of informatics in industrial settings. It focuses on the utilization of information in intelligent, distributed, and agile industrial automation and control systems. The scope includes topics such as knowledge-based and AI-enhanced automation, intelligent computer control systems, flexible and collaborative manufacturing, industrial informatics in software-defined vehicles and robotics, computer vision, industrial cyber-physical and industrial IoT systems, real-time and networked embedded systems, security in industrial processes, industrial communications, systems interoperability, and human-machine interaction.