A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
Volume 10 Issue 1
Jan.  2023

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 11.8, Top 4% (SCI Q1)
    CiteScore: 17.6, Top 3% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Y. K. Shi, Y. Q. Wang, and J. Y. Tuo, “Distributed secure state estimation of multi-agent systems under homologous sensor attacks,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 67–77, Jan. 2023. doi: 10.1109/JAS.2022.105920
Citation: Y. K. Shi, Y. Q. Wang, and J. Y. Tuo, “Distributed secure state estimation of multi-agent systems under homologous sensor attacks,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 1, pp. 67–77, Jan. 2023. doi: 10.1109/JAS.2022.105920

Distributed Secure State Estimation of Multi-Agent Systems Under Homologous Sensor Attacks

doi: 10.1109/JAS.2022.105920
Funds:  This work was supported by the Fundamental Research Funds for the Central Universities (buctrc202201) and High Performance Computing Platform, College of Information Science and Technology, Beijing University of Chemical Technology
More Information
  • This paper addresses the problem of distributed secure state estimation for multi-agent systems under homologous sensor attacks. Two types of secure Luenberger-like distributed observers are proposed to estimate the system state and attack signal simultaneously. Specifically, the proposed two observers are applicable to deal with the cases in the presence and absence of time delays during network communication. It is also shown that the proposed observers can ensure the attack estimations from different agents asymptotically converge to the same value. Sufficient conditions for guaranteeing the asymptotic convergence of the estimation errors are derived. Simulation examples are finally provided to demonstrate the effectiveness of the proposed results.

     

  • loading
  • [1]
    Y. Yang, Y. Xiao, and T. Li, “A survey of autonomous underwater vehicle formation: Performance, formation control, and communication capability,” IEEE Comm. Surveys &Tutorials, vol. 23, no. 2, pp. 815–841, 2021.
    [2]
    Y. Yang, Y. Xiao, and T. Li, “Attacks on formation control for multi-agent systems,” IEEE Trans. Cybernetics, 2021. DOI: 10.1109/TCYB.2021.3089375.
    [3]
    R. Langner, “Stuxnet: Dissecting a cyberwarfare weapon,” IEEE Security &Privacy, vol. 9, no. 3, pp. 49–51, 2011.
    [4]
    A. West, “Marine pollution from vessel sewage in queensland,” Mlaanz Journal, vol. 18, p. 126, 2004.
    [5]
    X. Wang, D. Ding, X. Ge, and Q.-L. Han, “Neural-network-based control for discrete-time nonlinear systems with denial-of-service attack: The adaptive event-triggered case,” Int. J. Robust and Nonlinear Control, vol. 32, no. 5, pp. 2760–2779, 2022. doi: 10.1002/rnc.5831
    [6]
    S. Wang, L. Chen, D. Gu, and H. Hu, “Cooperative localization of AUVS using moving horizon estimation,” IEEE/CAA J. Autom. Sinica, vol. 1, no. 1, pp. 68–76, 2014. doi: 10.1109/JAS.2014.7004622
    [7]
    Y. Zhang, L. Du, and F. L. Lewis, “Stochastic DoS attack allocation against collaborative estimation in sensor networks,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1225–1234, 2020.
    [8]
    D. Han, Y. Mo, and L. Xie, “Convex optimization based state estimation against sparse integrity attacks,” IEEE Trans. Autom. Control, vol. 64, no. 6, pp. 2383–2395, 2019. doi: 10.1109/TAC.2019.2891458
    [9]
    H. Fawzi, Tabuada, and S. Diggavi, “Secure estimation and control for cyber-physical systems under adversarial attacks,” IEEE Trans. Automatic Control, vol. 59, no. 6, pp. 1454–1467, 2014. doi: 10.1109/TAC.2014.2303233
    [10]
    M. Pajic, I. Lee, and G. J. Pappas, “Attack-resilient state estimation for noisy dynamical systems,” IEEE Trans. Control of Network Systems, vol. 4, no. 1, pp. 82–92, 2016.
    [11]
    Y. Shoukry and Tabuada, “Event-triggered state observers for sparse sensor noise/attacks,” IEEE Trans. Automatic Control, vol. 61, no. 8, pp. 2079–2091, 2015.
    [12]
    D. Ding, Q.-L. Han, X. Ge, and J. Wang, “Secure state estimation and control of cyber-physical systems: A survey,” IEEE Trans. Systems,Man,and Cybernetics: Systems, vol. 51, no. 1, pp. 176–190, 2020.
    [13]
    V. Ugrinovskii, “Conditions for detectability in distributed consensus-based observer networks,” IEEE Trans. Automatic Control, vol. 58, no. 10, pp. 2659–2664, 2013. doi: 10.1109/TAC.2013.2256675
    [14]
    X. Ge, Q.-L. Han, X.-M. Zhang, L. Ding, and F. Yang, “Distributed event-triggered estimation over sensor networks: A survey,” IEEE Trans. Cybernetics, vol. 50, no. 3, pp. 1306–1320, 2019.
    [15]
    Millán, L. Orihuela, C. Vivas, and F. R. Rubio, “Distributed consensus-based estimation considering network induced delays and dropouts,” Automatica, vol. 48, no. 10, pp. 2726–2729, 2012. doi: 10.1016/j.automatica.2012.06.093
    [16]
    X. Ge, Q.-L. Han, M. Zhong, and X.-M. Zhang, “Distributed krein space-based attack detection over sensor networks under deception attacks,” Automatica, vol. 109, p. 108557, 2019.
    [17]
    H. Song, D. Ding, H. Dong, and X. Yi, “Distributed filtering based on cauchy-kernel-based maximum correntropy subject to randomly occurring cyber-attacks,” Automatica, vol. 135, p. 110004, 2022.
    [18]
    D. Zhang, G. Feng, Y. Shi, and D. Srinivasan, “Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 2, pp. 319–333, 2021. doi: 10.1109/JAS.2021.1003820
    [19]
    X. Guo, D. Zhang, J. Wang, and C. K. Ahn, “Adaptive memory event-triggered observer-based control for nonlinear multi-agent systems under dos attacks,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 10, pp. 1644–1656, 2021. doi: 10.1109/JAS.2021.1004132
    [20]
    M. Meng, X. Li, and G. Xiao, “Distributed estimation under sensor attacks: Linear and nonlinear measurement models,” IEEE Trans. Signal and Information Processing Networks, vol. 7, pp. 156–165, 2021. doi: 10.1109/TSIPN.2021.3054981
    [21]
    Y. Chen, S. Kar, and J. M. Moura, “Resilient distributed estimation: Sensor attacks,” IEEE Trans. Automatic Control, vol. 64, no. 9, pp. 3772–3779, 2018.
    [22]
    X. He, X. Ren, H. Sandberg, and K. H. Johansson, “How to secure distributed filters under sensor attacks,” IEEE Trans. Automatic Control, 2021. DOI: 10.1109/TAC.2021.3092603.
    [23]
    X.-C. Jia, “Resource-efficient and secure distributed state estimation over wireless sensor networks: A survey,” Int. J. Systems Science, vol. 52, no. 16, pp. 3368–3389, 2021. doi: 10.1080/00207721.2021.1998843
    [24]
    C. Liu, Y. Wang, D. Zhou, and X. Shen, “Minimum-variance unbiased unknown input and state estimation for multi-agent systems by distributed cooperative filters,” IEEE Access, vol. 6, pp. 18128–18141, 2018.
    [25]
    C. Liu, Y. Xu, J. Li, and J. Tuo, “Distributed semi-cooperative filter for a nonlinear multi-agent system with heterogeneous and homologous unknown inputs,” The Canadian J. Chemical Engineering, vol. 98, no. 12, pp. 2574–2586, 2020. doi: 10.1002/cjce.23837
    [26]
    Y. Shi, C. Liu, and Y. Wang, “Asymptotically stable filter for MVU estimation of states and homologous unknown inputs in heterogeneous multiagent systems,” IEEE Trans. Automation Science and Engineering, vol. 19, no. 2, pp. 884–894, 2022. doi: 10.1109/TASE.2021.3060075
    [27]
    Y. Shi and Y. Wang, “Online secure state estimation of multiagent systems using average consensus,” IEEE Trans. Systems,Man,and Cybernetics: Systems, vol. 52, no. 5, pp. 3174–3186, 2022. doi: 10.1109/TSMC.2021.3064658
    [28]
    Y. Shi, C. Liu, and Y. Wang, “Secure state estimation of multiagent systems with homologous attacks using average consensus,” IEEE Trans. Control of Network Systems, vol. 8, no. 3, pp. 1293–1303, 2021. doi: 10.1109/TCNS.2021.3062472
    [29]
    E. D. Kaplan and C. Hegarty, Understanding GPS/GNSS: Principles and Applications. London, UK: Artech House, 2017.
    [30]
    R. Olfati-Saber and Jalalkamali, “Coupled distributed estimation and control for mobile sensor networks,” IEEE Trans. Automatic Control, vol. 57, no. 10, pp. 2609–2614, 2012. doi: 10.1109/TAC.2012.2190184
    [31]
    F. Zhang, The Schur Complement and its Applications. Berlin, Heidelberg, Germany: Springer Science & Business Media, 2006.
    [32]
    L. El Ghaoui, F. Oustry, and M. AitRami, “A CONE plementarity linearization algorithm for static output-feedback and related problems,” IEEE Trans. Automatic Control, vol. 42, no. 8, pp. 1171–1176, 1997. doi: 10.1109/9.618250
    [33]
    Y. S. Moon, Pa rk, W. H. Kwon, and Y. S. Lee, “Delay-dependent robust stabilization of uncertain state-delayed systems,” Int. J. Control, vol. 74, no. 14, pp. 1447–1455, 2001. doi: 10.1080/00207170110067116
    [34]
    T.-G. Park and K.-S. Lee, “Process fault isolation for linear systems with unknown inputs,” IEE Proceedings-Control Theory and Applications, vol. 151, no. 6, pp. 720–726, 2004. doi: 10.1049/ip-cta:20040796

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(1)

    Article Metrics

    Article views (338) PDF downloads(68) Cited by()

    Highlights

    • Considering the system affected by the homologous sensor attack, two observers are designed for communication network with and without time delay.
    • The proposed observers have less computation and communication pressure, and hence are more suitable for online operation
    • Some constructive sufficient conditions are derived for the two observers and can guide the design of the gain matrices of the observers

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return