Loading [MathJax]/jax/output/HTML-CSS/jax.js
A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation
C. Liu, B. Jiang, X. F. Wang, H. L. Yang, and S. R. Xie, “Distributed fault-tolerant consensus tracking of multi-agent systems under cyber-attacks,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 6, pp. 1037–1048, Jun. 2022. doi: 10.1109/JAS.2022.105419
Citation: C. Liu, B. Jiang, X. F. Wang, H. L. Yang, and S. R. Xie, “Distributed fault-tolerant consensus tracking of multi-agent systems under cyber-attacks,” IEEE/CAA J. Autom. Sinica, vol. 9, no. 6, pp. 1037–1048, Jun. 2022. doi: 10.1109/JAS.2022.105419

Distributed Fault-Tolerant Consensus Tracking of Multi-Agent Systems Under Cyber-Attacks

doi: 10.1109/JAS.2022.105419
Funds:  This work was supported by the National Key R&D Program of China (2018AAA0102804), National Natural Science Foundation of China (62020106003, 62103250, 61773201), Fundamental Research Funds for the Central Universities (NC2020002, NP2020103), Shanghai Sailing Program (21YF1414000)
More Information
  • This paper investigates the distributed fault-tolerant consensus tracking problem of nonlinear multi-agent systems with general incipient and abrupt time-varying actuator faults under cyber-attacks. First, a decentralized unknown input observer is established to estimate relative states and actuator faults. Second, the estimated and output neighboring information is combined with distributed fault-tolerant consensus tracking controllers. Criteria of reaching leader-following exponential consensus tracking of multi-agent systems under both connectivity-maintained and connectivity-mixed attacks are derived with average dwelling time, attack frequency, and attack activation rate technique, respectively. Simulation example verifies the effectiveness of the fault-tolerant consensus tracking algorithm.

     

  • MULTI-AGENT systems (MASs) tracking has been successfully used in many important civil and military applications, such as rigid and flexible spacecrafts, autonomous unmanned aerial vehicles, and mobile robots [1]-[3]. A brief survey of consensus and coordination of MASs was given in [4]. The distributed consensus of the second-order, high-order, homogeneous, and heterogeneous MASs has attracted considerable interest recently [5]-[8]. State-based consensus of homogeneous MASs and output-based consensus of heterogeneous MASs were investigated with event-triggered strategy [7]. Thus, assigning an effective concept of the distributed consensus tracking of MASs is important but challenging.

    MASs are vulnerable to network security problems, such as hostile cyber-attacks [9], stealthy attack on remote estimation [10], switching and quantization of nonsmooth behaviors [11], and emergence of sensors on lossy and bandwidth-limited channels [12]. The distributed consensus tracking of MASs requires ideal and accurate information interconnection of individual agents through communication topologies, and the essential issue under cyber-attacks is destroyed. Consensus tracking of MASs under cyber-attacks has been extensively investigated [13]-[16]. The observer-based event-triggered consensus control was developed for discrete-time MASs in the presence of loss sensors and network attacks [14]. Specifically, the secure consensus and coordination of cyber-physical MASs under denial-of-service attacks [17], deception attacks [18] and random attacks [19] were investigated. However, for undirected or directed balanced topologies, the consensus tracking problem of MASs under cyber-attacks cannot be directly addressed via the existing methods based on graph theory. Secure consensus tracking was achieved via switching control strategy for linear MASs with the respective paralyzed and maintained networks caused by cyber-attacks [20]. Therefore, developing a novel consensus tracking control protocol for MASs under cyber-attacks via the switching control concept is necessary but challenging.

    The intrinsic state evolution of MASs is affected not only by handover topologies subjected to cyber-attacks but also actuator faults occurring on local agents [21]-[26]. Therefore, MASs need to work safely and healthily, and the fault-tolerant consensus tracking control (FCTC) is an effective method for realizing the desired local tolerance and global synchronization of the entire MASs. Development trends and methodologies of cooperative fault-tolerant control of MASs were briefly summarized in [21]. Partial loss of effectiveness and bias faults of leader-following MASs were addressed by the adaptive robust fault-tolerant control strategy [25], [27]. A distributed observer-based FCTC protocol was developed for linear MASs to achieve the global consensus through local estimations and compensate for multiple heterogeneous actuator faults [28]. However, the majority of studies focus on constant or time-varying abrupt actuator faults [22], [29] and ignore incipient and inchoate actuator faults [30]. Notably, a massive collapse of the entire MASs may be caused by individual agents broadcasting early incipient faults to their neighbors through the communication network and ultimately breaking the synchronization of the MASs. On the one hand, most studies on the FCTC scheme in a distributed manner are either based on neighborhood state information [22], [23], [28] or state-feedback control gains [25]. The FCTC research on the neighboring output information of MASs has been rarely explored. On the other hand, as a result of the existing distributed FCTC methodology, the observer-based strategy is rarely considered from the fault estimation (FE) system to the tolerance system to construct unmeasurable information of each follower [26]. Moreover, the consensus problem of MASs under cyber-attacks has been investigated [31], but few studies focus on the fault-tolerant consensus tracking community, especially for nonlinear MASs in the presence of general incipient and abrupt time-varying actuator faults as well as cyber-attacks. Actuator faults and denial-of-service attacks in the respective linear MASs [32] and nonlinear MASs [33] were simultaneously solved via the distributed fault-tolerant control method with the dwell time technique. The adaptive fault-tolerant control scheme was developed for MASs with deception attacks in the communication layer and actuator faults in the physical layer in a distributed manner [34]. Therefore, developing an observer-based estimation and tolerance algorithm associated with the distributed output measurements for nonlinear MASs with incipient and abrupt actuator faults is crucial for the tolerance problem of MASs under cyber-attacks.

    The distributed FCTC is proposed for nonlinear MASs with incipient and abrupt time-varying actuator faults under cyber-attacks. First, the actuator fault and cyber-attack models (connectivity-maintained, connectivity-paralyzed and connectivity-mixed attacks) are established. Second, the unknown input observer (UIO) [26], [29] in decentralized FE is developed to estimate the unmeasurable state and fault information. Finally, two sufficient conditions with attack frequency, activation rate, and average dwelling time (ADT) technique [17], [20], [33] are given to achieve the exponential consensus tracking of leader-following MASs.

    The major contributions of this study are summarized as follows. 1) In comparison with the cooperative consensus of MASs under independent cyber-attacks [13], [31] or the FCTC of MASs under traditional abrupt bounded faults [28], [29], this study attempts to combine network anti-attack and fault-tolerant control technologies effectively. By virtue of the switching topology theory [7], [20], it is a brand-new attempt to address the different types of constraints of self-dynamics (general incipient and abrupt time-varying actuator faults) in physical hierarchy and maintained/paralyzed links (connectivity-mixed attacks) in networked hierarchy in an integrated FE-based distributed FCTC framework. 2) Unlike local state information [22], [23] and direct state-feedback protocols [25], [33] of neighboring agents, a novel control structure is proposed with the effective combination advantages of local fault/state estimation in the decentralized UIO-based FE and adjacent output information in the distributed FCTC to ensure the exponential consensus tracking of nonlinear leader-following MASs. 3) For connectivity-maintained attacks, dual metrics (attack frequency and attack duration) in [17] are circumvented and replaced by a single constrained metric (ADT) to realize secure consensus tracking with less computing resources. For connectivity-mixed attacks, the ADT switching between stable and unstable sub-topologies [20], [33] is evaded and replaced by multi-constraint metrics (attack frequency, activation rate and upper and lower bounds of FCTC parameters) to deal with faults and cyber-attacks simultaneously.

    The remainder of this study is structured as follows. Preliminaries and problem formulation are presented in Section II. The decentralized FE and distributed FCTC designs for leader-following MASs under cyber-attacks are discussed in Sections III and IV, respectively. Simulations are provided in Sec-tion V to illustrate the effectiveness of the FCTC strategy. Finally, conclusions of this study are drawn in Section VI.

    Notations: $ \mathbb{R},\mathbb{N} $ denote the sets of real and natural numbers, respectively, $ \otimes $ denotes the Kronecker product, $ \lambda_{\rm max}(\cdot),\lambda_{\rm min}(\cdot) $ represent the maximum and minimum eigenvalues, respectively, $ {\rm min}\{\cdot\},{\rm max}\{\cdot\} $ represent the minimum and maximum elements, respectively, and $ {\rm He}\{X\} = X+X^T $.

    A directed graph $ \mathcal{G} $ is a pair $ (\nu,\varepsilon,\mathcal{A}) $, where $\nu = \{\nu_1, \nu_2,\ldots,\nu_N\}$ and is a nonempty finite set of nodes, $ \varepsilon\subseteq\nu\times\nu $ is a set of edges, and $ (\nu_i,\nu_j) $ is an edge that denotes an ordered pair of nodes $ \nu_i,\nu_j $. Adjacency matrix of graph $ \mathcal{G} $ is denoted by $ \mathcal{A} = [a_{ij}]\in \mathbb{R}^{N\times N} $, where $ a_{ij} $ is the weight coefficient of edge $ (\nu_i,\nu_j) $ and $ a_{ii} = 0,a_{ij}>0 $ if $ (\nu_i,\nu_j)\in\varepsilon $; otherwise, $ a_{ij} = 0 $. Node $ \nu_j $ is the neighbor of node $ \nu_i $ if $ (\nu_i,\nu_j)\in\varepsilon $. The set of neighbors of node $ \nu_i $ is denoted by $ \mathcal{N}_i = \{\nu_j\in\nu\mid(\nu_i,\nu_j)\in\varepsilon\} $. The laplacian matrix is $\mathcal{L} = \mathcal{D}-\mathcal{A} = [l_{ij}]\in \mathbb{R}^{N\times N}$, where $ \mathcal{D} = [d_{ii}]\in \mathbb{R}^{N\times N} $ is a diagonal matrix with $ d_{ii} = \sum_{j = 1}^{N}a_{ij} $.

    The diagonal matrix is denoted by $\mathcal{B} = {\rm diag}\{b_1,\ldots,b_N\}$, where $ b_i $ is the information interaction between node $ \nu_i $ and the leader. If $ b_i = 1 $, then node $ \nu_i $ can reach the leader via a directed path; otherwise, $ b_i = 0 $. An information-exchange matrix is denoted by $ \mathcal{H} = \mathcal{L}+\mathcal{B} $ for notational convenience.

    A class of nonlinear MASs with a group of $ N $ followers are considered. The dynamics of the $ i $th follower with nonlinearities and actuator faults $(i = 1,\ldots,N)$ are modeled as

    {˙xi(t)=Axi(t)+B(ui(t)+fi(t))+ξ(xi(t),t)yi(t)=Cxi(t) (1)

    where $ x_i(t)\in \mathbb{R}^{n},y_i(t)\in \mathbb{R}^{p} $, and $ u_i(t)\in \mathbb{R}^{m} $ are the state, output, and input, respectively, $ \xi(x_i(t),t)\in \mathbb{R}^{n} $ denotes the state-dependent nonlinear perturbation, $ A, B $, and $ C $ are known system matrices with appropriate dimensions, $f_i(t) = [f_{i1}(t),\ldots, f_{im}(t)]^T\in \mathbb{R}^{m}$ is the incipient and abrupt time-varying actuator fault, and $f_{is}(t),s = 1,\ldots,m$ is modeled in the following form:

    fis(t)={0,tTs(1eϵs(tTs))ˉfis,t>Ts,s=1,,m (2)

    where $ \bar{f}_{is} $ is the $ s $th row vector of unknown constant actuator fault bound, $ T_s $ is incipient or abrupt actuator fault occurrence instant, and $ \epsilon_s $ is the unknown decay rate. The actuator fault is denoted as incipient actuator fault (slow decay rate) when $ \underline{\epsilon}_{\rm inc}\le\epsilon_s<\bar{\epsilon}_{\rm inc} $ and abrupt actuator fault (quick decay rate) when $ \epsilon_s\ge\bar{\epsilon}_{\rm inc} $, respectively.

    The leader’s dynamics (labeled as $ 0 $) are modeled as

    {˙x0(t)=Ax0(t)+Bu0(t)+ξ(x0(t),t)y0(t)=Cx0(t) (3)

    where $ x_0(t)\in \mathbb{R}^{n},y_0(t)\in \mathbb{R}^{p} $, and $ \xi(x_0(t),t)\in \mathbb{R}^{n} $ are the respective state, output, and nonlinearity of the leader. The leader’s input $ u_0(t)\in \mathbb{R}^{m} $ is devised as $ u_0(t) = -K_xx_0(t) $, where $ K_x\in \mathbb{R}^{m\times n} $ denotes the derived state-feedback matrix.

    Assumption 1: The dynamics $ (A,B) $ and $ (A,C) $ are controllable and observable, respectively.

    Assumption 2: i) The incipient and abrupt actuator faults are differentiable after each fault occurrence instant. ii) The lower and upper bounds of incipient actuator fault are determined manually with the known positive scalars $ \underline{\epsilon}_{\rm inc} $ and $ \bar{\epsilon}_{\rm inc} $.

    Assumption 3: The nonlinear function $ \xi(\cdot) $ is satisfied with the following Lipschitz form:

    ξ(ω1(t),t)ξ(ω2(t),t)ρω1(t)ω2(t) (4)

    where $ \rho>0 $ is a Lipschitz constant for $ \forall \omega_1(t),\omega_2(t),t\ge 0 $.

    Definition 1 [35]: The exponential consensus tracking control problem of the leader-following MASs in (1) and (3) is solved if $ \forall t\ge t_0 $, there exists an amplitude $ \mu>0 $ and a decay rate $ \lambda>0 $ such that

    ei(t)2μeλ(tt0)ei(t0)2 (5)

    where $ e_i(t) = x_i(t)-x_0(t) $ denotes the state tracking error.

    A switching signal $ \gamma(t):\left[0,\infty\right)\rightarrow \Gamma = \{1,2,3,\ldots,r\} $ is established to denote switchings in each individual topology under cyber-attacks. $ t_k,k = 0,1,2,\ldots, $ is the switching sequence over $ [t_0,t) $. Assume that there exists an infinite sequence of uniformly bounded and non-overlapping time intervals $ [t_k,t_{k+1}) $, in which the graph is time-invariant. The set $ \{\mathcal{G}_1,\mathcal{G}_2,\ldots,\mathcal{G}_r\} $ represents switching topologies $ \mathcal{G}_{\gamma(t)} $, and $ \{\mathcal{H}_1, \mathcal{H}_2,\ldots,\mathcal{H}_r\} $ represents information-switching matrices $ \mathcal{H}_{\gamma(t)} $.

    The following kinds of cyber-attacks are defined:

    1) Connectivity-Maintained Attacks: The connectivity-maintained topology (removing or adding edges) still remains connected and contains a directed spanning tree with the leader as the root although MASs suffer from actuator faults. The switching signal is denoted by $ \gamma(t)\in\Gamma_m = \{1,\ldots,r\} $ for switching topologies $ \mathcal{G}_{\gamma(t)} $.

    2) Connectivity-Paralyzed Attacks: The topology under connectivity-paralyzed attacks (removing or adding edges remarkably) becomes disconnected without a directed spanning tree but can be recovered into connectivity with the repair mechanism although actuator faults exist. The switching signal is denoted by $ \gamma(t)\in\Gamma_p = \{1,\ldots,r\} $ for switching topologies $ \mathcal{G}_{\gamma(t)} $.

    3) Connectivity-Mixed Attacks: The switching signal $ \gamma(t)\in\Gamma = \Gamma_m\cup\Gamma_p = \{1,\ldots,q,q+1,\ldots,r\},r\ge 2 $ for switching topologies $ \{\mathcal{G}_1,\ldots,\mathcal{G}_q,\mathcal{G}_{q+1},\ldots,\mathcal{G}_r\} $, where $ \Gamma_m $ and $ \Gamma_p $ are sets of $ q $ connectivity-maintained and $ (r-q) $ connectivity-paralyzed attacks, respectively.

    Definition 2 [20]: Denote the time instants $ k\in\mathbb{N} $ and $ {N}_{\Gamma}(t_0,t) = N_{\Gamma_m}(t_0,t)+N_{\Gamma_p}(t_0,t),\forall t>t_0\ge 0 $ for the switching signal $ \gamma(t)\in\Gamma = \Gamma_m\cup\Gamma_p $ as the number of $ \gamma(t) $ varies over $ [t_0,t) $, where $ N_{\Gamma_m}(t_0,t) $ and $ N_{\Gamma_p}(t_0,t) $ are the numbers of connectivity-maintained/paralyzed attacks.

    Define the total activation durations of connectivity-maintained and connectivity-paralyzed attacks over $ [t_0,t) $ as $ T_m(t_0,t) $ and $ T_p(t_0,t) $, respectively.

    {Tm(t0,t)=kN,γ(tk)Γm(tk+1tk)Tp(t0,t)=kN,γ(tk)Γp(tk+1tk). (6)

    Furthermore, if two scalars $ \bar{N}_{\Gamma}>0 $ and $ T_{\Gamma}>0 $ exist, such that $ {N}_{\Gamma}(t_0,t)\le\bar{N}_{\Gamma}+\frac{t-t_0}{T_{\Gamma}} $, then $ T_{\Gamma} $ and $ \bar{N}_{\Gamma} $ represent the ADT and chattering bounds, respectively.

    Definition 3 (Connectivity-Paralyzed Attack Frequency): For $ \gamma(t)\in\Gamma_p $, denote $ \mathcal{F}_{\Gamma_p}(t_0,t) = \frac{N_{\Gamma_p}(t_0,t)}{t-t_0} $ as the connectivity-paralyzed attack frequency over $ [t_0,t) $.

    Definition 4 (Connectivity-Maintained Attack Activation Rate): For $ \gamma(t)\in\Gamma_m $, denote $ \mathcal{R}_{\Gamma_m}(t_0,t) = \frac{T_m(t_0,t)}{t-t_0} $ as the connectivity-maintained attack activation rate over $ [t_0,t) $.

    Definition 5 (Connectivity-Paralyzed Attack Activation Rate): For $ \gamma(t)\in\Gamma_p $, denote $ \mathcal{R}_{\Gamma_p}(t_0,t) = \frac{T_p(t_0,t)}{t-t_0} $ as the connectivity-paralyzed attack activation rate over $ [t_0,t) $.

    Lemma 1 [36]: $ \Phi_{\gamma(t)}\mathcal{H}_{\gamma(t)}+\mathcal{H}_{\gamma(t)}^T\Phi_{\gamma(t)} $ is a symmetric positive-definite matrix and $ \Phi_{\gamma(t)} = {\rm diag}\{\phi_{\gamma(t),1}^{-1},\ldots,\phi_{\gamma(t),N}^{-1}\} $ is a diagonal positive-definite matrix, where $ \phi_{\gamma(t),i},i = 1,\ldots,N $ is the element of matrix $ \phi_{\gamma(t)} = \mathcal{H}_{\gamma(t)}^{-T}1_N $ with the switching signal $ \gamma(t)\in\Gamma $.

    Remark 1: Communication topologies may be subjected to frequent connectivity-maintained/-paralyzed attacks and eventually lead to poor consensus with destroyed links among agents. Compared with the arbitrary switching [5] or switching networks that satisfy jointly connected condition [7], connectivity-maintained attacks with a directed spanning tree and connectivity-paralyzed attacks without a spanning tree are modeled. It is required that the switching characteristics of dynamic switching topologies $ \mathcal{G}_{\gamma(t)} $ are known and deterministic, and can be detected by some intelligent devices, while assuming that the upper or lower bounds of ADT, attack frequency and attack activation rate need to satisfy specific conditions in order to maintain consensus tracking performance of MASs.

    Remark 2: Compared with the linear state-dependent nonlinear dynamics [24] and quadratic nonlinear constraints [26], the modeled nonlinear perturbation $ \xi(x_i(t),t),i = 0,\ldots,N $ in Assumption 3 is constrained within the Lipchitz condition. Moreover, control structures consisting of FE, FCTC designs, and switching topologies caused by cyber-attacks are shown in Fig. 1. This study aims to develop a decentralized FE-based FCTC controller to achieve the leader-following exponential consensus tracking property in a distributed manner in (5) for MASs with general incipient and abrupt time-varying actuator faults in (2) as well as cyber-attacks in two cases.

    Figure  1.  The structure with FE, FCTC, and network hierarchies.

    A UIO-based FE scheme is developed for MASs to obtain the fault and state estimated information with decentralized structure in this section.

    The augmented state is denoted as $ {\bar{x}}_i(t) = [x_i^T(t)\;f_i^T(t)]^T $ and the uncertainty is denoted as $ \bar{d}_i(t) = \dot{f}_i(t) $. Subsequently, the augmented dynamics of the $ i $th follower are rewritten as follows:

    {˙ˉxi(t)=ˉAˉxi(t)+ˉBui(t)+ˉDˉdi(t)+ˉξ(A0ˉxi(t))yi(t)=ˉCˉxi(t) (7)

    where $ \bar{\xi}(A_0\bar{x}_i(t)) = [\xi^T(x_i(t),t)\quad 0_{1\times m}]^T $ with $ A_0 = [I_n\quad 0_{n\times m}] $, and the system matrices $ \bar{C} = [C\quad 0_{p\times m}] $,

    ˉA=[AB0m×n0m],ˉB=[B0m],ˉD=[0n×mIm]. (8)

    Decentralized observers only need the output and input information of each agent, but do not require the information of their neighboring observers. Then, each augmented state $ {\bar{x}}_i(t) $ can be obtained in the decentralized UIO-based FE design as follows:

    {˙zi(t)=Mzi(t)+Gui(t)+Jyi(t)+Θˉξ(A0ˆˉxi(t))ˆˉxi(t)=zi(t)+Hyi(t) (9)

    where ${\textit{z}}_i(t)\in \mathbb{R}^{n+m}$ is the state of the UIO, $\hat{\bar{x}}_i(t) = [\hat{x}_i^T(t)\; \hat{f}_i^T(t)]^T$ is the estimation of $ \bar{x}_i(t) $ with the estimated state vector $ \hat{x}_i(t)\in \mathbb{R}^{n} $ and the estimated fault vector $ \hat{f}_i(t)\in \mathbb{R}^{m} $, $\bar{\xi}(A_0\hat{\bar{x}}_i(t)) = [\xi^T(\hat{x}_i(t),t)\; 0_{1\times m}]^T$ is the estimated state and fault-dependent nonlinear perturbation, and $ M,G,J,\Theta,H $ are designed matrices of proper dimensions.

    The estimation error is denoted as $\tilde{e}_i(t) = \bar{x}_i(t)- \hat{\bar{x}}_i(t) = [e_{xi}^T(t)\; e_{fi}^T(t)]^T$ with the state estimation error $ e_{xi}(t) = x_i(t)-\hat{x}_i(t) $ and the fault estimation error $ e_{fi}(t) = f_i(t)-\hat{f}_i(t) $. Next, define $ \Theta = I_{n+m}-H\bar{C} $ and $ J = J_1+J_2 $, and the estimation error dynamics are derived as

    ˙˜ei(t)=(ΘˉAJ1ˉC)˜ei(t)+(ΘˉAJ1ˉCM)zi(t)+((ΘˉAJ1ˉC)HJ2)yi(t)+(ΘˉBG)ui(t)+Θ(ˉξ(A0ˉxi(t))ˉξ(A0ˆˉxi(t)))+ΘˉDˉdi(t). (10)

    Subsequently, with the following equality constraints of $ M,G,J_1,J_2 $, and H:

    {M=ΘˉAJ1ˉCJ2=(ΘˉAJ1ˉC)HG=ΘˉB (11)

    where M is a Hurwitz matrix, and the corresponding FE error dynamics are expressed as

    ˙˜ei(t)=M˜ei(t)+ΘˉDˉdi(t)+ΘΔˉξi(t) (12)

    where $ \Delta\bar{\xi}_i(t) = \bar{\xi}(A_0\bar{x}_i(t),t)-\bar{\xi}(A_0\hat{\bar{x}}_i(t),t) $.

    It then follows that:

     ˙˜e(t)=(INM)˜e(t)+(INΘˉD)ˉd(t)+(INΘ)Δˉξ(t) (13)

    where $ \tilde{e}(t) = [\tilde{e}_1^T(t),\ldots,\tilde{e}_N^T(t)]^T,\bar{d}(t) = [\bar{d}_1^T(t),\ldots,\bar{d}_N^T(t)]^T $ and $ \Delta\bar{\xi}(t) = [\Delta\bar{\xi}_1^T(t),\ldots,\Delta\bar{\xi}_N^T(t)]^T $.

    Hence, the objective of decentralized FE design aims at devising H and $ J_1 $ such that the FE error dynamics in (12) and (13) are robustly asymptotically stable.

    Remark 3: The $ i $th UIO in (9) exists for the augmented dynamics (7) with $ \Theta\bar{D}\bar{d}_i(t) = 0 $ and $ \Theta\Delta\bar{\xi}_i(t) = 0 $ if the decoupled FE error dynamics in (12) and (13) are asymptotically stable. Subsequently, since matrix $ M $ is Hurwitz, the estimation error dynamics are robustly stable, indicating that $ \tilde{e}_i(t) $ approaches to zero, i.e., $ \lim_{t\rightarrow \infty}\tilde{e}_i(t) = 0 $. Compared with the fixed-time distributed observer [6] and resilient adaptive distributed observer [32], a novel decentralized UIO-based FE protocol is constructed, under which the FE errors in the presence of cyber-attacks and actuator faults are verified to be asymptotically convergent. In addition, in order to design the decentralized FE hierarchy under the solvable equality constraints in (11), it is guaranteed that the devised UIO matrices $ M,G $, and $ J_2 $ can be calculated by the derived matrices H and $ J_1 $, i.e., $M = (I_{n+m}-H\bar{C})\bar{A}- J_1\bar{C},\;G = (I_{n+m}-H\bar{C})\bar{B}$, and $J_2 = ((I_{n+m}- H\bar{C})\bar{A}-J_1\bar{C})H$.

    The distributed fault-tolerant consensus tracking controller of the $ i $th agent of MASs under cyber-attacks is designed as

    ui(t)=Kˆˉxi(t)+δRΞi(yj(t),γ(t)),i=1,,N (14)

    where $ K = [K_x\;I_m] $ is the compensation matrix with the state-feedback matrix $ K_x\in \mathbb{R}^{m\times n} $, $ R $ is the constant matrix, and $ \delta $ is a positive scalar. Then, the output information $\Xi_i(y_j(t),\gamma(t)), j = 0,1,\ldots,N,\gamma(t)\in\Gamma = \Gamma_m\cup\Gamma_p$ in a distributed manner is devised as

    Ξi(yj(t),γ(t))=Nj=1aγ(t)ij(yj(t)yi(t))+bγ(t)i(y0(t)yi(t)) (15)

    where $ a_{ij}^{\gamma(t)} $ is the $ (i,j) $th entry of $ \mathcal{A}_{\gamma(t)} $ with the graph $ \mathcal{G}_{\gamma(t)} $, and $ b_i^{\gamma(t)} = 1 $ when the $ i $th agent can access the leader and $ b_i^{\gamma(t)} = 0 $, otherwise.

    The state tracking error dynamics can be rewritten as

    ˙ei(t)=(ABKx)ei(t)+BK˜ei(t)+Δ˜ξi(t)+δBRC(Nj=1aγ(t)ij(ej(t)ei(t))bγ(t)iei(t)) (16)

    where $ \Delta\tilde{\xi}_i(t) = {\xi}({x}_i(t),t)-{\xi}({x}_0(t),t) $.

    Furthermore, it follows that:

    ˙e(t)=(IN(ABKx)δ(Hγ(t)BRC))e(t)+(INBK)˜e(t)+Δ˜ξ(t) (17)

    where the global vectors ${e}(t) = [{e}_1^T(t),\dots,{e}_N^T(t)]^T,\;\Delta\tilde{\xi}(t) = [\Delta\tilde{\xi}_1^T(t),\dots,\Delta\tilde{\xi}_N^T(t)]^T$, and $ \mathcal{H}_{\gamma(t)} $ denotes the nonsingular information-exchange matrix.

    The objective of Case I with proposing the distributed FCTC protocol in (14) and (15) is to determine $ K_x $ and R such that the leader-following consensus tracking is realized. The sufficient condition of FCTC scheme is proposed for MASs under connectivity-maintained attacks, i.e., $ \gamma(t)\in\Gamma_m $.

    Theorem 1: Consider leader-following MASs with incipient and abrupt actuator faults in (2) under connectivity-maintained attacks. Given positive scalars $ \tau_1,\tau_3,\sigma_{{\Gamma}_m} $, and a positive chattering bound $ \bar{N}_{{\Gamma}_m} $, the MASs with the distributed FCTC approach in (14) and (15) can realize the exponential consensus tracking performance, if there exists a symmetric positive-definite matrix $ P\in \mathbb{R}^{n\times n} $, matrix $K_x\in \mathbb{R}^{m\times n},\; H\in \mathbb{R}^{(n+m)\times p},\;J_1\in \mathbb{R}^{(n+m)\times p}$, and positive scalars $ {c},\tau_2,\tau_4 $ such that

    He((ABKx)P)+(λ1ˉϕcϕ_)BBT+ˉϕ(λ1In+ρ2P2)+τ3P<0 (18)
    1τ1(M+MT+ΘˉDˉDTΘT+ΘΘT+ρ2AT0A0)+KTK+τ4In+m<0 (19)
    τ4<2ϵ_incτ1 (20)
    τ2τ21τ4+2τ1ϵ_inc (21)

    where $ \underline{\phi} = {\rm min}\phi_{\gamma(t),i},\bar{\phi} = {\rm max}\phi_{\gamma(t),i},\gamma(t)\in\Gamma_m,i = 1,\ldots,N $ and $ {\lambda}_1 = \lambda_{\rm max}(\Phi_{\gamma(t)}^2) $ with the known $ \Phi_{\gamma(t)} $ in Lemma 1.

    The constant matrix is denoted by $ R = B^TP^{-1}(C^TC)^{-1}C^T $ and the positive scalar is constrained within $ \delta\ge \frac{{c}}{\vert{\lambda}_2\vert} $ and $ {\lambda}_2 = \lambda_{\rm min}(\Phi_{\gamma(t)}\mathcal{H}_{\gamma(t)}+\mathcal{H}_{\gamma(t)}^T\Phi_{\gamma(t)}) $. The switching signal $\gamma(t)\in {\Gamma_m}$ is selected for $ \mathcal{G}_{{\Gamma}_m} $ with the ADT $ T_{{\Gamma}_m} $ satisfying

    TΓm>ln(ˉϕϕ_)τm (22)

    where $ \tau_m = {\rm min}\{\tau_3,\tau_1\tau_4\} $, and the exponential consensus tracking problem is effectively solved with the following state tracking error expectation:

    E{ei(t)2}μΓmeλΓm(tt0)E{ei(t0)2} (23)

    with the initial maximum amplitude given by

    μΓm=eˉNΓmln(ˉϕϕ_)(λmax(ϕ1γ(t),iP1)+σΓm)λmin(ϕ1γ(t),iP1) (24)

    and the decay rate $ {\lambda}_{{\Gamma}_m} $ given by

    λΓm=τmln(ˉϕϕ_)TΓm. (25)

    Proof: Construct a Lyapunov function candidate $ V_1({e}(t),\gamma(t)) $ with a symmetric positive-definite matrix $ P $ and a positive scalar $ \phi_{\gamma(t),i},\gamma(t)\in\Gamma_m,i = 1,\ldots,N $ as follows:

    V1(e(t),γ(t))=Ni=1eTi(t)ϕ1γ(t),iP1ei(t) (26)

    where $ \phi_{\gamma(t),i}^{-1} $ is the element of the diagonal matrix $\Phi_{\gamma(t)} = {\rm diag}\{\phi_{\gamma(t),1}^{-1},\dots,\phi_{\gamma(t),N}^{-1}\}$ from Lemma 1.

    Denote $ \varsigma(t) = [\varsigma_1^T(t),\ldots,\varsigma_N^T(t)]^T $ with $ \varsigma_i(t) = P^{-1}{e}_i(t) $. According to the gain matrix $ R = B^TP^{-1}(C^TC)^{-1}C^T $, the derivative of $ V_1({e}(t),\gamma(t)) $ in (26) is obtained as

    ˙V1(e(t),γ(t))=2Ni=1eTi(t)ϕ1γ(t),iP1BK˜ei(t)+ςT(t)(Φγ(t)((ABKx)P+P(ABKx)T))ς(t)δςT(t)((Φγ(t)Hγ(t)+HTγ(t)Φγ(t))BBT)ς(t)+ςT(t)(Φ2γ(t)In)ς(t)+Ni=1Δ˜ξTi(t)Δ˜ξi(t)ςT(t)(Φγ(t)((ABKx)P+P(ABKx)T+(λ1ˉϕcϕ_)BBT+ˉϕ(λ1In+ρ2P2)))ς(t)+˜eT(t)(INKTK)˜e(t) (27)

    where the bounds $\underline{\phi} \;=\; {\rm min}\phi_{\gamma(t),i},\;\bar{\phi} \;=\; {\rm max}\phi_{\gamma(t),i},\;{\lambda}_1 \;=$ $\lambda_{\rm max} (\Phi_{\gamma(t)}^2),\; {\lambda}_2 = \lambda_{\rm min}(\Phi_{\gamma(t)}\mathcal{H}_{\gamma(t)}+\mathcal{H}_{\gamma(t)}^T\Phi_{\gamma(t)})$ with $ \gamma(t)\in\Gamma_m $, and the positive scalar $ \delta $ is selected as $ \delta\ge \frac{{c}}{\vert{\lambda}_2\vert} $.

    Here, incipient and abrupt actuator faults are considered. The first-order derivative form is obtained with $\bar{d}_i(t) = \dot{f}_i(t) = [\dot{f}_{i1}^T(t),\dots,\dot{f}_{im}^T(t)]^T$.

    ˙ˉdi(t)=¨fi(t)=diag(ϵ1,,ϵm)ˉdi(t) (28)

    where $ \dot{\bar{d}}_{is}(t) = -\epsilon_s\bar{d}_{is}(t) $ and the MASs are subject to different time-varying actuator fault when $ \epsilon_s>0 $ is selected.

    Subsequently, another Lyapunov function candidate $V_2(\tilde{e}(t),\;\bar{d}(t)) = \frac{1}{\tau_1}\sum_{i = 1}^{N}\tilde{e}_i^T(t)\tilde{e}_i(t) +\frac{1}{\tau_2}\sum_{i = 1}^{N}\bar{d}_i^T(t)\bar{d}_i(t)$ is considered, where $ \tau_1 $ and $ \tau_2 $ are positive constants. The first-order derivative of $ V_2(\tilde{e}(t),\bar{d}(t)) $ is given by

    ˙V2(˜e(t),ˉd(t))1τ1Ni=1˜eTi(t)(M+MT+ΘˉDˉDTΘT+ΘΘT+ρ2AT0A0)˜ei(t)+Ni=1(1τ12minϵsτ2)ˉdTi(t)ˉdi(t) (29)

    where ${\rm min}\epsilon_s = \mathop{\rm min}\nolimits_{s = 1,\ldots,m}\epsilon_s$.

    Finally, consider the Lyapunov function $V({e}(t),\tilde{e}(t)) = $ $V_1 (e(t), \gamma(t))+V_2(\tilde{e}(t),\bar{d}(t))$. On the basis of the inequality constraints in (18) and (19), i.e., ${\rm He}((A-BK_x)P)+({\lambda}_1\bar{\phi}- {c}\underline{\phi})BB^T+\bar{\phi}(\lambda_1I_n+\rho^2P^2)+\tau_3 P < 0$ and $K^TK+\frac{1}{\tau_1}(M+ M^T+ \Theta\bar{D}\bar{D}^T\Theta^T+\Theta\Theta^T+\rho^2A_0^TA_0)+\tau_4I_{n+m} < 0$, and $ {\rm min}\epsilon_s\ge\underline{\epsilon}_{\rm inc} $ in Assumption 2, it is obtained as

    ˙V(e(t),˜e(t))<τ3ςT(t)(Φγ(t)P)ς(t)τ4˜eT(t)˜e(t)+Ni=1(1τ12τ2ϵ_inc)ˉdTi(t)ˉdi(t)=τ3V1(e(t),γ(t))τ1τ4V2(˜e(t),ˉd(t))+(τ1τ4τ2+1τ12τ2ϵ_inc)Ni=1ˉdTi(t)ˉdi(t). (30)

    According to $ \tau_4<\frac{2\underline{\epsilon}_{\rm inc}}{\tau_1} $ in (20) and $ \tau_2\le-\tau_1^2\tau_4+2\tau_1\underline{\epsilon}_{\rm inc} $ in (21), $ \frac{\tau_1\tau_4}{\tau_2}+\frac{1}{\tau_1}-\frac{2}{\tau_2}\underline{\epsilon}_{\rm inc}\le 0 $ is then derived. Hence, it is proved that $\dot{V}({e}(t),\;\tilde{e}(t)) \; < \; -\tau_3V_1({e}(t),\;\gamma(t))\;-\;\tau_1\tau_4V_2(\tilde{e}(t),\;\bar{d}(t))\; \le\; -\tau_m V ({e}(t),\; \tilde{e}(t))$ with $ \tau_m = {\rm min}\{\tau_3,\tau_1\tau_4\} $.

    Integrating both sides of (30) over $ t\in\left[t_{{k}},t_{{k}+1}\right) $ yields

    V(e(t),˜e(t))eτm(ttk)V(e(tk),˜e(tk)). (31)

    It follows that $ \underline{\phi}V_1\le\sum_{i = 1}^{N}{e}_i^T(t)P^{-1}{e}_i(t)\le \bar{\phi}V_1 $ in (26). At each switching instant $ t_{{k}} $, it is obtained that $V(e(t_{{k}}),\tilde{e}(t_{{k}}))\le \frac{\bar{\phi}}{\underline{\phi}}V({e}(t_{{k}}^-),\tilde{e} (t_{{k}}^-))$.

    In Definition 2, $ {k} = N_{{\Gamma}_m}(t_0,t)\le \bar{N}_{{\Gamma}_m}+\frac{t-t_0}{T_{{\Gamma}_m}} $ is calculated with the ADT $ T_{{\Gamma}_m} $ and chattering bound $ \bar{N}_{{\Gamma}_m} $. Then, the expression is given as

    V(e(t),˜e(t))ˉϕϕ_eτm(ttk)V(e(tk),˜e(tk))ˉϕϕ_eτm(ttk1)V(e(tk1),˜e(tk1))(ˉϕϕ_)keτm(tt0)V(e(t0),˜e(t0))eˉNΓmln(ˉϕϕ_)e(τmln(ˉϕϕ_)TΓm)(tt0)V(e(t0),˜e(t0)). (32)

    Next, with the definition of $ V({e}(t),\tilde{e}(t)) $, it is derived as

    V(e(t),˜e(t))}λmin(ϕ1γ(t),iP1)ei(t)2 (33)

    and the expression with the initial time $ t_0 $ is derived as

    V(e(t0),˜e(t0))(λmax(ϕ1γ(t),iP1)+maxi=1,,N(1τ1˜ei(t0)2+1τ2ˉdi(t0)2)mini=1,,Nei(t0)2)ei(t0)2. (34)

    Denoting $ \Lambda_{{\Gamma}_m} = \lambda_{\rm max}(\phi_{\gamma(t),i}^{-1}P^{-1})+\sigma_{{\Gamma}_m} $ with the appropriate positive scalar $ \sigma_{{\Gamma}_m} $, it is finally given by

    ei(t)2μΓmeλΓm(tt0)ei(t0)2 (35)

    with

    μΓm=eˉNΓmln(ˉϕϕ_)ΛΓmλmin(ϕ1γ(t),iP1),λΓm=τmln(ˉϕϕ_)TΓm. (36)

    Hence, both $ \dot{V}({e}(t),\tilde{e}(t))<-\tau_m V({e}(t),\tilde{e}(t))<0 $ and the inequality in (35) imply that ${e}_i(t)\rightarrow 0,\tilde{e}_i(t)\rightarrow 0, x_i(t)\rightarrow x_0(t), \hat{x}_i(t)\rightarrow {x}_i(t)$ and $ \hat{f}_i(t)\rightarrow {f}_i(t) $ as $ t\rightarrow +\infty $ when ADT $ T_{{\Gamma}_m} $ is constrained within (22). The FE and state tracking error dynamics of MASs with time-varying faults are asymptotically stable. Moreover, the exponential consensus tracking control issue under connectivity-maintained attacks $ (\gamma(t)\in\Gamma_m) $ is solved through the proposed FCTC scheme.

    Remark 4: In the presence of complicated actuator faults and connectivity-maintained attacks, it is difficult for the existing fault-tolerant methods [22], [25], [26] to guarantee the consensus tracking property of MASs, especially with the coupling characteristics between the estimation and tolerance systems. Thus, a decentralized UIO in (9) is developed to estimate the relative states/actuator faults, and the estimated information is then applied to the novel distributed FCTC protocol in (14) to compensate for Lipschitz nonlinearity, actuator faults, and connectivity-maintained attacks and subsequently achieve the overall consensus tracking. Unlike the decentralized adaptive fault-tolerant tracking control via local estimations [28], these FCTC methods, which depend on the offset item $ -K\hat{\bar{x}}_i(t) $ and rely on switching rules $ \gamma(t)\in\Gamma_m $ in this study, can be utilized in a distributed structure. This distributed structure has advantages in computation, robustness and communication cost, and only requires the adjacent information $ \Xi_i(y_j(t),\gamma(t)),j = 0,1,\ldots,N $.

    The objective of Case II with designing the fully distributed FCTC protocol in (14) and (15) is to determine $ K_x $ and R such that the leader-following consensus tracking is realized. The following sufficient condition is developed for MASs under connectivity-mixed attacks, i.e., $ \gamma(t)\in\Gamma = \Gamma_m\cup\Gamma_p $.

    Theorem 2: Consider leader-following MASs with incipient and abrupt actuator faults in (2) under connectivity-mixed attacks. Given positive scalars $ \tau_1,\tilde{\tau}_3 $, and $ \sigma_{{\Gamma}} $, the MASs in (1) and (3) with the distributed FCTC approach in (14), (15) can solve the exponential consensus tracking problem, if there exists a symmetric positive-definite matrix $ P\in \mathbb{R}^{n\times n} $, matrix $ K_x\in \mathbb{R}^{m\times n},H\in \mathbb{R}^{(n+m)\times p},J_1\in \mathbb{R}^{(n+m)\times p} $, and positive scalars $ \tilde{c},\tau_2,\tilde{\tau}_4 $ such that

    He((ABKx)P)+(1+˜c)BBT+In+ρ2P2˜τ3P<0 (37)
    1τ1(M+MT+ΘˉDˉDTΘT+ΘΘT+ρ2AT0A0)+KTK˜τ4In+m<0 (38)
    τ2τ21˜τ4+2τ1ϵ_inc (39)

    and the positive scalar $ \delta $ in (14) satisfies

    c|λ2|δ˜c|λ3| (40)

    and for a positive decay rate $ \lambda_{{\Gamma}}\in(0,\lambda_{{\Gamma}}^{*}) $, the connectivity-paralyzed attack frequency $ \mathcal{F}_{\Gamma_p}(t_0,t) $ satisfies

    FΓp(t0,t)λΓλΓ2ln(ˉϕϕ_) (41)

    and for a scalar $ \lambda_{{\Gamma}}^{*}\in(0,\tau_m) $, the connectivity-maintained attack activation rate $ \mathcal{R}_{\Gamma_m}(t_0,t) $ and the connectivity-paralyzed attack activation rate $ \mathcal{R}_{\Gamma_p}(t_0,t) $ satisfy

    RΓm(t0,t)τp+λΓτm+τp,RΓp(t0,t)τmλΓτm+τp (42)

    where $ {\lambda}_3 = \lambda_{\rm max}(\mathcal{H}_{\gamma(t)}+\mathcal{H}_{\gamma(t)}^T) $ and $ \tau_p = {\rm max}\{\tilde{\tau}_3,\tau_1\tilde{\tau}_4\} $ with the switching signal $ \gamma(t)\in\Gamma_p $.

    Thus, the consensus tracking performance is exponentially achieved with the state tracking error expectation

    E{ei(t)2}μΓeλΓ(tt0)E{ei(t0)2} (43)

    with the initial maximum amplitude given by

    μΓ=max{λmax(ϕ1γ(t),iP1),λmax(P1)}+σΓmin{λmin(ϕ1γ(t),iP1),λmin(P1)}. (44)

    Proof: Construct the Lyapunov function candidate $ \tilde{V}_1({e}(t),\gamma(t)) $ with a positive scalar $ \phi_{\gamma(t),i},\gamma(t)\in\Gamma $,

    ˜V1(e(t),γ(t))={eT(t)(Φγ(t)P1)e(t),γ(t)ΓmeT(t)(INP1)e(t),γ(t)Γp. (45)

    Then, the Lyapunov function candidate $\tilde{V}(t) = \tilde{V}({e}(t), \; \tilde{e}(t)) = \tilde{V}_1(e(t),\gamma(t))+V_2(\tilde{e}(t),\bar{d}(t))$ is chosen. When the MASs suffer from $ q $ connectivity-maintained attacks, i.e., $ \gamma(t)\in\Gamma_m $. According to the same proof process in Theorem 1, it is obtained that $\dot{\tilde{V}}({e}(t),\tilde{e}(t)) < -\tau_3\tilde{V}_1({e}(t),\gamma(t))-\tau_1\tau_4V_2(\tilde{e}(t), \bar{d}(t)) \le -\tau_m \tilde{V}({e}(t),\tilde{e}(t))$ with the scalar $ \tau_m = {\rm min}\{\tau_3,\tau_1\tau_4\} $.

    When the MASs suffer from $ (r-q) $ connectivity-paralyzed attacks, i.e., $ \gamma(t)\in\Gamma_p $, the first-order derivative of the function $ \tilde{V}_1({e}(t),\gamma(t)) $ in (45) is given by

    ˙˜V1(e(t),γ(t))=ςT(t)(INHe((ABKx)P)δHe(Hγ(t))BBT)ς(t)+2ςT(t)(INBK)˜e(t)+2ςT(t)Δ˜ξ(t)ςT(t)(IN(He((ABKx)P)+(1+˜c)BBT+In+ρ2P2))ς(t)+˜eT(t)(INKTK)˜e(t) (46)

    where $ \delta\le \frac{\tilde{c}}{\vert{\lambda}_3\vert} $ with $ {\lambda}_3 = \lambda_{\rm max}(\mathcal{H}_{\gamma(t)}+\mathcal{H}_{\gamma(t)}^T),\gamma(t)\in\Gamma_p $.

    According to the constraints in (37)–(39), i.e., ${\rm He}((A - BK_x )P) +$$ (1+\tilde{c})BB^T+I_n+\rho^2P^2-\tilde{\tau}_3 P < 0,K^TK+\frac{1}{\tau_1}(M+M^T+\Theta\bar{D}\bar{D}^T\Theta^T+ $ $\Theta\Theta^T+ \rho^2A_0^TA_0) - \tilde{\tau}_4I_{n+m}<0$ and $ \tau_2\le\tau_1^2\tilde{\tau}_4+2\tau_1\underline{\epsilon}_{\rm inc} $, the first-order derivative of $ \tilde{V}(e(t),\tilde{e}(t)) $ is given as $\dot{\tilde{V}}(e(t),\tilde{e}(t)) < \tilde{\tau}_3\times \tilde{V}_1(e(t),\gamma(t))+{\tau}_1\tilde{\tau}_4V_2(\tilde{e}(t), \bar{d}(t)) +\bar{d}^T(t)(I_N\otimes(-\frac{\tau_1\tilde{\tau}_4}{\tau_2}+\frac{1}{\tau_1}-\frac{2}{\tau_2} \underline{\epsilon}_{\rm inc}))\bar{d}(t)$. Thus, it follows that $\dot{\tilde{V}}({e}(t),\tilde{e}(t)) < \tilde{\tau}_3\tilde{V}_1({e}(t),\gamma(t))+{\tau}_1\tilde{\tau}_4V_2(\tilde{e}(t), \bar{d}(t)) \le\tau_p \tilde{V}({e}(t),\tilde{e}(t))$ with $ \tau_p = {\rm max}\{\tilde{\tau}_3,\tau_1\tilde{\tau}_4\} $.

    Integrating both sides of $ \dot{\tilde{V}}({e}(t),\tilde{e}(t)) $ with $ \gamma(t)\in\Gamma = \Gamma_m\cup\Gamma_p $ over $ t\in\left[t_{{k}},t_{{k}+1}\right) $ yields

    ˜V(t){eτm(ttk)˜V(e(tk),˜e(tk)),γ(t)Γmeτp(ttk)˜V(e(tk),˜e(tk)),γ(t)Γp. (47)

    It follows that $ {k} = N_{{\Gamma}}(t_0,t)\le 2N_{\Gamma_p}(t_0,t) $ is obtained with the number of the connectivity-paralyzed attacks $ N_{\Gamma_p}(t_0,t) $ from Definition 2. Subsequently, $ \tilde{V}({e}(t),\tilde{e}(t)) $ is given by

    ˜V(e(t),˜e(t))(ˉϕϕ_)keτpTp(t0,t)τmTm(t0,t)˜V(e(t0),˜e(t0))e2NΓp(t0,t)ln(ˉϕϕ_)+τpTp(t0,t)τmTm(t0,t)˜V(e(t0),˜e(t0)). (48)

    On the basis of the inequality constraint in (41) of the connectivity-paralyzed attack frequency $ \mathcal{F}_{\Gamma_p} $ in Definition 3, $ 2N_{\Gamma_p}(t_0,t)\ln(\frac{\bar{\phi}}{\underline{\phi}})\le(\lambda_\Gamma^{*}-\lambda_\Gamma)(t-t_0) $ is derived. Furthermore, with the aid of Definitions 4 and 5 of the connectivity-maintained/paralyzed attack activation rates $ \mathcal{R}_{\Gamma_m}(t_0,t) $ and $ \mathcal{R}_{\Gamma_p}(t_0,t) $ in (42), $ \tau_pT_p(t_0,t)-\tau_mT_m(t_0,t)\le-\lambda_\Gamma^{*}(t-t_0) $ is then obtained with $ T_m(t_0,t)+T_p(t_0,t) = t-t_0 $.

    Thus, when the connectivity-mixed attacks are considered, i.e., $ \gamma(t)\in\Gamma = \Gamma_m\cup\Gamma_p $, it follows that:

    ˜V(e(t),˜e(t))eλΓ(tt0)˜V(e(t0),˜e(t0)) (49)

    and the state tracking error is given as

    ei(t)2˜V(e(t),˜e(t))min{λmin(ϕ1γ(t),iP1),λmin(P1)}μΓeλΓ(tt0)ei(t0)2 (50)

    with the chosen positive scalar $ \sigma_{{\Gamma}} $ and $ \mu_{{\Gamma}} $ expressed in (44).

    Hence, the state tracking error expectation in (50) indicates that the consensus tracking performance under connectivity-mixed attacks $ (\gamma(t)\in\Gamma) $ is exponentially realized through the proposed FCTC scheme.

    Remark 5: Compared with the distributed FCTC algorithm with ADT technique in Theorem 1, the success of connectivity-maintained and connectivity-paralyzed activation ratio of connectivity-mixed attacks is considered to ensure the tolerance and represent the connectivity and paralyzation of attacks passing through protection or repair devices subject to network fluctuations and limited resources. Unlike the fixed graph [7], [23], the preset switching graph is more general and more extensively applied in addressing network interruption [33]. The proposed distributed FCTC algorithm can be combined with the switching mechanism [20] to ensure that each agent can still realize the consensus tracking of MASs with connectivity-mixed attacks provided that attack frequency and activation rates in Theorem 2 satisfy certain conditions in (41) and (42). Furthermore, compared with existing studies on the FCTC design related to the state measurement error [17], the captured output information is added on the basis of the selected parameters in (40) to avoid high-precision measuring device.

    In this section, a network of five single-link manipulators with revolute joints is put forward to verify the effectiveness of the proposed distributed FCTC design under cyber-attacks.

    The model of the single-link manipulator with a flexible joint actuated by DC motor is given with the following state vector $ x_i = [x_{i1}^T\;x_{i2}^T\;x_{i3}^T\;x_{i4}^T]^T = [{\theta}_{mi}\;{\omega}_{mi}\;{\theta}_{li}\;{\omega}_{li}]^T $, where ${\theta}_{mi},{\omega}_{mi}, {\theta}_{li}$, and $ {\omega}_{li} $ denote the angular rotation of the motor, the angular velocity of the motor, the angular position of the link, and the angular velocity of the link, respectively [37].

    {˙θmi=ωmi˙ωmi=ksJm(θliθmi)llinkJmωmi+kτJmui˙θli=ωli˙ωli=ηksJl(θliθmi)ηmghJlsin(θli). (51)

    The physical meanings and values of the parameters in the single-link manipulator are illustrated in Table I. Furthermore, the state-dependent nonlinear perturbation $ \xi(x_i,t) $ is given as $ \xi(x_i,t) = [0\;0\;0\;\frac{-qmgh}{J_l}{\rm sin}({\theta}_{li})]^T $, and it follows that $ \xi(x_i,t) $ satisfies with the Lipschitz condition.

    Table  I.  The Physical Parameters of the Single-Link Manipulator [37]
    Parameter Physical meaning Value/Unit
    $ J_m $ Inertia of the motor $0.0037\;{\rm kg.m^2}$
    $ J_l $ Inertia of the link $0.0093\;{\rm kg.m^2}$
    $ k_s $ Torsional spring constant $0.18\;{\rm Nm/rad}$
    $ k_{\tau} $ Amplifier gain $0.08\;{\rm Nm/V}$
    $ \eta $ Transformation coefficient $ 0.1 $
    $l_{\rm{link} }$ Length of the link $0.31\;{\rm m}$
    $ h $ Center of gravity height $0.015\;{\rm m}$
    $ m $ Point mass of the arm $0.139\;{\rm kg}$
    $ g $ Gravity constant $9.8\;{\rm m/s^2}$
     | Show Table
    DownLoad: CSV

    To demonstrate the efficiency of the proposed algorithms in Theorems 1 and 2, the incipient and abrupt time-varying actuator faults $ f_i(t),i = 1,\ldots,5 $ in the control input channel in each single-link manipulator system are given as

    f1(t)=f3(t)=f5(t)=0,f2(t)=1e0.05tf4(t)={1e0.05t,t201e0.5t,t>20. (52)

    Simulation parameters are set as $ \epsilon_1 = 0.05,T_1 = 0,\bar{f}_{21} = 1 $ for the second faulty manipulator and $\epsilon_1 = 0.05\;(t\le 20\;{\rm s}), \epsilon_1 = 0.5\;(t > 20\;{\rm s}),T_1 = 20,\bar{f}_{41} = 1$ for the fourth faulty one. The lower and upper bounds of the incipient actuator fault in each single-link manipulator are designed as $\underline{\epsilon}_{\rm inc} = 0.005, \bar{\epsilon}_{\rm inc} = 0.1$, and the Lipschitz constant is given as $\, \rho = 0.2197 $. The preset scalars are set as $\tau_1 = 0.0065,\;\tau_3 = 2.32,\;\sigma_{\Gamma_m} = 1.68$ for Theorem 1 and $\tau_1 = 0.037,\tilde{\tau}_3 = 5.6,\;\sigma_{\Gamma} = 3.75$ for Theorem 2.

    The switching topologies under connectivity-maintained attacks are shown in Fig. 2 and the switching topologies under connectivity-mixed attacks are shown in Fig. 3, in which the second single-link manipulator fails with the incipient actuator fault and the fourth manipulator suffers from the combined incipient and abrupt faults at each fault occurrence time, i.e., $T_1 = 0\;{\rm s}$ and $20\;{\rm s}$. The gain matrices are derived by solving the algorithms in Theorems 1 and 2, i.e., $K_x = $ $ [-2.2463\; -2.7938\;2.2453\;0]$ in Case I with connectivity-maintained attacks and $ K_x = [0.2882\;0.1547\;2.39\;-0.9016] $ in Case II with connectivity-mixed attacks. Furthermore, the switching signal shows the switching of multi-manipulators $ \mathcal{G}_1,\mathcal{G}_2,\mathcal{G}_3 $, and $ \mathcal{G}_4 $ at each cyber-attack occurring time instants, i.e., $t = 10\;{\rm s},30\;{\rm s}$, and $60\;{\rm s}$ in Fig. 4.

    Figure  2.  The switching topologies under connectivity-maintained attacks.
    Figure  3.  The switching topologies under connectivity-mixed attacks.
    Figure  4.  Topology switching signal.

    In the presence of the incipient and abrupt actuator faults, the results in Figs. 5-8 under connectivity-maintained attacks (Case I) and in Figs. 9-12 under connectivity-mixed attacks (Case II) validate the effectiveness of the proposed distributed FCTC algorithms in Theorems 1 and 2. The respective angular rotation tracking $ x_{i1}-x_{01} $ and the angular velocity tracking $ x_{i2}-x_{02},i = 1,\ldots,5 $ of each motor under connectivity-maintained attacks are depicted in Figs. 5 and 6. The respective angular position tracking $ x_{i3}-x_{03} $ and the angular velocity tracking $ x_{i4}-x_{04},i = 1,\ldots,5 $ of each link in the single-link manipulator system under connectivity-maintained attacks are shown in Figs. 7 and 8. The incipient actuator fault of the second manipulator has influenced the state tracking errors, while the abrupt fault of the fourth manipulator in $20\;{\rm s}$ has the greatest influence on the angular velocity tracking of the motor and the least influence on the angular position tracking of the link. Due to the connectivity-maintained attacks in $10\;{\rm s},\;30\;{\rm s}$, and $ 60\;{\rm s} $ of Case I, severe oscillation convergence with different amplitudes is formed with the topological interconnection, and finally the consensus of state tracking errors is achieved with the distributed FCTC algorithm. Furthermore, the respective angular rotation tracking $ x_{i1}-x_{01} $, the angular velocity tracking $ x_{i2}-x_{02} $ of each motor, the angular position tracking $ x_{i3}-x_{03} $ and the angular velocity tracking $ x_{i4}-x_{04},i = 1,\ldots,5 $ of each link under connectivity-mixed attacks are illustrated in Figs. 9-12. All these figures show that the angular position and velocity tracking can converge asymptotically in spite of incipient and abrupt faults in the second and fourth manipulators. It is worth noting that despite the connectivity-mixed attacks in Case II, the dynamic convergence duration time of the single-link manipulator system is prolonged in $ 10\;{\rm s},30\;{\rm s} $, and $ 60\;{\rm s} $ under the action of topological recovery mechanism. Multiple switchings in $ 10\;{\rm s} $$ 30\;{\rm s} $ and $ 30\;{\rm s} $$ 60\;{\rm s} $ also cause angular and angular velocity tracking error fluctuations of each motor and link, which can gradually converge by the proposed distributed FCTC algorithm.

    Figure  5.  The angular rotation tracking of each motor: $x_{i1}-x_{01},i = 1,\ldots,5$ under connectivity-maintained attacks.
    Figure  6.  The angular velocity tracking of each motor: $x_{i2}-x_{02},i = 1,\ldots,5$ under connectivity-maintained attacks.
    Figure  7.  The angular position tracking of each link: $x_{i3}-x_{03},i = 1,\ldots,5$ under connectivity-maintained attacks.
    Figure  8.  The angular velocity tracking of each link: $x_{i4}-x_{04},i = 1,\ldots,5$ under connectivity-maintained attacks.
    Figure  9.  The angular rotation tracking of each motor: $x_{i1}-x_{01},i = 1,\ldots,5$ under connectivity-mixed attacks.
    Figure  10.  The angular velocity tracking of each motor: $x_{i2}-x_{02},i=1,\ldots,5$ under connectivity-mixed attacks.
    Figure  11.  The angular position tracking of each link: $x_{i3}-x_{03},i=1,\ldots,5$ under connectivity-mixed attacks.
    Figure  12.  The angular velocity tracking of each link: $x_{i4}-x_{04},i = 1,\ldots,5$ under connectivity-mixed attacks.

    Fig. 13 shows the rated and estimated incipient faults of the second manipulator and the combined incipient and abrupt faults of the fourth manipulator. Compared with our previous hierarchical FE and fault-tolerant control scheme [26], the proposed FE scheme in the distributed FCTC algorithm has smaller estimation error and better robustness at each cyber-attack occurring time instants. Fig. 14 depicts the rated and estimated values under the considered connectivity-maintained attacks without fault, the connectivity-mixed attacks with incipient fault and abrupt fault, respectively. In this case, our previous FE/fault-tolerant algorithm [26] cannot achieve an excellent estimation effect, and the phenomenon of continuous non-dissipation oscillation or deviation occurs under the considered connectivity-mixed attacks.

    Figure  13.  The rated fault, the estimated fault [26], and the estimated fault (FCTC algorithm) under cyber-attacks.
    Figure  14.  The comparisons of the considered connectivity-maintained attacks without fault, connectivity-mixed attacks with incipient fault and abrupt fault.

    A novel UIO-based FE and FCTC method was proposed in this study to ensure that nonlinear leader-following MASs can realize the exponential consensus tracking objective regardless of incipient/abrupt actuator faults and cyber-attacks. Distributed FCTC protocols based on fault and state estimations from the decentralized FE hierarchy and the relative adjacent output information of each individual agent were proposed in connectivity-maintained and connectivity-mixed attack cases. Two sufficient criteria utilizing the ADT, attack frequency, and attack activation rate method were proposed to ensure the prescribed consensus tracking performance. Multistep calculations were demonstrated to derive parameters in decentralized FE and distributed FCTC algorithms for both cases. Simulations proved the effectiveness of the proposed FCTC scheme. Future studies could fruitfully explore the consensus tracking issue of heterogeneous nonlinear MASs subject to complicated time-varying actuator and sensor faults in physical hierarchy and hostile DoS attacks in networked hierarchy further by the improved distributed event-triggered FCTC scheme with a substantial reduction in computational resources when message transmission fails intermittently.

  • [1]
    H. B. Du, Z. Q. Chen, and G. H. Wen, “Leader-following attitude consensus for spacecraft formation with rigid and flexible spacecraft,” J. Guid. Control Dyn., vol. 39, no. 4, pp. 941–948, 2016.
    [2]
    Q. S. Wang, D. Huang, Z. S. Duan, and J. Y. Wang, “Consensus tracking control with transient performance improvement for a group of unmanned aerial vehicles subject to faults and parameter uncertainty,” Int. J. Control, vol. 92, no. 4, pp. 796–815, 2019. doi: 10.1080/00207179.2017.1370555
    [3]
    W. Wang, J. S. Huang, C. Y. Wen, and H. J. Fan, “Distributed adaptive control for consensus tracking with application to formation control of nonholonomic mobile robots,” Automatica, vol. 50, no. 4, pp. 1254–1263, 2014. doi: 10.1016/j.automatica.2014.02.028
    [4]
    J. H. Qin, Q. C. Ma, Y. Shi, and L. Wang, “Recent advances in consensus of multi-agent systems: A brief survey,” IEEE Trans. Ind. Electron., vol. 64, no. 6, pp. 4972–4983, 2017. doi: 10.1109/TIE.2016.2636810
    [5]
    M. E. Valcher and I. Zorzan, “On the consensus of homogeneous multi-agent systems with arbitrarily switching topology,” Automatica, vol. 84, pp. 79–85, 2017. doi: 10.1016/j.automatica.2017.07.011
    [6]
    Z. Y. Zuo, B. L. Tian, M. Defoort, and Z. T. Ding, “Fixed-time consensus tracking for multiagent systems with high-order integrator dynamics,” IEEE Trans. Autom. Control, vol. 63, no. 2, pp. 563–570, 2018. doi: 10.1109/TAC.2017.2729502
    [7]
    B. Cheng, X. K. Wang, and Z. K. Li, “Event-triggered consensus of homogeneous and heterogeneous multiagent systems with jointly connected switching topologies,” IEEE Trans. Cybern., vol. 49, no. 12, pp. 4421–4430, 2019. doi: 10.1109/TCYB.2018.2864974
    [8]
    M. L. Lv, W. W. Yu, J. D. Cao, and S. Baldi, “A separation-based methodology to consensus tracking of switched high-order nonlinear multiagent systems,” IEEE Trans. Neural Netw. Learn. Syst., 2021. DOI: 10.1109/TNNLS.2021.3070824
    [9]
    W. L. He, Z. K. Mo, Q. L. Han, and F. Qian, “Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 5, pp. 1326–1334, 2020.
    [10]
    P. Cheng, Z. Y. Yang, J. M. Chen, et al., “An event-based stealthy attack on remote state estimation,” IEEE Trans. Autom. Control, vol. 65, no. 10, pp. 4348–4355, 2020. doi: 10.1109/TAC.2019.2956021
    [11]
    M. L. Lv, W. W. Yu, J. D. Cao, and S. Baldi, “Consensus in high-power multiagent systems with mixed unknown control directions via hybrid nussbaum-based control,” IEEE Trans. Cybern., 2020. DOI: 10.1109/TCYB.2020.3028171
    [12]
    S. Wu, K. M. Ding, P. Cheng, and L. Shi, “Optimal scheduling of multiple sensors over lossy and bandwidth limited channels,” IEEE Trans. Control Netw. Syst., vol. 7, no. 3, pp. 1188–1200, 2020. doi: 10.1109/TCNS.2020.2966671
    [13]
    D. Ye and X. Yang, “Distributed event-triggered consensus for nonlinear multi-agent systems subject to cyber attacks,” Inf. Sci., vol. 473, pp. 178–189, 2019. doi: 10.1016/j.ins.2018.09.030
    [14]
    D. R. Ding, Z. D. Wang, D. W. C. Ho, and G. L. Wei, “Observer-based event-triggering consensus control for multiagent systems with lossy sensors and cyber-attacks,” IEEE Trans. Cybern., vol. 47, no. 8, pp. 1936–1947, 2017. doi: 10.1109/TCYB.2016.2582802
    [15]
    K. F. E. Tsang, M. Y. Huang, K. H. Johansson, and L. Shi, “Sparse linear injection attack on multi-agent consensus control systems,” IEEE Control Syst. Lett., vol. 5, no. 2, pp. 665–670, 2021. doi: 10.1109/LCSYS.2020.3004920
    [16]
    D. Zhang, G. Feng, Y. Shi, and D. Srinivasan, “Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances,” IEEE/CAA J. Autom. Sinica, vol. 8, no. 2, pp. 319–333, 2021. doi: 10.1109/JAS.2021.1003820
    [17]
    Y. Xu, M. Fang, Z. G. Wu, et al., “Input-based event-triggering consensus of multiagent systems under denial-of-service attacks,” IEEE Trans. Syst. Man Cybern. -Syst., vol. 50, no. 4, pp. 1455–1464, 2020. doi: 10.1109/TSMC.2018.2875250
    [18]
    W. M. Fu, J. H. Qin, Y. Shi, et al., “Resilient consensus of discrete-time complex cyber-physical networks under deception attacks,” IEEE Trans. Ind. Inform., vol. 16, no. 7, pp. 4868–4877, 2020. doi: 10.1109/TII.2019.2933596
    [19]
    Y. Yang, H. W. Xu, and D. Yue, “Observer-based distributed secure consensus control of a class of linear multi-agent systems subject to random attacks,” IEEE Trans. Circuits Syst. I-Regul. Pap., vol. 66, no. 8, pp. 3089–3099, 2019. doi: 10.1109/TCSI.2019.2904747
    [20]
    Z. Feng, G. Q. Hu, and G. H. Wen, “Distributed consensus tracking for multi-agent systems under two types of attacks,” Int. J. Robust Nonlinear Control, vol. 26, no. 5, pp. 896–918, 2016. doi: 10.1002/rnc.3342
    [21]
    H. Yang, Q. L. Han, X. H. Ge, et al., “Fault-tolerant cooperative control of multiagent systems: A survey of trends and methodologies,” IEEE Trans. Ind. Inform., vol. 16, no. 1, pp. 4–17, 2020. doi: 10.1109/TII.2019.2945004
    [22]
    D. Ye, X. G. Zhao, and B. Cao, “Distributed adaptive fault-tolerant consensus tracking of multi-agent systems against time-varying actuator faults,” IET Contr. Theory Appl., vol. 10, no. 5, pp. 554–563, 2016. doi: 10.1049/iet-cta.2015.0790
    [23]
    Z. Q. Zuo, J. Zhang, and Y. J. Wang, “Adaptive fault-tolerant tracking control for linear and Lipchitz nonlinear multi-agent systems,” IEEE Trans. Ind. Electron., vol. 62, no. 6, pp. 3923–3931, 2015.
    [24]
    C. Deng, W. N. Gao, and W. W. Che, “Distributed adaptive fault-tolerant output regulation of heterogeneous multi-agent systems with coupling uncertainties and actuator faults,” IEEE/CAA J. Autom. Sinica, vol. 7, no. 4, pp. 1098–1106, 2020. doi: 10.1109/JAS.2020.1003258
    [25]
    X. Z. Jin, S. F. Wang, J. H. Qin, et al., “Adaptive fault-tolerant consensus for a class of uncertain nonlinear second-order multi-agent systems with circuit implementation,” IEEE Trans. Circuits Syst. I-Regul. Pap., vol. 65, no. 7, pp. 2243–2255, 2018. doi: 10.1109/TCSI.2017.2782729
    [26]
    C. Liu, B. Jiang, K. Zhang, and R. J. Patton, “Hierarchical structure-based fault estimation and fault-tolerant control for multiagent systems,” IEEE Trans. Control Netw. Syst., vol. 6, no. 2, pp. 586–597, 2019. doi: 10.1109/TCNS.2018.2860460
    [27]
    D. Ye, M. M. Chen, and H. J. Yang, “Distributed adaptive event-triggered fault-tolerant consensus of multiagent systems with general linear dynamics,” IEEE Trans. Cybern., vol. 49, no. 3, pp. 757–767, 2019. doi: 10.1109/TCYB.2017.2782731
    [28]
    X. Wang and G. H. Yang, “Fault-tolerant consensus tracking control for linear multiagent systems under switching directed network,” IEEE Trans. Cybern., vol. 50, no. 5, pp. 1921–1930, 2020. doi: 10.1109/TCYB.2019.2901542
    [29]
    Y. M. Wu, Z. S. Wang, S. B. Ding, and H. G. Zhang, “Leader-follower consensus of multi-agent systems in directed networks with actuator faults,” Neurocomputing, vol. 275, pp. 1177–1185, 2018. doi: 10.1016/j.neucom.2017.09.066
    [30]
    X. X. Hua, D. R. Huang, and S. H. Guo, “Extended state observer based on ADRC of linear system with incipient fault,” Int. J. Control Autom. Syst., vol. 18, pp. 1425–1424, 2020. doi: 10.1007/s12555-019-0052-2
    [31]
    Y. M. Wu and X. X. He, “Secure consensus control for multi-agent systems with attacks and communication delays,” IEEE/CAA J. Autom. Sinica, vol. 4, no. 1, pp. 136–142, 2017. doi: 10.1109/JAS.2016.7510010
    [32]
    C. Deng and C. Y. Wen, “Distributed resilient observer-based fault-tolerant control for heterogeneous multi-agent systems under actuator faults and DoS attacks,” IEEE Trans. Control Netw. Syst., vol. 7, no. 3, pp. 1308–1318, 2020. doi: 10.1109/TCNS.2020.2972601
    [33]
    L. Zhao and G. H. Yang, “Adaptive fault-tolerant control for nonlinear multi-agent systems with DoS attacks,” Inf. Sci., vol. 526, pp. 39–53, 2020. doi: 10.1016/j.ins.2020.03.083
    [34]
    L. Zhao and G. H. Yang, “Cooperative adaptive fault-tolerant control for multi-agent systems with deception attacks,” J. Frankl. Inst., vol. 357, no. 6, pp. 3419–3433, 2020. doi: 10.1016/j.jfranklin.2019.12.032
    [35]
    P. Yu, L. Ding, Z. W. Liu, and Z. H. Guan, “A distributed event-triggered transmission strategy for exponential consensus of general linear multi-agent systems with directed topology,” J. Frankl. Inst., vol. 352, no. 12, pp. 5866–5881, 2015. doi: 10.1016/j.jfranklin.2015.10.014
    [36]
    Q. Song, F. Liu, J. D. Cao, and W. W. Yu, “Pinning-controllability analysis of complex networks: An M-matrix approach,” IEEE Trans. Circuits Syst. I-Regul. Pap., vol. 59, no. 11, pp. 2692–2701, 2012. doi: 10.1109/TCSI.2012.2190573
    [37]
    C. Peng, J. Zhang, and Q. L. Han, “Consensus of multiagent systems with nonlinear dynamics using an integrated sampled-data-based event-triggered communication scheme,” IEEE Trans. Syst. Man Cybern. -Syst., vol. 49, no. 3, pp. 589–599, 2019. doi: 10.1109/TSMC.2018.2814572
  • Related Articles

    [1]Shouyan Chen, Weitian He, Zhijia Zhao, Yun Feng, Zhijie Liu, Keum-Shik Hong. Adaptive Control of a Flexible Manipulator With Unknown Hysteresis and Intermittent Actuator Faults[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(1): 148-158. doi: 10.1109/JAS.2024.124653
    [2]Pei-Ming Liu, Xiang-Gui Guo, Jian-Liang Wang, Daniel Coutinho, Lihua Xie. Chattering-Free Fault-Tolerant Cluster Control and Fault Direction Identification for HIL UAV Swarm With Pre-Specified Performance[J]. IEEE/CAA Journal of Automatica Sinica, 2025, 12(1): 183-197. doi: 10.1109/JAS.2024.124827
    [3]Chao Zhou, Zehui Mao, Bin Jiang, Xing-Gang Yan. Adaptive Fault-Tolerant Consensus Tracking Control for Nonlinear Multi-Agent Systems With Double Semi-Markovian Switching Topologies and Unknown Control Directions[J]. IEEE/CAA Journal of Automatica Sinica. doi: 10.1109/JAS.2025.125285
    [4]Zongyu Zuo, Jingchuan Tang, Ruiqi Ke, Qing-Long Han. Hyperbolic Tangent Function-Based Protocols for Global/Semi-Global Finite-Time Consensus of Multi-Agent Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(6): 1381-1397. doi: 10.1109/JAS.2024.124485
    [5]Xiangqian Yao, Hao Sun, Zhijia Zhao, Yu Liu. Event-Triggered Bipartite Consensus Tracking and Vibration Control of Flexible Timoshenko Manipulators Under Time-Varying Actuator Faults[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(5): 1190-1201. doi: 10.1109/JAS.2024.124266
    [6]Honghai Wang, Qing-Long Han. Designing Proportional-Integral Consensus Protocols for Second-Order Multi-Agent Systems Using Delayed and Memorized State Information[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(4): 878-892. doi: 10.1109/JAS.2024.124308
    [7]Meilin Li, Yue Long, Tieshan Li, Hongjing Liang, C. L. Philip Chen. Dynamic Event-Triggered Consensus Control for Input Constrained Multi-Agent Systems With a Designable Minimum Inter-Event Time[J]. IEEE/CAA Journal of Automatica Sinica, 2024, 11(3): 649-660. doi: 10.1109/JAS.2023.123582
    [8]Jingshu Sang, Dazhong Ma, Yu Zhou. Group-Consensus of Hierarchical Containment Control for Linear Multi-Agent Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2023, 10(6): 1462-1474. doi: 10.1109/JAS.2023.123528
    [9]Meng Zhou, Zhengcai Cao, Ye Wang. Robust Fault Detection and Isolation Based on Finite-frequency H/H Unknown Input Observers and Zonotopic Threshold Analysis[J]. IEEE/CAA Journal of Automatica Sinica, 2019, 6(3): 750-759. doi: 10.1109/JAS.2019.1911492
    [10]Zhaoxia Wang, Minrui Fei, Dajun Du, Min Zheng. Decentralized Event-Triggered Average Consensus for Multi-Agent Systems in CPSs with Communication Constraints[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(3): 248-257.
    [11]Zhenhua Wang, Juanjuan Xu, Huanshui Zhang. Consensus Seeking for Discrete-time Multi-agent Systems with Communication Delay[J]. IEEE/CAA Journal of Automatica Sinica, 2015, 2(2): 151-157.
    [12]Chuanrui Wang, Xinghu Wang, Haibo Ji. A Continuous Leader-following Consensus Control Strategy for a Class of Uncertain Multi-agent Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(2): 187-192.
    [13]Hongjing Liang, Huaguang Zhang, Zhanshan Wang, Junyi Wang. Consensus Robust Output Regulation of Discrete-time Linear Multi-agent Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(2): 204-209.
    [14]Hao Zhang, Gang Feng, Huaicheng Yan, Qijun Chen. Distributed Self-triggered Control for Consensus of Multi-agent Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(1): 40-45.
    [15]Wenhui Liu, Feiqi Deng, Jiarong Liang, Haijun Liu. Distributed Average Consensus in Multi-agent Networks with Limited Bandwidth and Time-delays[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(2): 193-203.
    [16]Nan Xiao, Xuehe Wang, Lihua Xie, Tichakorn Wongpiromsarn, Emilio Frazzoli, Daniela Rus. Road Pricing Design Based on Game Theory and Multi-agent Consensus[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(1): 31-39.
    [17]Jianming Wei, Yunan Hu, Meimei Sun. Adaptive Iterative Learning Control for a Class of Nonlinear Time-varying Systems with Unknown Delays and Input Dead-zone[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(3): 302-314.
    [18]Chenghui Zhang, Le Chang, Xianfu Zhang. Leader-follower Consensus of Upper-triangular Nonlinear Multi-agent Systems[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(2): 210-217.
    [19]Airong Wei, Xiaoming Hu, Yuzhen Wang. Tracking Control of Leader-follower Multi-agent Systems Subject to Actuator Saturation[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(1): 84-91.
    [20]Wen Qin, Zhongxin Liu, Zengqiang Chen. Formation Control for Nonlinear Multi-agent Systems with Linear Extended State Observer[J]. IEEE/CAA Journal of Automatica Sinica, 2014, 1(2): 171-179.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(14)  / Tables(1)

    Article Metrics

    Article views (1360) PDF downloads(181) Cited by()

    Highlights

    • This study attempts to combine network anti-attack and fault-tolerant control technologies effectively
    • It is a brand-new attempt to address the different types of constraints of self-dynamics in physical hierarchy and maintained/paralyzed links in networked hierarchy
    • A novel control structure is proposed with the effective combination of local fault/state estimation in decentralized FE and adjacent output information in distributed FCTC

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return