Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks

Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of mean-square bounded synchronization in multi-...

Full description

Saved in:
Bibliographic Details
Published inIEEE/CAA journal of automatica sinica Vol. 7; no. 5; pp. 1326 - 1334
Main Authors He, Wangli, Mo, Zekun, Han, Qing-Long, Qian, Feng
Format Journal Article
LanguageEnglish
Published Piscataway Chinese Association of Automation (CAA) 01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai 200237, China%School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne VIC 3122, Australia
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this paper. The control signals can be replaced with false data from controller-to-actuator channels or the controller. The success of the attack is measured through a stochastic variable. A distributed impulsive controller using a pinning strategy is redesigned, which ensures that mean-square bounded synchronization is achieved in the presence of deception attacks. Some sufficient conditions are derived, in which upper bounds of the synchronization error are given. Finally, two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2329-9266
2329-9274
DOI:10.1109/JAS.2020.1003297