Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks
Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of mean-square bounded synchronization in multi-...
Saved in:
Published in | IEEE/CAA journal of automatica sinica Vol. 7; no. 5; pp. 1326 - 1334 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Piscataway
Chinese Association of Automation (CAA)
01.09.2020
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) Key Laboratory of Advanced Control and Optimization for Chemical Processes, Ministry of Education, East China University of Science and Technology, Shanghai 200237, China%School of Software and Electrical Engineering, Swinburne University of Technology, Melbourne VIC 3122, Australia |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Cyber attacks pose severe threats on synchronization of multi-agent systems. Deception attack, as a typical type of cyber attack, can bypass the surveillance of the attack detection mechanism silently, resulting in a heavy loss. Therefore, the problem of mean-square bounded synchronization in multi-agent systems subject to deception attacks is investigated in this paper. The control signals can be replaced with false data from controller-to-actuator channels or the controller. The success of the attack is measured through a stochastic variable. A distributed impulsive controller using a pinning strategy is redesigned, which ensures that mean-square bounded synchronization is achieved in the presence of deception attacks. Some sufficient conditions are derived, in which upper bounds of the synchronization error are given. Finally, two numerical simulations with symmetric and asymmetric network topologies are given to illustrate the theoretical results. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 2329-9266 2329-9274 |
DOI: | 10.1109/JAS.2020.1003297 |