亚洲免费av电影一区二区三区,日韩爱爱视频,51精品视频一区二区三区,91视频爱爱,日韩欧美在线播放视频,中文字幕少妇AV,亚洲电影中文字幕,久久久久亚洲av成人网址,久久综合视频网站,国产在线不卡免费播放

        ?

        Resilience Against Replay Attacks: A Distributed Model Predictive Control Scheme for Networked Multi-Agent Systems

        2021-04-16 03:56:12GiuseppeFranzSeniorMemberIEEEFrancescoTedescoMemberIEEEandDomenicoFamularo
        IEEE/CAA Journal of Automatica Sinica 2021年3期

        Giuseppe Franzè, Senior Member, IEEE, Francesco Tedesco, Member, IEEE, and Domenico Famularo

        Abstract—In this paper, a resilient distributed control scheme against replay attacks for multi-agent networked systems subject to input and state constraints is proposed. The methodological starting point relies on a smart use of predictive arguments with a twofold aim: 1) Promptly detect malicious agent behaviors affecting normal system operations; 2) Apply specific control actions, based on predictive ideas, for mitigating as much as possible undesirable domino effects resulting from adversary operations. Specifically, the multi-agent system is topologically described by a leader-follower digraph characterized by a unique leader and set-theoretic receding horizon control ideas are exploited to develop a distributed algorithm capable to instantaneously recognize the attacked agent. Finally, numerical simulations are carried out to show benefits and effectiveness of the proposed approach.

        I. INTRODUCTION

        SEVERAL infrastructure systems are of major and crucial importance to society, as they significantly affect our daily life: power grids, telecommunication systems, water supply,and so on. In the last decade, ongoing integration of information technologies into such facilities [1], [2], has gained an increasing relevance within the control community.

        On one hand, these advances have boosted the emergence of networked control systems (NCSs) where information networks are tightly coupled to physical processes and human intervention, see [3] and references therein. Going into more detail, these systems are operated by means of computers and applications using communication networks to transmit information through wide and local area networks:measurements are transmitted to the control centers; control data are forwarded to the system’s actuators; information is exchanged between control centers [4].

        On the other hand, NCSs lead to several challenges when cyber and physical components are combined into a uniform infrastructure: amongst them security is by no means the most important issue [5]. Open and public communication channels, susceptible to even minor disturbance in the environment, may indeed ease physical system impairments or damages by malicious agents at worst. Adequate protection actions and/or countermeasures are then required by designing ad-hoc schemes capable to provide security mechanisms both for cyber and physical layers, see [6], [7]. Moreover, modern systems have an increasingly complex structure due to large number of interacting agents aligned to accomplish specific tasks in a distributed fashion. Multi-agent architecture features make the security issue more challenging because the subsystem vulnerability can lead to fragility of neighbor subsystems, see [8], [9], and references therein.

        On this issue, NCS research efforts are directed to analyze two main topics: attack detection and attack-resilient control.As the attack detection is concerned, false data injection attacks against state estimation have been studied in [1], [10],[11]. On the other hand, contributions pertaining to multiagent systems can be found in [12] and [13], where conditions under which misbehaving agents can be detected have been developed. Replay attacks, which iterating in malicious fashion transmitted data, have been analyzed in [14]. By referring to the attack-resilient control, the main aim was to derive admissible/efficient strategies for mitigating the undesired effects on the control loop signals. In spite of its relevance, few contributions have addressed such an issue. In particular, denial-of-service (DoS) attacks, which are capable to destroy the data availability in control systems, have been tackled in [15]-[17]. In [18], a distributed receding-horizon control law has been proposed to ensure that vehicles reach the desired formation despite DoS and replay attack occurrences. Moreover, a recent contribution [19] has a twofold interest: 1) It is proved that a stealthy attack on a single agent does not reflect along the network as a difference with the other agent states; 2) A distributed H∞control protocol is designed to soften the attack effect by solving nonhomogeneous game algebraic Riccati equations.

        Moving from this analysis, we propose here a distributed control strategy based on the receding horizon philosophy [20]that can be more adequate to deal with attack-resilient scenarios [21]. In fact a receding horizon control scheme has been proved to be extremely useful to manage simultaneous management of direct constraints fulfillment, disturbance/noise rejection and unpredictable attack occurrences [22],[23]. Going into details, the main aim is at developing a discrete-time receding horizon control (RHC) strategy for constrained regulation problems in networked multi-agent systems subject to replay attacks on the communication medium. This is one of the first attempts on this topic to develop an efficient resilient control strategy when severe cyber attacks affect the normal operation in constrained multiagent systems.

        In particular, the key attribute of the resulting scheme is to provide guaranteed countermeasures to unpredictable phenomena via a formal reconfiguration control law. By taking advantage of the set-theoretic approach first proposed in [24] and extended to the leader-follower (LF) framework in[25], the controller is capable to take care of (possibly)unknown information on the attack occurrence. To this end,the RHC unit is designed so that the multi-agent system behavior is encapsulated in a pre-computed state space region until safe communications are re-established.

        The main paper contribution can then be summarized as developing an efficient resilient control strategy when severe cyber attacks affect the normal operation in constrained multiagent systems. Noticing that the attack is unpredictable and the detection must be performed on the controller side make the problem extremely difficult to be tackled on. As a consequence, it is required that on the plant side a viable command is always available.

        The paper is organized as follows. In Section II, the problem to solve is formally stated. Section III summarizes literature results to be exploited in the subsequent developments. In Section IV, a set-theoretic customization to the multi-agent framework is provided, while in Section V the proposed resilient strategy is detailed. Finally, simulations and some remarks end the paper.

        Notations:

        Consider the following discrete-time linear time-invariant(LTI) system:

        where x(t)∈Rndenotes the state, u(t)∈U ?Rmthe constrained input and d(t)∈Rwthe process disturbance. It is assumed that d(t)∈D ?Rd, ?t ∈Z+:={0,1,...}, with D a compact set and 0d∈D.

        Definition 1: A set T ?Rnis robustly positively invariant(RPI) for (1) if once the state x(t) enters the set at any given time t0, all future states remain confined within regardless any disturbance realization affecting the plant, i.e., x(t0)∈T ??u(t)∈U s.t.x(t+1)∈T,?d(t)∈D, ?t ≥t0.

        Definition 2: Given the plant (1) it is possible to compute the sets of states i-step controllable to T0:=T via the following recursions (see [26]):

        Definition 3: Given the plant (1) and let S be a neighbourhood of the origin. The closed-loop trajectory xCL(·) is said to be uniformly ultimate bounded (UUB) in S if for all μ >0 there exist T(μ)>0 and u(t)∈U such that, for every‖x(0)‖≤μ, xCL(t)∈S for all t ≥T(μ).

        Definition 4: Given a set S ?Rn, I n[S]?S denotes its inner convex approximation.

        Definition 5: Given a set S ?X×Y ?Rn×Rm, the projection of S onto X is defined as ProjX(S):={x ∈X|?y ∈Y s.t.(x,y)∈S}.

        Definition 6: Given a finite set W, card(W) denotes its cardinality.

        Definition 7: Given sets A,B ?Rn, A ~B:={a: a+b ∈A,?b ∈B} denotes the Pontryagin-Minkowski set difference.

        II. PROBLEM FORMULATION

        A. Modeling

        Throughout the paper, the class of leader-follower configurations where at least one follower may be linked with more than a single path will be considered, see e.g., the dashed circles of Fig.1. With respect to standard platoon structures this configuration is computationally higher demanding because at each level the action pertaining to a single node could depend on more than an agent. On the other hand, the graph LF topology allows to address more complex scenarios with an increased flexibility level, for example research and rescue tasks in narrowed environments need to acquire information from different points of view [27].

        Fig.1. Directed acyclic LF graph topology.

        To formally take care of the graph LF topology of Fig.1,hereafter denoted as G, the following operator:

        level(i):{1,...,L}→Z+

        粗壮挺进人妻水蜜桃成熟漫画| 人妻少妇偷人精品一区二区三区| 久久一区二区三区久久久| av色欲无码人妻中文字幕| 又黄又爽又色又刺激的视频| 日本一区二区三区激情视频| 99视频偷拍视频一区二区三区 | 中文字幕一区二区三区四区五区 | 爆爽久久久一区二区又大又黄又嫩 | 国产亚洲精品久久久久久国模美| 国产一女三男3p免费视频| 国产精品网站夜色| 五十路在线中文字幕在线中文字幕 | 免费一区二区三区av| 女同同性av观看免费| 人妻丰满熟妇av无码区hd| 无码久久流水呻吟| 日韩亚洲国产中文字幕| 久久久亚洲欧洲日产国码二区| 无码少妇a片一区二区三区| 日韩久久久黄色一级av| 久久精品国产一区老色匹| 精品国产乱码久久久久久郑州公司| 亚洲美国产亚洲av| 国产成人精品视频网站| 中文字幕乱码日本亚洲一区二区| 免费va国产高清大片在线| 午夜精品久久久| 亚洲中文字幕在线精品2021| 国产激情久久久久久熟女老人| 无码国产精品一区二区高潮| 久久精品熟女不卡av高清| 今井夏帆在线中文字幕| 精品久久久无码人妻中文字幕豆芽| 国内少妇人妻丰满av| 国产av区亚洲av毛片| 国产高清成人在线观看视频 | 女同亚洲女同精品| 亚洲美女av二区在线观看| 浓毛老太交欧美老妇热爱乱| 一本大道无码av天堂|