Event-Triggered Data-Driven Iterative Learning Control for Multiagent Systems With FDI Attacks

This work investigates the consensus learning control for heterogeneous nonlinear multiagent systems (MASs) under false data injection (FDI) attacks on the communication channels. An enhanced iterative dynamic linearization (EiDL) method is introduced to transform the nonlinear MAS into an equivalen...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE internet of things journal Jg. 12; H. 12; S. 22036 - 22047
Hauptverfasser: Lin, Na, Peng, Huiming, Chi, Ronghu
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Piscataway IEEE 15.06.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Schlagworte:
ISSN:2327-4662, 2327-4662
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This work investigates the consensus learning control for heterogeneous nonlinear multiagent systems (MASs) under false data injection (FDI) attacks on the communication channels. An enhanced iterative dynamic linearization (EiDL) method is introduced to transform the nonlinear MAS into an equivalent linearization data model, where additional parameters are used to reflect the uncertainties of the MAS. Assume that the communication among agents is subject to a stochastic FDI attack which is modeled by a weighted sum of attacks for adjacent communication channels. Then, combining the event-triggering condition along the iterative direction, an event-triggered data-driven iterative learning control (ET-DDILC) is proposed where the attacked information is used in control law and parameter estimation law to counteract the impact of FDI attacks. The convergence is proven by introducing additional tools of mathematical expectations and matrix theory. Moreover, the proposed ET-DDILC is further extended to the MASs under iteration-switching topologies. Extensive simulation results verify that the proposed ET-DDILC can achieve a good control performance against injection attacks without using any model information while simultaneously saving system resources through the event-triggering mechanism.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:2327-4662
2327-4662
DOI:10.1109/JIOT.2025.3549604