On distributed constrained formation control in operator–vehicle adversarial networks

We consider an operator–vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to the desired formation subject to the given state and input constraints. Each operator–vehicle pair is attacked by an adversary who is able to m...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:Automatica (Oxford) Jg. 49; H. 12; S. 3571 - 3582
Hauptverfasser: Zhu, Minghui, Martínez, Sonia
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Kidlington Elsevier Ltd 01.12.2013
Elsevier
Schlagworte:
ISSN:0005-1098, 1873-2836
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Abstract We consider an operator–vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to the desired formation subject to the given state and input constraints. Each operator–vehicle pair is attacked by an adversary who is able to maliciously replay the control commands sent from the operator. To play against attackers, we come up with a novel distributed resilient algorithm based on the receding-horizon control methodology, and show that the algorithm is able to allow vehicles, on the one hand, satisfy state and input constraints, and on the other hand, asymptotically achieve the desired formation despite replay attacks. With slight modifications, our proposed algorithm shows an analogous resilience to denial-of-service attacks.
AbstractList We consider an operator-vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to the desired formation subject to the given state and input constraints. Each operator-vehicle pair is attacked by an adversary who is able to maliciously replay the control commands sent from the operator. To play against attackers, we come up with a novel distributed resilient algorithm based on the receding-horizon control methodology, and show that the algorithm is able to allow vehicles, on the one hand, satisfy state and input constraints, and on the other hand, asymptotically achieve the desired formation despite replay attacks. With slight modifications, our proposed algorithm shows an analogous resilience to denial-of-service attacks.
Author Martínez, Sonia
Zhu, Minghui
Author_xml – sequence: 1
  givenname: Minghui
  surname: Zhu
  fullname: Zhu, Minghui
  email: muz16@psu.edu
  organization: Department of Electrical Engineering, Pennsylvania State University, 201 Old Main, University Park, PA, 16802, USA
– sequence: 2
  givenname: Sonia
  surname: Martínez
  fullname: Martínez, Sonia
  email: soniamd@ucsd.edu
  organization: Department of Mechanical and Aerospace Engineering, University of California, San Diego, 9500 Gilman Dr, La Jolla, CA, 92093-0411, USA
BackLink http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27953127$$DView record in Pascal Francis
BookMark eNqNkEFO3DAUQK0KpA4Dd8gGqZukdmLHyQYJUFsqIbEBsbR-7B_V04w9tT1Tddc79IacBIehQmIDK_tb7z9L74gcOO-QkILRilHWfl5VsE1-DclqqGrKmor2FW3YB7JgnWzKumvaA7KglIqS0b77SI5iXOWRs65ekPsbVxgbU7DDNqEptHd5AOvyffRh9no3v6bgp8K6wm8wQPLh4e-_Hf6wesICzA5DhGBhKhym3z78jMfkcIQp4snzuSR3X7_cXl6V1zffvl-eX5eac5lKMRqUjeSGAuPCSNlzHBDbgXLBcTQtZyj00AyyRz0KKlqooR80wojGdH2zJJ_23k3wv7YYk1rbqHGawKHfRsVEkzMJ0dYZPX1GIWqYxgBO26g2wa4h_FG17DNby8yd7TkdfIwBR6Vteuowh5kUo2our1bqpbyayyvaq1w-C7pXgv9_vGP1Yr-KudnOYlBRW3QajQ2okzLevi15BJOKqtw
CODEN ATCAA9
CitedBy_id crossref_primary_10_1109_TNNLS_2022_3158085
crossref_primary_10_1137_16M1069390
crossref_primary_10_1109_TAC_2018_2852602
crossref_primary_10_1109_ACCESS_2019_2938067
crossref_primary_10_1109_TAC_2025_3546000
crossref_primary_10_1016_j_automatica_2020_109242
crossref_primary_10_1109_JSYST_2023_3330937
crossref_primary_10_1016_j_neucom_2023_126546
crossref_primary_10_1109_TVT_2017_2760367
crossref_primary_10_1109_TII_2019_2905295
crossref_primary_10_1109_TRO_2017_2658604
crossref_primary_10_1109_TAC_2020_3025870
crossref_primary_10_1016_j_ins_2025_122002
crossref_primary_10_1080_21642583_2014_897658
crossref_primary_10_1109_TCST_2016_2526639
crossref_primary_10_1109_TCYB_2019_2903411
crossref_primary_10_1109_TFUZZ_2021_3133903
crossref_primary_10_1002_rnc_6055
crossref_primary_10_1016_j_ins_2019_02_050
crossref_primary_10_1016_j_arcontrol_2019_08_002
crossref_primary_10_1016_j_automatica_2022_110241
crossref_primary_10_1109_JAS_2022_105548
crossref_primary_10_1016_j_automatica_2018_12_024
crossref_primary_10_1049_iet_cta_2017_1068
crossref_primary_10_1016_j_automatica_2021_109953
crossref_primary_10_1016_j_sysconle_2021_105056
crossref_primary_10_1109_TCYB_2022_3201909
crossref_primary_10_1049_iet_cta_2016_0002
crossref_primary_10_1002_mma_10068
crossref_primary_10_1007_s11768_016_5123_9
crossref_primary_10_1016_j_automatica_2021_109551
crossref_primary_10_1109_JAS_2020_1003542
crossref_primary_10_1109_TAC_2025_3532791
crossref_primary_10_1109_TII_2019_2933596
crossref_primary_10_1016_j_jprocont_2015_05_001
crossref_primary_10_1007_s11071_021_06462_8
crossref_primary_10_1016_j_isatra_2024_03_015
crossref_primary_10_1016_j_ins_2024_121782
crossref_primary_10_1109_TSIPN_2017_2749959
crossref_primary_10_1145_3204439
crossref_primary_10_1016_j_est_2023_107795
crossref_primary_10_1016_j_automatica_2024_112062
crossref_primary_10_1080_00207721_2020_1801883
crossref_primary_10_1109_TIE_2019_2952802
Cites_doi 10.1016/j.automatica.2009.10.021
10.1109/ALLERTON.2009.5394956
10.1109/JSAC.2008.080928
10.1109/ACC.2010.5530755
10.1080/00207170500533288
10.1016/j.automatica.2005.12.008
10.3182/20080706-5-KR-1001.00259
10.1016/j.automatica.2006.02.010
10.1016/j.automatica.2011.08.038
10.1109/CDC.2010.5717917
10.1016/S0005-1098(99)00214-9
10.1109/CDC.2010.5718158
10.1016/j.automatica.2006.07.008
10.1016/S0005-1098(01)00174-1
10.1109/CDC.2011.6161327
10.3182/20110828-6-IT-1002.02862
10.1109/TAC.2007.904277
10.1109/TAC.2009.2031208
10.1109/IECON.2012.6389386
10.1109/ACC.2011.5991188
10.1109/CDC.2010.5717544
10.1109/TAC.2008.929401
10.1109/SmartGridComm.2011.6102368
10.1109/TAC.2010.2088690
10.1109/TAC.2011.2158130
10.1145/2185505.2185515
10.1109/CDC.2010.5717318
10.1016/j.automatica.2012.09.007
ContentType Journal Article
Copyright 2013 Elsevier Ltd
2015 INIST-CNRS
Copyright_xml – notice: 2013 Elsevier Ltd
– notice: 2015 INIST-CNRS
DBID AAYXX
CITATION
IQODW
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
DOI 10.1016/j.automatica.2013.09.031
DatabaseName CrossRef
Pascal-Francis
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

DeliveryMethod fulltext_linktorsrc
Discipline Engineering
Applied Sciences
EISSN 1873-2836
EndPage 3582
ExternalDocumentID 27953127
10_1016_j_automatica_2013_09_031
S0005109813004640
GroupedDBID --K
--M
-~X
.DC
.~1
0R~
1B1
1~.
1~5
23N
3R3
4.4
457
4G.
5GY
5VS
6TJ
7-5
71M
8P~
9JN
9JO
AAAKF
AAAKG
AABNK
AACTN
AAEDT
AAEDW
AAIAV
AAIKJ
AAKOC
AALRI
AAOAW
AAQFI
AAQXK
AARIN
AAXUO
ABDEX
ABFNM
ABFRF
ABJNI
ABMAC
ABUCO
ABXDB
ABYKQ
ACBEA
ACDAQ
ACGFO
ACGFS
ACNNM
ACRLP
ADBBV
ADEZE
ADIYS
ADMUD
ADTZH
AEBSH
AECPX
AEFWE
AEKER
AENEX
AFFNX
AFKWA
AFTJW
AGHFR
AGUBO
AGYEJ
AHHHB
AHJVU
AHPGS
AI.
AIEXJ
AIKHN
AITUG
AJBFU
AJOXV
ALMA_UNASSIGNED_HOLDINGS
AMFUW
AMRAJ
APLSM
ASPBG
AVWKF
AXJTR
AZFZN
BJAXD
BKOJK
BLXMC
CS3
EBS
EFJIC
EFLBG
EJD
EO8
EO9
EP2
EP3
F5P
FDB
FEDTE
FGOYB
FIRID
FNPLU
FYGXN
G-2
G-Q
GBLVA
HAMUX
HLZ
HVGLF
HZ~
H~9
IHE
J1W
JJJVA
K-O
KOM
LG9
LY7
M41
MO0
N9A
O-L
O9-
OAUVE
OZT
P-8
P-9
P2P
PC.
Q38
R2-
RIG
ROL
RPZ
RXW
SBC
SDF
SDG
SDP
SES
SET
SEW
SPC
SPCBC
SSB
SSD
SST
SSZ
T5K
T9H
TAE
TN5
VH1
WH7
WUQ
X6Y
XFK
XPP
ZMT
~G-
77I
9DU
AATTM
AAXKI
AAYWO
AAYXX
ABUFD
ABWVN
ACLOT
ACRPL
ACVFH
ADCNI
ADNMO
AEIPS
AEUPX
AFJKZ
AFPUW
AGQPQ
AIGII
AIIUN
AKBMS
AKRWK
AKYEP
ANKPU
APXCP
CITATION
EFKBS
~HD
BNPGV
IQODW
SSH
7SC
7SP
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c447t-5fde7374d0a145d7794ebee6b0454efd641e5cb3b79ecf5056a2a9bceafedd893
ISICitedReferencesCount 65
ISICitedReferencesURI http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000327917500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
ISSN 0005-1098
IngestDate Sat Sep 27 20:49:49 EDT 2025
Wed Apr 02 07:25:10 EDT 2025
Sat Nov 29 01:49:26 EST 2025
Tue Nov 18 22:39:59 EST 2025
Fri Feb 23 02:23:46 EST 2024
IsPeerReviewed true
IsScholarly true
Issue 12
Keywords Distributed control
Resilient control
Multi-agent systems
Motor car
Local network
Constrained optimization
Resilience
Model predictive control
Control constraint
Multiagent system
Distributed algorithm
Cryptanalysis
Asymptotic approximation
Replay attack
Denial of service
Open ended horizon
Formation
Computer security
State constraint
Language English
License CC BY 4.0
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c447t-5fde7374d0a145d7794ebee6b0454efd641e5cb3b79ecf5056a2a9bceafedd893
Notes ObjectType-Article-2
SourceType-Scholarly Journals-1
ObjectType-Feature-1
content type line 23
PQID 1531015562
PQPubID 23500
PageCount 12
ParticipantIDs proquest_miscellaneous_1531015562
pascalfrancis_primary_27953127
crossref_citationtrail_10_1016_j_automatica_2013_09_031
crossref_primary_10_1016_j_automatica_2013_09_031
elsevier_sciencedirect_doi_10_1016_j_automatica_2013_09_031
PublicationCentury 2000
PublicationDate 2013-12-01
PublicationDateYYYYMMDD 2013-12-01
PublicationDate_xml – month: 12
  year: 2013
  text: 2013-12-01
  day: 01
PublicationDecade 2010
PublicationPlace Kidlington
PublicationPlace_xml – name: Kidlington
PublicationTitle Automatica (Oxford)
PublicationYear 2013
Publisher Elsevier Ltd
Elsevier
Publisher_xml – name: Elsevier Ltd
– name: Elsevier
References Teixeira, A., Perez, D., Sandberg, H., & Johansson, K.H. (2012). Attack models and scenarios for networked control systems. In
Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In
Pasqualetti, F., Carli, R., & Bullo, F. (2011). A distributed method for state estimation and false data detection in power networks. In
Gupta, A., Langbort, C., & Basar, T. (2010). Optimal control in the presence of an intelligent jammer with limited actions. In
Sundaram, Hadjicostis (br000160) 2011; 56
Alpcan, Basar (br000005) 2011
(pp. 4063–4068) June.
Mo, Kim, Brancik, Dickinson, Heejo, Perrig (br000130) 2012; 100
Amin, S., Litrico, X., Sastry, S.S., & Bayen, A.M. (2010). Stealthy deception attacks on water SCADA systems. In
Cummings, Bruni, Mercier, Mitchell (br000055) 2007; 1
Gupta, V., Sinopoli, B., Adlakha, S., & Goldsmith, A. (2006). Receding horizon networked control. In
Bhattacharya, S., & Basar, T. (2010a). Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In
Jiang, T., Matei, I., & Baras, J.S. (2010). A trust based distributed Kalman filtering approach for mode estimation in power systems. In
Bertsekas (br000035) 2009
Dunbar, Murray (br000065) 2006; 42
(pp. 1516–1521). Seoul, Korea, July.
Tabuada (br000165) 2007; 52
Teal Group Corporation.
(pp. 6624–6629). Orlando, FL, USA, December.
(pp. 3553–3558). Montreal, Canada, June.
Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2011). Risk-sensitive control under a class of denial-of-service attack models. In
.
(pp. 55–64).
Zhu, M., & Martínez, S. (2011b). Stackelberg game analysis of correlated attacks in cyber-physical system. In
Pang, Z.H., Liu, G.P., & Dong, Z. (2011). Secure networked control systems under denial of service attacks. In
Pasqualetti, Bicchi, Bullo (br000150) 2012; 57
Camacho, Bordons (br000050) 2004
Magni, Scattolini (br000115) 2006; 42
(pp. 818–823). Baltimore, USA, June.
Kobayashi, K., & Hiraishi, K. (2012). Self-triggered model predictive control with delay compensation for networked control systems. In
Zhu, Martínez (br000190) 2010; 46
Zhu, M., & Martínez, S. (2011a). Attack-resilient distributed formation control via online adaptation. In
(pp. 1096–1101). Atlanta, USA, December.
Falliere, N., Murchu, L.O., & Chien, E. (2011). W32.stuxnet dossier. In
Liu, Mu, Rees, Chai (br000110) 2006; 79
(pp. 8908–8913).
Bertsekas, Tsitsiklis (br000030) 1997
(pp. 5991–5998). Atlanta, USA, December.
Ferrari-Trecate, Galbusera, Marciandi, Scattolini (br000075) 2009; 54
Mu noz de la Peña, Christofides (br000140) 2008; 53
(pp. 469–474) October.
Zaloga, J.S., Rockwell, D., & Finnegan, P. (2008).
Amin, Schwartz, Sastry (br000015) 2013; 49
Ding (br000060) 2011; 47
Keviczky, Borrelli, Balas (br000095) 2006; 42
Zhu, M., & Martínez, S. (2012). On distributed resilient consensus against replay attacks in adversarial networks. In
Bhattacharya, S., & Basar, T. (2010b). Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer. In
(pp. 643–648). San Francisco, USA, June.
Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., & Sastry, S.S. (2010). Cyber security analysis of state estimators in electric power systems. In
Stockholm, Sweden, April.
(pp. 3200–3205).
Keviczky, T., & Johansson, K.H. (2008). A study on distributed model predictive consensus. In
Theodorakopoulos, Baras (br000180) 2008; 7
Bemporad, Morari, Dua, Pistikopoulos (br000025) 2002; 38
Mayne, Rawlings, Rao, Scokaert (br000120) 2000; 36
(pp. 3560–3565). Atlanta, USA, December.
Illinois, USA, September.
(pp. 5967–5972). Atlanta, USA, December.
(pp. 161–170) Stockholm, Sweden.
Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In
Bemporad (10.1016/j.automatica.2013.09.031_br000025) 2002; 38
Theodorakopoulos (10.1016/j.automatica.2013.09.031_br000180) 2008; 7
10.1016/j.automatica.2013.09.031_br000125
10.1016/j.automatica.2013.09.031_br000205
10.1016/j.automatica.2013.09.031_br000105
10.1016/j.automatica.2013.09.031_br000045
10.1016/j.automatica.2013.09.031_br000100
Ferrari-Trecate (10.1016/j.automatica.2013.09.031_br000075) 2009; 54
10.1016/j.automatica.2013.09.031_br000145
10.1016/j.automatica.2013.09.031_br000200
Tabuada (10.1016/j.automatica.2013.09.031_br000165) 2007; 52
Camacho (10.1016/j.automatica.2013.09.031_br000050) 2004
Cummings (10.1016/j.automatica.2013.09.031_br000055) 2007; 1
Magni (10.1016/j.automatica.2013.09.031_br000115) 2006; 42
Sundaram (10.1016/j.automatica.2013.09.031_br000160) 2011; 56
Mu noz de la Peña (10.1016/j.automatica.2013.09.031_br000140) 2008; 53
10.1016/j.automatica.2013.09.031_br000085
Bertsekas (10.1016/j.automatica.2013.09.031_br000030) 1997
10.1016/j.automatica.2013.09.031_br000040
Mayne (10.1016/j.automatica.2013.09.031_br000120) 2000; 36
Alpcan (10.1016/j.automatica.2013.09.031_br000005) 2011
10.1016/j.automatica.2013.09.031_br000020
10.1016/j.automatica.2013.09.031_br000185
10.1016/j.automatica.2013.09.031_br000080
Keviczky (10.1016/j.automatica.2013.09.031_br000095) 2006; 42
Liu (10.1016/j.automatica.2013.09.031_br000110) 2006; 79
10.1016/j.automatica.2013.09.031_br000155
Bertsekas (10.1016/j.automatica.2013.09.031_br000035) 2009
10.1016/j.automatica.2013.09.031_br000135
Zhu (10.1016/j.automatica.2013.09.031_br000190) 2010; 46
10.1016/j.automatica.2013.09.031_br000090
Pasqualetti (10.1016/j.automatica.2013.09.031_br000150) 2012; 57
Amin (10.1016/j.automatica.2013.09.031_br000015) 2013; 49
Ding (10.1016/j.automatica.2013.09.031_br000060) 2011; 47
Dunbar (10.1016/j.automatica.2013.09.031_br000065) 2006; 42
10.1016/j.automatica.2013.09.031_br000195
10.1016/j.automatica.2013.09.031_br000010
10.1016/j.automatica.2013.09.031_br000175
10.1016/j.automatica.2013.09.031_br000070
Mo (10.1016/j.automatica.2013.09.031_br000130) 2012; 100
10.1016/j.automatica.2013.09.031_br000170
References_xml – year: 2009
  ident: br000035
  article-title: Convex optimization theory
– reference: Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., & Sastry, S.S. (2010). Cyber security analysis of state estimators in electric power systems. In
– reference: (pp. 818–823). Baltimore, USA, June.
– reference: Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In
– reference: (pp. 3200–3205).
– volume: 38
  start-page: 3
  year: 2002
  end-page: 20
  ident: br000025
  article-title: The explicit linear quadratic regulator for constrained systems
  publication-title: Automatica
– reference: Kobayashi, K., & Hiraishi, K. (2012). Self-triggered model predictive control with delay compensation for networked control systems. In
– reference: (pp. 3560–3565). Atlanta, USA, December.
– reference: , Stockholm, Sweden, April.
– reference: (pp. 5991–5998). Atlanta, USA, December.
– reference: (pp. 8908–8913).
– year: 2004
  ident: br000050
  article-title: Model predictive control
– reference: Amin, S., Litrico, X., Sastry, S.S., & Bayen, A.M. (2010). Stealthy deception attacks on water SCADA systems. In
– reference: Gupta, A., Langbort, C., & Basar, T. (2010). Optimal control in the presence of an intelligent jammer with limited actions. In
– volume: 100
  start-page: 215
  year: 2012
  ident: br000130
  article-title: Cyber-physical security of a smart grid infrastructure
  publication-title: Proceedings of the IEEE
– reference: (pp. 5967–5972). Atlanta, USA, December.
– year: 2011
  ident: br000005
  article-title: Network security: a decision and game theoretic approach
– reference: Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In
– reference: Bhattacharya, S., & Basar, T. (2010a). Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In
– reference: Teixeira, A., Perez, D., Sandberg, H., & Johansson, K.H. (2012). Attack models and scenarios for networked control systems. In
– reference: (pp. 3553–3558). Montreal, Canada, June.
– reference: (pp. 1096–1101). Atlanta, USA, December.
– volume: 49
  start-page: 186
  year: 2013
  end-page: 192
  ident: br000015
  article-title: Security of interdependent and identical networked control systems
  publication-title: Automatica
– volume: 42
  start-page: 549
  year: 2006
  end-page: 558
  ident: br000065
  article-title: Distributed receding horizon control for multi-vehicle formation stabilization
  publication-title: Automatica
– volume: 56
  start-page: 1731
  year: 2011
  end-page: 1742
  ident: br000160
  article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 55–64).
– year: 1997
  ident: br000030
  article-title: Parallel and distributed computation: numerical methods
– volume: 36
  start-page: 789
  year: 2000
  end-page: 814
  ident: br000120
  article-title: Constrained model predictive control: stability and optimality
  publication-title: Automatica
– volume: 46
  start-page: 322
  year: 2010
  end-page: 329
  ident: br000190
  article-title: Discrete-time dynamic average consensus
  publication-title: Automatica
– volume: 54
  start-page: 2560
  year: 2009
  end-page: 2572
  ident: br000075
  article-title: Model predictive control schemes for consensus in multi-agent systems with single- and double- integrator dynamics
  publication-title: IEEE Transactions on Automatic Control
– reference: (pp. 643–648). San Francisco, USA, June.
– reference: , Illinois, USA, September.
– volume: 53
  start-page: 2076
  year: 2008
  end-page: 2089
  ident: br000140
  article-title: Lyapunov-based model predictive control of nonlinear systems subject to data losses
  publication-title: IEEE Transactions on Automatic Control
– reference: Zhu, M., & Martínez, S. (2012). On distributed resilient consensus against replay attacks in adversarial networks. In
– reference: . Illinois, USA, September.
– reference: (pp. 4063–4068) June.
– reference: Falliere, N., Murchu, L.O., & Chien, E. (2011). W32.stuxnet dossier. In
– volume: 47
  start-page: 2526
  year: 2011
  end-page: 2533
  ident: br000060
  article-title: Stabilization of linear systems over networks with bounded packet loss and its use in model predictive control
  publication-title: Automatica
– reference: Pang, Z.H., Liu, G.P., & Dong, Z. (2011). Secure networked control systems under denial of service attacks. In
– reference: Zaloga, J.S., Rockwell, D., & Finnegan, P. (2008).
– volume: 57
  start-page: 90
  year: 2012
  end-page: 104
  ident: br000150
  article-title: Consensus computation in unreliable networks: a system theoretic approach
  publication-title: IEEE Transactions on Automatic Control
– reference: Keviczky, T., & Johansson, K.H. (2008). A study on distributed model predictive consensus. In
– reference: (pp. 6624–6629). Orlando, FL, USA, December.
– reference: Gupta, V., Sinopoli, B., Adlakha, S., & Goldsmith, A. (2006). Receding horizon networked control. In
– reference: (pp. 161–170) Stockholm, Sweden.
– reference: Zhu, M., & Martínez, S. (2011b). Stackelberg game analysis of correlated attacks in cyber-physical system. In
– reference: Zhu, M., & Martínez, S. (2011a). Attack-resilient distributed formation control via online adaptation. In
– reference: Jiang, T., Matei, I., & Baras, J.S. (2010). A trust based distributed Kalman filtering approach for mode estimation in power systems. In
– reference: Pasqualetti, F., Carli, R., & Bullo, F. (2011). A distributed method for state estimation and false data detection in power networks. In
– volume: 79
  start-page: 288
  year: 2006
  end-page: 297
  ident: br000110
  article-title: Design and stability analysis of networked control systems with random communication time delay using the modified MPC
  publication-title: International Journal of Control
– volume: 7
  start-page: 1317
  year: 2008
  end-page: 1327
  ident: br000180
  article-title: Game theoretic modeling of malicious users in collaborative networks
  publication-title: IEEE Journal on Selected Areas in Communications
– reference: .
– reference: Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2011). Risk-sensitive control under a class of denial-of-service attack models. In
– volume: 1
  year: 2007
  ident: br000055
  article-title: Automation arquitecture for single operator, multiple UAV command and control
  publication-title: International Journal of Command and Control
– volume: 52
  start-page: 1680
  year: 2007
  end-page: 1685
  ident: br000165
  article-title: Event-triggered real-time scheduling of stabilizing control tasks
  publication-title: IEEE Transactions on Automatic Control
– reference: . Teal Group Corporation.
– reference: (pp. 469–474) October.
– reference: Bhattacharya, S., & Basar, T. (2010b). Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer. In
– volume: 42
  start-page: 2105
  year: 2006
  end-page: 2115
  ident: br000095
  article-title: Decentralized receding horizon control for large scale dynamically decoupled systems
  publication-title: Automatica
– volume: 42
  start-page: 1231
  year: 2006
  end-page: 1236
  ident: br000115
  article-title: Stabilizing decentralized model predictive control of nonlinear systems
  publication-title: Automatica
– reference: (pp. 1516–1521). Seoul, Korea, July.
– year: 2004
  ident: 10.1016/j.automatica.2013.09.031_br000050
– volume: 46
  start-page: 322
  issue: 2
  year: 2010
  ident: 10.1016/j.automatica.2013.09.031_br000190
  article-title: Discrete-time dynamic average consensus
  publication-title: Automatica
  doi: 10.1016/j.automatica.2009.10.021
– ident: 10.1016/j.automatica.2013.09.031_br000135
  doi: 10.1109/ALLERTON.2009.5394956
– volume: 7
  start-page: 1317
  year: 2008
  ident: 10.1016/j.automatica.2013.09.031_br000180
  article-title: Game theoretic modeling of malicious users in collaborative networks
  publication-title: IEEE Journal on Selected Areas in Communications
  doi: 10.1109/JSAC.2008.080928
– ident: 10.1016/j.automatica.2013.09.031_br000040
  doi: 10.1109/ACC.2010.5530755
– ident: 10.1016/j.automatica.2013.09.031_br000010
– volume: 100
  start-page: 215
  issue: 195–209
  year: 2012
  ident: 10.1016/j.automatica.2013.09.031_br000130
  article-title: Cyber-physical security of a smart grid infrastructure
  publication-title: Proceedings of the IEEE
– volume: 79
  start-page: 288
  issue: 4
  year: 2006
  ident: 10.1016/j.automatica.2013.09.031_br000110
  article-title: Design and stability analysis of networked control systems with random communication time delay using the modified MPC
  publication-title: International Journal of Control
  doi: 10.1080/00207170500533288
– volume: 42
  start-page: 549
  issue: 4
  year: 2006
  ident: 10.1016/j.automatica.2013.09.031_br000065
  article-title: Distributed receding horizon control for multi-vehicle formation stabilization
  publication-title: Automatica
  doi: 10.1016/j.automatica.2005.12.008
– ident: 10.1016/j.automatica.2013.09.031_br000100
  doi: 10.3182/20080706-5-KR-1001.00259
– volume: 42
  start-page: 1231
  issue: 7
  year: 2006
  ident: 10.1016/j.automatica.2013.09.031_br000115
  article-title: Stabilizing decentralized model predictive control of nonlinear systems
  publication-title: Automatica
  doi: 10.1016/j.automatica.2006.02.010
– volume: 47
  start-page: 2526
  issue: 9
  year: 2011
  ident: 10.1016/j.automatica.2013.09.031_br000060
  article-title: Stabilization of linear systems over networks with bounded packet loss and its use in model predictive control
  publication-title: Automatica
  doi: 10.1016/j.automatica.2011.08.038
– ident: 10.1016/j.automatica.2013.09.031_br000045
  doi: 10.1109/CDC.2010.5717917
– volume: 36
  start-page: 789
  year: 2000
  ident: 10.1016/j.automatica.2013.09.031_br000120
  article-title: Constrained model predictive control: stability and optimality
  publication-title: Automatica
  doi: 10.1016/S0005-1098(99)00214-9
– ident: 10.1016/j.automatica.2013.09.031_br000125
  doi: 10.1109/CDC.2010.5718158
– ident: 10.1016/j.automatica.2013.09.031_br000085
– volume: 42
  start-page: 2105
  issue: 12
  year: 2006
  ident: 10.1016/j.automatica.2013.09.031_br000095
  article-title: Decentralized receding horizon control for large scale dynamically decoupled systems
  publication-title: Automatica
  doi: 10.1016/j.automatica.2006.07.008
– year: 2011
  ident: 10.1016/j.automatica.2013.09.031_br000005
– volume: 38
  start-page: 3
  year: 2002
  ident: 10.1016/j.automatica.2013.09.031_br000025
  article-title: The explicit linear quadratic regulator for constrained systems
  publication-title: Automatica
  doi: 10.1016/S0005-1098(01)00174-1
– ident: 10.1016/j.automatica.2013.09.031_br000195
  doi: 10.1109/CDC.2011.6161327
– ident: 10.1016/j.automatica.2013.09.031_br000145
  doi: 10.3182/20110828-6-IT-1002.02862
– ident: 10.1016/j.automatica.2013.09.031_br000185
– year: 1997
  ident: 10.1016/j.automatica.2013.09.031_br000030
– volume: 52
  start-page: 1680
  issue: 9
  year: 2007
  ident: 10.1016/j.automatica.2013.09.031_br000165
  article-title: Event-triggered real-time scheduling of stabilizing control tasks
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2007.904277
– volume: 54
  start-page: 2560
  issue: 11
  year: 2009
  ident: 10.1016/j.automatica.2013.09.031_br000075
  article-title: Model predictive control schemes for consensus in multi-agent systems with single- and double- integrator dynamics
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2009.2031208
– ident: 10.1016/j.automatica.2013.09.031_br000105
  doi: 10.1109/IECON.2012.6389386
– ident: 10.1016/j.automatica.2013.09.031_br000200
– ident: 10.1016/j.automatica.2013.09.031_br000020
  doi: 10.1109/ACC.2011.5991188
– ident: 10.1016/j.automatica.2013.09.031_br000070
– ident: 10.1016/j.automatica.2013.09.031_br000080
  doi: 10.1109/CDC.2010.5717544
– year: 2009
  ident: 10.1016/j.automatica.2013.09.031_br000035
– volume: 53
  start-page: 2076
  issue: 9
  year: 2008
  ident: 10.1016/j.automatica.2013.09.031_br000140
  article-title: Lyapunov-based model predictive control of nonlinear systems subject to data losses
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2008.929401
– ident: 10.1016/j.automatica.2013.09.031_br000090
– ident: 10.1016/j.automatica.2013.09.031_br000155
  doi: 10.1109/SmartGridComm.2011.6102368
– ident: 10.1016/j.automatica.2013.09.031_br000205
– volume: 1
  issue: 2
  year: 2007
  ident: 10.1016/j.automatica.2013.09.031_br000055
  article-title: Automation arquitecture for single operator, multiple UAV command and control
  publication-title: International Journal of Command and Control
– volume: 56
  start-page: 1731
  issue: 7
  year: 2011
  ident: 10.1016/j.automatica.2013.09.031_br000160
  article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2010.2088690
– volume: 57
  start-page: 90
  issue: 1
  year: 2012
  ident: 10.1016/j.automatica.2013.09.031_br000150
  article-title: Consensus computation in unreliable networks: a system theoretic approach
  publication-title: IEEE Transactions on Automatic Control
  doi: 10.1109/TAC.2011.2158130
– ident: 10.1016/j.automatica.2013.09.031_br000175
  doi: 10.1145/2185505.2185515
– ident: 10.1016/j.automatica.2013.09.031_br000170
  doi: 10.1109/CDC.2010.5717318
– volume: 49
  start-page: 186
  issue: 1
  year: 2013
  ident: 10.1016/j.automatica.2013.09.031_br000015
  article-title: Security of interdependent and identical networked control systems
  publication-title: Automatica
  doi: 10.1016/j.automatica.2012.09.007
SSID ssj0004182
Score 2.405055
Snippet We consider an operator–vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to...
We consider an operator-vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to...
SourceID proquest
pascalfrancis
crossref
elsevier
SourceType Aggregation Database
Index Database
Enrichment Source
Publisher
StartPage 3571
SubjectTerms Algorithms
Applied sciences
Asymptotic properties
Commands
Computer science; control theory; systems
Computer systems and distributed systems. User interface
Constraints
Control theory. Systems
Distributed control
Exact sciences and technology
Memory and file management (including protection and security)
Memory organisation. Data processing
Multi-agent systems
Networks
Operators
Resilience
Resilient control
Robotics
Software
Vehicles
Title On distributed constrained formation control in operator–vehicle adversarial networks
URI https://dx.doi.org/10.1016/j.automatica.2013.09.031
https://www.proquest.com/docview/1531015562
Volume 49
WOSCitedRecordID wos000327917500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVESC
  databaseName: Elsevier SD Freedom Collection Journals 2021
  customDbUrl:
  eissn: 1873-2836
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0004182
  issn: 0005-1098
  databaseCode: AIEXJ
  dateStart: 19950101
  isFulltext: true
  titleUrlDefault: https://www.sciencedirect.com
  providerName: Elsevier
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3LjtMwFLVKhwUI8RhAlMfISOxQpNp5OBGrChVaBB0WU6hmEzm2IzoaudWkrbrkJ_hBvoTr2E4zwyDKgk0UWbIj5x5fX9vnHiP0SoVhEok-D6gq0sAoUoEflDwoQ0FVP5NJUp-ef_nIJpN0Nss-dzqlz4XZnDOt0-02W_5XU0MZGNukzv6DuZtGoQDewejwBLPDcy_DH2tz6mIvslImZ81oxML6H96bTMWGoT6HaHGp6qN2T3uIN-qbadPQAyA25PW1Htqyxat2LDtYrxa14CuvNUu3libfbCx8Gk_ej6bj16ejaVME0fN4Mjytt1zBmfD2ngMJr_A3fDLMJcdqBE3thdLesVotUg8g2nKTYWzvXXFTrsnWvdad252FM0PmcR0yZLzQKtOS3RTmj-2vzGwN35CyDHwNZTfQAWVxlnbRwWA8nH3YZdCS1OrKu244zpdlAl7_9T8FMneWvILhVdp7UX6b4uu45eQ-uusWHHhggfIAdZQ-RPfc4gM7114dotstZcqH6Ouxxi0U4RaKcIMi7FCE5xp7FP38_sPhB7fwgz1-HqHpu-HJ21Hg7uAIRBSxVRCXUrGQRbLPSRRLBu4bhr1KCiPdqEqZRETFoggLlilRmnCaU54VQvFSSQnB8GPU1QutniDMRURov1BMQAwuwTVEJY1iaEoKQliieoj5H5oLJ1BvenaeeybiWb4zRW5MkfezHEzRQ6SpubQiLXvUeeNtlrtg0waROYBvj9pHl8zcfNYjrYdeervn4LDNKRzXarGucggxiFmoJPTp3xp5hm7tRt9z1F1drNULdFNsVvPq4shh-BeIa7vB
linkProvider Elsevier
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+distributed+constrained+formation+control+in+operator%E2%80%95vehicle+adversarial+networks&rft.jtitle=Automatica+%28Oxford%29&rft.au=MINGHUI+ZHU&rft.au=MARTINEZ%2C+Sonia&rft.date=2013-12-01&rft.pub=Elsevier&rft.issn=0005-1098&rft.volume=49&rft.issue=12&rft.spage=3571&rft.epage=3582&rft_id=info:doi/10.1016%2Fj.automatica.2013.09.031&rft.externalDBID=n%2Fa&rft.externalDocID=27953127
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0005-1098&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0005-1098&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0005-1098&client=summon