On distributed constrained formation control in operator–vehicle adversarial networks
We consider an operator–vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to the desired formation subject to the given state and input constraints. Each operator–vehicle pair is attacked by an adversary who is able to m...
Gespeichert in:
| Veröffentlicht in: | Automatica (Oxford) Jg. 49; H. 12; S. 3571 - 3582 |
|---|---|
| Hauptverfasser: | , |
| Format: | Journal Article |
| Sprache: | Englisch |
| Veröffentlicht: |
Kidlington
Elsevier Ltd
01.12.2013
Elsevier |
| Schlagworte: | |
| ISSN: | 0005-1098, 1873-2836 |
| Online-Zugang: | Volltext |
| Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
| Abstract | We consider an operator–vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to the desired formation subject to the given state and input constraints. Each operator–vehicle pair is attacked by an adversary who is able to maliciously replay the control commands sent from the operator. To play against attackers, we come up with a novel distributed resilient algorithm based on the receding-horizon control methodology, and show that the algorithm is able to allow vehicles, on the one hand, satisfy state and input constraints, and on the other hand, asymptotically achieve the desired formation despite replay attacks. With slight modifications, our proposed algorithm shows an analogous resilience to denial-of-service attacks. |
|---|---|
| AbstractList | We consider an operator-vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to the desired formation subject to the given state and input constraints. Each operator-vehicle pair is attacked by an adversary who is able to maliciously replay the control commands sent from the operator. To play against attackers, we come up with a novel distributed resilient algorithm based on the receding-horizon control methodology, and show that the algorithm is able to allow vehicles, on the one hand, satisfy state and input constraints, and on the other hand, asymptotically achieve the desired formation despite replay attacks. With slight modifications, our proposed algorithm shows an analogous resilience to denial-of-service attacks. |
| Author | Martínez, Sonia Zhu, Minghui |
| Author_xml | – sequence: 1 givenname: Minghui surname: Zhu fullname: Zhu, Minghui email: muz16@psu.edu organization: Department of Electrical Engineering, Pennsylvania State University, 201 Old Main, University Park, PA, 16802, USA – sequence: 2 givenname: Sonia surname: Martínez fullname: Martínez, Sonia email: soniamd@ucsd.edu organization: Department of Mechanical and Aerospace Engineering, University of California, San Diego, 9500 Gilman Dr, La Jolla, CA, 92093-0411, USA |
| BackLink | http://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&idt=27953127$$DView record in Pascal Francis |
| BookMark | eNqNkEFO3DAUQK0KpA4Dd8gGqZukdmLHyQYJUFsqIbEBsbR-7B_V04w9tT1Tddc79IacBIehQmIDK_tb7z9L74gcOO-QkILRilHWfl5VsE1-DclqqGrKmor2FW3YB7JgnWzKumvaA7KglIqS0b77SI5iXOWRs65ekPsbVxgbU7DDNqEptHd5AOvyffRh9no3v6bgp8K6wm8wQPLh4e-_Hf6wesICzA5DhGBhKhym3z78jMfkcIQp4snzuSR3X7_cXl6V1zffvl-eX5eac5lKMRqUjeSGAuPCSNlzHBDbgXLBcTQtZyj00AyyRz0KKlqooR80wojGdH2zJJ_23k3wv7YYk1rbqHGawKHfRsVEkzMJ0dYZPX1GIWqYxgBO26g2wa4h_FG17DNby8yd7TkdfIwBR6Vteuowh5kUo2our1bqpbyayyvaq1w-C7pXgv9_vGP1Yr-KudnOYlBRW3QajQ2okzLevi15BJOKqtw |
| CODEN | ATCAA9 |
| CitedBy_id | crossref_primary_10_1109_TNNLS_2022_3158085 crossref_primary_10_1137_16M1069390 crossref_primary_10_1109_TAC_2018_2852602 crossref_primary_10_1109_ACCESS_2019_2938067 crossref_primary_10_1109_TAC_2025_3546000 crossref_primary_10_1016_j_automatica_2020_109242 crossref_primary_10_1109_JSYST_2023_3330937 crossref_primary_10_1016_j_neucom_2023_126546 crossref_primary_10_1109_TVT_2017_2760367 crossref_primary_10_1109_TII_2019_2905295 crossref_primary_10_1109_TRO_2017_2658604 crossref_primary_10_1109_TAC_2020_3025870 crossref_primary_10_1016_j_ins_2025_122002 crossref_primary_10_1080_21642583_2014_897658 crossref_primary_10_1109_TCST_2016_2526639 crossref_primary_10_1109_TCYB_2019_2903411 crossref_primary_10_1109_TFUZZ_2021_3133903 crossref_primary_10_1002_rnc_6055 crossref_primary_10_1016_j_ins_2019_02_050 crossref_primary_10_1016_j_arcontrol_2019_08_002 crossref_primary_10_1016_j_automatica_2022_110241 crossref_primary_10_1109_JAS_2022_105548 crossref_primary_10_1016_j_automatica_2018_12_024 crossref_primary_10_1049_iet_cta_2017_1068 crossref_primary_10_1016_j_automatica_2021_109953 crossref_primary_10_1016_j_sysconle_2021_105056 crossref_primary_10_1109_TCYB_2022_3201909 crossref_primary_10_1049_iet_cta_2016_0002 crossref_primary_10_1002_mma_10068 crossref_primary_10_1007_s11768_016_5123_9 crossref_primary_10_1016_j_automatica_2021_109551 crossref_primary_10_1109_JAS_2020_1003542 crossref_primary_10_1109_TAC_2025_3532791 crossref_primary_10_1109_TII_2019_2933596 crossref_primary_10_1016_j_jprocont_2015_05_001 crossref_primary_10_1007_s11071_021_06462_8 crossref_primary_10_1016_j_isatra_2024_03_015 crossref_primary_10_1016_j_ins_2024_121782 crossref_primary_10_1109_TSIPN_2017_2749959 crossref_primary_10_1145_3204439 crossref_primary_10_1016_j_est_2023_107795 crossref_primary_10_1016_j_automatica_2024_112062 crossref_primary_10_1080_00207721_2020_1801883 crossref_primary_10_1109_TIE_2019_2952802 |
| Cites_doi | 10.1016/j.automatica.2009.10.021 10.1109/ALLERTON.2009.5394956 10.1109/JSAC.2008.080928 10.1109/ACC.2010.5530755 10.1080/00207170500533288 10.1016/j.automatica.2005.12.008 10.3182/20080706-5-KR-1001.00259 10.1016/j.automatica.2006.02.010 10.1016/j.automatica.2011.08.038 10.1109/CDC.2010.5717917 10.1016/S0005-1098(99)00214-9 10.1109/CDC.2010.5718158 10.1016/j.automatica.2006.07.008 10.1016/S0005-1098(01)00174-1 10.1109/CDC.2011.6161327 10.3182/20110828-6-IT-1002.02862 10.1109/TAC.2007.904277 10.1109/TAC.2009.2031208 10.1109/IECON.2012.6389386 10.1109/ACC.2011.5991188 10.1109/CDC.2010.5717544 10.1109/TAC.2008.929401 10.1109/SmartGridComm.2011.6102368 10.1109/TAC.2010.2088690 10.1109/TAC.2011.2158130 10.1145/2185505.2185515 10.1109/CDC.2010.5717318 10.1016/j.automatica.2012.09.007 |
| ContentType | Journal Article |
| Copyright | 2013 Elsevier Ltd 2015 INIST-CNRS |
| Copyright_xml | – notice: 2013 Elsevier Ltd – notice: 2015 INIST-CNRS |
| DBID | AAYXX CITATION IQODW 7SC 7SP 8FD JQ2 L7M L~C L~D |
| DOI | 10.1016/j.automatica.2013.09.031 |
| DatabaseName | CrossRef Pascal-Francis Computer and Information Systems Abstracts Electronics & Communications Abstracts Technology Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
| DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
| DatabaseTitleList | Technology Research Database |
| DeliveryMethod | fulltext_linktorsrc |
| Discipline | Engineering Applied Sciences |
| EISSN | 1873-2836 |
| EndPage | 3582 |
| ExternalDocumentID | 27953127 10_1016_j_automatica_2013_09_031 S0005109813004640 |
| GroupedDBID | --K --M -~X .DC .~1 0R~ 1B1 1~. 1~5 23N 3R3 4.4 457 4G. 5GY 5VS 6TJ 7-5 71M 8P~ 9JN 9JO AAAKF AAAKG AABNK AACTN AAEDT AAEDW AAIAV AAIKJ AAKOC AALRI AAOAW AAQFI AAQXK AARIN AAXUO ABDEX ABFNM ABFRF ABJNI ABMAC ABUCO ABXDB ABYKQ ACBEA ACDAQ ACGFO ACGFS ACNNM ACRLP ADBBV ADEZE ADIYS ADMUD ADTZH AEBSH AECPX AEFWE AEKER AENEX AFFNX AFKWA AFTJW AGHFR AGUBO AGYEJ AHHHB AHJVU AHPGS AI. AIEXJ AIKHN AITUG AJBFU AJOXV ALMA_UNASSIGNED_HOLDINGS AMFUW AMRAJ APLSM ASPBG AVWKF AXJTR AZFZN BJAXD BKOJK BLXMC CS3 EBS EFJIC EFLBG EJD EO8 EO9 EP2 EP3 F5P FDB FEDTE FGOYB FIRID FNPLU FYGXN G-2 G-Q GBLVA HAMUX HLZ HVGLF HZ~ H~9 IHE J1W JJJVA K-O KOM LG9 LY7 M41 MO0 N9A O-L O9- OAUVE OZT P-8 P-9 P2P PC. Q38 R2- RIG ROL RPZ RXW SBC SDF SDG SDP SES SET SEW SPC SPCBC SSB SSD SST SSZ T5K T9H TAE TN5 VH1 WH7 WUQ X6Y XFK XPP ZMT ~G- 77I 9DU AATTM AAXKI AAYWO AAYXX ABUFD ABWVN ACLOT ACRPL ACVFH ADCNI ADNMO AEIPS AEUPX AFJKZ AFPUW AGQPQ AIGII AIIUN AKBMS AKRWK AKYEP ANKPU APXCP CITATION EFKBS ~HD BNPGV IQODW SSH 7SC 7SP 8FD JQ2 L7M L~C L~D |
| ID | FETCH-LOGICAL-c447t-5fde7374d0a145d7794ebee6b0454efd641e5cb3b79ecf5056a2a9bceafedd893 |
| ISICitedReferencesCount | 65 |
| ISICitedReferencesURI | http://www.webofscience.com/api/gateway?GWVersion=2&SrcApp=Summon&SrcAuth=ProQuest&DestLinkType=CitingArticles&DestApp=WOS_CPL&KeyUT=000327917500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| ISSN | 0005-1098 |
| IngestDate | Sat Sep 27 20:49:49 EDT 2025 Wed Apr 02 07:25:10 EDT 2025 Sat Nov 29 01:49:26 EST 2025 Tue Nov 18 22:39:59 EST 2025 Fri Feb 23 02:23:46 EST 2024 |
| IsPeerReviewed | true |
| IsScholarly | true |
| Issue | 12 |
| Keywords | Distributed control Resilient control Multi-agent systems Motor car Local network Constrained optimization Resilience Model predictive control Control constraint Multiagent system Distributed algorithm Cryptanalysis Asymptotic approximation Replay attack Denial of service Open ended horizon Formation Computer security State constraint |
| Language | English |
| License | CC BY 4.0 |
| LinkModel | OpenURL |
| MergedId | FETCHMERGED-LOGICAL-c447t-5fde7374d0a145d7794ebee6b0454efd641e5cb3b79ecf5056a2a9bceafedd893 |
| Notes | ObjectType-Article-2 SourceType-Scholarly Journals-1 ObjectType-Feature-1 content type line 23 |
| PQID | 1531015562 |
| PQPubID | 23500 |
| PageCount | 12 |
| ParticipantIDs | proquest_miscellaneous_1531015562 pascalfrancis_primary_27953127 crossref_citationtrail_10_1016_j_automatica_2013_09_031 crossref_primary_10_1016_j_automatica_2013_09_031 elsevier_sciencedirect_doi_10_1016_j_automatica_2013_09_031 |
| PublicationCentury | 2000 |
| PublicationDate | 2013-12-01 |
| PublicationDateYYYYMMDD | 2013-12-01 |
| PublicationDate_xml | – month: 12 year: 2013 text: 2013-12-01 day: 01 |
| PublicationDecade | 2010 |
| PublicationPlace | Kidlington |
| PublicationPlace_xml | – name: Kidlington |
| PublicationTitle | Automatica (Oxford) |
| PublicationYear | 2013 |
| Publisher | Elsevier Ltd Elsevier |
| Publisher_xml | – name: Elsevier Ltd – name: Elsevier |
| References | Teixeira, A., Perez, D., Sandberg, H., & Johansson, K.H. (2012). Attack models and scenarios for networked control systems. In Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In Pasqualetti, F., Carli, R., & Bullo, F. (2011). A distributed method for state estimation and false data detection in power networks. In Gupta, A., Langbort, C., & Basar, T. (2010). Optimal control in the presence of an intelligent jammer with limited actions. In Sundaram, Hadjicostis (br000160) 2011; 56 Alpcan, Basar (br000005) 2011 (pp. 4063–4068) June. Mo, Kim, Brancik, Dickinson, Heejo, Perrig (br000130) 2012; 100 Amin, S., Litrico, X., Sastry, S.S., & Bayen, A.M. (2010). Stealthy deception attacks on water SCADA systems. In Cummings, Bruni, Mercier, Mitchell (br000055) 2007; 1 Gupta, V., Sinopoli, B., Adlakha, S., & Goldsmith, A. (2006). Receding horizon networked control. In Bhattacharya, S., & Basar, T. (2010a). Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In Jiang, T., Matei, I., & Baras, J.S. (2010). A trust based distributed Kalman filtering approach for mode estimation in power systems. In Bertsekas (br000035) 2009 Dunbar, Murray (br000065) 2006; 42 (pp. 1516–1521). Seoul, Korea, July. Tabuada (br000165) 2007; 52 Teal Group Corporation. (pp. 6624–6629). Orlando, FL, USA, December. (pp. 3553–3558). Montreal, Canada, June. Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2011). Risk-sensitive control under a class of denial-of-service attack models. In . (pp. 55–64). Zhu, M., & Martínez, S. (2011b). Stackelberg game analysis of correlated attacks in cyber-physical system. In Pang, Z.H., Liu, G.P., & Dong, Z. (2011). Secure networked control systems under denial of service attacks. In Pasqualetti, Bicchi, Bullo (br000150) 2012; 57 Camacho, Bordons (br000050) 2004 Magni, Scattolini (br000115) 2006; 42 (pp. 818–823). Baltimore, USA, June. Kobayashi, K., & Hiraishi, K. (2012). Self-triggered model predictive control with delay compensation for networked control systems. In Zhu, Martínez (br000190) 2010; 46 Zhu, M., & Martínez, S. (2011a). Attack-resilient distributed formation control via online adaptation. In (pp. 1096–1101). Atlanta, USA, December. Falliere, N., Murchu, L.O., & Chien, E. (2011). W32.stuxnet dossier. In Liu, Mu, Rees, Chai (br000110) 2006; 79 (pp. 8908–8913). Bertsekas, Tsitsiklis (br000030) 1997 (pp. 5991–5998). Atlanta, USA, December. Ferrari-Trecate, Galbusera, Marciandi, Scattolini (br000075) 2009; 54 Mu noz de la Peña, Christofides (br000140) 2008; 53 (pp. 469–474) October. Zaloga, J.S., Rockwell, D., & Finnegan, P. (2008). Amin, Schwartz, Sastry (br000015) 2013; 49 Ding (br000060) 2011; 47 Keviczky, Borrelli, Balas (br000095) 2006; 42 Zhu, M., & Martínez, S. (2012). On distributed resilient consensus against replay attacks in adversarial networks. In Bhattacharya, S., & Basar, T. (2010b). Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer. In (pp. 643–648). San Francisco, USA, June. Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., & Sastry, S.S. (2010). Cyber security analysis of state estimators in electric power systems. In Stockholm, Sweden, April. (pp. 3200–3205). Keviczky, T., & Johansson, K.H. (2008). A study on distributed model predictive consensus. In Theodorakopoulos, Baras (br000180) 2008; 7 Bemporad, Morari, Dua, Pistikopoulos (br000025) 2002; 38 Mayne, Rawlings, Rao, Scokaert (br000120) 2000; 36 (pp. 3560–3565). Atlanta, USA, December. Illinois, USA, September. (pp. 5967–5972). Atlanta, USA, December. (pp. 161–170) Stockholm, Sweden. Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In Bemporad (10.1016/j.automatica.2013.09.031_br000025) 2002; 38 Theodorakopoulos (10.1016/j.automatica.2013.09.031_br000180) 2008; 7 10.1016/j.automatica.2013.09.031_br000125 10.1016/j.automatica.2013.09.031_br000205 10.1016/j.automatica.2013.09.031_br000105 10.1016/j.automatica.2013.09.031_br000045 10.1016/j.automatica.2013.09.031_br000100 Ferrari-Trecate (10.1016/j.automatica.2013.09.031_br000075) 2009; 54 10.1016/j.automatica.2013.09.031_br000145 10.1016/j.automatica.2013.09.031_br000200 Tabuada (10.1016/j.automatica.2013.09.031_br000165) 2007; 52 Camacho (10.1016/j.automatica.2013.09.031_br000050) 2004 Cummings (10.1016/j.automatica.2013.09.031_br000055) 2007; 1 Magni (10.1016/j.automatica.2013.09.031_br000115) 2006; 42 Sundaram (10.1016/j.automatica.2013.09.031_br000160) 2011; 56 Mu noz de la Peña (10.1016/j.automatica.2013.09.031_br000140) 2008; 53 10.1016/j.automatica.2013.09.031_br000085 Bertsekas (10.1016/j.automatica.2013.09.031_br000030) 1997 10.1016/j.automatica.2013.09.031_br000040 Mayne (10.1016/j.automatica.2013.09.031_br000120) 2000; 36 Alpcan (10.1016/j.automatica.2013.09.031_br000005) 2011 10.1016/j.automatica.2013.09.031_br000020 10.1016/j.automatica.2013.09.031_br000185 10.1016/j.automatica.2013.09.031_br000080 Keviczky (10.1016/j.automatica.2013.09.031_br000095) 2006; 42 Liu (10.1016/j.automatica.2013.09.031_br000110) 2006; 79 10.1016/j.automatica.2013.09.031_br000155 Bertsekas (10.1016/j.automatica.2013.09.031_br000035) 2009 10.1016/j.automatica.2013.09.031_br000135 Zhu (10.1016/j.automatica.2013.09.031_br000190) 2010; 46 10.1016/j.automatica.2013.09.031_br000090 Pasqualetti (10.1016/j.automatica.2013.09.031_br000150) 2012; 57 Amin (10.1016/j.automatica.2013.09.031_br000015) 2013; 49 Ding (10.1016/j.automatica.2013.09.031_br000060) 2011; 47 Dunbar (10.1016/j.automatica.2013.09.031_br000065) 2006; 42 10.1016/j.automatica.2013.09.031_br000195 10.1016/j.automatica.2013.09.031_br000010 10.1016/j.automatica.2013.09.031_br000175 10.1016/j.automatica.2013.09.031_br000070 Mo (10.1016/j.automatica.2013.09.031_br000130) 2012; 100 10.1016/j.automatica.2013.09.031_br000170 |
| References_xml | – year: 2009 ident: br000035 article-title: Convex optimization theory – reference: Teixeira, A., Amin, S., Sandberg, H., Johansson, K.H., & Sastry, S.S. (2010). Cyber security analysis of state estimators in electric power systems. In – reference: (pp. 818–823). Baltimore, USA, June. – reference: Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In – reference: (pp. 3200–3205). – volume: 38 start-page: 3 year: 2002 end-page: 20 ident: br000025 article-title: The explicit linear quadratic regulator for constrained systems publication-title: Automatica – reference: Kobayashi, K., & Hiraishi, K. (2012). Self-triggered model predictive control with delay compensation for networked control systems. In – reference: (pp. 3560–3565). Atlanta, USA, December. – reference: , Stockholm, Sweden, April. – reference: (pp. 5991–5998). Atlanta, USA, December. – reference: (pp. 8908–8913). – year: 2004 ident: br000050 article-title: Model predictive control – reference: Amin, S., Litrico, X., Sastry, S.S., & Bayen, A.M. (2010). Stealthy deception attacks on water SCADA systems. In – reference: Gupta, A., Langbort, C., & Basar, T. (2010). Optimal control in the presence of an intelligent jammer with limited actions. In – volume: 100 start-page: 215 year: 2012 ident: br000130 article-title: Cyber-physical security of a smart grid infrastructure publication-title: Proceedings of the IEEE – reference: (pp. 5967–5972). Atlanta, USA, December. – year: 2011 ident: br000005 article-title: Network security: a decision and game theoretic approach – reference: Mo, Y., & Sinopoli, B. (2009). Secure control against replay attacks. In – reference: Bhattacharya, S., & Basar, T. (2010a). Game-theoretic analysis of an aerial jamming attack on a UAV communication network. In – reference: Teixeira, A., Perez, D., Sandberg, H., & Johansson, K.H. (2012). Attack models and scenarios for networked control systems. In – reference: (pp. 3553–3558). Montreal, Canada, June. – reference: (pp. 1096–1101). Atlanta, USA, December. – volume: 49 start-page: 186 year: 2013 end-page: 192 ident: br000015 article-title: Security of interdependent and identical networked control systems publication-title: Automatica – volume: 42 start-page: 549 year: 2006 end-page: 558 ident: br000065 article-title: Distributed receding horizon control for multi-vehicle formation stabilization publication-title: Automatica – volume: 56 start-page: 1731 year: 2011 end-page: 1742 ident: br000160 article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents publication-title: IEEE Transactions on Automatic Control – reference: (pp. 55–64). – year: 1997 ident: br000030 article-title: Parallel and distributed computation: numerical methods – volume: 36 start-page: 789 year: 2000 end-page: 814 ident: br000120 article-title: Constrained model predictive control: stability and optimality publication-title: Automatica – volume: 46 start-page: 322 year: 2010 end-page: 329 ident: br000190 article-title: Discrete-time dynamic average consensus publication-title: Automatica – volume: 54 start-page: 2560 year: 2009 end-page: 2572 ident: br000075 article-title: Model predictive control schemes for consensus in multi-agent systems with single- and double- integrator dynamics publication-title: IEEE Transactions on Automatic Control – reference: (pp. 643–648). San Francisco, USA, June. – reference: , Illinois, USA, September. – volume: 53 start-page: 2076 year: 2008 end-page: 2089 ident: br000140 article-title: Lyapunov-based model predictive control of nonlinear systems subject to data losses publication-title: IEEE Transactions on Automatic Control – reference: Zhu, M., & Martínez, S. (2012). On distributed resilient consensus against replay attacks in adversarial networks. In – reference: . Illinois, USA, September. – reference: (pp. 4063–4068) June. – reference: Falliere, N., Murchu, L.O., & Chien, E. (2011). W32.stuxnet dossier. In – volume: 47 start-page: 2526 year: 2011 end-page: 2533 ident: br000060 article-title: Stabilization of linear systems over networks with bounded packet loss and its use in model predictive control publication-title: Automatica – reference: Pang, Z.H., Liu, G.P., & Dong, Z. (2011). Secure networked control systems under denial of service attacks. In – reference: Zaloga, J.S., Rockwell, D., & Finnegan, P. (2008). – volume: 57 start-page: 90 year: 2012 end-page: 104 ident: br000150 article-title: Consensus computation in unreliable networks: a system theoretic approach publication-title: IEEE Transactions on Automatic Control – reference: Keviczky, T., & Johansson, K.H. (2008). A study on distributed model predictive consensus. In – reference: (pp. 6624–6629). Orlando, FL, USA, December. – reference: Gupta, V., Sinopoli, B., Adlakha, S., & Goldsmith, A. (2006). Receding horizon networked control. In – reference: (pp. 161–170) Stockholm, Sweden. – reference: Zhu, M., & Martínez, S. (2011b). Stackelberg game analysis of correlated attacks in cyber-physical system. In – reference: Zhu, M., & Martínez, S. (2011a). Attack-resilient distributed formation control via online adaptation. In – reference: Jiang, T., Matei, I., & Baras, J.S. (2010). A trust based distributed Kalman filtering approach for mode estimation in power systems. In – reference: Pasqualetti, F., Carli, R., & Bullo, F. (2011). A distributed method for state estimation and false data detection in power networks. In – volume: 79 start-page: 288 year: 2006 end-page: 297 ident: br000110 article-title: Design and stability analysis of networked control systems with random communication time delay using the modified MPC publication-title: International Journal of Control – volume: 7 start-page: 1317 year: 2008 end-page: 1327 ident: br000180 article-title: Game theoretic modeling of malicious users in collaborative networks publication-title: IEEE Journal on Selected Areas in Communications – reference: . – reference: Befekadu, G. K., Gupta, V., & Antsaklis, P. J. (2011). Risk-sensitive control under a class of denial-of-service attack models. In – volume: 1 year: 2007 ident: br000055 article-title: Automation arquitecture for single operator, multiple UAV command and control publication-title: International Journal of Command and Control – volume: 52 start-page: 1680 year: 2007 end-page: 1685 ident: br000165 article-title: Event-triggered real-time scheduling of stabilizing control tasks publication-title: IEEE Transactions on Automatic Control – reference: . Teal Group Corporation. – reference: (pp. 469–474) October. – reference: Bhattacharya, S., & Basar, T. (2010b). Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer. In – volume: 42 start-page: 2105 year: 2006 end-page: 2115 ident: br000095 article-title: Decentralized receding horizon control for large scale dynamically decoupled systems publication-title: Automatica – volume: 42 start-page: 1231 year: 2006 end-page: 1236 ident: br000115 article-title: Stabilizing decentralized model predictive control of nonlinear systems publication-title: Automatica – reference: (pp. 1516–1521). Seoul, Korea, July. – year: 2004 ident: 10.1016/j.automatica.2013.09.031_br000050 – volume: 46 start-page: 322 issue: 2 year: 2010 ident: 10.1016/j.automatica.2013.09.031_br000190 article-title: Discrete-time dynamic average consensus publication-title: Automatica doi: 10.1016/j.automatica.2009.10.021 – ident: 10.1016/j.automatica.2013.09.031_br000135 doi: 10.1109/ALLERTON.2009.5394956 – volume: 7 start-page: 1317 year: 2008 ident: 10.1016/j.automatica.2013.09.031_br000180 article-title: Game theoretic modeling of malicious users in collaborative networks publication-title: IEEE Journal on Selected Areas in Communications doi: 10.1109/JSAC.2008.080928 – ident: 10.1016/j.automatica.2013.09.031_br000040 doi: 10.1109/ACC.2010.5530755 – ident: 10.1016/j.automatica.2013.09.031_br000010 – volume: 100 start-page: 215 issue: 195–209 year: 2012 ident: 10.1016/j.automatica.2013.09.031_br000130 article-title: Cyber-physical security of a smart grid infrastructure publication-title: Proceedings of the IEEE – volume: 79 start-page: 288 issue: 4 year: 2006 ident: 10.1016/j.automatica.2013.09.031_br000110 article-title: Design and stability analysis of networked control systems with random communication time delay using the modified MPC publication-title: International Journal of Control doi: 10.1080/00207170500533288 – volume: 42 start-page: 549 issue: 4 year: 2006 ident: 10.1016/j.automatica.2013.09.031_br000065 article-title: Distributed receding horizon control for multi-vehicle formation stabilization publication-title: Automatica doi: 10.1016/j.automatica.2005.12.008 – ident: 10.1016/j.automatica.2013.09.031_br000100 doi: 10.3182/20080706-5-KR-1001.00259 – volume: 42 start-page: 1231 issue: 7 year: 2006 ident: 10.1016/j.automatica.2013.09.031_br000115 article-title: Stabilizing decentralized model predictive control of nonlinear systems publication-title: Automatica doi: 10.1016/j.automatica.2006.02.010 – volume: 47 start-page: 2526 issue: 9 year: 2011 ident: 10.1016/j.automatica.2013.09.031_br000060 article-title: Stabilization of linear systems over networks with bounded packet loss and its use in model predictive control publication-title: Automatica doi: 10.1016/j.automatica.2011.08.038 – ident: 10.1016/j.automatica.2013.09.031_br000045 doi: 10.1109/CDC.2010.5717917 – volume: 36 start-page: 789 year: 2000 ident: 10.1016/j.automatica.2013.09.031_br000120 article-title: Constrained model predictive control: stability and optimality publication-title: Automatica doi: 10.1016/S0005-1098(99)00214-9 – ident: 10.1016/j.automatica.2013.09.031_br000125 doi: 10.1109/CDC.2010.5718158 – ident: 10.1016/j.automatica.2013.09.031_br000085 – volume: 42 start-page: 2105 issue: 12 year: 2006 ident: 10.1016/j.automatica.2013.09.031_br000095 article-title: Decentralized receding horizon control for large scale dynamically decoupled systems publication-title: Automatica doi: 10.1016/j.automatica.2006.07.008 – year: 2011 ident: 10.1016/j.automatica.2013.09.031_br000005 – volume: 38 start-page: 3 year: 2002 ident: 10.1016/j.automatica.2013.09.031_br000025 article-title: The explicit linear quadratic regulator for constrained systems publication-title: Automatica doi: 10.1016/S0005-1098(01)00174-1 – ident: 10.1016/j.automatica.2013.09.031_br000195 doi: 10.1109/CDC.2011.6161327 – ident: 10.1016/j.automatica.2013.09.031_br000145 doi: 10.3182/20110828-6-IT-1002.02862 – ident: 10.1016/j.automatica.2013.09.031_br000185 – year: 1997 ident: 10.1016/j.automatica.2013.09.031_br000030 – volume: 52 start-page: 1680 issue: 9 year: 2007 ident: 10.1016/j.automatica.2013.09.031_br000165 article-title: Event-triggered real-time scheduling of stabilizing control tasks publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2007.904277 – volume: 54 start-page: 2560 issue: 11 year: 2009 ident: 10.1016/j.automatica.2013.09.031_br000075 article-title: Model predictive control schemes for consensus in multi-agent systems with single- and double- integrator dynamics publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2009.2031208 – ident: 10.1016/j.automatica.2013.09.031_br000105 doi: 10.1109/IECON.2012.6389386 – ident: 10.1016/j.automatica.2013.09.031_br000200 – ident: 10.1016/j.automatica.2013.09.031_br000020 doi: 10.1109/ACC.2011.5991188 – ident: 10.1016/j.automatica.2013.09.031_br000070 – ident: 10.1016/j.automatica.2013.09.031_br000080 doi: 10.1109/CDC.2010.5717544 – year: 2009 ident: 10.1016/j.automatica.2013.09.031_br000035 – volume: 53 start-page: 2076 issue: 9 year: 2008 ident: 10.1016/j.automatica.2013.09.031_br000140 article-title: Lyapunov-based model predictive control of nonlinear systems subject to data losses publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2008.929401 – ident: 10.1016/j.automatica.2013.09.031_br000090 – ident: 10.1016/j.automatica.2013.09.031_br000155 doi: 10.1109/SmartGridComm.2011.6102368 – ident: 10.1016/j.automatica.2013.09.031_br000205 – volume: 1 issue: 2 year: 2007 ident: 10.1016/j.automatica.2013.09.031_br000055 article-title: Automation arquitecture for single operator, multiple UAV command and control publication-title: International Journal of Command and Control – volume: 56 start-page: 1731 issue: 7 year: 2011 ident: 10.1016/j.automatica.2013.09.031_br000160 article-title: Distributed function calculation via linear iterative strategies in the presence of malicious agents publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2010.2088690 – volume: 57 start-page: 90 issue: 1 year: 2012 ident: 10.1016/j.automatica.2013.09.031_br000150 article-title: Consensus computation in unreliable networks: a system theoretic approach publication-title: IEEE Transactions on Automatic Control doi: 10.1109/TAC.2011.2158130 – ident: 10.1016/j.automatica.2013.09.031_br000175 doi: 10.1145/2185505.2185515 – ident: 10.1016/j.automatica.2013.09.031_br000170 doi: 10.1109/CDC.2010.5717318 – volume: 49 start-page: 186 issue: 1 year: 2013 ident: 10.1016/j.automatica.2013.09.031_br000015 article-title: Security of interdependent and identical networked control systems publication-title: Automatica doi: 10.1016/j.automatica.2012.09.007 |
| SSID | ssj0004182 |
| Score | 2.405055 |
| Snippet | We consider an operator–vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to... We consider an operator-vehicle network where each vehicle is remotely maneuvered by an operator. The objective of the operators is to steer the vehicles to... |
| SourceID | proquest pascalfrancis crossref elsevier |
| SourceType | Aggregation Database Index Database Enrichment Source Publisher |
| StartPage | 3571 |
| SubjectTerms | Algorithms Applied sciences Asymptotic properties Commands Computer science; control theory; systems Computer systems and distributed systems. User interface Constraints Control theory. Systems Distributed control Exact sciences and technology Memory and file management (including protection and security) Memory organisation. Data processing Multi-agent systems Networks Operators Resilience Resilient control Robotics Software Vehicles |
| Title | On distributed constrained formation control in operator–vehicle adversarial networks |
| URI | https://dx.doi.org/10.1016/j.automatica.2013.09.031 https://www.proquest.com/docview/1531015562 |
| Volume | 49 |
| WOSCitedRecordID | wos000327917500008&url=https%3A%2F%2Fcvtisr.summon.serialssolutions.com%2F%23%21%2Fsearch%3Fho%3Df%26include.ft.matches%3Dt%26l%3Dnull%26q%3D |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| journalDatabaseRights | – providerCode: PRVESC databaseName: Elsevier SD Freedom Collection Journals 2021 customDbUrl: eissn: 1873-2836 dateEnd: 99991231 omitProxy: false ssIdentifier: ssj0004182 issn: 0005-1098 databaseCode: AIEXJ dateStart: 19950101 isFulltext: true titleUrlDefault: https://www.sciencedirect.com providerName: Elsevier |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwtV3di9QwEA-654Mi4ieuekcE8a3Q7zT4tMged8exK7gLiy8hbVN3jyNbr9tj_3xnmvRDPWF98KWU0rQkM5nMZH75DSEfOI9UmEjP4TyMnDD2YieNUulIWCswjcS4TJpiE2w2S1Yr_sVWRa2acgJM62S_5-V_FTU8A2Hj0dl_EHf3UXgA9yB0uILY4XqQ4Ocasy6mkJXCM2vIEQvxP9x3JxU7hPoGvMVSNal251at8VsICwCfUDblPLRBiVdDH3ZS77YN0atsuEr3Bh7fbSh8W9cGj6-_r-tNv-ONdAVmu_or2BE53G7wggF0ozWhSF1qSke3JtSwjraq4g8MYhCZCit2ccVzuXcabrOHcIWwHdsFhN0FhoPW6xerNkE_m4vT5eWlWExXi4_lDwfLiGG63dZUuU-OfBbxZESOJufT1UV_VNZLDIG87YUFdxnI390__5vH8riUFcyjwhRA-WMtbxyUxVPyxEYWdGI04hm5p_Rz8mjAN_mCLOeaDnSDDnSDdrpBrW7Qjaa_6wYd6AZtdeMlWZ5OF5_PHFtXw8nCkO2cqMgVC1iYu9ILo5yBSYaprOIU6RhVkcehp6IsDVLGVVagiyx9ydNMyULlOTi4r8hIb7V6TWhSQHgAEXyRu0HoJnkCL8RFIKXrKp8X_piwduxEZknnsV_XokUXXol-1AWOunC5gFEfE69rWRrilQPafGrFI6wDaRxDAWp2QOuTXyTa_dZnHFYqn43J-1bEAowwZtakVtu6EuA2eBh8xP6bA955Sx72M-sdGe1uanVMHmS3u011c2I19ifIlq97 |
| linkProvider | Elsevier |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=On+distributed+constrained+formation+control+in+operator-vehicle+adversarial+networks&rft.jtitle=Automatica+%28Oxford%29&rft.au=Zhu%2C+Minghui&rft.au=Martinez%2C+Sonia&rft.date=2013-12-01&rft.issn=0005-1098&rft.volume=49&rft.issue=12&rft.spage=3571&rft.epage=3582&rft_id=info:doi/10.1016%2Fj.automatica.2013.09.031&rft.externalDBID=NO_FULL_TEXT |
| thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0005-1098&client=summon |
| thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0005-1098&client=summon |
| thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0005-1098&client=summon |