Detection of Cyber Attacks on Leader-Following Multi-Agent Systems
This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following co...
Uložené v:
| Vydané v: | IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society Ročník 1; s. 6243 - 6248 |
|---|---|
| Hlavní autori: | , , , , |
| Médium: | Konferenčný príspevok.. |
| Jazyk: | English |
| Vydavateľské údaje: |
IEEE
01.10.2019
|
| Predmet: | |
| ISSN: | 2577-1647 |
| On-line prístup: | Získať plný text |
| Tagy: |
Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
|
| Abstract | This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following consensus. An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence. The core of the algorithm lies in a set-membership filtering approach from which each designed filter can provide an ellipsoidal state prediction set and an ellipsoidal state estimation set. Whether a filter can detect the occurrence of such an attack is then determined by the existence of intersection between these two sets. Furthermore, a convex optimization algorithm is established to solve out anticipated consensus protocol and two-step set-membership filter by resorting to some recursive linear matrix inequalities. Finally, an illustrative example is given to show the effectiveness of the proposed main results. |
|---|---|
| AbstractList | This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following consensus. An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence. The core of the algorithm lies in a set-membership filtering approach from which each designed filter can provide an ellipsoidal state prediction set and an ellipsoidal state estimation set. Whether a filter can detect the occurrence of such an attack is then determined by the existence of intersection between these two sets. Furthermore, a convex optimization algorithm is established to solve out anticipated consensus protocol and two-step set-membership filter by resorting to some recursive linear matrix inequalities. Finally, an illustrative example is given to show the effectiveness of the proposed main results. |
| Author | Yang, Fuwen Mousavinejad, Eman Han, Qing-Long Vlacic, Ljubo Ge, Xiaohua |
| Author_xml | – sequence: 1 givenname: Eman surname: Mousavinejad fullname: Mousavinejad, Eman organization: Griffith School of Engineering, Griffith University,Gold Coast,Qld,Australia,4222 – sequence: 2 givenname: Xiaohua surname: Ge fullname: Ge, Xiaohua organization: School of Software and Electrical Engineering, Swinburne University of Technology,Melbourne,Vic,Australia,3122 – sequence: 3 givenname: Qing-Long surname: Han fullname: Han, Qing-Long organization: School of Software and Electrical Engineering, Swinburne University of Technology,Melbourne,Vic,Australia,3122 – sequence: 4 givenname: Fuwen surname: Yang fullname: Yang, Fuwen organization: Griffith School of Engineering, Griffith University,Gold Coast,Qld,Australia,4222 – sequence: 5 givenname: Ljubo surname: Vlacic fullname: Vlacic, Ljubo organization: Griffith School of Engineering, Griffith University,Gold Coast,Qld,Australia,4222 |
| BookMark | eNotj81Kw0AYAFdRsK19Ab3sCyR-u9nfY4ytFqI9qOey2Xwpi2ki2RXp21uwp4E5DMycXA3jgITcMcgZA_uwWVXbt5wDs7mxXDMrL8icaW6YMNrwSzLjUuuMKaFvyDLG0IDgQgNINSOPT5jQpzAOdOxodWxwomVKzn9FenI1uhanbD32_fgbhj19_elTyMo9Dom-H2PCQ7wl153rIy7PXJDP9eqjesnq7fOmKussMMVl5k3LEaCRJ0KrfFdY7XwBzhSt9ai6hoFgjRLcAgfTCNM6KZVHoYwrEIsFuf_vBkTcfU_h4Kbj7rxc_AF8vEve |
| ContentType | Conference Proceeding |
| DBID | 6IE 6IH CBEJK RIE RIO |
| DOI | 10.1109/IECON.2019.8927195 |
| DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
| DatabaseTitleList | |
| Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://ieeexplore.ieee.org/ sourceTypes: Publisher |
| DeliveryMethod | fulltext_linktorsrc |
| EISBN | 1728148782 9781728148786 |
| EISSN | 2577-1647 |
| EndPage | 6248 |
| ExternalDocumentID | 8927195 |
| Genre | orig-research |
| GroupedDBID | 6IE 6IH ALMA_UNASSIGNED_HOLDINGS CBEJK M43 RIE RIO |
| ID | FETCH-LOGICAL-i1625-c8d2e00b58d20d6cf397ac30a83d9ce6fb1041b64290208b48da556ce468a3ee3 |
| IEDL.DBID | RIE |
| IngestDate | Wed Aug 27 02:42:12 EDT 2025 |
| IsDoiOpenAccess | false |
| IsOpenAccess | true |
| IsPeerReviewed | false |
| IsScholarly | false |
| Language | English |
| LinkModel | DirectLink |
| MergedId | FETCHMERGED-LOGICAL-i1625-c8d2e00b58d20d6cf397ac30a83d9ce6fb1041b64290208b48da556ce468a3ee3 |
| OpenAccessLink | http://hdl.handle.net/10072/392669 |
| PageCount | 6 |
| ParticipantIDs | ieee_primary_8927195 |
| PublicationCentury | 2000 |
| PublicationDate | 2019-Oct. |
| PublicationDateYYYYMMDD | 2019-10-01 |
| PublicationDate_xml | – month: 10 year: 2019 text: 2019-Oct. |
| PublicationDecade | 2010 |
| PublicationTitle | IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society |
| PublicationTitleAbbrev | IECON |
| PublicationYear | 2019 |
| Publisher | IEEE |
| Publisher_xml | – name: IEEE |
| SSID | ssib042470056 |
| Score | 1.7277877 |
| Snippet | This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and... |
| SourceID | ieee |
| SourceType | Publisher |
| StartPage | 6243 |
| SubjectTerms | Cyber attack detection Cyberattack Ellipsoids Filtering leader-following consensus multi-agent systems (MASs) Noise measurement Protocols quantization Quantization (signal) set-membership filtering State estimation |
| Title | Detection of Cyber Attacks on Leader-Following Multi-Agent Systems |
| URI | https://ieeexplore.ieee.org/document/8927195 |
| Volume | 1 |
| hasFullText | 1 |
| inHoldings | 1 |
| isFullTextHit | |
| isPrint | |
| link | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB7a4sGTSiu-ycGjsdvN-1irRS-lB4Xeym4ygV52pW4r_nuT3W1F8OIpYSCEPODLZOabD-BWeY3MaE8xYCvljOc0M2gpk14YnjqpW7EJNZvpxcLMO3C358IgYp18hvexW8fyXWk38atsqE2qRkZ0oauUbLhau7vDU65iWcsdLyYxw5coBRiTt8JtaAb-UlCpAWR69L-pj2Hww8Qj8z3GnEAHiz48PGJVZ1AVpPRk8pXjmoyrKrLlSbA1qpl0Gk64_AyjSE2ypeNIoiJthfIBvE2fXifPtNVCoKtRcFGo1S7FJMlFaBMnrQ_viMyyJNPMGYvS58GvGuXBmzBRdjPn2mVCSItc6owhslPoFWWBZ0BUnghrGHNoAzRZFzDKe2u0jDEZL_g59OP6l-9NuYtlu_SLv82XcBi3uMlvu4Jetd7gNRzYbbX6WN_UZ_QNJkCSSg |
| linkProvider | IEEE |
| linkToHtml | http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEB1qFfSk0orf5uDR2O0m2U2OtVparKWHCr2V3WQCvexK3Sr-e5PdbUXw4ilhIIR8wMtk5s0DuI2tRKakpeiwlXLGU5oo1JRFVigemkjWYhPxZCLnczVtwN2WC4OIZfIZ3vtuGcs3uV77r7KOVGHcVWIHdgXnYVCxtTa3h4c89oUtN8yYQHVGXgzQp2-5-1AN_aWhUkLI4PB_kx9B-4eLR6ZblDmGBmYteHjEosyhykhuSf8rxRXpFYXnyxNnq3Qz6cCdcf7pRpGSZkt7nkZF6hrlbXgdPM36Q1qrIdBl1zkpVEsTYhCkwrWBibR1L4lEsyCRzCiNkU2dZ9VNnT-hvPBmyqVJhIg08kgmDJGdQDPLMzwFEqeB0Ioxg9qBkzYOpazVSkY-KmMFP4OWX__irSp4saiXfv63-Qb2h7OX8WI8mjxfwIHf7irb7RKaxWqNV7CnP4rl--q6PK9v9G2VkQ |
| openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IECON+2019+-+45th+Annual+Conference+of+the+IEEE+Industrial+Electronics+Society&rft.atitle=Detection+of+Cyber+Attacks+on+Leader-Following+Multi-Agent+Systems&rft.au=Mousavinejad%2C+Eman&rft.au=Ge%2C+Xiaohua&rft.au=Han%2C+Qing-Long&rft.au=Yang%2C+Fuwen&rft.date=2019-10-01&rft.pub=IEEE&rft.eissn=2577-1647&rft.volume=1&rft.spage=6243&rft.epage=6248&rft_id=info:doi/10.1109%2FIECON.2019.8927195&rft.externalDocID=8927195 |