Detection of Cyber Attacks on Leader-Following Multi-Agent Systems

This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following co...

Celý popis

Uložené v:
Podrobná bibliografia
Vydané v:IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society Ročník 1; s. 6243 - 6248
Hlavní autori: Mousavinejad, Eman, Ge, Xiaohua, Han, Qing-Long, Yang, Fuwen, Vlacic, Ljubo
Médium: Konferenčný príspevok..
Jazyk:English
Vydavateľské údaje: IEEE 01.10.2019
Predmet:
ISSN:2577-1647
On-line prístup:Získať plný text
Tagy: Pridať tag
Žiadne tagy, Buďte prvý, kto otaguje tento záznam!
Abstract This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following consensus. An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence. The core of the algorithm lies in a set-membership filtering approach from which each designed filter can provide an ellipsoidal state prediction set and an ellipsoidal state estimation set. Whether a filter can detect the occurrence of such an attack is then determined by the existence of intersection between these two sets. Furthermore, a convex optimization algorithm is established to solve out anticipated consensus protocol and two-step set-membership filter by resorting to some recursive linear matrix inequalities. Finally, an illustrative example is given to show the effectiveness of the proposed main results.
AbstractList This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following consensus. An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence. The core of the algorithm lies in a set-membership filtering approach from which each designed filter can provide an ellipsoidal state prediction set and an ellipsoidal state estimation set. Whether a filter can detect the occurrence of such an attack is then determined by the existence of intersection between these two sets. Furthermore, a convex optimization algorithm is established to solve out anticipated consensus protocol and two-step set-membership filter by resorting to some recursive linear matrix inequalities. Finally, an illustrative example is given to show the effectiveness of the proposed main results.
Author Yang, Fuwen
Mousavinejad, Eman
Han, Qing-Long
Vlacic, Ljubo
Ge, Xiaohua
Author_xml – sequence: 1
  givenname: Eman
  surname: Mousavinejad
  fullname: Mousavinejad, Eman
  organization: Griffith School of Engineering, Griffith University,Gold Coast,Qld,Australia,4222
– sequence: 2
  givenname: Xiaohua
  surname: Ge
  fullname: Ge, Xiaohua
  organization: School of Software and Electrical Engineering, Swinburne University of Technology,Melbourne,Vic,Australia,3122
– sequence: 3
  givenname: Qing-Long
  surname: Han
  fullname: Han, Qing-Long
  organization: School of Software and Electrical Engineering, Swinburne University of Technology,Melbourne,Vic,Australia,3122
– sequence: 4
  givenname: Fuwen
  surname: Yang
  fullname: Yang, Fuwen
  organization: Griffith School of Engineering, Griffith University,Gold Coast,Qld,Australia,4222
– sequence: 5
  givenname: Ljubo
  surname: Vlacic
  fullname: Vlacic, Ljubo
  organization: Griffith School of Engineering, Griffith University,Gold Coast,Qld,Australia,4222
BookMark eNotj81Kw0AYAFdRsK19Ab3sCyR-u9nfY4ytFqI9qOey2Xwpi2ki2RXp21uwp4E5DMycXA3jgITcMcgZA_uwWVXbt5wDs7mxXDMrL8icaW6YMNrwSzLjUuuMKaFvyDLG0IDgQgNINSOPT5jQpzAOdOxodWxwomVKzn9FenI1uhanbD32_fgbhj19_elTyMo9Dom-H2PCQ7wl153rIy7PXJDP9eqjesnq7fOmKussMMVl5k3LEaCRJ0KrfFdY7XwBzhSt9ai6hoFgjRLcAgfTCNM6KZVHoYwrEIsFuf_vBkTcfU_h4Kbj7rxc_AF8vEve
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/IECON.2019.8927195
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 1728148782
9781728148786
EISSN 2577-1647
EndPage 6248
ExternalDocumentID 8927195
Genre orig-research
GroupedDBID 6IE
6IH
ALMA_UNASSIGNED_HOLDINGS
CBEJK
M43
RIE
RIO
ID FETCH-LOGICAL-i1625-c8d2e00b58d20d6cf397ac30a83d9ce6fb1041b64290208b48da556ce468a3ee3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:42:12 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly false
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i1625-c8d2e00b58d20d6cf397ac30a83d9ce6fb1041b64290208b48da556ce468a3ee3
OpenAccessLink http://hdl.handle.net/10072/392669
PageCount 6
ParticipantIDs ieee_primary_8927195
PublicationCentury 2000
PublicationDate 2019-Oct.
PublicationDateYYYYMMDD 2019-10-01
PublicationDate_xml – month: 10
  year: 2019
  text: 2019-Oct.
PublicationDecade 2010
PublicationTitle IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society
PublicationTitleAbbrev IECON
PublicationYear 2019
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib042470056
Score 1.7277877
Snippet This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and...
SourceID ieee
SourceType Publisher
StartPage 6243
SubjectTerms Cyber attack detection
Cyberattack
Ellipsoids
Filtering
leader-following consensus
multi-agent systems (MASs)
Noise measurement
Protocols
quantization
Quantization (signal)
set-membership filtering
State estimation
Title Detection of Cyber Attacks on Leader-Following Multi-Agent Systems
URI https://ieeexplore.ieee.org/document/8927195
Volume 1
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1LSwMxEB7a4sGTSiu-ycGjsdvN-1irRS-lB4Xeym4ygV52pW4r_nuT3W1F8OIpYSCEPODLZOabD-BWeY3MaE8xYCvljOc0M2gpk14YnjqpW7EJNZvpxcLMO3C358IgYp18hvexW8fyXWk38atsqE2qRkZ0oauUbLhau7vDU65iWcsdLyYxw5coBRiTt8JtaAb-UlCpAWR69L-pj2Hww8Qj8z3GnEAHiz48PGJVZ1AVpPRk8pXjmoyrKrLlSbA1qpl0Gk64_AyjSE2ypeNIoiJthfIBvE2fXifPtNVCoKtRcFGo1S7FJMlFaBMnrQ_viMyyJNPMGYvS58GvGuXBmzBRdjPn2mVCSItc6owhslPoFWWBZ0BUnghrGHNoAzRZFzDKe2u0jDEZL_g59OP6l-9NuYtlu_SLv82XcBi3uMlvu4Jetd7gNRzYbbX6WN_UZ_QNJkCSSg
linkProvider IEEE
linkToHtml http://cvtisr.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwlV1NSwMxEB1qFfSk0orf5uDR2O0m2U2OtVparKWHCr2V3WQCvexK3Sr-e5PdbUXw4ilhIIR8wMtk5s0DuI2tRKakpeiwlXLGU5oo1JRFVigemkjWYhPxZCLnczVtwN2WC4OIZfIZ3vtuGcs3uV77r7KOVGHcVWIHdgXnYVCxtTa3h4c89oUtN8yYQHVGXgzQp2-5-1AN_aWhUkLI4PB_kx9B-4eLR6ZblDmGBmYteHjEosyhykhuSf8rxRXpFYXnyxNnq3Qz6cCdcf7pRpGSZkt7nkZF6hrlbXgdPM36Q1qrIdBl1zkpVEsTYhCkwrWBibR1L4lEsyCRzCiNkU2dZ9VNnT-hvPBmyqVJhIg08kgmDJGdQDPLMzwFEqeB0Ioxg9qBkzYOpazVSkY-KmMFP4OWX__irSp4saiXfv63-Qb2h7OX8WI8mjxfwIHf7irb7RKaxWqNV7CnP4rl--q6PK9v9G2VkQ
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=IECON+2019+-+45th+Annual+Conference+of+the+IEEE+Industrial+Electronics+Society&rft.atitle=Detection+of+Cyber+Attacks+on+Leader-Following+Multi-Agent+Systems&rft.au=Mousavinejad%2C+Eman&rft.au=Ge%2C+Xiaohua&rft.au=Han%2C+Qing-Long&rft.au=Yang%2C+Fuwen&rft.date=2019-10-01&rft.pub=IEEE&rft.eissn=2577-1647&rft.volume=1&rft.spage=6243&rft.epage=6248&rft_id=info:doi/10.1109%2FIECON.2019.8927195&rft.externalDocID=8927195