Cooperative Systems in Presence of Cyber-Attacks: A Unified Framework for Resilient Control and Attack Identification

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

30 Downloads (Pure)


This paper considers a cooperative control problem in presence of unknown attacks. The attacker aims at destabilizing the consensus dynamics by intercepting the system’s communication network and corrupting its local state feedback. We first revisit the virtual network based resilient control proposed in our previous work and provide a new interpretation and insights into its implementation. Based on these insights, a novel distributed algorithm is presented to detect and identify the compromised communication links. It is shown that it is not possible for the adversary to launch a harmful and stealthy attack by only manipulating the physical states being exchanged via the network. In addition, a new virtual network is proposed which makes it more difficult for the adversary to launch a stealthy attack even though it is also able to manipulate information being exchanged via the virtual network. A numerical example demonstrates that the proposed control framework achieves simultaneously resilient operation and real-time attack identification.
Original languageEnglish
Title of host publication2022 American Control Conference (ACC)
Number of pages6
ISBN (Electronic)978-1-6654-5196-3
ISBN (Print)978-1-6654-9480-9
Publication statusPublished - 2022
Publication typeA4 Article in conference proceedings
EventAmerican Control Conference - Atlanta, United States
Duration: 8 Jun 202210 Jun 2022

Publication series

NameProceedings of the American Control Conference
ISSN (Print)0743-1619
ISSN (Electronic)2378-5861


ConferenceAmerican Control Conference
Abbreviated titleACC
Country/TerritoryUnited States

Publication forum classification

  • Publication forum level 1


Dive into the research topics of 'Cooperative Systems in Presence of Cyber-Attacks: A Unified Framework for Resilient Control and Attack Identification'. Together they form a unique fingerprint.

Cite this