Resilient Design of Continuous-time Distributed Optimization Algorithm in the Presence of Cyber-attacks: 22nd IFAC World Congress

Muhammad Iqbal, Zhihua Qu, Azwirman Gusrialdi

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

4 Citations (Scopus)
19 Downloads (Pure)

Abstract

This paper presents a continuous-time resilient distributed optimization algorithm based on competitive interaction design method on connected graphs in the presence of adversaries. The competitive interaction method allows us to design a network that protects the multi-agent systems from adversaries without requiring high network connectivity. In addition, the proposed algorithm does not require the global information about the number of adversaries. First, we show that the proposed distributed algorithm solves the resilient distributed optimization problem with no attack on the communication links. Second, we show that the proposed continuous-time distributed optimization algorithm on connected graphs converges to the small neighborhood of the optimal solution in the presence of cyber-attacks onto the communication channel. Simulations are presented to illustrate our theoretical results.
Original languageEnglish
Title of host publication22 nd IFAC World Congress
EditorsHideaki Ishii, Yoshio Ebihara, Jun-ichi Imura, Masaki Yamakita
PublisherElsevier
Pages5907-5912
Number of pages6
Volume56
Edition2
DOIs
Publication statusPublished - 2023
Publication typeA4 Article in conference proceedings
EventIFAC World Congress -
Duration: 1 Jan 2000 → …

Publication series

NameIFAC-PapersOnLine
PublisherIFAC (International Federation of Automatic Control)
ISSN (Print)2405-8963

Conference

ConferenceIFAC World Congress
Period1/01/00 → …

Keywords

  • Networked Systems
  • Distributed optimization for large-scale systems
  • Security in networked control systems

Publication forum classification

  • Publication forum level 1

Fingerprint

Dive into the research topics of 'Resilient Design of Continuous-time Distributed Optimization Algorithm in the Presence of Cyber-attacks: 22nd IFAC World Congress'. Together they form a unique fingerprint.

Cite this