Towards Resilient Design of Leader-following Consensus with Attack Identification and Privacy Preservation Capabilities

Azwirman Gusrialdi, Muhammad Iqbal, Zhihua Qu

Research output: Chapter in Book/Report/Conference proceedingConference contributionScientificpeer-review

17 Downloads (Pure)

Abstract

This paper considers a leader-following consensus in the presence of unknown but bounded cyber-attacks. Specifically, we consider the following cyber-attack scenarios: (i) an attacker aims to destabilize the consensus dynamics by injecting exogenous signals to both the actuators of the followers and/or the communication network, (ii) an eavesdropper adversary aims to obtain information on the physical state of the agents. To this end, a novel resilient leader-following consensus algorithm based on a competitive interaction method is proposed. In addition, it is demonstrated that by appropriately choosing the information exchanged between the agents, the proposed control framework also enables the cooperative system to either distributively identify the compromised communication links in real-time or to protect the privacy of the physical state of the agents from the eavesdropper. A numerical example is provided to illustrate the proposed resilient control algorithms.
Original languageEnglish
Title of host publication2023 European Control Conference, ECC 2023
PublisherIEEE
Number of pages6
ISBN (Print)978-1-6654-6531-1
DOIs
Publication statusPublished - 2023
Publication typeA4 Article in conference proceedings
EventEuropean Control Conference - Bucharest, Romania
Duration: 13 Jun 202316 Jun 2023
https://ecc23.euca-ecc.org/

Conference

ConferenceEuropean Control Conference
Abbreviated titleECC23
Country/TerritoryRomania
CityBucharest
Period13/06/2316/06/23
Internet address

Publication forum classification

  • Publication forum level 1

Fingerprint

Dive into the research topics of 'Towards Resilient Design of Leader-following Consensus with Attack Identification and Privacy Preservation Capabilities'. Together they form a unique fingerprint.

Cite this