827
Views
7
CrossRef citations to date
0
Altmetric
Research Article

Stochastic fault and cyber-attack detection and consensus control in multi-agent systems

, & ORCID Icon
Pages 2379-2397 | Received 16 Aug 2020, Accepted 26 Mar 2021, Published online: 16 Apr 2021

References

  • Aumasson, J.-P., Meier, W., Phan, R., & Henzen, L. (2014). The hash function BLAKE. Springer Publishing Company.
  • Chang, H. L. (2004). Robust observer-based control of systems with state perturbations via lmi approach. IEEE, Transactions on Automatic Control, 8, 1365–1370. https://doi.org/10.1109/TAC.2004.832660
  • Corradini, M. L., & Cristofaro, A. (2017). Robust detection and reconstruction of state and sensor attacks for cyber-physical systems using sliding modes. IET Control Theory and Applications, 11(11). https://doi.org/10.1049/iet-cta.2016.1313
  • Davoodi, M. R., Gallehdari, Z., Saboori, I., Rezaee, H., Semsar-Kazerooni, E., Meskin, N., Abdollahi, F., & Khorasani, K. (2016). An overview of cooperative and consensus control of multi-agent systems. In Wiley encyclopedia of electrical and electronics engineering. John Wiley & Sons Ltd. https://doi.org/10.1899/15-9834.6.
  • Davoodi, M. R., Golabi, A., Talebi, H. A., & Momeni, H. R. (2013). Simultaneous fault detection and control design for switched linear systems based on dynamic observer. Optimal Control Applications and Methods, 34, 35–52. https://doi.org/10.1002/oca.1026
  • Davoodi, M. R., Khorasani, K., Talebi, H. A., & Momeni, H. (2008). Distributed fault detection and isolation filter design for a network of heterogeneous multi-agent systems. IEEE Transactions on Control Systems Technology, 22, 1061–1069. https://doi.org/10.1109/TCST.87
  • Davoodi, M. R., Meskin, N., & Khorasani, K. (2016). Simultaneous fault detection and consensus control design for a network of multi-agent systems. Automatica, 66, 185–194. https://doi.org/10.1016/j.automatica.2015.12.027
  • Davoodi, M. R., Meskin, N., & Khorasani, K. (2017). Integrated design of fault detection, isolation, and control for continuous-time markovian jump systems. International Journal of Adaptive Control and Signal Processing, 31, 1903–1919. https://doi.org/10.1002/acs.v31.12
  • Etemadi, N. (1981). An elementary proof of the strong law of large numbers. Zeitschrift für Wahrscheinlichkeitstheorie und verwandte Gebiete, 55, 119–122. https://doi.org/10.1007/BF01013465
  • Feng, Z., & Allen, R. (2003). Reduced order H∞ control of an autonomous underwater vehicle. IFAC Proceedings Volumes, 36, 121–126. https://doi.org/10.1016/S1474-6670(17)36668-5
  • Feng, Z., & Allen, R. (2004). Reduced order H∞ control of an autonomous underwater vehicle. Control Engineering Practice, 12, 1511–1520. Guidance and control of underwater vehicles. https://doi.org/10.1016/j.conengprac.2004.02.004
  • Gallehdari, Z., Meskin, N., & Khorasani, K. (2016). A distributed control reconfiguration and accommodation for consensus achievement of multiagent systems subject to actuator faults. IEEE Transactions on Control Systems Technology, 24, 2031–2047. https://doi.org/10.1109/TCST.2016.2526639
  • Gallehdari, Z., Meskin, N., & Khorasani, K. (2017a). Distributed reconfigurable control strategies for switching topology networked multi-agent systems. ISA Transactions, 71, 51–67. https://doi.org/10.1016/j.isatra.2017.06.008
  • Gallehdari, Z., Meskin, N., & Khorasani, K. (2017b). An H∞ cooperative fault recovery control of multi-agent systems. Automatica, 84, 101–108. https://doi.org/10.1016/j.automatica.2017.07.017
  • Guan, Y., & Ge, X. (2018). Distributed attack detection and secure estimation of networked cyber-physical systems against false data injection attacks and jamming attacks. IEEE Transactions on Signal and Information Processing Over Networks, 4(1), 48–59. https://doi.org/10.1109/TSIPN.2017.2749959
  • Hajshirmohamadi, S., Askari, J., & Hoseinnia, S. (2013). Simultaneous fault detection and control for switched linear systems: An LMI approach. In 21st Iranian conference in electrical engineering (ICEE) (pp. 1–6).
  • Khazraei, A., Kebriaei, H., & Salmasi, F. R. (2017). Replay attack detection in a multi agent system using stability analysis and loss effective watermarking. In American control conference. Elsevier
  • Khosrowjerdi, M. J., Nikoukhah, R., & Safari-Shad, N. (2004). A mixed H2/ H∞ approach to simultaneous fault detection and control. Automatica, 40, 261–267. https://doi.org/10.1016/j.automatica.2003.09.011
  • Li, Y., Voos, H., Darouach, M., & Hua, C. (2015). An algebraic detection approach for control systems under multiple stochastic cyberattacks. IEEE/CAA Journal of Automatica Sinica, 2, 258–266. https://doi.org/10.1109/JAS.2015.7152659
  • Meng, X., & Yang, G. H. (2014). Simultaneous fault detection and control for stochastic time-delay systems. International Journal of Systems Science, 45, 1058–1069. https://doi.org/10.1080/00207721.2012.745021
  • Miao, F., Zhu, Q., Pajic, M., & Pappas, G. J. (2017). Coding schemes for securing cyber-physical systems against stealthy data injection attacks. IEEE Transactions on Control of Network Systems, 4, 106–117. https://doi.org/10.1109/TCNS.2016.2573039
  • Mo, Y., Garone, E., Casavola, A., & Sinopoli, B. (2010). False data injection attacks against state estimation in wireless sensor networks. In 49th IEEE conference on decision and control (CDC). IEEE.
  • Nazari, S., & Shafai, B. (2016). Distributed detection filter design for intruder identification. In American control conference. IEEE
  • Pajic, M., Lee, I., & Pappas, G. J. (2017). Attack-resilient state estimation for noisy dynamical systems. IEEE Transactions on Control of Network Systems, 4(1), 82–92. https://doi.org/10.1109/TCNS.2016.2607420
  • Pasqualetti, F., Bicchi, A., & Bullo, F. (2007). Distributed intrusion detection for secure consensus computations. In 46th IEEE conference on decision and control. IEEE.
  • Pasqualetti, F., Dorfler, F., & Bullo, F. (2013). Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(1), 2715–2729. https://doi.org/10.1109/TAC.2013.2266831
  • Pipeleers, G., Demeulenaere, B., Swevers, J., & Vandenberghe, L. (2009). Extended lmi characterizations for stability and performance of linear systems. Systems & Control Letters, 58, 510–518. https://doi.org/10.1016/j.sysconle.2009.03.001
  • Saboori, I., & Khorasani, K. (2015). Actuator fault accommodation strategy for a team of multi-agent systems subject to switching topology. Automatica, 62, 200–207. https://doi.org/10.1016/j.automatica.2015.09.025
  • Shames, I., Teixeira, A. H., Sandberg, H., & Johansson, K. H. (2010). Distributed fault detection for interconnected systems. Automatica, 47, 2757–2764. https://doi.org/10.1016/j.automatica.2011.09.011
  • Teixeira, A., Sou, K. C., Sandberg, H., & Johansson, K. H. (2013). Quantifying cyber-security for networked control systems. In Control of cyber-physical systems, Control and information science series: Vol. 449, Springer.
  • Wang, G., & Liu, M. (2015). Fault detection for discrete-time systems with fault signal happening randomly: The Markov approach. IEEE Access, 5, 14680–14689. https://doi.org/10.1109/ACCESS.2017.2732831
  • Wang, D., & Wang, W. (2014). Distributed fault detection and isolation for discrete time multi-agent systems. Computational Intelligence, Networked Systems and Their Applications, 462, 496–505. https://doi.org/10.1007/978-3-662-45261-5
  • Wang, H., & Yang, G. H. (2009). Simultaneous fault detection and control for uncertain linear discrete-time systems. IET Control Theory Applications, 3, 583–594. https://doi.org/10.1049/iet-cta.2007.0463
  • Zhang, F. (2005). The schur complement and its applications (Vol. 4). Springer.
  • Zhang, Z., & Jaimoukha, I. M. (2014). On-line fault detection and isolation for linear discrete-time uncertain systems. Automatica, 50, 513–518. https://doi.org/10.1016/j.automatica.2013.11.003

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.