Download PDF
Research Article  |  Open Access  |  16 May 2023

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Views: 544 |  Downloads: 269 |  Cited:   0
Complex Eng Syst 2023;3:7.
10.20517/ces.2023.06 |  © The Author(s) 2023.
Author Information
Article Notes
Cite This Article

Abstract

The consensus tracking problem is investigated for a class of multi-agent systems (MASs) under communication constraints. In particular, as a result of the impact of amplitude attenuation and random interference, communication among followers may inevitably suffer from the fading phenomenon. Meanwhile, the controllers may also be subject to malicious deception attacks, which will disrupt the correct operation of the MASs. Thus, the agents can only update their states based on fading information exchanged with their neighbors and the false control input under attacks. The consensus tracking error variables are first designed via the fading signal received from neighbors. Then, an online estimation strategy is introduced to estimate the unknown attacks, based on which the adaptive sliding mode controller is designed to attenuate the effect of the time-varying attacks on MASs. Convergence analysis of the MASs under the designed control strategy is provided by using the Lyapunov stability theory and adaptive sliding mode control method. Finally, the effectiveness of the theoretical results is verified via numerical simulations.

Keywords

Multi-agent systems, consensus tracking, adaptive mechanism, sliding mode control, deception attacks, channel fading

1. INTRODUCTION

As typical autonomous cyber-physical systems, multi-agent systems (MASs) provide an effective means to coordinate spatially distributed and networked agents, where agents interact together to optimize decisions and achieve system objectives. In recent decades, the development of cluster control has motivated more and more research on the consensus problem for MASs, such as multi-UAVs (Unmanned Aerial Vehicles) control [1-3], underwater cooperative operations [4], robot formation control [5-8], wireless sensors collaboration [9], microgrids control [10] and so on. As a key issue in the research of MASs, the consensus problem has received extensive attention in the past few decades. For example, Hu et al. proposed a new consensus protocol for complex networks composed of multiple subnetworks to ensure convergence[11]. Yao et al. considered the finite-time consensus problem of MASs based on the finite-time Lyapunov stability theory[12]. Rehman et al. investigated the consensus problem of leader-following MASs in both fixed undirected topology and fixed directed topology and proposed two distributed control protocols[13]. Liu et al. studied the positive consensus problem of MASs with directed communication topologies where all agents have identical continuous-time positive linear dynamics[14].

To handle the consensus problem, various control methods have been proposed including fuzzy control [15], robust $$ H_{\infty} $$ control [16], predictive control [17, 18], adaptive control [19-21], sliding mode control (SMC) [22], and so on. Due to the strong robustness to external disturbance and parameter uncertainties, the sliding mode control method has been used widely in the MASs consensus research. For the leaderless MASs, Wang et al. designed a special SMC protocol for the consensus problem[23]. Cong et al. proposed a distributed nonsingular controller to deal with the consensus problem for a class of nonlinear single-integrator MASs with input uncertain dynamics[24]. Rahmani et al. proposed a projection recurrent neural network, which was suitable for robotic MASs, and designed a new optimal SMC technique to achieve consensus tracking[25].

However, a key feature of the aforementioned works is that the information can be transmitted accurately among agents. In practical MASs, a satisfying communication environment cannot be guaranteed under wireless transmission networks. As a result of the impact of amplitude attenuation and random interference, the wireless link communication among agents will suffer from the fading phenomenon, resulting in the distortion of the data. This unfavorable factor motivated some interesting research on consensus tracking of wireless MASs subject to channel fading. Oral et al.[26] considered link outages between agents and obtained the probability expression for MASs reaching consensus. Gu et al. designed a distributed SMC law to deal with the impact of the information fading phenomenon in communication channels[27]. Ding et al. investigated the finite-time consensus control for MASs with channel fading via SMC technique. [28]

Another adverse phenomenon in the wireless transmission network is the inevitable malicious attacks, thereby rendering the secure control of MASs fundamental significance [29]. Considering the different mechanisms and effects on the MASs consensus problem, cyber-attacks can be divided into various types, for example, deception attacks [30], replay attacks [31] and denial-of-service (DoS) attacks [32]. Among them, deception attacks may lead to erroneous information feedback by tampering with the real packets via injecting false data. Cui et al. investigated the consensus tracking problem of MASs, which may be subject to deception attacks randomly. Recently, SMC strategy combined with adaptive mechanism has shown promising performance for constrained systems, for example, Chen et al. constructed an adaptive sliding mode control law to deal with the effects of adversarial cyber injection attacks[33]. It is of great practical significance to investigate the consensus problem for MASs against deception attacks[34]. Meanwhile, it is challenging to design a feasible SMC law under unknown and time-varying deception attacks.

Inspired by the above discussion and based on the expanded research of ref. [28], this paper will be concerned with the secure consensus control problem for multi-agent systems with malicious attacks and channel fading via the adaptive sliding mode technique, and the main contributions are highlighted as follows: (1) Both the position error and the velocity error are used to reflect the consistency of MASs, then the consensus tracking problem of MASs can be transformed into the stability problem of the tracking error system; (2) Coping with the effect of the fading channel between followers, the incomplete fading information received by the agent is introduced into the controller design; (3) An online estimation strategy is employed to estimate the unknown and time-varying attacks, based on which, an adaptive sliding mode controller is designed to attenuate the effect of the attacks on MASs; and (4) The distributed adaptive SMC strategy is designed to ensure the mean square consistency of MASs, despite the communication constraints.

Notation: $$ \mathbb{R}^{n} $$ and $$ \mathbb{R}^{m\times n} $$ mean the $$ n $$ dimension Euclidean space and the $$ m\times n $$ real matrix set. The symbol $$ \left | \cdot \right | $$ denotes the Euclidean norm and $$ \otimes $$ denotes the Kronecker product. Denote $$ \mathrm{sgn}(x) $$ the sign symbolic function, $$ \mathbf{1}_{N}=\left [ 1, 1, \cdots, 1 \right ] ^{T} $$, $$ \mathbf{0}_{N}=\left [ 0, 0, \cdots, 0 \right ] ^{T} $$.

2. PROBLEM FORMULATION

2.1. Graph theory

Graph theory is an important tool to study MASs, which is a graph composed of several nodes and edges connecting the node. Each agent can be represented as a node, and the information interaction between agents can be denoted as an edge in graph theory. A directed weighted graph is represented by $$ G=\left \{ \mathbb{V}, \mathbb{E} \right \} $$. For MASs with one leader and $$ N $$ agents, the node-set $$ \mathbb{V}=\left \{ {v}_{1}, {v}_{2}, \cdots, {v}_{N} \right \} $$ indicates the set of all points on the graph and $$ \mathbb{E}=\{(i, j), i, j \in \mathbb{V}, i \neq j\} $$ represents the set of all edges. $$ A=[a_{ij} ] \in \mathbb{R}^{N\times N} $$ is a non-negatively weighted adjacency matrix. If $$ a_{ij}>0 $$, it means that agent $$ i $$ can receive information from agent $$ j $$; conversely, if $$ a_{ij}=0 $$, agent $$ i $$ cannot receive information from agent $$ j $$. Define the matrix $$ B= $$ diag$$ (b_{1}, b_{2}, \cdots, b_{N} ) $$ to denote the communication between the leader and all followers, and the degree matrix $$ D= [d_{ii}] $$ with $$ d_{ii}= \sum_{j=1}^{N} a_{ij} $$. So, we can obtain the Laplace matrix $$ L= [l_{ij}] $$ as:

$$ L=D-A. $$

with

$$ l_{i j}=\left\{\begin{array}{ll} \sum_{k=1}^{N} a_{i k}, & i=j, \\ -a_{i j}, & i \neq j. \end{array}\right. $$

Lemma 1[35] The matrix $$ L + B $$ is invertible if the directed graph $$ G $$ has a directed spanning tree.

Definition 1 Consider a multi-agent system with $$ N $$ agents and let $$ x_i(t) $$ represent the state of agent $$ i $$. If $$ lim_{t \to \infty}\| x_i(t)-x_j(t) \|=0 $$, for all $$ i, j=1, 2, \cdots, N $$, it is said that the multi-agent system can reach a consensus. Furthermore, if there exists a leader whose state is $$ x_0(t) $$, then $$ lim_{t \to \infty}\| x_i(t)-x_0(t) \|=0 $$, for all $$ i, j=1, 2, \cdots, N $$, means the tracking consensus is achieved.

2.2. System model

Consider a second-order MASs consisting of a leader labeled as node $$ 0 $$ and $$ N $$ followers indexed by $$ i\in\{1, 2, \cdots, N\} $$, and the $$ i $$th follower's dynamic is given as:

$$ \left\{\begin{array}{l} \dot{x}_{i}(t)={v}_{i}(t), \\ \dot{v}_{i}(t)=u_{i}(t), \end{array}\right. $$

where $$ {x}_{i}(t)\in \mathbb{R}^{m} $$, $$ {v}_{i}(t)\in \mathbb{R}^{m} $$, $$ u_{i}(t)\in \mathbb{R}^{m} $$ represent the $$ i $$th follower's position, velocity and the control input, respectively. According to equation (3), it is obvious that we are focused on double integrators.

The leader's dynamic is of the following form:

$$ \left\{\begin{array}{l} \dot{x}_0(t)={v}_0 (t), \\ \dot{v}_0(t)=u_0(t), \end{array}\right. $$

with $$ {x}_{0}(t)\in \mathbb{R}^{m} $$, $$ {v}_{0}(t)\in \mathbb{R}^{m} $$ the leader's position and velocity, respectively, and $$ {u}_{0}(t)\in \mathbb{R}^{m} $$ representing the control input.

Define the $$ i $$th follower's consensus tracking errors as follows:

$$ \left\{\begin{array}{llll} e_{1 i}(t) &=&\sum_{j=1}^{N} a_{i j}\left(x_{i}(t)-x_{j}(t)\right) +b_{i}\left(x_{i}(t)-x_{0}(t)\right), \\ e_{2 i}(t) &=&\sum_{j=1}^{N} a_{i j}\left(v_{i}(t)-v_{j}(t)\right) +b_{i}\left(v_{i}(t)-v_{0}(t)\right), \end{array}\right. $$

with $$ {e}_{1i}(t) $$ and $$ {e}_{2i}(t) $$ the tracking error variables of position and velocity, $$ {a}_{ij} $$ represents the element of $$ A $$, $$ {b}_{i} $$ determines whether there is information interaction between the leader and the followers, when $$ {b}_{i} > 0 $$, agent $$ i $$ can receive information from the leader, otherwise, $$ {b}_{i} $$ = 0.

The tracking errors can be rewritten in the compact form:

$$ \left\{\begin{array}{llll} e_{1}(t)&=&(L+B) \otimes I_{m} \cdot( x(t) -\mathbf{1}_{N} \otimes x_{0}(t)), \\ e_{2}(t)&=&(L+B) \otimes I_{m} \cdot( v(t) -\mathbf{1}_{N} \otimes v_{0}(t)), \end{array}\right. $$

with $$ e_{1}(t)\triangleq [e_{11}^{T}(t), \cdots , e_{1 N}^{T}]^{T} $$, $$ e_{2}(t)\triangleq \left[e_{21}^{T}(t), \cdots , e_{2 N}^{T}(t)\right]^{T} $$, $$ x(t)\triangleq \left[x_{1}^{T}(t), \cdots , x_{N}^{T}(t)\right]^{T} $$, $$ v(t)\triangleq \left[v_{1}^{T}(t), \cdots , \right.\\ $$$$ v_{N}^{T}(t)]^{T} $$, $$ u(t)\triangleq \left[u_{1}^{T}(t), \cdots , u_{N}^{T}(t)\right]^{T} $$, $$ B\triangleq $$diag$$ \{b_{1}, b_{2}, \cdots, b_{N}\} $$.

From the above definition, one can obtain the tracking error system as:

$$ \left\{\begin{array}{llll} \dot{e}_{1}(t)&=&e_{2}(t), \\ \dot{e_{2}}(t)&=&(L+B) \otimes I_{m} \cdot(u(t) -\mathbf{1}_{N} \otimes u_{0}(t)). \end{array}\right. $$

Now, the consensus tracking problem of MASs (3)-(4) converts to the stabilization problem of the tracking error system (7). The objective of this work is to achieve leader-follower consistency.

2.3. Fading channel

As stated in the Introduction, the transmission between followers may be inevitably suffered from the channel fading phenomenon. In this work, the network channel is considered as a continuous one with time-varying channel gain, the transmitted data will be modeled as the actually received information with random attenuation. Hence, introduce the following memoryless multiplicative fading model:

$$ \left\{\begin{array}{l} x_{i j}(t)=\rho_{i j}(t) x_{j}(t), \\ v_{i j}(t)=\rho_{i j}(t) v_{j}(t), \end{array}\right. $$

where $$ {x}_{ij}(t) $$ and $$ {v}_{ij}(t) $$ are the fading position and speed signal of the $$ j $$th agent received by the $$ i $$th agent, and $$ {x}_{j}(t) $$ and $$ {v}_{j}(t) $$ are the signal and speed signal sent by the $$ j $$th agent, respectively. The random coefficient $$ \rho_{i j}(t) \in(0, 1] $$ are mutually independent random variables with mathematical expectation $$ \mathbb{E}\left(\rho_{ij}(t)\right)=\bar{\rho} $$.

Assuming that fading occurs only in the channel between followers, the special case of channel fading from the leader to the followers is not considered in this work. Hence, based on the fading information (8), the tracking errors (5) are rewritten as:

$$ \left\{\begin{array}{llll} \bar{e}_{1 i}(t)&=&\sum_{j=1}^{N} a_{i j}\left(x_{i}(t)-\frac{1}{\bar{\rho}} \Lambda_{i j}(t) x_{j}(t)\right)+b_{i}\left(x_{i}(t)-x_{0}(t)\right), \\ \bar{e}_{2 i}(t)&=&\sum_{j=1}^{N} a_{i j}\left(v_{i}(t)-\frac{1}{\bar{\rho}} \Lambda_{i j}(t) v_{j}(t)\right)+b_{i}\left(v_{i}(t)-v_{0}(t)\right). \end{array}\right. $$

It can be seen that the tracking errors (9) involve the expectation of the random variable $$ \rho_{ij}(t) $$, which is introduced to compute the consistent tracking error variable among the agents more accurately.

Define $$ \bar{e}_{1}(t) $$$$ \triangleq $$$$ [\bar{e}_{11}^{T}(t), \cdots, \bar{e}_{1 N}^{T}(t)]^{T}, \bar{e}_{2}(t) $$$$ \triangleq $$$$ \left[\bar{e}_{21}^{T}(t)\right., \cdots, \bar{e}_{2 N}^{T}(t)]^{T} $$. Then, the compact form of tracking errors (9) is of the following form:

$$ \left\{\begin{array}{llllllll} \bar{e}_{1}(t)&=&\sum_{i=1}^{N} \alpha_{i}\left(A \otimes I_{m}\right)\cdot \frac{1}{\bar{\rho}} \Lambda_{i}(t) x\left(t\right)-(L+B) \otimes I_{m}\left(\mathbf{1}_{n} \otimes x_{0}(t)\right)\\ & &-(B+D) \otimes I_{m} \cdot x\left(t\right), \\ \bar{e}_{2}(t)&=&\sum_{i=1}^{N} \alpha_{i}\left(A \otimes I_{m}\right) \cdot \frac{1}{\bar{\rho}} \Lambda_{i}(t) v\left(t\right)-(L+B) \otimes I_{m}\left(\mathbf{1}_{n} \otimes v_{0}(t)\right)\\ & &-(B+D) \otimes I_{m} \cdot v\left(t\right), \end{array}\right. $$

where $$ \alpha_{i} \triangleq \operatorname{diag} \{\delta_{i}^{1}, \delta_{i}^{2}, \ldots, \delta_{i}^{N}\} $$, $$ \delta_{i}^{k}(\cdot) $$ being the Kronecker delta function, which compares values of $$ i $$ and $$ k $$ and returns $$ 0 $$ when they are not equal; otherwise, it returns 1. $$ \Lambda_{1}(t)\triangleq\operatorname{diag}\{0, \rho_{1 2}(t), \cdots, \rho_{1N}(t)\} $$, $$ \cdots $$, $$ \Lambda_{N}(t) \triangleq \operatorname{diag}\{\rho_{N 1}(t), \rho_{N 2}(t), \cdots, 0\} $$. Considering the effect of channel fading, since only faded data is available, accurate neighbors' information cannot be used for the controller design. In the following section 3.1, the SMC law will be designed based on the consensus tracking errors $$ \bar{e}_1(t) $$ and $$ \bar{e}_2(t) $$.

Remark 1. There are two special cases considered in the channel fading model (8): when $$ \rho_{ij}(t)=0 $$, it means that there is no information interaction between agents and the communication channel is blocked, that is, the channel fading model is simplified to a packet loss model. In contrast, if $$ \rho_{ij}(t)=1 $$, it indicates that the data transmission between agents is complete and without any attenuation.

2.4. Deception attacks

Among various cyber-attacks, the deception attack on controllers is a common form and usually satisfies the following assumptions: the hackers can steal the state information or measurement output of the agents to generate false data, which can then be injected into the controller. As shown in Figure 1, the hackers can attack the controller of agent $$ i $$ by injecting false data. Thus, the actual data received by the actuator of agent $$ i $$ is as follows:

$$ \check{u}_{i}(t)=u_{i}(t)+W(t) \Psi_{a}(x_{i}(t), t). $$

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Figure 1. System over fading network subject to attacks on agent $$ i $$.

The compact form of expression (11) can be written as:

$$ \check{u}(t)=u(t)+W(t) \Psi_{a}(x(t), t). $$

where $$ u(t) $$ is the designed control input and $$ W(t) \Psi_{a}(x(t), t) $$ is the false data. The matrix $$ W(t) $$ is an unknown and time-varying matrix that satisfies $$ \|W(t)\| \leq \mu(t) $$ with $$ \mu(t) $$ unknown and bounded, represents the injection patterns of the false data, for example, $$ W(t) $$ may be a matrix composed of elements $$ 0 $$ and $$ 1 $$, that is, sometimes false data is injected, sometimes not, to confuse users. Thus, the attack is difficult to be detected by users. $$ \Psi_{a}(x(t), t) $$ is a function of $$ x(t) $$, which means the false data generated via the state $$ x(t) $$, and satisfy $$ \left\|\Psi_{a}(x(t), t)\right\| \leq \psi(x(t), t) $$ with $$ \psi(x(t), t) $$ a known nonnegative function.

Remark 2. The deception attacks considered in this work focus on the controller, that is, $$ u(t) $$ may be suffered from the false data injection, such as the problem considered in some literature [30, 36] and so on. The deception attacks can also occur in the communication channel between agents, that is, $$ x(t) $$ may be affected by false data injection during transmission [34].

3. MAIN RESULTS

3.1. Adaptive SMC law

To cope with the impact of the deception attacks, the information about the attack is usually utilized to design the controller. For example, when the upper bounds $$ \mu(t) $$ and $$ \psi(x(t), t) $$ of the attack are known, the design of the controller is relatively easy to implement, but the fixed upper bounds will inevitably lead to larger conservativeness. To overcome this problem, an online estimation strategy will be employed to estimate the time-varying and unknown attacks, based on which, an adaptive sliding mode controller will be designed to attenuate the effect of the unknown attacks on MASs.

Design the sliding function as follows:

$$ s_i(t)=ce_{1i}(t)+e_{2i}(t), $$

with $$ c>0 $$ the sliding gain, denoted $$ s(t)\triangleq\left[s_{1}^{T}(t), s_{2}^{T}(t), \cdots, s_{N}^{T}(t)\right]^{T} $$, the compact form of sliding function (13) can be written as:

$$ s(t)=ce_{1}(t)+e_{2}(t), $$

From (7), we can obtain the derivative of the sliding function:

$$ \begin{aligned} \dot {s}(t) &=c e_{2}(t)+ \dot e_{2}(t) \\ &=c e_{2}(t)+ (L+B) \otimes I_{m} \cdot\left(\check{u}(t)-I_{N} \otimes u_{0}(t)\right). \end{aligned} $$

Under these constraints considered in this work, the $$ i $$th agent cannot receive accurate and complete information from neighbor agents, the switching function (13) under fading channel is rewritten as:

$$ \overline{s}_{i}(t)=c\overline{e}_{1i}(t)+\overline{e}_{2i}(t). $$

The compact form of expression (16) as:

$$ \overline{s}(t)=c\overline{e}_{1}(t)+\overline{e}_{2}(t). $$

Then, construct the sliding mode controller as follow:

$$ u(t)=u_{a}(t)+u_{b}(t), $$

where the robust term $$ u_{a}(t) $$ is designed as :

$$ u_{a}(t)=-{(L+B)}^{-1} \otimes I_{m} \cdot\left(k_{1} \cdot \operatorname{sgn}(\bar{s}(t))+c \bar{e}_{2}(t)\right)+I_{N} \otimes u_{0}(t), $$

with $$ k_{1}>0 $$, and the adaptive term $$ u_{b}(t) $$ is designed as:

$$ u_{b}(t)=-{(L+B)}^{-1} \otimes I_{m} \cdot(\|L+B\| \hat{\mu}(t) \psi(x(t), t) \cdot \operatorname{sgn}(\bar{s}(t))). $$

where $$ \hat{\mu}(t) $$ is the estimation of $$ \mu(t) $$ under the following adaptive law:

$$ \dot{\hat{\mu}}(t)=\theta\left \| L+B \right \|\cdot\mathrm{Proj}(\hat{\mu}(t), \left \| \bar{s}^{T}(t) \right \|\psi(x(t), t)), $$

with $$ \theta $$ an adaptive parameter, and Proj the smooth projection [37] as:

$$ \large \begin{array}{l} \quad \mathrm{Proj}(\hat{\mu}(t), \left \| s^{T}(t) \right \|\psi(x(t), t)) \\ =\left\{\begin{array}{l} \left \| s^{T}(t) \right \|\psi(x(t), t), \text { if } \varphi(\hat{\mu}(t)) \leq 0, \\ \left \| s^{T}(t) \right \|\psi(x(t), t), \text { if } \varphi(\hat{\mu}(t)) \geq 0 \text { and } \varphi^{\prime}(\hat{\mu}(t))\left \| s^{T}(t) \right \|\psi(x(t), t) \leq 0, \\ \left \| s^{T}(t) \right \|\psi(x(t), t)-\frac{\varphi(\hat{\mu}(t)) \varphi^{\prime}(\hat{\mu}(t))\left\|s^{T}(t)\right\| \psi(x(t), t)}{\left\|\varphi^{\prime}(\hat{\mu}(t))\right\|^{\prime}}{\varphi^{\prime}}^{T}(\hat{\mu}(t)), \text { otherwise}, \end{array}\right. \end{array} $$

where the continuous function $$ \varphi(\hat{\mu}(t)) $$ defined as:

$$ \varphi(\hat{\mu}(t))\triangleq\frac{2}{\delta} (\frac{\hat{\mu}^{2}(t)}{\hat{\mu}^{2}_{max}} -1+\delta) $$

with $$ \hat{\mu}_{max} $$ the given bound of projection, and scalar $$ 0<\delta<1 $$.

According to Imbedded Convex Sets Assumption [37], we obtain:

$$ \begin{aligned} \left\|\mathrm{Proj}\left(\hat{\mu}(t), \left \| s^{T}(t)\right\| \psi(x(t), t)\right)\right\| \leq &\| s^{T}(t)\| \psi(x(t), t), \end{aligned} $$

and

$$ \begin{aligned} (\hat{\mu}(t)-\mu(t))(\mathrm{Proj}(\hat{\mu}(t), \left \| s^{T}(t)\right\| \psi(x(t), t)) -\left \| s^{T}(t)\right\| \psi(x(t), t))\le 0 \end{aligned} $$

and these two conditions will be used in the following derivation.

Remark 3. In some existing reliable control methods, the known bounds of attacks are usually utilized, which may inevitably yield larger conservativeness. To overcome this shortcoming, the online estimation mechanism for unknown attacks/faults was proposed in some related works [33, 38]. Inspired by these works, the online estimation mechanism of the attack is integrated with the SMC technique in this work.

3.2. Consistence and Reachability

Theorem 1. Consider the MASs (3)-(4) with channel fading (8) and deception attacks (12), under the proposed SMC law (19)-(20), the reachability of the sliding surface $$ s(t)=0 $$ can be guaranteed in the sense of mean square.

Proof. Choose the Lyapunov function as follows:

$$ V(s, t)=\frac{1}{2} s^{T}(t)s(t)+ \frac{1}{2}\theta^{-1}\widetilde{\mu}^{2} (t), $$

where $$ \tilde{\mu}(t)=\hat{\mu}(t)-\mu(t) $$ is the estimated error with $$ \dot{\tilde{\mu}}(t)=\dot{\hat{\mu}}(t) $$.

Then, by the expressions (15) and (21), the derivative of $$ V_{1}(s, t) $$ can be given as:

$$ \begin{aligned} \dot{V}(s, t)=& s^{T}(t) \dot{s}(t)+\theta^{-1} \tilde{\mu}(t) \dot{\tilde{\mu}}(t) \\ =& s^{T}(t) (c e_{2}(t)-c \bar{e}_{2}(t)+(L+B) \otimes I_{m} \cdot W(t)\Psi_{a}(x(t), t)) \\ &-\|L+B\| \cdot \hat{\mu} \psi(x(t), t)\cdot \operatorname{sgn}(\bar{s}(t))-k_{1} \operatorname{sgn}(\bar{s}(t)))+\theta^{-1}\tilde{\mu}(t) \dot{\tilde{\mu}}(t).\\ \end{aligned} $$

Taking mathematical expectation to the above expression (27), one has:

$$ \begin{aligned} \mathbb{E}[\dot{V}(s, t)]=&s^{T}(t)[c e_{2}(t)-c \mathbb{E}(\bar{e}_{2}(t))-k_{1} \mathbb{E}(\operatorname{sgn}(\bar{s}(t)))+(L+B)\otimes I_{m}\\ &\cdot W(t) \Psi_{a}(x(t), t)-\|L+B\| \hat{\mu} \psi(x(t), t) \mathbb{E}(\operatorname{sgn}(\bar{s}(t)))]\\ &+\|L+B\| (\hat{\mu}(t)-\mu(t)) \mathrm{Proj}(\hat{\mu}(t), \left \|\bar{s}^{T}(t) \right \|\psi(x(t), t)). \end{aligned} $$

It can be easily verified from expressions (5) and (9) that $$ \mathbb{E}\left(e_{1}(t)\right)=\mathbb{E}\left(\bar{e}_{1}(t)\right) $$, $$ \mathbb{E}\left(e_{2}(t)\right)=\mathbb{E}\left(\bar{e}_{2}(t)\right) $$. Meanwhile, it follows from (14) and (17) that $$ \mathbb{E}\left(s(t)\right)=\mathbb{E}\left(\bar{s}(t)\right) $$. Then, one can obtain:

$$ \begin{aligned} \mathbb{E}\left[\dot{V}(s, t)\right] =&-k_{1} s^{T}(t) \operatorname{sgn}(s(t))+s^{T}(t)(L+B) \otimes I_{m} \cdot W(t)\Psi_{a}(x(t), t)\\ &+\|L+B\| (\hat{\mu}(t)-\mu(t)) \mathrm{Proj}(\hat{\mu}(t), \left \| s^{T}(t) \right \|\psi(x(t), t))\\ & -s^{T}(t) \|L+B\| \hat{\mu}(t)\cdot\psi(x(t), t)\operatorname{sgn}(s(t))\\ \leq &-k_{1} \|s^{T}(t)\|+\|L+B\| \|W(t)\| \left\|\Psi_{a}(x(t), t)\right\|\|s^{T}(t)\|\\ &+\|L+B\| (\hat{\mu}(t)-\mu(t)) \mathrm{Proj}(\hat{\mu}(t), \|s^{T}(t)\|\cdot\psi(x(t), t))\\ &-\|L+B\| \hat{\mu}(t)\psi(x(t), t)\|s^{T}(t)\|.\\ \end{aligned} $$

By the conditions $$ \|W(t)\| \leq \mu(t) $$, $$ \left\|\Psi_{a}(x(t), t)\right\| \leq \psi(x(t), t) $$, one has:

$$ \begin{aligned} \mathbb{E}\left[\dot{V}(s, t)\right] \leq &-k_{1} \|s^{T}(t)\|+\|L+B\| (\mu(t)-\hat{\mu}(t)) (\|s^{T}(t)\|\\ &\cdot\psi(x(t), t)-\mathrm{Proj}(\hat{\mu}(t), \left \| s^{T}(t) \right \|\cdot\psi(x(t), t))).\\ \end{aligned} $$

Then, it follows from (25) that:

$$ \begin{aligned} \mathbb{E}\left[\dot{V}(s, t)\right] \leq & -k_{1} \|s^{T}(t)\|\\ \leq &0. \end{aligned} $$

Hence, the reachability of the sliding surface $$ s(t)=0 $$ can be ensured in the sense of mean square.

Theorem 2. Considering the MASs (3)-(4) subject to deception attacks (12) and channel fading model (8), the consensus tracking for MASs (3)-(4) will be achieved under the proposed sliding surface (14) and the SMC law (19)-(20).

Proof. Select the Lyapunov function:

$$ U(t)=\frac{1}{2} e_{1}(t)^{T} e_{1}(t)+\frac{1}{2} e_{2}(t)^{T} e_{2}(t), $$

Its derivative is given as:

$$ \begin{aligned} \dot{U}(t) &=e_{1}^{T}(t) \dot{e}_{1}(t)+e_{2}^{T}(t) \dot{e}_{2}(t)\\ &=e_{1}^{T}(t) e_{2}(t)+e_{2}^{T}(t) \dot{e}_{2}(t). \end{aligned} $$

When the sliding surface $$ s(t)=0 $$, it follows from (14) and (7) that $$ e_{2}(t)=-ce_{1}(t) $$ and $$ \dot{e_{2}}(t)=-ce_{2}(t) $$, then we can obtain:

$$ \begin{aligned} \dot{U}(t) &=e_{1}^{T}(t) {e}_{2}(t)+e_{2}^{T}(t) \dot {e}_{2}(t) \\ &=-c e_{1}(t)^{T} e_{1}(t)-c e_{2}^{T}(t) e_{2} (t) \\ &=-c\left\|e_{1}(t)\right\|^{2}-c\left\|e_{2}(t)\right\|^{2} \\ & \leq 0. \end{aligned} $$

Combining the results of Theorem 1, the consensus tracking of MASs (3)-(4) can be ensured under the proposed sliding surface (14) and the SMC law (19)-(20).

4. SIMULATION

Consider the second-order MASs with one leader and 4 followers, where the communication topology between agents is shown in Figure 2. The blue arrows indicate that the followers receive the complete information from the leader, while the red arrows indicate that the information interaction between followers is over fading channel. Thereby, follower $$ 1 $$ and follower $$ 2 $$ can receive accurate information from the leader, follower $$ 3 $$ can only receive the fading data from follower $$ 1 $$, and follower $$ 4 $$ can only receive the incomplete data from both follower $$ 1 $$ and follower $$ 2 $$. For simplicity, in this simulation example, the adjacency weights between neighbor agents are set as 1.

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Figure 2. Communication topology diagram of MASs. MASs: multi-agent systems.

Then, according to the leader and followers' topology, we can get the adjacency matrix $$ A $$, the diagonal matrix $$ B $$, and the Laplace matrix $$ L $$ of these MASs as follows:

$$ A=\begin{bmatrix} 0 & 0 & 0 & 0 \\ 0 & 0 & 0 & 0 \\ 1 & 0 & 0 & 0 \\ 1 & 1 & 0 & 0 \end{bmatrix}, L = \begin{bmatrix} 0 & 0 & 0 & 0 \\ 0 & 0 & 0 & 0 \\ -1 & 0 & 1 & 0 \\ -1 &-1 & 0 & 2 \end{bmatrix}, B = diag \begin{Bmatrix} 1 & 1 & 0 & 0 \end{Bmatrix}.\\ $$

In this simulation, the initial state of the leader's position, speed, and control input are set as $$ x_{0}=[10, -10]^{T} $$, $$ v_{0}=[10, -10]^{T} $$, $$ u_{0}=[cos(t), sin(t)]^{T} $$, the initial state of the followers' position and speed are set as $$ x_{1}=[10, -2]^{T} $$, $$ v_{1}=[20, -2]^{T} $$, $$ x_{2}=[15, 15]^{T} $$, $$ v_{2}=[20, 3]^{T} $$, $$ x_{3}=[25, 5]^{T} $$, $$ v_{3}=[15, 0]^{T} $$, $$ x_{4}=[45, 15]^{T} $$, $$ v_{4}=[35, 0]^{T} $$, and the injection packets $$ W(t) \Psi_{a}(x(t), t) $$ set as $$ W(t)=[1, 1, 1, 1] $$ and $$ \Psi_{a}(x(t), t)=10x(t)sin(t) $$. The sliding mode controller parameters are chosen as $$ c=1 $$, $$ k_{1}=0.1 $$.

Simulation results are shown in Figures 3-7. Among them, Figure 3 shows the tracking trajectories of MASs under the robust control term $$ u_{a}(t) $$ (19), and the horizontal and vertical axis represent the position state of different dimensions, respectively. As we can see from the Figure 3, the trajectories of the agents don't converge to a point, which indicates that the MASs under the robust control term $$ u_{a}(t) $$ (19) can't achieve consensus under the deception attacks. For comparison, Figure 4 shows the tracking trajectories of the agents under the proposed adaptive SMC law (18), and it is shown that the closed-loop MASs under channel fading and deception attacks can achieve consensus tracking. Figures 5 and 6 show the position error $$ e_{1}(t) $$ and velocity error $$ e_{2}(t) $$ between followers respectively. Figure 7 shows the sliding variable $$ s(t) $$ of the followers, respectively.

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Figure 3. The trajectories of the MASs under the robust control term $$ u_{a}(t) $$(19). MASs: multi-agent systems.

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Figure 4. The trajectories of the MASs under the adaptive SMC law (18). SMC: sliding mode control.

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Figure 5. The position error $$ e_{1}(t) $$ of the followers in Figure 5A-D. A: Position error of the 1st agent; B: Position error of the 2nd agent; C: Position error of the 3rd agent; D: Position error of the 4th agent.

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Figure 6. The velocity error $$ e_{2}(t) $$ of the followers in Figure 6A-D. A: Velocity error of the 1st agent; B: Velocity error of the 2nd agent; C: Velocity error of the 3rd agent; D: Velocity error of the 4th agent.

Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique

Figure 7. Sliding variables $$ s(t) $$ of the followers in Figure 7A-D. A: Sliding variable $$ s(t) $$ of the 1st agent; B: Sliding variable $$ s(t) $$ of the 2nd agent; C: Sliding variable $$ s(t) $$ of the 3rd agent; D: Sliding variable $$ s(t) $$ of the 4th agent.

Remark 4. As shown in Figures 5-7, agents 1 and 2 have better consensus tracking performance with smaller amplitude oscillating and smoother curves, that is, because they can receive accurate information from the leader. In contrast, agents 3 and 4 perform worse because they cannot obtain information from the leader, but only from neighbor agents over fading channel (as shown in Figure 2). Even so, the proposed adaptive SMC scheme can still guarantee consensus tracking of all followers, as shown in Figure 4.

5. CONCLUSION

This work considered the consensus control problem of MASs under deception attacks and fading channels. Due to the fading channels, the position and velocity errors cannot be calculated accurately. To solve this problem, the consensus tracking error variables have been designed based on the fading data received from neighbor agents. Meanwhile, the distributed adaptive SMC strategy via fading information has been proposed to deal with the time-varying and unknown deception attacks injected by the hacker. Utilizing the proposed scheme, consensus tracking can be achieved. Only malicious attacks and channel fading have been considered in this work. In practical applications, there may coexist multiple constraints, such as actuator/sensor faults, packet dropout, random noise[39, 40], etc. Under these constraints, how to design a feasible consensus control method is worthy to research in future work.

DECLARATIONS

Acknowledgments

Special thanks to the School of Electronic and Electrical Engineering, Shanghai University of Engineering Science (China) for providing technical support for this research.

Authors' contributions

Methodology, software, validation, data curation, visual conceptualization, ritingization, writing- original draft: Ding M

Conceptualization, riting-reviewing and editing, investigation: Chen B

Availability of data and materials

Not applicable.

Financial support and sponsorship

This work is supported in part by the NNSF of China (62173222, 61803255), Shanghai Science and Technology Innovation Action Plan (22S31903700, 21S31904200), and the National Key R & D Program of China (Grant No. 2020AAA0109301).

Conflicts of interest

Both authors declared that there are no conflicts of interest.

Ethical approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Copyright

© The Author(s) 2023.

REFERENCES

1. Liao W, Wei XH, Lai JZ, Sun H. Formation control for multi-UAVs systems based on Kullback-Leibler divergence. IEEE Trans Inst Meas Control 2020;42:598-603.

2. Dong X, Zhou Y, Ren Z, et al. Time-varying formation tracking for second-order multi-agent systems subjected to switching topologies with application to quadrotor formation flying. IEEE Trans Ind Electron 2016;64:5014-24.

3. Belkacem K, Munawar K, Muhammad SS. Distributed cooperative control of autonomous multi-agent UAV systems using smooth control. J Syst Eng Electron 2021;31:1297-307.

4. Ali S, Muhammad NM. Distributed observer for a team of autonomous underwater vehicles utilizing a beacon unit on the surface. In: 2017 IEEE 7th International Conference on Underwater System Technology: Theory and Applications 2017.

5. Lv YK, Zhang H, Wang ZP, Yan HC. Distributed localization for dynamic multiagent systems with randomly varying trajectory lengths. IEEE Trans Ind Electron 2022;69:9298-308.

6. Li X, Dong X, Li Q, Ren Z. Event-triggered time-varying formation control for general linear multi-agent systems. J Frankl Inst 2019;356:10179-95.

7. Chai XF, Wang Q, Diao Q, Yu Y, Sun CY. Sampled-data-based dynamic event-triggered formation control for nonlinear multi-agent systems. IEEE Trans Inst Meas Control 2022;14:2719-28.

8. Li Y, Jiao XY, Sun BQ, Yang JY. Multi-welfare-robot cooperation framework for multi-task assignment in healthcare facilities based on multi-agent system. In: 2021 IEEE International Conference on Intelligence and Safety for Robotics 2021.

9. Das R, Dwivedi M. Multi agent dynamic weight based cluster trust estimation for hierarchical wireless sensor networks. Peer-to-Peer Netw 2022;15:1505-20.

10. Abianeh AJ, Wan YH, Ferdowsi F, Mijatovic N, Dragicevic T. Vulnerability identification and remediation of FDI attacks in islanded DC microgrids using multiagent reinforcement learning. IEEE Trans Ind Electron 2022;37:6359-70.

11. Hu HX, Wen GH, Yu WW, Huang TW, Cao JD. Distributed stabilization of multiple heterogeneous agents in the strong-weak competition network: a switched system approach. IEEE Trans Cybern 2021;51:5328-41.

12. Yao DJ, Dou CX, Zhao N, Zhnag TJ. Finite-time consensus control for a class of multi-agent systems with dead-zone input. J Frankl Inst 2021;358:3512-29.

13. Rehman AU, Rehan M, Iqbal N, Waris MZ. Leaderless adaptive output feedback consensus approach for one-sided Lipschitz multi-agents. J Frankl Inst 2020;357:8800-22.

14. Liu JJR, Yang N, Kwok KW, Lam J. Positive consensus of directed multi-agent systems. IEEE Trans Automat Contr 2022;67:3641-6.

15. Chen CLP, Wen GX, Liu YJ, Liu Z. Observer-based adaptive backstepping consensus tracking control for high-order nonlinear semi-strict-feedback multiagent systems. IEEE Trans Cybern 2016;46:1591-601.

16. Sheng L, Wang Z, Zou L. Output-feedback $H_{2}/H_{\infty}$ consensus control for stochastic time-varying multi-agent systems with $(x, u, v)$-dependent noises. Syst Contr Lett 2017;107:58-67.

17. Yu D, Ji XY. Finite-time containment control of perturbed multi-agent systems based on sliding-mode control. Int J Syst Sci 2018;49:299-311.

18. Zou Y, Sun X, Li S, Liu Y. Event-triggered distributed predictive control for asynchronous coordination of multi-agent systems. Automatica 2019;99:92-8.

19. Yu WW, Chen GR, Cao M. Some necessary and sufficient conditions for second-order consensus in multi-agent dynamical systems. Automatica 2010;46:1089-95.

20. Tao T, Roy S, Baldi S. Adaptive synchronization of uncertain complex networks under state-dependent a priori Interconnections". In: 2021 60th IEEE Conference on Decision and Control (CDC), Austin, TX, USA, 2021: 1777-82.

21. Tao T, Roy S, Baldi S. Adaptive single-stage control for uncertain nonholonomic Euler-Lagrange systems. In: 2022 IEEE 61st Conference on Decision and Control (CDC), Cancun, Mexico. 2022: 2708-13.

22. Zuo ZY. Nonsingular fixed-time consensus tracking for second-order multi-agent networks. Automatica 2015;54:305-9.

23. Wang J, Zhang XR, Zhou JL. Chen YQ, Distribution consensus of nonlinear stochastic multi-agent systems based on sliding-mode control with probability density function compensation. J Frankl Inst 2020;357:9308-29.

24. Cong YR, Feng ZG, Song HW, Wang SM. Containment control of singular heterogeneous multi-agent systems. J Frankl Inst 2018;55:4629-43.

25. Rahmani R, Toshani H, Mobayen S. Consensus tracking of multi-agent systems using constrained neural-optimiser-based sliding mode control. Int J Syst Sci 2020;51:2653-74.

26. Oral E, Schmeink A, Dartmann G, Ascheid G, Pusane AE. Consensus analysis of wireless multi-agent systems over fading channels. IEEE Wireless Commun Lett 2021;10:1528-31.

27. Gu XW, Jia TG, Niu YG. Consensus tracking for multi-agent systems subject to channel fading: a sliding mode control method. Int J Syst Sci 2020;51:2703-11.

28. Ding M, Chen B, Hu ZX and Zhang Y. Finite-time consensus control for multi-agent systems with channel fading via sliding mode technique. In: 2022 34th Chinese Control and Decision Conference (CCDC), Hefei, China. 2022: 3706-11.

29. He WL, Xu WY, Ge XH, Han QL, Du WL, Qian F. Secure control of multiagent systems against malicious attacks: a brief survey. IEEE Trans Industr Inform 2022;18:3595-608.

30. Zhao L, Yang GH. Cooperative adaptive fault-tolerant control for multi-agent systems with deception attacks. J Frankl Inst 2020;357:3419-33.

31. Tahoun AH, Arafa M. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. ISA Trans 2021;110:1-14.

32. Shang Y, Liu CL, Cao KC. Event-triggered consensus control of second-order nonlinear multi-agent systems under denial-of-service attacks. IEEE Trans Inst Meas Control 2021;10:2272-81.

33. Chen B, Niu YG, Zou YY. Security control for Markov jump system with adversarial attacks and unknown transition rates via adaptive sliding mode technique. J Frankl Inst 2019;356:3333-52.

34. Cui Y, Liu YR, Zhang WB, Alsaadi FE. Sampled-based consensus for nonlinear multiagent systems with deception attacks: the decoupled method. IEEE Trans Syst Man Cybern Syst 2018;51:561-73.

35. Li W, Niu YG, Cao ZR. Event-triggered sliding mode control for multi-agent systems subject to channel fading. Int J Syst Sci 2021;53:1233-44.

36. Chen B, Niu YG. Dynamic event-triggered sliding mode security control for Markovian jump systems: Learning-based iteration optimization method. Int J Robust Nonlinear Control 2021;32:2500-17.

37. Pomet JB, Praly L. Adaptive nonlinear regulation: estimation from the Lyapunov equation. IEEE Trans. Automat. Contr 1992;37:729-40.

38. Zou Z, Ho DWC, Wang Y. Fault tolerant control for singular systems with actuator saturation and nonlinear perturbation. Automatica 2010;46:569-76.

39. Zhang QC, Zhou YY. Recent advances in non-gaussian stochastic systems control theory and its applications. IJNDI 2022;1:111-9.

40. Ren MF, Zhang QC, Zhang JH. An introductory survey of probability density function control. Syst Sci Contr Eng 2019;7:158-70.

Cite This Article

Export citation file: BibTeX | RIS

OAE Style

Ding M, Chen B. Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique. Complex Eng Syst 2023;3:7. http://dx.doi.org/10.20517/ces.2023.06

AMA Style

Ding M, Chen B. Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique. Complex Engineering Systems. 2023; 3(2): 7. http://dx.doi.org/10.20517/ces.2023.06

Chicago/Turabian Style

Ding, Meng, Bei Chen. 2023. "Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique" Complex Engineering Systems. 3, no.2: 7. http://dx.doi.org/10.20517/ces.2023.06

ACS Style

Ding, M.; Chen B. Secure consensus control for multi-agent systems under communication constraints via adaptive sliding mode technique. Complex. Eng. Syst. 2023, 3, 7. http://dx.doi.org/10.20517/ces.2023.06

About This Article

© The Author(s) 2023. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, sharing, adaptation, distribution and reproduction in any medium or format, for any purpose, even commercially, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Data & Comments

Data

Views
544
Downloads
269
Citations
0
Comments
0
3

Comments

Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at support@oaepublish.com.

0
Download PDF
Cite This Article 14 clicks
Like This Article 3 likes
Share This Article
Scan the QR code for reading!
See Updates
Contents
Figures
Related
Complex Engineering Systems
ISSN 2770-6249 (Online)

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/