IEEE/CAA Journal of Automatica Sinica
Citation:  Giuseppe Franzè, Francesco Tedesco and Domenico Famularo, "Resilience Against Replay Attacks: A Distributed Model Predictive Control Scheme for Networked MultiAgent Systems," IEEE/CAA J. Autom. Sinica, vol. 8, no. 3, pp. 628640, Mar. 2021. doi: 10.1109/JAS.2020.1003542 
[1] 
F. Pasqualetti, R. Carli, and F. Bullo, “A distributed method for state estimation and false data detection in power networks,” in Proc. IEEE Int. Conf. Smart Grid Communications, Brussels, Belgium, 2011, pp. 469–474.

[2] 
J. A. GuerreroIbanez, S. Zeadally, and J. ContrerasCastillo, “Integration challenges of intelligent transportation systems with connected vehicle, cloud computing, and internet of things technologies,” IEEE Wirel. Commun., vol. 22, no. 6, pp. 122–128, Dec. 2015. doi: 10.1109/MWC.2015.7368833

[3] 
A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson, “A secure control framework for resourcelimited adversaries,” Automatica, vol. 51, pp. 135–148, Jan. 2015. doi: 10.1016/j.automatica.2014.10.067

[4] 
W. P. M. H. Heemels, A. R. Teel, N. Van de Wouw, and D. Nešić, “Networked control systems with communication constraints: Tradeoffs between transmission intervals, delays and performance,” IEEE Trans. Autom. Control, vol. 55, no. 8, pp. 1781–1796, Aug. 2010. doi: 10.1109/TAC.2010.2042352

[5] 
A. A. Cárdenas, S. Amin, and S. Sastry, “Research challenges for the security of control systems,” in Proc. 3rd Conf. Hot Topics in Security, San Jose, USA, 2008.

[6] 
W. Lucia, B. Sinopoli, and G. Franzè, “A settheoretic approach for secure and resilient control of cyberphysical systems subject to false data injection attacks,” in Proc. Science of Security for CyberPhysical Systems Workshop, Vienna, Austria, 2016, pp. 1–5.

[7] 
Q. Y. Zhu, L. Bushnell, and T. Başar, “Resilient distributed control of multiagent cyberphysical systems,” in Control of CyberPhysical Systems, D. C. Tarraf, Ed. Heidelberg: Springer, 2013, pp. 301–316.

[8] 
Y. P. Guan and X. H. Ge, “Distributed attack detection and secure estimation of networked cyberphysical systems against false data injection attacks and jamming attacks,” IEEE Trans. Signal Inf. Process. Netw., vol. 4, no. 1, pp. 48–59, Mar. 2018.

[9] 
D. Zhang, Y. P. Shen, S. Q. Zhou, X. W. Dong, and L. Yu, “Distributed secure platoon control of connected vehicles subject to DoS attack: Theory and application,” IEEE Trans. Syst., Man, Cybernet.: Syst., Feb. 2020. DOI: 10.1109/TSMC.2020.2968606.

[10] 
A. Teixeira, S. Amin, H. Sandberg, K. H. Johansson, and S. S. Sastry, “Cyber security analysis of state estimators in electric power systems,” in Proc. 49th IEEE Int. Conf. Decision and Control, Atlanta, USA, 2010, pp. 5991–5998.

[11] 
L. Xie, Y. L. Mo, and B. Sinopoli, “ False data injection attacks in electricity markets,” in Proc. 1st IEEE Int. Conf. Smart Grid Communications, Gaithersburg, USA, 2010, pp. 226–231.

[12] 
F. Pasqualetti, A. Bicchi, and F. Bullo, “Consensus computation in unreliable networks: A system theoretic approach,” IEEE Trans. Autom. Control, vol. 57, no. 1, pp. 90–104, May 2012. doi: 10.1109/TAC.2011.2158130

[13] 
S. Sundaram and C. N. Hadjicostis, “Distributed function calculation via linear iterative strategies in the presence of malicious agents,” IEEE Trans. Autom. Control, vol. 56, no. 7, pp. 1495–1508, Jul. 2011. doi: 10.1109/TAC.2010.2088690

[14] 
Y. L. Mo and B. Sinopoli, “Secure control against replay attacks,” in Proc. 47th Annu. Allerton Conf. Communication, Control, and Computing, pp. 911–918, 2009.

[15] 
S. Amin, G. A. Schwartz, and S. S. Sastry, “Security of interdependent and identical networked control systems,” Automatica, vol. 49, no. 1, pp. 186–192, Jan. 2013. doi: 10.1016/j.automatica.2012.09.007

[16] 
A. Gupta, C. Langbort, and T. Başar, “Optimal control in the presence of an intelligent jammer with limited actions,” in Proc. 49th IEEE Conf. Decision and Control, Atlanta, USA, 2010, pp. 1096–1101.

[17] 
W. Chen, D. R. Ding, H. L. Dong, and G. L. Wei, “Distributed resilient filtering for power systems subject to denialofservice attacks,” IEEE Trans. Syst.,Man,Cybernet.:Syst., vol. 49, no. 8, pp. 1688–1697, Aug. 2019. doi: 10.1109/TSMC.2019.2905253

[18] 
M. H. Zhu and S. Martinez, “On distributed constrained formation control in operator–vehicle adversarial networks,” Automatica, vol. 49, no. 12, pp. 3571–3582, Dec. 2013. doi: 10.1016/j.automatica.2013.09.031

[19] 
R. Moghadam and H. Modares, “Resilient autonomous control of distributed Multiagent systems in contested environments,” IEEE Trans. Cybernet., vol. 49, no. 11, pp. 3957–3967, Nov. 2019. doi: 10.1109/TCYB.2018.2856089

[20] 
P. D. Christofides, R. Scattolini, D. M. de la Peña, and J. F. Liu, “Distributed model predictive control: A tutorial review and future research directions,” Comput. Chem. Eng., vol. 51, pp. 21–41, Apr. 2013. doi: 10.1016/j.compchemeng.2012.05.011

[21] 
H. Fawzi, P. Tabuada, and S. Diggavi, “Secure estimation and control for cyberphysical systems under adversarial attacks,” IEEE Trans. Autom. Control, vol. 59, no. 6, pp. 1454–1467, Jun. 2014. doi: 10.1109/TAC.2014.2303233

[22] 
P. Velarde, J. M. Maestre, H. Ishii, and R. R. Negenborn, “Scenariobased defense mechanism for distributed model predictive control,” in Proc. IEEE 56th Annu. Conf. Decision and Control, Melbourne, Australia, 2017, pp. 6171–6176.

[23] 
A. D. Liu and L. Y. Bai, “Distributed model predictive control for wide area measurement power systems under malicious attacks,” IET CyberPhys. Syst.:Theory Appl., vol. 3, no. 3, pp. 111–118, Oct. 2018. doi: 10.1049/ietcps.2017.0056

[24] 
G. Franzè, F. Tedesco, and D. Famularo, “Model predictive control for constrained networked systems subject to data losses,” Automatica, vol. 54, pp. 272–278, Apr. 2015. doi: 10.1016/j.automatica.2015.02.018

[25] 
G. Franzè, A. Casavola, D. Famularo, and W. Lucia, “Distributed receding horizon control of constrained networked leaderfollower formations subject to packet dropouts,” IEEE Trans. Control Syst. Technol., vol. 26, no. 5, pp. 1798–1809, Sep. 2018. doi: 10.1109/TCST.2017.2723869

[26] 
F. Blanchini and S. Miani, SetTheoretic Methods in Control. 2nd ed. Boston, USA: Birkäuser, 2015.

[27] 
S. Bhattacharya, N. Michael, and V. Kumar, “Distributed coverage and exploration in unknown nonconvex environments,” in Distributed Autonomous Robotic Systems, A. Martinoli, F. Mondada, N. Correll, G. Mermoud, M. Egerstedt, M. A. Hsieh, L. E. Parker, and K. Støy, Eds. Berlin, Heidelberg: Springer, 2013, pp. 61–75.

[28] 
G. Franzè, W. Lucia, and F. Tedesco, “A distributed model predictive control scheme for leaderfollower multiagent systems,” Int. J. Control, vol. 91, no. 2, pp. 369–382, 2018. doi: 10.1080/00207179.2017.1282178

[29] 
G. Franzè, F. Tedesco, and W. Lucia, “Resilient control for cyberphysical systems subject to replay attacks,” IEEE Control Syst. Lett., vol. 3, no. 4, pp. 984–989, Oct. 2019. doi: 10.1109/LCSYS.2019.2920507

[30] 
D. R. Ding, Z. D. Wang, and Q. L. Han, “A setmembership approach to eventtriggered filtering for general nonlinear systems over sensor networks,” IEEE Trans. Autom. Control, vol. 65, no. 4, pp. 1792–1799, Apr. 2020. doi: 10.1109/TAC.2019.2934389
