A journal of IEEE and CAA , publishes high-quality papers in English on original theoretical/experimental research and development in all areas of automation

IEEE/CAA Journal of Automatica Sinica

  • JCR Impact Factor: 15.3, Top 1 (SCI Q1)
    CiteScore: 23.5, Top 2% (Q1)
    Google Scholar h5-index: 77, TOP 5
Turn off MathJax
Article Contents
Y. Zhong, Y. Yuan, H. Yuan, M. Wang, and H. Liu, “Multi-spacecraft formation control under false data injection attack: A cross layer fuzzy game approach,” IEEE/CAA J. Autom. Sinica, 2024. doi: 10.1109/JAS.2024.124872
Citation: Y. Zhong, Y. Yuan, H. Yuan, M. Wang, and H. Liu, “Multi-spacecraft formation control under false data injection attack: A cross layer fuzzy game approach,” IEEE/CAA J. Autom. Sinica, 2024. doi: 10.1109/JAS.2024.124872

Multi-Spacecraft Formation Control Under False Data Injection Attack: A Cross Layer Fuzzy Game Approach

doi: 10.1109/JAS.2024.124872
Funds:  This work was supported by the Natural Science Foundation of China (62073268, 62122063, 62203360), the Young Star of Science and Technology in Shaanxi Province 2020KJXX-078
More Information
  • In this paper, we address a cross-layer resilient control issue for a kind of multi-spacecraft system (MSS) under attack. Attackers with bad intentions use the false data injection (FDI) attack to prevent the MSS from reaching the goal of consensus. In order to ensure the effectiveness of the control, the embedded defender in MSS preliminarily allocates the defense resources among spacecrafts. Then, the attacker selects its target spacecrafts to mount FDI attack to achieve the maximum damage. In physical layer, a Nash equilibrium (NE) control strategy is proposed for MSS to quantify system performance under the effect of attacks by solving a game problem. In cyber layer, a fuzzy Stackelberg game framework is used to examine the rivalry process between the attacker and defender. The strategies of both attacker and defender are given based on the analysis of physical layer and cyber layer. Finally, a simulation example is used to test the viability of the proposed cross layer fuzzy game algorithm.

     

  • loading
  • [1]
    T. Wang, M. Hu, and Y. Zhao, “Consensus control with a constant gain for discrete-time binary-valued multi-agent systems based on a projected empirical measure method,” IEEE/CAA Journal of Automatica Sinica, vol. 6, no. 4, pp. 1052–1059, 2019. doi: 10.1109/JAS.2019.1911594
    [2]
    D. Zhang, G. Feng, Y. Shi and D. Srinivasan, “Physical safety and cyber security analysis of multi-agent systems: A survey of recent advances,” IEEE/CAA Journal of Automatica Sinica, vol. 8, no. 2, pp. 319–333, 2021. doi: 10.1109/JAS.2021.1003820
    [3]
    A. A. Cardenas, S. Amin and S. Sastry, “Secure control: Towards survivable cyber-physical systems,” 2008 The 28th Int. Conf. on Distributed Computing Systems Workshops, pp. 495–500, 2008.
    [4]
    A. Lu and G. Yang, “Distributed consensus control for multi-agent systems under denial-of-service,” Information Sciences, vol. 439, pp. 95–107, 2018.
    [5]
    L. Sun, Y. Zhang and C. Sun, “Stochastic denial-of-service attack allocation in leader-following multiagent systems,” IEEE Trans. Systems, Man, and Cybernetics: Systems, 2021.
    [6]
    A. D. Wood and J. A. Stankovic, “Denial of service in sensor networks,” Computer, vol. 35, no. 10, pp. 54–62, 2002. doi: 10.1109/MC.2002.1039518
    [7]
    D. Ding, Z. Wang, D. W. Ho and G. Wei, “Observer-based event-triggering consensus control for multiagent systems with lossy sensors and cyber-attacks,” IEEE Trans. Cybernetics, vol. 47, no. 8, pp. 1936–1947, 2016.
    [8]
    W. He, X. Gao and W. Zhong, “Secure impulsive synchronization control of multi-agent systems under deception attacks,” Information Sciences, vol. 459, pp. 354–368, 2018. doi: 10.1016/j.ins.2018.04.020
    [9]
    A. Mustafa and H. Modares, “Attack analysis and resilient control design for discrete-time distributed multi-agent systems,” IEEE Robotics and Automation Letters, vol. 5, no. 2, pp. 369–376, 2019.
    [10]
    R. Moghadam and H. Modares, “Resilient autonomous control of distributed multiagent systems in contested environments,” IEEE Trans. Cybernetics, vol. 49, no. 11, pp. 3957–3967, 2018.
    [11]
    A. Mustafa, H. Modares and R. Moghadam, “Resilient synchronization of distributed multi-agent systems under attacks,” Automatica, vol. 115, p. 108869, 2020. doi: 10.1016/j.automatica.2020.108869
    [12]
    Y. Mo, E. Garone, A. Casavola and B. Sinopoli, “False data injection attacks against state estimation in wireless sensor networks,” 49th IEEE Conf. on Decision and Control, pp. 5967–5972, 2010.
    [13]
    L. Xie, Y. Mo and B. Sinopoli, “False data injection attacks in electricity markets,” 2010 First IEEE Int. Conf. on Smart Grid Communications, pp. 226–231, 2010.
    [14]
    M. Zuba, Z. Shi, Z. Peng and J. H. Cui, “Launching denial-of-service jamming attacks in underwater sensor networks,” Proc. The Sixth ACM Int. Workshop on Underwater Networks, pp. 1–5, 2011.
    [15]
    T. Basar and G. J. Olsder, “Dynamic noncooperative game theory,” Society for Industrial and Applied Mathematics, p. , 1998.
    [16]
    M. O. Sayin and T. Basar, “Secure sensor design for cyber-physical systems against advanced persistent threats,” Int. Conf. on Decision and Game Theory for Security, pp. 91–111, 2017.
    [17]
    Q. Zhu and T. Basar, “Game-theoretic methods for robustness, security, and resilience of cyberphysical control systems: games-in-games principle for optimal cross-layer resilient control systems,” IEEE Control Systems Magazine, vol. 35, no. 1, pp. 46–65, 2015. doi: 10.1109/MCS.2014.2364710
    [18]
    M. H. Manshaei, Q. Zhu, T. Alpcan, T. Bacsar and J. P. Hubaux, “Game theory meets network security and privacy,” ACM Computing Surveys, vol. 45, no. 3, pp. 1–39, 2013.
    [19]
    Y. Li, L. Shi, P. Cheng, J. Chen and D. E. Quevedo, “Jamming attack on cyber-physical systems: a game-theoretic approach,” 2013 IEEE Int. Conf. on Cyber Technology in Automation, Control and Intelligent Systems, pp. 252–257, 2013.
    [20]
    Y. Li, L. Shi, P. Cheng, J. Chen and D. E. Quevedo, “Jamming attacks on remote state estimation in cyber-physical systems: a game-theoretic approach,” IEEE Trans. Automatic Control, vol. 60, no. 10, pp. 2831–2836, 2015. doi: 10.1109/TAC.2015.2461851
    [21]
    Z. Li, Z. Duan and L. Huang, “$H_{\infty}$ control of networked multi-agent systems,” Journal of Systems Science and Complexity, vol. 22, no. 1, pp. 35–48, 2009. doi: 10.1007/s11424-009-9145-y
    [22]
    M. I. Abouheaf, F. L. Lewis, K. G. Vamvoudakis, S. Haesaert and R. Babuska, “Multi-agent discrete-time graphical games and reinforcement learning solutions,” Automatica, vol. 50, no. 12, pp. 3038–3053, 2014. doi: 10.1016/j.automatica.2014.10.047
    [23]
    Q. Jiao, H. Modares, S. Xu, F. L. Lewis and K. G. Vamvoudakis, “Multi-agent zero-sum differential graphical games for disturbance rejection in distributed control,” Automatica, vol. 69, pp. 24–34, 2016. doi: 10.1016/j.automatica.2016.02.002
    [24]
    P. Zhang, Y. Yuan, L. Guo and H. Liu, “Near-optimal control for time-varying linear discrete systems with additive nonlinearities and random gains,” IEEE Trans. Automatic Control, vol. 64, no. 7, pp. 2968–2975, 2018.
    [25]
    V. G. Lopez, F. L. Lewis, Y. Wan, M. Liu, G. Hewer and K. Estabridis, “Stability and robustness analysis of minmax solutions for differential graphical games,” Automatica, vol. 121, p. 109177, 2020. doi: 10.1016/j.automatica.2020.109177
    [26]
    K. G. Vamvoudakis, F. L. Lewis and G. R. Hudas, “Multi-agent differential graphical games: Online adaptive learning solution for synchronization with optimality,” Automatica, vol. 48, no. 8, pp. 1598–1611, 2012. doi: 10.1016/j.automatica.2012.05.074
    [27]
    Y. Li, D. Shi, and T. Chen, “False data injection attacks on networked control systems: A Stackelberg game analysis,” IEEE Trans. Automatic Control, vol. 63, no. 10, pp. 3503–3509, 2018. doi: 10.1109/TAC.2018.2798817
    [28]
    H. Fang, L. Xu, Y. Zou, X. Wang and K. K. R. Choo, “Three-stage stackelberg game for defending against full-duplex active eavesdropping attacks in cooperative communicatio,” IEEE Trans. Vehicular Technology, vol. 67, no. 11, pp. 10788–10799, 2018. doi: 10.1109/TVT.2018.2868900
    [29]
    D. Korzhyk, Z. Yin, C. Kiekintveld, V. Conitzer and M. Tambe, “Stackelberg vs. Nash in security games: An extended investigation of interchangeability, equivalence, and uniqueness,” Journal of Artificial Intelligence Research, vol. 41, pp. 297–327, 2011. doi: 10.1613/jair.3269
    [30]
    Y. Li, D. Shi and T. Chen, “Secure analysis of dynamic networks under pinning attacks against synchronization,” Automatica, vol. 111, p. 108576, 2020. doi: 10.1016/j.automatica.2019.108576
    [31]
    Y. Li, D. Shi and T. Chen, “False data injection attacks on networked control systems: A Stackelberg game analysis,” IEEE Trans. Automatic Control, vol. 63, no. 10, pp. 3503–3509, 2018. doi: 10.1109/TAC.2018.2798817
    [32]
    K. W. Li, F. Karray, K. W. Hipel and D. M. Kilgour, “Fuzzy approaches to the game of chicken,” IEEE Trans. Fuzzy Systems, vol. 9, no. 4, pp. 608–623, 2001. doi: 10.1109/91.940972
    [33]
    Z Zheng, P Zhang, J. Yuan, “Nonzero-Sum Pursuit-Evasion Game Control for Spacecraft Systems: A Q-Learning Method,” IEEE Trans. Aerospace and Electronic Systems, p. , 2023.
    [34]
    Y. Wang, H. Liu, and H. Tan, “An overview of filtering for sampled-data systems under communication constraints,” Int. Journal of Network Dynamics and Intelligence, pp. 100011–100011, 2023.
    [35]
    C. Deng and C. Wen, “MAS-based distributed resilient control for a class of cyber-physical systems with communication delays under DoS attacks,” IEEE Trans. Cybernetics, vol. 51, no. 15, pp. 2347–2358, 2020.
    [36]
    Y. Wu, B. Kang and H. Wu, “Strategies of attack-defense game for wireless sensor networks considering the effect of confidence level in fuzzy environment,” Engineering Applications of Artificial Intelligence, vol. 102, p. 104238, 2021. doi: 10.1016/j.engappai.2021.104238
    [37]
    Y. Yuan, P. Zhang, Z. Wang and L. Guo, “On resilient strategy design of multi-tasking optimal control for state-saturated systems with nonlinear disturbances: The time-varying case,” Automatica, vol. 107, pp. 138–145, 2019. doi: 10.1016/j.automatica.2019.05.041
    [38]
    L. Ding and W. Sun, “Predefined time fuzzy adaptive control of switched fractional-order nonlinear systems with input saturation,” Int. Journal of Network Dynamics and Intelligence, pp. 100019–100019, 2023.
    [39]
    R. El-Bardan, S. Brahma and P. K. Varshney, “Power control with jammer location uncertainty: A game theoretic perspective,” 2014 48th Annual Conf. on Information Sciences and Systems, pp. 1–6, 2014.
    [40]
    R. Deng, G. Xiao and R. Lu, “Defending against false data injection attacks on power system state estimation,” IEEE Trans. Industrial Informatics, vol. 13, no. 1, pp. 198–207, 2017. doi: 10.1109/TII.2015.2470218
    [41]
    H. Yuan, Y. Xia, H. Yang and Y. Yuan, “Resilient control for wireless networked control systems under DoS attack via a hierarchical game,” Int. Journal of Robust and Nonlinear Control, vol. 28, no. 15, pp. 4604–4623, 2018. doi: 10.1002/rnc.4272
    [42]
    T. Zhang and Q. Zhu, “Distributed privacy-preserving collaborative intrusion detection systems for VANETs,” IEEE Trans. Signal and Information Processing over Networks, vol. 4, no. 1, pp. 148–161, 2018. doi: 10.1109/TSIPN.2018.2801622
    [43]
    Q. Liu, Z. Wang, X. He and D. H. Zhou, “Event-based H consensus control of multi-agent systems with relative output feedback: the finite-horizon case,” IEEE Trans. Automatic Control, vol. 60, no. 9, pp. 2553–2558, 2015. doi: 10.1109/TAC.2015.2394872
    [44]
    C. Zhou, R. Zhao and W. Tang, “Two-echelon supply chain games in a fuzzy environment,” Computers and Industrial Engineering, vol. 55, no. 2, pp. 390–405, 2008. doi: 10.1016/j.cie.2008.01.014
    [45]
    A. Jagat and A. J. Sinclair, “Nonlinear control for spacecraft pursuit- evasion game using the state-dependent Riccati equation method,” IEEE Trans. Aerospace and Electronic Systems, vol. 53, no. 6, pp. 3032–3042, 2017. doi: 10.1109/TAES.2017.2725498
    [46]
    J. Wang, Y. Hong, J. Wang, J. Xu, Y. Tang, Q. L. Han, and J. Kurths, “Cooperative and competitive multi-agent systems: From optimization to games,” IEEE/CAA Journal of Automatica Sinica, vol. 9, no. 5, pp. 763–783, 2022. doi: 10.1109/JAS.2022.105506
    [47]
    H. Modares, B. Kiumarsi, F. L. Lewis, F. Ferrese and A. Davoudi, “Resilient and Robust Synchronization of Multiagent Systems Under Attacks on Sensors and Actuators,” IEEE Trans. Cybernetics, vol. 50, no. 3, pp. 1240–1250, 2020. doi: 10.1109/TCYB.2019.2903411
    [48]
    Z. Zhang, Y. Shi, Z. Zhang, H. Zhang, and S. Bi, “Modified order-reduction method for distributed control of multi-spacecraft networks with time-varying delays,” IEEE Trans. Control of Network Systems, vol. 5, no. 1, pp. 79–92, 2016.

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(6)  / Tables(2)

    Article Metrics

    Article views (81) PDF downloads(20) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return