Next Article in Journal
Fatigue Life Analysis of In Situ Conversion Burner Heaters for Oil Shale Based on the Numerical Simulation Method
Previous Article in Journal
A Comprehensive Review on the Integration of Renewable Energy Through Advanced Planning and Optimization Techniques
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism

1
School of Mathematical Science, Bohai University, Shenyang 121013, China
2
School of Instrument Science and Engineering, Harbin Institute of Technology, P.O. Box 416, Harbin 150001, China
3
Department of Biomedical Engineering, City University of Hong Kong, Hong Kong, China
4
School of Electrical and Electronic Engineering, Nanyang Technological University, Singapore 639798, Singapore
*
Author to whom correspondence should be addressed.
Energies 2025, 18(11), 2962; https://doi.org/10.3390/en18112962
Submission received: 21 April 2025 / Revised: 22 May 2025 / Accepted: 26 May 2025 / Published: 4 June 2025

Abstract

:
This study highlights the security control challenge for multi-agent systems (MASs) with integrated attack detectors under deception attacks (DAs). We develop an adaptive backstepping security control strategy designed to simultaneously detect DAs and maintain cooperative system performance. First, a DA detection mechanism is proposed using a state observer. The analytical results reveal that observer errors grow unbounded under DAs but converge to zero in attack-free scenarios, enabling effective attack identification. Following detection, we integrate a Nussbaum function into the backstepping control framework to manage unknown time-varying output gains. Additionally, adaptive parameters, dynamically adjusted based on DA signals, are designed to compensate for actuator and sensor deviations induced by attacks. Rigorous Lyapunov-based analysis proves that the proposed controller ensures output tracking under deception attacks, the timely detection of attack signals, and the boundedness of all closed-loop signals. Numerical simulations further confirm the theoretical findings and demonstrate the effectiveness of the proposed method.

1. Introduction

In the past few decades, distributed cooperative control of multi-agent systems (MASs) has received significant attention owing to its wide applications in various fields, for example, smart grids [1,2], transportation networks [3], sensor networks [4], and so on. Most current research on distributed cooperative control problems assumes a secure and non-attacked scenario to guarantee safe and stable data output. However, MASs consisting of N agents, which rely on communication topologies, actuators, and sensor networks to exchange information and transmit data, are vulnerable to attack. As such, in multi-agent systems (MAS), deception attacks may disrupt controllers or actuators, compromising the integrity of their output signals. This can trigger closed-loop stability issues and ultimately prevent the MAS from achieving cooperative control objectives. The authors of [5] proposed an effective, robust distributed frequency controller for multi-area power systems, where network communication between distributed wind energy units is vulnerable to attacks. However, without analyzing the impacts of cyber attacks, the proposed control method may fail to achieve its control objectives in such an adversarial environment. To compensate for the impact of the attack, considering stochastic FDI attacks [6] and sensor attacks [7], Ref. [6] designed adaptive security control protocols considering nonlinear multi-agent systems to realize cooperative control objectives. Consequently, it is crucial to design a secure control protocol for cooperative control of a distributed mass under attack.
Numerous recent studies have focused on addressing denial attacks (DAs) in MASs, proposing various control strategies to counteract them. A distributed impulsive controller is proposed in [8,9] for multi-agent systems with deception attacks under the impulsive control framework to solve the secure synchronization control problem. In [10], a distributed secure control scheme is developed for multi-agent systems under sensor DAs to compensate for the effect of unknown control gains caused by sensor DA. A security control protocol is designed in [11] to ensure secure sampling of data in a communication network for a class of nonlinear multi-agent systems subject to DAs. Zhang et al. [12] used a Bernoulli process to represent the startup success rate of random spoofing attacks and studied the coordinated control problem of networked high-order fully driven multi-agents under random DAs in feedback channels and forward channels. Considering more general uncertain DA scenarios, a neural network-based adaptive algorithm is designed in [13] for uncertain nonlinear multi-agent systems to achieve impulsive consensus control. However, the attack may not be detected under well-designed attack solutions, so it is important to build an effective attack detection mechanism, which motivates our work in this article.
The development of an attack detection mechanism has been the focus of the control community. It enables the system to identify attacks and design solutions to overcome the impact of an attack, which is the foundation for ensuring the safe operation of a system. From the perspective of the direction taken to design attack detection mechanisms, different detection methods have been proposed, see, e.g., [14,15,16,17,18,19,20,21,22,23,24,25,26,27]. The learning method [14,15] can be applied to detect attacks in complex sensor systems. The Kalman filter method [16] applies to attacks in automatic generation control systems, where they can be effectively detected using this type of method. The candidate set construction algorithm [17] is a type of algorithm that can detect attacks by introducing side information. The centralized and distributed monitors method [18] can detect various attacks based on system-theoretic and graph-theoretic processes. Satisfiability modulo theory [19] can detect attacks via the geometric structure of a problem. Existing detection techniques also include adaptive switching mechanisms [20], dynamic watermarking tests [21], distributedrecursivefiltering [22,23], etc. However, none of the attack detection methods mentioned above involve the system’s output information. Therefore, the motivation of this study is to explore how to detect DAs with the help of the output information of a system.
Meanwhile, compared to existing results on the cooperative control of MASs, to realize the cooperative security control of MASs under DAs, we need to overcome three technical barriers. Firstly, the effect of DAs on output information must be fully considered in MASs, but there is currently no detection method based on output information; therefore, a novel approach needs to be developed to design an effective DA detection mechanism. Secondly, the nature of DA makes the actuator and sensor deviation unknown and time-varying, rendering the standard backstepping technique inapplicable due to the lack of prior knowledge of the gain parameter. Thirdly, the indeterminacy of output signals and the presence of deviation terms in the observer under DAs increases the difficulty of designing the system controller using the backstepping method.
This paper constructs a DA detection mechanism via an output feedback observer and further develops an effective control protocol to achieve cooperative control of MASs under DAs. The major contributions of our work are summarized as follows:
(1) In contrast to the attack detection mechanism in reference [28,29], a dynamic detection mechanism, which only utilizes observer error obtained via agent output information as a threshold, is proposed in this paper to identify DAs, thereby overcoming the problem of difficulties in forming a stable mapping relationship between agent outputs.
(2) By adopting the idea of the dynamic filtering technique, as in [30], we propose a first-order filter to avert a direct differentiation of virtual control signals in control design. Meanwhile, introducing two adaptive parameters depends on the DA signal into the Lyapunov function to compensate for the attack deviation still involved in the Lyapunov stability analysis.
(3) A class of adaptive parameters dependent on the signal of the DAs and Nussbaum function are well-integrated into backstepping control to design a control framework with appropriate adaptive laws and a control protocol, which can effectively compensate for the impact caused by DAs and achieve the cooperative control of MASs under DAs.
The remaining part of the paper is organized as follows. Section 2 expresses the preliminaries and problem formulation. The detection method design is given in Section 3. The main results are shown in Section 4, and simulation results are illustrated in Section 5 to show the developed strategy. Finally, Section 6 concludes the paper.

2. Preliminaries and Problem Formulation

2.1. Information Transmission Among Agents

Suppose that the communication topology among the N agents is represented by an undirected graph Γ = V , F , D , where V = 1 , 2 , N , F V × V and D = a i , j R N × N denote the agent set, the edge set, and the adjacency matrix, respectively. An edge i , j F indicates that agent i can receive information from agent j , but not necessarily vice versa. The set of neighbors of the i th agent is denoted as N i = j | j , i F . The weight of the adjacency matrix is defined as a i i = 0 ,   a i j = 1 if j , i V , ; otherwise, a i j = 0 . The in-degree matrix is defined as Δ = diag Δ i R N × N with Δ i = j = 1 N a i , j . The Laplacian matrix is defined as L = Δ D . In addition, we define matrix H = diag h 1 , , h N , h i = 1 to indicate that the i-th follower can receive information from the leader node; otherwise, h i = 0 .

2.2. Problem Statement

To better illustrate our developed method of the control protocol analysis and design, we consider a kind of MAS with N N 2 agents, and each agent is modeled by
x ˙ i , h = x i , h + 1 x ˙ i , n i = u i + ς i t y i = Ξ i
where i = 1 , , N ,   h = 1 , , n i 1 ,   x i , h and u i R n i are the state and control input of the i-th agent, respectively. y i is the measurable output. ς i t denotes the actuator deviation of the DAs on the i th agent. Ξ i represents the output model considering DA, and it is represented by
Ξ i = G i x i , 1 ,   ϕ i t 0 x i , 1 ,   ϕ i t = 0
where ϕ i t = Ξ i x i , 1 shows the sensor deviation caused by the DAs.
The actuator and sensor deviations are described as follows.
Actuator deviation caused via DA
To provide a more intuitive description of whether the attack is successful, define the actuator deviation ς i t = γ i t ς ˘ i t caused by the DAs, with ς ˘ i t R being the DA signal generated by the attacker. γ i t is an attack variable, and the DA signal ς ˘ i t satisfies | | ς ˘ | | 2 ς ¯ , in which ς ¯ > 0 is a constant and ς ˘ = [ ς ˘ i , , ς ˘ N ] T .
Sensor deviation caused via DA
Similar to Actuator deviation, we define sensor deviation ϕ i t = γ i t ϕ ˘ i t with ϕ ˘ i t being the DA signal dependent on x i , 1 generated by the attacker. Moreover, ϕ ˘ i satisfies | | ϕ ˘ | | 2 ϕ ¯ , in which ϕ ¯ > 0 is a constant and ϕ ˘ = [ ϕ ˘ i , , ϕ ˘ N ] T .
Due to the synchronous impact of the DA considered in this paper on both the actuators and sensors, i.e., they are either simultaneously attacked or neither, and there is no case where the actuators and sensors are individually attacked, we employ the same attack variable γ i t , and it is described by
γ i t = 1 ,   attack   occurrence 0 ,   no   attack  
Via (2), we can easily see that if a DA occurs, then y i = Ξ i = G i x i , 1 ; otherwise, ς i t = 0 and y i = Ξ i = x i , 1 .
Remark 1.
Attackers are usually limited by energy, so it is reasonable for the deviation attack signals ς ˘ i t and ϕ ˘ i to satisfy the properties mentioned above, and a similar energy-limited constraint can be found in [31] and the references therein. Meanwhile, to better identify the DAs, an attack detection mechanism is designed in Section 3.

2.3. Control Objectives

We develop a class of adaptive cooperative security control protocols for MASs under DA to achieve the following objectives.
(a)
The adaptive cooperative security control is achieved under DA;
(b)
All signals are bounded in the closed-loop system.
In order to achieve the above control objectives, the following assumptions and lemma are required.
Assumption 1.
The communication topology Γ is fixed and connected. The desired trajectory y d t is available to at least one subsystem in Γ .
Assumption 2.
All DAs can be detected via (10).
Assumption 3.
The trajectory y d t of the leader and its n-th order derivatives are piecewise continuous, bounded, and only known by subsystem i with h i = 1 . Moreover, it is known by subsystem i with h i = 0 such that y ˙ d Y d , in which where Y d > 0 is an unknown constant.
Lemma 1.
([32]). For any scalars O R and μ > 0 , the inequality 0 O O 2 O 2 + μ 2 μ holds.

3. Detection Method Design

In practical application, the communication network of MASs is always in a dynamic process due to the information exchanges among agents, which brings unexpected attacks to the communication network of MASs. This operating condition of MASs may make it difficult to form a static mapping relationship between the output y i of an agent, i.e., it is difficult to determine whether MASs achieve cooperative control. Hence, an observer is designed based on the agent’s output information to identify the occurrence of DAs and to develop a reliable cooperative security control protocol for MASs. When DA occurs, the attacked agent is accurately located. Next, we start by designing a DA detection observer, after which an attack detection method and mechanism are developed.

3.1. Attack Detection Observer Design

A DA detection observer was designed to determine whether the agents are attacked or not. The following DA detection observer is designed
x ^ ˙ i , h = x ^ i , h + 1 + l i , h y i x ^ i , 1 x ^ ˙ i , n i = u i + l i , n i y i x ^ i , 1
with x ^ i , h being the estimate of x i , h , h = 1 , , n i 1 .
Define observer error ϰ i = x i x ^ i with ϰ i = [ ϰ i , 1 , , ϰ i , n i ] T , x i = [ y i , , x i , n i ] T and x ^ i = [ x ^ i , 1 , , x ^ i , n i ] T ; differentiating ϰ i with respect to time yields
ϰ ˙ i = ϝ i ϰ i + γ i t ς ˘ i t l i γ i t ϕ ˘ i t
where l i = l i , 1 , , l i , n i T should satisfy the condition that ϝ i = l i , 1 I n i 1 l i , n i 0 is Hurwitz. This implies that there exists a matrix P i = P i T for Q i = Q i T such that ϝ i T P i + P i ϝ i = Q i .
Remark 2.
It is worth noting that due to the existence of DAs, only y i rather than x i , 1 can be used in (3), which leads to the extra terms γ i t ς ˘ i t l i γ i t ϕ ˘ i t in (4). As a result, the actuator and sensor deviation appearing in (27) and (29) and in each step of the backstepping design procedure poses an additional challenge for the stability analysis. To handle the actuator and sensor deviation caused by the DAs, two adaptive parameters related to DA signal ς ˘ i t and ϕ ˘ i t , that is, ξ i = max sup t 0 | ς ˘ i t | and β i , h = max { sup t 0 l i , h | ϕ ˘ i t | } , are defined, and adaptive parameters ξ i and β i , h are introduced into the Lyapunov function. Then, we perform an online estimation of ξ i and β i , h by designing suitable adaptive update laws.
To better identify whether a DA has occurred, we propose the following lemma.
Lemma 2.
Consider MAS (1) with DAs under observer (3); the following properties are satisfied:
lim t ϰ i , 1 = 0 ,   no   attack lim t ϰ i , 1 0 ,   attack
Proof. 
Consider a Lyapunov function candidate as follows:
V 0 = i = 1 N ϰ i T P i ϰ i
Based on (4), take the derivative of V 0 and use Young’s inequality; one has
V ˙ 0 i = 1 N ϰ i T Q ˘ i ϰ i + γ i t 2 | | ς ˘ | | 2 + l i 2 γ i t 2 | | ϕ ˘ | | 2 i = 1 N ϰ i T Q ˘ i ϰ i + γ i t 2 ς ¯ + l i 2 γ i t 2 ϕ ¯
where Q ˘ i = λ min Q i 2 P i 2 with λ min · denotes the minimum eigenvalue of · .
Further, one can obtain
V ˙ 0 a i V 0 + b i
where a i = min i = 1 N Q ˘ i λ max p i > 0 ,   b i = i = 1 N { γ i t 2 ς ¯ + l i 2 γ i t 2 ϕ ¯ } .
For the potential DAs, we proceed with the following discussion based on the DA variable model (2).
C a s e 1: No DAs occur, i.e., γ i t = 0 , where (6) is rewritten as
V ˙ 0 a i V 0
We can easily obtain lim t ϰ i = 0 .
C a s e 2: DAs occur, i.e., γ i t = 1 ; one has
V ˙ 0 a i V 0 + b i
By integrating both sides of (8), one has
0 V 0 t e a i t V 0 0 + b i a i 1 e a i t
In theory, we can easily obtain lim t ϰ i = b i a i 0 .
Hence, based on the above analysis, Lemma 2 is proved.

3.2. Attack Detection Mechanism

Based on a DA detection observer and Lemma 2, a dynamic detection method for DAs is presented, which is expressed as follows:
no   attack ,   if   γ i t = 0 , attack ,     if   γ i t = 1 ,
Hence, according to (2), we can easily know y i = G x i , 1 when a DA occurs and satisfies equation y ˙ i = ω i t x ˙ i , 1 ; otherwise, y ˙ i = x ˙ i , 1 and ς i t = 0 , in which ω i t is an unknown time-varying function, ω i t ω i min , ω i max , with ω i min and ω i max being unknown upper and lower bounds and 0 ω i min , ω i max ; the attack detection threshold ϰ i is designed, and the update rule logic is represented as follows:
lim t ϰ i , 1 = 0 ,   if   γ i t = 0 , lim t ϰ i , 1 0 ,   if   γ i t = 1 ,
Remark 3.
It can be observed from (11) that lim t ϰ i , 1 = 0 indicates no DAs occur; otherwise, DAs occur. Meanwhile, the threshold ϰ i is chosen and updated based on the observer error obtained from the real-time operational output dynamics of MASs.

4. Main Results

In this section, according to a backstepping technique, a class of distributed adaptive cooperative security control protocols is developed for MASs with DAs, and a block diagram of adaptive cooperative control for MASs is given in Figure 1.

4.1. Nussbaum Functions Method

The Nussbaum technique is employed to overcome the unknown time-varying gain problem caused by a DA. Based on this, the following type of Nussbaum function is considered:
N i ϱ i = χ exp ϱ i 2 2 ϱ i 2 + 2 sin ( ϱ i )
with χ > 0 being a constant and ϱ i being a real variable.
Lemma 3.
([33]). Let V be a smooth function defined on 0 , t ω with V t 0 for any t 0 , t ω , and ϱ i s i = 1 , , N are designed as smooth functions with their initials ϱ i 0 being bounded. If the following inequality holds
V t W + 0 t i = 1 N ω i s N i ϱ i s + W ¯ ϱ ˙ i s d s
where W and W ¯ are any constants, ω i s expresses unknown time-varying functions which take values in the unknown closed intervals Q i : ω i min , ω i max ,   V t ,   ϱ i t and 0 t i = 1 N ω i s N i ϱ i + W ¯ ϱ ˙ i d s must be bounded on t 0 , t ω , for i = 1 , , N .

4.2. Controller Design and Stability Analysis

Based on MAS control theory, the cooperative security control protocol is developed via the backstepping technique. The following coordinate transformations are given for system (1)
e i , 1 = j = 1 N a i , j y i y j + h i ( y i y d )
e i , h = x ^ i , h c i , h
ϑ i , h = c i , h Ψ i , h 1 ,   h 2
where Ψ i , h 1 is a virtual controller that is designed later. Via defining e 1 = [ e 1 , 1 , e N , 1 ] T , one has
e 1 = L + H z
where z = [ y 1 y d , y N y d ] T . The introduced state variable c i , h is obtained by the following first-order low-pass filter:
ϖ i , h c ˙ i , h + c i , h = Ψ i , h 1 ,   c i , h 0 = Ψ i , h 1 0
with ϖ i , h > 0 being a design constant.
To simplify the notation, ω i ( ) is denoted as ω i hereafter.
The following sections show the virtual/real controllers and adaptive update laws from two aspects:
C a s e 1: Agents are detected via (10) in relation to occurring DAs, where one has y ˙ i = ω i x ˙ i , 1 .
By choosing appropriate Lyapunov functions, the virtual/real controllers are designed as follows:
Ψ i , 1 = f i N i ϱ i α i , 1 Ψ i , h = b i , h e i , h 3 2 e i , h l i , h ϰ i , 1
β ^ i , h e i , h e i , h 2 + μ i 2 t + c ˙ i , h u i = b i , n i e i , n i 1 2 e i , n i l i , n i ϰ i , 1 + c ˙ i , n i
β ^ i , n i e i , n i e i , n i 2 + μ i 2 t ξ ^ i e i , n i e i , n i 2 + μ i 2 t
where α i , 1 = b i , 1 e i , 1 + 3 4 e i , 1 3 + Y ^ i e i , 1 e i , 1 2 + μ i 2 t h i y ˙ d , Y ^ i is the estimation of Y i = h i 1 Y d ,   f i > 0 and b i , h > 0 ( h = 1 , , n i ) are design parameters. μ i t = s i 1 e s i 2 t with s i 1 and s i 2 being positive constants. β ^ i , h and ξ ^ i are the estimations of β i , h and ξ i , respectively, and β i , h and ξ i have been defined in Remark 2.
The adaptive update laws are defined as
ϱ ˙ i = r i f i e i , 1 α i . 1
Y ^ ˙ i = ν i Y ^ i + ψ i e i , 1 2 e i , 1 2 + μ i 2 t
β ^ ˙ i , h = κ i , m β ^ i , h + d i , h e i , h 2 e i , h 2 + μ i 2 t
ξ ^ ˙ i = φ i ξ ^ i + g i e i , n i 2 e i , n i 2 + μ i 2 t
where h = 2 , , n i , r i , ν i ,   κ i ,   φ i ,   ψ i , d i , h and g i are positive design parameters.
C a s e 2: No DA is detected via (10); we have ς i t = 0 and y ˙ i = x ˙ i , 1 .
By selecting appropriate Lyapunov functions, we define the following virtual/real controllers:
Ψ i , 1 = b ¯ i , 1 e i , 1 3 2 e i , 1 h i y ˙ d Y ^ i e i , 1 e i , 1 2 + μ i 2 t
Ψ i , h = b ¯ i , h e i , h ρ i , h e i , h l i , h ϰ i , 1 + c ˙ i , h
where ρ i , h = 3 2 , ( h = 2 , , n i 1 ) ,   ρ i , n i = 1 2 and u i = Ψ i , n i . b ¯ i , h > 0 ( h = 1 , , n i ) are design parameters.
The adaptive update law is defined as
Y ^ ˙ i = ν ¯ i Y ^ i + ψ ¯ i e i , h 2 e i , h 2 + μ i 2 t
where ν ¯ i and ψ ¯ i are positive design parameters.
The main results are formally stated by the following theorem.
T h e o r e m 1: Consider the MASs (1) subject to DAs satisfying Assumptions 1–3 under C a s e 1 and 2 . If the cooperative control protocol associated with the virtual control signals and adaptive laws are applied, then for any initial condition, there exist positive design parameters b i , h ,   r i ,   ν i ,   κ i ,   φ i ,   f i ,   d i , h ,   g i ,   ψ i ,   b ¯ i , h ,   ν ¯ i and ψ ¯ i such that the control objectives can be achieved.
Proof. 
C a s e 1: According to (2), we know that γ i t = 1 when a DA occurs.
Step 1: Choose the Lyapunov function candidate as
V i , 1 a 1 = V 0 + 1 2 z T L + H z + 1 2 i = 1 N 1 ψ i Y ˜ i 2
where Y ˜ i = Y ^ i Y i denote the estimation errors.
Based on Young’s inequation, from (1), (5), and (12)–(14), one has
V ˙ i , 1 a 1 = V 0 + i = 1 N e i , 1 [ ω i ( ϰ i , 2 + e i , 2 + ϑ i , 2 + Ψ i , 1 ) y ˙ d ] + i = 1 N 1 ψ i Y ˜ i Y ^ ˙ i i = 1 N { Q ˘ i ϰ i 2 + l i 2 γ i t 2 ϕ ¯ + γ i t 2 ς ¯ + e i , 1 [ 3 4 e i , 1 3 + ω i Ψ i , 1 + h i 1 y ˙ d h i y ˙ d ] + 3 4 ω i max 4 + 1 2 e i , 2 2 + 1 2 ϰ i 2 + 1 2 ϑ i , 2 2 + i = 1 N 1 ψ i Y ˜ i Y ^ ˙ i }
Then, via using Lemma 1, substituting (16), (19), and (20) into (26), V ˙ i , 1 a 1 can be rewritten as
V ˙ i , 1 a 1 i = 1 N Φ ϰ i 2 + ς ¯ + l i 2 ϕ ¯ b i , 1 e i , 1 2 + 1 2 ϑ i , 2 2 + 1 2 e i , 2 2 + 3 4 ω i max 4 + μ i Y i ν i ψ i Y ˜ i Y ^ i + ω i N i ϱ i + f i 1 r i ϱ ˙ i
where Φ = Q ˘ i 1 2 .
Step h 2 h n i 1 : Via (3), (13), and (14), the derivative of e i , h can be computed as
e ˙ i , h = e i , h + 1 + Ψ i , h + ϑ i , h + 1 + l i , h ϰ i , 1 + l i , h ϕ i t c ˙ i , h
Choose the Lyapunov function candidate as
V i , h a 1 = V i , h 1 a 1 + 1 2 i = 1 N e i , h 2 + ϑ i , h 2 + 1 d i , h β ˜ i , h 2
where β ˜ i , h = β ^ i , h β i , h .
By applying Young’s inequation, the definition of β i , h and γ i t , and the resulting V ˙ i , h a 1 is
V ˙ i , h a 1 V ˙ i , h 1 a 1 + i = 1 N { e i , h ( e i , h + Ψ i , h + l i , h ϰ i , 1 + β i , h c ˙ i , h ) + 1 2 e i , h + 1 2 + 1 2 ϑ i , h + 1 2 + ϑ i , h ϑ ˙ i , h + 1 d i , h β ˜ i , h β ^ ˙ i , h }
Then, according to Lemma 1, virtual controller (17) and adaptive update law (21), we arrive at
V ˙ i , h a 1 i = 1 N Φ ϰ i 2 + ς ¯ + l i 2 ϕ ¯ + 1 2 e i , h + 1 2 + 3 4 ω i max 4 + 1 2 m = 2 h + 1 ϑ i , m 2 + m = 2 h ϑ i , m ϑ ˙ i , m m = 1 h b i , m e i , m 2 + m = 2 h β i , m μ i m = 2 h κ i , m d i , m β ˜ i , m β ^ i , h + μ i Y i ν i ψ i Y ˜ i Y ^ i + ω i N i ϱ i + f i 1 r i ϱ ˙ i
Step n i : Choose the Lyapunov function candidate as
V i , n i a 1 = V i , n i 1 a 1 + 1 2 i = 1 N e i , n i 2 + ϑ i , n i 2 + 1 d i , n i β ˜ i , n i 2 + 1 g i ξ ˜ i 2
where ξ ˜ i = ξ ^ i ξ i .
Using (3) and (13), the derivative of V i , n i a 1 is computed as
V ˙ i , n i a 1 V ˙ i , n i 1 a 1 + i = 1 N e i , n i ( u i + ς i t + l i , n i ϰ i , 1 + l i , n i ϕ i t c ˙ i , n i ) + ϑ i , n i ϑ ˙ i , n i + 1 d i , h β ˜ i , h β ^ ˙ i , h + 1 g i ξ ˜ i ξ ^ ˙ i
In light of Lemma 1 and the definition of β i , n i , ξ i and γ i t , by inserting (18), (21), and (22) into (29), we can readily deduce that
V ˙ i , n i a 1 i = 1 N Φ ϰ i 2 + ς ¯ + l i 2 ϕ ¯ + 3 4 ω i max 4 + μ i Y i + 1 2 m = 2 n i ϑ i , m 2 + ϑ i , m ϑ ˙ i , m m = 1 n i b i , m e i , m 2 + m = 2 n i β i , m μ i m = 2 n i κ i , m d i , m β ˜ i , m β ^ i , m ν i ψ i Y ˜ i Y ^ i + μ i ξ i φ i g i ξ ˜ i ξ ^ i + ω i N i ϱ i + f i 1 r i ϱ ˙ i
According to properties of μ i , one can obtain
k ¯ i = ( Y i + ξ i + m = 2 n i β i , m ) 0 + μ i τ d τ > ( Y i + ξ i + m = 2 n i β i , m ) 0 t μ i τ d τ
such that k ¯ i > 0 is a finite constant.
Meanwhile, by defining p ¯ i , m = max { | Ψ ˙ i , m 1 | } , from (14) and (15), we obtain
ϑ i , m ϑ ˙ i , m ϑ i , m ϑ i , m ϖ i , m + p i , m 1 ϖ i , m p i , m 2 2 σ i , m ϑ i , m 2 + σ i , m 2
with σ ¯ i , m > 0 being a constant.
Based on Young’s inequality, substituting (31)–(32) into (30) gives
V ˙ i , n i a 1 i = 1 N Φ ϰ i 2 φ i 2 g i ξ ˜ i 2 m = 2 n i κ i , m 2 d i , m β ˜ i , m 2 ν i 2 ψ i Y ˜ i 2 + m = 2 n i 1 ϖ i , m p i , m 2 2 σ i , m 1 2 ϑ i , m 2 + ς ¯ + l i 2 ϕ ¯ m = 1 n i b i , m e i , m 2 + φ i 2 g i ξ i 2 + ν i 2 ψ i Y i 2 + k ¯ i + m = 2 n i κ i , m 2 d i , m β i , m 2 + σ i , m 2 + 3 4 ω i max 4 + ω i N i ϱ i + f i 1 r i ϱ ˙ i η ¯ V a 1 + υ ¯ + ω i N i ϱ i + f i 1 r i ϱ ˙ i
where η ¯ = min { Φ λ max P ,   b i , m ,   φ i ,   κ i , m ,   ν i ,   2 ( 1 ϖ i , h p i , h 2 2 σ i , h 1 2 ) } > 0 ,   υ ¯ = i = 1 N ( ς ¯ + l i 2 ϕ ¯ + φ i 2 g i ξ i 2 + ν i 2 ψ i Y i 2 + k ¯ i + m = 2 n i ( κ i , m 2 d i , m β i , m 2 + σ i , m 2 ) + 3 4 ω i max 4 ) .
C a s e 2: According to (2), we know that γ i t = 0 when no DA occurs.
Step 1: Choose the Lyapunov function candidate as
V i , 1 s = V 0 + 1 2 z T L + H z + 1 2 i = 1 N 1 ψ ¯ i Y ˜ i 2
Based on Young’s inequation, from (1), (5), and (12)–(14), one has
V ˙ i , 1 s i = 1 N { Q ˘ i ϰ i 2 + e i , 1 [ 3 2 e i , 1 + Ψ i , 1 h i y ˙ d + h i 1 y ˙ d ] + 1 2 e i , 2 2 + 1 2 ϰ i 2 + 1 2 ϑ i , 2 2 + i = 1 N 1 ψ ¯ i Y ˜ i Y ^ ˙ i }
Then, via using Lemma 1, substituting (23) and (25) into (34), V ˙ i , 1 s can be rewritten as
V ˙ i , 1 s i = 1 N Φ ϰ i 2 b ¯ i , 1 e i , 1 2 + 1 2 ϑ i , 2 2 + 1 2 e i , 2 2 + μ i Y i ν ¯ i ψ ¯ i Y ˜ i Y ^ i
with Φ = Q ˘ i 1 2 .
Step h 2 h n i : Choose the Lyapunov function candidate as V i , h s = V i , h 1 s + 1 2 i = 1 N e i , h 2 + ϑ i , h 2 . Apply the same method as (32), define p ¯ i , h = max { | Ψ ˙ i , h 1 | } , based on (1), (13), (14), and (24), where the derivative of V i , h s can be calculated as
V ˙ i , n i s i = 1 N Φ ϰ i 2 ν i 2 ψ i Y ˜ i 2 m = 1 n i b ¯ i , m e i , m 2 + m = 2 n i 1 ϖ i , m p ¯ i , m 2 2 σ ¯ i , m 1 2 ϑ i , m 2 + ν ¯ i 2 ψ ¯ i Y i 2 + k ¯ 1 + m = 2 n i σ ¯ i , m 2 η ˘ V s + υ ˘
where σ ¯ i , m > 0 is a constant, and η ˘ = min { Φ λ max P ,   b ¯ i , m ,   ν ¯ i ,   2 ( 1 ϖ i , h p ¯ i , m 2 2 σ ¯ i , m 1 2 ) } > 0 ,   υ ˘ = i = 1 N ( ν ¯ i 2 ψ ¯ i Y i 2 + k ¯ i + m = 2 n i σ ¯ i , m 2 ) , with k ¯ 1 = i = 1 N Y i 0 + μ i τ d τ > i = 1 N Y i 0 t μ i τ d τ > 0 being a finite constant.
Then, considering C a s e 1 and C a s e 2, construct a total Lyapunov function V = V a 1 + V s . Based on (33) and (35), the derivative of V can be expressed as
V η V + υ + ω i N i ϱ i + f i 1 r i ϱ ˙ i
where η = min { η ¯ , η ˘ } and υ = max { υ ¯ , υ ˘ } .
By integrating both sides of (36), one has
0 V t e η t V 0 + υ η 1 e η t + e η t i = 1 N 0 t ω i N i ϱ i + f 1 r ϱ ˙ i τ e η τ d τ
Then, according to Lemma 3, we know that V t , ϱ i t and 0 t ω i N i ϱ i + f 1 r ϱ ˙ i τ d τ are bounded on t 0 , t ω . Moreover, we can easily obtain
0 t ω i N i ϱ i + f 1 r ϱ ˙ i τ e η t τ d τ 0 t ω i N i ϱ i + f 1 r ϱ ˙ i τ d τ
Hence, 0 t ω i N i ϱ i + f 1 r ϱ ˙ i τ e η t τ d τ is bounded on t 0 , t ω .
Then, define
δ = max t 0 , t ω i = 1 N 0 t ω i N i ϱ i + f 1 r ϱ ˙ i τ e η t τ d τ ,
where we can obtain
0 V t e η t V 0 + υ η 1 e η t + δ
By applying (37) and the definition of V, we arrive at e 2 2 e η t V 0 + 2 υ η 1 e η t + δ . Then, theoretically, for any ϵ > 0 , on account of the definitions of η ,   υ and δ , and selecting the design parameters appropriately makes the inequality 2 υ η + δ ϵ 2 ι L + H 2 hold, where ι L + H is the minimum singular value of L + H . Further, based on Lemma 2 in [34], we have lim t y i y r ϵ , i.e., the tracking error z i = y i y r is proved to be bounded. Distinctly, (37) means that all variables are bounded in system (1). Further, the control objectives of MASs are achieved. This completes the proof.
Remark 4.
Although the study presented in [35] employs a nonlinear backstepping control strategy optimized by metaheuristic algorithms to improve trajectory tracking for a quadrotor-slung load system, it primarily focuses on enhancing performance in a deterministic and attack-free environment. In contrast, our work investigates a fundamentally different and more challenging problem: achieving resilient cooperative control in MASs subjected to DAs. Instead of relying on metaheuristic optimization, we construct an output-feedback-based detection mechanism and integrate it into a Lyapunov-guided adaptive backstepping framework, which simultaneously ensures timely attack identification and boundedness of all closed-loop signals. Our approach addresses both the detection and mitigation of malicious attacks, which are not considered in [35], thereby contributing to the security and robustness of MASs under adversarial conditions.
Remark 5.
Generally speaking, most research on adaptive cooperative control has only focused on ensuring system stability in the presence of attacks. There are few studies that explore joint methods for detecting and mitigating attacks. Moreover, current DA detection methods mainly adopt a class of detection mechanisms with a constant threshold and linear feedback controllers to deal with DAs, which leads to constraints and complex DA detection mechanism designs. However, in this paper, we propose an output-based DA detection method, which only requires the output information of agents and does not depend on any additional conditions. With this method, the predictability of DAs is achieved in a system. Based on this, a control protocol is developed to mitigate the effects of DAs and ensure the performance of MASs under DAs. Compared to previous works, this approach provides a more efficient and effective DA detection and mitigation method for MASs.

5. Simulation Results

To illustrate the effectiveness of the developed control scheme, the following MASs are considered
x ˙ i , 1 = x i , 2 x ˙ i , 2 = u i + ς i t y i = Ξ i
where ς i t = 5 + 2 sin ( t ) , and if ϕ t 0 ; then, Ξ i = sin ( x i , 1 ) + x i , 1 ; otherwise, Ξ i = x i , 1 . Meanwhile, the communication digraph is depicted in Figure 2, where the leader node represents a reference unit that provides the desired trajectory or consensus target for the system, and the agents are individual dynamic nodes that aim to follow or synchronize with the leader based on local interactions.
In the simulation, all the states and adaptive update law initials are selected as zero, except that x ^ 12 0 = 0.1 ,   x ^ 22 0 = 0.12 ,   x ^ 32 0 = 0.13 ,   x ^ 42 0 = 0.14 ,   x ^ 52 0 = 0.25 . The controller coefficients and adaptive update laws parameters are chosen as b i , 1 = 120 ,   b i , 2 = 150 ,   l i , 1 = 15 ,   l i , 2 = 20 ,   f i = 0.05 ,   χ = 5 ,   r i = 0.005 ,   ν i = 0.5 ,   ψ i = 0.3 ,   κ i , h = 0.2 ,   d i , h = 25 ,   φ i = 0.045 ,   g i = 0.015 ,   s i 1 = s ¯ i 1 = s ˘ i 1 = 3 ,   s i 2 = s ¯ i 2 = s ˘ i 2 = 0.01 . In addition, the leader trajectory is selected as y d = 0.5 sin ( 0.1 t ) + 0.5 sin ( 0.05 t ) .
The simulation results are presented in Figure 3, Figure 4 and Figure 5 to verify the effectiveness of the proposed detection and control framework. As illustrated in Figure 3, the behavior of the observer errors under different conditions is examined under the developed control protocol (24) for MASs with or without DA; (a) this represents the fact that the observer errors can converge to 0 when t tends to infinity (i.e., lim t ϰ i , 1 = 0 ) in the absence of a DA; (b) here, the observer errors cannot converge to 0 when t tends to infinity (i.e., lim t ϰ i , 1 0 ) in the presence of a DA, i.e., the design sees that the attack detection observer can effectively detect the DA via Lemma 2. Under a DA, the tracking performance of each agent and the evolution of control input are shown in Figure 4 and Figure 5, which further illustrate the performance of the multi-agent system under a DA. In both figures, two different controllers are compared: (a) this shows the results using a controller (18), which does not incorporate DA-resilient features, while (b) employs controller (24), which is specifically designed to handle DAs. Figure 4 demonstrates the tracking performance of each agent under these controllers, and Figure 5 presents the evolution of the control inputs. From the comparative analysis, it is evident that controller (24) not only ensures the effective detection of DAs but also maintains satisfactory tracking performance and bounded control inputs despite the presence of attacks. This confirms the robustness and resilience of the proposed control strategy in adversarial environments. The combined simulation results strongly support the theoretical developments and show that the proposed method achieves both secure state estimation and cooperative tracking control in the presence of DAs.

6. Conclusions

In this article, a DA detection mechanism based on the output information of an agent has been developed in MASs. The adverse effects generated by a DA have been resolved through the design of the Nussbaum function and adaptive update laws dependent on the DA signal. Moreover, an adaptive cooperative security control protocol has been proposed for MASs under a DA via backstepping technology to achieve cooperative control and ensure that all the closed-loop signals are bounded. The proposed framework effectively integrates detection, mitigation, and control strategies to enhance the resilience of MASs against a DA. The introduction of the Nussbaum function addresses unknown control directions caused by DA, while the adaptive laws allow the system to dynamically compensate for disturbances without requiring prior knowledge of attack models. Furthermore, the backstepping-based design ensures stability and cooperation in a fully distributed manner. These key findings demonstrate the potential of the proposed approach in real-world applications where security and cooperation are critical. It is worth noting that this article only considers the distributed resilient cooperative control problem under a single-leader case. Thus, generalizing this result to the multiple-leader case is an interesting direction for future research.

Author Contributions

Methodology, S.Z.; software, S.Z.; validation, K.Z.; formal analysis, S.Z. and K.Z.; writing—original draft preparation, S.Z.; writing—review and editing, K.Z. and Z.H.; supervision, Z.H.; funding acquisition, Z.H. All authors have read and agreed to the published version of the manuscript.

Funding

This work is supported by the European Union’s Horizon 2022 Research and Innovation Programme for the Marie Skłodowska-Curie Actions under Grant 101108472.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data involved are contained within the paper.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Li, F.; Qin, J.; Kang, Y. Multi-agent system based distributed pattern search algorithm for non-convex economic load dispatch in smart grid. IEEE Trans. Power Syst. 2018, 34, 2093–2102. [Google Scholar] [CrossRef]
  2. Hu, Z.; Su, R.; Wang, R.; Liu, G.; Zhang, K.; Xie, X. Robust distributed load frequency control for multiarea wind energy-dominated microgrids considering phasor measurement unit failures. IEEE Internet Things J. 2024, 11, 23475–23484. [Google Scholar] [CrossRef]
  3. Liu, Y.; Wang, Y.; Li, Y.; Gooi, H.B.; Xin, H. Multi-agent based optimal scheduling and trading for multi-microgrids integrated with urban transportation networks. IEEE Trans. Power Syst. 2020, 36, 2197–2210. [Google Scholar] [CrossRef]
  4. Ogren, P.; Fiorelli, E.; Leonard, N.E. Cooperative control of mobile sensor networks: Adaptive gradient climbing in a distributed environment. IEEE Trans. Autom. Control 2004, 49, 1292–1302. [Google Scholar] [CrossRef]
  5. Hu, Z.; Zhang, K.; Su, R.; Wang, R. Robust cooperative load frequency control for enhancing wind energy integration in multi-area power systems. IEEE Trans. Autom. Sci. Eng. 2025, 22, 1508–1518. [Google Scholar] [CrossRef]
  6. Liu, G.; Sun, Q.; Su, H.; Wang, M. Adaptive cooperative fault-tolerant control for output-constrained nonlinear multi-agent systems under stochastic fdi attacks. IEEE Trans. Circuits Syst. Regul. 2025, 99, 1–12. [Google Scholar] [CrossRef]
  7. Liu, G.; Sun, Q.; Su, H.; Hu, Z. Adaptive tracking control for uncertain nonlinear multi-agent systems with partially sensor attack. IEEE Trans. Autom. Sci. Eng. 2025, 22, 6270–6279. [Google Scholar] [CrossRef]
  8. He, W.; Gao, X.; Zhong, W.; Qian, F. Secure impulsive synchronization control of multi-agent systems under deception attacks. Inf. Sci. 2018, 459, 354–368. [Google Scholar] [CrossRef]
  9. Hu, Z.; Su, R.; Ling, K.-V.; Guo, Y.; Ma, R. Resilient event-triggered MPC for load frequency regulation with wind turbines under false data injection attacks. IEEE Trans. Autom. Sci. Eng. 2024, 21, 7073–7083. [Google Scholar] [CrossRef]
  10. Wang, X.; Cao, Y.; Niu, B.; Song, Y. A novel bipartite consensus tracking control for multiagent systems under sensor deception attacks. IEEE Trans. Cybern. 2023, 53, 5984–5993. [Google Scholar] [CrossRef]
  11. Cui, Y.; Liu, Y.; Zhang, W.; Alsaadi, F.E. Sampled-based consensus for nonlinear multiagent systems with deception attacks: The decoupled method. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 561–573. [Google Scholar] [CrossRef]
  12. Zhang, D.-W.; Liu, G.-P. Predictive sliding-mode control for networked high-order fully actuated multiagents under random deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 484–496. [Google Scholar] [CrossRef]
  13. Ren, C.-E.; Li, J.; Shi, Z.; Guan, Y.; Chen, C.L.P. Adaptive impulsive consensus of nonlinear multiagent systems with limited bandwidth under uncertain deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 4592–4604. [Google Scholar] [CrossRef]
  14. Aboelwafa, M.M.; Seddik, K.G.; Eldefrawy, M.H.; Gadallah, Y.; Gidlund, M. A machine-learning-based technique for false data injection attacks detection in industrial IoT. IEEE Internet Things J. 2020, 7, 8462–8471. [Google Scholar] [CrossRef]
  15. Ma, R.; Hu, Z. Deep-Neural-Network-Controlled Safety-Critical Systems with Uncertainty Resilience. IEEE Internet Things J. 2024, 11, 24061–24072. [Google Scholar] [CrossRef]
  16. Khalaf, M.; Youssef, A.; El-Saadany, E. Joint detection and mitigation of false data injection attacks in agc systems. IEEE Trans. Smart Grid 2018, 10, 4985–4995. [Google Scholar] [CrossRef]
  17. Lu, A.-Y.; Yang, G.-H. Detection and identification of sparse sensor attacks in cyber physical systems with side information. IEEE Trans. Autom. Control 2022, 9, 5349–5364. [Google Scholar] [CrossRef]
  18. Pasqualetti, F.; Dörfler, F.; Bullo, F. Attack detection and identification in cyber-physical systems. IEEE Trans. Sutomatic Control 2013, 58, 2715–2729. [Google Scholar] [CrossRef]
  19. Shoukry, Y.; Nuzzo, P.; Puggelli, A.; Sangiovanni-Vincentelli, A.L.; Seshia, S.A.; Tabuada, P. Secure state estimation for cyber-physical systems under sensor attacks: A satisfiability modulo theory approach. IEEE Trans. Autom. Control 2017, 62, 4917–4932. [Google Scholar] [CrossRef]
  20. An, L.; Yang, G.-H. Secure state estimation against sparse sensor attacks with adaptive switching mechanism. IEEE Trans. Autom. Control 2017, 63, 2596–2603. [Google Scholar] [CrossRef]
  21. Hespanhol, P.; Porter, M.; Vasudevan, R.; Aswani, A. Sensor switching control under attacks detectable by finite sample dynamic watermarking tests. IEEE Trans. Autom. Control 2020, 66, 4560–4574. [Google Scholar] [CrossRef]
  22. Ding, D.; Han, Q.-L.; Wang, Z.; Ge, X. Recursive filtering of distributed cyber-physical systems with attack detection. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 6466–6476. [Google Scholar] [CrossRef]
  23. Ma, R.; Hu, Z.; Xu, L.; Wu, L. Distributed Secure Estimation Against Sparse False Data Injection Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 2685–2697. [Google Scholar] [CrossRef]
  24. Hu, Z.; Liu, S.; Luo, W.; Wu, L. Resilient distributed fuzzy load frequency regulation for power systems under cross-layer random denial-of-service attacks. IEEE Trans. Cybern. 2022, 52, 2396–2406. [Google Scholar] [CrossRef]
  25. Ding, F.; Shan, H.; Han, X.; Jiang, C.; Peng, C.; Liu, J. Security-based resilient triggered output feedback lane keeping control for human–machine cooperative steering intelligent heavy truck under denial-of-service attacks. IEEE Trans. Fuzzy Syst. 2023, 31, 2264–2276. [Google Scholar] [CrossRef]
  26. Gao, Z.; Song, Y.; Polycarpou, M.M. Adaptive security control using output only for quantized nonlinear systems under irregularly intermittent DoS attacks. IEEE Trans. Cybern. 2024, 54, 6755–6766. [Google Scholar] [CrossRef]
  27. Hu, Z.; Liu, S.; Luo, W.; Wu, L. Intrusion-detector-dependent distributed economic model predictive control for load frequency regulation with PEVs under cyber attacks. IEEE Trans. Circuits Syst. I Regular Pap. 2021, 68, 3857–3868. [Google Scholar] [CrossRef]
  28. Kazemi, Z.; Safavi, A.A.; Arefi, M.M.; Naseri, F. Finite-time secure dynamic state estimation for cyber–physical systems under unknown inputs and sensor attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 52, 4950–4959. [Google Scholar] [CrossRef]
  29. Huang, X.; Dong, J. An adaptive secure control scheme for t–s fuzzy systems against simultaneous stealthy sensor and actuator attacks. IEEE Trans. Fuzzy Syst. 2021, 29, 1978–1991. [Google Scholar] [CrossRef]
  30. Swaroop, D.; Hedrick, J.K.; Yip, P.P.; Gerdes, J.C. Dynamic surface control for a class of nonlinear systems. IEEE Trans. Autom. Control 2000, 45, 1893–1899. [Google Scholar] [CrossRef]
  31. Wen, G.; Zhai, X.; Peng, Z.; Rahmani, A. Fault-tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control. Commun. Nonlinear Sci. Numer. Simul. 2020, 82, 105043. [Google Scholar] [CrossRef]
  32. Liu, G.; Pan, Y.; Lam, H.-K.; Liang, H. Event-triggered fuzzy adaptive quantized control for nonlinear multi-agent systems in nonaffine pure-feedback form. Fuzzy Sets Syst. 2021, 416, 27–46. [Google Scholar] [CrossRef]
  33. Liu, Z.; Huang, J.; Wen, C.; Su, X. Distributed control of nonlinear systems with unknown time-varying control coefficients: A novel nussbaum function approach. IEEE Trans. Autom. Control 2023, 68, 4191–4203. [Google Scholar] [CrossRef]
  34. Shang, Y.; Chen, B.; Lin, C. Consensus tracking control for distributed nonlinear multiagent systems via adaptive neural backstepping approach. IEEE Trans. Syst. Man Cybern. Syst. 2018, 50, 2436–2444. [Google Scholar] [CrossRef]
  35. Maaruf, M.; Ahmad, S.; Hamanah, W.; Baraean, A.; Shafiul, A.; Mohammad, A.; Shafiullah, M. Advanced Optimization Methods for Nonlinear Backstepping Controllers for Quadrotor-Slung Load Systems. IEEE Access 2025, 13, 66607–66621. [Google Scholar] [CrossRef]
Figure 1. Block diagram of the presented adaptive cooperative control for MASs against DA.
Figure 1. Block diagram of the presented adaptive cooperative control for MASs against DA.
Energies 18 02962 g001
Figure 2. Communication topology.
Figure 2. Communication topology.
Energies 18 02962 g002
Figure 3. Observer errors ϰ i , 1 = y i x ^ i , 1 . (a) Using controller (24) when no DA occurs. (b) Using controller (24) when DA occurs.
Figure 3. Observer errors ϰ i , 1 = y i x ^ i , 1 . (a) Using controller (24) when no DA occurs. (b) Using controller (24) when DA occurs.
Energies 18 02962 g003
Figure 4. Output trajectories of y i and y d under DA. (a) Using controller (18) considering a DA. (b) Using controller (24) without considering a DA.
Figure 4. Output trajectories of y i and y d under DA. (a) Using controller (18) considering a DA. (b) Using controller (24) without considering a DA.
Energies 18 02962 g004
Figure 5. Control input trajectories u i under DA. (a) Controller (18) considering a DA. (b) Controller (24) without considering a DA.
Figure 5. Control input trajectories u i under DA. (a) Controller (18) considering a DA. (b) Controller (24) without considering a DA.
Energies 18 02962 g005
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, S.; Zhang, K.; Hu, Z. Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism. Energies 2025, 18, 2962. https://doi.org/10.3390/en18112962

AMA Style

Zhang S, Zhang K, Hu Z. Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism. Energies. 2025; 18(11):2962. https://doi.org/10.3390/en18112962

Chicago/Turabian Style

Zhang, Shuhan, Kai Zhang, and Zhijian Hu. 2025. "Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism" Energies 18, no. 11: 2962. https://doi.org/10.3390/en18112962

APA Style

Zhang, S., Zhang, K., & Hu, Z. (2025). Cooperative Control for Multi-Agent Systems with Deception Attack Based on an Attack Detection Mechanism. Energies, 18(11), 2962. https://doi.org/10.3390/en18112962

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop