Abstract
This work investigates the containment control for linear multiagent systems. We assume that the systems are subject to periodic energy-limited denial-of-service (DoS) attacks, which prevent agent-to-agent data transmission. It is assumed that the DoS attacks occur periodically based on the time sequence method. It is also assumed that some devices can be used to predict the duration of DoS attacks and uniform lower bound of communication areas. To achieve containment control, state and disturbance estimators are proposed for each following agent to estimate the relative state information. Under suitable conditions, the containment control problem can be solved with the designed controllers and observers. Finally, we provide a simulation result to confirm the theoretical analysis.
1. Introduction
In recent years, the challenge of coordinated control for multiagent systems has attracted significant research attention due to its several potential applications in spacecraft formation flying, sensor networks, cooperative surveillance, etc. As one of the many cooperation issues, consensus has received wide attention in the past decades. Current research on consensus can be roughly divided into two types, i.e., consensus without a leader [1,2] and consensus with one or multiple leaders. For a single leader case, the followers eventually converge to the state of the leader, a phenomenon called consensus tracking or leader-following consensus problem [3,4,5]. However, for multiple leaders, the followers eventually converge to a convex hull spanned by the leaders, called the containment control problem [6,7,8]. In [6], based on the output of adjacent agents, a distributed dynamic output feedback controller was developed to address the challenge of distributed containment control and provided a necessary and sufficient condition, which was only related to the spectral properties of the topology matrix. The problem of containment control laws was solved for both continuous-time and discrete-time cases in [7]. Considering the unknown leaders, two distributed control protocols based on state feedback and dynamic output feedback were locally designed, and the challenge of adaptive containment control for MASs was solved in [8].
Due to external disturbances, the consensus disturbance rejection problem has attracted substantial attention. In [9], two distributed protocols were designed for a Lipschitz multiagent system, i.e., one was to attain global consensus without external disturbances, whereas the other was to reach consensus with a guaranteed performance. Considering the input delays and disturbances of the system, a controller based on a predictor and disturbance observer was designed for each follower [10]. Consensus could be achieved and all signals in the closed-loop dynamics were eventually and uniformly bounded with the designed distributed protocol. Wang analyzed the consensus disturbance rejection problem for multiple-input multiple-output (MIMO) linear MASs in [5], and consensus was achieved and the external disturbance was suppressed with suitable control parameters and a large average dwell time.
System security is an intriguing and important issue. Network security issues have been broadly studied over the past decade [11,12]. When a multiagent system is attacked, data exchange among agents is interrupted or destroyed, resulting in the instability of the entire system [13,14,15,16]. Generally, two types of attacks exist in a multiagent system, i.e., one is to attack the dynamic behavior (or closed-loop dynamics) of the agents, whereas the other is to attack the communication among the agents. Any attack will seriously influence the consensus properties of the whole system. The second case includes denial-of-service (DoS) attacks as in [13,14,15]. Considering channel interference by an energy-constrained attacker, optimal DoS attack schedules were constructed in [13] to maximize the expected average estimation error. To minimize unnecessary network traffic, Zha et al. proposed a distributed event-triggered secure consensus control for multiagent systems (MASs) subject to DoS attacks [14]. A secure consensus comprising two different measurements was proposed in [15]. The formation control problem for nonlinear multiagent systems (MASs) under DoS attacks was emphatically studied in [16], and the distributed hybrid event-triggering strategies (HETSs) could be applied to preserve formation control.
With this background, we explore the challenge of containment control for the multiagent system with external disturbances and DoS attacks. The contributions of this paper are summarized as follows: (1) The containment control problem of linear MASs with an external perturbation is considered, unlike [5], which only analyzed consensus tracking problems for linear MASs with deterministic disturbances. (2) Three observers are designed to solve the containment control problem, unlike [5,17], which assessed the consensus challenge in a secure network environment. This paper suggests that data exchange among agents is interrupted due to DoS attacks. Data interruption among agents affects the connectivity of the entire network. Therefore, the convergence of the system cannot be guaranteed. Therefore, we provide a summary based on [5] to expand its scope of application.
The subsequent sections are organized as follows. Section 2 introduces the relevant graph theory and the preliminary work. In Section 3, a containment control protocol based on three different observers, with or without attacks is proposed. Simulation examples are provided for the efficacy of the protocol in Section 4. Section 5 presents the conclusions and our future work.
2. Preliminaries and Problem Statement
Notations and Preliminary Results
The notations used in this paper are standard. R and C represent the real number set and complex number set, respectively. is the set of real matrices. I represents an identity matrix with a compatible dimension. denotes transpose (conjugate transpose). represents a diagonal matrix with diagonal elements . Provided that the matrix A has n real eigenvalues, the largest and smallest eigenvalues are denoted by and , respectively. For symmetric matrices A and B, means that is positive (semi-)definite. The -dimensional zero matrix is denoted by . denotes the Euclidean norm, and ⊗ denotes the Kronecker product.
For the multiagent systems, a weighted graph can be used to represent the interaction relationships among agents, where is a node set, represents an edge set, and an adjacency matrix is . We assume that agents 1 to N and agents to are followers and leaders, respectively, and each follower has at least one neighbor, but the leaders have no neighbors. Of note, indicates that agent j can obtain the information from agent i. The elements in are non-negative, i.e., if and only if and otherwise. At the same time, self-loops do not exist, i.e., . A directed path from agent i to agent j is a sequence of edges of the form . Here, denotes a degree matrix, where . Then, the Laplacian matrix of graph is defined as
where and .
Assumption 1.
For each follower, there is at least one leader that gives a directed path to the follower.
Lemma 1
([18]). If Assumption 1 holds, then all the eigenvalues of have positive real parts, each entry of is nonnegative, and the sum of elements in each row of is equal to one. Moreover, there exists a diagonal matrix with such that , where .
Obviously, there is from the above Lemma 1 that is . Then, there exists an orthogonal matrix , such that . Therefore, we can let , and clearly, .
Definition 1
([18]). A set is convex if , for any , and any . For a finite set of points , it the convex hull is defined as .
Herein, we consider multiagent systems comprising N followers and M leaders. Let be the set of followers and be the set of leaders. Here, all followers are assumed homogeneous, and their dynamics are given by
and the dynamics of the leaders are described by
where is the agent i’s state, is the agent i’s control input and is the agent i’s measured output. A, B, C, and D are system matrices with appropriate dimensions. is the external disturbance, generated by a linear exogenous system with the form
where S is a constant matrix.
Then, we address the containment control problem of multiagent systems (1) and (2), which are defined as follows.
Definition 2.
We always assumed that the state of the agent was difficult to obtain and the output of the agent could be obtained directly. To achieve the control objective, the relative output information was used based on the design of the observers and controller. With the developed control laws, the final state of the followers should converge asymptotically to the convex combination formed by the leaders, and the external disturbances should be suppressed. To complete further research, the following results and assumptions are given first, which are used later.
Lemma 2
([19]). Let S be a symmetric matrix partitioned into the block form , where and are symmetric and square, respectively. Then, if and only if
or equivalently
Lemma 3
([20]). Suppose that is a Hermitian matrix, such that , where is, respectively, the maximum and minimum eigenvalue of Ω.
Lemma 4
([21]). Given a symmetric positive definite matrix P, the following inequality holds
where and P is a positive matrix.
Assumption 2.
The exosystem matrix S has different eigenvalues and only an imaginary part, meanwhile is observable.
Assumption 3.
The system matrix D for the disturbance in (1) satisfies the matching condition that there is a matrix such that .
Assumption 4
([5]). The matrix triplet meets
- (i)
- rank() = rank(B) = p,
- (ii)
- rank , where
Let be a relative state vector, , where the weight is chosen as follows in our problem:
where is the connection weight constant between agent i and agent j. For the considered multiagent system, it was assumed that the interconnection topology switched in a finite possible directed graph. The set of all possible topology graphs was denoted as , with index set . The switching signal was used to represent the index of the topology digraph, i.e., at each time t, the underlying graph was . Define
Then, we introduced the error vector for the followers
in which
It can be seen from Lemma 1 that the containment can be realized if , i.e., , as .
3. Main Results
Since we could not obtain the state of agent i directly, we could only use the output to design control protocols. In order to achieve the control objective, an observer (7) was adopted to estimate the relative state by agent i
where is the internal state, , , and was chosen such that was stable.
Remark 1.
The first condition of Assumption 4 can ensure the existence of H and we can conclude that and . At the same time, the second condition of Assumption 4 can guarantee that the matrix pair is detectable, and that F exists. Therefore, there is a such that
Then, we can design . Moreover, is controllable from the second condition of Assumption 4.
In this part, the following observer was constructed to recover
where , , and is a positive constant.
From (7) and (9), the disturbance observer was designed as
where is the state of the disturbance observer and is the internal state of the disturbance observer, and the gain matrices Q and K are given later.
Then, the distributed dynamic adaptive feedback control was given with the form
The design objective of this paper was to construct suitable gain matrices , and Q to achieve containment control with the proposed protocols.
3.1. Containment Control of MASs with Directed Communication Graph without Attacks
In this part, we give one theorem for solving the containment control problem of MASs (1) and (2) under a directed communication topology.
Theorem 1.
Consider the multiagent system (1) and (2) with exogenous disturbance systems (3). Suppose that Assumptions 1–4 are satisfied. Gain matrices and Q can be chosen as , , , where and satisfy (12)–(14)
with , . and the following conditions hold:
in which and are positive constant and . Then, the containment control of MASs (1) and (2) can be achieved via the control protocol (11).
Proof.
where .
According to Lemma 4, the following equalities hold
According and conditions (42), we can obtain
where . Obviously, based on LMIs (12)–(14) and (23), we have . Therefore, through Lyapunov’s theory, we can get , so , , , and . Then, according to the definition of , the MASs (1) and (2) with external disturbance systems (3) achieve containment control with the control protocol (11). This completes the proof. □
For convenience, let , , , and . Then, we can obtain the following closed-loop error dynamics
where , and .
Let , according to the above formula, we get
It is easy to see that if , , , and , then , which means that the containment control is achieved. Thus, the containment control problem of MASs (1) and (2) is transformed into the stability problem of error systems (18)–(21).
Let , and for any , consider the following multiple Lyapunov function (22) for error systems (18)–(21)
in which
where satisfies the LMI
and .
Then, taking the derivative of and using Lemma 4, we can get
Remark 2.
If there is no external perturbation, that is , the considered systems (1) and (2) can still achieve containment control with the designed control protocol (11) which is based on observers (9) and (10). Thus, the control protocol designed in this paper applies to more general systems because it is based on the relative output.
Remark 3.
Unlike article [5], which only discussed the case of a single leader, this paper primarily considered the problem of containment control for multiple leaders. Obviously, when , the considered system in this paper becomes the system in [5], and the system can achieve the consensus if the conditions of Theorem 1 are satisfied. Moreover, article [17] only considered the consensus problem based on output feedback in the undirected communication topology. In this regard, this paper discussed the containment control problem based on adaptive observers in the directed communication topology, which means matrix associated with is not the symmetric matrix, so it is more difficult to obtain the conditions for consensus.
3.2. Containment Control of MASs with DoS Attacks
In this part, the secure containment control problem is considered for systems (1) and (2) under denial-of-service (DoS) attacks. We make the following assumptions to make it easier to deal with the problem.
Assumption 5.
The attackers have limited energy. They can only attack the network a limited number of times instead of unlimited times, and the duration for each attack is upper-bounded.
Assumption 6.
When the attack occurs, all communication among agents is interrupted.
Remark 4.
It is reasonable to assume that the energy of the attackers is limited in Assumption 5 since it represents several practical scenarios. For instance, many digital devices used as attack tools work with batteries, and their attack times are limited due to limited battery energy. The challenge of energy-constrained attacks has been recently discussed, see [13] for more details. Assumption 6, which can also be found in [22], is often a reality in practice.
Based on Assumptions 5 and 6, we can divide the first-period , into two areas as shown in Figure 1, where the red area represents the communication area without the DoS attacks, the green area indicates the area where data transmission between agents is interrupted because of the DoS attacks.
Figure 1.
Attack strategy based on a time-sequence way with n = 1.
Assumption 7.
For every attack period , the period T has been identified.
Since, for , the data exchange among agents is interrupted by cyberattacks, and the agents cannot communicate with their neighbors, the adaptive observer (9) can be modified as
where , and thecontroller is still designed as
Then, we can establish the following result.
Theorem 2.
Provided that Assumptions 1–7 hold, consider there must exist , such that if , the MASs (1) and (2) with exogenous disturbance systems (3) can reach consensus by employing the observer (34), the adaptive state estimator (31), and the disturbance observer (32) based on control protocol (11) with , , , in which and are positive constants, and , are obtained by solving LMIs (39)–(41):
Then, the following conditions hold:
in which and are positive constants and .
Proof.
where
Use the same Lyapunov function as for (22), in the communication area, for , from (30), we can obtain
Now, considering , we take the derivative of
- (1)
- For , and .
- (2)
- For , and .
- (3)
- For , and .
- (4)
- For , and
By induction, we have
- (5)
- For , i.e.,
- (6)
- For , i.e.,
Therefore, for any
If , then by defining , we have
which indicates the multiagent system can achieve containment control at the convergence rate of . The proof is completed. □
Remark 5.
We can use the parameter ς to estimate the exponential convergence rate of the controlled system. The parameter ς is ostensibly determined by Tand h but actually depends on the controller K. Obtaining a small ϖ in the application is interesting. Setting as the upper limit of ϖ, as long as the effective estimation of ϖ is satisfied , i.e., if , then the multiagent system can achieve containment control by the proposed control law.
Remark 6.
For simplicity, this paper assumed that T and were fixed in each period. However, if the attack time is variable for each period i, the conclusion is also valid. For example, and are represented as the control period and attack period, respectively. According to our proof process, it is not difficult to see that the control law proposed can also solve the containment control problem under a DoS attack if is uniformly bounded and . Additionally, the attack can be partitioned into multiple agents, which can discontinuously locate in every period only if the total attack time is inferior to . In addition, a larger attack width results in a larger control gain.
Remark 7.
Clearly, when , the problem of containment control with DoS attacks becomes the problem of secure containment control. Moreover, the containment control can be achieved if the conditions of Theorem 2 are satisfied. Unlike the problem in [17,18], here, we considered the system with DoS attacks. When the system is attacked, the connectivity of the network is affected, which may result in the instability of the entire system. Thus, it is more challenging to consider the containment control problem with DoS attacks.
4. Numerical Example
We give two examples to show the practical validity of Theorems 1 and 2. In this section, the system matrices of linear multiagent systems (1) and (2) are
Then, we can get
From (8), we get
Example 1.
Assuming the considered system consists of four followers and two leaders, and the interaction topology is directed and switched, then the Laplacian matrix of is as follows
where
The initial value was taken randomly. It can be intuitively seen from Figure 2 that MASs (1) and (2) could achieve containment control with the perturbation observer-based control law (11), conforming with the result obtained from Theorem 1. Figure 3 and Figure 4 show the relative state error and converge to zero, and Figure 5 shows the evolution of the adaptive parameters from which it can be seen that the adaptive parameters converge to finite steady-state values.
Figure 2.
The containment errors.
Figure 3.
The relative state error under observer (7).
Figure 4.
The relative state error of linear multiagent systems under observer (9).
Figure 5.
The variation trend of the adaptive parameters of observer (9).
Then, we considered the containment control under DoS attacks. Here, we took , from Figure 6 we can see the relative state error converges to zero which means containment control was achieved, and from Figure 7 we can see the adaptive parameters converge to finite steady-state values. However, Figure 8 shows that containment control could not be achieved if the duration of the DoS attack was too big.
Figure 6.
The containment errors.
Figure 7.
The variation trend of the adaptive parameters of observer (9).
Figure 8.
The containment errors.
5. Conclusions
This paper explored the challenge of containment control for linear multiagent systems with and without attacks in the presence of certain perturbations. Using the relative output information among adjacent agents, we proposed a control law based on a relative state observer, state estimator, and disturbance estimator to address the containment control problem. However, mechanisms for identifying attacks and isolating them remain unavailable. Future research should discuss how to identify attackers and isolate attacks.
Author Contributions
H.L. proposed the framework of the paper under the undirected graph. X.X. popularized the model to the directed graph and with attack and completed the paper writing. L.G. is the leader of the course team, providing the paper creativity and organizing the implementation, and revising and reviewing the article. W.C. also did some simulation work. All authors have read and agreed to the published version of the manuscript.
Funding
This work was supported in part by the National Science Foundation of China under grant 62173188, Scientific Research Fund of Zhejiang Provincial Education under Y202250565.
Data Availability Statement
Not applicable.
Conflicts of Interest
The authors declare no conflict of interest.
References
- Oh, K.; Park, M.C.; Ahn, H.S. A survey of multi-agent formation control. Automatica 2015, 53, 424–440. [Google Scholar] [CrossRef]
- Saber, R.O. Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Trans. Autom. Control 2006, 51, 401–420. [Google Scholar] [CrossRef]
- Fu, J.J.; Wang, J.Z. Observer-based finite-time coordinated tracking for general linear multi-agent systems. Automatica 2016, 66, 231–237. [Google Scholar] [CrossRef]
- Sun, J.; Geng, Z.; Lv, Y.; Li, Z.; Ding, Z. Distributed Adaptive Consensus Disturbance Rejection for Multi-Agent Systems on Directed Graphs. IEEE Trans. Control Netw. Syst. 2018, 5, 629–639. [Google Scholar] [CrossRef]
- Wang, P.; Wen, G.; Yu, X.; Yu, W.; Lv, Y. Consensus Disturbance Rejection for Linear Multiagent Systems With Directed Switching Communication Topologies. IEEE Trans. Control Netw. Syst. 2020, 7, 254–265. [Google Scholar] [CrossRef]
- Ma, Q.; Miao, G.Y. Distributed containment control of linear multi-agent systems. Neurocomputing 2014, 133, 399–403. [Google Scholar] [CrossRef]
- Li, Z.K.; Ren, W.; Liu, X.D.; Fu, M.Y. Distributed containment control of multi-agent systems with general linear dynamics in the presence of multiple leaders. Int. J. Robust Nonlinear Control 2013, 23, 534–547. [Google Scholar] [CrossRef]
- Zuo, S.; Song, Y.D.; Lewis, F.L.; Davoudi, A. Adaptive output containment control of heterogeneous multi-agent systems with unknown leaders. Automatica 2018, 92, 235–239. [Google Scholar] [CrossRef]
- Li, Z.; Liu, X.; Fu, M.; Xie, L. Global H∞ consensus of multi-agent systems with Lipschitz non-linear dynamics. IET Control Theory Appl. 2012, 6, 2041–2048. [Google Scholar] [CrossRef]
- Wang, C.; Sun, J.; Zuo, Z.; Ding, Z. Consensus disturbance rejection of network-connected dynamic systems with input delay and unknown network connectivity. IFAC Pap. Line 2017, 50, 10357–10362. [Google Scholar] [CrossRef]
- Zegzhda, D.; Lavrova, D.; Pavlenko, E.; Shtyrkina, A. Cyber attack prevention based on evoluttional cybernetics approach. Symmetry 2020, 12, 1931. [Google Scholar] [CrossRef]
- Zegzhda, D.; Lavrova, D.; Shtyrkina, A. multifractal analysis of internet backbone traffic for denial of service attacks. Autom. Control Comput. Sci. 2018, 52, 936–994. [Google Scholar] [CrossRef]
- Zhang, H.; Cheng, P.; Shi, L.; Chen, J. Optimal dental-of-service attack scheduling with energy constrain. IEEE Trans. Control Netw. Syst. 2015, 6, 3023–3028. [Google Scholar]
- Zha, L.; Liu, J.; Cao, J. Resilient event-triggered consensus control for nonlinear muti-agent systems with DoS attacks. J. Frankl. Inst. 2019, 356, 7071–7090. [Google Scholar] [CrossRef]
- Xu, Y.; Fang, M.; Shi, P.; Wu, Z. Event-based secure consensus of mutiagent systems against DoS attacks. IEEE Trans. Cybern. 2020, 50, 3468–3476. [Google Scholar] [CrossRef]
- Tang, Y.; Zhang, D.; Shi, P.; Zhang, W.; Qian, F. Event-based formation control for nonlinear multi-agent systems under DoS attacks. IEEE Trans. Autom. Control 2021, 66, 452–459. [Google Scholar] [CrossRef]
- Han, T.; Li, J.; Guan, Z.H.; Cai, C.X.; Zhang, D.X.; He, D.X. Containment control of multi-agent systems via a disturbance observer-based approach. J. Frankl. Inst. 2019, 356, 2919–2933. [Google Scholar] [CrossRef]
- Du, X.N.; Yu, H. Consensus of multi-agent systems with delayed sampled-data and directed topologies. Neurocomputing 2019, 363, 78–87. [Google Scholar] [CrossRef]
- Horn, R.; Johnson, C. Matrix Analysis; Cambridge University Press: New York, NY, USA, 1985. [Google Scholar]
- Bernstein, D. Matrix Mathematics: Theory, Facts, and Formulas; Princeton University Press: Princeton, NJ, USA, 2009. [Google Scholar]
- Jiang, B.; Wang, J.; Soh, Y. An adaptive technique for robust diagnosis of faults with independent effects on system outputs. Int. J. Control 2002, 75, 792–802. [Google Scholar] [CrossRef]
- Feng, Z.; Hu, G.; Wen, G. Distributed consensus tracking for multi-agent systems under two types of attacks. Int. J. Robust Nonlinear Control 2016, 26, 896–918. [Google Scholar] [CrossRef]
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content. |
© 2023 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).