Next Article in Journal
3D Analysis of the Initial and End Positions of an Active and Passive Prone Hip Extension Test and Its Correlation with Lower Limb Isokinetic Neuromuscular Function of College Students: A Pilot Study
Previous Article in Journal
Optimization of HOTAS Joystick Design Based on Virtual Simulation
Previous Article in Special Issue
Anomaly Detection Method Considering PLC Control Logic Structure for ICS Cyber Threat Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Remote State Estimation and Instruction Adjustment of Multi-Agent Systems Under False Data Injection Attacks

1
College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
2
School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China
3
Foshan Graduate School of Innovation, Northeastern University, Foshan 528311, China
*
Author to whom correspondence should be addressed.
Appl. Sci. 2025, 15(23), 12734; https://doi.org/10.3390/app152312734
Submission received: 6 November 2025 / Revised: 26 November 2025 / Accepted: 27 November 2025 / Published: 1 December 2025

Abstract

This paper investigates the problems of remote state estimation and instruction adjustment for multi-agent systems (MASs) under simultaneous sensor and instruction attacks, as well as external disturbances. Unlike existing research that primarily focuses on single-channel attacks, this paper investigates the more challenging scenario of dual-channel attacks. To decouple the detrimental effects of instruction attacks on state estimation, an augmented descriptor system is constructed, treating sensor attacks as part of an extended state. Then, a distributed unknown input observer is designed to estimate the system states. Theoretical analysis demonstrates that state estimation error is asymptotically convergent and independent of instruction estimation. Furthermore, to counteract instruction attacks, a distributed cooperative estimation strategy based on an adaptive saturation mechanism is proposed, enabling all agents to achieve bounded estimation of the true reference instruction within a finite number of iterations. Finally, the effectiveness and robustness of the proposed approach under dual-channel attacks are verified by a simulation of an unmanned vehicle platoon.

1. Introduction

Multi-agent systems (MASs) are distributed systems consisting of multiple autonomous agents. These agents are capable of sensing, decision-making, and interaction, and they work collaboratively to accomplish complex tasks [1]. In recent years, MASs have garnered significant attention due to their broad applications in domains such as unmanned aerial vehicle formations [2,3], smart grids [4,5], and distributed sensor networks [6]. However, their heavy reliance on communication networks makes them highly vulnerable to various cyber-attacks in open and shared network environments, posing serious threats to their secure and stable operation [7].
Common cyber-attacks against MASs primarily include false data injection (FDI) attacks, denial-of-service (DoS) attacks, replay attacks, and man-in-the-middle attacks [8,9]. Specifically, FDI attacks compromise data integrity by tampering with sensor measurements or control instructions [10,11]; DoS attacks disrupt communication links to deprive the system of partial or full control capability [12]; replay attacks interfere with state updates by retransmitting historical data [13]; and man-in-the-middle attacks undermine coordination by eavesdropping on or altering communication content [14]. To address these complex threats, researchers have focused on areas such as attack detection, secure controller design, and secure state estimation for MASs [15]. For instance, ref. [16] developed a resilient control strategy for multi-agent networks that combated FDI attacks using an adaptive estimator and achieved resource-efficient consensus via a neural approximation-based optimal event-triggered mechanism. Ref. [17] addressed the resilient consensus problem for linear MASs under directed topologies and DoS attacks by proposing a distributed observer-based event-triggered control scheme that effectively reduced communication and excluded Zeno phenomena.
In recent years, substantial progress has been made in secure control of MASs, with mature theoretical frameworks established for classical problems like consensus control and formation control [18,19]. Consequently, the design of closed-loop control for MASs is no longer a primary research challenge. However, in practical applications, when task environments change or emergent missions arise, local closed-loop control alone is often insufficient for global objective adjustment, necessitating real-time instruction issuance from a remote monitoring center (RMC) [20]. Therefore, a critical problem is how to ensure that agents receive correct instructions while maintaining stable operation of the MASs, when the instruction transmission process is compromised by cyber-attacks.
Furthermore, secure state estimation in MASs is particularly crucial [20,21,22,23,24,25]. For instance, ref. [22] optimized secure state estimation under homologous attacks and established a unique reconstruction condition from shared observations. Ref. [23] developed an online observer based on average consensus to recover both states and attacks in heterogeneous MASs. However, most of these works focus solely on sensor channel attacks, paying insufficient attention to instruction channel attacks. In fact, the accuracy of control instructions directly influences the evolution of system states, thereby coupling with and affecting the outcomes of state estimation. Although a few existing studies, e.g., [20], have attempted to address secure state estimation under both instruction and sensor attacks, the state estimation process remains susceptible to interference from biases in instruction estimation. This vulnerability leads to conservative convergence analysis and compromises estimation accuracy. A comparison of the relevant references is provided in Table 1. Thus, in complex scenarios involving dual-channel attacks on both instructions and sensors, the core motivation of this study is to eliminate the coupling effect of instruction attacks on state estimation and achieve unbiased estimation of the system state.
Based on the above description, this paper studies the secure state estimation and instruction adjustment problems of MASs under dual-channel attacks. The main contributions of this paper include:
  • For dual-channel attacks, an augmented system is constructed to decouple the sensor attacks. Subsequently, a distributed unknown input observer is designed to effectively eliminate the coupling effects of the instruction attacks on the state estimation process. In contrast to [20], where the state estimation remains susceptible to instruction estimation bias, our approach achieves asymptotically unbiased state estimation and enhances robustness against instruction attacks.
  • To mitigate instruction channel attacks, a distributed estimation algorithm is developed. This algorithm leverages neighbor-to-neighbor communication and an adaptive saturation function, guaranteeing that all agents’ estimation errors for the reference instruction converge to a bounded region after a finite number of iterations, thereby enhancing system resilience.
The structure of this paper is as follows: Section 2 presents the preliminaries and problem formulation. Section 3 presents the main results. In Section 4, the effectiveness of the proposed method is demonstrated through a simulation. Finally, Section 5 provides a concluding summary of this paper.
Notation: R n is used to denote the n-dimensional Euclidean space. The Euclidean norm is expressed as · . The vector I N = [ 1 , , N ] T is defined as an N-dimensional column vector. The symbols 1 n represent the n-dimensional all-ones vector, and I n is the identity matrix of size n. For any matrix W, W T indicates its transpose, W > 0 ( W < 0 ) signifies that W is positive definite(negative definite), W represents its pseudo-inverse. Given a set v, | v | denotes its cardinality.

2. Preliminaries and Problem Formulation

2.1. Graph Theory

Definition G = ( V , E , A ) represents an undirected graph, where V = { 1 , 2 , , N } is the node set, E V × V is the edge set, and A = [ a i j ] R N × N is the adjacency matrix. If ( j , i ) E , then a i j = 1 ; otherwise a i j = 0 . The neighbor set of node i is defined as N i = { j V | ( j , i ) E } . The graph Laplacian matrix is defined as L = D A , where D = diag { d 1 , , d N } is the degree matrix with d i = j N i a i j . Let λ i denote the ith smallest eigenvalue of the Laplacian matrix L . If the graph G is connected, then 0 = λ 1 < λ 2 λ 3 λ N . Furthermore, the second smallest eigenvalue λ 2 satisfies the following lemma.
Lemma 1. 
For an undirected connected graph G, the second smallest eigenvalue λ 2 of its Laplacian matrix L provides a strict lower bound for the Rayleigh quotient ( x T L x ) / ( x T x ) over the subspace { x R N 1 N T x = 0 , x 0 } . That is, for any non-zero vector x satisfying 1 N T x = 0 , we have:
x T L x λ 2 x T x .

2.2. System Dynamics

Consider MASs composed of N agents. The dynamics of the ith agent can be represented in the following discrete form:
x i ( t + 1 ) = A x i ( t ) + B ( u i ( t , x i ( t ) , x j ( t ) , r i ( t ) ) + ω i ( t ) ) , j N i y i ( t ) = C x i ( t ) , i = 1 , , N
where x i ( t ) R n , u i ( t , x i ( t ) , x j ( t ) , r i ( t ) ) R m , y i ( t ) R p , and ω i ( t ) R m are the system state, control input, measured output, and external disturbance, respectively. r i ( t ) R v is the reference instruction from the RMC. A R n × n , B R n × m , and C R p × n are known matrices with appropriate dimensions.
The overall framework for state estimation and instruction adjustment in MASs under FDI attacks is illustrated in Figure 1. The RMC is responsible for monitoring the states of each agent in real time and sending reference instructions at appropriate moments. Based on the received instructions, the agents proceed to update their own states. However, when the measured output y i and the reference instruction r i are transmitted over the network, they become highly vulnerable to FDI attacks. Such attacks can not only compromise the decision-making accuracy of the RMC but may also lead to unpredictable safety risks in the MASs. The measurement output and reference instructions affected by FDI attacks can be represented as follows:
r ˜ i ( t ) = r i ( t ) + D r δ i r , y ˜ i ( t ) = y i ( t ) + D s δ i s ,
where r ˜ i ( t ) R v represents the reference instruction actually received by agent i; y ˜ i ( t ) R p denotes the measured output from agent i actually received by the RMC; δ i r R q r and δ i s R q s respectively represent instruction attacks and sensor attacks. D r R v × q r and D s R p × q s ( p q s ) are known matrices with appropriate dimensions. For instruction attacks, we define A t r = { i | δ i r 0 } to represent the set of attacked instruction channels and N t r = I / A t r .
To mitigate the direct impact of instruction attacks on the closed-loop dynamics of the agents, this paper adopts an active defense strategy based on instruction estimation. Specifically, upon receiving the potentially compromised instruction r ˜ i ( t ) , agent i does not use it directly in the controller. Instead, it first performs instruction estimation to obtain an estimate r i m ( t ) of the true instruction r i ( t ) . The estimated value r i m ( t ) is then used in computing the control law. Under this strategy and considering the sensor attack δ i s ( t ) , the system (1) under dual-channel attacks can be reformulated as follows:
x i ( t + 1 ) = A x i ( t ) + B ( u i ( t ) + ω i ( t ) ) , j N i y ˜ i ( t ) = C x i ( t ) + D s δ i s ( t ) , i = 1 , , N
where u i ( t ) = u i ( t , x i ( t ) , x j ( t ) , r i m ( t ) ) . Next, the following assumptions are provided for subsequent analysis.
Assumption 1. 
The pair ( A , B ) is controllable, ( A , C ) is observable, and r a n k ( D s ) = q s .
Assumption 2. 
The malicious adversary can compromise at most | A t r |   = n r < N / 2 instruction channels simultaneously.
Assumption 3. 
Within each sampling period, agent i estimates the reference instruction r i by executing a maximum of K iterations. Denoting the estimated value by agent i at the k-th iteration as r ^ i ( k ) , the final instruction estimate used for the control input is given by r i m ( t ) = r ^ i ( K ) .
Remark 1. 
In Assumption 1, the assumptions about controllability and observability are the fundamental assumptions that ensure the feasibility of instruction regulation and state estimation. Moreover, the assumption that matrix D s is full rank is reasonable, as when D s is not full rank, it can be achieved by eliminating the redundant terms of δ i ( t ) . Assumption 2 limits the number of instruction channels that can be attacked simultaneously, which is the standard assumption for accurately estimating reference instructions under FDI attacks. Assumption 3 guarantees that each agent achieves bounded estimation of the reference instruction within a finite number of iterations.

2.3. Augmented System Construction

The goal of this article is to achieve remote state estimation and instruction adjustment, but both sensor attacks and instruction attacks can compromise the performance of remote state estimation. A key strategy is to decouple and simultaneously estimate the system states and the sensor attack signals. This is achieved by constructing an augmented descriptor system where the sensor attack is treated as part of the extended state.
Based on system (3), the dynamic of augmented system ξ i ( t ) = [ x i T ( t ) , δ i T ( t ) ] T R n + q s is as follows:
E ξ i ( t + 1 ) = A ¯ ξ i ( t ) + B ( u i ( t ) + ω i ( t ) ) , y ˜ i ( t ) = C ¯ ξ i ( t ) ,
where E = I n 0 R n × ( n + q s ) , A ¯ = A 0 R n × ( n + q s ) , C ¯ = C D s R p × ( n + q s ) .
The following assumption and lemma regarding augmented system (4) are used for subsequent analysis.
Lemma 2. 
If D s is a column full rank matrix, there exist matrices R 1 and R 2 that satisfy
R 1 E + R 2 C ¯ = I n + q s
and the general solutions for R 1 and R 2 can be expressed as:
R 1 R 2 = I n 0 C D s + Λ I I n 0 C D s I n 0 C D s ,
where Λ is an arbitrary matrix of appropriate dimensions.
Assumption 4. 
r a n k ( C ¯ R 1 B ) = r a n k ( B ) = m .
Remark 2. 
Note that the state observer designed in this paper is similar to an unknown input observer, requiring decoupling of the disturbance term. Therefore, Assumption 4 is necessary, similar to the standard assumption of r a n k ( C ¯ B ) = r a n k ( B ) in an unknown input observer. Since R 1 contains free parameters through Λ in (6), one can select R 1 to satisfy r a n k ( C ¯ R 1 B ) = r a n k ( B ) in most practical MASs. In the vehicle-platoon example of Section 4, we have numerically verified that r a n k ( C ¯ B ) = r a n k ( B ) . A similar full-rank assumption is also used in existing work [26], which further indicates that Assumption 4 is mild and practically reasonable.
Using Lemma 2, the augmented system (4) can be transformed into:
ξ i ( t + 1 ) = R 1 A ¯ ξ i ( t ) + R 1 B [ u i ( t ) + ω i ( t ) ] + R 2 y i ( t + 1 ) , y ˜ i ( t ) = C ¯ ξ i ( t ) .

2.4. Problem Statement

In the existing literature, secure state estimation under either sensor attacks or reference instruction attacks alone has been extensively studied. However, when both sensor measurements and reference instructions are simultaneously compromised by FDI attacks, the system faces a more challenging scenario: it must ensure that the agents accurately track reference instructions and maintain stable operation, while also obtaining accurate state estimates from corrupted measurement data. Distortions in the reference instructions directly affect the system’s output response, thereby interfering with the performance of the state observer. If not properly handled, biases induced by instruction attacks can propagate and amplify the state estimation error. To achieve secure state estimation and instruction adjustment, the following two key problems can be summarized:
Problem 1. 
For the system (3) under external disturbances and dual-channel FDI attacks, design a secure state estimation strategy such that for each agent i, the state estimate x ^ i ( t ) asymptotically converges to the true state x i ( t ) . Specifically, the estimation error should satisfy:
lim t x ^ i ( t ) x i ( t ) = 0 .
Problem 2. 
Under FDI attacks on reference instructions, design a distributed cooperative estimation strategy such that all agents achieve bounded estimation of the true reference instruction within a finite number of iterations. Specifically, there exists a positive constant ε such that for all agents i and sufficiently large time t, the estimation error satisfies:
r i m ( t ) r i ( t )   ε .
Remark 3. 
It should be noted that this paper does not address the specific design of the controller, as objectives such as consensus control, formation control, and path following in MASs have been extensively studied, and mature controller design methods are readily available. Thus, this paper assumes that the controller is already designed and operational, and the focus is on secure state estimation and instruction estimation under network attacks.

3. Design of Distributed Observers Under Dual-Channel Attack

In this section, we design a distributed unknown input observer to achieve unbiased estimation of the system state. In addition, a distributed observer based on adaptive saturation mechanism is designed for instruction estimation.

3.1. Distributed Unknown Input Observer for State Estimation

Both unknown noise and instruction estimation errors can degrade the performance of state estimation, leading to estimation bias. To solve Problem 1, an unknown input observer is designed to achieve unbiased state estimation. Inspired by the unknown-input proportional-differential observer for continuous-time systems proposed in [26], we design an unknown input observer for the discrete-time augmented system (7) as follows:
σ i ( t + 1 ) = R 1 A ¯ ξ ^ i ( t ) + R 1 B [ u ^ i ( t ) + ω ¯ ^ i ( t ) ] + L [ y ˜ ( t ) y ^ i ( t ) ] , ξ ^ i ( t ) = σ i ( t ) + R 2 y ˜ i ( t ) , ω ¯ ^ i ( t ) = ( C ¯ R 1 B ) [ y ˜ i ( t + 1 ) C ¯ R 2 y ˜ i ( t + 1 ) C ¯ R 1 A ¯ ξ ^ i ( t ) ] u ^ i ( t ) , y ^ i ( t ) = C ¯ ξ ^ i ( t ) ,
where σ i ( t ) is the state of the ith observer node, ξ ^ i ( t ) represents the estimate of the augmented state ξ i ( t ) , u ^ i ( t ) = u i ( t , x ^ i ( t ) , x ^ j ( t ) , r i ( t ) ) , ω ¯ ^ i ( t ) is the estimate of the unknown input ω ¯ i ( t ) = ω i ( t ) + u i ( t ) u ^ i ( t ) , y ^ i ( t ) is the estimate of the measured output y ˜ i ( t ) , and L is the gain matrix to be designed. (8) is the state estimation of the augmented system (7), and it is evident that the state estimation of the original system (3) can be obtained by x ^ i ( t ) = E ξ ^ i ( t ) .
Remark 4. 
Note that the update of ω ^ i ( t ) in (8) involves the measurement y ˜ i ( t + 1 ) . In practice, the observer is implemented as follows. At time t + 1 , the RMC first receives the updated measurement y ˜ i ( t + 1 ) from all agents and uses (8) to compute ω ¯ ^ i ( t ) . Then, based on ω ¯ ^ i ( t ) and the previous estimate ξ ^ i ( t ) , it sequentially updates y ^ i ( t ) and σ i ( t + 1 ) , respectively, and finally obtains the new state estimate ξ ^ i ( t + 1 ) . This step-by-step description clarifies that the use of y ˜ i ( t + 1 ) does not introduce any timing ambiguity.
Remark 5. 
Due to the presence of instruction attacks, RMC cannot access the agent i’s actual estimate of the reference instruction r i m , but instead must rely on the originally sent instruction r i . Consequently, when r i m differs from r i , an error inevitably arises between the actual control input u i and the computed control input u ^ i based on the state estimates. If the observer (8) only compensates by estimating the external disturbance ω i , the state estimation error will fail to converge to zero because the control input error continuously perturbs the system dynamics. To address this, the above observer compensates for the unknown term ω ¯ i ( t ) and eliminates the coupling effect of instruction attacks on state estimation, thereby solving Problem 1.
Next, the performance of the unknown input observer (8) is analyzed. Define the state estimation error of the augmented system and estimation error of unknown input ω ¯ i ( t ) respectively as:
ξ ˜ i ( t ) = ξ i ( t ) ξ ^ i ( t )
and
ω ¯ ˜ i ( t ) = ω ¯ i ( t ) ω ¯ ^ i ( t ) .
Based on (5) and (8), we have
ξ ˜ i ( t ) = ( R 1 E + R 2 C ¯ ) ξ i ( t ) ξ ^ i ( t ) , = R 1 E ξ i ( t ) σ i ( t ) .
From (4), (8), and (9), the dynamics of state estimation error ξ ˜ i ( t ) can be derived as:
ξ ˜ i ( t + 1 ) = R 1 E ξ i ( t + 1 ) σ i ( t + 1 ) = R 1 A ¯ ξ i ( t ) + R 1 B [ u i ( t ) + ω i ( t ) ] R 1 A ¯ ξ ^ i ( t ) R 1 B [ u ^ i ( t ) + ω ¯ ^ i ( t ) ] L [ y ˜ i ( t ) y ^ i ( t ) ] = ( R 1 A ¯ L C ¯ ) ξ ˜ i ( t ) + R 1 B ω ¯ ˜ i ( t ) .
The estimation error of the unknown input ω ¯ i ( t ) is further analyzed. From (7) and the observer (8), we have:
ω ¯ ˜ i ( t ) = ω ¯ i ( t ) ω ¯ ^ i ( t ) = ω ¯ i ( t ) ( C ¯ R 1 B ) [ y ˜ i ( t + 1 ) C ¯ R 2 y ˜ i ( t + 1 ) C ¯ R 1 A ¯ ξ ^ i ( t ) ] u ^ i ( t ) = ω i ( t ) + u i ( t ) ( C ¯ R 1 B ) C ¯ [ R 1 A ¯ ξ i ( t ) + R 1 B ( u i ( t ) + ω i ( t ) ) ] + ( C ¯ R 1 B ) C ¯ R 1 A ¯ ξ ^ i ( t ) = H ξ ˜ i ( t ) ,
where H = ( C ¯ R 1 B ) C ¯ R 1 A ¯ .
Substituting (11) into (10), we obtain the final error dynamics:
ξ ˜ i ( t + 1 ) = ( R 1 A ¯ L C ¯ R 1 B H ) ξ ˜ i ( t ) .
Remark 6. 
Under Assumption 4, the matrix C ¯ R 1 B is full column rank, hence its left pseudo-inverse ( C ¯ R 1 B ) exists. From (11), it can be seen that due to this property, the unknown input estimation error ω ¯ ˜ i ( t ) can be expressed as a linear function of the state estimation error ξ ˜ i ( t ) , thus achieving decoupling of the unknown terms. Moreover, (12) shows that the state estimation error dynamics ξ ˜ i ( t ) is independent of the control input u i ( t ) or the instruction estimation error, which implies that the instruction estimation error does not affect the state estimation. Therefore, the requirement for asymptotic convergence of the state estimation error in Problem 1 can be well addressed. If C ¯ R 1 B is rank-deficient, (11) cannot be satisfied due to the inability to eliminate the unknown input. Therefore, Assumption 4 is necessary for observer (8) to accurately estimate the system state.
The following Theorem 1 is given for analyzing the performance of the unknown input observer (8).
Theorem 1. 
Under Assumptions 1 and 4, if there exists a positive scalar 0 < ϑ 1 < 1 , a positive definite matrix P > 0 , and a matrix L ˜ such that the following linear matrix inequality (LMI) holds:
ϑ 1 P ( R 1 A ¯ R 1 B H ) P C ¯ L ˜ P < 0 ,
then the unknown input observer (8) with gain L = P 1 L ˜ ensures that the state estimation error satisfies lim t x ^ i ( t ) x i ( t ) = 0 .
Proof. 
Choose the Lyapunov function candidate
V ( t ) = ξ ˜ T ( t ) ( I N P ) ξ ˜ ( t ) ,
where ξ ˜ ( t ) = [ ξ ˜ 1 T ( t ) , , ξ ˜ N T ( t ) ] T . From LMI (13), we have
( R 1 A ¯ L C ¯ R 1 B H ) T P ( R 1 A ¯ L C ¯ R 1 B H ) < ϑ 1 P .
Based on (12) and (15), one can derive
V ( t + 1 ) = ξ ˜ T ( t + 1 ) ( I N P ) ξ ˜ ( t + 1 ) = ξ ˜ T ( t ) ( I N ( R 1 A ¯ L C ¯ R 1 B H ) T P ( R 1 A ¯ L C ¯ R 1 B H ) ) ξ ˜ ( t ) ϑ 1 V ( t ) .
Recursively using (16) makes it easy to get V ( t ) ϑ 1 t V ( 0 ) . Since V ( 0 ) is bounded and 0 < ϑ 1 < 1 , we conclude that lim t V ( t ) = 0 which implies lim t ξ ˜ i ( t ) = 0 . Thus, lim t x ^ i ( t ) x i ( t )   = lim t E ξ ˜ i ( t ) = 0 . The proof is completed. □
Remark 7. 
Theorem 1 shows that observer (8) can achieve unbiased estimation of the system states. It is noteworthy that observer (8) and Theorem 1 do not involve the design of the controller. This implies that the RMC equipped with observer (8) can accurately estimate the states of the MASs under any control input. This capability holds even when the reference instructions are severely compromised by attackers and the agents fail to estimate the true control instructions. This result highlights the observer’s strong robustness under dual-channel attacks.

3.2. Distributed Adaptive Saturation Observer for Instruction Estimation

To solve Problem 2, this subsection designs a distributed adaptive saturation observer that can achieve bounded estimation of reference instructions after a finite number of iterations. The dynamics of the instructions observer r ^ i ( t k ) is designed as follows:
r ^ i ( t k + 1 ) = r ^ i ( t k ) + κ 1 j = 1 N a i j ( r ^ j ( t k ) r ^ i ( t k ) ) + κ 2 η i ( t k ) ( r ˜ i ( t ) r ^ i ( t k ) ) ,
where r ^ i ( t k ) is the estimated values of r i ( t ) . κ 1 and κ 2 are the parameters to be determined. η i ( t k ) is an adaptive saturation function and defined as follows:
η i ( t k ) = min { 1 , ψ ( t k ) r ˜ i ( t ) r ^ i ( t k ) } ,
where ψ ( t k ) is an adaptive threshold. The key to the adaptive saturation strategy lies in the configuration of the threshold ψ ( t k ) , which is based on the following assumptions.
Assumption 5. 
An upper bound on the initial error of the instruction estimation is assumed to be known. Specifically, there exists a known constant ϱ t r such that the instruction estimation error e i r ( t k ) = r ^ i ( t k ) r i ( t ) satisfies
e i r ( t 0 )   ϱ t r , i V .
Then, the threshold ψ ( t k ) can be designed as
ψ ( t k ) = ψ 1 ( t k ) + ψ 2 ( t k ) , ψ 1 ( t k + 1 ) = ( 1 κ 1 λ 2 + N κ 2 ) ψ 1 ( t k ) + N κ 2 ψ 2 ( t k ) , ψ 2 ( t k + 1 ) = 2 n r κ 2 ψ 1 ( t k ) / N + [ 1 κ 2 ( 1 2 n r / N ) ] ψ 2 ( t k ) ,
with the initial state ψ 1 ( t 0 ) 0 , ψ 2 ( t 0 ) = ϱ t r , and we assume that RMC sends the same reference instruction r ( t ) to all agents. The estimates of all agents can be aggregated into the following form:
r ^ ( t k + 1 ) = ( ( I N κ 1 L ) I v ) r ^ ( t k ) + κ 2 η ( t k ) I v ( r ˜ ( t ) r ^ ( t k ) ) ,
where r ^ ( t k ) = [ r ^ 1 T ( t k ) , , r ^ N T ( t k ) ] T , η ( t k ) = d i a g { η 1 ( t k ) , , η N ( t k ) } . Define the average of instruction estimation r ¯ ( t k ) = 1 N ( 1 N T I v ) r ^ ( t k ) , matrix I ˜ = I N v 1 N 1 N 1 N T I v with I ˜   = 1 , and auxiliary error variable
e ¯ r ( t k ) = r ¯ ( t k ) r ( t ) , e ˜ r ( t k ) = r ^ ( t k ) 1 N r ¯ ( t k ) = I ˜ r ^ ( t k ) .
By substituting (20) into (21), we can obtain that
e ¯ r ( t k + 1 ) = e ¯ r ( t k ) + κ 2 N 1 N T η ( t k ) I v ( r ˜ ( t ) r ^ ( t k ) ) = ( 1 κ 2 ) e ¯ r ( t k ) + κ 2 N 1 N T η A t r ( t k ) I v ( r ˜ ( t ) r ^ ( t k ) ) + κ 2 N [ 1 N T ( I N η N t r ( t k ) ) I v ] e r ( t k )
and
e ˜ r ( t k + 1 ) = [ ( I N κ 1 L ) I v ] e ˜ r ( t k ) + κ 2 I ˜ ( η ( t k ) I v ) ( r ˜ ( t ) r ^ ( t k ) ) .
The following theorem is proposed for analyzing the estimation performance of adaptive saturation observer (17).
Theorem 2. 
Under Assumptions 1–3, if there exist positive parameters κ 1 , κ 2 , and ϑ 2 < 1 satisfying κ 1 ( λ 2 + λ N ) 2 , ( 1 2 n r / N ) κ 2 < 1 , and the following linear matrix inequality holds:
ϑ 2 I Γ T I < 0 ,
where the matrix Γ is defined as:
Γ = 1 κ 1 λ 2 + N κ 2 N κ 2 2 κ 2 n r / N 1 ( 1 2 n r / N ) κ 2 ,
then each agent equipped with observer (17) can achieve bounded estimation of the reference instruction r i ( t ) after a finite number of iterations. Specifically, the estimation error satisfies r i m ( t ) r i ( t )   2 ϑ 2 K / 2 ϱ t r = ε .
Proof. 
We construct the following Lyapunov functions to analyze the system stability
V 1 ( t k ) =   e ˜ r ( t k ) , V 2 ( t k ) = e ¯ r ( t k ) .
Considering the initial time k = 0 , we set the initial estimates of all agents to zero, i.e., r ^ i ( t 0 ) = 0 ( i V ), which implies r ¯ ( t 0 ) = 0 . Based on this initial condition, one has
V 1 ( t 0 ) = 0 ψ 1 ( t 0 ) , V 2 ( t 0 ) ϱ t r = ψ 2 ( t 0 ) .
Then, we need to prove that for any t , k 0 , the following inequalities hold
V 1 ( t k ) ψ 1 ( t k ) , V 2 ( t k ) ψ 2 ( t k ) .
According to the initial condition (25), there must exist k 0 such that inequality (26) holds. This leads to
e i r ( t k )     e ˜ i r ( t k )   +   e ¯ r ( t k )   ψ ( t k ) , i V .
From inequality (27), for i N t r , we have η i ( t k ) = 1 . Furthermore, according to the definition of the saturation function (18), the following inequality is derived.
η i ( t k ) r ˜ i ( t ) r ^ i ( t k ) ψ ( t k ) , i V .
Considering 1 N T e ˜ r ( t k ) = 0 , along with the condition κ 1 ( λ 2 + λ N ) 2 and Lemma 1, we acquire
[ ( I N κ 1 L ) I v ] e ˜ r ( t k )   ( 1 κ 1 λ 2 ) e ˜ r ( t k ) .
Substituting expressions (19), (28), and (29) into (22) and (23) respectively, one deduces
V 1 ( t k + 1 ) ( 1 κ 1 λ 2 ) ψ 1 ( t k ) + N κ 2 ψ ( t k ) ( 1 κ 1 λ 2 + N κ 2 ) ψ 1 ( t k ) + N κ 2 ψ 2 ( t k ) = ψ 1 ( t k + 1 )
and
V 2 ( t k + 1 ) ( 1 κ 2 ) ψ 2 ( t k ) + 2 κ 2 N | A t r | ψ ( t k ) ( 1 κ 2 ( 1 2 n r N ) ) ψ 2 ( t k ) + 2 n r κ 2 N ψ 1 ( t k ) = ψ 2 ( t k + 1 ) .
Therefore, inequality (26) and e i r ( t k )   ψ ( t k ) hold for all t , k 0 . Defining the vector ψ ˜ ( t k ) = [ ψ 1 ( t k ) , ψ 2 ( t k ) ] T . From LMI (24), Γ T Γ < ϑ 2 I can be obtained, which implies
ψ ˜ ( t k + 1 )   < ϑ 2 ψ ˜ ( t k ) .
Recursively applying inequality (32), we obtain:
ψ 1 2 ( t k ) + ψ 2 2 ( t k ) < ϑ 2 k ( ψ 1 2 ( t 0 ) + ψ 2 2 ( t 0 ) ) ,
which leads to
ψ ( t K ) ( 2 ψ 1 2 ( t K ) + 2 ψ 2 2 ( t K ) ) 1 2 < 2 ϑ 2 K / 2 ϱ t r .
Finally, we conclude that r i m ( t ) r i ( t )   2 ϑ 2 K / 2 ϱ t r = ε . The proof is completed. □

4. Simulation Example

In this section, numerical simulations are conducted to validate the effectiveness and robustness of the proposed method under dual-channel FDI attacks. We consider MASs consisting of 7 unmanned vehicles, forming a platoon on a road. All vehicles in the platoon travel with identical spacing and speed. The communication topology is such that each vehicle can only communicate with its immediate neighbors (i.e., the front and rear vehicles), as shown in Figure 2. RMC estimates the states of the vehicles using the proposed observer (8) and sends reference instructions to control the vehicles’ speed and spacing.
The dynamics of each vehicle are described by the discrete-time linear system (3), with the following system matrices [27]:
A = 1 T τ T τ 2 1 e T / τ 0 1 τ 1 e T / τ 0 0 e T / τ , B = τ 2 e T / τ 1 T τ T 2 2 τ 2 τ e T / τ 1 T τ e T / τ 1 ,
C = I 3 , D r = I 2 and D s = 10 [ 4 , 1 ; 3 , 0 ; 2 , 2 ] , where T = 0.01 represents the sampling time and τ = 0.4 is the time lag constant. The state vector of the vehicle i is x i ( t ) = [ d i ( t ) , v i ( t ) , a i ( t ) ] , which represents displacement, velocity, and acceleration, respectively. Assuming the initial state of the last vehicle is [ 0 , 5 , 0 ] and the interval between all vehicles is 5, the initial velocity and acceleration of the other vehicles are the same as the last vehicle (i.e., x 7 ( 0 ) = [ 0 , 5 , 0 ] , , x 1 ( 0 ) = [ 30 , 5 , 0 ] ).
The external disturbance ω i ( t ) is modeled as a bounded random signal with ω i ( t )   1 . The reference instruction sent by RMC is r ( t ) = [ v ( t ) , Δ ( t ) ] , which represents velocity and spacing. It is assumed that when RMC detects the displacement d 7 ( t ) = 30 of the last unmanned vehicle, it starts sending reference signals r ( t ) = [ 10 s i n ( 0.5 t ) , 10 ] to all unmanned vehicles. The estimated value of vehicle i for the instruction is r i c = [ v i c , Δ i c ] . Based on the vehicle platooning control method in [28], the controller for each unmanned vehicle is designed as:
u i ( t ) = K j N i ( x i ( t ) x j ( t ) ( j i ) Δ i c ( t ) ) k 2 ( v i ( t ) v i c ( t ) ) ,
where K = [ k 1 , k 2 , k 3 ] = [ 24.55 , 53.70 , 17.55 ] is a feedback gain satisfying the stabilization condition. In accordance with Assumption 2, at each sampling instant the adversary can attack at most n r < N / 2 instruction channels. Thus, we consider the simplest nontrivial case with one attacked instruction channel and design a relatively strong instruction attack δ i r ( t ) = [ 20 s i n ( 0.5 t ) , 30 s i n ( t ) ] that would lead to severe collisions in the vehicle platoon if it were not compensated. Since no explicit upper bound on the number of attacked sensor channels is imposed in our analysis, we consider the worst case where all sensor channels are simultaneously subjected to FDI attacks with δ i s ( t ) = [ ( 8 i ) 10 s i n ( 2 t ) , i 35 s i n ( 5 t ) ] . Next, we verify the instruction estimation performance of the adaptive saturation observer (17) and state estimation performance of the unknown input observer (8), separately.
(1) Performance analysis of instruction estimation: assume that only instruction attacks are present (i.e., sensor attacks are zero). According to Theorem 2, the parameters κ 1 and κ 2 are selected by solving the LMI (24) under the constraints κ 1 ( λ 2 + λ N ) 2 and ( 1 2 n r / N ) κ 2 < 1 , yielding κ 1 = 0.459 and κ 2 = 0.01 . The iteration number is set to K = 800 to ensure the convergence of the instruction estimation. The initial instruction estimate for all agents is r ^ i ( t 0 ) = [ 0 , 0 ] . Figure 3 illustrates the instruction estimation error of all unmanned vehicles. It can be observed that the estimation errors rapidly decrease and then remain within a small neighborhood of zero after approximately 450 iterations, which is consistent with Theorem 2. To validate the effectiveness of the distributed adaptive saturation observer (17), two cases are compared:
Case 1: agents obtain the instruction estimate r i m ( t ) via the distributed adaptive saturation observer (17) and employ it in the controller;
Case 2: agents directly use the attacked instruction r ˜ i ( t ) .
Simulation results are shown in Figure 4 and Figure 5. Figure 4 shows that after applying observer (17), the speed and acceleration of the unmanned vehicles can still achieve consensus and operate stably according to the reference instructions sent by RMC. Figure 5 shows that without the observer (17), unmanned vehicles not only cannot operate according to the reference instructions, but also collide multiple times.
To provide a quantitative comparison, we compute the root mean square error (RMSE) between the actual vehicle states and the reference instruction for both the velocity v and spacing Δ at the time T = 35 s . Specifically, the RMSE indices are defined as
RMSE 1 = 1 N i = 1 N v i v 2 , RMSE 2 = 1 N 1 i = 1 N 1 d i d i + 1 Δ 2 .
For convenience, the time T in the above equation has been omitted. The convergence time is determined as the first time instant when both RMSE 1 and RMSE 2 remain below 1. Table 2 compares the proposed method (Case 1) against a baseline in which the agents directly use the attacked instruction without the observer (Case 2). The numerical results in Table 2 clearly show that the proposed method significantly reduces the RMSE and achieves much faster convergence than the baseline.
(2) Performance analysis of state estimation: under dual-channel attacks (both instruction and sensor attacks), the performance of the state observer is evaluated. The proposed unknown input observer (8) is employed in RMC, with the initial state σ i ( 0 ) = 0 , matrices
L = 0.2530 0.4205 0.1255 0.4050 0.6754 0.2025 1.8560 3.0924 0.9261 0.0135 0.02250 0.0068 0.0793 0.13214 0.0396 , R 1 = 0.8759 0.2069 0.0621 0.2069 0.6552 0.1034 0.0628 0.1034 0.9690 0.0138 0.0103 0.0069 0.02 0 0.04 ,
R 2 = 0.1241 0.2069 0.0621 0.2069 0.3448 0.1034 0.0621 0.1034 0.0310 0.0138 0.0103 0.01 0.02 0.00 0.04 .
To comprehensively demonstrate the effectiveness and robustness of the state observer, we consider two cases:
Case 1: simultaneously estimate instructions and states using observers (17) and (8), respectively;
Case 2: Only use observer (8) to estimate the system state (i.e., agents directly utilize the attacked instruction r ˜ i ( t ) ).
For each case, we analyze the convergence of the state estimation error e i x ( t ) = x ^ i ( t ) x i ( t ) and the stability of the vehicle states (Whether the vehicle has collided, i.e., the state component d i ( t ) ). The simulation results are depicted in Figure 6. Figure 6 illustrates the norm of the state estimation error over time. In case 1, where both observers are employed, the state estimation error converges to zero rapidly, confirming that the method in this paper can achieve accurate state estimation despite dual-channel attacks. In case 2, where only the state observer (8) is used, the state estimation error also converges to zero; however, the vehicle states become unstable due to the propagation of instruction errors, and even collisions occur. This highlights that the state observer (8) can decouple the effects of instruction attacks and provide unbiased estimates, even if the control inputs are compromised.

5. Conclusions

This paper investigated the problems of secure state estimation and instruction adjustment for MASs subject to concurrent FDI attacks on both sensor and instruction channels. The key challenge of decoupling state estimation from instruction attacks has been successfully addressed through the innovative design of a distributed unknown input observer and a distributed adaptive saturation-based instruction observer. The proposed collaborative estimation method ensures accurate state estimation even when control inputs are compromised due to instruction attacks and simultaneously maintaining bounded instruction estimation errors. Both theoretical analysis and numerical simulations confirm the effectiveness of the proposed method in countering dual-channel attacks, significantly bolstering the security and resilience of MASs in adversarial network environments.
We note that the proposed approach relies on relatively strong rank conditions and on a fixed, undirected communication topology, which limits its generality. In future work, we will aim to relax such constraints and extend the framework to more practical environments with measurement noise, communication loss, and time-varying topologies.

Author Contributions

Conceptualization, Q.W., Y.Q. and A.-Y.L.; methodology, Q.W. and A.-Y.L.; validation, Q.W. and Y.Q.; formal analysis, Q.W.; investigation, Y.Q.; resources, A.-Y.L.; data curation, Y.Q.; writing—original draft preparation, Q.W.; writing—review and editing, Q.W., Y.Q. and A.-Y.L.; supervision, Y.Q.; funding acquisition, A.-Y.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded in part by the Funds of the National Natural Science Foundation of China (Grant Nos. 62522309, 62473088), in part by the Provincial Natural Science Foundation of Liaoning (Grant No. 2025JH6/101000012, 2024-MSBA-37), in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2023A1515140007, and in part by the Fundamental Research Funds for the Central Universities (Grant No. N25QNR008).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

The data presented in this study are available in the article.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Qin, J.; Ma, Q.; Shi, Y.; Wang, L. Recent advances in consensus of multi-agent systems: A brief survey. IEEE Trans. Ind. Electron. 2017, 64, 4972–4983. [Google Scholar]
  2. Hou, Y.; Zhao, J.; Zhang, R.; Cheng, X.; Yang, L. UAV swarm cooperative target search: A multi-agent reinforcement Learning Approach. IEEE Trans. Intell. Veh. 2024, 9, 568–578. [Google Scholar]
  3. Alkhamees, S.N.; Alsaif, S.A.; Bin Salamah, Y. Recent Advances and a Hybrid Framework for Cooperative UAV Formation Control. Appl. Sci. 2025, 15, 9761. [Google Scholar] [CrossRef]
  4. Nie, Y.; Liu, J.; Liu, X.; Zhao, Y.; Ren, K.; Chen, C. Asynchronous multi-agent reinforcement learning-based framework for Bi-level noncooperative game-theoretic demand response. IEEE Trans. Smart Grid 2024, 15, 5622–5637. [Google Scholar]
  5. Izmirlioglu, Y.; Pham, L.; Son, T.C.; Pontelli, E. A survey of multi-agent systems for smartgrids. Energies 2024, 17, 3620. [Google Scholar] [CrossRef]
  6. Duan, Y.; Li, W.; Fu, X.; Luo, Y.; Yang, L. A methodology for reliability of WSN based on software defined network in adaptive industrial environment. IEEE/CAA J. Autom. Sin. 2018, 5, 74–82. [Google Scholar]
  7. Cavalcante, R.C.; Bittencourt, I.I.; da Silva, A.P.; Silva, M.; Costa, E.; Santos, R. A survey of security in multi-agent systems. Expert Syst. Appl. 2012, 39, 4835–4846. [Google Scholar] [CrossRef]
  8. He, W.; Xu, W.; Ge, X.; Han, Q.L.; Du, W.; Qian, F. Secure control of multiagent systems against malicious attacks: A brief survey. IEEE Trans. Ind. Inform. 2022, 18, 3595–3608. [Google Scholar] [CrossRef]
  9. Bijani, S.; Robertson, D. A review of attacks and security approaches in open multi-agent systems. Artif. Intell. Rev. 2014, 42, 607–636. [Google Scholar]
  10. Wang, Q.; Qian, Y.; Lu, A.Y. Data and model-based switching observer for cyber-physical systems against sparse sensor attacks. Int. J. Syst. Sci. 2025, 1–13. [Google Scholar] [CrossRef]
  11. Lu, A.Y.; Yang, G.H. A polynomial-time algorithm for the secure state estimation problem under sparse sensor attacks via state decomposition technique. IEEE Trans. Autom. Control 2023, 68, 7451–7465. [Google Scholar]
  12. Zhang, J.; Ma, Y. Complex dynamic networks for multiple attacks: A jump-like event-triggered controller based on neural network model. IEEE Trans. Netw. Sci. Eng. 2024, 11, 4470–4480. [Google Scholar]
  13. Wang, J.; Wang, D.; Yan, H.; Shen, H. Composite antidisturbance H control for hidden Markov jump systems with multi-sensor against replay attacks. IEEE Trans. Autom. Control 2024, 69, 1760–1766. [Google Scholar]
  14. Zhang, Y.; Peng, Z.; Wen, G.; Wang, J.; Huang, T. Optimal stealthy linear man-in-the-middle attacks with resource constraints on remote state estimation. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 445–456. [Google Scholar]
  15. Wang, J.; Feng, T. Securing Remote State Estimation against Sequential Logic Attack of Sensor Data. Appl. Sci. 2022, 12, 2259. [Google Scholar] [CrossRef]
  16. Gong, Z.; Yang, F.; Liu, C.; Ma, Z. Distributed dynamic event-triggered control for multiagent systems under FDI attack via ESN-based adaptive dynamic programming. IEEE Trans. Cybern. 2025, 55, 3663–3674. [Google Scholar] [CrossRef] [PubMed]
  17. Zhang, S.Q.; Che, W.W.; Deng, C. Observer-based event-triggered control for linear MASs under a directed graph and DoS attacks. J. Control Decis. 2022, 9, 384–396. [Google Scholar]
  18. Fan, S.; Yue, D.; Wang, B.; Deng, C.; Yan, H. Distributed optimization for uncertain nonlinear MASs under event-triggered communication. Automatica 2025, 177, 112134. [Google Scholar] [CrossRef]
  19. Zou, L.; Liu, X.; Zhang, X.; Su, H. Resilient consensus for multi-agent systems under distributed denial-of-service attacks: A graph-based approach. J. Control Decis. 2024, 1–13. [Google Scholar] [CrossRef]
  20. Lei, X.; Wen, G.; Zheng, W.X.; Fu, J. Security strategy against location-varying sparse attack on distributed state monitoring. IEEE Trans. Autom. Control 2024, 69, 2514–2521. [Google Scholar]
  21. Tabatabaei, H.; Gallo, A.J.; Al-Dabbagh, A.W. Secure state and output estimation for accommodation of false data injection attacks in large-scale systems. Automatica 2025, 180, 112460. [Google Scholar] [CrossRef]
  22. Shi, M.; Wan, N. Estimate the states of multiagent systems under homologous attacks by optimization Approaches. IEEE Trans. Control Netw. Syst. 2023, 10, 430–440. [Google Scholar] [CrossRef]
  23. Shi, Y.; Wang, Y. Online secure state estimation of multiagent systems using average consensus. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 3174–3186. [Google Scholar] [CrossRef]
  24. Lu, A.Y.; Yang, G.H. Secure State Estimation Under Sparse Sensor Attacks Via Saturating Adaptive Technique. IEEE Trans. Control Netw. Syst. 2023, 10, 1890–1898. [Google Scholar] [CrossRef]
  25. Zuo, S.; Wang, Y.; Rajabinezhad, M.; Zhang, Y. Resilient Containment Control of Heterogeneous Multiagent Systems Against Unbounded Attacks on Sensors and Actuators. IEEE Trans. Control Netw. Syst. 2024, 11, 1537–1547. [Google Scholar] [CrossRef]
  26. Wang, B.Q.; Guo, X.G.; Wang, J.L.; Coutinho, D.; Park, J.H. Unknown-Input-Proportional-Differential Observer-Based Event-Triggered Intrusion-Tolerant Control for Human-in-the-Loop Multi-Agent Systems Against Unconstrained Actuator and Sensor FDIAs. IEEE Trans. Autom. Sci. Eng. 2025, 22, 15701–15712. [Google Scholar] [CrossRef]
  27. Ding, S.; Ai, H.; Xie, X.; Jing, Y. Distributed Adaptive Platooning Control of Connected Vehicles with Markov Switching Topologies. IEEE Trans. Intell. Transp. Syst. 2024, 25, 18421–18432. [Google Scholar] [CrossRef]
  28. Halder, K.; Montanaro, U.; Dixit, S.; Dianati, M.; Mouzakitis, A.; Fallah, S. Distributed H Controller Design and Robustness Analysis for Vehicle Platooning Under Random Packet Drop. IEEE Trans. Intell. Transp. Syst. 2022, 23, 4373–4386. [Google Scholar] [CrossRef]
Figure 1. Communication topology of MASs under FDI attacks.
Figure 1. Communication topology of MASs under FDI attacks.
Applsci 15 12734 g001
Figure 2. The communication topology of 7 unmanned vehicles.
Figure 2. The communication topology of 7 unmanned vehicles.
Applsci 15 12734 g002
Figure 3. Instruction estimation error of all unmanned vehicles versus the number of iterations.
Figure 3. Instruction estimation error of all unmanned vehicles versus the number of iterations.
Applsci 15 12734 g003
Figure 4. State curve of unmanned vehicles with the distributed adaptive saturation observer (17).
Figure 4. State curve of unmanned vehicles with the distributed adaptive saturation observer (17).
Applsci 15 12734 g004
Figure 5. State curve of unmanned vehicles without the distributed adaptive saturation observer (17).
Figure 5. State curve of unmanned vehicles without the distributed adaptive saturation observer (17).
Applsci 15 12734 g005
Figure 6. State estimation error and system state curve in two cases.
Figure 6. State estimation error and system state curve in two cases.
Applsci 15 12734 g006
Table 1. Comparison with relevant secure state estimation methods.
Table 1. Comparison with relevant secure state estimation methods.
ReferencesArchitectureAttack TypesControl InputDisturbanceStability
[21]DistributedSensor attacksunknownasymptotic stability
[22,23]DistributedSensor attacksknownasymptotic stability
[24]CentralizedSensor attacksknownasymptotic stability
[20,25]DistributedSensor attacks and instruction attacksunknownBounded
[26]DistributedSensor attacks and instruction attacksknownBounded
ProposedDistributedSensor attacks and instruction attacksunknownasymptotic stability
✗ indicates that the article does not account for disturbance, while ✓ indicates that it does.
Table 2. RMSE and convergence time in two cases.
Table 2. RMSE and convergence time in two cases.
MethodRMSE1RMSE2Convergence Time
Case 10.08720.529925.8
Case 23.2743.9177Periodic oscillation
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, Q.; Qian, Y.; Lu, A.-Y. Remote State Estimation and Instruction Adjustment of Multi-Agent Systems Under False Data Injection Attacks. Appl. Sci. 2025, 15, 12734. https://doi.org/10.3390/app152312734

AMA Style

Wang Q, Qian Y, Lu A-Y. Remote State Estimation and Instruction Adjustment of Multi-Agent Systems Under False Data Injection Attacks. Applied Sciences. 2025; 15(23):12734. https://doi.org/10.3390/app152312734

Chicago/Turabian Style

Wang, Qingjie, Yining Qian, and An-Yang Lu. 2025. "Remote State Estimation and Instruction Adjustment of Multi-Agent Systems Under False Data Injection Attacks" Applied Sciences 15, no. 23: 12734. https://doi.org/10.3390/app152312734

APA Style

Wang, Q., Qian, Y., & Lu, A.-Y. (2025). Remote State Estimation and Instruction Adjustment of Multi-Agent Systems Under False Data Injection Attacks. Applied Sciences, 15(23), 12734. https://doi.org/10.3390/app152312734

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop