You are currently viewing a new version of our website. To view the old version click .
Applied Sciences
  • This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
  • Article
  • Open Access

1 December 2025

Remote State Estimation and Instruction Adjustment of Multi-Agent Systems Under False Data Injection Attacks

,
and
1
College of Information Science and Engineering, Northeastern University, Shenyang 110819, China
2
School of Computer Science and Engineering, Northeastern University, Shenyang 110819, China
3
Foshan Graduate School of Innovation, Northeastern University, Foshan 528311, China
*
Author to whom correspondence should be addressed.
Appl. Sci.2025, 15(23), 12734;https://doi.org/10.3390/app152312734 
(registering DOI)
This article belongs to the Special Issue Advances in Attack Detection and Secure State Estimation for Cyber–Physical Systems (CPS)

Abstract

This paper investigates the problems of remote state estimation and instruction adjustment for multi-agent systems (MASs) under simultaneous sensor and instruction attacks, as well as external disturbances. Unlike existing research that primarily focuses on single-channel attacks, this paper investigates the more challenging scenario of dual-channel attacks. To decouple the detrimental effects of instruction attacks on state estimation, an augmented descriptor system is constructed, treating sensor attacks as part of an extended state. Then, a distributed unknown input observer is designed to estimate the system states. Theoretical analysis demonstrates that state estimation error is asymptotically convergent and independent of instruction estimation. Furthermore, to counteract instruction attacks, a distributed cooperative estimation strategy based on an adaptive saturation mechanism is proposed, enabling all agents to achieve bounded estimation of the true reference instruction within a finite number of iterations. Finally, the effectiveness and robustness of the proposed approach under dual-channel attacks are verified by a simulation of an unmanned vehicle platoon.

Article Metrics

Citations

Article Access Statistics

Article metric data becomes available approximately 24 hours after publication online.