Next Article in Journal
Up-to-Date Scoping Review of Object Detection Methods for Macro Marine Debris
Previous Article in Journal
Evaluation of Free-Surface Exposure Effects on Tidal Turbine Performance Using CFD
Previous Article in Special Issue
A Novel Swin-Transformer with Multi-Source Information Fusion for Online Cross-Domain Bearing RUL Prediction
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Event-Triggering Surrounding Control for Multi-USVs Under FDI Attacks via Adaptive Dynamic Programming

1
Logistics Engineering College, Shanghai Maritime University, Shanghai 201306, China
2
College of Information Engineering, Shanghai Maritime University, Shanghai 201306, China
3
School of Mechanical Engineering, Shanghai Dianji University, Shanghai 201306, China
4
School of Information Science and Technology, Dalian Maritime University, Dalian 116026, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
J. Mar. Sci. Eng. 2025, 13(8), 1588; https://doi.org/10.3390/jmse13081588
Submission received: 23 July 2025 / Revised: 8 August 2025 / Accepted: 14 August 2025 / Published: 19 August 2025
(This article belongs to the Special Issue Ship Wireless Sensor)

Abstract

This paper investigates the surrounding control problem of multiple unmanned surface vehicles (USVs) against false data injection (FDI) attacks and proposes a learning-based prescribed performance control (PPC) integrated with a dynamic event-triggering (DET) mechanism. First, a predefined-time observer (PTO) is designed to estimate the injected false data. Then, the constrained surrounding tracking error of multi-USVs is first formulated based on an exponential prescribed performance function. To facilitate the control law design, the constrained surrounding problem is transformed into an unconstrained space using a hyperbolic tangent function. Based on adaptive dynamic programming (ADP) and the DET mechanism, a prescribed performance time-varying surrounding control scheme is developed. Finally, the effectiveness and superiority of the proposed control strategy are demonstrated through rigorous theoretical analysis and simulation experiments, while Zeno behavior in the event-triggered mechanism is excluded.

1. Introduction

In recent years, multi-agent systems (MASs) control has emerged as a significant research focus due to the inherent flexibility, scalability, and intelligent emergence characteristics of MASs. The MASs control technology has been widely used in the formation control of unmanned systems [1], surrounding control of unmanned surface vehicles (USVs) [2], and reconnaissance missions of multiple unmanned aerial vehicles (UAVs) [3].
Multi-USV systems have attracted significant research attention globally, owing to the advantages of their low cost, high maneuverability, and operational reliability. An equal-distance surrounding control strategy was proposed to address the encirclement tasks of multi-USVs with collision avoidance in [4]. Skjetne et al. [5] designed an adaptive recursive control scheme for nonlinear USV systems with parameter uncertainties. In [6], a distributed prescribed performance formation control method with obstacle avoidance was presented for multiple USVs under parameter uncertainties and external disturbances. However, the above-mentioned control methods, such as sliding mode control, adaptive control, and backstepping control, fail to account for the trade-off between control performance and control cost. Moreover, in practical applications, the communication networks of multi-USVs may be vulnerable to cyber-attacks, and the closed-loop systems (CLSs) are required to achieve good steady-state and transient performance. Therefore, it is significant to design a robust, secure, and optimal control scheme with prescribed performance to address the surrounding control problem of multiple USVs under network attacks.
In [7], a fixed-time extended state observer (FTESO) was designed to estimate the velocities and disturbances of multi-USVs, and a FTESO-based fixed-time distributed formation control method was developed. In [8], a leader–follower formation control strategy based on event-triggered mechanism and artificial potential function was proposed for multiple autonomous underwater vehicles (AUVs) in a three-dimensional environment. The authors investigated the formation control problem of multiple USVs under constraints on line-of-sight range and angular measurements, and a fault-tolerant finite-time formation control method based on time-varying tangent barrier Lyapunov function was proposed in [9]. Formation control methods are generally used to realize cooperative tasks. However, the surrounding control and containment control methods can be utilized to address the MASs control problem involving non-cooperative targets [10]. Xu et al. [11] developed an event-triggered control method to address the surrounding-formation control problem with multiple dynamic targets; Zeno behavior did not occur in the event-triggered mechanism. Reference [12] proposed a sampled-data-based containment control strategy to solve the second-order multi-agent control problem involving a dynamic leader with nonzero input, ultimately guaranteeing that all followers converge within the convex hull formed by the dynamic leader. In practical applications, USVs are typically powered by lithium batteries, which are limited in capacity due to the constraints of the USV’s size and structure. Therefore, designing control schemes that minimize energy consumption while maintaining USV performance is of significant value. In [13], an optimal tracking control scheme was designed for USV dead-zone input nonlinearity and external disturbances, which can balance the control cost and performance. In [14], the authors addressed the control problem of fixed-wing UAVs subjected to both matched and unmatched disturbances, and an adaptive optimal control method based on the adaptive gain generalized super-twisting algorithm was proposed to mitigate the negative impact of disturbances on the CLSs.
The aforementioned works primarily focus on designing control methods to ensure the steady-state performance of control systems. However, these control methods do not simultaneously account for both steady-state and transient performance, including factors such as convergence accuracy, convergence speed, and overshoot in the CLSs. In [15], a prescribed performance control (PPC) method was first designed for MIMO nonlinear systems, which can ensure that the state of CLSs remains within the range defined by a prescribed performance function. A reinforcement learning (RL)-based prescribed performance optimal control scheme was presented to deal with the constrained tracking control problem of USV [16]. An adaptive fault-tolerant control scheme based on PPC techniques for spacecraft in the presence of external disturbances and actuator failures in [17]. In [18], a RL-based prescribed performance attitude control method was designed for spacecraft attitude control systems under disturbances and state constraints, and a neural network (NN) weight update law without persistent excitation (PE) conditions was proposed in the RL algorithm. In [19], a leader–follower prescribed performance formation control approach was developed to solve second-order MASs output feedback control problems without velocity measurement. In [20], a FTESO-based PPC method was proposed to handle the path-tracking problem of USVs via sliding mode control (SMC) techniques. An event-triggered-based reinforcement learning PPC method was presented for the underactuated USV in [21]. The event-triggered strategies in the aforementioned works primarily are mainly static triggering mechanisms. To further reduce the number of event triggers, reference [22] employed a dynamic event-triggered (DET) mechanism to design a finite-time formation control method for USVs.
Multi-UAVs are one branch of cyber-physical systems (CPSs); malicious cyberattacks can have severe negative impacts on their security and stability [23,24]. The cyberattacks are mainly categorized into denial of service (DoS) attacks [25] that destroy data availability, and false data injection (FDI) attacks [26] that damage data integrity. Compared to DoS attacks, FDI attacks are more covert and destructive. Considering the consensus control problem of multiple UAVs under deception attacks, a memory-based event-triggered control strategy was proposed by incorporating an averaging mechanism to suppress event mis-triggering caused by deception attacks [27]. For smart grid systems subjected to FDI attacks, a deep-learning-based intelligent detection algorithm was designed to identify the behavioral characteristics of false data using historical measurement data in [28]. He et al. [29] proposed a pulse-synchronization-based secure control method for MASs under deception attacks. For MASs under composite attacks combining FDI and information replay, an adaptive observer-based distributed leader–follower resilient control scheme was proposed in [30]. A periodic event-triggered resilient control strategy was developed for the consensus control problem of linear MASs under FDI and DoS attacks [31]. In [32], a fully distributed resilient control protocol was developed for the formation-containment control problem of higher-order heterogeneous MASs under unbounded FDI attacks. In [33], a distributed resilient containment control method was proposed for MASs against FDI attacks. Zhang et al. [34] designed a predictive sliding mode control method to address the output tracking problem of higher-order fully actuated systems in the presence of FDI attacks. In [35], considering the higher-order fully actuated MASs under FDI attacks, a predictive sliding mode control approach was proposed to ensure the stability and security of CLSs.
By analyzing the aforementioned works, it can be observed that there is relatively little research on the surrounding control problem of multi-USVs under FDI cyberattacks. Inspired by the above studies, this paper proposes a learning-based resilient DET surrounding control strategy for multi-USVs under FDI attacks. The main contributions of this work are as follows:
1. A novel predefined-time observer (PTO) is proposed to estimate false data in the communication network of multi-USVs, and a PTO-based resilient control scheme is designed. In contrast to the asymptotic convergence FDI observer presented in [27], the proposed PTO can estimate the false data within a user-predefined time and does not require the assumption that the false data are bounded.
2. Based on the information from the PTO, a prescribed performance time-varying surrounding control method is designed for multi-USVs within the adaptive dynamic programming (ADP) framework. In [16], an RL-based control method for the tracking control problem of USVs was proposed using the NN weight update law under the persistent excitation condition (PE). In contrast, the NN weight update law in this paper relaxes the PE requirement by incorporating the system’s state into the learning rate, thereby accelerating the convergence of the weight update law.
3. Compared to these control schemes for USVs in [4,11,16], this work proposes an ADP-based prescribed performance controller integrated with the DET mechanism. In contrast to the time-sampling controller in [4,11], and the static event-triggering strategy in [16], the proposed DET scheme further reduces the event-triggering numbers to reduce energy consumption. Moreover, by combining the ADP and PPC techniques, the proposed optimal surrounding controller effectively balances control cost and performance while considering both the steady-state and transient performance of the CLSs.

2. Materials and Methods

This paper investigates the surrounding control problem of multiple unmanned surface vehicles (USVs) against false data injection (FDI) attacks and the control structure diagram of the multi-USVs against FDI attacks is given in Figure 1. The false data are injected into the communication network between USVs to degrade the performance of CLSs. The proposed FDI compensation observer can effectively detect false signals to mitigate the impact of FDI attacks. Ultimately, combining the framework of adaptive dynamic programming and the dynamic event-triggered mechanism, a resilient prescribed performance surrounding control method is designed for multi-USVs.

2.1. Communication Network Diagram of USV

The time-varying surrounding control problem of multi-USVs is investigated in this work. Considering the multi-USVs with N agents, the directed communication network of USVs is defined as G = V , ε , where V = { v 1 , v 2 , v N } denotes the node set and ε V × V is the edge set among the directed graph G . The symbol A = [ a i j ] R N × N is defined as the adjacency matrix of multi-USVs, where a i j denotes the connection weight between the ith USV and jth USV. If v j , v i ε , that means the ith USV can acquire the state of jth USV, a i j = 1 , otherwise a i j = 0 . The diagonal matrix D = diag { d i } is denoted as the in-degree matrix of USVs, where d i = j = 1 N a i j . The Laplacian matrix is given by L = D A .
Consider the state of target USV as η 0 , if the state information of target USV can flow to the ith USV, b i 0 = 1 , otherwise b i 0 = 0 . For a digraph G ¯ with N + 1 agents, the directed graph G ¯ contains the target USV and N pursuer USVs. The Laplacian matrix of digraph G ¯ is defined as H = L + B , where B = diag { b i 0 } .
Assumption 1. 
For the digraph  G ¯ , there exists at least one path from the target USV to any pursuer USV. Also, a directed spanning tree is rooted at the target USV in the  G ¯ .

2.2. The Dynamical Model of USV

The simplified schematic diagram of the unmanned surface vehicle (USV) is shown in Figure 2, where F e O e X e Y e represents the Earth-fixed coordinate and F B O B X B Y B denotes the body-fixed coordinate of the USV.
According to references [6,16], the kinematic and dynamic models of the USVs are given as follows:
η ˙ i = R i ( φ i ) v i v ˙ i = M i 1 C i ( v i ) v i + D i ( v i ) v i τ i
where η i = x i , y i , φ i T denotes the state of the ith USV, ( x i , y i ) is the position state and φ i is the yaw angle. v i = u i , v i , r i T is the velocity vector, u i ,   v i ,   r i are the surge, sway, yaw velocities, respectively. τ i = τ u i , τ v i , τ r i T is the control input. M i R 3 × 3 represents the inertia matrix, satisfying M i = M i T C i ( v i ) R 3 × 3 is the skew-symmetric Coriolis force matrix, C i ( v i ) = C i ( v i ) T , and  D i ( v i ) R 3 × 3 is the damping matrix. R i ( φ i ) is the rotation matrix from F B O B X B Y B to F e O e X e Y e , defined as follows:
R i ( φ i ) = cos φ i sin φ i 0 sin φ i cos φ i 0 0 0 1
where the rotation matrix has the property R i T ( φ i ) R i ( φ i ) = I . The matrices M i C i ( v i ) D i ( v i ) are expressed as follows:
M i = m 11 i 0 0 0 m 22 i m 23 i 0 m 23 i m 33 i ,   C i ( v i ) = 0 0 c 13 i 0 0 c 23 i c 13 i c 23 i 0 ,   D i ( v i ) = d 11 i 0 0 0 d 22 i 0 0 0 d 33 i
with m 11 i = m i X u ˙ i m 22 i = m i Y v ˙ i m 33 i = I z i N r ˙ i m 23 i = m i x g i Y r ˙ i m i is the mass of the ith USV, I z i denotes the inertia term in the z-axis, x g i is the gravity of the USV, and these variables X u ˙ i , Y v ˙ i , Y r ˙ i , N r ˙ i are the added masses. c 13 i = m 22 i v i + m 23 i r i c 23 i = m 11 i u i . d 11 i = ( X u i + X u | u | i u i ) d 22 i = ( Y v i + Y v | v | i v i ) d 33 i = ( N r i + N r | r | i r i ) X u i , Y v i , N r i are the linear damping coefficients of USV, and X u | u | i , Y v | v | i , N r | r | i denote the quadratic damping coefficients.
Next, according to the Euler-Lagrange modeling method [36,37], the dynamical model (1) of the USV is transformed as follows:
v i = R i 1 η ˙ i
Taking the derivative of Equation (4), we obtain the following equation:
v ˙ i = R ˙ i 1 η ˙ i + R i 1 η ¨ i
Substituting (5) into (1), we can obtain the following:
J i η ¨ i + H i η ˙ i = τ i
where J i = M i R i 1 H i = M i + C i + D i R i 1 .
In this work, the control inputs under the FDI attacks are represented as follows:
τ ˜ i = τ i + E i Γ i
where Γ i denotes the false information injected by the attacker, E i = diag { γ i 1 ,   γ i 2 ,   γ i 3 } is the FDI attacks probability matrix, γ i 1 γ i 2 , and  γ i 3 denote random variables that follow the Bernoulli distribution. The probability distribution of the random variable satisfies the following:
P r o b { γ i 1 = 1 } = γ ¯ i 1 , P r o b { γ i 2 = 1 } = γ ¯ i 2 , P r o b { γ i 3 = 1 } = γ ¯ i 3 ,
where γ ¯ i 1 [ 0 , 1 ] γ ¯ i 2 [ 0 , 1 ] , and  γ ¯ i 3 [ 0 , 1 ] .
Substituting (7) into (6), we can obtain the dynamic systems of multiple USVs under FDI attacks as follows:
J i η ¨ i + H i η ˙ i = τ i + E i Γ i

2.3. The Surrounding Control for Multi-USVs

Definition 1 
[38]. There exists a set  X = { x 1 , x 2 , x n }  that belongs to a convex set  C . In the convex set  C , there exists a convex hull  C o ( X ) = i = 1 n δ i x i | x i X , i = 1 n δ i = 1 .
Definition 2. 
The time-varying surrounding control of multi-USVs is achieved, if for any pursuer USV satisfying the following equation:
lim t η i η 0 ρ i 0 = 0
where  η 0  denotes the state of target USV, the time-varying surrounding function  ρ i 0 = [ c 1 cos ( c 2 t + 2 π i / N ) , c 1 sin ( c 2 t + 2 π i / N ) , 0 ] T c 1 , c 2 > 0 i = 1 , 2 , N .
Figure 3 illustrates the process of multiple USVs moving from their initial states to uniformly encircling the target. It can be observed that the target USV is finally distributed into the convex hull spanned by the pursuer USVs.
Lemma 1 
[39]. Consider the dynamic system  x = f ( x , u ) , where  x  represents the system state and  u  is the control input. For any positive constants  a  and  0 < p < 1 , there exists a positive-definite Lyapunov function  V ( t )  satisfying the following:
V ˙ ( t ) 1 a p T c ( 1 + a V ( t ) p ) 2 V ( t ) 1 p
with  T c > 0 . The system state  x  will converge to the origin within the user-predefined time  T c .

2.4. Design of a Preset Time Controller Based on ADP and Dynamic Event-Triggering Mechanism

2.4.1. Predefined-Time FDI Attack Observer Design

This work considers the surrounding control problem of multi-USVs under FDI attacks. If the false information in the communication network of USVs is not handled properly, it will lead to the performance degradation of the closed-loop system. To mitigate the impact of FDI attacks, a predefined-time attack compensation observer will be designed for the multi-USVs. One auxiliary variable is defined as follows:
S i = k i t 0 t τ i H i η ˙ i + J ˙ i η ˙ i S i ( s ) d s k i J i η ˙ i
where k i is a positive constant. Taking the time derivative of Equation (12), we obtain the following expression:
S ˙ i = k i S i + F i
where F i = E i Γ i .
Theorem 1. 
Based on the auxiliary variable  S i  and its derivative  S ˙ i , which are specifically defined in Equations (12) and (13), a predefined-time observer is designed as follows:
S ^ ˙ i = 1 2 a i p i T i 1 + a i L i p i 2 L i p i S ˜ i + S ˙ i
with  a i > 0 0 < p i < 1 L i = 1 2 S ˜ i T S ˜ i S ˜ i = S i S ^ i . According to Equations (13) and (14), to alleviate the impact of FDI attacks on the closed-loop system of USVs, the following predefined-time FDI observer is given as follows:
F ^ i = 1 k i k i S ^ i + S ˙ i
Under the observer (15), the estimation error  F ˜ i = F i F ^ i  will converge to zero within the predefined time  T i .
Proof. 
The function L i = 1 2 S ˜ i T S ˜ i is selected as the Lyapunov function, and the L ˙ i can be obtained as follows:
L ˙ i = S ˜ i T S ˜ ˙ i = S ˜ i T 1 2 a i p i T i 1 + a i L i p i 2 L i p i S ˜ i 1 a i p i T i 1 + a i L i p i 2 L i 1 p i
According to Lemma 1, it can be derived that S ˜ i 0 as the time t T i . When t T i S ˜ i = 0 can be obtained. Based on Equations (13) and (15), we can obtain the following:
F ˜ i = F i F ^ i = F i + 1 k i k i S ^ i k i S i + F i = S ˜ i
Based on the above analysis, it can be concluded that the estimation error F ˜ i of the false data will converge to zero within the predefined time T i . □

2.4.2. Tracking Error Subsystem of USVs

Considering the second-order Euler-Lagrange dynamic model of the USV in Equation (6), the following controller is given as follows:
τ i = τ r i + τ f i
where the τ r i denotes the ADP-based controller, the feedforward control law τ f i is defined as τ f i = H i η ˙ i F ^ i + J i h ¨ i 0 , and  h i 0 is the surrounding position vector of the ith USV relative to the target.
The position vector of the target USV is set as η d = x d , y d , φ d T , and  v ˙ d = η d is the velocity vector of the target. Next, the surrounding tracking error model for the multi-USVs will be established. The position error e i , 1 of the ith USV relative to its neighbor is formulated as follows:
e i , 1 = j = 0 N a i j η i η j h i j
where h i j = h i 0 h j 0 denotes the relative position between ith USV and jth USV, η 0 = η d .
The velocity tracking error e i , 2 is defined as follows:
e ˙ i , 1 = e i , 2 = j = 0 N a i j η ˙ i η ˙ j h ˙ i j
Take the derivative of Equation (20) with respect to time, it can yield the following:
e ˙ i , 2 = j = 0 N a i j η ¨ i η ¨ j h ¨ i j = j = 0 N a i j η ¨ i η ¨ j h ¨ i j = j = 0 N a i j J i 1 τ r i J j 1 τ r j + J i 1 F i J i 1 F ^ i J j 1 F j J j 1 F ^ j = j = 0 N a i j τ R i τ R j + J i 1 F ˜ i J j 1 F ˜ j
with τ R i = J i 1 τ r i τ R j = J j 1 τ r j τ R 0 = η ¨ d . One can determine that F ˜ i = 0 3 and F ˜ j = 0 3 when time t T i . According to (20) and (21), a combined dynamic system is defined as follows:
e ˙ i = A i e i + B i τ R i B i τ R j
where e i = e i , 1 T , e i , 2 T T e i , 1 = e i 1 , e i 2 , e i 3 T e i , 2 = e i 4 , e i 5 , e i 6 T A i = 0 3 × 3 I 3 × 3 0 3 × 3 0 3 × 3 B i = 0 3 × 3 I 3 × 3 j = 0 N a i j .
In this paper, to ensure that the surrounding tracking error of USVs has both great steady-state and transient performance, the following prescribed performance function is designed:
λ i ( t ) = λ i ( 0 ) λ i , exp ( l i t ) + λ i ,
where λ i ( t ) = λ i 1 , λ i 2 , λ i 6 T l i > 0 0 < e i k ( 0 ) < λ i k ( 0 ) 0 < λ i k , < λ i k ( 0 ) k = 1 ,   6 . The surrounding tracking error e i can be expressed as follows:
e i ( t ) = λ i ( t ) Γ i ( z i )
where Γ i ( z i ) is a monotonically increasing smooth function such that lim z i + Γ i ( z i ) = 1 lim z i Γ i ( z i ) = 1 . The mapping function Γ i ( z i ) is designed as follows:
Γ i ( z i ) = exp ( z i ) exp ( z i ) exp ( z i ) + exp ( z i )
Because 1 < Γ i ( z i ) < 1 , it can be deduced that λ i ( t ) < λ i ( t ) Γ i ( z i ) < λ i ( t ) from Equation (25). Furthermore, we can obtain the following:
λ i ( t ) < e i ( t i ) < λ i ( t )
From (26), the inverse function of the variable Γ i ( z i ) is given as follows:
z i = 1 2 ln 1 + Γ i ( z i ) 1 Γ i ( z i ) = 1 2 ln 1 + ( e i / λ i ) 1 ( e i / λ i )
The time derivative of Equation (27) can be given as follows:
z ˙ i = 1 2 λ ˙ i + e ˙ i λ i + e i λ ˙ i e ˙ i λ i e i = G i 1 ( e ˙ i G i 2 e i )
with G i 1 = diag G i 11 , G i 12 , , G i 16 G i 1 k = λ i k / ( λ i k 2 e i k 2 ) G i 2 = diag G i 21 , G i 22 , , G i 26 G i 2 k = λ ˙ i k / λ i k k = 1 ,   6 . Substituting Equation (20) into (28), we obtain the following:
z ˙ i = F ( z i ) + B ¯ i τ R i B ¯ i τ R j
where F ( z i ) = G i 1 ( A i G i 2 ) e i B ¯ i = G i 1 B i . According to (24) and (27), F ( 0 ) = 0 can be derived.

2.4.3. ADP-Based Optimal Time-Varying Surrounding Control

To save the energy of the USV, this paper adopts a dynamic event-triggered control strategy to reduce communication frequency and state sampling times between USVs. The sampling time sequence for the ith USV is defined as t s i , satisfying t s i < t s + 1 i s = 0 ,   . The sampling error q i ( t ) of ith USV is designed as follows:
q i ( t ) = z i ( t s i ) z i ( t ) , t t s i , t s + 1 i
where z i ( t s i ) represents the previous sampling time t s i of ith USV. To facilitate the design of the event-triggered control strategy in the following discussion, we define z ^ i = z i ( t s i ) . The performance index function for the ith USV is designed as follows:
J i ( z i ) = 0 z i T Q i z i + τ R i T R i τ R i   d t
where Q i = Q i T > 0 and R i = R i T > 0 . If the ith USV has an optimal control scheme τ R i , the cost function in Equation (27) can be transformed into the following form:
J i ( z i ) = 0 z i T Q i z i + ( τ R i ) T R i τ R i   d t
We conduct the time derivative of the optimal cost function J i ( z i ) in (32), it yields the following:
H z i , τ R i , z i J i ( z i ) = z i T Q i z i + ( τ R i ) T R i τ R i + z i T J i ( z i ) ( F ( z i ) + B ¯ i τ R i B ¯ i τ R j ) = 0
where z i J i ( z i ) = J i ( z i ) / z i is the partial derivative of J i ( z i ) with respect to z i . Using Equation (33), the optimal control strategy τ R i is obtained as follows:
τ R i = 1 2 R i 1 B ¯ i T z i J i ( z i )
According to the definition of z i ( t s i ) in (30), the event-triggered optimal controller is obtained as follows:
τ ^ R i ( z ^ i ) = 1 2 R i 1 B ¯ i T z i J i ( z ^ i )
Substituting (35) into (33), the HJB equation of ith USV under the event-triggered strategy is given as follows:
z i T Q i z i + 1 4 ( J i ( z ^ i ) ) T B ¯ i R i 1 B ¯ i T J i ( z ^ i ) + ( J i ( z i ) ) T F ( z i ) 1 2 ( J i ( z i ) ) T B ¯ i R i 1 B ¯ i T J i ( z ^ i ) + 1 2 J i ( z i ) ) T B ¯ i R j 1 B ¯ j T J j ( z j ) = 0
Based on the above analysis, we can obtain the event-triggered optimal control strategy τ ^ R i ( z ^ i ) by solving the HJB Equation (36). However, the HJB equation is highly nonlinear and contains partial differential terms, making it difficult to obtain an analytical solution. Therefore, we use a neural network to approximate the optimal cost function, which can be formulated as follows:
J i ( z i ) = ( W i ) T ϕ i ( z i ) + ε i ( z i )
where W i 6 × 1 is the optimal weight vector of the NN, ϕ i ( z i ) 6 × 1 represents the activation function, and ε i ( z i ) is the approximation error of the NN. Utilizing (37), the optimal event-triggered control strategy in (35) is re-expressed as follows:
τ ^ R i ( z ^ i ) = 1 2 R i 1 B ¯ i T ϕ i ( z ^ i ) W i + ε i ( z ^ i )
The optimal weight vector W i is unknown, which makes it impossible to directly obtain the optimal cost function J i ( z i ) . Then, we design the W ^ i to estimate the W i , and  J ^ i ( z i ) = W ^ i T ϕ i ( z i ) is defined as the estimation of J i ( z i ) . Therefore, the actual optimal control strategy τ ^ R i ( z ^ i ) is given as follows:
τ ^ R i ( z ^ i ) = 1 2 R i 1 B ¯ i T ϕ i ( z ^ i ) W ^ i
According to (33) and J ^ i ( z i ) = W ^ i T ϕ i ( z i ) , the Hamiltonian function can be rewritten as follows:
H z i , τ ^ R i , W ^ i = z i T Q i z i + ( τ ^ R i ) T R i τ ^ R i + W ^ i T z i T ϕ i ( z i ) z ˙ i = 𝔼 i
Furthermore, based on Equations (33), (37) and (40), we can obtain the following:
H z i , τ ^ R i , W i = z i T Q i z i + ( τ ^ R i ) T R i τ ^ R i + ( W i ) T z i T ϕ i ( z i ) z ˙ i = 𝔼 i H
where 𝔼 i H = ( ε i ( z i ) ) T z ˙ i . According to (40) and (41), we can obtain the following:
𝔼 i H 𝔼 i = W ˜ i T ϖ i
with ϖ i = z i T ϕ i ( z i ) z ˙ i and W ˜ i = W i W ^ i .
Assumption 2. 
The activation function of the NN and the approximation error are both bounded, satisfying  ϕ i ϕ ¯ i ε i ε ¯ i , where  ϕ ¯ i  and  ε ¯ i  are constant values.
Assumption 3. 
The activation function  ϕ i T ( z i )  satisfies the Lipschitz continuous [40]; we obtain the following:
ϕ i T ( z i ) ϕ i T ( z ^ i ) c i q i ( t )
where  c i  is a positive constant.
Theorem 2. 
Considering the transformed subsystem (29) of the USVs, an event-triggered control strategy (39) based on reinforcement learning is designed. The dynamic event-triggering condition is designed as follows:
t s + 1 i = sup t > t s i l 4 ( l 3 q i 2 σ l 1 z i 2 σ l 2 τ ^ R i 2 exp ( z i ) ) δ i
where l 1 = λ min ( Q i ) l 2 = λ min ( R i ) l 4 > 0 l 3 = c i 2 R i 1 B ¯ i T 2 W ^ i 2 σ 0 , 1 . The dynamic variable  δ i in (44) is given as follows:
δ ˙ i = β i δ i + ξ i ( σ l 1 z i 2 + σ l 2 τ ^ R i 2 + exp ( z i ) l 3 q i 2 )
where  δ i ( 0 ) > 0 β i > 0 ξ i 0 , 1 . The NN weight update law without PE condition is given as follows:
W ^ ˙ i = ς 2 ς 1 exp ( ς 3 / z i ) + ς 4 W ^ i ς 5 𝔼 i ϖ i ς 1 ( ϖ i T ϖ i + 1 ) 2
with  ς 1 ς 2 ς 3 ς 4  and  ς 5  being positive constants. The state tracking error  z i  and the NN weight estimation error  W ˜ i = W i W ^ i  are ensured to be uniformly ultimately bounded (UUB) under the optimal control law (39) and the weight update law (46). Furthermore, the proposed dynamic event-triggered control strategy does not exhibit Zeno behavior.
Proof. 
According to Equations (44) and (45), we can obtain δ ˙ i β i δ i ξ i l 4 δ i = ( β i + ξ i l 4 ) δ i . Furthermore, from one, we obtain δ i ( t ) 0 . Based on the above analysis, a positive-definite Lyapunov function for the ith USV is chosen as follows:
V i = J i + 1 2 ς 1 W ˜ i T W ˜ i + δ i
The following analysis will be divided into two parts: (1) the stability analysis; (2) the exclusion of Zeno behavior.
(1) Stability Analysis: The time derivative of the Lyapunov function V i is given as follows:
V ˙ i = ( J i ) T ( F ( z i ) + B ¯ i τ ^ R i B ¯ i τ ^ R j ) + ς 1 W ˜ i T W ˜ ˙ i + δ ˙ i
According to Equations (33), (46) and (48) can be further derived into the following form:
V ˙ i = z i T Q i z i + ( τ R i ) T R i τ R i 2 ( τ R i ) T R i τ ^ R i + ( J i ) T B ¯ i ( τ R j τ ^ R j ) ς 1 W ˜ i T W ^ ˙ i + δ ˙ i
According to [18], the ideal weight W i is bounded. Furthermore, we can obtain ( J i ) T B ¯ i ( τ R j τ ^ R j ) υ j , where υ j > 0 . Based on the weight update law (46) and Equation (49), the following inequality can be obtained:
ς 1 W ˜ i T W ^ ˙ i = χ 1 i W ˜ i T W ^ i + χ 2 i W ˜ i T 𝔼 i ϖ i = χ 1 i W ˜ i T W i W ˜ i + χ 2 i W ˜ i T ϖ i 𝔼 i H W ˜ i T ϖ i χ 1 i 2 W ˜ i 2 χ 2 i 2 W ˜ i T ϖ i 2 + χ 1 i 2 W i 2 + χ 2 i 2 𝔼 i H 2 χ 1 i 2 W ˜ i 2 χ 2 i 2 W ˜ i T ϖ i 2 + χ 1 i 2 W ¯ i 2 + χ 2 i 2 𝔼 ¯ i H 2
where χ 1 i = ς 2 exp ( ς 3 / z i ) + ς 4 and χ 2 i = ς 5 / ( ϖ i T ϖ i + 1 ) 2 . W ¯ i is the upper bound of the ideal weight W i , and  𝔼 ¯ i H is the upper bound of 𝔼 i H Substituting (50) into (49), we obtain the following:
V ˙ i z i T Q i z i + ( τ R i τ ^ R i ) T R i ( τ R i τ ^ R i ) ( τ ^ R i ) T R i τ ^ R i   χ 1 i 2 W ˜ i 2 χ 2 i 2 W ˜ i T ϖ i 2 + χ 1 i 2 W ¯ i 2 + χ 2 i 2 𝔼 ¯ i H 2 + δ ˙ i
According to Equations (34) and (37), the time-sampling-based control strategy τ R i is obtained as follows:
τ R i = 1 2 R i 1 B ¯ i T ϕ i T ( z i ) W i + ε i ( z i )
And further from (39) and (52), the following inequality can be derived as follows:
( τ R i τ ^ R i ) T R i ( τ R i τ ^ R i ) R i τ R i τ ^ R i 2 R i R i 1 B ¯ i T ϕ i T ( z i ) ϕ i T ( z ^ i ) W ^ i 2       + R i R i 1 B ¯ i T ϕ i T ( z i ) W ˜ i + ε i ( z i ) 2 c i 2 R i 1 B ¯ i T 2 W ^ i 2 q i 2 + 2 R i 1 B ¯ i T 2 ϕ ¯ i 2 W ˜ i 2       + 2 R i 1 B ¯ i T 2 ε ¯ i 2
Substituting (53) into (52), Equation (51) can be reformulated as follows:
V ˙ i λ min ( Q i ) z i 2 + c i 2 R i 1 B ¯ i T 2 W ^ i 2 q i 2 + 2 R i 1 B ¯ i T 2 ϕ ¯ i 2 W ˜ i 2 + 2 R i 1 B ¯ i T 2 ε ¯ i 2       λ min ( R i ) τ ^ R i 2 χ 1 i 2 W ˜ i 2 χ 2 i 2 W ˜ i T ϖ i 2 + χ 1 i 2 W ¯ i 2 + χ 2 i 2 𝔼 ¯ i H 2 + δ ˙ i l 1 z i 2 l 2 τ ^ R i 2 + l 3 q i 2 ϑ 1 W ˜ i 2 + ϑ 2 + δ ˙ i
where ϑ 1 and ϑ 2 are shown as follows:
ϑ 1 = χ 1 i 2 + χ 2 i ϖ i T ϖ i 2 2 R i 1 B ¯ i T 2 ϕ ¯ i 2 > 0 ϑ 2 = 2 R i 1 B ¯ i T 2 ε ¯ i 2 + χ 1 i 2 W ¯ i 2 + χ 2 i 2 𝔼 ¯ i H 2
Based on the dynamic event-triggering conditions (44) and (45), Equation (54) can be re-expressed in the following form:
V ˙ i ( 1 ξ i σ ) l 1 z i 2 ( 1 ξ i σ ) l 2 τ ^ R i 2 + ( 1 ξ i σ ) l 3 q i 2       + ξ i exp ( z i ) ϑ 1 W ˜ i 2 + ϑ 2 β i δ i ( 1 σ ) l 1 z i 2 ( 1 σ ) l 2 τ ^ R i 2 + 1 ξ i l 4 β i δ i ϑ 1 W ˜ i 2 + ϑ ¯ 2
where l 4 > ( 1 ξ i ) / β i ξ i exp ( z i ) + ϑ 2 ϑ ¯ 2 . Based on the above analysis, it is known that the variables z i and W ˜ i are UUB. It is reasonable to assume that the position tracking error is lim t 0 e i , 1 k i 1 , where k i 1 is a positive constant. Therefore, we can obtain the following:
i = 1 N 1 N η i η 0 ρ i 0 = η 0 1 N i = 1 N η i k i 1
According to the definition of encirclement control and Equation (53), it can be concluded that multiple unmanned ships will successfully complete the encirclement control task for the target.
(2) Exclusion of Zeno behavior: Taking the derivative of the event-triggered sampling error q i ( t ) with respect to time t t s i , t s + 1 i , we obtain the following:
q ˙ i ( t ) = z ˙ i ( t ) = F ( z i ) + B ¯ i τ R i B ¯ i τ R j
From the proof results given above, it is known that these variables z i , τ R i , τ R j are bounded. Therefore, Equation (58) can be written in the following form:
q ˙ i ( t ) k i 2
where k i 2 0 . Since time is within the interval t t s i , t s + 1 i , integrating both sides of Equation (59) yields the following expression:
t s + 1 i t s i t s + 1 i t q i ( t ) k i 2 > 0
According to (60), there is no Zeno behavior in the proposed DETC.
Remark 1. 
The predefined-time FDI attacks observer was first proposed in this work for multi-USVs under FDI network attacks. Compared to the asymptotic convergence, finite-time, and fixed-time observers [1,7,27], the proposed observer allows for a predefined convergence time while maintaining a simple structure. In [41], the prescribed-time observer may encounter singularity issues at the prescribed time point. This occurs because measurement errors in the system state can lead to an infinite gain. Compared to [41], the predefined-time approach proposed in this paper overcomes the singularity problem.
Remark 2. 
Compared to these multi-USVs surrounding control strategies in [4,11,42], this paper proposes a prescribed-performance time-varying surrounding control scheme based on ADP for the first time. In the proposed control strategy, multi-USVs can achieve time-varying even encirclement of the target, meaning that all the pursuer USVs are evenly distributed on a circle with the encirclement radius and move in a circular motion around the target.
Remark 3. 
Reference [16] proposed a reinforcement learning-based prescribed-performance tracking control strategy for USV, which requires the assumption of a weight update law with persistent excitation. Compared to [16], this paper introduces an NN weight update law that does not require the persistently excited condition. Additionally, a system state is incorporated into the NN weight update law, which accelerates the convergence of the NN weights.
Remark 4. 
Compared to the static event-triggered control strategy proposed in [21] for the USV tracking problem, this paper introduces an improved dynamic event-triggered mechanism (IDETM) to further reduce the number of triggers. Moreover, through rigorous theoretical proof, Zeno behavior is eliminated. The proposed reinforcement learning control method based on IDETM significantly reduces the energy consumption of multi-USVs caused by the controller and communication.

3. Results and Discussion

In this section, numerical simulations are used to verify the effectiveness of the proposed control strategy. The computer specifications for this simulation are as follows: an AMD Ryzen 9-7945HX processor running at 2.5 GHz and 16 GB of RAM. The simulation is implemented in MATLAB/Simulink (R2016B) and MATLAB/Simscape (R2023B) with a fixed-step sampling method, where the step size is 0.01 and the total simulation time is 100 s. In the simulation, four pursuer USVs ( i = 1 ,   2 ,   3 ,   4 ) and one target are designed. Figure 4 shows the communication topology of the multi-USVs.
The settings for the inertia matrix M i , Coriolis term C i , and damping matrix D i of the dynamics model of the unmanned surface vehicle refer to [5], with specific values listed in Table 1. The parameters for the prescribed performance function are set as λ i ( 0 ) = 4 λ i , = 0.001 l i = 0.5 . Additionally, the initial values of USV states, NN weights, the weight matrix, control parameters, and the parameters of the predefined-time FDI observer are provided in Table 2. The vector z ^ i is expanded as z ^ i = [ z ^ i 1 , , z ^ i 6 ] T , and  ϕ i ( z ^ i ) = [ z ^ i 1 2 , z ^ i 2 2 , z ^ i 3 2 , z ^ i 1 z ^ i 4 , z ^ i 2 z ^ i 5 , z ^ i 3 z ^ i 6 ] T is set as the NN activation function. The desired motion trajectory for the target is set as η d ( t ) = [ 3 + 0.2 t , 3 + 0.2 t , 0.785 ] T , while the time-varying surrounding configuration of the pursuer USVs relative to the target is given in Table 3. Assuming the false data are Γ i ( t ) = [ 0.1 sin ( 0.1 t ) , 0.1 cos ( 0.1 t ) , 0.1 sin ( 0.1 t ) ] T , the attack probability constants are set as γ ¯ i 1 = 0.3 γ ¯ i 2 = 0.26 γ ¯ i 3 = 0.23 .
Considering the surrounding control problem of multi-USVs under FDI attacks, this work proposes an ADP-based prescribed performance time-varying encirclement control strategy. This subsection verifies the effectiveness and superiority of the proposed scheme through numerical simulations and comparative experiments.
Figure 5 shows the 2D trajectory of multi-USVs. From Figure 5, it can be seen that at the initial moment, the target is located outside the four pursuer USVs. Under the proposed control method, the four pursuer USVs successfully form a square configuration to encircle the target unmanned ship. Furthermore, from Figure 5, it can be observed that the formation of the configuration of pursuer USVs is time-varying, meaning that each pursuer USV performs a circular motion around the target unmanned ship, ultimately resulting in the target being enclosed within the convex hull formed by the pursuing unmanned ships.
To demonstrate the superior performance of the proposed ADP-based prescribed-performance control method (PPCADP), Figure 6 presents comparative simulation results with three different control approaches, including the traditional ADP control method (TADP) in [38], the model predictive control strategy (MPC) in [43], and the sliding mode control method (SMC) in [44]. Figure 6 illustrates the simulation results of the state tracking error under different controllers. From Figure 6, it can be seen that the state tracking errors under the PPCADP strategy remain strictly within the prescribed bounds, indicating the superior control performance of the proposed PPCADP. Figure 6b–d show the simulation results of the state tracking errors under the TADP, MPC, and SMC methods, respectively. The three control methods without prescribed performance constraints fail to confine the state tracking errors within the predefined bounds.
To sum up, it can be observed from Figure 6 that the proposed PPCADP approach achieves faster convergence, higher convergence accuracy, and smaller overshoot compared with the other three control strategies.
In order to quantitatively compare the energy consumption results, a unified control energy cost function has been designed in the manuscript for different control methods: J C = 0 T 0 i = 1 4 z i T Q z i + ( τ i τ f i ) T R ( τ i τ f i ) d t , where Q = I 6 R = I 3 T 0 = 100   s . Figure 7 presents comparative simulation results of energy consumption under different control strategies.
As observed from Figure 7, the PPCADP strategy achieves the lowest energy consumption, reducing energy cost by 12.8%, 49.3%, and 71.6% compared to the TADP, MPC, and SMC methods, respectively. This improvement is attributed to the incorporation of both control performance and control cost in the design of the cost function for the proposed PPCADP.
Figure 8 shows the control input curves. It can be observed that the resilient control strategy designed in this work ensures the stable performance of the multi-USVs under FDI attacks, and the control inputs converge to the origin within 10 s.
Figure 9 illustrates the time response of the NN weights. It can be seen that the weights converge from initial values to a constant value, indicating that the weights remain stable as the state convergence of CLSs.
The time response results of the attack variable that satisfy the Bernoulli probability distribution are shown in Figure 10.
Figure 11 shows the estimation error of the predefined-time FDI observer for the injected false data. It can be observed that the FDI observer’s estimation error converges to zero within 10 s (the predefined convergence time), verifying the effectiveness and rapidity of the proposed predefined-time FDI observer.
Figure 12 presents a comparison of the number of sampling between the proposed dynamic event-triggered control scheme (DETC), and the event-triggered reinforcement learning control (ETC) method proposed in [40]. The ETC method [40] is applied to the USV model in simulation, and all parameters of the multi-USVs are kept consistent with the settings mentioned above. In Figure 12, the blue bar represents the results under the DETC, while the orange-red bar is the results under the ETC. It can be observed that the four USVs have fewer event-trigger numbers under DETC. The dynamic event-triggering strategy proposed in this paper reduces the total number of triggers by 31.5% compared to the ETC in [40].
Figure 13 shows the time response curves of the dynamic event-triggering condition q i ( t ) (44) and trigger threshold q i T . It can be observed that the value of the event-triggering condition is always less than or equal to the trigger threshold, and the q i ( t ) and q i T gradually converge to zero as the closed-loop system state stabilizes.
In summary, the theoretical proofs and simulation results given above validate the effectiveness and superiority of the proposed control method (18). This method can effectively solve the time-varying surrounding control problem of multi-USVs under FDI attacks.
To further validate the engineering applicability of the proposed PPCADP control method, a 3D semi-physical simulation model of multiple USVs was developed using the Simscape simulation platform. The mass is 1.884   kg , the inertial matrix of USV is I = diag { 0.098 , 0.017 , 0.75 }   kg · m 2 , and the control parameters were kept consistent with those used in the previous Simulink simulations. Figure 14 and Figure 15 show the motion trajectories of the USVs and the time responses of the state tracking errors in the Simscape environment, respectively. These results demonstrate the effectiveness of the proposed PPCADP in the Simscape-based multi-USVs simulation.
Although the above simulation results verify the effectiveness and superiority of the proposed control method, sensitivity analysis was not conducted [45,46]. In future work, we plan to further investigate the reliability of the algorithm under varying simulation parameters through box plots and Monte Carlo simulations.

4. Conclusions

This paper integrated an IDETM with the ADP algorithm and proposed a prescribed-performance time-varying surrounding control scheme for multiple unmanned surface vehicles (multi-USVs) under false data injection (FDI) attacks. First, a predefined-time FDI observer was developed to estimate the injected false data within a user-specified time, thereby removing the conventional assumption of bounded false data. Subsequently, an ADP-based control strategy utilizing the IDETM was designed. Within the learning framework of ADP, a weight update law was constructed without requiring the persistency of the excitation condition, enhancing the generality of the proposed method. Finally, theoretical analysis and numerical simulations demonstrated that the proposed approach enables the pursuer USVs to achieve time-varying surrounding configuration of the target while avoiding Zeno behavior in the DETC. Future work will explore the surrounding control problem of multi-USVs in the presence of actuator failures.

Author Contributions

Y.Z. put forward the general framework of the article and provided the writing ideas, conceived and supervised the research and experiments, and made many constructive comments for the improvement and revision of the article. D.W. consulted the references, performed the validation, and completed the writing and revision of this article. Q.H. guided the structure of the paper and provided suggestions for revisions. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported by the National Natural Science Foundation of China under Grant 61673259, in part by the Natural Science Foundation of Shanghai under Grant 25ZR1401159, in part by the Open Project Funds for the Key Laboratory of Space Photoelectric Detection and Perception (Nanjing University of Aeronautics and Astronautics), Ministry of Industry and Information Technology under Grant NJ2024027-3, in part by the Fundamental Research Funds for the Central Universities under Grant NJ2024027, also in part by the Shanghai Key Laboratory of Intelligent Information Processing, Fudan University. Grant No. IIPL-2025-RD5-01.

Data Availability Statement

The data presented in this study are available in this article (tables and figures).

Acknowledgments

The authors would like to thank the College of Information Engineering and the Institute of Logistics Science and Engineering of Shanghai Maritime University for their support. The author would also like to thank the anonymous reviewers for their helpful suggestions and comments to improve the article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
USVsUnmanned surface vehicles
FDIFalse data injection
PPCPrescribed performance control
DETDynamic event-triggering
PTOPredefined-time observer
MASsMulti-agent systems
FTESOFixed-time extended state observer
CLSsClosed-loop systems
RLReinforcement learning
NNNeural network
SMCSliding mode control
PEPersistent excitation
IDETMimproved dynamic event-triggered mechanism
PPCADPPrescribed-performance control ADP
TADPTraditional ADP
DETCDynamic event-triggered control
Symbols and terms.
G The directed communication network of USVs
V The node set among the directed graph G
ε The edge set among the directed graph G
A The adjacency matrix of multi-USVs,
a i j The connection weight between the ith USV and jth USV
D The in-degree matrix of USVs
L The Laplacian matrix of USV
H The Laplacian matrix of digraph
η i The state of ith USV
η 0 the state of target USV
( x i , y i ) The position state of ith USV
φ i The yaw angle of ith USV
u i , v i , r i The surge, sway, yaw velocities
v i The velocity vector of ith USV
τ i The control input
M i The inertia matrix
C i ( v i ) The skew-symmetric Coriolis force matrix
D i ( v i ) The damping matrix
R i ( φ i ) The   rotation   matrix   from   the   Earth - fixed   coordinate   ( F B O B X B Y B )     to   the   body - fixed   coordinate   ( F e O e X e Y e )
Γ i The false information injected by the attacker
E i The FDI attacks probability matrix
γ i 1 ,   γ i 2 ,   γ i 3 Random variables that follow the Bernoulli distribution
ρ i 0 The time-varying surrounding function
τ r i The RL-based controller
τ f i The feedforward control law
F ˜ i The estimation error
e i , 1 The position error of ith USV relative to its neighbor
e i , 2 The velocity tracking error of ith USV relative to its neighbor
λ i ( t ) The prescribed performance function
q i ( t ) The sampling error of ith USV
J i ( z i ) The performance index function for the ith USV

References

  1. Zhao, J.; Li, X.; Yu, X.; Wang, H. Finite-Time Cooperative Control for Bearing-Defined Leader-Following Formation of Multiple Double-Integrators. IEEE Trans. Cybern. 2022, 52, 13363–13372. [Google Scholar] [CrossRef]
  2. Hu, B.-B.; Zhang, H.-T. Bearing-Only Motional Target-Surrounding Control for Multiple Unmanned Surface Vessels. IEEE Trans. Ind. Electron. 2022, 69, 3988–3997. [Google Scholar] [CrossRef]
  3. An, B.; Wang, B.; Fan, H.; Liu, L.; Hu, H.; Wang, Y. Fully distributed prescribed performance formation control for UAVs with unknown maneuver of leader. Aerosp. Sci. Technol. 2022, 130, 107886. [Google Scholar] [CrossRef]
  4. Hu, B.-B.; Zhang, H.-T.; Wang, J. Multiple-Target Surrounding and Collision Avoidance With Second-Order Nonlinear Multiagent Systems. IEEE Trans. Ind. Electron. 2021, 68, 7454–7463. [Google Scholar] [CrossRef]
  5. Skjetne, R.; Fossen, T.I.; Kokotović, P.V. Adaptive maneuvering, with experiments, for a model ship in a marine control laboratory. Automatica 2005, 41, 289–298. [Google Scholar] [CrossRef]
  6. He, S.; Wang, M.; Dai, S.-L.; Luo, F. Leader–Follower Formation Control of USVs With Prescribed Performance and Collision Avoidance. IEEE Trans. Ind. Inform. 2019, 15, 572–581. [Google Scholar] [CrossRef]
  7. Li, J.; Fan, Y.; Liu, J. Distributed fixed-time formation tracking control for multiple underactuated USVs with lumped uncertainties and input saturation. ISA Trans. 2024, 154, 186–198. [Google Scholar] [CrossRef]
  8. Wang, L.; Zhu, D.; Pang, W.; Luo, C. A Novel Obstacle Avoidance Consensus Control for Multi-AUV Formation System. IEEE/CAA J. Autom. Sin. 2023, 10, 1304–1318. [Google Scholar] [CrossRef]
  9. Jin, X. Fault tolerant finite-time leader–follower formation control for autonomous surface vessels with LOS range and angle constraints. Automatica 2016, 68, 228–236. [Google Scholar] [CrossRef]
  10. Xiong, H.; Zhang, Y. Time-Varying Formation-Surrounding Control for Multiquadrotors Pursuit–Evasion Games With Disturbances and Collision Avoidance. IEEE Trans. Aerosp. Electron. Syst. 2025, 61, 522–541. [Google Scholar] [CrossRef]
  11. Xu, B.; Zhang, H.-T.; Ding, Y.; Ren, W. Event-Triggered Surrounding Formation Control of Multiagent Systems for Multiple Dynamic Targets. IEEE Trans. Control Netw. Syst. 2023, 10, 752–764. [Google Scholar] [CrossRef]
  12. Ding, Y.; Ren, W. Sampled-data containment control for double-integrator agents with dynamic leaders with nonzero inputs. Syst. Control Lett. 2020, 139, 104673. [Google Scholar] [CrossRef]
  13. Wang, N.; Gao, Y.; Zhao, H.; Ahn, C.K. Reinforcement Learning-Based Optimal Tracking Control of an Unknown Unmanned Surface Vehicle. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 3034–3045. [Google Scholar] [CrossRef] [PubMed]
  14. Zhang, C.; Zhang, G.; Dong, Q. Adaptive dynamic programming-based adaptive-gain sliding mode tracking control for fixed-wing unmanned aerial vehicle with disturbances. Int. J. Robust Nonlinear Control. 2023, 33, 1065–1097. [Google Scholar] [CrossRef]
  15. Bechlioulis, C.P.; Rovithakis, G.A. Robust Adaptive Control of Feedback Linearizable MIMO Nonlinear Systems With Prescribed Performance. IEEE Trans. Autom. Control 2008, 53, 2090–2099. [Google Scholar] [CrossRef]
  16. Wang, N.; Gao, Y.; Zhang, X. Data-Driven Performance-Prescribed Reinforcement Learning Control of an Unmanned Surface Vehicle. IEEE Trans. Neural Netw. Learn. Syst. 2021, 32, 5456–5467. [Google Scholar] [CrossRef]
  17. Hu, Q.; Shao, X.; Guo, L. Adaptive Fault-Tolerant Attitude Tracking Control of Spacecraft With Prescribed Performance. IEEE/ASME Trans. Mechatron. 2018, 23, 331–341. [Google Scholar] [CrossRef]
  18. Xiao, B.; Zhang, H.; Chen, Z.; Cao, L. Fixed-Time Fault-Tolerant Optimal Attitude Control of Spacecraft With Performance Constraint via Reinforcement Learning. IEEE Trans. Aerosp. Electron. Syst. 2023, 59, 7715–7724. [Google Scholar] [CrossRef]
  19. Gong, W.; Li, B.; Yang, Y.; Xiao, B.; Ran, D. Leader-following output-feedback consensus for second order multiagent systems with arbitrary convergence time and prescribed performance. ISA Trans. 2023, 141, 251–260. [Google Scholar] [CrossRef]
  20. Nie, J.; Zhang, X.; Wang, H.; Sheng, C.; Zhang, C.; Zhang, C. Anti-saturation distributed fixed-time prescribed performance sliding mode formation control based on FXESO for uncertain USVs. Ocean Eng. 2025, 318, 120101. [Google Scholar] [CrossRef]
  21. Liu, H.; Chen, Y.; Tian, X.; Mai, Q. Reinforcement learning control for USVs using prescribed performance sliding surfaces and an event-triggered strategy. Ocean Eng. 2024, 306, 118045. [Google Scholar] [CrossRef]
  22. Feng, K.; Li, K.; Li, Y. Finite-Time Formation Tracking Control for USVs Based on Dynamic Event-triggered Mechanism. In Proceedings of the 2023 IEEE International Conference on Unmanned Systems (ICUS), Hefei, China, 13–15 October 2023; pp. 1148–1153. [Google Scholar] [CrossRef]
  23. Ma, Y.; Che, W.; Deng, C. Event-triggered model-free adaptive control for nonlinear cyber-physical systems with false data injection attacks. Int. J. Robust Nonlinear Control 2022, 32, 2442–2452. [Google Scholar] [CrossRef]
  24. Huang, S.; Zhang, Y. Secrecy Rate Optimization for Multi-User Secure Communication Assisted by Intelligent Reflecting Surfaces (IRS) Under Imperfect CSI Conditions. Trans. Emerg. Telecommun. Technol. 2025, 36, 70117. [Google Scholar] [CrossRef]
  25. Zhan, W.; Miao, Z.; Chen, Y.; Wu, Z.-G.; Wang, Y. Event-Triggered Finite-Time Formation Control for Networked Nonholonomic Mobile Robots Under Denial-of-Service Attacks. IEEE Trans. Netw. Sci. Eng. 2023, 10, 354–368. [Google Scholar] [CrossRef]
  26. He, W.; Gao, X.; Zhong, W.; Qian, F. Secure impulsive synchronization control of multi-agent systems under deception attacks. Inf. Sci. 2018, 459, 354–368. [Google Scholar] [CrossRef]
  27. Mu, X.; Gu, Z.; Lu, Q. Memory-event-triggered consensus control for multi-UAV systems against deception attacks. ISA Trans. 2023, 139, 95–105. [Google Scholar] [CrossRef] [PubMed]
  28. He, Y.; Mendis, G.J.; Wei, J. Real-Time Detection of False Data Injection Attacks in Smart Grid: A Deep Learning-Based Intelligent Mechanism. IEEE Trans. Smart Grid 2017, 8, 2505–2516. [Google Scholar] [CrossRef]
  29. He, W.; Mo, Z.; Han, Q.-L.; Qian, F. Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks. IEEE/CAA J. Autom. Sin. 2020, 7, 1326–1334. [Google Scholar] [CrossRef]
  30. Tahoun, A.; Arafa, M. Cooperative control for cyber–physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. ISA Trans. 2021, 110, 1–14. [Google Scholar] [CrossRef]
  31. Amini, A.; Mohammadi, A.; Asif, A.; Hou, M.; Plataniotis, K.N. Fault-Tolerant Periodic Event-Triggered Consensus Under Communication Delay and Multiple Attacks. IEEE Syst. J. 2022, 16, 6338–6349. [Google Scholar] [CrossRef]
  32. Zuo, S.; Yue, D. Resilient Output Formation Containment of Heterogeneous Multigroup Systems Against Unbounded Attacks. IEEE Trans. Cybern. 2022, 52, 1902–1910. [Google Scholar] [CrossRef]
  33. Zuo, S.; Yue, D. Resilient Containment of Multigroup Systems Against Unknown Unbounded FDI Attacks. IEEE Trans. Ind. Electron. 2022, 69, 2864–2873. [Google Scholar] [CrossRef]
  34. Zhang, D.-W.; Liu, G.-P. Predictive sliding-mode control of networked high-order fully actuated systems under random deception attacks. Sci. China Inf. Sci. 2023, 66, 190204. [Google Scholar] [CrossRef]
  35. Zhang, D.-W.; Liu, G.-P. Predictive Sliding-Mode Control for Networked High-Order Fully Actuated Multiagents Under Random Deception Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 484–496. [Google Scholar] [CrossRef]
  36. Li, D.; Zhang, W.; He, W.; Li, C.; Ge, S.S. Two-Layer Distributed Formation-Containment Control of Multiple Euler–Lagrange Systems by Output Feedback. IEEE Trans. Cybern. 2019, 49, 675–687. [Google Scholar] [CrossRef] [PubMed]
  37. Chen, L.; Li, C.; Xiao, B.; Guo, Y. Formation-containment control of networked Euler–Lagrange systems: An event-triggered framework. ISA Trans. 2019, 86, 87–97. [Google Scholar] [CrossRef] [PubMed]
  38. Xiong, H.; Zhang, Y. Reinforcement learning-based formation-surrounding control for multiple quadrotor UAVs pursuit-evasion games. ISA Trans. 2024, 145, 205–224. [Google Scholar] [CrossRef]
  39. Zhang, H.; Huang, H.; Xiao, B.; Dong, K. Command-filtered incremental backstepping attitude control of spacecraft with predefined-time stability. Aerosp. Sci. Technol. 2024, 155, 109552. [Google Scholar] [CrossRef]
  40. Xue, S.; Luo, B.; Liu, D. Event-Triggered Adaptive Dynamic Programming for Zero-Sum Game of Partially Unknown Continuous-Time Nonlinear Systems. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 3189–3199. [Google Scholar] [CrossRef]
  41. Li, B.; Gong, W.; Xiao, B.; Yang, Y. Distributed prescribed-time leader-following formation control for second-order multi-agent systems with mismatched disturbances. Int. J. Robust Nonlinear Control 2023, 33, 9781–9803. [Google Scholar] [CrossRef]
  42. Xiong, H.; Zhang, Y. Dynamic Event-Triggering Formation-Surrounding Control for Multiagent Pursuit-Evasion Games under DoS Attacks. IEEE Internet Things J. 2025, 1–14. [Google Scholar] [CrossRef]
  43. Zhao, M.; Li, H. Distributed Model Predictive Contouring Control of Unmanned Surface Vessels. IEEE Trans. Ind. Electron. 2024, 71, 13012–13019. [Google Scholar] [CrossRef]
  44. Gao, Z.; Guo, G. Fixed-time sliding mode formation control of AUVs based on a disturbance observer. IEEE/CAA J. Autom. Sin. 2020, 7, 539–545. [Google Scholar] [CrossRef]
  45. Owais, M.; Moussa, G.S. Global sensitivity analysis for studying hot-mix asphalt dynamic modulus parameters. Constr. Build. Mater. 2024, 413, 134775. [Google Scholar] [CrossRef]
  46. Idriss, L.K.; Owais, M. Global sensitivity analysis for seismic performance of shear wall with high-strength steel bars and recycled aggregate concrete. Constr. Build. Mater. 2024, 411, 134498. [Google Scholar] [CrossRef]
Figure 1. The structure illustration of surrounding control for multi-USVs under FDI attacks.
Figure 1. The structure illustration of surrounding control for multi-USVs under FDI attacks.
Jmse 13 01588 g001
Figure 2. Construction and frame of the unmanned surface vehicle (USV).
Figure 2. Construction and frame of the unmanned surface vehicle (USV).
Jmse 13 01588 g002
Figure 3. Schematic diagram of surrounding control for multi-USVs.
Figure 3. Schematic diagram of surrounding control for multi-USVs.
Jmse 13 01588 g003
Figure 4. The communication topology of the multi-USVs.
Figure 4. The communication topology of the multi-USVs.
Jmse 13 01588 g004
Figure 5. Trajectories of multiple USVs with a time-varying surrounding configuration.
Figure 5. Trajectories of multiple USVs with a time-varying surrounding configuration.
Jmse 13 01588 g005
Figure 6. Comparison of state tracking error results under different controllers.
Figure 6. Comparison of state tracking error results under different controllers.
Jmse 13 01588 g006
Figure 7. Energy consumption results under different control strategies.
Figure 7. Energy consumption results under different control strategies.
Jmse 13 01588 g007
Figure 8. Time response of control input τ i achieved by PPCADP.
Figure 8. Time response of control input τ i achieved by PPCADP.
Jmse 13 01588 g008
Figure 9. Time response of NN weight W ^ i achieved by PPCADP.
Figure 9. Time response of NN weight W ^ i achieved by PPCADP.
Jmse 13 01588 g009
Figure 10. The time response results of random variable γ i .
Figure 10. The time response results of random variable γ i .
Jmse 13 01588 g010
Figure 11. Estimation error of the predefined-time FDI observer.
Figure 11. Estimation error of the predefined-time FDI observer.
Jmse 13 01588 g011
Figure 12. The event-triggered number used in DETC and ETC.
Figure 12. The event-triggered number used in DETC and ETC.
Jmse 13 01588 g012
Figure 13. The results of event-triggering condition and trigger threshold under the DETC.
Figure 13. The results of event-triggering condition and trigger threshold under the DETC.
Jmse 13 01588 g013
Figure 14. The collaborative surrounding process of multi-USVs under Simscape simulation.
Figure 14. The collaborative surrounding process of multi-USVs under Simscape simulation.
Jmse 13 01588 g014
Figure 15. State tracking errors achieved by PPCADP under Simscape simulation.
Figure 15. State tracking errors achieved by PPCADP under Simscape simulation.
Jmse 13 01588 g015
Table 1. Parameters of USVs.
Table 1. Parameters of USVs.
ParametersValuesParametersValues
m i 11 25.8 kg d i 11 0.7225 + 1.3274 u i + 5.8664 u i 2
m i 22 33.8 kg d i 22 0.8612 + 36.2823 v i + 0.805 r i
m i 23 1.0948 kg d i 23 0.1079 + 0.845 v i + 3.45 r i
m i 32 1.0948 kg d i 32 0.1052 5.0437 v i 0.13 r i
m i 33 2.76 kg d i 33 1.9 0.08 v i + 0.75 r i
c i 13 m i 22 v i m i 23 r i c i 23 m i 11 u i
Table 2. Parameters for simulation.
Table 2. Parameters for simulation.
ParametersValuesParametersValues
η 1 ( 0 ) [ 0 , 3 , 2 ] T a i 1
η 2 ( 0 ) [ 3 , 0 , 1.2 ] T p i 0.2
η 3 ( 0 ) [ 0 , 3 , 1.5 ] T k i 10
η 4 ( 0 ) [ 3 , 0 , 1.8 ] T T i 10 s
v 1 ( 0 ) [ 0 , 0 , 2 ] T Q i 15 I 6
v 2 ( 0 ) [ 0 , 0 , 1.2 ] T R i 8 I 3
v 3 ( 0 ) [ 0 , 0 , 1.5 ] T ς 1 1.1
v 4 ( 0 ) [ 0 , 0 , 1.8 ] T ς 2 1
W ^ 1 ( 0 ) [ 16 , 30 , 35 , 22 , 28 , 33 ] T ς 3 1.2
W ^ 2 ( 0 ) [ 20 , 28 , 32 , 22 , 28 , 33 ] T ς 4 1.5
W ^ 3 ( 0 ) [ 18 , 26 , 33 , 22 , 28 , 33 ] T ς 5 0.5
W ^ 4 ( 0 ) [ 17 , 31 , 32 , 22 , 27.5 , 33 ] T σ 0.01
l 4 1 β i 1.1
δ i ( 0 ) 1 ξ i 0.5
Table 3. Time-varying surrounding function.
Table 3. Time-varying surrounding function.
ParametersValues
h 10 ( t ) [ 3 cos ( 0.15 t + 2 π / 4 ) ,   3 sin ( 0.15 t + 2 π / 4 ) , 0 ] T
h 20 ( t ) [ 3 cos ( 0.15 t + 4 π / 4 ) ,   3 sin ( 0.15 t + 4 π / 4 ) , 0 ] T
h 30 ( t ) [ 3 cos ( 0.15 t + 6 π / 4 ) ,   3 sin ( 0.15 t + 6 π / 4 ) , 0 ] T
h 40 ( t ) [ 3 cos ( 0.15 t + 8 π / 4 ) ,   3 sin ( 0.15 t + 8 π / 4 ) , 0 ] T
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Wang, D.; Zhang, Y.; Hu, Q. Dynamic Event-Triggering Surrounding Control for Multi-USVs Under FDI Attacks via Adaptive Dynamic Programming. J. Mar. Sci. Eng. 2025, 13, 1588. https://doi.org/10.3390/jmse13081588

AMA Style

Wang D, Zhang Y, Hu Q. Dynamic Event-Triggering Surrounding Control for Multi-USVs Under FDI Attacks via Adaptive Dynamic Programming. Journal of Marine Science and Engineering. 2025; 13(8):1588. https://doi.org/10.3390/jmse13081588

Chicago/Turabian Style

Wang, Dongwei, Ying Zhang, and Qing Hu. 2025. "Dynamic Event-Triggering Surrounding Control for Multi-USVs Under FDI Attacks via Adaptive Dynamic Programming" Journal of Marine Science and Engineering 13, no. 8: 1588. https://doi.org/10.3390/jmse13081588

APA Style

Wang, D., Zhang, Y., & Hu, Q. (2025). Dynamic Event-Triggering Surrounding Control for Multi-USVs Under FDI Attacks via Adaptive Dynamic Programming. Journal of Marine Science and Engineering, 13(8), 1588. https://doi.org/10.3390/jmse13081588

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop