Next Article in Journal
A Robust Corroded Metal Fitting Detection Approach for UAV Intelligent Inspection with Knowledge-Distilled Lightweight YOLO Model
Previous Article in Journal
Heterogeneous PLC-Based Distributed Controller with Embedded Logic-Monitoring Blackbox for Real-Time Failover
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Stochastic Game-Based Anti-Jamming Control Method for Heavy-Haul Train Group Operation

1
The State Key Laboratory of Advanced Rail Autonomous Operation, Beijing Jiaotong University, Beijing 100044, China
2
The Shenzhen Institute of Advanced Technology, Chinese Academy of Sciences, Shenzhen 518055, China
3
The Institute of Intelligence Science and Engineering, Shenzhen Polytechnic University, Shenzhen 518055, China
4
SHANDONG SCICOM Information and Economy Research Institute Co., Ltd., Jinan 250101, China
*
Author to whom correspondence should be addressed.
Electronics 2025, 14(22), 4360; https://doi.org/10.3390/electronics14224360
Submission received: 22 September 2025 / Revised: 3 November 2025 / Accepted: 6 November 2025 / Published: 7 November 2025
(This article belongs to the Special Issue Advancements in Autonomous Driving and Smart Transportation Systems)

Abstract

With the growing global demand for mineral resources, enhancing the transport capacity of heavy-haul railways (HHR) has emerged as a key area of research. As an emerging train formation technology, the virtual coupling train system (VCTS) has the potential to substantially increase the traffic density of heavy-haul trains (HHT) and thereby improve transport efficiency. However, the stable operation of virtually coupled fleets relies on train-to-train (T2T) communication, which is vulnerable to jamming attacks (JAs) within the complex operational environments of HHR. To address issues such as train decoupling and emergency braking in the VCTS that may be caused by JAs, this study proposes a stochastic game-based anti-jamming control (SGAC) strategy aimed at ensuring the stability and operational safety of the VCTS operating within HHR. The proposed approach models both JAs and defensive actions as a stochastic game and employs an H -based cross-layer control method to mitigate their adverse effects. The control performance is analyzed through frequency-domain mapping, and a quantitative evaluation is conducted using the H norm. The simulation results demonstrate that the SGAC scheme significantly enhances the resilience of VCTS cooperative control under JAs, offering a robust solution for ensuring the stable operation of HHR.

1. Introduction

Heavy-haul trains (HHT) serve as the backbone of bulk cargo transportation, offering significant advantages in both scale and cost-effectiveness. They play a crucial role in maintaining stable resource distribution and promoting sustainable economic growth by ensuring the continuous operation of critical energy and mineral supply chains [1]. To meet the increasing global demand for these resources, enhancing the transport capacity and operational efficiency of heavy-haul railways (HHR) has become a major focus of innovation. As an advanced train control technology, the virtual coupling train system (VCTS) employs real-time train-to-train (T2T) communication and high-precision positioning to dynamically shorten inter-train spacing from the absolute braking distance to the relative braking distance. This capability substantially reduces train headways and enhancing overall line capacity [2], addressing the urgent need for higher efficiency in HHR.
However, implementing VCTS in HHR introduces unique challenges absent in conventional rail systems. The enormous mass and length of HHT make them highly sensitive to internal forces, where even minor communication delays or losses may trigger control actions leading to serious safety risks, such as in-train force instability or derailment. Moreover, heavy-haul railways often operate in remote, complex terrains with unreliable wireless channels, rendering the system vulnerable to both natural interference and intentional attacks. Given the high strategic and economic value of transported cargo, ensuring the security and resilience of VCTS operation in HHR is crucial. Consequently, the integrity and availability of T2T communication in VCTS are highly vulnerable to jamming attacks (JAs) and other external disturbances [3]. JAs, as one of the most prevalent forms of communication threats, directly compromise the stability of VCTS by causing transmission delays and degrading T2T communication quality [4], which can lead to unintentional decoupling or emergency braking events [5]. Therefore, mitigating the effects of JAs on the operation of virtually coupled fleets in HHR is of vital importance.
In response to these operational and safety challenges, a substantial body of research has explored cooperative control strategies for VCTS. Early studies use model-based control frameworks such as dynamic programming (DP) and model predictive control (MPC) [5,6] for trajectory optimization and predictive coordination. Subsequent work sought to enhance robustness by integrating adaptive and nonlinear control techniques, including sliding mode control and variable-structure control, to address model uncertainties and disturbances [7,8,9]. At the formation-control level, hybrid and distributed approaches have also been proposed, such as integrating generalized predictive control (GPC) with potential field methods or deploying distributed MPC (DMPC) for multi-train coordination [10,11]. Recently, a paradigm shift toward data-driven and learning-based control has emerged. Reinforcement learning (RL) and other model-free methods are increasingly applied to cope with nonlinear dynamics without requiring precise physical models [12,13,14,15]. Meanwhile, the broader control community has explored imitation learning for approximating stochastic models of systems with complex uncertainties [16].
In HHR, these control paradigms have been extended to address unique operational challenges. Research efforts have focused on cooperative speed tracking, trajectory smoothing, and train formation coordination [17,18,19]. Operational-level studies have also tackled problems such as headway-energy joint optimization, disruption-tolerant timetable rescheduling, and large-scale scheduling optimization [20,21,22]. Furthermore, recent work has emphasized distributed communication-based learning protocols to mitigate the effects of in-train forces and enhance cooperative stability [23,24,25].
From a methodological standpoint, robust control and game theory have independently proven effective in ensuring stability under uncertainty. On one hand, H control has been widely adopted in railway systems to guarantee bounded responses against stochastic faults and disturbances [26]. On the other hand, game-theoretic approaches have been used to capture strategic interactions in networked control systems, with cooperative frameworks such as potential games enabling optimal coordination among agents to achieve a system-wide objective [27].
Nevertheless, most existing VCTS studies implicitly assume an ideal and secure communication environment, overlooking the strategic and adversarial nature of cyber-physical threats. While some efforts have addressed communication resilience through event-triggered control (ETC) or resilient distributed methods for intermittent data transmission under attacks [28,29], these approaches are predominantly reactive. More recently, a proactive defense based on a stochastic game framework has also been proposed for jamming-resistant virtual coupled trains [30]. However, a critical research gap remains in applying such advanced defense mechanisms specifically to the unique operational context of HHR. The stringent stability requirements of HHR, magnified by their immense mass and the severe consequences of control failure, present unique challenges under communication uncertainty that are not fully addressed by general VCTS security frameworks. To bridge this gap, this paper proposes a stochastic game-based anti-jamming control (SGAC) strategy. The SGAC method explicitly couples the adversarial dynamics at the physical communication layer, modeled as a stochastic game, with the robust H control synthesis at the network layer. This cross-layer co-design offers a proactive defense mechanism capable of anticipating and mitigating worst-case jamming attacks, thereby ensuring the stability, safety, and resilience of virtually coupled heavy-haul train systems.
The main contributions of this paper are summarized as follows:
  • A novel cross-layer defense method is proposed, specifically tailored to the stringent stability requirements of VCTS in HHR. This method systematically couples the adversarial dynamics at the communication layer, modeled as a stochastic game, with the design of a robust H controller at the physical layer.
  • A zero-sum stochastic game is formulated to model the strategic conflict between the jammer and the VCTS. Solving for the saddle-point equilibrium of this game yields an optimal probabilistic defense strategy, enabling a paradigm shift from conventional reactive measures to proactive, anticipatory defense.
  • A Game-Theory-Based H controller is developed through a co-design process. The equilibrium outcomes of the stochastic game are systematically embedded into the linear matrix inequality (LMI) constraints of the controller synthesis, ensuring the controller is inherently robust against the worst-case attacks predicted by the game.
Together, these innovations establish a proactive, cross-layer defense mechanism that significantly enhances the resilience of virtual coupling train systems in heavy-haul railways. The remainder of this paper is organized as follows: Section 2 introduces the proposed SGAC methodology, including the stochastic game formulation and H -based control synthesis. Section 3 presents numerical simulations and comparative analysis, and Section 4 concludes the paper with future research directions.

2. The Stochastic Game-Based Anti-Jamming Control (SGAC) Strategy

To address the critical security vulnerabilities of VCTS in HHR, this paper proposes a SGAC strategy. The fundamental challenge motivating this work is illustrated in Figure 1. While VCTS enables efficient operation under ideal conditions, its reliance on T2T communication makes it susceptible to jamming attacks. As shown, JAs can degrade communication quality, leading to hazardous events such as emergency braking, which highlights the necessity for a robust defense mechanism.
The overall architecture of the proposed SGAC strategy is illustrated in Figure 2. The method adopts a cross-layer co-design that integrates game-theoretic decision-making at the physical layer with robust control synthesis at the network layer. This architecture enables a proactive defense paradigm that anticipates and mitigates adversarial actions, rather than reacting to them.
The methodological workflow of SGAC is presented in Figure 3, providing a detailed roadmap from problem formulation to final controller synthesis. At its core, SGAC formulates a zero-sum stochastic game between the attacker and defender, where jamming attacks are modeled as stochastic disturbances causing random packet losses. Solving for the saddle-point equilibrium yields the optimal probabilistic defense strategy, which is subsequently mapped to control actions through an H robust controller to ensure system stability and performance under worst-case attacks.
In summary, the SGAC method provides a unified methodology that translates strategic decisions into robust control actions, ensuring safe and efficient operation under contested communication environments. The following section details its mathematical formulation and algorithmic implementation.

2.1. Train Dynamics Model

The longitudinal dynamics of virtually coupled train fleets in heavy-haul transportation can be expressed as follows:
M k v k ˙ ( t ) = F k ( t ) B k r ( t ) R k b ( t ) R k l ( t )
where the subscript k denotes the k-th train in a virtually coupled fleet. M k and v k represent the mass and speed of the k-th train, respectively. F k is the traction or dynamic braking force generated by the locomotive, and B k r denotes the air braking force. R k b and R k l represent the basic resistance and line resistance, respectively. The variable t denotes the running time.
R k b = M k g 0 F k b r × 10 3
where g 0 is the standard acceleration due to gravity, and F k b r = c 0 + c 1 v k ( t ) + c 2 v k 2 ( t ) is an empirical resistance coefficient. The constants c 0 , c 1 , and c 2 are positive coefficients determined by the train type and external environment.
The line resistance represents the additional resistance caused by the railway line’s geometric and topographic features, including both gradient and curvature effects. It is defined as
R k l = M k g 0 G k r a + E m p C k u r × 10 3
where G k r a is the track gradient, C k u r is the track curvature radius, and E m p is an empirical coefficient reflecting the influence of curve sharpness and train length.

2.2. The Hybrid Control Model of Heavy-Haul Train-Based Virtual Coupling Train System

Let s k ( t ) and β ( t ) represent the dynamic characteristics of the k-th train and the state of T2T communication. The hybrid control model of VCTS can be expressed as
s k ˙ ( t ) : = g ( t , s k , u k , f k d i s t ; β ( t , J a s , D e f ) ) , s k ( t 0 ) = s k , 0
u k ( t ) : = ϑ k ( t , s k ( t ) ; β ( t ) ) , t [ t 0 , t i )
f k d i s t ( t ) : = ϱ k ( t , s k ( t ) ; β ( t ) ) , t [ t 0 , t i )
where s k represent the state of the k-th train, u k denote the control input, f k d i s t is the disturbance and s k , 0 represent the state of the k-th train at the initial time t 0 . The time-varing state value β depends on the defense action D e f and the attack action J a s . ϑ represents the cross-layer control strategy. Besides, attacks are defined as A k , while defense strategies are defined as D k .

2.3. The Stochastic Game Method in SGAC

The proposed SGAC algorithm transforms the robust control problem into a minimax optimization by employing a zero-sum game framework. Within the VCTS, the stochastic game in SGAC represents the interactive decision-making process between two agents: the jammer (attacker) and the train control system (defender). The jammer seeks to maximize communication degradation by inducing packet loss and delay, whereas the defender aims to minimize performance deterioration via adaptive control. Each player’s strategy affects communication quality, thereby influencing the accuracy and timeliness of control information exchange. Thus, the stochastic game method quantitatively describes how cyber-level conflicts translate into variations in the control performance of the VCTS.
To obtain the optimal closed-loop controller ϑ U k , the attacker–defender interaction is formulated as a minimax stochastic game, in which the performance cost L quantifies the influence of closed-loop disturbances and serves as a guaranteed upper bound on system degradation.
sup ϱ k P k L ( ϑ , ϱ ) = inf ϑ k U k sup ϱ k P k L ( ϑ , ϱ )
The cost function is composed of two main components:
J k ( t , s , u , f k d i s t ; β ) = J 0 , k ( t , s , u , f k d i s t ; β ) η ˜ w k ( f k d i s t , β )
where J 0 , k denotes the nominal system performance, and the second term models the degradation caused by jamming, reflecting the trade-off between control effort and robustness.
By treating the stochastic game outcome as an uncertainty source in system dynamics, the optimal attenuation level η min can be determined, yielding the corresponding H controller ϑ that guarantees robustness against worst-case jammer-induced disturbances, as constrained by
sup f k d i s t N E β { q i ( s ( t i ) ; β ( t i ) ) + t 0 t i J 0 ( t , s k ( t ) , u k ( t ) , f k d i s t ( t ) ; β ( t ) ) d t } E β { f k d i s t 2 + q 0 ( s 0 ; β ( t 0 ) ) }
where · denotes the L 2 -norm.
When the game reaches its saddle-point equilibrium, the optimal strategies ( ϑ g , ϱ g ) define an upper-bound value function, obtained from the following partial differential equation:
V t i ( t , s k ) = sup f d i s t R { V s k i ( t , s k ) g ( t , s k , ϑ g ( t , s k ; i ) , ϱ g ( t , s k ; i ) ; i ) + J ( t , s k , ϑ g ( t , s k ; i ) , ϱ g ( t , s k ; i ) ; i ) + j = 1 X λ i j V t , s k j }
where λ i j denotes the state transition probability of the system.
As both players act simultaneously and independently, neither knows the other’s decision in advance, and each action affects both the instantaneous cost and state transition probability of the VCTS. To quantify this effect, a cost function J ( t , s k , ϑ g , ϱ g ) is defined, mapping the current system state and player strategies to the corresponding instantaneous performance loss. To evaluate the long-term impact of repeated attacker–defender interactions, a discounted payoff metric is introduced to quantify the expected cumulative performance degradation of the VCTS over time, given an initial communication state β and the strategy pair ( g , h ) . The specific calculation is formulated as follows:
υ θ ( i , g , h ) : = 0 e θ t n E g ( t n ) , h ( t n ) J k ( D e f i , J a s j ; ϑ g , ϱ g ) d t n ,
where θ denotes the discounting factor, and E g ( t n ) , h ( t n ) represents the expectation operator.
Before deriving the optimal defensive control law, the existence of an equilibrium under the given stochastic dynamics must be ensured, as formalized in the following theorem.
Theorem 1.
Consider a game defined for each state k X . If the following conditions hold:
1. 
the state transition rates λ i j ( t n ) are continuous with respect to the mixed strategy pair ( g i , h j ) ;
2. 
the cost function J ( t , s k , u k , f k d i s t ; i ) is bounded.
  • then, for each state k X , there exists at least one static strategy pair ( g , h ) D X × A X that satisfies the following equilibrium condition:
    θ υ θ ( i ) = J ^ i ( g , h ) + j X λ i j ( g , h ) v θ ( j ) = sup g D X inf h A X { J ^ i ( g , h ) + j X λ i j ( g , h ) v θ ( j ) } : = T θ ( i ) = inf h A X sup g D X { J ^ i ( g , h ) + j X λ i j ( g , h ) v θ ( j ) } : = U θ ( i )
    where J i ^ ( g , h ) is the abbreviation for E g ( t n ) , h ( t n ) . Additionally, T θ ( i ) and U θ ( i ) denote the lower and upper bounds of the mixed-strategy game, respectively. The pair ( g , h ) constitutes a saddle-point equilibrium algorithm, with a unique game value v θ ( i ) satisfying T θ ( i ) = U θ ( i ) .
Given the existence of equilibrium, the saddle-point is rigorously defined to characterize the relationship between both players’ optimal strategies. This definition serves as the foundation for deriving the optimal defensive algorithm through a cross-layer design approach.
Definition 1
(Saddle-Point Equilibrium). A pair of strategies ( g , h ) constitutes a saddle-point equilibrium for a zero-sum stochastic game if the following inequalities hold for any other strategy pair ( g , h ) , and for all initial states i:
J ^ i ( g , h ) J ^ i ( g , h ) J ^ i ( g , h )
where J ^ i represents the cumulative discounted return. The unique value υ θ = J ^ i ( g , h ) is called the Value of the Game.
The equilibrium strategies can be computed via a value iteration algorithm, which reformulates the stochastic game as a dynamic programming problem and updates the expected cost recursively until convergence according to the Bellman equation:
υ θ d + 1 ( β ) = val { Δ ( β ) } , [ Δ ( β ) ] i j = J ( β , g , X J a s ) + θ β B P ( β | β , g , X J a s ) v θ d ( β )
where the val operator computes the value of the matrix game Δ ( β ) , which is constructed at each step from the immediate cost J ( · ) and the expected future costs.
Once the value iteration process has converged, the saddle-point equilibrium strategies ( g , h ) constitute the optimal policies satisfying the following condition:
{ g ( β ) , h ( β ) } arg val { Δ ( β ) }
The SGAC algorithm integrates game-theoretic equilibrium strategies with an H controller to ensure robustness against worst-case JAs. This establishes a cross-layer link from communication-layer defense to physical-layer control, ensuring safe headway and coordinated motion under varying jamming conditions. The next section details the final solution process of the SGAC algorithm.

2.4. The H -Based Cross-Layer Controller in SGAC Strategy

The SGAC algorithm is a robust closed-loop state-feedback controller formulated within the H framework to ensure the operational stability of virtual coupling fleets in HHR, even under worst-case conditions. Within the VCTS architecture, the controller continuously regulates traction and braking commands according to real-time communication states, which may be disrupted by jamming attacks manifested as random packet losses.
To formalize this process, the relationship between the ideal controller output and the received measurement at time t n is expressed as
p k ( t n ) = W ¯ s k ( t n ) p k , e ( t n ) = ( 1 ζ β ) p k ( t n ) + ζ β p k ( t n 1 )
At time t n , the controller cannot directly access the ideal output p k ( t n ) due to potential communication disruptions and instead relies on the received measurement p k , e ( t n ) transmitted through an unreliable channel. This formulation explicitly captures the information mismatch caused by packet loss, distinguishing the intended control signal from the actually received measurement.
The state of the T2T communication link is denoted by β X c o m , where the discrete state space is defined as X c o m : = β 1 , β 2 , , β x . Packet loss events are modeled as a state-dependent random variable ζ β . Under the influence of JAs, the random variable ζ β follows a Bernoulli distribution:
ζ ¯ β : = P { ζ β = 1 } = E { ζ } , P { ζ β = 0 } = 1 E { ζ } = 1 ζ ¯ β .
where ζ β = 0 signifies a successful data transmission, allowing the controller to use the current information, p k , e ( t n ) = p k ( t n ) . Conversely, ζ β = 1 indicates that a packet has been lost, requiring the controller to utilize the information from the previous time step, p k , e ( t n ) = p k ( t n 1 ) .
The dynamics of the SGAC observer and state-feedback controller under stochastic packet losses are described by the following state-space equations, which serve as the basis for subsequent H stability and performance analysis:
s ^ ( t n + 1 ) = G ¯ s ^ ( t n ) + K ¯ ( 1 θ β ) u v o ( t n ) + O β g a i n W ¯ ( s ( t n ) s ^ ( t n ) ) u ( t n ) = C β g a i n s ^ ( t n ) u v o ( t n ) = ( 1 θ β ) u v o ( t n )
where s ^ k ( t n ) is the estimated state of train k at time t n , u v o ( t n ) denotes the control signal received by the vehicle onboard controller, and C β g a i n , O β g a i n R are the control and the observation gains, respectively.
The quality of service (QoS) of the T2T communication link is quantified using two random variables, ζ β and θ β , whose distributions are dynamically governed by the strategic interaction between JAs and the system’s defense mechanisms. Given the communication state β and the players’ strategies ( g β , h β ) , the expectations of these QoS indicators are calculated as follows:
ζ ¯ β : = D 1 ( β , g β , h β ) = g β T D ( β ) h β
θ ¯ β : = Z 1 ( β , g β , h β ) = g β T Z ( β ) h β
The preceding equations establish a mathematical linkage between the attacker–defender game strategies and the resulting QoS performance, providing a bridge through which the SGAC algorithm dynamically adjusts each train’s control input according to the real-time communication state. Based on this connection, the next section derives the H performance metrics for the VCTS hybrid system, explicitly accounting for these game-dependent variables.

2.5. The SGAC Model Solution

The central principle of the proposed cross-layer design is the establishment of a direct link that translates the strategic outcomes of the stochastic game into robust control actions. This linkage is achieved by explicitly mapping the expected results of the game-theoretic strategies ( g β , h β ) to the system’s overall H performance index ϵ β for each network state β .
For zero initial conditions, the performance objective is achieved if ϵ β satisfies the following inequality for all possible states β B :
E ( g β , h β ) { t n = 0 { z k ( t n ) 2 } < ϵ β 2 t n = 0 { f k d i s t ( t n ) 2 } } ,
A smaller value of ϵ β signifies better disturbance rejection performance.
Although this inequality defines the control objective, it cannot be directly solved and must therefore be reformulated into a tractable form. To this end, the following section will convert this H control condition into a set of linear matrix inequalities.
Theorem 2.
For a given scalar ϵ β > 0 and any state β B , if there exist positive definite matrices Q 11 R j × j , Q 22 R i j × i j , Q 2 R i × i , X 1 R i × i and X 2 R i × i , and real matrices M β R j × q , N β R j × i , such that the LMI Ψ ˜ β < 0 is feasible, then a hybrid algorithm pair ( g β , h β ) exists that guarantees the following properties:
1. 
The VCTS hybrid system is exponentially mean-square stable.
2. 
The prescribed H -norm constraint ϵ β is satisfied for all nonzero disturbances f k d i s t .
The LMI feasibility condition is given by inequality:
Ψ ˜ β = Ψ ˜ 11 β Ψ ˜ 21 β Ψ ˜ 22 β < 0 ,
where the entries of the matrix Ψ ˜ β are given as follows:
Q 1 : = T 1 T Q 11 T 2 + T 1 T Q 22 T 2 ,
T 1 T 2 K 2 V = Γ ˜ 0 , Γ ˜ = diag { γ ˜ 1 , γ ˜ 2 , , γ ˜ j } ,
Ψ ˜ 11 β = Q 1 Q 2 0 X 1 X 2 0 0 Q 2 0 0 0 X 2 0 0 0 0 ϵ ˜ β 2 I , Ψ ˜ 22 β = Q 1 0 X 1 0 0 Q 1 0 0 0 X 1 0 0 0 0 I , Ψ ˜ 21 β = Ψ ˜ 21 β ( 1 , 1 ) Ψ ˜ 21 β ( 1 , 2 ) Ψ ˜ 21 β ( 2 , 1 ) Ψ ˜ 21 β ( 2 , 2 ) ,
Ψ ˜ 21 β ( 1 , 1 ) = Q 1 β G ¯ + ( 1 θ ¯ β ) K ¯ N β ( 1 θ ¯ β ) K ¯ N β 0 X 1 β G ¯ ( 1 ζ ¯ β ) M β J ( β ) , Ψ ˜ 21 β ( 1 , 2 ) = θ ¯ K ¯ N β θ ¯ β K ¯ N β Q 1 β W ¯ 0 ζ ¯ β M β J ( θ ) X 1 β W ¯ , Ψ ˜ 21 β ( 2 , 1 ) = μ ˜ 1 β K ¯ N β μ ˜ 1 β K ¯ N β μ ˜ 2 β M β J ( β ) 0 H 0 , Ψ ˜ 21 β ( 2 , 2 ) = μ ˜ 1 β K ¯ N β μ ˜ 1 β K ¯ N β 0 μ ˜ 2 β M β J ( β ) 0 0 0 0 0 ,
μ ˜ 1 β = [ ( 1 θ ¯ β ) θ ¯ β ] 1 / 2 , μ ˜ 2 β = [ ( 1 ζ ¯ β ) ζ ¯ β ] 1 / 2 .
Furthermore, if the LMI condition is satisfied, the controller gain C g a i n β and observer gain O g a i n β can be derived as follows:
C β g a i n = V Γ 1 Q 11 Γ V T N β , O β g a i n = X 1 M β ,
Building on the feasibility conditions of the previous theorem, Formulas (18) and (19) are reformulated into a convex optimization problem in Theorem 2, which determines the minimum achievable H performance index ϵ ˜ β and offers quantitative performance guarantees for the controller design:
ϵ ˜ β = min Q 11 β > 0 , Q 22 β > 0 , Q 2 β > 0 , X 1 β > 0 , X 2 β > 0 , N β , M β ϵ β
s . t . s u b j e c t e d t o ( 16 ) .
where ϵ β denotes the optimal value obtained from the optimization, corresponding to the game value in the underlying zero-sum stochastic method. To formalize this relationship, we define the system’s performance payoff matrix, J ( β ) R j × i , where each element J m n ( β ) represents the physical layer H performance under D e f i , J a s j . Consequently, the Value of the Game, ϵ β , is the expected outcome of this payoff matrix when both players adopt their saddle-point equilibrium strategies ( g β , h β ) . The value ϵ ˜ β results from the following mapping:
ϵ ˜ β = g β T J ( β ) h β
Based on the theoretical analysis and objective control function, the stochastic game defense algorithm employs a coupled co-design to address the H index and the H optimal controller. The solution to the LMI problem presented in Theorem 2 simultaneously provides both the optimal game strategies ( g β , h β ) and the corresponding optimal controller gains. These strategies then determine the expected Qos of the communication link, ensuring that the design satisfies the conditions ζ ¯ β = g β T D ( β ) h β and θ ¯ β = g β T Z ( β ) h β . The proof of Theorem 2 can be found in the Appendix A.
The primary control objective for the VCTS system is to maintain a predefined target spacing between consecutive trains. Strict adherence to this spacing is crucial for ensuring platoon stability and guaranteeing both operational efficiency and safety. However, this critical task is compromised by JAs that disrupt the T2T communication necessary for cooperative control.
To address this challenge, this paper has developed the SGAC algorithm, an integrated defense strategy that combines stochastic game theory with robust H control. By jointly optimizing the communication defense strategies and physical control parameters, the SGAC method enables the VCTS to dynamically adjust its feedback control inputs in response to real-time network states, thereby preserving stability and coordination under severe jamming attacks.

3. Numerical and Simulation Results

In this section, a series of simulations are conducted to validate the effectiveness and robustness of the proposed SGAC algorithm. The simulations are implemented in MATLAB R2021a, using the YALMIP toolbox [Available online: https://yalmip.github.io/; accessed on 20 October 2024]; to formulate the convex optimization problem and the SDPT3 solver [Available online: https://www.math.nus.edu.sg/~mattohkc/sdpt3.html; accessed on 20 October 2024].
The simulation is based on a virtual platoon scenario consisting of four heavy-haul trains. The predefined target spacing between consecutive trains in the VCTS is set to 600 m. Each train is configured to include one HXD1 locomotive and fifty C80 carriages, resulting in a total train length of 635 m. The emergency braking deceleration is set to −0.6 m/s2.
The primary objective of these experiments is to evaluate the performance of the SGAC strategy under varying probabilities and durations of JAs. To highlight its superiority, the robustness of the proposed SGAC algorithm is compared against two classical control methods: DP and MPC.
The state-space matrices for the train dynamics model are defined as follows: G ¯ = [ 1 , 1 , 0.5 ; 0 , 1 , 1 ; 0 , 0 , 1 ] , K ¯ = [ 1 ; 1 ; 1 ] ; H ¯ = [ 1 ; 1 ; 1 ] , Other system parameters are set to R = 6 and ε = 0.05 . The state transition matrix for the Signal-to-Interference-plus-Noise Ratio (SINR), which is used for the payoff matrices D ( β ) and Z ( β ) , is given by
D ( β ) = Z ( β ) = 0.8374 0.1626 0 0 0.0217 0.7901 0.1779 0 0 0.6035 0.3930 0.0246 0 0 0.4375 0.5625 .
Before running the dynamic simulations, the LMI optimization problem presented in Theorem 2 is solved to synthesize the required controller and derive the game-theoretic solution. The results of this offline computation are as follows: the Saddle-point equilibrium strategies are g β = [ 0.774 0.135 0.023 0.067 ] T and h β = [ 0.226 0.423 0.157 0.194 ] T . The optimized minimum value of H is ϵ ˜ β = 0.7354 . The controller gain is C β g a i n = [ 0.01026 0.1330 0.1281 ] and the observer gain is O β g a i n = [ 0.0056 0.0056 0.0045 ] T . These synthesized gains and strategies are then used to implement the SGAC controller in the following simulation tests.
The operational performance of the proposed SGAC strategy was comprehensively evaluated against baseline methods under jamming attacks using quantitative criteria. To facilitate this rigorous assessment, the root mean square error (RMSE) metric is employed. The RMSE quantifies the average magnitude of deviation between the actual and reference values over the simulation horizon, providing a clear measure of tracking performance and stability. A lower RMSE value indicates superior performance. The RMSE is calculated as follows:
RMSE v = 1 T ( N 1 ) n = 1 T k = 2 N v k ( t n ) v k 1 ( t n ) 2 ,
RMSE s = 1 T ( N 1 ) n = 1 T k = 2 N x k ( t n ) x k 1 ( t n ) d des L 2 ,
where v k ( t n ) and x k ( t n ) are the speed and position of train k at time t n , d des is the desired inter-train headway, and L denotes the physical length of train.
Figure 4 illustrates the trajectory results under a targeted jamming attack, while Table 1 summarizes the corresponding quantitative RMSE metrics. In the simulated scenario, a communication loss occurs in the second train. As clearly shown in Figure 4b,c, both the traditional DP and MPC algorithms interpret this data loss as a critical fault, forcing all subsequent trains into emergency braking. This behavior results in catastrophic degradation, reflected in their extremely high headway RMSE values exceeding 3700 m (Table 1). The ETC strategy, depicted in Figure 4d, demonstrates significantly better resilience compared to DP and MPC, managing to avoid complete failure but still exhibiting noticeable deviations, resulting in a headway RMSE of 2.1031 m. In stark contrast, the proposed SGAC method, shown in Figure 4e, maintains exceptional stability. By leveraging its integrated game-theoretic model and robust H controller, the SGAC algorithm effectively anticipates and compensates for the disruption, achieving a near-ideal headway RMSE of only 0.1315 m, significantly outperforming all baseline methods.
The robustness of the SGAC strategy against varying attack intensities was further assessed, as shown in Figure 5 and quantified in Table 2. The lower plot in each subfigure of Figure 5 visualizes the corresponding random distribution of jamming events. Despite the visually evident increase in attack frequency and randomness, the operational trajectories demonstrate that platoon stability is well preserved across all scenarios. This qualitative observation is strongly corroborated by the quantitative data in Table 2, where the headway RMSE remains negligible even as the jamming probability increases to a high of 90 % , rising only from 0.1272 m to 0.2782 m. These results confirm the high resilience of the SGAC strategy against frequent and intermittent attacks.
The capability of the SGAC system to withstand sustained communication disruptions is illustrated in Figure 6, with quantitative results listed in Table 2. When the communication failure is transient (lasting 1–5 cycles), the operational dynamics remain largely unaffected, as the state observer and predictive game strategy effectively compensate for short-term data loss. As the failure duration increases to 10 cycles, uncertainty in the state estimation grows, resulting in more conservative speed regulation. Nevertheless, the headway RMSE increases only to 3.9468 m, demonstrating the system’s graceful degradation property. Unlike the abrupt performance collapse observed in the baseline methods, the SGAC method degrades smoothly and predictably as the attack severity intensifies, validating its effectiveness as a proactive and robust game-theoretic defense mechanism for secure train operations.

4. Conclusions and Future Works

This paper proposes an SGAC strategy to ensure stable and efficient train convoy operations in VCTS under uncertain JAs. The SGAC strategy integrates H control optimization with a stochastic game method, balancing the interactions between the attacker and defender through a saddle–point equilibrium. Simulation studies compare convoy dynamics with and without the SGAC strategy under stochastic JAs. The results demonstrate that the SGAC strategy effectively mitigates T2T communication failures caused by JAs with probabilities ranging from 50 % to 90 % and single-attack durations of 1–5 communication cycles, thereby maintaining stable convoy dynamics. Additionally, the SGAC strategy ensures operational safety under single jamming attacks lasting from 1 to 10 communication cycles. Although the simulation results indicate the effectiveness of the SGAC strategy, its performance has yet to be confirmed in real-world experiments or using actual railway data, which will be addressed in future studies. Future research work will primarily focus on three aspects: First, extending the algorithm to more diverse railway operational scenarios. Second, further enhancing its anti-jamming performance based on the existing method, such as machine learning. Third, validating the algorithm using real-world railway data or experimental tests to ensure its practical effectiveness and reliability.

Author Contributions

Conceptualization, L.R. and S.M.; Methodology, L.R. and S.M.; Software, L.R.; Validation, L.R.; Resources, M.J.; writing—original draft preparation, L.R.; writing—review and editing, L.R. and S.M.; Supervision, H.W., T.G., Y.L., X.Q. and M.J. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Key Research and Development Program of China under Grant 2021YFB3901300, in part by the National Natural Science Foundation of China under Grant Number U2368204 and 62503039, in part by the Postdoctoral Fellowship Program of CPSF under Grant Number GZC20251129, in part by the China Postdoctoral Science Foundation under Grant Number 2024M760196.

Data Availability Statement

Dataset available on request from the authors. The raw data supporting the conclusions of this article will be made available by the authors on request.

Acknowledgments

The authors would like to thank all reviewers for their constructive comments on the manuscript.

Conflicts of Interest

Author Mingxi Ji was employed by the company SHANDONG SCICOM Information and Economy Research Institute Co., Ltd. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
HHRHeavy-haul Railways
VCTSVirtual Coupling Train System
HHTHeavy-haul Trains
T2TTrain-to-train
JAsJamming Attacks
SGACStochastic Game-based Anti-jamming Control
DPDynamic Programming
MPCModel Predictive Control
GPCGeneralized Predictive Control
DMPCDistributed Model Predictive Control
RLReinforcement Learning
ETC     Event-triggered Control
LMILinear Matrix Inequality
QoSQuality of Service

Appendix A

This paper defines the Lyapunov function as follows:
V ( t n ) = s k T ( t n ) Q 1 s k ( t n ) + s k T ( t n 1 ) Q 2 s k ( t n 1 ) + e k T ( t n ) X 1 e k ( t n ) + e k T ( t n 1 ) X 2 e k ( t n 1 )
where Q 1 , Q 2 , X 1 and X 2 are positive definite matrices.
The controller’s estimation error is defined as:
e k ( t n ) : = s k ( t n ) s ^ k ( t n ) .
The discrete-time dynamics of the state vector s ( t n + 1 ) are described by the following discrete-time equation:
s k ( t n + 1 ) = G ¯ s k ( t n ) + K ¯ u k , v o ( t n ) + f k d i s t ( t n ) = [ G ¯ + ( 1 θ ¯ β ) K ¯ C β g a i n ] s k ( t n ) ( 1 θ ¯ β ) K ¯ C β g a i n e k ( t n ) + θ ¯ β K ¯ C β g a i n s k ( t n 1 ) θ ¯ β C β g a i n e k ( t n 1 ) + f k d i s t ( t n ) + ( θ β θ ¯ β ) K ¯ C β g a i n s k ( t n 1 ) ( θ β θ ¯ β ) K ¯ C β g a i n e k ( t n 1 ) ( θ β θ ¯ β ) K ¯ C β g a i n s k ( t n ) + ( θ β θ ¯ β ) K ¯ C β g a i n e k ( t n )
Based on Formulae (11)–(13), can be expressed as
e k ( t n + 1 ) = G ¯ s k ( t n ) + K ¯ u v o ( t n ) + f k d i s t ( t n ) G ¯ s ^ k ( t n ) K ¯ ( 1 θ β ) u v o ( t n ) + O β g a i n [ p v o ( t n ) p ^ v o ( t n ) ]
Equation (A4) can be reformulated as
χ k ( t n + 1 ) = ( A 1 ¯ + A ¯ 2 + K ˜ 1 ) χ k ( t n ) ,
where
χ k ( t n ) = s k ( t n ) e k ( t n ) s k ( t n 1 ) e k ( t n 1 ) T ,
A 1 ¯ = G ¯ + ( 1 θ ¯ β ) K ¯ C β g a i n ( 1 θ ¯ β ) K ¯ C β g a i n 0 G ¯ ( 1 ζ ¯ β ) O β g a i n J ( β ) I 0 0 I θ ¯ β K ¯ C β g a i n θ ¯ β K ¯ C β g a i n 0 ζ ¯ β O β g a i n J ( β ) 0 0 0 0 ,
A 2 ¯ = ( θ ¯ β θ β ) K ¯ C β g a i n ( θ β θ ¯ β ) K ¯ C β g a i n ( ζ β ζ ¯ β ) O β g a i n J ( β ) 0 0 0 0 0 ( θ β θ ¯ β ) K ¯ C β g a i n ( θ ¯ β θ β ) K ¯ C β g a i n ( ζ β ζ ¯ β ) O β g a i n J ( β ) 0 0 0 0 0 ,
K ˜ 1 = I I 0 0 T .
Additionally, there exists
E ( ζ β ζ ¯ β ) 2 = ζ ¯ β ( 1 ζ ¯ β ) , E ( θ β θ ¯ β ) 2 = θ ¯ β ( 1 θ ¯ β ) .
The derivation of the Lyapunov function (A1) is presented as follows:
E V ( t n + 1 ) | s ( t n ) , , s ( t 0 ) , e ( t n ) , , e ( t 0 ) V ( t n ) = E { s k T ( t n + 1 ) Q 1 s k ( t n + 1 ) + s k T ( t n ) Q 2 s k ( t n ) + e k T ( t n + 1 ) X 1 e k ( t n + 1 ) + e k T ( t n ) X 2 e k ( t n ) } s k T ( t n ) Q 1 s k ( t n ) s k T ( t n 1 ) Q 2 s k ( t n 1 ) e k T ( t n ) X 1 e k ( t n ) e k T ( t n 1 ) X 2 e k ( t n 1 )
= { [ G ¯ + ( 1 θ ¯ β ) K ¯ C β g a i n ] s k ( t n ) ( 1 θ ¯ β ) K ¯ C β g a i n e k ( t n ) + θ ¯ β K ¯ C β g a i n s k ( t n 1 ) θ ¯ β K ¯ C β g a i n e k ( t n 1 ) } T Q 1 { [ G ¯ + ( 1 θ ¯ β )
K ¯ C β g a i n ] s k ( t n ) ( 1 θ ¯ β ) K ¯ C β g a i n e k ( t n ) + θ ¯ β K ¯ C β g a i n s k ( t n 1 ) θ ¯ β K ¯ C β g a i n e k ( t n 1 ) } + θ ¯ β ( 1 θ ¯ β ) { K ¯ C β g a i n s ( t n ) K ¯ C β g a i n
e k ( t n ) K ¯ C β g a i n s k ( t n 1 ) + K ¯ C β g a i n e k ( t n 1 ) } T Q 1 { K ¯ C β g a i n s ( t n ) K ¯ C β g a i n e k ( t n ) K ¯ C β g a i n s k ( t n 1 ) + K ¯ C β g a i n e k ( t n 1 ) } + ζ ¯ β ( 1 ζ ¯ β ) [ O β g a i n J ( β ) s k ( t n ) O β g a i n J ( β ) s k ( t n 1 ) ] T X 1 [ O β g a i n
J ( β ) s k ( t n ) O β g a i n J ( β ) s k ( t n 1 ) ] + s k ( t n ) T Q 2 s k ( t n ) + e k T ( t n ) X 2 e k ( t n ) s k T ( t n ) Q 1 s k ( t n ) e k T ( t n ) X 1 e k ( t n ) s k T ( t n 1 ) Q 2 s k ( t n 1 ) e k T ( t n 1 ) X 2 e k ( t n 1 ) = χ k T ( t n ) Ψ χ k ( t n )
where
Ψ = G ¯ + ( 1 θ ¯ β ) K ¯ C β g a i n ( 1 θ ¯ β ) K ¯ C β g a i n 0 G ¯ ( 1 ζ ¯ β ) O β g a i n J ( β ) K ¯ C β g a i n K ¯ C β g a i n O β g a i n J ( β ) 0 θ ¯ β K ¯ C β g a i n θ ¯ β K ¯ C β g a i n 0 ζ ¯ β O β g a i n J ( β ) K ¯ C β g a i n K ¯ C β g a i n O β g a i n J ( β ) 0 T
Q 1 0 0 0 0 X 1 0 0 0 0 ζ β ( 1 ζ ¯ β ) Q 2 0 0 0 0 ζ β ( 1 ζ ¯ β ) Q 2 ,
G ¯ + ( 1 θ ¯ β ) K ¯ C β g a i n ( 1 θ ¯ β ) K ¯ C β g a i n 0 G ¯ ( 1 ζ ¯ β ) O β g a i n J ( β ) K ¯ C β g a i n K ¯ C β g a i n O β g a i n J ( β ) 0 θ ¯ β K ¯ C β g a i n θ ¯ β K ¯ C β g a i n 0 ζ ¯ β O β g a i n J ( β ) K ¯ C β g a i n K ¯ C β g a i n O β g a i n J ( β ) 0
+ Q 2 Q 1 0 0 0 0 X 2 X 1 0 0 0 0 Q 2 0 0 0 0 X 2
According to Schur complement theory, Ψ <0 can be derived from Formula (A7). The formula can be obtained as follows:
E V ( t n + 1 ) | s ( t n ) , , s ( t 0 ) , e ( t n ) , , e ( t 0 ) V ( t n ) λ ¯ m i n ( Ψ ) χ k T ( t n ) χ k ( t n ) μ ¯ χ k T ( t n ) χ k ( t n )
where
0 < μ ¯ < min λ ¯ m i n ( Ψ ) , Φ Φ : = max λ ¯ m a x ( Q 1 ) , λ ¯ m a x ( X 1 ) , λ ¯ m a x ( Q 2 ) , λ ¯ m a x ( X 2 ) ,
λ ¯ m a x ( ) and λ ¯ m i n ( ) represent the maximum and minimum eigenvalues of a matrix, respectively.
Thus, the result of formula can be expressed as follows:
E V ( t n + 1 ) | s ( t n ) , , s ( t 0 ) , e ( t n ) , , e ( t 0 ) V ( t n ) μ ¯ χ k T ( t n ) χ k ( t n ) < μ ¯ Φ V ( t n ) : = ψ V ( t n )
Based on the above, the exponential mean-square stability of the SGAC algorithm is successfully proven.
According to Formula (A1), the following can be derived.
E { V ( t n + 1 ) } E { V ( t n ) } + E { z k T ( t n ) z k ( t n ) } ϵ β 2 E { f k d i s t T ( t n ) f k d i s t ( t n ) }
= E { χ k ( t n ) f k d i s t ( t n ) T Ψ + D 1 ˜ T D 1 ˜ K ˜ 3 T Q 1 + K ˜ 4 T X 1 K ˜ 3 T Q 1 + K ˜ 4 T X 1 ( Q 1 + S 1 ) ϵ β 2 I χ k ( t n ) f k d i s t ( t n ) }
where
K ˜ 3 = G ¯ + ( 1 θ ¯ β ) K ¯ C β g a i n 0 0 ( 1 θ ¯ β ) K ¯ C β g a i n K ¯ C β g a i n K ¯ C β g a i n T K ˜ 4 = 0 G ¯ + ( 1 ζ ¯ β ) β J ( β ) 0 ζ ¯ β O β g a i n J ( β ) T
By applying the Schur complement to Formula (17), the following equivalent condition is obtained:
Ψ + D 1 ˜ T D 1 ˜ K ˜ 3 T Q 1 + K ˜ 4 T X 1 K ˜ 3 T Q 1 + K ˜ 4 T X 1 ( Q 1 + X 1 ) ϵ β 2 I < 0 .
Therefore, the inequality can be formulated as follows.
E { V ( t n + 1 ) } E { V ( t n ) } + E { z k T ( t n ) z k ( t n ) } ϵ β 2 E f k d i s t T ( t n ) f k d i s t ( t n ) < 0 .
Equation (A11) yields
t n = 0 E { z k T ( t n ) z k ( t n ) } < ϵ β 2 E { f k d i s t ( t n ) 2 } + E { V ( t 0 ) } E { V ( ) }
Giventhe zero initial condition, χ i T ( 0 ) = 0 , and the exponential mean-square stability of the system, Equation (A12) simplifies to
t n = 0 E z k ( t n ) 2 < ϵ β 2 E { f k d i s t ( t n ) 2 }
Based on the preceding analysis, the proof of Theorem 2 is complete.

References

  1. Wang, X.; Su, S.; Cao, Y.; Qin, L.; Liu, W. Robust Cruise Control for the Heavy Haul Train Subject to Disturbance and Actuator Saturation. IEEE Trans. Intell. Transp. Syst. 2023, 24, 8003–8013. [Google Scholar] [CrossRef]
  2. Felez, J.; Vaquero-Serrano, M.A. Virtual Coupling in Railways: A Comprehensive Review. Machines 2023, 11, 521. [Google Scholar] [CrossRef]
  3. Parise, R.; Dittus, H.; Winter, J.; Lehner, A. Reasoning Functional Requirements for Virtually Coupled Train Sets: Communication. IEEE Commun. Mag. 2019, 57, 12–17. [Google Scholar] [CrossRef]
  4. Quaglietta, E.; Wang, M.; Goverde, R.M.P. A Multi-State Train-Following Model for the Analysis of Virtual Coupling Railway Operations. J. Rail Transp. Plan. Manag. 2020, 15, 100195. [Google Scholar] [CrossRef]
  5. Felez, J.; Kim, Y.; Borrelli, F. A Model Predictive Control Approach for Virtual Coupling in Railways. IEEE Trans. Intell. Transp. Syst. 2019, 20, 2728–2739. [Google Scholar] [CrossRef]
  6. Felez, J.; Vaquero-Serrano, M.A.; de Dios Sanz, J. A Robust Model Predictive Control for Virtual Coupling in Train Sets. Actuators 2022, 11, 372. [Google Scholar] [CrossRef]
  7. Wang, D.; Cao, Y.; Su, S. Adaptive Cruise Control of Virtual Coupled High-Speed Trains. In Proceedings of the 2021 China Automation Congress (CAC), Beijing, China, 22–24 October 2021; pp. 6496–6501. [Google Scholar] [CrossRef]
  8. Zhang, Q.; Wang, H.; Zhang, Y.; Chai, M. An adaptive safety control approach for virtual coupling system with model parametric uncertainties. Transp. Res. Part C Emerg. Technol. 2023, 154, 104235. [Google Scholar] [CrossRef]
  9. Wang, X.; Hu, M.; Wang, H.; Dong, H.; Ying, Z. Formation Control for Virtual Coupling Trains with Parametric Uncertainty and Unknown Disturbances. IEEE Trans. Circuits Syst. II Express Briefs 2023, 70, 3429–3433. [Google Scholar] [CrossRef]
  10. Cao, Y.; Yang, Y.; Ma, L.; Wen, J. Research on Virtual Coupled Train Control Method Based on GPC & VAPF. Chin. J. Electron. 2022, 31, 897–905. [Google Scholar] [CrossRef]
  11. Liu, Y.; Liu, R.; Wei, C.; Xun, J.; Tang, T. Distributed Model Predictive Control Strategy for Constrained High-Speed Virtually Coupled Train Set. IEEE Trans. Veh. Technol. 2022, 71, 171–183. [Google Scholar] [CrossRef]
  12. Lang, Y.; Liu, H.; Luo, X.; Lin, B. DQN-based Speed Curve Optimization for Virtual Coupling. In Proceedings of the 2022 IEEE 25th International Conference on Intelligent Transportation Systems (ITSC), Macau, China, 8–12 October 2022; pp. 1758–1763. [Google Scholar] [CrossRef]
  13. Chen, B.; Zhang, L.; Cheng, G.; Liu, Y.; Chen, J. A Novel Approach for Train Tracking in Virtual Coupling Based on Soft Actor-Critic. Actuators 2023, 12, 447. [Google Scholar] [CrossRef]
  14. Basile, G.; Lui, D.G.; Petrillo, A.; Santini, S. Deep Deterministic Policy Gradient Virtual Coupling control for the coordination and manoeuvring of heterogeneous uncertain nonlinear High-Speed Trains. Eng. Appl. Artif. Intell. 2024, 133, 108120. [Google Scholar] [CrossRef]
  15. Luo, X.; Wang, D.; Tang, T.; Liu, H. A data-driven MPC approach for virtually coupled train set with non-analytic safety distance. Transp. Res. Part C Emerg. Technol. 2025, 174, 105087. [Google Scholar] [CrossRef]
  16. Pozzi, A.; Incremona, A.; Toti, D. Imitation learning-driven approximation of stochastic control models. Appl. Intell. 2025, 55, 838. [Google Scholar] [CrossRef]
  17. Yu, X.; Li, W.; Li, S.; Yang, Y.; Peng, J. Cooperative Reference Velocity Regulation Control for Virtual Coupling Systems of Heavy-Haul Trains. Sustainability 2023, 15, 13425. [Google Scholar] [CrossRef]
  18. Pang, Y.; Liu, X.; Liu, Z. Research on Speed Collaborative Control Method for Heavy Haul Trains Based on Virtual Coupling Technology. In Proceedings of the 2023 3rd International Conference on Electrical Engineering and Mechatronics Technology (ICEEMT), Nanjing, China, 21–23 July 2023; pp. 496–501. [Google Scholar] [CrossRef]
  19. Wu, Q.; Ge, X.; Zhu, S.; Cole, C.; Spiryagin, M. A Time Headway Control Scheme for Virtually Coupled Heavy Haul Freight Trains. J. Dyn. Syst. Meas. Control 2024, 146, 041008. [Google Scholar] [CrossRef]
  20. Zhang, K.; Gao, J.; Xu, Z.; Yang, H.; Jiang, M.; Liu, R. Headway compression oriented trajectory optimization for virtual coupling of heavy-haul trains. Control Eng. Pract. 2024, 143, 105784. [Google Scholar] [CrossRef]
  21. Ma, X.; Zhou, M.; Wang, H.; Song, W.; Dong, H. Virtual-Coupling-Based Timetable Rescheduling for Heavy-Haul Railways Under Disruptions. IEEE Trans. Comput. Soc. Syst. 2024, 11, 7045–7054. [Google Scholar] [CrossRef]
  22. Wu, L.; Ye, H.; Xiong, Z.; Dong, W. An Integrated Optimization Method for Heavy Haul Trains with Virtual Coupling Based on Genetic Algorithm. IFAC-PapersOnLine 2025, 59, 606–611. [Google Scholar] [CrossRef]
  23. Hou, Z.; You, K. Hybrid Model Predictive Control for Virtual Coupling of Heavy-haul Trains. In Proceedings of the 2024 American Control Conference (ACC), Toronto, ON, Canada, 10–12 July 2024; pp. 2273–2278. [Google Scholar] [CrossRef]
  24. Chen, L.; Yang, H.; Jin, F.; Ren, Y. Distributed Global Composite Learning Cooperative Control of Virtually Coupled Heavy Haul Train Formations. IEEE Trans. Intell. Transp. Syst. 2024, in press.
  25. Wang, C.; Zhan, J.; Zhang, L. Distributed Model Predictive Control for Virtually Coupled Heavy-Haul Trains. In Proceedings of the 2025 37th Chinese Control and Decision Conference (CCDC), Xiamen, China, 16–19 May 2025; pp. 4563–4568. [Google Scholar] [CrossRef]
  26. Ding, K.; Zhu, Q.; Yang, X. Intermittent Estimator-Based Mixed Passive and H∞ Control for High-Speed Train With Actuator Stochastic Fault. IEEE Trans. Cybern. 2022, 52, 11624–11638. [Google Scholar] [CrossRef]
  27. Liu, T.; Wang, J.; Zhang, X.; Cheng, D. Game Theoretic Control of Multiagent Systems. SIAM J. Control Optim. 2019, 57, 1691–1709. [Google Scholar] [CrossRef]
  28. Ma, S.; Bu, B.; Wang, H. A Virtual Coupling Approach Based on Event-triggering Control for CBTC Systems under Jamming Attacks. In Proceedings of the 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), Victoria, BC, Canada, 18 November–16 December 2020; pp. 1–6. [Google Scholar] [CrossRef]
  29. Ge, X.; Wu, Q.; Han, Q.-L.; Zhang, X.-M. Resilient Virtual Coupling Control of Automatic Train Convoys With Intermittent Communications. IEEE Trans. Veh. Technol. 2024, 73, 6183–6195. [Google Scholar] [CrossRef]
  30. Ma, S.; Qi, X.; Lou, Z.; Wang, H.; Zhu, L.; Gong, T.; Li, Y.; Dong, H. Stochastic game-based cross-layer defense scheme for jamming-resistant virtual coupled train sets. Transp. Res. Part C Emerg. Technol. 2025, 174, 105028. [Google Scholar] [CrossRef]
Figure 1. Schematic comparison of train operation under different control modes and communication conditions.
Figure 1. Schematic comparison of train operation under different control modes and communication conditions.
Electronics 14 04360 g001
Figure 2. Stochastic Game-based Anti-jamming Control (SGAC) Algorithm Framework.
Figure 2. Stochastic Game-based Anti-jamming Control (SGAC) Algorithm Framework.
Electronics 14 04360 g002
Figure 3. Flowchart of the SGAC Algorithm.
Figure 3. Flowchart of the SGAC Algorithm.
Electronics 14 04360 g003
Figure 4. Virtual Coupling Train System (VCTS) Trajectory Comparison Under Different Algorithms. (a) Operation trajectory of the VCTS under ideal conditions. (b) Operation trajectory of the VCTS using the dynamic programming algorithm under jamming attacks. (c) Operation trajectory of the VCTS using the model predictive control algorithm under jamming attacks. (d) Operation trajectory of the VCTS using the event-triggered control algorithm under jamming attacks. (e) Operation trajectory of the VCTS using the SGAC algorithm under jamming attacks.
Figure 4. Virtual Coupling Train System (VCTS) Trajectory Comparison Under Different Algorithms. (a) Operation trajectory of the VCTS under ideal conditions. (b) Operation trajectory of the VCTS using the dynamic programming algorithm under jamming attacks. (c) Operation trajectory of the VCTS using the model predictive control algorithm under jamming attacks. (d) Operation trajectory of the VCTS using the event-triggered control algorithm under jamming attacks. (e) Operation trajectory of the VCTS using the SGAC algorithm under jamming attacks.
Electronics 14 04360 g004
Figure 5. VCTS trajectories and corresponding jamming event distributions under different attack probabilities. (a) 50% jamming initiation probability. (b) 70% jamming initiation probability. (c) 90% jamming initiation probability.
Figure 5. VCTS trajectories and corresponding jamming event distributions under different attack probabilities. (a) 50% jamming initiation probability. (b) 70% jamming initiation probability. (c) 90% jamming initiation probability.
Electronics 14 04360 g005aElectronics 14 04360 g005b
Figure 6. VCTS Trajectory Comparison Under Different Interference Durations. (a) Operation trajectory of the VCTS under a single jamming attack lasting for one communication cycle. (b) Operation trajectory of the VCTS under a single jamming attack lasting for two communication cycles. (c) Operation trajectory of the VCTS under a single jamming attack lasting for five communication cycles. (d) Operation trajectory of the VCTS under a single jamming attack lasting for ten communication cycles.
Figure 6. VCTS Trajectory Comparison Under Different Interference Durations. (a) Operation trajectory of the VCTS under a single jamming attack lasting for one communication cycle. (b) Operation trajectory of the VCTS under a single jamming attack lasting for two communication cycles. (c) Operation trajectory of the VCTS under a single jamming attack lasting for five communication cycles. (d) Operation trajectory of the VCTS under a single jamming attack lasting for ten communication cycles.
Electronics 14 04360 g006
Table 1. Root Mean Square Error (RMSE) Performance Comparison of Different Control Strategies.
Table 1. Root Mean Square Error (RMSE) Performance Comparison of Different Control Strategies.
Control StrategySpeed RMSE (m/s)Headway RMSE (m)
Ideal Condition (No Attack)0.00000.0000
Proposed SGAC0.00010.1315
Event-triggered Control [28]0.05202.1031
Model Predictive Control [5]4.95044191.5384
Dynamic Programming [6]5.30163742.0636
Table 2. RMSE Performance of the Proposed SGAC Strategy under Varying Attack Conditions.
Table 2. RMSE Performance of the Proposed SGAC Strategy under Varying Attack Conditions.
Attack ConditionSpeed RMSE (m/s)Headway RMSE (m)
Varying Attack Duration
    1 Communication Cycle0.00010.1315
    2 Communication Cycles0.00450.2208
    5 Communication Cycles0.02002.9379
    10 Communication Cycles0.08733.9468
Varying Attack Initiation Probability
    50% Probability0.00020.1272
    70% Probability0.00030.1595
    90% Probability0.00050.2782
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Rong, L.; Ma, S.; Wang, H.; Gong, T.; Li, Y.; Qi, X.; Ji, M. Stochastic Game-Based Anti-Jamming Control Method for Heavy-Haul Train Group Operation. Electronics 2025, 14, 4360. https://doi.org/10.3390/electronics14224360

AMA Style

Rong L, Ma S, Wang H, Gong T, Li Y, Qi X, Ji M. Stochastic Game-Based Anti-Jamming Control Method for Heavy-Haul Train Group Operation. Electronics. 2025; 14(22):4360. https://doi.org/10.3390/electronics14224360

Chicago/Turabian Style

Rong, Lin, Shuomei Ma, Hongwei Wang, Taiyuan Gong, Yang Li, Xiaozhi Qi, and Mingxi Ji. 2025. "Stochastic Game-Based Anti-Jamming Control Method for Heavy-Haul Train Group Operation" Electronics 14, no. 22: 4360. https://doi.org/10.3390/electronics14224360

APA Style

Rong, L., Ma, S., Wang, H., Gong, T., Li, Y., Qi, X., & Ji, M. (2025). Stochastic Game-Based Anti-Jamming Control Method for Heavy-Haul Train Group Operation. Electronics, 14(22), 4360. https://doi.org/10.3390/electronics14224360

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop