Next Article in Journal
Spectral Galerkin Methods for Riesz Space-Fractional Convection–Diffusion Equations
Previous Article in Journal
Predicting the Deformation of a Slope Using a Random Coefficient Panel Data Model
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Securing Bipartite Nonlinear Fractional-Order Multi-Agent Systems against False Data Injection Attacks (FDIAs) Considering Hostile Environment

by
Hanen Louati
1,
Saadia Rehman
2,
Farhat Imtiaz
2,
Nafisa A. AlBasheir
3,
Afrah Y. Al-Rezami
4,
Mohammed M. A. Almazah
5 and
Azmat Ullah Khan Niazi
2,*
1
Department of Mathematics, Faculty of Science, Northern Border University, Arar 73213, Saudi Arabia
2
Department of Mathematics and Statistics, The University of Lahore, Sargodha 40100, Pakistan
3
Department of Mathematics, College of Sciences and Arts (Magardah), King Khalid University, Magardah 61937, Saudi Arabia
4
Mathematics Department, College of Humanities and Science in Al Aflaj, Prince Sattam Bin Abdulaziz University, Al-Kharj 11912, Saudi Arabia
5
Department of Mathematics, College of Sciences and Arts (Muhyil), King Khalid University, Muhyil 61421, Saudi Arabia
*
Author to whom correspondence should be addressed.
Fractal Fract. 2024, 8(7), 430; https://doi.org/10.3390/fractalfract8070430
Submission received: 7 June 2024 / Revised: 13 July 2024 / Accepted: 15 July 2024 / Published: 22 July 2024
(This article belongs to the Topic Computational Complex Networks)

Abstract

:
This study investigated the stability of bipartite nonlinear fractional-order multi-agent systems (FOMASs) in the presence of false data injection attacks (FDIAs) in a hostile environment. To tackle this problem we used signed graph theory, the Razumikhin methodology, and the Lyapunov function method. The main focus of our proposed work is to provide a method of stability for FOMASs against FDIAs. The technique of Razumikhin improves the Lyapunov-based stability analysis by supporting the handling of the intricacies of fractional-order dynamics. Moreover, utilizing signed graph theory, we analyzed both hostile and cooperative interactions between agents within the MASs. We determined the system stability requirements to ensure robustness against erroneous data injections through comprehensive theoretical investigation. We present numerical examples to illustrate the robustness and efficiency of our proposed technique.

1. Introduction

Networked system cooperation has been greatly improved through the fast developments of network and communication technologies [1,2]. In the field of multi-agent systems, cooperative control has received significant interest in areas such as automation [3], Mathematics [4], and Computer science [5]. This kind of technology has been utilized extensively in the military and the civilian sector for a range of operations, including designing smart power grid systems [6], controlling unmanned spacecraft [7], adjusting satellite placements [8], and guiding mobile robot formations [9]. In a multi-agent system, containment control having more than one leader is a specific field of interest. The use of this approach has gained greater attention in recent years. The primary object is to establish a control protocol to ensure that followers eventually converge to a desired region defined by the convex hull created by the leaders [10,11]. The research mentioned above explored traditional communication networks that encompass cooperative interactions. These networks are represented by directed graphs with non-negative adjacency weight matrices. However, practical situations, such as social networks [12], trust networks [13], natural predator–prey dynamics [14], games [15], and biological systems [16], commonly involve relationships that can be either cooperative or hostile. These interactions can be represented by signed digraphs, where positive weights show cooperative or trust relationships, and negative weights indicate hostile relationships between connected agents. The existence of hostile interactions leads to more complex actions in signed digraphs in contrast to conventional non-negative directed graphs [17]. Additionally, without a secure network and preservation, the system becomes susceptible to potential infiltration by adversaries who may interrupt communication channels. This could result in compromised control performance, such as a slow convergence rate, significant convergence error, and instability [18]. Additionally, the adversary’s capabilities are typically limited. Deception attacks [19] and DoS attacks [20] are two main categories of attacks on multi-agent dynamical systems based on their impact. Deception attacks involve manipulating transmitted information, while DoS attacks result in the loss or delay of transmitted information. Dibaji et al. highlighted that deception attacks, particularly false data injection (FDI) attacks [21], cause the most severe damage in such systems. Therefore, it is crucial to study deception attacks, especially FDI attacks, in multi-agent dynamical systems to safeguard against the manipulation of transmitted information [22]. In this overview, we provide a summary of the current research on coordinating the control of fractional-order multi-agent systems. Within the domain of continuous-time systems, several protocols have been suggested to address coordination issues in fractional-order multi-agent systems [23]. For example, in reference [24], researchers explored consensus mechanisms in the context of fractional-order multi-agent systems dealing with communication delays using frequency domain theory. Moreover, in [25], the academic community introduced conditions based on Linear Matrix Inequalities (LMIs) to facilitate containment control strategies designed for uncertain linear multi-agent systems. In a similar vein, [26] utilized a sliding-mode control approach to tackle the complex task of distributed consensus tracking within fractional-order multi-agent systems. These efforts collectively shed light on the ongoing work aimed at improving the understanding and implementation of effective coordination control mechanisms for fractional-order multi-agent systems within continuous-time frameworks. We examine several critical studies addressing the security of multi-agent systems in cyber-physical environments. Notably, the research on multi-agent systems for detecting false data injection attacks against the power grid provides essential methodologies for identifying and mitigating such threats [27]. Additionally, the observer-based event-triggered secure synchronization control for multi-agent systems under false data injection attacks offers valuable insights into maintaining secure synchronization in the presence of data corruption [28]. Furthermore, the cooperative control for cyber-physical multi-agent networked control systems with unknown false data injection and replay cyber-attacks highlights strategies for managing and securing networked control systems against sophisticated cyber-attacks [29]. These foundational studies form the basis of our approach, informing our strategies for enhancing the security and resilience of multi-agent systems. Motivated by the above study, we will address hostile-based nonlinear bipartite containment control fractional-order multi-agent systems under false data injection attacks (FDIAs). We will discuss both fixed and switching signed directed networks under FDIAs. Furthermore, we will check the stability of the system in the presence of false data injection attacks, and for this purpose, we use the Lyapunov function, Razumikhin methods, and signed graph theory. Our special contributions are listed below:
  • In contrast to [28], our work contributes to the field by integrating delayed controllers to enhance the resilience and effectiveness of multi-agent systems against false data injection attacks.
  • The use of false data injection in the dynamics of followers improves the detection and mitigation of such attacks in multi-agent systems, which were not considered in the previous study [17].
  • Utilizing fractional-order multi-agent systems can enhance the robustness and accuracy of detecting and mitigating false data injection attacks as compared to [29].
The rest of this paper is as follows:
  • Section 2: Provide background knowledge about multi-agent systems of fractional order, covering foundational concepts and initial details.
  • Section 3: Present the formulation of the main result.
  • Section 4: Present the stability analysis of the proposed multi-agent system.
  • Section 5: Present practical examples to illustrate the effectiveness of our work.
  • Section 6: Present the conclusion of the overall study.

2. Background Knowledge

This section presents the background knowledge about the study:

2.1. Signed Graph Theory

Consider a weighted signed digraph G = { V , E } , where V = { v 1 , v 2 , , v M } and E V × V are the vertices and edge set, respectively. The adjacency matrix J = [ j u v ] M × M is defined such that j u v 0 if ( v u , v v ) E , and j u v = 0 otherwise. In this matrix, j u v > 0 and j u v < 0 represent cooperative and hostile relationships between nodes, respectively.
The Laplacian matrix of the graph G , denoted by L = [ u v ] M × M , is defined as follows:
  • u v = j u v if u v
  • u v = v = 1 , v u M | j u v | if u = v
A signed graph G is said to be structurally balanced if the set of nodes V can be partitioned into two disjoint subsets, V 1 and V 2 , such that
  • j u v 0 for any v u , v v V 1 or v u , v v V 2
  • j u v 0 for any v u V 1 and v v V 2

2.2. Necessary Lemmas and Definitions

Several essential definitions and lemmas are addressed in this section.
Definition 1 
([30]). The Caputo derivative of order α for the function h ( k ) of order s, which is continuous and also differentiable, is defined as
D α h ( k ) = 1 Γ ( s α ) s 0 s h s ( u ) ( s u ) α s + 1 d u 0 s 1 < α s , s Z +
Lemma 1 
([31]). A function h ( k ) belonging to the set of absolutely continuous functions in R n adheres to the following:
D α ( h T ( k ) h ( k ) ) 2 h T ( k ) D α h ( k ) , α ( 0 , 1 )
Lemma 2 
([32]). If U, V, and W are matrices, then the inequality
U V V T W < 0
is equivalent to inequalities U < 0 and W V T U 1 V < 0 .
Lemma 3 
([33]). The following inequality holds for positive scalar ξ and W 1 , W 2 R n :
2 W 1 T W 2 ξ W 1 T W 1 + 1 ξ W 2 T W 2
Consider the Banach space B = B ( [ r , 0 ] R n ) of functions that exhibit continuity for interval [ r , 0 ] . Also, consider a delayed system that is of a fractional order incorporating delays:
D α x ( k ) = G ( k , x t ) f o r 0 < α < 1
x k 0 = φ ( θ ) , w h e r e x t ( ϕ ) = x ( k + ϕ ) , ϕ , θ [ r , 0 ]
where G : ( R × bounded set of B ) ( bounded set of R n ) satisfies condition G ( k , 0 ) = 0 . This condition holds for each k k 0 , time delay r > 0 , and φ B .
Lemma 4. 
For a quadratic Lyapunov function V : R n R , there exist some η > 1 and a 1 , a 2 , a 3 > 0 such that the following inequality holds:
  • a 1 | | s ( k ) | | 2 V ( s ( k ) ) a 2 | | s ( k ) | | 2 and always
  • V ( s ( k + ϑ ) ) η V ( s ( k ) ) , ϑ [ r , 0 ]
  • D α z ( s ( k ) ) a 3 | | s ( k ) | | 2
Hence, the necessary solution of the system defined by (2) and (3) may be made stable.

3. Issue Identification

Consider a bipartite fractional-order multi-agent system (FOMAS) with the following definitions:
  • Follower: F agents labeled as F ¯ = { 1 , 2 , 3 , F } ;
  • Leaders: M F agents labeled as R ¯ = { F + 1 , F + 2 , M } .
The uth agent state z u ( k ) R n is governed by fractional differential equations that are defined as follows:
D α z u ( k ) = B z u ( k ) + g ( k , z u ( k ) ) + W r 0 z u ( k + ϑ ) d ϑ + ω u ( k r ) , u F ¯
D α z u ( k ) = B z u ( k ) + g ( k , z u ( k ) ) + W r 0 z u ( k + ϑ ) d ϑ , u R ¯
Here, ω u ( k ) represents the control input for agent u, and r and r are the delay in time and distributed delay, respectively. Matrices B and W belong to R n × n , and g with g ( k , 0 ) = 0 is the continuous odd function such that g : R × R n R n .
Definition 2 
([34]). The function η R n is called convex if for each x 1 , x 2 η , for 0 < ρ < 1 , the following condition holds:
( 1 ρ ) x 1 + ρ x 2 η
And the convex hull formed by x 1 , x 2 , x n R n . is defined as
c o { x 1 , x 2 , x n } = { u = 1 n η u x u | η u 0 , u = 1 n η u = 1 }
Definition 3. 
The bipartite containment control FOMAS defined by (4) and (5) will be obtained if some followers converge to c o { z u , u R ¯ } , and others converge to the negative of it.
For the main result, we need the following assumptions.
Assumption 1. 
For nonlinear function g, the following inequality holds:
g ( k , x ) u = 1 M F η u g ( k , x u ) b x u = 1 M F η u x u .
where x u R n b > 0, and η u is obtained from u = 1 M F η u = 1 .
Assumption 2. 
G is a structurally balanced signed directed graph.
Assumption 3. 
In G , each follower has a directed link with at least one leader.
All followers will be split into two subsets if Assumption 2 is true, with agents in subsets F ¯ 1 and F ¯ 2 interacting cooperatively while these subsets are in hostile connection with other subsets. Now, the FMAS implements bipartite containment control if, by Definition 3,
lim k z u ( k ) c o { z i ( k ) , i R ¯ } = 0 , u F ¯ 1 lim k z u ( k ) + c o { z i ( k ) , i R ¯ } = 0 u F ¯ 2 .

3.1. Attack Model

3.1.1. Identification of Compromised Agents

Firstly, we define a subset A that includes all the compromised agents. If an agent u is compromised, it belongs to subset A , denoted as u A F . To indicate which agents are compromised, we use an indicator vector ν A { 0 , 1 } n . The vector ν A is defined such that ν A = [ ν 1 A , ν 2 A , . . . , ν n A ] T . The element ν u A = 1 if and only if agent u is compromised, and ν u A = 0 if agent u is not compromised. This can be formally expressed as
ν u A = 1   i f   u A ν u A = 0   i f   u A

3.1.2. Characteristics of Vulnerable Agents

The specific characteristics that make agents vulnerable to attacks depend on various factors, including but not limited to the following:
  • Connectivity: Agents with high connectivity or central roles in the network might be more vulnerable because compromising them can have a larger impact on the overall system.
  • Lack of Security Measures: Agents that lack adequate security measures, such as encryption, authentication, or anomaly detection systems, are easier targets for attackers.
  • Resource Constraints: Agents with limited computational resources might not be able to run advanced security algorithms, making them more susceptible to attacks.
  • Behavioral Patterns: Agents with predictable or easily detectable patterns of behavior can be targeted more effectively by adversaries.

3.1.3. Attack Strategy Design

  • State Update Equation: For any selected subset A of compromised agents, agent u will update its state according to the following equation:
    D α z u ( k ) = B z u ( k ) + g ( k , z u ( k ) ) + W r 0 z u ( k + ϑ ) d ϑ + ω u ( k r ) + ω u a ( k ) , u F ¯
    where ω u a ( k ) represents the false data injected by an adversary.
  • False Data Injection: The false data ω u a ( k ) are designed as follows:
    ω u a ( k ) = ψ ( k ) , if u A , 0 , if u A .
    The term ψ ( k ) R m is the concrete attack strategy.
  • Attack Space Expansion: The dynamical interaction between agents with m-dimensional states greatly expands the attack space, allowing for more sophisticated and coordinated attack strategies.
We need the following assumptions regarding this type of attack.
Assumption 4. 
The adversary is capable of injecting false data undetected, and these false data are bounded.
Assumption 5. 
The attack is time-invariant.

3.2. Hostile Interactions in Signed Digraph

To better understand the practical implications of hostile interactions in signed digraphs, we consider a social network scenario where users exhibit both supportive and antagonistic relationships. This example illustrates the complexities and challenges introduced by such interactions.

3.2.1. Network Structure and Interaction Dynamics

In this social network, nodes represent users, and edges represent interactions. Positive edges (+) indicate support, while negative edges (−) indicate opposition. Consider the following network structure:
  • Node A supports Node B (+);
  • Node B opposes Node C (−);
  • Node C supports Node D (+);
  • Node D opposes Node A (−).

3.2.2. Dynamics of Hostile Interactions

  • Feedback Loops: The presence of a negative feedback loop (A → B → C → D → A) introduces instability. Such loops can lead to persistent conflicts, making it difficult for the network to reach a consensus.
  • Influence Propagation: If Node A is a key opinion leader, their opposition to Node B can trigger a cascade of antagonistic interactions, polarizing the network and hindering cooperative behavior.

3.2.3. Practical Implications

  • System Design: Understanding these hostile interactions helps in designing interventions to promote stability and cooperation, such as targeted conflict resolution strategies or enhanced moderation policies.
  • Policy Making: For policymakers, mitigating the effects of negative interactions is crucial in maintaining harmony and functionality in critical infrastructure networks.

4. Stability Analysis of Bipartite Containment Control under FDIA

In this section, we propose a stability analysis for both fixed and switching signed directed networks.

4.1. Fixed Signed Directed Networks

For attaining the bipartite containment control of the system defined by (4) and (5), first, we construct a controller that is under FDIAs:
ω u ( k r ) = K v = 1 M | j u v | ( s g n ( j u v ) ) z v ( k r ) z u ( k r ) + ω u a ( k ) , u F ¯
The gain constant K used in the above equation is taken to be positive, j u v J where J is an adjacency matrix that is defined as
J = J F × F ( 1 ) J F × ( M F ) ( 2 ) 0 ( M F ) × F 0 ( M F ) × ( M F )
Here, ω u = 0 u R ¯ . Now, in using (10), the Laplacian matrix is defined as
L = L F L R 0 ( M F ) × F 0 ( M F ) × ( M F )
In the above equation, L F and L R belong to R F × F and R F × ( M F ) , respectively. Suppose that Assumption 2 holds. Then, one can select
Δ = d i a g ( Δ 1 , Δ 2 , , Δ F , Δ F + 1 , , Δ M )
where
Δ u = 1 if u F ¯ 1 R ¯ Δ u = 1 if u F ¯ 2
From Equation (12), we have
L ¯ = L ¯ F L ¯ R 0 ( M F ) × F 0 ( M F ) × ( M F )
where L ¯ = Δ L Δ , and referring to [35], we have
L ¯ F = [ ¯ u v ] F × F = | j u v | , u v , u = 1 , 2 , 3 F v = 1 , v u M | j u v | , u = v , v = F + 1 , F + 2 , , M
and L ¯ R = [ ¯ u v ] F × ( M F ) with ¯ u v = | j u v | 0 .

4.1.1. Control Objective

The control object ensures that the states of followers remain within a region defined by the states of leaders despite the presence of compromised agents.

4.1.2. Detection and Mitigation of FDIA

Detection Mechanism:
  • Implement residual analysis to detect anomalies in the state trajectories of agents.
  • Employ statistical or machine learning-based methods to identify deviations indicative of FDIAs.

4.1.3. Control Design

  • Redundancy: Incorporate redundant measurements and control paths to cross-verify data and control actions.
  • Observer-Based Techniques: Design observers to estimate the true state of the system, reducing reliance on potentially compromised data.
  • Adaptive Control: Implement adaptive control strategies that can adjust control parameters in real time to mitigate the effects of detected attacks.
  • Fault-Tolerant Control: Develop control laws that are less sensitive to false data, ensuring system performance even when some agents are compromised.

4.1.4. Control Assumptions

  • The set of compromised agents A is known or can be estimated.
  • The system dynamics B, g ( k , z u ( k ) ) , and W are accurately known.
  • The attack method ψ ( k ) is either known or can be bounded.

4.1.5. Control Limitations

  • High computational complexity of detection and control algorithms.
  • Potential trade-offs between robustness and system performance.
  • Assumptions on the attack model may not cover all possible FDIA scenarios.
Lemma 5 
([34]). If Assumption 3 is satisfied, L ¯ F is an invertible matrix. Moreover, the matrix L ¯ F 1 L ¯ R is non-negative, and each of its rows sums to 1.
Theorem 1. 
Under Assumptions 1, 2, and 3, the bipartite containment control of the fractional-order multi-agent system defined by (4) and (5) using controller (9) will be achieved if there exist a scalar K > 0 and symmetric matrices A > 0 and X > 0 satisfying the following inequalities:
Ω 1 0 0 Ω 2 < 0
Ω 3 I F A W I F W T A γ I F I n < 0
where
  • Ω 1 = I F ( A B + B T A + A 2 + b 2 I n + γ I n + X K λ 1 A + 4 ν A A ψ ( k ) δ ) ;
  • Ω 2 = I F ( K A γ I n ) ;
  • Ω 3 = I F ( γ I n 1 r X ) , where γ > 0 for any scalar, and λ 1 = λ m a x [ L ¯ F L ¯ F T ] .
Proof. 
Consider the coordinate transformation h u ( . ) = Δ u z u ( . ) specified in (12) being valid for any u = 1 , 2 , , M . By applying the control protocol described in (9) to the system defined by Equations (4) and (5), we achieve the following result:
D α h u ( k ) = B h u ( k ) + g ( k , h u ( k ) ) + W r 0 h u ( k + ϑ ) d ϑ   + K Δ u v = 1 M | j u v | ( s g n ( j u v ) Δ v h v ( k r ) Δ u h u ( k r ) ) + 2 ω u a ( k ) u F ¯
D α h u ( k ) = B h u ( k ) + g ( k , h u ( k ) ) + W r 0 h u ( k + ϑ ) d ϑ u R ¯
Notice that
v = 1 M | j u v | s g n ( j u v ) h v ( k r ) h u ( k r ) = v = 1 , v u M | j u v | s g n ( j u v ) h v ( k r ) v = 1 , v u M | j u v | h u ( k r ) = v = 1 , v u M | j u v | h v ( k r ) v = 1 , v u M | j u v | h u ( k r ) = v = 1 , v u M u v h v ( k r ) u u h u ( k r ) = v = 1 M u v h v ( k r )
Using this in Equations (17) and (18), we obtain
D α h u ( k ) = B h u ( k ) + g ( k , h u ( k ) ) + W r 0 h u ( k + ϑ ) d ϑ   K v = 1 M Δ u u v Δ v h v ( k r ) + 2 ω u a ( k ) , u F ¯
D α h u ( k ) = B h u ( k ) + g ( k , h u ( k ) ) + W r 0 h u ( k + ϑ ) d ϑ , u R ¯
Let H F ( . ) = ( h 1 T ( . ) , h 2 T ( . ) , h F T ( . ) ) T , H R ( . ) = ( h F + 1 T ( . ) , h F + 2 T ( . ) , h M T ( . ) ) T ,
G ( k , h F ) = ( g T ( k , h 1 ) , g T ( k , h F ) ) T , and G ( k , h R ) = ( g T ( k , h F + 1 ) , , g T ( k , h M ) ) T from (19) and (20):
D α H F ( k ) = ( I F B ) H F ( k ) + G ( k , H F ( k ) ) K ( L ¯ F I n ) H F ( k r )   K ( L ¯ R I n ) H R ( k r ) + r 0 ( I F W ) H F ( k + ϑ ) d ϑ + 2 ν A ψ ( k )
D α H R ( k ) = ( I M F B ) H R ( k ) + G ( k , H R ( k ) ) + r 0 ( I M F W ) H R ( k + ϑ ) d ϑ
Consider the bipartite containment control error as β ( . ) = H F ( . ) ( L ¯ F 1 L ¯ R I n ) H R ( . ) . Then, the system defined by (21) and (22) becomes
D α β ( k ) = ( I F B ) H F ( k ) + ( L ¯ F 1 L ¯ R B ) H R ( k ) + G ( k , H F ( k ) ) + ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) )   ( K L ¯ F I n ) ( I F I n ) H F ( k r ) ( K L ¯ F I n ) ( L ¯ F 1 L ¯ R I n ) H R ( k r )   + r 0 ( I F W ) H F ( k + ϑ ) d ϑ + r 0 ( L ¯ F 1 L ¯ R W ) H R ( k + ϑ ) d ϑ + 2 ν A ψ ( k ) D α β ( k ) = ( I F B ) β ( k ) + G ( k , H F ( k ) ) + ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) )   ( K L ¯ F I n ) β ( k r ) + r 0 ( I F W ) β ( k + ϑ ) d ϑ + 2 ν A ψ ( k )
We formed the following Lyapunov function:
V ( β ( k ) ) = β T ( k ) ( I F A ) β ( k )
Now, in applying Lemmas 1 and 3 on Equation (23):
D α V ( β ( k ) ) = D α [ β T ( k ) ] ( I F A ) β ( k ) 2 β T ( k ) ( I F A ) [ D α β ( k ) ] = 2 β T ( k ) ( I F A ) [ ( I F B ) β ( k ) + G ( k , H F ( k ) ) + ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) ) ( K L ¯ F I n ) β ( k r ) + r 0 ( I F W ) β ( k + ϑ ) d ϑ + 2 ν A ψ ( k ) ] . = β T ( k ) [ I F ( A B + B T A ) ] β ( k ) + 2 β T ( k ) ( I F A ) [ G ( k , H F ( k ) ) + ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) ) ] 2 β T ( k ) ( K L ¯ F A ) β ( k r ) + 2 β T ( k ) ( I F A ) [ r 0 ( I F W ) β ( k + ϑ ) d ϑ ] + 4 β T ( k ) ν A A ψ ( k ) β T ( k ) [ I F ( A B + B T A ) ] β ( k ) 2 β T ( k ) ( K L ¯ F A ) β ( k r ) + β T ( k ) ( I F A T ) β ( k )   + [ G ( k , H F ( k ) ) + ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) ) ] T [ [ G ( k , H F ( k ) ) + ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) ) ] + 2 β T ( k ) ( I F A ) [ r 0 ( I F W ) β ( k + ϑ ) d ϑ ] + 4 β T ( k ) ν A A ψ ( k )
Suppose that L ¯ F 1 L ¯ R = [ ¯ p q ] F × ( M F ) , and from Assumption 1,
[ G ( k , H F ( k ) ) ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) ) ] T [ [ G ( k , H F ( k ) ) ( L ¯ F 1 L ¯ R I n ) G ( k , H R ( k ) ) ] = u = 1 F [ g ( k , h u ) v = 1 M F ¯ u v g ( k , h F + q ) ] T [ u = 1 F g ( k , h u ) v = 1 M F ¯ u v g ( k , h F + q ) ] u = 1 F b 2 [ h u v = 1 M F ¯ u v h F + q ] T [ u = 1 F h u v = 1 M F ¯ u v h F + q ] = b 2 [ H F ( k ) ( L ¯ F 1 L ¯ R I n ) H R ( k ) ] T [ H F ( k ) ( L ¯ F 1 L ¯ R I n ) H R ( k ) ] = b 2 β T ( k ) β ( k )
Consider
2 β T ( k ) ( K L ¯ F A ) β ( k r ) = K . 2 β T ( k ) ( L ¯ F A ) ( I F A 1 2 ) ( I F A 1 2 ) β ( k r )   K . β T ( k ) ( L ¯ F A ) ( I F A 1 2 ) ( I F A 1 2 ) ( L ¯ F T A ) β ( k )   + K . β T ( k r ) ( L ¯ F A ) ( I F A 1 2 ) ( I F A 1 2 ) β ( k r ) = β T ( k ) ( K L ¯ F L ¯ F T A ) β ( k ) + K . β T ( k r ) ( I F A ) β ( k r )
Using Equations (25) and (26) in Equation (24), we obtain
D α V ( β ( k ) ) β T ( k ) [ I F ( A B + B T A ) ] β ( k ) + β T ( k ) ( I F A T ) β ( k ) + b 2 β T ( k ) β ( k ) β T ( k ) ( K L ¯ F L ¯ F T A ) β ( k ) K . β T ( k r ) ( I F A ) β ( k r ) + 2 β T ( k ) ( I F A ) [ r 0 ( I F W ) β ( k + ϑ ) d ϑ ] + 4 β T ( k ) ν A A ψ ( k )
By Lemma 5, L ¯ F is invertible. Then, L ¯ F L ¯ F T is a positive definite matrix. Therefore, we define λ 1 as the largest eigenvalue of L ¯ F L ¯ F T , defined as
λ 1 = λ m a x { L ¯ F L ¯ F T }
D α V ( β ( k ) ) β T ( k ) [ I F ( A B + B T A + A T + b 2 I n K λ 1 A + 4 ν A A ψ ( k ) δ ) ] β ( k )   K . β T ( k r ) ( I F A ) β ( k r ) + 2 β T ( k ) ( I F A ) [ r 0 ( I F W ) β ( k + ϑ ) ] d ϑ
where δ = β ( k ) whenever
V ( k + ϵ , g ( k + ϵ ) ) < ϱ V ( k , g ( k ) ) r ϵ 0
where r = m a x [ r , r ] . Now, for some ϱ > 1 , we can conclude that for any γ > 0 ,
D α V ( k ) β T ( k ) [ I F ( A B + B T A + A T + b 2 I M K λ 1 A + 4 ν A A ψ ( k ) δ ) ] β ( k ) K . β T ( k r ) ( I F A ) ( k r ) + 2 β T ( k ) r 0 ( I F A ) ( I F W ) β ( k + ϑ ) d ϑ + γ [ ϱ β T ( k ) ( I F I n ) β ( k ) β T ( k r ) ( I F I n ) β ( k r ) ] + r 0 γ [ ϱ β T ( k ) ( I F I n ) β ( k ) β T ( k + ϑ ) ( I F I n ) β ( k + ϑ ) ] d ϑ = β T ( k ) [ I F ( A B + B T A + A T + b 2 I n + γ ϱ I n + X K λ 1 A + 4 ν A A ψ ( k ) δ ) ] β ( k ) + K . β T ( k r ) ( I F A ) β ( k r ) γ β T ( k r ) ( I F I n ) β ( k r ) r 0 [ β T ( k ) ( I F ( γ ϱ I n 1 r X ) ) β ( k ) + 2 β T ( k ) ( I F A ) ( I F W ) β ( k + ϑ ) γ β T ( k + ϑ ) ( I F I n ) β ( k + ϑ ) ] d ϑ
φ r T I F ( A B + B T A + A T + b 2 I M + γ ϱ I n + X K λ 1 A + 4 ν A A ψ ( k ) δ ) 0 0 I F ( K A γ I n ) φ r   r 0 φ ϑ T I F ( γ ϱ I n 1 r X ) I F A W I F W T A γ I F I n φ ϑ d ϑ
where φ r = ( β T ( k ) , β T ( k r ) ) , φ ϑ = ( β T ( k ) , β T ( k + ϑ ) ) , and ϑ [ r , 0 ] . Let ϱ 1 + . Then, we can obtain
D α V ( k ) φ r T Ω 1 0 0 Ω 2 φ r r 0 φ ϑ T Ω 3 I F A W I F W T A γ I F I n φ ϑ d ϑ
Now, from Lemma 2,
Ω 1 0 0 Ω 2 < 0
Ω 3 I F A W I F W T A γ I F I n < 0
where λ 1 = λ m a x [ L ¯ F L ¯ F T ] . By Lemma 2, relationships (15) and (16) hold, which indicates that D α V ( k ) < 0 whenever V ( k + ϵ , g ( k + ϵ ) ) < ϱ V ( k , g ( k ) ) for some ϱ > 1 and ϵ [ r , 0 ] . Lemma 4 states that system (23) is asymptotically stable, which means that control law (9) can attain the stability of the system defined by (4) and (5). □
Remark 1. 
In (9), we use delayed controllers because it can enhance the robustness of a multi-agent system. Delayed controllers allow agents to continue their work effectively even in scenarios where communication is disrupted or delayed.
Remark 2. 
In contrast, the irregularity in space and the restricted occurrence of extreme points in the gradients of fractional derivatives, compared to traditional integer-order systems, presents significant difficulties when studying fractional multi-agent systems (FMASs), especially with temporal delays. In traditional systems with integer-order derivatives, analyzing how they perform under delays often involves using a Lyapunov function that includes an integral component. However, when dealing with delayed FMASs, through using Caputo derivatives, this Lyapunov function becomes ineffective because fractional operators do not follow the same composition property as integer derivatives. That is, the derivative of a derivative may not be equal to the combined derivative of the sum. To address this issue, we propose a novel approach that leverages signed graph theory and the fractional Razumikhin method to control delayed FMASs with a bipartite containment objective. Our method overcomes the challenges posed by delays and fractional derivatives by employing a straightforward quadratic Lyapunov function. This technique is also adaptable to fractional-order multi-agent systems experiencing both communication and various types of distributed delays [36,37].

4.2. Switching Signed Directed Network

Let G σ ( k ) = ( V , E σ ( k ) ) be a switching signed directed graph, and at k 𝚥 (switching point), the switching signal (piecewise) σ determines the interval [ k 0 , ) for the set N = { 1 , 2 , 3 , n } . For any k 𝚥 , there exists a small point t such that k 𝚥 + 1 k 𝚥 t , preventing Zeno behavior. This ensures that the nth topology is activated for k [ k 𝚥 , k 𝚥 + 1 ) when σ ( k ) = n N . The adjacency matrix is represented as J σ ( k ) = [ j u v σ ( k ) ] M × M , and L σ ( k ) = [ u v σ ( k ) ] M × M represent the Laplacian matrices of G σ ( k ) . Furthermore, G 𝚤 = G for any σ ( k ) = 𝚤 N .
To achieve the bipartite containment control of fractional-order multi-agent systems as described in (4) and (5) for a switching signed network, some assumptions are necessary. Here, we discuss them:
Assumption 6. 
The graph G σ ( k ) is structurally balanced for any σ ( k ) N .
Assumption 7. 
Every follower has a directed link to at least one leader in G σ ( k ) .
We construct the delayed control protocol under FDIAs for attaining the bipartite containment control of the system defined by (4) and (5), which is defined as
ω u ( k r ) = K v = 1 M | j u v σ ( k ) | ( s g n ( j u v σ ( k ) ) ) z v ( k r ) z u ( k r ) + ω u a ( k ) , u F ¯
Remark 3. 
In using (10) and (12) for σ ( k ) M , the Laplacian matrix of G σ ( k ) is denoted by
L σ ( k ) = L F σ ( k ) L R σ ( k ) 0 ( M F ) × F 0 ( M F ) × ( M F )
In the above equation, L F σ ( k ) and L R σ ( k ) belong to R F × F and R F × ( M F ) , respectively. We can choose a matrix
Δ σ ( k ) = d i a g ( Δ 1 , Δ 2 , , Δ F , Δ F + 1 , , Δ M )
with
Δ u = 1 i f u F ¯ 1 R ¯ Δ u = 1 i f u F ¯ 2
Also,
L ¯ σ ( k ) = L ¯ F σ ( k ) L ¯ R σ ( k ) 0 ( M F ) × F 0 ( M F ) × ( M F )
where
L ¯ σ ( k ) = Δ σ ( k ) L σ ( k ) Δ σ ( k )
L ¯ F σ ( k ) = [ ¯ u v σ ( k ) ] F × F = | j u v σ ( k ) | , u v u = 1 , . . . , F v = 1 , v u M | j u v σ ( k ) | , u = v v = F + 1 , F + 2 , . . . , M
and L ¯ R σ ( k ) = [ ¯ u v σ ( k ) ] F × ( M F ) with ¯ u v σ ( k ) = | j u v σ ( k ) | 0
Remark 4. 
If Assumption 3 is satisfied, L ¯ F σ ( k ) is an invertible matrix. Moreover, the matrix ( L ¯ F σ ( k ) ) 1 L ¯ R σ ( k ) is non-negative, and each of its rows sums to 1 for any σ ( k ) N .
Theorem 2. 
Under Assumptions 1, 2, and 3, the bipartite containment control of fractional-order multi-agent systems (4) and (5) for switching signed network using controller (31) shall be achieved if there exist a scalar K > 0 and symmetric matrices A > 0 and X > 0 satisfying the following inequalities.
Ω 1 0 0 Ω 2 < 0
Ω 3 I F A W I F W T A γ I F I n < 0
where
  • Ω 1 = I F ( A B + B T A + A T + b 2 I n + γ I n + X K λ 2 A + 4 ν A A ψ ( k ) δ ) ;
  • Ω 2 = I F ( K A γ I n ) ;
  • Ω 3 = I F ( γ I n 1 r X ) , where γ > 0 for any scalar, and λ 2 = m a x σ ( k ) N [ λ m a x { L ¯ F σ ( k ) ( L ¯ F σ ( k ) ) T } ] .
Proof. 
The containment control error system is defined as β ( . ) = H F ( . ) ( ( L ¯ F σ ( k ) ) 1 L ¯ R σ ( k ) I n ) H R ( . ) . Then, the system using controller (31) is defined as
D α β ( k ) = ( I F B ) β ( k ) + H ( k , H F ( k ) ) + ( ( L ¯ F σ ( k ) ) 1 L ¯ R σ ( k ) I n ) H ( k , H R ( k ) ) ( K L ¯ F σ ( k ) I n ) β ( k r ) + r 0 ( I F A ) ( I F W ) β ( k + ϑ ) d ϑ + 2 ν A ψ ( k ) .
We formed the following Lyapunov function for the purpose of stability:
V ( β ( k ) ) = β T ( k ) ( I F A ) β ( k )
The Lyapunov function was selected based on its ability to handle the complexities of fractional-order systems and the particular characteristics of bipartite structures. This function provides a robust framework for stability analysis in such dynamic environments. Now, by using Theorem 1, one can obtain
I F ( A B + B T A + A T + b 2 I n + γ I n + X K λ 2 A + 4 ν A A ψ ( k ) δ ) 0 0 I F ( K U γ I n ) < 0
I F ( γ I n 1 r X ) I F A W I F W T A γ I F I n < 0
where λ 2 = m a x σ ( k ) N [ λ m a x { L ¯ F σ ( k ) ( L ¯ F σ ( k ) ) T } ] . According to Lemma 2, relationships (36) and (37) hold, which indicates that D α V ( k ) < 0 whenever V ( k + ϵ , g ( k + ϵ ) ) < ϱ V ( k , g ( k ) ) for some ϱ > 1 and ϵ [ r , 0 ] . Lemma 4 states that system (38) is asymptotically stable, which means that control law (31) can attain the leader-following consensus of systems (4) and (5) when arbitrary switching is realized. □

5. Numerical Illustration

Example 1. 
In the context of the bipartite containment control of a fractional-order multi-agent system defined by (4) and (5) for a fixed signed network containing two leaders and five followers, the topology of the problem is described in Figure 1. Take two bipartite subgroups that are defined as F ¯ 1 = { 1 , 2 } and F 2 ¯ = { 3 , 4 , 5 } for the structurally balanced signed directed graph G .
Now, let B = 6.3   0 4   8 , W= 0.35 0.05 0.6 0.6 , ψ ( k ) = 0.23 0.45 , δ = 0.3 , and g ( k , z u ( k ) ) = 3 2 s i n ( z u ( k ) ) , u = 1 , 2 , 3 7 , and we can take k = 0.6, which satisfies (6).
Now, from Figure 1, the adjacency matrices are as follows:
J = 0 0 0.5 0 0 1 0 0.3 0 0 0 0 0 1.2 0 0 0 0 0.4 1 0 0 0 0.2 0 0 0 0.8 0 0.3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Δ = 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1
L = 1.5 0 0.5 0 0 1 0 0.3 1.5 0 0 0 0 1.2 0 0 1.4 0 0.4 1 0 0 0 0.2 1 0 0 0.8 0 0.3 0 0 0.3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
and L ¯ = Δ L Δ = 1.5 0 0.5 0 0 1 0 0.3 1.5 0 0 0 0 1.2 0 0 1.4 0 0.4 1 0 0 0 0.2 1 0 0 0.8 0 0.3 0 0 0.3 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 where L ¯ F = 1.5 0 0.5 0 0 0.3 1.5 0 0 0 0 0 1.4 0 0.4 0 0 0.2 1 0 0 0.3 0 0 0.3 and L ¯ R = 1 0 0 1.2 1 0 0 0.8 0 0 where λ 1 = λ m a x [ L ¯ F L ¯ F T ] = 3.2348
If we take γ = 1.2 and r = 0.625 and then solve inequalities (15) and (16), we can obtain X = 3.54 2.61 2.61 3.74 , A= 1.21 0.32 0.32 1.21 , and K = 1.14 , which satisfy inequalities (15) and (16). Take α = 0.6 and initial conditions
z 1 ( 1 ) = 0.5 0.3 T z 2 ( 1 ) = 0.4 1 T z 2 ( 1 ) = [ 0.6 , 0.4 ] T z 3 ( 1 ) = [ 0.8 , 2 ] T z 4 ( 1 ) = [ 0.3 , 0.1 ] T z 5 ( 1 ) = [ 0.5 , 0.6 ] T z 6 ( 1 ) = [ 0.2 , 0.6 ] T z 7 ( 1 ) = [ 0.5 , 1 ] T
and then solve the system using ADAM’s optimizer. Then, the error trajectories of the FOMAS defined by (4) and (5) for a fixed signed directed network are given in Figure 2.
For error trajectories
β p 1 ( k ) = z p 1 ( k ) c o { z 61 , z 71 } ,
β p 2 ( k ) = z p 2 ( k ) c o { z 61 , z 71 } ,
and
β p 1 ( k ) = ( z p 1 ( k ) + c o { z 61 , z 71 } ) ,
β p 2 ( k ) = ( z p 2 ( k ) + c o { z 61 , z 71 } ) ,
we are now able to conclude that
lim k z u ( k ) c o { z i ( k ) , i R ¯ } = 0 , u { 1 , 2 } , lim k z u ( k ) + c o { z i ( k ) , i R ¯ } = 0 , u { 3 , 4 , 5 } .
This indicates that the system continues to operate under FDIAs and delays, but a larger number of delays and attacks can affect the speed of the convergence of the system. An attack signal is presented in Figure 3.
Example 2. 
In the context of the bipartite containment control of a fractional-order multi-agent system defined by (4) and (5) for a switching signed network containing two leaders and five followers, the switching topologies of digraphs G 1 , G 2 , and G 3 are described in Figure 4, Figure 5, and Figure 6, respectively. Take two bipartite subgroups that are defined as F ¯ 1 = { 1 , 2 } and F 2 ¯ = { 3 , 4 , 5 } for the structurally balanced signed directed graphs G 1 , G 2 , and G 3 . Now, from Figure 4, Figure 5 and Figure 6, we have the following matrices:
J ( 1 ) = 0 0 0.2 0 0 1.3 0 2 0 0 0 0 0 2.1 0 0 0 0 0.5 2 0 0 0 0.1 0 0 0 0.8 0 1.5 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
J ( 2 ) = 0 0 0 0.3 0 0 2 0.5 0 0 0 1.1 0 0 0 0 0 0 0 1.1 0 0 0 0.1 0 0 0 0 0 0 0 0.7 0 0.4 0.8 0 0 0 0 0 0 0 0 0 0 0 0 0 0
J ( 3 ) = 0 0 0.3 0 0 1.1 0 1.7 0 0 0 0 0 2 0 0 0 0 0 1.2 0 0 0 0.1 0 0 0 0 0 1.5 0 1 0 0 0.5 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Δ ( 1 ) = Δ ( 2 ) = Δ ( 3 ) = 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1
Then,
L ¯ F ( 1 ) = 1.5 0 0.2 0 0 2 4.1 0 0 0 0 0 2.5 0 0.5 0 0 0.1 0.9 0 0 1.5 0 0 1.5 L ¯ R ( 1 ) = 1.3 0 0 2.1 2 0 0 0.8 0 0
L ¯ F ( 2 ) = 2.3 0 0 0.3 0 0.5 1.6 0 0 1.1 0 0 1.1 0 0 0 0 0.1 0.1 0 0 0 0 0.7 1.9 L ¯ R ( 2 ) = 0 2 0 0 1.1 0 0 0 0.4 0.8
L ¯ F ( 3 ) = 1.3 0 0.3 0 0 1.7 1.9 0 0 0 0 0 1.2 0 0 0 0 0.1 0.1 0 0 1.5 0 1 3 L ¯ R ( 3 ) = 1.1 0 0 2 1.2 0 0 0 0 0.5
Given λ m a x [ L ¯ F ( 1 ) ( L ¯ F ( 1 ) ) T ] = 23.2612 , λ m a x [ L ¯ F ( 2 ) ( L ¯ F ( 2 ) ) T ] = 6.8258 , and λ m a x [ L ¯ F ( 3 ) ( L ¯ F ( 3 ) ) T ] = 13.4871, from these three values, we have λ 2 = 23.2612 . Now by solving inequalities (36) and (37), we can obtain A = 1.31 0.42 0.42 1.31 , X = 3.64 2.71 2.71 3.84 , and K = 1.25 , which satisfy (36) and (37). Let α = 0.6 . Then, the error trajectories of the FOMAS defined by (4) and (5) for a switching signed directed network are given in Figure 7.

Practical Example: Autonomous Warehouse Robots for Task Coordination

In a warehouse automation scenario, we consider a multi-agent system consisting of two leader robots and seven follower robots, designed to illustrate the proposed work. The communication topology is given in Figure 8. The system is organized into two groups: Group A includes robots 1, 2, and 3, while Group B consists of robots 4, 5, 6, and 7. The leaders are tasked with directing their respective groups to complete different sections of the warehouse, such as picking and sorting tasks, while managing potential conflicts between the two groups. In this setup, we apply the proposed control strategy to ensure that each follower robot maintains a desired formation around its leader and that the two groups manage their interactions effectively. From Figure 8, we have the following matrices:
J = 0 0 0 0 0 0 0 1 0 1 0 0 0 1 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 1 0 0 1 0 0 0 0 0 0 1 0 0 0 1 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0 0
Δ = 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1
and L ¯ F = 1 0 0 0 0 0 0 1 2 0 0 1 0 0 0 1 2 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 2 0 1 0 0 0 0 1 2 0 0 0 1 0 0 0 1   L ¯ R = 1 0 0 0 0 1 1 0 0 0 0 1 0 0
where λ 1 = λ m a x [ L ¯ F L ¯ F T ] = 9.7354 . Now, let the values of the other parameters involved in the system be the same as in Example 1. These parameters are chosen to satisfy the stability conditions of the system and ensure convergence to the desired formations. Then, through solving inequalities (15) and (16), we can obtain X = 3.04 2.01 2.01 3.14 , A = 1.11 0.22 0.22 1.21 , and K = 1.13 which satisfy inequalities (15) and (16). The Lypnove function stability graph is given in Figure 9. A series of experiments could be conducted using physical robots equipped with sensors and communication systems to enable real-time position tracking and control. The robots would be programmed to follow specified routes, maintaining their formations and managing interactions between Group A and Group B as they perform their tasks. These experiments would aim to demonstrate that the fractional-order control strategy can effectively manage both task completion and group interactions. It is anticipated that the followers will maintain stable positions relative to their leaders and that the two groups will avoid interference despite their competing objectives. The results of these experiments validate the theoretical findings from the fractional-order bipartite containment control model. The practical implementation confirms that the theoretical stability criteria are met, with the robots maintaining the desired formations and effectively managing the hostile interactions between groups. These results highlight the practical effectiveness of the fractional-order control strategy in real-world robotics applications, proving that the theoretical model can be successfully translated into a functional system.

6. Conclusions

Hostile-based nonlinear bipartite containment control (FOMASs) under FDIA is proposed in this paper. Both fixed and switching signed directed networks have been used for describing the interaction between agents. In assuming that the structural balance of the associated signed digraph remains intact when each follower is directed by at least one leader, robust controllers were developed to address bipartite containment control facing the issue of false data injection. These controllers can work in the presence of small delays and FDIAs. To check the stability of the system, we used the fractional Razumikhin technique and typical Lyapunov function approach. A reliable and feasible solution is proposed to tackle the problem arising from system delay switching topologies and fractional calculus. The validity and feasibility of the main findings are illustrated through concrete numerical examples. Practical examples are also provided for the effectiveness of our work.

Author Contributions

Conceptualization, M.M.A.A.; software, N.A.A.; validation, A.Y.A.-R.; formal analysis, M.M.A.A.; resources, H.L.; data curation, F.I.; writing—original draft, S.R.; writing—review and editing, A.U.K.N.; supervision, A.U.K.N. and H.L.; project administration, H.L. and M.M.A.A. All authors have read and agreed to the published version of the manuscript.

Funding

The authors extend their appreciation to the Deanship of Research and Graduate Studies at King Khalid University for funding this work through Large Research Project under grant number RGP2/59/45; the authors extend their appreciation to the Deanship of Scientific Research at Northern Border University, Arar, KSA, for funding this research work through project number NBU-FFR-2024-2920-02; and this study was supported through funding from Prince Sattam bin Abdulaziz University, project number PSAU/2024/R/1445.

Data Availability Statement

The code is considered intellectual property of the University of Lahore, Sargodha campus, and is therefore not publicly available.

Conflicts of Interest

The authors declare that they have no conflicts of interest.

References

  1. Qu, C.; Sorbelli, F.B.; Singh, R.; Calyam, P.; Das, S.K. Environmentally-aware and energy-efficient multi-drone coordination and networking for disaster response. IEEE Trans. Netw. Serv. Manag. 2023, 20, 1093–1109. [Google Scholar] [CrossRef]
  2. Ge, X.; Han, Q.L.; Ding, L.; Wang, Y.L.; Zhang, X.M. Dynamic event-triggered distributed coordination control and its applications: A survey of trends and techniques. IEEE Trans. Syst. Man Cybern. Syst. 2020, 50, 3112–3125. [Google Scholar] [CrossRef]
  3. Wang, H.; Feng, Y.; Tian, Y.; Wang, Z.; Hu, J.; Tomizuka, M. Towards the Next Level of Vehicle Automation through Cooperative Driving: A Roadmap from Planning and Control Perspective. IEEE Trans. Intell. Veh. 2024, 9, 4335–4347. [Google Scholar] [CrossRef]
  4. Khan, A.; Hassan, W.U.; Manzor, A.; Ahmed, S.; Niazi, A.U.K. Strengthening stability with centralized event-triggered control system with the disturbances and artificial time delay in wireless connected vehicle platooning (CVSs). Syst. Sci. Control Eng. 2024, 12, 2342818. [Google Scholar] [CrossRef]
  5. De Tuglie, E.E.; Cagnano, A.; Introna, A.; Montegiglio, P.; Passarelli, A. An Online Cooperative Control Strategy for Enhancing Microgrid Participation into Electricity Market. Available online: https://papers.ssrn.com/sol3/papers.cfm?abstract_id=4792943 (accessed on 12 April 2024).
  6. Wang, G.; Sun, W.; Ding, L. Cooperative control of time-delay wind power grid-connected unit under actuator saturation based on Hamiltonian method. Int. J. Electr. Power Energy Syst. 2023, 152, 109188. [Google Scholar] [CrossRef]
  7. Li, L.; Du, L.; Hu, Y. Cooperative control method of multiple spacecraft formation based on graphtheory. J. Comput. Methods Sci. Eng. 2024, 24, 1237–1251. [Google Scholar] [CrossRef]
  8. Xv, H.; Sun, Y.; Zhao, Y.; Peng, M.; Zhang, S. Joint beam scheduling and beamforming design for cooperative positioning in multi-beam LEO satellite networks. IEEE Trans. Veh. Technol. 2023, 73, 5276–5287. [Google Scholar] [CrossRef]
  9. Naderolasli, A.; Shojaei, K.; Chatraei, A. Leader-follower formation control of Euler-Lagrange systems with limited field-of-view and saturating actuators: A case study for tractor-trailer wheeled mobile robots. Eur. J. Control 2024, 75, 100903. [Google Scholar] [CrossRef]
  10. Zhou, Y.; Zhang, H.; Mu, Y.; Wang, Y. Cooperative Containment Control for Multiagent Systems With Reduced-Order Protocols. IEEE Trans. Cybern. 2023, 54, 3823–3831. [Google Scholar] [CrossRef]
  11. Xiang, C.; Jing, H.; Changfan, Z.; Xinliang, H.; Miaoying, Z. Fixed time containment control of multi-agent system under multi-source mismatched disturbance. Meas. Control 2024, 57, 794–805. [Google Scholar] [CrossRef]
  12. Miao, S.; Su, H. Behaviors of matrix-weighted networks with antagonistic interactions. Appl. Math. Comput. 2024, 467, 128490. [Google Scholar] [CrossRef]
  13. Liu, X.; Zhang, Y.; Xu, Y.; Li, M.; Herrera-Viedma, E. A consensus model for group decision-making with personalized individual self-confidence and trust semantics: A perspective on dynamic social network interactions. Inf. Sci. 2023, 627, 147–168. [Google Scholar] [CrossRef]
  14. Gu, L.; De Meester, L.; Yang, Z. The role of prey and predator identity in eliciting inducible defenses of Daphnia. Ecology 2023, 104, e4033. [Google Scholar] [CrossRef] [PubMed]
  15. Yan, L.; Liu, J.; Chen, C.P.; Zhang, Y.; Wu, Z.; Liu, Z. Game-based adaptive fuzzy optimal bipartite containment of nonlinear multi-agent systems. IEEE Trans. Fuzzy Syst. 2023, 32, 1455–1465. [Google Scholar] [CrossRef]
  16. Błaszczyk, L.; Ćwiek-Kupczyńska, H.; Hoppe Gromadzka, K.; Basińska-Barczak, A.; Stępień, Ł.; Kaczmarek, J.; Lenc, L. Containment of Fusarium culmorum and its mycotoxins in various biological systems by antagonistic Trichoderma and Clonostachys strains. J. Fungi 2023, 9, 289. [Google Scholar] [CrossRef] [PubMed]
  17. Khan, A.; Niazi, A.U.K.; Rehman, S.; Ahmed, S. Hostile-based bipartite containment control of nonlinear fractional multi-agent systems with input delays: A signed graph approach under disturbance and switching networks. AIMS Math. 2024, 9, 12678–12699. [Google Scholar] [CrossRef]
  18. Luo, X.; Zhao, C.; Fang, C.; He, J. Submodularity-based false data injection attack scheme in multi-agent dynamical systems. Automatica 2024, 160, 111426. [Google Scholar] [CrossRef]
  19. Dibaji, S.M.; Pirani, M.; Flamholz, D.B.; Annaswamy, A.M.; Johansson, K.H.; Chakrabortty, A. A systems and control perspective of CPS security. Annu. Rev. Control 2019, 47, 394–411. [Google Scholar] [CrossRef]
  20. Ren, H.; Cheng, Z.; Qin, J.; Lu, R. Deception attacks on event-triggered distributed consensus estimation for nonlinear systems. Automatica 2023, 154, 111100. [Google Scholar] [CrossRef]
  21. de Neira, A.B.; Kantarci, B.; Nogueira, M. Distributed denial of service attack prediction: Challenges, open issues and opportunities. Comput. Netw. 2023, 222, 109553. [Google Scholar] [CrossRef]
  22. Ma, R.; Hu, Z.; Yang, H.; Jiang, Y.; Huo, M.; Luo, H.; Yang, R. Adversarial FDI attack monitoring: Toward secure defense of industrial electronics. IEEE Ind. Electron. Mag. 2023, 18, 48–57. [Google Scholar] [CrossRef]
  23. Liu, Y.; Zhang, H.; Shi, Z.; Gao, Z. Neural-network-based finite-time bipartite containment control for fractional-order multi-agent systems. IEEE Trans. Neural Netw. Learn. Syst. 2022, 34, 7418–7429. [Google Scholar] [CrossRef] [PubMed]
  24. Yaghoubi, Z.; Talebi, H.A. Cluster consensus of fractional-order non-linear multi-agent systems with switching topology and time-delays via impulsive control. Int. J. Syst. Sci. 2020, 51, 1685–1698. [Google Scholar] [CrossRef]
  25. Zhang, C.; Qin, J.; Ma, Q.; Shi, Y.; Kang, Y. On containment for linear systems with switching topologies: A novel state transition matrix perspective. IEEE Trans. Cybern. 2020, 52, 1061–1072. [Google Scholar] [CrossRef] [PubMed]
  26. Yao, X.; Chen, X.; Liu, H.; Sun, L.; He, L. Adaptive sliding-mode synchronization of the memristor-based sixth-order uncertain chaotic system and its application in image encryption. Front. Phys. 2022, 10, 863668. [Google Scholar] [CrossRef]
  27. Amullen, E.; Lin, H.; Kalbarczyk, Z.; Keel, L. Multi-agent system for detecting false data injection attacks against the power grid. In Proceedings of the 2nd Annual Industrial Control System Security Workshop, Los Angeles, CA, USA, 6 December 2016; pp. 38–44. [Google Scholar]
  28. Zhang, S.Q.; Che, W.W.; Deng, C. Observer-based event-triggered secure synchronization control for multi-agent systems under false data injection attacks. Int. J. Robust Nonlinear Control 2022, 32, 4843–4860. [Google Scholar] [CrossRef]
  29. Tahoun, A.H.; Arafa, M. Cooperative control for cyber–physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. ISA Trans. 2021, 110, 1–14. [Google Scholar] [CrossRef]
  30. Troparevsky, M.I.; Seminara, S.A.; Fabio, M.A. A review of fractional differential equations and a numerical method to solve some boundary value problems. In Nonlinear Systems-Theoretical Aspects and Recent Applications; IntechOpen Limited: London, UK, 2019. [Google Scholar]
  31. Yuan, J.; Chen, T. Observer-based adaptive neural network dynamic surface bipartite containment control for switched fractional-order multi-agent systems. Int. J. Adapt. Control Signal Process. 2022, 36, 1619–1646. [Google Scholar] [CrossRef]
  32. Huang, Y.B.; He, Y.; An, J.; Wu, M. Polynomial-type Lyapunov–Krasovskii functional and Jacobi–Bessel inequality: Further results on stability analysis of time-delay systems. IEEE Trans. Autom. Control 2020, 66, 2905–2912. [Google Scholar] [CrossRef]
  33. Liu, S.; Yang, R.; Zhou, X.F.; Jiang, W.; Li, X.; Zhao, X.W. Stability analysis of fractional delayed equations and its applications on consensus of multi-agent systems. Commun. Nonlinear Sci. Numer. Simul. 2019, 73, 351–362. [Google Scholar] [CrossRef]
  34. Hu, J.; Yu, J.; Cao, J. Distributed containment control for nonlinear multi-agent systems with time-delayed protocol. Asian J. Control 2016, 18, 747–756. [Google Scholar] [CrossRef]
  35. Ahsan, M.; Ma, Q. Bipartite containment control of multi-agent systems. In Proceedings of the 2019 IEEE/ASME International Conference on Advanced Intelligent Mechatronics (AIM), Hong Kong, China, 8–12 July 2019; IEEE: Piscataway, NJ, USA, 2019; pp. 895–900. [Google Scholar]
  36. Liu, S.; Yang, R.; Li, X.; Xiao, J. Global attractiveness and consensus for Riemann–Liouville’s nonlinear fractional systems with mixed time-delays. Chaos Solitons Fractals 2021, 143, 110577. [Google Scholar] [CrossRef]
  37. Yang, R.; Liu, S.; Li, X.; Zhao, X.W.; Pan, G. Consensus of fractional-order delayed multi-agent systems in Riemann–Liouville sense. Neurocomputing 2020, 396, 123–129. [Google Scholar] [CrossRef]
Figure 1. Signed directed network of G under FDIA.
Figure 1. Signed directed network of G under FDIA.
Fractalfract 08 00430 g001
Figure 2. For fixed trajectories, the error trajectories of the FOMAS defined by (4) and (5).
Figure 2. For fixed trajectories, the error trajectories of the FOMAS defined by (4) and (5).
Fractalfract 08 00430 g002
Figure 3. False data injection attack signal.
Figure 3. False data injection attack signal.
Fractalfract 08 00430 g003
Figure 4. Under FDIA, communication topology of G 1 .
Figure 4. Under FDIA, communication topology of G 1 .
Fractalfract 08 00430 g004
Figure 5. Under FDIA, communication topology of G 2 .
Figure 5. Under FDIA, communication topology of G 2 .
Fractalfract 08 00430 g005
Figure 6. Under FDIA, communication topology of G 3 .
Figure 6. Under FDIA, communication topology of G 3 .
Fractalfract 08 00430 g006
Figure 7. Error trajectories for FMASs (4) and (5) under switching signed directed network.
Figure 7. Error trajectories for FMASs (4) and (5) under switching signed directed network.
Fractalfract 08 00430 g007
Figure 8. Communication topology of autonomous warehouse robots for task coordination.
Figure 8. Communication topology of autonomous warehouse robots for task coordination.
Fractalfract 08 00430 g008
Figure 9. Stability analysis of Lyapunov function.
Figure 9. Stability analysis of Lyapunov function.
Fractalfract 08 00430 g009
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Louati, H.; Rehman, S.; Imtiaz, F.; AlBasheir, N.A.; Al-Rezami, A.Y.; Almazah, M.M.A.; Niazi, A.U.K. Securing Bipartite Nonlinear Fractional-Order Multi-Agent Systems against False Data Injection Attacks (FDIAs) Considering Hostile Environment. Fractal Fract. 2024, 8, 430. https://doi.org/10.3390/fractalfract8070430

AMA Style

Louati H, Rehman S, Imtiaz F, AlBasheir NA, Al-Rezami AY, Almazah MMA, Niazi AUK. Securing Bipartite Nonlinear Fractional-Order Multi-Agent Systems against False Data Injection Attacks (FDIAs) Considering Hostile Environment. Fractal and Fractional. 2024; 8(7):430. https://doi.org/10.3390/fractalfract8070430

Chicago/Turabian Style

Louati, Hanen, Saadia Rehman, Farhat Imtiaz, Nafisa A. AlBasheir, Afrah Y. Al-Rezami, Mohammed M. A. Almazah, and Azmat Ullah Khan Niazi. 2024. "Securing Bipartite Nonlinear Fractional-Order Multi-Agent Systems against False Data Injection Attacks (FDIAs) Considering Hostile Environment" Fractal and Fractional 8, no. 7: 430. https://doi.org/10.3390/fractalfract8070430

APA Style

Louati, H., Rehman, S., Imtiaz, F., AlBasheir, N. A., Al-Rezami, A. Y., Almazah, M. M. A., & Niazi, A. U. K. (2024). Securing Bipartite Nonlinear Fractional-Order Multi-Agent Systems against False Data Injection Attacks (FDIAs) Considering Hostile Environment. Fractal and Fractional, 8(7), 430. https://doi.org/10.3390/fractalfract8070430

Article Metrics

Back to TopTop