Next Article in Journal
MSUD-YOLO: A Novel Multiscale Small Object Detection Model for UAV Aerial Images
Previous Article in Journal
A Cross-Mamba Interaction Network for UAV-to-Satallite Geolocalization
Previous Article in Special Issue
A Comprehensive Survey on Short-Distance Localization of UAVs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resilient Multi-Dimensional Consensus and Containment Control of Multi-UAV Networks in Adversarial Environments

1
School of Automation Science and Electronic Engineering, Beihang University, Beijing 100191, China
2
The Sixth Research Laboratory, Beijing System Design Institute of Electro-Mechanic Engineering, Beijing 100854, China
3
The 54th Research Institute, China Electronics Technology Group Corporation, Shijiazhuang 050081, China
*
Author to whom correspondence should be addressed.
Drones 2025, 9(6), 428; https://doi.org/10.3390/drones9060428
Submission received: 21 April 2025 / Revised: 4 June 2025 / Accepted: 10 June 2025 / Published: 12 June 2025
(This article belongs to the Special Issue Resilient Networking and Task Allocation for Drone Swarms)

Abstract

Practical large-scale multiple unmanned aerial vehicle (multi-UAV) networks are susceptible to multiple potential points of vulnerability, such as hardware failures or adversarial attacks. Existing resilient multi-dimensional coordination control algorithms in multi-UAV networks are rather costly in the computation of a safe point and rely on an assumption of the maximum number of adversarial nodes in the multi-UAV network or neighborhood. In this paper, a dynamic trusted convex hull method is proposed to filter received states in multi-dimensional space without requiring assumptions about the maximum adversaries. Based on the proposed method, a distributed local control protocol is designed with lower computational complexity and higher tolerance of adversarial nodes. Sufficient and necessary graph-theoretic conditions are obtained to achieve resilient multi-dimensional consensus and containment control despite adversarial nodes’ behaviors. The theoretical results are validated through simulations.

1. Introduction

Distributed coordination control algorithms are highly important in multi-UAV networks because of their fundamental role in various applications, including the formation control of UAVs, flocking, and distributed data fusion in networks [1,2,3,4,5]. Practical large-scale multi-UAV networks are susceptible to multiple potential points of vulnerability, such as hardware failures or adversarial attacks, which can cause certain nodes to exhibit abnormal or adversarial behaviors [6,7]. The primary objective of resilient coordination control protocols is to guarantee that when an attack or failure compromises some nodes in multi-UAV networks, the remaining unaffected nodes can still achieve their objectives in a more relaxed setting [8,9,10].
A central concern within this domain is devising strategies to alleviate or eliminate the influence of adversarial nodes. A class of algorithms known as the mean subsequence reduced (MSR) algorithms has emerged as a solution to this challenge [11,12,13,14,15,16]. The fundamental concept underlying MSR algorithms involves sorting and filtering the values received from their in-neighbors using a trimmed mean approach, based on a predefined upper bound number of adversarial nodes in the neighbors or network. The concept of r / ( r , s ) -robustness [12], a graph-theoretic notion, was introduced to analyze the network topology of MSR algorithms to achieve consensus. This concept is more suitable for capturing information redundancy than the notion of connectivity. Subsequently, the MSR-based methods have been further extended to multi-UAV networks with different scenarios, such as containment control [13] and leader–follower consensus [14,15]. The effectiveness of MSR-based methods in ensuring resilient consensus in one-dimensional networks where the states of nodes are scalars has been demonstrated. However, these outcomes refer to the r / ( r , s ) -robustness graph conditions. Verifying this property in arbitrary graphs is NP-hard, and no computationally efficient method is currently available to address this problem [16]. References [8,17] provide a systematic review of the State-of-the-Art in graph-theory-based resilient consensus control for distributed systems.
To enhance the robustness of network structures, the concept of trusted nodes, which represents entities continually shielded from both attacks and failures through heightened security measures, including identity authentication, device hardening, or other cryptographic techniques, was introduced in [18]. In [18], the authors analyze the necessary graph conditions and incorporate trusted nodes into MSR algorithms to achieve resilient consensus. In [19], a method based on trusted regions was proposed for designing resilient consensus algorithms in adversarial environments. Similar strategies were employed in [20], where trusted nodes were employed to prevent data pollution from adversarial neighbors. However, the aforementioned methods mainly focus on one-dimensional scenarios, in which nodes’ states are scalars, and the consensus value is within an interval constrained by the maximum and minimum of regular nodes’ initial states. In scenarios where nodes’ states are represented as points or vectors in R d , resilient consensus and containment are conducted to guarantee that all regular nodes converge to a point or within a defined space encompassed by the convex hull of either regular nodes or the leaders’ initial states. Notably, as discussed in [21], resilient multi-dimensional consensus and containment control problems cannot be addressed by directly applying existing scalar algorithms to individual entries of the state through Kronecker product operations.
In recent research, the MSR algorithms were extended to more general d -dimensional space [21,22,23,24,25,26,27,28]. In these algorithms, each regular node iteratively updates its state by calculating a point guaranteed to lie in the convex hull formed by the states of regular neighbors. Existing algorithms compute this point through methods such as the Tverberg point [21,22], centerpoint [23,24], and intersection of multiple convex sets [25,26,27,28]. The outcomes obtained from these methods are elegant; however, the computational costs can be high, potentially growing exponentially with the number of adversarial nodes or neighbors. Moreover, all these findings are based on a predetermined parameter representing the maximum adversaries in multi-UAV networks or neighborhoods. Appropriately estimating this parameter may be impossible in practical applications, such as when addressing damaged sensors in extreme weather or real-time damaged robots in military wars. If the number of adversarial nodes exceeds the preset parameter, the coordination objective cannot be guaranteed.
In this paper, we extend the trusted-node-based approach to high-dimensional spaces. For resilient consensus control and resilient containment control in high-dimensional spaces, we design information filtering methods and resilient control algorithms, analyze the network topology conditions required for algorithm convergence, and provide corresponding proofs. Compared to traditional centralized or distributed control models [21,22,23,24,25,26,27,28], as shown in Figure 1, we employ a hybrid control model that benefits from trusted nodes to solve the resilient multi-dimensional consensus and containment control problems in this paper. Trusted nodes follow the same distributed control protocol as regular nodes and can also be influenced by adversarial nodes during the update process. They differ from leaders, which are typically remotely controlled or autonomous and function as anchor nodes. The main contributions of this paper can be outlined as follows:
(1)
A dynamic trusted convex hull method is proposed for regular nodes (including trusted nodes) to filter information in a d -dimensional space in a distributed manner. This method does not require a predetermined parameter specifying the maximum number of adversarial nodes in networks or neighborhoods, which is necessary in [21,22,23,24,25,26,27,28];
(2)
Based on this method, a distributed local control protocol is designed for regular nodes (including trusted nodes) to achieve resilient multi-dimensional consensus and containment control. Compared to [21,22,23,24,25,26,27,28], the proposed protocol exhibits lower computational complexity and better tolerance of more adversarial nodes;
(3)
The necessary and sufficient graph-theoretic conditions for the success of the proposed control protocol are derived. The newly defined graph conditions, namely r -dominating subgraphs, are easier to verify in arbitrary graphs than the classical r / ( r , s ) -robustness graph conditions [11,12,13,14,15,16].
The remainder of this paper is organized as follows: Preliminaries and problem formulation are provided in Section 2. The algorithm design and theoretical analysis are provided in Section 3 and Section 4, respectively. The simulations are described in Section 5, and Section 6 concludes the paper.
Notations: Throughout this paper, the symbols Z , Z + , and R denote the sets of integers, positive integers, and real numbers, respectively. | S | denotes the cardinality of a set S . The separability of set S 1 by set S 2 is denoted by S 1 \ S 2 = { x S 1 : x S 2 } . Moreover, α R and ε R are real numbers.

2. Preliminaries and Problem Formulation

2.1. Graph Theory

Consider a directed graph (digraph) denoted as G = ( V , E ) , where V = { 1 , 2 , , n } is the node set and E V × V is the edge set. An edge ( j , i ) E indicates that node i can directly acquire information from node j . The set of neighbors for a node i is denoted by N i = { j , | ( j , i ) E } . The adjacency matrix A = [ a i j ] R n × n is defined by a i j > 0 if ( j , i ) E ; otherwise, a i j = 0 . A digraph G s ( V s , E s ) is said to be a subgraph of G ( V , E ) if V s V and E S E . The path from node i 1 to node i p is denoted as the sequence ( i 1 , i 2 , . . , i p ) , where ( i j , i j + 1 ) E for j = 1 , 2 , , p 1 . If a directed path from i 1 to i p holds such that ( i j , i j + 1 ) E and { i 2 , , i p 1 } V S V , then the directed path is in subgraph G S . If there is a node in digraph G that has a directed path to all other nodes, then G contains a directed spanning tree. To avoid ambiguity and for convenience, in this paper, we use node indices i , j in a special font to refer to the nodes themselves, while explicitly indicating whether it is node i or node j , so as not to confuse them with other symbols.
To analyze the resilience of the algorithms developed in this paper, we introduce two new concepts that are extended from the notion of a connected dominating set [29,30]:
Definition 1.
( r -dominating subgraph) Consider a digraph G = ( V , E ) ; a subgraph G S ( V S , E S ) is said to be an r -dominating subgraph if the following two conditions are met:
(i)
G S  contains a directed spanning tree.
(ii)
i V , | N i V S | r .
Definition 2.
( r -dominating subgraph with respect to L ) Consider a digraph G = ( V , E ) , where S and L are nonempty disjointed subsets of V ; a subgraph G S ( V S , E S ) is an r -dominating subgraph with respect to L if the following two conditions are met:
(i)
i V \ L , there exists j L that has a directed path from j to i in subgraph G S or N i L .
(ii)
i ( V L ) , | N i ( V S L ) | r .
Based on the above definitions, we present the following new lemma and its proof:
Lemma 1.
Consider a digraph G = ( V , E ) . If G S ( V S , E S ) G is an r -dominating subgraph, then for any pair of nonempty disjointed subsets Z 1 , Z 2 V , Y z 1 V S Y z 2 V S is satisfied, where Y Z i V S = { j Z i : N j ( V S \ Z i ) } , i = 1 , 2 .
Proof. 
Three possible cases are considered:
(i)
Z 1 V S = : Since G S is an r -dominating subgraph, any node in Z 1 has at least r neighbors in V S . Therefore, Y Z 1 V S ;
(ii)
Z 2 V S = : Similarly to (i), Y Z 2 V S ;
(iii)
Z 1 V S and Z 2 V S : Since G S is a r -dominating subgraph, there is a node q that has a directed path to all other nodes in V S . If q Z 1 , by definition, there is a node p in Z 2 V S that must have a neighbor in V S \ Z 2 , since node q must have a directed path to node p . Then, Y Z 2 V S . If q Z 1 , by definition, there is a node p in Z 1 V S that must have a neighbor in V S \ Z 1 , since node q must have a directed path to node p . Thus, Y Z 1 V S . □

2.2. Problem Formulation

Consider a multi-UAV network G = ( V , E ) consisting of sets of regular nodes, leaders, and adversarial nodes in an adversarial environment. These sets are denoted as V R , V L , and V A , respectively. Thus, V = V R V A V L . First, the set of regular nodes V R executes a predefined distributed control protocol with local information from neighbors. Second, the leaders V L can be autonomous or remotely controlled without implementing the proposed control protocol. In this paper, leaders are considered static, functioning as anchor nodes and defining a containment space for followers to reach and remain within. The leader set may be empty; in this case, we consider only regular and adversarial nodes. Finally, the adversarial nodes V A are nodes with full knowledge of the network that deviate from any predefined protocol rules. They may aim to hinder regular nodes from achieving coordination goals, or they may just be unable to execute the predefined distributed control protocol. The adversaries considered in this paper are malicious in the sense that they send the same misinformation to all out-neighbors.
In this paper, nodes are modeled as discrete-time multi-dimensional integrators with positions in d -dimensional space. The behavior of nodes is represented by the following dynamics:
x i ( k + 1 ) = x i ( k ) + u i ( k ) , i V R x i ( k + 1 ) = x i ( 0 ) , i V L x i ( k + 1 ) : arbitrary , i V A
where u i ( k ) R d is the local control input and x i ( k ) R d is the position of the nodes, k Z is the time step. In this paper, we use x i ( k ) to represent the positional information of node i . In a one-dimensional space, x i ( k ) is a scalar, whereas in two-dimensional or three-dimensional spaces, x i ( k ) is a vector. For convenience, we uniformly use x i ( k ) to denote it, so no strict distinction is made.
We aim to enhance the resilience of multi-UAV networks through trusted nodes, which are a very small set of regular nodes continuously safeguarded from both attacks and failures through augmented security investments, including identity authentication, device hardening, or other cryptographic techniques from practical implementation. Since the security investments are costly, the designated set of trusted nodes, denoted by V T ( V T V R ) , must be small and meticulously constructed. Trusted nodes follow the same update rules as regular nodes and can also be influenced by adversarial nodes during the update process. Assume that each regular node is aware of the trusted nodes’ identity in the neighborhood [18,19]. This assumption means that the identity of trusted nodes is known to all regular nodes (including trusted nodes) within the neighborhood, while the identity of adversarial nodes remains unknown to regular nodes. All regular nodes in the multi-UAV network may become adversarial due to attacks or failures, except for a small set of trusted nodes. To clarify the problems, the following definition of the convex hull is provided:
Definition 3.
(convex hull) The convex hull of a set of nodes S V is defined as
c o ( x ( k ) , S ) = { y R d ,   y = i S a i x i ( k ) : i S a i = 1   , a i 0 }
In this paper, two coordination problems within multi-UAV networks are addressed using the proposed algorithm. Regular nodes can achieve (i) resilient multi-dimensional consensus when there are no leaders in the network or (ii) resilient multi-dimensional containment control when there are leaders in the network, regardless of the behaviors exhibited by the adversarial nodes. The problems are defined as follows [23,24]:
Problem 1.
(Resilient Multi-Dimensional Consensus) Consider a multi-UAV network consisting of regular nodes and adversarial nodes in d -dimensional space. For any behavior of adversarial nodes and any initial positions x ( 0 ) , the following holds:
lim k   x i ( k ) = p ,   i V R ,
where  p c o ( x ( 0 ) , V R ) .
Problem 2.
(Resilient Multi-Dimensional Containment Control) Consider a multi-UAV network consisting of regular nodes, leaders, and adversarial nodes in d -dimensional space. For any behavior of adversarial nodes and any initial positions x ( 0 ) , the following holds:
lim k   x i ( k ) C L ,   i V R ,
where  C L = c o ( x ( 0 ) , V L ) .

3. Algorithm Design

In this section, we provide the resilient multi-dimensional consensus and containment control protocol. In the introduction, we discussed how many algorithms prove highly effective in simple one-dimensional spaces for ensuring resilient consensus control. Consequently, one might naively attempt to extend these one-dimensional methods to high-dimensional spaces by applying them independently to each dimension of the node states via the Kronecker product, thereby achieving resilient control in higher dimensions. However, this approach only guarantees convergence to a hypercube determined by the nodes’ initial states—a limitation similarly noted in the literature [21,28]. Figure 2 illustrates an example in two-dimensional space, where node positions represent their initial states. If one-dimensional algorithms are merely applied separately to each dimension, the final convergence would be confined to the gray rectangular region. In contrast, the darker triangular region represents the more precise convex hull formed by the nodes’ initial states.
To facilitate the introduction of the proposed algorithm, we first define the safe convex hull as the convex hull formed by all regular nodes, trusted nodes, and leaders (when present). In the absence of leaders, the safe convex hull is constructed solely by regular and trusted nodes.
Definition 4.
(safe convex hull) The safe convex hull is defined as
s - c o ( x ( k ) ) = c o ( x ( k ) , ( V R V T V L ) ) .
Since this paper addresses two distinct problems—resilient consensus control (without leaders) and resilient containment control (with multiple leaders)—we must account for scenarios both with and without leaders. However, during information filtering and state updates, both leaders and trusted nodes are treated as authenticated participants whose state values are fully trusted. Specifically, trusted nodes are authenticated and execute the same algorithm as regular nodes. Leaders are authenticated and update their states via remote control. Regular nodes follow the prescribed algorithm, but may become adversarial due to faults or attacks, deviating from correct execution. Given these shared principles, we unify the algorithmic design for both problems in the subsequent discussion. Next, we give the definition of a trusted convex hull.
Definition 5.
(trusted convex hull) The trusted convex hull of regular node i at time step k is a convex hull formulated by the set of trusted nodes and leaders in the neighborhood. This convex hull is represented by the following polytope:
T - c o ( x ( k ) , N i ) = c o ( x ( k ) , ( N i ( V T V L ) ) { i } ) .
Figure 3 serves as a schematic diagram demonstrating how a regular node i constructs a trusted convex hull in two-dimensional space by utilizing trusted neighbor nodes, leaders within its neighborhood, and its own state. The positions of the nodes represent their real-time state values, and the nodes shown in the figure constitute only a portion of the entire network. According to the definition, for any regular node i V R ( V T V R ) , the trusted convex hull T - c o ( x ( k ) , N i ) is a subset of the convex hull formulated by all regular nodes, trusted nodes, and leaders. Then, it is confirmed that the trusted convex hull is a subset of the safe convex hull, that is
T - c o ( x ( k ) , N i ) s - c o ( x ( k ) ) .
Note that the construction of the trusted convex hull is not contingent upon a preknown parameter specifying the maximum adversaries in the multi-UAV system or neighborhood. In other words, it can tolerate any regular node within the multi-UAV network becoming adversarial under attacks or failures, excluding a very small set of trusted nodes.
For any regular node i V R ( V T V R ) , it makes updates according to the resilient multi-dimensional consensus and containment control protocol, as outlined in Algorithm 1. The algorithm’s key steps are designed as follows: at any given time k , each regular node i receives state information from all neighboring nodes and constructs a trusted convex hull by combining its own trusted state value with those from trusted neighbors and leaders (if present); neighboring states falling within this convex hull are retained for subsequent state updates while external ones are discarded, with the preserved node set denoted as M i ( k ) , and the state update rule—similar to the MSR algorithm—utilizes only these filtered states from M i ( k ) to maintain distributed operation, as illustrated in Figure 3, where a regular node i builds its trusted convex hull using trusted nodes and leaders in the neighborhood.
Algorithm 1: Resilient Multi-Dimensional Consensus and Containment Control Protocol
At each time step k , regular node i V R ( V T V R ) , repeat the following operations:
1: Receive relative position information x j ( k ) from neighbors j N i , and store these positions in a list X i ( k ) ;
2: Compute a dynamic trusted convex hull T - c o ( x ( k ) , N i ) that is formulated by trusted nodes and leaders in X i ( k ) ;
3: Compute a candidate node set M i ( k ) where the positions in X i ( k ) out of T - c o ( x ( k ) , N i ) are removed and the others are reserved;
4: Compute a local control input using
u i = j M i ( k ) a i j ( k ) ( x j ( k ) x i ( k ) ) ,
where a i j ( k ) α and 1 j M i ( k ) a i j ( k ) α for some 0 < α < 1 ;
5: Update position according to (1) and transmit x i ( k + 1 ) to neighbors j N i .
A novelty of the protocol is empowering regular nodes i V R to compute and update using information derived from a safe convex hull, i.e., T - c o ( x ( k ) , N i ) , ensuring immunity to arbitrary influence from adversarial nodes. During the updating process, the positions of nodes located outside the trusted convex hull are excluded and disregarded by node i . If the set of trusted nodes is carefully arranged and the network topology satisfies specific conditions, then the regular nodes in the multi-UAV network can achieve collaborative objectives in a distributed manner regardless of the behavior of the adversarial nodes. Although adversarial nodes may be located in the trusted convex hull, they cannot have arbitrary control over the regular nodes. Next, we focus on the scenario where an adversarial node p remains within the trust convex hull of a node i , i.e., x p ( k ) T - c o ( x ( k ) , N i ) . According to the definition of a convex hull, the state value x p ( k ) of node p can necessarily be represented as a convex combination of other regular nodes (including trusted nodes and leaders) in the trusted convex hull, i.e., x p ( k ) = d 1 ( k ) x 1 ( k ) + d 2 ( k ) x 2 ( k ) + + d l ( k ) x l ( k ) , where 0 d l ( k ) 1 , d 1 ( k ) + d 2 ( k ) + + d l ( k ) = 1 , and { x 1 ( k ) , x 2 ( k ) , , x l ( k ) } T - c o ( x ( k ) , N i ) . Let a i 1 ( k ) = a i 1 ( k ) + d 1 ( k ) a i p ( k ) , a i 2 ( k ) = a i 2 ( k ) + d 2 ( k ) a i p ( k ) , …, a i l ( k ) = a i l ( k ) + d l ( k ) a i p ( k ) . Then, the influence of the adversarial node can be transformed into the effect of other regular nodes within the trust convex hull. It is evident that the adversarial node p will not be able to arbitrarily control the state value of node i , and can at most influence the weights of the nodes in the convex combination.
The computation of T - c o ( x ( k ) , N i ) and M i ( k ) in Algorithm 1 can be transformed into a classic convex problem in mathematics [31,32]. Since trusted nodes are expensive and protected from attacks by increased security investment, the number of trusted neighbors of any regular node i is as small as possible, and at least d . Thus, the computation of T - c o ( x ( k ) , N i ) is transformed into a computation of a convex hull of d + 1 points. According to the Quickhull algorithm in [31,32], the average complexity is O ( d log d ) and the worst-case complexity is O ( d 2 ) . The computation of M i ( k ) involves calculating whether a point is within T - c o ( x ( k ) , N i ) . Since N i d points need to be determined, the complexity of this problem is O ( d 2 N i ) . In previous studies of multi-dimensional cases [21,22,23,24,25,26,27,28], the computation of a safe point relies on a preknown parameter specifying the maximum number of adversaries. Thus, the computation cost may increase exponentially with the number of adversarial nodes or neighbors; a detailed analysis of this can be seen in [24,28]. Our algorithm presented in this paper exhibits a significantly decreased computational cost, which is O ( d 2 N i ) at worst. The computational complexity analysis here only considers the scenario in a d -dimensional space, where any regular node i has enough trusted neighbors to form a d -dimensional trusted convex hull. It evaluates the complexity of computing such a trusted convex hull and the computational complexity of filtering received state information using this convex hull. When the number of trusted neighbors of node i is insufficient to form a d -dimensional trusted convex hull, the trusted convex hull of node i in Algorithm 1 will instead form a lower-dimensional trusted space, such as a closed convex polygon in a three-dimensional space. In this case, the computational complexity will also change. The trusted convex hull may be a point, a line, an area, or a space. The hull always contains the regular node i itself, which is considered trust by definition. In the worst, T - c o ( x ( k ) , N i ) is a single point of regular node i .

4. Theoretical Analysis

In this section, we analyze the convergence of multi-UAV network (1) under the designed control protocol. The number of regular nodes | V R | in multi-UAV network (1) is denoted by N . Combining (1) and (8) yields the dynamics of the regular node i V R as
x i ( k + 1 ) = a i i ( k ) x i ( k ) + j M i ( k ) a i j ( k ) x j ( k )
where a i i ( k ) = 1 j M i ( t k ) a i j ( k ) α , a i j ( k ) α and 0 < α < 1 .
Note that x i ( k + 1 ) is a convex combination of x j ( k ) in M i ( k ) and x i ( k ) . From Algorithm 1, we know that M i ( k ) is a candidate node set belonging to the trusted convex hull T - c o ( x ( k ) , N i ) . Since T - c o ( x ( k ) , N i ) s - c o ( x ( k ) ) , one has x i ( k + 1 ) s - c o ( x ( k ) ) . Thus, x i ( k + 1 ) is always located in the safe convex hull s - c o ( x ( k ) ) regardless of the adversarial nodes’ misleading. Next, we shall provide sufficient graph-theoretic conditions on network topology, under which resilient multi-dimensional consensus and containment control are achieved. To prove this, it is sufficient to prove that the consensus is achieved at any dimension since x i ( k + 1 ) s - c o ( x ( k ) ) . Given the symmetry across different dimensions, without loss of generality, we concentrate solely on the first entry of nodes’ positions. The convergence of other entries can be proved using the same method.
For convenience, at any p { 1 , 2 , , d } , let M R p ( k ) and m R p ( k ) denote the maximum and minimum values, respectively, of the p -th entries of regular nodes’ positions at time step k . That is,
M R p ( k ) = max i V R   x i p ( k ) , m R p ( k ) = min i V R   x i p ( k ) .
With the above preparations, we can now provide the main theoretical results.

4.1. Resilient Multi-Dimensional Consensus

First, we present the theoretical results for the resilient multi-dimensional consensus problem. Theorems 1 and 2 only consider the case where there is no leader node, and all regular nodes converge within the convex hull formed by the regular nodes (including trusted nodes). The proof of Theorem 1 follows the general structure of that for scalar systems [11], with modifications to accommodate our specific information filtering and position updating rules. We begin by proving the safety condition, i.e., x i ( k ) co ( x ( 0 ) , V R ) . Next, we prove the agreement condition by contradiction, showing that the agreement gap between all regular nodes converges to zero.
Theorem 1.
Consider a multi-UAV network in d -dimensional space consisting of regular nodes and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional consensus can be achieved through the control protocol outlined in Algorithm 1 if the subgraph G T ( V T , E T ) induced by trusted nodes forms a d -dominating subgraph.
Proof. 
First, we prove the safety condition x i ( k ) co ( x ( 0 ) , V R ) . Since G T ( V T , E T ) is a d -dominating subgraph of G , by definition, each regular node i V R in G must have at least d trusted neighbors. Thus, T - c o ( x ( k ) , N i ) . From (9), we can see that x i ( k + 1 ) is a convex combination of nodes’ positions in T - c o ( x ( k ) , N i ) . It is obtained that x i ( k + 1 ) T - c o ( x ( k ) , N i ) . Since this holds for any regular node i V R , recalling (7), one has x i ( k + 1 ) s - c o ( x ( k ) ) . By induction, we can obtain x i ( k ) co ( x ( 0 ) , V R ) .
Next, we prove the agreement condition. Based on Algorithm 1, if an adversarial node j V A satisfies x j ( k ) T - c o ( x ( k ) , N i ) , then x j ( k ) M i ( k ) for any i V R . Consequently, a i j ( k ) = 0 . Based on (9), x i 1 ( k + 1 ) is determined by the positions at time step k within [ m R 1 ( k ) , M R 1 ( k ) ] . The following is obtained:
M R 1 ( k + 1 ) M R 1 ( k ) , m R 1 ( k + 1 ) m R 1 ( k ) .
Then, M R 1 ( k ) and m R 1 ( k ) are monotone and bounded functions of k , indicating that each function converges to some limit, denoted by a and b, respectively. It has been established that a b . If we can demonstrate that a = b , then the consensus is guaranteed. We proceed to prove by contradiction that this assertion holds.
Let us assume that a b , noting that a > b by definition. Consequently, we can define a constant ε 0 > 0 , such that a ε 0 > b + ε 0 . For any positive real number ε i and at any time step k , we define the following two sets:
X M 1 ( k , ε i ) = { i V : x i 1 ( k ) > a ε i } , X m 1 ( k , ε i ) = { i V : x i 1 ( k ) < b + ε i } .
The former includes all regular and adversarial nodes that have a first entry larger than a ε i , and the latter includes all regular and adversarial nodes that have a first entry smaller than b + ε i . Then, a small quantity ε < α N ε 0 / 1 α N can be chosen. Note that 0 < ε < ε 0 . Since { M 1 ( k ) } and { m 1 ( k ) } are convergence sequences, there exists k ε Z + , such that M 1 ( k ) < a + ε and m 1 ( k ) > b ε , k k ε . Now, we consider the nonempty sets X M 1 ( k ε , ε 0 ) and X m 1 ( k ε , ε 0 ) . According to the definition of ε 0 , these two sets are disjointed.
Since the subgraph G T ( V T , E T ) is an d -dominating subgraph, Lemma 1 indicates that a regular node i in either X M 1 ( k ε , ε 0 ) or X m 1 ( k ε , ε 0 ) with at least one trusted neighbor situated outside its set exists. Let us assume that regular node i X M 1 ( k ε , ε 0 ) V R has a trusted neighbor outside X M 1 ( k ε , ε 0 ) . By definition, the first entry of these trusted neighbors is at most equal to a ε 0 . According to the control protocol outlined in Algorithm 1, the trusted neighbors fall within T - c o ( x ( k ) , N i ) and are utilized by node i for position updating. Referring to (9) reveals that the position of regular node i at each time step is a convex combination of its own position and the position of nodes in T - c o ( x ( k ) , N i ) , where the weight has a lower bound α .
Considering that the largest first entry that regular node i uses at k ε is M 1 ( k ε ) , assigning the maximum weight to M R 1 ( k ε ) yields
x i 1 ( k ε + 1 ) ( 1 α ) M R 1 ( k ε ) + α ( a ε 0 ) < ( 1 α ) ( a + ε ) + α ( a ε 0 ) = a α ε 0 + ( 1 α ) ε = a ε 1 .
Here, ε 1 = α ε 0 ( 1 α ) ε satisfies 0 < ε < ε 1 < ε 0 . Importantly, this upper bound also applies to the updated first entry of any regular node not in X M 1 ( k ε , ε 0 ) ; as such, the node utilizes its own position in updating. Similarly, if regular node i X m 1 ( k ε , ε 0 ) V R has a trusted neighbor outside X m 1 ( k ε , ε 0 ) , applying the same analysis yields
x i 1 ( k ε + 1 ) ( 1 α ) m R 1 ( k ε ) + α ( b + ε 0 ) > ( 1 α ) ( b ε ) + α ( b + ε 0 ) = b + α ε 0 ( 1 α ) ε = b + ε 1 .
Again, any regular node that is not in X m 1 ( k ε , ε 0 ) has the same lower bound. Considering the sets X M 1 ( k ε + 1 , ε 1 ) and X m 1 ( k ε + 1 , ε 1 ) , according to the previous analysis, at least one regular node in X M 1 ( k ε , ε 0 ) whose first entry will be less than a ϵ 1 at time step k ε + 1 or one regular node in X m 1 ( k ε , ε 0 ) whose first entry will be more than b + ε 1 at time step k ε + 1 exists. It must be that either | X M 1 ( k ε + 1 , ε 1 ) V R | < | X M 1 ( k ε , ε 0 ) V R | or | X m 1 ( k ε + 1 , ε 1 ) V R | < | X m 1 ( k ε , ε 0 ) V R | , or both. Since ε 1 < ε 0 , X M 1 ( k ε + 1 , ε 0 ) and X m 1 ( k ε + 1 , ε 0 ) are still disjointed. Let ε l = α ε l 1 ( 1 α ) ε , l Z + . It is evident that { ε l } is a strictly decreasing sequence. We repeat the above analysis recursively for l steps, where l N is straightforward. Since | X M 1 ( k ε , ε 0 ) V R | + | X m 1 ( k ε , ε 0 ) V R | N , there must be some time step k ε + l where either X M 1 ( k ε + l , ε l ) V R or X m 1 ( k ε + l , ε l ) V R is empty. In the former case, all regular nodes at time step k ε + l have their first entry at a ε l , at most, and in the latter case, all regular nodes at time step k ε + l have their first entry at b + ε l , at least. We aim to demonstrate that ε l > 0 , thereby contradicting the assertion that either M R 1 ( k ) monotonically converges to a or that m R 1 ( k ) monotonically converges to b. Recalling that ε < α N ε 0 / 1 α N and 0 < α < 1 according to the definitions, we have
ε l = α ε l 1 ( 1 α ) ε = α 2 ε l 2 α ( 1 α ) ε ( 1 α ) ε = α l ε 0 ( 1 α ) ( 1 + α + + α l 1 ) ε = α l ε 0 ( 1 α l ) ε α N ε 0 ( 1 α N ) ε > 0 .
Thus, we obtain a contradiction. This contradiction indicates that ε 0 must be zero, namely, a = b . The consensus has been proven. □
In Theorem 1, a sufficient condition is proven to solve the resilient multi-dimensional consensus problem in an adversarial environment. The following result elaborates upon a sufficient and necessary condition for Algorithm 1 to succeed.
Theorem 2.
Consider a multi-UAV network in d -dimensional space, consisting of regular nodes and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional consensus can be achieved through the control protocol outlined in Algorithm 1, if and only if the following conditions are met:
(i)
G T ( V T , E T ) contains a directed spanning tree;
(ii)
i V R , either i V T or N i V T .
Proof. 
(Sufficiency) Based on the two conditions, any regular node i V R in G must either be a trust node or have at least one trusted neighbor to ensure that T - c o ( x ( k ) , N i ) is not empty. The subsequent analysis follows a similar approach to that outlined in Theorem 1.
(Necessity) We prove this via contradiction considering the following cases:
(i)
G T does not contain a directed spanning tree.
(ii)
i   ( V R \ V T ) , such that N i V T = .
  • Case (i): Since the subgraph G T does not contain a directed spanning tree, by definition, a subset of trusted nodes V T 1 must exist, and the following conditions are met:
    (1)
    i   V T 1 , N i ( V T \ V T 1 ) = ;
    (2)
    j ( V T \ V T 1 ) , N j V T 1 = .
  • Consider the following initial positions: i V T 1 , x i ( 0 ) = c 1 , j ( V T \ V T 1 ) , and x j ( 0 ) = c 2 , where c 1 and c 2 are real vectors, such that c 1 c 2 . The initial positions of nontrusted nodes can be arbitrary. According to condition (1), i V T 1 , T - c o ( x ( k ) , N i ) is a single point c 1 based on Algorithm 1. Hence, u i ( 1 ) = 0 and x i ( 1 ) = x i ( 0 ) = c 1 . Similarly, from (9), we know that x i ( k ) = c 1 for k Z + ; this is true for any trusted node j ( V T \ V T 1 ) , we have x j ( k ) = c 2 for k Z + . Since c 1 c 2 , resilient multi-dimensional consensus cannot be achieved.
  • Case (ii): There exists at least one nontrusted node i ( V R \ V T ) , such that N i V T = . Consider the following initial positions: (1) x i ( 0 ) = c 1 ; (2) j V R \ { i } , x j ( 0 ) = c 2 , and i N j , where c 1 and c 2 are real vectors, such that c 1 c 2 . Similarly to the analysis in Case (i), since c 1 c 2 , resilient multi-dimensional consensus cannot be achieved. □
In the resilient consensus control problem, the primary objective is to mitigate the influence of adversarial nodes, ensuring that the network can still reach consensus even in their presence. While resilient consensus algorithms guarantee convergence within the convex hull of regular nodes, the final convergence value varies depending on the network topology conditions and computational methods. As discussed in Algorithm Design, although adversarial nodes cannot prevent the network from achieving consensus, their state values still participate in the computation of the convergence process, affecting the weights assigned to state values and thus influencing the final convergence value of the network. Similarly, the selection and exclusion of state values from neighboring regular nodes during computation can have analogous effects. Note that resilient multi-dimensional consensus can be achieved if the topology conditions in Theorem 2 are satisfied. However, these conditions may not be practical, as a regular node might not have sufficient trusted neighbors to construct a d -dimensional trusted convex hull. In such cases, a lower-dimensional convex hull T - c o ( x ( k ) , N i ) is employed. Consequently, numerous positions of other regular nodes not in T - c o ( x ( k ) , N i ) are excluded and not utilized during the update step. Neglecting these positions involves disregarding useful information, potentially causing a consensus point to be significantly distant from the true average of the initial positions of all regular nodes (including trusted nodes), as illustrated in Figure 4. In comparison, the sufficient condition in Theorem 1 is more prudent.

4.2. Resilient Multi-Dimensional Containment Control

Next, we provide the theoretical results of the resilient multi-dimensional containment control problem. Theorems 3 and 4 only consider the case where multiple leader nodes exist, and all regular nodes converge within the convex hull formed by the leader nodes. Proving that all regular nodes converge to the convex hull C L in any dimension is sufficient for proving that the regular nodes asymptotically converge to the convex hull of the leaders’ initial positions, C L = c o ( x ( 0 ) , V L ) , since x i ( k + 1 ) s - c o ( x ( k ) ) . We concentrate solely on the first entry of nodes’ positions. The convergence of other entries can be proven using the same method.
Theorem 3.
Consider a multi-UAV network in d -dimensional space, consisting of regular nodes, leaders, and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional containment control can be achieved through the control protocol outlined in Algorithm 1 if the subgraph G T ( V T , E T ) induced by trusted nodes forms a d -dominating subgraph with respect to V L . In particular, all regular nodes will converge to the convex hull of leaders’ initial positions, C L = c o ( x ( 0 ) , V L ) regardless of the behaviors exhibited by adversarial nodes.
Proof. 
We concentrate solely on the first entry of nodes’ positions, that is, we prove that the first entry of each regular node finally reaches and remains in the interval C L 1 = [ m L 1 ( 0 ) , M L 1 ( 0 ) ] . To prove this, we consider the following cases.
(i)
All regular nodes are initially in C L 1 , that is, i V R , x i 1 ( 0 ) C L 1 ;
(ii)
  i V 1 V R , such that x i 1 ( 0 ) > M L 1 ( 0 ) , for any j V R \ V 1 , x j 1 ( 0 ) C L 1 . That is, the first entry of some regular nodes’ initial position is larger than M L 1 ( 0 ) , while the others are initially in C L 1 ;
(iii)
  i V 2 V R , such that x i 1 ( 0 ) < m L 1 ( 0 ) , for any j V R \ V 2 , x j 1 ( 0 ) C L 1 ;
(iv)
  i V 3 V R , such that x i 1 ( 0 ) > M L 1 ( 0 ) ,   j V 4 V R , such that x j 1 ( 0 ) < m L 1 ( 0 ) , and for other l V R \ ( V 3 V 4 ) , x l 1 ( 0 ) C L 1 .
  • Case (i): We prove this via induction. First, k Z + , x i 1 ( k ) C L 1 , i V R . Since the subgraph G T ( V T , E T ) is an d -dominating subgraph with respect to V c , according to Definition 2, each regular node i V R has at least d trusted nodes or leaders in neighbors. Thus, T - c o (   x   ( k ) , N i ) . Based on Algorithm 1, if an adversarial node j V A satisfies x j ( k ) T - c o ( x ( k ) , N i ) , then x j ( k ) M i ( k ) for any i V R . Consequently, a i j ( k ) = 0 . Based on (9), x i 1 ( k + 1 ) is determined by the positions at time step k within [ m R 1 ( k ) , M R 1 ( k ) ] . Thus, we have x i 1 ( k + 1 ) C L 1 . Therefore, all regular nodes will always be within the convex hull C L 1 . The proof is complete.
  • Case (ii): We demonstrate that M R 1 ( k ) M L 1 ( k ) as k . We prove this via two claims, as outlined below:
  • Claim (1): If M R 1 ( k ) > M L 1 ( k ) , M R 1 ( k ) is nonincreasing. Similarly to the analysis in Case (i), T - c o ( x ( k ) , N i ) . Based on (9), x i 1 ( k + 1 ) is determined by the positions at time step k within [ m R 1 ( k ) , M R 1 ( k ) ] . Thus, for each regular node i V R , we have
    x i 1 ( k + 1 ) = a i i ( k ) x i 1 ( k ) + j M i ( k ) a i j ( k ) x j 1 ( k ) M R 1 ( k ) .
The proof of Claim (1) is complete.
  • Claim (2): If M R 1 ( k ) > M L 1 ( k ) , then after finite time steps, M R 1 ( k ) will decrease. To establish this, we consider a set S 1 V R V \ V L containing all regular nodes that have at least one leader as a neighbor. We know such a set S 1 is not empty, since for each regular node i V R , j V L , which has a directed path to it in G T or N i V L , exists. As discussed previously, each regular node i S 1 has at least d trusted nodes or leaders as neighbors and updates its position according to Algorithm 1. Define γ 0 = M R 1 ( k ) M L 1 ( k ) . Hence, if i S 1 , there is at least one leader in T - c o ( x ( k ) , N i ) . Furthermore, (9) yields
    x i 1 ( k + 1 ) = a i i ( k ) x i 1 ( k ) + j M i ( k ) a i j ( k ) x j 1 ( k ) ( 1 α ) M R 1 ( k ) + α M R 1 ( k ) γ 0 = M R 1 ( k ) α γ 0 < M R 1 ( k ) .
Since the weight is lower bounded by α , we put the largest possible weight on M R 1 ( k ) . Thus, the first inequality in (17) holds. At time step k + 2 , similarly, we put the largest possible weight on M R 1 ( k + 1 ) ; thus,
x i 1 ( k + 2 ) = a i i ( k + 1 ) x i 1 ( k + 1 ) + j M ( k + 1 ) a i j ( k + 1 ) x j 1 ( k + 1 ) α M R 1 ( k ) α γ 0 + ( 1 α ) M R 1 ( k + 1 ) α M R 1 ( k ) α γ 0 + ( 1 α ) M K 1 ( k ) = M K 1 ( k ) α 2 γ 0 < M R 1 ( k ) .
According to Claim (1), the second inequality in (18) holds. Recursive reasoning reveals that the first entry of any node in S 1 will be consistently smaller than M R 1 ( k ) from time k + 1 .
Since V T , we obtain S 1 V T . Next, we denote S 2 V R \ S 1 V \ V L as containing all regular nodes that have at least one trusted node in S 1 . Since G T ( V T , E T ) is an d -dominating subgraph with respect to V L , if | S 1 | | V R | = N , then at least one regular node in V R \ S 1 that has a directed path from leaders to it in subgraph G T exists. Thus, S 2 . As discussed previously, each regular node i S 2 has at least d trusted nodes as neighbors and updates its position according to Algorithm 1. Recalling (16) yields x i 1 ( k + 1 ) M R 1 ( k ) . At time step k + 2 , since regular node i S 2 has a trusted neighbor in S 1 that belongs to T - c o ( x ( k ) , N i ) , we have
x i 1 ( k + 2 ) = a i i ( k + 1 ) x i 1 ( k + 1 ) + j M i ( k + 1 ) a i j ( k + 1 ) x j 1 ( k + 1 ) ( 1 α ) M R 1 ( k ) + α M R 1 ( k ) α γ 0 = M R 1 ( k ) α 2 γ 0 < M R 1 ( k ) ,
where the first inequality holds, since regular node i S 2 has a trusted neighbor in S 1 whose weight is lower bounded by α and whose value is upper bounded by (17). Thus, we have x i 1 ( k + 2 ) M R 1 ( k ) α 2 γ 0 . As before, the first entry of any regular node in S 2 will be smaller than M R 1 ( k ) from k + 2 .
Similarly, we extend the previous analysis recursively to l steps and deduce that the first entry of any regular node in S l will be below M R 1 ( k ) , where l N . Thus, the first entry of every regular node will be strictly smaller than M R 1 ( k ) from time step k + N . That is, M R 1 ( k + N ) M R 1 ( k ) . Thus, the proof of Claim (2) is complete.
According to Claim (1) and Claim (2), M R 1 ( k ) M L 1 ( k ) as k . Additionally, m R 1 ( k ) m L 1 ( k ) at any k > 0 according to (9). Consequently, all regular nodes will ultimately converge and move in C L 1 .
  • Case (iii): This analysis is similar to Case (ii) and consists of demonstrating that m R 1 ( k ) m L 1 ( k ) as k and M R 1 ( k ) M L 1 ( k ) for any k > 0 .
  • Case (iv): This analysis is a combination of Case (ii) and Case (iii). Thus, the proof is complete. □
Note that the same argument holds in the case of resilient multi-dimensional containment control. Similarly, we provide sufficient and necessary conditions for Algorithm 1 to succeed in resilient multi-dimensional containment control problems, which is not prudent for multi-dimensional cases, as discussed previously.
Theorem 4.
Consider a multi-UAV network in d -dimensional space consisting of regular nodes, leaders, and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional containment control can be achieved through the control protocol outlined in Algorithm 1 if, and only if i V \ V L , and j V L exists, which has a directed path from j to i in subgraph G T or N i V L . In particular, all regular nodes will converge to the convex hull of leaders’ initial positions, C L = c o ( x ( 0 ) , V L ) , regardless of the behaviors exhibited by the adversarial nodes.
Proof. 
To conserve space, we omit this proof, which is similar to Theorem 2. □
Note that the graph-theoretic conditions developed in this paper are more straightforward to verify in practical applications than the classic r / ( r , s ) -robust graph conditions described in [11,12,13,14,15,16]. Verifying r   / ( r , s ) -robust graph conditions in arbitrary graphs is NP-hard, and no computationally efficient method is currently available to address this problem [16]. For the graph-theoretic conditions developed in this paper, the first step is to determine whether the set of trusted nodes and leaders forms a directed spanning tree. There are many classic spanning tree algorithms that can be used to make this determination. Next, we calculate the number of trusted nodes and leaders among the neighbors of each regular node (including trusted nodes) to determine whether the conditions are satisfied.

5. Simulation

In this section, we present simulations to demonstrate resilient multi-dimensional consensus and containment using the trusted convex hull method and compare it with approaches utilizing the Tverberg point [22] and centerpoint [24]. For clarity, we perform simulations in a two-dimensional space.

5.1. Resilient Multi-Dimensional Consensus

For the resilient multi-dimensional consensus problem, we consider a multi-UAV network comprising 200 nodes, including nine trusted nodes, deployed in a planar region W = [ 1 , 1 ] × [ 1 , 1 ] R 2 , as illustrated in Figure 5a and Figure 6a. The communication radius of the nodes is 1.2 , which ensures that all regular nodes can receive information from at least two trusted nodes. We model the communication links between nodes as an undirected graph, with trusted nodes initially distributed in the central region, as illustrated. Based on the nodes’ communication radius, any trusted node can communicate with at least two other trusted nodes, ensuring that all trusted nodes can form a spanning tree. Similarly, any regular node can communicate with at least two trusted nodes. Therefore, the communication topology among the nodes satisfies the conditions of the 2-dominating subgraph in the theorem. We set the weight a i j = 1 / | N i | if ( j , i ) E ; otherwise, a i j = 0 . We consider two types of adversarial behaviors: oscillating nodes and move-away nodes. Notably, the network topology in Figure 5a and Figure 6a satisfies the conditions outlined in Theorem 1. Consequently, regular nodes achieve resilient multi-dimensional consensus under Algorithm 1 despite the presence of varying numbers and types of adversarial nodes, as depicted in Figure 5 and Figure 6.

5.2. Resilient Multi-Dimensional Containment Control

For the resilient multi-dimensional containment control problem, we consider a multi-UAV network comprising 200 nodes, including nine trusted nodes and three static leaders, as illustrated in Figure 7a. The three leaders delineate a triangular area within which the regular nodes are expected to remain. The remaining parameter settings align with those used in the simulations for the resilient multi-dimensional consensus problem. Notably, the network topology in Figure 7a adheres to the conditions outlined in Theorem 3. Consequently, under Algorithm 1, regular nodes achieve resilient multi-dimensional containment control despite the presence of adversarial nodes, as depicted in Figure 7.

5.3. Comparison with Existing Methods

To compare the convergence rates of a multi-UAV network using the trusted convex hull, Tverberg point, and centerpoint methods, we conduct a simulation in a planar region W = [ 1 , 1 ] × [ 1 , 1 ] R 2 . By setting the communication radius to 3.0, the network topology is ensured to be a complete digraph. The convergence time is defined as min t i V R j V R x i ( t ) x j ( t ) / N / N < 0.01 . Simulations are conducted with varying numbers of nodes, where 1 / 4 are adversarial nodes and nine are trusted nodes. Figure 8a shows the convergence time with different numbers of nodes under the three methods. The proposed method exhibits a notably faster convergence rate than the other methods, and its performance is not notably impacted by increasing the number of nodes.
To demonstrate the enhanced resilience of the proposed method, comparative simulations are conducted on a fixed-topology multi-UAV network comprising 36 nodes, including 16 stationary adversarial nodes (red) and four trusted nodes (green), as depicted in Figure 8b,c. The adversarial nodes and regular nodes (blue) are divided equally into two parts and distributed on opposite sides of the trusted nodes. According to references [22,24], in a two-dimensional space, the Tverberg point method can tolerate at most N i 4 1 of the neighboring nodes being adversarial, while the centerpoint method can tolerate at most N i 3 of the neighboring nodes being adversarial. Clearly, the number of adversarial nodes among the neighbors of regular nodes has already exceeded this threshold. As illustrated, under the Tverberg point and centerpoint methods, the regular nodes fail to converge to a single point, whereas this convergence is successful under the trusted convex hull method.

5.4. Hardware-in-the-Loop Simulation Experiments

Next, we will validate the proposed algorithm using a hardware-in-the-loop (HIL) simulation system for UAV formation control. The single-UAV HIL simulation system consists of a single-UAV flight control module, a formation cooperative control module, an X-Plane flight simulator, and a single-UAV flight monitoring module, with the simulation connections illustrated in Figure 9. The formation networking module is connected to the formation cooperative control modules of member nodes, forming a formation support network to enable the intercommunication of control command and flight data. The formation flight monitor module is simultaneously connected to the single-UAV flight monitoring modules of all member nodes, enabling the real-time monitoring of formation status. Additionally, the formation support network facilitates unified distribution and the control of formation cooperative decision-making and management commands. The red arrows indicate the control command and flight data flow of formation cooperative control and member node flight control.
We apply the resilient control algorithm proposed in this paper to UAV formation control to validate the effectiveness of formation shape control. The reference position vector for the formation shape is set as h = [ h 1 T , h 2 T , , h N T ] T R n N , where this formation parameter represents the reference value relative to the average consensus constant. In other words, the control objective is for all nodes to maintain their respective formation parameters relative to the average consensus constant. Under the condition of an undirected connected graph G , the goal of this simulation is to ensure that each regular UAV node forms a stable formation according to the proposed resilient control algorithm, even in the presence of adversarial node interference. That is, when k , for all regular nodes i , j V R , the following holds:
( x i ( k ) h i ) ( x j ( k ) h j ) 0 .
Moreover, the control law in the Equation (8) is modified to
u i = j M i ( k ) a i j ( k ) ( x j ( k ) h j ( x i ( k ) h i ) ) .
Using the resilient control algorithm designed in this paper and the control law (21), a HIL simulation was conducted with a UAV formation consisting of five nodes. The five nodes form a fully connected graph, where UAV1 serves as the leader, UAV2 as the trusted node, UAV3 and UAV4 as regular nodes, and UAV5 as the adversarial node. The desired formation was set to h = [ ( 0 , 0 ) , ( 50 , 50 ) , ( 50 , 50 ) , ( 100 , 100 ) , ( 100 , 100 ) ] T .
When no attack occurs, all five nodes successfully achieve the desired formation, as shown in Figure 10. At time k = 250 , UAV5 deviates northward due to an attack, and the northward distance trajectories of the five UAVs are illustrated in Figure 11. The solid lines represent the position under the proposed resilient control algorithm, while the dashed lines represent the unoptimized position. It can be observed that, without optimization, the regular nodes UAV3 and UAV4 are affected by the adversarial node UAV5, causing their trajectories to partially deviate northward and altering the formation spacing. In contrast, the proposed resilient control method effectively mitigates the impact of the adversarial node, maintaining stable formation geometry.

5.5. Results and Discussion

In the presentation of the simulation results, to facilitate the demonstration of the algorithm’s effectiveness, we used the number of algorithm iterations as the horizontal axis to plot the curve of node position changes. At the same time, to illustrate the differences in the convergence time among different algorithms, we used the convergence time as the vertical axis to show the impact of the number of nodes on the algorithm. In the hardware-in-the-loop simulation experiments, we demonstrated an application of the proposed algorithm in formation control. Since the equipment specifications did not significantly affect the algorithm’s performance, they were not specifically mentioned.
This paper presents a hybrid control method as an alternative solution for resilient multi-dimensional consensus and containment control problems. While it may incur costs due to the security investments in trusted nodes, regular nodes in this approach need to be aware of the trusted nodes’ identities within the neighborhood, whereas in [21,22,23,24,25,26,27,28], all nodes are assumed to have equal identities. Despite the added expense of trusted nodes, however, fully distributed control methods in large-scale networks could be more costly due to the high communication and computation burdens. Inspired by human societies and animal groups, a hybrid control method based on appropriate role division could be a viable approach to enhancing the efficiency of large-scale distributed networks while reducing costs.

6. Conclusions

In this paper, we explore resilient multi-dimensional consensus and containment control problems within an adversarial environment. A dynamic trusted convex hull method is proposed to filter information in d -dimensional space without employing the parameter of the maximum number of adversarial nodes in networks or neighborhoods. Based on this method, a distributed local control protocol is designed for regular nodes to achieve resilient multi-dimensional consensus and containment with lower computational complexity and higher tolerance of adversarial nodes. The sufficient and necessary graph-theoretic conditions for the proposed control protocol to succeed are obtained. The theoretical results are validated through simulations. The proposed method exhibits faster convergence rates and better tolerance of more adversarial nodes than the Tverberg point and centerpoint algorithms.
In the future, we will extend our work to develop a control protocol ensuring resilient containment control with dynamic leaders and limited communication resources.

Author Contributions

Conceptualization, P.Z.; Methodology, P.Z. and K.L.; Software, P.Z.; Validation, P.Z.; Writing—review & editing, Z.L.; Supervision, S.W.; Project administration, L.L. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Key Project of Basic-Strengthened Research under grant number 2020JCJQZD02212.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

Author Lianhe Luo was employed by the 54th Research Institute of the China Electronics Technology Group Corporation. The remaining authors declare that the research was conducted in the absence of any commercial or financial relationships that could be construed as a potential conflict of interest.

References

  1. Olfati-Saber, R. Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Trans. Autom. Control 2006, 51, 401–420. [Google Scholar] [CrossRef]
  2. Olfati-Saber, R.; Shamma, J.S. Consensus filters for sensor networks and distributed sensor fusion. In Proceedings of the 44th IEEE Conference on Decision and Control, Seville, Spain, 15 December 2005; pp. 6698–6703. [Google Scholar]
  3. Shi, T.; Zhu, F. Security time-varying formation control for multi-agent systems under denial-of-service attacks via unknown input observer. IEEE Trans. Netw. Sci. Eng. 2023, 10, 2372–2385. [Google Scholar] [CrossRef]
  4. Chen, J.; Yang, Y.; Qin, S. A distributed optimization algorithm for fixed-time flocking of second-order multiagent systems. IEEE Trans. Netw. Sci. Eng. 2024, 11, 152–162. [Google Scholar] [CrossRef]
  5. Yan, J.; Zhang, Z.; Yang, X.; Luo, X.; Guan, X. Target detection in underwater sensor networks by fusion of active and passive measurements. IEEE Trans. Netw. Sci. Eng. 2023, 10, 2319–2333. [Google Scholar] [CrossRef]
  6. Humayed, A.; Lin, J.; Li, F.; Luo, B. Cyber-physical systems security—A survey. IEEE Internet Things J. 2017, 4, 1802–1831. [Google Scholar] [CrossRef]
  7. He, W.; Xu, W.; Ge, X.; Han, Q.-L.; Du, W.; Qian, F. Secure control of multiagent systems against malicious attacks: A brief survey. IEEE Trans. Ind. Informat. 2022, 18, 3595–3608. [Google Scholar] [CrossRef]
  8. Ishii, H.; Wang, Y.; Feng, S. An overview on multi-agent consensus under adversarial attacks. Annu. Rev. Control 2022, 53, 252–272. [Google Scholar] [CrossRef]
  9. LeBlanc, H.; Koutsoukos, X. Resilient first-order consensus and weakly stable higher order synchronization of continuous-time networked multiagent systems. IEEE Trans. Control of Netw. Syst. 2018, 5, 1219–1231. [Google Scholar] [CrossRef]
  10. Ramos, G.; Silvestre, D.; Silvestre, C. A discrete-time reputation-based resilient consensus algorithm for synchronous or asynchronous communications. IEEE Trans. Autom. Control 2024, 69, 543–550. [Google Scholar] [CrossRef]
  11. LeBlanc, H.J.; Zhang, H.; Koutsoukos, X.; Sundaram, S. Resilient asymptotic consensus in robust networks. IEEE J. Sel. Areas Commun. 2013, 31, 766–781. [Google Scholar] [CrossRef]
  12. Zhang, H.; Sundaram, S. Robustness of information diffusion algorithms to locally bounded adversaries. In Proceedings of the 2012 American Control Conference (ACC), Montreal, QC, Canada, 27–29 June 2012; pp. 5855–5861. [Google Scholar]
  13. Yan, J.Q.; Wen, C.Y. Resilient containment control in adversarial environment. IEEE Trans. Control Netw. Syst. 2020, 7, 1951–1959. [Google Scholar] [CrossRef]
  14. Usevitch, J.; Panagou, D. Resilient leader-follower consensus to arbitrary reference values in time-varying graphs. IEEE Trans. Autom. Control 2020, 65, 1755–1762. [Google Scholar] [CrossRef]
  15. Rezaee, H.; Parisini, T.; Polycarpou, M.M. Resiliency in dynamic leader–follower multiagent systems. Automatica 2021, 125, 109384. [Google Scholar] [CrossRef]
  16. Usevitch, J.; Panagou, D. Determining r-and (r s)-robustness of digraphs using mixed integer linear programming. Automatica 2020, 111, 110022. [Google Scholar] [CrossRef]
  17. Pirani, M.; Mitra, A.; Sundaram, S. Graph-theoretic approaches for analyzing the resilience of distributed control systems: A tutorial and survey. Automatica 2023, 157, 111264. [Google Scholar] [CrossRef]
  18. Abbas, W.; Laszka, A.; Koutsoukos, X. Improving network connectivity and robustness using trusted nodes with application to resilient consensus. IEEE Trans. Control Netw. Syst. 2018, 5, 2036–2048. [Google Scholar] [CrossRef]
  19. Zhai, Y.; Liu, Z.-W.; Ge, M.-F.; Wen, G.; Yu, X.; Qin, Y. Trusted-region subsequence reduction for designing resilient consensus algorithms. IEEE Trans. Netw. Sci. Eng. 2021, 8, 259–268. [Google Scholar] [CrossRef]
  20. Zhang, P.; Luo, Z.; Wu, S. Event-triggered resilient consensus of second-order multiagent networks via trusted neighbors. IEEE Trans. Circuits Syst. II Express Briefs 2024, 71, 2689–2693. [Google Scholar] [CrossRef]
  21. Vaidya, N.H.; Garg, V.K. Byzantine vector consensus in complete graphs. In Proceedings of the ACM Symposium on Principles of Distributed Computing, Montreal, QC, Canada, 22–24 July 2013; pp. 65–73. [Google Scholar]
  22. Park, H.; Hutchinson, S.A. Fault-tolerant rendezvous of multirobot systems. IEEE Trans. Robot. 2017, 33, 565–582. [Google Scholar] [CrossRef]
  23. Matteo; Franceschelli, M.; Gasparri, A. Secure rendezvous and static containment in multi-agent systems with adversarial intruders. Automatica 2022, 143, 110456. [Google Scholar]
  24. Abbas, W.; Shabbir, M.; Li, J.; Koutsoukos, X. Resilient distributed vector consensus using centerpoint. Automatica 2022, 136, 110046. [Google Scholar] [CrossRef]
  25. Mendes, H.; Herlihy, M. Multidimensional approximate agreement in Byzantine asynchronous systems. In Proceedings of the 45th Annual ACM Symposium on Theory of Computing, Palo Alto, CA, USA, 2–4 June 2013; pp. 391–400. [Google Scholar]
  26. Wang, X.; Mou, S.; Sundaram, S. A resilient convex combination for consensus-based distributed algorithms. Numer. Algebra Control Optim. 2019, 9, 269–281. [Google Scholar] [CrossRef]
  27. Yan, J.; Mo, Y.; Li, X.; Wen, C. A safe kernel approach for resilient multi-dimensional consensus. IFAC-PapersOnLine 2020, 53, 2507–2512. [Google Scholar] [CrossRef]
  28. Yan, J.; Li, X.; Mo, Y.; Wen, C. Resilient multi-dimensional consensus in adversarial environment. Automatica 2022, 145, 110530. [Google Scholar] [CrossRef]
  29. Liu, Z.; Wang, B.; Guo, L. A survey on connected dominating set construction algorithm for. Inf. Technol. J. 2010, 9, 1081–1092. [Google Scholar] [CrossRef]
  30. Zhao, C.; He, J.; Wang, Q.-G. Resilient distributed optimization algorithm against adversarial attacks. IEEE Trans. Autom. Control 2020, 65, 4308–4315. [Google Scholar] [CrossRef]
  31. Barber, C.B.; Dobkin, D.P.; Huhdanpaa, H. The Quickhull algorithm for convex hulls. ACM Trans. Math. Softw. 1996, 22, 469–483. [Google Scholar] [CrossRef]
  32. O’Rourke, J. Computational Geometry in C; Cambridge University Press: Cambridge, UK, 1998. [Google Scholar]
Figure 1. An illustration of three control models.
Figure 1. An illustration of three control models.
Drones 09 00428 g001
Figure 2. A two-dimensional illustration of nodes’ initial states.
Figure 2. A two-dimensional illustration of nodes’ initial states.
Drones 09 00428 g002
Figure 3. A two-dimensional multi-UAV network where the trusted convex hull of a regular node i is highlighted by a dark gray triangle.
Figure 3. A two-dimensional multi-UAV network where the trusted convex hull of a regular node i is highlighted by a dark gray triangle.
Drones 09 00428 g003
Figure 4. An example of a consensus point that is distant from the average of all regular nodes (including trusted nodes) occurs only if the topology conditions in Theorem 2 are satisfied.
Figure 4. An example of a consensus point that is distant from the average of all regular nodes (including trusted nodes) occurs only if the topology conditions in Theorem 2 are satisfied.
Drones 09 00428 g004
Figure 5. (a) Initial positions of nodes with nine trusted nodes and 50 oscillating adversaries. Changes in the positions of (b) X and (c) Y for the nodes in (a).
Figure 5. (a) Initial positions of nodes with nine trusted nodes and 50 oscillating adversaries. Changes in the positions of (b) X and (c) Y for the nodes in (a).
Drones 09 00428 g005
Figure 6. (a) Initial positions of nodes with nine trusted nodes and 100 move-away adversaries. Changes in the positions of (b) X and (c) Y for the nodes in (a).
Figure 6. (a) Initial positions of nodes with nine trusted nodes and 100 move-away adversaries. Changes in the positions of (b) X and (c) Y for the nodes in (a).
Drones 09 00428 g006
Figure 7. (a) Initial positions of nodes with nine trusted nodes, three leaders, and 100 move-away adversaries. Changes in the positions of (b) X and (c) Y for the nodes in (a).
Figure 7. (a) Initial positions of nodes with nine trusted nodes, three leaders, and 100 move-away adversaries. Changes in the positions of (b) X and (c) Y for the nodes in (a).
Drones 09 00428 g007
Figure 8. (a) The convergence time with different numbers of nodes under three methods. The evolution of nodes’ positions using (b) the Tverberg point or centerpoint method and (c) the trusted convex hull method.
Figure 8. (a) The convergence time with different numbers of nodes under three methods. The evolution of nodes’ positions using (b) the Tverberg point or centerpoint method and (c) the trusted convex hull method.
Drones 09 00428 g008
Figure 9. HIL simulation connection diagram.
Figure 9. HIL simulation connection diagram.
Drones 09 00428 g009
Figure 10. HIL simulation formation plot of UAVs.
Figure 10. HIL simulation formation plot of UAVs.
Drones 09 00428 g010
Figure 11. The solid lines represent position under the proposed resilient control algorithm, the dashed lines represent unoptimized position.
Figure 11. The solid lines represent position under the proposed resilient control algorithm, the dashed lines represent unoptimized position.
Drones 09 00428 g011
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, P.; Liu, Z.; Li, K.; Wu, S.; Luo, L. Resilient Multi-Dimensional Consensus and Containment Control of Multi-UAV Networks in Adversarial Environments. Drones 2025, 9, 428. https://doi.org/10.3390/drones9060428

AMA Style

Zhang P, Liu Z, Li K, Wu S, Luo L. Resilient Multi-Dimensional Consensus and Containment Control of Multi-UAV Networks in Adversarial Environments. Drones. 2025; 9(6):428. https://doi.org/10.3390/drones9060428

Chicago/Turabian Style

Zhang, Peng, Zhenghua Liu, Kai Li, Sentang Wu, and Lianhe Luo. 2025. "Resilient Multi-Dimensional Consensus and Containment Control of Multi-UAV Networks in Adversarial Environments" Drones 9, no. 6: 428. https://doi.org/10.3390/drones9060428

APA Style

Zhang, P., Liu, Z., Li, K., Wu, S., & Luo, L. (2025). Resilient Multi-Dimensional Consensus and Containment Control of Multi-UAV Networks in Adversarial Environments. Drones, 9(6), 428. https://doi.org/10.3390/drones9060428

Article Metrics

Back to TopTop