Loading [MathJax]/extensions/MathMenu.js
Attacks on Formation Control for Multiagent Systems | IEEE Journals & Magazine | IEEE Xplore

Attacks on Formation Control for Multiagent Systems


Abstract:

Multiagent systems (MASs) are distributed systems with two or more intelligent agents. Formation control is a significant control technique of MASs. To date, formation co...Show More

Abstract:

Multiagent systems (MASs) are distributed systems with two or more intelligent agents. Formation control is a significant control technique of MASs. To date, formation control on MASs is widely used in various fields, such as robots, spacecrafts, satellites, and unmanned aerial/surface/underwater vehicles. However, there is a relatively small body of literature that is concerned with security problems of formation control on MASs in past years. Our research represents the first step toward developing security attacks of formation control on MASs. Our study aims to investigate potential security problems of formation control on a multirobot system for the first time. We propose two kinds of control-level attacks and each kind of attack includes several specific attack forms. Then, we discuss specific features of formation control on a classical multirobot system and utilize theoretical analyses to illustrate how cyberattacks can influence the physical movements of robots. The experimental results of the proposed attacks show that attacks can easily interrupt formation movements of a multirobot system and several carefully designed attacks even can cause irreversible loss.
Published in: IEEE Transactions on Cybernetics ( Volume: 52, Issue: 12, December 2022)
Page(s): 12805 - 12817
Date of Publication: 14 July 2021

ISSN Information:

PubMed ID: 34260367

Funding Agency:

References is not available for this document.

I. Introduction

In the last few decades, there has been a surge of interest in the development of various multiagent systems (MASs) [1], [2]. MASs are distributed systems with two or more intelligent agents [3]. In contrast to a single agent, agents in MASs can cooperatively solve complicated problems with good efficiency, robustness, and reliability.

Select All
1.
Y. Cao, W. Yu, W. Ren and G. Chen, "An overview of recent progress in the study of distributed multi-agent coordination", IEEE Trans. Ind. Informat., vol. 9, no. 1, pp. 427-438, Feb. 2013.
2.
K.-K. Oh, M.-C. Park and H.-S. Ahn, "A survey of multi-agent formation control", Automatica, vol. 53, pp. 424-440, Mar. 2015.
3.
Y. Lee, J. Trevathan, I. Atkinson and W. Read, "An intelligent agent system for managing heterogeneous sensors in dispersed and disparate wireless sensor network", Int. J. Sens. Netw., vol. 27, no. 3, pp. 149-162, 2018.
4.
Y. Yang, Y. Xiao and T. Li, "A survey of autonomous underwater vehicle formation: Performance formation control and communication capability", IEEE Commun. Surveys Tuts., vol. 23, no. 2, pp. 815-841, 2nd Quart. 2021.
5.
Y. Zou, J. Zhu, X. Wang and L. Hanzo, "A survey on wireless security: Technical challenges recent advances and future trends", Proc. IEEE, vol. 104, no. 9, pp. 1727-1765, Sep. 2016.
6.
M. Valero, F. Li and W. Song, "Smart seismic network for shallow subsurface imaging and infrastructure security", Int. J. Sens. Netw., vol. 31, no. 1, pp. 10-23, 2019.
7.
J. Gao et al., "SCADA communication and security issues", Security Commun. Netw., vol. 7, no. 1, pp. 175-194, 2014.
8.
H. J. LeBlanc and X. D. Koutsoukos, "Consensus in networked multi-agent systems with adversaries", Proc. 14th Int. Conf. Hybrid Syst. Comput. Control, pp. 281-290, Apr. 2011.
9.
I. Shames, A. M. H. Teixeira, H. Sandberg and K. H. Johansson, "Distributed fault detection for interconnected second-order systems", Automatica, vol. 47, no. 12, pp. 2757-2764, 2011.
10.
Z. Feng, G. Hu and G. Wen, "Distributed consensus tracking for multi-agent systems under two types of attacks", Int. J. Robust Nonlinear Control, vol. 26, no. 5, pp. 896-918, 2016.
11.
Z. Feng, G. Wen and G. Hu, "Distributed secure coordinated control for multiagent systems under strategic attacks", IEEE Trans. Cybern., vol. 47, no. 5, pp. 1273-1284, May 2017.
12.
W. He, X. Gao, W. Zhong and F. Qian, "Secure impulsive synchronization control of multi-agent systems under deception attacks", Inf. Sci., vol. 459, pp. 354-368, Aug. 2018.
13.
D. Ding, Z. Wang, D. W. C. Ho and G. Wei, "Observer-based event-triggering consensus control for multiagent systems with lossy sensors and cyber-attacks", IEEE Trans. Cybern., vol. 47, no. 8, pp. 1936-1947, Aug. 2017.
14.
M. Zhu and S. Martinez, "On the performance analysis of resilient networked control systems under replay attacks", IEEE Trans. Autom. Control, vol. 59, no. 3, pp. 804-808, Mar. 2014.
15.
X.-M. Li, Q. Zhou, P. Li, H. Li and R. Lu, "Event-triggered consensus control for multi-agent systems against false data-injection attacks", IEEE Trans. Cybern., vol. 50, no. 5, pp. 1856-1866, May 2020.
16.
X.-M. Zhang, Q.-L. Han, X. Ge and L. Ding, "Resilient control design based on a sampled-data model for a class of networked control systems under denial-of-service attacks", IEEE Trans. Cybern., vol. 50, no. 8, pp. 3616-3626, Aug. 2020.
17.
C. Peng, J. Li and M. Fei, " Resilient event-triggering h ∞ load frequency control for multi-area power systems with energy-limited dos attacks ", IEEE Trans. Power Syst., vol. 32, no. 5, pp. 4110-4118, Sep. 2017.
18.
C. Peng and H. Sun, "Switching-like event-triggered control for networked control systems under malicious denial of service attacks", IEEE Trans. Autom. Control, vol. 65, no. 9, pp. 3094-3103, Sep. 2020.
19.
X. Shao and D. Ye, "Fuzzy adaptive event-triggered secure control for stochastic nonlinear high-order mass subject to DoS attacks and actuator faults", IEEE Trans. Fuzzy Syst., Oct. 2020.
20.
T.-Y. Zhang and D. Ye, "Distributed secure control against denial-of-service attacks in cyber-physical systems based on K-connected communication topology", IEEE Trans. Cybern., vol. 50, no. 7, pp. 3094-3103, Jul. 2020.
21.
X.-M. Zhang et al., "Networked control systems: A survey of trends and techniques", IEEE/CAA J. Autom. Sinica, vol. 7, no. 1, pp. 1-17, Jan. 2020.
22.
T. Hoppe, S. Kiltz and J. Dittmann, "Security threats to automotive CAN networks—Practical examples and selected short-term countermeasures", Rel. Eng. Syst. Safety, vol. 96, no. 1, pp. 11-25, 2011.
23.
J. Liu, Y. Xiao, S. Li, W. Liang and C. L. P. Chen, "Cyber security and privacy issues in smart grids", IEEE Commun. Surveys Tuts., vol. 14, no. 4, pp. 981-997, 4th Quart. 2012.
24.
J. Jow, Y. Xiao and W. Han, "A survey of intrusion detection systems in smart grid", Int. J. Sens. Netw., vol. 23, no. 3, pp. 170-186, 2017.
25.
T. Mahjabin, Y. Xiao, T. Li and C. L. P. Chen, "Load distributed and benign-bot mitigation methods for IoT DNS flood attacks", IEEE Internet Things J., vol. 7, no. 2, pp. 986-1000, Feb. 2020.
26.
J. R. T. Lawton, R. W. Beard and B. J. Young, "A decentralized approach to formation maneuvers", IEEE Trans. Robot. Autom., vol. 19, no. 6, pp. 933-941, Dec. 2003.
27.
M. A. Lewis and K.-H. Tan, "High precision formation control of mobile robots using virtual structures", Auton. Robots, vol. 4, no. 4, pp. 387-403, 1997.
28.
X. Dong, B. Yu, Z. Shi and Y. Zhong, "Time-varying formation control for unmanned aerial vehicles: Theories and applications", IEEE Trans. Control Syst. Technol., vol. 23, no. 1, pp. 340-348, Jan. 2015.
29.
X. Wang, V. Yadav and S. N. Balakrishnan, "Cooperative UAV formation flying with obstacle/collision avoidance", IEEE Trans. Control Syst. Technol., vol. 15, no. 4, pp. 672-679, Jul. 2007.
30.
J. Wang and M. Xin, "Integrated optimal formation control of multiple unmanned aerial vehicles", IEEE Trans. Control Syst. Technol., vol. 21, no. 5, pp. 1731-1744, Sep. 2013.

Contact IEEE to Subscribe

References

References is not available for this document.