Attack-resilient distributed formation control via online adaptation

This paper investigates a distributed formation control problem in an operator-vehicle network where each vehicle is remotely controlled by an operator. Each operator-vehicle pair is attacked by an adversary, who corrupts the commands sent from the operator to the vehicle following a partially unknown strategy. We propose a novel distributed control algorithm that allows operators to adapt their policies online by exploiting the latest collected information about adversaries. The algorithm enables vehicles to asymptotically achieve the desired formation from any initial configuration and initial estimate of the adversaries' strategies. It is shown that the sequence of the distances to the desired formation is summable. A numerical example is provided to illustrate the performance of the algorithm. In particular, we observe that the rate of convergence to the desired formation is exponential, outperforming our theoretical result.

[1]  Karl Henrik Johansson,et al.  Cyber security analysis of state estimators in electric power systems , 2010, 49th IEEE Conference on Decision and Control (CDC).

[2]  Tamer Basar,et al.  Optimal control in the presence of an intelligent jammer with limited actions , 2010, 49th IEEE Conference on Decision and Control (CDC).

[3]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[4]  Ruggero Carli,et al.  Distributed Estimation and False Data Detection with Application to Power Networks , 2011, ArXiv.

[5]  Bruno Sinopoli,et al.  Foundations of Control and Estimation Over Lossy Networks , 2007, Proceedings of the IEEE.

[6]  João Pedro Hespanha,et al.  Stabilization of nonlinear systems with limited information feedback , 2005, IEEE Transactions on Automatic Control.

[7]  Wei Zhang,et al.  Stability of networked control systems: explicit analysis of delay , 2000, Proceedings of the 2000 American Control Conference. ACC (IEEE Cat. No.00CH36334).

[8]  Nicola Elia,et al.  Stabilization of linear systems with limited information , 2001, IEEE Trans. Autom. Control..

[9]  M. Dufwenberg Game theory. , 2011, Wiley interdisciplinary reviews. Cognitive science.

[10]  John S. Baras,et al.  A Trust Based Distributed Kalman Filtering Approach for Mode Estimation in Power Systems , 2010 .

[11]  Robin J. Evans,et al.  Topological feedback entropy and Nonlinear stabilization , 2004, IEEE Transactions on Automatic Control.

[12]  S. Shankar Sastry,et al.  Safe and Secure Networked Control Systems under Denial-of-Service Attacks , 2009, HSCC.

[13]  Vijay Gupta,et al.  On Stability in the Presence of Analog Erasure Channel Between the Controller and the Actuator , 2010, IEEE Transactions on Automatic Control.

[14]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[15]  Jorge Cortés,et al.  Global and robust formation-shape stabilization of relative sensing networks , 2009, Autom..

[16]  William B. Dunbar,et al.  Distributed receding horizon control for multi-vehicle formation stabilization , 2006, Autom..

[17]  Robin J. Evans,et al.  Feedback Control Under Data Rate Constraints: An Overview , 2007, Proceedings of the IEEE.

[18]  Vijay Gupta,et al.  On stability in the presence of analog erasure channels , 2008, 2008 47th IEEE Conference on Decision and Control.

[19]  Daniel Liberzon,et al.  Quantized feedback stabilization of linear systems , 2000, IEEE Trans. Autom. Control..

[20]  Tamer Basar,et al.  Graph-theoretic approach for connectivity maintenance in mobile networks in the presence of a jammer , 2010, 49th IEEE Conference on Decision and Control (CDC).

[21]  Minghui Zhu,et al.  Stackelberg-game analysis of correlated attacks in cyber-physical systems , 2011, Proceedings of the 2011 American Control Conference.

[22]  Brian D. O. Anderson,et al.  Reaching a Consensus in a Dynamically Changing Environment: Convergence Rates, Measurement Delays, and Asynchronous Events , 2008, SIAM J. Control. Optim..

[23]  Bruno Sinopoli,et al.  False Data Injection Attacks in Electricity Markets , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[24]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[25]  John S. Baras,et al.  Game Theoretic Modeling of Malicious Users in Collaborative Networks , 2008, IEEE Journal on Selected Areas in Communications.

[26]  B. Pasik-Duncan,et al.  Adaptive Control , 1996, IEEE Control Systems.

[27]  Dragan Nesic,et al.  Input-output stability properties of networked control systems , 2004, IEEE Transactions on Automatic Control.

[28]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[29]  Panos J. Antsaklis,et al.  Risk-sensitive control under a class of denial-of-service attack models , 2011, Proceedings of the 2011 American Control Conference.

[30]  Chase Qishi Wu,et al.  A Survey of Game Theory as Applied to Network Security , 2010, 2010 43rd Hawaii International Conference on System Sciences.

[31]  Jie Lin,et al.  Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..

[32]  Bruno Sinopoli,et al.  Secure control against replay attacks , 2009, 2009 47th Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[33]  Emanuele Garone,et al.  False data injection attacks against state estimation in wireless sensor networks , 2010, 49th IEEE Conference on Decision and Control (CDC).

[34]  Tansu Alpcan,et al.  Network Security , 2010 .

[35]  Xavier Litrico,et al.  Stealthy deception attacks on water SCADA systems , 2010, HSCC '10.

[36]  Randal W. Beard,et al.  Distributed Consensus in Multi-vehicle Cooperative Control - Theory and Applications , 2007, Communications and Control Engineering.

[37]  S. Shankar Sastry,et al.  Security of interdependent and identical networked control systems , 2013, Autom..

[38]  F. Paganini,et al.  Global stability with time-delay in network congestion control , 2002, Proceedings of the 41st IEEE Conference on Decision and Control, 2002..

[39]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[40]  S Bhattacharya,et al.  Game-theoretic analysis of an aerial jamming attack on a UAV communication network , 2010, Proceedings of the 2010 American Control Conference.