Your browser doesn't support javascript.
loading
Induced attack with prescribed consensus trajectory against multiagent systems.
Li, Junlong; Wang, Le; Xi, Jianxiang; Xia, Kehan; Gao, Jiuan; Zheng, Yuanshi.
Afiliación
  • Li J; Department of Physics, Lüliang University, Lüliang, 033000, PR China; High-Tech Institute of Xi'an, Xi'an, 710025, PR China.
  • Wang L; High-Tech Institute of Xi'an, Xi'an, 710025, PR China; School of Aerospace Engineering, Beijing Institute of Technology, Beijing, 100081, PR China.
  • Xi J; High-Tech Institute of Xi'an, Xi'an, 710025, PR China. Electronic address: xijx07@mails.tsinghua.edu.cn.
  • Xia K; High-Tech Institute of Xi'an, Xi'an, 710025, PR China.
  • Gao J; High-Tech Institute of Xi'an, Xi'an, 710025, PR China.
  • Zheng Y; Shaanxi Key Laboratory of Space Solar Power Station System, School of MechanoElectronic Engineering, Xidian University, Xian 710071, PR China.
ISA Trans ; 146: 274-284, 2024 Mar.
Article en En | MEDLINE | ID: mdl-38242734
ABSTRACT
This paper proposes a new induced attack strategy against multiagent systems from the perspective of the attacker. It is noted that the induced attack can drive multiagent systems as a whole to follow a specific trajectory prescribed by the attacker, which cannot be achieved by denial-of-service attacks or deception attacks. Firstly, the induced attack signal is produced by establishing an attack generation exosystem, whose dynamics can be regulated to generate the prescribed consensus trajectory. Then, by the local state information and the induced attack signal among partial agents, a new induced attack protocol is proposed, which consists of the nominal consensus term and the induced attack term. By constructing the projection of the induced attack signal onto the consensus subspace, an explicit expression of the prescribed consensus trajectory is determined, which describes the movement trajectory of the entire multiagent system under the induced attack. Meanwhile, the induced attack design criterion is proposed to determine the dynamics matrix of the attack generation exosystem via the robust H∞ scheme. Finally, the simulation example is performed to illustrate the effectiveness of theoretical results.
Palabras clave

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Idioma: En Revista: ISA Trans Año: 2024 Tipo del documento: Article Pais de publicación: Estados Unidos

Texto completo: 1 Colección: 01-internacional Base de datos: MEDLINE Idioma: En Revista: ISA Trans Año: 2024 Tipo del documento: Article Pais de publicación: Estados Unidos