Research article Special Issues

Adaptive fuzzy fixed time formation control of state constrained nonlinear multi-agent systems against FDI attacks


  • In this manuscript, based on nonlinear multi-agent systems (MASs) with full state constraints and considering security control problem under false data injection (FDI) attacks, the fixed-time formation control (FTFC) protocol was designed, which can ensure that all agents follow the required protocol within a fixed time. Fuzzy logic system (FLS) was used to compensate and approximate the uncertain function, which improved safety and robustness of the formation process. Finally, the fixed-time theory and Lyapunov stability theory were addressed to prove the effectiveness of the proposed method, and simulation examples verified the effectiveness of the theory.

    Citation: Jinxin Du, Lei Liu. Adaptive fuzzy fixed time formation control of state constrained nonlinear multi-agent systems against FDI attacks[J]. Mathematical Biosciences and Engineering, 2024, 21(3): 4724-4741. doi: 10.3934/mbe.2024207

    Related Papers:

    [1] Qiushi Wang, Hongwei Ren, Zhiping Peng, Junlin Huang . Dynamic event-triggered consensus control for nonlinear multi-agent systems under DoS attacks. Mathematical Biosciences and Engineering, 2024, 21(2): 3304-3318. doi: 10.3934/mbe.2024146
    [2] Siyu Li, Shu Li, Lei Liu . Fuzzy adaptive event-triggered distributed control for a class of nonlinear multi-agent systems. Mathematical Biosciences and Engineering, 2024, 21(1): 474-493. doi: 10.3934/mbe.2024021
    [3] Tianqi Yu, Lei Liu, Yan-Jun Liu . Observer-based adaptive fuzzy output feedback control for functional constraint systems with dead-zone input. Mathematical Biosciences and Engineering, 2023, 20(2): 2628-2650. doi: 10.3934/mbe.2023123
    [4] Yuhang Yao, Jiaxin Yuan, Tao Chen, Xiaole Yang, Hui Yang . Distributed convex optimization of bipartite containment control for high-order nonlinear uncertain multi-agent systems with state constraints. Mathematical Biosciences and Engineering, 2023, 20(9): 17296-17323. doi: 10.3934/mbe.2023770
    [5] Dongxiang Gao, Yujun Zhang, Libing Wu, Sihan Liu . Fixed-time command filtered output feedback control for twin-roll inclined casting system with prescribed performance. Mathematical Biosciences and Engineering, 2024, 21(2): 2282-2301. doi: 10.3934/mbe.2024100
    [6] Sai Zhang, Li Tang, Yan-Jun Liu . Formation deployment control of multi-agent systems modeled with PDE. Mathematical Biosciences and Engineering, 2022, 19(12): 13541-13559. doi: 10.3934/mbe.2022632
    [7] Chao Wang, Cheng Zhang, Dan He, Jianliang Xiao, Liyan Liu . Observer-based finite-time adaptive fuzzy back-stepping control for MIMO coupled nonlinear systems. Mathematical Biosciences and Engineering, 2022, 19(10): 10637-10655. doi: 10.3934/mbe.2022497
    [8] Na Zhang, Jianwei Xia, Tianjiao Liu, Chengyuan Yan, Xiao Wang . Dynamic event-triggered adaptive finite-time consensus control for multi-agent systems with time-varying actuator faults. Mathematical Biosciences and Engineering, 2023, 20(5): 7761-7783. doi: 10.3934/mbe.2023335
    [9] Yan Zhao, Jianli Yao, Jie Tian, Jiangbo Yu . Adaptive fixed-time stabilization for a class of nonlinear uncertain systems. Mathematical Biosciences and Engineering, 2023, 20(5): 8241-8260. doi: 10.3934/mbe.2023359
    [10] Chaoyue Wang, Zhiyao Ma, Shaocheng Tong . Adaptive fuzzy output-feedback event-triggered control for fractional-order nonlinear system. Mathematical Biosciences and Engineering, 2022, 19(12): 12334-12352. doi: 10.3934/mbe.2022575
  • In this manuscript, based on nonlinear multi-agent systems (MASs) with full state constraints and considering security control problem under false data injection (FDI) attacks, the fixed-time formation control (FTFC) protocol was designed, which can ensure that all agents follow the required protocol within a fixed time. Fuzzy logic system (FLS) was used to compensate and approximate the uncertain function, which improved safety and robustness of the formation process. Finally, the fixed-time theory and Lyapunov stability theory were addressed to prove the effectiveness of the proposed method, and simulation examples verified the effectiveness of the theory.



    Recently, with the continuous progress of information technology and the rapid development of artificial intelligence and swarm intelligence theory, the control technology of multi-agent system (MASs) has become a hot research direction[1,2,3]. MASs are networks composed of multiple cooperating agents, which can jointly solve complex problems and provide innovative solutions. With the wide application of MASs in various fields, distributed control of MASs has attracted much attention, mainly including consensus control[4], formation control[5,6,7,8], containment control[9,10], etc. Nevertheless, in some practical systems, especially in MASs, there are generally complex nonlinearities and uncertainties that can't be ignored, so the study of nonlinear MASs is of great essence. Because of the existence of nonlinear dynamics, the control problem of nonlinear MASs has become a challenge.

    In the field of nonlinear multi-agent control, the key of control is to influence the behavior of the whole system by adjusting the interaction between each agent, and then achieve the control goal in a specific time scale. At present, finite-time control[11,12,13], fast finite-time control[14,15], fixed-time control[16,17,18,19] and other methods have attracted the attention of many scholars, Cao et al. proposed finite-time control protocols in MASs consensus control in [11], and Du et al. designed a fixed-time consensus control protocol in heterogeneous MASs[17]. Fixed-time control means that the system can reach the required state or goal within a predetermined fixed time. Compared with traditional control methods, fixed-time control could keep the stability and performance within a predetermined time and is not affected by the initial conditions and external disturbances of the system. It was applied in mechanical control, robot control, power system, etc. In addition, with the increasing requirements and limitations in the controlled system and the improvement of system modeling, scholars have proposed various control algorithms and methods, such as sliding mode control [20], adaptive control [21], reinforcement learning[22,23], and iterative learning control [24], to cope with the challenges of complex and nonlinear systems.

    Constraint problems in control systems have become one of the hot research directions[25]. These constraints may involve state constraints[25,26,27], input constraints[28,29], output constraints[30], etc. Due to the constraints in actual systems, many scholars hammered at formation control and constraint problems of MASs, and they certainly made progress in the theoretical research levels. In the research of MASs formation problem, similar to social networks[31], the relationships between agents are complex. Agents need to be able to perceive the surrounding environment, including detecting the presence and position information of other neighbor agents, complete the coordination and control of complex tasks, and maintain predetermined geometric configurations. However, there are often more complex external conditions and human factors in practical applications.

    At present, the security control problem of the control system under the complex network has been a concern, and the most typical attacks are the attacks in control system. Common malicious attacks include FDI attacks[10,32,33,34], replay attacks[35], cyber attacks[36], and denial of service (DOS) attacks[37,38,39,40]. Among these, FDI attack is a kind of network attack method with strong damage ability to system stability where attackers inject false data into the network to change the state and destroy the stability of the systems. Miao et al. studied the control problem under attack and constraints in cyber-physical systems in [32], and Jiang et al. studied the tracking control problem under attack conditions based on MASs[33].

    Considering the universality and destructiveness in practical applications, many scholars are devoted to the study of FDI attacks. Nontheless, there are still few studies on the FDI attacks in the formation control of nonlinear MASs. Therefore, we realize the FTFC of nonlinear MASs under FDI attacks is required and it has more practical application reference value. This paper innovates from the following aspects:

    1) Compared with previous control strategies, the FTFC for MASs with full state constraints proposed in this article takes FDI attacks into account. In dealing with the state constraint problem, a novel nonlinear transformation method is employed to transform the system state to an unconstrained state.

    2) Integrating backstepping techniques with FTFC strategies, the designed controller can achieve stability during the attack period, and the attack coefficient can also be effectively compensated.

    Define Ξ=(υ,ε,A) being a weighted-undirected graph in communication network, with a cluster of nodes υ={v1,v2,,vN}, a cluster of edges ε{(vi,vj):vi,vjυ}, and A=[aij]Rn×n representing the adjacency matrix. In the undirected graph Ξ, an edge (vi,vj) is expressed as vij=(vi,vj),ij, and it means that the jth agent is able to deliver the message to the ith agent. The Laplacian matrix L=[lij]Rn×n, associated with the undirected graph Ξ, is structured as

    L=[lij]=DA

    where D=diag{d1,,dn}=diag{nj=1a1j,,nj=1anj}.

    Consider the nonlinear MASs as

    {˙xi,m=xi,m+1+fi,m(ˉxi,m)˙xi,q=ui+fi,q(ˉxi,q)yi=xi,1 (2.1)

    where ˉxi,m=[xi,1,,xi,m]TRm and ˉxi,q=[xi,1,,xi,q]TRq represent state vector of the ith follower, i=1,,P, m=1,,q1, ui and yi are the control input and output of the ith follower, and fi,m(ˉxi,m) and fi,q(ˉxi,q) are both unknown smooth nonlinear functions.

    Definition 1: Consider state-dependent parameterized FDI attacks model as

    xi,r = xi,r+ζs(xi,r,t) (2.2)

    where xi,r denotes the state destroyed by FDI attacks, ζs(xi,r,t) represents the FDI attacks into xi,r, ζs(xi,r,t) is parameterized as ζs(xi,r,t)=ςs(t)xi,r, and ςs(t) represents the unknown and time-varying signals. The transformed state is denoted as xi,r=κs(t)xi,r, κs(t)=(1+ςs(t))1.

    The dynamic of the leader is scaled as

    {˙xl,m=xl,m+1˙xl,q=ulyl=xl,1 (2.3)

    Consider the case of being attacked, which is modeled as

    yl=κs(t)yl (2.4)

    Remark 1: The FDI attacks in this paper targets MASs and occurs in both leader and follower agents.

    Definition 2: Given any initial formation tracking errors xi(t0)xl(t0)hiR, one has

    limtt0+Txi(t)xl(t)i=0, tt0+T (2.5)

    where T denotes the settling time for secure fixed-time formation tracking control, and i=[hi,1,,hi,m]TRm represents the anticipated position vector between the ith agent and the leader.

    Remark 2: The time-varying structure hi of MASs in the paper is bounded, and its time derivative exists, that is, there exist ˆhi and ˉhi such that |hi|<ˆhi, |˙hi|<ˉhi. Moreover, when hi=0, the formation control in this paper can be transformed into consensus tracking control.

    Assumption 1 [32]: For the false data ζs(xi,r,t), there exists ˉζs, satisfying: ζs(xi,m,t)<ˉζi, and the signals ςs(t) are positive and meet the following conditions: ςs<ςs(t)<ˉςs, ςs and ˉςs stand by the unknown constants, the coefficient of attack κs(t) is bounded, and |κs(t)|ˉκs.

    Assumption 2: There exists an edge at least between each follower and the leader (root).

    Lemma 1 [3]: The undirected graph Ξ is connected if, and only if, the Laplacian matrix is irreducible.

    Lemma 2 [18]: In continuously normalized and radiationally unconstrained functions V(Z), for any Z(t)R, satisfy: V(Z)σVι(Z)υVτ(Z), where σ>0, υ>0, ι>1, 0<τ<1 are constants and the system can achieve fixed-time stability within T=1υ(1τ)+1σ(1ι).

    Lemma 3 [28]: For any variables ˉa, ˉb and positive constants ϑ1, ϑ2, and ϑ3, one has

    |ˉa|ϑ1|ˉb|ϑ2ϑ1ϑ1+ϑ2ϑ3|ˉa|ϑ1+ϑ2+ϑ2ϑ1+ϑ2ϑ3ϑ1ϑ2|ˉb|ϑ1+ϑ2 (2.6)

    Lemma 4 [41]: For any λiR, the inequalities hold

    Qj=1|λi|m{(Qj=1|λi|)m0<m1Q1m(Qj=1|λi|)m1<m<+ (2.7)

    Lemma 5 [12]: ω(x) denotes a continuous but unknown function, and the domain is the compact set γ. For constant θ>0, the FLS f(x)=WTΨ(x) satisfy the following:

    supxν|ω(x)WTΨ(x)|θ (2.8)

    where x=(x1,x2,,xq)T, Ψ(x)=[Ψ1(x),Ψ2(x),,ΨL(x)]T, Ψp(x) is the fuzzy basis function, and W=[W1,,WP]T stands by the ideal weight vector.

    Control objective: The principal objective of this article is to devise adaptive fuzzy FTFC controllers such that MASs with full state constraints satisfy the following:

    1) Each follower in MASs can achieve fixed-time formation control in the case of FDI attacks.

    2) The states of MASs are all bounded by the constraints and the closed-loop signals of the system are bounded.

    The coordinates are converted as

    zi,m=xi,mk2cx2i,m (3.1)

    where kc denotes known smooth constants constraints on xi,m, |xi,m|<kc and define Φi,m=k2cx2i,m, μi,m=(k2c+x2i,m)/(k2cx2i,m)2.

    The formation tracking error is determined as

    ei,m=Nij=1aij((zi,mhi)(zj,mhj))+bi(zi,mhiα0) (3.2)
    ei,m=zi,mκsαi,m1Φi,m (3.3)
    α0=ylk2cy2l (3.4)

    Step 1: The constrained system under attack can be constructed as

    zi,1=xi,1k2cx2i,1 (3.5)

    According to (3.1), take the derivative with respect to zi,1, and one has

    ˙zi,1=μi,1˙xi,1 = μi,1(xi,2+fi,1(ˉxi,1)) (3.6)

    where μi,1=k2c+x2i,1/(k2cx2i,1)2.

    The formation tracking errors are defined as

    ei,1=Nij=1aij((zi,1hi)(zj,1hj))+bi(zi,1hiα0) (3.7)

    then, one has

    E=(L+B)(ZfiINyl) (3.8)

    where E=[ei,1,,eP,1]TRP, Zf=[zi,1,,zP,1]T.

    The unknown nonlinear function is defined as

    Gi,1(Mi,1)=μi,1fi,1(ˉxi,1)μl˙yl (3.9)

    From the FLSs, it follows that

    Gi,1(Mi,1)=WTi,1Ψi,1(Mi,1)+εi,1(Mi,1) (3.10)

    where Ψi,1(Mi,1)Rυm stands by fuzzy basis function vector, υm denotes the numbers of fuzzy rules, Wi,mˉWi,m, |εi,m(Mi,m)|ˉεi,m, and m=1,2,q.

    Define

    V1=12ET(L+B)1E+Pi=112υi,1˜ω2i,1+Pi=112ϖi,1˜κ2s (3.11)

    where ˜ωi,m=ωi,mˆωi,m, ˆωi,m stands by the estimation of ωi,m, ˜κs=κsˆκs, ˆκs stands by the estimation of κs, υi,1=2φi,1/(2φi,11), and ϖi,1=2ψi,1/(2ψi,11).

    Take the derivative of V1, and it obtains

    ˙V1=Pi=1(ei,1(˙zi,1˙hiμl˙yl)1υi,1˜ωi,1˙ˆωi,11ϖi,1˜κs˙ˆκs)=Pi=1(ei,1(μi,1Φi,2ei,2+1κsμi,1αi,1˙hi+WTi,1Ψi,1+εi,1)1υi,1˜ωi,1˙ˆωi,11ϖi,1˜κs˙ˆκs) (3.12)

    According to Young's inequality,

    ei,1WTi,1Ψi,112d2i,1+12d2i,1ˉW2i,1ΨTi,1Ψi,1e2i,1 (3.13)
    ei,1εi,114e2i,1+ˉε2i,1 (3.14)
    ei˙hi14e2i+ˉh2i (3.15)

    where di,j represents the positive design parameter.

    The virtual controller is designed as

    αi,1=1μi,1(ei,12+ΨTi,1Ψi,12d2i,1ei,1ˆωi,1+ci,1eγ1i,1+ˉci,1eγ2i,1) (3.16)

    Substituing (3.13)–(3.16) into (3.12), one has

    ˙V1Pi=1(μi,1Φi,2ei,1ei,2ci,1eγ1i,1ˉci,1eγ2i,11υi,1˜ωi,1(˙ˆωi,1ΨTi,1Ψi,12d2i,1e2i,1)+1ϖi,1˜κi,1˙ˆκi,1+Δi,1) (3.17)

    where Δi,1=12d2i,1+ˉε2i,1+ˉh2i.

    Step p(2pq1): The derivative of ei,p is scaled as

    ˙ei,p=˙zi,p(κsαi,p1Φi,p) (3.18)

    The unknown nonlinear function is defined as

    Gi,p(Mi,p)=μi,pfi,p(ˉxi,p)(κsαi,p1Φi,p) (3.19)

    From the FLSs, it obtains

    Gi,p(Mi,p)=WTi,pΨi,p(Mi,p)+εi,p(Mi,p) (3.20)

    where Mi,p=[xi,1,,xi,p,ˆωi,1,,ˆωi,p1]T, Ψi,p(Mi,p) stands for fuzzy basis function, WTi,p denotes the optimal weight vector, and εi,p(Mi,p) denotes the error of approximation.

    The Lyapunov function is chosen as

    Vp=Vp1+Pi=112e2i,p+Pi=112υi,p˜ω2i,p+Pi=112ϖi,p˜κ2s (3.21)

    Take the derivative of (3.21), and it obtains

    ˙Vp=˙Vp1+Pp+1i=1(μi,pΦi,p+1ei,pei,p+1+ei,p(1κsμi,pαi,p+WTi,pΨi,p+εi,p)1υi,p˜ωi,p˙ˆωi,p1ϖi,p˜κs˙ˆκs) (3.22)

    According to Young's inequality,

    ei,pWTi,pΨi,p12d2i,p+12d2i,pˉW2i,pΨTi,pΨi,pe2i,p (3.23)
    ei,pεi,p12e2i,p+12ˉε2i,p (3.24)

    The virtual controller is

    αi,p=1μi,p(μi,p1Φi,pei,p1+ei,p2+ΨTi,pΨi,p2d2i,pei,pˆωi,p+ci,peγ1i,p+ˉci,peγ2i,p) (3.25)
    ˙Vpp1m=1Pi=1(ci,me1+γ1i,mˉci,me1+γ2i,m1υi,p˜ωi,m(˙ˆωi,mΨTi,mΨi,m2d2i,me2i,m)1ϖi,p˜κs˙ˆκs+Δi,p)+pm=1μi,p1Φi,pei,p1ei,p (3.26)

    Step q: Derivation of ei,q is scaled as

    ˙ei,q=μi,q(ui+fi,q(ˉxi,q))(κsαi,q1Φi,q) (3.27)

    The unknown nonlinear function is defined as

    Gi,q(Mi,q)=μi,qfi,q(ˉxi,q)(κsαi,q1Φi,q) (3.28)

    From the FLSs, it obtains

    Gi,q(Mi,q)=WTi,qΨi,q(Mi,q)+εi,q(Mi,q) (3.29)

    where Mi,q=[xi,1,,xi,q,ˆωi,1,,ˆωi,q1]T, Ψi,q(Mi,q) stands for fuzzy basis function, WTi,q denotes the optimal weight vector, and εi,q(Mi,q) denotes the error of approximation.

    Choose the Lyapunov function

    Vq=Vq1+Pi=112e2i,q+Pi=112υi,q˜ω2i,q+Pi=112ϖi,q˜κ2s (3.30)

    The actual controller is derived as

    ui=1μi,q(μi,q1Φi,qei,q1+ei,q2+ΨTi,qΨi,q2d2i,qei,qˆωi,q+ci,qeγ1i,q+ˉci,qeγ2i,q) (3.31)

    The adaptive law of design parameters is

    ˙ˆωi,m=υi,mσi,mˆωi,m+υi,mΨTi,mΨi,me2i,m2d2i,m (3.32)
    ˙ˆκs=ϖi,mri,mˆκs (3.33)

    where σi,m and ri,m are design positive constants.

    We then obtain

    ˙Vqqm=1Pi=1(ci,me1+γ1i,mˉci,me1+γ2i,m+σi,m˜ωi,mˆωi,m+ri,m˜κsˆκs)+Δm (3.34)

    where Δm=qm=1Pi=1Δi,m.

    Theorem 1: For the high order MASs (2.1) with full state constraints under FDI attacks (2.2), with Assumptions 1–2, design virtual controllers (3.16) and (3.25), actual controllers (3.31), and choosing adaptation laws (3.32) and (3.33), boundedness of the MASs state can be achieved and the formation tracking error can fluctuate around zero with FTFC.

    Proof of the Theorem 1:

    Substituing (3.11), (3.21), and (3.30), we have

    Vq=12ET(L+B)1E+qm=2Pi=112e2i,m+qm=1Pi=112υi,m˜ω2i,m+qm=1Pi=112ϖi,m˜κ2s (3.35)

    From Young's inequality,

    σi,m˜ωi,mˆωi,mσi,mυi,m˜ω2i,m+φi,mσi,m2ω2i,m (3.36)
    ri,m˜κsˆκsri,mϖi,m˜κ2s+ri,mψi,m2κ2s (3.37)

    then we get

    ˙Vqqm=1Pi=1σi,m(˜ω2i,m2υi,m)1+γ12+a(qm=1Pi=1(˜ω2i,m2υi,m)1+γ22)+ˉΔi,qaqm=1Pi=1˜ω2i,m2υi,m+qm=1Pi=1ri,m(˜κ2s2ϖi,m)1+γ12qm=1Pi=1ri,m2ϖi,m˜κ2sa(qm=1Pi=1((e2i,m)1+γ12+(˜ω2i,m)1+γ12+(˜κ2s)1+γ12))b(qm=1Pi=1((e2i,m)1+γ22+(˜ω2i,m)1+γ22+(˜κ2s)1+γ22))+bqm=1Pi=1(˜κ2s2ϖi,m)1+γ22bqm=1Pi=1ri,m2ϖi,m˜κ2sqm=1Pi=1σi,m2υi,m˜ω2i,m (3.38)

    where ˉΔi,q=qm=1Pi=1(ri,mψi,m2κ2s+φi,mσi,m2ω2i,m).

    Thus, one obtains

    a=min{ci,m,σi,m(1/2υi,m)1+γ12,ri,m(1/2ϖi,m)1+γ12,σi,m} (3.39)
    b=min{ˉci,m, σi,m(1/2υi,m)1+γ22,ri,m(1/2ϖi,m)1+γ22,ri,m} (3.40)

    From Lemma 3, we get

    qm=1Pi=1(˜ω2i,m2υi,m)1+γ22qm=1Pi=1(˜ω2i,m2υi,m)+Λ1 (3.41)
    qm=1Pi=1(˜κ2s2ϖi,m)1+γ22qm=1Pi=1(˜κ2s2ϖi,m)+Λ1 (3.42)

    where Λ1 = (1γ22)(1+γ22)1+γ21γ2 Define cr=max{λmax[(L+B)1],12,12υi,m,12ϖi,m}

    Vqcr(qm=2Pi=1e2i,m+qm=1Pi=1˜ω2i,m+qm=1Pi=1˜κ2s) (3.43)
    Vq1+γ12cs(qm=2Pi=1e1+γ1i,m+qm=1Pi=1˜ω1+γ1i,m+qm=1Pi=1˜κ1+γ1s) (3.44)

    From Lemma 4, one has

    Vq1+γ22ˉcs(qm=2Pi=1e1+γ2i,m+qm=1Pi=1˜ω1+γ2i,m+qm=1Pi=1˜κ1+γ2s) (3.45)

    where cs=3γ112c1+γ12r, ˉcs=c1+γ22r.

    From above, we get

    ˙Vq1Vγq2Vˉγq+qm=1Pi=1(σi,m(˜ω2i,m2υi,m)1+γ12σi,m2υi,m˜ω2i,m)+qm=1Pi=1(ri,m(˜κ2s2ϖi,m)1+γ12ri,m2ϖi,m˜κ2s)+Λ0 (3.46)

    where 1=acs>0, 2=bˉcs>0, 0<ˉγ=1+γ22<1, γ=1+γ12>1, Λ0=ˉΔi,q+aΛ1+bΛ1.

    Suppose that there are unknown constants Γi,m and Πi,m, which satisfy: |˜ωi,m|Γi,m, |˜κs|Πi,m

    If Γi,m<2υi,m, one has

    qm=1Pi=1(σi,m(˜ω2i,m2υi,m)1+γ12σi,m2υi,m˜ω2i,m)<0 (3.47)

    With Γi,m2υi,m, one obtains

    qm=1Pi=1(σi,m(˜ω2i,m2υi,m)1+γ12σi,m2υi,m˜ω2i,m)Ξ1 (3.48)

    where Ξ1=qm=1Pi=1σi,m(Γ2i,m2υi,m)1+γ12σi,m2υi,mΓ2i,m

    If Πi,m<2ϖi,m, it gets

    qm=1Pi=1(ri,m(˜κ2s2ϖi,m)1+γ12ri,m2ϖi,m˜κ2s)<0 (3.49)

    If Πi,m2ϖi,m, one obtains

    qm=1Pi=1(ri,m(˜κ2s2ϖi,m)1+γ12ri,m2ϖi,m˜κ2s)Ξ2 (3.50)

    where Ξ2=qm=1Pi=1ri,m(Π2i,m2ϖi,m)1+γ12ri,m2ϖi,mΠ2i,m.

    Through all above, it can be obtained that

    ˙Vq1Vγq2Vˉγq+ˉΛ0 (3.51)

    To sum up, all the states of MASs are bounded within T1/2(1β)(1ˉγ)+1/1(γ1), and β denotes a constant that satisfies: ˉΛ02βVˉγq.

    Remark 3: The MASs in this paper are full state constrained, xi,m satisfying kc<xi,m<kc, and since zi,m is bounded, the states are all in a compact set.

    In this section, MASs consist of the leader and 4 followers, and the adjacency matrix A represents

    A=(0101101001011010) (4.1)

    The relationships between leader and followers are B=diag{1,0,0,0}, and the Laplacian matrix is in the form of

    L=(2101121001211012). (4.2)

    Figure 1 shows the communication topology of MASs.

    Figure 1.  Communication topology.

    The followers are modeled as

    {˙xi,1=0.1sin(xi,1)+xi,2˙xi,2=0.1sin(xi,1)xi,2+uiyi=xi,1i=1,2,3,4 (4.3)

    where the state of systems satisfies: |xi,1|<kc1=0.7, |xi,2|<kc2=1.9.

    The leader trajectory is xl.1=0.8sin(2.5t), and the formation coefficient is h1=h2=h3=h4=2.2cos(2.5t). The fuzzy membership function is set as μPFi1=exp[(zi,1+0.25P)2(zi,2+0.25P)2], μPFi2=exp[(zi,1+0.25P)2(zi,2+0.25P)2-(xl,1+0.25P)2(˙xl,1+0.25P)2-(¨xl,1+0.25P)2], selecting attack weight ςs(t)=0.180.42cos(t) and the initial value is xi,1(0)=0, xi,2(0)=0.45, ωi,j(0)=0. κi,j(0)=0. The design parameters are set as γ1=1.3, γ2=0.9, di,j=1.5, σi,j=2.5, ri,j=2, ci,1=0.1, ci,2=20, ˉc1,1=ˉc2,1=5, ˉc3,1=ˉc4,1=0.1, ˉci,2=0.1, i=1,2,3,4, j=1,2.

    The simulation results are shown in Figure 2 to Figure 7. The follower agents in Figure 2 can maintain the predetermined formation trajectory in the constrained state, and the tracking effects meet expectation and conform to the constraint range. The state output of the agents are shown in Figure 3, which conform to the constraint bound. Figures 4 and 5 illustrate the control inputs of the four groups of agents. Figure 6 illustrates the tracking error of the agents, and it can be seen that the tracking errors of the agents stably converge around zero. Figure 7 shows the state error of the formation process, and the convergence effect reaches the expected standard. During the simulation, the FDI attacks time is set within 5-15s, and the proposed method can still maintain the stability of MASs formation control after FDI attacks.

    Figure 2.  The output signal of agents under FDI attacks.
    Figure 3.  The states of agents under FDI attacks.
    Figure 4.  The control inputs of agent 1 and 2.
    Figure 5.  The control inputs of agent 3 and 4.
    Figure 6.  Tracking error of the agents.
    Figure 7.  State error of the agents.

    In this paper, for the nonlinear MASs with full state constraints, the fixed-time formation strategy is proposed under FDI attacks conditions, the coordinate transformation is used to deal with the attacks state and the system state constraints, the nonlinear transformation method is used to remove the influence between the full state constraints and topological relations, and the FLS is used to approximate the uncertain function. An adaptive fuzzy fixed-time formation controller is designed based on backstepping method, and the effectiveness of the controller is verified by simulation examples. In the following work, we will work on MASs formation control under complex types of attacks.

    The authors stated that no artificial intelligence (AI) tools were used at the time of writing this article.

    This work was supported in part by the National Natural Science Foundation of China under Grants 62333009, in part by the Liaoning Revitalization Talents Program under Grant XLYC2202014, and in part by the Key Projects in Liaoning Province under Grant JYTZD2023085.

    The authors declare that there is no competing financial interest or personal relationship that could have appeared to influence the work reported in this paper.



    [1] X. W. Dong, G. Q. Hu, Time-varying formation control for general linear multi-agent systems with switching directed topologies, Automatica, 73 (2016), 47–55. https://doi.org/10.1016/j.automatica.2016.06.024 doi: 10.1016/j.automatica.2016.06.024
    [2] T. Guo, J. Han, C. Zhou, J. Zhou, Multi-leader-follower group consensus of stochastic time-delay multi-agent systems subject to Markov switching topology, Math. Biosci. Eng., 19 (2022), 7504–7520. https://doi.org/10.3934/mbe.2022353 doi: 10.3934/mbe.2022353
    [3] H. Q. Hou, Y. J. Liu, J. Lan, L. Liu, Adaptive fuzzy fixed time time-varying formation control for heterogeneous multiagent systems with full state constraints, IEEE Trans. Fuzzy Syst., 31 (2022), 1152–1162. https://doi.org/10.1109/TFUZZ.2022.3195609 doi: 10.1109/TFUZZ.2022.3195609
    [4] L. Wang, J. Dong, C. Xi, Event-triggered adaptive consensus for fuzzy output-constrained multi-agent systems with observers, J. Frankl. Inst., 19 (2022), 7504–7520. https://doi.org/10.1016/j.jfranklin.2019.09.033 doi: 10.1016/j.jfranklin.2019.09.033
    [5] Q. Shi, T. S. Li, J. Q. Li, C. L. P. Chen, Y. Xiao, Q. H. Shan, Adaptive leader-following formation control with collision avoidance for a class of second-order nonlinear multi-agent systems, Neurocomputing, 350 (2019), 282–290. https://doi.org/10.1016/j.neucom.2019.03.045 doi: 10.1016/j.neucom.2019.03.045
    [6] S. Zhang, L. Tang, Y. J. Liu, Formation deployment control of multi-agent systems modeled with PDE, Math. Biosci. Eng., 19 (2022), 13541–13559. https://doi.org/10.3934/mbe.2022632 doi: 10.3934/mbe.2022632
    [7] S. Zhao, Affine formation maneuver control of multiagent systems, IEEE Trans. Autom. Control, 63 (2018), 4140–4155. https://doi.org/10.1109/TAC.2018.2798805 doi: 10.1109/TAC.2018.2798805
    [8] Y. Yang, Y. Xiao, T. S. Li, Attacks on formation control for multiagent systems, IEEE Trans. Cybern., 52 (2022), 12805–12817. https://doi.org/10.1109/TCYB.2021.3089375 doi: 10.1109/TCYB.2021.3089375
    [9] H. Liu, G. Xie, L. Wang, Necessary and sufficient conditions for containment control of networked multi-agent systems, Automatica, 48 (2012), 1415–1422. https://doi.org/10.1016/j.automatica.2012.05.010 doi: 10.1016/j.automatica.2012.05.010
    [10] H. Chu, S. Gorbachev, D. Yue, C. Dou, Output formation containment for multiagent systems under multipoint multipattern FDI attacks: A resilient impulsive compensation control approach, IEEE Trans. Cybern., (2023), 1–12. https://doi.org/10.1109/TCYB.2023.3319647 doi: 10.1109/TCYB.2023.3319647
    [11] Y. Cao, W. Ren, Finite-time consensus for multi-agent networks with unknown inherent nonlinear dynamics, Automatica, 50 (2014), 2648–2656. https://doi.org/10.1016/j.automatica.2014.08.028 doi: 10.1016/j.automatica.2014.08.028
    [12] S. Sui, C. L. P. Chen, S. C. Tong, Fuzzy adaptive finite-time control design for nontriangular stochastic nonlinear systems, IEEE Trans. Fuzzy Syst., 27 (2019), 172–184. https://doi.org/10.1109/TFUZZ.2018.2882167 doi: 10.1109/TFUZZ.2018.2882167
    [13] Y. L. Cai, H. G. Zhang, Y. Liu, Q. He, Distributed bipartite finite-time event-triggered output consensus for heterogeneous linear multi-agent systems under directed signed communication topology, Appl. Math. Comput., 378 (2020), 125162. https://doi.org/10.1016/j.amc.2020.125162 doi: 10.1016/j.amc.2020.125162
    [14] J. Lan, Y. J. Liu, T. Y. Xu, S. C. Tong, L. Liu, Adaptive fuzzy fast finite-time formation control for second-order MASs based on capability boundaries of agents, IEEE Trans. Fuzzy Syst., 30 (2021), 3905–3917. https://doi.org/10.1109/TFUZZ.2021.3133903 doi: 10.1109/TFUZZ.2021.3133903
    [15] H. Q. Wang, K. Xu, P. X. P. Liu, J. F. Qiao, Adaptive fuzzy fast finite-time dynamic surface tracking control for nonlinear systems, IEEE Trans. Circuits I, 68 (2021), 4337–4348. https://doi.org/10.1109/TCSI.2021.3098830 doi: 10.1109/TCSI.2021.3098830
    [16] D. J. Yao, C. X. Dou, N. Zhao, T. J. Zhang, Practical fixed-time adaptive consensus control for a class of multi-agent systems with full state constraints and input delay, Neurocomputing, 446 (2021), 156–164. https://doi.org/10.1016/j.neucom.2021.03.032 doi: 10.1016/j.neucom.2021.03.032
    [17] H. B. Du, G. H. Wen, D. Wu, Y. Y. Cheng, J. H. Lü, Distributed fixed-time consensus for nonlinear heterogeneous multi-agent systems, Automatica, 113 (2020), 108797. https://doi.org/10.1016/j.automatica.2019.108797 doi: 10.1016/j.automatica.2019.108797
    [18] M. Chen, H. Wang, X. Liu, Adaptive fuzzy practical fixed-time tracking control of nonlinear systems, IEEE Trans. Fuzzy Syst., 29 (2021), 664–673. https://doi.org/10.1109/TFUZZ.2019.2959972 doi: 10.1109/TFUZZ.2019.2959972
    [19] Y. L. Cai, H. Zhang, Y. Wang, Z. Gao, Q. He, Adaptive bipartite fixed-time time-varying output formation-containment tracking of heterogeneous linear multiagent systems, IEEE Trans. Neural Networks Learn. Syst., 33 (2021), 4688–4698. https://doi.org/10.1109/TNNLS.2021.3059763 doi: 10.1109/TNNLS.2021.3059763
    [20] J. Qin, G. Zhang, W. X. Zheng, Y. Kang, Adaptive sliding mode consensus tracking for second-order nonlinear multiagent systems with actuator faults, IEEE Trans. Cybern., 49 (2019), 1605–1615. https://doi.org/10.1109/TCYB.2018.2805167 doi: 10.1109/TCYB.2018.2805167
    [21] D. P. Li, D. J. Li, Adaptive neural tracking control for nonlinear time-delay systems with full state constraints, IEEE Trans. Syst. Man Cybern. Syst., 47 (2017), 1590–1601. https://doi.org/10.1109/TSMC.2016.2637063 doi: 10.1109/TSMC.2016.2637063
    [22] T. S. Li, W. W. Bai, Q. Liu, Y. Long, C. L. P. Chen, Distributed fault-tolerant containment control protocols for the discrete-time multi-agent systems via reinforcement learning method, IEEE Trans. Neural Networks Learn. Syst., 34 (2021), 3979–3991. https://doi.org/10.1109/TNNLS.2021.3121403 doi: 10.1109/TNNLS.2021.3121403
    [23] Q. He, Z. Feng, H. Fang, X. W. Wang, L. Zhao, Y. D. Yao, et al., A blockchain-based scheme for secure data offloading in healthcare with deep reinforcement learning, IEEE/ACM Trans. Networks, 2023 (2023), 1–16. https://doi.org/10.1109/TNET.2023.3274631 doi: 10.1109/TNET.2023.3274631
    [24] P. Lin, W. Ren, Y. Song, Distributed multi-agent optimization subject to nonidentical constraints and communication delays, Automatica, 65 (2016), 120–131. https://doi.org/10.1016/j.automatica.2015.11.014 doi: 10.1016/j.automatica.2015.11.014
    [25] K. Zhao, Y. Song, Removing the feasibility conditions imposed on tracking control designs for state-constrained strict-feedback systems, IEEE Trans. Autom. Control, 64 (2018), 1265–1272. https://doi.org/10.1109/TAC.2018.2845707 doi: 10.1109/TAC.2018.2845707
    [26] W. Zhao, Y. J. Liu, L. Liu, Observer-based adaptive fuzzy tracking control using integral barrier Lyapunov functionals for a nonlinear system with full state constraints, IEEE /CAA J. Autom. Sin., 8 (2021), 617–627. https://doi.org/10.1109/JAS.2021.1003877 doi: 10.1109/JAS.2021.1003877
    [27] D. P. Li, H. G. Han, J. F. Qiao, Adaptive NN controller of nonlinear state-dependent constrained systems with unknown control direction, IEEE Trans. Neural Networks Learn. Syst., 35 (2024), 913–922. https://doi.org/10.1109/TNNLS.2022.3177839 doi: 10.1109/TNNLS.2022.3177839
    [28] M. Chen, S. S. Ge, B. Ren, Adaptive tracking control of uncertain MIMO nonlinear systems with input constraints, Automatica, 4 (2011), 452–465. https://doi.org/10.1016/j.automatica.2011.01.025 doi: 10.1016/j.automatica.2011.01.025
    [29] J. J. Fu, G. H. Wen, W. W. Yu, T. W. Huang, X. H. Yu, Consensus of second-order multiagent systems with both velocity and input constraints, IEEE Trans. Ind. Electron., 66 (2018), 7946–7955. https://doi.org/10.1109/TIE.2018.2879292 doi: 10.1109/TIE.2018.2879292
    [30] B. Fan, Q. Yang, S. Jagannathan, Y. Sun, Output-constrained control of nonaffine multiagent systems with partially unknown control directions, IEEE Trans. Autom. Control, 64 (2019), 3936–3942. https://doi.org/10.1109/TAC.2019.2892391 doi: 10.1109/TAC.2019.2892391
    [31] Q. He, H. Fang, J. Zhang, X. Wang, Dynamic opinion maximization in social networks, IEEE Trans. Knowl. Data Eng., 35 (2023), 350–361. https://doi.org/10.1109/TKDE.2021.3077491 doi: 10.1109/TKDE.2021.3077491
    [32] B. Miao, H. Wang, Y. J. Liu, L. Liu, Adaptive security control against false data injection attacks in cyber-physical systems, IEEE J. Emerging Sel. Top. Circuits Syst., 13 (2023), 743–751. https://doi.org/10.1109/JETCAS.2023.3253483 doi: 10.1109/JETCAS.2023.3253483
    [33] Y. Jiang, B. Niu, X. Wang, X. Zhao, H. Wang, B. Yan, Distributed finite-time consensus tracking control for nonlinear multi-agent systems with FDI attacks and application to single-link robots, IEEE Trans. Circuits II, 70 (2022), 1505–1509. https://doi.org/10.1109/TCSII.2022.3220359 doi: 10.1109/TCSII.2022.3220359
    [34] A. Mousavi, K. Aryankia, R. R. Selmic, A distributed FDI cyber-attack detection in discrete-time nonlinear multi-agent systems using neural networks, Eur. J. Control, 66 (2022), 100646. https://doi.org/10.1016/j.ejcon.2022.100646 doi: 10.1016/j.ejcon.2022.100646
    [35] M. Nadeem, A. Arshad, S. Riaz, A secure architecture to protect the network from replay attacks during client-to-client data transmission, Appl. Sci., 12 (2022), 8143. https://doi.org/10.3390/app12168143 doi: 10.3390/app12168143
    [36] Z. Gu, P. Shi, D. Yue, S. Yan, X. Xie, Memory-based continuous event-triggered control for networked T-S fuzzy systems against cyberattacks, IEEE Trans. Fuzzy Syst., 29 (2020), 3118–3129. https://doi.org/10.1109/TFUZZ.2020.3012771 doi: 10.1109/TFUZZ.2020.3012771
    [37] W. Qi, Y. Hou, J. H. Park, G. Zong, J. Cao, J. Cheng, SMC for discrete-time networked semi-Markovian switching systems with random DoS attacks and applications, IEEE Trans. Syst. Man Cybern. Syst., 53 (2022), 7504–7520. https://doi.org/10.1109/TSMC.2022.3211322 doi: 10.1109/TSMC.2022.3211322
    [38] H. Zhang, P. Cheng, L. Shi, J. Chen, Optimal DoS attack scheduling in wireless networked control system, IEEE Trans. Control Syst. Technol., 24 (2015), 843–852. https://doi.org/10.1109/TSMC.2022.3211322 doi: 10.1109/TSMC.2022.3211322
    [39] Y. Zhang, Z. G. Wu, P. Shi, Event/self-triggered control for leader-following consensus over unreliable network with DoS attacks, IEEE Trans. Neural Networks Learn. Syst., 30 (2019), 3137–3149. https://doi.org/10.1109/TNNLS.2018.2890119 doi: 10.1109/TNNLS.2018.2890119
    [40] Z. Gu, C. K. Ahn, D. Yue, X. Xie, Event-triggered H filtering for T-S fuzzy-model-based nonlinear networked systems with multisensors against dos attacks, IEEE Trans. Cybern., 52 (2022), 5311–5321. https://doi.org/10.1109/TCYB.2020.3030028 doi: 10.1109/TCYB.2020.3030028
    [41] B. L. Tian, Z. Y. Zuo, H. Wang, Leader–follower fixed-time consensus of multi-agent systems with high-order integrator dynamics, Int. J. Control, 90 (2017), 1420–1427. https://doi.org/10.1080/00207179.2016.1207101 doi: 10.1080/00207179.2016.1207101
  • Reader Comments
  • © 2024 the Author(s), licensee AIMS Press. This is an open access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/4.0)
通讯作者: 陈斌, bchen63@163.com
  • 1. 

    沈阳化工大学材料科学与工程学院 沈阳 110142

  1. 本站搜索
  2. 百度学术搜索
  3. 万方数据库搜索
  4. CNKI搜索

Metrics

Article views(1050) PDF downloads(65) Cited by(0)

Figures and Tables

Figures(7)

Other Articles By Authors

/

DownLoad:  Full-Size Img  PowerPoint
Return
Return

Catalog