Next Article in Journal
Area-Efficient Universal Code Generator for GPS L1C and BDS B1C Signals
Previous Article in Journal
Experimental Application of Bluetooth Low Energy Connectionless in Smart Cities
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Event-Triggered Formation Tracking Control for Unmanned Aerial Vehicles Subjected to Deception Attacks

1
College of Mechanical & Electronic Engineering, Nanjing Forestry University, Nanjing 210037, China
2
School of Aeronautic Engineering, Nanjing Vocational University of Industry Technology, Nanjing 210023, China
*
Author to whom correspondence should be addressed.
Electronics 2021, 10(22), 2736; https://doi.org/10.3390/electronics10222736
Submission received: 16 September 2021 / Revised: 2 November 2021 / Accepted: 5 November 2021 / Published: 10 November 2021
(This article belongs to the Section Microwave and Wireless Communications)

Abstract

:
This study investigates the time-varying formation tracking (TVFT) control problem for multiple unmanned aerial vehicle (multi-UAV) systems under deception attacks by utilizing an event-triggered mechanism (ETM). First, for the sake of alleviating the communication burden, an effective ETM is designed in this paper. Second, to deal with deception attacks in the communication network, a random deception attack model under the designed ETM is constructed. Finally, a novel formation tracking control scheme for multi-UAV systems under deception attack combining the ETM is proposed to achieve the expected TVFT. The stability analysis of the formation control system is given by using the Lyapunov stability theory and linear matrix inequality (LMI) technique. Simulations are conducted to verify the effectiveness of the proposed formation control scheme.

1. Introduction

In the past few decades, formation flight for multiple unmanned aerial vehicle (multi-UAV) has attracted considerable research interest with the development of computer technology, sensor technology and communication networks, owing to their incomparable advantages, including low operation cost, high robustness, strong mobility and self-adaptability. Generally, one of the primary concerns of formation flight is the formation tracking control problem, which has been a research hotspot. Consequently, a large amount of results have emerged [1,2,3]. However, a great part of the existing formation tracking control methods are to achieve time-invariant formations, which are difficult to satisfy practical demands [4,5]. Therefore, time-varying formation control is proposed, and an increasing number of studies were conducted recently [4,6,7,8,9].
It should be pointed out that UAVs exchange information with each other through a communication network with limited energy and bandwidth in practical application. Such a situation may deteriorate the formation control performance of the multi-UAV systems. Therefore, it is necessary to design an appropriate information transmission mechanism to overcome the above drawbacks. Traditionally, an effective information transmission mechanism is periodic state sampling mechanism (so-called time-triggered mechanism (TTM)) [10], which is simple and easy to be implemented. However, the time-triggered mechanism (TTM) releases a large amount of redundant information into the communication network, even when the system is in a good condition, which will not only lead to the waste of network resources, but also decrease the battery life of the UAVs [11]. For purpose of dealing with the above problems brought by TTMs, event-triggered mechanisms (ETMs) are put forward to save network resources [12,13,14,15,16,17]. In the ETMs, whether a control task is executed or not hinges on predefined trigger criteria rather than on a time period [18,19]. For networked control systems, a new event-triggering control strategy is designed in [20]. On the basis of the work in [20], fruitful subsequent researches were conducted [21,22,23,24,25,26,27,28,29,30,31,32,33,34,35]. A position tracking control strategy based on an event-triggered mechanism for UAVs with multiple state time delays and external disturbances is designed in [36].
A communication network provides convenience and efficiency in the information exchange among UAVs. Nevertheless, it brings many challenges to the control of multi-UAV systems, such as the network security problem. Among the various factors impacting network security, cyber attacks [37,38] are able to exhaust network resources and may cause failures of important tasks. The network attack includes denial of service (DoS) attack [39,40], replay attack [41], deception attack [42,43,44] and so on. The DoS attack may prevent the timely information exchange [45]. With respect to the replay attack, the attackers maliciously transmit the received data repeatedly within a certain period of time, which may result in repeated unnecessary operations [46]. The deception attack will cause the incompleteness of data by replacing or stealing the information, which may result in the instability, and even executions of instructions from the attackers [47]. Compared to the aforementioned two forms of cyber-attacks, the deception attack is difficult to detect and prevent [48]. Therefore, much effort has been devoted to alleviating the negative impacts from deception attack, and great progress has been made in recent years [49,50,51,52].
As far as we know, few results are available on consensus or formation control problems for multi-UAV systems with deception attacks. Wang et al. investigate the formation control problem of multiple robots under deception attacks. Nevertheless, the ETM is not utilized to alleviate the communication burden [53]. A novel formation control law based on ETM is proposed in [54]; however, the deception attack is not considered in the proposed strategy. In addition, only time-invariant formations are realized in [54]. Therefore, the time-varying formation tracking (TVFT) control problem based on ETM for multi-UAV systems subjected to deception attacks needs more investigation.
Inspired by the observations above, we propose an integrated event-triggered formation tracking control scheme for multi-UAV systems with deception attacks. The main contributions of this study can be summarized as follows.
(1) An ETM is proposed for multi-UAV systems with time delay. Compared with the event-triggered mechanisms in Ref. [12], the information of both the leader and the formation is used to design the triggering condition, which reduces the amount of redundant data and alleviates the communication burden. Compared with the event-triggered mechanism in Ref. [54], time delay is taken into consideration, which makes the designed ETM more reasonable and realistic. The presence of time delay brings a large challenge to the theoretical analysis and finding a feasible solution by LMI since the Lyapunov function is more complicated, compared to the one in [54].
(2) A novel time-varying formation tracking control strategy is developed for multi-UAV systems under deception attacks. As far as we know, few results simultaneously take the TVFT control and deception attack problems into consideration. Different from the existing results on multi-UAV systems without cyber attacks [2,19], the problem of deception attacks is taken into account, which describes the actual situation more reasonably. The existence of deception attack increases the difficulty of the stability analysis since attackers release the inaccuracy feedback information into the communication network among the UAVs. In addition, to deal with the deception attacks, plenty of nonlinear terms are brought in the stability analysis, which needs more mathematical treatments.
Notations are as follows: I n represents the identity matrix with n × n dimension. ⊗ describes Kronecker product. ∗ is the terms obtained by symmetric transformation. E { G ( t ) } is the mathematical expectation of G ( t ) . X 2 denotes the 2-norm of matrix X. Q > 0 represents that the matrix Q is positive definite.

2. System Description and Modeling

2.1. UAV Modeling

In this paper, we assume that N UAVs (labeled as 1 , 2 , , N ) and one leader (denoted as UAV 0) comprise the multi-UAV systems, whose dynamics can be described as follows [2]:
x ˙ i ( t ) = A x i ( t ) + B u i ( t ) , x ˙ 0 ( t ) = A x 0 ( t ) + B u 0 ( t ) ,
where x i ( t ) = [ x i x T ( t ) , x i v T ( t ) ] T R 2 m and x 0 ( t ) = [ x 0 x T ( t ) , x 0 v T ( t ) ] T R 2 m are the state vectors of UAV i and the leader, respectively. x i x ( t ) R m and x i v ( t ) R m are the position and velocity vector of UAV i, respectively. x 0 x ( t ) R m and x 0 v ( t ) R m are the position and velocity vector of the leader, respectively. u i ( t ) R m and u 0 ( t ) R m are the control inputs of UAV i and leader, respectively. A = 0 1 0 0 I m , B = 0 1 I m .
Remark 1.
It is worth noting that a single UAV is regarded as a particle here, which is applied in most of the existing studies on the formation tracking control problem for multi-UAV systems [2,5,6]. As is known to all, the control of a UAV can be decoupled into attitude-loop and trajectory-loop control. Since the attitude-loop control of a UAV can be completed by UAV itself, and the formation control studied in this paper is only concerned with the position x i x ( t ) and the velocity x i v ( t ) , the trajectory-loop control problem is addressed when dealing with the formation tracking control issue for the multi-UAV systems.
The UAVs are supposed to maintain a desired formation and track the leader’s trajectories in the meantime under the proposed control scheme. The expected formation is specified by p F ( t ) = [ p 1 T ( t ) , p 2 T ( t ) , , p N T ( t ) ] T , where p i ( t ) = [ p i x T ( t ) , p i v T ( t ) ] T with p ˙ i x ( t ) = p i v ( t ) is the piecewise continuously differentiable formation vector for UAV i with p i x ( t ) and p i v ( t ) being the corresponding position and velocity term in vector p i ( t ) , respectively [55]. We define the formation tracking error as follows:
Ψ i ( t ) = x i ( t ) x 0 ( t ) p i ( t ) .
where Ψ i = [ Ψ i x T , Ψ i v T ] T , Ψ i x ( t ) = x i x ( t ) x 0 x ( t ) p i x ( t ) and Ψ i v ( t ) = x i v ( t ) x 0 v ( t ) p i v ( t ) are denoted as the formation tracking position and velocity error vector, respectively.
This article aims at proposing a novel event-triggered formation tracking control scheme so that Ψ i ( t ) is able to converge to the origin, that is, the desired TVFT of multi-UAV system (1) subjected to deception attacks can be achieved. Figure 1 shows the framework of the overall formation control scheme.

2.2. Event-Triggered Communication Scheme

The information exchanges among the UAVs are implemented by a communication network. To solve the problem of unnecessary network resource consumption brought by periodic sampling, ETMs are adopted to decide whether the real-time local control data should be released or not. The event-trigger function is as follows:
( t ) = e i T ( t ) Ω i e i ( t ) λ i Ψ i T ( t φ i h + μ i h ) Ω i Ψ i ( t φ i h + μ i h ) ,
where e i ( t ) = Ψ i ( t φ i h ) Ψ i ( t φ i h + μ i h ) represents the i-th UAV’s error between the last event-triggered data and current sampling data; λ i [ 0 , 1 ) and Ω i are positive symmetric matrices to be designed; h is the sampling period; μ i = 1 , 2 , ; t φ i h { t 0 i h , t 1 i h , t 2 i h , } represents the latest releasing instant of the i-th UAV in which t 0 is the initial time; t φ i h + μ i h denotes the current sampling instant of the i-th UAV. Then the next releasing instant of the i-th UAV can be defined by the following:
t φ + 1 i h = t φ i h + max ( μ i + 1 ) h | ( t ) < 0 .
According to (4), if the event-triggered condition ( t ) > 0 , the data packet at this sampling instant is delivered to the controller of the i-th UAV, while the packets at instants t φ i h + μ i h are discarded with μ M i max ( t ) < 0 { μ i } for t [ t φ i h , t φ + 1 i h ) .

2.3. Deception Attacks

Due to the intrinsic properties of the communication network among the UAVs, the network is vulnerable to cyber attacks. The deception attack as a common attack mode is considered in this paper, which may modify the data transmitted through the network. It can be expressed by a nonlinear function f ( Ψ i ( t ) ) . In view of the fact that the deception attack occurs randomly, the random variable ϖ ( t ) { 0 , 1 } is used to describe whether the deception attack occurs or not, which satisfies the Bernoulli distribution. In detail, if ϖ ( t ) = 1 , the attack occurs; if ϖ ( t ) = 0 , the attack does not happen. Then, the signal under deception attacks for UAV i received from UAV j is presented as the following:
Ψ ^ j ( t ) = ϖ ( t ) f ( Ψ j ( t ϱ j ( t ) ) ) + ( 1 ϖ ( t ) ) Ψ j ( t φ j h ) ,
where 0 ϱ j ( t ) ϱ M j with ϱ M j being a maximum attack delay. Denote ϱ M = max { ϱ M 1 , ϱ M 2 , , ϱ M N } . Besides, E { ϖ ( t ) } = ϖ ¯ and E { ( ϖ ( t ) ϖ ¯ ) 2 } = ϵ 2 .
Assumption A1.
Assume that the deception attack function f ( x ) satisfies the following conditions:
f ( Ψ ( t ) ) 2 F Ψ ( t ) 2 ,
where F is a real constant matrix with appropriate dimensions.
Remark 2.
Note that the deception attacks may be undetectable since the attack signals are strategically generated by malicious adversaries and may relate to system information. In this paper, we assume that the full state information transmitted in the network is available to the attackers. In addition, the deception attack is supposed to be modeled as a nonlinear function f ( Ψ j ( t ϱ j ( t ) ) ) associated with the system state.
Remark 3.
It should be pointed out that the error signal under deception attack Ψ ^ j ( t ) can be acquired through the corresponding sensors and network in real control. In detail, the ideal error signal without deception attack Ψ j ( t ) is obtained through corresponding local sensors. Then, it may encounter deception attacks, and Ψ ^ j ( t ) may be delivered to UAV i through the communication network.
Remark 4.
It should be mentioned that the energy of deception attack is limited in practice, and deception attacks may be difficult to be detected. Thus, we can assume the deception attack nonlinear function f ( Ψ j ( t ϱ j ( t ) ) ) is constrained by condition (6) in Assumption 1, which is really of practical significance and also made in [23,56,57].
Remark 5.
To avoid being detected, the deception attack is usually an intermittent signal. Thus, we can assume that ϖ ( t ) satisfies the Bernoulli distribution, which also conforms to reality. Similar assumptions are also made in [58,59].
Remark 6.
In recent years, due to the widespread application of UAVs, the network security of multi-UAV systems has attracted widespread attention from scholars. In the existing literature, researchers have deeply investigated the control problems of single systems under deception attacks. However, the research on the network security control issues for multi-UAV systems is not sufficient at present. As a result, this study investigates the secure formation control for multi-UAV systems (1) with deception attacks (5).

2.4. Control Law and Formation Tracking Error Systems

Invoking the dynamics (1) and taking the derivative of (2), the dynamics of the formation tracking error is the following:
Ψ ˙ i ( t ) = A x i ( t ) + B u i ( t ) A x 0 ( t ) B u 0 ( t ) p ˙ i ( t ) .
According to the above equation and adopting state feedback control method, a general formation tracking control law can be derived as follows:
u ¯ i ( t ) = K { j = 1 N a i j ( x i ( t ) x 0 ( t ) p i ( t ) ) ( x j ( t ) x 0 ( t ) p j ( t ) ) + b i ( x i ( t ) x 0 ( t ) p i ( t ) ) } + p ˙ i v + x ˙ 0 v ,
where K R m × m is the control gain matrix with the elements being positive. a i j 0 and b i 0 are the coupling weights among the followers and leader. In detail, a i j > 0 if and only if UAV j can deliver information to UAV i; otherwise, a i j = 0 . b i > 0 if and only if the leader can deliver information to UAV i; if not, b i = 0 .
Combining (2) and (8), we have the following:
u ¯ i ( t ) = K j = 1 N a i j Ψ i ( t ) Ψ j ( t ) + b i Ψ i ( t ) + p ˙ i v + x ˙ 0 v .
Then, by taking the designed ETM (3) and deception attack into consideration, the actual control law can be obtained as follows:
u i ( t ) = K j = 1 N a i j Ψ i ( t φ i h ) Ψ ^ j ( t ) + b i Ψ i ( t φ i h ) + p ˙ i v + x ˙ 0 v , t [ t φ i h , t φ + 1 i h ) .
Remark 7.
As a matter of fact, the term K j = 1 N a i j Ψ i ( t ) Ψ j ( t ) + b i Ψ i ( t ) in (9) denotes the feedback control with respect to the local neighborhood error j = 1 N a i j [ Ψ i ( t ) Ψ j ( t ) ] + b i Ψ i ( t ) . The last two terms p ˙ i v and x ˙ 0 v are designed to compensate the corresponding terms in (7). Furthermore, the formation tracking error signal of UAV i at instant t φ i h adopts the packets generated by ETM, which is represented by Ψ i ( t φ i h ) . In addition, with the help of the zero-order-holder which is equipped in the local controller, the control input holds until a new triggered signal is delivered. Ψ ^ j ( t ) refers to the formation tracking error state of UAV j suffering from the deception attack. Compared with the traditional formation control law in [2,19], the multi-UAV system can achieve the desired formation by using the event-based control strategy (10), even if the multi-UAV systems suffer from the deception attacks.
Time delay is inevitable during the communication among the UAVs. We assume that time delay of the the i-th UAV at the instant of t φ i h is denoted as π φ i with an upper bound π m a x i . It holds that [ t φ i h + π φ i , t φ + 1 i h + π φ + 1 i ) = μ i = 0 μ M i χ t φ i μ i with χ t φ i μ i = [ t φ i h + μ i h + π φ μ i , t φ + 1 i h + μ i h + h + π φ + 1 μ i + 1 ) . Define π i ( t ) = t t φ i h μ i h for t χ t φ μ i . It yields the following:
0 π i ( t ) h + π m a x i π M i .
To facilitate analysis, π M i = max { π M 1 , π M 2 , , π M N } .
From (3) and (11), the event-triggered data at the current time can be expressed as the following:
Ψ i ( t φ i h ) = Ψ i ( t π i ( t ) ) + e i ( t ) .
Define
Ψ ( t ) = [ Ψ 1 T ( t ) , Ψ 2 T ( t ) , , Ψ N T ( t ) ] T , F ( Ψ ( t ϱ ( t ) ) ) = [ f T ( Ψ 1 ( t ϱ ( t ) ) ) , f T ( Ψ 2 ( t ϱ ( t ) ) ) , , f T ( Ψ N ( t ϱ ( t ) ) ) ] , e ( t ) = [ e 1 T ( t ) , e 2 T ( t ) , , e N T ( t ) ] T , Ψ ( t π ( t ) ) = [ Ψ 1 T ( t π 1 ( t ) ) , Ψ 2 T ( t π 2 ( t ) ) , , Ψ N T ( t π N ( t ) ) ] T , B ^ = diag { b 1 , b 2 , , b N , } , L ¯ = L + B ^ ,
where matrix L = D W is the Laplacian matrix among the UAVs with D = diag { j = 1 N a 1 j , j = 1 N a 2 j , , j = 1 N a N j } and W = [ a i j ] N × N .
Combining Equations (1)–(3), (5), (10), (12) and definition in (13), the formation tracking error system can be rewritten as the following:
Ψ ˙ ( t ) = ( I N A ) Ψ ( t ) ( L ¯ B K ) Ψ ( t π ( t ) ) ( L ¯ B K ) e ( t ) ϖ ( t ) ( W B K ) e ( t ) + ϖ ( t ) ( W B K ) F ( Ψ ( t ϱ ( t ) ) ) ϖ ( t ) ( W B K ) Ψ ( t π ( t ) ) .
Next, an assumption is made for the subsequent theoretical analysis.
Assumption A2.
Assume that the communication graph among the UAVs and the leader is a digraph containing a spanning tree, in which the leader is the root node.
Remark 8.
Based on Assumption 2, the overall formation trajectory can be determined by the leader dynamics, while other followers follow the leader’s trajectory.

3. Main Results

In this section, we present the main results of this paper; the stability criterion for the closed-loop control system is derived.
Theorem 1.
For given event trigger parameter λ i , the delay upper π M , ϱ M , scalar μ, the probability expectation of deception attack ϖ ¯ , the gain matrix K and the attack upper bound matrix F, the formation tracking error system (14) is asymptotically stable if there exist positive definite matrices P > 0 , Q 1 > 0 , Q 2 > 0 , R 1 > 0 , R 2 > 0 , Ω i > 0 ( i = 1 , 2 , , , N ) , and the matrices M , N with appropriate dimensions such that the following matrix inequalities hold:
Γ = Γ 11 Γ 21 I Γ 31 0 R 1 1 Γ 41 0 0 R 2 1 Γ 51 0 0 0 R 1 1 Γ 61 0 0 0 0 R 2 1 < 0 ,
R 1 M R 1 0 , R 2 N R 2 0 ,
where
Γ 11 = Φ 11 Φ 21 Φ 22 Φ 31 Φ 32 Φ 33 Φ 41 0 0 Φ 44 Φ 51 0 0 Φ 54 Φ 55 Φ 61 0 0 0 0 Ω Φ 71 0 0 0 0 0 I , Φ 11 = Φ 11 1 + Φ 11 2 , Φ 11 1 = I N ( P A + A T P ) , Φ 11 2 = Q 1 + Q 2 R 1 R 2 , Φ 21 = L ¯ T K T B T P ϖ ¯ ( W T K T B T P ) + R 1 + M , Φ 22 = 2 R 1 M M T + λ ( L T I 2 ) Ω ( L I 2 ) , Φ 31 = M , Φ 32 = R 1 + M , Φ 33 = Q 1 R 1 , Φ 41 = R 2 + N , Φ 44 = 2 R 2 N N T , Φ 51 = N , Φ 54 = R 2 + N , Φ 55 = Q 2 R 2 , Φ 61 = L ¯ T K T B T P ϖ ¯ ( W T K T B T P ) , Φ 71 = ϖ ¯ ( W T K T B T P ) ,
Γ 21 = 0 0 0 F 0 0 0 , Γ 31 = Γ 31 1 Γ 31 2 0 0 0 Γ 31 2 Γ 31 3 , Γ 31 1 = π M ( I N A ) , Γ 31 2 = π M [ L ¯ B K + ϖ ¯ ( W B K ) ] , Γ 31 3 = π M ϖ ¯ ( W B K ) , Γ 41 = Γ 41 1 Γ 41 2 0 0 0 Γ 41 2 Γ 41 3 , Γ 41 1 = ϱ M ( I N A ) , Γ 41 2 = ϱ M [ L ¯ B K + ϖ ¯ ( W B K ) ] , Γ 41 3 = ϱ M ϖ ¯ ( W B K ) , Γ 51 = 0 Γ 51 1 0 0 0 Γ 51 1 Γ 51 1 , Γ 51 1 = ϵ π M ( W B K ) , Γ 61 = 0 Γ 61 1 0 0 0 Γ 61 1 Γ 61 1 , Γ 61 1 = ϵ ϱ M ( W B K ) , Ω = d i a g { Ω 1 , Ω 2 , , Ω N } , λ = d i a g { I 2 λ 1 , I 2 λ 2 , , I 2 λ N } .
Proof 
Choose a Lyapunov–Krasovskii candidate as follows:
V ( t ) = Ψ T ( t ) ( I N P ) Ψ ( t ) + t π M t Ψ T ( s ) Q 1 Ψ ( s ) d s + t ϱ M t Ψ T ( s ) Q 2 Ψ ( s ) d s + π M t π M t s t Ψ ˙ T ( v ) R 1 Ψ ˙ ( v ) d v d s + ϱ M t ϱ M t s t Ψ ˙ T ( v ) R 2 Ψ ˙ ( v ) d v d s .
Time-differentiate (17) and compute its mathematical expectation to obtain the following:
E { V ˙ ( t ) } = 2 Ψ T ( t ) ( I N P ) Ψ ˙ T ( t ) + Ψ T ( t ) ( Q 1 + Q 2 ) Ψ ( t ) Ψ T ( t π M ) Q 1 Ψ ( t π M ) Ψ T ( t ϱ M ) Q 2 Ψ ( t ϱ M ) + E { Ψ ˙ T ( t ) ( π M 2 R 1 + ϱ M 2 R 2 ) Ψ ˙ ( t ) } π M t π M t Ψ ˙ T ( s ) R 1 Ψ ˙ ( s ) d s ϱ M t ϱ M t Ψ ˙ T ( s ) R 2 Ψ ˙ ( s ) d s ,
where the following holds:
Ψ ˙ ( t ) = A ( t ) + ( ϖ ¯ ϖ ( t ) ) B ( t ) , A ( t ) = ( I N A ) Ψ ( t ) [ L ¯ B K + ϖ ¯ ( W B K ) ] Ψ ( t π ( t ) ) [ L ¯ B K + ϖ ¯ ( W B K ) ] e ( t ) + ϖ ¯ ( W B K ) F ( Ψ ( t ϱ ( t ) ) ) , B ( t ) = ( W B K ) Ψ ( t π ( t ) ) + ( W B K ) e ( t ) ( W B K ) F ( Ψ ( t ϱ ( t ) ) ) .
Letting R = π M 2 R 1 + ϱ M 2 R 2 yields the following:
E { Ψ ˙ T ( t ) ( π M 2 R 1 + ϱ M 2 R 2 ) Ψ ˙ ( t ) } = A T ( t ) R A ( t ) + ϵ 2 B T ( t ) R B ( t ) .
Using the Jesson inequality in [21], it follows that
π M t π M t Ψ ˙ T ( s ) R 1 Ψ ˙ ( s ) d s Ξ 1 T ( t ) Π 1 Ξ 1 ( t ) , ϱ M t ϱ M t Ψ ˙ T ( s ) R 2 Ψ ˙ ( s ) d s Ξ 2 T ( t ) Π 2 Ξ 2 ( t ) ,
where
Ξ 1 ( t ) = Ψ ( t ) Ψ ( t π ( t ) ) Ψ ( t π M ) , Ξ 2 ( t ) = Ψ ( t ) Ψ ( t ϱ ( t ) ) Ψ ( t ϱ M ) ,
Π 1 = R 1 R 1 + M 2 R 1 M M T M R 1 + M R 1 ,
Π 2 = R 2 R 2 + N 2 R 2 N N T N R 2 + N R 2 .
According to ETM (3), it can be obtained the following:
λ Ψ T ( t π ( t ) ) Ω Ψ ( t π ( t ) ) e T ( t ) Ω e ( t ) > 0 .
Based on the inequality (6), the constraint conditions of deception attack can be obtained as follows:
Ψ T ( t ϱ ( t ) ) F T F Ψ ( t ϱ ( t ) ) F T ( Ψ ( t ϱ ( t ) ) ) F ( Ψ ( t ϱ ( t ) ) ) > 0 .
Combining the above Equations (18)–(21) yields the following:
E { V ˙ ( t ) } 2 Ψ T ( t ) ( I N P ) Ψ ˙ T ( t ) + Ψ T ( t ) ( Q 1 + Q 2 ) Ψ ( t ) Ψ T ( t π M ) Q 1 Ψ ( t π M ) Ψ T ( t ϱ M ) Q 2 Ψ ( t ϱ M ) + Ξ 1 T ( t ) Π 1 Ξ 1 ( t ) + Ξ 2 T ( t ) Π 2 Ξ 2 ( t ) + A T ( t ) R A ( t ) + ϵ 2 B T ( t ) R B ( t ) + λ Ψ T ( t π ( t ) ) Ω Ψ ( t π ( t ) ) e T ( t ) Ω e ( t ) + Ψ T ( t ϱ ( t ) ) F T F Ψ ( t ϱ ( t ) ) F T ( Ψ ( t ϱ ( t ) ) ) F ( Ψ ( t ϱ ( t ) ) ) ) .
Define ζ T ( t ) = [ Ξ 1 T ( t ) , Ψ T ( t ϱ ( t ) ) , Ψ T ( t ϱ M ) , e T ( t ) , F T ( Ψ ( t ϱ ( t ) ) ) ] , and then applying inequality (21) and the Schur complement yields the following:
E { V ˙ ( t ) } ζ T ( t ) Γ ζ ( t ) .
According to the above analysis, the condition Γ < 0 is sufficient to guarantee E { V ˙ ( t ) } 0 . Therefore, we can conclude from Equations (15) and (23) that all UAVs in the multi-UAV system can track the trajectories of the leader while forming the designed formation under the proposed control scheme. This completes the proof. □
Theorem 1 provides a sufficient criterion of realizing TVFT. Based on this, the design of control gain K is presented in Theorem 2.
Theorem 2.
Suppose that Assumptions 1 and 2 hold. For given event-triggering parameter λ i , the delay upper bound π M , ϱ M , scalar μ , γ 1 , γ 2 , γ 3 , the probability expectation of deception attack ϖ ¯ , and the matrix F, the formation tracking error system (14) is asymptotically stable if there are positive definite matrices P ^ > 0 , Q ^ 1 > 0 , Q ^ 2 > 0 , R ^ 1 > 0 , R ^ 2 > 0 , Ω i > 0 ( i = 1 , 2 , , N ) , X > 0 , Y > 0 and the matrices M ^ , N ^ so that the following linear matrix inequalities hold:
Γ ^ = Γ ^ 11 Γ ^ 21 I ^ Γ ^ 31 0 Z 1 Γ ^ 41 0 0 Z 2 Γ ^ 51 0 0 0 Z 1 Γ ^ 61 0 0 0 0 Z 2 < 0 ,
R ^ 1 M ^ R ^ 1 0 , R ^ 2 N ^ R ^ 2 0 ,
where
Γ ^ 11 = Φ ^ 11 Φ ^ 21 Φ ^ 22 Φ ^ 31 Φ ^ 32 Φ ^ 33 Φ ^ 41 0 0 Φ ^ 44 ^ Φ ^ 51 0 0 Φ ^ 54 Φ ^ 55 Φ ^ 61 0 0 0 0 Ω ^ Φ ^ 71 0 0 0 0 0 I ^ ,
Φ ^ 11 = Φ ^ 11 1 + Φ ^ 11 2 , Φ ^ 11 1 = A 1 X 1 + X 1 T A 1 T , Φ ^ 11 2 = Q ^ 1 + Q ^ 2 R ^ 1 R ^ 2 , Φ ^ 21 = Y 1 T L 1 T ϖ ¯ ( Y 1 T W 1 T ) + R ^ 1 + M ^ , Φ ^ 22 = 2 R ^ 1 M ^ M ^ T + λ ( L T I 2 ) Ω ^ ( L I 2 ) , Φ ^ 31 = M ^ , Φ ^ 32 = R ^ 1 + M ^ , Φ ^ 33 = Q ^ 1 R ^ 1 , Φ ^ 41 = R ^ 2 + N ^ , Φ ^ 44 = 2 R ^ 2 N ^ N ^ T , Φ ^ 51 = N ^ , Φ ^ 54 = R ^ 2 + N ^ , Φ ^ 55 = Q ^ 2 R ^ 2 , Φ ^ 61 = Y 1 T L 1 T ϖ ¯ Y 1 T W 1 T , Φ ^ 71 = ϖ ¯ Y 1 T W 1 T , Γ ^ 21 = 0 0 0 F X 1 0 0 0 , Γ ^ 31 = Γ ^ 31 1 Γ ^ 31 2 0 0 0 Γ ^ 31 2 Γ ^ 31 3 , Γ ^ 31 1 = π M A 1 X 1 , Γ ^ 31 3 = π M ϖ ¯ ( W 1 Y 1 ) , Γ ^ 31 2 = π M [ L 1 Y 1 + ϖ ¯ W 1 Y 1 ] , Γ ^ 41 = Γ ^ 41 1 Γ ^ 41 2 0 0 0 Γ ^ 41 2 Γ ^ 41 3 , Γ ^ 41 1 = ϱ M ( A 1 X 1 ) , Γ ^ 41 3 = ϱ M ϖ ¯ ( W 1 Y 1 ) , Γ ^ 41 2 = ϱ M [ L 1 Y 1 + ϖ ¯ W 1 Y 1 ] , Γ ^ 51 = 0 Γ ^ 51 1 0 0 0 Γ ^ 51 1 Γ ^ 51 1 , Γ ^ 51 1 = ϵ π M ( W 1 Y 1 ) , Γ ^ 61 = 0 Γ ^ 61 1 0 0 0 Γ ^ 61 1 Γ ^ 61 1 , Γ ^ 61 1 = ϵ ϱ M ( W 1 Y 1 ) , A 1 = I N A , X 1 = I N X , Y 1 = I N Y , W 1 = W B , L 1 = L ¯ B , Z 1 = 2 γ 1 ( I N X ) + γ 1 2 R ^ 1 , Z 2 = 2 γ 2 ( I N X ) + γ 2 2 R ^ 2 .
Proof 
Define X = P 1 , X ^ = I N X , Q ^ 1 = X ^ Q 1 X ^ , Q ^ 2 = X ^ Q 2 X ^ , R ^ 1 = X ^ R 1 X ^ , R ^ 2 = X ^ R 2 X ^ , M ^ = X ^ M X ^ , N ^ = X ^ N X ^ , Ω ^ = X ^ Ω X ^ , Y = K X , then we can obtain that
R 1 1 = X ^ R ^ 1 1 X ^ , R 2 1 = X ^ R ^ 2 1 X ^ , I = X ^ I ^ X ^ .
According to ( γ R P ) R 1 ( γ R P ) 0 , where γ is a positive real number, R , P are positive definite matrix, we have the following:
P R 1 P 2 γ P + γ 2 R .
Combining (26) and (27), we can obtain the following:
X ^ R ^ 1 1 X ^ 2 γ 1 X ^ + γ 1 2 R ^ 1 , X ^ R ^ 2 1 X ^ 2 γ 2 X ^ + γ 2 2 R 2 ^ , X ^ I ^ X ^ 2 γ 3 X ^ + γ 3 2 I ^ .
Pre-multiplying and post-multiplying inequalities (15) and (16) with Λ and Λ ¯ , respectively, where Λ = diag { I N X , I N X , I N X , I N X , I N X , I N X , I N X , I , I , I , I , I } and Λ ¯ = diag { I N X , I N X } , it is obvious that (15) and (16) are equivalent to (24) and (25). According to Theorem 1 and Equation (23), we can draw the conclusion that the goal of expected formation tracking under deception attacks is realized for system (1). Moreover, the control gain of controller (10) is K = Y X 1 . This completes the proof. □

4. Simulation Example

In the simulation, we construct a multi-UAV system composed of four UAVs and a virtual leader described by Equation (1). As stated in Remark 1, each UAV in the multi-UAV system is deemed as a particle, and only the trajectory-loop control of UAV i is studied to achieve the expected formation tracking control for the multi-UAV systems [2,54].
The communication topology is exhibited in Figure 2, which describes the information sharing among the UAVs and the leader in the multi-UAV systems. From Figure 2, one has the Laplacian matrix and adjacency matrix as follows:
L = 0 0 0 0 1 1 0 0 0 0 0 0 0 0 1 1 , W = 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 .
The initial states are chosen as follows:
x 0 = [ 0 0 0 0 ] T , x 1 = [ 20 10 0 0 ] T , x 2 = [ 20 20 0 0 ] T , x 3 = [ 20 20 0 0 ] T , x 4 = [ 15 15 0 0 ] T .
The deception attack f ( Ψ i ( t ) ) ( i = 1 , 2 , 3 , 4 ) is set as the following:
f ( Ψ i ( t ) ) = tan h ( 0.15 Ψ i x ( t ) ) tan h ( 0.3 Ψ i v ( t ) ) .
We set F = diag { 0.15 , 0.3 } , which means that the condition (6) can be guaranteed.
Next, considering the random property of the deception attacks, two possible cases of different values of ϖ ¯ ( t ) are given in this section.
Case 1: The probability of deception attack occurrence is ϖ ¯ = 0.2 . Let π M = 0.2 , ϱ M = 0.1 , h = 0.01 , the scalars γ 1 = γ 2 = γ 3 = 1 , μ = 0.1 , λ 1 = 0.01 , λ 2 = 0.02 , λ 3 = 0.015 , λ 4 = 0.025 . Through solving the LMI in Theorem 2 by MATLAB, the following triggering parameters and control gain are obtained:
Ω 1 = 0.1635 0.3702 0.3702 1.2485 , Ω 2 = 0.2008 0.4793 0.4793 1.5662 , Ω 3 = 0.1549 0.3506 0.3506 1.2018 , Ω 4 = 0.2009 0.4829 0.4829 1.5835 , K = 0.3579 1.0710 .
The simulation results are shown by Figure 3, Figure 4, Figure 5, Figure 6, Figure 7, Figure 8, Figure 9, Figure 10 and Figure 11. The formation tracking position error Ψ i x is exhibited by Figure 3 and Figure 4, respectively, which show that the control system performs well in this case. The varying formations at t = 30 , 40 , 50 , 60 s are presented in Figure 5, from which it can be observed that the four UAVs realize the desired time-varying square formation with rotating around and tracking the trajectories of the leader. Figure 6, Figure 7, Figure 8 and Figure 9 represent the release time intervals of four UAVs, respectively. It can be seen in Figure 6, Figure 7, Figure 8 and Figure 9 that a large amount sampled data are abandoned by utilizing the proposed ETM, which implies that the network communication burden is alleviated effectively. Figure 10 and Figure 11 represent the control input of four UAVs on the X- and Y-axes, respectively.
Case 2: In this case, ϖ ¯ is set as ϖ ¯ = 0.5 . In addition, the other parameters in this simulation case are chosen as the same as those in Case 1. According to Theorem 2, the triggering parameters and control gain are calculated as follows:
Ω 1 = 0.1292 0.2148 0.2148 0.6170 , Ω 2 = 0.1562 0.2810 0.2810 0.7759 , Ω 3 = 0.1264 0.2104 0.2104 0.6092 , Ω 4 = 0.1553 0.2810 0.2810 0.7782 , K = 0.4496 1.0639 .
The simulation results in Case 2 are shown in Figure 12 and Figure 13, which depict the formation position tracking errors Ψ i x , i = 1 , 2 , 3 , 4 . It can be observed that Ψ i x converges to the origin about 20 s, even when the probability of the deception attack occurrence is 0.5 in Figure 12 and Figure 13.
Furthermore, to show the superiority of the proposed ETM, a comparative simulation is conducted between the TTM and our proposed ETM based formation control under deception attacks. The simulation results are shown by Table 1, which presents the average numbers of released data packets of four UAVs on X- and Y-axes with sampling period h = 0.01 under ETM and TTM, respectively. From Table 1, it can be observed that the average numbers of released data packets under the proposed ETM are significantly fewer than those under TTM, which indicates that the proposed ETM-based formation control scheme in this paper can effectively alleviate network burden.
Consequently, the ETM designed in this paper leads to less data released into the network and saves network resources. Meanwhile, the multi-UAV systems subjected to deception attacks is able to realize the desired TVFT by utilizing the proposed formation control scheme.

5. Conclusions

In this paper, we propose a novel event-triggered formation tracking control scheme for multi-UAV systems subjected to deception attacks. A novel ETM is put forward to alleviate the communication burden, in which the information of both the leader and the formation is involved in the triggering condition. To deal with the problems of limited network bandwidth and insecure control for the wireless networked multi-UAV systems, a novel formation control strategy is developed for multi-UAV systems subjected to deception attacks. Under this strategy, the desired formation tracking for multi-UAV systems with deception attacks can be guaranteed, and the burden of the network can be reduced. Finally, two simulation examples with different probabilities of deception attack occurrence and a comparative simulation are conducted to verify the validity and superiority of the presented control scheme. The future work aims to propose an adaptive ETM-based control strategy to improve communication efficiency.

Author Contributions

Conceptualization, T.X. and Z.G.; methodology, B.S.; software, T.X.; validation, Z.G., T.X. and B.S.; formal analysis, B.S.; investigation, B.S.; resources, T.X.; writing—original draft preparation, B.S.; writing—review and editing, T.X.; visualization, T.X.; supervision, Z.G. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by National Natural Science Foundation of China Grant No.52005266 and No.62103193.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Lin, Z.; Wang, L.; Han, Z.; Fu, M. Distributed formation control of multi-agent systems using complex laplacian. IEEE Trans. Autom. Control 2014, 59, 1765–1777. [Google Scholar] [CrossRef]
  2. Dong, X.; Hua, Y.; Zhou, Y.; Ren, Z.; Zhong, Y. Theory and experiment on formation-containment control of multiple multirotor unmanned aerial vehicle systems. IEEE Trans. Autom. Sci. Eng. 2019, 16, 229–240. [Google Scholar] [CrossRef]
  3. Zhang, J.; Yan, J.; Zhang, P. Multi-uav formation control based on a novel back-stepping approach. IEEE Trans. Veh. Technol. 2020, 69, 2437–2448. [Google Scholar] [CrossRef]
  4. Xiong, T.; Gu, Z. Observer-based adaptive fixed-time formation control for multi-agent systems with unknown uncertainties. Neurocomputing 2021, 423, 506–517. [Google Scholar] [CrossRef]
  5. Xiong, T.; Pu, Z.; Yi, J.; Tao, X. Fixed-time observer based adaptive neural network time-varying formation tracking control for multi-agent systems via minimal learning parameter approach. IET Control Theory Appl. 2020, 14, 1147–1157. [Google Scholar] [CrossRef]
  6. Dong, X.; Zhou, Y.; Ren, Z.; Zhong, Y. Time-varying formation tracking for second-order multi-agent systems subjected to switching topologies with application to quadrotor formation flying. IEEE Trans. Ind. Electron. 2016, 64, 5014–5024. [Google Scholar] [CrossRef]
  7. Wang, R.; Dong, X.; Li, Q.; Ren, Z. Distributed time-varying formation control for multiagent systems with directed topology using an adaptive output-feedback approach. IEEE Trans. Ind. 2019, 15, 4676–4685. [Google Scholar] [CrossRef]
  8. Wang, R.; Dong, X.; Li, Q.; Ren, Z. Distributed time-varying output formation control for general linear multiagent systems with directed topology. IEEE Trans. Control Netw. Syst. 2019, 6, 609–620. [Google Scholar] [CrossRef]
  9. Wang, Z.; Zhuang, Z.; Liu, Y.; Ding, F.; Tang, M. Color Classification and Texture Recognition System of Solid Wood Panels. Forests. 2021, 12, 1154. [Google Scholar] [CrossRef]
  10. Yue, D.; Won, S. Delay-dependent robust stability of stochastic uncertain systems with time delay and markovian jump parameters. Circuits Syst. Signal Process. 2003, 22, 351–365. [Google Scholar] [CrossRef]
  11. Li, X.; Dong, X.; Li, Q.; Ren, Z. Event-triggered time-varying formation control for general linear multi-agent systems. J. Franklin Inst. 2019, 356, 10179–10195. [Google Scholar] [CrossRef]
  12. Gu, Z.; Park, J.H.; Yue, D.; Wu, Z.-G.; Xie, X. Event-triggered security output feedback control for networked interconnected systems subject to cyber-attacks. IEEE Trans. Syst. Man Cybern. 2020, 51, 6197–6206. [Google Scholar] [CrossRef]
  13. Gu, Z.; Shi, P.; Yue, D. An adaptive event-triggering scheme for networked interconnected control system with stochastic uncertainty. Int. J. Robust Nonlinear Control. 2017, 27, 236–251. [Google Scholar] [CrossRef]
  14. Hu, S.; Yue, D.; Yin, X.; Xie, X.; Ma, Y. Adaptive event-triggered control for nonlinear discrete-time systems. Int. J. Robust Nonlinear Control 2016, 26, 4104–4125. [Google Scholar] [CrossRef]
  15. Li, J.; Li, C.; Yang, X.; Chen, W. Event-triggered containment control of multi-agent systems with high-order dynamics and input delay. Electronics 2018, 7, 343. [Google Scholar] [CrossRef] [Green Version]
  16. Kwon, W.; Baek, J. Novel summation-type triggering condition on event-based memory output feedback control for networked control systems. Electronics 2020, 9, 779. [Google Scholar] [CrossRef]
  17. Zheng, B.-C.; Fei, S.; Liu, X. Event-triggered and memory-based sliding mode variable structure control for memristive systems. Electronics 2018, 7, 253. [Google Scholar] [CrossRef] [Green Version]
  18. Yang, J.; Xiao, F.; Chen, T. Event-triggered formation tracking control of nonholonomic mobile robots without velocity measurements. Automatica 2020, 112, 108671. [Google Scholar] [CrossRef]
  19. Yin, X.; Yue, D.; Hu, S.; Zhang, H. Distributed adaptive model-based event-triggered predictive control for consensus of multiagent systems. Int. J. Robust Nonlinear Control 2018, 28, 6180–6201. [Google Scholar] [CrossRef]
  20. Yue, D.; Tian, E.; Han, Q.-L. A delay system method for designing event-triggered controllers of networked control systems. IEEE Trans. Autom. Control 2012, 58, 475–481. [Google Scholar] [CrossRef]
  21. Liu, J.; Wei, L.; Xie, X.; Tian, E.; Fei, S. Quantized stabilization for t–s fuzzy systems with hybrid-triggered mechanism and stochastic cyber-attacks. IEEE Trans. Fuzzy Syst. 2018, 26, 3820–3834. [Google Scholar] [CrossRef]
  22. Ye, D.; Chen, M.; Yang, H. Distributed adaptive event-triggered fault-tolerant consensus of multiagent systems with general linear dynamics. IEEE Trans. Cybern. 2018, 49, 757–767. [Google Scholar] [CrossRef]
  23. Tian, E.; Peng, C. Memory-based event-triggering H load frequency control for power systems under deception attacks. IEEE Trans. Cybern. 2020, 50, 4610–4618. [Google Scholar] [CrossRef]
  24. Zhang, J.; Zhang, H.; Cai, Y.; Wang, W. Consensus control for nonlinear multi-agent systems with event-triggered communications. Appl. Math. Comput. 2021, 408, 126341. [Google Scholar]
  25. Zhang, A.; Zhou, D.; Yang, P.; Yang, M. Event-triggered finite-time consensus with fully continuous communication free for second-order multi-agent systems. Int. J. Control. Autom. Syst. 2019, 17, 836–846. [Google Scholar] [CrossRef]
  26. Gu, Z.; Yue, D.; Tian, E. On designing of an adaptive event-triggered communication scheme for nonlinear networked interconnected control systems. Inf. Sci. 2018, 422, 257–270. [Google Scholar] [CrossRef]
  27. Hu, S.; Yue, D.; Chen, X.; Cheng, Z.; Xie, X. Resilient H filtering for event-triggered networked systems under nonperiodic dos jamming attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 1392–1403. [Google Scholar] [CrossRef]
  28. Liu, J.; Wang, Y.; Cao, J.; Yue, D.; Xie, X. Secure adaptive-event-triggered filter design with input constraint and hybrid cyber attack. IEEE Trans. Cybern. 2021, 51, 4000–4010. [Google Scholar] [CrossRef]
  29. Peng, C.; Yue, D.; Yang, T.-C.; Tian, E.G. On delay-dependent approach for robust stability and stabilization of t–s fuzzy systems with constant delay and uncertainties. IEEE Trans. Fuzzy Syst. 2009, 17, 1143–1156. [Google Scholar] [CrossRef]
  30. Peng, C.; Han, Q.-L.; Yue, D. Communication-delay-distribution-dependent decentralized control for large-scale systems with ip-based communication networks. IEEE Trans. Control Syst. Technol. 2013, 21, 820–830. [Google Scholar] [CrossRef]
  31. Yang, Y.; Yue, D.; Xue, Y. Decentralized adaptive neural output feedback control of a class of large-scale time-delay systems with input saturation. J. Frankl. Inst. 2015, 352, 2129–2151. [Google Scholar] [CrossRef]
  32. Xie, X.; Yue, D.; Zhang, H.; Xue, Y. Fault estimation observer design for discrete-time takagi–sugeno fuzzy systems based on homogenous polynomially parameter-dependent lyapunov functions. IEEE Trans. Cybern. 2017, 47, 2504–2513. [Google Scholar] [CrossRef]
  33. Gu, Z.; Sun, X.; Lam, H.-K.; Yue, D.; Xie, X. Event-based secure control of t-s fuzzy based 5-dof active semi-vehicle suspension systems subject to dos attacks. IEEE Trans. Fuzzy Syst. 2021. to be published. [Google Scholar] [CrossRef]
  34. Gu, Z.; Ahn, C.K.; Yue, D.; Xie, X. Event-triggered H filtering for t-s fuzzy-model-based nonlinear networked systems with multisensors against dos attacks. IEEE Trans. Cybern. 2020. to be published. [Google Scholar] [CrossRef] [PubMed]
  35. Yan, S.; Gu, Z.; Nguang, S.K. Memory-event-triggered H output control of neural networks with mixed delays. IEEE Trans. Neural Netw. Learn. Syst. 2021. to be published. [Google Scholar] [CrossRef] [PubMed]
  36. Zhang, M. Tracking control for unmanned aerial vehicles with time-delays based on event-triggered mechanism. J. Control Eng. Appl. Inf. 2019, 21, 12–19. [Google Scholar]
  37. Zhang, D.; Ling, R.; Wang, Q.; Yu, L.; Feng, Y. Sensor-network-based distributed stabilization of nonlinear large-scale systems with energy constraints and random sensor faults. J. Frankl. Institute 2015, 352, 3345–3365. [Google Scholar] [CrossRef]
  38. Gu, Z.; Shi, P.; Yue, D.; Yan, S.; Xie, X. Memory-based continuous event-triggered control for networked t-s fuzzy systems against cyber-attacks. IEEE Trans. Fuzzy Syst. 2020, 29, 3118–3129. [Google Scholar] [CrossRef]
  39. Hu, S.; Yue, D.; Han, Q.-L.; Xie, X.; Chen, X.; Dou, C. Observer-based event-triggered control for networked linear systems subject to denial-of-service attacks. IEEE Trans. Cybern. 2019, 50, 1952–1964. [Google Scholar] [CrossRef]
  40. Sun, H.; Peng, C.; Zhang, W.; Yang, T.; Wang, Z. Security-based resilient event-triggered control of networked control systems under denial of service attacks. J. Frankl. Inst. 2019, 356, 10277–10295. [Google Scholar] [CrossRef]
  41. Ye, D.; Zhang, T.-Y.; Guo, G. Stochastic coding detection scheme in cyber-physical systems against replay attack. Inf. Sci. 2019, 481, 432–444. [Google Scholar] [CrossRef]
  42. Wang, H.; Ying, Y.; Lu, R.; Xue, A. Network-based H control for singular systems with event-triggered sampling scheme. Inf. Sci. 2016, 329, 540–551. [Google Scholar] [CrossRef]
  43. Ding, D.; Wang, Z.; Ho, D.W.; Wei, G. Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks. Automatica 2017, 78, 231–240. [Google Scholar] [CrossRef]
  44. Han, F.; Dong, H.; Wang, Z.; Li, G. Local design of distributed H-consensus filtering over sensor networks under multiplicative noises and deception attacks. Int. J. Robust Nonlinear Control 2019, 29, 2296–2314. [Google Scholar] [CrossRef]
  45. Zhang, D.; Liu, L.; Feng, G. Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and dos attack. IEEE Trans. Cybern. 2018, 49, 1501–1511. [Google Scholar] [CrossRef] [PubMed]
  46. Porter, M.; Hespanhol, P.; Aswani, A.; Johnson-Roberson, M.; Vasudevan, R. Detecting generalized replay attacks via time-varying dynamic watermarking. IEEE Trans. Autom. Control 2020, 66, 3502–3517. [Google Scholar] [CrossRef]
  47. Zhang, D.; Wang, Q.; Feng, G.; Shi, Y.; Vasilakos, A.V. A survey on attack detection, estimation and control of industrial cyber–physical systems. ISA Trans. 2021, 116, 1–16. [Google Scholar] [CrossRef]
  48. Yao, W.; Nan, J.; Zhao, Y.; Fang, J.; Ai, X.; Zuo, W.; Wen, J.; Cheng, S. Resilient wide-area damping control for inter-area oscillations to tolerate deception attacks. IEEE Trans. Smart Grid 2021, 12, 4238–4249. [Google Scholar] [CrossRef]
  49. Rong, N.; Wang, Z. Event-based impulsive control of it2 t–s fuzzy interconnected system under deception attacks. IEEE Trans. Fuzzy Syst. 2021, 29, 1615–1628. [Google Scholar] [CrossRef]
  50. Yoo, S.J. Neural-network-based adaptive resilient dynamic surface control against unknown deception attacks of uncertain nonlinear time-delay cyberphysical systems. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 4341–4353. [Google Scholar] [CrossRef]
  51. Gu, Z.; Zhou, X.; Zhang, T.; Yang, F.; Shen, M. Event-triggered filter design for nonlinear cyber–physical systems subject to deception attacks. ISA Trans. 2020, 104, 130–137. [Google Scholar] [CrossRef] [PubMed]
  52. Cui, Y.; Liu, Y.; Zhang, W.; Alsaadi, F.E. Sampled-based consensus for nonlinear multiagent systems with deception attacks: The decoupled method. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 561–573. [Google Scholar] [CrossRef]
  53. Wang, W.; Han, Z.; Liu, K.; Lü, J. Distributed adaptive resilient formation control of uncertain nonholonomic mobile robots under deception attacks. IEEE Trans. Circuits Syst. Regul. Pap. 2021, 68, 3822–3835. [Google Scholar] [CrossRef]
  54. Wei, L.; Chen, M.; Li, T. Dynamic event-triggered cooperative formation control for uavs subject to time-varying disturbances. IET Control Appl. 2020, 14, 2514–2525. [Google Scholar] [CrossRef]
  55. Xiong, T.; Gu, Z.; Yi, J.; Pu, Z. Fixed-time adaptive observer-based time-varying formation control for multi-agent systems with directed topologies. Neurocomputing 2021, 463, 483–494. [Google Scholar] [CrossRef]
  56. Liu, J.; Yin, T.; Cao, J.; Yue, D.; Karimi, H.R. Security control for ts fuzzy systems with adaptive event-triggered mechanism and multiple cyber-attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6544–6554. [Google Scholar] [CrossRef]
  57. Liu, J.; Gu, Y.; Xie, X.; Yue, D.; Park, J.H. Hybrid-driven-based H control for networked cascade control systems with actuator saturations and stochastic cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2452–2463. [Google Scholar] [CrossRef]
  58. Liu, J.; Gu, Y.; Zha, L.; Liu, Y.; Cao, J. Event-triggered h load frequency control for multiarea power systems under hybrid cyber attacks. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 1665–1678. [Google Scholar] [CrossRef]
  59. Zhou, X.; Gu, Z.; Yang, F. Resilient event-triggered output feedback control for load frequency control systems subject to cyber attacks. IEEE Access 2019, 7, 58951–58958. [Google Scholar] [CrossRef]
Figure 1. The framework of the overall formation control scheme.
Figure 1. The framework of the overall formation control scheme.
Electronics 10 02736 g001
Figure 2. The communication graph.
Figure 2. The communication graph.
Electronics 10 02736 g002
Figure 3. Responses of Ψ i x on X-axis.
Figure 3. Responses of Ψ i x on X-axis.
Electronics 10 02736 g003
Figure 4. Responses of formation tracking error on Y-axis.
Figure 4. Responses of formation tracking error on Y-axis.
Electronics 10 02736 g004
Figure 5. Position of four UAVs and the leader at t = 30 , 40 , 50 , 60 s .
Figure 5. Position of four UAVs and the leader at t = 30 , 40 , 50 , 60 s .
Electronics 10 02736 g005
Figure 6. Triggering instants of UAV 1.
Figure 6. Triggering instants of UAV 1.
Electronics 10 02736 g006
Figure 7. Triggering instants of UAV 2.
Figure 7. Triggering instants of UAV 2.
Electronics 10 02736 g007
Figure 8. Triggering instants of UAV 3.
Figure 8. Triggering instants of UAV 3.
Electronics 10 02736 g008
Figure 9. Triggering instants of UAV 4.
Figure 9. Triggering instants of UAV 4.
Electronics 10 02736 g009
Figure 10. Control inputs of the four UAVs on X-axis.
Figure 10. Control inputs of the four UAVs on X-axis.
Electronics 10 02736 g010
Figure 11. Control inputs of the four UAVs on Y-axis.
Figure 11. Control inputs of the four UAVs on Y-axis.
Electronics 10 02736 g011
Figure 12. Responses of Ψ i x on X-axis.
Figure 12. Responses of Ψ i x on X-axis.
Electronics 10 02736 g012
Figure 13. Responses of Ψ i x on Y-axis.
Figure 13. Responses of Ψ i x on Y-axis.
Electronics 10 02736 g013
Table 1. The average number of released data packets of four UAVs on X- and Y-axes.
Table 1. The average number of released data packets of four UAVs on X- and Y-axes.
On X-AxisOn Y-Axis
ETM151.5174.25
TTM60016001
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Sun, B.; Gu, Z.; Xiong, T. Event-Triggered Formation Tracking Control for Unmanned Aerial Vehicles Subjected to Deception Attacks. Electronics 2021, 10, 2736. https://doi.org/10.3390/electronics10222736

AMA Style

Sun B, Gu Z, Xiong T. Event-Triggered Formation Tracking Control for Unmanned Aerial Vehicles Subjected to Deception Attacks. Electronics. 2021; 10(22):2736. https://doi.org/10.3390/electronics10222736

Chicago/Turabian Style

Sun, Biao, Zhou Gu, and Tianyi Xiong. 2021. "Event-Triggered Formation Tracking Control for Unmanned Aerial Vehicles Subjected to Deception Attacks" Electronics 10, no. 22: 2736. https://doi.org/10.3390/electronics10222736

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop