Next Article in Journal
GAN-SkipNet: A Solution for Data Imbalance in Cardiac Arrhythmia Detection Using Electrocardiogram Signals from a Benchmark Dataset
Previous Article in Journal
Multivariate Perturbed Hyperbolic Tangent-Activated Singular Integral Approximation
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Decentralized Adaptive Event-Triggered Fault-Tolerant Cooperative Control of Multiple Unmanned Aerial Vehicles and Unmanned Ground Vehicles with Prescribed Performance under Denial-of-Service Attacks

College of Electrical Engineering and Automation, Fuzhou University, Fuzhou 350108, China
*
Author to whom correspondence should be addressed.
Mathematics 2024, 12(17), 2701; https://doi.org/10.3390/math12172701
Submission received: 14 August 2024 / Revised: 26 August 2024 / Accepted: 29 August 2024 / Published: 29 August 2024

Abstract

:
This paper proposes a decentralized adaptive event-triggered fault-tolerant cooperative control (ET-FTCC) scheme for multiple unmanned aerial vehicles (UAVs) and unmanned ground vehicles (UGVs) with actuator faults and external disturbances under denial-of-service (DoS) attacks. The multiple UAVs and UGVs have a larger search radius, which is important in both the civilian and military domains. The different dynamics between UAVs and UGVs result in unbalanced interactions in the communication topologies, which increases the complexity of cooperative control. DoS attacks are conducted in both sensor and control channels. The dynamic models of UAVs and UGVs are introduced firstly, and the unified heterogeneous multiagent system model with actuator faults is established. The composite observer is designed to obtain the information of state and lumped disturbance, which is used to design the controller. In order to save the limited communication network resources, the event-triggered mechanism is introduced. The transformed error is presented by using the prescribed performance function (PPF). Then, the sliding-mode manifold is presented by combining the event-triggered control scheme to achieve the tracking purpose with actuator faults, external disturbances, and DoS attacks. Based on the Lyapunov function approach, the tracking errors are bounded within the prescribed boundary. Finally, the effectiveness of the proposed method is verified by qualitative analysis and quantitative analysis of the simulation results. This study can enhance the security and reliability of heterogeneous multiagent systems, providing technical support for the safe operation of unmanned systems. This paper mainly solves the FTCC problem of second-order nonlinear heterogeneous multiagent systems, and further research is needed for the FTCC problem of higher-order nonlinear heterogeneous multi-agent systems. In addition, the system may encounter multiple cyber attacks. As one of the future research works, we can extend the results of this paper to high-order nonlinear systems under multiple cyber attacks, which contain DoS attacks and deception attacks, and achieve fault-tolerant cooperative control of heterogeneous multiagent systems.

1. Introduction

Heterogeneous multiagent systems (HMASs) are widely employed in many fields, such as area searching, spacecraft formation flying, and so on [1,2,3]. An HMAS consists of different types of agents that offer more advantages than the homogeneous MASs. For example, multiple UAVs and UGVs have a larger search radius, which is important in both the civilian and military domains. However, due to the heterogeneous characteristics such as structure, and state dimensions between UAVs and UGVs, the execution of air ground formation tasks is hindered. Due to the heterogeneous characteristics of UAVs and UGVs, as well as the influence of parameter uncertainties, air–ground heterogeneous tracking control faces several challenges: UAVs and UGVs differ notably in structure, state dimensions, and model parameters; faults in the physical layer and DoS attacks in the cyber layer of multiple UAVs and UGVs may affect tracking performance. Recently, various cooperative control issues have been investigated for MASs to achieve consensus, formation, or containment control [4,5,6]. But, the existing cooperative control strategies illustrated may not be directly scalable to the cooperative control of HMASs, since there are unexpected actuator faults and DoS attacks.
In practical applications, the actuator in the physical layer may encounter faults. Because the agent is connected through the communication topology, faults will spread through the network, and may result in critical destruction of the system. To ensure the systems’ safe operation, fault-tolerant control (FTC) is an efficient method, and has drawn much attention in safety-critical systems [7,8,9]. In [10], the fault-tolerant tracking control based on distributed observer for MASs is investigated under directed topology. In [11], the FTC protocol utilizing local state information of neighbor agents is presented for MASs subjected to actuator faults. In [12], the FTC scheme by using distributed observer and auxiliary controller gain is investigated for MASs subjected to actuator faults. In [13], the distributed FTC strategy is presented for nonlinear MASs with external disturbances under switched topologies. Nevertheless, in addition to faults in physical layer, attacks in cyber layer can also block the transmission of information, which can be very destructive. In [14], the distributed FTC scheme is investigated by utilizing fuzzy logic systems method and switching mechanism for MASs with node fault and DoS attacks. In [15], the distributed FTC protocol based on resilient observer for HMASs is illustrated under DoS attacks. In [16], the distributed output-feedback control strategy is presented for linear HMASs with sampling and random DoS attacks. In [17], the distributed consensus problem is studied for MASs subjected to DoS attacks under directed topology. In [18], the distributed formation control strategy is designed for MASs against DoS attacks. However, there are few results on FTCC of HMASs with actuator faults subjected to DoS attacks.
Transient performance is another important problem for tracking control of MASs; it is significant to take transient and steady-state performance into account in the post-fault phase. In [19], the adaptive FTC scheme which can ensure that the consensus errors satisfy the prescribed performance requirements is investigated for nonlinear MASs. In [20], the prescribed performance control strategy is presented for a vehicular platoon by utilizing a Gaussian error function and finite-time PPF. In [21], the finite-time consensus issue is illustrated for MASs within prescribed performance. In [22], the tracking control issue is presented for underwater vehicle with model uncertainties by using PPF and disturbance observer. In [23], the formation-containment control scheme is presented for HMASs with prescribed performance. Also considering the limited communication resource, the event-triggered mechanism is proposed to obtain better performance with limited communication resources. In [24], the distributed ET containment control scheme by using a disturbance observer, which does not require the continuous sharing of state information, is studied for linear MASs with DoS attack and external disturbances. In [25], the distributed ET consensus problem is presented for linear MASs under DoS jamming attacks. In [26], the distributed ET formation control scheme is investigated for nonlinear MASs against DoS attacks. In [27], the ET consensus issue is studied for linear MASs with frequency cyber attacks. Although several FTC strategies are investigated for MASs under DoS attacks, the adaptive ET-FTCC strategy for HMASs with actuator faults and prescribed performance against DoS attacks is a challenging problem.
Motivated by the above-mentioned analyses, this paper investigates the ET-FTCC scheme for HMASs with actuator faults subjected to DoS attacks. The observer is designed to obtain the unmeasurable states. The PPF is utilized to convert the tracking error. Utilizing the transformed error, the ET-FTCC with prescribed performance can be achieved.
In comparison with other relevant works, the main contributions are concluded as follows:
  • In order to save the limited communication network resources, the novel ET mechanism is illustrated, in comparison with some existing results [28,29], in which only the ET mechanism in the control channel is considered. The event-triggered mechanism is also presented by using the triggered state directly, which may cause chattering of the controller once actuator faults or DoS attacks occur. In this work, the ET mechanism in the sensor and controller channel are both considered. The presented ET mechanism can balance the limited communication network resources and information utilization. Furthermore, the Zeno behavior is excluded.
  • The composite observer is presented, in which the state is estimated and the lumped disturbances are reconstructed utilizing the estimated state and the sensor channel triggered outputs without using the disturbance upper bound. In this way, the unknown variables are estimated with less information. In contrast to some existing results [30,31], in which the upper bound information of disturbances should be known when designing the disturbance observer, the results of this work provide another method to estimate the disturbances.
  • An observer-based ET-FTCC scheme, including FTC compensation, disturbances degradation, and DoS prevention components, is studied. To obtain good system performance, a modified PPF is presented to convert the tracking errors, thereby relaxing the requirement for the exact initial conditions. In contrast to the work in [32], in which the control input is blocked when the DoS attack is active, the data at the instant when the attacker is switched between asleep and active in this work is triggered and utilized as a compensation component.
The remainder of this paper is presented as follows. Some preliminaries and problem formulation are introduced in Section 2 and Section 3. Section 4 gives the main theoretical results. The simulation studies are provided in Section 5. Section 6 concludes the paper.

2. Preliminaries

2.1. Graph Theory

A graph is given to describe interaction topology of agents. The undirected graph G = ( V , E ) consists of a node set V = { 1 , 2 , , N } and an edge set E V × V . Let A = [ a i j ] R N × N be adjacency matrix of G , where a i j = 1 if ( j , i ) E and a i j = 0 otherwise. Let D = diag { d 1 , d 2 , , d N } be degree matrix with d i = j = 1 N a i j . The Laplacian matrix is defined as L = [ l i j ] = D A R N × N .
Assumption 1.
The topology G is connected.
Lemma 1
([33]). If Assumption 1 is satisfied and U R N is a nonzero non-negative vector, then L and L + diag ( U ) are both symmetric positive definite matrices.

2.2. Actuator Fault Model

The actuator fault model is presented as
u i h F ( t ) = ρ i h u i h ( t ) + u i h b ( t ) ,
where ρ i h denotes the unknown effectiveness factor, u i h b ( t ) denotes the bias, u i h ( t ) and u i h F ( t ) denote the desired and actual control input signal.
From (1), one has
u i F ( t )   =   ρ i u i ( t ) + u i b ( t ) ,
with ρ i = diag { ρ i 1 , ρ i 2 , , ρ i n } , u i b ( t ) = [ u i b 1 ( t ) , u i b 2 ( t ) , , u i b n ( t ) ] T .
Assumption 2.
There exist a lower bound ρ ̲ i and upper bound ρ ¯ i satisfying 0 < ρ ̲ i ρ i ρ ¯ i 1 . ρ ˙ i ρ i c with ρ i c being a positive constant.

2.3. DoS Attack Model

DoS attacks can interfere with the communication channel and damage the communication equipment, causing data transmission to be interrupted. It can attack the single communication channel or attack measurement, communication, and control channels all at once. The DoS attack has great destructive power, but it needs to stop to recover energy, due to energy limitations. The attack’s purpose is to obliterate the transmitted data before reaching the destination, which is expressed as
S D o S = 0 , t Ξ n , 1 : = [ p d n , p d n + l d n ) , 1 , t Ξ n , 2 : = [ p d n + l d n , p d n + 1 ) ,
where p d n and l d n represent the instant and the length of the n-th attack, respectively. Ξ n , 1 and Ξ n , 2 represent the sleeping period and active period of the DoS attack, respectively.
Assumption 3.
Let n a ( τ d , t ) be the number of attacks on [ τ d , t ) ; there exist ξ d 0 and τ S > 0 satisfying
n a ( τ d , t ) ξ d + t τ d τ S .
Assumption 4.
Let | Ξ ( τ , t ) | be the length of Ξ ( τ d , t ) ; there exist o d 0 and T > 1 satisfying
| Ξ ( τ , t ) | o d + t τ d T .

3. Problem Formulation

In this section, M 1 quadrotor UAVs and M 2 two-wheeled mobile robot UGVs are considered. For convenience, let Π 1 = { 1 , 2 , , M 1 } , Π 2 = { M 1 + 1 , M 1 + 2 , , M 1 + M 2 } , and Π = Π 1 Π 2 .

3.1. UAV Dynamics

The structure of the quadrotor UAV is shown in Figure 1. In order to describe the dynamic characteristic of the quadrotor UAV, the inertia frame and the body-fixed frame are employed. The axes of the inertia frame are denoted as ( x e , y e , z e ) , and the axes of the body-fixed frame are denoted as ( x b , y b , z b ) . The translational dynamics of the i-th ( i Π 1 ) UAV are described as [34]
m a i p ¨ a i x = ( cos ϕ a i sin θ a i cos ψ a i + sin ϕ a i sin ψ a i ) u p i d i x p ˙ a i x , m a i p ¨ a i y = ( cos ϕ a i sin θ a i sin ψ a i + sin ϕ a i cos ψ a i ) u p i d i y p ˙ a i y , m a i p ¨ a i z = ( cos θ a i cos ϕ a i ) u p i m a i g d i z p ˙ a i z ,
J a x ϕ ¨ a i = θ ˙ a i ψ ˙ a i ( J a y J a z ) J a r θ ˙ a i d ¯ a i + τ ϕ i d i ϕ ϕ ˙ a i , J a y θ ¨ a i = ϕ ˙ a i ψ ˙ a i ( J a z J a x ) J a r ϕ ˙ a i d ¯ a i + τ θ i d i θ θ ˙ a i , J a z ψ ¨ a i = ϕ ˙ a i θ ˙ a i ( J a x J a y ) + τ ψ i d i ψ ψ ˙ a i ,
where [ p a i x , p a i y , p a i z ] T and [ ϕ a i , θ a i , ψ a i ] T denote the position and attitude states, d i x , d i y , and d i z denote the aerodynamic damping coefficients, m a i , u p i , and g denote the mass, control thrust, and gravitational acceleration, τ ϕ i , τ θ i , and τ ψ i denote the three control torques, J a x , J a y , and J a z denote the moments of the inertia, J a r denotes the moment of rotor’s inertia, and d ¯ a i is the overall residual rotor angle.
Consider a new control signal u a i ; (4) can be rewritten as
p ¨ a i = u a i + f a i ,
where f a i = [ d i x p ˙ a i x / m a i , d i y p ˙ a i y / m a i , d i z p ˙ a i z / m a i g ] T , p a i = [ p a i x , p a i y , p a i z ] T , u a i = [ u a i x , u a i y , u a i z ] T with u a i x = ( cos ϕ a i sin θ a i cos ψ a i + sin ϕ a i sin ψ a i ) u p i / m a i , u a i y = ( cos ϕ a i sin θ a i sin ψ a i sin ϕ a i cos ψ a i ) u p i / m a i , u a i z = ( cos ϕ a i cos θ a i ) u p i / m a i g .
Remark 1.
The six-degree-of-freedom quadrotor dynamic systems can be controlled by utilizing attitude subsystems and trajectory subsystems control framework. The trajectory subsystems, which are capable of guiding the quadrotor UAV to an expected position, are more significant in the UAV tracking control design than the attitude subsystems [35]. Therefore, the adaptive event-triggered fault-tolerant cooperative control scheme studied in this paper considers the trajectory systems.

3.2. UGV Dynamics

The two-wheeled mobile robot UGV is driven by two wheels at the rear, with a supporting universal wheel at the front to maintain stability. The structure of the UGV is shown in Figure 2. The dynamic model of the i-th ( i Π 2 ) two-wheeled mobile robot UGV is described as [36]
x ˙ g i   = v g i cos θ g i , y ˙ g i   = v g i sin θ g i , θ ˙ g i   = ω g i ,
where x i = [ x g i , y g i ] T denotes the position states, θ g i denotes the orientation, v g i and ω g i are the linear and angular velocity, respectively, v ˙ g i = F g i / M g i , ω ˙ g i = τ g i / J g i , M g i and J g i are the mass and moment of the inertia, and F g i and τ g i are the force and torque.
Due to the non-holonomic constraint, a hand position approach is utilized. The front point ( p g i x , p g i y ) of the UGVs is defined as the hand point. The coordinate transformation is given as p g i x = x g i + L g i cos θ g i and p g i y = y g i + L g i sin θ g i , where L g i is the distance between the position ( x g i , y g i ) and the new defined hand point ( p g i x , p g i y ) . Then, the system (7) is rewritten
p ¨ g i = u g i + f g i ,
where
u g i   =   cos θ g i L g i sin θ g i sin θ g i L g i cos θ g i v ˙ g i ω ˙ g i , f g i   =   v i ω g i sin θ g i L g i ω g i 2 cos θ g i v i ω g i cos θ g i L g i ω g i 2 sin θ g i .

3.3. Model Transformation

In comparison with MASs, the difficulty of cooperative control of HMASs is that the dynamic characteristics and even the dimensions differ between the agents. To solve this control problem, the unified control model with actuator faults model (2) and external disturbances d i is written as
x ˙ i 1 = x i 2 , x ˙ i 2 = ρ i u i + u i b + d i + f i ,
where x i 1 = [ p a i x , p a i y , p a i z ] T denotes the position of the i-th UAV, ρ i = diag { ρ a i x , ρ a i y , ρ a i z } denotes the effectiveness factor, u i = [ u a i x , u a i y , u a i z ] T denotes the virtual control input signal, f i = f a i denotes the nonlinear term, u i b = [ u a i b x , u a i b y , u a i b z ] T denotes the bias, d i = [ d a i x , d a i y , d a i z ] T denotes the external disturbance ( i Π 1 ), x i 1 = [ p g i x , p g i y , 0 ] T denotes the position of the i-th UGV, ρ i = diag { ρ g i x , ρ g i y , 0 } denotes the effectiveness factor, u i = [ u g i x , u g i y , 0 ] T denotes the virtual control input signals, f i = f g i denotes the nonlinear term, u i b = [ u g i b x , u g i b y , 0 ] T denotes the bias, and d i = [ d g i x , d g i y , 0 ] T denotes the external disturbance, i Π 2 .
Hence, (9) can be rewritten as
x ˙ i = A i x i ( t ) + B i ρ i u i ( t ) + R i ( t ) ,
where A i = 0 1 0 0 , B i = [ 0 , 1 ] T , R i ( t ) = B i d i + B i u i b + B i f i .
Remark 2.
Since the dynamics of UAVs and UGVs are three dimensional and two dimensional, respectively, it is hard to design collaborative control scheme straightforwardly. Hence, the dimension of the UGV is upgraded, i.e., the position, velocity, and control input on Z-axis are zero. In addition, the unified control model (9) is transformed from the actual physical models of quadrotor UAVs and two-wheeled mobile robot UGVs; therefore, the complexity of UAVs and UGVs can be reflected. Consequently, the unified control model (9) accommodates both UAVs and UGVs.

3.4. Control Objective

The control objective is to present ET-FTCC scheme for HMASs (9) subjected to actuator faults and disturbances against DoS attacks, such that the tracking errors can be restrained to the prescribed bounds.

4. Main Results

In this section, the ET-FTCC scheme is designed for HMASs subjected actuator faults and disturbances against DoS attacks. Figure 3 shows the diagram.

4.1. Event-Triggered Mechanism Design

To save the limited communication resource, the ET mechanism in the sensor and controller channel are both considered. For the sensor channel, the ET time instants are designed as
t k + 1 i h = inf { q h > t k i h : F i ( q h ) > 0 } ,
where F i ( q h ) = e z i ( t k i h ) T Q i e z i ( t k i h ) σ ϵ i ( t k i h + q h ) T Q i ϵ i ( t k i h + q h ) , with σ [ 0 , 1 ) , Q i > 0 , q N , e z i ( t k i h ) = y i ( t k i h ) y i ( t k i h + q h ) , ϵ i ( t k i h + q h ) = j N i a i j [ y i ( t k i h + q h ) y j ( t k j h + q h ) ] .
The DoS attack can interfere with communication channel, which indicates that the k-th triggered data may not be delivered to the target when the DoS attack is active. Figure 4 shows an example of the ET mechanism and sequence of DoS attacks. In Figure 4, the n-th DoS attack period Ξ n includes the sleeping period Ξ n , 1 and the active period Ξ n , 2 . To ensure the performance, the reasonable assumption is made that the packets at the end of each attack period p d n should be released regardless of whether it satisfies the condition (11) in the ET mechanism. The specific meaning of each kind of packet is shown in Figure 4. For example, at instant 10 h , the packet does not satisfy the condition (11), but it is necessary to improve the performance. Hence, the resilient ET mechanism is given as
t k , n + 1 i h { t s i h satisfying ( 11 ) | t s i h Ξ n , 1 } { p d n } ,
where t k , n + 1 i h denotes the instant when the data are transmitted to sensor. k { 0 , 1 , , k ( n ) } with k ( n ) = sup { k N | t k , n + 1 i h < p d n + l d n } .
Remark 3.
According to Equation (11), the next transferred data will be triggered if the condition is met. Since the DoS attacks can block the communication, the triggered data should not be within the active period of the DoS attacks. Hence, the resilient ET mechanism (12) is proposed.

4.2. Observer Design

The state of the HMASs is treated as not fully measurable; the observer is presented for (10) at t [ t k i h , t k + 1 i h )
x ^ ˙ i ( t )   = A i x ^ i ( t ) + B i ρ ^ i u i ( t ) + L i ( y i ( t k , n + 1 i h ) y ^ i ( t ) ) + Δ i ( t ) , y ^ i ( t )   = C i x ^ i ( t ) ,
where x ^ i ( t ) , ρ ^ i , θ ^ i , and y ^ i ( t ) denote the estimations of x i ( t ) , ρ i , θ i * , and y i ( t ) , respectively. L i denotes observer gain. Δ i ( t ) is an estimation error compensator, which is given as
Δ i ( t )   =   P i e x i ( t ) e x i ( t ) T P i 2 ι ^ i e x i ( t ) T P i Ψ i ( t ) κ 1 Ψ i ( t ) 2 e x i ( t ) T P i L c i e x i ( t ) e x i ( t ) T P i L i e y i ( t ) + η c i ,
where e x i ( t ) = x i ( t ) x ^ i ( t ) , e y i ( t ) = y i ( t k , n + 1 i h ) y i ( t ) , η c i = ( ρ ¯ i ρ ̲ i ) ( ρ ¯ i ρ ̲ i + ρ i c ) , P i is a positive symmetry matrix, L c i is a designed matrix, ι ^ i is the estimations of ι i , and κ 1 is a positive constant.
The adaptive law of ρ ^ i is designed as
ρ ^ ˙ i = Proj [ ρ ̲ i , ρ ¯ i ] { P } = 0 , if ρ ^ i = ρ ¯ i and P 0 or ρ ^ i = ρ ̲ i and P 0 , P , otherwise ,
where P = B i u i ( t ) T P i e x i ( t ) .
Hence, the error system is obtained as
e ˙ x i ( t )   =   B i ρ ˜ i u i ( t ) + ( A i L i C i ) e x i ( t ) + R i ( t ) L i e y i ( t ) Δ i ( t )
where ρ ˜ i = ρ i ρ ^ i .
In this work, the lumped disturbance is assumed to meet R i ( t ) ι i Ψ i ( t ) , with ι i being an unknown constant. The auxiliary vector is given as
Ψ i ( t )   =   0 t κ 2 e x i ( t ) d t + e x i ( t ) ξ i ( t ) ,
with κ 2 being a positive constant. ξ i ( t ) is an internal variable, which is given as
ξ ˙ i ( t )   =   B i ρ ˜ i u i ( t ) + ( A i L i C i ) e x i ( t ) + ( κ 1 + ι ^ i ) Ψ i ( t ) + κ 2 e x i ( t ) L i e y i ( t ) Δ i ( t ) .
The adaptive law ι ^ i is designed as
ι ^ ˙ i   =   κ 1 ( Ψ i ( t ) 2 + e x i T ( t ) P i Ψ i ( t ) ) .
In addition, the lumped disturbances can be estimated as
R ^ ˙ i ( t )   =   ( κ 1 + ι ^ i ) Ψ i ( t ) .
Theorem 1.
With the estimators (13) and (20), and the adaptive law (15), the estimation errors of the close-loop systems is guaranteed if the following condition holds:
( P Γ + P L c ) T + ( P Γ + P L c ) < 0 ,
with P = diag { P 1 , P 2 , , P N } , L c = diag { L c 1 , L c 2 , , L c N } , Γ = [ A 1 L 1 C 1 , A 2 L 2 C 2 , , A N L N C N ] .
Proof. 
Consider the Lyapunov function
V 1 ( t )   =   i = 1 N ( e x i T ( t ) P i e x i ( t ) + Ψ i ( t ) Ψ i ( t ) + ι ˜ i T ι ˜ i κ 1 + ρ ˜ i T ρ i ) ,
where ι ˜ i = ι i ι ^ i .
The derivative of (22) is presented as
V ˙ 1 ( t )   =   2 i = 1 N e x i T ( t ) P i ( B i ρ ˜ i u i ( t ) + ( A i L i C i ) e x i ( t ) L i e y i ( t ) + R i ( t ) Δ i ( t ) ) + 2 i = 1 N ( Ψ i ( t ) Ψ ˙ i ( t ) + ι ˜ i T ι ˜ ˙ i κ 1 + ρ ˜ i T ρ ˜ ˙ i ) .
From (15), one can deduce that
2 e x i T ( t ) P i B i ρ ˜ i u i ( t ) + 2 ρ ˜ i T ρ ˜ ˙ i = 2 e x i T ( t ) P i B i ρ ˜ i u i ( t ) + 2 ρ ˜ i T ( ρ ˙ i ρ ^ ˙ i ) = 2 e x i T ( t ) P i B i ρ ˜ i u i ( t ) + 2 ρ ˜ i T ( ρ ˙ i e x i T ( t ) P i B i u i ( t ) ) 2 ρ ˜ i T ρ ˙ i 2 η c i ,
In terms of (20), one has
2 e x i T ( t ) P i R i ( t ) + 2 Ψ i ( t ) Ψ ˙ i ( t ) + 2 ι ˜ i T ι ˜ ˙ i κ 1 2 ι i e x i T ( t ) P i Ψ i ( t ) + 2 Ψ i ( t ) T ( κ 2 e x i ( t ) + e ˙ x i ( t ) ξ ˙ i ( t ) ) + 2 ι ˜ i T ι ˜ ˙ i κ 1 2 ι i e x i T ( t ) P i Ψ i ( t ) + 2 Ψ i ( t ) T ( R i ( t ) R ^ i ( t ) ) + 2 ι ˜ i T ι ˜ ˙ i κ 1 2 ι i e x i T ( t ) P i Ψ i ( t ) + 2 Ψ i ( t ) T ( ι i Ψ i ( t ) ( κ 1 + ι ^ i ) Ψ i ( t ) ) 2 ι ˜ i T ( Ψ i ( t ) 2 + e x i T ( t ) P i Ψ i ( t ) ) = 2 ι i e x i T ( t ) P i Ψ i ( t ) 2 ι ˜ i e x i T ( t ) P i Ψ i ( t ) 2 κ 1 Ψ i ( t ) 2 = 2 κ 1 Ψ i ( t ) 2 + 2 ι ^ i e x i T ( t ) P i Ψ i ( t ) .
Combing (24) and (25), one can obtain
V ˙ 1 ( t )     2 i = 1 N e x i T ( t ) P i ( ( A i L i C i ) e x i ( t ) L i e y i ( t ) Δ i ( t ) ) 2 i = 1 N ( e x i T ( t ) P i L c i e x i ( t ) e x i T ( t ) P i L c i e x i ( t ) ) 2 i = 1 N κ 1 Ψ i ( t ) 2 + 2 i = 1 N ι ^ i e x i T ( t ) P i Ψ i ( t ) + 2 i = 1 N η c i
Substituting (14) into (26), one has
V ˙ 1 ( t )     2 i = 1 N e x i T ( t ) P i P i e x i ( t ) e x i ( t ) T P i 2 ( η c i κ 1 Ψ i ( t ) 2 + ι ^ i e x i ( t ) T P i Ψ i ( t ) e x i ( t ) T P i L c i e x i ( t ) e x i ( t ) T P i L i e y i ( t ) ) 2 i = 1 N e x i T ( t ) P i L i e y i ( t ) + 2 i = 1 N ( η c i κ 1 Ψ i ( t ) 2 + ι ^ i e x i T ( t ) P i Ψ i ( t ) e x i T ( t ) P i L c i e x i ( t ) ) + 2 i = 1 N e x i T ( t ) P i ( A i L i C i ) e x i ( t ) + 2 i = 1 N e x i T ( t ) P i L c i e x i ( t ) 2 i = 1 N e x i T ( t ) P i ( A i L i C i ) e x i ( t ) + 2 i = 1 N e x i T ( t ) P i L c i e x i ( t )   = e T ( ( P Γ + P L c ) T + ( P Γ + P L c ) ) e .
where e x = [ e x 1 , e x 2 , , e x N ] T .
According to (21), one can conclude that V ˙ 1 ( t ) < 0 . On Ξ n , 2 , similar results can be obtained. Hence, the convergence of the estimation errors is guaranteed. This completes the proof. □
Remark 4.
In this work, the estimation of the lumped disturbance is based on the assumption R i ( t ) ι i Ψ i ( t ) , which is reasonable. The actuator fault and the external disturbance in the practical system are both bounded, and the auxiliary vector Ψ i ( t ) has the information of the lumped disturbance. Since the lumped disturbance is bounded, by introducing the unknown scalar ι i , the assumption can be satisfied.

4.3. FTCC Design

The tracking error is defined as
s i   =   χ 1 z i + χ 2 j N i a i j ( z i z j ) ,
where z i = y i ( t k , n + 1 i h ) y i d ( t ) , y i d ( t ) is the desired reference, χ 1 and χ 2 are positive parameters.
Then, (28) can be rewritten as
S   =   [ ( χ 1 I N + χ 2 L ) I 3 ] Z 1 ,
where S = [ s 1 T , s 2 T , , s N T ] T and Z 1 = [ z 1 T , z 2 T , , z N T ] T . In terms of Lemma 1, one has Z 1 0 as S 0 .
The error constraints are defined as
k ̲ i ε i ( t ) s i k ¯ i ε i ( t ) ,
where k ̲ i and k ¯ i are positive constants.
The PPF is chosen as
ε i ( t ) = coth ( β 1 t + β 2 ) 1 + ε i ,
where β 1 and β 2 are positive constants.
In order to facilitate controller design, (30) can be transformed as
s i = ε i ( t ) Λ ( e i s ) ,
where e i s is the transformed error, Λ ( e i s ) = k ¯ i e e i s k ̲ i e e i s e e i s e e i s .
Then, one can obtain
e i s = 1 2 ln ( k ̲ i + π i k ¯ i π i ) ,
where π i = s i / ε i .
The derivative of (33) is presented as
e ˙ i s   =   1 2 ( 1 π i + k ̲ i 1 π i k ¯ i ) ( s ˙ i ε i ε ˙ i s i ε i 2 )   =   υ i ( s ˙ i ε ˙ i s i ε i ) ,
where υ i = 1 2 ε i ( 1 π i + k ̲ i 1 π i k ¯ i ) .
The sliding mode manifold is designed as
δ i = 0 t ( ς i ( e i s α 1 + e ˙ i s α 2 ) υ i Ω C i B i ρ ^ i u i a ( t ) ) d t + e i s ,
where α 1 and α 2 are positive constants. ς i is designed as
ς i = α a α b + α c exp ( α d ( R ^ i + e i s ) α e ) ,
where α a , α b , α c , α d , and α e are positive constants.
The derivative of (35) is presented as
δ ˙ i   =   ς i ( e i s α 1 + e ˙ i s α 2 ) υ i Ω C i B i ρ ^ i u i a ( t ) + υ i ( s ˙ i ε ˙ i s i ε i )   =   ς i ( e i s α 1 + e ˙ i s α 2 ) υ i Ω C i B i ρ ^ i u i a ( t ) + υ i Ω C i ( A i x i ( t ) + B i ρ i u i ( t ) + θ i * T φ i ( x ^ i ) + R i ( t ) ) υ i Ω y ˙ i d + υ i χ 2 j N i l i j z j υ i ε ˙ i s i ε i   =   ς i ( e i s α 1 + e ˙ i s α 2 ) + υ i Ω C i ( A i x i ( t ) + B i ρ ^ i u i b ( t ) + B i ρ ˜ i u i ( t ) + θ i * T φ i ( x ^ i ) + R i ( t ) ) υ i Ω y ˙ i d + υ i χ 2 j N i l i j z j υ i ε ˙ i s i ε i ,
where Ω = χ 1 + χ 2 l i i .
Hence, the equivalent control is obtained
u i b e q ( t ) = ( C i B i ρ ^ i ) 1 ( ς i υ i Ω ( e i s α 1 + e ˙ i s α 2 ) y ˙ i d + Φ i 1 ( t ) ) ,
where Φ i 1 ( t ) = C i ( A i x i ( t ) + B i ρ ˜ i u i ( t ) + θ i * T φ i ( x ^ i ) + R i ( t ) ) + χ 2 Ω j N i l i j z j ε ˙ i s i Ω ε i .
The FTCC scheme is designed as
u i a ( t ) = ( C i B i ρ ^ i ) 1 ( ( α f + ϱ ^ 1 i ϖ 1 ) sign ( δ i ) ) , t Ξ n , 1 , ( C i B i ρ ^ i ) 1 ( ( α g + ϱ ^ 2 i ϖ 2 ) sign ( δ i ) ) , t Ξ n , 2 ,
u i b ( t ) = ( C i B i ρ ^ i ) 1 ( ς i υ i Ω ( e i s α 1 + e ˙ i s α 2 ) y ˙ i d + Φ i 2 ( t ) ) ,
where Φ i 2 ( t ) = C i ( A i x ^ i ( t ) + θ ^ i T φ i ( x ^ i ) + R ^ i ( t ) ) + χ 2 Ω j N i l i j z ^ j ε ˙ i s ^ i Ω ε i , z ^ j = y ^ j y j d , s ^ i = χ 1 z ^ i + χ 2 j N i a i j ( z ^ i z ^ j ) . α f and α g are positive constants, ϖ 1 and ϖ 2 are two new vectors, which will be given later, and ϱ ^ 1 i and ϱ ^ 2 i are the estimations of two unknown vectors ϱ 1 i and ϱ 2 i , respectively, which will also be defined later.
To save the limited communication resources, the event condition in the control channel is considered. Hence, under the ET condition of the control channel, the triggered control u i b ( t ) can be rewritten as
u i b e t ( t ) = ( C i B i ρ ^ i ( t c ) ) 1 ( ς i υ i Ω ( e i s α 1 ( t c ) + e ˙ i s α 2 ( t c ) ) y ˙ i d ( t c ) + Φ i 2 ( t c ) ) , t Ξ n , 1 , ( C i B i ρ ^ i ( t p d n + l d n ) ) 1 ( ς i υ i Ω ( e i s α 1 ( t p d n + l d n ) + e ˙ i s α 2 ( t p d n + l d n ) ) y ˙ i d ( t p d n + l d n ) + Φ i 2 ( t p d n + l d n ) ) , t Ξ n , 2 ,
where t c is the event-triggered instant of the control channel, which is designed as
t c + 1 i = inf { t > t c i : h i ( t ) > 0 } .
The triggered function is designed as
h i ( t ) = e i s α 1 ( t ) e i s α 1 ( t c ) e μ 1 ν 1
or e ˙ i s α 2 ( t ) e ˙ i s α 2 ( t c ) e μ 2 ν 2 ,
where μ 1 , μ 2 , ν 1 , and ν 2 are positive constants.
Theorem 2.
Consider HMASs under Assumptions 1–4. The sliding mode manifold is given as (35), the triggered function is designed as (42), the control law is presented as (38) and (40), and then the sliding motion will maintain and the tracking errors of all vehicles can be guaranteed.
Proof. 
Select the Lyapunov function
V s ( t )   =   i = 1 N ( 1 J ) V s 1 ( t ) + J V s 2 ( t ) ,
with V s 1 ( t ) = 1 2 δ i ( t ) T δ i ( t ) + 1 2 ( ϱ 1 i ϱ ^ 1 i ) 2 , J = 0 , t Ξ n , 1 ; V s 2 ( t ) = 1 2 δ i ( t ) T δ i ( t ) + 1 2 ( ϱ 2 i ϱ ^ 2 i ) 2 , J = 1 , t Ξ n , 2 .
Consider that there is no DoS attack, i.e., t Ξ n , 1 . Substituting (38) and (40) into (36), one can obtain
δ ˙ i ( t )   =   ς i ( e i s α 1 ( t ) + e ˙ i s α 2 ( t ) ) υ i Ω y ˙ i d + υ i Ω Φ i 1 ( t ) ς i ( e i s α 1 ( t c ) + e ˙ i s α 2 ( t c ) ) + υ i Ω y ˙ i d ( t c ) υ i Ω Φ i 2 ( t c )   =   ς i ( e i s α 1 ( t ) e i s α 1 ( t c ) + e ˙ i s α 2 ( t ) e ˙ i s α 2 ( t c ) ) + Φ i 3 ( t ) ( α f + ϱ ^ 1 i ϖ 1 ) sign ( δ i ) ,
where Φ i 3 ( t ) = υ i Ω y ˙ i d + υ i Ω Φ i 1 ( t ) + υ i Ω y ˙ i d ( t c ) υ i Ω Φ i 2 ( t c ) + ( α f + ϱ ^ 1 i ϖ 1 ) sign ( δ i ) .
Let Θ i =   ς i ( e i s α 1 ( t ) e i s α 1 ( t c ) + e ˙ i s α 2 ( t ) e ˙ i s α 2 ( t c ) )   +   Φ i 3 ( t ) . Then, one can obtain that Θ i is unknown but bounded. The RBFNN is utilized to approximate the unknown part Θ i .
Θ i = F i T ψ i ( t ) + M i .
Hence, one can obtain
δ i ( t ) Θ i δ i ( t ) F i T ψ i ( t ) + δ i ( t ) M i   =   δ i ( t ) ϱ 1 i ϖ 1 i ,
where ϱ 1 i = [ F i T , M i ] , ϖ 1 i = [ ψ i ( t ) , 1 ] T . In addition, the adaptive law of ϱ 1 i is updated as ϱ ^ 1 i = δ i ( t ) ϖ 1 i .
The derivative of (44) yields that
V ˙ s ( t ) i = 1 N ( δ i ( t ) T δ ˙ i ( t ) + ( ϱ 1 i ϱ ^ 1 i ) ( ϱ ˙ 1 i ϱ ^ ˙ 1 i ) ) i = 1 N ( δ i ( t ) ϱ 1 i ϖ 1 i δ i ( t ) T ( α f + ϱ ^ 1 i ϖ 1 i ) sign ( δ i ) ( ϱ 1 i ϱ ^ 1 i ) δ i ( t ) ϖ 1 i )   =   i = 1 N ( δ i ( t ) ( ϱ 1 i ϖ 1 i α f ϱ ^ 1 i ϖ 1 i ) ( ϱ 1 i ϱ ^ 1 i ) δ i ( t ) ϖ 1 i ) i = 1 N α f δ i ( t ) .
Consider that the DoS attack is launched, i.e., t Ξ n , 2 . Similar results can be obtained through similar derivations. Hence, it can be concluded that V ˙ s ( t ) 0 , which implies that the sliding motion will maintain and the convergence of e i s is guaranteed. In terms of the property of the PPF, the boundedness of e i s implies that the tracking errors s i are also bounded within the predefined bounds specified by (30). This ends the proof. □
Remark 5.
It can be easily seen from (10) that the minimum time interval will be no less than h, which implies that the time interval between two adjacent data release times will not be less than the sampling period. Hence, the Zeno behavior can be avoided in the sensor channel. A similar analysis can be applied in the controller channel. Therefore, the Zeno behavior can be also avoided in the controller channel.
Remark 6.
In some existing literature [37,38], the control input is directly set to zero. It does not consider how to utilize an observer to guarantee the safe and stable operation of the system. The existing results about event-triggered mechanism concentrates on either the sensor channel or the control channel. It is challenging to take both sensor and control channels into account, simultaneously. Hence, the novelty of this work is that an observer-based ET-FTCC scheme is proposed via dual-terminal triggered mechanisms with prescribed performance.

5. Simulation Studies

In this section, the efficiency of the presented ET-FTCC scheme is verified with actuator faults and external disturbances under DoS attacks.

5.1. Simulation Conditions

The HMASs containing two UAVs and two UGVs are considered. The topology of the HMASs is described in Figure 5.
The system parameters are given as m a i = 2 kg , d i x = d i y = d i z = 0.012 N · s · rad 1 , M g i = 10 kg , J g i = 1 N · s · rad 1 , L g i = 0.5 m . The initial values are x 11 ( 0 ) = [ 0.9 , 2 , 2.5 ] T , x 21 ( 0 ) = [ 0.4 , 1 , 0.5 ] T , x 31 ( 0 ) = [ 2.2 , 2.5 , 0 ] T , x 41 ( 0 ) = [ 1.5 , 1.5 , 0 ] T , x 12 ( 0 ) = [ 0.1 , 0.2 , 0.5 ] T , x 22 ( 0 ) = [ 0.3 , 0.6 , 0.4 ] T , x 32 ( 0 ) = [ 0.1 , 0.3 , 0 ] T , and x 42 ( 0 ) = [ 0.2 , 0.4 , 0 ] T . The parameters are selected as α 1 = 0.7 , α 2 = 1.2 , α a = 0.9 , α b = 1.3 , α c = 1 , α f = 0.2 , α g = 0.5 , μ 1 = 0.4 , μ 2 = 0.4 , ν 1 = 0.01 , and ν 2 = 0.01 . The prescribed performance function parameters are given as β 1 = 0.3 , β 2 = 0.3 , ε i = 3 . The external disturbances are given as d 1 = [ 0.3 sin ( t ) , 0.4 , 0.2 cos ( t ) ] T , d 2 = [ 0.25 , 0.3 sin ( t ) , 0.2 ] T , d 3 = [ 0.3 sin ( t ) , 0.2 , 0 ] T , and d 4 = [ 0.5 cos ( t ) , 0.1 , 0 ] T . The actuator faults are encountered by the followers UAV#1 and UGV#4, and they are given as ρ 11 = I 3 , u 11 b = [ 0 , 0 , 0 ] T for t < 9 s , and ρ 11 = diag { 0.9 , 1 , 0.8 } , u 11 b = [ 0.2 , 0.3 , 0.15 ] T for t 9 s , ρ 41 = diag { 1 , 1 , 0 } , u 41 b = [ 0 , 0 , 0 ] T for t < 15 s , and ρ 41 = diag { 0.8 , 0.9 , 0 } , u 41 b = [ 0.3 , 0.2 , 0 ] T for t 15 s .
The performance of the presented ET-FTCC scheme is compared with the control scheme in [39]. To further quantitatively evaluate the control performance, the X-direction, Y-direction, and Z-direction tracking error metric (TEM) are defined as
XTEM   =   1 4 i = 1 4 | s i x | 2 , YTEM = 1 4 i = 1 4 | s i y | 2 , ZTEM = 1 2 i = 1 2 | s i z | 2 .

5.2. Simulation Results

The simulation results are presented in Figure 6, Figure 7 and Figure 8. The tracking errors of UAVs and UGVs in the X-direction, Y-direction, and Z-direction are depicted in Figure 6. It can be observed from Figure 6 that the tracking errors achieve good performance, which are confined within the prescribed error bounds ( k ̲ i ε i , k ¯ i ε i ) . In addition, the active period of the DoS attack is denoted by the green shadow, while the rest parts denote that there is no DoS attack. To further show the advantages of the proposed scheme, a simulation comparison of the control approach in [39] is also carried out.
From Figure 6, one can determine that the tracking performance will degraded when the DoS attacks are active. It can be observed that the proposed scheme in this work has better recovery performance under DoS attacks. The tracking performance can recover soon when the attackers are sleeping. Meanwhile, the approach in [39] cannot ensure good performance when the DoS attacks are active. As depicted in Figure 7, the proposed scheme has better recovering abilities than the approach in [39], which means that the tracking performance is recovered by utilizing the presented scheme, even subjected to actuator faults and external disturbances under DoS attacks. Figure 8 shows the release times and intervals of the event-triggered mechanism. It can be observed from Figure 8 that the communication burden is reduced Hence, the efficiency of the presented decentralized adaptive ET-FTCC scheme with prescribed performance in the presence of actuator faults, external disturbances, and DoS attacks is verified.

6. Conclusions

In this paper, the ET-FTCC is investigated for HMASs with actuator faults and external disturbances under DoS attacks. The composite observer is designed to obtain the information of state and lumped disturbance, which is used to design the controller. After that, the event-triggered sliding mode FTCC scheme is presented to compensate for actuator faults and external disturbances and defend against DoS attacks. The tracking errors are bounded within the prescribed boundary. The effectiveness of the proposed method is verified by qualitative analysis and quantitative analysis of the simulation results. This study can enhance the security and reliability of heterogeneous multi-agent systems, providing technical support for the safe operation of unmanned systems.
This article mainly solves the FTCC problem of second-order nonlinear heterogeneous multiagent systems, and further research is needed for the FTCC problem of higher-order nonlinear heterogeneous multi-agent systems. In addition, the DoS attacks are considered in this paper. However, the heterogeneous multiagent systems may encounter multiple cyber attacks, such as DoS attacks and deception attacks. In order to solve the multiple cyber attacks, a multiple cyber attack model should be modeled first. Combining the characteristics of the attack model and the unified model of the heterogeneous multiagent systems, the FTCC scheme will be investigated to compensate the influence of the faults under multiple cyber attacks, which is one of our future works.

Author Contributions

Conceptualization, S.L.; methodology, S.L.; software, S.L.; validation, S.L.; writing—original draft preparation, S.L.; writing—review and editing, S.L. and J.H.; supervision, J.H.; project administration, J.H.; funding acquisition, J.H. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Natural Science Foundation of China (No. 92367109), Aeronautical Science Foundation of China (No. 2023000144001).

Data Availability Statement

No new data were created or analyzed in this study.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Liu, C.; Jiang, B.; Wang, X.; Yang, H.; Xie, S. Distributed Fault-Tolerant Consensus Tracking of Multi-Agent Systems under Cyber-Attacks. IEEE/CAA J. Autom. Sin. 2022, 9, 1037–1048. [Google Scholar] [CrossRef]
  2. Zuo, Z.; Cao, X.; Wang, Y.; Zhang, W. Resilient Consensus of Multiagent Systems Against Denial-of-Service Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 2664–2675. [Google Scholar] [CrossRef]
  3. Shen, Q.; Jiang, B.; Shi, P. Adaptive Fault Diagnosis for T–S Fuzzy Systems with Sensor Faults and System Performance Analysis. IEEE Trans. Fuzzy Syst. 2014, 22, 274–285. [Google Scholar] [CrossRef]
  4. Wu, J.; Cui, P. Cooperative Adaptive Fuzzy Control for the Synchronization of Nonlinear Multi-Agent Systems under Input Saturation. Mathematics 2024, 12, 1426. [Google Scholar] [CrossRef]
  5. Guo, X.; Wang, C.; Dong, Z.; Ding, Z. Adaptive Containment Control for Heterogeneous MIMO Nonlinear Multiagent Systems With Unknown Direction Actuator Faults. IEEE Trans. Autom. Control 2023, 68, 5783–5790. [Google Scholar] [CrossRef]
  6. Liu, Y.; Su, H. Second-Order Consensus for Multiagent Systems with Switched Dynamics and Sampled Position Data. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 4129–4137. [Google Scholar] [CrossRef]
  7. Jiang, B.; Shen, Q.; Shi, P. Neural-networked adaptive tracking control for switched nonlinear pure-feedback systems under arbitrary switching. Automatica 2015, 61, 119–125. [Google Scholar] [CrossRef]
  8. Jiang, B.; Zhang, K.; Shi, P. Integrated Fault Estimation and Accommodation Design for Discrete-Time Takagi-Sugeno Fuzzy Systems With Actuator Faults. IEEE Trans. Fuzzy Syst. 2011, 19, 291–304. [Google Scholar] [CrossRef]
  9. Chen, K.; Gu, Y.; Lin, H.; Zhang, Z.; Zhou, X.; Wang, X. Guaranteed Performance Event-Triggered Adaptive Consensus Control for Multiagent Systems under Time-Varying Actuator Faults. Mathematics 2024, 12, 1528. [Google Scholar] [CrossRef]
  10. Wu, Y.; Li, J.; Liu, L.; Wu, C. Distributed adaptive practical formation tracking for multi-agent systems with actuator faults. Int. J. Robust Nonlinear Control 2023, 33, 1633–1654. [Google Scholar] [CrossRef]
  11. Wang, Z.; Wu, Y.; Liu, L.; Zhang, H. Adaptive Fault-Tolerant Consensus Protocols for Multiagent Systems with Directed Graphs. IEEE Trans. Cybern. 2020, 50, 25–35. [Google Scholar] [CrossRef] [PubMed]
  12. Xiao, S.; Dong, J. Distributed Adaptive Fuzzy Fault-Tolerant Containment Control for Heterogeneous Nonlinear Multiagent Systems. IEEE Trans. Syst. Man Cybern. Syst. 2022, 52, 954–965. [Google Scholar] [CrossRef]
  13. Wang, J.; Gui, Z.; Sun, J.; Xie, X.; Meng, Q. Distributed Fault-Tolerant Control of Nonlinear Multiagent Systems With Generally Uncertain Semi-Markovian Switching Topologies. IEEE Trans. Autom. Sci. Eng. 2024. [Google Scholar] [CrossRef]
  14. Zhao, L.; Zhao, F.; Che, W.W. Distributed adaptive fuzzy fault-tolerant control for multi-agent systems with node faults and denial-of-service attacks. Inf. Sci. 2023, 631, 385–395. [Google Scholar] [CrossRef]
  15. Deng, C.; Wen, C. Distributed Resilient Observer-Based Fault-Tolerant Control for Heterogeneous Multiagent Systems Under Actuator Faults and DoS Attacks. IEEE Trans. Control Netw. Syst. 2020, 7, 1308–1318. [Google Scholar] [CrossRef]
  16. Zhang, D.; Liu, L.; Feng, G. Consensus of Heterogeneous Linear Multiagent Systems Subject to Aperiodic Sampled-Data and DoS Attack. IEEE Trans. Cybern. 2019, 49, 1501–1511. [Google Scholar] [CrossRef]
  17. Wan, Y.; Wen, G.; Yu, X.; Huang, T. Distributed Consensus Tracking of Networked Agent Systems Under Denial-of-Service Attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6183–6196. [Google Scholar] [CrossRef]
  18. Pan, K.; Lyu, Y.; Pan, Q. Adaptive Formation for Multiagent Systems Subject to Denial-of-Service Attacks. IEEE Trans. Circuits Syst. I 2022, 69, 3391–3401. [Google Scholar] [CrossRef]
  19. Lu, L.T.; Zhu, S.L.; Wang, D.M.; Han, Y.Q. Distributed adaptive fault-tolerant control with prescribed performance for nonlinear multiagent systems. Commun. Nonlinear Sci. 2024, 138, 108222. [Google Scholar] [CrossRef]
  20. Gao, Z.; Zhang, Y.; Guo, G. Finite-Time Fault-Tolerant Prescribed Performance Control of Connected Vehicles with Actuator Saturation. IEEE Trans. Veh. Technol. 2023, 72, 1438–1448. [Google Scholar] [CrossRef]
  21. Zhang, L.; Che, W.W.; Chen, B.; Lin, C. Adaptive Fuzzy Output-Feedback Consensus Tracking Control of Nonlinear Multiagent Systems in Prescribed Performance. IEEE Trans. Cybern. 2023, 53, 1932–1943. [Google Scholar] [CrossRef] [PubMed]
  22. Ding, Z.; Wang, H.; Sun, Y.; Qin, H. Adaptive prescribed performance second-order sliding mode tracking control of autonomous underwater vehicle using neural network-based disturbance observer. Ocean Eng. 2022, 260, 111939. [Google Scholar] [CrossRef]
  23. Gong, J.; Jiang, B.; Ma, Y.; Mao, Z. Distributed Adaptive Fault-Tolerant Formation-Containment Control with Prescribed Performance for Heterogeneous Multiagent Systems. IEEE Trans. Cybern. 2023, 53, 7787–7799. [Google Scholar] [CrossRef] [PubMed]
  24. Mousavian, M.; Atrianfar, H. Resilient Event-triggered Containment Control of Multi-Agent Systems under Asynchronous DoS Attacks and Disturbances. IEEE Trans. Control Netw. Syst. 2024. [Google Scholar] [CrossRef]
  25. Cheng, Z.; Yue, D.; Hu, S.; Ge, H.; Chen, L. Distributed event-triggered consensus of multi-agent systems under periodic DoS jamming attacks. Neurocomputing 2020, 400, 458–466. [Google Scholar] [CrossRef]
  26. Tang, Y.; Zhang, D.; Shi, P.; Zhang, W.; Qian, F. Event-Based Formation Control for Nonlinear Multiagent Systems Under DoS Attacks. IEEE Trans. Autom. Control 2021, 66, 452–459. [Google Scholar] [CrossRef]
  27. Ye, D.; Yang, X. Distributed event-triggered consensus for nonlinear multi-agent systems subject to cyber attacks. Inf. Sci. 2019, 473, 178–189. [Google Scholar] [CrossRef]
  28. Liu, Y.; Jia, Y. Event-triggered consensus control for uncertain multi-agent systems with external disturbance. Int. J. Syst. Sci. 2019, 50, 130–140. [Google Scholar] [CrossRef]
  29. Li, J.; Yang, Z.; Mu, X.; Wu, X. Passivity-based Event-triggered Fault Tolerant Control for Nonlinear Networked Control System with Actuator Failures and DoS Jamming Attacks. J. Franklin Inst. 2020, 357, 9288–9307. [Google Scholar] [CrossRef]
  30. Sun, L.; Zheng, Z. Disturbance Observer-Based Robust Saturated Control for Spacecraft Proximity Maneuvers. IEEE Trans. Control Syst. Technol. 2018, 26, 684–692. [Google Scholar] [CrossRef]
  31. He, W.; Sun, Y.; Yan, Z.; Yang, C.; Li, Z.; Kaynak, O. Disturbance Observer-Based Neural Network Control of Cooperative Multiple Manipulators With Input Saturation. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 1735–1746. [Google Scholar] [CrossRef] [PubMed]
  32. Ma, X.; Yang, L.; Ma, L.; Dong, W.; Jin, M.; Zhang, L.; Yang, F.; Lin, Y. Consensus tracking control for uncertain non-strict feedback multi-agent system under cyber attack via resilient neuroadaptive approach. Int. J. Robust Nonlinear Control 2022, 32, 4251–4280. [Google Scholar] [CrossRef]
  33. Xiang, X.; Liu, C.; Su, H.; Zhang, Q. On decentralized adaptive full-order sliding mode control of multiple UAVs. ISA Trans. 2017, 71, 196–205. [Google Scholar] [CrossRef]
  34. Du, H.; Zhu, W.; Wen, G.; Duan, Z.; Lü, J. Distributed Formation Control of Multiple Quadrotor Aircraft Based on Nonsmooth Consensus Algorithms. IEEE Trans. Cybern. 2019, 49, 342–353. [Google Scholar] [CrossRef] [PubMed]
  35. Dong, X.; Hua, Y.; Zhou, Y.; Ren, Z.; Zhong, Y. Theory and Experiment on Formation-Containment Control of Multiple Multirotor Unmanned Aerial Vehicle Systems. IEEE Trans. Autom. Sci. Eng. 2019, 16, 229–240. [Google Scholar] [CrossRef]
  36. Aghaeeyan, A.; Abdollahi, F.; Talebi, H. UAV-UGVs cooperation: With a moving center based trajectory. Rob. Auton. Syst. 2015, 63, 1–9. [Google Scholar] [CrossRef]
  37. Lu, A.Y.; Yang, G.H. Input-to-State Stabilizing Control for Cyber-Physical Systems with Multiple Transmission Channels Under Denial of Service. IEEE Trans. Autom. Control 2018, 63, 1813–1820. [Google Scholar] [CrossRef]
  38. Xu, W.; Hu, G.; Ho, D.W.C.; Feng, Z. Distributed Secure Cooperative Control Under Denial-of-Service Attacks from Multiple Adversaries. IEEE Trans. Cybern. 2020, 50, 3458–3467. [Google Scholar] [CrossRef]
  39. Qin, J.; Ma, Q.; Gao, H.; Zheng, W.X. Fault-Tolerant Cooperative Tracking Control via Integral Sliding Mode Control Technique. IEEE/ASME Trans. Mechatronics 2018, 23, 342–351. [Google Scholar] [CrossRef]
Figure 1. The structure of the quadrotor UAV.
Figure 1. The structure of the quadrotor UAV.
Mathematics 12 02701 g001
Figure 2. The structure of the UGV.
Figure 2. The structure of the UGV.
Mathematics 12 02701 g002
Figure 3. The diagram of ET-FTCC scheme.
Figure 3. The diagram of ET-FTCC scheme.
Mathematics 12 02701 g003
Figure 4. Example of the ET mechanism and sequence of DoS attacks.
Figure 4. Example of the ET mechanism and sequence of DoS attacks.
Mathematics 12 02701 g004
Figure 5. Communication topology graph.
Figure 5. Communication topology graph.
Mathematics 12 02701 g005
Figure 6. Position errors of UAVs and UGVs. (Case 1: presented method; case 2: method in [39]).
Figure 6. Position errors of UAVs and UGVs. (Case 1: presented method; case 2: method in [39]).
Mathematics 12 02701 g006
Figure 7. XTEM, YTEM, and ZTEM. (Case 1: presented method; case 2: method in [39]).
Figure 7. XTEM, YTEM, and ZTEM. (Case 1: presented method; case 2: method in [39]).
Mathematics 12 02701 g007
Figure 8. Release instants and intervals of UAVs and UGVs.
Figure 8. Release instants and intervals of UAVs and UGVs.
Mathematics 12 02701 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Liu, S.; Huang, J. Decentralized Adaptive Event-Triggered Fault-Tolerant Cooperative Control of Multiple Unmanned Aerial Vehicles and Unmanned Ground Vehicles with Prescribed Performance under Denial-of-Service Attacks. Mathematics 2024, 12, 2701. https://doi.org/10.3390/math12172701

AMA Style

Liu S, Huang J. Decentralized Adaptive Event-Triggered Fault-Tolerant Cooperative Control of Multiple Unmanned Aerial Vehicles and Unmanned Ground Vehicles with Prescribed Performance under Denial-of-Service Attacks. Mathematics. 2024; 12(17):2701. https://doi.org/10.3390/math12172701

Chicago/Turabian Style

Liu, Shangkun, and Jie Huang. 2024. "Decentralized Adaptive Event-Triggered Fault-Tolerant Cooperative Control of Multiple Unmanned Aerial Vehicles and Unmanned Ground Vehicles with Prescribed Performance under Denial-of-Service Attacks" Mathematics 12, no. 17: 2701. https://doi.org/10.3390/math12172701

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop