Next Article in Journal
Synthesis of Novel Luminescent Double-Decker Silsesquioxanes Based on Partially Condensed TetraSilanolPhenyl POSS and Tb3+/Eu3+ Lanthanide Ions
Next Article in Special Issue
Modeling and Simulation Research of Interactive Public Opinion Evolution under Multi-Agent Interventions
Previous Article in Journal
Discussion on the Reconstruction of Medium/Low-Permeability Gas Reservoirs Based on Seepage Characteristics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Leader-Following Consensus Tracking Control of Multiple UAVs Subject to Deception Attacks

College of Mechanical & Electronic Engineering, Nanjing Forestry University, Nanjing 210037, China
*
Author to whom correspondence should be addressed.
Processes 2022, 10(4), 757; https://doi.org/10.3390/pr10040757
Submission received: 8 December 2021 / Revised: 29 December 2021 / Accepted: 8 April 2022 / Published: 13 April 2022
(This article belongs to the Special Issue Modeling and Control of Distributed Complex Dynamic Systems)

Abstract

:
This article is concerned with the problem of leader-following consensus tracking control for multi-unmanned aerial vehicle (UAV) systems under deception attacks and actuator saturation. While guaranteeing the expected control performance, a novel adaptive event-triggered scheme (AETS) is developed to reduce the frequency of data transmission among UAVs and reduce the release of redundant data, where the adaptive threshold can be adjusted online according to the dynamic error instead of giving a default value. With the help of a new Lyapunov function, sufficient conditions and security criteria are developed to ensure that all following UAVs could reach secure consensus asymptotically with a leader UAV. Lastly, an illustrative example is presented to validate the effectiveness of the designed method.

1. Introduction

In recent years, the cooperative control issues of multi-unmanned aerial vehicle (UAV) systems have attracted considerable attention from scientific and engineering fields [1,2,3,4,5,6,7,8], mainly owing to the fact that a group of mobile UAVs come to agreement by utilizing local relative information from adjacent UAVs, which can cooperate to complete some complex tasks that exceed the capability of a single vehicle. Additionally, a group of UAVs has better robustness than a single vehicle when executing tasks. It is noteworthy that cooperative consensus control can be approximately divided into two categories according to the number of leaders, which are leader-following consensus and leaderless consensus [9,10,11,12]. The leader-following problem plays a vital role in consensus control for multi-UAVs, although leaderless consensus is useful in several application fields. Up to the present, a large number of studies and references therein have paid attention to it.
As is well known, due to the limitation of communication and control resources, it is unrealistic that continuous update of the controller and continuous communication between UAVs are required in practical engineering. In order to address this issue, event-triggered scheme (ETS) in multiple-UAV systems has attracted wide attention [13,14,15,16,17,18,19]. Considering the influence of input saturation on a multi-UAV system, the work in [20] probed into the problem of implementing predefined configuration in a distributed finite-time ETS. When a UAV system was suffering time-varying disturbance, the dynamic event-triggered cooperative formation control strategy was investigated in [21]. Despite ensuring the control performance with the aid of the above results, the thresholds are unable to be automatically regulated in the light of system requirements. Hence, it is necessary to design a trigger mechanism to dynamically adjust the trigger conditions on the basis of system performance demand and reduce information transmission rate. Different from the preset constant threshold used in the existing literature, the method of designing an adaptive event-triggered scheme (AETS) for nonlinear interconnected systems was proposed in [22], wherein adaptive threshold was based on the dynamic error of the system. The authors in [23] investigated consensus of multi-agent systems (MASs) on directed graphs through AETS with composite triggering conditions. In the case of switching directional communication topology and security assignments, the issue of cluster tracking cooperative formation control was studied in [6], where the restriction of limited information interchange and the assumption of continuous feedback control gain were relaxed with the help of cluster ETS. Inspired by the above works, the purpose of this paper is to adopt an AETS to realize the tracking control consistency for multi-UAV systems.
As the most common and important nonlinear phenomenon, actuator saturation, due to the limitation of the physical characteristics of the actuator, often results in poor performance so far as to destabilize the UAV system. Over the last decade, a great many scholars have studied the topic whereby UAV systems suffer from actuator saturation [24,25,26,27,28,29]. For instance, comprehensively considering the effects of actuator failure, saturation, and disturbance, the problem of fault-tolerant tracking consensus was discussed in [25]. It was reported in [26], with intermittent communication, that the global consensus problem for MAS subject to actuator saturation was considered. In addition, to achieve global consistency, a distributed feedback controller was designed for the system with switching topology and time-varying delay. How to explore some novel design algorithms for UAV systems with actuator saturation to achieve better performance gives impetus to this work.
Due to the increasing dependence on the network, UAV systems are more vulnerable to malicious cyberattacks. At the same time, the issue of secure consensus control has also attracted extensive attention of scholars [30,31,32,33,34,35,36,37,38,39,40]. Under known and unknown acceleration of targets, in order to address the issue of collaborative siege and simultaneous assault, two collaborative guidance laws based on multiple attackers encircling the target region were proposed in [30]. In addition, with regard to an impulsive system under spoofing attack, the authors in [39] inquired into the topic of secure synchronization and proposed the distributed impulsive control protocol for MASs. In [40], the issue of robust output consensus was studied to guarantee that the consensus goal of the heterogeneous MASs can be achieved, immune from aperiodic sampling and DoS attack. Thus far, the secure consensus of an UAV system, subject to both unknown disturbance and cyber attack, has not been fully discussed, which motivates the current study.
Inspired by the above observations, this paper is concerned with the leader-following consensus tracking control design for multi-UAV systems subject to deception attacks and actuator saturation. The major contributions of this paper lie in three points:
(1) A novel adaptive data transmission scheme is developed for multi-UAV systems. The triggering threshold, introducing measurement error among UAVs, can be adjusted online according to the fluctuation of system state, so as to actively discard the data with little change from the latest released data packet. By utilizing the designed AETS, data-releasing rate can be reduced while the sensitivity of the system to malicious attacks is improved.
(2) A new event-triggered multi-UAV system is constructed, in which the wind disturbance during UAV flight, the uncertainty inside the actuator, actuator saturation, and deception attack injected into the system are considered within a unified framework.
(3) By introducing an improved Lyapunov functional method, some sufficient conditions for the stability of a multi-UAV system under digraph is proposed to co-design the triggering parameters and controllers in the meantime.
The outline for the rest of this article is as follows. In Section 2, problem formulation including system model description, deception attack model, and AETS is introduced. In Section 3, some sufficient conditions are established to guarantee the desired control performance and the leader-following consensus in security of the multi-UAV system with the AETS and deception attacks. In addition, the design algorithm of controllers is given. Section 4 introduces a simulation example manifesting the effectiveness of the proposed method. Finally, the conclusion is drawn in Section 5.
Notation: R n and R p × q denote the n-Euclidean space and the set of all p × q dimensional real matrices. diag N S (or diag N S i ) represents an N-block diagonal matrix diag { S , , S } (or diag { S 1 , , S N } ). Similarly, col S (or col N S i ) is used to express column vectors with suitable blocks. ∗ stands for the transpose of block matrix. 0 is the zero matrix of the appropriate dimension. Furthermore, I n (or I N ) and I n N (or I 2 n N ) represent the identity matrix of n (or N) order and n N (or 2 n N ) order, respectively. ⊗ indicates the Kronecker product. describes Euclidean norm for vectors or matrices. The expectation of X is represented by E { X } .

2. Problem Formulation

2.1. Graph Theory

A weighted digraph G = V , E , W without self-loops describes the communication topology among one leader and N followers, where V denotes index set of N followers, that is, V = v 1 , v 2 , , v N . An edge set is represented by E V × V , and W = ω i j R N × N is defined to represent a weighted adjacency matrix. For any edge ( V j , V i ) E , ω i j > 0 , and ω i j = 0 otherwise. N i = j V : j , i E is used to express the set of neighbors of the i-th follower.
Assumption 1.
With regard to a multi-UAV system, the leader UAV is presumed to be the root node of the spanning tree in G , and the followers receive information from the leader.

2.2. System Description

In this paper, a multi-UAV system is made up of N followers and one leader (labeled by 0). For simplicity, assuming that each number of the group has the same mechanical structure and for i = 1 , , N , each vehicle is described as follows:
p ˙ x i ( t ) = V i c o s φ i ( t ) p ˙ y i ( t ) = V i s i n φ i ( t ) v ˙ i ( t ) = u i ( t ) ,
where ( p x i ( t ) , p y i ( t ) ) , v i ( t ) represent the position, accelerated velocity of the i-th UAV, respectively. φ i ( t ) is the heading angle, and V i is flight speed. We denote u i ( t ) as the control input vectors.
The precise feedback linearization is used to linearize the UAV system. We define s i ( t ) = ( p x i ( t ) , p y i ( t ) ) T , then the system (1) can be transformed as below:
s ˙ i ( t ) = v i ( t ) v ˙ i ( t ) = u i ( t ) ,
where s i ( t ) R n denote position and v i ( t ) R n represent velocity of the i-th UAV. Without loss of generality, the leader vehicle has the following dynamic equation:
s ˙ 0 ( t ) = v 0 ( t ) v ˙ 0 ( t ) = 0 ,
Considering the wind disturbance and actuator uncertainty during UAV flight, the second-order integrator model structured above can be described as
δ ˙ i ( t ) = A δ i ( t ) + B u i ( t ) + f ( δ i ( t ) ) δ ˙ 0 ( t ) = A δ 0 ( t ) + f ( δ 0 ( t ) ) ,
where A = 0 n × n I n 0 n × n 0 n × n , B = 0 n × n I n , δ i ( t ) = c o l { s i ( t ) , v i ( t ) } , δ 0 ( t ) = c o l { s 0 ( t ) , v 0 ( t ) } denote the state vector. In addition, in a short time and a small flight space, the wind disturbance and actuator uncertainty of UAV can be regarded as slow variables and expressed as unknown vector parameters, and f ( δ i ( t ) ) R 2 n , f ( δ 0 ( t ) ) R 2 n represent the uncertain disturbance of follower and leader UAV, respectively. For all δ i ( t ) , δ 0 ( t ) R 2 n , the following inequality holds if there exists an appropriate constant β > 0 :
f ( δ i ( t ) ) f ( δ 0 ( t ) ) β δ i ( t ) δ 0 ( t ) .
The main intention of this study is to design distributed adaptive event-triggered consensus strategies for each UAV such that the consensus problem of the UAV system (1) can be asymptotically solved, i.e., lim t s i ( t ) s 0 ( t ) = 0 and lim t v i ( t ) v 0 ( t ) = 0 for i = 1 , 2 , , N . For this purpose, we need the following assumptions and lemmas.

2.3. Deception Attack Model

In this paper, actuator saturation is taken into account, which can be described by a saturation function s a t ( · ) : R m R m , i.e., s a t ( u i ( t ) ) : = [ s a t ( u i 1 ( t ) ) , s a t ( u i 2 ( t ) ) , , s a t ( u i m ( t ) ) ] T . For each s = { 1 , 2 , , m } , s a t ( u i ( t ) ) = s i g n ( u i s ( t ) ) m i n { 1 , | u i s ( t ) | } .
In addition, the saturation function resolves into two items, that is s a t ( u i ( t ) ) = u i ( t ) ψ ( u i ( t ) ) , where ψ ( u i ( t ) ) is a nonlinear vector-valued function, and ψ ( u i ( t ) ) satisfies the following inequality:
i = 1 N ψ T ( ( u i ( t ) ) ) ( ψ ( u i ( t ) ) u i ( t ) ) 0 .
In fact, due to the aging of the actuator or external attacks from the network, the actuators may suffer malicious attacks. The attack signals for transmitted information between follower UAVs are expressed by
δ ^ j ( t ) = δ j ( t ) + ϱ j ( t ) ,
where the attack function, similar to [41], ϱ j ( t ) R 2 n , is assumed to satisfy
ϱ j ( t ) 2 E ( δ j ( t ) δ 0 ( t ) ) 2
with a known energy constraint matrix E.

2.4. Adaptive Event-Triggered Communication Scheme

To reduce the number of triggering event of data releasing, An AETS is utilized for each vehicle transmission. Under the scheme, the i-th UAV only broadcasts the data packets to its neighbor when the triggering event is generated.
An AETS is proposed to design the following controller for a multiple UAV system:
u i ( t ) = K χ i ( t ) ,
where K is a feedback matrix to be designed, and χ i ( t ) = j N i ω i j [ δ i ( t k i ) ( δ j ( t k j ) + ϱ j ( t ) ) ] + b i ( δ i ( t k i ) δ 0 ( t k i h + l h ) ) .
Then, we will design the adaptive triggering mechanism to determine the update time of the controller. In order to clearly clarify the mechanism of AETS, we artificially divide the packet release interval into some subsets, shown as [ t k i h , t k + 1 i h ) = ι h = t k i h ( t k + 1 i 1 ) h ι h , ( ι + 1 ) h , where ι h = t k i h + l h . We define measurement error e i ( t k i h + l h ) = δ i ( t k i ) δ 0 ( t k i h + l h ) and S i = l | e i T ( ι h ) Ξ e i ( ι h ) κ i ( t ) χ i T ( ι h ) Ξ χ i ( ι h ) 0 .
The next releasing instant of the i-th UAV can be expressed by
t k + 1 i h = t k i h + ( l M + 1 ) h ,
where l M = max l S i l . t k i h is on behalf of the data releasing instant of ith follower, and immediately sampling packets t k i h + l h are discarded with l = 1 , 2 , , l M . Ξ is a triggering matrix to be constructed. In addition, κ i ( t ) represents the adjustable thresholds satisfying the following adaptive algorithm:
κ ˙ i ( t ) = α i κ i ( t ) ( 1 κ i ( t ) ϖ i ) e i T ( ι h ) Ξ e i ( ι h ) ,
where κ i ( t ) ( 0 , 1 ] , α i > 0 , and   ϖ i 1 are used to make the adaptive law obtain better threshold adjustment.
Remark 1.
The next releasing instant is given in Equation (10), and l M is the maximum number of continuous packet losses allowed, which means that the updated sampling data will be sent when the following trigger condition are violated; otherwise, the data packet will be discarded,
e i T ( ι h ) Ξ e i ( ι h ) κ i ( t ) χ i T ( ι h ) Ξ χ i ( ι h ) 0 .
Consequently, the amount of transmitted packets from the i-th UAV are greatly reduced.
Remark 2.
If one sets α i = 0 , then the proposed AETS will deduce to a conventional ETS
e i T ( ι h ) Ξ e i ( ι h ) κ ¯ i χ i T ( ι h ) Ξ χ i ( ι h ) 0 ,
where κ ¯ i are constant triggering thresholds.
Through the above discussion, for t [ ι h , ( ι + 1 ) h ) , we define the tracking error as ξ i ( ι h ) = δ i ( ι h ) δ 0 ( ι h ) , i = 1 , 2 , , N , and d i ( t ) = t ι h , d i ( t ) satisfies d i ( t ) [ 0 , d M ) with the derivative d ˙ i ( t ) = 1 at t ι h . Then, the leader-following consensus tracking error system is given as follows:
ξ ˙ i ( t ) = A ξ i ( t ) + B u i ( t ) + f ( δ i ( t ) ) f ( δ 0 ( t ) ) .
Combining the measurement error e i ( t d i ( t ) ) and tracking error ξ i ( t d i ( t ) ) , the controller u i ( t ) can be described as
u i ( t ) = K [ j = 1 N l i j ( ξ j ( t d j ( t ) ) + e j ( t d j ( t ) ) ) + b i ( ξ i ( t d i ( t ) ) + e i ( t d i ( t ) ) ) j = 1 N ω i j ϱ j ( t ) ] ,
where L = [ l i j ] N × N , l i i = j N i ω i j , l i j = ω i j , and B = d i a g N { b i } .
From (7), (14), and (15), we have
ξ ˙ i ( t ) = A ξ i ( t ) B K j = 1 N l i j ( ξ j ( t d j ( t ) ) + e j ( t d j ( t ) ) ) B K b i ξ i ( t d i ( t ) ) B K b i e i ( t d i ( t ) ) + B K j = 1 N c i j ϱ j ( t ) B ψ ( u i ( t ) ) + f ( δ i ( t ) ) f ( δ 0 ( t ) ) .
By using Kronecker product, for t [ ι h , ( ι + 1 ) h ) , the overall error dynamic can be rewritten as
ξ ˙ ( t ) = ( I N A ) ξ ( t ) ( H B K ) ϝ ( t ) ( H B K ) ϰ ( t ) + ( C B K ) Y ( t ) ( I N B ) ψ ( u ( t ) ) + F ( ξ ( t ) ) ,
where
H = L + B , ξ ( t ) = c o l { ξ 1 ( t ) , ξ 2 ( t ) , , ξ N ( t ) } , ϝ ( t ) = c o l { ξ 1 ( t d 1 ( t ) ) , ξ 2 ( t d 2 ( t ) ) , , ξ N ( t d N ( t ) ) } , ϰ ( t ) = c o l { e 1 ( t d 1 ( t ) ) , e 2 ( t d 2 ( t ) ) , , e N ( t d N ( t ) ) } , Y ( t ) = c o l { ϱ 1 ( t ) , ϱ 2 ( t ) , , ϱ N ( t ) } , ψ ( u ( t ) ) = c o l { ψ ( u 1 ( t ) ) , ψ ( u 2 ( t ) ) , , ψ ( u N ( t ) ) } , F ( ξ ( t ) ) = c o l { f ( δ 1 ( t ) ) f ( δ 0 ( t ) ) , , f ( δ N ( t ) ) f ( δ 0 ( t ) ) } .
The objective of this paper is to design a consensus controller for the UAV system by applying the AETS, such that the system subject to the deception attacks and actuator saturation may maintain the performance at a certain level.

3. Main Results

Before further derivation, we will give some useful definitions and lemmas.
Definition 1
([42]). The leader-following consensus of multi-UAV system (2) with the designed controller (9) is achieved if the following criterion
lim t δ i ( t ) δ 0 ( t ) = 0 , i = 1 , 2 , , N ,
holds for any initial conditions δ i ( 0 ) .
Lemma 1
([43]). For given vector-valued function ρ ( t ) satisfying ρ ( t ) [ 0 , ρ ¯ ] , and any scalar x ˙ ( t ) : [ ρ ¯ , 0 ] R n , if any symmetric constant matrix R R n × n > 0 , then the following inequality holds:
ρ ¯ t ρ ¯ t x ˙ T ( t ) R x ˙ ( t ) d t x ( t ) x ( t ρ ( t ) ) x ( t ρ ¯ ) T R * * R 2 R * 0 R R x ( t ) x ( t ρ ( t ) ) x ( t ρ ¯ ) .
Proof.
Defining 0 = ρ 1 ρ ( t ) ρ 2 = ρ ¯ , from Jensen’s integral inequality and Leibnitz–Newton formula, one can obtain that
( ρ 2 ρ 1 ) t ρ 2 t ρ 1 x ˙ T ( v ) R x ˙ ( v ) d v = ρ ¯ t ρ ( t ) t x ˙ T ( v ) R x ˙ ( v ) d v + t ρ ¯ t ρ ( t ) x ˙ T ( v ) R x ˙ ( v ) d v ρ ( t ) t ρ ( t ) t x ˙ T ( v ) R x ˙ ( v ) d v ( ρ ¯ ρ ( t ) ) t ρ ¯ t ρ ( t ) x ˙ T ( v ) R x ˙ ( v ) d v t ρ ( t ) t x ˙ T ( v ) d v R t ρ ( t ) t x ˙ ( v ) d v t ρ ¯ t ρ ( t ) x ˙ T ( v ) d v R t ρ ¯ t ρ ( t ) x ˙ ( v ) d v = [ x ( t ) x ( t ρ ( t ) ) ] T R [ x ( t ) x ( t ρ ( t ) ) ] [ x ( t ρ ( t ) ) x ( t ρ ¯ ) ] T R [ x ( t ρ ( t ) ) x ( t ρ ¯ ) ] .
Rearranging some terms of (20) yields the result (1). This completes the proof.    □
Theorem 1.
For given positive constants β , d M , α i , ϖ i , and matrix K, the multi-UAV system (4) subject to deception attacks can achieve consensus if there exist symmetrical matrices P > 0 , Q > 0 , R > 0 , Ξ > 0 , such that
Π = Π 1 * * d M A R 1 * Π 3 0 I 2 n N * Π 4 0 0 ( I N P ) 1 < 0 ,
where
Π 1 = Π 11 * * * * * * Π 21 Π 22 * * * * * 0 R Q R * * * * Π 41 Π 42 0 Π 44 * * * Π 51 Π 52 0 Π 54 Π 55 * * Π 61 Π 62 0 Π 64 C K I n N * Π 71 0 0 0 0 0 I 2 n N , Π 11 = ( I N A ) T ( I N P ) + ( I N P ) ( I N A ) + Q R , Π 21 = ( H B K ) T ( I N P ) + R , Π 41 = ( H B K ) T ( I N P ) , Π 51 = ( C B K ) T ( I N P ) , Π 61 = ( I N B ) T ( I N P ) , Π 71 = I N P , Π 22 = 2 R + M H T H Ξ , Π 42 = M H T H Ξ , Π 52 = M C T H Ξ , Π 62 = H K , Π 44 = M H T H Ξ Θ Ξ , Π 54 = M C T H Ξ , Π 55 = M C T C Ξ I N P , Π 64 = H K , M = d i a g N { α i } , Θ = d i a g N { α i ϖ i } , A = [ I N A H B K 0 H B K C B K I N B I 2 n N ] , Π 3 = β I 2 n N 0 0 0 0 0 0 , Π 4 = I N E 0 0 0 0 0 0 .
Proof.
Construct the following Lyapunov–Krasovskii functional candidate for the multi-UAV system
V ( t ) = U = 1 3 V U ( t ) ,
where
V 1 ( t ) = ξ T ( t ) ( I N P ) ξ ( t ) , V 2 ( t ) = t d M t ξ T ( s ) Q ξ ( s ) d s + d M d M 0 t + α t ξ ˙ T ( s ) R ξ ˙ ( s ) d s d α , V 3 ( t ) = 1 2 i = 1 N κ i 2 ( t ) .
Calculating the derivative of V ( t ) , one obtains
V ˙ 1 ( t ) = ξ ˙ T ( t ) ( I N P ) ξ ( t ) + ξ T ( t ) ( I N P ) ξ ˙ ( t ) , V ˙ 2 ( t ) = ξ T ( t ) Q ξ ( t ) ξ T ( t d M ) Q ξ ( t d M ) + d M 2 ζ T ( t ) A T R A ζ ( t ) d M t d M t ξ ˙ T ( s ) R ξ ˙ ( s ) d s , V ˙ 3 ( t ) = i = 1 N [ 1 κ i ( t ) e i T ( t d i ( t ) ) Ξ e i ( t d i ( t ) ) ϖ i e i T ( t d i ( t ) ) Ξ e i ( t d i ( t ) ) ] ,
where ζ ( t ) = c o l { ξ ( t ) ϝ ( t ) ξ ( t d M ) ϰ ( t ) ψ ( u ( t ) ) F ( ξ ( t ) ) } .
Considering (5), one can see that the nonlinear functions F T ( ξ ( t ) ) satisfies
F T ( ξ ( t ) ) F ( ξ ( t ) ) β 2 δ i ( t ) δ 0 ( t ) = β 2 ξ T ( t ) ξ ( t ) .
Applying the adaptive algorithm (11) and the trigger condition (12), it yields that
V 3 ( t ) ˙ i = 1 N ( α i χ i T ( t d i ( t ) ) Ξ χ i ( t d i ( t ) ) α i ϖ i e i T ( t d i ( t ) ) Ξ e i ( t d i ( t ) ) ) = M [ ( H I 2 n ) ( ϝ ( t ) + ϰ ( t ) ) ( C I 2 n ) Y ( t ) ] T ( I N Ξ ) [ ( H I 2 n ) ( ϝ ( t ) + ϰ ( t ) ) ( C I 2 n ) Y ( t ) ] ϰ T ( t ) ( Θ Ξ ) ϰ ( t ) .
According to Lemma 1, we have
d M t d M t ξ ˙ ( s ) T R ξ ˙ ( s ) d s ζ T ( t ) Δ ζ ( t ) ,
where
Δ = R * * * * * R 2 R * * * * 0 R R * * * 0 0 0 0 * * 0 0 0 0 0 * 0 0 0 0 0 0 .
According to (6)
ψ T ( u ( t ) ) ( ψ ( u ( t ) ) u ( t ) ) 0 ,
which can be expressed as
ψ T ( u ( t ) ) [ ( H K ) ( ϝ ( t ) + ϰ ( t ) ) + ( C K ) Y ( t ) ] ψ T ( u ( t ) ) ψ ( u ( t ) ) 0 .
In addition, recalling Equation (8), the following inequality holds for a given symmetric matrix P
ξ T ( t ) ( I N E ) T ( I N P ) ( I N E ) ξ ( t ) Y T ( t ) ( I N P ) Y ( t ) .
Combining (24)–(28) yields
E { V ˙ ( t ) } 2 ξ T ( t ) ( I N P ) [ ( I N A ) ξ ( t ) ( H B K ) ϝ ( t ) ( H B K ) ϰ ( t ) + ( C B K ) Y ( t ) ( I N B ) ψ ( u ( t ) ) + F ( ξ ( t ) ) ] + ξ T ( t ) Q ξ ( t ) ξ T ( t d M ) Q ξ ( t d M ) + ζ T ( t ) [ d M 2 A T R A + Δ ] ζ ( t ) ϰ T ( t ) ( Θ Ξ ) ϰ ( t ) + M [ ( H I 2 n ) ( ϝ ( t ) + ϰ ( t ) ) ( C I 2 n Y ( t ) ) ] T ( I N Ξ ) [ ( H I 2 n ) ( ϝ ( t ) + ϰ ( t ) ) ( C I 2 n Y ( t ) ) ] + β 2 ξ T ( t ) ξ ( t ) F T ( ξ ( t ) ) F ( ξ ( t ) ) + ψ T ( u ( t ) ) [ ( H K ) ( ϝ ( t ) + ϰ ( t ) ) + ( C K ) Y ( t ) ] ψ T ( u ( t ) ) ψ ( u ( t ) ) + ξ T ( t ) ( I N E ) T ( I N P ) ( I N E ) ξ ( t ) Y T ( t ) ( I N P ) Y ( t ) .
The inequality (29) can be expressed as
E { V ˙ ( t ) } ζ T ( t ) ( Π 1 + d M 2 A T R A + Π 3 T Π 3 + Π 4 T Π 4 ) ζ ( t ) .
Applying Schur complement, one can see that (21) is a sufficient condition to guarantee (30) and E { V ˙ ( t ) } < 0 .
Then, the tracking error closed-loop system (14) is asymptotically stable on the basis of condition (21), and the consensus of leader-following is achieved. This completes the proof.    □
In the following text, the co-design of controller gains with the assistance of the proposed AETS for the system (4) subject to deception attacks is given.
Theorem 2.
Under the proposed AETS (12), for some given positive constants β , d M , ν , α , ϖ i , the leader-following consensus of UAV system (4) can be achieved if there exist matrices Q ˘ > 0 , R ˘ > 0 , Ξ ˘ > 0 , Y and W with appropriate dimensions, such that
Π ˘ = Π ˘ 1 * * Π ˘ 2 ν 2 R ˘ 2 ν ( I N Y ) * Π ˘ 3 0 I 2 n N * Π ˘ 4 0 0 I N Y < 0 ,
where
Π ˘ 1 = Π ˘ 11 * * * * * * Π ˘ 21 Π ˘ 22 * * * * * 0 R ˘ Q ˘ R ˘ * * * * Π ˘ 41 Π ˘ 42 0 Π ˘ 44 * * * Π ˘ 51 Π ˘ 52 0 Π ˘ 54 Π ˘ 55 * * Π ˘ 61 Π ˘ 62 0 Π ˘ 64 Π ˘ 65 I n N * I 2 n N 0 0 0 0 0 I 2 n N , Π ˘ 11 = I N Y A T + I N A Y + Q ˘ R ˘ , Π ˘ 21 = ( H B W ) T + R ˘ , Π ˘ 41 = ( H B W ) T , Π ˘ 51 = ( C B W ) T , Π ˘ 61 = I N B T , Π ˘ 22 = 2 R ˘ + M H T H Ξ ˘ , Π ˘ 42 = M H T H Ξ ˘ , Π ˘ 52 = M C T H Ξ ˘ , Π ˘ 62 = H W , Π ˘ 44 = M H T H Ξ ˘ Θ Ξ ˘ , Π ˘ 54 = M C T H Ξ ˘ , Π ˘ 64 = H W , Π ˘ 55 = M C T C Ξ ˘ I N Y , Π ˘ 65 = C W , Π ˘ 2 = [ d M I N A Y d M H B W 0 d M H B W d M C B W d M I N B d M I 2 n N ] , Π ˘ 3 = [ β I N Y 0 0 0 0 0 0 ] , M = d i a g N { α i } , Π ˘ 4 = I N E Y 0 0 0 0 0 0 , Θ = d i a g N { α i ϖ i } .
Furthermore, the desired controller gain can be computed as K = W Y 1 , and Ξ = Y 1 Ξ ˘ Y 1 .
Proof.
Define Y = P 1 , J = d i a g { I N Y , I N Y , I N Y , I N Y , I 2 n N , I 2 n N , I 2 n N , I 2 n N , I n N } , and Q ˘ = Y Q Y , R ˘ = Y R Y , Ξ ˘ = Y Φ Y , W = K Y .
From [44], we utilize the following inequality to handle the nonlinear item R 1 ; it is true that
R ˘ 1 ν 2 R ˘ 2 ν ( I N Y ) .
One can conclude that (31) is sufficient condition to guarantee (21) holds and pre- and post-multiplying (21) with J and its transpose. In addition, the leader-following consensus is achieved under deception attacks.
According to the analysis above, the following Algorithm 1 is given to present the method of designing leader-following consensus control and AETS for the UAV system subject to actuator saturation and deception attacks.   □
Algorithm 1: Adaptive event-triggered control algorithm.
REQUIRE   
Given values of the triggering parameters in (12) and μ .
ENSURE   
for  t [ t 0 , t e n d ]   do
Step 1: Compute feasible solutions of Ξ in (12) and K in (15) according to Theorem 2;
Step 2: The sensors of UAV group sample data δ i ( t ) .
Step 3: if triggering condition holds, go to Step 4;
            otherwise, go to Step 5.
Step 4: Drop the current data; Controller holds the last event-triggered instant (ETI) x i ( t k i ) ; Go to Step 3.
Step 5: use a buffer to stack the released data and update the ZOH.
           compute e i ( t k i h + l h ) , χ i ( t k i h ) , κ i ( t ) , update the ZOH.
            end if
Step 6: Update the state δ i ( t ) at ETI.
Step 7: Compute the consensus control u i ( t ) with (15).
Step 8: Go to Step 2.
end for
In particular, when setting α i = 0 , the proposed AETS reduces to the conventional ETS, as stated in Remark 2.
Corollary 1.
Consider the leader-following multi-UAV system (4); for the given positive constants β , d M and triggering parameter ϖ ¯ i , the consensus of tracking error systems (14) can be achieved if there exist matrices Q ˘ > 0 , R ˘ > 0 , Ξ ˘ > 0 , such that
Π ¯ = Π ¯ 1 * * Π ¯ 2 ν 2 R ˘ 2 ν ( I N Y ) * Π ¯ 3 0 I 2 n N * Π ¯ 4 0 0 I N Y < 0 ,
where
Π ¯ 1 = Π ¯ 11 * * * * * * Π ¯ 21 Π ¯ 22 * * * * * 0 R ˘ Q ˘ R ˘ * * * * Π ¯ 41 Π ¯ 42 0 Π ¯ 44 * * * Π ¯ 51 Π ¯ 52 0 Π ¯ 54 Π ¯ 55 * * Π ¯ 61 Π ¯ 62 0 Π ¯ 64 Π ¯ 65 I n N * I 2 n N 0 0 0 0 0 I 2 n N ,
Π ¯ 11 = I N Y A T + I N A Y + Q ˘ R ˘ , Π ¯ 21 = ( H B W ) T + R ˘ , Π ¯ 41 = ( H B W ) T , Π ¯ 51 = ( C B W ) T , Π ¯ 61 = I N B T , Π ¯ 22 = 2 R ˘ + H T Γ H Ξ ˘ , Π ¯ 42 = H T Γ H Ξ ˘ , Π ¯ 52 = C T Γ H Ξ ˘ , Π ¯ 62 = H W , Π ¯ 44 = H T Γ H Ξ ˘ I N Ξ ˘ , Π ¯ 54 = C T Γ H Ξ ˘ , Π ¯ 64 = H W , Π ¯ 55 = M C T Γ C Ξ ˘ I N Y , Π ¯ 65 = C W , Π ¯ 2 = [ d M I N A Y d M H B W 0 d M H B W d M C B W d M I N B d M I 2 n N ] , Π ¯ 3 = β I N Y 0 0 0 0 0 0 , Π ¯ 4 = I N E Y 0 0 0 0 0 0 , Γ = d i a g N { ϖ ¯ i } .
The designed controller gain can be obtained as K = W Y 1 , and Ξ = Y 1 Ξ ˘ Y 1 .
Proof.
Choose the following Lyapunov functional:
V ( t ) = ξ T ( t ) ( I N P ) ξ ( t ) + t d M t ξ T ( s ) Q ξ ( s ) d s + d M d M 0 t + α t ξ ˙ T ( s ) R ξ ˙ ( s ) d s d α ,
and along the proving route of Theorem 1, the results can be obtained. For brevity, it is omitted here. □

4. An Illustrative Example

A simulation example with two cases is introduced to testify the validity of the proposed consensus control method under AETS in this section.
Assuming that the UAV group flies at a fixed altitude, the tracking flight can be approximated as a two-dimensional plane motion.
The directed topology graph of the communication network is depicted in Figure 1, in which the leader UAV is indicated by 0, while 1–4 represent follower UAVs.
The corresponding Laplacian matrix L and leader adjacency matrix B on the basis of Figure 1 can be acquired as:
L = 0 0 0 0 1 1 0 0 0 0 1 1 1 0 0 1 , B = 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 , E = d i a g { 0.02 , 0.01 , 0.02 , 0.01 } .
Suppose the uncertain disturbance functions are f ( δ i ( t ) ) ( t ) = 0.01 s i n ( δ i ( t ) ) , f ( δ 0 ( t ) ) ( t ) = 0.01 s i n ( δ 0 ( t ) ) .
Case 1: By using Theorem 2, we can obtain the triggering matrix Ξ and controller gain K as:
Ξ = 1.9234 0 0.6403 0 0 1.9661 0 0.733 0.6403 1.4923 0 0 0.733 0 1.7276 , K = 0.3783 0 1.1729 0 0 0.4095 0 1.2777 .
Under the initial states δ 0 ( t ) = [ 1.2 2.6 3.2 2.6 ] T , δ 1 ( t ) = [ 1.5 1 2 1.8 ] T , δ 2 ( t ) = [ 0.7 1 4 3 ] T , δ 3 ( t ) = [ 2.3 1.5 1.6 2 ] T , δ 4 ( t ) = [ 4.3 2 2.2 3 ] T , sampling period h = 0.1 s, and triggering parameters α i = 1 , ϖ 1 = 10 , ϖ 2 = 15 , ϖ 3 = 12 , ϖ 4 = 10 , we can obtain the following responses, which are presented in Figure 2.
Figure 2 depicts the tracking error of all follower UAVs and the leader, where one can see that the motion of the leader and follower UAVs are finally identical from 16.3 s, that is to say, the leader-following consensus of the UAV system is achieved under the proposed control law.
Case 2: If we set α i = 0 , i = 1 , 2 , , N , the proposed AETS will reduce into the conventional ETS for the leader-following consensus of UAV systems.
The initial conditions in this case are chosen as the same case 1, and the triggering parameters are selected as ϖ ¯ 1 = 0.05 , ϖ ¯ 2 = 0.007 , ϖ ¯ 3 = 0.035 , ϖ ¯ 4 = 0.003 . The controller gain K and triggering matrix Ξ according to Corollary 1 are derived as follows:
Ξ = 0.8238 0.0067 0.0725 0.0098 0.0067 0.8739 0.0893 0.0742 0.0725 0.0893 1.0466 0.0012 0.0098 0.0742 0.0012 1.1461 , K = 0.1500 0.0078 0.5907 0.0103 0.0065 0.1900 0.0038 0.6666 .
The tracking errors of the displacement and velocity for all UAVs under conventional ETS are shown in Figure 3. It is not difficult to see that although the system finally achieves consensus, the tracking speed is slower than that in Case 1. For the purpose of testifying the effectiveness of the designed method in data transmission, we choose ρ ¯ = 0.03 and sampling period h = 0.1 s. The number of data sampling (NDS) for each UAV within 25 s is 250, and the results of number of packet-releasing (NPR) and data-releasing rate (DRR=NPR/NDS) are given in Table 1.
From Table 1, it is clear that the DRR of the proposed AETS is less than the one of conventional ETS. According to the above results, the designed scheme can not only ensure the performance of the system, but it also effectively saves communication resources. The simulation results verify the applicability of the proposed method.

5. Conclusions

In this paper, we have investigated the AETS-based leader-following consensus for multi-UAV systems subject to actuator saturation and deception attacks. By applying a novel AETS, the data-releasing rate can be greatly reduced, while the efficiency of data releasing is enhanced during the systems under deception attacks with actuator saturation. With the aid of improved Lyapunov–Krasovskii technique, some sufficient conditions have been proposed to ensure the leader-following secure consensus of the UAV systems subject to deception attacks. In addition, extending the proposed methods to a cooperative output regulation problem for more complicated dynamical systems under switching topology is the major study orientation of our future work.

Author Contributions

Conceptualization, X.M.; methodology, X.M.; software, X.M.; validation, X.M. and S.Y.; formal analysis, X.M.; investigation, X.M.; writing—original draft preparation, X.M.; writing—review and editing, X.M. and S.Y.; supervision, S.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research is supported by Natural Science Foundation of Jiangsu Province of China (Grant Number: BK20200769).

Informed Consent Statement

Informed consent was obtained from all subjects involved in the study.

Data Availability Statement

The data presented were determined by our own measurements.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Chen, J.; Zhang, X.; Xin, B.; Fang, H. Coordination between unmanned aerial and ground vehicles: A taxonomy and optimization perspective. IEEE Trans. Cybern. 2016, 46, 959–972. [Google Scholar] [CrossRef] [PubMed]
  2. Ding, D.; Han, Q.-L.; Xiang, Y.; Ge, X.; Zhang, X.-M. A survey on security control and attack detection for industrial cyber-physical systems. Neurocomputing 2018, 275, 1674–1683. [Google Scholar] [CrossRef]
  3. Caillouet, C.; Mitton, N. Optimization and communication in uav networks. Sensors 2020, 20, 5036. [Google Scholar] [CrossRef] [PubMed]
  4. Cai, X.; Queiroz, M.D. Adaptive rigidity-based formation control for multirobotic vehicles with dynamics. IEEE Trans. Control Syst. Technol. 2015, 23, 389–396. [Google Scholar] [CrossRef]
  5. Zou, W.; Xiang, Z.; Ki, A.C. Mean square leader-following consensus of second-order nonlinear multi-agent systems with noises and unmodeled dynamics. IEEE Trans. Syst. Man Cybern. Syst. 2019, 49, 2478–2486. [Google Scholar] [CrossRef]
  6. Wang, B. Cluster event-triggered tracking cooperative and formation control for multivehicle systems: An extended magnification region condition. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 3229–3239. [Google Scholar] [CrossRef]
  7. Zhang, A.; Zhang, J.; Yang, L. Distributed event-triggered adaptive coordinated trajectory tracking control of multi-usvs based on the aggregate tracking error. IEEE Access. 2021, 9, 26802–26810. [Google Scholar] [CrossRef]
  8. Xie, J.; Peng, X.; Wang, H.; Niu, W.; Zheng, X. Uav autonomous tracking and landing based on deep reinforcement learning strategy. Sensors 2020, 20, 5630. [Google Scholar] [CrossRef]
  9. Zou, W.; Zhou, C.; Guo, J.; Xiang, Z. Global adaptive leader-following consensus for second-order nonlinear multiagent systems with switching topologies. IEEE Trans. Circuits Syst. II Express Briefs 2021, 68, 702–706. [Google Scholar] [CrossRef]
  10. Chen, B.S.; Wang, C.P.; Lee, M.Y. Stochastic robust team tracking control of multi-uav networked system under wiener and poisson random fluctuations. IEEE Trans. Cybern. 2020, 51, 5786–5799. [Google Scholar] [CrossRef]
  11. Zhang, J.; Yan, J.; Zhsng, P. Multi-uav formation control based on a novel back-stepping approach. IEEE Trans. Veh. Technol. 2020, 69, 2437–2448. [Google Scholar] [CrossRef]
  12. Zou, W.; Qian, K.; Xiang, Z. Fixed-time consensus for a class of heterogeneous nonlinear multiagent systems. IEEE Trans. Circuits Syst. II Express Briefs 2020, 67, 1279–1283. [Google Scholar] [CrossRef]
  13. Xie, D.; Xu, S.; Chu, Y.; Zou, Y. Event-triggered average consensus for multi-agent systems with nonlinear dynamics and switching topology. J. Franklin Inst. 2015, 352, 1080–1098. [Google Scholar] [CrossRef]
  14. Yan, S.; Gu, Z.; Park, J.H. Memory-event-triggered H load frequency control of multi-area power systems with cyber-attacks and communication delays. IEEE Trans. Netw. Sci. Eng. 2021, 8, 1571–1583. [Google Scholar] [CrossRef]
  15. Hu, S.; Yue, D.; Yin, X.; Xie, X.; Ma, Y. Adaptive event-triggered control for nonlinear discrete-time systems. Int. J. Robust Nonlinear Control. 2016, 26, 4101–4125. [Google Scholar] [CrossRef]
  16. Yan, S.; Shen, M.Q.; Nguang, S.K.; Zhang, G.M. Event-triggered H control of networked control systems with distributed transmission delay. IEEE Trans. Autom. Control. 2020, 65, 4295–4301. [Google Scholar] [CrossRef]
  17. Gu, Z.; Yue, D.; Park, J.H.; Xie, X. Memory-event-triggered fault detection of networked IT2 T-S fuzzy systems. IEEE Trans. Cybern. 2022. [Google Scholar] [CrossRef] [PubMed]
  18. Zou, W.; Shi, P.; Xiang, Z.; Shi, Y. Consensus tracking control of switched stochastic nonlinear multiagent systems via event-triggered strategy. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 1036–1045. [Google Scholar] [CrossRef]
  19. Yan, S.; Gu, Z.; Nguang, S.K. Memory-event-triggered H output control of neural networks with mixed delays. IEEE Trans. Neural Netw. Learn. Syst. 2021. [Google Scholar] [CrossRef]
  20. Yang, P.; Zhang, A.; Zhou, D. Event-triggered finite-time formation control for multiple unmanned aerial vehicles with input saturation. Int. J. Control Autom. Syst. 2021, 19, 1760–1773. [Google Scholar] [CrossRef]
  21. Wei, L.; Chen, M.; Li, T. Dynamic event-triggered cooperative formation control for UAVs subject to time-varying disturbances. IET Control Theory Appl. 2020, 14, 2514–2525. [Google Scholar] [CrossRef]
  22. Gu, Z.; Yue, D.; Tian, E. On designing of an adaptive event-triggered communication scheme for nonlinear networked interconnected control systems. Inf. Sci. 2018, 422, 257–270. [Google Scholar] [CrossRef]
  23. Li, X.; Sun, Z.; Tang, Y.; Karimi, H.R. Adaptive event-triggered consensus of multi-agent systems on directed graphs. IEEE Trans. Autom. Control. 2021, 66, 1670–1685. [Google Scholar] [CrossRef]
  24. Wei, A.; Hu, X.; Wang, Y. Consensus of linear multi-agent systems subject to actuator saturation. Int. J. Control Autom. Syst. 2013, 11, 649–656. [Google Scholar] [CrossRef]
  25. Guan, W.; Bian, T.; Zhao, Z. Fault-tolerant control of multi-agent systems with saturation and L2-disturbances. IEEE Access. 2020, 8, 556–564. [Google Scholar] [CrossRef]
  26. Xie, Y.; Lin, Z. Global consensus of multi-agent systems with intermittent directed communication in the presence of actuator saturation. Int. J. Robust Nonlinear Control. 2020, 30, 8469–8484. [Google Scholar] [CrossRef]
  27. You, X.; Hua, C.; Peng, D.; Guan, X. Leader–following consensus for multi-agent systems subject to actuator saturation with switching topologies and time-varying delays. IET Control Theory Appl. 2016, 10, 144–150. [Google Scholar] [CrossRef]
  28. Chu, H.; Chen, J.; Wei, Q.; Zhang, W. Robust global consensus tracking of linear multi-agent systems with input saturation via scheduled low-and-high gain feedback. IET Control Theory Appl. 2019, 13, 69–77. [Google Scholar] [CrossRef]
  29. Yang, Y.; Yue, D.; Xue, Y. Decentralized adaptive neural output feedback control of a class of large-scale time-delay systems with input saturation. J. Franklin Inst. 2015, 352, 2129–2151. [Google Scholar] [CrossRef]
  30. Wei, X.; Yang, J.; Fan, X. Distributed guidance law design for multi-UAV multi-direction attack based on reducing surrounding area. Aerosp. Sci. Technol. 2020, 99, 105571. [Google Scholar] [CrossRef]
  31. Basan, E.; Basan, A.; Nekrasov, A.; Fidge, C.; Gamec, J.; Gamcová, M. A self-diagnosis method for detecting uav cyber attacks based on analysis of parameter changes. Sensors 2021, 21, 509. [Google Scholar] [CrossRef] [PubMed]
  32. Ai, X.; Wang, L.; Yu, J.; Shen, Y. Field-of-view constrained two-stage guidance law design for three-dimensional salvo attack of multiple missiles via an optimal control approach. Aerosp. Sci. Technol. 2019, 85, 334–346. [Google Scholar] [CrossRef]
  33. Gu, Z.; Ahn, C.K.; Yue, D.; Xie, X. Event-triggered H filtering for T–S fuzzy-model-based nonlinear networked systems with multi-sensors against DoS attacks. IEEE Trans. Cybern. 2020. [Google Scholar] [CrossRef] [PubMed]
  34. Lee, H.; Yoon, J.; Jang, M.-S.; Park, K.-J. A robot operating system framework for secure uav communications. Sensors 2021, 21, 1369. [Google Scholar] [CrossRef] [PubMed]
  35. Aldosari, W.; Moinuddin, M.; Aljohani, A.J.; Al-Saggaf, U.M. Distributed extended kalman filtering based techniques for 3-d uav jamming localization. Sensors 2020, 20, 6405. [Google Scholar] [CrossRef] [PubMed]
  36. Gu, Z.; Sun, X.; Lam, H.; Yue, D.; Xie, X. Event-based secure control of T-S fuzzy based 5-DOF active semi-vehicle suspension systems subject to DoS attacks. IEEE Trans. Fuzzy Syst. 2021. [Google Scholar] [CrossRef]
  37. Tang, Y.; Zhang, D.; Shi, P.; Zhang, W.; Qian, F. Event-based formation control for nonlinear multiagent systems under dos attacks. IEEE Trans. Autom. Control. 2021, 66, 452–459. [Google Scholar] [CrossRef]
  38. Zhang, J.; Song, J.; Li, J.; Han, F.; Zhang, H. Observer-based non-fragile H-consensus control for multi-agent systems under deception attacks. Int. J. Syst. Sci. 2021, 52, 1223–1236. [Google Scholar] [CrossRef]
  39. He, W.; Gao, X.; Zhong, W.; Qian, F. Secure impulsive synchronization control of multi-agent systems under deception attacks. Inf. Sci. 2018, 459, 354–368. [Google Scholar] [CrossRef]
  40. Zhang, D.; Liu, L.; Feng, G. Consensus of heterogeneous linear multiagent systems subject to aperiodic sampled-data and dos attack. IEEE Trans. Cybern. 2019, 49, 1501–1511. [Google Scholar] [CrossRef]
  41. Peng, C.; Han, Q.-L.; Yue, D. Communication-delay-distribution-dependent decentralized control for large-scale systems with IP-based communication networks. IEEE Trans. Control Syst. Technol. 2013, 21, 820–830. [Google Scholar] [CrossRef]
  42. Ding, L.; Zheng, W.X. Network-based practical consensus of heterogeneous nonlinear multiagent systems. IEEE Trans. Cybern. 2017, 47, 1841–1851. [Google Scholar] [CrossRef] [PubMed]
  43. Gu, Z.; Shi, P.; Yue, D. An adaptive event-triggering scheme for networked interconnected control system with stochastic uncertainty. Int. J. Robust Nonlinear Control. 2017, 27, 236–251. [Google Scholar] [CrossRef]
  44. Hu, S.; Zhang, Y.; Du, Z. Network-based H tracking control with event-triggering sampling scheme. IET Control Theory Appl. 2012, 6, 533–544. [Google Scholar] [CrossRef]
Figure 1. Topology graph for the UAV group.
Figure 1. Topology graph for the UAV group.
Processes 10 00757 g001
Figure 2. The tracking error responses of the displacement and velocity for all UAVs under the proposed AETS.
Figure 2. The tracking error responses of the displacement and velocity for all UAVs under the proposed AETS.
Processes 10 00757 g002
Figure 3. The tracking error responses of the displacement and velocity for all UAVs under conventional ETS.
Figure 3. The tracking error responses of the displacement and velocity for all UAVs under conventional ETS.
Processes 10 00757 g003
Table 1. Comparison of triggering numbers under different schemes.
Table 1. Comparison of triggering numbers under different schemes.
UAVConventional ETSOur Method
NPRNDRNPRNDR
12911.6%208%
23112.4%2510%
3239.2%218.4%
4239.2%208%
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Mu, X.; Yan, S. Adaptive Leader-Following Consensus Tracking Control of Multiple UAVs Subject to Deception Attacks. Processes 2022, 10, 757. https://doi.org/10.3390/pr10040757

AMA Style

Mu X, Yan S. Adaptive Leader-Following Consensus Tracking Control of Multiple UAVs Subject to Deception Attacks. Processes. 2022; 10(4):757. https://doi.org/10.3390/pr10040757

Chicago/Turabian Style

Mu, Xiufeng, and Shen Yan. 2022. "Adaptive Leader-Following Consensus Tracking Control of Multiple UAVs Subject to Deception Attacks" Processes 10, no. 4: 757. https://doi.org/10.3390/pr10040757

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop