• myGriffith
    • Staff portal
    • Contact Us⌄
      • Future student enquiries 1800 677 728
      • Current student enquiries 1800 154 055
      • International enquiries +61 7 3735 6425
      • General enquiries 07 3735 7111
      • Online enquiries
      • Staff phonebook
    View Item 
    •   Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    • Home
    • Griffith Research Online
    • Conference outputs
    • View Item
    JavaScript is disabled for your browser. Some features of this site may not work without it.

    Browse

  • All of Griffith Research Online
    • Communities & Collections
    • Authors
    • By Issue Date
    • Titles
  • This Collection
    • Authors
    • By Issue Date
    • Titles
  • Statistics

  • Most Popular Items
  • Statistics by Country
  • Most Popular Authors
  • Support

  • Contact us
  • FAQs
  • Admin login

  • Login
  • Detection of Cyber Attacks on Leader-Following Multi-Agent Systems

    Author(s)
    Mousavinejad, Eman
    Ge, Xiaohua
    Han, Qing-Long
    Yang, Fuwen
    Vlacic, Ljubo
    Griffith University Author(s)
    Yang, Fuwen
    Vlacic, Ljubo
    Year published
    2019
    Metadata
    Show full item record
    Abstract
    This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following consensus. An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence. The core of the algorithm lies in a set-membership filtering approach from which each designed filter can provide an ellipsoidal state prediction set and an ellipsoidal ...
    View more >
    This paper studies an attack detection problem for a networked leader-following multi-agent system subject to unknown-but-bounded system noises and quantization effects, where an adversary launches malicious cyber attacks on agents' measurement outputs aiming to distrust the leader-following consensus. An effective distributed attack detection algorithm is firstly developed for each follower such that the attack can be identified at the time of its occurrence. The core of the algorithm lies in a set-membership filtering approach from which each designed filter can provide an ellipsoidal state prediction set and an ellipsoidal state estimation set. Whether a filter can detect the occurrence of such an attack is then determined by the existence of intersection between these two sets. Furthermore, a convex optimization algorithm is established to solve out anticipated consensus protocol and two-step set-membership filter by resorting to some recursive linear matrix inequalities. Finally, an illustrative example is given to show the effectiveness of the proposed main results.
    View less >
    Conference Title
    IECON 2019 - 45th Annual Conference of the IEEE Industrial Electronics Society
    Volume
    2019-October
    DOI
    https://doi.org/10.1109/iecon.2019.8927195
    Subject
    Cybersecurity and privacy not elsewhere classified
    Publication URI
    http://hdl.handle.net/10072/392669
    Collection
    • Conference outputs

    Footer

    Disclaimer

    • Privacy policy
    • Copyright matters
    • CRICOS Provider - 00233E
    • TEQSA: PRV12076

    Tagline

    • Gold Coast
    • Logan
    • Brisbane - Queensland, Australia
    First Peoples of Australia
    • Aboriginal
    • Torres Strait Islander