[go: up one dir, main page]

Next Article in Journal
Functional Partial Fuzzy Relations
Previous Article in Journal
How to Assess Different Algorithms Using Intuitionistic Fuzzy Logic
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Secure Control for Leader-Follower Formation of Nonholonomic Mobile Robots in the Presence of Uncertainty and Deception Attacks

1
Division of Electrical, Electronic, and Control Engineering, Institute of IT Convergence Technology, Kongju National University, Cheonan 31080, Korea
2
School of Electrical and Electronics Engineering, Chung-Ang University, 84 Heukseok-Ro, Dongjak-Gu, Seoul 06974, Korea
*
Author to whom correspondence should be addressed.
Mathematics 2021, 9(18), 2190; https://doi.org/10.3390/math9182190
Submission received: 23 July 2021 / Revised: 24 August 2021 / Accepted: 6 September 2021 / Published: 7 September 2021
Figure 1
<p>Leader-follower model.</p> ">
Figure 2
<p>Desired formation and information flow.</p> ">
Figure 3
<p>Formation tracking result.</p> ">
Figure 4
<p>Formation errors.</p> ">
Figure 5
<p>Control torque <math display="inline"><semantics> <msub> <mi>τ</mi> <mn>1</mn> </msub> </semantics></math>.</p> ">
Figure 5 Cont.
<p>Control torque <math display="inline"><semantics> <msub> <mi>τ</mi> <mn>1</mn> </msub> </semantics></math>.</p> ">
Figure 6
<p>Estimates of attack signals.</p> ">
Figure 7
<p>Outputs of RBFNs (solid: <math display="inline"><semantics> <mrow> <msubsup> <mover accent="true"> <mi>W</mi> <mo>^</mo> </mover> <mrow> <mn>1</mn> <mo>,</mo> <mi>j</mi> </mrow> <mo>⊤</mo> </msubsup> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>j</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>X</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math>, dashed: <math display="inline"><semantics> <mrow> <msubsup> <mover accent="true"> <mi>W</mi> <mo>^</mo> </mover> <mrow> <mn>2</mn> <mo>,</mo> <mi>j</mi> </mrow> <mo>⊤</mo> </msubsup> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>j</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>X</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math>).</p> ">
Figure 7 Cont.
<p>Outputs of RBFNs (solid: <math display="inline"><semantics> <mrow> <msubsup> <mover accent="true"> <mi>W</mi> <mo>^</mo> </mover> <mrow> <mn>1</mn> <mo>,</mo> <mi>j</mi> </mrow> <mo>⊤</mo> </msubsup> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>j</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>X</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math>, dashed: <math display="inline"><semantics> <mrow> <msubsup> <mover accent="true"> <mi>W</mi> <mo>^</mo> </mover> <mrow> <mn>2</mn> <mo>,</mo> <mi>j</mi> </mrow> <mo>⊤</mo> </msubsup> <msub> <mi mathvariant="sans-serif">Φ</mi> <mi>j</mi> </msub> <mrow> <mo>(</mo> <msub> <mi>X</mi> <mi>j</mi> </msub> <mo>)</mo> </mrow> </mrow> </semantics></math>).</p> ">
Figure 8
<p>Simulation results for impulse attack signals.</p> ">
Figure 8 Cont.
<p>Simulation results for impulse attack signals.</p> ">
Versions Notes

Abstract

:
This paper addresses an adaptive secure control problem for the leader-follower formation of nonholonomic mobile robots in the presence of uncertainty and deception attacks. It is assumed that the false data of the leader robot’s information attacked by the adversary is transmitted to the follower robot through the network, and the dynamic model of each robot has uncertainty, such as unknown nonlinearity and external disturbances. A robust, adaptive secure control strategy compensating for false data and uncertainty is developed to accomplish the desired formation of nonholonomic mobile robots. An adaptive compensation mechanism is derived to remove the effects of time-varying attack signals and system uncertainties in the proposed control scheme. Although unknown deception attacks are injected to the leader’s velocities and the model nonlinearities of robots are unknown, the boundedness and convergence of formation tracking errors of the proposed adaptive control system are analyzed in the Lyapunov sense. The validity of the proposed scheme is verified via simulation results.

1. Introduction

Study efforts have actively proceeded to apply the cooperation technique of multi-robot systems to various areas, such as industries, commerce, and the military. For the operation of multi-robot systems, the robots are frequently connected through a network, which can be a target for attackers. Because exposure to a cyber-attack may result in critical loss of multi-robot systems, information security is essential and various methods, such as encryption techniques, intrusion detection systems, and secure control have been studied.
Cyber-attacks are largely divided into denial-of-service (DoS) disrupting services of a host connected to the network [1,2,3], a deception attack deceiving the data [4,5,6], and a replay attack delaying data transmission [7,8,9]. Among them, since a deception attack distorts the information of neighboring robots required to operate multi-robot systems, the robots that receive the wrong information cannot move according to the control objective, and finally, cause collaboration failure. Therefore, studies on secure control have been proposed. In [10], adaptive control architectures for linear dynamical systems with sensor uncertainty and attacks were presented. In [11,12], time-varying sensor and actuator attacks were estimated by the adaptive controllers. In [13], an adaptive event-triggered mechanism was proposed for the networked control systems (NCS) under deception attacks and stochastic nonlinearity. In [14], data quantization, DoS attacks, and deception attacks of the NCS were considered. In [15], the security correction control scheme based on an interconnected adaptive observer was proposed for stochastic cyber-physical systems subject to false data injection attacks. Because the above papers are limited to linear systems, studies on nonlinear systems have been conducted. In [16], a neural-network-based controller was presented for uncertain nonlinear time-delay cyber-physical systems in the presence of sensor and actuator attacks. An approximation-based event-triggered control method was proposed to compensate for unknown injection data of lower-triangular nonlinear systems in [17]. In [18], an adaptive control scheme for second-order nonlinear systems was presented to deal with time-varying parameters and an unknown control direction brought by the injection and deception attacks. However, all these papers cannot be applied to nonholonomic mobile robots due to the underactuation problem. Although an adaptive resilient event-triggered control method at the kinematic level was proposed for single autonomous vehicles with DoS attacks [19], performance degradation due to uncertainty arising from the dynamic model is inevitable. Moreover, the deception attack problem was not considered in [19].
For the operation of multi-robot systems, formation control methods have been studied using the behavior-based approach [20], virtual structure [21], and leader-follower approach [22]. Although each approach has its advantages, the leader-follower approach has been widely used because of its simplicity, scalability, and reliability. Early studies on the leader-follower approach dealt with only the kinematics of mobile robots [22,23]. To consider model uncertainties and disturbances, studies were conducted that took into account the dynamics of mobile robots. The sliding mode control and adaptive neural network control problems were addressed to compensate for the uncertainty in [24,25], respectively. In recent years, formation control research has been conducted on connectivity preservation and collision avoidance between robots. In [26,27], formation control approaches using potential-like functions were presented. In [28], a dipolar navigation function was introduced to design the formation controller. In [29], a formation tracking method was proposed to avoid obstacles while maintaining connectivity. However, those studies mentioned above did not deal with the problem against deception attacks in the formation control design. For practical applications, it is significant to deal with the formation control of multiple mobile robots under deception attacks. This problem has not been addressed yet.
Accordingly, this paper proposes an adaptive secure control methodology for leader-follower formation of uncertain nonholonomic mobile robots in the presence of deception attacks of the leader’s information. The leader’s velocity information corrupted by unknown injected data is assumed to be transmitted to the follower robots through the network. A robust and resilient control design with adaptive attack compensation mechanisms is developed to compensate for time-varying velocity attacks where the radial basis function networks (RBFNs) are employed to deal with system uncertainties and external disturbances. Furthermore, in the proposed control design, the dynamic surface design technique is applied to circumvent the problem that the time derivatives of the virtual control laws are affected by unknown deception attack signals. It is proven that all closed-loop signals are uniformly ultimately bounded in the Lyapunov stability sense, and the formation errors are ensured for converging to an adjustable neighborhood of the origin. Finally, simulation results are given to verify the performance of the proposed theoretical approach.
Compared with the existing literature, the main contributions of this paper are as follows:
(i)
To the best of the authors’ knowledge, an adaptive secure control problem for leader-follower formation of nonholonomic mobile robots in the presence of deception attacks is the first trial of the formation control field of nonholonomic mobile robots. The secure formation control design and stability strategies using the adaptive technique are firstly established in this paper.
(ii)
Compared with the related works in the literature, a robust, resilient control design with adaptive attack compensation mechanisms is firstly developed to compensate for time-varying velocity attacks of the leader. It is proven that all closed-loop signals are uniformly ultimately bounded in the Lyapunov stability sense, and the formation errors are ensured for converging to an adjustable neighborhood of the origin.
The rest of this paper is organized as follows. In Section 2, the leader-follower model is introduced, and the adaptive secure control problem is formulated for achieving the desired formation of nonholonomic mobile robots with unknown deception velocity attacks. In Section 3, the proposed secure control strategy and its stability analysis are presented. In Section 4, simulation results are given. Finally, the conclusion of this paper is drawn in Section 5.

2. System Description and Problem Statement

2.1. Leader-Follower Model

In this paper, the leader-follower model, which is represented by the relative distance and angle between the leader i and follower j, is used for the formation of multiple mobile robots. If the leader-follower model is expressed using the relative distance and angle between the center positions of the leader and the follower, it is difficult to design the controller due to the lack of control inputs compared to the degrees of freedom. To address this problem, the leader-follower model shown in Figure 1 is used. This makes sense because the position of the sensor is different from the center position of the mobile robot in the practical application. From Figure 1, the relative distance l i j and angle ϕ i j between the leader i and the follower j measured by the sensor mounted on the follower j can be expressed as follows.
l i j = ( x i x j d j cos θ j ) 2 + ( y i y j d j sin θ j ) 2 ϕ i j = θ j arctan y i y j d j sin θ j x i x j d j cos θ j
where ( x n , y n ) and θ n , n = i , j denote the position and orientation of the robots, respectively, and d j is the distance from the position of the follower j to the front sensor.
The kinematics of the mobile robots are needed to derive the leader-follower model from (1), and the dynamics of the mobile robots are required to design the controller. The kinematics and dynamics of the mobile robots can be described by [30]
q ˙ n = cos θ n 0 sin θ n 0 0 1 ν n
τ n = M n ν ˙ n + C n ( ν n ) ν n + D n ν n + τ d , n
where n = i , j , q n = [ x n , y n , θ n ] ; ( x n , y n ) is the position and θ n is the heading angle, ν n = [ v n , ω n ] ; v n and ω n are the linear and angular velocities, respectively, τ d , n denotes the bounded external disturbance vector, and τ n = [ τ 1 , n , τ 2 , n ] is the control torque vector. In these expressions, the unknown matrices M n , C n , and D n are defined as follows:
M n = m 1 , n m 2 , n m 1 , n m 2 , n , C n ( ν n ) = r n m b , n c n 2 R n 1 R n 1 R n , D n = 1 r n d 1 , n R n d 1 , n d 2 , n R n d 2 , n ,
where m 1 , n = r n ( m b , n + 2 m w , n ) / 2 + J w , n / r n , m 2 , n = r n J n / ( 2 R n ) + R n J w , n / r n , J n = m b , n c n 2 + 2 m w , n R n 2 + J c , n + J m , n , R n and r n denote the half of the width of the body and the radius of the wheel, respectively, c n is the distance from the center of mass to the position of the nth mobile robot, d 1 , n and d 2 , n are the damping coefficients, m b , n and m w , n denote the mass of the body and the wheel, respectively, and J c , n , J w , n , and J m , n are the moments of inertia of the body, the wheel with a motor, and the wheel with the robot of a motor, respectively.
Substituting (2) into the time derivative of (1) yields the following leader-follower model [22]:
l ˙ i j = v i cos ψ i j v j cos ϕ i j + d j ω j sin ϕ i j ψ ˙ i j = ω i 1 l i j v i sin ψ i j + 1 l i j v j sin ϕ i j + 1 l i j d j ω j cos ϕ i j
where ψ i j = ϕ i j + θ i θ j .

2.2. Radial Basis Function Network

In this paper, we employ the radial basis function networks (RBFNs) to compensate the model uncertainty and external disturbance. The RBFN can approximate any continuous function f ( X ) as follows: f ( X ) = W Φ ( X ) + ε where X is the input vector, W R N h is the constant optimal weight vector, N h is the node number, ε is the reconstruction error, and Φ ( X ) = [ φ 1 ( X ) , , φ N h ( X ) ] is the Gaussian activation function defined by
φ l ( X ) = exp ( X ξ l ) ( X ξ l ) η l , l = 1 , , N h
where ξ l and η l are the center and the width of the Gaussian function, respectively.

2.3. Problem Statement

To design the adaptive secure controller using the leader-follower model (4), the follower j requires the measurement data ( θ i , v i , ω i ) of the leader i. It can be corrupted by the adversary while it is transmitted over the communication network. Even though the transmitted data can be arbitrarily attacked by the adversary, the number of the corrupted data is limited due to the limited attack resources, such as [31]. In this paper, we assume that the leader velocities ( v i , ω i ) are corrupted by unknown attack signals. Thus, the follower j receives the corrupted data ( v ¯ i , ω ¯ i ) given by
v ¯ i = v i + a v , i ω ¯ i = ω i + a ω , i
where a v , i and a ω , i are the time-varying attack signals.
Therefore, the control objective of this paper is to design the torque input vector τ j for the jth follower such that lim t | l i j l d , i j | ι j and lim t | ψ i j ψ d , i j | ι j are achieved in the environment with model uncertainty, external disturbance, and time-varying attack signals. Here, l d , i j and ψ d , i j denote the desired distance and angle, respectively, and ι j is an arbitrarily small positive constant.
Assumption 1.
The following assumptions are used in this study.
(i) 
The leader’s velocities ( v i , ω i ) and accelerations ( v ˙ i , ω ˙ i ) are bounded.
(ii) 
The external disturbance τ d , n is bounded, such that τ d , n τ ¯ d , n , where τ ¯ d , n is an unknown positive constant.
(iii) 
The time-varying attack signals a v , i and a ω , i are unknown and bounded, such that | a v , i | a ¯ v , i and | a ω , i | a ¯ ω , i , where a ¯ v , i and a ¯ ω , i are unknown positive constants.
(iv) 
The optimal weight vector W and reconstruction error ε are bounded, such that W W ¯ and | ε | ε ¯ , where W ¯ and ε ¯ are unknown positive constants.
(v) 
The first derivatives of the desired distance l d , i j and angle ψ d , i j exist and are bounded.
Remark 1.
The reasons for the validity of Assumption 1 are as follows.
(i) 
The follower j cannot follow the leader i unless the leader’s velocity and acceleration are bounded. The unbounded leader’s velocity and acceleration lead to the unstable operation of the leader i. Therefore, the leader’s velocity and acceleration must be bounded for the leader-follower formation.
(ii) 
In a real environment, external disturbances, such as friction and wind, are bounded. If external disturbances are unbounded (i.e., infinite), the control problem cannot be formulated.
(iii) 
In real applications, since the defender can obtain some statistical information of the attack signal (e.g., extreme values) by monitoring the target online for some time, the bounded attack signals can ensure the concealment of the attacker [32]. Thus, Assumption 1-(iii) is reasonable in the secure control field.
(iv) 
Owing to the universal approximation property, the optimal weighting vector and reconstruction error are bounded (see [33,34]). Thus, Assumption 1-(iv) is reasonable in the control field using neural networks.
(v) 
l d , i j and ψ d , i j are the desired values chosen by the control designer for achieving the formation control objective. That is, they are the reference signals for the leader-follower control. Thus, they should be bounded. If they are infinite, the formation control problem cannot be formulated. In addition, for the continuous formation operation, l d , i j and ψ d , i j should be continuous and differentiable signals. Thus, Assumption 1-(v) is reasonable.
The following Lemma will be used to prove the stability of the proposed control system.
Lemma 1
([34]). The following inequality is satisfied for any ϵ > 0 and for any χ R
0 | χ | χ tanh χ ϵ κ ϵ
where κ = 0.2785 .

3. Controller Design

In this section, we design the controller to achieve the control objective under the assumption that the follower j receives the corrupted data ( v ¯ i , ω ¯ i ) from the leader i. The adaptive technique and neural networks are employed to deal with model uncertainty, external disturbance, and time-varying attack signals. The dynamic surface control (DSC) method [35] is used to design the controller at the dynamic level.
Let us define the errors as
e 1 , j = l i j l d , i j
e 2 , j = ψ i j ψ d , i j
e 3 , j = θ r , j θ j
e 4 , j = ν j α f , j
ϖ j = [ ϖ 1 , j , ϖ 2 , j ] = α f , j α j
where e 4 , j = [ e 4 , 1 , j , e 4 , 2 , j ] , α j = [ α 1 , j , α 2 , j ] is the virtual control, α f , j = [ α f , 1 , j , α f , 2 , j ] is the filtered signal obtained by Γ j α ˙ f , j + α f , j = α j , α f , j ( 0 ) = α j ( 0 ) , Γ j is a diagonal matrix and positive definite, and θ r , j is the reference orientation to be defined later. In the leader-follower formation, the orientations of the leader i and the follower j cannot be equal while the formation is turning [25]. Thus, instead of following the orientation of the leader i, the reference orientation θ r , j is required for the follower j.
Step 1: Substituting (2) and (4) into the time derivatives of (7)–(9) yields the following error dynamics,
e ˙ 1 , j = v i cos ψ i j v j cos ϕ i j + d j ω j sin ϕ i j l ˙ d , i j e ˙ 2 , j = ω i v i l i j sin ψ i j + v j l i j sin ϕ i j + d j l i j ω j cos ϕ i j ψ ˙ d , i j e ˙ 3 , j = θ ˙ r , j ω j .
Consider the Lyapunov function candidate as
V 1 , j = 1 2 e 1 , j 2 + e 2 , j 2 + e 3 , j 2 + 1 γ v , j a ˜ v , j 2 + 1 γ ω , j a ˜ ω , j 2
where γ v , j and γ ω , j are positive constants, a ˜ v , j = a ¯ v , i a ^ v , j , a ˜ ω , j = a ¯ ω , i a ^ ω , j , and a ^ v , j and a ^ ω , j are the estimates of a ¯ v , i and a ¯ ω , i , respectively. By Assumption 1-(iii) and the inequality, we obtain the time derivative of (13) along (10)–(12) as follows:
V ˙ 1 , j = e 1 , j ( v ¯ i cos ψ i j a v , i cos ψ i j l ˙ d , i j ( e 4 , 1 , j + α 1 , j + ϖ 1 , j ) cos ϕ i j + d j ( e 4 , 2 , j + α 2 , j + ϖ 2 , j ) sin ϕ i j ) + e 2 , j ( ω ¯ i v ¯ i l i j sin ψ i j a ω , i + a v , i l i j sin ψ i j ψ ˙ d , i j + e 4 , 1 , j + α 1 , j + ϖ 1 , j l i j sin ϕ i j + d j l i j ( e 4 , 2 , j + α 2 , j + ϖ 2 , j ) cos ϕ i j ) + e 3 , j ( θ ˙ r , j e 4 , 2 , j α 2 , j ϖ 2 , j ) 1 γ v , j a ˜ v , j a ^ ˙ v , j 1 γ ω , j a ˜ ω , j a ^ ˙ ω , j e 1 , j v ¯ i cos ψ i j l ˙ d , i j ( e 4 , 1 , j + α 1 , j + ϖ 1 , j ) cos ϕ i j + d j ( e 4 , 2 , j + α 2 , j + ϖ 2 , j ) sin ϕ i j + e 2 , j ( ω ¯ i v ¯ i l i j sin ψ i j + e 4 , 1 , j + α 1 , j + ϖ 1 , j l i j sin ϕ i j + d j l i j ( e 4 , 2 , j + α 2 , j + ϖ 2 , j ) cos ϕ i j ψ ˙ d , i j ) + | a ^ v , j e 1 , j | + a ˜ v , j | e 1 , j | + | a ^ ω , j e 2 , j | + a ˜ ω , j | e 2 , j | + | a ^ v , j e 2 , j | + a ˜ v , j | e 2 , j | l i j + e 3 , j ( θ ˙ r , j e 4 , 2 , j α 2 , j ϖ 2 , j ) 1 γ v , j a ˜ v , j a ^ ˙ v , j 1 γ ω , j a ˜ ω , j a ^ ˙ ω , j .
The virtual controls α 1 , j and α 2 , j are chosen as
α 1 , j = ζ 1 , j cos ϕ i j l i j ζ 2 , j sin ϕ i j α 2 , j = ζ 1 , j d j sin ϕ i j l i j d j ζ 2 , j cos ϕ i j
and the reference orientation is updated by
θ ˙ r , j = α 2 , j k 3 , j e 3 , j
where
ζ 1 , j = k 1 , j e 1 , j + a ^ v , j tanh a ^ v , j e 1 , j ϵ j l ˙ d , i j + v ¯ i cos ψ i j ζ 2 , j = k 2 , j e 2 , j + ω ¯ i v ¯ i l i j sin ψ i j ψ ˙ d , i j + a ^ v , j l i j tanh a ^ v , j e 2 , j ϵ j l i j + a ^ ω , j tanh a ^ ω , j e 2 , j ϵ j
with positive constants k 1 , j , k 2 , j , k 3 , j , and ϵ j . Substituting (15) and (16) into (14) and using Lemma 1 yield
V ˙ 1 , j k 1 , j e 1 , j 2 k 2 , j e 2 , j 2 k 3 , j e 3 , j 2 + 3 κ ϵ j e 1 , j ( e 4 , 1 , j cos ϕ i j d j e 4 , 2 , j sin ϕ i j ) + e 2 , j l i j ( e 4 , 1 , j sin ϕ i j + d j e 4 , 2 , j cos ϕ i j ) e 3 , j e 4 , 2 , j e 1 , j ( ϖ 1 , j cos ϕ i j d j ϖ 2 , j sin ϕ i j ) + e 2 , j l i j ( ϖ 1 , j sin ϕ i j + d j ϖ 2 , j cos ϕ i j ) e 3 , j ϖ 2 , j + a ˜ v , j | e 1 , j | + | e 2 , j | l i j 1 γ v , j a ^ ˙ v , j + a ˜ ω , j | e 2 , j | 1 γ ω , j a ^ ˙ ω , j
where from Lemma 1, the following inequalities are used:
| a ^ v , j e 1 , j | a ^ v , j e 1 , j tanh a ^ v , j e 1 , j ϵ j κ ϵ j | a ^ ω , j e 2 , j | a ^ ω , j e 2 , j tanh a ^ ω , j e 2 , j ϵ j κ ϵ j | a ^ v , j e 2 , j | l i j a ^ v , j e 2 , j l i j tanh a ^ v , j e 2 , j ϵ j l i j κ ϵ j .
We choose the adaptation laws as
a ^ ˙ v , j = γ v , j | e 1 , j | + | e 2 , j | l i j γ v , j σ 1 , j a ^ v , j a ^ ˙ ω , j = γ ω , j | e 2 , j | γ ω , j σ 2 , j a ^ ω , j
where σ 1 , j and σ 2 , j are positive constants.
Step 2: The time derivative of (10) along (3) is
e ˙ 4 , j = M j 1 ( C j ( ν j ) ν j D j ν j τ d , j + τ j ) α ˙ f , j .
Multiplying B j M j both sides of (19) yields
M ¯ j e ˙ 4 , j = B j ( C j ( ν j ) ν j + D j ν j + M j α ˙ f , j ) B j τ d , j + B j τ j
where
M ¯ j = B j M j , B j = 1 2 1 1 1 1 .
Note that there exists the inverse of B j , and the constant matrix M ¯ j is positive definite.
Consider the Lyapunov function candidate as
V 2 , j = 1 2 e 4 , j M ¯ j e 4 , j + l = 1 2 1 γ l , j W ˜ l , j W ˜ l , j + ϖ j ϖ j
where γ l , j > 0 , W ˜ l , j = W l , j W ^ l , j , W l , j is the constant optimal weight vector, and W ^ l , j is the estimate of W l , j . By Assumption 1(ii), the time derivative of (21) along (20) yields
V ˙ 2 , j = e 4 , j ( B j ( C j ( ν j ) ν j + D j ν j + M j α ˙ f , j ) B j τ d , j + B j τ j ) l = 1 2 1 γ l , j W ˜ l , j W ^ ˙ l , j ϖ j Γ j 1 ϖ j ϖ j α ˙ j e 4 , j ( f j ( X j ) + B j τ j ) l = 1 2 1 γ l , j W ˜ l , j W ^ ˙ l , j ϖ j Γ j 1 ϖ j ϖ j α ˙ j + ς j 2
where f j ( X j ) = [ f 1 , j , f 2 , j ] = B j ( C j ( ν j ) ν j + D j ν j M j Γ 1 ϖ j ) + τ ¯ d , j 2 e 4 , j / ( 2 ς j ) with X j = [ ν j , ϖ j , e 4 , j ] and a constant ς j > 0 . Note that the continuous functions f n , j for n = 1 , 2 can be approximated by RBFNs as follows: f n , j ( X j ) = W n , j Φ j + ε n , j .
Remark 2.
The backstepping technique cannot be applied to the secure control problem concerned in this paper because the time derivative of the virtual control α j includes the unknown time-varying attack signals. Thus, the term α ˙ j cannot be removed by the actual control torque τ j of the follower j. To overcome this problem, we employ the dynamic surface control method that can replace the time derivative of α j with the first-order filtered signal term Γ j 1 ϖ j in the neural network approximator.
We chose the actual control inputs and update laws as
τ j = B j 1 ( W ^ j Φ j ( X j ) + k 4 , j e 4 , j + Λ j )
W ^ ˙ 1 , j = γ 1 , j Φ j e 4 , 1 , j γ 1 , j σ 3 , j W ^ 1 , j W ^ ˙ 2 , j = γ 2 , j Φ j e 4 , 2 , j γ 2 , j σ 4 , j W ^ 2 , j
where k 4 , j , σ 3 , 4 , and σ 4 , j are positive constants, and
W ^ j = [ W ^ 1 , j , W ^ 2 , j ] , Λ j = e 1 , j cos ϕ i j + e 2 , j l i j sin ϕ i j d j e 1 , j sin ϕ i j + d j l i j e 2 , j cos ϕ i j e 3 , j .
Consider the Lyapunov function candidate V T , j = V 1 , j + V 2 , j . Then, the following theorem gives the main result of this paper.
Theorem 1.
Assume that the transmitted leader signals ( v i , ω i ) are attacked by the adversary, and consider the leader-follower model (4) controlled by the proposed controller (23) with the update laws (18) and (24) under Assumption 1. For any initial conditions such that V T , j ( 0 ) β 0 , j where β 0 , j is a positive constant, there exist k 1 , j , k 2 , j , k 3 , j , γ v , j , γ ω , j , γ 1 , j , γ 2 , j , and Γ j such that V T , j ( t ) β 0 , j , t 0 . Furthermore, the control objective is achieved, namely, lim t | l i j l d , i j | ι j and lim t | ψ i j ψ d , i j | ι j .
Proof. 
Substituting (18), (23), and (24) into the time derivative of V T , j along (17) and (22), we have
V ˙ T , j = k 1 , j e 1 , j 2 k 2 , j e 2 , j 2 k 3 , j e 3 , j 2 k 4 , j e 4 , j e 4 , j + | e 1 , j | + 1 l i j | e 2 , j | ( | ϖ 1 , j | + d j | ϖ 2 , j | ) + | e 3 , j | | ϖ 2 , j | + σ 1 , j a ˜ v , j a ^ v , j + σ 2 , j a ˜ ω , j a ^ ω , j + e 4 , j ε j ϖ j Γ j 1 ϖ j + ϖ j α ˙ j + σ 3 , j W ˜ 1 , j W ^ 1 , j + σ 4 , j W ˜ 2 , j W ^ 2 , j + 3 κ ϵ j + ς j 2
where ε j = [ ε 1 , j , ε 2 , j ] . From the definition of α j and Assumption 1(i), it follows that
α ˙ j h j ( e 1 , j , e 2 , j , e 4 , j , ϖ j , a ˜ v , j , a ˜ ω , j )
for some continuous function h j . Consider the set Ω j : = { e 1 , j 2 + e 2 , j 2 + e 4 , j M ¯ j e 4 , j + a ˜ v , j 2 / γ v , j + a ˜ ω , j 2 / γ ω , j + ϖ j ϖ j 2 β 0 , j } . There exists a positive constant β ¯ j such that α ˙ j β ¯ j on Ω j . By Assumption 1(iv) and Young’s inequality, (25) can be written as
V ˙ T , j ( k 1 , j 1 ) e 1 , j 2 ( k 2 , j 1 ) e 2 , j 2 ( k 3 , j 1 ) e 3 , j 2 ( k 4 , j 1 ) e 4 , j e 4 , j σ 1 , j 2 a ˜ v , j 2 σ 2 , j 2 a ˜ ω , j 2 ϖ j Γ j 1 β ¯ j 2 2 δ j I Υ j ϖ j σ 3 , j 2 W ˜ 1 , j W ˜ 1 , j σ 4 , j 2 W ˜ 2 , j W ˜ 2 , j ϖ j 2 β ¯ j 2 2 δ j 1 h j 2 β ¯ j 2 + δ j 2 + 3 κ ϵ j + σ 1 , j 2 a ¯ v , i 2 + σ 2 , j 2 a ¯ ω , i 2 + σ 3 , j 2 W ¯ 1 , j 2 + σ 4 , j 2 W ¯ 2 , j 2 + ε ¯ 1 , j 2 4 + ε ¯ 2 , j 2 4 + ς j 2
where I is a 2 × 2 identity matrix, δ j is a positive constant, and
Υ j = 1 2 + 1 2 l i j 2 0 0 d j 2 2 + d j 2 2 l i j 2 + 1 4 .
If we choose k l , j = 1 + k l , j and Γ j 1 = β ¯ j 2 I / ( 2 δ j ) + Υ j + Γ j where k l , j > 0 , Γ j > 0 , and l = 1 , , 4 , then (27) is expressed as
V ˙ T , j 2 μ 0 , j V T , j + μ 1 , j ϖ j 2 β ¯ j 2 2 δ j 1 h j 2 β ¯ j 2
where μ 0 , j = min { k 1 , j , k 2 , j , k 3 , j , λ min ( M ¯ j 1 ) k 4 , j , γ v , j σ 1 , j / 2 , γ ω , j σ 2 , j / 2 , λ min ( Γ j ) , γ 1 , j σ 3 , j / 2 , γ 2 , j σ 4 , j / 2 } , μ 1 , j = δ j / 2 + 3 κ ϵ j + σ 1 , j a ¯ v , i 2 / 2 + σ 2 , j a ¯ ω , i 2 / 2 + σ 3 , j W ¯ 1 , j 2 / 2 + σ 4 , j W ¯ 2 , j 2 / 2 + ε ¯ 1 , j 2 / 4 + ε ¯ 2 , j 2 / 4 + ς j / 2 , and λ min ( · ) is a minimum eigenvalue of ( · ) . On V T , j = β 0 , j , h j β ¯ j . Therefore, V ˙ T , j 2 μ 0 , j V T , j + μ 1 , j . If μ 0 , j > μ 1 , j / ( 2 β 0 , j ) , then V ˙ T , j 0 on V T , j = β 0 , j . This implies that there exist k 1 , j , k 2 , j , k 3 , j , γ v , j , γ ω , j , γ 1 , j , γ 2 , j , and Γ j such that V T , j β 0 , j , t 0 . Furthermore, fixing σ l , j for l = 1 , , 4 and increasing μ 0 , j allow V T , j to be within the arbitrarily small bound μ 1 , j / ( 2 μ 0 , j ) . Therefore, the control objective is achieved, that is, lim t | l i j l d , i j | ι j and lim t | ψ i j ψ d , i j | ι j , where ι j = μ 1 , j / μ 0 , j . This completes the proof. □
Remark 3.
Theorem 1 proves the stability of the jth robot. For the formation of N mobile robots, a stability analysis for all robots, called formation stability [25], should be given. Because the formation stability can be analyzed using the sum of the Lyapunov candidate V T , j for all j, it can be easily proven using the proof of Theorem 1. However, the sum of errors can be large, as many layers exist. A leader-to-formation stability (LFS) [36], which provides performance measures that can be calculated analytically, can be applied to analyze a stability property of leader-following formations. Using the LFS allows the calculation of worst-case ultimate error bounds. Thus, this can be used to check a particular formation design. For example, if the LFS measure is unacceptable, the stability of the formation can be improved by adjusting the reference trajectory or formation architecture.

4. Simulation Results

In this section, we simulate five robots to demonstrate the performance of the proposed control scheme. Figure 2 shows the desired formation and information flow. The model parameters of each robot follow closely [30]. The initial postures of all robots are set to q 0 = [ 0 , 0 , π / 4 ] , q 1 = [ 3 , 3 , π / 2 ] , q 2 = [ 3 , 3 , π / 2 ] , q 3 = [ 6 , 3 , π / 2 ] , and q 4 = [ 6 , 3 , π / 2 ] . The external disturbances are given by τ d , j = [ 0.7 cos ( 1.5 t ) , 1.2 sin ( 0.5 t ) ] . The time-varying attack signals are set to a v , n = sin ( π t / 5 ) and a ω , n = cos ( π t / 5 ) , where n = 0 , 1 , 2 . The design parameters are chosen as γ v , j = γ ω , j = γ 1 , j = γ 2 , j = 5 , k n , j = 5 , σ n , j = 0.002 , Γ j = diag [ 0.01 , 0.01 ] , and ϵ j = 0.5 where n = 1 , , 4 . We assume that the robot 0 moves autonomously and the trajectory is generated by (2). The velocities of the robot 0 are chosen as follows: ν 0 = [ 0.25 ( 1 cos ( π t / 5 ) ) , 0 ] for 0 t < 5 , ν 0 = [ 0.5 , 0 ] for 5 t < 25 , ν 0 = [ 0.5 , 0.2 cos ( 2 π t / 20 ) ] for 25 t < 45 , and ν 0 = [ 0.5 , 0 ] for t 45 .
Figure 3, Figure 4 and Figure 5 show the simulation results. As shown in Figure 3 and Figure 4, the desired formation is achieved for straight and curved paths, and the formation errors converge to nearly zero. As shown in Figure 4, both the distance and angle errors that occur at the starting point drop quickly in less than a few seconds. Thus, there are design parameters that can achieve the desired formation, as mentioned in Theorem 1. This implies that the theoretical results of Theorem 1 are valid. Therefore, it can be seen from Theorem 1 that increasing the design parameters can reduce the bounds of the error and speed up the convergence rate. Figure Figure 5 depicts the control torques of all robots. Figure 6 and Figure 7 show the estimates of the attack signals and the outputs of the RBFNs. From Figure 6 and Figure 7, we can see that the bounds of the attack signals and unknown nonlinearities of the follower dynamics are compensated by the proposed adaptive laws and the adaptive neural network approximators, respectively. To consider various attack signals, the simulation with impulse attack signals is conducted. In this case, the impulse attack signals are chosen as: a v , n = 0.5 and a ω , n = 0 at t = 20 s, a v , n = 1 and a ω , n = 0.5 at t = 40 s, and a v , n = 1 and a ω , n = 0.5 at t = 60 s, where n = 0 , 1 , 2 . Figure 8 shows the simulation results. It can be seen that the formation tracking errors converge to nearly zero even though the control torques are affected by impulse attack signals. From the simulation results, it can be concluded that the proposed scheme is effective in achieving the desired formation of uncertain mobile robots in the presence of unknown attack signals.

5. Conclusions

In this paper, an adaptive secure control scheme has been proposed for achieving the leader-follower formation of nonholonomic mobile robots with uncertainty and deception attacks. It has been assumed that all follower robots receive their leader robot’s information corrupted by malicious attacks through the network. The effects of the time-varying attack signals injected into the leader’s information have been overcome by the adaptive technique, and the uncertainty arising from the dynamic model of nonholonomic mobile robots has been compensated by the RBFNs. From the Lyapunov stability theory, it has been proven that all estimation errors and formation tracking errors are bounded for all time. Because these errors can be reduced by adjusting the design parameters, the desired formation is achieved even though the leader’s velocities corrupted by deception attacks are transmitted to the followers. Finally, simulation results have been presented to verify the effectiveness of the proposed theoretical result. Further studies on the state and input constraint problem and the collision avoidance problem under unknown deception attacks are recommended as future work.

Author Contributions

Conceptualization, B.-S.P. and S.-J.Y.; methodology, B.-S.P. and S.-J.Y.; software, B.-S.P.; validation, B.-S.P. and S.-J.Y.; formal analysis, B.-S.P. and S.-J.Y.; investigation, B.-S.P.; writing—original draft preparation, B.-S.P.; writing—review and editing, S.-J.Y.; supervision, S.-J.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was supported by the National Research Foundation of Korea (NRF) grant funded by the Korea government (NRF-2019R1A2C1004898 and NRF-2019R1A2C1087552).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Amin, S.; Crdenas, A.A.; Sastry, S.S. Safe and secure networked control systems under denial-of-service attacks. In Hybrid Systems: Computation and Control; Springer: Berlin, Germany, 2009; pp. 31–45. [Google Scholar]
  2. Corona, I.; Giacinto, G.; Roli, F. Adversarial attacks against intrusion detection systems: Taxonomy, solutions and open issues. Inf. Sci. 2013, 239, 201–225. [Google Scholar] [CrossRef]
  3. Dolk, V.S.; Tesi, P.; Persis, C.; Heemels, W.P.M.H. Event-triggered control systems under denial-of-service attacks. IEEE Trans. Control Netw. Syst. 2017, 4, 93–105. [Google Scholar] [CrossRef] [Green Version]
  4. Wang, J.X.; Liu, Z.X.; Zhang, S.G.; Zhang, X. Defending collaborative false data injection attacks in wireless sensor networks. Inf. Sci. 2014, 254, 39–53. [Google Scholar] [CrossRef]
  5. He, W.; Gao, X.; Zhong, W.; Qian, F. Secure impulsive synchronization control of multi-agent systems under deception attacks. Inf. Sci. 2018, 459, 354–368. [Google Scholar] [CrossRef]
  6. Ding, D.; Wang, Z.; Han, Q.L.; Wei, G. Security control for discrete-time stochastic nonlinear systems subject to deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2018, 48, 779–789. [Google Scholar] [CrossRef]
  7. Zhu, M.H.; Martnez, S. On the performance analysis of resilient networked control systems under replay attacks. IEEE Trans. Autom. Control 2014, 59, 804–808. [Google Scholar] [CrossRef] [Green Version]
  8. Ye, D.; Zhang, T.Y.; Guo, G. Stochastic coding detection scheme in cyber-physical systems against replay attack. Inf. Sci. 2019, 481, 432–444. [Google Scholar] [CrossRef]
  9. Huang, J.S.; Zhao, L.; Wang, Q.G. Adaptive control of a class of strict nonlinear systems under replay attacks. ISA Trans. 2020, 107, 134–142. [Google Scholar] [CrossRef]
  10. Yucelen, T.; Haddad, W.M.; Feron, E.M. Adaptive control architecture for mitigating sensor attacks in cyber-physical systems. Cyber-Phys. Syst. 2016, 2, 24–52. [Google Scholar] [CrossRef]
  11. Jin, X.; Haddad, W.M.; Yucelen, T. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems. IEEE Trans. Autom. Control 2017, 62, 6058–6064. [Google Scholar] [CrossRef]
  12. An, L.; Yang, G.H. Improved adaptive resilient control against sensor and actuator attacks. Inf. Sci. 2018, 423, 145–156. [Google Scholar] [CrossRef]
  13. Yin, T.; Gu, A. Z. Security control for adaptive event-triggered networked control systems under deception attacks. IEEE Access 2020, 9, 10789–10796. [Google Scholar]
  14. Mousavinejad, E.; Ge, X.; Han, Q.; Yang, F.; Vlacic, L. Resilient tracking control of networked control systems under cyber attacks. IEEE Trans. Cybern. 2021, 51, 2107–2119. [Google Scholar] [CrossRef] [Green Version]
  15. Dong, L.; Xu, H.; Wei, X.; Hu, X. Security correction control of stochastic cyber-physical systems subject to false data injection attacks with heterogeneous effects. ISA Trans. 2021, in press. [Google Scholar] [CrossRef]
  16. Yoo, S.J. Neural-network-based adaptive resilient dynamic surface control against unknown deception attack of uncertain nonlinear time-delay cyberphysical systems. IEEE Tran. Neural Netw. Learn. Syst. 2019, 31, 4341–4353. [Google Scholar] [CrossRef]
  17. Yoo, S.J. Approximation-based event-triggered control against unknown injection data in full states and actuator of uncertain lower-triangular nonlinear systems. IEEE Access 2020, 8, 101747–101757. [Google Scholar] [CrossRef]
  18. Yang, Y.; Huang, J.; Su, X.; Wang, K.; Li, G. Adaptive control of second-order nonlinear systems with injection and deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2021, in press. [Google Scholar] [CrossRef]
  19. Zhang, K.; Su, R.; Zhang, H.; Tian, Y. Adaptive resilient event-triggered control design of autonomous vehicles with an iterative single critic learning framework. IEEE Trans. Neural Netw. Learn. Syst. 2021, in press. [Google Scholar]
  20. Balch, T.; Arkin, R.C. Behavior-based formation control for multi-robot teams. IEEE Trans. Robot. Autom. 1998, 14, 926–939. [Google Scholar] [CrossRef] [Green Version]
  21. Lewis, M.A.; Tan, K.H. High precision formation control of mobile robots using virtual structures. Auton. Robot. 1997, 14, 387–403. [Google Scholar] [CrossRef]
  22. Desai, J.P.; Ostrowski, J.; Kumar, V. Modeling and control of formations of nonholonomic mobile robots. IEEE Trans. Robot. Autom. 2001, 17, 905–908. [Google Scholar] [CrossRef] [Green Version]
  23. Consolini, L.; Morbidi, F.; Prattichizzo, D.; Tosques, M. Leader-follower formation control of nonholonomic mobile robots with input constraints. Automatica 2008, 44, 1343–1349. [Google Scholar] [CrossRef]
  24. Defoort, M.; Floquet, T.; Kokosy, A.; Perruquetti, W. Sliding-mode formation control for cooperative autonomous mobile robots. IEEE Trans. Ind. 2008, 55, 3944–3953. [Google Scholar] [CrossRef] [Green Version]
  25. Dierks, T.; Jagannathan, S. Neural network control of mobile robot formations using RISE feedback. IEEE Trans. Syst. Man Cybern. Part B Cybern. 2009, 39, 332–347. [Google Scholar] [CrossRef]
  26. Poonawala, H.A.; Satici, A.C.; Exkert, H.; Spong, M.W. Collision-free formation control with decentralized connectivity preservation for nonholonomic wheeled mobile robots. IEEE Trans. Control. Syst. Technol. 2015, 2, 122–130. [Google Scholar] [CrossRef]
  27. Wang, Y.; Wang, D.; Yang, S.; Shan, M. A practical leader-follower tracking control scheme for multiple nonholonomic mobile robots in unknown obstacle environments. IEEE Trans. Control Syst. Technol. 2019, 27, 1685–1693. [Google Scholar] [CrossRef]
  28. Kan, Z.; Klotz, J.R.; Shea, J.M.; Doucette, E.A.; Dixon, W.E. Decentralized rendezvous of nonholonomic robots with sensing and connectivity constraints. J. Dyn. Syst. Meas. Control 2017, 39, 024501. [Google Scholar] [CrossRef] [Green Version]
  29. Park, B.S.; Yoo, S.J. Connectivity-maintaining obstacle avoidance approach for leader-follower formation tracking of uncertain multiple nonholonomic mobile robots. Expert Syst. Appl. 2021, 171, 114589. [Google Scholar] [CrossRef]
  30. Fukao, T.; Nakagawa, H.; Adachi, N. Adaptive tracking control of a nonholonomic mobile robot. IEEE Trans. Robot. Autom. 2000, 16, 609–615. [Google Scholar] [CrossRef]
  31. Fawzi, H.; Tabuada, P.; Diggavi, S. Secure estimation and control for cyber-physical systems under adversarial attacks. IEEE Trans. Autom. Control 2014, 59, 1454–1467. [Google Scholar] [CrossRef] [Green Version]
  32. Li, L.; Yang, H.; Xia, Y.; Zhu, C. Attack detection and distributed filtering for state-saturated systems under deception attack. IEEE Trans. Control Netw. Syst. 2021, in press. [Google Scholar] [CrossRef]
  33. Ge, S.S.; Wang, C. Adaptive neural control of uncertain MIMO nonlinear systems. IEEE Trans. Neural Netw. 2004, 15, 674–692. [Google Scholar] [CrossRef] [PubMed]
  34. Polycarpou, M.M. Stable adaptive neural control scheme for nonlinear systems. IEEE Trans. Autom. Control 1996, 41, 447–451. [Google Scholar] [CrossRef]
  35. Swaroop, D.; Hedrick, J.K.; Yip, P.P.; Gerdes, J.C. Dynamic surface control for a class of nonlinear systems. IEEE Trans. Autom. Control 2000, 45, 1893–1899. [Google Scholar] [CrossRef] [Green Version]
  36. Tanner, H.G.; Pappas, G.J.; Kumar, V. Leader-to-formation stability. IEEE Trans. Robot. Autom. 2004, 20, 443–455. [Google Scholar] [CrossRef] [Green Version]
Figure 1. Leader-follower model.
Figure 1. Leader-follower model.
Mathematics 09 02190 g001
Figure 2. Desired formation and information flow.
Figure 2. Desired formation and information flow.
Mathematics 09 02190 g002
Figure 3. Formation tracking result.
Figure 3. Formation tracking result.
Mathematics 09 02190 g003
Figure 4. Formation errors.
Figure 4. Formation errors.
Mathematics 09 02190 g004
Figure 5. Control torque τ 1 .
Figure 5. Control torque τ 1 .
Mathematics 09 02190 g005aMathematics 09 02190 g005b
Figure 6. Estimates of attack signals.
Figure 6. Estimates of attack signals.
Mathematics 09 02190 g006
Figure 7. Outputs of RBFNs (solid: W ^ 1 , j Φ j ( X j ) , dashed: W ^ 2 , j Φ j ( X j ) ).
Figure 7. Outputs of RBFNs (solid: W ^ 1 , j Φ j ( X j ) , dashed: W ^ 2 , j Φ j ( X j ) ).
Mathematics 09 02190 g007aMathematics 09 02190 g007b
Figure 8. Simulation results for impulse attack signals.
Figure 8. Simulation results for impulse attack signals.
Mathematics 09 02190 g008aMathematics 09 02190 g008b
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Park, B.-S.; Yoo, S.-J. Adaptive Secure Control for Leader-Follower Formation of Nonholonomic Mobile Robots in the Presence of Uncertainty and Deception Attacks. Mathematics 2021, 9, 2190. https://doi.org/10.3390/math9182190

AMA Style

Park B-S, Yoo S-J. Adaptive Secure Control for Leader-Follower Formation of Nonholonomic Mobile Robots in the Presence of Uncertainty and Deception Attacks. Mathematics. 2021; 9(18):2190. https://doi.org/10.3390/math9182190

Chicago/Turabian Style

Park, Bong-Seok, and Sung-Jin Yoo. 2021. "Adaptive Secure Control for Leader-Follower Formation of Nonholonomic Mobile Robots in the Presence of Uncertainty and Deception Attacks" Mathematics 9, no. 18: 2190. https://doi.org/10.3390/math9182190

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop