CN116820100B - Unmanned vehicle formation control method under spoofing attack - Google Patents
Unmanned vehicle formation control method under spoofing attack Download PDFInfo
- Publication number
- CN116820100B CN116820100B CN202310748225.4A CN202310748225A CN116820100B CN 116820100 B CN116820100 B CN 116820100B CN 202310748225 A CN202310748225 A CN 202310748225A CN 116820100 B CN116820100 B CN 116820100B
- Authority
- CN
- China
- Prior art keywords
- unmanned vehicle
- attack
- formation
- node
- error
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Active
Links
- 230000015572 biosynthetic process Effects 0.000 title claims abstract description 77
- 238000000034 method Methods 0.000 title claims abstract description 20
- 238000004891 communication Methods 0.000 claims abstract description 47
- 239000011159 matrix material Substances 0.000 claims description 21
- 230000008878 coupling Effects 0.000 claims description 7
- 238000010168 coupling process Methods 0.000 claims description 7
- 238000005859 coupling reaction Methods 0.000 claims description 7
- 238000013461 design Methods 0.000 claims description 5
- 230000000087 stabilizing effect Effects 0.000 abstract 1
- 238000005755 formation reaction Methods 0.000 description 55
- 230000006870 function Effects 0.000 description 5
- 238000011160 research Methods 0.000 description 4
- 238000012986 modification Methods 0.000 description 3
- 230000004048 modification Effects 0.000 description 3
- 230000009286 beneficial effect Effects 0.000 description 2
- 238000009795 derivation Methods 0.000 description 2
- 238000010586 diagram Methods 0.000 description 2
- 238000005516 engineering process Methods 0.000 description 2
- 238000005070 sampling Methods 0.000 description 2
- 238000004088 simulation Methods 0.000 description 2
- 230000005540 biological transmission Effects 0.000 description 1
- 230000007547 defect Effects 0.000 description 1
- 230000007613 environmental effect Effects 0.000 description 1
- 238000004519 manufacturing process Methods 0.000 description 1
- 230000008447 perception Effects 0.000 description 1
- 239000002699 waste material Substances 0.000 description 1
Landscapes
- Feedback Control In General (AREA)
Abstract
Description
技术领域Technical field
本发明属于无人车协同编队控制领域,尤其涉及一种欺骗攻击下的无人车编队控制方法。The invention belongs to the field of unmanned vehicle collaborative formation control, and in particular relates to an unmanned vehicle formation control method under deception attack.
背景技术Background technique
无人车是一种能够自主完成任务的智能化系统,在无人车中,多个无人车可以协同完成更加复杂的任务,并在系统中发挥各自的优势。无人车由于不需要人员直接操作,能够在复杂或危险环境中工作,具有许多优点,如高效、安全、便捷等。因此,无人车在军事、民用、工业、科研等领域都有广泛的应用。在军事领域,无人车可以用于侦察、监视、打击等任务,能够提高作战效率和保障作战安全。在民用领域,无人车可以用于物流、交通、环保等领域,能够提高工作效率和减少人力资源的浪费。其中,时变输出编队作为无人车中的一个重要研究方向之一,其目标是使一组无人车在动态环境中以一定的形态和规律完成特定任务,如空地协同侦察、协同制导等。无人车的时变输出编队在制造业和军事等许多领域具有至关重要的意义,提高无人车的操作效率和性能和时变输出编队的鲁棒性已经成为当前研究的关键问题。An unmanned vehicle is an intelligent system that can complete tasks autonomously. In an unmanned vehicle, multiple unmanned vehicles can collaborate to complete more complex tasks and leverage their respective advantages in the system. Unmanned vehicles do not require direct operation by personnel and can work in complex or dangerous environments. They have many advantages, such as efficiency, safety, and convenience. Therefore, unmanned vehicles are widely used in military, civilian, industrial, scientific research and other fields. In the military field, unmanned vehicles can be used for reconnaissance, surveillance, strike and other tasks, which can improve combat efficiency and ensure combat safety. In the civilian field, unmanned vehicles can be used in logistics, transportation, environmental protection and other fields, which can improve work efficiency and reduce the waste of human resources. Among them, time-varying output formation is one of the important research directions in unmanned vehicles. Its goal is to enable a group of unmanned vehicles to complete specific tasks in a dynamic environment in a certain form and pattern, such as air-ground coordinated reconnaissance, coordinated guidance, etc. . The time-varying output formation of unmanned vehicles is of vital significance in many fields such as manufacturing and military. Improving the operating efficiency and performance of unmanned vehicles and the robustness of time-varying output formations has become a key issue in current research.
然而,随着无人车的应用规模不断扩大,无人车编队技术也面临着网络安全性的挑战,恶意攻击者可能会利用欺骗攻击手段干扰无人车编队的正常运行,导致无人车编队的失败。因此,抵御欺骗攻击带来的影响,确保无人车的感知和决策系统的可靠性和安全性成为了无人车研究的重要方向之一。However, as the application scale of unmanned vehicles continues to expand, unmanned vehicle formation technology is also facing network security challenges. Malicious attackers may use deception attacks to interfere with the normal operation of unmanned vehicle formations, resulting in unmanned vehicle formations. s failure. Therefore, resisting the impact of spoofing attacks and ensuring the reliability and security of autonomous vehicle perception and decision-making systems have become one of the important directions for autonomous vehicle research.
在无人车的时变输出编队的控制方法中,现有的许多连续控制方法在某些情况下不可避免地会增加网络通信负担,这是由于无人车的大规模分布式通信所导致的。然而,采用脉冲控制协议,使得每个无人车仅在采样瞬间独立地接收邻居状态信息。则可以大大减少信息传输,从而降低网络通信负担和通信丢失的风险。Among the control methods for the time-varying output formation of unmanned vehicles, many existing continuous control methods will inevitably increase the network communication burden in some cases, which is caused by the large-scale distributed communication of unmanned vehicles. . However, the pulse control protocol is adopted so that each unmanned vehicle independently receives neighbor status information only at the sampling instant. Information transmission can be greatly reduced, thereby reducing network communication burden and the risk of communication loss.
需要指出的是,在面对网络安全和资源有限的情况下,探究抵御攻击并减少通信负担的无人车的时变输出编队控制方法是当前亟待解决的问题。It should be pointed out that in the face of limited network security and resources, exploring time-varying output formation control methods for unmanned vehicles that resist attacks and reduce communication burdens is an urgent problem that needs to be solved.
发明内容Contents of the invention
发明目的:本发明的目的在于提供一种欺骗攻击下的无人车编队控制方法,能够使无人车保持一定精度情况下达成期望的时变编队构型,并且可以降低实际系统的通信量,同时有效地抵御欺骗攻击。Purpose of the invention: The purpose of the present invention is to provide a method for controlling the formation of unmanned vehicles under deception attacks, which can enable the unmanned vehicles to achieve the desired time-varying formation configuration while maintaining a certain accuracy, and can reduce the communication volume of the actual system. At the same time, it effectively resists spoofing attacks.
技术方案:本发明的一种欺骗攻击下的无人车编队控制方法,包括以下步骤:Technical solution: An unmanned vehicle formation control method under deception attack of the present invention includes the following steps:
步骤1:将一辆无人车作为一个通信节点,根据若干通信节点建立通信拓扑关系,并定义无人车编队中领导者和跟随者的耦合权重;Step 1: Use an unmanned vehicle as a communication node, establish a communication topology relationship based on several communication nodes, and define the coupling weight of the leader and follower in the unmanned vehicle formation;
步骤2:基于通信拓扑关系和耦合权重在无人车编队中构建领航者系统动态模型和跟随者系统动态模型;Step 2: Construct a leader system dynamic model and a follower system dynamic model in the unmanned vehicle formation based on communication topology relationships and coupling weights;
步骤3:在领航者系统动态模型和跟随者系统动态模型基础上,基于无人车节点通信信道上的网络安全,建立欺骗攻击动态模型;Step 3: Based on the leader system dynamic model and follower system dynamic model, establish a deception attack dynamic model based on network security on the unmanned vehicle node communication channel;
步骤4:在欺骗攻击动态模型基础上提出基于脉冲攻击信号补偿器的时变编队控制协议,并建立与时变编队控制协议相对应的动态误差系统模型;Step 4: Based on the spoofing attack dynamic model, a time-varying formation control protocol based on the pulse attack signal compensator is proposed, and a dynamic error system model corresponding to the time-varying formation control protocol is established;
步骤5:基于李亚普诺夫理论,在动态误差系统模型中给出误差系统稳定的充分条件,以证明基于脉冲攻击信号补偿器的时变编队控制协议的有效性,得到无人车的编队误差的跟踪误差界,由此无人车在保证精度情况下达到期望三角形编队队形。Step 5: Based on Lyapunov theory, sufficient conditions for the stability of the error system are given in the dynamic error system model to prove the effectiveness of the time-varying formation control protocol based on the pulse attack signal compensator, and obtain the formation error of the unmanned vehicle Tracking error bound, so that the unmanned vehicle can achieve the desired triangular formation while ensuring accuracy.
进一步的,步骤1中,将一辆无人车作为一个通信节点,根据若干通信节点建立通信拓扑关系:Further, in step 1, an unmanned vehicle is used as a communication node, and a communication topology relationship is established based on several communication nodes:
其中lij表示矩阵L的(i,j)元素,aij=1表示节点i能够接收节点j的信息,且信息流向为单向,aij=0表示节点i、j间不存在通信信道;Where l ij represents the (i, j) element of matrix L, a ij =1 indicates that node i can receive information from node j, and the information flow direction is one-way, a ij =0 indicates that there is no communication channel between nodes i and j;
定义领导者和跟随者的耦合权重为B=diag{b1,b2,...,bn},bi=1表示节点i能接收领导者信息,否则bi=0。The coupling weight of the leader and the follower is defined as B=diag{b 1 , b 2 ,..., b n }, b i =1 indicates that node i can receive the leader information, otherwise bi =0.
进一步的,步骤2具体为:无人车中领导者0和第i的跟随者的系统动态模型分别为:Further, step 2 is specifically: the system dynamic models of the leader 0 and the i-th follower in the autonomous vehicle are respectively:
其中R0,S0,A,B和C是具有适当维数的常数系统矩阵,x0(t)和y0(t)是领导者的状态和输出,xi(t),yi(t)和ui(t)分别表示跟随者的状态、输出和控制输入。where R 0 , S 0 , A, B and C are constant system matrices with appropriate dimensions, x 0 (t) and y 0 (t) are the states and outputs of the leader, x i (t), y i ( t) and u i (t) represent the status, output and control input of the follower respectively.
进一步的,步骤3中,基于无人车节点通信信道上的网络安全,建立欺骗攻击动态模型,具体包括:Further, in step 3, based on the network security on the unmanned vehicle node communication channel, a deception attack dynamic model is established, specifically including:
考虑欺骗攻击发生在无人车节点通信信道上,建立欺骗攻击模型为wij(tk)qij(tk),其中qij(tk)表示在tk时刻节点i到节点j的通信信道中的攻击信号,定义矩阵Q(tk)=[qij(tk)]n×n,且满足||Q(tk)||2≤q,q表示攻击信号总能量,wij(tk)服从伯努利分布,其概率密度函数为:Considering that the spoofing attack occurs on the communication channel of the unmanned vehicle node, the spoofing attack model is established as w ij (t k )q ij (t k ), where q ij (t k ) represents the communication from node i to node j at time t k For the attack signal in the channel, the matrix Q(t k )=[q ij (t k )] n×n is defined, and satisfies ||Q(t k )|| 2 ≤ q, q represents the total energy of the attack signal, w ij (t k ) obeys Bernoulli distribution, and its probability density function is:
其中,wij(tk)=1表示发生欺骗攻击,否则wij(tk)=0,λij∈[0,1)是用来描述在tk时刻节点i到节点j的通信信道中发生欺骗攻击的概率,令W(tk)=[wij(tk)]n×n,则有Among them, w ij (t k )=1 indicates that a spoofing attack has occurred, otherwise w ij (t k )=0, λ ij ∈[0,1) is used to describe the communication channel from node i to node j at time t k The probability of a spoofing attack occurring, let W(t k )=[w ij (t k )] n×n , then we have
进一步的,步骤4中,在欺骗攻击动态模型基础上提出基于脉冲攻击信号补偿器的时变编队控制协议具体为:Further, in step 4, based on the spoofing attack dynamic model, a time-varying formation control protocol based on the pulse attack signal compensator is proposed, specifically:
其中in
ηi(t)是无人车i的攻击信号补偿器的补偿值,δ(.)是狄拉克函数,c>0是补偿器的耦合增益,hi是分段连续可微的,表示无人车的输出编队形状信息,且满足以下式子: η i (t) is the compensation value of the attack signal compensator of unmanned vehicle i, δ (.) is the Dirac function, c>0 is the coupling gain of the compensator, h i is piecewise continuously differentiable, indicating no The output formation shape information of people and vehicles satisfies the following formula:
其中,Rhi,Shi是待选择的具有合适维数矩阵;K1i,K2i,K3i是待设计的控制器增益;Among them, R hi and S hi are matrices with appropriate dimensions to be selected; K 1i , K 2i , K 3i are the controller gains to be designed;
首先根据下列线性矩阵方程First according to the following linear matrix equation
得到(Xi,Ui)和(Xhi,Uhi)的解;Obtain the solutions of (X i ,U i ) and (X hi ,U hi );
然后,根据算法设计步骤选择合适的K1i,由下列等式即可得到K2i,K3i Then, select the appropriate K 1i according to the algorithm design steps, and K 2i and K 3i can be obtained from the following equations
K2i=Ui-K1iXi K 2i =U i -K 1i X i
K3i=Uhi-K1iXhi。K 3i =U hi -K 1i X hi .
进一步的,步骤4中,所述动态误差系统模型具体为:Further, in step 4, the dynamic error system model is specifically:
定义ei=yi(t)-yhi(t)-y0(t)为系统误差,无人车编队控制的目标公式化为:Define e i =y i (t)-y hi (t)-y 0 (t) as the system error, and the goal of unmanned vehicle formation control is formulated as:
其中为一个正常数,E(||.||2)代表欧几里得向量范数或其衍生得矩阵2-范数的期望。in is a positive constant, and E(||.|| 2 ) represents the expectation of the Euclidean vector norm or its derived matrix 2-norm.
进一步的,步骤5中,基于李亚普诺夫理论,给出误差系统稳定的充分条件:Further, in step 5, based on Lyapunov theory, sufficient conditions for the stability of the error system are given:
若分布式弹性编队控制器增益K1i满足R+SK1i是Hurwitz的,且K2i=Ui-K1iXi,K3i=Uhi-K1iXhi,如果存在正标量α1,α2,正定矩阵Ψ和正定矩阵P=diag(P1,...,Pn),满足以下矩阵不等式:If the distributed elastic formation controller gain K 1i satisfies R+SK 1i is Hurwitz's, and K 2i =U i -K 1i X i ,K 3i =U hi -K 1i X hi , if there are positive scalars α 1 ,α 2 , the positive definite matrix Ψ and the positive definite matrix P=diag(P 1 ,...,P n ) satisfy the following matrix inequality:
R0 TΨ+ΨR0-α2Ψ<0R 0 T Ψ+ΨR 0 -α 2 Ψ<0
Γ>κIΓ>κI
其中,in,
其中a,b,d,g是待选择的正标量;由此可得到在设计的编队控制器下跟踪误差系统稳定,无人车在一定误差界内实现期望的时变编队。Among them, a, b, d, and g are positive scalars to be selected; from this, it can be obtained that the tracking error system is stable under the designed formation controller, and the unmanned vehicle can achieve the desired time-varying formation within a certain error bound.
进一步的,步骤5中,所述无人车的编队误差的跟踪误差界:Further, in step 5, the tracking error bound of the unmanned vehicle formation error is:
即:Right now:
其中,φ=||[Ci C0]||。Among them, φ=||[C i C 0 ]||.
有益效果:与现有技术相比,本发明具有如下显著优点:本发明公开了一种欺骗攻击下的无人车编队控制方法。基于所述脉冲攻击信号补偿器,不仅可以有效地补偿欺骗攻击造成的缺陷,并且可以降低大规模的通信网络负担,还能使无人车在采样时刻接收邻居状态信息。同时,补偿器将补偿值反馈到编队控制器中,再根据编队控制器各无人车确定的控制输入量,可以完成期望编队。本发明公开的方法能够使无人车保持一定精度情况下达成期望的时变编队构型,并且可以降低实际系统的通信量,同时有效地抵御欺骗攻击。本发明还可以减少通信负担,节省资源;实时接收邻居状态信息与发送自身状态信息,完成期望的编队队形。Beneficial effects: Compared with the existing technology, the present invention has the following significant advantages: The present invention discloses an unmanned vehicle formation control method under deception attack. Based on the pulse attack signal compensator, it can not only effectively compensate for the defects caused by spoofing attacks, but also reduce the burden on large-scale communication networks and enable unmanned vehicles to receive neighbor status information at the sampling time. At the same time, the compensator feeds back the compensation value to the formation controller, and then based on the control input determined by each unmanned vehicle of the formation controller, the desired formation can be completed. The method disclosed in the present invention can enable unmanned vehicles to achieve the desired time-varying formation configuration while maintaining a certain accuracy, and can reduce the communication volume of the actual system while effectively resisting spoofing attacks. The invention can also reduce communication burden and save resources; receive neighbor status information and send own status information in real time to complete the desired formation.
附图说明Description of drawings
图1是本发明所提供的一种欺骗攻击下的无人车编队控制方法的控制结构框图;Figure 1 is a control structure block diagram of an unmanned vehicle formation control method under deception attack provided by the present invention;
图2是本发明实施例的4个无人车之间通信拓扑结构示意图;Figure 2 is a schematic diagram of the communication topology between four unmanned vehicles according to the embodiment of the present invention;
图3是本发明实施例的3个跟随者在不同时刻的时变输出编队运动轨迹;Figure 3 is the time-varying output formation trajectory of three followers at different moments according to the embodiment of the present invention;
图4是本发明实施例的3个无人车弹性时变输出编队误差曲线;Figure 4 is an elastic time-varying output formation error curve of three unmanned vehicles according to the embodiment of the present invention;
图5是本发明实施例的3个无人车的误差范数界||e(t)||2。Figure 5 is the error norm bound ||e(t)|| 2 of three unmanned vehicles according to the embodiment of the present invention.
具体实施方式Detailed ways
下面结合附图对本发明的技术方案作进一步说明。The technical solution of the present invention will be further described below with reference to the accompanying drawings.
下面将结合本发明实施例中的附图,进一步阐述本发明。显然,所描述的实施例仅仅是本发明一部分实施例,而不是全部的实施例。基于本发明中的实施例,本领域普通技术人员可以对本发明作各种改动或修改,这些等价形式同样于本申请所附权利要求书所限定范围。The present invention will be further described below with reference to the accompanying drawings in the embodiments of the present invention. Obviously, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, those of ordinary skill in the art can make various changes or modifications to the present invention, and these equivalent forms are also within the scope defined by the appended claims of this application.
如图1至图5所示,本实施例提供了一种欺骗攻击下的无人车编队控制方法,本实例以4个无人车的编队为例来对本发明做进一步的说明和解释。As shown in Figures 1 to 5, this embodiment provides a method for controlling an unmanned vehicle formation under a deception attack. This example uses a formation of four unmanned vehicles as an example to further illustrate and explain the present invention.
现期望它们能形成一个三角形的编队。要实现该编队,需采取以下步骤:Now expect them to form a triangular formation. To achieve this formation, the following steps need to be taken:
步骤1:考虑将一个无人车作为一个通信节点,根据通信节点建立通信拓扑关系:Step 1: Consider an unmanned vehicle as a communication node, and establish a communication topology relationship based on the communication node:
其中lij表示矩阵L的(i,j)元素,aij=1表示节点i能够接收节点j的信息,且信息刘翔为单向,aij=0表示节点i、j间不存在通信信道。此外,定义领导者和跟随者的耦合权重为B=diag{b1,b2,...,bn},bi=1表示节点i能接收领导者信息,否则bi=0。Among them, l ij represents the (i, j) element of matrix L, a ij =1 indicates that node i can receive information from node j, and the information flow is one-way, and a ij =0 indicates that there is no communication channel between nodes i and j. In addition, the coupling weight of the leader and the follower is defined as B=diag{b 1 , b 2 ,..., b n }, b i =1 indicates that node i can receive the leader information, otherwise bi =0.
步骤2:所述的无人车中领导者0和第i个的跟随者的系统动态模型分别为:Step 2: The system dynamic models of the leader 0 and the i-th follower in the unmanned vehicle are respectively:
其中R0,S0,A,B和C是具有适当维数的常数系统矩阵,x0(t)和y0(t)是领导者的状态和输出,xi(t),yi(t)和ui(t)分别表示跟随者的状态,输出和控制输入。where R 0 , S 0 , A, B and C are constant system matrices with appropriate dimensions, x 0 (t) and y 0 (t) are the states and outputs of the leader, x i (t), y i ( t) and u i (t) represent the follower’s status, output and control input respectively.
步骤3:考虑网络安全问题,建立欺骗攻击动态模型,具体包括:Step 3: Consider network security issues and establish a dynamic model of deception attacks, including:
考虑欺骗攻击发生在无人车节点通信信道上,建立欺骗攻击模型为wij(tk)qij(tk)。其中qij(tk)表示在tk时刻节点i到节点j的通信信道中的攻击信号。定义矩阵Q(tk)=[qij(tk)]n×n,且满足||Q(tk)||2≤q,q表示攻击信号总能量。Considering that the deception attack occurs on the communication channel of the unmanned vehicle node, the deception attack model is established as w ij (t k )q ij (t k ). Where q ij (t k ) represents the attack signal in the communication channel from node i to node j at time t k . Define the matrix Q(t k )=[q ij (t k )] n×n , and satisfy ||Q(t k )|| 2 ≤ q, q represents the total energy of the attack signal.
wij(tk)服从伯努利分布,其概率密度函数为w ij (t k ) obeys Bernoulli distribution, and its probability density function is
其中,wij(tk)=1表示发生欺骗攻击,否则wij(tk)=0。λij∈[0,1)是用来描述在tk时刻节点i到节点j的通信信道中发生欺骗攻击的概率。令W(tk)=[wij(tk)]n×n,则有Among them, w ij (t k )=1 indicates that a spoofing attack has occurred, otherwise w ij (t k )=0. λ ij ∈[0,1) is used to describe the probability of a spoofing attack occurring in the communication channel from node i to node j at time t k . Let W(t k )=[w ij (t k )] n×n , then we have
步骤4:提出的一种基于脉冲攻击信号补偿器的时变编队控制协议,具体设计如下:Step 4: A time-varying formation control protocol based on pulse attack signal compensator is proposed. The specific design is as follows:
其中 in
K1i,K2i,K3i是适当维数的矩阵,根据下列线性矩阵方程K 1i , K 2i , K 3i are matrices of appropriate dimensions, according to the following linear matrix equations
得到(Xi,Ui)和(Xhi,Uhi)的解。Obtain solutions to (X i ,U i ) and (X hi ,U hi ).
根据设计步骤选择合适的K1i,由下列等式即可得到K2i,K3i Select the appropriate K 1i according to the design steps. K 2i and K 3i can be obtained from the following equations
K2i=Ui-K1iXi K 2i =U i -K 1i X i
K3i=Uhi-K1iXhi K 3i = U hi -K 1i X hi
确定无人车期望的时变编队函数,具体步骤如下;Determine the desired time-varying formation function of unmanned vehicles. The specific steps are as follows;
定义无人车输出编队形状信息为h(t)=[h1 T(t),h2 T(t),...hn T(t)]T,满足:Define the output formation shape information of unmanned vehicles as h(t)=[h 1 T (t),h 2 T (t),...h n T (t)] T , which satisfies:
其中hi(t)∈Rn是分段连续可微的,Rh和Sh是合适维数的系统矩阵,yhi是第i个无人车输出编队状态信息。Among them, h i (t)∈R n is piecewise continuously differentiable, R h and S h are system matrices of appropriate dimensions, and y hi is the output formation status information of the i-th unmanned vehicle.
考虑建立相应的动态误差系统模型,具体如下:Consider establishing a corresponding dynamic error system model, as follows:
定义ei=yi(t)-yhi(t)-y0(t)为系统误差,所述步骤5中的无人车编队控制的目标公式化为:Define e i =y i (t)-y hi (t)-y 0 (t) as the system error. The goal of unmanned vehicle formation control in step 5 is formulated as:
其中为一个正常数,E(||.||2)代表欧几里得向量范数或其衍生得矩阵2-范数的期望。in is a positive constant, and E(||.|| 2 ) represents the expectation of the Euclidean vector norm or its derived matrix 2-norm.
步骤5:基于李亚普诺夫理论,给出误差系统稳定的充分条件:Step 5: Based on Lyapunov theory, sufficient conditions for the stability of the error system are given:
存在正标量α1,α2,正定矩阵Ψ和正定矩阵P=diag(P1,...,Pn),满足以下矩阵不等式:There are positive scalars α 1 , α 2 , a positive definite matrix Ψ and a positive definite matrix P=diag(P 1 ,...,P n ), which satisfy the following matrix inequality:
A0 TΨ+ΨA0-α2Ψ<0A 0 T Ψ+ΨA 0 -α 2 Ψ<0
Γ>κIΓ>κI
其中:in:
Tmax=max{tk+1-tk},Tmin=min{tk+1-tk},k=1,2...T max =max{t k+1 -t k },T min =min{t k+1 -t k },k=1,2...
根据理论推导得到无人车的编队跟踪误差界为According to theoretical derivation, the formation tracking error bound of unmanned vehicles is
即:Right now:
其中,φ=||[Ci C0]||。Among them, φ=||[C i C 0 ]||.
在本实施例中,选取4个无人车为例,其通信拓扑如图2所示,其中编号0为领导者,编号1-3是跟随者。4个无人车的系统动态模型参数为:In this embodiment, four unmanned vehicles are selected as an example. Their communication topology is shown in Figure 2, where number 0 is the leader and numbers 1-3 are followers. The system dynamic model parameters of the four unmanned vehicles are:
按照设计步骤,选择Follow the design steps and select
c=0.45,a=0.05,b=0.5,d=0.5,g=0.01,q=0.1c=0.45, a=0.05, b=0.5, d=0.5, g=0.01, q=0.1
λmax(P)=1.3134,κ=0.2138,Tmax=Tmin=0.2λ max (P) = 1.3134, κ = 0.2138, T max = T min = 0.2
这里令无人车编队期望的时变编队函数为:Here, the expected time-varying formation function of the unmanned vehicle formation is:
将上述值带入,可以得到跟踪误差界为 Bringing in the above values, we can get the tracking error bound as
仿真结果如图3-5所示。图3左图描述了三个跟随者的初始位置,右图为t=50s时跟随者的编队形状。图4为三个无人车弹性时变输出编队误差曲线,由此可见,在保证一定精度的情况下无人车实现了时变输出编队。图5表示了时变输出编队误差的范数界||e(t)||2,得到编队跟踪误差的范数是收敛的,证明了理论推导的正确性。从以上仿真结果可以看出,本发明公开的一种欺骗攻击下的无人车编队控制方法,保证编队误差动态系统稳定,并且可以降低实际系统的通信量,同时有效地抵御欺骗攻击,显示本发明技术方案的有效性。The simulation results are shown in Figure 3-5. The left picture of Figure 3 depicts the initial positions of the three followers, and the right picture shows the formation shape of the followers at t=50s. Figure 4 shows the elastic time-varying output formation error curves of three unmanned vehicles. It can be seen that the unmanned vehicles have achieved time-varying output formation while ensuring a certain accuracy. Figure 5 shows the norm bound of the time-varying output formation error ||e(t)|| 2. The obtained norm of the formation tracking error is convergent, which proves the correctness of the theoretical derivation. It can be seen from the above simulation results that the unmanned vehicle formation control method under deception attacks disclosed by the present invention ensures the stability of the formation error dynamic system, can reduce the communication volume of the actual system, and effectively resists deception attacks, showing that this method The effectiveness of the invented technical solution.
以上所述的具体实施方式,对本发明的目的、技术方案和有益效果进行进一步详细说明,所理解的是,以上所述仅为本发明的具体实施方式而已,并不用于限定本发明的保护范围。同时,本领域的技术人员可以对本发明进行各种改动和变型而不脱离本发明的精神和范围,这些改进和变型也应该视为本发明的保护范围。The above-described specific embodiments further describe the objectives, technical solutions and beneficial effects of the present invention in detail. It should be understood that the above-mentioned are only specific embodiments of the present invention and are not intended to limit the scope of the present invention. . At the same time, those skilled in the art can make various changes and modifications to the present invention without departing from the spirit and scope of the present invention, and these improvements and modifications should also be regarded as the protection scope of the present invention.
Claims (4)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310748225.4A CN116820100B (en) | 2023-06-25 | 2023-06-25 | Unmanned vehicle formation control method under spoofing attack |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202310748225.4A CN116820100B (en) | 2023-06-25 | 2023-06-25 | Unmanned vehicle formation control method under spoofing attack |
Publications (2)
Publication Number | Publication Date |
---|---|
CN116820100A CN116820100A (en) | 2023-09-29 |
CN116820100B true CN116820100B (en) | 2024-02-27 |
Family
ID=88140563
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202310748225.4A Active CN116820100B (en) | 2023-06-25 | 2023-06-25 | Unmanned vehicle formation control method under spoofing attack |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN116820100B (en) |
Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109240331A (en) * | 2018-09-30 | 2019-01-18 | 北京航空航天大学 | A kind of unmanned plane-unmanned vehicle cluster models time-varying formation control method and system |
CN111665848A (en) * | 2020-06-28 | 2020-09-15 | 北京航空航天大学 | Heterogeneous cluster formation tracking control method for unmanned aerial vehicle and unmanned aerial vehicle under topological switching |
CN114020042A (en) * | 2021-12-14 | 2022-02-08 | 北京航空航天大学 | A heterogeneous unmanned swarm formation encirclement tracking control method and system |
CN114371625A (en) * | 2022-01-11 | 2022-04-19 | 哈尔滨工业大学 | A Multi-Agent Formation Control Method Based on Variation of Node Count |
CN114710436A (en) * | 2022-04-19 | 2022-07-05 | 电子科技大学 | Topology reconstruction method of multi-domain unmanned system under topology attack |
CN114721435A (en) * | 2022-02-16 | 2022-07-08 | 鹏城实验室 | Soft constraint-based defense method for unmanned aerial vehicle cluster and related equipment |
CN114815856A (en) * | 2022-06-27 | 2022-07-29 | 中国人民解放军国防科技大学 | Time-varying formation of nonholonomic multi-agent system including control method, device and equipment |
CN114967439A (en) * | 2022-04-13 | 2022-08-30 | 燕山大学 | Multi-agent safety event triggering model prediction control method |
CN115913704A (en) * | 2022-11-14 | 2023-04-04 | 重庆邮电大学 | A time-delay pulse control method for intelligent unmanned swarm system against spoofing attack |
Family Cites Families (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US8922427B2 (en) * | 2011-06-29 | 2014-12-30 | Bae Systems Information And Electronic Systems Integration Inc. | Methods and systems for detecting GPS spoofing attacks |
CN110794867B (en) * | 2019-10-18 | 2020-10-30 | 合肥工业大学 | Intelligent decision-making method and device for UAV formation information interaction topology under communication interference |
-
2023
- 2023-06-25 CN CN202310748225.4A patent/CN116820100B/en active Active
Patent Citations (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109240331A (en) * | 2018-09-30 | 2019-01-18 | 北京航空航天大学 | A kind of unmanned plane-unmanned vehicle cluster models time-varying formation control method and system |
CN111665848A (en) * | 2020-06-28 | 2020-09-15 | 北京航空航天大学 | Heterogeneous cluster formation tracking control method for unmanned aerial vehicle and unmanned aerial vehicle under topological switching |
CN114020042A (en) * | 2021-12-14 | 2022-02-08 | 北京航空航天大学 | A heterogeneous unmanned swarm formation encirclement tracking control method and system |
CN114371625A (en) * | 2022-01-11 | 2022-04-19 | 哈尔滨工业大学 | A Multi-Agent Formation Control Method Based on Variation of Node Count |
CN114721435A (en) * | 2022-02-16 | 2022-07-08 | 鹏城实验室 | Soft constraint-based defense method for unmanned aerial vehicle cluster and related equipment |
CN114967439A (en) * | 2022-04-13 | 2022-08-30 | 燕山大学 | Multi-agent safety event triggering model prediction control method |
CN114710436A (en) * | 2022-04-19 | 2022-07-05 | 电子科技大学 | Topology reconstruction method of multi-domain unmanned system under topology attack |
CN114815856A (en) * | 2022-06-27 | 2022-07-29 | 中国人民解放军国防科技大学 | Time-varying formation of nonholonomic multi-agent system including control method, device and equipment |
CN115913704A (en) * | 2022-11-14 | 2023-04-04 | 重庆邮电大学 | A time-delay pulse control method for intelligent unmanned swarm system against spoofing attack |
Non-Patent Citations (3)
Title |
---|
Ad_hoc网络基于投影寻踪的虫洞检测机制研究;马磊;中国优秀硕士学位论文全文数据库 信息科技辑;全文 * |
Leader-Following Consensus of Multiple Euler-Lagrange Systems Under Deception Attacks;Lizhang Wang 等;IEEE Access;全文 * |
面向空地协同作战的无人机-无人车异构时变编队跟踪控制;周思全 等;航空兵器;第26卷(第4期);全文 * |
Also Published As
Publication number | Publication date |
---|---|
CN116820100A (en) | 2023-09-29 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11757723B2 (en) | Distributed secure state reconstruction method based on double-layer dynamic switching observer | |
Shao et al. | Fuzzy adaptive event-triggered secure control for stochastic nonlinear high-order MASs subject to DoS attacks and actuator faults | |
Xu et al. | Anti-attack event-triggered control for nonlinear multi-agent systems with input quantization | |
CN116679753B (en) | Formation tracking control method for anti-spoofing attack of heterogeneous unmanned system | |
CN114020042A (en) | A heterogeneous unmanned swarm formation encirclement tracking control method and system | |
Liang et al. | Secure and privacy-preserving formation control for networked marine surface vehicles with sampled-data interactions | |
CN114866284B (en) | Unmanned ship cluster distributed safety control method | |
CN116886743A (en) | Dynamic event triggering control method for second-order multi-agent system under denial of service attack | |
Pan et al. | Predefined-time bipartite time-varying formation tracking control of networked autonomous surface vehicles via hierarchical control approach | |
Shi et al. | Flocking dynamics for cooperation-antagonism multi-agent networks subject to limited communication resources | |
Zhang et al. | Observer‐based consensus control for heterogeneous multi‐agent systems with intermittent communications | |
Xu et al. | Fixed-time fuzzy resilient consensus tracking of nonlinear MASs under DoS attacks and actuator faults | |
CN116820100B (en) | Unmanned vehicle formation control method under spoofing attack | |
CN115033013A (en) | Multi-unmanned aerial vehicle fixed time distributed formation control method with input constraint | |
Zhu et al. | Dynamic-memory event-based adaptive sliding mode control for networked nonlinear implicit hybrid systems under random spoofing attacks and data-buffer-aided mechanism | |
An et al. | Adaptive Fault-Tolerant Optimized Platoon Cloud Tracking Control for Heterogeneous Vehicles via Dual Learning Mechanism | |
CN118226748A (en) | Multi-agent sliding mode fault-tolerant control method under finite time observer | |
Li et al. | Event‐based secure leader‐following consensus for cyber‐physical systems under denial‐of‐service attacks | |
CN117471970A (en) | Construction method and device of proportional-integral synchronous controller of complex dynamic network | |
Qian et al. | Robust cooperative tracking of multiagent systems with asymmetric saturation actuator via output feedback | |
CN113741185B (en) | A Leader-Follower Consensus Method with Guaranteed Performance for Unilateral Lipschitz Nonlinear Multi-Agent Systems | |
Shi et al. | Neural-network-based event-triggered formation tracking for nonlinear multi-uav systems with switching topologies under dos attacks | |
CN114609930A (en) | Unmanned aerial vehicle air-ground tracking control method based on mixed event triggering in network environment | |
CN110007603B (en) | Low-altitude unmanned-machine conflict resolution method and system based on nucleolus resolution | |
Long et al. | Fully Distributed Secure Consensus Control for Cyber-Physical Systems Against Actuator Fault and Denial-of-Service Attack |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |