TY - JOUR
T1 - Neural observer-based formation for multi-UAVs against deception and desired trajectory attacks
AU - Pan, Kunpeng
AU - Yang, Feisheng
AU - Lyu, Yang
AU - Ji, Mingyue
AU - Pan, Quan
N1 - Publisher Copyright:
© 2024
PY - 2025/3/14
Y1 - 2025/3/14
N2 - This paper investigates secure formation control for multi-UAV systems in the presence of deception and desired trajectory attacks. It is crucial to note that previous papers studying the secure formation control problem for multi-UAV systems usually apply to cases where the multi-UAV systems are subject to sensor attacks and actuator attacks. In this paper, we propose a formation control scheme to address both desired trajectory and deception attacks, incorporating attack modeling, estimation, and compensation at its core. First, dynamic models are constructed for multi-UAV systems and cyber attacks, respectively. In particular, desired trajectory and deception attacks are mapped to control input channels during modeling. Subsequently, an adaptive neural network observer is introduced to reconstruct desired trajectory attack signals. The online updating of neural network weights avoids the need for manual parameter selection. Next, we propose an event-triggered secure formation controller with an attack compensation approach aimed at reducing transmission resources under an event-triggered mechanism. The uniform ultimate boundedness of the system is derived. Finally, the formation tracking protocol is substantiated and validated by providing simulation results.
AB - This paper investigates secure formation control for multi-UAV systems in the presence of deception and desired trajectory attacks. It is crucial to note that previous papers studying the secure formation control problem for multi-UAV systems usually apply to cases where the multi-UAV systems are subject to sensor attacks and actuator attacks. In this paper, we propose a formation control scheme to address both desired trajectory and deception attacks, incorporating attack modeling, estimation, and compensation at its core. First, dynamic models are constructed for multi-UAV systems and cyber attacks, respectively. In particular, desired trajectory and deception attacks are mapped to control input channels during modeling. Subsequently, an adaptive neural network observer is introduced to reconstruct desired trajectory attack signals. The online updating of neural network weights avoids the need for manual parameter selection. Next, we propose an event-triggered secure formation controller with an attack compensation approach aimed at reducing transmission resources under an event-triggered mechanism. The uniform ultimate boundedness of the system is derived. Finally, the formation tracking protocol is substantiated and validated by providing simulation results.
KW - Deception attacks
KW - Desired trajectory attacks
KW - Multi-UAV systems
KW - Neural network observer
KW - Secure formation control
UR - http://www.scopus.com/inward/record.url?scp=85214578750&partnerID=8YFLogxK
U2 - 10.1016/j.neucom.2024.129297
DO - 10.1016/j.neucom.2024.129297
M3 - 文章
AN - SCOPUS:85214578750
SN - 0925-2312
VL - 622
JO - Neurocomputing
JF - Neurocomputing
M1 - 129297
ER -