Containment Control of Multiagent Systems Subject to Denial of Service Attacks
This article proposes a secure containment control of multi-agent systems under cyber attacks. Multiple Unmanned Aerial Vehicle Systems (UAVs) are considered in this article. The suggested approach considers denial of service (DoS) attacks, containment control of multiple UAVs, and designs a strong...
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
IEEE
2022-01-01
|
Series: | IEEE Access |
Subjects: | |
Online Access: | https://ieeexplore.ieee.org/document/9766311/ |
_version_ | 1818201819228143616 |
---|---|
author | Siddig M. Elkhider Sami El-Ferik Abdul-Wahid A. Saif |
author_facet | Siddig M. Elkhider Sami El-Ferik Abdul-Wahid A. Saif |
author_sort | Siddig M. Elkhider |
collection | DOAJ |
description | This article proposes a secure containment control of multi-agent systems under cyber attacks. Multiple Unmanned Aerial Vehicle Systems (UAVs) are considered in this article. The suggested approach considers denial of service (DoS) attacks, containment control of multiple UAVs, and designs a strong steering approach as well as a secure middleware for data sharing and exchange. A combination of graph theory and L1 adaptive control is utilized to ensure efficient steering and cooperation. The data distribution services (DDS) middleware handles data transfer among all the UAVs, which solves the interoperability challenge when interacting with several UAVs from various platforms and can be regarded as an enhanced security strategy depending on its quality of service (QoS). The L1 controller is used to stabilize the dynamic model of each UAV, while the graph method is used for the containment of multi UAVs. The linear matrix inequalities (LMIs) control is designed as a robust level of security to handle the influence of the DoS attack. Simulation results are utilized to validate and demonstrate the suggested technique’s performance under the criteria mentioned before. |
first_indexed | 2024-12-12T02:59:37Z |
format | Article |
id | doaj.art-f2ca152d8783494ebd930b7d11cdfd4a |
institution | Directory Open Access Journal |
issn | 2169-3536 |
language | English |
last_indexed | 2024-12-12T02:59:37Z |
publishDate | 2022-01-01 |
publisher | IEEE |
record_format | Article |
series | IEEE Access |
spelling | doaj.art-f2ca152d8783494ebd930b7d11cdfd4a2022-12-22T00:40:40ZengIEEEIEEE Access2169-35362022-01-0110481024811110.1109/ACCESS.2022.31723509766311Containment Control of Multiagent Systems Subject to Denial of Service AttacksSiddig M. Elkhider0https://orcid.org/0000-0002-9814-9094Sami El-Ferik1https://orcid.org/0000-0001-5648-4786Abdul-Wahid A. Saif2https://orcid.org/0000-0003-2969-1581Interdisciplinary Center of Smart Mobility and Logistics, King Fahd University of Petroleum and Minerals, Dhahran, Saudi ArabiaInterdisciplinary Center of Smart Mobility and Logistics, King Fahd University of Petroleum and Minerals, Dhahran, Saudi ArabiaInterdisciplinary Center of Smart Mobility and Logistics, King Fahd University of Petroleum and Minerals, Dhahran, Saudi ArabiaThis article proposes a secure containment control of multi-agent systems under cyber attacks. Multiple Unmanned Aerial Vehicle Systems (UAVs) are considered in this article. The suggested approach considers denial of service (DoS) attacks, containment control of multiple UAVs, and designs a strong steering approach as well as a secure middleware for data sharing and exchange. A combination of graph theory and L1 adaptive control is utilized to ensure efficient steering and cooperation. The data distribution services (DDS) middleware handles data transfer among all the UAVs, which solves the interoperability challenge when interacting with several UAVs from various platforms and can be regarded as an enhanced security strategy depending on its quality of service (QoS). The L1 controller is used to stabilize the dynamic model of each UAV, while the graph method is used for the containment of multi UAVs. The linear matrix inequalities (LMIs) control is designed as a robust level of security to handle the influence of the DoS attack. Simulation results are utilized to validate and demonstrate the suggested technique’s performance under the criteria mentioned before.https://ieeexplore.ieee.org/document/9766311/Containment controlcyber attacksunmanned aerial vehicle systempublish-subscribe middleware |
spellingShingle | Siddig M. Elkhider Sami El-Ferik Abdul-Wahid A. Saif Containment Control of Multiagent Systems Subject to Denial of Service Attacks IEEE Access Containment control cyber attacks unmanned aerial vehicle system publish-subscribe middleware |
title | Containment Control of Multiagent Systems Subject to Denial of Service Attacks |
title_full | Containment Control of Multiagent Systems Subject to Denial of Service Attacks |
title_fullStr | Containment Control of Multiagent Systems Subject to Denial of Service Attacks |
title_full_unstemmed | Containment Control of Multiagent Systems Subject to Denial of Service Attacks |
title_short | Containment Control of Multiagent Systems Subject to Denial of Service Attacks |
title_sort | containment control of multiagent systems subject to denial of service attacks |
topic | Containment control cyber attacks unmanned aerial vehicle system publish-subscribe middleware |
url | https://ieeexplore.ieee.org/document/9766311/ |
work_keys_str_mv | AT siddigmelkhider containmentcontrolofmultiagentsystemssubjecttodenialofserviceattacks AT samielferik containmentcontrolofmultiagentsystemssubjecttodenialofserviceattacks AT abdulwahidasaif containmentcontrolofmultiagentsystemssubjecttodenialofserviceattacks |