A global approach to fault detection in multi-agent systems with switching topologies subject to cyber-attacks

Anass Taoufik, Michael Defoort, Mohamed Djemai, Krishna Busawon

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

In this paper, a distributed methodology is proposed for attack detection and isolation in multi-agent systems (MAS) with high order integrator dynamics. The proposed methodology is capable of detecting an attack on a node/agent and on an edge/communication link anywhere in the fleet and identify its nature even in the presence of a switching communication topology. In order to effectively achieve this, a cascade of predefined-time switched observers is introduced for each agent to achieve a fast estimate of the global state of the MAS whereby the settling time is an a-priori user defined parameter, independently of the initial conditions. Then, through a conventional consensus algorithm, a set of residuals are generated by the agents that is capable of detecting and isolating attacks on nodes and edges in the network.

Original languageEnglish
Title of host publication2021 International Conference on Control, Automation and Diagnosis, ICCAD 2021
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Electronic)9781665449687
DOIs
Publication statusPublished - 2021
Event2021 International Conference on Control, Automation and Diagnosis, ICCAD 2021 - Grenoble, France
Duration: 3 Nov 20215 Nov 2021

Publication series

Name2021 International Conference on Control, Automation and Diagnosis, ICCAD 2021

Conference

Conference2021 International Conference on Control, Automation and Diagnosis, ICCAD 2021
Country/TerritoryFrance
CityGrenoble
Period3/11/215/11/21

Keywords

  • Cyber-attacks
  • Fault detection
  • Multi-agent systems
  • Predefined-time observers
  • State reconstruction
  • Switching topologies

Fingerprint

Dive into the research topics of 'A global approach to fault detection in multi-agent systems with switching topologies subject to cyber-attacks'. Together they form a unique fingerprint.

Cite this