This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Passivity-based Attack Identification and Mitigation with Event-triggered Observer Feedback and Switching Controller

Pushkal Purohit and Anoop Jain
The authors are with the Department of Electrical Engineering, Indian Institute of Technology Jodhpur, Rajasthan, India 342030 (e-mail: [email protected], [email protected]).
Abstract

This paper addresses the problem of output consensus in linear passive multi-agent systems under a False Data Injection (FDI) attack, considering the unavailability of complete state information. Our formulation relies on an event-based cryptographic authentication scheme for sensor integrity and considers FDI attacks at the actuator end, inspired by their practical nature and usages. For secure consensus, we propose (i) a passivity-based approach for detecting FDI attacks on the system and (ii) a Zeno-free event-triggered observer-based switching controller, which switches between the normal and the defense modes following an attack detection. We show that the closed-loop system achieves practical consensus under the controller’s action in the defense mode. Simulation examples are provided to support the theoretical findings.

Index Terms:
Consensus, false data injection attack, event-triggered observer, networked system, passive systems.

I Introduction

Cyber-Physical Systems (CPS) are often exposed to adversarial attacks due to their operation over insecure communication networks. In particular, FDI attacks are a major threat to the secure operation of a CPS, as they can corrupt both the actuation signal and the sensor measurements [9, 12]. Since the sensor feedback cannot be trusted in this situation, cryptographic tools like message authentication code [6], etc., have been popular as these guarantee sensor measurement integrity from such attacks by preventing data alteration in transit [6]. This situation is shown in Fig. 1, where a cryptographic authenticator is employed in conjunction with an observer to design the secure controllers. However, continuous use of cryptographic tools can generate computation and communication overhead primarily due to the limited resources of CPS [15]. As a remedy, one could employ an event-based cryptographic authentication scheme where the communication is realized using sensors (such as ultrasonic and infrared) that are practically discrete or event-based [2]. Consequently, the controller can ignore an attack injected in between adjacent events, limiting adverse effects on the system. On the other hand, actuators usually work in a continuous fashion and have faster actuation than sensor measurements (for example, the motor in Khepera IV mobile robot [13]). Thereby, an attack injected in between adjacent events at the actuator side cannot be rejected by the actuator. For these practical reasons, it is viable to consider an event-based cryptographic authentication at the sensor end and the FDI attacks at the actuator end.

Refer to caption
Figure 1: The ithi^{\text{th}} agent under the FDI attack at the actuator end and with cryptographic authenticator at the sensor end.

For the secure control of CPS, attack detection is often the foremost objective [25]. While most of the existing works focus on residual-based and estimation-based attack detectors, these might be vulnerable to destabilizing stealthy attacks [15, 8]. The authors in [5] presented an energy equivalence-based attack detection approach that checks for equality between the supplied, and the dissipated and stored energies. Consequently, the attacks are classified as passive and non-passive. A generalized notion of this is referred to as passivity theory [14], which relies on an inequality between the supplied energy and the change in stored energy. Besides being a flexible tool for control design and analyzing the system’s stability, the passivity property can be leveraged in identifying an attack in a CPS. Unlike [5], our attack identification approach relies on a passivity inequality between the energy supplied and the change in the system’s stored energy, along with an event-based observer setting. With an observer, while an event-triggering mechanism can be implemented either by continuously monitoring the system output [21] or the observer output [24], we consider the former case in this paper where the event condition is independent of the observer state in the presence of a malicious attack.

Attack mitigation is the second necessary step for securely controlling a CPS towards its desired goal following an attack detection. For this, it is essential to have (accurate) knowledge of the attack signal to mitigate its effect, usually accomplished using attack estimators designed as part of the state observers. Some popular works in this direction are [18, 11], where the attack estimators operate continuously irrespective of the absence of an attack signal and hence, are computationally expensive [28]. Unlike these works, this paper proposes a switching-based controller scheme employing the attack estimator only in the case of attack detection and works according to an event-triggered authentication scheme.

Main Contributions: As shown in Fig. 1, we consider a multi-agent system comprising linear passive agents interacting towards achieving output consensus over a network susceptible to malicious FDI attacks. We envisage the presence of actuator attacks uiau_{i}^{a} while relying on an event-based cryptographic authentication for sensor measurement integrity. The proposed controller receives information about estimated states x^i\hat{x}_{i} from its cascaded observer and the estimated outputs y^j\hat{y}_{j} from the neighboring agents and works in the dual modes, namely, the normal mode (no-attack detection) and the defense mode (attack detection). We first obtain the Zeno-free event condition for cryptographic authentication for the stable operation of the observer, independent of the overall system’s stability. We then propose a passivity-based approach for the detection of actuator attacks. It is shown that the difference between the agents’ output remains bounded under the action of the proposed switching controller in the defense mode and the previously derived event condition. Alternatively, it can be said that the system achieves practical output consensus.

Paper Organization: Section II describes the system and attack models, followed by the problem statement. Section III introduces the Zeno-free event condition for observer stability. Section IV discusses attack detection and mitigation by introducing the idea of the switching controller, followed by proof of the closed-loop system’s stability. Section V provides simulation results before we conclude the paper and discuss the future direction of work in Section VI.

I-A Notations

The set of real, non-negative real numbers and positive integers is denoted by \mathbb{R}, +\mathbb{R}_{+}, and +\mathbb{Z}_{+}, respectively. 𝟎nn\boldsymbol{0}_{n}\in\mathbb{R}^{n}, 𝟏nn\boldsymbol{1}_{n}\in\mathbb{R}^{n} are column vectors with all entries 0, 11, respectively. Inn×nI_{n}\in\mathbb{R}^{n\times n} is an identity matrix. The induced 22-norm (resp., Euclidean norm) for any matrix MM (resp., vector zz) is represented by M:m×n+\|M\|:\mathbb{R}^{m\times n}\to\mathbb{R}_{+} (resp., z:n+\|z\|:\mathbb{R}^{n}\to\mathbb{R}_{+}). The symbol \otimes denotes the Kronecker product of two matrices and diag{k1,,kn}n×n\text{diag}\{k_{1},\ldots,k_{n}\}\in\mathbb{R}^{n\times n} denotes a diagonal matrix with diagonal entries kik_{i}. The maximum and minimum eigenvalues of a symmetric matrix Mn×nM\in\mathbb{R}^{n\times n} are represented by λmax(M)\lambda_{\text{max}}(M) and λmin(M)\lambda_{\text{min}}(M), respectively. The Moore–Penrose pseudo-inverse of a matrix Mm×nM\in\mathbb{R}^{m\times n} is Mn×mM^{\dagger}\in\mathbb{R}^{n\times m}, having the property MMM=MMM^{\dagger}M=M. If MM has full column rank, M=(MTM)1MTM^{\dagger}=(M^{T}M)^{-1}M^{T} and MM=InM^{\dagger}M=I_{n} [23]. For a digraph with edge set 𝔼\mathbb{E}, (i,j)𝔼(i,j)\in\mathbb{E} is a directed edge from node ii to node jj. The Laplacian for a graph with NN nodes is denoted by sN×N\mathcal{L}_{s}\in\mathbb{R}^{N\times N} (please refer to [7] for details).

I-B Preliminaries

Definition 1 (Passive System [14]).

Consider the system

x˙=f(x,u);y=h(x,u),\dot{x}=f(x,u);\quad y=h(x,u), (1)

with state xmx\in\mathbb{R}^{m}, control input upu\in\mathbb{R}^{p}, and output ypy\in\mathbb{R}^{p}. The function ff is locally Lipschitz, hh is continuous, f(𝟎m,𝟎p)=𝟎mf(\boldsymbol{0}_{m},\boldsymbol{0}_{p})=\boldsymbol{0}_{m} and h(𝟎m,𝟎p)=𝟎ph(\boldsymbol{0}_{m},\boldsymbol{0}_{p})=\boldsymbol{0}_{p}. The system (1) is said to be passive if there exists a continuously differentiable storage function S(x):mS(x):\mathbb{R}^{m}\to\mathbb{R}, S(x)0,S(𝟎m)=0S(x)\geq 0,S(\boldsymbol{0}_{m})=0, such that

uTyS˙=(S/x)f(x,u),(x,u)m×p.u^{T}y\geq\dot{S}=({\partial S}/{\partial x})f(x,u),\quad\forall(x,u)\in\mathbb{R}^{m}\times\mathbb{R}^{p}. (2)

Note that the storage function S(x)S(x) in (2) (which is also referred to as passivity inequality) is not unique. However, the quadratic storage function of the form S(x)=(1/2)xTxS(x)=(1/2)x^{T}x has its own vantages over others in analyzing linear systems, as it is computationally moderate, easy to implement, and close to the concept of energy in linear systems. Particularly, it is shown in [26] that any storage function can be represented as a quadratic storage function for a linear dynamical system. Motivated by this fact, we exploit the quadratic storage function in our analysis in this paper.

Lemma 1 (Implications of Passivity [4]).

Consider the linear system

x˙=Ax+Bu,y=Cx,\dot{x}=Ax+Bu,\quad y=Cx, (3)

where xm,up,ypx\in\mathbb{R}^{m},u\in\mathbb{R}^{p},y\in\mathbb{R}^{p} are state, input and output vectors, and Am×m,Bm×pA\in\mathbb{R}^{m\times m},B\in\mathbb{R}^{m\times p} and Cp×mC\in\mathbb{R}^{p\times m} are system, input and output matrices, respectively. The system (3) is said to be passive if there exists a differentiable scalar storage function V:mV:\mathbb{R}^{m}\to\mathbb{R} for (3) such that V(x)0,V(𝟎m)=0V(x)\geq 0,V(\boldsymbol{0}_{m})=0, and W(x)0W(x)\geq 0, such that (Vx)TAx=W(x),(Vx)TB=yT(\frac{\partial V}{\partial x})^{T}Ax=-W(x),\ (\frac{\partial V}{\partial x})^{T}B=y^{T}.

II System Modeling and Problem Description

II-A The Agent and Attack Models

II-A1 Agent Model

We consider a multi-agent system comprising NN linear passive agents under the influence of FDI attack and having combined system dynamics (see Fig. 1):

x˙=Ax+Buc,y=Cx,\dot{x}=Ax+Bu^{c},\quad y=Cx, (4)

where x=[x1T,,xNT]TNmx=[x_{1}^{T},\ldots,x_{N}^{T}]^{T}\in\mathbb{R}^{Nm}, uc=[(u1c)T,,(uNc)T]TNpu^{c}=[(u^{c}_{1})^{T},\ldots,(u^{c}_{N})^{T}]^{T}\in\mathbb{R}^{Np} and y=[y1T,,yNT]TNpy=[y_{1}^{T},\ldots,y_{N}^{T}]^{T}\in\mathbb{R}^{Np} are the stacked state, input and output vectors, respectively, where ximx_{i}\in\mathbb{R}^{m}, uipu_{i}\in\mathbb{R}^{p} and yipy_{i}\in\mathbb{R}^{p} i\forall i. Further, A=diag{A1,,AN}Nm×Nm{A}=\text{diag}\{A_{1},\ldots,A_{N}\}\in\mathbb{R}^{Nm\times Nm}, B=diag{B1,,BN}Nm×Np{B}=\text{diag}\{B_{1},\ldots,B_{N}\}\in\mathbb{R}^{Nm\times Np}, and C=diag{C1,,CN}Np×Nm{C}=\text{diag}\{C_{1},\ldots,C_{N}\}\in\mathbb{R}^{Np\times Nm} are the stacked system, input and output block diagonal matrices, respectively. We incorporate the following reasonable assumptions on system (4) (unless otherwise explicitly stated):

  1. (A1)

    The matrix pair (Ai,Bi)(A_{i},B_{i}) is controllable and (Ai,Ci)(A_{i},C_{i}) is observable for all ii.

  2. (A2)

    The matrix BiB_{i} has full column rank for all ii.

  3. (A3)

    The agents are strongly connected over a fixed directed network having Laplacian s\mathcal{L}_{s}.

Remark 1.

Note that the assumption (A2) follows from the fact that the agents are usually under-actuated where p<mp<m. If the rank of BiB_{i} is less than the number of columns for an under-actuated system, there exists a set of inputs that do not affect the system dynamics, which is not practically desired. Further, in over-actuated systems, if the columns of BiB_{i} are linearly dependent, some inputs will be redundant. Thus, it is reasonable to remove dependent columns and corresponding inputs with the assumption that BiB_{i} has full column rank (please refer to [3, Section 6.2.1]). Some of the most widely used robotic models, like quadcopter and car-like models, among others, satisfy (A2) [28, 17]. Other examples are- tugboats [10], which follow second-order Lagrangian dynamics, and harmonic oscillators [27]. Both these systems are passive and satisfy the preconditions (A1) and (A2).

II-A2 FDI Attack Model

The FDI attack on the ithi^{\text{th}} agent can be modeled as shown in Fig. 1, implying that the compromised signal reaching its actuator can be written as

uic=ui+uia,u^{c}_{i}=u_{i}+u^{a}_{i}, (5)

for each ii, where uiu_{i}, uiau^{a}_{i}, and uicu^{c}_{i} are designed control, actuator attack, and compromised control signals, respectively. As discussed in Section I, since we employ an event-based cryptographic authentication scheme for the sensor measurements collected at point R in Fig. 1, the attack at the sensor end can be neglected for a suitably chosen event condition such that the observer error dynamics remains stable. The following reasonable limitations are considered on the actuator attack signal:

Assumption 1.

The attack signal ua=[(u1a)T,,(uNa)T]Tu^{a}{=}[(u_{1}^{a})^{T},\ldots,(u_{N}^{a})^{T}]^{T} Np\in\mathbb{R}^{Np} is bounded and has a bounded derivative, that is, uau¯a\|u^{a}\|\leq\bar{u}^{a} and u˙au~a\|\dot{u}^{a}\|\leq\tilde{u}^{a}, for some u¯a,u~a+\bar{u}^{a},\tilde{u}^{a}\in\mathbb{R}_{+}.

Assumption 1 is motivated by the fact that the attack signal cannot be arbitrarily large, as the attacker has limited resources [20]. Secondly, arbitrarily large attack signals are easy to detect, while the attacker generally wants to remain stealthy. Further, this paper does not deal with sensor noise. In practice, noise and attacks have inherently different characteristics; noise is caused randomly and unintentionally, while attacks are injected intentionally by an intruder to mislead or even paralyze the whole network’s behaviors while remaining undetected [12].

II-B Event-based Observer and Switching Controller

II-B1 The Observer

Due to event-triggered sensor feedback, the latest measurements yy are not always available at point G (in Fig. 1). Let the sensor measurement at the last event tkt_{k} be y¯=y(tk),k+\bar{y}=y(t_{k}),\ k\in\mathbb{Z}_{+}. We define an error variable e(t)=y¯y(t),t[tk,tk+1),ke(t)=\bar{y}-y(t),\ t\in[t_{k},t_{k+1}),\forall k. Clearly, e(tk)=𝟎Np,ke(t_{k})=\boldsymbol{0}_{Np},\forall k. With the error term ee, the event-triggered observer dynamics is given by:

x^˙=Ax^+B(u+u^a)+H(yy^+e),y^=Cx^,\dot{\hat{x}}=A\hat{x}+B(u+\hat{u}^{a})+H(y-\hat{y}+e),\quad\hat{y}=C\hat{x}, (6)

where HNm×NpH\in\mathbb{R}^{Nm\times Np} is the observer gain matrix, x^\hat{x} is the estimated state and u^a\hat{u}^{a} is the estimated input attack signal proposed as:

u^a=B(x^˙Ax^Bu+Bu^a(ttd)),\hat{u}^{a}=B^{\dagger}(\dot{\hat{x}}-A\hat{x}-Bu+B\hat{u}^{a}(t-t_{d})), (7)

where td>0t_{d}>0 is a small constant reaction time, representing the time required to observe the effect of control u(t)u(t) on the sensor output. Clearly, u^a\hat{u}^{a} is Lipschitz under Assumption 1, i.e.,

u^a(t)u^a(ttd)ψtd,\|\hat{u}^{a}(t)-\hat{u}^{a}(t-t_{d})\|\leq\psi t_{d}, (8)

for some constant ψ+\psi\in\mathbb{R}_{+}. Ideally, td0t_{d}\to 0, however, it may not be feasible in practice due to the components’ response time and can be assumed sufficiently small. Next, we define the state estimation error ξ(t)=x(t)x^(t)\xi(t)=x(t)-\hat{x}(t), whose time-derivative, using (4) and (6), is obtained as

ξ˙=x˙x^˙=(AHC)ξ+B(uau^a)He.\dot{\xi}=\dot{x}-\dot{\hat{x}}=(A-HC)\xi+B(u^{a}-\hat{u}^{a})-He. (9)

In the absence of an attack (i.e., ua=𝟎Npu^{a}=\boldsymbol{0}_{Np}), attack estimator is inactive, that is, u^a𝟎Np\hat{u}^{a}\coloneqq\boldsymbol{0}_{Np}, and hence, (9) can be written as ξ˙=(AHC)ξHe\dot{\xi}=(A-HC)\xi-He, which is independent of tdt_{d}, and can be stabilized with the event condition as provided in further analysis in the paper. Without loss of generality, we consider the following assumption for the initialization of the observer states:

Assumption 2.

The state estimation error is zero at the instant of time when an attack starts. For instance, if the attack begins at time t=tat=t_{a}, ξ(ta)𝟎Nmx^(ta)x(ta)\xi(t_{a})\approx\boldsymbol{0}_{Nm}\iff\hat{x}(t_{a})\approx x(t_{a}).

Please note that Assumption 2 does not imply a prior knowledge of the attack time tat_{a} and only assumes that the observer error is small at the beginning of an attack. Similar assumptions have been made in literature [1], as such assumptions are generally required for attack detection with residual based attack detection approaches but not mentioned explicitly. We have the following proposition about the boundedness of the signal B(u^aua)B(\hat{u}^{a}-u^{a}) (whose proof is discussed in Section IV):

Proposition 1.

Under the proposed event-based observer (6), it holds that B(uau^a)Φ,tta\|B(u^{a}-\hat{u}^{a})\|\leq\varPhi,\forall t\geq t_{a}, where Φ=ψtdB+\varPhi=\psi t_{d}\|B\|\in\mathbb{R}_{+} is a constant.

II-B2 The Controller

Let us introduce a logic δ\delta such that δ=0\delta=0 indicates “no attack detection”, while δ=1\delta=1 indicates an “attack detection”. Based on this, the following switching-based control strategy is proposed:

u=uδ(1δ)un+δud,u=u_{\delta}\coloneqq(1-\delta)u^{n}+\delta u^{d}, (10)

where unu^{n} and udu^{d} are the control actions in normal (no attack detection) and defense (attack detection) modes, respectively. In the absence of an attack, it follows from [4, Theorem 2.1] that the system (4), under passivity assumption, achieve output consensus with the following control:

un=Ky,u^{n}=-K\mathcal{L}y, (11)

where (sIp)Np×Np\mathcal{L}\coloneqq(\mathcal{L}_{s}\otimes I_{p})\in\mathbb{R}^{Np\times Np} is the extended Laplacian, K+K\in\mathbb{R}_{+} is a constant gain, and unNpu^{n}\in\mathbb{R}^{Np} is the stacked input vector under normal operation. Under the action of an observer, (11) can be written equivalently in terms of the estimated measurement signal y^\hat{y} as [16]:

u^n=Ky^,\hat{u}^{n}=-K\mathcal{L}\hat{y}, (12)

which would be used in the subsequent analysis in this paper.

II-C The Problem

Consider the linear passive system (4) under FDI attacks (5) with observer dynamics (6) equipped with an event-based authentication mechanism as shown in Fig. 1. Let the system be governed by a switching-based control protocol (10), where the attack estimator operates only in the defense mode and the event-authentication mechanism is in operation for all time. Suppose that the aforementioned assumptions hold. The following problems are addressed in this paper:

  • (P1)

    Obtain an event condition for authentication feedback to the observer such that the observer error dynamics (9) is practically stable and the estimation error remains near the origin, i.e., limtξ0\lim_{t\to\infty}\|\xi\|\approx 0.

  • (P2)

    Device an FDI attack detection mechanism using passivity inequality (2) with the quadratic storage function.

  • (P3)

    Design the switching control law uu in (10) (effectively udu^{d}) such that the system achieves (practical) output consensus, i.e., there exists a small constant ϵo>0\epsilon_{o}>0 such that limtyiyjϵo,(i,j)𝔼\lim_{t\to\infty}\|y_{i}-y_{j}\|\leq\epsilon_{o},\ \forall(i,j)\in\mathbb{E}.

III Event Condition and Zeno Behavior

In this section, we introduce the event condition and show that the observer states follow the agents’ states closely with a small error. To ensure that the observer error dynamics (9) is stable and ξ\xi converges to zero, V=ξTPξV=\xi^{T}P\xi could be a candidate Lyapunov function, where PP is a symmetric positive definite matrix satisfying (AHC)TP+P(AHC)=Q(A-HC)^{T}P+P(A-HC)=-Q for some symmetric positive definite matrix QQ. The time-derivative of the Lyapunov function VV, along the error dynamics (9), is

V˙\displaystyle\dot{V} =ξTPξ˙+ξ˙TPξ\displaystyle=\xi^{T}P\dot{\xi}+\dot{\xi}^{T}P\xi
=ξT(P(AHC)+(AHC)TP)ξ\displaystyle=\xi^{T}(P(A-HC)+(A-HC)^{T}P)\xi
+2ξTPB(uau^a)2ξTPHe\displaystyle~{}~{}~{}+2\xi^{T}PB(u^{a}-\hat{u}^{a})-2\xi^{T}PHe
ξTQξ+2ξPB(uau^a)+2ξPHe.\displaystyle\leq-\xi^{T}Q\xi+2\|\xi\|\|PB(u^{a}-\hat{u}^{a})\|+2\|\xi\|\|PHe\|.

From the inequality111The proof follows from the fact that the arithmetic mean is greater than or equal to geometric mean for any two positive numbers cX2cX^{2} and Y2/c,c>0Y^{2}/c,c>0. 2XYcX2+(1/c)Y22XY\leq cX^{2}+({1}/{c})Y^{2} for some c>0c>0 and X,YX,Y\in\mathbb{R}, it follows that 2ξPB(uau^a)cξ2+(PB(uau^a)2/c)2\|\xi\|\|PB(u^{a}-\hat{u}^{a})\|\leq c\|\xi\|^{2}{+}({\|PB(u^{a}-\hat{u}^{a})\|^{2}}/{c}) and 2ξPHecξ2+(PHe2/c)2\|\xi\|\|PHe\|\leq c\|\xi\|^{2}{+}({\|PHe\|^{2}}/{c}). Using these, it can be written that

V˙\displaystyle\dot{V} λmin(Q)ξ2+2cξ2\displaystyle{\leq}-\lambda_{\text{min}}(Q)\|\xi\|^{2}{+}2c\|\xi\|^{2}
+(1/c)(PB(uau^a)2+PHe2)\displaystyle~{}~{}~{}+(1/c)({\|PB(u^{a}{-}\hat{u}^{a})\|^{2}}+{\|PHe\|^{2}})
λmin(Q)(12cλmin(Q))ξ2\displaystyle{\leq}-\lambda_{\text{min}}(Q)\left(1-\frac{2c}{\lambda_{\text{min}}(Q)}\right)\|\xi\|^{2}
+(1/c)(PB(uau^a)2+PHe2)\displaystyle~{}~{}~{}+(1/c)({\|PB(u^{a}-\hat{u}^{a})\|^{2}}{+}{\|PHe\|^{2}})
λmin(Q)λmax(P)(12cλmin(Q))ξTPξ\displaystyle{\leq}-\frac{\lambda_{\text{min}}(Q)}{\lambda_{\text{max}}(P)}\left(1-\frac{2c}{\lambda_{\text{min}}(Q)}\right)\xi^{T}P\xi
+P2cB(uau^a)2+PH2ce2\displaystyle~{}~{}~{}+\frac{\|P\|^{2}}{c}\|B(u^{a}-\hat{u}^{a})\|^{2}+\frac{\|PH\|^{2}}{c}\|e\|^{2}
αV(ξ)+βΦ2+γe2,\displaystyle{\leq}-\alpha V(\xi)+\beta\varPhi^{2}+\gamma\|e\|^{2},

where αλmin(Q)λmax(P)(12cλmin(Q))>0\alpha\coloneqq\frac{\lambda_{\text{min}}(Q)}{\lambda_{\text{max}}(P)}\left(1-\frac{2c}{\lambda_{\text{min}}(Q)}\right)>0, βP2/c>0\beta\coloneqq{\|P\|^{2}}/{c}>0, γPH2/c>0\gamma\coloneqq{\|PH\|^{2}}/{c}>0, and c(0,12λmin(Q))c\in(0,\frac{1}{2}\lambda_{\text{min}}(Q)) is a design variable. If the event condition is set as γe2+βΦ2ραV(ξ)\gamma\|e\|^{2}+\beta\varPhi^{2}\leq\rho\alpha V(\xi) for some ρ(0,1)\rho\in(0,1), V˙α(aρ)V\dot{V}\leq-\alpha(a-\rho)V, implying stability of the observer error dynamics. However, non-availability of the entire error vector ξ\xi and requirement to monitor both system and observer states restricts its implementation, as discussed in Section I. Therefore, motivated by the dynamic event-triggered scheme [21], we introduce an auxiliary variable η\eta with dynamics:

η˙=c1η+c2e2,\dot{\eta}=-c_{1}\eta+c_{2}\|e\|^{2}, (13)

where η\eta\in\mathbb{R}, and c1>0c_{1}>0 and c20c_{2}\geq 0 are design parameters. Clearly, solution of (13) is given by η=ec1tη(0)+0tec1(tτ)c2e2𝑑τ\eta={\rm e}^{-c_{1}t}\eta(0)+\int_{0}^{t}{\rm e}^{-c_{1}(t-\tau)}c_{2}\|e\|^{2}d\tau, which non-negative for η(0)0\eta(0)\geq 0. Thus, η0,t0η(0)0\eta\geq 0,\forall t\geq 0\iff\eta(0)\geq 0.

Theorem 1.

The observer error dynamics (9) is stable and the error ξ\xi converges to a small ball around the origin under the following dynamic event condition:

(γ+dc2)e2=(dc1η+Ω),({\gamma+dc_{2}})\|e\|^{2}=(dc_{1}\eta+\varOmega), (14)

where Ω=εβΦ2>0\varOmega=\varepsilon-\beta\varPhi^{2}>0, ε+\varepsilon\in\mathbb{R}_{+} and d+d\in\mathbb{R}_{+} are arbitrary design constants (β,γ\beta,\gamma are defined as above).

Proof.

Consider the composite Lyapunov function U=V(ξ)+dηU=V(\xi)+d\eta, whose time-derivative, along (9) and (13), is U˙=V˙+dη˙αV(ξ)+γe2+βΦ2dc1η+dc2e2=αV(ξ)+(γ+dc2)e2+βΦ2dc1η\dot{U}{=}\dot{V}+d\dot{\eta}\leq-\alpha V(\xi)+\gamma\|e\|^{2}+\beta\varPhi^{2}-dc_{1}\eta+dc_{2}\|e\|^{2}=-\alpha V(\xi)+(\gamma+dc_{2})\|e\|^{2}+\beta\varPhi^{2}-dc_{1}\eta. Under the event condition (14) and substituting for Ω\varOmega, yields U˙αV(ξ)+ε\dot{U}\leq-\alpha V(\xi)+\varepsilon. Now, it can be concluded that the dynamics (9) is practically stable and the estimation error ξ\xi converges to a small ball near the origin having its radius dependent on ε\varepsilon. ∎

Next, we prove the exclusion of Zeno behavior by showing that there exists a positive minimum inter event time (MIET). Before proceeding, we consider that the system’s output has bounded derivative, i.e., y˙=Cx˙=CAx+CBuσ,t0\|\dot{y}\|=\|C\dot{x}\|=\|CAx+CBu\|\leq\sigma,\ \forall t\geq 0, where σ\sigma is arbitrary large positive constant.

Theorem 2.

Consider error dynamics (9). Under the event condition (14), the system (9) has positive MIET, τ=12σΩγ+dc2\tau=\frac{1}{2\sigma}\sqrt{\frac{\varOmega}{\gamma+dc_{2}}} and does not exhibit Zeno behavior.

Proof.

Differentiating e2\|e\|^{2} for t[tk,tk+1)t\in[t_{k},t_{k+1}) we get ddte2=2eTe˙=2eT(y¯˙y˙)\frac{d}{dt}\|e\|^{2}=2e^{T}\dot{e}=2e^{T}(\dot{\bar{y}}-\dot{y}) =2eTC(Ax+Bu)=-2e^{T}C(Ax+Bu) 2eCAx+CBu\leq 2\|e\|\|CAx+CBu\| 2σe\leq 2\sigma\|e\|. For MIET (τ)(\tau), the event triggers when the right side of the equality in (14) is minimum, which is achieved when η=0\eta=0 (since η0t0\eta\geq 0\forall t\geq 0, see (13)). The value of error at MIET (τ)(\tau) is

e(tk+τ)=minηdc1η+Ωγ+dc2=Ωγ+dc2,\displaystyle\|e(t_{k}+\tau)\|=\min_{\eta}\sqrt{\frac{dc_{1}\eta+\varOmega}{\gamma+dc_{2}}}=\sqrt{\frac{\varOmega}{\gamma+dc_{2}}}, (15)

and using (15) in the expression of ddte2\frac{d}{dt}\|e\|^{2}, we get

ddte22σΩγ+dc2.\frac{d}{dt}\|e\|^{2}\leq 2\sigma\sqrt{\frac{\varOmega}{\gamma+dc_{2}}}. (16)

Integrating (16) for t[tk,tk+τ)t\in[t_{k},t_{k}+\tau), we get e(tk+τ)2e(tk)2=2σ(tk+τtk)Ω/(γ+dc2)\|e(t_{k}+\tau)\|^{2}-\|e(t_{k})\|^{2}=2\sigma(t_{k}+\tau-t_{k})\sqrt{{\varOmega}/(\gamma+dc_{2})}. Since e(tk)=0,k+\|e(t_{k})\|=0,\forall k\in\mathbb{Z}_{+} and substituting e(tk+τ)\|e(t_{k}+\tau)\| from (15), we get τ=(1/2σ)Ω/(γ+dc2)\tau=({1}/{2\sigma})\sqrt{{\varOmega}/(\gamma+dc_{2})}. ∎

IV Attack Detection, Mitigation and Closed-Loop System Stability

IV-A Passivity-Based Attack Detection

The proposed passivity-based attack detector relies on the verification of passivity inequality (2) for the measurable signals in Fig. 1. Note that the agents’ output yy, controllers’ output uu, and observers’ state x^\hat{x} and the output y^=Cx^\hat{y}=C\hat{x} are measurable. Note that the original input signal uu is measurable and the corrupted input ucu^{c}, applied to the agent, is not measurable. However, the output yy is available only at events of cryptographic authentication. This suggests verification of (2) for the input-output pair (u,y^)(u,\hat{y}) across the observer (i.e., points E and F in Fig. 1) with the quadratic storage function S(x^)=(1/2)x^Tx^S(\hat{x})=(1/2)\hat{x}^{T}\hat{x} associated with the observer’s states x^\hat{x}. It is straightforward that (2) holds for appropriately designed observer, across points E and F if there is no attack on the system [22], while this might not be true in case of an actuator attack. We leverage this fact in detecting the presence of an attack uau^{a}. We classify the attack signal as detectable and undetectable as follows:

Definition 2.

An attack uau^{a} which does not satisfy (resp., satisfy) passivity inequality (2) with respect to the points E and F in Fig. 1 with quadratic storage function S(x^)=(1/2)x^Tx^S(\hat{x})=(1/2)\hat{x}^{T}\hat{x} is detectable (resp., undetectable).

Note that it is sufficient to check (2) for the detection of an attack on the system. However, we also provide the following theorem to establish a connection between the system and network properties (in terms of the matrices A,B,C,HA,B,C,H, and \mathcal{L}) under the attack signal uau_{a} on the system, however, it is not necessary for the purpose of implementation - verifying only (2) is sufficient.

Theorem 3.

Let (K(BCTT)+H)CA\mathcal{M}\coloneqq(K(B\mathcal{L}-C^{T}\mathcal{L}^{T})+H)C-A be a matrix of order Nm×NmNm\times Nm. If there exists an attack signal uau^{a} such that

x^Tx^<x^THC0tk(Ax+Bu^n+Bua)𝑑τ,\hat{x}^{T}\mathcal{M}\hat{x}<\hat{x}^{T}HC\int_{0}^{t_{k}}(Ax+B\hat{u}^{n}+Bu^{a})d\tau, (17)

where tkt_{k} is the latest event time, then the passivity inequality (2) is not satisfied across points E and F. Consequently, an attack uau^{a} is detected in accordance with Definition 2.

Proof.

We prove it by contradiction. Assume that (2) is satisfied across points E and F with S(x^)=(1/2)x^Tx^S(\hat{x})=(1/2)\hat{x}^{T}\hat{x}. This implies that uTy^S˙=x^Tx^˙u^{T}\hat{y}\geq\dot{S}=\hat{x}^{T}\dot{\hat{x}}. Since the system is operating in normal mode, we have u=u^nu=\hat{u}^{n} as δ=0\delta=0 in (10). Substituting x^˙\dot{\hat{x}} and u^n\hat{u}^{n} from (6) and (12) results in Kx^TCTTCx^x^T(Ax^+Bu^n+H(yy^+e))Kx^TCTTCx^x^T(Ax^BKCx^+HC(xx^+x¯x))-K\hat{x}^{T}C^{T}\mathcal{L}^{T}C\hat{x}\geq\hat{x}^{T}(A\hat{x}+B\hat{u}^{n}+H(y-\hat{y}+e))\implies-K\hat{x}^{T}C^{T}\mathcal{L}^{T}C\hat{x}\geq\hat{x}^{T}(A\hat{x}-BK\mathcal{L}C\hat{x}+HC(x-\hat{x}+\bar{x}-x)), where x¯=x(tk)\bar{x}=x(t_{k}). Rearranging, we get x^T((K(BCTT)+H)CA)x^x^THCx¯\hat{x}^{T}((K(B\mathcal{L}-C^{T}\mathcal{L}^{T})+H)C-A)\hat{x}\geq\hat{x}^{T}HC\bar{x}. Replacing (K(BCTT)+H)CA(K(B\mathcal{L}-C^{T}\mathcal{L}^{T})+H)C-A by \mathcal{M} as defined in the statement of theorem, the preceding inequality becomes x^Tx^x^THCx¯\hat{x}^{T}\mathcal{M}\hat{x}\geq\hat{x}^{T}HC\bar{x}. Now, substituting x¯=0tkx˙(τ)𝑑τ\bar{x}=\int_{0}^{t_{k}}\dot{x}(\tau)d\tau, where x˙(τ)\dot{x}(\tau) is given by (4), we get x^Tx^x^THC0tk(Ax+Bu^n+Bua)𝑑τ\hat{x}^{T}\mathcal{M}\hat{x}\geq\hat{x}^{T}HC\int_{0}^{t_{k}}(Ax+B\hat{u}^{n}+Bu^{a})d\tau. Now, it can be concluded that any uau^{a} which violates the preceding inequality (i.e., satisfies (17)) does not satisfy (2) across points E and F in Fig. 1, and hence, are detectable. ∎

IV-B Attack Mitigation

Once the attack is detected, the controller (10) switches to the defense mode, i.e., δ=1\delta=1 and u=udu=u^{d}. Relying on the estimated attack signal u^a\hat{u}^{a} in (7), we propose the control in defense mode as

ud=u^nu^a,u^{d}=\hat{u}^{n}-\hat{u}^{a}, (18)

where u^n\hat{u}^{n} is given by (12). As a result, the compromised control input to the actuators becomes

uc=ud+ua=u^nu^a+ua.u^{c}=u^{d}+u^{a}=\hat{u}^{n}-\hat{u}^{a}+u^{a}. (19)

We are now ready to prove Proposition 1.

Proof of Proposition 1.

Left multiplying (7) with BB on both sides, yields

Bu^a=BB(x^˙Ax^Bun+Bu^a(ttd)).B\hat{u}^{a}=BB^{\dagger}(\dot{\hat{x}}-A\hat{x}-Bu^{n}+B\hat{u}^{a}(t-t_{d})). (20)

From (9), substituting x^=xξ\hat{x}=x-\xi and x^˙=x˙ξ˙\dot{\hat{x}}=\dot{x}-\dot{\xi}, we obtain Bu^a=BB(x˙ξ˙A(xξ)Bu^n+Bu^a(ttd))B\hat{u}^{a}=BB^{\dagger}(\dot{x}-\dot{\xi}-A(x-\xi)-B\hat{u}^{n}+B\hat{u}^{a}(t-t_{d})). Substituting for x˙\dot{x} and ucu^{c} from (4) and (19), respectively, and using the property BBB=BBB^{\dagger}B=B (as stated in notations), we get Bu^a=BB(Ax+Bu^nBu^a+BuaAxBu^n+Bu^a(ttd)ξ˙+Aξ)B\hat{u}^{a}=BB^{\dagger}(Ax+B\hat{u}^{n}-B\hat{u}^{a}+Bu^{a}-Ax-B\hat{u}^{n}+B\hat{u}^{a}(t-t_{d})-\dot{\xi}+A\xi) =Bua+Bu^a(ttd)Bu^a+ν=Bu^{a}+B\hat{u}^{a}(t-t_{d})-B\hat{u}^{a}+\nu, where ν=BB(ξ˙+Aξ)\nu=BB^{\dagger}(-\dot{\xi}+A\xi). Rearranging, we have B(u^aua)=B(u^au^a(ttd))+νB(u^aua)B(u^au^a(ttd))+νB(\hat{u}^{a}-u^{a})=-B(\hat{u}^{a}-\hat{u}^{a}(t-t_{d}))+\nu\implies\|B(\hat{u}^{a}-u^{a})\|\leq\|B(\hat{u}^{a}-\hat{u}^{a}(t-t_{d}))\|+\|\nu\|. Using (8), we get B(u^aua)ψtdB+ν\|B(\hat{u}^{a}-u^{a})\|\leq\psi t_{d}\|B\|+\|\nu\|. According to Assumption 2 and Theorem 1, ξ0\xi\to 0 as ttat\to t_{a}, this implies that ν0\|\nu\|\to 0 as ttat\to t_{a}. Now, it follows that there exists a constant Φ=ψtdB>0\varPhi=\psi t_{d}\|B\|>0 such that B(u^aua)Φ,tta\|B(\hat{u}^{a}-u^{a})\|\leq\varPhi,\ \forall t\geq t_{a}, proving our claim. ∎

Remark 2.

Multiplying by B\|B^{\dagger}\| on both sides of the inequality B(u^aua)Φ\|B(\hat{u}^{a}-u^{a})\|\leq\varPhi, we have BB(u^aua)ΦBBB(u^aua)BB(u^aua)ΦB\|B^{\dagger}\|\|B(\hat{u}^{a}-u^{a})\|\leq\varPhi\|B^{\dagger}\|\implies\|B^{\dagger}B(\hat{u}^{a}-u^{a})\|\leq\|B^{\dagger}\|\|B(\hat{u}^{a}-u^{a})\|\leq\varPhi\|B^{\dagger}\|. Since BB=IB^{\dagger}B=I for the full column rank matrix BB (see (A2)) and Φ=ψtdB\varPhi=\psi t_{d}\|B\|, it follows from the preceding relation that u^auaψtd,tta\|\hat{u}^{a}-u^{a}\|\leq\psi t_{d},\ \forall t\geq t_{a}. Clearly, u^aua0,tta\|\hat{u}^{a}-u^{a}\|\approx 0,\forall t\geq t_{a} for sufficiently small reaction time tdt_{d}.

Note that there seems to be an inter-dependency among Proposition 1 and Theorem 1. However, under Assumption 2, Theorem 1 holds independently for t<tat<t_{a}, as the attack estimator is “OFF” (i.e., u^a=𝟎Np\hat{u}^{a}=\boldsymbol{0}_{Np}) in the absence of an attack (i.e., ua=𝟎Npu^{a}=\boldsymbol{0}_{Np}), and can be considered as initialization to our problem. On the other hand, in the presence of an attack (i.e., ua𝟎Npu^{a}\neq\boldsymbol{0}_{Np}), we make sure with the aid of Assumption 1 that when an attack starts at t=tat=t_{a}, the state observer has a small error for accurate detection and estimation of the attack signal (similar assumption is also made in [1]).

IV-C Closed-Loop System Stability

In the below theorem, we show that the difference among agents’ outputs remain bounded during attack and the closed-loop system achieves practical consensus.

Theorem 4.

Consider the closed-loop system as shown in Fig. 1 with agent, observer and attack estimator models (4), (6) and (7), respectively. Let the system be governed by the switching controller (10) where unu^{n} and udu^{d} are defined in (12) and (18), respectively. Then, the system achieves (practical) output consensus, i.e., there exists a small constant ϵo>0\epsilon_{o}>0 such that limtyiyjϵo,(i,j)𝔼\lim_{t\to\infty}\|y_{i}-y_{j}\|\leq\epsilon_{o},\forall(i,j)\in\mathbb{E}. Additionally, if the communication topology is balanced, then ϵo\epsilon_{o} is given by ϵo=ω¯/K\epsilon_{o}=\sqrt{\bar{\omega}/K}, where ω¯\bar{\omega} depends on ξ\|\xi\| and u^aua\|\hat{u}^{a}-u^{a}\|.

Proof.

Under no attack condition, the convergence directly follows from [4], as u=u^nu=\hat{u}^{n} (see (12)). Our main goal here is to prove convergence in case when the controller operates in the defense mode under attack, i.e., u=udu=u^{d}, given by (18). Since the agents (4) are passive, Lemma 1 assures existence of a candidate Lyapunov function Vs(x)V_{s}(x) such that its time-derivative along agent dynamics (4) satisfies V˙s=(Vs/x)T(Ax+Buc)=W(x)+yTuc=W(x)+yTu^nyT(u^aua)\dot{V}_{s}=({\partial V_{s}}/{\partial x})^{T}(Ax+Bu^{c})=-W(x)+y^{T}u^{c}=-W(x)+y^{T}\hat{u}^{n}-y^{T}(\hat{u}^{a}-u^{a}), where W(x)>0,x𝟎NnW(x)>0,\forall x\neq\boldsymbol{0}_{Nn}. Substituting for u^n\hat{u}^{n} from (12) and x^=xξ\hat{x}=x-\xi, we obtain

V˙s\displaystyle\dot{V}_{s} =WKyTy^yT(u^aua)\displaystyle=-W-Ky^{T}\mathcal{L}\hat{y}-y^{T}(\hat{u}^{a}-u^{a})
=WKyTCx^yT(u^aua)\displaystyle=-W-Ky^{T}\mathcal{L}C\hat{x}-y^{T}(\hat{u}^{a}-u^{a})
=WKyTC(xξ)yT(u^aua)\displaystyle=-W-Ky^{T}\mathcal{L}C(x-\xi)-y^{T}(\hat{u}^{a}-u^{a})
=WKyTy+KyTCξyT(u^aua)\displaystyle=-W-Ky^{T}\mathcal{L}y{+}Ky^{T}\mathcal{L}C\xi{-}y^{T}(\hat{u}^{a}{-}u^{a})
=WKyTy+ω,\displaystyle=-W-Ky^{T}\mathcal{L}y+\omega,

where ω=yT(KCξ(u^aua))\omega=y^{T}(K\mathcal{L}C\xi-(\hat{u}^{a}-u^{a})). If ω0\omega\equiv 0, the trajectories converges to the set Γ={xNm|V˙s0}\Gamma=\{x\in\mathbb{R}^{Nm}\ |\ \dot{V}_{s}\equiv 0\}. The set Γ\Gamma is characterized by all the trajectories such that {W(x)0,yμ𝟏Np,μ}\{W(x)\equiv 0,y\equiv\mu\boldsymbol{1}_{Np},\mu\in\mathbb{R}\}. If ω0\omega\neq 0, it can be written that V˙sWKyTy+|ω|\dot{V}_{s}\leq-W-Ky^{T}\mathcal{L}y+|\omega|. Following Proposition 1 and Remark 2, it can be concluded that |ω|ω¯|\omega|\leq\bar{\omega} for some ω¯\bar{\omega}, which is a small positive constant for small values of ξ\|\xi\| and u^aua\|\hat{u}^{a}{-}u^{a}\|. Consequently, V˙sW(x)KyTy+ω¯\dot{V}_{s}\leq-W(x)-Ky^{T}\mathcal{L}y+\bar{\omega}, and the convergence follows in the sense of practical stability.

To prove the second statement, we analyze the time-derivative V˙s\dot{V}_{s}. Clearly, V˙s0\dot{V}_{s}\leq 0, if ω¯W(x)+KyTy\bar{\omega}\leq W(x)+Ky^{T}\mathcal{L}y. Since the preceding inequality must hold even in the worst-case scenario where W(x)0W(x)\equiv 0, the condition KyTyω¯Ky^{T}\mathcal{L}y\geq\bar{\omega} must be satisfied. In this situation, as V˙s0\dot{V}_{s}\leq 0 outside the region where KyTyω¯Ky^{T}\mathcal{L}y\geq\bar{\omega}, it follows from [14, Lemmea 4.6] that all the solution trajectories fall within the region where KyTyω¯Ky^{T}\mathcal{L}y\leq\bar{\omega}, as tt\to\infty. For balanced and strongly connected digraphs (i.e., L=LTL=L^{T}), the preceding inequality can be written as (i,j)𝔼yiyj2ω¯/Kyiyjω¯/K\sum_{(i,j)\in\mathbb{E}}\|y_{i}-y_{j}\|^{2}\leq\bar{\omega}/{K}\implies\|y_{i}-y_{j}\|\leq\sqrt{\bar{\omega}/{K}} for each (i,j)𝔼(i,j)\in\mathbb{E}. As ω¯\bar{\omega} relies on ξ\|\xi\| and u^aua\|\hat{u}^{a}{-}u^{a}\|, small values of ξ\|\xi\| and the reaction time tdt_{d} (see Remark 2) will lead to small value of ω¯\bar{\omega}, and hence, ϵo\epsilon_{o}. Alternatively, by increasing KK, ϵo\epsilon_{o} can be made small. ∎

Refer to caption
(a) Network Topology

s=[1001011000011000012100101]\mathcal{L}_{s}=\begin{bmatrix}1&0&0&-1&0\\ -1&1&0&0&0\\ 0&-1&1&0&0\\ 0&0&-1&2&-1\\ 0&0&-1&0&1\end{bmatrix}

(b) Laplacian
Figure 2: Communication Topology.

V Simulation Example

Consider N=5N=5 agents interacting according to a communication graph as shown in Fig. 2. Agent’s initial states are taken randomly in the interval [20,25][-20,25]. The FDI attack on actuator is of the form uia=aisinωitu^{a}_{i}=a_{i}\sin{\omega_{i}t}, where ai,ωia_{i},\omega_{i} are chosen randomly in the interval [10,20][10,20] and [0,10π][0,10\pi], respectively, for i=1,2,4,5i=1,2,4,5, and a3=0a_{3}=0, i.e., no attack on agent 33. Note that the attack information is given only for the purpose of illustration and is unavailable to the controller. We consider that the attack remains active for t[2,5]st\in[2,5]s. We discuss three case studies as follows:

V-A Passive Agents with Real Poles

Consider heterogeneous agents with the following governing matrices in (4):

Ai=i[6i0.5ii90.4i0.5i0.4i9],Bi=i[000.5],Ci=1i[200]T,A_{i}=i\begin{bmatrix}-6&i&0.5i\\ i&-9&0.4i\\ 0.5i&0.4i&-9\end{bmatrix},~{}B_{i}=i\begin{bmatrix}0\\ 0\\ 0.5\end{bmatrix},~{}C_{i}=\frac{1}{i}\begin{bmatrix}2\\ 0\\ 0\end{bmatrix}^{T},

respectively, where i=1,,5i=1,\ldots,5. It can be easily verified that the agents are passive as the associated transfer function is positive real (please refer to positive real lemma [14, Lemma 6.4]). Further, the preconditions (A1) and (A2) are trivially satisfied.

Refer to caption
(a) Passivity for agent 4
Refer to caption
(b) u4au^{a}_{4}, u^4a\hat{u}^{a}_{4}
Figure 3: Passivity inequality and attack signals (Case A).
Refer to caption
(a) yi,iy_{i},\forall i
Refer to caption
(b) Events
Figure 4: Agents’ output and events for observer (Case A).
Refer to caption
(a) Passivity for agent 2
Refer to caption
(b) u2au^{a}_{2}, u^2a\hat{u}^{a}_{2}
Figure 5: Passivity inequality and attack signals (Case B).
Refer to caption
(a) yi,iy_{i},\forall i
Refer to caption
(b) Events for Observer
Figure 6: Oscillator’s output and events for observer (Case B).
Refer to caption
(a) Passivity for agent 2
Refer to caption
(b) u2au^{a}_{2}, u^2a\hat{u}^{a}_{2}
Figure 7: Passivity inequality and attack signals (Case C).
Refer to caption
(a) yi,iy_{i},\forall i
Refer to caption
(b) Events for Observer
Figure 8: Oscillator’s output and events for observer (Case C).

Fig. 3(a) depicts the plots for storage function S(x^)S(\hat{x}), change in the stored energy S˙(x^)\dot{S}(\hat{x}), and the supplied energy uTy^u^{T}\hat{y} for agent 4. It can be observed that the passivity is lost at t=2t=2s as soon as the attack begins. Consequently, the attack is detected and the controller switches to defense mode. Fig. 3(b) shows the attack estimation and the actual attack signals - it is clearly visible that their difference is finite. The plots for other agents are similar and omitted for brevity. Fig. 4(a) shows that the output (of all the agents) remains bounded even under attack, as established in Theorem 4. Finally, Fig. 4(b) depicts the events generated for the observer and shows the absence of Zeno behavior. Because of the fast-moving system states, there is a higher density of events initially and during the attack period, and a lower density when the states do not change.

V-B Passive Agents with Complex Poles

Consider the network of homogeneous harmonic oscillators [27], characterized by the following matrices in (4):

Ai=[0111],Bi=[01],Ci=[01],i,A_{i}=\begin{bmatrix}0&1\\ -1&1\end{bmatrix},\quad B_{i}=\begin{bmatrix}0\\ 1\end{bmatrix},\quad C_{i}=\begin{bmatrix}0&1\end{bmatrix},\ \forall i,

is a passive system according to the positive real lemma [14, Section 6.3] and satisfy the preconditions (A1) and (A2). Figs. 5 and 6 show the simulation results for this case where conclusions, similar to the previous case, can be drawn. It is observed that the presence of complex poles degrades the attack estimation performance of the system due to the presence of oscillations in the system output.

V-C Passive Agents with Imaginary Poles

We consider the network of homogeneous harmonic oscillators [27], having the following matrices:

Ai=[0110],Bi=[01],Ci=[01],i.A_{i}=\begin{bmatrix}0&1\\ -1&0\end{bmatrix},\quad B_{i}=\begin{bmatrix}0\\ 1\end{bmatrix},\quad C_{i}=\begin{bmatrix}0&1\end{bmatrix},\forall i.

Again, the agents are passive and satisfy the preconditions (A1) and (A2). Figs. 7 and 8 show the simulation results for this case. It can be noted that i) the presence of imaginary poles degrades the attack estimation performance of the system, and ii) the number of events is relatively higher, as compared to earlier cases, which is expected due to the oscillating nature of output [19].

VI Conclusions

The problem of output consensus for networked linear passive agents under FDI actuator attacks is examined in this paper. To reduce the computation and communication overhead, an event-triggered observer-based switching controller was proposed in conjunction with cryptographic authentication for estimating the non-measurable states. It was shown that the proposed event condition does not result in Zeno behavior and has a positive MIET. Relying on the measurements from the observer, a passivity-based attack detection approach was presented. It was shown that the error between the estimated and the actual attack signal is norm-bounded during the controller’s functioning in the defense mode. Finally, the system was shown to achieve practical output consensus.

Refer to caption
(a) yi,iy_{i},\forall i
Refer to caption
(b) u2au^{a}_{2}
Figure 9: Agent 2 under undetectable attack for t[0,10]t\in[0,10].

As discussed in Definition 2, only the attacks that violate the passivity condition (2) are detected and mitigated in this paper. Since undetectable attacks do not cause the system to lose passivity (Definition 2), they are not of concern as the system’s consensus properties are unaffected by such attacks. We have simulated a result in this direction as shown in Fig. 9 for the agents in Subsection V-A, which supports our claim. This happens because the total energy of passive agents approaches zero towards consensus for undetectable attacks, forcing the attack signal to eventually converge to zero to remain undetectable (see Fig. 9(b)). This shows that the undetectable attacks are decrescent with time and asymptotically converge to zero.

It would be interesting to also consider the attack on the global communication network and generalize the problem for more complex systems.

References

  • [1] Francesca Boem, Alexander J Gallo, Giancarlo Ferrari-Trecate, and Thomas Parisini. A distributed attack detection method for multi-agent systems governed by consensus-based control. In 2017 IEEE 56th Annual Conference on Decision and Control (CDC), pages 5961–5966. IEEE, 2017.
  • [2] Alessio Carullo, Marco Parvis, et al. An ultrasonic sensor for distance measurement in automotive applications. IEEE Sensors journal, 1(2):143, 2001.
  • [3] Chi-Tsong Chen. Linear System Theory and Design. Oxford University Press, 1999.
  • [4] Nikhil Chopra. Output synchronization on strongly connected graphs. IEEE Transactions on Automatic Control, 57(11):2896–2901, 2012.
  • [5] Emeka Eyisi and Xenofon Koutsoukos. Energy-based attack detection in networked control systems. In Proceedings of the 3rd international conference on High confidence networked systems, pages 115–124, 2014.
  • [6] Behrouz A. Forouzan. Cryptography and Network Security. McGraw-Hill Forouzan networking series. McGraw-Hill, 2008.
  • [7] Chris Godsil and Gordon F Royle. Algebraic graph theory, volume 207. Springer Science & Business Media, 2001.
  • [8] Haibin Guo, Jian Sun, and Zhong-Hua Pang. Stealthy false data injection attacks with resource constraints against multi-sensor estimation systems. ISA transactions, 2022.
  • [9] Shicheng Huo, Ya Zhang, Frank L Lewis, and Changyin Sun. Observer-based resilient consensus control for heterogeneous multi-agent systems against cyber-attacks. IEEE Transactions on Control of Network Systems, 2022.
  • [10] Ivar-André F Ihle, Murat Arcak, and Thor I Fossen. Passivity-based designs for synchronized path-following. Automatica, 43(9):1508–1518, 2007.
  • [11] Xu Jin, Wassim M Haddad, and Tansel Yucelen. An adaptive control architecture for mitigating sensor and actuator attacks in cyber-physical systems. IEEE Transactions on Automatic Control, 62(11):6058–6064, 2017.
  • [12] Youngjun Joo, Zhihua Qu, and Toru Namerikawa. Resilient control of cyber-physical system using nonlinear encoding signal against system integrity attacks. IEEE Transactions on Automatic Control, 66(9):4334–4341, 2020.
  • [13] K-Team. KHEPERA IV NEW - K-Team Corporation. Accessed on 2023-01-19.
  • [14] H.K. Khalil. Nonlinear Systems. Pearson Education. Prentice Hall, 2002.
  • [15] Amir Khazraei and Miroslav Pajic. Attack-resilient state estimation with intermittent data authentication. Automatica, 138:110035, 2022.
  • [16] Zhongkui Li, Xiangdong Liu, Peng Lin, and Wei Ren. Consensus of linear multi-agent systems with reduced-order observer-based protocols. Systems & Control Letters, 60(7):510–516, 2011.
  • [17] Kevin M Lynch and Frank C Park. Modern robotics. Cambridge University Press, 2017.
  • [18] Min Meng, Gaoxi Xiao, and Beibei Li. Adaptive consensus for heterogeneous multi-agent systems under sensor and actuator attacks. Automatica, 122:109242, 2020.
  • [19] Cameron Nowzari, Eloy Garcia, and Jorge Cortés. Event-triggered communication and control of networked systems for multi-agent consensus. Automatica, 105:1–27, 2019.
  • [20] Chen Peng and Hongtao Sun. Switching-like event-triggered control for networked control systems under malicious denial of service attacks. IEEE Transactions on Automatic Control, 65(9):3943–3949, 2020.
  • [21] Elena Petri, Romain Postoyan, Daniele Astolfi, D Nešić, and WP Maurice H Heemels. Event-triggered observer design for linear systems. In 2021 60th IEEE Conference on Decision and Control (CDC), pages 546–551. IEEE, 2021.
  • [22] Li Qin, Zhang Qingling, Zhang Yanjuan, and An Yichun. Observer-based passive control for descriptor systems with time-delay. Journal of Systems Engineering and Electronics, 20(1):120–128, 2009.
  • [23] C.R. Rao, Sujit Kumar Mitra, and J.K. Mitra. Generalized Inverse of Matrices and Its Applications. Probability and Statistics Series. Wiley, 1971.
  • [24] Dawei Shi, Tongwen Chen, and Ling Shi. Event-triggered maximum likelihood state estimation. Automatica, 50(1):247–254, 2014.
  • [25] Sen Tan, Josep M Guerrero, Peilin Xie, Renke Han, and Juan C Vasquez. Brief survey on attack detection methods for cyber-physical systems. IEEE Systems Journal, 14(4):5329–5339, 2020.
  • [26] Harry L Trentelman and Jan C Willems. Storage functions for dissipative linear systems are quadratic state functions. In Proceedings of the 36th IEEE Conference on Decision and Control, volume 1, pages 42–47. IEEE, 1997.
  • [27] Tian Xia and Luca Scardovi. Synchronization of linear time-invariant systems on rooted graphs. In 2016 IEEE 55th Conference on Decision and Control (CDC), pages 4376–4381. IEEE, 2016.
  • [28] Yang Yan, Panos Antsaklis, and Vijay Gupta. A resilient design for cyber physical systems under attack. In 2017 American Control Conference (ACC), pages 4418–4423. IEEE, 2017.