2.624

2020影响因子

(CJCR)

• 中文核心
• EI
• 中国科技核心
• Scopus
• CSCD
• 英国科学文摘

## 留言板

 引用本文: 应晨铎, 伍益明, 徐明, 郑宁, 何熊熊. 欺骗攻击下具备隐私保护的多智能体系统均值趋同控制. 自动化学报, 2022, 48(x): 1−12
Ying Chen-Duo, Wu Yi-Ming, Xu Ming, Zheng Ning, He Xiong-Xiong. Privacy-preserving average consensus control for multi-agent systems under deception attacks. Acta Automatica Sinica, 2022, 48(x): 1−12 doi: 10.16383/j.aas.c210889
 Citation: Ying Chen-Duo, Wu Yi-Ming, Xu Ming, Zheng Ning, He Xiong-Xiong. Privacy-preserving average consensus control for multi-agent systems under deception attacks. Acta Automatica Sinica, 2022, 48(x): 1−12

## Privacy-preserving Average Consensus Control for Multi-agent Systems Under Deception Attacks

Funds: Supported by National Natural Science Foundation of China (61803135, 61873239, 62073109), Zhejiang Provincial Public Welfare Research Project of China (LGF21F020011)
###### Author Bio: YING Chen-Duo　Master student at the School of Cyberspace, Hangzhou Dianzi University. He received his bachelor degree in software engineering from NingboTech University in 2020. His research interest covers resilient consensus, privacy preservation, and distributed system security WU Yi-Ming　Associate professor at the School of Cyberspace, Hangzhou Dianzi University. He received his Ph.D. degree in control science and engineering from Zhejiang University of Technology in 2016. His research interest covers distributed system secure control, cyber-security for multi-agent systems, and iterative learning control. Corresponding author of this paper XU Ming　Professor at the School of Cyberspace, Hangzhou Dianzi University. He received his Ph.D. degree from Zhejiang University in 2004. His research interest covers network security and digital forensics ZHENG Ning　Professor at the School of Cyberspace, Hangzhou Dianzi University. He received his master degree from Zhejiang University in 1990. His research interest covers information security, information management system, and multi-agent systems HE Xiong-Xiong Professor at the College of Information Engineering, Zhejiang University of Technology. He received his Ph.D. degree from Zhejiang University in 1997. His research interest covers iterative learning control, intelligent control, and applications in multi-agent systems and sensor networks
• 摘要: 针对通信网络遭受欺骗攻击的离散时间多智能体系统, 研究其均值趋同和隐私保护问题. 首先, 考虑链路信道存在窃听者的情形, 提出一种基于状态分解思想的分布式网络节点值重构方法, 以阻止系统初始信息的泄露. 其次, 针对所构建的欺骗攻击模型, 利用重构后节点状态信息并结合现有的安全接受广播算法, 提出一种适用于无向通信网络的多智能体系统均值趋同控制方法. 理论分析表明, 所提方法能够有效保护节点初始状态信息的隐私, 并能消除链路中欺骗攻击的影响, 实现分布式系统中所有节点以初始值均值趋同. 最后, 通过数值仿真实验验证了该方法的有效性.
• 图  1  状态分解方法示例图

Fig.  1  Example diagram of state decomposition method

图  2  欺骗攻击下多智能体系统分布式网络示意图

Fig.  2  The diagram of the multi-agent system distributed network under deception attacks

图  3  6个节点组成的多智能体系统通信拓扑图

Fig.  3  Network topology of multi-agent system with 6 nodes

图  4  系统不满足强(2f+1)-链路鲁棒图下各节点的状态量测值变化轨迹

Fig.  4  State trajectory of each node with system that does not meet the strong (2f+1)-links robustness

图  5  系统外部通信链路遭受欺骗攻击下各节点的状态量测值变化轨迹

Fig.  5  State trajectory of each node under deception attack on the external communication link of the system

图  6  节点$v_4$内部遭受欺骗攻击的通信拓扑及攻击示意图

Fig.  6  Communication topology and attack diagram of the deception attack inside node $v_4$

图  7  系统内部通信链路遭受欺骗攻击下使用状态分解算法各节点的状态量测值变化轨迹

Fig.  7  State trajectory of each node under deception attack on the internal communication link of the system by using the state decomposition algorithm

图  8  系统内部通信链路遭受欺骗攻击下使用本文算法各节点的状态量测值变化轨迹

Fig.  8  State trajectory of each node under deception attack on the internal communication link of the system by using the proposed algorithm

##### 计量
• 文章访问数:  219
• HTML全文浏览量:  40
• 被引次数: 0
##### 出版历程
• 收稿日期:  2021-09-16
• 录用日期:  2022-04-28
• 网络出版日期:  2022-05-19

/

• 分享
• 用微信扫码二维码

分享至好友和朋友圈