Next Article in Journal
Zeolite H-Beta as a Dispersive Solid-Phase Extraction Sorbent for the Determination of Eight Neonicotinoid Insecticides Using Ultra-High-Performance Liquid Chromatography—Tandem Mass Spectrometry
Previous Article in Journal
Session-Enhanced Graph Neural Network Recommendation Model (SE-GNNRM)
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Denial of Service Attack of QoS-Based Control of Multi-Agent Systems

by
Siddig M. Elkhider
1,*,
Sami El-Ferik
1,2 and
Abdul-Wahid A. Saif
1,2
1
Interdisciplinary Center of Smart Mobility and Logistics, King Fahd University of Petroleum and Minerals, P.O. Box 5067, Dhahran 31261, Saudi Arabia
2
Control and Instrumentation Engineering Department, King Fahd University of Petroleum and Minerals, P.O. Box 5067, Dhahran 31261, Saudi Arabia
*
Author to whom correspondence should be addressed.
Appl. Sci. 2022, 12(9), 4315; https://doi.org/10.3390/app12094315
Submission received: 13 March 2022 / Revised: 16 April 2022 / Accepted: 18 April 2022 / Published: 24 April 2022

Abstract

:
This paper presents a secure formation control design of multi-agent systems under denial of service (DoS) attacks. Multiple unmanned aerial vehicle systems (UAVs) are considered in this paper. The proposed technique takes into account communication time delay, as well as formation and cyberattack, and provides a robust guidance method as well as a reliable middleware for information transfer and sharing. To ensure optimal guidance and coordination, a combined approach of L1 adaptive control and graph theory is used. The packet transmission between all UAVs is handled by the data distribution services (DDS) middleware, which overcomes the interoperability problem when dealing with multiple UAVs of different platforms and can be considered as an extra security level based on its quality of service (QoS). The graph theory is utilized to coordinate multiple UAVs in a hexagon formation, while the L1 controller is utilized as a local controller to stabilize the UAV’s dynamic model. A robust control security level is built to handle the effect of cyberattacks based on linear matrix inequalities (LMIs) control. Simulations are used to verify and show the performances of the proposed technique under the conditions indicated earlier.

1. Introduction

In recent years, multi-agent systems (MASs) have been used in wide areas [1]. Distributed systems containing two or more autonomous agents are known as MASs [2], which are the important applications of distributed systems found in real-time systems; one of these systems is multi-UAV systems which can work together to solve complex problems with high efficiency, reliability, and robustness. Formation control of multi-UAV systems is one of the most interesting study issues in the MASs field, and it has a broad range of uses. Agents must communicate to maintain the shape of the formation by exchanging (e.g., velocity, displacement, and/or direction information). The formation control can be classified into different categories: leader-following [3,4,5], virtual-based [6,7], and behavior-based [8,9,10]. These days, formation control of multiple UAV systems can be built for military use, personal use, recreation, etc. As technology develops faster than ever before, cyber security has never been more crucial. Multi-UAVs can take care of their cyber security to keep their formation. Most of the previous research considers that attackers insert misleading data (misleading data injection attacks) or attempt to make the system unstable by intercepting transmission (DoS attacks). Then, resilient control or fault-tolerant control can be used to defeat the attacks. The attacks aim to influence robot velocities and displacements in order to produce a physical influence on the formation control of the robot. Robots may vary from desired locations because of displacement attacks. The objectives of velocity attacks are to increase energy consumption and reduce work performance by lowering robot velocity. Secure coordinate control of multiple linear agent systems with linked and unconnected topologies due to connectivity broken/maintained attacks was achieved by Feng et al. [11]. Consequently, an arbitrary Markov model is used to describe a secure coordinate control of multiple linear agent systems under strategic attacks in [12]; however, the secure coordinate control has been designed based on hybrid stochastic control. A secure multi-agent systems synchronization for the case of sensor/controller communication under misleading data injection attacks was addressed in [13]. Accordingly, Ref. [14] investigated a secure consensus control of multi-agent systems for the case of sensor/controller communication under misleading data injection attacks that can result in random packet losses. In addition, Ref. [15] studied the secure consensus control of multi-agent systems based on event-triggered conditions for two cases of controller/actuators and sensor/controller communications under misleading data injection attacks. A secure distributed control of multi-agent systems based on event-triggered control to withstand a certain amount of packet loss caused by denial of service (DoS) attacks was studied in [16]. Yang et al. [17] achieved a secure formation control of multiple nonlinear systems based on hybrid event-triggered control under denial of service (DoS) attacks. Secure model-based formation control of multiple ground vehicles under denial of service (DoS) attacks was proposed in [18]. Secure adaptive formation control of a multi-agent system under actuator attack was developed in [19]. A secure event-triggered control of T-S fuzzy-model-based nonlinear networked systems and T-S fuzzy-model-based five-DOF active semi-vehicle subject to denial of service (DoS) attacks was proposed in [20,21]. An event-triggered control of stochastic nonlinear systems with unpredictable backlash-like hysteresis and unmeasured states based on adaptive fuzzy was proposed in [22]. The data-driven fuzzy control of tower crane systems was developed in [23]. An adaptive state observer was designed to minimize the impact of cyberattacks on communication. Moreover, the Nussbaum function and back-stepping controller were utilized to stabilize the agent’s dynamic model. Formation control of multiple UAVs based on DDS middleware was introduced in [24,25,26]. DDS middleware was developed to solve data loss issues between multiple UAVs as well as the interoperability issues that occur with different UAV platforms. As a result, using the DDS middleware approach improved portability, flexibility, and reliability significantly. Researchers are becoming more interested in the secure consensus of multi-agent systems, as evidenced by the preceding literature review. However, most of the multi-agent systems’ secure consensus literature available has focused solely on attack resilient control or detecting attacks. There is a scarcity of studies on the secure formation of multi-agent systems. The following are the major contributions of this study:
  • A robust navigation framework for multiple UAVs’ secure formation control has been designed.
  • A robust control security level is built to handle the effect of cyberattacks.
  • Reliable QoS middleware for extra cyber security and sharing information has been built.
The rest of the paper is arranged as follows. The preliminaries of DDS middleware, graph theory techniques, DoS attacks, and quadrotor dynamics are addressed in Section 2. The secure formation control of multiple UAVs utilizing linear matrix inequalities (LMIs) and L1 approach are discussed in Section 3. Section 4 presents and discusses the simulation results. Finally, the conclusions, as well as the final recommendations, have been noted.

2. Preliminaries

This section contains some preliminary quadrotor dynamics, DoS attacks, graph theory techniques, and DDS middleware.

2.1. Quadrotor’s Dynamics

The translational equation model of a quadrotor built on the Euler–Lagrangian equations is provided by [26,27]:
Υ ¨ = g 0 0 1 + c θ c ψ s ψ c ϕ + c ψ s ϕ s θ s ϕ s ψ + c ϕ c ψ s θ c θ s ψ c ϕ c ψ + s ψ s ϕ s θ s ϕ c ψ + c ϕ s ψ s θ s θ s ϕ c θ c θ c ϕ 0 0 i = 1 4 Ω i 2 k i m k t m Υ ˙
where the (x,y,z) position is represented by Υ , ( θ , ϕ , ψ ) motion denotes the pitch(), roll(), and yaw(), respectively, g and m represent the gravity and mass, respectively, the drag coefficient is represented by k t , the angular speeds of the motors are represented by Ω i , k i denotes positive constants, and c ( . ) = cos , s ( . ) = sin , t ( . ) = tan with the assumption of θ 90 and ϕ 90 .
The rotational equation for a quadrotor is given below:
ν ˙ 2 = d i a g ( I x , I y , I z ) 1 ( ( ν 2 × I ν 2 ) I R ( ν 2 × [ 0 , 0 , 1 ] T ) ( Ω 1 Ω 2 + Ω 3 Ω 4 ) k r ν 2 + τ )
where the angular velocity is represented by ν 2 , the inertia of a quadrotor is represented as ( I x , I y , I z ) , the inertia of a propeller is indicated by the symbol I R , the cross product is indicated by ×, the rotational drag is represented by k r , and τ = [ τ p , τ q , τ r ] represents the torques on the body frame. Rotational and translational motions of the quadrotor are as follows:
τ p τ q τ r u = 0 l 0 l l 0 l 0 d d d d 1 1 1 1 f 1 f 2 f 3 f 4
where u represents the force on the body frame, ( f 1 , f 2 , f 3 , f 4 ) represents the upward-lifting forces, and the distance from the center to the motors is denoted by l, while the drag factor is given by d. The system utilized in the above formula is an underactuated system model since the degrees of freedom number is greater than the actuation. The following is the underactuated model that is presented in this study:
η ¨ = G ( η , η ˙ ) + Q ( η ) u
where η represents the coordinates vector, G denotes the dynamic vector, and u and Q represent the control inputs and the input matrix. More details can be found in [26,27].

2.2. Denial of Service (DoS) Attacks

Denial of service (DoS) attacks are a type of cyberattack that attempts to make a machine or network resource unavailable to its intended users. While DoS attacks have been around since the 1970s, they have grown in prevalence and severity in recent years. In 2013, internet security experts estimated that 15 % of all websites were suffering from a DoS attack on any given day. The FBI reported that there were more than 3 million active denial of service attacks per month in 2016. The most common DoS attack vector targets web servers by flooding them with unwanted requests, making them unable to deliver the intended content. Such attacks are typically difficult to detect and prevent since they can be orchestrated remotely by an attacker over the Internet. The attacker often has no need to identify the server he or she is attacking; all that is needed is a high level of bandwidth or computing power, which may be acquired over the Internet anonymously. The impacts and effectiveness of DoS attacks vary. Some DoS attacks can be merely inconvenient, while others can prevent affected systems from performing useful work for hours or even days. Advanced persistent DoS (APDoS) attacks can be intended to permanently destroy data or computer resources. The DoS attack can affect multi-agent systems by producing some packet dropout during their communication. In this article, the packet dropout produced by DoS attacks and the communication’s time-varying delays are considered for the formation control of multiple UAVs systems. The packet drops produced by DoS attacks are modeled by parameter m i ( k ) , This parameter specifies whether a packet is lost or not.
m i ( k ) = 0 if p i ( k ) a n d v i ( k ) a r e r e c e i v e d 1 if p i ( k ) a n d v i ( k ) a r e l o s t
where p i ( k ) and v i ( k ) indicate the sampled position and the sampled velocity of agent i, respectively. We assume the time-varying delays are bounded by τ d m a x and τ d m i n with bounded sampling by h m a x and h m i n and the number of subsequent packet dropouts are bounded by δ ¯ , which means
v = k δ ¯ k m i ( v ) δ ¯
Then, the admissible sequences can be described as follows:
i = ( s i ( k ) , τ d i ( k ) , m i ( k ) ) k N | h m i n s i ( k + 1 ) s i ( k ) h m a x , s i ( 0 ) = 0 , τ d m i n τ d i ( k ) τ d m a x , v = k δ ¯ k m i ( v ) δ ¯
where s i ( k ) represents the sampling instants:
s i ( k ) = k = 0 m h i ( k ) m 1 s 0 = 0
which are having the same distance in time made by h i ( k ) > 0 , and this is denoted to sampling intervals.

2.3. Algebraic Graph Theory

A multi-agent system’s communication network can be modeled using a directed graph. A directed graph is a non-empty finite set with N nodes, arcs, or edges, and the A d i r = [ a i j ] R N × N correlated adjacency matrix. The nodes of the communication-directed graph in a quadrotor are agents. The communication linkages are denoted by the edges of the communication network’s matching directed graph. The ( x j , x i ) represents an edge between j node and i nodes, indicating that j node sends the data to i node, and the weight of the edge ( x j , x i ) is denoted by a i j . Node i is regarded as a neighbor of node j. N j refers to the neighbor set of j node. If j node and i node are neighbors in a directed graph, then the j node and i node can obtain information from each other. The in-degree matrix is configured to D d i r = d i a g ( d i R N × N ) . The Laplacian matrix is defined as L g = D d i r A d i r . An edge series is a straight link from the i node to the j node. The spanning tree of a directed graph happens when a root node has a direct path connecting to every other node in the graph.

2.4. Data Distribution Service Middleware

A data distributed service is commonly regarded as the ideal middleware for unmanned aerial formation control due to its ability to handle data as a result of real-time mission-critical and publication–subscription systems. It also has a pliable established policy setting for quality of service (QoS) that may be used for a variety of applications. DDS middleware is deemed in our investigation for UAV formation control because it gives almost all performance measures. The DDS middleware is built on the concept of a subscription-publishing, by postulating some of these UAVs acting as publishers and others as subscribers collaborating with each other. A publish–subscribe structure encourages flexible and dynamic loose coupling between the data architecture. DDS-based systems can easily be adapted and applied to different conditions and criteria. In addition, a publish–subscribe structure is where multiple subscribers and publishers share highly typed information across a common topic. A reliable quality of service model manages the communication. These QoS regulations might be used separately or as a set, in order to influence different aspects of communications, such as reliability, durability, and data persistence. These QoS regulations sets are a feature of the DDS not available in all other middleware approaches for communication. They guarantee high reliability, performance, and low-latency integration of DDS data transmission. On the other hand, The DDS middleware has some drawbacks, such as that QoS policies are only enforced in a tight DDS framework. In addition, DDS requires double bandwidth compared to MQTT middleware. Furthermore, Web applications are not supported by DDS. To solve this, the OMG designed a web-enabled DDS standard. A web application can be constructed utilizing this interface that interacts directly with the DDS system via a gateway. The following are a customizable set of quality of service settings criteria that must be completed prior to the interaction between both the UAV subscriber and the UAV publisher:
  • Durability: Indicates whether or not the publisher formerly transferred information to a new subscriber.
  • Reliability: Can decide whether the DDS should retransmit information that has been lost over the middleware. Reliability can be configured in two ways: RELIABLE (retransmit missing information) or BEST EFFORT (do not retransmit missing information). With this QoS, the DDS middleware can prevent the formation system from losing the information caused by the DoS attacks.
  • History: Indicates whether or not data receipted or transmitted by a publisher would be kept for a subscriber. History can be configured in two ways: KEEP ALL and KEEP LAST. The first option does not store an infinite amount of data.
  • Deadline: Sets the maximum period for specimens to arrive for subscribers.
  • Ownership: Can decide whether or not a subscriber would receive new samples that were collected from different publishers at the same time. There are two types of ownership: EXCLUSIVE and SHARED.
  • Presentation: Manages how the middleware presents the information received by the subscriber.
  • Time-based Filter: Confirms the minimum time duration between the current information and the future information received by the subscriber.
  • Latency budget: Indicates the time allowed by the middleware to deliver the information.
  • Lifespan: Determines for how long the middleware will accept the validity of the information sent by the publisher.
  • Resource Limits: Sets the memory space that a publisher or subscriber could assign for storing information in cache memory.

3. Multiple UAVs Control Design

3.1. L1 Adaptive Control

The fundamental advantage of using the L1 adaptive controller is its capability of adjusting quickly and robustly, as well as the decoupling of robustness and adaptability. It also provides a guaranteed time-delay margin and eliminates hardware performance constraints. The proper design of the bandwidth-limited filter is a challenging issue when using the L1 adaptive controller [28]. The state-space form required for applying an L1 controller on the dynamics’ rotational in Equation (2) is described as follows:
x ˙ = A m x + b ( f ( t , x ( t ) ) + ω u a d ) , x ( 0 ) = x 0 y = c x ( t )
where
x ν 2 , a known Hurwitz matrix A m R n × n ω I M 1 , b = 1 , u a d L 1 Adaptive control τ I M 1 ( ( ν 2 × I M ν 2 ) I R ( ν 2 × z e ) Ω k r ν 2 ) f ( t , x ( t ) ) c = I 3 × 3
Equation (9) can be rewritten as follows:
x ˙ = A m x + b ( θ x + σ + ω u a d ) , x ( 0 ) = x 0 y = c x ( t )
Equation (11) has a predictor state of
x ^ ˙ = A m x ^ + b ( θ ^ x + σ ^ + ω ^ u a d ) , x ^ ( 0 ) = x 0 y ^ = c x ^
where x ^ R n represents the estimated state, y ^ R n represents the estimated output, and θ ^ and σ ^ represent the estimated parameters. θ ˜ = θ ^ θ , x ˜ = x ^ x , and σ ˜ = σ ^ σ are the error definitions. The following is the dynamic error:
x ˜ ˙ = A m x ˜ + b ( θ ˜ x + σ ˜ ) , x ˜ ( 0 ) = 0
The adaption law is derived as follows:
σ ^ ˙ = σ ˜ ˙ = Γ Proj ( σ ˜ , b P x ˜ ) θ ^ ˙ = θ ˜ ˙ = Γ Proj ( θ ˜ , x b P x ˜ )
where the adaption law’s rate is expressed by Γ > 0 . As seen in [29], Proj indicates the operator’s projection. Q = Q > 0 and P = P > 0 satisfy the expression
Q = P A m + A m P
Finally, the adaptive control law can be expressed as follows:
u a d ( s ) = k s ( μ ^ ( s ) k g r ( s ) + ω u a d ( s ) )
where μ ^ ( t ) θ ^ ( t ) x + σ ^ ( t ) expresses the inverse Laplace transform of μ ^ ( s ) , r ( t ) represents the inverse Laplace transform of the reference r ( s ) , and the feed-forward gain is expressed by k g 1 c A m 1 b . L1 adaptive control details are found in [26,27,28].

3.2. Formation Control

3.2.1. Formation Objective

Consider a multi-agent system consisting of N agents, described as follows:
x i ( k + 1 ) = A i x i ( k ) + B i u i ( k ) y i ( k ) = C i x i ( k ) i = 1 , 2 N
where
A i = d i a g o n a l ( 0 1 a 21 1 a 22 1 . . . . 0 1 a 21 n a 22 n ) , B i = I n 0 1 , x i ( k ) = x p i x v i a n d x i ( k + 1 ) = x v i x a i
Definition 1
([30]). A formation is a vector h = h p 1 0 R 2 N . The N agents are in formation h if there are vectors q , w R N such that ( x p ) i ( h p ) i = q , ( x v ) i = w , i = 1 , , N where subscript p (position) and subscript v (velocity) are components of x i .
Therefore, the error between vehicles is calculated as follows:
e i = 1 | J i | j J i ( x j h j ) + ( x i h i ) i = 1 , , N .
We seek a feedback control K i that guides the agent i into a formation h using the Kronecker product of graph Laplacian matrix L = L g I N , where the graph Laplacian matrix L g = D d i r A d i r , where D d i r and A d i r indicate the degree matrix and the adjacency matrix, respectively, such that the following objective is achieved:
lim t | | x i h i | | = q , i N
Then, by substituting u i into Equation (17), we obtain
x i ( k + 1 ) = A 1 i x i ( k ) + B 1 i K i L ( x i h i ) y i ( k ) = C 1 i x i ( k ) i = 1 , 2 . . . N
with A 1 i = I N A i , B 1 i = I N B i , a n d C 1 i = I N C i .

3.2.2. Formation Design

In this section, we discuss the design of the control gains K i for each agent i based on LMI techniques.
The proposed LMI approach used in this research is a modification of the method in [31]. If there exist symmetric positive definite matrices Y i ( j ) R n + ( d ¯ + δ ¯ ) m x n + ( d ¯ + δ ¯ ) m , a matrix Z i ¯ R m x n , matrices
X i ( j ) = X ¯ i ( 1 , j ) 0 X ¯ i ( 2 , j ) X ¯ i ( 3 , j )
with X ¯ i ( 1 , j ) R n x n , X ¯ i ( 2 , j ) R ( d ¯ + δ ¯ ) m x n X ¯ i ( 3 , j ) R ( d ¯ + δ ¯ ) m x ( d ¯ + δ ¯ ) m , j = 1, 2, and a scalar γ < 1 satisfying the following LMI matrix:
X i ( j ) Y i ( j ) X i ( j ) T H F , i T ( Z ¯ i 0 ) T H G , i T H F , i T X i T ( j ) H G , i T ( Z ¯ i 0 ) T ( γ ) X i ( j ) > 0
where
H F , i = e A i h i h m i n h m a x e A i s d s B i 0 0 , and H F , i = h m i n h m a x e A i s d s B i 1
then the formation for all agents i 1 , 2 , with K ¯ i = Z ¯ i X ¯ i 1 is globally asymptotically stable.
Proof. 
See Appendix A. □

4. Simulation Results

Simulation studies were conducted in MATLAB considering a the formation of six UAVs. The DDS middleware, graph theory, LMI, and L1 adaptive controller are used. Table 1 shows the quadrotor parameters that were used [27].
Furthermore, the controller parameters are set to k d = 10, k p = 10 and γ = 10 6 . Figure 1 shows the flowchart of multiple UAVs’ formation control utilizing graph theory and LMI controllers. Figure 2 depicts the network topology between multiple UAVs, which is based on a set of QoS criteria (Table 2) that must be met before interaction between the subscribers and publishers may begin. The degree matrix D d i r and the adjacency matrix A d i r of the graph in Figure 2 are
D d i r = 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 and A d i r = 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 1 1 0 0 0 0 0
The following cases were taken into account in the formation control’s simulation:
  • UAVs formation without DoS attacks: In the first case, we considered six UAV models with communication delay only. The proposed LMI condition was used to find the formation feedback gain, which means without dropout packet produced by DoS attacks or δ ¯ = 0, h m i n = 0.01, h m a x = 0.014, τ m a x = 100 h m a x , and τ m i n = 10 h m i n in the delay, as shown in Figure 3, with γ 0 = 0 and h = 1, and the same initial values of the UAVs, shown in Figure 4, Figure 5, Figure 6, Figure 7 and Figure 8. This demonstrates how a swarm of six unmanned aerial vehicles (UAVs) may establish a certain topology in 2D space without the effect of the DoS attacks.
  • UAVs formation under DoS attacks: In the second case, we considered six UAVs model with communication delay and dropout packet produced by DoS attacks for when we applied the effect of the DoS attacks, as in Figure 9 on the system, with the same parameters and same controller as in the first case and the same initial values of the UAVs. This is shown in Figure 10, Figure 11, Figure 12, Figure 13 and Figure 14. The figures illustrate how a swarm of six unmanned aerial vehicles (UAVs) may establish a certain topology in 2D space under the effect of the DoS attacks.
Figure 4, Figure 5, Figure 6 and Figure 7 show the formation control of six UAVs without the effect of DoS attacks. It can be seen that all of the UAVs were built in a hexagon shape. Figure 8 shows the full-view map of UAVs’ formation without the effect of DoS attacks. It is clear that at each time, the six UAVs are constructed in a hexagon shape. The DDS middleware was used to share data between the six UAVs.
Figure 10, Figure 11, Figure 12 and Figure 13 illustrate the formation control of six UAVs under the effect of DoS attacks. It can be seen that all of the UAVs were recognized in a hexagon shape. This huge variance caused by DoS attacks had no effect on the system’s performance. Figure 14 illustrates the full-view path of UAVs’ formation under the effect of DoS attacks. It is clear that the six UAVs are structured in a hexagon shape at each time. Information was transmitted across the six UAVs using the DDS middleware.

5. Discussion Summary

The DDS formation between multiple UAVs systems is shown in Figure 2. To make this communication, all of the UAVs consider publishers’ UAVs and subscribers’ UAVs at the same time. A set of QoS criteria must be followed when publishers’ UAVs and subscribers’ UAVs communicate. The formation control of six UAVs in the absence of DoS attacks is illustrated in Figure 4, Figure 5, Figure 6 and Figure 7. Six of the UAVs were positioned in a hexagon formation. The whole path of UAV formation without the influence of DoS attacks is depicted in Figure 8. The DDS middleware is used to facilitate information transmission between the UAVs. The formation control of multiple UAVs under the effect of DoS attacks is shown in Figure 10, Figure 11, Figure 12 and Figure 13. All of the UAVs are identified as being in the shape of a hexagon. The whole map of UAV formation with the effect of DoS attacks is shown in Figure 14. The DDS middleware is used to make data communication between the UAVs easier.

6. Conclusions

This paper presents a novel architecture for secure formation control of several UAVs. The LMI controller, DDS middleware, L1 controller, and graph theory approach are used to construct multiple UAV formation control under DoS attacks. The LMI controller is utilized to overcome the communication time delay and packet drops produced by DoS attacks. As a result, data were exchanged between the UAVs using the DDS middleware, In addition, it can be considered as an extra security level based on its reliable QoS. Furthermore, the L1 controller is utilized as a local controller to stabilize the UAV’s dynamic model. Moreover, the graph theory approach is utilized to maintain the UAVs in hexagon formation. The L1 adaptive and LMI controller perform effectively in the face of DoS attacks. According to the simulation results, the L1 adaptive controller, LMI controller, and DDS middleware significantly improved overall performance.

Author Contributions

Conceptualization, S.M.E. and S.E.-F.; Data curation, S.M.E.; Formal analysis, S.M.E.; Funding acquisition, S.E.-F. and A.-W.A.S.; Investigation, S.M.E.; Methodology, S.M.E.; Project administration, S.E.-F.; Resources, S.E.-F.; Software, S.M.E.; Validation, S.M.E.; Visualization, S.M.E.; Writing–original draft, S.M.E.; Writing–review & editing, S.E.-F. and A.-W.A.S. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

None.

Informed Consent Statement

None.

Data Availability Statement

The data generated during the current study are available from the corresponding author on reasonable request.

Acknowledgments

The authors would like to acknowledge the support of King Fahd University of Petroleum and Minerals and the Interdisciplinary Research Center of Smart Mobility and Logistics.

Conflicts of Interest

The authors declare no conflict of interest.

Appendix A. Stability Analysis of Discrete-Time Multi-Agent Systems

Consider the discrete-time systems:
ξ i ( k + 1 ) = A i ξ i ( k ) + B i u i ( k ) y i ( k ) = C i ξ i ( k ) i = 1 , 2 N
Consider a Lyapunov function V,
V = i = 1 N V i
where V i ( k ) = ξ i ( k ) T P ξ i ( k ) and where P > 0 . The discrete-time system is stable under the feedback u i ( k ) = K i ξ i ( k ) if
V i ( k + 1 ) V i ( k ) < 0 .
Now V i ( k + 1 ) = ξ i ( k + 1 ) T P ξ i ( k + 1 ) where P > 0 . by substituting in Equation (A3) we get
ξ i ( k + 1 ) T P ξ i ( k + 1 ) ξ i ( k ) T P ξ i ( k ) < 0 .
Now substitute Equation (A1) in Equation (A4)
[ A i ξ i ( k ) + B i u i ( k ) ] T P [ A i ξ i ( k ) + B i u i ( k ) ] ξ i ( k ) T P ξ i ( k ) < 0 .
But u i ( k ) = K i ξ i ( k ) then we can rewrite Equation (A5)
[ A i ξ i ( k ) + B i K i ξ i ( k ) ] T P [ A i ξ i ( k ) + B i K i ξ i ( k ) ] ξ i ( k ) T P ξ i ( k ) < 0 .
By rewriting Equation (A6) we obtain
[ ( A i + B i K i ) ξ i ( k ) ] T P [ ( A i + B i K i ) ξ i ( k ) ] ξ i ( k ) T P ξ i ( k ) < 0 .
Then from the properties of transpose Equation (A7) will be
ξ i ( k ) T ( A i + B i K i ) T P ( A i + B i K i ) ξ i ( k ) ξ i ( k ) T P ξ i ( k ) < 0 .
Then from Equation (A8)
( A i + B i K i ) T P ( A i + B i K i ) P < 0 .
By applying the Schur complement on Equation (A8)
P ( A i + B i K i ) T P P ( A i + B i K i ) P < 0 .
Multiply (A10) by P 1 I from left and right then
P 1 P 1 ( A i + B i K i ) T ( A i + B i K i ) P 1 P 1 < 0 .
Now input X i = P 1 and K i = Y i X i 1 into (A11), then we will obtain the linear matrix inequality
X i X i A i T + Y i T B i T A i X i + B i Y i X i < 0 .
Now by returning back to our problem A i = H F , i , B i = H G , i and Y i = [ Z i 0 ] , Then by substituting in (A12)
X i X i H F , i T + [ Z i 0 ] T H G , i T H F , i X i + H G , i [ Z i 0 ] X i < 0 .
The matrix (A13) can be written as
X i ( j ) Y i ( j ) X i ( j ) T H F , i T ( Z ¯ i 0 ) T H G , i T H F , i T X i T ( j ) H G , i T ( Z ¯ i 0 ) T ( γ ) X i ( j ) > 0
If there exist symmetric positive definite matrices matrix Z i R m x n , matrices
X i ( j ) = X ¯ i ( 1 ) 0 X ¯ i ( 2 , j ) X ¯ i ( 3 , j )
with X ¯ i ( 1 ) R n x n , X ¯ i ( 2 , j ) R ( d ¯ + δ ¯ ) m x n X ¯ i ( 3 , j ) R ( d ¯ + δ ¯ ) m x ( d ¯ + δ ¯ ) m , satisfying matrix (A14) for all i = 1, 2, then the close loop of formation system with K i = Z i X i 1 is globally asymptotically stable, which completes the proof.

References

  1. Oh, K.K.; Park, M.C.; Ahn, H.S. A Survey of Multi-Agent Formation Control. Automatica 2015, 53, 424–440. [Google Scholar] [CrossRef]
  2. Lee, Y.J.; Trevathan, J.; Atkinson, I.; Read, W. An Intelligent Agent System for Managing Heterogeneous Sensors in Dispersed and Disparate Wireless Sensor Network. Int. J. Sens. Netw. 2018, 27, 149–162. [Google Scholar] [CrossRef]
  3. Chen, L.; Mei, J.; Li, C.; Ma, G. Distributed leader–follower affine formation maneuver control for high-order multiagent systems. IEEE Trans. Autom. Control 2020, 65, 4941–4948. [Google Scholar] [CrossRef]
  4. Tang, Z.; Cunha, R.; Hamel, T.; Silvestre, C. Formation control of a leader–follower structure in three dimensional space using bearing measurements. Automatica 2021, 128, 109567. [Google Scholar] [CrossRef]
  5. Nasir, M.T.; El-Ferik, S. Adaptive sliding-mode cluster space control of a non-holonomic multi-robot system with applications. IET Control Theory Appl. 2017, 11, 1264–1273. [Google Scholar] [CrossRef]
  6. Beard, R.W.; Lawton, J.; Hadaegh, F.Y. A coordination architecture for spacecraft formation control. IEEE Trans. Control Syst. Technol. 2001, 9, 777–790. [Google Scholar] [CrossRef] [Green Version]
  7. Ghasemi, K.; Ghaisari, J.; Abdollahi, F. Robust formation control of multiagent systems on the Lie group SE(3). Int. J. Robust Nonlinear Control 2020, 30, 966–998. [Google Scholar] [CrossRef]
  8. Xu, D.; Zhang, X.; Zhu, Z.; Chen, C.; Yang, P. Behavior-based formation control of swarm robots. Math. Probl. Eng. 2014, 2014, 205759. [Google Scholar] [CrossRef]
  9. Hacene, N.; Mendil, B. Behavior-based autonomous navigation and formation control of mobile robots in unknown cluttered dynamic environments with dynamic target tracking. Int. J. Autom. Comput. 2021, 18, 766–786. [Google Scholar] [CrossRef]
  10. Do, H.T.; Nguyen, M.T.; Hua, H.T. Formation Control for Multiple Unmanned Aerial Vehicles (UAVs): Recent Developments and Research Challenges. ICSES Trans. Comput. Netw. Commun. 2021, 1–4. [Google Scholar] [CrossRef]
  11. Feng, Z.; Hu, G.; Wen, G. Distributed consensus tracking for multi-agent systems under two types of attacks. Int. J. Robust Nonlinear Control 2016, 26, 896–918. [Google Scholar] [CrossRef]
  12. Feng, Z.; Wen, G.; Hu, G. Distributed secure coordinated control for multiagent systems under strategic attacks. IEEE Trans. Cybern. 2016, 47, 1273–1284. [Google Scholar] [CrossRef] [PubMed]
  13. He, W.; Gao, X.; Zhong, W.; Qian, F. Secure impulsive synchronization control of multi-agent systems under deception attacks. Inf. Sci. 2018, 459, 354–368. [Google Scholar] [CrossRef]
  14. Ding, D.; Wang, Z.; Ho, D.W.; Wei, G. Observer-based event-triggering consensus control for multiagent systems with lossy sensors and cyber-attacks. IEEE Trans. Cybern. 2016, 47, 1936–1947. [Google Scholar] [CrossRef]
  15. Li, X.M.; Zhou, Q.; Li, P.; Li, H.; Lu, R. Event-triggered consensus control for multi-agent systems against false data-injection attacks. IEEE Trans. Cybern. 2019, 50, 1856–1866. [Google Scholar] [CrossRef] [PubMed]
  16. Zhang, T.Y.; Ye, D. Distributed secure control against denial-of-service attacks in cyber-physical systems based on K-connected communication topology. IEEE Trans. Cybern. 2020, 50, 3094–3103. [Google Scholar] [CrossRef]
  17. Tang, Y.; Zhang, D.; Shi, P.; Zhang, W.; Qian, F. Event-based formation control for nonlinear multiagent systems under DoS attacks. IEEE Trans. Autom. Control 2020, 66, 452–459. [Google Scholar] [CrossRef]
  18. Amullen, E.M.; Shetty, S.; Keel, L.H. Secured formation control for multi-agent systems under DoS attacks. In Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 10–11 May 2016; pp. 1–6. [Google Scholar]
  19. Wang, S.; Zheng, S.; Zhao, C.; Jian, H.; Li, H. Formation Control of Nonlinear Multi-Agent Systems with Actuator and Communication Attacks. In Proceedings of the 2021 40th Chinese Control Conference (CCC), Shanghai, China, 26–28 July 2021; pp. 2286–2291. [Google Scholar]
  20. Gu, Z.; Sun, X.; Lam, H.K.; Yue, D.; Xie, X. Event-based secure control of T-S fuzzy based 5-DOF active semi-vehicle suspension systems subject to DoS attacks. IEEE Trans. Fuzzy Syst. 2021. [Google Scholar] [CrossRef]
  21. Gu, Z.; Ahn, C.K.; Yue, D.; Xie, X.P. Event-Triggered H Filtering for T-S Fuzzy-Model-Based Nonlinear Networked Systems With Multisensors Against DoS Attacks. IEEE Trans. Cybernet. 2020, 1–11. [Google Scholar] [CrossRef]
  22. Zhu, Z.; Pan, Y.; Zhou, Q.; Lu, C. Event-Triggered Adaptive Fuzzy Control for Stochastic Nonlinear Systems With Unmeasured States and Unknown Backlash-Like Hysteresis. IEEE Trans. Fuzzy Syst. 2020, 29, 1273–1283. [Google Scholar] [CrossRef]
  23. Roman, R.C.; Precup, R.E.; Petriu, E.M. Hybrid data-driven fuzzy active disturbance rejection control for tower crane systems. Eur. J. Control 2021, 58, 373–387. [Google Scholar] [CrossRef]
  24. Elkhider, S.M.; Al-Buraiki, O.; El-Ferik, S. Publish and Subscribe-Based Formation and Containment Control of Heterogeneous Robotic System with Actuator Time Delay. Appl. Sci. 2021, 11, 9145. [Google Scholar] [CrossRef]
  25. AL-Madani, B.; Elkhider, S.; El Ferik, S. DDS-based containment control of multiple UAV systems. Appl. Sci. 2020, 10, 4572. [Google Scholar] [CrossRef]
  26. El-Ferik, S.; Almadani, B.; Elkhider, S.M. Formation Control of Multi Unmanned Aerial Vehicle Systems Based on DDS Middleware. IEEE Access 2020, 8, 44211–44218. [Google Scholar] [CrossRef]
  27. Koesdwiady, A.B. Immersion and Invariance Control Design for Unmanned Aerial Vehicle. Master’s Thesis, King Fahd University of Petroleum and Minerals, Dhahran, Saudi Arabia, 2013. [Google Scholar]
  28. Hovakimyan, N.; Cao, C. L 1 Adaptive Control Theory: Guaranteed Robustness with Fast Adaptation; Siam: Philadelphia, PA, USA, 2010; Volume 21. [Google Scholar]
  29. Pomet, J.; Praly, L. Adaptive nonlinear regulation: Estimation from the Lyapunov equation. IEEE Trans. Autom. Control 1992, 37, 729–740. [Google Scholar] [CrossRef] [Green Version]
  30. Lafferriere, G.; Caughman, J.; Williams, A. Graph theoretic methods in the stability of vehicle formations. In Proceedings of the 2004 American Control Conference, Boston, MA, USA, 30 June–2 July 2004; Volume 4, pp. 3729–3734. [Google Scholar] [CrossRef]
  31. Cloosterman, M.; Hetel, L.; van de Wouw, N.; Heemels, W.; Daafouz, J.; Nijmeijer, H. Controller synthesis for networked control systems. Automatica 2010, 46, 1584–1594. [Google Scholar] [CrossRef]
Figure 1. Flowchart of multiple UAVs’ formation control.
Figure 1. Flowchart of multiple UAVs’ formation control.
Applsci 12 04315 g001
Figure 2. DDS communication topology of multiple UAVs.
Figure 2. DDS communication topology of multiple UAVs.
Applsci 12 04315 g002
Figure 3. The total delay on the system.
Figure 3. The total delay on the system.
Applsci 12 04315 g003
Figure 4. UAVs formation at the first position without DoS attacks.
Figure 4. UAVs formation at the first position without DoS attacks.
Applsci 12 04315 g004
Figure 5. UAVs formation at the second position without DoS attacks.
Figure 5. UAVs formation at the second position without DoS attacks.
Applsci 12 04315 g005
Figure 6. UAVs formation at the third position without DoS attacks.
Figure 6. UAVs formation at the third position without DoS attacks.
Applsci 12 04315 g006
Figure 7. UAVs formation at the fourth position without DoS attacks.
Figure 7. UAVs formation at the fourth position without DoS attacks.
Applsci 12 04315 g007
Figure 8. Full-view map of UAVs formation without DoS attacks.
Figure 8. Full-view map of UAVs formation without DoS attacks.
Applsci 12 04315 g008
Figure 9. Effect of the DoS attacks.
Figure 9. Effect of the DoS attacks.
Applsci 12 04315 g009
Figure 10. UAVs formation at the first position under DoS attacks’ effect.
Figure 10. UAVs formation at the first position under DoS attacks’ effect.
Applsci 12 04315 g010
Figure 11. UAVs formation at the second position under DoS attacks’ effect.
Figure 11. UAVs formation at the second position under DoS attacks’ effect.
Applsci 12 04315 g011
Figure 12. UAVs formation at the third position under DoS attacks’ effect.
Figure 12. UAVs formation at the third position under DoS attacks’ effect.
Applsci 12 04315 g012
Figure 13. UAVs formation at the fourth position under DoS attacks’ effect.
Figure 13. UAVs formation at the fourth position under DoS attacks’ effect.
Applsci 12 04315 g013
Figure 14. Full-view map of UAVs formation under DoS attacks’ effect.
Figure 14. Full-view map of UAVs formation under DoS attacks’ effect.
Applsci 12 04315 g014
Table 1. The quadrotor parameters.
Table 1. The quadrotor parameters.
SymbolValue/UnitProperties
g9.8 m/s 2 Gravity Acceleration
m0.52 kgMass
k r 0.105 Drag’s Rotational
L0.205 mArm Length
k t 0.95 Drag’s Translational
d7.5 × 10 7 Ratio of Drag and Thrust
I z 0.0129 kg·m 2 Inertia of z-axis
I y 0.0069 kg·m 2 Inertia of y-axis
I x 0.0069 kg·m 2 Inertia of x-axis
I R 3.36 × 10 5 kg·m 2 Propeller Inertia
Table 2. Quality of service (QoS) policies.
Table 2. Quality of service (QoS) policies.
QoS PoliciesQoS Value
SubscriberPublisher
DeadlineInfiniteInfinite
DurabilityVolatileVolatile
HistoryKeep LastKeep All
ReliabilityReliableReliable
OwnershipSharedShared
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Elkhider, S.M.; El-Ferik, S.; Saif, A.-W.A. Denial of Service Attack of QoS-Based Control of Multi-Agent Systems. Appl. Sci. 2022, 12, 4315. https://doi.org/10.3390/app12094315

AMA Style

Elkhider SM, El-Ferik S, Saif A-WA. Denial of Service Attack of QoS-Based Control of Multi-Agent Systems. Applied Sciences. 2022; 12(9):4315. https://doi.org/10.3390/app12094315

Chicago/Turabian Style

Elkhider, Siddig M., Sami El-Ferik, and Abdul-Wahid A. Saif. 2022. "Denial of Service Attack of QoS-Based Control of Multi-Agent Systems" Applied Sciences 12, no. 9: 4315. https://doi.org/10.3390/app12094315

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop