Loading…

Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks

This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected...

Full description

Saved in:
Bibliographic Details
Published in:Journal of the Franklin Institute 2021-03, Vol.358 (5), p.2780-2800
Main Authors: Liu, Yonggui, Li, Ziyuan, Shen, Zhiping
Format: Article
Language:English
Subjects:
Citations: Items that this one cites
Items that cite this one
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
cited_by cdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93
cites cdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93
container_end_page 2800
container_issue 5
container_start_page 2780
container_title Journal of the Franklin Institute
container_volume 358
creator Liu, Yonggui
Li, Ziyuan
Shen, Zhiping
description This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.
doi_str_mv 10.1016/j.jfranklin.2020.12.035
format article
fullrecord <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2519432222</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0016003220308504</els_id><sourcerecordid>2519432222</sourcerecordid><originalsourceid>FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</originalsourceid><addsrcrecordid>eNqFkE1LAzEQhoMoWKu_wYDnrfnY3XSPpfgFBUH0HOLsrM22zdZMqvTfm1Lx6lyGybzzZuZh7FqKiRSyvu0nfRddWK19mCih8quaCF2dsJGcmqZQdaNP2UhkaSGEVufsgqjPpZFCjNjmBcmvPYbEYQiEgXbEh463niBiwiL5DR5aASFhy79w6WGNnPaUcEP826cl9yFhdJD8EHjA9D3EFXcfzgfKrvt3jIVLycGKLtlZ59aEV795zN7u717nj8Xi-eFpPlsUoEudCmlMDQqwLWsAqYSp2rJrXKVBKVF2UzDYQItaOdkAdHpaylZWrelcY-oaGj1mN0ffbRw-d0jJ9sMuhvylVZVsSq1yZJU5qiAORBE7u41-4-LeSmEPbG1v_9jaA1srlc1s8-TsOIn5iC-P0RJkhnljHzMn2w7-X48fA0SJuw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2519432222</pqid></control><display><type>article</type><title>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</title><source>ScienceDirect Journals</source><source>Backfile Package - Mathematics (Legacy) [YMT]</source><creator>Liu, Yonggui ; Li, Ziyuan ; Shen, Zhiping</creator><creatorcontrib>Liu, Yonggui ; Li, Ziyuan ; Shen, Zhiping</creatorcontrib><description>This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.</description><identifier>ISSN: 0016-0032</identifier><identifier>EISSN: 1879-2693</identifier><identifier>EISSN: 0016-0032</identifier><identifier>DOI: 10.1016/j.jfranklin.2020.12.035</identifier><language>eng</language><publisher>Elmsford: Elsevier Ltd</publisher><subject>Convergence ; Cybercrime ; Cybersecurity ; Discrete element method ; Discrete time systems ; Graph theory ; Matrix methods ; Simulation ; Stability analysis ; Studies</subject><ispartof>Journal of the Franklin Institute, 2021-03, Vol.358 (5), p.2780-2800</ispartof><rights>2021 The Franklin Institute</rights><rights>Copyright Elsevier Science Ltd. Mar 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</citedby><cites>FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0016003220308504$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3564,27924,27925,46003</link.rule.ids></links><search><creatorcontrib>Liu, Yonggui</creatorcontrib><creatorcontrib>Li, Ziyuan</creatorcontrib><creatorcontrib>Shen, Zhiping</creatorcontrib><title>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</title><title>Journal of the Franklin Institute</title><description>This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.</description><subject>Convergence</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Discrete element method</subject><subject>Discrete time systems</subject><subject>Graph theory</subject><subject>Matrix methods</subject><subject>Simulation</subject><subject>Stability analysis</subject><subject>Studies</subject><issn>0016-0032</issn><issn>1879-2693</issn><issn>0016-0032</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNqFkE1LAzEQhoMoWKu_wYDnrfnY3XSPpfgFBUH0HOLsrM22zdZMqvTfm1Lx6lyGybzzZuZh7FqKiRSyvu0nfRddWK19mCih8quaCF2dsJGcmqZQdaNP2UhkaSGEVufsgqjPpZFCjNjmBcmvPYbEYQiEgXbEh463niBiwiL5DR5aASFhy79w6WGNnPaUcEP826cl9yFhdJD8EHjA9D3EFXcfzgfKrvt3jIVLycGKLtlZ59aEV795zN7u717nj8Xi-eFpPlsUoEudCmlMDQqwLWsAqYSp2rJrXKVBKVF2UzDYQItaOdkAdHpaylZWrelcY-oaGj1mN0ffbRw-d0jJ9sMuhvylVZVsSq1yZJU5qiAORBE7u41-4-LeSmEPbG1v_9jaA1srlc1s8-TsOIn5iC-P0RJkhnljHzMn2w7-X48fA0SJuw</recordid><startdate>202103</startdate><enddate>202103</enddate><creator>Liu, Yonggui</creator><creator>Li, Ziyuan</creator><creator>Shen, Zhiping</creator><general>Elsevier Ltd</general><general>Elsevier Science Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope></search><sort><creationdate>202103</creationdate><title>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</title><author>Liu, Yonggui ; Li, Ziyuan ; Shen, Zhiping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Convergence</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Discrete element method</topic><topic>Discrete time systems</topic><topic>Graph theory</topic><topic>Matrix methods</topic><topic>Simulation</topic><topic>Stability analysis</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Yonggui</creatorcontrib><creatorcontrib>Li, Ziyuan</creatorcontrib><creatorcontrib>Shen, Zhiping</creatorcontrib><collection>CrossRef</collection><collection>Mechanical &amp; Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><jtitle>Journal of the Franklin Institute</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Yonggui</au><au>Li, Ziyuan</au><au>Shen, Zhiping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</atitle><jtitle>Journal of the Franklin Institute</jtitle><date>2021-03</date><risdate>2021</risdate><volume>358</volume><issue>5</issue><spage>2780</spage><epage>2800</epage><pages>2780-2800</pages><issn>0016-0032</issn><eissn>1879-2693</eissn><eissn>0016-0032</eissn><abstract>This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.</abstract><cop>Elmsford</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.jfranklin.2020.12.035</doi><tpages>21</tpages></addata></record>
fulltext fulltext
identifier ISSN: 0016-0032
ispartof Journal of the Franklin Institute, 2021-03, Vol.358 (5), p.2780-2800
issn 0016-0032
1879-2693
0016-0032
language eng
recordid cdi_proquest_journals_2519432222
source ScienceDirect Journals; Backfile Package - Mathematics (Legacy) [YMT]
subjects Convergence
Cybercrime
Cybersecurity
Discrete element method
Discrete time systems
Graph theory
Matrix methods
Simulation
Stability analysis
Studies
title Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks
url http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T22%3A18%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Resilient%20consensus%20of%20discrete-time%20connected%20vehicle%20systems%20with%20interaction%20network%20against%20cyber-attacks&rft.jtitle=Journal%20of%20the%20Franklin%20Institute&rft.au=Liu,%20Yonggui&rft.date=2021-03&rft.volume=358&rft.issue=5&rft.spage=2780&rft.epage=2800&rft.pages=2780-2800&rft.issn=0016-0032&rft.eissn=1879-2693&rft_id=info:doi/10.1016/j.jfranklin.2020.12.035&rft_dat=%3Cproquest_cross%3E2519432222%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2519432222&rft_id=info:pmid/&rfr_iscdi=true