Loading…
Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks
This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected...
Saved in:
Published in: | Journal of the Franklin Institute 2021-03, Vol.358 (5), p.2780-2800 |
---|---|
Main Authors: | , , |
Format: | Article |
Language: | English |
Subjects: | |
Citations: | Items that this one cites Items that cite this one |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
cited_by | cdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93 |
---|---|
cites | cdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93 |
container_end_page | 2800 |
container_issue | 5 |
container_start_page | 2780 |
container_title | Journal of the Franklin Institute |
container_volume | 358 |
creator | Liu, Yonggui Li, Ziyuan Shen, Zhiping |
description | This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations. |
doi_str_mv | 10.1016/j.jfranklin.2020.12.035 |
format | article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_2519432222</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0016003220308504</els_id><sourcerecordid>2519432222</sourcerecordid><originalsourceid>FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</originalsourceid><addsrcrecordid>eNqFkE1LAzEQhoMoWKu_wYDnrfnY3XSPpfgFBUH0HOLsrM22zdZMqvTfm1Lx6lyGybzzZuZh7FqKiRSyvu0nfRddWK19mCih8quaCF2dsJGcmqZQdaNP2UhkaSGEVufsgqjPpZFCjNjmBcmvPYbEYQiEgXbEh463niBiwiL5DR5aASFhy79w6WGNnPaUcEP826cl9yFhdJD8EHjA9D3EFXcfzgfKrvt3jIVLycGKLtlZ59aEV795zN7u717nj8Xi-eFpPlsUoEudCmlMDQqwLWsAqYSp2rJrXKVBKVF2UzDYQItaOdkAdHpaylZWrelcY-oaGj1mN0ffbRw-d0jJ9sMuhvylVZVsSq1yZJU5qiAORBE7u41-4-LeSmEPbG1v_9jaA1srlc1s8-TsOIn5iC-P0RJkhnljHzMn2w7-X48fA0SJuw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2519432222</pqid></control><display><type>article</type><title>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</title><source>ScienceDirect Journals</source><source>Backfile Package - Mathematics (Legacy) [YMT]</source><creator>Liu, Yonggui ; Li, Ziyuan ; Shen, Zhiping</creator><creatorcontrib>Liu, Yonggui ; Li, Ziyuan ; Shen, Zhiping</creatorcontrib><description>This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.</description><identifier>ISSN: 0016-0032</identifier><identifier>EISSN: 1879-2693</identifier><identifier>EISSN: 0016-0032</identifier><identifier>DOI: 10.1016/j.jfranklin.2020.12.035</identifier><language>eng</language><publisher>Elmsford: Elsevier Ltd</publisher><subject>Convergence ; Cybercrime ; Cybersecurity ; Discrete element method ; Discrete time systems ; Graph theory ; Matrix methods ; Simulation ; Stability analysis ; Studies</subject><ispartof>Journal of the Franklin Institute, 2021-03, Vol.358 (5), p.2780-2800</ispartof><rights>2021 The Franklin Institute</rights><rights>Copyright Elsevier Science Ltd. Mar 2021</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</citedby><cites>FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://www.sciencedirect.com/science/article/pii/S0016003220308504$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>314,780,784,3564,27924,27925,46003</link.rule.ids></links><search><creatorcontrib>Liu, Yonggui</creatorcontrib><creatorcontrib>Li, Ziyuan</creatorcontrib><creatorcontrib>Shen, Zhiping</creatorcontrib><title>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</title><title>Journal of the Franklin Institute</title><description>This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.</description><subject>Convergence</subject><subject>Cybercrime</subject><subject>Cybersecurity</subject><subject>Discrete element method</subject><subject>Discrete time systems</subject><subject>Graph theory</subject><subject>Matrix methods</subject><subject>Simulation</subject><subject>Stability analysis</subject><subject>Studies</subject><issn>0016-0032</issn><issn>1879-2693</issn><issn>0016-0032</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2021</creationdate><recordtype>article</recordtype><recordid>eNqFkE1LAzEQhoMoWKu_wYDnrfnY3XSPpfgFBUH0HOLsrM22zdZMqvTfm1Lx6lyGybzzZuZh7FqKiRSyvu0nfRddWK19mCih8quaCF2dsJGcmqZQdaNP2UhkaSGEVufsgqjPpZFCjNjmBcmvPYbEYQiEgXbEh463niBiwiL5DR5aASFhy79w6WGNnPaUcEP826cl9yFhdJD8EHjA9D3EFXcfzgfKrvt3jIVLycGKLtlZ59aEV795zN7u717nj8Xi-eFpPlsUoEudCmlMDQqwLWsAqYSp2rJrXKVBKVF2UzDYQItaOdkAdHpaylZWrelcY-oaGj1mN0ffbRw-d0jJ9sMuhvylVZVsSq1yZJU5qiAORBE7u41-4-LeSmEPbG1v_9jaA1srlc1s8-TsOIn5iC-P0RJkhnljHzMn2w7-X48fA0SJuw</recordid><startdate>202103</startdate><enddate>202103</enddate><creator>Liu, Yonggui</creator><creator>Li, Ziyuan</creator><creator>Shen, Zhiping</creator><general>Elsevier Ltd</general><general>Elsevier Science Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7TB</scope><scope>8FD</scope><scope>FR3</scope><scope>KR7</scope></search><sort><creationdate>202103</creationdate><title>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</title><author>Liu, Yonggui ; Li, Ziyuan ; Shen, Zhiping</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2021</creationdate><topic>Convergence</topic><topic>Cybercrime</topic><topic>Cybersecurity</topic><topic>Discrete element method</topic><topic>Discrete time systems</topic><topic>Graph theory</topic><topic>Matrix methods</topic><topic>Simulation</topic><topic>Stability analysis</topic><topic>Studies</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Liu, Yonggui</creatorcontrib><creatorcontrib>Li, Ziyuan</creatorcontrib><creatorcontrib>Shen, Zhiping</creatorcontrib><collection>CrossRef</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>Engineering Research Database</collection><collection>Civil Engineering Abstracts</collection><jtitle>Journal of the Franklin Institute</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Liu, Yonggui</au><au>Li, Ziyuan</au><au>Shen, Zhiping</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks</atitle><jtitle>Journal of the Franklin Institute</jtitle><date>2021-03</date><risdate>2021</risdate><volume>358</volume><issue>5</issue><spage>2780</spage><epage>2800</epage><pages>2780-2800</pages><issn>0016-0032</issn><eissn>1879-2693</eissn><eissn>0016-0032</eissn><abstract>This paper concerns the consensus of the second-order discrete-time autonomous connected vehicle system (CVS) in presence of cyber-attacks. First, the necessary and sufficient conditions for the autonomous CVS are derived without a cyber-attack. Then, a virtual system in hidden layer, interconnected with the original CVS in platoon layer through the designed interaction network, is introduced to resist cyber attacks. Matrix analysis tool, algebraic graph theory and Lyapunov stability method are used to analyze the convergence of CVS. It is proved that the states of CVS can reach consensus and the state errors converge to a certain bound in the case of attacks existing only in hidden layer, or in the overall system including both hidden layer and platoon layer. Finally, the validity of the proposed control approach is verified by the designed simulations.</abstract><cop>Elmsford</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.jfranklin.2020.12.035</doi><tpages>21</tpages></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0016-0032 |
ispartof | Journal of the Franklin Institute, 2021-03, Vol.358 (5), p.2780-2800 |
issn | 0016-0032 1879-2693 0016-0032 |
language | eng |
recordid | cdi_proquest_journals_2519432222 |
source | ScienceDirect Journals; Backfile Package - Mathematics (Legacy) [YMT] |
subjects | Convergence Cybercrime Cybersecurity Discrete element method Discrete time systems Graph theory Matrix methods Simulation Stability analysis Studies |
title | Resilient consensus of discrete-time connected vehicle systems with interaction network against cyber-attacks |
url | http://sfxeu10.hosted.exlibrisgroup.com/loughborough?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-04T22%3A18%3A53IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Resilient%20consensus%20of%20discrete-time%20connected%20vehicle%20systems%20with%20interaction%20network%20against%20cyber-attacks&rft.jtitle=Journal%20of%20the%20Franklin%20Institute&rft.au=Liu,%20Yonggui&rft.date=2021-03&rft.volume=358&rft.issue=5&rft.spage=2780&rft.epage=2800&rft.pages=2780-2800&rft.issn=0016-0032&rft.eissn=1879-2693&rft_id=info:doi/10.1016/j.jfranklin.2020.12.035&rft_dat=%3Cproquest_cross%3E2519432222%3C/proquest_cross%3E%3Cgrp_id%3Ecdi_FETCH-LOGICAL-c343t-1776c2ced46cc12075d4f9a53c2204f8c7e9cde32a19ccf3841d15d7fa9766c93%3C/grp_id%3E%3Coa%3E%3C/oa%3E%3Curl%3E%3C/url%3E&rft_id=info:oai/&rft_pqid=2519432222&rft_id=info:pmid/&rfr_iscdi=true |