5 Secure_LeaderFollower_Formation_Control_of_Networked_Mobile_Robots_Under_Replay_Attacks
5 Secure_LeaderFollower_Formation_Control_of_Networked_Mobile_Robots_Under_Replay_Attacks
1551-3203 © 2023 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission.
See https://www.ieee.org/publications/rights/index.html for more information.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
4150 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 20, NO. 3, MARCH 2024
network-induced delays. dius; hi denotes the half distance between MRi ’s two actu-
2) Distinct from the replay attack models in [18], [22], and ated wheels; and σiv (t) = (fiv (vi (t), ωi (t)) + r2i dvi (t))/mvi and
[23], where attack detection is not considered, a dedicated σiω (t) = (fiω (vi (t), ωi (t)) + 2h d (t))/mω
ri ω
i i i , with fi (·) and
v
data packet analyzer is proposed for each MR to detect fi (·) being the uncertainties and di (t) and di (t) being the un-
ω v ω
and handle replay attacks simultaneously by verifying the known external disturbances. Denote by pi (t) = [xi (t), yi (t)]T
fresh time stamps attached on the received packets. the position vector of the ith MR.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SECURE LEADER–FOLLOWER FORMATION CONTROL OF NETWORKED MOBILE ROBOTS UNDER REPLAY ATTACKS 4151
are satisfied in the presence of replay attacks, network-induced 2) Design of a Networked Cooperative Kinematic Control
delays, system uncertainties, and external disturbances. Law: At first, we define the cooperative LFF error as
1) The multi-MRs are driven to cooperatively follow the
N
virtual leader with a desired time-varying formation pat-
tern qi (t), i.e., limt→∞ pi (t) − p0 (θ(t)) − qi (t) < 1 , zi (t) = aij (pi (t) − pj (t) − qij (t))
where pi (t) = [xi (t), yi (t)]T and 1 > 0 is a scalar. j=0
2) The derivative of θ(t) converges to a desired speed v0 (t) + ai0 (pi (t) − p0 (θ(t)) − qi (t))
as limt→∞ θ̇(t) − v0 (t) < 2 , where 2 > 0 is a scalar.
where qij (t) = qi (t) − qj (t).
III. MAIN RESULTS Taking the time derivative of zi (t) yields
A. Design of the Desired Secure LFF Control Scheme żi (t) = aςi αi (t) + aςi αei (t) − ai0 pθ0 (t)(v0 (t) − χ(t))
1) Design of an Extended State Observer (ESO): To esti- N N
mate the nonlinear terms σiv (t) and σiω (t), the following ESO is − aij vj (t)Ωj (ψj (t)) − aij q̇ij (t) (4)
constructed: j=1 j=0
⎧
⎪
⎪ v̂˙ i (t) = −ki1 ṽi (t) + σ̂iv (t) + 2m
ri
v ui (t)
v
∂p0 (θ(t))
j=0 aij , p0 (t) = ∂θ(t) , Ωj (ψj (t)) = [cos(ψj (t)),
θ
⎪ v
⎨ i where aςi = N
σ̂˙ i (t) = −ki2 ṽi (t) sin(ψj (t))] , αi (t) = vi (t)Ωi (ψi∗ (t)), and αei (t) = vi (t)
T ∗
˙ (2)
⎪
⎪ω̂i (t) = −ki3 ω̃i (t) + σ̂i (t) + 2hmωi ui (t)
ω ri ω
Ωi (ψi (t)) − vi∗ (t)Ωi (ψi∗ (t)), with vi∗ (t) and ψi∗ (t) being the
⎪
⎩˙ω
σ̂ (t) = −ki4 ω̃i (t)
i commanded surge velocity and heading angle, respectively, and
Ωi (ψi∗ (t)) = [cos(ψi∗ (t)), sin(ψi∗ (t))]T .
where ṽi (t) = v̂i (t) − vi (t), ω̃i (t) = ω̂i (t) − ωi (t), and kin for For t ∈ [tk + τk , tk+1 + τk+1 ) Dk , where τk and τk+1 are
n = 1, 2, 3, 4 are positive scalars. the duration of network-induced delays at instants tk and tk+1 ,
Then, the following observer error system can be derived: respectively, the update law of χ(t) is constructed as
Ėi1 (t) = Ai Ei1 (t) − Bi1 σ̇iv (t) − Bi2 σ̇iω (t) (3) N
χ̇(t) = − μ1 χ(t) + μ2 ai0 (pθ0 (t))T ((1 − γi (t))
where Ei1 (t)=[ṽi (t),σ̃iv (t),ω̃i (t),σ̃iω (t)]T with σ̃iv (t) = σ̂iv (t) −
i=1
σiv (t) and σ̃iω (t) = σ̂iω (t) − σiω (t), Bi1 =[0,1,0,0]
T
, Bi2 =
−ki1 1
[0,0,0,1]T , and Ai =diag {Ai,11 ,Ai,22 } with Ai,11 = −ki2 0 and ×zi (tk ) + γi (t)zi (tk−1 )) , t ∈ Dk (5)
−ki3 1
Ai,22 = −ki4 0 . Given that Ai is a Hurwitz matrix, there is a
positive-definite matrix Pi1 such that ATi Pi1 + Pi1T Ai = −ρi I, where μ1 and μ2 are positive scalars. Meanwhile, the virtual
where ρi > 0 is a scalar. Then, the following lemma is given to control law αi (t) is developed as
analyze the stability of the observer error system (3).
Lemma 1: Given suitable positive scalars ρi and kin for i ∈ αi (t) = a−1
ςi {−Ki1 ((1 − γi (t))zi (tk ) + γi (t)zi (tk−1 ))
VN and n = 1, 2, 3, 4, the observer error system (3) is input-to- N N
state stable (ISS). + aij q̇ij (t) + aij ((1 − γi (t))vj (tk )
Proof: Choose a Lyapunov candidate function as j=0 j=1
V̇io (t) = Ei1 (t)T Pi1 (Ai Ei1 (t) − Bi1 σ̇iv (t) − Bi2 σ̇iω (t)) where Ki1 is a positive controller gain matrix.
Let αi (t) = [αix (t), αiy (t)]T . Then, design ψi∗ (t) and vi∗ (t)
which can be further estimated as as ψi∗ (t) = 2Fi (t)π + atan2(αiy (t), αix (t)), with Fi (t) being an
ρi ρi i integer-valued signal and
V̇io (t) ≤ − (1 − i )Ei1 (t)2 − Ei1 (t)2 + Ei1 (t)
2 2
vi∗ (t) = αi (t) cos ((1 − γi (t))ψi (tk )
× (Pi1 Bi1 |σ̇iv (t)| + Pi1 Bi2 |σ̇iω (t)|)
+γi (t)ψi (tk−1 ) − ψi∗ (t)) , t ∈ Dk . (7)
where 0 < i < 1.
It follows that V̇io (t) ≤ − ρ2i (1 − i )Ei1 (t)2 for any 3) Design of Local Kinetic Control Laws: The design of local
Ei1 (t) ≥ ρi2i (Pi1 Bi1 |σ̇iv (t)| + Pi1 Bi2 |σ̇iω (t)|). kinetic control laws is further divided into two parts: Part i) surge
According to [24, Th. 4.6], it can be concluded that the velocity control law design and Part ii) heading angle control
observer error system (3) is ISS. The proof is completed. law design.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SECURE LEADER–FOLLOWER FORMATION CONTROL OF NETWORKED MOBILE ROBOTS UNDER REPLAY ATTACKS 4153
Part i) Surge velocity control law design: Denoting vie (t) = τ1 (t)))+γi (t)vj (t − τ2 (t))Ωj (ψj (t − τ2 (t))), and p̆θ0 (t)v̆0
v̂i (t) − vi∗ (t), it follows that: (t) = (1−γi (t))pθ0 (t−τ1 (t))v0 (t−τ1 (t))+γi (t)pθ0 (t−τ2 (t))
ri v v0 (t − τ2 (t)).
v̇ie (t) = −ki1 ṽi (t) + σ̂iv (t) + u (t) − v̇ ∗ (t). (8) Based on (4), (8)–(11), and (14)–(16), the following network-
2mvi i
based LFF error system can be derived:
Design the surge velocity control law as ⎧
2 mvi ⎪żi (t) = −K
⎪
⎪ N
i1 z̆i (t) + aςi αei (t) + ai0 δi (t)
uvi (t) = (−Ki2 vie (t) − σ̂iv (t) + v̇i∗ (t)) , t ∈ Dk (9) ⎪
⎪
ri ⎪
⎨ + j=1 aij j (t) + ai0 pθ0 (t)χ(t)
v̇ie (t) = −Ki2 vie (t) − ki1 ṽi (t) (17)
where Ki2 is a positive controller gain. ⎪
⎪
Part ii) heading angle control law design: Denoting ψie (t) = ⎪
⎪ ψ̇ie (t) = −Ki3 ψie (t) + ωie (t) − ω̃i (t)
⎪
⎪
ψi (t) − ψi∗ (t), one has that ψ̇ie (t) = ωi (t) − ψ̇ ∗ (t). Further ⎩
ω̇ie (t) = −Ki4 ωie (t) − ki3 ω̃i (t) + ω̃id (t) − ψie (t)
define ωie (t) = ω̂i (t) − ωi∗ (t), with ωi∗ (t) being designed as
ωi∗ (t) = −Ki3 ψie (t) + ψ̇i∗ (t). It leads to where t ∈ Dk , j (t) = v̆j (t)Ωj (ψ̆j (t)) − vj (t)Ωj (ψj (t)),
δi (t) = p̆θ0 (t)v̆0 (t) − pθ0 (t)v0 (t), and ω̃id (t) = ω̂id (t) − ω̇i∗ (t).
ψ̇ie (t) = −Ki3 ψie (t) + ωie (t) − ω̃i (t) (10) The following lemma is given to analyze the stability of the
where Ki3 is a positive controller gain. LFF error system (17).
Taking the time derivative of ωie (t), we obtain that Lemma 2: Given suitable scalars τ1∗ ≥ 0, Δ̄ > 0, ϕ > 0, γ̄i ∈
∗
[0, 1], βi > 0, μ1 > 0, μ2 > 0, and positive controller gains Kin ,
ω̇ie (t) = −ki3 ω̃i (t) + σ̂iω (t) + uω
i (t)/Υi − ω̇i (t) (11) n = 1, 2, 3, 4, the LFF error system (17) is stochastic ISS if there
where Υi = 2hi mω are positive-definite matrices Wi1 , Qi1 , Qi2 , Ui1 , and Ui2 such
i /ri . Then, we design the following heading
angle control law: that
∗ Θi < 0 ∀ i ∈ VN (18)
i (t) = Υi (−Ki4 ωie (t) − σ̂i (t) + ω̇i (t) − ψie (t))
uω ω
(12)
where t ∈ Dk and Ki4 is a positive controller gain. where
⎡ ⎤
To estimate ω̇i∗ (t), the following second-order tracking dif- Θ11
i 0 0 Θ14i Θ15
i Θ16
i Θ17
i Θ18
i
ferentiator is constructed: ⎢ Θ 22
Θi23
0 0 Θi Θ27
26
Θ28 ⎥
∗ ⎢ i i i ⎥
⎢ Θ33 Θ38 ⎥
ω̂˙ i (t) = ω̂id (t) ⎢ i 0 0 0 0 i ⎥
⎢ Θ44 0 0 0 0 ⎥
ω̂˙ id (t) = −ι2 (ω̂ ∗ (t) − ω ∗ (t)) − 2ιi ω̂id (t) Θi = ⎢
⎢
i ⎥
i i i
⎢ Θ 55
i 0 0 0 ⎥⎥
where ω̂i∗ (t) and ω̂id
∗
(t) are, respectively, the estimates of ωi∗ (t) ⎢ Θ66 0 0 ⎥
⎢ i ⎥
∗
and ω̇i (t); ιi > 0 denotes a tuning parameter. Based on [25], ⎣ Θ77 i 0 ⎦
there exist positive constants ω̄ ∗ and ω̄id ∗
such that |ω̂i∗ (t) − Θ88
i
∗ ∗ ∗ ∗ ∗
ωi (t)| ≤ ω̄ and |ω̂id (t) − ω̇i (t)| ≤ ω̄id .
Then, for t ∈ Dk , (12) can be redesigned as with Θ11 i = Qi1 + Qi2 − 4Ui1 − 4Ui2 , Θi = −2Ui1 , Θi =
14 15
i (t) = Υi (−Ki4 ωie (t) − σ̂i (t) + ω̂id (t) − ψie (t)) . (13)
uω ω
γ̄i )2 Ki1 , Θ23i = −2(γ̄i − γ̄i )Ki1 , Θi = 6Ui1 , Θi = 6Ui2 ,
2 26 27
ously, 0 ≤ τk ≤ τ1 (t) ≤ τ1∗ and 0 < ϕ ≤ τ2 (t) < τ2∗ with τ1∗ = 2βi I.
max{tk } and τ2∗ = Δ̄ + ϕ + τ1∗ . Then, (5)–(7) are converted Proof: See the Appendix.
into The following theorem presents the stability analysis conclu-
sion of the closed-loop control system cascaded by subsystems
N
(3) and (17).
χ̇(t) = − μ1 χ(t) + μ2 ai0 (pθ0 (t))T z̆i (t) (14)
Theorem 1: Consider MR dynamics (1) together with the
i=1
ESO (2), the path regulation law (14), the networked cooperative
kinematic control law (15), the surge velocity control law (9),
αi (t) = a−1
ςi − Ki1 z̆i (t) + ai0 p̆θ0 (t)v̆0 (t) and the heading angle control law (13). The closed-loop control
⎫ system for LFF of multi-MRs is stochastic ISS.
N N ⎬ Proof: By combining [3, Th. 1] and the proofs of Lemmas 1
+ aij q̇ij (t) + aij v̆j (t)Ωj (ψ̆j (t)) (15) and 2 in this article, one can derive that the closed-loop control
⎭ system is stochastic ISS. The detailed proof is omitted here for
j=0 j=1
brevity.
vi∗ (t) = αi (t) cos(ψ̆i (t) − ψi∗ (t)) (16)
for t ∈ Dk , where z̆i (t) = (1 − γi (t))zi (t − τ1 (t))+γi (t)zi C. LFF Control Scheme Implementation Algorithm
(t − τ2 (t)), ψ̆i (t) = (1 − γi (t))ψi (t − τ1 (t)) + γi (t)ψi (t − With the proposed data packet analyzer, the maximum
τ2 (t)), v̆j (t)Ωj (ψ̆j (t)) = (1 − γi (t))vj (t − τ1 (t))Ωj (ψj (t − allowable duration of replay attacks can be recorded as Δ̄,
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
4154 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 20, NO. 3, MARCH 2024
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SECURE LEADER–FOLLOWER FORMATION CONTROL OF NETWORKED MOBILE ROBOTS UNDER REPLAY ATTACKS 4155
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
4156 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 20, NO. 3, MARCH 2024
Fig. 10. LFF errors under replay attacks in the experiment case.
(a) The position errors in the X-axis. (b) The position errors in the Y-axis.
(c) The heading errors.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SECURE LEADER–FOLLOWER FORMATION CONTROL OF NETWORKED MOBILE ROBOTS UNDER REPLAY ATTACKS 4157
V̇zi (t, zi (t)) 0 Ei2 (t)|χ(t)| − 2Ki3 ψie (t) + 2|ψie (t)||ω̃i (t)|
+ 2βi ai0 pθ∗ 2
= 2ziT (t)Wi1 żi (t) + ziT (t)(Qi1 + Qi2 )zi (t) − 2Ki2 vie
2
(t) + 2ki1 |vie (t)||ṽi (t)| + 2ki3 |ωie (t)||ω̃i (t)|
− ziT (t − τ1∗ )Qi1 zi (t − τ1∗ ) − ziT (t − τ2∗ )Qi2 zi (t − τ2∗ ) − 2Ki4 ωie
2
(t) + 2|ωie (t)||ω̃id (t)| − 2χ2 (t)/μ2
+ żiT (t)[(τ1∗ )2 Ui1 + (τ2∗ )2 Ui2 ]żi (t) + ζi1 + ζi2
where pθ∗0 is a bound satisfying p0 (t) ≤ p0 .
θ θ∗
∗ t
∗ t Let j = min{−λmin (Θi1 ), 2Ki2 , 2Ki3 , 2Ki4 , 2/μ2 }, = j −
where ζi1 = −τ1 t−τ1∗ żiT (ϑ)Ui1 żi (ϑ)dϑ and ζi2 = −τ2 t−τ2∗
0 > 0, E2 (t) = col{Ei2 (t)}N , ψe (t) = col{ψie (t)}N ,
2βi ai0 pθ∗
żiT (ϑ)Ui2 żi (ϑ)dϑ. ve (t) = col{vie (t)}N , ωe (t) = col{ωie (t)}N , and Γ(t) =
By using the Wirtinger-based integral inequality, we obtain col{E2 (t), ψe (t), ve (t), ωe (t), χ(t)}. Then, we have
ζi1 ≤ −ΠTi1 Ui1 Πi1 − 3ΠTi2 Ui1 Πi2 and ζi2 ≤ −ΠTi3 Ui2 Πi3 −
3ΠTi4 Ui2 Πi4 , where Πi1 = zi (t) − zi (t − τ1∗ ), Πi2 = zi (t) +
t E V̇e (t, zi (t), ψie (t), vie (t), ωie (t), χ(t))
zi (t − τ1∗ ) − τ2∗ t−τ ∗ zi (ϑ)dϑ, Πi3 = zi (t) − zi (t − τ2∗ ), and
1 1
t
Πi4 = zi (t) + zi (t − τ2∗ ) − τ2∗ t−τ ∗ zi (ϑ)dϑ. ≤ −(1 − ε)Γ(t)2 − εΓ(t)2 + Γ(t)
2 2
Note that E{2(βi żiT (t)+ z̆iT (t))(−Ki1 z̆i (t)+ N j=1 aij j N
⎧ ⎫ (βi + 1)(a∗ςi ¯ i (t) + ai0 δ̄i (t) + aςi αei (t))}, we have E
⎨N ⎬
{V̇e (t, zi (t), ψie (t), vie (t), ωie (t), χ(t))} ≤ −(1 − ε)Γ(t)2 .
× aij ¯ j (t) + ai0 δ̄i (t) + aςi αei (t) + ai0 pθ0 (t)χ(t)
⎩ ⎭ Based on [26, Th. 2], the following inequality can be
j=1
derived: Prob{Γ(t) < κ̄2 (Γ(t0 ), t)+Ξ(t)} ≥ 1−κ, where
where z̄i (t) = (1 − γ̄i )zi (t − τ1 (t)) + γ̄i zi (t − τ2 (t)), ¯ j (t) κ > 0, κ̄2 (·) is a KL function, and Ξ(t) = 2(ε)−1
N
= v̄j (t)Ωj (ψ̄j (t)) − vj (t)Ωj (ψj (t)), and δ̄i (t) = p̄θ0 (t)v̄0 (t) − i=1 Pi2 {i Ei1 (t) + |ω̃id (t)| + (βi + 1)(a∗ςi i (t) +
$
pθ0 (t)v0 (t) with v̄j (t)Ωj (ψ̄j (t)) = (1 − γ̄i )vj (t − τ1 (t))Ωj aςi αei (t) + ai0 δi (t))}, with Pi2 = λmax (Pi2 )/λmin (Pi2 )
(ψj (t − τ1 (t))) + γ̄i vj (t − τ2 (t))Ωj (ψj (t − τ2 (t))) and p̄θ0 (t) and Pi2 = diag{Wi1 , Qi1 , Qi2 , τ1∗ Ui1 , τ2∗ Ui2 , I, (μ1 μ2 )−1 }.
v̄0 (t) = (1 − γ̄i )pθ0 (t − τ1 (t))v0 (t − τ1 (t)) + γ̄i pθ0 (t − τ2 (t)) According to [27, Def. 3], one can conclude that the LFF error
v0 (t − τ2 (t)). system (17) is stochastic ISS. The proof is completed.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
4158 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 20, NO. 3, MARCH 2024
REFERENCES [22] X. Li, X. Xu, L. Chen, H. Zhang, Z. Ju, and W. Guo, “Longitudinal speed
tracking control for an electric connected vehicle with actuator saturation
[1] R. S. Sharma, A. Mondal, and L. Behera, “Tracking control of mobile subject to a replay attack,” Nonlinear Dyn., vol. 111, pp. 1369–1383,
robots in formation in the presence of disturbances,” IEEE Trans. Ind. Jan. 2023.
Inform., vol. 17, no. 1, pp. 110–123, Jan. 2021. [23] W. Xu, J. Kurths, G. Wen, and X. Yu, “Resilient event-triggered con-
[2] B. Ning, Q.-L. Han, Z. Zuo, L. Ding, Q. Lu, and X. Ge, “Fixed-time trol strategies for second-order consensus,” IEEE Trans. Autom. Control,
and prescribed-time consensus control of multi-agent systems and its vol. 67, no. 8, pp. 4226–4233, Aug. 2022.
applications: A survey of recent trends and methodologies,” IEEE Trans. [24] H. K. Khalil, Nonlinear Control. London, U.K.:Pearson Educ., 2015.
Ind. Inform., vol. 19, no. 2, pp. 1121–1135, Feb. 2023. [25] B. Guo and Z. Zhao, “On convergence of tracking differentiator,” Int. J.
[3] N. Gu, Z. Peng, D. Wang, and F. Zhang, “Path-guided containment Control, vol. 84, no. 4, pp. 693–701, Apr. 2011.
maneuvering of mobile robots: Theory and experiments,” IEEE Trans. [26] P. Zhao, W. Feng, and Y. Kang, “Stochastic input-to-state stability of
Ind. Electron., vol. 68, no. 8, pp. 7178–7187, Aug. 2021. switched stochastic nonlinear systems,” Automatica, vol. 48, no. 10,
[4] Q. Zhang, L. Lapierre, and X. Xiang, “Distributed control of coordinated pp. 2569–2576, Oct. 2012.
path tracking for networked nonholonomic mobile vehicles,” IEEE Trans. [27] S.-J. Liu, J.-F. Zhang, and Z.-P. Jiang, “A notion of stochastic input-
Ind. Inform., vol. 9, no. 1, pp. 472–484, Feb. 2013. to-state stability and its application to stability of cascaded stochastic
[5] G. Antonelli, F. Arrichiello, and S. Chiaverini, “Experiments of formation nonlinear systems,” Acta Math. Appl. Sinica, vol. 24, no. 1, pp. 141–156,
control with multirobot systems using the null-space-based behavioral Jan. 2008.
control,” IEEE Trans. Control Syst. Technol., vol. 17, no. 5, pp. 1173–1182,
Sep. 2009.
[6] S.-L. Dai, S. He, X. Chen, and X. Jin, “Adaptive leader-follower for-
mation control of nonholonomic mobile robots with prescribed transient
and steady-state performance,” IEEE Trans. Ind. Inform., vol. 16, no. 6, Zhao-Qing Liu (Graduate Student Member,
pp. 3662–3671, Jun. 2020. IEEE) received the M.Sc. degree in control engi-
[7] Z. Miao, H. Zhong, Y. Wang, H. Zhang, H. Tan, and R. Fierro, “Low- neering from the Jiangsu University of Science
complexity leader-following formation control of mobile robots using only and Technology, Zhenjiang, China, in 2018.
FOV-constrained visual feedback,” IEEE Trans. Ind. Inform., vol. 18, no. 7, He is currently working toward the Ph.D. de-
pp. 4665–4673, Jul. 2022. gree in control science and engineering with
[8] Z. Xu, T. Yan, S. X. Yang, and S. A. Gadsden, “Distributed leader follower the School of Science, Computing and Engi-
formation control of mobile robots based on bioinspired neural dynamics neering Technologies, Swinburne University of
and adaptive sliding innovation filter,” IEEE Trans. Ind. Inform., early Technology, Melbourne, VIC, Australia, and also
access, doi: 10.1109/TII.2023.3272666. with the School of Mechatronic Engineering
[9] X. Ge, Q.-L. Han, X.-M. Zhang, and D. Ding, “Communication resource- and Automation, Shanghai University, Shang-
efficient vehicle platooning control with various spacing policies,” hai, China.
IEEE/CAA J. Autom. Sinica, early access, doi: 10.1109/JAS.2023.123507. His research interests include motion control for unmanned surface
[10] J. Zhang, X. Shao, W. Zhang, and J. Na, “Path-following control capable vehicles and mobile robots, networked control systems, and multiagent
of reinforcing transient performances for networked mobile robots over a systems.
single curve,” IEEE Trans. Instrum. Meas., vol. 72, pp. 1–12, May 2023.
[11] S. J. Yoo and B.-S. Park, “Connectivity preservation and collision avoid-
ance in networked nonholonomic multi-robot formation systems: Uni-
fied error transformation strategy,” Automatica, vol. 103, pp. 274–281, Xiaohua Ge (Senior Member, IEEE) received
May 2019. the Ph.D. degree in computer engineering from
[12] Z. Liu, B. Wu, J. Dai, and H. Lin, “Distributed communication-aware Central Queensland University, Rockhampton,
motion planning for networked mobile robots under formal specifications,” QLD, Australia, in 2014.
IEEE Trans. Control Netw. Syst., vol. 7, no. 4, pp. 1801–1811, Dec. 2020. From 2015 to 2017, he was a Research Fel-
[13] P. Lu, W. Yu, G. Chen, and X. Yu, “Leaderless consensus of ring-networked low with the Griffith School of Engineering, Grif-
mobile robots via distributed saturated control,” IEEE Trans. Ind. Elec- fith University, Gold Coast, QLD. He is cur-
tron., vol. 67, no. 12, pp. 10723–10731, Dec. 2020. rently a Senior Lecturer with the School of Sci-
[14] X.-M. Zhang, Q.-L. Han, and X. Ge, “A novel approach to H∞ perfor- ence, Computing and Engineering Technolo-
mance analysis of discrete-time networked systems subject to network- gies, Swinburne University of Technology, Mel-
induced delays and malicious packet dropouts,” Automatica, vol. 136, bourne, VIC, Australia. His research interests in-
Feb. 2022, Art. no. 110010. clude networked, secure, and intelligent control and estimation theories,
[15] Z. Han, W. Wang, J.-S. Huang, and Z. Wang, “Distributed adaptive forma- and their applications in electric vehicles, intelligent robotic vehicles,
tion tracking control of mobile robots with event-triggered communication connected automated vehicles, intelligent transportation systems, and
and denial-of-service attacks,” IEEE Trans. Ind. Electron., vol. 70, no. 4, so on.
pp. 4077–4087, Apr. 2023. Dr. Ge is an Associate Editor for IEEE TRANSACTIONS ON INDUSTRIAL
[16] X. Ge, Q.-L. Han, Q. Wu, and X.-M. Zhang, “Resilient and safe pla- INFORMATICS, IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS:
tooning control of connected automated vehicles against intermittent SYSTEMS, IEEE TRANSACTIONS ON INTELLIGENT VEHICLES, IEEE TRANS-
denial-of-service attacks,” IEEE/CAA J. Autom. Sinica, vol. 10, no. 5, ACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, and IEEE/CAA
pp. 1234–1251, May 2023. JOURNAL OF AUTOMATICA SINICA.
[17] W. Fu, J. Qin, W. X. Zheng, Y. Chen, and Y. Kang, “Resilient cooperative
source seeking of double-integratormulti-robot systems under deception
attacks,” IEEE Trans. Ind. Electron., vol. 68, no. 5, pp. 4218–4227,
May 2021.
[18] M. Xie, D. Ding, X. Ge, Q. -L. Han, H. Dong, and Y. Song, “Distributed Hao Xie received the B.Eng. degree in robotics
platooning control of automated vehicles subject to replay attacks based on and mechatronics and the Ph.D. degree in con-
proportional integral observers,” IEEE/CAA J. Autom. Sinica, early access, trol science and engineering from the School of
doi: 10.1109/JAS.2022.105941. Software and Electrical Engineering, Swinburne
[19] W. He, W. Xu, X. Ge, Q.-L. Han, W. Du, and F. Qian, “Secure control University of Technology, Melbourne, VIC, Aus-
of multi-agent systems against malicious attacks: A brief survey,” IEEE tralia, in 2019 and 2023, respectively.
Trans. Ind. Inform., vol. 18, no. 6, pp. 3595–3608, Jun. 2022. He is currently an Engineer with the Shanghai
[20] W. H. Ko, B. Satchidanandan, and P. R. Kumar, “Dynamic watermarking- Aerospace Control Technology Institute, Shang-
based defense of transportation cyber-physical systems,” ACM Trans. hai, China, and a Postdoctoral Fellow with the
Cyber-Phys. Syst., vol. 4, no. 1, pp. 1–21, Nov. 2019. School of Automation Science and Electrical
[21] Q. Liu, Y. Mo, X. Mo, C. Lv, E. Mihankhah, and D. Wang, “Secure pose Engineering, Beihang University, Beijing, China.
estimation for autonomous vehicles under cyber attacks,” in Proc. IEEE His research interests include trajectory tracking and cooperative guid-
Intell. Veh. Symp., 2019, pp. 1583–1588. ance of aerial and ground vehicles.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.
LIU et al.: SECURE LEADER–FOLLOWER FORMATION CONTROL OF NETWORKED MOBILE ROBOTS UNDER REPLAY ATTACKS 4159
Qing-Long Han (Fellow, IEEE) received the Yu-Long Wang (Member, IEEE) received the
B.Sc. degree in mathematics from Shandong B.Sc. degree in computer science and tech-
Normal University, Jinan, China, in 1983, and nology from Liaocheng University, Liaocheng,
the M.Sc. and Ph.D. degrees in control engi- China, in 2000, and the M.Sc. and Ph.D. de-
neering from the East China University of Sci- grees in control science and engineering from
ence and Technology, Shanghai, China, in 1992 Northeastern University, Shenyang, China, in
and 1997, respectively. 2006 and 2008, respectively.
He is currently a Pro Vice-Chancellor (Re- He was a Postdoctoral Research Fellow and a
search Quality) and a Distinguished Professor Research Fellow with Central Queensland Uni-
with the Swinburne University of Technology, versity, North Rockhampton, QLD, Australia. He
Melbourne, VIC, Australia. He held various aca- was an Academic Visitor with the University of
demic and management positions with Griffith University, Gold Coast Adelaide, Adelaide, SA, Australia. He was a Professor with the Jiangsu
QLD, Australia, and Central Queensland University, Rockhampton, QLD, University of Science and Technology, Zhenjiang, China. In 2017, he
Australia. His research interests include networked control systems, was appointed as an Eastern Scholar by the Municipal Commission of
multi-agent systems, time-delay systems, smart grids, unmanned sur- Education, Shanghai, China, and joined Shanghai University, Shanghai,
face vehicles, and neural networks. China, where he is currently a Professor. His current research interests
Prof. Han was the recipient of the 2021 Norbert Wiener Award (the include deep reinforcement learning and the motion control for marine
Highest Award in systems science and engineering, and cybernetics) vehicles.
and the 2021 M. A. Sargent Medal (the Highest Award of the Electrical
College Board of Engineers Australia). He was also the recipient of the
IEEE Systems, Man, and Cybernetics Society Andrew P. Sage Best
Transactions Paper Award in 2022, 2020, and 2019, the IEEE/CAA
JOURNAL OF AUTOMATICA SINICA Norbert Wiener Review Award in 2020,
and the IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS Outstanding
Paper Award in 2020. He is a Member of the Academia Europaea (the
Academy of Europe). He is a Fellow of the International Federation
of Automatic Control, the Institution of Engineers Australia, and the
Chinese Association of Automation. He is a Highly Cited Researcher in
both Engineering and Computer Science (Clarivate). He was an AdCom
Member of the IEEE Industrial Electronics Society (IES), a Member of
IEEE IES Fellows Committee, a Member of the IEEE IES Publications
Committee, and the Chair of the IEEE IES Technical Committee on
Networked Control Systems. He is the Editor-in-Chief for IEEE/CAA
JOURNAL OF AUTOMATICA SINICA, the Co-Editor-in-Chief for IEEE TRANS-
ACTIONS ON INDUSTRIAL INFORMATICS, and the Co-Editor for Australian
Journal of Electrical and Electronic Engineering.
Authorized licensed use limited to: NATIONAL INSTITUTE OF TECHNOLOGY CALICUT. Downloaded on January 27,2025 at 19:20:25 UTC from IEEE Xplore. Restrictions apply.