1. Introduction
Over the past decade, a multitude of consensus control algorithms for multi-robot systems (MRS) have emerged, showcasing their effectiveness across diverse domains, such as agriculture, search and rescue, industry, autonomous vehicles, and power grids [
1,
2,
3,
4,
5,
6]. The primary goal of MRS consensus control is to facilitate the convergence of all robots toward a desired state (such as a specific position or heading) while engaging robots in dedicated or shared tasks, including tracking, monitoring, capturing, enclosing, and lifting [
7,
8]. To ensure effective control of MRS, various consensus control techniques have been proposed in the literature. These include behavior-based control, structure-based control, leader–follower control, etc., [
9,
10,
11]. The leader–follower control technique has proven particularly valuable due to its scalability and simplicity. Information exchange between the leader robot and all other robots is crucial for task completion within this control framework.
The exchange of information within the cooperating MRS plays a pivotal role in achieving the desired cooperative consensus objectives [
12]. Typically, wireless networks facilitate intercommunication among robots, allowing them to exchange information such as position, velocity, and heading within an MRS [
13]. Wireless networks introduce various constraints for the robots, including induced delays, parameter uncertainties, and external disturbances [
14,
15]. These delays can significantly impact the performance of MRS and may even lead to instability [
16]. Various techniques can be employed to address the induced constraints posed by wireless networks in multi-agent systems [
17]. Hence, an ideal wireless network for the MRS can be assumed, excluding induced constraints. However, rather than induced constraints, several security considerations can impact the secure transmission of information among the robots [
18]. Thus, designing an appropriate model to mitigate the adverse effects of security concerns on the consensus performance of MRS requires meticulous consideration.
The security concern during the exchange of information among robots is significant and cannot be ignored [
19]. For example, the communication among robots via wireless networks is susceptible to various cyber attacks [
20]. These attacks can be deception attacks [
21], denial of service attacks [
22], replay attacks [
23], or Byzantine attacks [
24]. Among all these attacks, the Byzantine attack stands out as one of the most severe and challenging to detect. It can be described as a situation where certain components of a distributed system have failed. However, identifying these failures remains difficult due to the lack of relevant attack information [
25]. Existing literature highlights that components of individual robots, including actuators, sensors, robot operating systems, and motion controllers, are susceptible to cyber attacks. These vulnerabilities create opportunities for attackers to infiltrate robots, gaining full control and potentially leading to a Byzantine attack within the MRS [
26]. In a cooperative MRS, all robots coordinate with each other. Consequently, if one of the robots falls victim to a Byzantine attack, it can compromise the performance of other robots, potentially leading to a system-wide collapse [
27].
To address security challenges, such as Byzantine attacks on MRS, various control mechanisms have been proposed. One commonly used technique involves applying advanced encryption and authentication methods to safeguard information sharing among robots and verify the identity of each robot [
28]. However, these approaches often overlook the dynamic behavior of individual robots. Consequently, there remains a need for resilient consensus control in MRS when facing Byzantine attacks. While a few control designs have been introduced to address this issue, one notable example is a fuzzy logic-based control technique aimed at countering Byzantine attacks within MRS [
29]. Similarly, to solve the inconsistent and unintended behaviors of the robots in MRS, a blockchain-based leader–follower control mechanism for MRS is proposed [
30]. In addition, to tackle the challenges related to sensed data sharing and energy efficiency in swarm operations for multi-drone collaboration, a secure blockchain-based technique has been proposed to counter Byzantine robots [
31]. In the same way, to address issues related to Byzantine tolerance and decision making under partition tolerance, a distributed control strategy has been devised using IoT and ROS2 [
32]. Likewise, to empower swarm robots in identifying malicious robots and data, a knowledge validation-based algorithm has been proposed that utilizes Hashgraph [
33].
Numerous control methods have been proposed to address the uncertainties and disturbances of the MRS. For example, [
34,
35,
36] worked to focus cyber threats on actuators, sensors, and designed observers, which can monitor the performance of cyber–physical systems in the presence of attacks and external disturbances. All these proposed techniques contributed to solving the issues of cyber–physical systems, but still considerable contributions are required to improve the performance of MRS and solve the consensus problems of MRS. Furthermore, chattering is one of the important crucial problems which needs further improvement. Similarly, a resilient adaptive and distributed control technique for the MRS has been proposed [
37].
The proposed technique maintained the stability of the MRS under sensor attacks and solved the high gain sensitivity problem. The proposed technique is limited to sensor attacks only, but it did not consider the other possible attacks on the MRS, such as reachable robots, root robots, non-root robots, etc. Furthermore, the convergence rate of the proposed technique is low, which can raise concerns about coordination and stability in MRS. Furthermore, a consensus control mechanism for an MRS to minimize the denial-of-service attack effects based on an event-triggered and cooperative localization approach is proposed [
38]. The proposed event-triggered control approach is a decent solution for MRS under attack, but the proposed technique can generate jitters due to variations of updates, which can result in performance degradation and communication delay. Furthermore, the proposed technique cannot solve the Byzantine attack on MRS. Furthermore, a bio-inspired SMC-based formation control and tracking of MRS is proposed in [
39]. The proposed scheme solved the consensus formation of MRS, but the proposed technique lacks in dealing with several constraints, such as misleading data and package loss due to a Byzantine robot. Hence, this conversation leads to the need for a resilient controller to overcome issues.
For the above-mentioned problems, a sliding mode control (SMC) can be the best choice due to its ability to deal with performance issues in finite time intervals. SMC is a well-known and widely used controller for nonlinear control of practical applications due to its strong robustness to interference and uncertainties, such as attacks and speed of response. Similarly, using the SMC method has many other advantages, such as higher precision and perturbation performance compared to asymptotic performance and faster convergence in finite time intervals. Furthermore, SMC has gained tremendous attraction due to its certain benefits while considering the system’s performance in finite time intervals [
40].
The robustness and phase reaching are the prominent issues of MRS in the presence of uncertainties and disturbances due to Byzantine attacks. Hence, a combination of robust techniques with SMC to solve such issues is the conventional method. This paper presents an adaptive sliding mode resilient technique for the consensus control of MRS under Byzantine attack. Compared to existing techniques, the paper’s main contributions are as follows:
First, an investigation of finite-time resilient consensus tracking for MRS is performed. By bounded time derivative of the attack signal, transient performance within a finite time interval is achieved.
Second, an SMC-based resilient consensus control law to analyze finite-time resilient consensus in MRS under Byzantine attacks is developed. Additionally, an observer is integrated into the controller design to track attack effects and mitigate chattering.
Third, an adaptive technique based on integral SMC has been proposed. This technique automatically adjusts the gain to ensure the stability of MRS by minimizing the impact of Byzantine attacks.
Finally, we show that SMC’s data structure can be used for advanced computational algorithms, such as Artificial Intelligence, to identify the events and conditions in the MRS in the context of the Industrial Internet of Things. This is achieved by deriving a computational model of the same problem addressed by the SMC.
The rest of the paper is summarized as follows:
Section 2 presents the problem formulation and attack effects,
Section 3,
Section 4,
Section 5 and
Section 6 presents the design of the control technique,
Section 7 presents the simulation results, and
Section 8 and
Section 9 concludes the paper discussing the data structure and possibilities with Artificial Intelligence.
5. Controller Design
In this section, the proposed integral sliding mode scheme is analyzed to ensure that the MRS remains on a sliding surface even under a Byzantine attack. Additionally, the resilient consensus performance of MRS in the presence of a Byzantine attack is also addressed. Finally, the necessary conditions for designing a controller are given below.
Theorem 1. The consensus control law for the MRS is discussed in Section 4. According to Assumptions 1 and 2, MRS on the sliding mode surface in the finite time should be satisfied. Proof. By taking the derivative of
and combining it with Equation (
9), one can obtain:
where
, and
are the sliding state, updated control law, and attack signal, respectively, which are already defined in the aforementioned sections. Equation (
20) can also be written as:
Let
then Equation (
21) can be modified as:
The Lyapunov function candidate can be created as:
where
.
The derivative of the
can be written as follows:
where
.
Now, by calculating the derivative of the Lyapunov function given in Equation (
23), with system dynamics given in Equation (
22), one obtains:
where
and
are connected to each other based on the Lyapunov equation, given as:
From Equation (
26), the solution
is unique for every
. Thus,
is purely the Lyapunov function.
The inequality given in Equation (
25) can be modified based on the fact that
, given below:
where
. The expression
holds in the light of Lemma 4. Therefore, one can write
□
According to the above discussions, we have . Furthermore, one can verify that and approach zero using Lemma 3 and its equation in the finite time, which is smaller than . Furthermore, because , but .
Remark 1. The Lyapunov function given in Equation (25) is absolutely continuous, but it is not locally Lipschitz on the set , as it includes . This term requires the designed Lyapunov function to be locally Lipschitz different from the typical Lyapunov function. According to Zubov theorem, it is important to have a continuous Lyapunov function. In this section, the analysis of the MRS stability is performed using . It is worth noting that a combination of absolute continuous functions is not always absolute continuous. In the above analysis, is absolutely continuous with the trajectories and it is important to verify it carefully. Furthermore, Theorem 2 is presented below to describe the consensus tracking of MRS under Byzantine attack on the sliding surface.
Theorem 2. MRS operating under a Byzantine attack achieves consensus tracking, as per Assumptions 1 and 2, by maintaining the MRS on the integral sliding mode surface within finite time [40]. Proof. To prove Theorem 2, first, there is a need to choose a suitable Lyapunov function given below:
where
L is Laplacian matrix,
B is the input matrix,
is an identity matrix, and
is a vector associated with robot
i such that
and
.
The derivative of Equation (
29) gives:
where
represents the ratio of odd positive numbers, i.e.,
. Furthermore,
and
.
From Lemma 3, it is clear that
approaches to 0 in fixed time. Therefore, settling time can be written as:
□
Thus, and . Hence, the consensus performance of MRS under a Byzantine attack can be assured at a specific time.
Remark 2. Since it is already assumed that , , therefore, represent the control of the MRS attack with and . It is also worth mentioning that if the term , then the control acts as an attack observer, i.e., .
6. Consensus Control of a Multi-Robot System with an Attack Observer
Sometimes, it is very difficult to obtain a bond between malicious information (attack) and topology information, especially in the case of a Byzantine attack, where an attacker is an authenticated robot of the MRS. Furthermore, to ensure the adaptive consensus performance, a large switching gain ∇ is selected, because it will create the actuator’s critical chattering and high energy consumption in practical situations. Chattering in the actuator can be raised through friction. Therefore, to analyze this phenomenon developed through
and
are selected positive. The limited growth of the switching gain can be prevented through a term
. First, an attack observer is presented to estimate the attacks on the MRS. The dynamics of the attack observer can be written as:
where
and
represent the attack, observer’s internal state, and observer gain, respectively. Using this attack observer, one can get:
where
, where
. From the arguments for stability in input states, the condition
holds true after an adequately long time.
Second, the control law contains discontinuous dynamics, which may result in chattering, poor MRS performance, and the life of the actuator can even be shortened. Therefore, it is important to consider continuous dynamics while designing an adaptive consensus law in the presence of attacks, written as:
Therefore, to minimize the attack effects, an adaptive resilient sliding mode controller is designed given below
The states of the MRS remain sliding on the resilient sliding mode, i.e.,
. If
, which means that:
Thus, a resilient consensus control mechanism can be modeled as follows:
where
Furthermore, Theorem 3 is given below to discuss the adaptive sliding mode control law of MRS under Byzantine attacks.
Theorem 3. Suppose that Assumptions 1 and 2 are true, then the consensus control issue of MRS in the presence of a Byzantine attack with resilient control technique can be resolved by using continuous adaptive sliding mode control law [40]. Proof. To prove this theorem, the first derivative of Equation (
34), i.e., sliding surface
, is calculated. Thus, the candidate of the Lyapunov function can be written as:
where the upper bound of the
is represented by
. Moreover,
is considered to be
.
Now, by calculating the differential of the
with consensus control trajectory given in Equation (
12) gives:
□
Case 1:
Since:
where
.
Case 2: If
Since , therefore, it is easy to understand that attains the highest value when . Hence, one can obtain here .
Case 3: If
for some robots of the network, then
for some remaining robots of network. Similarly, one can obtain as given below:
where
Based on the above discussion, the below given expression is verifiable for any
such that:
where
.
Based on the above cases, the boundary layer can be reached in a finite time in the designed sliding surface.
The below given Theorem 4 is being presented for the adaptive resilient consensus control of MRS using directed communication topology under attack.
Theorem 4. Let MRS follow a directed communication topology. The resilient consensus problem of MRS under Byzantine attack can be solved by proposing a continuous adaptive sliding mode controller and nominal protocol [40]. Proof. Using Theorem 2, a suitable Lyapunov function can be constructed as follows:
By using expression in Equation (
42), one can rewrite
as follows:
where
and
. One can get
.
If
, one gets:
Then, the bounded limit of
.
If
one gets:
Therefore, it is verifiable that
Hence, it is concluded that and adaptive consensus control of MRS under Byzantine attack using sliding mode control protocol can be assured. If , then MRS can reach to the set of trajectories . □
Remark 3. The parameter ε affects the reaction time of the adaptive gain for the proposed SMC technique. The value of the parameters ℶ and ρ are kept small to boost the tracking performance. Although a small value of ℶ may lead to chattering effects due to the presence of time delays. The proposed work is chattering-free due to the continuous integral sliding mode controller rather than a discontinuous controller. Furthermore, the proposed technique is independent of communication topology and attack effect on the MRS due to the adaptive mechanism.
7. Simulation
This section presents the effectiveness of the proposed mechanism in ensuring adaptive, resilient consensus control of MRS in the presence of a Byzantine attack. To verify the proposed model, consider a communication topology of the five cooperating robots, as shown in
Figure 1. According to
Figure 1, Robot 1 serves as the root (leader) robot, while the remaining four robots function as non-root (leader–follower) robots. Let us borrow the dynamics of the MRS from [
34], given as:
The diagonal and Laplacian matrices, based on the communication topology as depicted in
Figure 1, can be expressed as follows:
An adaptive, resilient control scheme for the MRS under a Byzantine attack is designed by choosing the parameters, given as , , , , , , , and . Furthermore, a step signal is regarded as an attack signal in MRS due to its simplicity of implementation. Let the initial state trajectories of the MRS under Byzantine attack be at to design an adaptive and resilient consensus controller.
In
Figure 2, the performance of the MRS is observed in the absence of attacks, where all signals converge to the consensus state. Specifically,
Figure 2a demonstrates that MRS successfully achieves consensus, with all state values converging towards the desired input state. This result validates that MRS, employing a resilient SMC, achieves consensus and corroborates the findings presented in Theorem 1. Similarly,
Figure 2b shows the error signal of the MRS.
Let us consider a scenario where the MRS is subjected to a Byzantine attack. In such a situation, the collaborating MRS cannot attain a consensus state, as in
Figure 3. Specifically,
Figure 3a shows random ripples in the response, indicating instability due to Byzantine attacks.
Figure 3b plots the error signal of MRS under a Byzantine attack.
Figure 4 depicts that the MRS is prevented from phase reaching in the presence of Byzantine attacks and boosts the robustness. Particularly,
Figure 4a illustrates the response of MRS under a Byzantine attack. It is observed that during a brief interval, the collaboration or communication among the robots is disrupted, resulting in spikes in the MRS response. However, after this transient disturbance, all the robots eventually converge to the desired input state. This observation underscores the effectiveness of the resilient, adaptive SMC technique. Furthermore,
Figure 4b shows the error signal of stable MRS in the presence of a Byzantine attack.
While the proposed technique demonstrates adaptability and robustness for MRS under attack, it is essential to consider the leader–follower topology. In this configuration, an attacker could potentially target the root robot, non-root robots, or any reachable robot within the MRS.
In accordance with
Section 2, an MRS comprises a collaboration of
n robots with a leader–follower communication topology. Consequently, an attacker can launch attacks on both the root robot and non-root robots within the MRS. Furthermore, the attacker can exploit reachable robots to execute attacks. Therefore, it becomes crucial to assess the performance of the proposed resilient, adaptive control mechanism under such scenarios.
Figure 5,
Figure 6 and
Figure 7 shows the response of MRS under Byzantine attack on the root robot, non-root robot, and reachable robot. It is easy to validate that although attacks impacted the performance of MRS, i.e., spikes in the response of MRS for a short interval; after that, MRS achieved the input state.
According to simulation results, one can verify that the proposed control technique verifies the Theorems 1 and 2 to provide consensus tracking within finite time tracking. Furthermore, the proposed technique provides a consensus control, which is resilient for the MRS under Byzantine attacks and independent of communication topology, according to Theorems 3 and 4. Therefore, it is easy to say that MRS achieves consensus despite Byzantine attacks on different robots using resilient, adaptive sliding mode controllers in a finite time.
9. Future Applications with Discrete Event Systems and Artificial Intelligence
The proposed control strategy is resilient enough against the Byzantine attacks on the MRS and provides robust performance of the MRS. However, the real-time tracking of the performance of MRS, as given in Equation (
1), can be ensured through intelligent techniques, such as digital twin, machine learning, deep learning, reinforcement learning, etc. For example, the resilience of MRS against cyber attacks such as Byzantine attacks can be increased through IoT-based digital twin technology.
Regarding operation, the above MRS can be viewed as a Discrete Event System (DES). Each robot in the system uses a microcontroller with an expected range of state spaces and the change of the states. Suppose that the IIoT (Industrial Internet of Things) devices contain a controller that generates control instructions for the machine to change its state or orientation. There can be multiple controllers within an IIoT system, and they can be operated cooperatively. For example, in the MRS, controllers are responsible for deciding how much power is supplied to a particular robot within an MRS, depending on its task type. Similarly, the allocation of a task to the robot in an MRS is also controlled by the controller based on time consumption or other factors. Every time an MRS receives a control signal, the state also changes with time. Therefore, the change of state space or orientation in an MRS can be derived from Equations (
1) and (
11) as:
where
A represents the state of the MRS evolving with the change in time
T,
X is the input state vector at a particular time,
B contains the controlled inputs (generated by the controllers),
U is the desired input value, and
C is the output matrix used to represent how
X contributes to the system’s output.
Based on state space relation, the data of any IIoT system having a complex control system can be represented through the data given below in
Table 2.
This is an equivalent rendering of the data in
Table 1 concerning the state space of a particular device in the IIoT system. Here:
represent the states of the IIoT system, which changes with respect to the time
. Hence, it is clear that these data are used to make decisions, such as predictions of the current state, future state, and performance, or it can be used for other operations. An MRS can perform a task
at a given time
t.
contains a set of states {
} as defined by the state of the actuators
m. A set of
with size
may be followed by another set of time-bound
states. Each of these time-bound sets of
is non-time-bound with respect to each other.
Every time a machine receives a control signal, the state is expected to change. After getting data matrices representing the state of at every interval, it can be fed into machine learning or any other intelligent algorithm to predict the expected future states with decreasing order of probabilities. This can be compared to the current state information to determine whether it has fulfilled the required conditions at the current time. The data can be analyzed using a machine learning algorithm that can be useful to establish an autonomous system, which can further predict the machine’s performance, future possible failure, possible solutions to faults, attacks, etc. Based on the above explanation, future research can investigate the following:
- (1)
In the case of the complex IIoT control system, we can design a ‘
model’ with the help of intelligent schemes such as Artificial Intelligence/Machine learning/Deep Reinforcement Learning. Given that the control systems’ architecture is fixed but
unknown, a behavioral model of the devices must be created. Training of the
Neural Network can be completed based on the set of
, which can be used to classify the current state
and predict the future states, i.e.,
, as shown in
Figure 8.
- (2)
It can also be used to classify
faults or
errors, i.e.,
, an IIoT system faces with minimal supervisory data and training. In designing such a device, suppose a closed-loop feedback complex IIoT system that uses its feedback information to diagnose the variations and faults, as shown in
Figure 8. A controller can be designed to ensure adaptive stability if the IIoT system contains faults due to internal or external disturbance (communication and induced delays, cyber attacks). A method can be developed based on recurrent neural networks (RNN) and SMC to measure the expected model’s variations based on the system’s known control state space.
- (3)
The architecture of the IIoT system is based on IoT, and it is changing periodically due to the evolution of advanced technologies used to implement it. Therefore, IIoT systems often inherit the security challenges of IoT. Since IIoT systems are desired to be distributed rather than centralized, they are vulnerable to certain cyber attacks such as DoS attacks, deception attacks, Byzantine attacks, false data injection attacks, etc. Hence, there is a requirement to consider such attacks carefully. For this, a model can be designed to detect the attacks and types of attacks and minimize the attack effects.
Figure 8.
RNN- and SMC-based closed-loop feedback control mechanism for an IIoT system.
Figure 8.
RNN- and SMC-based closed-loop feedback control mechanism for an IIoT system.
9.1. Example Applications 1—Detecting Network Attacks
The proposed techniques will be able to detect the type of Byzantine attack on IIoT systems. For example, in the case of MRS, whether attacks are either root robot or non-root or the whole MRS is under attack, whenever the attack is detected, an observer algorithm based on a what-if state can be deployed to take corrective actions to ensure seamless and safe MRS operations. Furthermore, digital twins can present a constructible active model for communicating between the attackers and the defense technique.
For creating a digital twin and processing the data stream in real-time, the computational algorithms need the condition of the MRS as a set of matrices or similar data structures. These can be used with existing machine learning and deep learning algorithms for behavior modeling or state space modeling of the MRS. The mathematical modeling of MRS in terms of digital twins is given below.
According to Equations (
1) and (
2), the state space representations of the physical thing of MRS can be written as:
where
and
denote the states and input to the physical MRS, respectively.
The attack signal, given in Equation (
5), on the physical MRS, can be represented as a feature vector at time t:
Similarly, state space representations of cyber MRS can be written as:
where
is used to represent cyber things. Furthermore,
and
denote the states and input to the cyber MRS, respectively.
The attack on the cyber MRS can be written as:
Based on Equations (
48) and (
50), the hybrid MRS model to represent the overall behavior of MRS can be represented as:
These can be streamed in real time and sampled or batched for further processing. Such batches can be used to train a model based on existing data on the MRS performance and known deviations. A deviation beyond an acceptable threshold can be used to classify the current and future state of the MRS in a desired future time frame.
Equation (
52) can be used to monitor the performance of MRS due to the sharing of information between physical things and cyber things in the hybrid model. Any anomaly in the MRS can be detected very easily using digital twin technology. Therefore, more accurate and safer MRS operations can be ensured than other conventional techniques. Furthermore, the performance of the MRS will also be increased due to the corrective actions in the presence of anomalies such as Byzantine attacks. Furthermore, it is known that a Byzantine robot is hard to identify. Therefore, a digital twin for resilient control of MRS in the presence of a Byzantine attack can be a very useful technique.
Similarly, the proposed work can be extended using AI-based algorithms. In this work, a supervisory robot
can be well-trained using recorded information of Equations (
1), (
2), and (
5). The trained supervisory robot
will be placed at the top of the other five robots, as shown in
Figure 9. If the supervisory robot
is well trained, then it can be used to detect and prevent the attack from happening based on Equation (
5). For example, if the supervisory robot can detect that an attack has started to occur. Then, it can prevent the attack effects by notifying all the other robots that an attack has happened to come to the default state, e.g., reboot. This can be achieved by classification of data obtained through Equations (
1), (
2), and (
5).
9.2. Example Applications 2—Comparative Digital Twins
Let us consider a developer company that manufactures high-cost equipment and sells it to many users. The device has a high level of flexibility in usage. This means the device can be used in a variety of ways, i.e., flexible in state space. Typically, the manufacturer has no direct control over the device after the device is installed. If the manufacturer wants to monitor the device in real time, it can create a comparative digital twin to monitor and analyze the use of devices by different customers. In this way, the manufacturer will be able to determine the reasons for the customer’s device performance degradation at various rates concerning time between multiple users. Using the proposed outcomes and artifacts of the above research, the developer can compare the different users (human or master devices) using the same or similar devices and potentially suggest factors of what a user/customer did incorrectly, causing their devices to break down earlier compared to others. The proposed research outcomes will play an important role in Industry 5.0 practices. It can enable human users to adopt machine technology or autonomous systems and quickly set up their business aims.