Next Article in Journal
Optimization Method of Sheet Metal Laser Cutting Process Parameters under Heat Influence
Previous Article in Journal
Design and Analysis of a Moment of Inertia Adjustment Device
Previous Article in Special Issue
Reinforcement Learning-Based Dynamic Zone Positions for Mixed Traffic Flow Variable Speed Limit Control with Congestion Detection
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things

School of ICT, University of Tasmania, Invermay 7248, Australia
*
Author to whom correspondence should be addressed.
Machines 2024, 12(3), 205; https://doi.org/10.3390/machines12030205
Submission received: 29 January 2024 / Revised: 12 March 2024 / Accepted: 14 March 2024 / Published: 20 March 2024
(This article belongs to the Special Issue Optimization and AI of Autonomous Multi-Agents)

Abstract

:
In this paper, an adaptive and resilient consensus control mechanism for multi-robot systems under Byzantine attack, based on sliding mode control, is proposed. The primary aim of the article is to develop a finite-time consensus control strategy even in the presence of a Byzantine attack. In the start, a finite-time consensus control mechanism is proposed to identify the essential conditions required for ensuring consensus accuracy in multi-robot systems, even when faced with Byzantine attacks using Lyapunov theory. Subsequently, a sliding mode control is combined with an adaptive technique for multi-robot systems that lack prior knowledge of Byzantine attack. Later, an attack observer is proposed to estimate the performance of multi-robot systems in the presence of a Byzantine attack. Additionally, chattering effects are mitigated by employing integral sliding mode control. As a result, resilient consensus performance of multi-robot systems can be achieved in a finite time interval. A simulation example is also presented to validate the effectiveness of the proposed model. Furthermore, we delve into the data structure of the proposed method and explore its integration with Artificial Intelligence for seamless incorporation into the Industrial Internet of Things applications.

1. Introduction

Over the past decade, a multitude of consensus control algorithms for multi-robot systems (MRS) have emerged, showcasing their effectiveness across diverse domains, such as agriculture, search and rescue, industry, autonomous vehicles, and power grids [1,2,3,4,5,6]. The primary goal of MRS consensus control is to facilitate the convergence of all robots toward a desired state (such as a specific position or heading) while engaging robots in dedicated or shared tasks, including tracking, monitoring, capturing, enclosing, and lifting [7,8]. To ensure effective control of MRS, various consensus control techniques have been proposed in the literature. These include behavior-based control, structure-based control, leader–follower control, etc., [9,10,11]. The leader–follower control technique has proven particularly valuable due to its scalability and simplicity. Information exchange between the leader robot and all other robots is crucial for task completion within this control framework.
The exchange of information within the cooperating MRS plays a pivotal role in achieving the desired cooperative consensus objectives [12]. Typically, wireless networks facilitate intercommunication among robots, allowing them to exchange information such as position, velocity, and heading within an MRS [13]. Wireless networks introduce various constraints for the robots, including induced delays, parameter uncertainties, and external disturbances [14,15]. These delays can significantly impact the performance of MRS and may even lead to instability [16]. Various techniques can be employed to address the induced constraints posed by wireless networks in multi-agent systems [17]. Hence, an ideal wireless network for the MRS can be assumed, excluding induced constraints. However, rather than induced constraints, several security considerations can impact the secure transmission of information among the robots [18]. Thus, designing an appropriate model to mitigate the adverse effects of security concerns on the consensus performance of MRS requires meticulous consideration.
The security concern during the exchange of information among robots is significant and cannot be ignored [19]. For example, the communication among robots via wireless networks is susceptible to various cyber attacks [20]. These attacks can be deception attacks [21], denial of service attacks [22], replay attacks [23], or Byzantine attacks [24]. Among all these attacks, the Byzantine attack stands out as one of the most severe and challenging to detect. It can be described as a situation where certain components of a distributed system have failed. However, identifying these failures remains difficult due to the lack of relevant attack information [25]. Existing literature highlights that components of individual robots, including actuators, sensors, robot operating systems, and motion controllers, are susceptible to cyber attacks. These vulnerabilities create opportunities for attackers to infiltrate robots, gaining full control and potentially leading to a Byzantine attack within the MRS [26]. In a cooperative MRS, all robots coordinate with each other. Consequently, if one of the robots falls victim to a Byzantine attack, it can compromise the performance of other robots, potentially leading to a system-wide collapse [27].
To address security challenges, such as Byzantine attacks on MRS, various control mechanisms have been proposed. One commonly used technique involves applying advanced encryption and authentication methods to safeguard information sharing among robots and verify the identity of each robot [28]. However, these approaches often overlook the dynamic behavior of individual robots. Consequently, there remains a need for resilient consensus control in MRS when facing Byzantine attacks. While a few control designs have been introduced to address this issue, one notable example is a fuzzy logic-based control technique aimed at countering Byzantine attacks within MRS [29]. Similarly, to solve the inconsistent and unintended behaviors of the robots in MRS, a blockchain-based leader–follower control mechanism for MRS is proposed [30]. In addition, to tackle the challenges related to sensed data sharing and energy efficiency in swarm operations for multi-drone collaboration, a secure blockchain-based technique has been proposed to counter Byzantine robots [31]. In the same way, to address issues related to Byzantine tolerance and decision making under partition tolerance, a distributed control strategy has been devised using IoT and ROS2 [32]. Likewise, to empower swarm robots in identifying malicious robots and data, a knowledge validation-based algorithm has been proposed that utilizes Hashgraph [33].
Numerous control methods have been proposed to address the uncertainties and disturbances of the MRS. For example, [34,35,36] worked to focus cyber threats on actuators, sensors, and designed observers, which can monitor the performance of cyber–physical systems in the presence of attacks and external disturbances. All these proposed techniques contributed to solving the issues of cyber–physical systems, but still considerable contributions are required to improve the performance of MRS and solve the consensus problems of MRS. Furthermore, chattering is one of the important crucial problems which needs further improvement. Similarly, a resilient adaptive and distributed control technique for the MRS has been proposed [37].
The proposed technique maintained the stability of the MRS under sensor attacks and solved the high gain sensitivity problem. The proposed technique is limited to sensor attacks only, but it did not consider the other possible attacks on the MRS, such as reachable robots, root robots, non-root robots, etc. Furthermore, the convergence rate of the proposed technique is low, which can raise concerns about coordination and stability in MRS. Furthermore, a consensus control mechanism for an MRS to minimize the denial-of-service attack effects based on an event-triggered and cooperative localization approach is proposed [38]. The proposed event-triggered control approach is a decent solution for MRS under attack, but the proposed technique can generate jitters due to variations of updates, which can result in performance degradation and communication delay. Furthermore, the proposed technique cannot solve the Byzantine attack on MRS. Furthermore, a bio-inspired SMC-based formation control and tracking of MRS is proposed in [39]. The proposed scheme solved the consensus formation of MRS, but the proposed technique lacks in dealing with several constraints, such as misleading data and package loss due to a Byzantine robot. Hence, this conversation leads to the need for a resilient controller to overcome issues.
For the above-mentioned problems, a sliding mode control (SMC) can be the best choice due to its ability to deal with performance issues in finite time intervals. SMC is a well-known and widely used controller for nonlinear control of practical applications due to its strong robustness to interference and uncertainties, such as attacks and speed of response. Similarly, using the SMC method has many other advantages, such as higher precision and perturbation performance compared to asymptotic performance and faster convergence in finite time intervals. Furthermore, SMC has gained tremendous attraction due to its certain benefits while considering the system’s performance in finite time intervals [40].
The robustness and phase reaching are the prominent issues of MRS in the presence of uncertainties and disturbances due to Byzantine attacks. Hence, a combination of robust techniques with SMC to solve such issues is the conventional method. This paper presents an adaptive sliding mode resilient technique for the consensus control of MRS under Byzantine attack. Compared to existing techniques, the paper’s main contributions are as follows:
  • First, an investigation of finite-time resilient consensus tracking for MRS is performed. By bounded time derivative of the attack signal, transient performance within a finite time interval is achieved.
  • Second, an SMC-based resilient consensus control law to analyze finite-time resilient consensus in MRS under Byzantine attacks is developed. Additionally, an observer is integrated into the controller design to track attack effects and mitigate chattering.
  • Third, an adaptive technique based on integral SMC has been proposed. This technique automatically adjusts the gain to ensure the stability of MRS by minimizing the impact of Byzantine attacks.
  • Finally, we show that SMC’s data structure can be used for advanced computational algorithms, such as Artificial Intelligence, to identify the events and conditions in the MRS in the context of the Industrial Internet of Things. This is achieved by deriving a computational model of the same problem addressed by the SMC.
The rest of the paper is summarized as follows: Section 2 presents the problem formulation and attack effects, Section 3, Section 4, Section 5 and Section 6 presents the design of the control technique, Section 7 presents the simulation results, and Section 8 and Section 9 concludes the paper discussing the data structure and possibilities with Artificial Intelligence.

2. Mathematical Preliminaries

Consider a graph G consisting of n number of coordinating robots such that G = { V , E , A } , where V = { 1 , 2 , 3 , , n } and E V × V represents the vertices and edges of the graph, respectively. Suppose an undirected path from robot i to robot j such that the path consists of a successive sequence of edges, which can be denoted as ( V i , V j ) , ( V k , V l ) , , ( V i , V j ) . Let A be n × n adjacency matrix, which is also a diagonal matrix, can be written as A = 1 , if ( V i , V j ) E 0 , otherwise and A = [ a i j ] n × n . Similarly, the degree matrix D = { d i j } is a diagonal matrix such that the degree of the i t h robot is represented by d i j . Furthermore, consider a semi-positive and symmetric definite matrix denotes the Laplacian matrix L of the graph G, where L = D A and L = [ l i j ] n × n . If j i , l i j = a i j ; otherwise , l i j = j = 1 n a i j [3].
Let r 0 be the leader robot and the remaining r 1 , r 2 , , r n the follower robots in the MRS. Then, the role of the leader robot is to send and receive information to some of the follower robots. In other words, the leader robot does not need to receive information from all followers. Suppose a connection weight q i is used between the sender and follower robots such that q i > 0 , if the information is received by i t h follower robot from the leader robot; otherwise, q i = 0 [9].

3. Problem Formulation

Suppose MRS consists of n cooperating robots, then the dynamics of each robot can be written as:
y i ˙ ( t ) = u i ( t ) + f i ( t ) ,
where u i ( t ) , y i ( t ) , and f i ( t ) denote the control input, state of the i t h follower robot, and attack signal on the i t h follower in the MRS, respectively.
Similarly, the dynamics of the leader robot in the MRS can be written as:
y ˙ 0 ( t ) = u 0 ( t ) ,
where u 0 ( t ) and y 0 ( t ) denote the control input and state of the leader robot, respectively.
Then, an error y ¯ i ( t ) between the leader and follower robots can be represented as y ¯ i ( t ) = y i ( t ) + y 0 ( t ) + R i , where R i denote deviation of state between the leader robot and follower robots.

3.1. Attack on the Multi-Robot System

This section describes the modeling and analysis of an attack on MRS.

3.1.1. Attack Modeling

In this section, modeling of the attack on the MRS has been presented. Specifically, the MRS under actuator attack can be expressed as:
u i c ( t ) = u i ( t ) + α i u i a ( t ) ,
where u i ( t ) , u i c ( t ) , and u i a ( t ) represent the control input, corrupted control input, and attack signal. Similarly, α i denotes the binary constant such that if α i = 1 , then i t h robot of MRS is under actuator attack; otherwise, α i = 0 . Furthermore, MRS under sensor attack can be written as:
y i c ( t ) = y i ( t ) + β i y i a ( t ) ,
where y i ( t ) , y i c ( t ) and y i a ( t ) represent the nominal state, corrupted state, and attack signal. Furthermore, β i is a binary constant such that if β i = 1 , then i t h robot of MRS is under sensor attack; otherwise, β i = 0 .
According to Equations (3) and (4), the overall attack effects on the i t h robot of MRS can be written as:
f i ( t ) = α i u i a ( t ) + c k n i a i j ( β j y j a ( t ) β i y i a ( t ) ) ,
where y i a ( t ) and u i a ( t ) represent the attack signals into the sensor and actuator, respectively, and y j a ( t ) represents the attack signals injected into the neighborhood j of the robot i. Similarly, c , k , and a i j represent the scalar gain, feedback gain, and ( i , j ) adjacency of the adjacency matrix A, respectively.
Based on the above discussion, attacks on the MRS can be divided into two types, such as Byzantine attack and non-Byzantine attack. In a Byzantine attack, a trusted robot that has successfully passed all verification and authentication processes turns out to be rogue. In such a scenario, the rogue robot can easily launch an attack on the MRS, affecting functionalities, such as destabilization and performance degradation [29]. This type of attack can be designed as follows:
f ˙ i ( t ) = σ f i ( t ) ,
where σ R , which can be used to design all types of attack which are not in the form of Equation (6), written as:
Δ = { λ 1 ( σ ) , λ 2 ( σ ) , , λ n ( σ ) } ,
where λ i ( σ ) denotes the set of eigenvalues of the attack signal generator dynamics σ .
Definition 1.
A robot is said to be a compromised robot if it is under the influence of attacks, represented by n c o m ; otherwise, it is called an intact robot, represented as n i n t , i.e., = n / n c o m [3].
Definition 2.
A robot i is called reachable to robot j if and only if there exists a path between them in the graph, such that v v = [ v v 1 , v v 2 , , v v n ] , such that a j v v 1 , a j v v 2 , . . . , a j v v n 0 [3].

3.1.2. Attack Analysis

This section provides an analysis of the Byzantine attacks on the MRS based on graph theory. Certain lemmas and notations are used for this purpose.
Suppose L denotes the partitioned Laplacian graph, written as:
L = L r × r 0 r × n r L n r × r L n r × n r ,
where r and n r denote the root and non-root robots of the MRS. Similarly, L r × r and L n r × n r matrices denote the root robot and non-root robots of the subgraph.
Lemma 1, given below, can be used to prove that local neighborhood error tracking converges to zero and the MRS ensures the resilient consensus despite Byzantine attack.
Lemma 1.
Consider a Laplacian matrix L, as given in Equation (8), then L r × r and L n r × n r denotes the singular M-matrix and non-singular M-matrix, respectively, [41].
Similarly, the following given Lemma 2 is used to derive the necessary consensus condition of MRS.
Lemma 2.
The resilient consensus control of MRS in the presence of attacks can be ensured if the following conditions are fulfilled [40]:
u ¯ i ( t ) nor = Y i ζ ( t ) ,
where ζ denotes the ratio of odd numbers such that ζ ( 0.5 , 1 ) . Suppose a scalar ξ i > 0 and number of neighbouring robots r i of any i t h robot where r i [ 1 , n ] , then Y i ( t ) can be modeled as follows:
Y i ( t ) = ξ i r i + 1 j n i b i j y i ( t ) y 0 ( t ) + R i ( y j ( t ) y 0 ( t ) + R i ) + a i j ( y i ( t ) y 0 ( t ) + R i ) = ξ i r i + 1 j n i b i j ( y ¯ i ( t ) y ¯ j ( t ) ) + a i j y ¯ i ( t ) .
Lemma 3.
Suppose a linear MRS whose state space representation is written as:
y ˙ ( t ) = g ( x , t ) , g ( 0 , t ) = 0 ,
where y R n . Let O ( x ) > 0 be a continuously differentiable function, which can be defined in the locality of root such that two real numbers must meet a ( 0 , 1 ) and c > 0 . Then, origin stabilization in the MRS can be guaranteed in the settling time if the function O ( x ) verifies O ˙ ( x ) c O ( x ) a [40].
One can calculate the upper bound value of the settling time of the following:
T O 1 a c 1 a .
Lemma 4.
For y i R , π ( 0 , 1 ] , then ( i = 1 n | y i | ) π ( i = 1 n | y i | π ) [40].
Assumption 1.
Suppose a positive scalar μ i and attack signal f i ( t ) of the follower robots, which satisfies f ˙ i ( t ) μ i .
Assumption 2.
Suppose graph G has a directed spanning tree and directed communication topology with a leader robot at the root.

4. Continuous-Sliding-Mode-Based Consensus

This section provides a control law for the MRS under Byzantine attack based on continuous-sliding-mode-based consensus.

4.1. Sliding Mode Control

The design procedure of SMC includes switching surface and control law. The switching surface is designed through a linear combination of state variables, whereas the control law involves the design of a suitable control law. The switching surface is crucial to classifying the SMC techniques into lower or higher orders. The conventional first-order sliding surface of the first-order SMC technique can be defined as:
S ( t ) = { y ( t ) R n : s ( t ) = 0 } ,
where y ( t ) R n denotes the state vector and s ( t ) = 0 shows that the sliding surface trajectory is obeyed. The control law of the first-order SMC scheme can be written as:
u ( t ) = u e ( t ) + u d ( t ) ,
where u e ( t ) and u d ( t ) define linear or equivalent control and nonlinear or discontinuous control parts, respectively. The goal of the discontinuous part is to move the state trajectories near to switching surface. Therefore, for an ideal sliding motion, the linear control and nonlinear control become s ˙ ( y ( t ) , u ( t ) , y ( t ) ) | u ( t ) u e ( t ) = 0 , and u d ( t ) = k s i n ( s ) .
Higher-order SMC is used to increase the tracking accuracy of switching surface under sliding motion represented as in [40]:
s r = y R n : s = s ˙ = s ¨ = = s r 1 = 0

4.2. Integral-Sliding-Mode-Control-Based Consensus

According to Equations (1) and (9), a control law for the MRS using the sliding mode control mechanism can be modified. Thus, integral SMC can be represented as
s i ( t ) = y ¯ i ( 0 ) 0 t u ¯ i ( τ ) d τ + y ¯ i ( t ) ,
where y ¯ i ( 0 ) denotes the initial state value of y ¯ i ( t ) . The integral sliding mode state can be ensured for the MRS, i.e., s i ( t ) = s ˙ i ( t ) = 0 . Thus, one can write the following:
y ¯ ˙ i ( t ) = u ¯ i ( t ) nor .
Subsequently, an updated sliding mode consensus control protocol can be written as:
u ¯ i ( t ) = u ¯ i ( t ) nor + u ¯ i ( t ) up , u ¯ i ( t ) up = g 1 sig 1 2 ( s i ) + w i ( t ) , w ˙ i ( t ) = g 2 sgn ( s i ) .
Equation (18) can be written in vector form, as given below:
u ¯ ( t ) = u ¯ ( t ) nor + u ¯ ( t ) up , u ¯ ( t ) up = g 1 sig 1 2 ( s ) + w ( t ) , w ˙ ( t ) = g 2 sgn ( s ) ,
where u ¯ ( t ) = [ u ¯ 1 ( t ) , , u ¯ n ( t ) ] T , u ¯ ( t ) n o r = [ u ¯ 1 ( t ) n o r , . . . , u ¯ n ( t ) n o r ] T , w ( t ) = [ w 1 ( t ) , . . . , w n ( t ) ] T , and u ¯ ( t ) u p = [ u ¯ 1 ( t ) u p , . . . , u ¯ n ( t ) u p ] T , which shows the consensus control with g 1 > 0 , g 2 > μ , where μ is a positive scalar value.

5. Controller Design

In this section, the proposed integral sliding mode scheme is analyzed to ensure that the MRS remains on a sliding surface even under a Byzantine attack. Additionally, the resilient consensus performance of MRS in the presence of a Byzantine attack is also addressed. Finally, the necessary conditions for designing a controller are given below.
Theorem 1.
The consensus control law for the MRS is discussed in Section 4. According to Assumptions 1 and 2, MRS on the sliding mode surface in the finite time should be satisfied.
Proof. 
By taking the derivative of s i ( t ) and combining it with Equation (9), one can obtain:
s ˙ i ( t ) = u ¯ i ( t ) u p + f i ( t ) ,
where s i ( t ) , u i ( t ) u p , and f i ( t ) are the sliding state, updated control law, and attack signal, respectively, which are already defined in the aforementioned sections. Equation (20) can also be written as:
s ˙ i ( t ) = g 1 ( t ) sig 1 2 ( s i ) + f i + w i , w ˙ i ( t ) = g 2 sgn ( s i ) .
Let e i = f i + w i then Equation (21) can be modified as:
s ˙ i ( t ) = g 1 sig 1 2 ( s i ) + e i , e ˙ i ( t ) = g 2 sgn ( s i ) + f ˙ i .
The Lyapunov function candidate can be created as:
V ( t ) = i = 1 n V i ( t ) = i = 1 n ϕ i ( t ) T R i ( t ) ϕ i ( t ) ,
where ϕ i ( t ) = [ sig 1 2 ( s i ) e i ] , R i R 2 × 2 > 0 .
The derivative of the ϕ i ( t ) can be written as follows:
ϕ ˙ i ( t ) = 1 2 | S i | 1 2 S ˙ i e ˙ i = 1 2 | S i | 1 2 g 1 ( t ) sig 1 2 ( s i ) + e i 2 g 2 f ˙ i sgn ( s i ) sig 1 2 ( s i ) = | S i | 1 2 W i ϕ i ( t ) ,
where W i = 1 2 g 1 ( t ) 1 2 [ g 2 f ˙ i sgn ( s i ) ] 0 .
Now, by calculating the derivative of the Lyapunov function given in Equation (23), with system dynamics given in Equation (22), one obtains:
V ˙ ( t ) = i = 1 n V ˙ i = i = 1 n | S i | 1 2 ϕ i ( t ) T Q i ϕ i ( t ) < 0 ,
where Q i and W i are connected to each other based on the Lyapunov equation, given as:
W i T R i + R i W i = Q i .
From Equation (26), the solution W i > 0 is unique for every Q i > 0 . Thus, V i is purely the Lyapunov function.
The inequality given in Equation (25) can be modified based on the fact that | S i | 1 2 = | s i g 1 2 ( s i ) | ϕ i 2 μ m i n 1 2 ( R i ) V i 1 2 , given below:
V ˙ ( t ) i = 1 n μ min 1 2 V i 1 2 ( t ) μ min ( Q i ) μ max ( R i ) V i ( t ) δ i = 1 n V i 1 2 ( t ) .
where δ = min i = 1 , 2 , , n μ min 1 2 ( W i ) μ min ( Q i ) μ max ( R i ) > 0 . The expression i = 1 n V i 1 2 ( t ) i = 1 n V i 1 2 ( t ) holds in the light of Lemma 4. Therefore, one can write V ˙ ( t ) δ V 1 2 ( t ) .
According to the above discussions, we have V ( θ ( t , s ( 0 ) , e ( 0 ) ) ) δ V 1 / 2 ( θ ( t , s ( 0 ) , e ( 0 ) ) ) . Furthermore, one can verify that V ( θ ( t , s ( 0 ) , e ( 0 ) ) ) and θ ( t , s ( 0 ) , e ( 0 ) ) approach zero using Lemma 3 and its equation in the finite time, which is smaller than T = 2 δ V 1 / 2 ( s ( 0 ) , e ( 0 ) ) . Furthermore, θ ( s ( 0 ) , e ( 0 ) ) 0 because s ( 0 ) = 0 , but e ( 0 ) 0 .
Remark 1.
The Lyapunov function given in Equation (25) is absolutely continuous, but it is not locally Lipschitz on the set Ξ = { ( s i , w i ) R 2 | s i = 0 , i = 1 , 2 , 3 , , n } , as it includes s i g ( s i ) 1 2 . This term requires the designed Lyapunov function to be locally Lipschitz different from the typical Lyapunov function. According to Zubov theorem, it is important to have a continuous Lyapunov function. In this section, the analysis of the MRS stability is performed using V ( ϕ i ) . It is worth noting that a combination of absolute continuous functions is not always absolute continuous. In the above analysis, V ( θ ( t , s ( 0 ) , e ( 0 ) ) ) is absolutely continuous with the trajectories θ ( t , s ( 0 ) , e ( 0 ) ) = [ θ 1 ( t , s 1 ( 0 ) , e 1 ( 0 ) ) , θ 2 ( t , s 2 ( 0 ) , e 2 ( 0 ) ) , , θ n ( t , s n ( 0 ) , e n ( 0 ) ) ] T and it is important to verify it carefully.
Furthermore, Theorem 2 is presented below to describe the consensus tracking of MRS under Byzantine attack on the sliding surface.
Theorem 2.
MRS operating under a Byzantine attack achieves consensus tracking, as per Assumptions 1 and 2, by maintaining the MRS on the integral sliding mode surface within finite time [40].
Proof. 
To prove Theorem 2, first, there is a need to choose a suitable Lyapunov function given below:
V ( t ) = 1 2 y ¯ ( t ) ( ( L + B ) I n ) T ( ( L + B ) I n ) y ¯ ( t ) = 1 2 M T M ,
where L is Laplacian matrix, B is the input matrix, I n is an identity matrix, and M i T is a vector associated with robot i such that M = [ M 1 T , M 2 T , , M n T ] T and M i T = i = 1 n a i j ( y ¯ i ( t ) y ¯ j ( t ) ) + b i j y ¯ i ( t ) .
The derivative of Equation (29) gives:
V ˙ ( t ) = M T ( ( L + B ) I n ) y ¯ ˙ ( t ) = M T ( ( L + B ) I n ) Y i ζ ( t ) μ min ( φ ( t ) I n ) μ min ( ( L + B ) I n ) M 1 + a μ min ( φ ( t ) I n ) μ min ( ( L + B ) I n ) M T M 1 + a 2 μ min ( φ ( t ) I n ) μ min ( ( L + B ) I n ) 2 V ( t ) 1 + a 2 z V ( t ) 1 + a 2 ,
where ζ represents the ratio of odd positive numbers, i.e., sign ( ( . ) ζ ) = sign ( . ) . Furthermore, φ = diag ξ 1 r 1 + 1 a , ξ 2 r 2 + 1 a , , ξ n r n + 1 a and z = μ min ( φ ( t ) I n ) μ min ( ( L + B ) I n ) 2 V ( t ) 1 + a 2 .
From Lemma 3, it is clear that V ( t ) approaches to 0 in fixed time. Therefore, settling time can be written as:
T 2 V ( y ¯ ( 0 ) ) 1 + a 2 z ( 1 a ) .
Thus, V ( t ) = 0 , t T and y i ( t ) = y 0 ( t ) R i t T . Hence, the consensus performance of MRS under a Byzantine attack can be assured at a specific time.
Remark 2.
Since it is already assumed that e i = f i + w i , u ¯ i ( t ) u p , therefore, represent the control of the MRS attack with g 1 > 0 and g 2 > μ . It is also worth mentioning that if the term e i = f i + w i , then the control u ¯ i ( t ) u p acts as an attack observer, i.e., o t g 2 sgn ( s ) d τ = f , t > T .

6. Consensus Control of a Multi-Robot System with an Attack Observer

Sometimes, it is very difficult to obtain a bond between malicious information (attack) and topology information, especially in the case of a Byzantine attack, where an attacker is an authenticated robot of the MRS. Furthermore, to ensure the adaptive consensus performance, a large switching gain ∇ is selected, because it will create the actuator’s critical chattering and high energy consumption in practical situations. Chattering in the actuator can be raised through friction. Therefore, to analyze this phenomenon developed through ˙ i = ε s i ρ i , i ( 0 ) 0 , ε and ρ are selected positive. The limited growth of the switching gain can be prevented through a term ρ i . First, an attack observer is presented to estimate the attacks on the MRS. The dynamics of the attack observer can be written as:
˙ ( t ) = ϕ ( q ( t ) + [ ϕ y ¯ i ( t ) + u ¯ i ( t ) ] ) , f ¯ i ( t ) = q ( t ) + ϕ y ¯ i ( t ) ,
where f ¯ i ( t ) , q ( t ) and ϕ represent the attack, observer’s internal state, and observer gain, respectively. Using this attack observer, one can get:
f ^ ˙ i ( t ) = f ˙ i ( t ) + ϕ q ( t ) + ϕ [ ϕ y ¯ i ( t ) + u ¯ i ( t ) ] ϕ ( u ¯ i ( t ) + f i ( t ) ) = ϕ f ^ ˙ i ( t ) + f ˙ i ( t ) ,
where f ^ ˙ i ( t ) = f i ( t ) f ¯ i ( t ) , where i = 1 , 2 , , n . From the arguments for stability in input states, the condition f ^ ˙ i ( t ) μ i ϕ holds true after an adequately long time.
Second, the control law contains discontinuous dynamics, which may result in chattering, poor MRS performance, and the life of the actuator can even be shortened. Therefore, it is important to consider continuous dynamics while designing an adaptive consensus law in the presence of attacks, written as:
γ ( s i ) = i s i s i , if i S i i 2 s i , if i s i < ,
Therefore, to minimize the attack effects, an adaptive resilient sliding mode controller is designed given below
s i = y ¯ i ( t ) + y ¯ i ( 0 ) 0 t ( u ¯ i ( τ ) n o r + f ¯ i ( τ ) ) d ( τ ) .
The states of the MRS remain sliding on the resilient sliding mode, i.e., s i = s ˙ i = 0 . If s ˙ i = 0 , which means that:
y ¯ ˙ i ( t ) = u ¯ i ( t ) n o r + f ¯ i ( t ) .
Thus, a resilient consensus control mechanism can be modeled as follows:
u ¯ ( t ) = u ¯ i ( t ) n o r + u ¯ i ( t ) c n ,
where u ¯ i ( t ) c n = [ γ ( s 1 ) T , γ ( s 2 ) T , , γ ( s n ) T ] T .
Furthermore, Theorem 3 is given below to discuss the adaptive sliding mode control law of MRS under Byzantine attacks.
Theorem 3.
Suppose that Assumptions 1 and 2 are true, then the consensus control issue of MRS in the presence of a Byzantine attack with resilient control technique can be resolved by using continuous adaptive sliding mode control law [40].
Proof. 
To prove this theorem, the first derivative of Equation (34), i.e., sliding surface s i , is calculated. Thus, the candidate of the Lyapunov function can be written as:
V ( t ) = 1 2 s T s + 1 2 ε i = 1 n ( i ¯ ) 2 ,
where the upper bound of the i is represented by ¯ . Moreover, ¯ is considered to be ¯ > μ ϕ + 0 , μ = [ μ 1 T , μ 2 T , , μ n T ] T , 0 > 0 .
Now, by calculating the differential of the V ( t ) with consensus control trajectory given in Equation (12) gives:
V ˙ ( t ) = s T s ˙ + 1 ε i = 1 n ( i ¯ ) ˙ μ ϕ s + s T u ¯ ( t ) cn + i = 1 n ( i ¯ ) ( s i ρ i )
Case 1:  i s i , for i = 1 , 2 , , n , s T ( t ) u ¯ ( t ) cn = i = 1 n i s i .
Since:
V ˙ ( t ) = μ ϕ s i = 1 n i s i + i = 1 n ( i ¯ ) ( s i ρ i ) = μ ϕ s ¯ i = 1 n s i ρ i = 1 n ( i ¯ ) i μ ϕ ¯ s + ρ 4 i = 1 n ¯ 2 0 s + γ 1 ,
where γ 1 = ρ n 4 ¯ 2 .
Case 2: If i s i < , for i = 1 , 2 , , n , s T ( t ) u ¯ ( t ) cn = i = 1 n i 2 s i .
V ˙ ( t ) μ ϕ s i = 1 n i 2 s i 2 + i = 1 n ( i ¯ ) ( s i ρ i ) 0 s + γ + i = 1 n i 2 s i 2 + i s i .
Since i s i , therefore, it is easy to understand that i 2 s i 2 + i s i attains the highest value / 4 when i s i = / 2 . Hence, one can obtain V ˙ ( t ) 0 s + γ 2 , here γ 2 = γ 1 + n 4 .
Case 3: If i s i for some robots of the network, then i s i < for some remaining robots of network. Similarly, one can obtain as given below:
V ˙ ( t ) 0 s + γ 3 ,
where γ 1 γ 3 γ 2 .
Based on the above discussion, the below given expression is verifiable for any i s i such that:
V ˙ ( t ) 0 s + γ 0 s + 0 s 0 s + γ ( 1 ) 0 s , s γ 0 ,
where ( 0 , 1 ) , γ = max { γ 1 , γ 2 , γ 3 } = n ( ρ ¯ 2 + ) 4 .
Based on the above cases, the boundary layer can be reached in a finite time in the designed sliding surface.
The below given Theorem 4 is being presented for the adaptive resilient consensus control of MRS using directed communication topology under attack.
Theorem 4.
Let MRS follow a directed communication topology. The resilient consensus problem of MRS under Byzantine attack can be solved by proposing a continuous adaptive sliding mode controller and nominal protocol [40].
Proof. 
Using Theorem 2, a suitable Lyapunov function can be constructed as follows:
V 2 ( t ) = 1 2 y ¯ ( t ) T ( ( L + B ) I n ) T ( ( L + B ) I n ) y ¯ ( t ) + V ( t ) = 1 2 M T M + V ( t ) .
One gets:
V ˙ 2 ( t ) = M T ( ( L + B ) I n ) y ¯ ˙ ( t ) + V ˙ ( t )
By using expression in Equation (42), one can rewrite V ˙ 2 ( t ) as follows:
V ˙ 2 ( t ) M T ( ( L + B ) I n ) y ¯ ˙ ( t ) 0 s + γ μ min ( φ ( t ) I n ) μ min ( ( L + B ) I n ) M 1 + a 0 s + γ ( 1 1 ) M 1 + a , M 1 + a γ 1 z ,
where z = μ m i n ( φ ( t ) I n ) μ m i n ( ( L + B ) I n ) 2 1 + a and 1 ( 0 , 1 ) . One can get V 2 ( t ) < 0 .
If M [ 0 , 1 ) , one gets:
V ˙ 2 ( t ) z M 2 + γ ( 1 1 ) z M 2 .
Then, the bounded limit of M γ 1 z .
If M [ 1 , ) , one gets:
V ˙ 2 ( t ) z M + γ , ( 1 1 ) z M .
Therefore, it is verifiable that M γ 1 z .
Hence, it is concluded that V 2 ( t ) < 0 and adaptive consensus control of MRS under Byzantine attack using sliding mode control protocol can be assured. If Δ = γ 1 z , γ 1 z , then MRS can reach to the set of trajectories Δ 1 = M Δ , s γ 0 z . □
Remark 3.
The parameter ε affects the reaction time of the adaptive gain for the proposed SMC technique. The value of the parameters ℶ and ρ are kept small to boost the tracking performance. Although a small value of ℶ may lead to chattering effects due to the presence of time delays. The proposed work is chattering-free due to the continuous integral sliding mode controller rather than a discontinuous controller. Furthermore, the proposed technique is independent of communication topology and attack effect on the MRS due to the adaptive mechanism.

7. Simulation

This section presents the effectiveness of the proposed mechanism in ensuring adaptive, resilient consensus control of MRS in the presence of a Byzantine attack. To verify the proposed model, consider a communication topology of the five cooperating robots, as shown in Figure 1. According to Figure 1, Robot 1 serves as the root (leader) robot, while the remaining four robots function as non-root (leader–follower) robots. Let us borrow the dynamics of the MRS from [34], given as:
A = 1.175 0.987 8.487 8.878 ,   B = 0.194 0.036 19.29 3.803 .
The diagonal and Laplacian matrices, based on the communication topology as depicted in Figure 1, can be expressed as follows:
L = 2 1 1 0 1 1 0 0 0 1 2 1 1 0 0 0 , D = 2 1 1 0 1 1 0 0 0 1 2 1 1 0 0 0 .
An adaptive, resilient control scheme for the MRS under a Byzantine attack is designed by choosing the parameters, given as ρ i = 0.5 , r 1 = 3 , r 2 = 1 , r 3 = 2 , r 4 = 2 , g 1 = 0.5491 , g 2 = 1.6878 , and g 2 > μ = 1 . Furthermore, a step signal is regarded as an attack signal in MRS due to its simplicity of implementation. Let the initial state trajectories of the MRS under Byzantine attack be at y i = 0 0 to design an adaptive and resilient consensus controller.
In Figure 2, the performance of the MRS is observed in the absence of attacks, where all signals converge to the consensus state. Specifically, Figure 2a demonstrates that MRS successfully achieves consensus, with all state values converging towards the desired input state. This result validates that MRS, employing a resilient SMC, achieves consensus and corroborates the findings presented in Theorem 1. Similarly, Figure 2b shows the error signal of the MRS.
Let us consider a scenario where the MRS is subjected to a Byzantine attack. In such a situation, the collaborating MRS cannot attain a consensus state, as in Figure 3. Specifically, Figure 3a shows random ripples in the response, indicating instability due to Byzantine attacks. Figure 3b plots the error signal of MRS under a Byzantine attack. Figure 4 depicts that the MRS is prevented from phase reaching in the presence of Byzantine attacks and boosts the robustness. Particularly, Figure 4a illustrates the response of MRS under a Byzantine attack. It is observed that during a brief interval, the collaboration or communication among the robots is disrupted, resulting in spikes in the MRS response. However, after this transient disturbance, all the robots eventually converge to the desired input state. This observation underscores the effectiveness of the resilient, adaptive SMC technique. Furthermore, Figure 4b shows the error signal of stable MRS in the presence of a Byzantine attack.
While the proposed technique demonstrates adaptability and robustness for MRS under attack, it is essential to consider the leader–follower topology. In this configuration, an attacker could potentially target the root robot, non-root robots, or any reachable robot within the MRS.
In accordance with Section 2, an MRS comprises a collaboration of n robots with a leader–follower communication topology. Consequently, an attacker can launch attacks on both the root robot and non-root robots within the MRS. Furthermore, the attacker can exploit reachable robots to execute attacks. Therefore, it becomes crucial to assess the performance of the proposed resilient, adaptive control mechanism under such scenarios. Figure 5, Figure 6 and Figure 7 shows the response of MRS under Byzantine attack on the root robot, non-root robot, and reachable robot. It is easy to validate that although attacks impacted the performance of MRS, i.e., spikes in the response of MRS for a short interval; after that, MRS achieved the input state.
According to simulation results, one can verify that the proposed control technique verifies the Theorems 1 and 2 to provide consensus tracking within finite time tracking. Furthermore, the proposed technique provides a consensus control, which is resilient for the MRS under Byzantine attacks and independent of communication topology, according to Theorems 3 and 4. Therefore, it is easy to say that MRS achieves consensus despite Byzantine attacks on different robots using resilient, adaptive sliding mode controllers in a finite time.

8. Discussions

In this section, we discuss the impact of the outcome of our proposed SMC architecture and articulate its limitations. Furthermore, we convert this control problem to a corresponding computational problem to address some of those limitations.

8.1. Limitations in the Context of the Industrial Internet of Things

The proposed approach of SMC has some limitations in the context of the Industrial Internet of Things (IIoT). An IIoT can have multiple MRS operations simultaneously. Each MRS may be doing the same task, such as in an Assembly line, or different tasks, such as in a smart building.
  • Scalability: In IIoT, multiple machines need to connect and retrieve information from the same cloud-based platforms. This means that cloud-based platforms need to store and maintain a large amount of information about a wide variety of devices, their tasks, and constraints over a period of time. While the proposed SMC can operate within a single network of MRS in a localized environment, it will become difficult to achieve the same results if there is an adverse change to the structure of the network, such as a specific robot being replaced or when there is additional latency in the network.
  • Device Characterization: For an IIoT to operate smoothly, it needs to understand the operational model, i.e., the normal vs. abnormal changes in the state space of each machine. Only when each device is in the acceptable range of state space, both historically and in the expected near future, the IIoT can achieve a smooth operation within a given MRS. While the SMC-based approach can achieve success for a given MRS, it may be difficult for the IIoT to identify the source or the cause of the problem and then potentially resolve it, if ad hoc devices with different configurations are used to do the same task.
In order to solve these issues, it is necessary to convert this control problem into a computational problem. Once the MRS operation can be modeled as a set of streaming data, it can open wide-ranging possibilities for IIoT applications.

8.2. The Dataset from MRS

The data used in this paper are based on a simulated environment in MATLAB and according to the simulation results, the tracking of the performance of MRS, as given in Equation (1), can also be recorded as in Table 1 given below. Table 1 shows the change in the dynamics of the robots in the MRS. It is also clear from Table 1 that, for time intervals, the states of robots are changing based on their activities. If there are disturbances within MRS, such as Byzantine attacks, then the state of robots would have different values, which can be minimized by our proposed controller. The time gap between the data is in milliseconds or lower. This tabular form of data can also be fed into AI algorithms.

9. Future Applications with Discrete Event Systems and Artificial Intelligence

The proposed control strategy is resilient enough against the Byzantine attacks on the MRS and provides robust performance of the MRS. However, the real-time tracking of the performance of MRS, as given in Equation (1), can be ensured through intelligent techniques, such as digital twin, machine learning, deep learning, reinforcement learning, etc. For example, the resilience of MRS against cyber attacks such as Byzantine attacks can be increased through IoT-based digital twin technology.
Regarding operation, the above MRS can be viewed as a Discrete Event System (DES). Each robot in the system uses a microcontroller with an expected range of state spaces and the change of the states. Suppose that the IIoT (Industrial Internet of Things) devices contain a controller that generates control instructions for the machine to change its state or orientation. There can be multiple controllers within an IIoT system, and they can be operated cooperatively. For example, in the MRS, controllers are responsible for deciding how much power is supplied to a particular robot within an MRS, depending on its task type. Similarly, the allocation of a task to the robot in an MRS is also controlled by the controller based on time consumption or other factors. Every time an MRS receives a control signal, the state also changes with time. Therefore, the change of state space or orientation in an MRS can be derived from Equations (1) and (11) as:
Input states = AX + BU,
Output states = CX
where A represents the state of the MRS evolving with the change in time T, X is the input state vector at a particular time, B contains the controlled inputs (generated by the controllers), U is the desired input value, and C is the output matrix used to represent how X contributes to the system’s output.
Based on state space relation, the data of any IIoT system having a complex control system can be represented through the data given below in Table 2.
This is an equivalent rendering of the data in Table 1 concerning the state space of a particular device in the IIoT system. Here:
A = a 11 a 12 a 13 a 21 a 22 a 23 a 31 a 32 a 33 ,
represent the states of the IIoT system, which changes with respect to the time t 1 , t 2 , t 3 . Hence, it is clear that these data are used to make decisions, such as predictions of the current state, future state, and performance, or it can be used for other operations. An MRS can perform a task β t at a given time t. β contains a set of states { α x y } as defined by the state of the actuators m. A set of α with size k i may be followed by another set of time-bound α states. Each of these time-bound sets of α is non-time-bound with respect to each other.
Every time a machine receives a control signal, the state is expected to change. After getting data matrices representing the state of ( m 1 , m 2 . . . ) at every interval, it can be fed into machine learning or any other intelligent algorithm to predict the expected future states with decreasing order of probabilities. This can be compared to the current state information to determine whether it has fulfilled the required conditions at the current time. The data can be analyzed using a machine learning algorithm that can be useful to establish an autonomous system, which can further predict the machine’s performance, future possible failure, possible solutions to faults, attacks, etc. Based on the above explanation, future research can investigate the following:
(1)
In the case of the complex IIoT control system, we can design a ‘model’ with the help of intelligent schemes such as Artificial Intelligence/Machine learning/Deep Reinforcement Learning. Given that the control systems’ architecture is fixed but unknown, a behavioral model of the devices must be created. Training of the Neural Network can be completed based on the set of α , which can be used to classify the current state β t and predict the future states, i.e., β t + 1 , as shown in Figure 8.
(2)
It can also be used to classify faults or errors, i.e., ( β p r e d i c t e d β a c t u a l ) , an IIoT system faces with minimal supervisory data and training. In designing such a device, suppose a closed-loop feedback complex IIoT system that uses its feedback information to diagnose the variations and faults, as shown in Figure 8. A controller can be designed to ensure adaptive stability if the IIoT system contains faults due to internal or external disturbance (communication and induced delays, cyber attacks). A method can be developed based on recurrent neural networks (RNN) and SMC to measure the expected model’s variations based on the system’s known control state space.
(3)
The architecture of the IIoT system is based on IoT, and it is changing periodically due to the evolution of advanced technologies used to implement it. Therefore, IIoT systems often inherit the security challenges of IoT. Since IIoT systems are desired to be distributed rather than centralized, they are vulnerable to certain cyber attacks such as DoS attacks, deception attacks, Byzantine attacks, false data injection attacks, etc. Hence, there is a requirement to consider such attacks carefully. For this, a model can be designed to detect the attacks and types of attacks and minimize the attack effects.
Figure 8. RNN- and SMC-based closed-loop feedback control mechanism for an IIoT system.
Figure 8. RNN- and SMC-based closed-loop feedback control mechanism for an IIoT system.
Machines 12 00205 g008

9.1. Example Applications 1—Detecting Network Attacks

The proposed techniques will be able to detect the type of Byzantine attack on IIoT systems. For example, in the case of MRS, whether attacks are either root robot or non-root or the whole MRS is under attack, whenever the attack is detected, an observer algorithm based on a what-if state can be deployed to take corrective actions to ensure seamless and safe MRS operations. Furthermore, digital twins can present a constructible active model for communicating between the attackers and the defense technique.
For creating a digital twin and processing the data stream in real-time, the computational algorithms need the condition of the MRS as a set of matrices or similar data structures. These can be used with existing machine learning and deep learning algorithms for behavior modeling or state space modeling of the MRS. The mathematical modeling of MRS in terms of digital twins is given below.
According to Equations (1) and (2), the state space representations of the physical thing of MRS can be written as:
Y ˙ ψ = A Φ Y ψ + B Φ U ψ X ψ = C Φ Y ψ
where Y ψ and U ψ denote the states and input to the physical MRS, respectively.
The attack signal, given in Equation (5), on the physical MRS, can be represented as a feature vector at time t:
f i ψ ( t ) = β i u i ψ ( t ) + c k n i a i j ( α j y j ψ α i y i ψ ) .
Similarly, state space representations of cyber MRS can be written as:
Y ˙ θ = A θ Y θ + B θ U θ X θ = C θ Y θ
where θ is used to represent cyber things. Furthermore, Y θ and U θ denote the states and input to the cyber MRS, respectively.
The attack on the cyber MRS can be written as:
f i θ ( t ) = β i u i θ ( t ) + c k n i a i j ( α j y j θ α i y i θ ) .
Based on Equations (48) and (50), the hybrid MRS model to represent the overall behavior of MRS can be represented as:
Y ˙ θ Y ˙ ψ = A θ 0 B Φ C θ A Φ Y θ Y ψ + B θ 0 U θ Y θ ψ = 0 C Φ Y θ Y ψ
These can be streamed in real time and sampled or batched for further processing. Such batches can be used to train a model based on existing data on the MRS performance and known deviations. A deviation beyond an acceptable threshold can be used to classify the current and future state of the MRS in a desired future time frame.
Equation (52) can be used to monitor the performance of MRS due to the sharing of information between physical things and cyber things in the hybrid model. Any anomaly in the MRS can be detected very easily using digital twin technology. Therefore, more accurate and safer MRS operations can be ensured than other conventional techniques. Furthermore, the performance of the MRS will also be increased due to the corrective actions in the presence of anomalies such as Byzantine attacks. Furthermore, it is known that a Byzantine robot is hard to identify. Therefore, a digital twin for resilient control of MRS in the presence of a Byzantine attack can be a very useful technique.
Similarly, the proposed work can be extended using AI-based algorithms. In this work, a supervisory robot R l can be well-trained using recorded information of Equations (1), (2), and (5). The trained supervisory robot R l will be placed at the top of the other five robots, as shown in Figure 9. If the supervisory robot R l is well trained, then it can be used to detect and prevent the attack from happening based on Equation (5). For example, if the supervisory robot can detect that an attack has started to occur. Then, it can prevent the attack effects by notifying all the other robots that an attack has happened to come to the default state, e.g., reboot. This can be achieved by classification of data obtained through Equations (1), (2), and (5).

9.2. Example Applications 2—Comparative Digital Twins

Let us consider a developer company that manufactures high-cost equipment and sells it to many users. The device has a high level of flexibility in usage. This means the device can be used in a variety of ways, i.e., flexible in state space. Typically, the manufacturer has no direct control over the device after the device is installed. If the manufacturer wants to monitor the device in real time, it can create a comparative digital twin to monitor and analyze the use of devices by different customers. In this way, the manufacturer will be able to determine the reasons for the customer’s device performance degradation at various rates concerning time between multiple users. Using the proposed outcomes and artifacts of the above research, the developer can compare the different users (human or master devices) using the same or similar devices and potentially suggest factors of what a user/customer did incorrectly, causing their devices to break down earlier compared to others. The proposed research outcomes will play an important role in Industry 5.0 practices. It can enable human users to adopt machine technology or autonomous systems and quickly set up their business aims.

10. Conclusions

This article proposed an adaptive, resilient consensus control technique for the MRS under the Byzantine technique using the SMC method. First, the accuracy of the proposed resilient consensus control scheme was ensured using the SMC method, and then the robustness of the proposed SMC-based scheme in the presence of Byzantine attacks was proved. Second, an attack observer is designed to approximate the effects of Byzantine attacks on the MRS and the effects of chattering removed through integral SMC. Similarly, the proposed integral SMC method can automatically tune the gain and performs well without prior knowledge of Byzantine attacks. In the end, the effectiveness of the proposed mechanism is verified through simulation results. The time series data used in controlling the MRS can be used for training machine learning models, such as RNN, in the future. Such a method can be used to create a model of any machine without knowing the actual mechanics of the device, which will be an extension of this in the future.

Author Contributions

Conceptualization, M.N. and A.M.; methodology, M.N. and A.M.; software, M.N.; validation, M.N. and A.M.; formal analysis, M.N.; investigation, M.N. and A.M.; resources, M.N. and A.M.; data curation, M.N.; writing—original draft preparation, M.N.; writing—review and editing, M.N. and A.M.; visualization, M.N. and A.M.; supervision, A.M.; All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

No new data were created or analyzed in this study. Data sharing is not applicable to this article.

Conflicts of Interest

The authors do not have any conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MRSMulti-robot system
IoTInternet of Things
ROSRobot operating system
SMCSliding mode control

References

  1. Wei, H.; Lv, Q.; Duo, N.; Wang, G.; Liang, B. Consensus algorithms based multi-robot formation control under noise and time delay conditions. Appl. Sci. 2019, 9, 1004. [Google Scholar] [CrossRef]
  2. Mao, W.; Liu, Z.; Liu, H.; Yang, F.; Wang, M. Research progress on synergistic technologies of agricultural multi-robots. Appl. Sci. 2021, 11, 1448. [Google Scholar] [CrossRef]
  3. Nasir, M.; Ahmed, Z.; Ali, N.; Saeed, M.A. H performance tracking and group consensus of delayed multiagent systems under attack. J. Vib. Control 2023. [Google Scholar] [CrossRef]
  4. Liang, W.; Ning, Z.; Xie, S.; Hu, Y.; Lu, S.; Zhang, D. Secure fusion approach for the internet of things in smart autonomous multi-robot systems. Inf. Sci. 2021, 579, 468–482. [Google Scholar] [CrossRef]
  5. Chen, D.; Chen, K.; Li, Z.; Chu, T.; Yao, R.; Qiu, F.; Lin, K. Powernet: Multi-agent deep reinforcement learning for scalable powergrid control. IEEE Trans. Power Syst. 2021, 37, 1007–1017. [Google Scholar] [CrossRef]
  6. Al-Hussaini, S.; Gregory, J.M.; Gupta, S.K. Generating Task Reallocation Suggestions to Handle Contingencies in Human-Supervised Multi-Robot Missions. IEEE Trans. Autom. Sci. Eng. 2023, 21, 367–381. [Google Scholar] [CrossRef]
  7. Aranda, M.; Aragüés, R.; López-Nicolás, G. Combined leaderless control of translational, shape-preserving and affine multirobot formations. IEEE Robot. Autom. Lett. 2023, 8, 7567–7574. [Google Scholar] [CrossRef]
  8. Fu, J.; Wen, G.; Yu, X.; Huang, T. Robust collision-avoidance formation navigation of velocity and input-constrained multirobot systems. IEEE Trans. Cybern. 2023, 54, 1734–1746. [Google Scholar] [CrossRef]
  9. Dong, S.; Li, Y. Adaptive Fuzzy Event-Triggered Formation Control for Nonholonomic Multirobot Systems with Infinite Actuator Faults and Range Constraints. IEEE Internet Things J. 2023, 11, 1361–1373. [Google Scholar] [CrossRef]
  10. Herguedas, R.; Aranda, M.; López-Nicolás, G.; Sagüés, C.; Mezouar, Y. Double-integrator multirobot control with uncoupled dynamics for transport of deformable objects. IEEE Robot. Autom. Lett. 2023, 8, 7623–7630. [Google Scholar] [CrossRef]
  11. Hu, B.B.; Zhang, H.T.; Yao, W.; Ding, J.; Cao, M. Spontaneous-Ordering Platoon Control for Multirobot Path Navigation Using Guiding Vector Fields. IEEE Trans. Robot. 2023, 39, 2654–2668. [Google Scholar] [CrossRef]
  12. Rossi, E.; Tognon, M.; Ballotta, L.; Carli, R.; Cortés, J.; Franchi, A.; Schenato, L. Coordinated multi-robot trajectory tracking control over sampled communication. Automatica 2023, 151, 110941. [Google Scholar] [CrossRef]
  13. Ferranti, L.; Lyons, L.; Negenborn, R.R.; Keviczky, T.; Alonso-Mora, J. Distributed nonlinear trajectory optimization for multi-robot motion planning. IEEE Trans. Control Syst. Technol. 2022, 31, 809–824. [Google Scholar] [CrossRef]
  14. He, S.; Lyu, W.; Liu, F. Robust H sliding mode controller design of a class of time-delayed discrete conic-type nonlinear systems. IEEE Trans. Syst. Man Cybern. Syst. 2018, 51, 885–892. [Google Scholar] [CrossRef]
  15. Song, J.; Wang, Y.K.; Niu, Y.; Lam, H.K.; He, S.; Liu, H. Periodic event-triggered terminal sliding mode speed control for networked PMSM system: A GA-optimized extended state observer approach. IEEE/ASME Trans. Mechatron. 2022, 27, 4153–4164. [Google Scholar] [CrossRef]
  16. Tasooji, T.K.; Marquez, H.J. Decentralized event-triggered cooperative localization in multirobot systems under random delays: With/without timestamps mechanism. IEEE/ASME Trans. Mechatron. 2022, 28, 555–567. [Google Scholar] [CrossRef]
  17. Nasir, M.; Hayat, M.F.; Jamal, A.; Ahmed, Z. Frequency domain consensus control analysis of the networked multi-agent system with controller area network bus–induced delay. J. Vib. Control 2022, 28, 2900–2912. [Google Scholar] [CrossRef]
  18. Zhang, K.; Li, Z.; Wang, Y.; Louati, A.; Chen, J. Privacy-preserving dynamic average consensus via state decomposition: Case study on multi-robot formation control. Automatica 2022, 139, 110182. [Google Scholar] [CrossRef]
  19. Alsamhi, S.H.; Shvetsov, A.V.; Shvetsova, S.V.; Hawbani, A.; Guizani, M.; Alhartomi, M.A.; Ma, O. Blockchain-empowered security and energy efficiency of drone swarm consensus for environment exploration. IEEE Trans. Green Commun. Netw. 2022, 7, 328–338. [Google Scholar] [CrossRef]
  20. Zhou, L.; Kumar, V. Robust multi-robot active target tracking against sensing and communication attacks. IEEE Trans. Robot. 2023, 39, 1768–1780. [Google Scholar] [CrossRef]
  21. Bonczek, P.J.; Peddi, R.; Gao, S.; Bezzo, N. Detection of nonrandom sign-based behavior for resilient coordination of robotic swarms. IEEE Trans. Robot. 2022, 38, 92–109. [Google Scholar] [CrossRef]
  22. Han, Z.; Wang, W.; Huang, J.; Wang, Z. Distributed adaptive formation tracking control of mobile robots with event-triggered communication and denial-of-service attacks. IEEE Trans. Ind. Electron. 2022, 70, 4077–4087. [Google Scholar] [CrossRef]
  23. Yin, T.; Gu, Z.; Xie, X. Observer-based event-triggered sliding mode control for secure formation tracking of multi-UAV systems. IEEE Trans. Netw. Sci. Eng. 2022, 10, 887–898. [Google Scholar] [CrossRef]
  24. Usevitch, J.; Panagou, D. Resilient trajectory propagation in multirobot networks. IEEE Trans. Robot. 2021, 38, 42–56. [Google Scholar] [CrossRef]
  25. He, W.; Xu, W.; Ge, X.; Han, Q.L.; Du, W.; Qian, F. Secure control of multiagent systems against malicious attacks: A brief survey. IEEE Trans. Ind. Inform. 2021, 18, 3595–3608. [Google Scholar] [CrossRef]
  26. Szynkiewicz, W.; Niewiadomska-Szynkiewicz, E.; Lis, K. Deep Learning of Sensor Data in Cybersecurity of Robotic Systems: Overview and Case Study Results. Electronics 2023, 12, 4146. [Google Scholar] [CrossRef]
  27. Dutta, V.; Zielińska, T. Cybersecurity of robotic systems: Leading challenges and robotic system design methodology. Electronics 2021, 10, 2850. [Google Scholar] [CrossRef]
  28. Yaacoub, J.P.A.; Noura, H.N.; Salman, O.; Chehab, A. Robotics cyber security: Vulnerabilities, attacks, countermeasures, and recommendations. Int. J. Inf. Secur. 2022, 21, 115–158. [Google Scholar] [CrossRef]
  29. Deng, G.; Zhou, Y.; Xu, Y.; Zhang, T.; Liu, Y. An investigation of byzantine threats in multi-robot systems. In Proceedings of the RAID ’21: 24th International Symposium on Research in Attacks, Intrusions and Defenses, San Sebastian, Spain, 6–8 October 2021; pp. 17–32. [Google Scholar]
  30. Ferrer, E.C.; Jiménez, E.; Lopez-Presa, J.L.; Martín-Rueda, J. Following leaders in byzantine multirobot systems by using blockchain technology. IEEE Trans. Robot. 2021, 38, 1101–1117. [Google Scholar] [CrossRef]
  31. Kumar, A.; Bhatia, S.; Kaushik, K.; Gandhi, S.M.; Devi, S.G.; Diego, A.D.J.; Mashat, A. Survey of promising technologies for quantum drones and networks. IEEE Access 2021, 9, 125868–125911. [Google Scholar] [CrossRef]
  32. Keramat, F.; Queralta, J.P.; Westerlund, T. Partition-tolerant and byzantine-tolerant decision-making for distributed robotic systems with iota and ROS 2. IEEE Internet Things J. 2023, 10, 12985–12998. [Google Scholar] [CrossRef]
  33. Luo, J.; Shu, X.; Zhai, Y.; Fu, X.; Ding, B.; Xu, J. A Fast and Robust Solution for Common Knowledge Formation in Decentralized Swarm Robots. J. Intell. Robot. Syst. 2022, 106, 68. [Google Scholar] [CrossRef]
  34. Lü, S.; Jin, X.; Ding, L.; Tan, Q. Adaptive sliding-mode control of a class of disturbed cyber–physical systems against actuator attacks. Comput. Electr. Eng. 2021, 96, 107492. [Google Scholar] [CrossRef]
  35. Corradini, M.; Cristofaro, A. A sliding-mode scheme for monitoring malicious attacks in cyber-physical systems. IFAC-PapersOnLine 2017, 50, 2702–2707. [Google Scholar] [CrossRef]
  36. Li, M.; Chen, Y.; Zhang, Y.; Liu, Y. Adaptive sliding-mode tracking control of networked control systems with false data injection attacks. Inf. Sci. 2022, 585, 194–208. [Google Scholar] [CrossRef]
  37. Mukherjee, P.; Santilli, M.; Gasparri, A.; Williams, R.K. Distributed Adaptive and Resilient Control of Multi-Robot Systems With Limited Field of View Interactions. IEEE Robot. Autom. Lett. 2022, 7, 5318–5325. [Google Scholar] [CrossRef]
  38. Tasooji, T.K.; Marquez, H.J. Event-triggered consensus control for multirobot systems with cooperative localization. IEEE Trans. Ind. Electron. 2022, 70, 5982–5993. [Google Scholar] [CrossRef]
  39. Tasooji, T.K.; Khodadadi, S.; Marquez, H.J. Event-Based Secure Consensus Control for Multirobot Systems With Cooperative Localization Against DoS Attacks. IEEE/ASME Trans. Mechatron. 2023, 29, 715–729. [Google Scholar] [CrossRef]
  40. He, S.; Xu, Y.; Wu, Y.; Li, Y.; Zhong, W. Adaptive consensus tracking of multi-robotic systems via using integral sliding mode control. Neurocomputing 2021, 455, 154–162. [Google Scholar] [CrossRef]
  41. Ahmed, Z.; Saeed, M.A.; Jenabzadeh, A.; Xu, X.; Zhang, W. Frequency domain resilient consensus of multi-agent systems under IMP-based and non IMP-based attacks. Automatica 2022, 146, 110582. [Google Scholar] [CrossRef]
Figure 1. Communication topology of MRS.
Figure 1. Communication topology of MRS.
Machines 12 00205 g001
Figure 2. Convergence response of the MRS in the absence of a Byzantine attack.
Figure 2. Convergence response of the MRS in the absence of a Byzantine attack.
Machines 12 00205 g002
Figure 3. Divergence response of MRS under Byzantine attack.
Figure 3. Divergence response of MRS under Byzantine attack.
Machines 12 00205 g003
Figure 4. Convergence response of MRS under Byzantine attack.
Figure 4. Convergence response of MRS under Byzantine attack.
Machines 12 00205 g004
Figure 5. Response of the root robot of MRS under Byzantine attack.
Figure 5. Response of the root robot of MRS under Byzantine attack.
Machines 12 00205 g005
Figure 6. Response of the non-root robot of MRS under Byzantine attack.
Figure 6. Response of the non-root robot of MRS under Byzantine attack.
Machines 12 00205 g006
Figure 7. Response of the reachable robot of MRS under Byzantine attack.
Figure 7. Response of the reachable robot of MRS under Byzantine attack.
Machines 12 00205 g007
Figure 9. Future communication topology.
Figure 9. Future communication topology.
Machines 12 00205 g009
Table 1. Simulation data (snippet).
Table 1. Simulation data (snippet).
TimeRobot 1Robot 2Robot 3Robot 4Robot 5
6.08677970.0115266770.0115266770.000007500.00002840.0000000923
6.69490630.0283321150.028332115 7.28 × 10 5 0.0002492290.00000797
7.27025400.0516617650.0516617650.0003344210.0009974380.00000194
7.84560170.0808650550.0808650550.0009676320.0025766030.00000129
8.40835430.1138120340.1138120340.0021420510.0051763580.0000475
9.09754710.1577425220.1577425220.0044487550.009801120.000145903
9.99723640.2190703240.2190703240.0093576380.0186256880.000442586
10.9781080.2874330460.2874330460.0185194460.0330505350.001244096
11.8316780.3424133880.3424133880.0313523520.0505966980.002848768
12.6404860.3874686850.3874686850.0470895020.0698989130.005431664
13.6108700.433175620.433175620.0694331430.0950379670.009993675
14.7337350.4717406720.4717406720.1006465370.1266651050.018196414
15.8873320.4928457010.4928457010.1381616330.1604211070.031336091
17.0661030.4988868480.4988868480.1791185430.1936421330.050370389
18.4168650.4951632870.4951632870.2252447680.2284265840.078504275
Table 2. States of the IIoT system including three actuators with time.
Table 2. States of the IIoT system including three actuators with time.
TimeState ( m 1 )State ( m 2 )State ( m 3 )
t 1 a 11 a 12 a 13
t 2 a 21 a 22 a 23
t 3 a 31 a 32 a 33
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Nasir, M.; Maiti, A. Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things. Machines 2024, 12, 205. https://doi.org/10.3390/machines12030205

AMA Style

Nasir M, Maiti A. Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things. Machines. 2024; 12(3):205. https://doi.org/10.3390/machines12030205

Chicago/Turabian Style

Nasir, Muhammad, and Ananda Maiti. 2024. "Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things" Machines 12, no. 3: 205. https://doi.org/10.3390/machines12030205

APA Style

Nasir, M., & Maiti, A. (2024). Adaptive Sliding Mode Resilient Control of Multi-Robot Systems with a Leader–Follower Model under Byzantine Attacks in the Context of the Industrial Internet of Things. Machines, 12(3), 205. https://doi.org/10.3390/machines12030205

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop