A Distributed Security State Reconfiguration Method Based on Double-layer Dynamically Switching Observers

A safe state and observer technology, applied in safe communication devices, digital transmission systems, electrical components, etc., to reduce the possibility of collapse, ensure safe reconstruction, and contain the effect of impact

Active Publication Date: 2022-06-28
SOUTHEAST UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

The disadvantage of this scheme is that only one agent under attack is allowed in the neighbor subsystem of a single agent, and the attack identification method can only deal with the situation where a single covert attack exists

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Distributed Security State Reconfiguration Method Based on Double-layer Dynamically Switching Observers
  • A Distributed Security State Reconfiguration Method Based on Double-layer Dynamically Switching Observers
  • A Distributed Security State Reconfiguration Method Based on Double-layer Dynamically Switching Observers

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] Step 1. For a multi-agent system consisting of 5 unmanned vehicles, the dynamic model is as follows:

[0067]

[0068] The attacker randomly selects the sensor transmission channels of 2 cars for attack injection every 5s, and the bad data injection function is d i (t)=(-ip i 0.5e t / 20 ) T .

[0069] Next, according to figure 2 The described process is used to solve the corresponding parameters to realize the distributed security state observation of multi-agents.

[0070] Step 2, the communication topology between the 5 cars and the double-layer observer is as follows image 3 The dotted circles represent the first-layer observer and the second-layer observer respectively; the solid line in the observer channel represents the communication topology channel when the observer determines that there is no malicious attack, and the dashed line represents the dynamic when the observer determines that there is a malicious attack. Switched communication channel. St...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a distributed security state reconstruction method based on a double-layer dynamic switching observer, which includes the following steps: constructing a dynamic model of its sensing channel after being attacked according to a multi-agent system; combining specific multi-agent The body system model builds a double-layer observer for each multi-agent agent, constructs a suitable observation communication topology, and designs a corresponding residual generator; analyzes and generates dynamic information of the residual threshold for the observation model, and checks the relationship between each residual signal and The size between the thresholds dynamically switches the communication topology between observers according to the size of the comparison, and performs new data communication interactions; combines its own observation data and received neighbor observation information to iteratively update to generate new observation data, and Whether the residual signal is greater than the current threshold is used as a criterion for judging whether the corresponding communication channel is under attack. The invention can ensure correct identification of all transmission channels subjected to malicious attacks and safe reconstruction of the real state of the system.

Description

technical field [0001] The invention relates to the technical field of security control, in particular to a distributed security state reconstruction method based on a double-layer dynamic switching observer. Background technique [0002] Entering the 21st century, multi-agent systems based on intelligence and unmanned autonomy have become a research hotspot in the field of systems and control technology, and have achieved important applications in unmanned factories, smart logistics, and smart cities. At the same time, the important role of multi-agent systems in joint reconnaissance, precision strikes, and coordinated countermeasures makes them an indispensable part of the field of military operations. It is worth noting that the multi-agent system makes the system more vulnerable to network attacks while improving the system efficiency, especially in the remote control work environment, when it communicates with the remote interaction center, it is very easy for malicious...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/40H04L41/12H04L41/14
CPCH04L63/1416H04L41/12H04L41/145H04L63/1441H04L41/142H04L41/147
Inventor 温广辉雷旭强吕跃祖赵丹周佳玲
Owner SOUTHEAST UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products