Strategic Topology Switching for Security-Part II: Detection & Switching Topologies
This two-part paper considers strategic topology switching for the second-order multi-agent system under attack. In Part II, we propose a strategy on switching topologies to reveal zero-dynamics attack. We first study the detectability of zero-dynamics attack for the second-order multi-agent sys- tem under switching topology, which has requirements on the switching times and switching topologies. Based on the strategy on switching times proposed in Part I and the strategy on switching topologies proposed in Part II, a decentralized strategic topology-switching algorithm is derived. The primary advantages of the algorithm are: 1) in achieving consensus in the absence of attacks, control protocol does not need velocity measurements and the algorithm has no constraint on the magnitude of coupling strength; 2) in revealing zero-dynamics attack, the algorithm has no constraint on the size of misbehaving-agent set; 3) in revealing zero-dynamics attack, if the Xor graph generated by every two-consecutive topologies has distinct eigenvalues, only one output is enough for the algorithm. Simulation examples are provided to verify the effectiveness of the strategic topology- switching algorithm.
READ FULL TEXT