Resilient Nash Equilibrium Seeking for Graphic Game Subject to Stochastic Deception Attacks With Its Application to Spacecraft Systems

  • Huanhuan Yuan
  • , Yuan Yuan*
  • , Yuanqing Xia
  • *Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

3 Citations (Scopus)

Abstract

In this article, we address a discrete-time Nash equilibrium seeking problem for a class of graphical game, which is susceptible to disturbances and stochastic deception attacks. To mitigate these unwanted factors, we devise a dynamic outlier-resistant extended state observer (ESO) for each player to estimate disturbances in the presence of anomalous measurement outputs. We rigorously establish the convergence of the outlier-resistant ESO. Moreover, we propose a distributed state estimation approach for each player to estimate real-time states of all players accounting for potential deception attacks during transmission. Following the compensation of disturbances based on these estimates, we formulate a Nash equilibrium (NE) seeking strategy aiming to achieve solutions where the upper bound of deviation from the unique equilibrium point of the nominal system is analytically derived ensuring a certain level of robustness denoted by ɛ-NE solution. To assess the efficacy of the proposed game strategy, we introduce a spacecraft formation system and present comparative results. Additionally, we conduct a practical experiment using a wheeled mobile robot platform to demonstrate the applicability and effectiveness of our proposed methodology.

Original languageEnglish
Pages (from-to)10837-10846
Number of pages10
JournalIEEE Transactions on Industrial Electronics
Volume72
Issue number10
DOIs
Publication statusPublished - 2025
Externally publishedYes

Keywords

  • Graph game
  • Nash equilibrium (NE) seeking
  • outlier-resistant extended state observer (ESO)
  • stochastic deception attack

Fingerprint

Dive into the research topics of 'Resilient Nash Equilibrium Seeking for Graphic Game Subject to Stochastic Deception Attacks With Its Application to Spacecraft Systems'. Together they form a unique fingerprint.

Cite this