1. Introduction
Systems with time-varying dynamics are more suitable to model objects in the real world compared with time-invariant systems. Owing to the time-varying parameters, the stability and stabilization of time-varying systems are more difficult to study even for linear systems. In recent years, results on the stability analysis of time-varying systems have been found in [1,2,3,4,5,6] and the references therein.
For example, a uniformly asymptotically stable function was proposed to study the asymptotic stability of linear time-varying systems in [5] and a nonlinear one in [6]. This approach was then extended to time-delayed systems [7], impulsive systems [8] and sampled-data systems [9]. Different from the method used in [5,6,7], the authors in [4] developed a novel lemma based on more general time-varying delayed systems.
Nevertheless, the consensus of time-varying multi-agent systems (MASs) has not been fully studied, as the analysis of time-varying systems is laborious. Moreover, time-varying dynamics in MASs mainly focus on the time delay and the communication topology [10,11,12].
For example, the uncertainty caused by unknown time-varying communication delays was considered in [10]; formation control with time-varying communication networks was studied in [12]. When studying systems with uncertain parameters, such as randomly occurring uncertainties and randomly occurring nonlinearities in [13,14,15], the norm of the time-varying term in the system matrix is always assumed to be less than one. Conservatively, this assumption is restrictive to adopt in practical works.
On the other hand, the consensus problems of MASs have been crucial issues over the past two decades [16]. The consensus of MASs means that all agents will reach the identical goal through exchanging information with neighbors [17],. It has been widely studied in practical applications, such as UAV irrigation and formation [18,19] and power grid energy distribution [20,21]. In practice, unexpected interferences, such as external inputs or cyber-attacks, may occur due to the complicated workspace. These unexpected interferences may lead to poor performance and even destroy the stability of systems. It is known that environment disturbances are inevitable and usually described by the Brownian motion.
Stochastic MASs modeled by differential equations have been widely investigated in recent years [22]. However, the definition of consensus is not applicable if systems are disturbed by external inputs, and to describe the consensus in this case, the concept of quasi-consensus is proposed. Particularly, an error bound as controllable error for bounded external inputs is introduced in the quasi-consensus [23,24].
Significantly, working in an open environment typically brings about security problems [25]. Cyber-attacks are common, and they can destroy the stability of systems and seriously affect the equipment [26]. Hence, cyber-attacks are important factors when studying the stability of MASs. Generally, cyber-attacks are divided into two categories: denial-of-service (DoS) attacks [27,28] and deception attacks [29,30,31,32,33].
DoS attacks block communication networks, which leads to packet drops or packet time delays. For instance, the problem of communication topologies interrupted by DoS attacks with a definite probability was considered in [28].
Deception attacks relate to the situation that malicious adversaries can find and manipulate the transmitting information and control signal. False data injection attacks mean that false information can be injected to the controller or the feedback channel of the controller [29]. Furthermore, deception attacks can be divided into different categories: data replacement attacks, false data injection attacks and so on [30]. In [32], the quasi-consensus of a class of discrete-time multi-agent systems was studied using recursive linear matrix inequality and the stochastic analysis method.
In [33], in order to avoid certain adverse effects caused by system instability, load shedding and false data injection attacks, the authors designed a load frequency controller to provide a constant and uniform frequency in different operation cases of microgrids. The consensus of MASs in a given finite horizon were studied when the systems suffered from false data injection attacks [34].
To describe the randomness of deception attacks, Bernoulli variables were introduced in an attack scenario in [35]. Nevertheless, most of the existing results are on time-invariant MASs subjected to continuous-time deception attacks [29,31,32,33], while it is more practical and challenging for time-varying multi-agent systems under impulsive deception attacks.
With the above analysis, a consensus of time-varying MASs subject to both external inputs and deception attacks is missing in the literature, and how to release the restrictive assumption on the time-varying system matrix is meaningful and challenging. This paper aims to deal with the above problems, and the main contributions of this paper are summarized as follows:
(1). Compared with the traditional assumption on the time-varying system matrix of MASs, more general and practical conditions are considered in this paper versus the analysis approaches used in [5].
(2). Both false data injection attacks modeled with Bernoulli variables and external inputs are considered in this paper. Moreover, sufficient conditions for achieving the quasi-consensus are derived, and the error upper bounds related to the external inputs and deception attacks are also obtained.
The rest of this article is organized as follows. Some preliminaries are given in Section 2. Sufficient conditions for the quasi-consensus are provided in Section 3. In Section 4, an illustrative example is provided to verify the effectiveness of the proposed results. Finally, our conclusions are drawn in Section 5.
Throughout this article, the following notations are adopted. and are the maximum and minimum eigenvalues of any real and symmetrical matrix, respectively. and denote the n-dimensional identity matrix and an N-dimensional column vector with all ones, respectively. , , where . , , denotes an n-dimensional Euclidean space, and is the set of real matrix. diag denotes a block-diagonal matrix. is the operator of expectation, and denotes the Euclidean norm of vector . indicates the continuous mapping from X to Y. denotes the Dini derivative of the function , and it is defined as:
2. Preliminaries
2.1. Graph Theory
In general, a weighted undirected graph can be represented by , where , and = , mean the set of vertexes, the set of edges and the adjacency matrix, respectively. When data can be transferred between agent i and j, , , there exists an edge between and , that is , then and , otherwise . L is Laplacian matrix of graph , which can be denoted , and , , .
2.2. The Model of MASs
Consider a class of nonlinear time-varying MASs composed of N agents with external disturbances. The dynamics of agent can be described by
(1)
where , and represent the state, the control input and external disturbances of agent i, respectively. is a time-varying matrix, where A, T, and Q are constant matrices with suitable dimensions, and is a time-varying matrix. is a nonlinear function, represents intrinsic dynamics of the agent. Assume that the initial time , the initial state of agent i is and .The system considered in this article may be linear or non-linear, which mainly depends on the value of . Clearly, while , (1) is a linear system.
Assume that the random variables and in system (1) both obey the Bernoulli distribution with the value 0 or 1. Their probabilities are set as follows:
(2)
where α, β are known constants. In addition, and are independent of each other.Based on the above conditions, the following equations are established:
(3)
In this article, a controller that suffers from false data injection attacks is considered, and it is designed as follows:
(4)
where is the Dirac function, denotes the attack signal of the agent i, and means the strength of attack signal at the kth impulsive moment. is the impulsive control gain. is the impulsive time sequence and satisfies , . Let and . is a Bernoulli variable related to agent i, which is introduced to denote the occurrence of an achievable attack. Hence, one finds: where are known constants.The stochastic variables , are mutually independent.
The configuration of MAS with external inputs under deception attacks in this paper is shown in Figure 1. Deception attacks occur on the channel from sensor to controller, and the attackers inject false data to control signal at discrete-time instants, thus, reducing the accuracy of the system data.
According to the controller (4), MASs (1) suffering from false data injection attacks can be described as:
(5)
where . Throughout the article, assume that is right-hand continuous at , and .Notice that the stabilization problem of an error system is equal to the consensus of MASs. Therefore, define the error state and . With the help of a Kronecker product, one yields and , where , , and .
Then, the compact form error system under the false data injection attacks can be described as:
(6)
where is a diagonal matrix, as well as , where .The attack signal , , is bound: , and is a known positive constant.
For the nonlinear function f in system (1), there exist constants , that satisfy
Assume that the external disturbance is bounded and there exists a positive constant that satisfies
Ref. [36] Assume that are matrices with proper dimensions. Therefore, the Kronecker product has the properties
Ref. [37] For any given initial value of the system , if there exists a compact set and a constant ϑ such that as , the error state converges to
(7)
and then the MASs (1) is said to achieve quasi-consensus; ϑ is the upper bound of error; and if , MASs (1) is said to achieve consensus.Ref. [8] Given an impulsive sequence , let denotes the number of impulsive times in the interval , exists two constants and , such that
(8)
and are called the average impulsive interval and the elasticity number, respectively.3. Main Results
Suppose that Assumptions 1–5 hold, if there exists a positive definite matrix P and positive scalars , , , γ, , and , such that
(9)
(10)
(11)
where , , , , , , , , , , , and .
Then, the time-varying multi-agent system (1) with external inputs and deception attacks can achieve quasi-consensus under the control protocol (4), and the upper bound of error can be estimated as
where .
Consider the following Lyapunov function:
(12)
For , , taking the Dini derivative of (12) gives:
(13)
According to Assumption 1, one has:
(14)
(15)
Based on Assumption 4, it can be found that:
(16)
(17)
Substituting (14)–(17) into (13) and taking the mathematical expectation operation gives:
(18)
Therefore, combining the above conditions with (18), we have:
(19)
where + , , , and .For , and any positive number S, we establish a comparative differential equation as follows:
(20)
where By solving and comparing the solutions of the differential equations, the following result is obtained:For , , setting , one has:
(21)
For , , according to (6), we obtain:
(22)
where . As for the first term in (22), has:(23)
Then, we have:
(24)
For the fourth term, we obtain:
(25)
In summary, through (23)–(25), we reach the following conclusion:
(26)
where and .In this part, the mathematical induction method will be used to obtain the overall evolution process of the system, based on (21), which is proven as follows:
For , we have
(27)
According to (21) and (26), for any , , suppose that the following inequality holds:
(28)
For , , a comparative differential equation similar to (20) is established as follows:
(29)
where . By solving and comparing the solutions of the differential equations and , the following result is obtained:(30)
Based on the definition of in Definition 2, Assumption 5 and (30), for any , one finds:
(31)
where and . Then, set , and one has:(32)
It follows from (32) that:
(33)
As
In conclusion, the nonlinear time-varying multi-agent systems with external inputs under deception attacks can achieve quasi-consensus under impulsive protocol (4), and they have the upper bound of error:
□
Different from the works [31,32,35], the deception attacks in this paper mainly focus on the false data injection attacks in impulsive form. Note that the time-varying matrix in [37] assumes that with , and this bounded condition is removed here. In [35], the quasi-consensus problem of time-invariant systems under deception attacks is considered. Compare with [35], this paper takes into account external inputs, deception attacks and time-varying dynamics, which have greater significance in practice.
Based on the continuous time evolution characteristics of the system, a reasonable assumption is constructed as (9). In addition, it can be seen from (21) that the system is always unstable without a control protocol. If the system is stable, then (9) can be changed to:
(34)
Under Assumptions 1–5, if there exists a positive definite matrix P and positive scalars , , , γ, , and , the condition (34), and the following condition is satisfied:
(35)
where . Then, the nonlinear time-varying multi-agent system (1) with external inputs and deception attacks can achieve quasi-consensus under the control protocol (4), and the upper bound of error can be estimated as:
(36)
As this inference only involves the assumption of continuous time evolution characteristics of the system, it only needs to prove the first part and the third part according to Theorem 1. According to the solution of (19) and comparison function (20), for , , setting , one can find:
(37)
Similarly, we find that, as
(38)
where . When , we have:(39)
Hence, the nonlinear time-varying multi-agent system with external inputs and deception attacks can achieve quasi-consensus under control protocol (4), and
□
4. Numerical Examples
In this section, a numerical example is provided to verify the applicability of theoretical results. The undirected communication graph of time-varying MASs (1) is shown as Figure 2. From this, we know that
We consider 3-dimensional time-varying MASs with four agents, i.e., and . Setting , and
In addition, let , where . According to the control protocol designed in (4), Figure 3 describes an impulsive sequence with attack strength and impulsive control gain . On the one hand, we assume that , , and , then .
Considering the influence of an impulsive attack sequence, we adopt a distinctive impulsive signal , which satisfies (8) and is described as follows:
(40)
where and are positive numbers that satisfy , . Hence, we find and . We choose , according to (40), and we find that , . Choose that , then . The parameters of system are set as follows: with parameters , and . In addition, let , and .Based on the designed parameters and in consideration of , then , . , .
As shown in Figure 4, the green curve represents the modulus of the average states of the agents of the time-varying MASs. According to the parameters selected above, the upper bound of error can be calculated , which is shown as Figure 5. When , the trajectories of states coincide and the MASs achieves consensus. It can be seen from Figure 5 that, when system (1) disturbed by both external disturbances and impulse deception attacks, the quasi-consensus can be achieved under the control protocol (4), and the error is kept within the error bound. If there is no external disturbances or impulse deception attacks, the consensus of the system can be obtained as shown in Figure 6.
5. Conclusions
In this paper, we studied the quasi-consensus of a class of time-varying MASs suffering from both external inputs and deception attacks. By utilizing the analysis method from [5], we relaxed the restrictive assumption on time-varying matrices. To describe the success of deception attacks, a stochastic variable that obeys a Bernoulli distribution was adopted. By employing the comparison principle, sufficient conditions to ensure quasi-consensus were derived. Finally, a simulation example was given to verify the theoretical results.
Conceptualization, Z.Z.; methodology, Z.Z. and S.P.; software, Z.Z. and W.F.; validation, Z.Z., S.P. and W.F.; resources, Z.Z.; data curation, Z.Z.; writing—original draft preparation, Z.Z.; writing—review and editing, Z.Z., S.P. and W.F. All authors have read and agreed to the published version of the manuscript.
This work was supported in part by the National Natural Science Foundation of China under Grant 61973092, and in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2019A1515012104.
Not applicable.
Not applicable.
Not applicable.
The authors declare no conflict of interest.
The following abbreviations are used in this manuscript:
MASs | Multi-agent systems |
DoS | Denial-of-service |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Figure 1. Configuration of time-varying MASs with external inputs under deception attacks.
Figure 3. Impulsive sequence for [Forumla omitted. See PDF.] and [Forumla omitted. See PDF.].
Figure 5. Trajectories of system errors under external inputs and impulse deception attacks.
Figure 6. Trajectories of system errors without external inputs or impulse deception attacks.
References
1. Xu, S.; Lam, J.; Zou, Y.; Li, J. Robust admissibility of time-varying singular systems with commensurate time delays. Automatica; 2009; 45, pp. 2714-2717. [DOI: https://dx.doi.org/10.1016/j.automatica.2009.07.014]
2. Mazenc, F.; Malisoff, M.; Niculescu, S.I. Reduction model approach for linear time-varying systems with delays. IEEE Trans. Autom. Control; 2014; 59, pp. 2068-2082. [DOI: https://dx.doi.org/10.1109/TAC.2014.2320308]
3. Chen, G.; Yang, Y. Relaxed conditions for the input-to-state stability of switched nonlinear time-varying systems. IEEE Trans. Autom. Control; 2016; 62, pp. 4706-4712. [DOI: https://dx.doi.org/10.1109/TAC.2016.2625979]
4. Hu, W.; Zhu, Q.; Karimi, H.R. Some improved Razumikhin stability criteria for impulsive stochastic delay differential systems. IEEE Trans. Autom. Control; 2019; 64, pp. 5207-5213. [DOI: https://dx.doi.org/10.1109/TAC.2019.2911182]
5. Zhou, B. On asymptotic stability of linear time-varying systems. Automatica; 2016; 68, pp. 266-276. [DOI: https://dx.doi.org/10.1016/j.automatica.2015.12.030]
6. Zhou, B. Stability analysis of non-linear time-varying systems by Lyapunov functions with indefinite derivatives. IET Control Theory Appl.; 2017; 11, pp. 1434-1442. [DOI: https://dx.doi.org/10.1049/iet-cta.2016.1538]
7. Zhou, B.; Egorov, A.V. Razumikhin and Krasovskii stability theorems for time-varying time-delay systems. Automatica; 2016; 71, pp. 281-291. [DOI: https://dx.doi.org/10.1016/j.automatica.2016.04.048]
8. Peng, S.; Deng, F. New criteria on p th moment input-to-state stability of impulsive stochastic delayed differential systems. IEEE Trans. Autom. Control; 2017; 62, pp. 3573-3579. [DOI: https://dx.doi.org/10.1109/TAC.2017.2660066]
9. Zhang, W.; Han, Q.L.; Tang, Y.; Liu, Y. Sampled-data control for a class of linear time-varying systems. Automatica; 2019; 103, pp. 126-134. [DOI: https://dx.doi.org/10.1016/j.automatica.2019.01.027]
10. Yang, J. A Consensus Control for a Multi-Agent System With Unknown Time-Varying Communication Delays. IEEE Access; 2021; 9, pp. 55844-55852. [DOI: https://dx.doi.org/10.1109/ACCESS.2021.3070388]
11. Li, X.; Zhu, J. Event-triggered Weighted Average Consensus in Networks of Dynamic Agents with Time-varying Delay. IFAC-PapersOnLine; 2021; 54, pp. 127-132. [DOI: https://dx.doi.org/10.1016/j.ifacol.2021.11.127]
12. Xu, S.; Wang, B. Noisy Information Based Formation Control of Multi-Agent Systems in Time-Varying Communication Networks. IEEE Access; 2021; 9, pp. 70313-70321. [DOI: https://dx.doi.org/10.1109/ACCESS.2021.3078173]
13. Hu, J.; Wang, Z.; Gao, H.; Stergioulas, L.K. Robust sliding mode control for discrete stochastic systems with mixed time delays, randomly occurring uncertainties, and randomly occurring nonlinearities. IEEE Trans. Ind. Electron.; 2011; 59, pp. 3008-3015. [DOI: https://dx.doi.org/10.1109/TIE.2011.2168791]
14. Duan, Z.; Xiang, Z.; Karimi, H.R. Robust stabilisation of 2D state-delayed stochastic systems with randomly occurring uncertainties and nonlinearities. Int. J. Syst. Sci.; 2014; 45, pp. 1402-1415. [DOI: https://dx.doi.org/10.1080/00207721.2013.835004]
15. Zhang, Z.; Peng, S.; Liu, D.; Wang, Y.; Chen, T. Leader-Following Mean-Square Consensus of Stochastic Multiagent Systems With ROUs and RONs via Distributed Event-Triggered Impulsive Control. IEEE Trans. Cybern.; 2020; [DOI: https://dx.doi.org/10.1109/TCYB.2020.2999359]
16. Almeida, R.; Girejko, E.; Hristova, S.; Malinowska, A. On leader-following consensus in multi-agent systems with discrete updates at random times. Entropy; 2020; 22, 650. [DOI: https://dx.doi.org/10.3390/e22060650]
17. Zhao, C.; Liu, X.; Zhong, S.; Shi, K.; Liao, D.; Zhong, Q. Secure consensus of multi-agent systems with redundant signal and communication interference via distributed dynamic event-triggered control. ISA Trans.; 2021; 112, pp. 89-98. [DOI: https://dx.doi.org/10.1016/j.isatra.2020.11.030]
18. Ahirwar, S.; Swarnkar, R.; Bhukya, S.; Namwade, G. Application of drone in agriculture. Int. J. Curr. Microbiol. Appl. Sci.; 2019; 8, pp. 2500-2505. [DOI: https://dx.doi.org/10.20546/ijcmas.2019.801.264]
19. Du, H.; Zhu, W.; Wen, G.; Duan, Z.; Lü, J. Distributed formation control of multiple quadrotor aircraft based on nonsmooth consensus algorithms. IEEE Trans. Cybern.; 2017; 49, pp. 342-353. [DOI: https://dx.doi.org/10.1109/TCYB.2017.2777463]
20. Chen, J.; Yan, S.; Yang, T.; Tan, S.C.; Hui, S.Y. Practical evaluation of droop and consensus control of distributed electric springs for both voltage and frequency regulation in microgrid. IEEE Trans. Power Electron.; 2018; 34, pp. 6947-6959. [DOI: https://dx.doi.org/10.1109/TPEL.2018.2874495]
21. Rahbari-Asr, N.; Zhang, Y.; Chow, M.Y. Consensus-based distributed scheduling for cooperative operation of distributed energy resources and storage devices in smart grids. IET Gener. Transm. Distrib.; 2016; 10, pp. 1268-1277. [DOI: https://dx.doi.org/10.1049/iet-gtd.2015.0159]
22. Yu, J.; Yu, S.; Yan, Y. Fixed-time stability of stochastic nonlinear systems and its application into stochastic multi-agent systems. IET Control Theory Appl.; 2021; 15, pp. 126-135. [DOI: https://dx.doi.org/10.1049/cth2.12040]
23. Zhang, W.; Ho, D.W.; Tang, Y.; Liu, Y. Quasi-consensus of heterogeneous-switched nonlinear multiagent systems. IEEE Trans. Cybern.; 2019; 50, pp. 3136-3146. [DOI: https://dx.doi.org/10.1109/TCYB.2018.2882191]
24. Zhang, W.; Tang, Y.; Han, Q.L.; Liu, Y. Sampled-Data Consensus of Linear Time-Varying Multiagent Networks With Time-Varying Topologies. IEEE Trans. Cybern.; 2020; [DOI: https://dx.doi.org/10.1109/TCYB.2020.2977720]
25. Luo, H.; Wang, Y.; Zhan, R.; Zhang, X.; Wen, H.; Yang, S. Cluster-Delay Mean Square Consensus of Stochastic Multi-Agent Systems with Impulse Time Windows. Entropy; 2021; 23, 1033. [DOI: https://dx.doi.org/10.3390/e23081033]
26. Zhang, X.; Wang, S. Admissible consensus for descriptor multi-agent systems with exogenous disturbances. Entropy; 2018; 20, 276. [DOI: https://dx.doi.org/10.3390/e20040276]
27. Xu, Y.; Fang, M.; Pan, Y.J.; Shi, K.; Wu, Z.G. Event-triggered output synchronization for nonhomogeneous agent systems with periodic denial-of-service attacks. Int. J. Robust Nonlinear Control; 2021; 31, pp. 1851-1865. [DOI: https://dx.doi.org/10.1002/rnc.5223]
28. Zhang, T.Y.; Ye, D. Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks. Inf. Sci.; 2021; 542, pp. 380-390. [DOI: https://dx.doi.org/10.1016/j.ins.2020.06.070]
29. Pang, Z.H.; Fan, L.Z.; Sun, J.; Liu, K.; Liu, G.P. Detection of stealthy false data injection attacks against networked control systems via active data modification. Inf. Sci.; 2021; 546, pp. 192-205. [DOI: https://dx.doi.org/10.1016/j.ins.2020.06.074]
30. He, W.; Qian, F.; Han, Q.L.; Chen, G. Almost sure stability of nonlinear systems under random and impulsive sequential attacks. IEEE Trans. Autom. Control; 2020; 65, pp. 3879-3886. [DOI: https://dx.doi.org/10.1109/TAC.2020.2972220]
31. Shen, Z.; Yang, F.; Chen, J.; Zhang, J.; Hu, A.; Hu, M. Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay. Entropy; 2021; 23, 1291. [DOI: https://dx.doi.org/10.3390/e23101291] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/34682015]
32. Liu, L.; Sun, H.; Ma, L.; Zhang, J.; Bo, Y. Quasi-consensus control for a class of time-varying stochastic nonlinear time-delay multiagent systems subject to deception attacks. IEEE Trans. Syst. Man Cybern. Syst.; 2020; 51, pp. 6863-6873. [DOI: https://dx.doi.org/10.1109/TSMC.2020.2964826]
33. Javanmardi, H.; Dehghani, M.; Mohammadi, M.; Siamak, S.; Hesamzadeh, M.R. BMI-based load frequency control in microgrids under false data injection attacks. IEEE Syst. J.; 2021; [DOI: https://dx.doi.org/10.1109/JSYST.2021.3054947]
34. Li, X.M.; Zhou, Q.; Li, P.; Li, H.; Lu, R. Event-triggered consensus control for multi-agent systems against false data-injection attacks. IEEE Trans. Cybern.; 2019; 50, pp. 1856-1866. [DOI: https://dx.doi.org/10.1109/TCYB.2019.2937951]
35. He, W.; Mo, Z.; Han, Q.L.; Qian, F. Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks. IEEE/CAA J. Autom. Sin.; 2020; 7, pp. 1326-1334. [DOI: https://dx.doi.org/10.1109/JAS.2020.1003297]
36. Wang, Q.; Wang, J.L.; Wu, H.N.; Huang, T. Consensus and H∞ Consensus of Nonlinear Second-Order Multi-Agent Systems. IEEE Trans. Netw. Sci. Eng.; 2020; 7, pp. 1251-1264. [DOI: https://dx.doi.org/10.1109/TNSE.2019.2917287]
37. Wen, G.; Zhai, X.; Peng, Z.; Rahmani, A. Fault-tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control. Commun. Nonlinear Sci. Numer. Simul.; 2020; 82, 105043. [DOI: https://dx.doi.org/10.1016/j.cnsns.2019.105043]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
The quasi-consensus of a class of nonlinear time-varying multi-agent systems suffering from both external inputs and deception attacks is studied in this paper. This is different from a time-varying matrix, which is assumed to be bounded; further reasonable assumptions are supposed. In addition, impulsive deception attacks modeled with Bernoulli variables are considered. Sufficient conditions to achieve quasi-consensus are given, and the upper bounds of the error state related to the deception attacks is derived. Finally, a numerical simulation example is provided to show the validity of the obtained results.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer