1. Introduction
In recent years, multi-agent systems have attracted increasing attention from researchers because they are widely applied to UAV (Unmanned Aerial Vehicle) formation control [1], robot cooperative control [2], smart grid power allocation [3], and so on. One of the instrumental research directions for multi-agent systems is to design coordinated strategies, which describe the micro-communication among agents. There are many methods of study for multi-agent systems consensus, such as impulsive control [4], event-triggered control [5], model predictive control [6], integral sliding-mode control [7], model-free optimal control [8], and so on. However, the collaborative process is highly dependent on the channel.
In fact, due to the simple structure of agents, it is impossible to load complex protection protocols when communicating. Thus, multi-agent systems are easy to attack via DoS attacks [9,10], deception attacks [11], replay attacks [12], etc. Among these attacks, the DoS attacks do great damage to coordinations in multi-agent systems because they break off the channels and prevent information exchange between agents. Therefore, secure consensus for multi-agent systems under attacks has obtained more interest from investigators.
In [13], the authors used the random disturbance information and, considering the packet loss caused by DoS attacks, designed an observer to reconstruct the state of agents. The coupling probability constraint is transformed into the coupling deterministic constraint to resist the DoS attacks. In [14], a secure strategy was proposed to ensure the acceptable operation of multi-agent systems in the environment of DoS attacks. In [15], for attackers attacking different channels, a distributed controller was designed, and the authors considered the state feedback and observer controller so that consensus could still be reached in the environment of DoS attacks. For multi-agent systems in the presence of DoS attacks, the above paper [13,14,15,16] used different control strategies can achieve the goal of multi-agent consensus control. However, when systems are subject to attack, communication resources are restricted. To deal with it, in [17,18,19,20,21] event-triggered strategies were proposed to reduce the use of the controller and decrease the influence of channel break off caused by DoS attacks. In [17], researchers used the distributed sliding mode control method to study the control problem of a nonlinear second-order multi-agent system. In [19], the event-triggered distributed state estimation problem for linear multi-agent systems under DoS attacks was studied. In [20], a distributed event-triggered condition was designed to keep the whole system consistent in the case of multiple communication channel outages caused by irregular DoS attacks.
The above works assume the DoS attacks only destroy the local channels or the global channels when attacked. In fact, the topology of multi-agent systems tends to change because communications are interrupted. To cope with this problem, a switched system model was introduced in reference [22] to deal with changes caused by DoS attacks, and the quantitative relation between consensus performance and attack parameters was established. In [23], the secure consensus problem of multi-agent systems under DoS attacks on the communication topology was studied. The switched systems are usually composed of some subsystem models. The Markovian process has been proved to be effective for describing switching rules caused by the sudden change from the outer environment, topology switching and man-made intervention. In order to describe the process of topology random switching in multi-agent systems, paper [24,25] used the Markov process to establish a topological switching model. In the process of topology switching at present, the transition rates of model changes of different subsystems were given partially or even completely [26,27].
Nevertheless, there are a few works that consider the impact of each possible topology governed by the Markovian process. In fact, DoS attacks may cause the original possible topology to change, and cannot be ignored. Wang et al. [28] considered the impact of the attacks on the topology, but the controller was based on a continuous-time design, and did not consider the DoS attack energy-limited analysis. Moreover, due to the existence of external interference factors, the transition rates of each subsystem model switching are generally not accurate. In this case, the transition rates are deemed to be partly unknown or fully unknown. Meanwhile, DoS attacks cause changes to the possible topologies in the next switched period.
Motivated by the discussions above, we focus on the problem of leader-following multi-agent systems. This paper adopts an event-triggered strategy to control the consensus of multi-agent systems affected by DoS attacks during Markovian switching topologies. The main innovation points of this paper are as follows.
-
(1). Different from the topology switching process in reference [20], this paper uses the Markov process to establish the topological switching process. We study the consensus of the topology in the random switching process under the DoS attack. Compared with reference [20], this paper also needs to analyze the random process, so the theoretical analysis process is more complex.
-
(2). In order to describe the issue of energy-limited DoS attack, the DoS attack suffered by the multi-agent systems is further analyzed and the upper limit of DoS attack intensity is given, which will be more in line with practical application scenarios.
-
(3). Because of the influence of the DoS attacks, the channels between agents will be interrupted. After each attack, the controller of the system will be updated after the communication recovery. Therefore, with the premise of ensuring the secure consensus of the multi-agent systems, an event-triggered control is designed based on stochastic process analysis, a recursive method, and an inequality method to reduce the use of the controller.
The structure of this paper is as follows: Section 2 introduces some preliminary knowledge, algebraic graph theory, the Markovian switching process, and control objectives. In Section 3, a security control scheme based on event triggering is proposed. In Section 4, the stability analysis is carried out. Section 5 gives a numerical example and Section 6 gives a conclusion.
2. Preliminaries
2.1. Notations
In this paper, The notations and N denote the sets of real and natural numbers, respectively. The notations and denote the n-dimensional vector space and matrix space, respectively. The notation represents an -dimensional matrix in which each element is 1. The notations and ⊗ represent the Euclidean norm and the Kronecker product, respectively. The notation is the transpose of a matrix C. Moreover, represents that the switching signal set is driven by a Markov chain. For two sets, and , denotes the set of elements belonging to , but not those belonging to .
2.2. Graph Theory
We consider an undirected graph , where represents the vertex set of follower agent nodes and represents the set of edges in the graph. The notation represents the node pair , where the node can receive the information sent by the node . The neighbor agent node set of the agent node is defined as . The notation is the adjacency matrix of a directed graph. In the matrix , when , there is the weight of the edge ; otherwise . The Laplacian matrix of the figure is or , where represents a degree matrix, the notation m is a subsystem mode of multi-agent system in the Markov switching topology process. The adjacency matrix of leader and follower is . If the node can send information to the node , then ; otherwise, .
2.3. Markovian Switching Process
The Markovian switching topology is defined as , where . The notation represents the Markovian jump process. For different switching topology sets , its adjacency matrix is and its Laplacian matrix is , as defined in the Graph theory. In the Markovian process, the transition probabilities of different subsystems are determined by the following equation:
where , is the little o notation and represents the transfer rate between different elements m to elements n in the set S from time t to time and . Apart from this, the transition rates matrix composed of the transfer rates of different elements is expressed as follows, and the set of transition rates is defined as S.2.4. DoS Attack Model
DoS attack is a common cyber attack, which can directly attack the network communication channels. In this paper, we consider that the communication channels between agents are attacked, resulting in communication interruption between two adjacent agents, leaving them unable to transmit information. Without generality, the DoS attack is an energy-limited attack and a random discontinuous attack. Moreover, the DoS attacks are irregular, so intervals that systems suffer from are uncertain, and the whole attack process is random. Therefore, this increases the difficulty of establishing the consensus convergence criteria for this modeled multi-agent system.
Throughout this paper, the DoS attacks can be divided into two phases: one is the system suffered by DoS attacks, while the other is not. In this paper, is defined as the attack time sequence of the DoS attacks, which means the kth DoS attack time and is the duration of the kth DoS attack. This time is not fixed and there is no distribution law. For the entire multi-agent systems that suffered every DoS attack, this paper defines to represent the attack interval of the kth DoS attack, where represents the end of the kth DoS attack. is defined as the period from the end of the kth attack to the beginning of the th attack without DoS attack, as shown in Figure 1.
([21]). DoS attacks are assumed to have limited energy.
When the channel between agents is attacked, the total length of time that agents cannot communicate is:
The system is not attacked, and the normal communication interval between agents is defined as:
([29]). represents the number of attacks on the entire multi-agent systems in , so the corresponding attack frequency is defined as:
([30]). The attack length rate is the total attack time to the total system operation time so the corresponding length rate ς is defined as:
3. Problem Formulation
The multi-agent systems considered in this paper include a leader agent and N follower agents. The dynamic model for the i-follower agent in the system is defined as
(1)
where represents the state value of the i follower agent and stands for the control input of the i follower agent. The notations and are the constant matrices with approximate dimensions, respectively. Assume that the pair (A, B) is stabilizable. The leader agent is defined as and its dynamic model is defined as:(2)
For multi-agent systems with Markovian switching topology under DoS attacks, to reduce the consumption of communication resources between agents and maintain the good consensus effect of multi-agent systems, a distributed event-triggered control is used for consensus control. The controller is designed as
(3)
where represents the triggering time sequence. The event trigger time is defined as where is the event trigger function. At the triggering instants, the agent i can sample the information of its neighbors to update its control protocol . The notation denotes the feedback control gain, . The notation represents the coupling weight value between agent i and j. If the two agents can establish communication exchange information, ; otherwise, . The notation represents the coupling weight value between the agent i and the leader. If they can communicate, then , otherwise, .For DoS attacks, the above assumption 1 indicates that the attacks are energy-limited, and do not always attack the channel, and they are intermittent. When the attacks work, the communication channel between the agents will be interrupted. Then, the agents cannot communicate normally. Moreover, the topology of the multi-agent systems will change. When the attacks stop, the channel will recover. In other words, only within attack time will the topology of the subsystems change.
In , the communication channel of the agent is attacked, then the communication channel is interrupted, which means the information of the agent i and their neighbor, which cannot change adjacent to the agent, will not be collected. The worst case scenario is that the channels of agent i are all interrupted, in which case the agent i will not communicate with all of its neighbors, now .
Through the above discussion, the control protocol is designed as
(4)
When the DoS attacks disappear, the communication channel will recover and information can be transmitted among agents again. If the event trigger condition is satisfied, the control protocol will work.
In the case of limited system communication resources, the adoption of this protocol can not only reduce the consumption of a large number of communication resources between agents, but can also maintain the consensus of the entire system. The measurement error function for the agent i is defined as
(5)
The state error of multi-agent systems is . In the communication area , we can get the equation:
(6)
According to the notation , using Kronecker, we can get:
(7)
when the system is affected by an attack, the following is available:(8)
where ,Under uncertain random switching topologies and DoS attacks, if the following inequalities are satisfied, the multi-agent systems based on Markovian switching can achieve mean-square consensus.
(9)
where represent two positive constants, respectively.(Schur Complement) linear matrix inequality
(10)
equal to one of the following conditions holding:-
, ,
-
, .
4. Results
In this section, we provide sufficient conditions for secure consensus with Markov switching topologies under DoS attacks.
4.1. Stability Analysis
The secure consensus of leader-following multi-agent systems can be achieved under the following triggering condition.
(11)
where . Given the constants , if there are matrices , with appropriate dimensions, makes the following matrix inequalities hold:(12)
(13)
(14)
(15)
where , . The definition of has been given in Definitions 2 and 3, respectively.Firstly, the following Lyapunov function is constructed:
(16)
For the agent in the normal communication region and each , the infinitesimal operator ℑ of the Lyapunov function is defined as:
(17)
Using full probability formulas and conditional expectations:
(18)
Similar to the calculation of Markov process in [31], we can get
(19)
where . Taking the expected values on both sides of Equation (18) above, the following equation can be obtained:(20)
For the derivation of the above process, the same treatment method is adopted as in paper [21]. We adopt an orthogonal matrix W, such that and , where . Obviously, , where . The minimum eigenvalue of is in the whole Markov process. From Equation (12), we can get
(21)
Notice that, according to the event trigger condition, one has
(22)
Substituting (22) into (21), it yields
(23)
where , . The notation is the cardinality of the set . It is obvious that and in the area . For the Markov process, combined with Equation (25), the following equation can be derived.(24)
The same analysis method is used to analyze the DoS attacks process. In the region, due to the attacks on the communication channels between agents, the information transmission between agents cannot be carried out, so some topological structures will change at this time. Therefore, the following equation can be obtained:
(25)
According to Equation (13), the following formula will hold:
(26)
According to Comparison Lemma, the whole process can be summarized as follows.
(27)
Here, we define to continue the analysis. In
(28)
If , then
(29)
where . According to Definition 2, we can get(30)
Based on Equations (14) and (15), Equation (30) can be written as
(31)
where and . In conclusion, we can get . This means that the multi-agent systems secure consensus under mean-square consensus is proved. This completes the proof. □Since each DoS attack occurs in a random discontinuity when the entire system is running, it is necessary to use the induction method to analyze the whole process. If the stability condition of the entire system in the DoS attacks environment is to be obtained, this is similar to most previous literature processing, such as [21].
4.2. Elimination of Zeno’s Behavior
Next, we will show that in the context of this article, the Zeno behavior does not exist. If the Zeno behavior does not exist, then the minimum event interval between the two adjacent event trigger times will be greater than zero, as expressed in the formula: .
Firstly, region is analyzed. The proved method is similar to [21,31]. When the derivation of the measurement error function of the formula is: When , the derivation of the measurement error function of the formula is
(32)
where let . The Equation (22) can be rewritten as:(33)
In the the sufficient condition for the triggering condition is considered as follows:
(34)
when the event is triggered, considering condition. Then, by adopting similar method in [32], there is a link So If , we will get:(35)
This set is non-empty and , so in the normal communication region, the Zeno behavior will not occur. When the system is in DoS attack range , it can be seen that the event trigger function will not be triggered. At this time, the Zeno behavior can be excluded. □
Compared with the existing literature, this article has the following advantages: (i) It considers more complex communication topology, and therefore will be more general than Yang et al. [20], Xu et al. [21]; (ii) it clears the upper limit of DoS attacks, which will be more suitable for the application scenarios in real life compared with the research contents of Yang et al. [20], Wang et al. and other literature; (iii) it saves system control resources. Compared with the research work of Wang et al. [28], unnecessary waste of communication resources can be avoided and control efficiency can be improved.
5. Numerical Simulations
This section will give a simulation experiment to verify the effectiveness of the algorithm. Figure 2 is leader–follower system (1) and (2) as a system with one leader and three followers, where , . The topological structure corresponding to the DoS attacks is shown in Figure 3. The corresponding H matrices are given as follows:
Let , . The feedback gain matrix for different topologies , and are
The transmission probability matrix is chosen to be . Suppose that the initial distribution of the Markov process obeys an invariant distribution and . Choose , . Figure 4 shows the state error value of the agent. It is not difficult to see from Figure 5 that it exhibits the triggering instants for three agents. Figure 6 depicts the time period during which DoS emerges in multi-agent systems, and Figure 7 is the Markovian jump process, respectively.
6. Conclusions
In this paper, we mainly studied the secure consensus control of the multi-agent systems with Markovian switching systems under DoS attack. We used an event-trigger strategy to control the consensus of the leader–follower system. Unlike fixed topology, the topology was controlled by the Markov switching process. Moreover, we considered that DoS attacks cause changes in communication topologies, which lead to network paralysis. We used the stochastic technique, induction, Lyapunov functional protocol, and other related knowledge to design the mean square consensus condition to ensure that the system could reach a stable state. Finally, we used a simulation experiment to prove the validity of the proposed model. Further research works will consider the problem of communication delay in the topology switching process under DoS attacks.
Conceptualization, H.L. and X.W.; methodology, H.L.; formal analysis, S.T.; investigation, S.T.; resources, Q.H.; data curation, S.T.; writing—original draft preparation, S.T.; visualization, S.T.; supervision, Q.H.; funding acquisition, Y.T. All authors have read and agreed to the published version of the manuscript.
Not applicable.
Not applicable.
Not applicable.
The authors wishe to thank the reviewers for their precious reviews.
The authors have no conflict of interest to declare.
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.
References
1. Zhou, Z.; Wang, H.; Wang, Y.; Xue, X.; Zhang, M. Distributed Formation Control for Multiple Quadrotor UAVs under Markovian Switching Topologies with Partially Unknown Transition Rates. J. Frankl. Inst.; 2019; 356, pp. 5706-5728. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2018.11.051]
2. Dong, X.; Yuan, C.; Stegagno, P.; Zeng, W.; Wang, C. Composite cooperative synchronization and decentralized learning of multi-robot manipulators with heterogeneous nonlinear uncertain dynamics. J. Frankl. Inst.; 2019; 356, pp. 5049-5072. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2019.04.028]
3. Guo, F.; Xu, Q.; Wen, C.; Wang, L.; Wang, P. Distributed secondary control for power allocation and voltage restoration in islanded DC microgrids. IEEE Trans. Sustain. Energy; 2018; 9, pp. 1857-1869. [DOI: https://dx.doi.org/10.1109/TSTE.2018.2816944]
4. Han, J.; Zhang, H.; Liang, X.; Wang, R. Distributed impulsive control for heterogeneous multi-agent systems based on event-triggered scheme. J. Frankl. Inst.; 2019; 356, pp. 9972-9991. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2019.01.055]
5. Sun, Y.; Shi, P.; Lim, C. Event-triggered sliding mode scaled consensus control for multi-agent systems. J. Frankl. Inst.; 2022; 359, pp. 981-998. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2021.12.007]
6. Dai, L.; Cao, Q.; Xia, Y.; Gao, Y. Distributed MPC for formation of multi-agent systems with collision avoidance and obstacle avoidance. J. Frankl. Inst.; 2017; 354, pp. 2068-2085. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2016.12.021]
7. Yang, Y.; Liu, F.; Yang, H.; Yuling, L.; Liu, Y. Distributed Finite-Time Integral Sliding-Mode Control for Multi-Agent Systems with Multiple Disturbances Based on Nonlinear Disturbance Observers. J. Syst. Sci. Complex.; 2021; 34, pp. 995-1013. [DOI: https://dx.doi.org/10.1007/s11424-020-9152-6]
8. Jing, G.; Bai, H.; George, J.; Chakrabortty, A. Model-Free Optimal Control of Linear Multi-Agent Systems via Decomposition and Hierarchical Approximation. IEEE Trans. Control Netw. Syst.; 2021; 8, pp. 1069-1081. [DOI: https://dx.doi.org/10.1109/TCNS.2021.3074256]
9. Ni, H.; Xu, Z.; Cheng, J.; Zhang, D. Robust Stochastic Sampled-data-based Output Consensus of Heterogeneous Multi-agent Systems Subject to Random DoS Attack: A Markovian Jumping System Approach. Int. J. Control Autom. Syst.; 2019; 17, pp. 1687-1698. [DOI: https://dx.doi.org/10.1007/s12555-018-0658-9]
10. Cheng, Z.; Yue, D.; Hu, S.; Ge, H.; Chen, L. Distributed event-triggered consensus of multi-agent systems under periodic DoS jamming attacks. Neurocomputing; 2020; 400, pp. 458-466. [DOI: https://dx.doi.org/10.1016/j.neucom.2019.03.089]
11. He, W.; Mo, Z.; Han, Q.L.; Qian, F. Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks. IEEE/CAA J. Autom. Sin.; 2020; 5, pp. 1326-1334. [DOI: https://dx.doi.org/10.1109/JAS.2020.1003297]
12. Arafa, M.; Tahoun, A. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. ISA Trans.; 2021; 110, pp. 1-14.
13. Yang, Y.; Li, Y.; Xia, Y. MPC-based defense strategy for distributed networked control systems under DoS attacks. Syst. Control Lett.; 2019; 128, pp. 9-18. [DOI: https://dx.doi.org/10.1016/j.sysconle.2019.04.001]
14. Amullen, E.M.; Shetty, S.; Keel, L.H. Secured Formation Control for Multi-agent Systems Under DoS Attacks. Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST); Waltham, MA, USA, 10–11 May 2016; pp. 1-6.
15. Lu, A.; Yang, G. Distributed Consensus Control for Multi-Agent Systems under Denial-of-Service. Inf. Sci.; 2018; 439, pp. 95-107. [DOI: https://dx.doi.org/10.1016/j.ins.2018.02.008]
16. Guo, X.; Liu, P.; Wang, J. Event-Triggered Adaptive Fault-Tolerant Pinning Control for Cluster Consensus of Heterogeneous Nonlinear Multi-Agent Systems Under Aperiodic DoS Attacks. IEEE Trans. Netw. Sci. Eng.; 2021; 2, pp. 1941-1956. [DOI: https://dx.doi.org/10.1109/TNSE.2021.3077766]
17. Yao, D.; Li, H.; Lu, R.; Shi, Y. Distributed Sliding-Mode Tracking Control of Second-Order Nonlinear Multiagent Systems: An Event-Triggered Approach. IEEE Trans. Cybern.; 2020; 9, pp. 3892-3902. [DOI: https://dx.doi.org/10.1109/TCYB.2019.2963087]
18. Zha, L.; Liu, J.; Cao, J. Resilient event-triggered consensus control for nonlinear muti-agent systems with DoS attacks. J. Frankl. Inst.; 2019; 356, pp. 7071-7090. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2019.06.014]
19. Sun, Y.; Yang, G. Event-Triggered Distributed State Estimation for Multiagent Systems Under DoS Attacks. IEEE Trans. Cybern.; 2020; 99, pp. 6901-6910. [DOI: https://dx.doi.org/10.1109/TCYB.2020.3034456]
20. Yang, Y.; Li, Y.; Yue, D. Event-trigger-based consensus secure control of linear multi-agent systems under DoS attacks over multiple transmission channels. Inf. Sci.; 2020; 5, pp. 105-118. [DOI: https://dx.doi.org/10.1007/s11432-019-2687-7]
21. Xu, Y.; Fang, M.; Shi, P.; Wu, Z.G. Event-Based Secure Consensus of Mutiagent Systems Against DoS Attacks. IEEE Trans. Cybern.; 2020; 8, pp. 3468-3476. [DOI: https://dx.doi.org/10.1109/TCYB.2019.2918402]
22. Zhang, D.; Feng, G. A New Switched System Approach to Leader-Follower Consensus of Heterogeneous Linear Multiagent Systems With DoS Attack. IEEE Trans. Syst.; 2021; 2, pp. 1258-1266. [DOI: https://dx.doi.org/10.1109/TSMC.2019.2895097]
23. Zhu, J.; Liang, C.Y.; He, D.F.; Wang, X. A Novel Intermediate Estimator Based Secure Consensus Control for Multi-agent Systems with Application to Networked Multi-axis Motion Synchronization. Int. J. Control Autom. Syst.; 2021; 4, pp. 1470-1479. [DOI: https://dx.doi.org/10.1007/s12555-020-0352-6]
24. Dai, J.; Guo, G. Exponential consensus of non-linear multi agent systems with semi-Markov switching topologies. IET Control Theory Appl.; 2017; 18, pp. 3363-3371. [DOI: https://dx.doi.org/10.1049/iet-cta.2017.0562]
25. Dai, J.; Guo, G. Event-based consensus for second-order multi-agent systems with actuator saturation under fixed and Markovian switching topologies. J. Frankl.-Inst.-Eng. Appl. Math.; 2017; 14, pp. 6098-6118. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2017.07.011]
26. Hu, Z.; Mu, X. Stabilization for switched stochastic systems with semi-Markovian switching signals and actuator saturation. Inf. Sci.; 2019; 483, pp. 419-431. [DOI: https://dx.doi.org/10.1016/j.ins.2019.01.063]
27. Wu, X.; Mu, X. Event-triggered control for networked nonlinear semi-Markovian jump systems with randomly occurring uncertainties and transmission delay. Inf. Sci.; 2019; 487, pp. 84-96. [DOI: https://dx.doi.org/10.1016/j.ins.2019.03.014]
28. Wang, X.; Yang, H.; Zhong, S. Improved results on consensus of nonlinear MASs with nonhomogeneous Markov switching topologies and DoS cyber attacks. J. Frankl.-Inst.-Eng. Appl. Math.; 2021; 14, pp. 7237-7253. [DOI: https://dx.doi.org/10.1016/j.jfranklin.2021.07.044]
29. Dong, T.; Gong, Y. Leader-following secure consensus for second-order multi-agent systems with nonlinear dynamics and event-triggered control strategy under DoS attack. Neurocomputing; 2019; 416, pp. 95-102. [DOI: https://dx.doi.org/10.1016/j.neucom.2019.01.113]
30. Zhi, F.; Wen, G.H.; Hu, G.Q. Distributed secure coordinated control for multiagent systems under strategic attacks. IEEE Trans. Cybern.; 2017; 47, pp. 1273-1284.
31. Liu, Q.; Wang, Z.; He, X.; Zhou, D. Event-based Distributed Filtering over Markovian Switching Topologies. IEEE Trans. Autom. Control; 2018; 64, pp. 1595-1602. [DOI: https://dx.doi.org/10.1109/TAC.2018.2853570]
32. Hu, W.; Liu, L. Cooperative output regulation of heterogeneous linear multi-agent systems by event-triggered control. IEEE Trans. Cybern.; 2017; 47, pp. 105-116. [DOI: https://dx.doi.org/10.1109/TCYB.2015.2508561] [PubMed: https://www.ncbi.nlm.nih.gov/pubmed/26766386]
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
© 2022 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/). Notwithstanding the ProQuest Terms and Conditions, you may use this content in accordance with the terms of the License.
Abstract
This paper studies secure consensus control for multi-agent systems subject to denial-of-service (DoS) attacks. The DoS attacks cause changes in topologies, which will destroy the channels of communication and result in network paralysis. Unlike the existing publications with Markov switching, this paper mainly studies the topological structure changes of the subsystem models after DoS attacks. To ensure the consensus of systems, this paper designs an event triggered to reduce the use of the controller and decrease the influence of channel breaks off caused by DoS attacks. On this basis, different Lyapunov functions are established in each period of attack. Then, stochastic and Lyapunov stable theory is used to form the consensus criteria. Moreover, Zeno behavior is excluded by theoretical analysis. Finally, the simulation experiment proves the effectiveness of the proposed protocol.
You have requested "on-the-fly" machine translation of selected content from our databases. This functionality is provided solely for your convenience and is in no way intended to replace human translation. Show full disclaimer
Neither ProQuest nor its licensors make any representations or warranties with respect to the translations. The translations are automatically generated "AS IS" and "AS AVAILABLE" and are not retained in our systems. PROQUEST AND ITS LICENSORS SPECIFICALLY DISCLAIM ANY AND ALL EXPRESS OR IMPLIED WARRANTIES, INCLUDING WITHOUT LIMITATION, ANY WARRANTIES FOR AVAILABILITY, ACCURACY, TIMELINESS, COMPLETENESS, NON-INFRINGMENT, MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE. Your use of the translations is subject to all use restrictions contained in your Electronic Products License Agreement and by using the translation functionality you agree to forgo any and all claims against ProQuest or its licensors for your use of the translation functionality and any output derived there from. Hide full disclaimer
Details


1 College of Intelligent Technology and Engineering, Chongqing University of Science and Technology, Chongqing 401331, China;
2 College of Electronic and Information Engineering, Southwest University, Chongqing 400075, China;
3 College of Safety Engineering, Chongqing University of Science and Technology, Chongqing 401331, China;