4.6 Article

Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries

Journal

IEEE TRANSACTIONS ON CYBERNETICS
Volume 50, Issue 8, Pages 3458-3467

Publisher

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TCYB.2019.2896160

Keywords

Protocols; Decentralized control; Eigenvalues and eigenfunctions; Multi-agent systems; Laplace equations; Denial-of-service attack; Communication networks; Asymptotic consensus; distributed denial-of-service (DoS) attack; distributed secure control; event-triggered; sample data

Funding

  1. Singapore Economic Development Board through EIRP [S14-1172-NRF EIRP-IHL]
  2. Singapore Ministry of Education Academic Research Fund Tier 1 [RG180/17 (2017-T1-002-158)]
  3. Research Grants Council of the Hong Kong [CityU 11200717, CityU 7005029]
  4. Natural Science Foundation of Jiangsu Province [BK20180367]
  5. National Natural Science Foundation of China [61803082]
  6. Fundamental Research Funds for the Central Universities
  7. Alexander von Humboldt Foundation of Germany
  8. ZhiShan Youth Scholar Program from Southeast University

Ask authors/readers for more resources

This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries. In such an insecure network environment, two kinds of communication schemes, that is, sample-data and event-triggered communication schemes, are discussed. Then, a fully distributed control protocol with strong robustness and high scalability is well designed. This protocol guarantees asymptotic consensus against distributed DoS attacks. In this paper, fully emphasizes that the eigenvalue information of the Laplacian matrix is not required in the design of both the control protocol and event conditions. For the event-triggered case, two effective dynamical event-triggered schemes are proposed, which are independent of any global information. Such event-triggered schemes do not exhibit Zeno behavior even in the insecure environment. Finally, a simulation example is provided to verify the effectiveness of theoretical analysis.

Authors

I am an author on this paper
Click your name to claim this paper and add it to your profile.

Reviews

Primary Rating

4.6
Not enough ratings

Secondary Ratings

Novelty
-
Significance
-
Scientific rigor
-
Rate this paper

Recommended

No Data Available
No Data Available