4.8 Article

Resilient Event-/Self-Triggering Leader-Following Consensus Control of Multiagent Systems Against DoS Attacks

期刊

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS
卷 19, 期 4, 页码 5925-5934

出版社

IEEE-INST ELECTRICAL ELECTRONICS ENGINEERS INC
DOI: 10.1109/TII.2022.3187747

关键词

Denial-of-service (DoS) attacks; event/self-triggered communication; leader-following consensus; multiagent system (MAS)

向作者/读者索取更多资源

This article proposes two update strategies based on event/self-triggering for control protocols to handle the leader-following consensus in unreliable shared networks against denial-of-service (DoS) attacks. The strategies include a dynamic event-triggered communication scheme to mitigate unnecessary information transfer and a self-triggered communication function to save computation resources. The effectiveness of the proposed strategies and control protocols is verified through simulations.
This article focuses on the problem of resilient leader-following consensus for multiagent systems against denial-of-service (DoS) attacks. Two update strategies based on event/self-triggering are proposed for the control protocols to handle the leader-following consensus in unreliable shared networks. We first propose a dynamic event-triggered communication scheme to mitigate unnecessary information transfer through energy-limited and vulnerable networks. Continuous communication between agents can be avoided. DoS attacks are supposed to be aperiodic and asynchronous at different edges. The concept of valid DoS attack interval is introduced, and the frequency and duration of attacks are analyzed. The leader-following consensus can be achieved when there exist DoS attacks using the dynamic event-based control strategy. Then, to avoid continuous event detection and save computation resources, a self-triggered communication function is developed. The next triggering moment is predetermined with the latest received state information, and the Zeno behavior is eliminated for the feasibility of the event/self-triggering scheme. Finally, a simulation is provided to verify the effectiveness of the proposed update strategies and control protocols.

作者

我是这篇论文的作者
点击您的名字以认领此论文并将其添加到您的个人资料中。

评论

主要评分

4.8
评分不足

次要评分

新颖性
-
重要性
-
科学严谨性
-
评价这篇论文

推荐

暂无数据
暂无数据