Secure consensus control for multi-agent systems under communication delay

被引:1
|
作者
Wu Y.-M. [1 ]
Ding J.-J. [1 ]
He X.-X. [1 ]
Ou X.-H. [1 ,2 ]
机构
[1] College of Information Engineering, Zhejiang University of Technology, Hangzhou, 310023, Zhejiang
[2] School of Electronic and Electrical Engineering, Nanyang Technological University, Singapore
来源
Kongzhi Lilun Yu Yingyong/Control Theory and Applications | 2016年 / 33卷 / 08期
基金
中国国家自然科学基金;
关键词
Communication delay; Consensus; Multi-agent systems; Secure distributed control;
D O I
10.7641/CTA.2016.50713
中图分类号
学科分类号
摘要
This paper studies the secure consensus problem for discrete-time multi-agent systems under communication delay. The objective is to design a control protocol such that all normal agents can resist adversarial agents and asymptotically achieve an agreement as time goes to infinity. For the considered networked system, the control input of each normal agent can only use its own value and the delayed information of its neighbors. Sufficient and necessary conditions, which depend on the control parameters, the topological property, and the communication delay, are obtained to guarantee the final convergence of the consensus protocol. Finally, some numerical examples are given to demonstrate the theoretical results. © 2016, Editorial Department of Control Theory & Applications South China University of Technology. All right reserved.
引用
收藏
页码:1039 / 1045
页数:6
相关论文
共 30 条
  • [21] Zhao C.C., He J.P., Cheng P., Et al., Secure consensus against message manipulation attacks in synchronous networks, Proceedings of the 19th IFAC World Congress, 8, pp. 1182-1187, (2014)
  • [22] Abbas W., Vorobeychik Y., Koutsoukos X., Resilient consensus protocol in the presence of trusted nodes, Proceedings of the 7th International Symposium on Resilient Control Systems, 8, pp. 1-7, (2014)
  • [23] Sundaram S., Hadjicostis C.N., Distributed function calculation via linear iterative strategies in the presence of malicious agents, IEEE Transactions on Automatic Control, 56, 7, pp. 1495-1508, (2011)
  • [24] Pasqualetti F., Bicchi A., Bullo F., Consensus computation in unreliable networks: a system theoretic approach, IEEE Transactions on Automatic Control, 57, 1, pp. 90-104, (2012)
  • [25] Vaidya N.H., Tseng L., Liang G., Iterative approximate Byzantine consensus in arbitrary directed graphs, Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing, 7, pp. 365-374, (2012)
  • [26] Song H., Zhu S., Cao G., Attack-resilient time synchronization for wireless sensor networks, Ad Hoc Networks, 5, 1, pp. 112-125, (2007)
  • [27] Kim E.J., In J., Youm S., Et al., Delay attack-resilient clock synchronization for wireless sensor networks, IEICE Transactions on Information and Systems, 95, 1, pp. 188-191, (2012)
  • [28] Wu Y.M., He X.X., Liu S., Et al., Consensus of discrete-time multiagent systems with adversaries and time delays, International Journal of General Systems, 43, 3-4, pp. 402-411, (2014)
  • [29] Cao M., Morse A.S., Anderson B.D., Reaching a consensus in a dynamically changing environment: Convergence rates, measurement delays, and asynchronous events, SIAM Journal on Control and Optimization, 47, 2, pp. 601-623, (2008)
  • [30] Xiao F., Wang L., State consensus for multi-agent systems with switching topologies and time-varying delays, International Journal of Control, 79, 10, pp. 1277-1284, (2006)