Secure Consensus Control of Multiagent Systems Under DoS Attacks: A Switching-Scheme-Based Active Defense Method

被引:4
作者
Zhang, Dong-Yu [1 ]
Li, Xiao-Jian [2 ,3 ]
机构
[1] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
[2] Northeastern Univ, State Key Lab Synthet Automat Proc Ind, Shenyang 110819, Peoples R China
[3] Northeastern Univ, Coll Informat Sci & Engn, Shenyang 110819, Peoples R China
基金
中国国家自然科学基金;
关键词
Topology; Switches; Denial-of-service attack; Network topology; Observers; Control systems; Consensus control; Multi-agent systems; Actuators; Frequency control; Adaptive switching mechanism; backup topologies; denial-of-service (DoS) attacks; multiagent systems (MASs); secure consensus control; FAULT-TOLERANT CONTROL; H-INFINITY CONSENSUS; NONLINEAR-SYSTEMS;
D O I
10.1109/TCYB.2024.3467272
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This article studies the secure consensus control problem of multiagent systems (MASs) with a nonzero input leader subject to denial-of-service (DoS) attacks. The introduction of backup topologies makes it possible for MASs to actively defend against DoS attacks. Subsequently, a novel active defense method consisting of two types of state observers, an adaptive topology switching mechanism, and switching controllers is proposed, which can ensure the leader-follower bound consensus even if DoS attacks hinder the interaction between agents. Within such a defense framework, the switching mechanism, driven by the predefined performance index and designed monitoring function, can automatically search for a healthy communication graph among backup topologies. Concurrently, the observer-based switching control strategy will be modified to match the corresponding topology, in which the universal observer and controller parameters in different topologies are obtained by solving linear matrix inequalities. It should be highlighted that the developed defense scheme not only removes the limitations of existing results on the duration and frequency of DoS attacks but also ensures the same upper bound of consensus error before and after DoS attacks. Finally, several simulation examples for different systems illustrate the efficiency and superiority of the theoretical results.
引用
收藏
页码:7404 / 7415
页数:12
相关论文
共 46 条
[1]   Secure State Estimation Against Sparse Sensor Attacks With Adaptive Switching Mechanism [J].
An, Liwei ;
Yang, Guang-Hong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2018, 63 (08) :2596-2603
[2]   SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks [J].
Chang, Sang-Yoon ;
Hu, Yih-Chun .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2017, 16 (12) :3527-3540
[3]   H∞ Containment Control of Multiagent Systems Under Event-Triggered Communication Scheduling: The Finite-Horizon Case [J].
Chen, Wei ;
Ding, Derui ;
Ge, Xiaohua ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (04) :1372-1382
[4]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[5]   MAS-Based Distributed Resilient Control for a Class of Cyber-Physical Systems With Communication Delays Under DoS Attacks [J].
Deng, Chao ;
Wen, Changyun .
IEEE TRANSACTIONS ON CYBERNETICS, 2021, 51 (05) :2347-2358
[6]   Event-Triggered Consensus of Linear Multiagent Systems With Time-Varying Communication Delays [J].
Deng, Chao ;
Er, Meng Joo ;
Yang, Guang-Hong ;
Wang, Ning .
IEEE TRANSACTIONS ON CYBERNETICS, 2020, 50 (07) :2916-2925
[7]   An Event-Triggered Observer and Its Applications in Cooperative Control of Multiagent Systems [J].
Dong, Yi ;
Lin, Zongli .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2022, 67 (07) :3647-3654
[8]   Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks [J].
Feng, Zhi ;
Wen, Guanghui ;
Hu, Guoqiang .
IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (05) :1273-1284
[9]   Event-Based Set-Membership Leader-Following Consensus of Networked Multi-Agent Systems Subject to Limited Communication Resources and Unknown-But-Bounded Noise [J].
Ge, Xiaohua ;
Han, Qing-Long ;
Yang, Fuwen .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017, 64 (06) :5045-5054
[10]   Resilient Time-Varying Formation-Tracking of Multi-UAV Systems Against Composite Attacks: A Two-Layered Framework [J].
Gong, Xin ;
Basin, Michael V. ;
Feng, Zhiguang ;
Huang, Tingwen ;
Cui, Yukang .
IEEE-CAA JOURNAL OF AUTOMATICA SINICA, 2023, 10 (04) :969-984