Secure consensus of multi-agent systems under denial-of-service attacks

被引:74
作者
Wen, Guanghui [1 ]
Wang, Peijun [2 ]
Lv, Yuezu [3 ,4 ]
Chen, Guanrong [5 ]
Zhou, Jialing [3 ,4 ]
机构
[1] Southeast Univ, Sch Math, Dept Syst Sci, Nanjing 211189, Peoples R China
[2] Anhui Normal Univ, Sch Math & Stat, Wuhu, Peoples R China
[3] Beijing Inst Technol, Adv Res Inst Multidisciplinary Sci, Beijing, Peoples R China
[4] Beijing Inst Technol, Yangtze Delta Reg Acad, Jiaxing, Peoples R China
[5] City Univ Hong Kong, Dept Elect Engn, Hong Kong, Peoples R China
关键词
denial-of-service attack; multi-agent system; resilient controller; secure consensus; SWITCHING TOPOLOGIES; OBSERVERS; NETWORKS; DESIGN;
D O I
10.1002/asjc.2953
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In this paper, we study the secure consensus problem for multiple-input-multiple-output (MIMO) linear multi-agent systems (MASs) subject to denial-of-service (DoS) attacks, where an attack on an agent will block its associated communication channels until it stops. Firstly, we design an unknown input observer (UIO), based upon which we develop a resilient consensus controller, where the UIO depends only on the relative outputs. By employing a common Lyapunov function (CLF) and using the average dwell-time (ADT) method, we show that secure consensus is achieved if the attack length rate is not greater than a positive threshold. Secondly, we design a resilient consensus controller with different control gains. By using the multiple Lyapunov functions (MLFs) technique, we show that secure consensus is achieved if the attack length rate and the attack frequency are respectively not greater than the corresponding positive thresholds. Finally, we present an example of multiple YF-22 research UAVs to demonstrate the theoretical results.
引用
收藏
页码:695 / 709
页数:15
相关论文
共 41 条
[1]  
Boyd S., 2004, Convex optimization
[2]   FULL-ORDER OBSERVERS FOR LINEAR-SYSTEMS WITH UNKNOWN INPUTS [J].
DAROUACH, M ;
ZASADZINSKI, M ;
XU, SJ .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 1994, 39 (03) :606-609
[3]   Time-Varying Formation Tracking for Second-Order Multi-Agent Systems Subjected to Switching Topologies With Application to Quadrotor Formation Flying [J].
Dong, Xiwang ;
Zhou, Yan ;
Ren, Zhang ;
Zhong, Yisheng .
IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017, 64 (06) :5014-5024
[4]   Distributed Semiglobal Consensus With Relative Output Feedback and Input Saturation Under Directed Switching Networks [J].
Fan, Ming-Can ;
Zhang, Hai-Tao ;
Lin, Zongli .
IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2015, 62 (08) :796-800
[5]   DISTRIBUTED CONSENSUS OF MULTI-AGENT SYSTEMS WITH INPUT FAULTS AND TIME-VARYING DELAYS [J].
Fattahi, M. ;
Afshar, A. .
ASIAN JOURNAL OF CONTROL, 2018, 20 (04) :1682-1685
[6]   Distributed Secure Coordinated Control for Multiagent Systems Under Strategic Attacks [J].
Feng, Zhi ;
Wen, Guanghui ;
Hu, Guoqiang .
IEEE TRANSACTIONS ON CYBERNETICS, 2017, 47 (05) :1273-1284
[7]   A self-triggered scheme for cyber-physical systems under denial-of-service attacks [J].
Geng, Qing ;
Liu, Fucai .
ASIAN JOURNAL OF CONTROL, 2021, 23 (02) :697-707
[8]   Design and flight testing evaluation of formation control laws [J].
Gu, Yu ;
Seanor, Brad ;
Campa, Giampiero ;
Napolitano, Marcello R. ;
Rowe, Larry ;
Gururajan, Srikanth ;
Wan, Sheng .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2006, 14 (06) :1105-1112
[9]   Multi-radius geographical spatial networks: Statistical characteristics and application to wireless sensor networks [J].
Guan, Zhi-Hong ;
Ding, Li ;
Kong, Zheng-Min .
PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS, 2010, 389 (01) :198-204
[10]   Secure impulsive synchronization control of multi-agent systems under deception attacks [J].
He, Wangli ;
Gao, Xiaoyang ;
Zhong, Weimin ;
Qian, Feng .
INFORMATION SCIENCES, 2018, 459 :354-368