Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries

被引:206
作者
Xu, Wenying [1 ,2 ]
Hu, Guoqiang [2 ]
Ho, Daniel W. C. [3 ]
Feng, Zhi [2 ]
机构
[1] Southeast Univ, Sch Math, Nanjing 210096, Peoples R China
[2] Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore
[3] City Univ Hong Kong, Dept Math, Hong Kong, Peoples R China
基金
中国国家自然科学基金;
关键词
Protocols; Decentralized control; Eigenvalues and eigenfunctions; Multi-agent systems; Laplace equations; Denial-of-service attack; Communication networks; Asymptotic consensus; distributed denial-of-service (DoS) attack; distributed secure control; event-triggered; sample data; CONSENSUS CONTROL; MULTIAGENT;
D O I
10.1109/TCYB.2019.2896160
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries. In such an insecure network environment, two kinds of communication schemes, that is, sample-data and event-triggered communication schemes, are discussed. Then, a fully distributed control protocol with strong robustness and high scalability is well designed. This protocol guarantees asymptotic consensus against distributed DoS attacks. In this paper, "fully" emphasizes that the eigenvalue information of the Laplacian matrix is not required in the design of both the control protocol and event conditions. For the event-triggered case, two effective dynamical event-triggered schemes are proposed, which are independent of any global information. Such event-triggered schemes do not exhibit Zeno behavior even in the insecure environment. Finally, a simulation example is provided to verify the effectiveness of theoretical analysis.
引用
收藏
页码:3458 / 3467
页数:10
相关论文
共 28 条
[1]  
[Anonymous], 2014, IFAC P
[2]   An Overview of Recent Progress in the Study of Distributed Multi-Agent Coordination [J].
Cao, Yongcan ;
Yu, Wenwu ;
Ren, Wei ;
Chen, Guanrong .
IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) :427-438
[3]   Secure Fusion Estimation for Bandwidth Constrained Cyber-Physical Systems Under Replay Attacks [J].
Chen, Bo ;
Ho, Daniel W. C. ;
Hu, Guoqiang ;
Yu, Li .
IEEE TRANSACTIONS ON CYBERNETICS, 2018, 48 (06) :1862-1876
[4]   Input-to-State Stabilizing Control Under Denial-of-Service [J].
De Persis, Claudio ;
Tesi, Pietro .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (11) :2930-2944
[5]   Robust Self-Triggered Coordination With Ternary Controllers [J].
De Persis, Claudio ;
Frasca, Paolo .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (12) :3024-3038
[6]   Neural-Network-Based Output-Feedback Control Under Round-Robin Scheduling Protocols [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON CYBERNETICS, 2019, 49 (06) :2372-2384
[7]   Security Control for Discrete-Time Stochastic Nonlinear Systems Subject to Deception Attacks [J].
Ding, Derui ;
Wang, Zidong ;
Han, Qing-Long ;
Wei, Guoliang .
IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2018, 48 (05) :779-789
[8]   Self-Triggered Consensus for Multi-Agent Systems With Zeno-Free Triggers [J].
Fan, Yuan ;
Liu, Lu ;
Feng, Gang ;
Wang, Yong .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2015, 60 (10) :2779-2784
[9]   Resilient control under Denial-of-Service: Robust design [J].
Feng, Shuai ;
Tesi, Pietro .
AUTOMATICA, 2017, 79 :42-51
[10]   Secure Cooperative Event-Triggered Control of Linear Multiagent Systems Under DoS Attacks [J].
Feng, Zhi ;
Hu, Guoqiang .
IEEE TRANSACTIONS ON CONTROL SYSTEMS TECHNOLOGY, 2020, 28 (03) :741-752