Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries
This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries. In such an insecure network environment, two kinds of communication schemes, that is, sampl...
Gespeichert in:
Veröffentlicht in: | IEEE transactions on cybernetics 2020-08, Vol.50 (8), p.3458-3467 |
---|---|
Hauptverfasser: | , , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 3467 |
---|---|
container_issue | 8 |
container_start_page | 3458 |
container_title | IEEE transactions on cybernetics |
container_volume | 50 |
creator | Xu, Wenying Hu, Guoqiang Ho, Daniel W. C. Feng, Zhi |
description | This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries. In such an insecure network environment, two kinds of communication schemes, that is, sample-data and event-triggered communication schemes, are discussed. Then, a fully distributed control protocol with strong robustness and high scalability is well designed. This protocol guarantees asymptotic consensus against distributed DoS attacks. In this paper, "fully" emphasizes that the eigenvalue information of the Laplacian matrix is not required in the design of both the control protocol and event conditions. For the event-triggered case, two effective dynamical event-triggered schemes are proposed, which are independent of any global information. Such event-triggered schemes do not exhibit Zeno behavior even in the insecure environment. Finally, a simulation example is provided to verify the effectiveness of theoretical analysis. |
doi_str_mv | 10.1109/TCYB.2019.2896160 |
format | Article |
fullrecord | <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_pubmed_primary_30794199</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>8643042</ieee_id><sourcerecordid>2424189230</sourcerecordid><originalsourceid>FETCH-LOGICAL-c349t-4e6088042cbc944b8bb3dd201d247b53c65608a7468b738b35a6de1bf230fe6f3</originalsourceid><addsrcrecordid>eNpdkU1rGzEQhkVJqUOSH1AKZaGXXNbR12qlY-o0H5DSQ-xDT6qknQW565UraQ3595Wx40N00TDzzMvMvAh9JnhOCFY3y8Xv73OKiZpTqQQR-AM6p0TImtK2OTvFop2hq5TWuDxZUkp-QjOGW8WJUufoz51POXo7ZeiqF3BThGoRwhaiyX63j8ccw1Ctxg5idQejN0Md-voF4s47qG5zNu5vqu5j2FQ_pyH77VCy3Q5iMtFDukQfezMkuDr-F2h1_2O5eKyffz08LW6fa8e4yjUHgaXEnDrrFOdWWsu6rqzXUd7ahjnRFMC0XEjbMmlZY0QHxPaU4R5Ezy7Q9UF3G8O_CVLWG58cDIMZIUxJUyKbpsEtJQX99g5dhymOZTpNOeVEqiJaKHKgXAwpRej1NvqNia-aYL13QO8d0HsH9NGB0vP1qDzZDXSnjrd7F-DLAfAAcCpLwVlZnf0HvhqJPw</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>2424189230</pqid></control><display><type>article</type><title>Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries</title><source>IEEE Electronic Library (IEL)</source><creator>Xu, Wenying ; Hu, Guoqiang ; Ho, Daniel W. C. ; Feng, Zhi</creator><creatorcontrib>Xu, Wenying ; Hu, Guoqiang ; Ho, Daniel W. C. ; Feng, Zhi</creatorcontrib><description>This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries. In such an insecure network environment, two kinds of communication schemes, that is, sample-data and event-triggered communication schemes, are discussed. Then, a fully distributed control protocol with strong robustness and high scalability is well designed. This protocol guarantees asymptotic consensus against distributed DoS attacks. In this paper, "fully" emphasizes that the eigenvalue information of the Laplacian matrix is not required in the design of both the control protocol and event conditions. For the event-triggered case, two effective dynamical event-triggered schemes are proposed, which are independent of any global information. Such event-triggered schemes do not exhibit Zeno behavior even in the insecure environment. Finally, a simulation example is provided to verify the effectiveness of theoretical analysis.</description><identifier>ISSN: 2168-2267</identifier><identifier>EISSN: 2168-2275</identifier><identifier>DOI: 10.1109/TCYB.2019.2896160</identifier><identifier>PMID: 30794199</identifier><identifier>CODEN: ITCEB8</identifier><language>eng</language><publisher>United States: IEEE</publisher><subject>Asymptotic consensus ; Communication networks ; Cooperative control ; Decentralized control ; Denial of service attacks ; Denial-of-service attack ; distributed denial-of-service (DoS) attack ; distributed secure control ; Eigenvalues ; Eigenvalues and eigenfunctions ; event-triggered ; Laplace equations ; Multi-agent systems ; Multiagent systems ; Protocols ; Robust control ; sample data</subject><ispartof>IEEE transactions on cybernetics, 2020-08, Vol.50 (8), p.3458-3467</ispartof><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2020</rights><lds50>peer_reviewed</lds50><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c349t-4e6088042cbc944b8bb3dd201d247b53c65608a7468b738b35a6de1bf230fe6f3</citedby><cites>FETCH-LOGICAL-c349t-4e6088042cbc944b8bb3dd201d247b53c65608a7468b738b35a6de1bf230fe6f3</cites><orcidid>0000-0002-8618-5581 ; 0000-0002-1301-7739 ; 0000-0002-6110-9160 ; 0000-0001-9799-3712</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/8643042$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,780,784,796,27922,27923,54756</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/8643042$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttps://www.ncbi.nlm.nih.gov/pubmed/30794199$$D View this record in MEDLINE/PubMed$$Hfree_for_read</backlink></links><search><creatorcontrib>Xu, Wenying</creatorcontrib><creatorcontrib>Hu, Guoqiang</creatorcontrib><creatorcontrib>Ho, Daniel W. C.</creatorcontrib><creatorcontrib>Feng, Zhi</creatorcontrib><title>Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries</title><title>IEEE transactions on cybernetics</title><addtitle>TCYB</addtitle><addtitle>IEEE Trans Cybern</addtitle><description>This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries. In such an insecure network environment, two kinds of communication schemes, that is, sample-data and event-triggered communication schemes, are discussed. Then, a fully distributed control protocol with strong robustness and high scalability is well designed. This protocol guarantees asymptotic consensus against distributed DoS attacks. In this paper, "fully" emphasizes that the eigenvalue information of the Laplacian matrix is not required in the design of both the control protocol and event conditions. For the event-triggered case, two effective dynamical event-triggered schemes are proposed, which are independent of any global information. Such event-triggered schemes do not exhibit Zeno behavior even in the insecure environment. Finally, a simulation example is provided to verify the effectiveness of theoretical analysis.</description><subject>Asymptotic consensus</subject><subject>Communication networks</subject><subject>Cooperative control</subject><subject>Decentralized control</subject><subject>Denial of service attacks</subject><subject>Denial-of-service attack</subject><subject>distributed denial-of-service (DoS) attack</subject><subject>distributed secure control</subject><subject>Eigenvalues</subject><subject>Eigenvalues and eigenfunctions</subject><subject>event-triggered</subject><subject>Laplace equations</subject><subject>Multi-agent systems</subject><subject>Multiagent systems</subject><subject>Protocols</subject><subject>Robust control</subject><subject>sample data</subject><issn>2168-2267</issn><issn>2168-2275</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2020</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNpdkU1rGzEQhkVJqUOSH1AKZaGXXNbR12qlY-o0H5DSQ-xDT6qknQW565UraQ3595Wx40N00TDzzMvMvAh9JnhOCFY3y8Xv73OKiZpTqQQR-AM6p0TImtK2OTvFop2hq5TWuDxZUkp-QjOGW8WJUufoz51POXo7ZeiqF3BThGoRwhaiyX63j8ccw1Ctxg5idQejN0Md-voF4s47qG5zNu5vqu5j2FQ_pyH77VCy3Q5iMtFDukQfezMkuDr-F2h1_2O5eKyffz08LW6fa8e4yjUHgaXEnDrrFOdWWsu6rqzXUd7ahjnRFMC0XEjbMmlZY0QHxPaU4R5Ezy7Q9UF3G8O_CVLWG58cDIMZIUxJUyKbpsEtJQX99g5dhymOZTpNOeVEqiJaKHKgXAwpRej1NvqNia-aYL13QO8d0HsH9NGB0vP1qDzZDXSnjrd7F-DLAfAAcCpLwVlZnf0HvhqJPw</recordid><startdate>20200801</startdate><enddate>20200801</enddate><creator>Xu, Wenying</creator><creator>Hu, Guoqiang</creator><creator>Ho, Daniel W. C.</creator><creator>Feng, Zhi</creator><general>IEEE</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>NPM</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>7TB</scope><scope>8FD</scope><scope>F28</scope><scope>FR3</scope><scope>H8D</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>7X8</scope><orcidid>https://orcid.org/0000-0002-8618-5581</orcidid><orcidid>https://orcid.org/0000-0002-1301-7739</orcidid><orcidid>https://orcid.org/0000-0002-6110-9160</orcidid><orcidid>https://orcid.org/0000-0001-9799-3712</orcidid></search><sort><creationdate>20200801</creationdate><title>Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries</title><author>Xu, Wenying ; Hu, Guoqiang ; Ho, Daniel W. C. ; Feng, Zhi</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c349t-4e6088042cbc944b8bb3dd201d247b53c65608a7468b738b35a6de1bf230fe6f3</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2020</creationdate><topic>Asymptotic consensus</topic><topic>Communication networks</topic><topic>Cooperative control</topic><topic>Decentralized control</topic><topic>Denial of service attacks</topic><topic>Denial-of-service attack</topic><topic>distributed denial-of-service (DoS) attack</topic><topic>distributed secure control</topic><topic>Eigenvalues</topic><topic>Eigenvalues and eigenfunctions</topic><topic>event-triggered</topic><topic>Laplace equations</topic><topic>Multi-agent systems</topic><topic>Multiagent systems</topic><topic>Protocols</topic><topic>Robust control</topic><topic>sample data</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Xu, Wenying</creatorcontrib><creatorcontrib>Hu, Guoqiang</creatorcontrib><creatorcontrib>Ho, Daniel W. C.</creatorcontrib><creatorcontrib>Feng, Zhi</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>PubMed</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics & Communications Abstracts</collection><collection>Mechanical & Transportation Engineering Abstracts</collection><collection>Technology Research Database</collection><collection>ANTE: Abstracts in New Technology & Engineering</collection><collection>Engineering Research Database</collection><collection>Aerospace Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>MEDLINE - Academic</collection><jtitle>IEEE transactions on cybernetics</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Xu, Wenying</au><au>Hu, Guoqiang</au><au>Ho, Daniel W. C.</au><au>Feng, Zhi</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries</atitle><jtitle>IEEE transactions on cybernetics</jtitle><stitle>TCYB</stitle><addtitle>IEEE Trans Cybern</addtitle><date>2020-08-01</date><risdate>2020</risdate><volume>50</volume><issue>8</issue><spage>3458</spage><epage>3467</epage><pages>3458-3467</pages><issn>2168-2267</issn><eissn>2168-2275</eissn><coden>ITCEB8</coden><abstract>This paper develops a fully distributed framework to investigate the cooperative behavior of multiagent systems in the presence of distributed denial-of-service (DoS) attacks launched by multiple adversaries. In such an insecure network environment, two kinds of communication schemes, that is, sample-data and event-triggered communication schemes, are discussed. Then, a fully distributed control protocol with strong robustness and high scalability is well designed. This protocol guarantees asymptotic consensus against distributed DoS attacks. In this paper, "fully" emphasizes that the eigenvalue information of the Laplacian matrix is not required in the design of both the control protocol and event conditions. For the event-triggered case, two effective dynamical event-triggered schemes are proposed, which are independent of any global information. Such event-triggered schemes do not exhibit Zeno behavior even in the insecure environment. Finally, a simulation example is provided to verify the effectiveness of theoretical analysis.</abstract><cop>United States</cop><pub>IEEE</pub><pmid>30794199</pmid><doi>10.1109/TCYB.2019.2896160</doi><tpages>10</tpages><orcidid>https://orcid.org/0000-0002-8618-5581</orcidid><orcidid>https://orcid.org/0000-0002-1301-7739</orcidid><orcidid>https://orcid.org/0000-0002-6110-9160</orcidid><orcidid>https://orcid.org/0000-0001-9799-3712</orcidid></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISSN: 2168-2267 |
ispartof | IEEE transactions on cybernetics, 2020-08, Vol.50 (8), p.3458-3467 |
issn | 2168-2267 2168-2275 |
language | eng |
recordid | cdi_pubmed_primary_30794199 |
source | IEEE Electronic Library (IEL) |
subjects | Asymptotic consensus Communication networks Cooperative control Decentralized control Denial of service attacks Denial-of-service attack distributed denial-of-service (DoS) attack distributed secure control Eigenvalues Eigenvalues and eigenfunctions event-triggered Laplace equations Multi-agent systems Multiagent systems Protocols Robust control sample data |
title | Distributed Secure Cooperative Control Under Denial-of-Service Attacks From Multiple Adversaries |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-14T13%3A29%3A20IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Distributed%20Secure%20Cooperative%20Control%20Under%20Denial-of-Service%20Attacks%20From%20Multiple%20Adversaries&rft.jtitle=IEEE%20transactions%20on%20cybernetics&rft.au=Xu,%20Wenying&rft.date=2020-08-01&rft.volume=50&rft.issue=8&rft.spage=3458&rft.epage=3467&rft.pages=3458-3467&rft.issn=2168-2267&rft.eissn=2168-2275&rft.coden=ITCEB8&rft_id=info:doi/10.1109/TCYB.2019.2896160&rft_dat=%3Cproquest_RIE%3E2424189230%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=2424189230&rft_id=info:pmid/30794199&rft_ieee_id=8643042&rfr_iscdi=true |