Input-Based Event-Triggering Consensus of Multiagent Systems Under Denial-of-Service Attacks

This paper applies an input-based triggering approach to investigate the secure consensus problem in multiagent systems under denial-of-service (DoS) attacks. The DoS attacks are based on the time-sequence fashion and occur aperiodically in an unknown attack strategy, which can usually damage the co...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on systems, man, and cybernetics. Systems man, and cybernetics. Systems, 2020-04, Vol.50 (4), p.1455-1464
Hauptverfasser: Xu, Yong, Fang, Mei, Wu, Zheng-Guang, Pan, Ya-Jun, Chadli, Mohammed, Huang, Tingwen
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:This paper applies an input-based triggering approach to investigate the secure consensus problem in multiagent systems under denial-of-service (DoS) attacks. The DoS attacks are based on the time-sequence fashion and occur aperiodically in an unknown attack strategy, which can usually damage the control channels executed by an intelligent adversary. A novel event-triggered control scheme on the basis of the relative interagent state is developed under the DoS attacks, by designing a link-based estimator to estimate the relative interagent state between intermitted communication instead of the absolute state. Compared with most of the existing work on the design of the triggering condition related to the state measurement error, the proposed triggering condition is designed based on the control input signal from the view of privacy protection, which can avoid continuous sampling for every agent. Besides, the attack frequency and attack duration of DoS attacks are analyzed and the secure consensus is reachable provided that the attack frequency and attack duration satisfy some certain conditions under the proposed control algorithm. "Zeno phenomenon" does not exhibit by proving that there exist different positive lower bounds corresponding to different link-based triggering conditions. Finally, the effectiveness of the proposed algorithm is verified by a numerical example.
ISSN:2168-2216
2168-2232
DOI:10.1109/TSMC.2018.2875250