
We investigated impulsive consensus in second-order nonlinear multi-agent systems (MASs) under Denial-of-Service (DoS) attacks. We consided scenarios where the communication network is subjected to DoS attacks, disrupting communication links and causing changes in the communication topology. An event-triggered impulsive control(ETIC) approach is proposed to flexibly address these issues. Additionally, an upper bound on the DoS attack period is introduced. Finally, a numerical example is given to verify the validity of the major results.
Citation: Qiushi Wang, Hongwei Ren, Zhiping Peng. Event-triggered impulsive control for second-order nonlinear multi-agent systems under DoS attacks[J]. AIMS Mathematics, 2024, 9(6): 13998-14011. doi: 10.3934/math.2024680
[1] | Jiaqi Liang, Zhanheng Chen, Zhiyong Yu, Haijun Jiang . Fixed-time consensus of second-order multi-agent systems based on event-triggered mechanism under DoS attacks. AIMS Mathematics, 2025, 10(1): 1501-1528. doi: 10.3934/math.2025070 |
[2] | Le You, Chuandong Li, Xiaoyu Zhang, Zhilong He . Edge event-triggered control and state-constraint impulsive consensus for nonlinear multi-agent systems. AIMS Mathematics, 2020, 5(5): 4151-4167. doi: 10.3934/math.2020266 |
[3] | Linni Li, Jin-E Zhang . Input-to-state stability of nonlinear systems with delayed impulse based on event-triggered impulse control. AIMS Mathematics, 2024, 9(10): 26446-26461. doi: 10.3934/math.20241287 |
[4] | Zuo Wang, Hong Xue, Yingnan Pan, Hongjing Liang . Adaptive neural networks event-triggered fault-tolerant consensus control for a class of nonlinear multi-agent systems. AIMS Mathematics, 2020, 5(3): 2780-2800. doi: 10.3934/math.2020179 |
[5] | Biwen Li, Yujie Liu . Quasi-synchronization of nonlinear systems with parameter mismatch and time-varying delays via event-triggered impulsive control. AIMS Mathematics, 2025, 10(2): 3759-3778. doi: 10.3934/math.2025174 |
[6] | Tao Xie, Xing Xiong . Finite-time synchronization of fractional-order heterogeneous dynamical networks with impulsive interference via aperiodical intermittent control. AIMS Mathematics, 2025, 10(3): 6291-6317. doi: 10.3934/math.2025287 |
[7] | Chengbo Yi, Rui Guo, Jiayi Cai, Xiaohu Yan . Pinning synchronization of dynamical neural networks with hybrid delays via event-triggered impulsive control. AIMS Mathematics, 2023, 8(10): 25060-25078. doi: 10.3934/math.20231279 |
[8] | Kairui Chen, Yongping Du, Shuyan Xia . Adaptive state observer event-triggered consensus control for multi-agent systems with actuator failures. AIMS Mathematics, 2024, 9(9): 25752-25775. doi: 10.3934/math.20241258 |
[9] | Zhaohui Chen, Jie Tan, Yong He, Zhong Cao . Decentralized observer-based event-triggered control for an interconnected fractional-order system with stochastic Cyber-attacks. AIMS Mathematics, 2024, 9(1): 1861-1876. doi: 10.3934/math.2024091 |
[10] | Tian Xu, Jin-E Zhang . Intermittent control for stabilization of uncertain nonlinear systems via event-triggered mechanism. AIMS Mathematics, 2024, 9(10): 28487-28507. doi: 10.3934/math.20241382 |
We investigated impulsive consensus in second-order nonlinear multi-agent systems (MASs) under Denial-of-Service (DoS) attacks. We consided scenarios where the communication network is subjected to DoS attacks, disrupting communication links and causing changes in the communication topology. An event-triggered impulsive control(ETIC) approach is proposed to flexibly address these issues. Additionally, an upper bound on the DoS attack period is introduced. Finally, a numerical example is given to verify the validity of the major results.
In recent years, the issue of multi-agent consensus has garnered considerable attention and research across various disciplines, including computer science, control theory, communication, and related fields. Multi-agent systems comprise numerous interacting intelligent agents collaborating to accomplish predefined objectives. Many researchers have studied the issue of achieving consensus in multi-agent systems under different conditions. There are several effective methods for achieving consensus, such as distributed control [1,2], sliding mode control [3], fault-tolerant control [4,5], and impulsive control [6,7,8,9].
Compared to the continuous control methods mentioned above, the use of impulsive control protocols significantly reduces information transmission. Impulsive control involves only information transfer at discrete impulsive moments. This helps to reduce the risk of communication losses. In recent decades, impulsive control has widespread applications in fields such as signal processing, communication, and medical devices. In [10], researchers investigated bounded consensus in heterogeneous multi-agent systems using impulsive control. Additionally, some multi-agent systems with heterogeneous delays were discussed and studied in [11,12]. In [13], two different impulsive control were proposed: Partial state constraint and full state constraint. They delved into the consensus problem of nonlinear MASs featuring grouping through state constraint impulsive protocols. They examined two scenarios: One involving a leader agent and another without, each analyzed using distinct two kinds of protocol. Considering that the network communication topology is not always constant, in [14], scholars employed algebraic graph theory and impulsive stability theory to explore the consensus problem in fixed-topology systems using impulsive control. In [15], the flexible handling of communication interruptions and topology switches was achieved using the T-S fuzzy model and impulsive control. It is important to note that the above-mentioned impulsive control methods are all time-triggered, which may result in additional communication and control overhead during information transmission. Therefore, it is necessary to study a new impulsive control method to address this issue. In [16], a distributed ETIC strategy was proposed to achieve consensus of MASs. Considering the evident benefits of ETIC, in recent years, numerous scholars have conducted research on ETIC and reported their corresponding results [17]. In [18], a distributed ETIC protocol was proposed to achieve consensus in MASs. Furthermore, in [19], an innovative dynamic event-triggered impulsive control protocol has been introduced, offering a more efficient means to reduce controller updates and minimize the waste of communication resources.
In practice, complex network systems or MAS tend to be more complex and vulnerable to cyber attacks by malicious actors. In recent years, scholars have gradually turned their attention to nonlinear multi-agent systems. In [20] scholars proposed an improved prescribed performance approach for human-in-the-loop consensus tracking control in unmanned aerial vehicle (UAV) systems. Their research underscores the importance of establishing effective interactions between humans and machines to achieve efficient control of UAV systems. In [21], scholars explored a privacy preservation mechanism for multi-agent systems and introduced a gain iterative disturbance observer. Their research focuses on safeguarding information privacy within systems while maintaining stability and reliability of system performance. In [22], scholars proposed an improved predefined-time adaptive neural control approach for addressing control issues in nonlinear multi-agent systems. Their research aims to overcome limitations of traditional control methods in complex systems, presenting a control solution with enhanced adaptability and robustness. In [23], scholars investigated quantized guaranteed cost memory consensus for nonlinear multi-agent systems with switching topology and actuator faults. Their study addresses uncertainties and faults within the system, introducing a novel guaranteed cost memory consensus method. Furthermore, cyber attacks have also been a hot research direction in recent years. Cyber attacks are typically categorized into two types: deception attacks [24,25] and DoS attacks [26,27,28,29,30,31,32,33]. Deception attacks focus on tampering with the data in the communication network, while DoS attacks typically overload the resources of the target system, rendering it unable to provide services and thus disrupting the information transmission channel. In [24], the impulsive consensus of nonlinear leader-follower MASs under DoS attacks was studied. The authors in [25] considered cases where sensor data transmission involves packet loss, with the objective of maximizing the terminal state covariance as the attack target, and presents optimal energy-constrained DoS attack scheduling schemes. In [26], the scholars developed a resilient cooperative ETIC scheme of linear MASs with DoS attacks. In [27], the guided bounded consensus of MASs with ETIC was studied in the presence of DoS attacks. In [28], the adaptive fault-tolerant control was investigated by designing an adaptive scheme and state feedback control gain. In [29], the scholars investigated positive impulsive effects and negative impulsive effects, and by employing the concept of "average impulsive interval, " they have unified the quasi-synchronization criteria for systems with two types of impulsive effects.
Inspired by the aforementioned research, this paper studies event-triggered impulsive consensus in second-order nonlinear MASs under DoS attacks. The system suffered DoS attacks, communication links are disrupted, and the communication topology of the system undergoes changes. The proposed ETIC can achieve consensus of second-order MASs under DoS attacks. The key contributions of this study are summarized as follows:
(1) We investigate a second-order nonlinear multi-agent system that experiences DoS attacks, resulting in communication interruption. The considered attack model is more general, and the paper provides sufficient conditions for the asymptotic convergence of the system.
(2) Compared with [34], we introduce an event-triggered mechanism within the impulsive control framework to investigate the security consensus of multi-agent systems with switching topology. The proposed mechanism efficiently reduces communication resource wastage and avoiding Zeno behavior.
Notation. R and RN×N denote the set of real numbers and the set of N×N real matrix, ‖⋅‖ denotes the Euclidean norm of a vector or the spectral norm of a matrix. The superscripts T represent transpose of a matrix, and λmax(⋅) and λmin(⋅) represent the maximum and minimum eigenvalues of a matrix, ⨂ denote the Kronecker product.
Consider a MAS, the digraph G is (V,E), where V={1,2,⋯,N} is the set of nodes and E⊆V×V represents the edge set of followers. The information exchange between each node can be described by adjacency matrix A and Laplacian matrix L. A=[aij]∈RN×N if agents i and j communicate with one another, aij=1, otherwise aij=0 and L=[lij]∈Rn×n where L=D−A. The degree matrix D=diag(di) with di=∑Ni=1aij.
We consider a second-order MASs with a leader, where the dynamics equation of the leader is described as
{˙x0(t)=v0(t)˙v0(t)=Ax0(t)+f(x0(t),v0(t)), | (1) |
and the ith follower's dynamics equation can be defined as
{˙xi(t)=vi(t)˙vi(t)=Axi(t)+f(xi(t),vi(t))+ui(t), | (2) |
where x0∈Rn,v0∈Rn are the positions and velocities of the leader, xi∈Rn,vi∈Rn are the positions and velocities of the ith follower agent, f(x,v) is a nonlinear function, ui(t)∈Rn is the control input.
Then, the state error is defined as
{epi(t)=xi(t)−x0(t)evi(t)=vi(t)−v0(t). | (3) |
In this paper, we consider a second-order leader system under DoS attacks, so the impulsive control input can be designed as
ui(t)=c∞∑k=1[∑j∈Niaij(m)(xj(t)−xi(t))+bi(m)(x0−xi)+∑j∈Niaij(m)(vj(t)−vi(t))+bi(m)(v0−vi)]δ(t−tk), | (4) |
where c denotes the coupling strength, m defines the topology under DoS attacks, the local neighborhood consensus error is pi(t)=∑j∈Niaij(xj(t)−xi(t))+bi(x0−xi)+∑j∈Niaij(vj(t)−vi(t))+bi(v0−vi), δ(⋅) is the Dirac function, {tk} is the impulse sequence, it satisfies limk→∞tk=∞,k∈N+.
From (1) and (2), the state error system are as follows
{˙epi(t)=evi(t)˙evi(t)=Aepi+f(epi,evi)+ui(t), | (5) |
where f(ep,ev)=f(xi(t),vi(t))−f(x0(t),v0(t)).
From the (3)–(5), we can get
{˙epi(t)=evi(t)˙evi(t)=Aepi+f(epi,evi),t≠tkΔevi(tk)=∑Nj=1c[−pi(tk)(m)],t=tk, | (6) |
where pi(tk)(m)=∑j∈Niaij(m)(xj(t)−xi(t))+bi(m)(x0−xi)+∑j∈Niaij(m)(vj(t)−vi(t))+bi(m)(v0−vi), Δevi(tk)=evi(tk)−evi(t−k), evi(tk)=evi(t+k)=limh→0+evi(tk+h), evi(t−k)=limh→0−evi(tk+h), and e(t) is right-hand continuous at t=tk.
The system (6) can be rewritten as:
{˙ep(t)=ev(t)˙ev(t)=(IN⊗A)ep+F(ep,ev),t≠tkΔev(tk)=−c[(L(m)+B(m))⊗IN](ep(t−k)+ev(t−k)),t=tk, | (7) |
where ep=[ep1,ep2,⋯,epN]T, ev=[ev1,ev2,⋯,evN]T, F(ep,ev)=[f(ep1,ev1),f(ep2,ev2),⋯,f(epN,evN)]T, B=diag{bi}∈RN×N.
Lemma 1. ([35] Differential Mean Value Theorem) Let f(⋅) is a continuously differentiable nonlinear function, for any x1,x2∈R, the following formula is satisfied:
f(xi(t),vi(t))−f(xi(t0),vi(t0))=∂f(zi)∂xi(xi(t)−xi(t0))+∂f(zi)∂vi(vi(t)−vi(t0)), |
where f(zi)=f(xi(t0)+Δ(xi(t)−xi(t0)),vi(t0+Δ(vi(t)−vi(t0))), 0<Δ<1.
Definition 1. [28] The second-order MASs (1) and (2) with an impulsive controller ui(t) is said to be global exponential consensus, if there exist a scalar θ and a decay rate ε such that for any x1(t0),x0(t0)∈R.
‖xi(t)−x0(t)‖≤θ‖xi(t0)−x0(t0))‖e−ε(t−t0). |
When MASs are targeted by DoS attacks, the attacks focus on disrupting the communication network, causing varying degrees of damage to the communication connections among system nodes. Consequently, leading to a disconnection of the communication channel, the network communication topology undergoes changes. It is noted that the MASs incorporates a recovery mechanism that allows the communication topology to be restored once the attack concludes. We assume that DoS attacks are not continuous and that the attacks needs time to recover energy after one attack. Thus, there is a minimum interval between attacks.
We assume that the time interval of an attack cycle is divided into three periods.
(1) Normal control period(Nn): The multi-agent system is normal working. The DoS attack has not arrived yet.
(2) Attack period(Na): DoS attacks and switching topologies occur in this interval.
(3) Recovery period(Nr): The period during which the system recovers from a DoS attack. (minimum interval between attacks)
Definition 2. [28] Define the average impulsive interval as ϕ>0 in the time interval [t0,t]. If there exist positive integer N0, such that
t−t0ϕ−N0≤N(t0,t)≤t−t0ϕ+N0, | (8) |
where N(t0,t) is the number of impulsive times in [t0,t].
Definition 3. [28] According to the DoS attack model, suppose that Nn(t0,t), Na(t0,t) and Nr(t0,t) denote the number of impulse instants in the normal control period, attack period and recovery period. The total time of an attack cycle is N(T0,T)=Nn(t0,t)+Na(t0,t)+Nr(t0,t). Then the impulsive attack ratio ηa can be defined as
ηa=Na(t0,t)N(t0,t). | (9) |
Assumption 1. The graph G contains a spanning tree which the root node is the leader.
In this section, by designing an appropriate Lyapunov function and utilizing linear matrix inequalities, the system errors can be driven towards a bounded set, resulting in successful synchronization. Next, we designed the event trigger condition to be
tk+1=inf{t≥tk:V(t)≥ea+ξ(tk−t)V(tk)}, |
where a,ξ>0 are event trigger parameters.
Theorem 1. Under that Assumption 1, the MASs (1) and (2) are said to be globally exponentially synchronized, if there exist a symmetric matrix P>0, system parameters α,ϕ,ξ>0, 0<μ1,μm<1, such that
PˉA+ˉATP−αP≤0, | (10) |
−ξ+αϕ<lnμ1<−kaN0+k, | (11) |
ηa<−lnμ1+αϕlnμm−lnμ1, | (12) |
ϕ<−lnμ1α, | (13) |
where we denote
μ(tk)=λmax((I2N×2N−R(m))TP(I2N×2N−R(m)), |
μ1=λmax((I2N×2N−R)TP(I2N×2N−R), |
μm=maxμ(tk)∈{2,…,m}λmax((I2N×2N−R(m))TP(I2N×2N−R(m)). |
The definition of R and R(m) are given later.
Proof. Let e(t)=[ep(t),ev(t)]T, according to Lemma 1 and Assumption 1, we can get
˙e(t)=ˉAe(t), | (14) |
where ˉA=[0ININ+∂f(zi)∂x∂f(zi)∂v], ∂f(zi)∂x=diagNi=1[∂f(zi)∂xi], ∂f(zi)∂v=diagNi=1[∂f(zi)∂vi].
Then, choose a Lyapunov function as
V(t)=e(t)TPe(t). | (15) |
For t∈[tk−1,tk), differentiating V(t) with respect to time t,
˙V(t)=2e(t)TP˙e(t)=2e(t)TPˉAe(t)=e(t)T(PˉA+ˉATP)e(t). | (16) |
Based on (10), one has
˙V(t)≤αV(t), | (17) |
which leads to
V(t)≤eα(t−tk−1)V(tk−1),t∈[tk−1,tk). | (18) |
On the another hand, when t=tk,k=1,2,⋯,n,
V(tk)=e(tk)TPe(tk)=(e(t−k)−c[(L(m)+B(m))⊗IN](ep(t−k)+ev(t−k)))TP(e(t−k)−c[(L(m)+B(m))⊗IN](ep(t−k)+ev(t−k)))=e(t−k)T(I2N×2N−R(m))TPe(t−k)(I2N×2N−R(m))≤λmax((I2N×2N−R(m))TP(I2N×2N−R(m))V(tk)=μ(tk)V(t−k), | (19) |
where
R=[−c[(L+B)⊗IN]00−c[(L+B)⊗IN]],R(m)=[−c[(L(m)+B(m))⊗IN]00−c[(L(m)+B(m))⊗IN]]. |
Let t∈[t0,t1), from (17),
V(t1)≤μ(t1)V(t−1)≤μ(t1)eα(t1−t0)V(t0). | (20) |
For t∈[t1,t2), from (17), (19) and (20)
V(t2)≤μ(t2)V(t−2)≤μ(t2)eα(t2−t1)V(t1)≤μ(t2)μ(t1)eα(t2−t1)eα(t1−t0)V(t0)=μ(t2)μ(t1)eα(t2−t0)V(t0). | (21) |
By induction, for t∈[tk,tk+1),
V(t)≤eα(t−tk)V(tk)≤k∏m=1μ(t−m)eα(t−t0)V(t0). | (22) |
According to the Definitions 2 and 3, it is easy to get
Na(t0,t)N(t0,t)(t−t0ϕ−N0)≤Na(t0,t)≤Na(t0,t)N(t0,t)(t−t0ϕ+N0). |
In a similar way, Nn and Nr is similar to Na.
According to Assumption 2, the multi-agent system is not attacked (N(t0,t)=Nn(t0,t)+Nr(t0,t)), one has
V(t)<μN(t0.t)1eα(t−t0)V(t0)<μ−N01e(lnμ1ϕ+α)(t−t0)V(t0). | (23) |
Based on trigger condition, for any t∈[tk,tk+1), we have
V(t)≤μk1eka+ξ(t0−tk+1)V(t0). | (24) |
During the second pulse control time, there are three possible event triggering conditions: Event triggering zero times, event triggering one time, and event triggering multiple times.
(1) Event triggering zero times: V(t)≤ea+ξ(t0−t1)V(t0).
(2) Event triggering one times: V(t)≤μ1e2a+ξ(t0−t2)V(t0).
(3) Event triggering k times: V(t)≤μk1eka+ξ(t0−tk+1)V(t0).
In general, we have V(t)≤ek(lnμ1+a)e−ξ(t−t0)V(t0), when t∈[t0,t], k=0,1,2,⋅⋅⋅,n
According to the condition,
V(t)≤ek(lnμ1+a)e−ξ(t−t0)V(t0)≤μ−N01e(lnμ1ϕ+α)(t−t0)V(t0). | (25) |
On the another hand, when there are attacks(N(t0,t)=Nn(t0,t)+Na(t0,t)+Nr(t0,t)).
V(t)≤μNn(t0,t)N(t0,t)(t−t0ϕ−N0)1μNa(t0,t)N(t0,t)(t−t0ϕ−N0)mμNr(t0,t)N(t0,t)(t−t0ϕ−N0)1eα(t−t0)V(t0)≤μ−N0Nn(t0,t)+Nr(t0,t)N(t0,t)1μ−N0Na(t0,t)N(t0,t)me(lnμ1ϕNn(t0,t)+Nr(t0,t)N(t0,t)+lnμmϕNa(t0,t)N(t0,t)+α)(t−t0)V(t0)=θe−ε(t−t0)V(t0), | (26) |
where θ=μ−N0Nn(t0,t)+Nr(t0,t)N(t0,t)1μ−N0Na(t0,t)N(t0,t)m, ε=−(lnμ1ϕNn(t0,t)+Nr(t0,t)N(t0,t)+lnμmϕNa(t0,t)N(t0,t)+α) =−(lnμ1ϕ(1−ηa)+lnμmϕηa+α). According to the condition and Definition 1, the proof is completed.
Next, it is proved that there is no Zeno behavior. Assume that t1<t2<...<tk are the trigger instants, and based on (26), it holds that
V(t1)=ea+ε(t0−t1)V(t0)≤μ−N0e(lnμ1ϕ+α)(t1−t0)V(t0), |
which implies that t1−t0≥ϕ(a+N0lnμ1)ϕα+ϕε+lnμ1. It means that event-triggered time interval {tk+1−tk}k∈N are lower bounded by τ (τ=ϕ(a+N0lnμ1)ϕα+ϕε+lnμ1). The conditions in Theorem 1 prove that τ>0. Therefore, the system does not exhibit Zeno behavior.
Remark 1. We analyze the time upper bound and attack intensity that can sustain the DoS attack cycle of the system in Theorem 1. In this paper, an attack cycle is divided into three periods to be analyzed, and it is worth noting that the system will not be attacked during the adjustment period. In addition, different from the general event-triggered control strategy, in the control protocol proposed in this paper, the controller works only when the system state meets the trigger condition, and the controller does not perform pulse control in the rest time. This effectively reduces the number of information transmission and avoids the congestion of information transmission channels.
Remark 2. Compared with literature [36], literature [36] introduced an event trigger interval parameter and a mandatory immediate sequence. The event trigger mechanism in this paper only needs the system information of the previous event trigger time to determine the departure time of the next event, which makes the proposed algorithm easy to implement.
Consider MASs with nonlinear dynamics (1), where the network topology is shown in Figure 1. 0 is the leader, and the rest are the followers. Control input matrix A, and the Laplace matrix of the switching topology are described as
A=[−1000−1000−1],L1=[2−10−1−1100001000−11],L2=[2−10−1−1100000000−11] |
L3=[2−10−100000−1100000],L4=[0000000000000000]. |
Take the initial values of the leader as X0=[0.23560.56880.6325], nonlinear function f(xij(t))=0.5×(|xij+1|−|xij−1|), and other system parameters c=0.4, a=0.05, ξ=0.1.
Figures 2 and 3 describe the position error and velocity error images. It is evident from these graphs that the system error gradually diminishes over time. Figure 4 describes the motion position trajectory of multi-agent i (0, 1, 2, 3, 4). It is easy to see that the followers' states converge towards those of the leader as time progresses. In addition, the system was attacked in 8–10 seconds, 15–18 seconds, 23–29 seconds. The network topology is changed due to a DoS attack. The trigger time of each agent is shown in Figure 5. In the initial 10 seconds, the system state error is large and the trigger is more frequent. When t = 10s, the position of multiple agents gradually tends to be consistent, the trigger times decrease, and the event trigger pulse control does not trigger after reaching an agreement, which indicates that the event trigger pulse control can effectively solve the problem of limited bandwidth. Moreover, comparing the proposed event-triggered mechanism in this paper with the one in [35] under similar consensus performance, one can conclude from Table 1 that the communication burden can be reduced greatly by adopting the mechanism in this paper. The design of event triggering function in literature [35] is as follows
tik+1=inf{t>tik|‖qi(t)‖2−ρ‖ei(t)‖2≥0}, |
where ρ=1.2.
Agent i | 1 | 2 | 3 | 4 |
[35] | 288 | 295 | 294 | 297 |
Our ETC | 67 | 15 | 45 | 15 |
We investigate event-triggered impulsive consensus in second-order nonlinear MASs under DoS attacks. By employing Lyapunov functions, matrix graph theory, and inequality techniques, the conditions for asymptotic convergence of the global synchronization error system are studied. The influence of DoS attacks is solved by the design of a appropriate event-triggered impulsive controller. An example simulation substantiates the efficiency of the control schema. Furthermore, in future research, we will consider other control strategies to alleviate the impact of diverse network attacks.
The authors declare that they have not used Artificial Intelligence (AI) tools in the creation of this article.
This research was funded in part by National Natural Science Foundation of China under Grant 62273109, in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2023A1515010168, Grant 2019A1515010830, in part by the Key Special Foundation for General Universities in Guangdong Province under Grant 2022ZDZX1018, and in part by the Maoming Science and Technology Plan Foundation under Grant 2022S043.
The author declares no conflicts of interest in this paper.
[1] |
X. L. Wang, Y. G. Hong, J. Huang, Z. P. Jiang, A distributed control approach to a robust output regulation problem for multi-Agent linear systems, IEEE T. Automat. Contr., 55 (2010), 2891–2895. https://doi.org/10.1109/TAC.2010.2076250 doi: 10.1109/TAC.2010.2076250
![]() |
[2] |
A. Maidi, J. P. Corriou, Distributed control of nonlinear diffusion systems by input-output linearization, Int. J. Robust Nonlin. Contr., 24 (2014), 389–405. https://doi.org/10.1002/rnc.2892 doi: 10.1002/rnc.2892
![]() |
[3] |
Z. N. Zhang, Y. G. Niu, H. J. Zhao, Secure sliding mode control of interval type-2 fuzzy systems against intermittent denial-of-service attacks, Int. J. Robust Nonlin. Contr., 31 (2021), 1866–1884. https://doi.org/10.1002/rnc.5219 doi: 10.1002/rnc.5219
![]() |
[4] |
W. C. Cai, X. H. Liao, Y. D. Song, Indirect robust adaptive fault-tolerant control for attitude tracking of spacecraft, J. Guid. Control Dynam., 31 (2008), 1456–1463. https://doi.org/10.2514/1.31158 doi: 10.2514/1.31158
![]() |
[5] |
Y. J. Liu, X. Y. Zhao, J. H. Park, F. Fang, Fault-tolerant control for T-S fuzzy systems with an aperiodic adaptive event-triggered sampling, Fuzzy Set. Syst., 452 (2023), 23–41. https://doi.org/10.1016/j.fss.2022.04.019 doi: 10.1016/j.fss.2022.04.019
![]() |
[6] |
T. Yang, L. O. Chua, Impulsive control and synchronization of nonlinear dynamical systems and application to secure communication, Int. J. Bifurcat. Chaos, 7 (1997), 645–664. https://doi.org/10.1142/S0218127497000443 doi: 10.1142/S0218127497000443
![]() |
[7] |
H. G. Zhang, J. Fu, T. D. Ma, S. C. Tong, An improved impulsive control approach to nonlinear systems with time-varying delays, Chinese Phys. B, 18 (2009), 969–974. https://doi.org/10.1088/1674-1056/18/3/021 doi: 10.1088/1674-1056/18/3/021
![]() |
[8] |
Y. Chen, W. W. Yu, F. F. Li, S. S. Feng, Synchronization of complex networks with impulsive control and disconnected topology, IEEE T. Circuits-II, 60 (2013), 292–296. https://doi.org/10.1109/TCSII.2013.2251961 doi: 10.1109/TCSII.2013.2251961
![]() |
[9] |
X. Y. Zhang, C. D. Li, H. F. Li, Finite-time stabilization of nonlinear systems via impulsive control with state-dependent delay, J. Franklin I., 359 (2022), 1196–1214. https://doi.org/10.1016/j.jfranklin.2021.11.013 doi: 10.1016/j.jfranklin.2021.11.013
![]() |
[10] |
W. L. He, F. Qian, J. Lam, G. R. Chen, Q. L. Han, J. Kurths, Quasi synchronization of heterogeneous dynamic networks via distributed impulsive control: Error estimation, optimization and design, Automatica, 62 (2015), 249–262. https://doi.org/10.1016/j.automatica.2015.09.028 doi: 10.1016/j.automatica.2015.09.028
![]() |
[11] |
S. M. Chu, W. L. He, Q. L. Han, F. Qian, Pinning synchronization of delayed dynamical networks via impulsive control, IEEE, 2014,544–549. https://doi.org/10.1109/ICMC.2014.7231615 doi: 10.1109/ICMC.2014.7231615
![]() |
[12] |
W. L. He, G. R. Chen, Q. L. Han, F. Qian, Network-based leaderfollowing consensus of nonlinear multi-agent systems via distributed impulsive control, Inform. Sci., 380 (2017), 145–158. https://doi.org/10.1016/j.ins.2015.06.005 doi: 10.1016/j.ins.2015.06.005
![]() |
[13] |
C. Ke, C. D. Li, L. You, Consensus of nonlinear multi-agent systems with grouping via state-constraint impulsive protocols, IEEE T. Cybernetics, 51 (2021), 4162–4172. https://doi.org/10.1109/TCYB.2019.2953566 doi: 10.1109/TCYB.2019.2953566
![]() |
[14] |
S. S. Yang, X. F. Liao, Y. B. Liu, Second-order consensus in directed networks of identical nonlinear dynamics via impulsive control, Neurocomputing, 179 (2016), 290–297. https://doi.org/10.1016/j.neucom.2015.11.088 doi: 10.1016/j.neucom.2015.11.088
![]() |
[15] |
T. D. Ma, Z. L. Zhang, B. Cui, Impulsive consensus of nonlinear fuzzy multi-agent systems under DoS attack, Nonlinear Anal. Hybri., 44 (2022), 101155. https://doi.org/10.1016/j.nahs.2022.101155 doi: 10.1016/j.nahs.2022.101155
![]() |
[16] |
X. G. Tan, J. D. Cao, X. D. Li, Consensus of leader-following multiagent systems: A distributed event-triggered impulsive control strategy, IEEE T. Cybernetics, 49 (2019), 792–801. https://doi.org/10.1109/TCYB.2017.2786474 doi: 10.1109/TCYB.2017.2786474
![]() |
[17] |
X. D. Li, D. X. Peng, J. D, Cao, Lyapunov stability for impulsive systems via event-triggered impulsive control, IEEE T. Automat. Contr., 65 (2020), 4908–4913. https://doi.org/10.1109/TAC.2020.2964558 doi: 10.1109/TAC.2020.2964558
![]() |
[18] |
W. Y. Tang, K. Li, J. Wu, Y. F. Xie, Consensus of nonlinear multi-agent systems with distributed event-triggered impulsive control, J. Vib. Control, 28 (2022), 882–891. https://doi.org/10.1177/1077546320985978 doi: 10.1177/1077546320985978
![]() |
[19] |
H. H. Guo, J. Liu, C. K. Ahn, Y. B. Wu, W. X. Li, Dynamic event-triggered impulsive control for stochastic nonlinear systems with extension in complex networks, IEEE T. Circuits-II, 69 (2022), 2167–2178. https://doi.org/10.1109/TCSI.2022.3141583 doi: 10.1109/TCSI.2022.3141583
![]() |
[20] |
L. Chen, H. G. Liang, Y. N. Pan, T. S. Li, Human-in-the-loop consensus tracking control for UAV systems via an improved prescribed performance approach, IEEE T. Aero. Elec. Sys., 59 (2023), 8380–8391. https://doi.org/10.1109/TAES.2023.3304283 doi: 10.1109/TAES.2023.3304283
![]() |
[21] |
M. Wang, H. G. Liang, Y. N. Pan, X. P. Xie, A new privacy preservation mechanism and a gain iterative disturbance observer for multiagent systems, IEEE T. Netw. Sci. Eng., 11 (2024), 392–403. https://doi.org/10.1109/TNSE.2023.3299614 doi: 10.1109/TNSE.2023.3299614
![]() |
[22] |
Y. N. Pan, W. Y. Ji, H. K. Lam, L. Cao, An improved predefined-time adaptive neural control approach for nonlinear multiagent systems, IEEE T. Autom. Sci. Eng., 2023. https://doi.org/10.1109/TASE.2023.3324397 doi: 10.1109/TASE.2023.3324397
![]() |
[23] |
A. Parivallal, R. Sakthivel, F. Alzahrani, A. Leelamani, Quantized guaranteed cost memory consensus for nonlinear multi-agent systems with switching topology and actuator faults, Physica A, 539 (2020), 122946. https://doi.org/10.1016/j.physa.2019.122946 doi: 10.1016/j.physa.2019.122946
![]() |
[24] |
S. Han, S. K. Kommuri, S. Lee, Affine transformed it2 fuzzy event-triggered control under deception attacks, IEEE T. Fuzzy Syst., 29 (2021), 322–335. https://doi.org/10.1109/TFUZZ.2020.2999779 doi: 10.1109/TFUZZ.2020.2999779
![]() |
[25] |
D. R. Ding, Z. D. Wang, D. N. C. Ho, G. L. Wei, Distributed recursive filtering for stochastic systems under uniform quantizations and deception attacks through sensor networks, Automatica, 78 (2017), 231–240. https://doi.org/10.1016/j.automatica.2016.12.026 doi: 10.1016/j.automatica.2016.12.026
![]() |
[26] |
J. Cao, D. Ding, J. L. Liu, E. G. Tian, S. L. Hu, X. P. Xie, Hybridtriggered-based security controller design for networked control system under multiple cyber attacks, Inform. Sci., 548 (2021), 69–84. https://doi.org/10.1016/j.ins.2020.09.046 doi: 10.1016/j.ins.2020.09.046
![]() |
[27] |
X. L. Chen, Y. G. Wang, S. L. Hu, Event-based robust stabilization of uncertain networked control systems under quantization and denial-of-service attacks, Inform. Sci., 459 (2018), 369–386. https://doi.org/10.1016/j.ins.2018.05.019 doi: 10.1016/j.ins.2018.05.019
![]() |
[28] |
Y. T. Wang, W. L. He, Impulsive consensus of leader-following nonlinear multi-agent systems under DoS attacks, IECON 2019-45th Annual Conference of the IEEE Industrial Electronics Society, 2019, 6274–6279. https://doi.org/10.1109/IECON.2019.8927636 doi: 10.1109/IECON.2019.8927636
![]() |
[29] |
J. H. Qin, M. L. Li, L. Shi, X. H. Yu, Optimal denial-ofservice attack scheduling with energy constraint over packet-dropping networks, IEEE T. Automat. Contr., 63 (2018), 1648–1663. https://doi.org/10.1109/TAC.2017.2756259 doi: 10.1109/TAC.2017.2756259
![]() |
[30] |
Z. Feng, G. Q. Hu, Secure cooperative event-triggered control of linear multi-agent systems under DoS attacks, IEEE T. Contr. Syst. T., 28 (2020), 741–752. https://doi.org/10.1109/TCST.2019.2892032 doi: 10.1109/TCST.2019.2892032
![]() |
[31] |
H. Liu, Event-triggering-based leader-following bounded consensus of multi-agent systems under DoS attacks, Commun. Nonlinear Sci., 89 (2020), 105342. https://doi.org/10.1016/j.cnsns.2020.105342 doi: 10.1016/j.cnsns.2020.105342
![]() |
[32] |
L. Zhao, G. H. Yang, Adaptive fault-tolerant control for nonlinear multi-agent systems with DoS attacks, Inform. Sci., 526 (2020), 39–53. https://doi.org/10.1016/j.ins.2020.03.083 doi: 10.1016/j.ins.2020.03.083
![]() |
[33] |
D. Ye, Y. Y. Shao, Quasi-synchronization of heterogeneous nonlinear multi-agent systems subject to DoS attacks with impulsive effects, Neurocomputing, 366 (2019), 131–139. https://doi.org/10.1016/j.neucom.2019.07.095 doi: 10.1016/j.neucom.2019.07.095
![]() |
[34] |
Y. C. Sun, G. H. Yang, Event-triggered distributed state estimation for multiagent systems under DoS attacks, IEEE T. Cybernetics, 52 (2020), 6901–6910. https://doi.org/10.1109/TCYB.2020.3034456 doi: 10.1109/TCYB.2020.3034456
![]() |
[35] |
M. A. Shayman, Geometry of the algebraic Riccati equation, Part Ⅰ, SIAM J. Control Optim., 21 (1983), 375–394. https://doi.org/10.1137/0321021 doi: 10.1137/0321021
![]() |
[36] |
Z. D. Ai, L. H. Peng, G. D. Zong, K. B. Shi, Impulsive control for nonlinear systems under DoS attacks: A dynamic event-triggered method, IEEE T. Circuits-II, 69 (2022), 3839–3843. https://doi.org/10.1109/TCSII.2022.3170592 doi: 10.1109/TCSII.2022.3170592
![]() |
Agent i | 1 | 2 | 3 | 4 |
[35] | 288 | 295 | 294 | 297 |
Our ETC | 67 | 15 | 45 | 15 |