Resilient Event-Triggered Control Strategies for Second-Order Consensus

This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an asynchronous dynamic edge event-triggered (DEET) communication scheme is developed to reduce the utilization of network resources in the abs...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on automatic control Vol. 67; no. 8; pp. 4226 - 4233
Main Authors Xu, Wenying, Kurths, Jurgen, Wen, Guanghui, Yu, Xinghuo
Format Journal Article
LanguageEnglish
Published New York IEEE 01.08.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text
ISSN0018-9286
1558-2523
DOI10.1109/TAC.2021.3122382

Cover

Loading…
Abstract This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an asynchronous dynamic edge event-triggered (DEET) communication scheme is developed to reduce the utilization of network resources in the absence of attacks. Then, we further consider the case of replay attacks launched by multiple adversaries, under which the transmitted information is maliciously replaced by a previous unnecessary message. To overcome the impact caused by replay attacks, a modified DEET scheme and an effective attack-resilient consensus protocol are well constructed, both of which successfully guarantee second-order consensus in the presence of replay attacks. In addition, internal dynamic variables are utilized in the proposed DEET schemes such that the triggering time sequence does not exhibit Zeno behavior. Finally, one numerical example is provided to illustrate our theoretical analysis.
AbstractList This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an asynchronous dynamic edge event-triggered (DEET) communication scheme is developed to reduce the utilization of network resources in the absence of attacks. Then, we further consider the case of replay attacks launched by multiple adversaries, under which the transmitted information is maliciously replaced by a previous unnecessary message. To overcome the impact caused by replay attacks, a modified DEET scheme and an effective attack-resilient consensus protocol are well constructed, both of which successfully guarantee second-order consensus in the presence of replay attacks. In addition, internal dynamic variables are utilized in the proposed DEET schemes such that the triggering time sequence does not exhibit Zeno behavior. Finally, one numerical example is provided to illustrate our theoretical analysis.
Author Kurths, Jurgen
Yu, Xinghuo
Wen, Guanghui
Xu, Wenying
Author_xml – sequence: 1
  givenname: Wenying
  orcidid: 0000-0002-6110-9160
  surname: Xu
  fullname: Xu, Wenying
  email: wyxu@seu.edu.cn
  organization: School of Mathematics, Southeast University, Nanjing, China
– sequence: 2
  givenname: Jurgen
  orcidid: 0000-0002-5926-4276
  surname: Kurths
  fullname: Kurths, Jurgen
  email: jkurths@agnld.uni-potsdam.de
  organization: Potsdam Institute for Climate Impact Research, Potsdam, Germany
– sequence: 3
  givenname: Guanghui
  orcidid: 0000-0003-0070-8597
  surname: Wen
  fullname: Wen, Guanghui
  email: wenguanghui@gmail.com
  organization: School of Mathematics, Southeast University, Nanjing, China
– sequence: 4
  givenname: Xinghuo
  orcidid: 0000-0001-8093-9787
  surname: Yu
  fullname: Yu, Xinghuo
  email: x.yu@rmit.edu.au
  organization: RMIT University, Melbourne, VIC, Australia
BookMark eNp9kE1LAzEQhoNUsK3eBS8Lnrfmu9ljKbUKhYKt55AmsyVl3dQkFfz37tLiwYOXGQbeZ4Z5RmjQhhYQuid4Qgiunraz-YRiSiaMUMoUvUJDIoQqqaBsgIYYE1VWVMkbNErp0I2SczJEyzdIvvHQ5mLx1dVyG_1-DxFcMQ9tjqEpNjmaDHsPqahDLDZgQ-vKdXQQ-0yCNp3SLbquTZPg7tLH6P15sZ2_lKv18nU-W5WWViSXzlguDK0V5sAqsNQJuROEsto5CbWwHFu-kzBVzDjjOJVSEcYNl8ISTKdsjB7Pe48xfJ4gZX0Ip9h2JzWVlSBiqmTVpeQ5ZWNIKUKtrc8m-_4j4xtNsO6l6U6a7qXpi7QOxH_AY_QfJn7_hzycEQ8Av_FKKNHpZz8FSXjK
CODEN IETAA9
CitedBy_id crossref_primary_10_1109_TVT_2024_3420451
crossref_primary_10_1177_01423312241292758
crossref_primary_10_1016_j_amc_2025_129336
crossref_primary_10_1109_TFUZZ_2024_3376402
crossref_primary_10_1109_JIOT_2023_3308195
crossref_primary_10_1109_JIOT_2023_3342032
crossref_primary_10_1016_j_ifacol_2024_07_270
crossref_primary_10_1016_j_neucom_2024_128601
crossref_primary_10_1109_TII_2023_3313651
crossref_primary_10_1109_MSMC_2023_3317592
crossref_primary_10_1109_TCYB_2024_3422232
crossref_primary_10_1016_j_neucom_2022_07_047
crossref_primary_10_1109_JSYST_2023_3323549
crossref_primary_10_1109_TAC_2021_3131145
crossref_primary_10_1109_TFUZZ_2022_3215529
crossref_primary_10_1109_TSMC_2023_3328001
crossref_primary_10_1016_j_ins_2022_12_087
crossref_primary_10_1109_ACCESS_2024_3379420
crossref_primary_10_1016_j_chaos_2023_113405
crossref_primary_10_1109_TSMC_2024_3418970
crossref_primary_10_3390_electronics13142680
crossref_primary_10_1002_rnc_6815
crossref_primary_10_1109_TCSII_2022_3193730
crossref_primary_10_1109_TCYB_2023_3262540
crossref_primary_10_1109_TCYB_2023_3246096
crossref_primary_10_1016_j_sysconle_2025_106032
crossref_primary_10_1109_TCNS_2024_3487640
crossref_primary_10_1063_5_0155863
crossref_primary_10_1002_acs_3475
crossref_primary_10_1109_JAS_2023_123507
crossref_primary_10_1109_TCSI_2024_3381191
crossref_primary_10_1109_TII_2023_3245194
crossref_primary_10_1016_j_sysconle_2023_105579
crossref_primary_10_1016_j_neucom_2024_128134
crossref_primary_10_1109_TCNS_2022_3232500
crossref_primary_10_1007_s11431_023_2513_8
crossref_primary_10_1016_j_neucom_2023_127180
crossref_primary_10_1109_TSMC_2023_3257297
crossref_primary_10_1007_s11424_024_3291_0
Cites_doi 10.1109/TASE.2018.2844258
10.1109/TNNLS.2018.2890119
10.1109/JPROC.2011.2161428
10.1109/TAC.2015.2390553
10.1016/j.automatica.2010.03.006
10.1109/TAC.2019.2895927
10.1109/TAC.2013.2279896
10.1109/TCSII.2018.2882538
10.1016/j.automatica.2016.12.026
10.1109/TAC.2016.2610945
10.1109/TCYB.2019.2896160
10.1109/TCYB.2017.2716115
10.1016/j.automatica.2013.03.002
10.1109/TAC.2005.843873
10.1109/TAC.2011.2174666
10.1137/110843332
10.1016/j.na.2007.01.018
10.1016/j.automatica.2017.07.056
10.1109/JSAC.2013.130413
10.1007/s11424-017-6181-x
10.1017/CBO9781139020411
10.1109/TAC.2018.2874703
10.1109/TAC.2018.2836919
10.1049/iet-cta.2009.0191
10.1109/TAC.2018.2862471
10.1109/TCNS.2017.2668901
10.1016/j.automatica.2016.02.002
10.1109/TAC.2008.924961
10.1049/iet-cta.2013.0761
10.1109/TSMC.2019.2895027
10.1016/j.automatica.2009.05.026
10.1002/rnc.1147
10.1016/j.automatica.2008.05.027
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
DOI 10.1109/TAC.2021.3122382
DatabaseName IEEE Xplore (IEEE)
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Computer and Information Systems Abstracts
Electronics & Communications Abstracts
Mechanical & Transportation Engineering Abstracts
Technology Research Database
Engineering Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Technology Research Database
Computer and Information Systems Abstracts – Academic
Mechanical & Transportation Engineering Abstracts
Electronics & Communications Abstracts
ProQuest Computer Science Collection
Computer and Information Systems Abstracts
Engineering Research Database
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts Professional
DatabaseTitleList Technology Research Database

Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-2523
EndPage 4233
ExternalDocumentID 10_1109_TAC_2021_3122382
9585558
Genre orig-research
GrantInformation_xml – fundername: Fundamental Research Funds for the Central Universities
  funderid: 10.13039/501100012226
– fundername: Alexander von Humboldt Foundation of Germany
– fundername: Southeast University
  funderid: 10.13039/501100008081
– fundername: Natural Science Foundation of Jiangsu Province
  grantid: BK20180367
  funderid: 10.13039/501100004608
– fundername: Australian Research Council
  grantid: DP200101199
  funderid: 10.13039/501100000923
– fundername: National Natural Science Foundation of China
  grantid: 61803082; 62073079; 62088101
  funderid: 10.13039/501100001809
GroupedDBID -~X
.DC
0R~
29I
3EH
4.4
5GY
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACGFO
ACGFS
ACIWK
ACNCT
AENEX
AETIX
AGQYO
AGSQL
AHBIQ
AI.
AIBXA
AKJIK
AKQYR
ALLEH
ALMA_UNASSIGNED_HOLDINGS
ASUFR
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CS3
DU5
EBS
EJD
F5P
HZ~
H~9
IAAWW
IBMZZ
ICLAB
IDIHD
IFIPE
IFJZH
IPLJI
JAVBF
LAI
M43
MS~
O9-
OCL
P2P
RIA
RIE
RNS
TAE
TN5
VH1
VJK
~02
AAYOK
AAYXX
CITATION
RIG
7SC
7SP
7TB
8FD
FR3
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c291t-dac45a2f804e39ec2d56b5123fdd6ef5c40c4b6e783adad42668134a465c10273
IEDL.DBID RIE
ISSN 0018-9286
IngestDate Mon Jun 30 08:36:46 EDT 2025
Thu Apr 24 22:56:13 EDT 2025
Tue Jul 01 03:36:39 EDT 2025
Wed Aug 27 02:25:28 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c291t-dac45a2f804e39ec2d56b5123fdd6ef5c40c4b6e783adad42668134a465c10273
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0002-5926-4276
0000-0003-0070-8597
0000-0001-8093-9787
0000-0002-6110-9160
PQID 2695157869
PQPubID 85475
PageCount 8
ParticipantIDs proquest_journals_2695157869
crossref_citationtrail_10_1109_TAC_2021_3122382
ieee_primary_9585558
crossref_primary_10_1109_TAC_2021_3122382
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-08-01
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on automatic control
PublicationTitleAbbrev TAC
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref12
ref15
ref14
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref16
ref19
ref18
ref24
ref23
ref26
ref25
ref20
ref22
ref21
ref28
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref5
  doi: 10.1109/TASE.2018.2844258
– ident: ref19
  doi: 10.1109/TNNLS.2018.2890119
– ident: ref28
  doi: 10.1109/JPROC.2011.2161428
– ident: ref13
  doi: 10.1109/TAC.2015.2390553
– ident: ref3
  doi: 10.1016/j.automatica.2010.03.006
– ident: ref15
  doi: 10.1109/TAC.2019.2895927
– ident: ref27
  doi: 10.1109/TAC.2013.2279896
– ident: ref4
  doi: 10.1109/TCSII.2018.2882538
– ident: ref25
  doi: 10.1016/j.automatica.2016.12.026
– ident: ref1
  doi: 10.1109/TAC.2016.2610945
– ident: ref18
  doi: 10.1109/TCYB.2019.2896160
– ident: ref21
  doi: 10.1109/TCYB.2017.2716115
– ident: ref12
  doi: 10.1016/j.automatica.2013.03.002
– ident: ref29
  doi: 10.1109/TAC.2005.843873
– ident: ref11
  doi: 10.1109/TAC.2011.2174666
– ident: ref22
  doi: 10.1137/110843332
– ident: ref10
  doi: 10.1016/j.na.2007.01.018
– ident: ref30
  doi: 10.1016/j.automatica.2017.07.056
– ident: ref23
  doi: 10.1109/JSAC.2013.130413
– ident: ref16
  doi: 10.1007/s11424-017-6181-x
– ident: ref26
  doi: 10.1017/CBO9781139020411
– ident: ref6
  doi: 10.1109/TAC.2018.2874703
– ident: ref20
  doi: 10.1109/TAC.2018.2836919
– ident: ref7
  doi: 10.1049/iet-cta.2009.0191
– ident: ref32
  doi: 10.1109/TAC.2018.2862471
– ident: ref17
  doi: 10.1109/TCNS.2017.2668901
– ident: ref33
  doi: 10.1016/j.automatica.2016.02.002
– ident: ref2
  doi: 10.1109/TAC.2008.924961
– ident: ref14
  doi: 10.1049/iet-cta.2013.0761
– ident: ref24
  doi: 10.1109/TSMC.2019.2895027
– ident: ref8
  doi: 10.1016/j.automatica.2009.05.026
– ident: ref31
  doi: 10.1002/rnc.1147
– ident: ref9
  doi: 10.1016/j.automatica.2008.05.027
SSID ssj0016441
Score 2.5753121
Snippet This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 4226
SubjectTerms Communication channels
Consensus protocol
Dynamic scheduling
Eigenvalues and eigenfunctions
Event triggered control
Event-triggered scheme
Information processing
Multi-agent systems
multiagent system
Multiagent systems
replay attack
Schedules
second-order consensus
Title Resilient Event-Triggered Control Strategies for Second-Order Consensus
URI https://ieeexplore.ieee.org/document/9585558
https://www.proquest.com/docview/2695157869
Volume 67
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZgJzjwRgwG6oELEtnaNE2b4zQxEBIgwZB2q5rERYhpQ3S78OuJ267iJcStB0eK7MT-3NifAU6tCYQ1mWR5HCATMtRMx9pniVGYK5-rHKkb-eZWXj2K63E0XoHzphcGEcviM-zSZ_mWb2dmQb_Kesph2yhKVmHVJW5Vr1bzYkBxvfK67gLzpHmS9FVv1B-4RJAHLj91wTDhX0JQOVPlhyMuo8twE26W-6qKSl66i7numvdvlI3_3fgWbNQw0-tX52IbVnC6A-ufyAd34fIei-cJtUN6F1T0yEYuUX-i0Z3eoKpf95bUtVh4Dtt6D5Q8W3ZHbJ0kU9CYjGIPHocXo8EVq8cqMMNVMGc2MyLKeJ74AkOFhttIahf3w9xaiXlkhG-ElhgnYWYzSyE8CUKRCRmZgOhv9qE1nU3xADwdOxdgNc-zMCeeGRWhgzAiRqWlVlK0obfUdGpqznEafTFJy9zDV6mzTUq2SWvbtOGsWfFa8W38IbtLqm7kai23obM0ZlpfyCLl0kFJ552kOvx91RGscepsKGv7OtCavy3w2OGNuT4pD9oHjbvROg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB615UA5AG2pWFhoDlwq4d3EsZ34uFq1LG23SCUr7S2K7UmFqLaIZC_8ejx5iQJC3HIYS9aMPY94vm8A3jkbCWcLxcokQiZUbJhJTMhSq7HUIdclEhp5ea0WK3GxlusdeD9gYRCxaT7DCX02b_nu3m7pV9lU-9xWynQXHkkC47ZoreHNgCJ763f9Febp8CgZ6mk2m_tSkEe-QvXhMOUPglAzVeUPV9zEl_NnsOx31raVfJ1sazOxP34jbfzfrT-Hp12iGczak3EAO7g5hCe_0A8ewYcbrL7cESAyOKO2R5b5Uv2WhncG87aDPejJa7EKfHYbfKby2bFPxNdJMhUNyqhewOr8LJsvWDdYgVmuo5q5wgpZ8DINBcYaLXdSGR_549I5haW0IrTCKEzSuHCFoyCeRrEohJI2IgKcY9jb3G_wJQQm8U7AGV4WcUlMM1qiT2JEgtooo5UYwbTXdG471nEafnGXN9VHqHNvm5xsk3e2GcHpsOJby7jxD9kjUvUg12l5BOPemHl3JaucK59Mev-k9Ku_rzqBx4tseZVffby-fA37nHAOTaffGPbq71t847OP2rxtDt1PoofUgg
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Resilient+Event-Triggered+Control+Strategies+for+Second-Order+Consensus&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Xu%2C+Wenying&rft.au=Kurths%2C+Jurgen&rft.au=Wen%2C+Guanghui&rft.au=Yu%2C+Xinghuo&rft.date=2022-08-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9286&rft.eissn=1558-2523&rft.volume=67&rft.issue=8&rft.spage=4226&rft_id=info:doi/10.1109%2FTAC.2021.3122382&rft.externalDBID=NO_FULL_TEXT
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon