Resilient Event-Triggered Control Strategies for Second-Order Consensus
This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an asynchronous dynamic edge event-triggered (DEET) communication scheme is developed to reduce the utilization of network resources in the abs...
Saved in:
Published in | IEEE transactions on automatic control Vol. 67; no. 8; pp. 4226 - 4233 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.08.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
ISSN | 0018-9286 1558-2523 |
DOI | 10.1109/TAC.2021.3122382 |
Cover
Loading…
Abstract | This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an asynchronous dynamic edge event-triggered (DEET) communication scheme is developed to reduce the utilization of network resources in the absence of attacks. Then, we further consider the case of replay attacks launched by multiple adversaries, under which the transmitted information is maliciously replaced by a previous unnecessary message. To overcome the impact caused by replay attacks, a modified DEET scheme and an effective attack-resilient consensus protocol are well constructed, both of which successfully guarantee second-order consensus in the presence of replay attacks. In addition, internal dynamic variables are utilized in the proposed DEET schemes such that the triggering time sequence does not exhibit Zeno behavior. Finally, one numerical example is provided to illustrate our theoretical analysis. |
---|---|
AbstractList | This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an asynchronous dynamic edge event-triggered (DEET) communication scheme is developed to reduce the utilization of network resources in the absence of attacks. Then, we further consider the case of replay attacks launched by multiple adversaries, under which the transmitted information is maliciously replaced by a previous unnecessary message. To overcome the impact caused by replay attacks, a modified DEET scheme and an effective attack-resilient consensus protocol are well constructed, both of which successfully guarantee second-order consensus in the presence of replay attacks. In addition, internal dynamic variables are utilized in the proposed DEET schemes such that the triggering time sequence does not exhibit Zeno behavior. Finally, one numerical example is provided to illustrate our theoretical analysis. |
Author | Kurths, Jurgen Yu, Xinghuo Wen, Guanghui Xu, Wenying |
Author_xml | – sequence: 1 givenname: Wenying orcidid: 0000-0002-6110-9160 surname: Xu fullname: Xu, Wenying email: wyxu@seu.edu.cn organization: School of Mathematics, Southeast University, Nanjing, China – sequence: 2 givenname: Jurgen orcidid: 0000-0002-5926-4276 surname: Kurths fullname: Kurths, Jurgen email: jkurths@agnld.uni-potsdam.de organization: Potsdam Institute for Climate Impact Research, Potsdam, Germany – sequence: 3 givenname: Guanghui orcidid: 0000-0003-0070-8597 surname: Wen fullname: Wen, Guanghui email: wenguanghui@gmail.com organization: School of Mathematics, Southeast University, Nanjing, China – sequence: 4 givenname: Xinghuo orcidid: 0000-0001-8093-9787 surname: Yu fullname: Yu, Xinghuo email: x.yu@rmit.edu.au organization: RMIT University, Melbourne, VIC, Australia |
BookMark | eNp9kE1LAzEQhoNUsK3eBS8Lnrfmu9ljKbUKhYKt55AmsyVl3dQkFfz37tLiwYOXGQbeZ4Z5RmjQhhYQuid4Qgiunraz-YRiSiaMUMoUvUJDIoQqqaBsgIYYE1VWVMkbNErp0I2SczJEyzdIvvHQ5mLx1dVyG_1-DxFcMQ9tjqEpNjmaDHsPqahDLDZgQ-vKdXQQ-0yCNp3SLbquTZPg7tLH6P15sZ2_lKv18nU-W5WWViSXzlguDK0V5sAqsNQJuROEsto5CbWwHFu-kzBVzDjjOJVSEcYNl8ISTKdsjB7Pe48xfJ4gZX0Ip9h2JzWVlSBiqmTVpeQ5ZWNIKUKtrc8m-_4j4xtNsO6l6U6a7qXpi7QOxH_AY_QfJn7_hzycEQ8Av_FKKNHpZz8FSXjK |
CODEN | IETAA9 |
CitedBy_id | crossref_primary_10_1109_TVT_2024_3420451 crossref_primary_10_1177_01423312241292758 crossref_primary_10_1016_j_amc_2025_129336 crossref_primary_10_1109_TFUZZ_2024_3376402 crossref_primary_10_1109_JIOT_2023_3308195 crossref_primary_10_1109_JIOT_2023_3342032 crossref_primary_10_1016_j_ifacol_2024_07_270 crossref_primary_10_1016_j_neucom_2024_128601 crossref_primary_10_1109_TII_2023_3313651 crossref_primary_10_1109_MSMC_2023_3317592 crossref_primary_10_1109_TCYB_2024_3422232 crossref_primary_10_1016_j_neucom_2022_07_047 crossref_primary_10_1109_JSYST_2023_3323549 crossref_primary_10_1109_TAC_2021_3131145 crossref_primary_10_1109_TFUZZ_2022_3215529 crossref_primary_10_1109_TSMC_2023_3328001 crossref_primary_10_1016_j_ins_2022_12_087 crossref_primary_10_1109_ACCESS_2024_3379420 crossref_primary_10_1016_j_chaos_2023_113405 crossref_primary_10_1109_TSMC_2024_3418970 crossref_primary_10_3390_electronics13142680 crossref_primary_10_1002_rnc_6815 crossref_primary_10_1109_TCSII_2022_3193730 crossref_primary_10_1109_TCYB_2023_3262540 crossref_primary_10_1109_TCYB_2023_3246096 crossref_primary_10_1016_j_sysconle_2025_106032 crossref_primary_10_1109_TCNS_2024_3487640 crossref_primary_10_1063_5_0155863 crossref_primary_10_1002_acs_3475 crossref_primary_10_1109_JAS_2023_123507 crossref_primary_10_1109_TCSI_2024_3381191 crossref_primary_10_1109_TII_2023_3245194 crossref_primary_10_1016_j_sysconle_2023_105579 crossref_primary_10_1016_j_neucom_2024_128134 crossref_primary_10_1109_TCNS_2022_3232500 crossref_primary_10_1007_s11431_023_2513_8 crossref_primary_10_1016_j_neucom_2023_127180 crossref_primary_10_1109_TSMC_2023_3257297 crossref_primary_10_1007_s11424_024_3291_0 |
Cites_doi | 10.1109/TASE.2018.2844258 10.1109/TNNLS.2018.2890119 10.1109/JPROC.2011.2161428 10.1109/TAC.2015.2390553 10.1016/j.automatica.2010.03.006 10.1109/TAC.2019.2895927 10.1109/TAC.2013.2279896 10.1109/TCSII.2018.2882538 10.1016/j.automatica.2016.12.026 10.1109/TAC.2016.2610945 10.1109/TCYB.2019.2896160 10.1109/TCYB.2017.2716115 10.1016/j.automatica.2013.03.002 10.1109/TAC.2005.843873 10.1109/TAC.2011.2174666 10.1137/110843332 10.1016/j.na.2007.01.018 10.1016/j.automatica.2017.07.056 10.1109/JSAC.2013.130413 10.1007/s11424-017-6181-x 10.1017/CBO9781139020411 10.1109/TAC.2018.2874703 10.1109/TAC.2018.2836919 10.1049/iet-cta.2009.0191 10.1109/TAC.2018.2862471 10.1109/TCNS.2017.2668901 10.1016/j.automatica.2016.02.002 10.1109/TAC.2008.924961 10.1049/iet-cta.2013.0761 10.1109/TSMC.2019.2895027 10.1016/j.automatica.2009.05.026 10.1002/rnc.1147 10.1016/j.automatica.2008.05.027 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
DOI | 10.1109/TAC.2021.3122382 |
DatabaseName | IEEE Xplore (IEEE) IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Computer and Information Systems Abstracts Electronics & Communications Abstracts Mechanical & Transportation Engineering Abstracts Technology Research Database Engineering Research Database ProQuest Computer Science Collection Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Academic Computer and Information Systems Abstracts Professional |
DatabaseTitle | CrossRef Technology Research Database Computer and Information Systems Abstracts – Academic Mechanical & Transportation Engineering Abstracts Electronics & Communications Abstracts ProQuest Computer Science Collection Computer and Information Systems Abstracts Engineering Research Database Advanced Technologies Database with Aerospace Computer and Information Systems Abstracts Professional |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-2523 |
EndPage | 4233 |
ExternalDocumentID | 10_1109_TAC_2021_3122382 9585558 |
Genre | orig-research |
GrantInformation_xml | – fundername: Fundamental Research Funds for the Central Universities funderid: 10.13039/501100012226 – fundername: Alexander von Humboldt Foundation of Germany – fundername: Southeast University funderid: 10.13039/501100008081 – fundername: Natural Science Foundation of Jiangsu Province grantid: BK20180367 funderid: 10.13039/501100004608 – fundername: Australian Research Council grantid: DP200101199 funderid: 10.13039/501100000923 – fundername: National Natural Science Foundation of China grantid: 61803082; 62073079; 62088101 funderid: 10.13039/501100001809 |
GroupedDBID | -~X .DC 0R~ 29I 3EH 4.4 5GY 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACGFO ACGFS ACIWK ACNCT AENEX AETIX AGQYO AGSQL AHBIQ AI. AIBXA AKJIK AKQYR ALLEH ALMA_UNASSIGNED_HOLDINGS ASUFR ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ CS3 DU5 EBS EJD F5P HZ~ H~9 IAAWW IBMZZ ICLAB IDIHD IFIPE IFJZH IPLJI JAVBF LAI M43 MS~ O9- OCL P2P RIA RIE RNS TAE TN5 VH1 VJK ~02 AAYOK AAYXX CITATION RIG 7SC 7SP 7TB 8FD FR3 JQ2 L7M L~C L~D |
ID | FETCH-LOGICAL-c291t-dac45a2f804e39ec2d56b5123fdd6ef5c40c4b6e783adad42668134a465c10273 |
IEDL.DBID | RIE |
ISSN | 0018-9286 |
IngestDate | Mon Jun 30 08:36:46 EDT 2025 Thu Apr 24 22:56:13 EDT 2025 Tue Jul 01 03:36:39 EDT 2025 Wed Aug 27 02:25:28 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c291t-dac45a2f804e39ec2d56b5123fdd6ef5c40c4b6e783adad42668134a465c10273 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0002-5926-4276 0000-0003-0070-8597 0000-0001-8093-9787 0000-0002-6110-9160 |
PQID | 2695157869 |
PQPubID | 85475 |
PageCount | 8 |
ParticipantIDs | proquest_journals_2695157869 crossref_citationtrail_10_1109_TAC_2021_3122382 ieee_primary_9585558 crossref_primary_10_1109_TAC_2021_3122382 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-08-01 |
PublicationDateYYYYMMDD | 2022-08-01 |
PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on automatic control |
PublicationTitleAbbrev | TAC |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref12 ref15 ref14 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref16 ref19 ref18 ref24 ref23 ref26 ref25 ref20 ref22 ref21 ref28 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref5 doi: 10.1109/TASE.2018.2844258 – ident: ref19 doi: 10.1109/TNNLS.2018.2890119 – ident: ref28 doi: 10.1109/JPROC.2011.2161428 – ident: ref13 doi: 10.1109/TAC.2015.2390553 – ident: ref3 doi: 10.1016/j.automatica.2010.03.006 – ident: ref15 doi: 10.1109/TAC.2019.2895927 – ident: ref27 doi: 10.1109/TAC.2013.2279896 – ident: ref4 doi: 10.1109/TCSII.2018.2882538 – ident: ref25 doi: 10.1016/j.automatica.2016.12.026 – ident: ref1 doi: 10.1109/TAC.2016.2610945 – ident: ref18 doi: 10.1109/TCYB.2019.2896160 – ident: ref21 doi: 10.1109/TCYB.2017.2716115 – ident: ref12 doi: 10.1016/j.automatica.2013.03.002 – ident: ref29 doi: 10.1109/TAC.2005.843873 – ident: ref11 doi: 10.1109/TAC.2011.2174666 – ident: ref22 doi: 10.1137/110843332 – ident: ref10 doi: 10.1016/j.na.2007.01.018 – ident: ref30 doi: 10.1016/j.automatica.2017.07.056 – ident: ref23 doi: 10.1109/JSAC.2013.130413 – ident: ref16 doi: 10.1007/s11424-017-6181-x – ident: ref26 doi: 10.1017/CBO9781139020411 – ident: ref6 doi: 10.1109/TAC.2018.2874703 – ident: ref20 doi: 10.1109/TAC.2018.2836919 – ident: ref7 doi: 10.1049/iet-cta.2009.0191 – ident: ref32 doi: 10.1109/TAC.2018.2862471 – ident: ref17 doi: 10.1109/TCNS.2017.2668901 – ident: ref33 doi: 10.1016/j.automatica.2016.02.002 – ident: ref2 doi: 10.1109/TAC.2008.924961 – ident: ref14 doi: 10.1049/iet-cta.2013.0761 – ident: ref24 doi: 10.1109/TSMC.2019.2895027 – ident: ref8 doi: 10.1016/j.automatica.2009.05.026 – ident: ref31 doi: 10.1002/rnc.1147 – ident: ref9 doi: 10.1016/j.automatica.2008.05.027 |
SSID | ssj0016441 |
Score | 2.5753121 |
Snippet | This article investigates the second-order consensus issue for multiagent systems subject to both limited communication resources and replay attacks. First, an... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 4226 |
SubjectTerms | Communication channels Consensus protocol Dynamic scheduling Eigenvalues and eigenfunctions Event triggered control Event-triggered scheme Information processing Multi-agent systems multiagent system Multiagent systems replay attack Schedules second-order consensus |
Title | Resilient Event-Triggered Control Strategies for Second-Order Consensus |
URI | https://ieeexplore.ieee.org/document/9585558 https://www.proquest.com/docview/2695157869 |
Volume | 67 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LT8MwDLZgJzjwRgwG6oELEtnaNE2b4zQxEBIgwZB2q5rERYhpQ3S78OuJ267iJcStB0eK7MT-3NifAU6tCYQ1mWR5HCATMtRMx9pniVGYK5-rHKkb-eZWXj2K63E0XoHzphcGEcviM-zSZ_mWb2dmQb_Kesph2yhKVmHVJW5Vr1bzYkBxvfK67gLzpHmS9FVv1B-4RJAHLj91wTDhX0JQOVPlhyMuo8twE26W-6qKSl66i7numvdvlI3_3fgWbNQw0-tX52IbVnC6A-ufyAd34fIei-cJtUN6F1T0yEYuUX-i0Z3eoKpf95bUtVh4Dtt6D5Q8W3ZHbJ0kU9CYjGIPHocXo8EVq8cqMMNVMGc2MyLKeJ74AkOFhttIahf3w9xaiXlkhG-ElhgnYWYzSyE8CUKRCRmZgOhv9qE1nU3xADwdOxdgNc-zMCeeGRWhgzAiRqWlVlK0obfUdGpqznEafTFJy9zDV6mzTUq2SWvbtOGsWfFa8W38IbtLqm7kai23obM0ZlpfyCLl0kFJ552kOvx91RGscepsKGv7OtCavy3w2OGNuT4pD9oHjbvROg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1Lb9QwEB615UA5AG2pWFhoDlwq4d3EsZ34uFq1LG23SCUr7S2K7UmFqLaIZC_8ejx5iQJC3HIYS9aMPY94vm8A3jkbCWcLxcokQiZUbJhJTMhSq7HUIdclEhp5ea0WK3GxlusdeD9gYRCxaT7DCX02b_nu3m7pV9lU-9xWynQXHkkC47ZoreHNgCJ763f9Febp8CgZ6mk2m_tSkEe-QvXhMOUPglAzVeUPV9zEl_NnsOx31raVfJ1sazOxP34jbfzfrT-Hp12iGczak3EAO7g5hCe_0A8ewYcbrL7cESAyOKO2R5b5Uv2WhncG87aDPejJa7EKfHYbfKby2bFPxNdJMhUNyqhewOr8LJsvWDdYgVmuo5q5wgpZ8DINBcYaLXdSGR_549I5haW0IrTCKEzSuHCFoyCeRrEohJI2IgKcY9jb3G_wJQQm8U7AGV4WcUlMM1qiT2JEgtooo5UYwbTXdG471nEafnGXN9VHqHNvm5xsk3e2GcHpsOJby7jxD9kjUvUg12l5BOPemHl3JaucK59Mev-k9Ku_rzqBx4tseZVffby-fA37nHAOTaffGPbq71t847OP2rxtDt1PoofUgg |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Resilient+Event-Triggered+Control+Strategies+for+Second-Order+Consensus&rft.jtitle=IEEE+transactions+on+automatic+control&rft.au=Xu%2C+Wenying&rft.au=Kurths%2C+Jurgen&rft.au=Wen%2C+Guanghui&rft.au=Yu%2C+Xinghuo&rft.date=2022-08-01&rft.pub=The+Institute+of+Electrical+and+Electronics+Engineers%2C+Inc.+%28IEEE%29&rft.issn=0018-9286&rft.eissn=1558-2523&rft.volume=67&rft.issue=8&rft.spage=4226&rft_id=info:doi/10.1109%2FTAC.2021.3122382&rft.externalDBID=NO_FULL_TEXT |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0018-9286&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0018-9286&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0018-9286&client=summon |