Adaptive Formation for Multiagent Systems Subject to Denial-of-Service Attacks
The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs under multi-channel denial-of-service (DoS) attacks. In this article, the attacks on each channel are independent, while most of the existing res...
Saved in:
Published in | IEEE transactions on circuits and systems. I, Regular papers Vol. 69; no. 8; pp. 3391 - 3401 |
---|---|
Main Authors | , , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.08.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Abstract | The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs under multi-channel denial-of-service (DoS) attacks. In this article, the attacks on each channel are independent, while most of the existing results show that DoS attacks are the same on all channels. Without loss of generality, we consider multi-channel DoS attacks are imposed on a leader-follower MAS. Firstly, we propose a distributed formation control protocol to achieve the desired formation in the presence of DoS attacks. A translation-adaptive method is considered to adjust the interaction weights among neighboring agents online. Furthermore, a performance guarantee is derived based on the state information, and hereafter state errors among all agents can be regulated. Moreover, we derive the sufficient conditions for system stability w.r.t the controller gain and the allowable attack duration in the form of linear matrix inequalities (LMIs). Finally, simulation results are given to illustrate the effectiveness of the proposed method. |
---|---|
AbstractList | The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs under multi-channel denial-of-service (DoS) attacks. In this article, the attacks on each channel are independent, while most of the existing results show that DoS attacks are the same on all channels. Without loss of generality, we consider multi-channel DoS attacks are imposed on a leader-follower MAS. Firstly, we propose a distributed formation control protocol to achieve the desired formation in the presence of DoS attacks. A translation-adaptive method is considered to adjust the interaction weights among neighboring agents online. Furthermore, a performance guarantee is derived based on the state information, and hereafter state errors among all agents can be regulated. Moreover, we derive the sufficient conditions for system stability w.r.t the controller gain and the allowable attack duration in the form of linear matrix inequalities (LMIs). Finally, simulation results are given to illustrate the effectiveness of the proposed method. |
Author | Pan, Quan Pan, Kunpeng Lyu, Yang |
Author_xml | – sequence: 1 givenname: Kunpeng orcidid: 0000-0003-0092-357X surname: Pan fullname: Pan, Kunpeng email: pankunpeng@mail.nwpu.edu.cn organization: School of Automation, Northwestern Polytechnical University, Xi"an, Shaanxi, China – sequence: 2 givenname: Yang orcidid: 0000-0002-0702-908X surname: Lyu fullname: Lyu, Yang email: lyu.yang0326@gmail.com organization: School of Automation, Northwestern Polytechnical University, Xi"an, Shaanxi, China – sequence: 3 givenname: Quan orcidid: 0000-0001-8162-2896 surname: Pan fullname: Pan, Quan email: quanpan@nwpu.edu.cn organization: School of Automation, Northwestern Polytechnical University, Xi"an, Shaanxi, China |
BookMark | eNp9kLFOwzAQQC1UJNrCByAWS8wpPjtNnLEqFCoVGFLmyEnOyCWNi-1U6t_TUMTAwOQb3ruT34gMWtsiIdfAJgAsu1vP8-WEM84nAhIJiTgjQ5hOZcQkSwb9HGeRFFxekJH3G8Z4xgQMycusVrtg9kgX1m1VMLal2jr63DXBqHdsA80PPuDW07wrN1gFGiy9x9aoJrI6ytHtTYV0FoKqPvwlOdeq8Xj1847J2-JhPX-KVq-Py_lsFVU8EyHSAuJaaSY5FwmWCeOAWGOMWFagZaVUyWKAIwIaIa1rXjKOcamTOq3jVIoxuT3t3Tn72aEPxcZ2rj2eLHiSTSGOBfRUeqIqZ713qIvKhO8_BqdMUwAr-nhFH6_o4xU_8Y4m_DF3zmyVO_zr3Jwcg4i_fJZmAMDFFzyCfWQ |
CODEN | ITCSCH |
CitedBy_id | crossref_primary_10_1016_j_jfranklin_2024_106920 crossref_primary_10_1109_TCSI_2024_3371492 crossref_primary_10_1002_rnc_6832 crossref_primary_10_1051_sands_2023017 crossref_primary_10_1109_ACCESS_2023_3296741 crossref_primary_10_1109_TNSE_2024_3354913 crossref_primary_10_1109_TCNS_2023_3290071 crossref_primary_10_1109_TNSE_2023_3308934 crossref_primary_10_3390_math12172701 crossref_primary_10_1016_j_dt_2024_07_014 crossref_primary_10_1109_TCSI_2024_3399757 crossref_primary_10_1016_j_isatra_2023_11_016 crossref_primary_10_1109_TCYB_2025_3528200 |
Cites_doi | 10.1109/TSMC.2019.2895097 10.1016/j.jfranklin.2015.02.012 10.1109/TCYB.2019.2918402 10.1007/s12555-014-0316-9 10.1109/TCSI.2021.3058216 10.1109/TNNLS.2019.2915376 10.1109/ACCESS.2021.3070918 10.1002/rnc.2800 10.1109/TCSI.2020.3037242 10.1002/rnc.5201 10.1016/j.sysconle.2011.09.020 10.1016/j.automatica.2013.11.008 10.1109/TCSI.2019.2948015 10.1109/TSMC.2018.2852277 10.1109/TCYB.2019.2903817 10.1016/j.ins.2018.02.008 10.1109/TCSI.2013.2289399 10.1007/s11432-019-2687-7 10.1016/j.automatica.2017.01.031 10.1109/TCYB.2019.2956137 10.1109/CCDC.2017.7978104 10.1109/TFUZZ.2020.2992864 10.1109/TCYB.2019.2944956 10.23919/ACC.2017.7963289 10.1109/TSMC.2016.2616544 10.1109/TIE.2016.2593656 10.1109/TCYB.2020.3026083 10.1109/CDC.2012.6425868 10.1080/00207179.2017.1352104 10.1109/TCSI.2020.2975383 10.1177/1729881419862733 10.1109/TCYB.2020.2979342 10.1109/TCSI.2021.3061386 10.1016/j.ins.2020.07.070 10.1109/TAC.2014.2350391 10.1109/TCYB.2018.2806387 10.1109/TCYB.2020.3001187 |
ContentType | Journal Article |
Copyright | Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
Copyright_xml | – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022 |
DBID | 97E RIA RIE AAYXX CITATION 7SP 8FD L7M |
DOI | 10.1109/TCSI.2022.3168163 |
DatabaseName | IEEE All-Society Periodicals Package (ASPP) 2005–Present IEEE All-Society Periodicals Package (ASPP) 1998–Present IEEE Electronic Library (IEL) CrossRef Electronics & Communications Abstracts Technology Research Database Advanced Technologies Database with Aerospace |
DatabaseTitle | CrossRef Technology Research Database Advanced Technologies Database with Aerospace Electronics & Communications Abstracts |
DatabaseTitleList | Technology Research Database |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISSN | 1558-0806 |
EndPage | 3401 |
ExternalDocumentID | 10_1109_TCSI_2022_3168163 9791112 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China grantid: 61790552 funderid: 10.13039/501100001809 |
GroupedDBID | 0R~ 29I 4.4 5VS 6IK 97E AAJGR AARMG AASAJ AAWTH ABAZT ABQJQ ABVLG ACIWK AETIX AGQYO AGSQL AHBIQ AIBXA AKJIK AKQYR ALMA_UNASSIGNED_HOLDINGS ATWAV BEFXN BFFAM BGNUA BKEBE BPEOZ EBS EJD HZ~ H~9 IFIPE IPLJI JAVBF M43 O9- OCL PZZ RIA RIE RNS VJK AAYXX CITATION RIG 7SP 8FD L7M |
ID | FETCH-LOGICAL-c293t-f314daf082236eb6021eede4eebc1f8caab0411daf1fe17dd2b02e4bf6d7d4783 |
IEDL.DBID | RIE |
ISSN | 1549-8328 |
IngestDate | Mon Jun 30 03:43:37 EDT 2025 Tue Jul 01 04:15:17 EDT 2025 Thu Apr 24 23:03:33 EDT 2025 Wed Aug 27 02:28:04 EDT 2025 |
IsPeerReviewed | true |
IsScholarly | true |
Issue | 8 |
Language | English |
License | https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html https://doi.org/10.15223/policy-029 https://doi.org/10.15223/policy-037 |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-c293t-f314daf082236eb6021eede4eebc1f8caab0411daf1fe17dd2b02e4bf6d7d4783 |
Notes | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ORCID | 0000-0001-8162-2896 0000-0003-0092-357X 0000-0002-0702-908X |
PQID | 2695144318 |
PQPubID | 85411 |
PageCount | 11 |
ParticipantIDs | ieee_primary_9791112 proquest_journals_2695144318 crossref_citationtrail_10_1109_TCSI_2022_3168163 crossref_primary_10_1109_TCSI_2022_3168163 |
ProviderPackageCode | CITATION AAYXX |
PublicationCentury | 2000 |
PublicationDate | 2022-08-01 |
PublicationDateYYYYMMDD | 2022-08-01 |
PublicationDate_xml | – month: 08 year: 2022 text: 2022-08-01 day: 01 |
PublicationDecade | 2020 |
PublicationPlace | New York |
PublicationPlace_xml | – name: New York |
PublicationTitle | IEEE transactions on circuits and systems. I, Regular papers |
PublicationTitleAbbrev | TCSI |
PublicationYear | 2022 |
Publisher | IEEE The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Publisher_xml | – name: IEEE – name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
References | ref13 ref35 ref12 ref34 ref15 ref37 ref14 ref36 ref31 ref30 ref11 ref33 ref10 ref32 ref2 ref1 ref17 ref16 ref38 ref19 ref18 ref24 ref23 ref26 ref25 She (ref28) 2010; 38 ref20 ref22 ref21 ref27 ref29 ref8 ref7 ref9 ref4 ref3 ref6 ref5 |
References_xml | – ident: ref18 doi: 10.1109/TSMC.2019.2895097 – ident: ref33 doi: 10.1016/j.jfranklin.2015.02.012 – ident: ref14 doi: 10.1109/TCYB.2019.2918402 – ident: ref20 doi: 10.1007/s12555-014-0316-9 – ident: ref4 doi: 10.1109/TCSI.2021.3058216 – ident: ref12 doi: 10.1109/TNNLS.2019.2915376 – ident: ref15 doi: 10.1109/ACCESS.2021.3070918 – ident: ref31 doi: 10.1002/rnc.2800 – ident: ref5 doi: 10.1109/TCSI.2020.3037242 – ident: ref7 doi: 10.1002/rnc.5201 – ident: ref2 doi: 10.1016/j.sysconle.2011.09.020 – ident: ref29 doi: 10.1016/j.automatica.2013.11.008 – ident: ref6 doi: 10.1109/TCSI.2019.2948015 – ident: ref35 doi: 10.1109/TSMC.2018.2852277 – ident: ref22 doi: 10.1109/TCYB.2019.2903817 – ident: ref16 doi: 10.1016/j.ins.2018.02.008 – volume: 38 start-page: 60 issue: 11 year: 2010 ident: ref28 article-title: Finite-time consensus of multi-agent systems with communication constraints publication-title: J. Huazhong Univ. Sci. Technol., Natural Sci. Ed. – ident: ref32 doi: 10.1109/TCSI.2013.2289399 – ident: ref37 doi: 10.1007/s11432-019-2687-7 – ident: ref25 doi: 10.1016/j.automatica.2017.01.031 – ident: ref17 doi: 10.1109/TCYB.2019.2956137 – ident: ref34 doi: 10.1109/CCDC.2017.7978104 – ident: ref1 doi: 10.1109/TFUZZ.2020.2992864 – ident: ref27 doi: 10.1109/TCYB.2019.2944956 – ident: ref24 doi: 10.23919/ACC.2017.7963289 – ident: ref8 doi: 10.1109/TSMC.2016.2616544 – ident: ref38 doi: 10.1109/TIE.2016.2593656 – ident: ref9 doi: 10.1109/TCYB.2020.3026083 – ident: ref21 doi: 10.1109/CDC.2012.6425868 – ident: ref11 doi: 10.1080/00207179.2017.1352104 – ident: ref30 doi: 10.1109/TCSI.2020.2975383 – ident: ref13 doi: 10.1177/1729881419862733 – ident: ref10 doi: 10.1109/TCYB.2020.2979342 – ident: ref3 doi: 10.1109/TCSI.2021.3061386 – ident: ref26 doi: 10.1016/j.ins.2020.07.070 – ident: ref36 doi: 10.1109/TAC.2014.2350391 – ident: ref19 doi: 10.1109/TCYB.2018.2806387 – ident: ref23 doi: 10.1109/TCYB.2020.3001187 |
SSID | ssj0029031 |
Score | 2.459638 |
Snippet | The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs... |
SourceID | proquest crossref ieee |
SourceType | Aggregation Database Enrichment Source Index Database Publisher |
StartPage | 3391 |
SubjectTerms | adaptive formation Cybersecurity Denial of service attacks Denial-of-service attack Eigenvalues and eigenfunctions guaranteed-performance Linear matrix inequalities linear matrix inequality Mathematical analysis multi-agent system Multi-agent systems Multiagent systems Protocols State feedback Systems stability Task analysis Upper bound |
Title | Adaptive Formation for Multiagent Systems Subject to Denial-of-Service Attacks |
URI | https://ieeexplore.ieee.org/document/9791112 https://www.proquest.com/docview/2695144318 |
Volume | 69 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKJxh4FUR5yQMTwmnsOK-xKlQFqV1opW6RHdsLVVNBuvDr8SVOxEuILYMdWb7z3X323XcI3QCrmAxMSHgkGOGJ4SSVviHGaAvdlBChgRfd6SyaLPjTMlx20F1bC6O1rpLPtAef1Vu-KvItXJUN0hiOpjW4Oxa41bVaLbhK_aDmRuUpsVqauBdM6qeD-ej50SJBxjzo0kSj4IsPqpqq_LDElXsZH6Bps7A6q-TF25bSy9-_cTb-d-WHaN_FmXhYK8YR6uj1Mdr7xD7YQ7OhEhuwdnjcVDBiG8LiqiZXQMkVdnzm2JoXuK_BZYHvITtvRQpDnJnBw7KEQv0TtBg_zEcT4torkNz6-JKYgHIlDFC-B5GWkfX21mFqboWUU5PkQkifU2qHUKNprBSTPtNcmkjFisdJcIq662KtzxCWiqucShHmoeSUUcmMn8Ya4KYILKbrI7_Z8Cx33OPQAmOVVRjETzOQUQYyypyM-ui2nbKpiTf-GtyDPW8Huu3uo8tGqpk7mm8Zi2xQyW3clJz_PusC7cK_6yy_S9QtX7f6ykYepbyuVO4DIWDVpg |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4hGICBN6JQwAMTwm3sOK-xKlTl0S4UqVtkx_ZC1SJIF349vsSteAmxZTgr1t35HvbddwAXiCqmQhtREUtORWoFzVRgqbXGpW5aysjii-5gGPefxN04Gq_A1bIXxhhTFZ-ZFn5Wb_l6VszxqqydJXg0ncFdc34_4nW31jK9yoKwRkcVGXV6mvo3TBZk7VH38dblgpy3cE4Ti8MvXqgaq_LDFlcOprcNg8XW6rqS59a8VK3i_Rtq43_3vgNbPtIknVo1dmHFTPdg8xP-4D4MO1q-oL0jvUUPI3FBLKm6ciU2XRGPaE6cgcEbG1LOyDXW503ozFJvaEinLLFV_wCeejejbp_6AQu0cF6-pDZkQkuLoO9hbFTs_L1zmUY4MRXMpoWUKhCMORJmDUu05irgRigb60SLJA0PYXU6m5ojIEoLXTAloyJSgnGmuA2yxGDCKUOX1TUgWDA8Lzz6OA7BmORVFhJkOcooRxnlXkYNuFwueamhN_4i3keeLwk9uxvQXEg194fzLeexCyuFi5zS499XncN6fzR4yB9uh_cnsIH_qWv-mrBavs7NqYtDSnVWqd8Hc2zY8A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Formation+for+Multiagent+Systems+Subject+to+Denial-of-Service+Attacks&rft.jtitle=IEEE+transactions+on+circuits+and+systems.+I%2C+Regular+papers&rft.au=Pan%2C+Kunpeng&rft.au=Lyu%2C+Yang&rft.au=Pan%2C+Quan&rft.date=2022-08-01&rft.issn=1549-8328&rft.eissn=1558-0806&rft.volume=69&rft.issue=8&rft.spage=3391&rft.epage=3401&rft_id=info:doi/10.1109%2FTCSI.2022.3168163&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCSI_2022_3168163 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1549-8328&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1549-8328&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1549-8328&client=summon |