Adaptive Formation for Multiagent Systems Subject to Denial-of-Service Attacks

The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs under multi-channel denial-of-service (DoS) attacks. In this article, the attacks on each channel are independent, while most of the existing res...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on circuits and systems. I, Regular papers Vol. 69; no. 8; pp. 3391 - 3401
Main Authors Pan, Kunpeng, Lyu, Yang, Pan, Quan
Format Journal Article
LanguageEnglish
Published New York IEEE 01.08.2022
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
Abstract The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs under multi-channel denial-of-service (DoS) attacks. In this article, the attacks on each channel are independent, while most of the existing results show that DoS attacks are the same on all channels. Without loss of generality, we consider multi-channel DoS attacks are imposed on a leader-follower MAS. Firstly, we propose a distributed formation control protocol to achieve the desired formation in the presence of DoS attacks. A translation-adaptive method is considered to adjust the interaction weights among neighboring agents online. Furthermore, a performance guarantee is derived based on the state information, and hereafter state errors among all agents can be regulated. Moreover, we derive the sufficient conditions for system stability w.r.t the controller gain and the allowable attack duration in the form of linear matrix inequalities (LMIs). Finally, simulation results are given to illustrate the effectiveness of the proposed method.
AbstractList The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs under multi-channel denial-of-service (DoS) attacks. In this article, the attacks on each channel are independent, while most of the existing results show that DoS attacks are the same on all channels. Without loss of generality, we consider multi-channel DoS attacks are imposed on a leader-follower MAS. Firstly, we propose a distributed formation control protocol to achieve the desired formation in the presence of DoS attacks. A translation-adaptive method is considered to adjust the interaction weights among neighboring agents online. Furthermore, a performance guarantee is derived based on the state information, and hereafter state errors among all agents can be regulated. Moreover, we derive the sufficient conditions for system stability w.r.t the controller gain and the allowable attack duration in the form of linear matrix inequalities (LMIs). Finally, simulation results are given to illustrate the effectiveness of the proposed method.
Author Pan, Quan
Pan, Kunpeng
Lyu, Yang
Author_xml – sequence: 1
  givenname: Kunpeng
  orcidid: 0000-0003-0092-357X
  surname: Pan
  fullname: Pan, Kunpeng
  email: pankunpeng@mail.nwpu.edu.cn
  organization: School of Automation, Northwestern Polytechnical University, Xi"an, Shaanxi, China
– sequence: 2
  givenname: Yang
  orcidid: 0000-0002-0702-908X
  surname: Lyu
  fullname: Lyu, Yang
  email: lyu.yang0326@gmail.com
  organization: School of Automation, Northwestern Polytechnical University, Xi"an, Shaanxi, China
– sequence: 3
  givenname: Quan
  orcidid: 0000-0001-8162-2896
  surname: Pan
  fullname: Pan, Quan
  email: quanpan@nwpu.edu.cn
  organization: School of Automation, Northwestern Polytechnical University, Xi"an, Shaanxi, China
BookMark eNp9kLFOwzAQQC1UJNrCByAWS8wpPjtNnLEqFCoVGFLmyEnOyCWNi-1U6t_TUMTAwOQb3ruT34gMWtsiIdfAJgAsu1vP8-WEM84nAhIJiTgjQ5hOZcQkSwb9HGeRFFxekJH3G8Z4xgQMycusVrtg9kgX1m1VMLal2jr63DXBqHdsA80PPuDW07wrN1gFGiy9x9aoJrI6ytHtTYV0FoKqPvwlOdeq8Xj1847J2-JhPX-KVq-Py_lsFVU8EyHSAuJaaSY5FwmWCeOAWGOMWFagZaVUyWKAIwIaIa1rXjKOcamTOq3jVIoxuT3t3Tn72aEPxcZ2rj2eLHiSTSGOBfRUeqIqZ713qIvKhO8_BqdMUwAr-nhFH6_o4xU_8Y4m_DF3zmyVO_zr3Jwcg4i_fJZmAMDFFzyCfWQ
CODEN ITCSCH
CitedBy_id crossref_primary_10_1016_j_jfranklin_2024_106920
crossref_primary_10_1109_TCSI_2024_3371492
crossref_primary_10_1002_rnc_6832
crossref_primary_10_1051_sands_2023017
crossref_primary_10_1109_ACCESS_2023_3296741
crossref_primary_10_1109_TNSE_2024_3354913
crossref_primary_10_1109_TCNS_2023_3290071
crossref_primary_10_1109_TNSE_2023_3308934
crossref_primary_10_3390_math12172701
crossref_primary_10_1016_j_dt_2024_07_014
crossref_primary_10_1109_TCSI_2024_3399757
crossref_primary_10_1016_j_isatra_2023_11_016
crossref_primary_10_1109_TCYB_2025_3528200
Cites_doi 10.1109/TSMC.2019.2895097
10.1016/j.jfranklin.2015.02.012
10.1109/TCYB.2019.2918402
10.1007/s12555-014-0316-9
10.1109/TCSI.2021.3058216
10.1109/TNNLS.2019.2915376
10.1109/ACCESS.2021.3070918
10.1002/rnc.2800
10.1109/TCSI.2020.3037242
10.1002/rnc.5201
10.1016/j.sysconle.2011.09.020
10.1016/j.automatica.2013.11.008
10.1109/TCSI.2019.2948015
10.1109/TSMC.2018.2852277
10.1109/TCYB.2019.2903817
10.1016/j.ins.2018.02.008
10.1109/TCSI.2013.2289399
10.1007/s11432-019-2687-7
10.1016/j.automatica.2017.01.031
10.1109/TCYB.2019.2956137
10.1109/CCDC.2017.7978104
10.1109/TFUZZ.2020.2992864
10.1109/TCYB.2019.2944956
10.23919/ACC.2017.7963289
10.1109/TSMC.2016.2616544
10.1109/TIE.2016.2593656
10.1109/TCYB.2020.3026083
10.1109/CDC.2012.6425868
10.1080/00207179.2017.1352104
10.1109/TCSI.2020.2975383
10.1177/1729881419862733
10.1109/TCYB.2020.2979342
10.1109/TCSI.2021.3061386
10.1016/j.ins.2020.07.070
10.1109/TAC.2014.2350391
10.1109/TCYB.2018.2806387
10.1109/TCYB.2020.3001187
ContentType Journal Article
Copyright Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
Copyright_xml – notice: Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2022
DBID 97E
RIA
RIE
AAYXX
CITATION
7SP
8FD
L7M
DOI 10.1109/TCSI.2022.3168163
DatabaseName IEEE All-Society Periodicals Package (ASPP) 2005–Present
IEEE All-Society Periodicals Package (ASPP) 1998–Present
IEEE Electronic Library (IEL)
CrossRef
Electronics & Communications Abstracts
Technology Research Database
Advanced Technologies Database with Aerospace
DatabaseTitle CrossRef
Technology Research Database
Advanced Technologies Database with Aerospace
Electronics & Communications Abstracts
DatabaseTitleList
Technology Research Database
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISSN 1558-0806
EndPage 3401
ExternalDocumentID 10_1109_TCSI_2022_3168163
9791112
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  grantid: 61790552
  funderid: 10.13039/501100001809
GroupedDBID 0R~
29I
4.4
5VS
6IK
97E
AAJGR
AARMG
AASAJ
AAWTH
ABAZT
ABQJQ
ABVLG
ACIWK
AETIX
AGQYO
AGSQL
AHBIQ
AIBXA
AKJIK
AKQYR
ALMA_UNASSIGNED_HOLDINGS
ATWAV
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
EBS
EJD
HZ~
H~9
IFIPE
IPLJI
JAVBF
M43
O9-
OCL
PZZ
RIA
RIE
RNS
VJK
AAYXX
CITATION
RIG
7SP
8FD
L7M
ID FETCH-LOGICAL-c293t-f314daf082236eb6021eede4eebc1f8caab0411daf1fe17dd2b02e4bf6d7d4783
IEDL.DBID RIE
ISSN 1549-8328
IngestDate Mon Jun 30 03:43:37 EDT 2025
Tue Jul 01 04:15:17 EDT 2025
Thu Apr 24 23:03:33 EDT 2025
Wed Aug 27 02:28:04 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 8
Language English
License https://ieeexplore.ieee.org/Xplorehelp/downloads/license-information/IEEE.html
https://doi.org/10.15223/policy-029
https://doi.org/10.15223/policy-037
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c293t-f314daf082236eb6021eede4eebc1f8caab0411daf1fe17dd2b02e4bf6d7d4783
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0000-0001-8162-2896
0000-0003-0092-357X
0000-0002-0702-908X
PQID 2695144318
PQPubID 85411
PageCount 11
ParticipantIDs ieee_primary_9791112
proquest_journals_2695144318
crossref_citationtrail_10_1109_TCSI_2022_3168163
crossref_primary_10_1109_TCSI_2022_3168163
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2022-08-01
PublicationDateYYYYMMDD 2022-08-01
PublicationDate_xml – month: 08
  year: 2022
  text: 2022-08-01
  day: 01
PublicationDecade 2020
PublicationPlace New York
PublicationPlace_xml – name: New York
PublicationTitle IEEE transactions on circuits and systems. I, Regular papers
PublicationTitleAbbrev TCSI
PublicationYear 2022
Publisher IEEE
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Publisher_xml – name: IEEE
– name: The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
References ref13
ref35
ref12
ref34
ref15
ref37
ref14
ref36
ref31
ref30
ref11
ref33
ref10
ref32
ref2
ref1
ref17
ref16
ref38
ref19
ref18
ref24
ref23
ref26
ref25
She (ref28) 2010; 38
ref20
ref22
ref21
ref27
ref29
ref8
ref7
ref9
ref4
ref3
ref6
ref5
References_xml – ident: ref18
  doi: 10.1109/TSMC.2019.2895097
– ident: ref33
  doi: 10.1016/j.jfranklin.2015.02.012
– ident: ref14
  doi: 10.1109/TCYB.2019.2918402
– ident: ref20
  doi: 10.1007/s12555-014-0316-9
– ident: ref4
  doi: 10.1109/TCSI.2021.3058216
– ident: ref12
  doi: 10.1109/TNNLS.2019.2915376
– ident: ref15
  doi: 10.1109/ACCESS.2021.3070918
– ident: ref31
  doi: 10.1002/rnc.2800
– ident: ref5
  doi: 10.1109/TCSI.2020.3037242
– ident: ref7
  doi: 10.1002/rnc.5201
– ident: ref2
  doi: 10.1016/j.sysconle.2011.09.020
– ident: ref29
  doi: 10.1016/j.automatica.2013.11.008
– ident: ref6
  doi: 10.1109/TCSI.2019.2948015
– ident: ref35
  doi: 10.1109/TSMC.2018.2852277
– ident: ref22
  doi: 10.1109/TCYB.2019.2903817
– ident: ref16
  doi: 10.1016/j.ins.2018.02.008
– volume: 38
  start-page: 60
  issue: 11
  year: 2010
  ident: ref28
  article-title: Finite-time consensus of multi-agent systems with communication constraints
  publication-title: J. Huazhong Univ. Sci. Technol., Natural Sci. Ed.
– ident: ref32
  doi: 10.1109/TCSI.2013.2289399
– ident: ref37
  doi: 10.1007/s11432-019-2687-7
– ident: ref25
  doi: 10.1016/j.automatica.2017.01.031
– ident: ref17
  doi: 10.1109/TCYB.2019.2956137
– ident: ref34
  doi: 10.1109/CCDC.2017.7978104
– ident: ref1
  doi: 10.1109/TFUZZ.2020.2992864
– ident: ref27
  doi: 10.1109/TCYB.2019.2944956
– ident: ref24
  doi: 10.23919/ACC.2017.7963289
– ident: ref8
  doi: 10.1109/TSMC.2016.2616544
– ident: ref38
  doi: 10.1109/TIE.2016.2593656
– ident: ref9
  doi: 10.1109/TCYB.2020.3026083
– ident: ref21
  doi: 10.1109/CDC.2012.6425868
– ident: ref11
  doi: 10.1080/00207179.2017.1352104
– ident: ref30
  doi: 10.1109/TCSI.2020.2975383
– ident: ref13
  doi: 10.1177/1729881419862733
– ident: ref10
  doi: 10.1109/TCYB.2020.2979342
– ident: ref3
  doi: 10.1109/TCSI.2021.3061386
– ident: ref26
  doi: 10.1016/j.ins.2020.07.070
– ident: ref36
  doi: 10.1109/TAC.2014.2350391
– ident: ref19
  doi: 10.1109/TCYB.2018.2806387
– ident: ref23
  doi: 10.1109/TCYB.2020.3001187
SSID ssj0029031
Score 2.459638
Snippet The vulnerabilities of multi-agent-system (MAS) become a critical issue for cybersecurity. The article investigates the formation control problem for MASs...
SourceID proquest
crossref
ieee
SourceType Aggregation Database
Enrichment Source
Index Database
Publisher
StartPage 3391
SubjectTerms adaptive formation
Cybersecurity
Denial of service attacks
Denial-of-service attack
Eigenvalues and eigenfunctions
guaranteed-performance
Linear matrix inequalities
linear matrix inequality
Mathematical analysis
multi-agent system
Multi-agent systems
Multiagent systems
Protocols
State feedback
Systems stability
Task analysis
Upper bound
Title Adaptive Formation for Multiagent Systems Subject to Denial-of-Service Attacks
URI https://ieeexplore.ieee.org/document/9791112
https://www.proquest.com/docview/2695144318
Volume 69
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwELZKJxh4FUR5yQMTwmnsOK-xKlQFqV1opW6RHdsLVVNBuvDr8SVOxEuILYMdWb7z3X323XcI3QCrmAxMSHgkGOGJ4SSVviHGaAvdlBChgRfd6SyaLPjTMlx20F1bC6O1rpLPtAef1Vu-KvItXJUN0hiOpjW4Oxa41bVaLbhK_aDmRuUpsVqauBdM6qeD-ej50SJBxjzo0kSj4IsPqpqq_LDElXsZH6Bps7A6q-TF25bSy9-_cTb-d-WHaN_FmXhYK8YR6uj1Mdr7xD7YQ7OhEhuwdnjcVDBiG8LiqiZXQMkVdnzm2JoXuK_BZYHvITtvRQpDnJnBw7KEQv0TtBg_zEcT4torkNz6-JKYgHIlDFC-B5GWkfX21mFqboWUU5PkQkifU2qHUKNprBSTPtNcmkjFisdJcIq662KtzxCWiqucShHmoeSUUcmMn8Ya4KYILKbrI7_Z8Cx33OPQAmOVVRjETzOQUQYyypyM-ui2nbKpiTf-GtyDPW8Huu3uo8tGqpk7mm8Zi2xQyW3clJz_PusC7cK_6yy_S9QtX7f6ykYepbyuVO4DIWDVpg
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV07T8MwED4hGICBN6JQwAMTwm3sOK-xKlTl0S4UqVtkx_ZC1SJIF349vsSteAmxZTgr1t35HvbddwAXiCqmQhtREUtORWoFzVRgqbXGpW5aysjii-5gGPefxN04Gq_A1bIXxhhTFZ-ZFn5Wb_l6VszxqqydJXg0ncFdc34_4nW31jK9yoKwRkcVGXV6mvo3TBZk7VH38dblgpy3cE4Ti8MvXqgaq_LDFlcOprcNg8XW6rqS59a8VK3i_Rtq43_3vgNbPtIknVo1dmHFTPdg8xP-4D4MO1q-oL0jvUUPI3FBLKm6ciU2XRGPaE6cgcEbG1LOyDXW503ozFJvaEinLLFV_wCeejejbp_6AQu0cF6-pDZkQkuLoO9hbFTs_L1zmUY4MRXMpoWUKhCMORJmDUu05irgRigb60SLJA0PYXU6m5ojIEoLXTAloyJSgnGmuA2yxGDCKUOX1TUgWDA8Lzz6OA7BmORVFhJkOcooRxnlXkYNuFwueamhN_4i3keeLwk9uxvQXEg194fzLeexCyuFi5zS499XncN6fzR4yB9uh_cnsIH_qWv-mrBavs7NqYtDSnVWqd8Hc2zY8A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Adaptive+Formation+for+Multiagent+Systems+Subject+to+Denial-of-Service+Attacks&rft.jtitle=IEEE+transactions+on+circuits+and+systems.+I%2C+Regular+papers&rft.au=Pan%2C+Kunpeng&rft.au=Lyu%2C+Yang&rft.au=Pan%2C+Quan&rft.date=2022-08-01&rft.issn=1549-8328&rft.eissn=1558-0806&rft.volume=69&rft.issue=8&rft.spage=3391&rft.epage=3401&rft_id=info:doi/10.1109%2FTCSI.2022.3168163&rft.externalDBID=n%2Fa&rft.externalDocID=10_1109_TCSI_2022_3168163
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1549-8328&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1549-8328&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1549-8328&client=summon