Secure Consensus Control of Two-timescale Networks Subject to Sequential Scaling Attacks

This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and frequency are given. Under this attack framework, a ε-dependent controller in a distributed manner is proposed. By virtue of the ε-dependent Lyap...

Full description

Saved in:
Bibliographic Details
Published inIECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society pp. 1 - 6
Main Authors Liang, Kun, He, Wangli
Format Conference Proceeding
LanguageEnglish
Published IEEE 13.10.2021
Subjects
Online AccessGet full text
ISSN2577-1647
DOI10.1109/IECON48115.2021.9589523

Cover

Loading…
Abstract This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and frequency are given. Under this attack framework, a ε-dependent controller in a distributed manner is proposed. By virtue of the ε-dependent Lyapunov function, stability of the error system is analyzed and sufficient conditions for secure consensus are obtained. Furthermore, the corresponding upper bound ε max is derived, which means secure consensus of two-timescale networks is ensured for ε ∈ (0, ε max ]. Finally, the effectiveness of the proposed secure control protocol is validated by a numerical simulation.
AbstractList This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and frequency are given. Under this attack framework, a ε-dependent controller in a distributed manner is proposed. By virtue of the ε-dependent Lyapunov function, stability of the error system is analyzed and sufficient conditions for secure consensus are obtained. Furthermore, the corresponding upper bound ε max is derived, which means secure consensus of two-timescale networks is ensured for ε ∈ (0, ε max ]. Finally, the effectiveness of the proposed secure control protocol is validated by a numerical simulation.
Author Liang, Kun
He, Wangli
Author_xml – sequence: 1
  givenname: Kun
  surname: Liang
  fullname: Liang, Kun
  email: luckyliangkun@126.com
  organization: East China University of Science and Technology,Key Laboratory of Smart Manufacturing in Energy Chemical Processes, Ministry of Education,Shanghai,China
– sequence: 2
  givenname: Wangli
  surname: He
  fullname: He, Wangli
  email: wanglihe@ecust.edu.cn
  organization: East China University of Science and Technology,Key Laboratory of Smart Manufacturing in Energy Chemical Processes, Ministry of Education,Shanghai,China
BookMark eNotkMtOwzAURA0CCSj9Ahb4B1J8_YjjZRUVqFS1ixSJXWU7N8g0TSB2VPH3FNHFaM5idBZzR666vkNCHoHNAJh5Wi7KzVoWAGrGGYeZUYVRXFyQqdEF5LmSQp1ySW650jqDXOobMo0xOCa51Iyp_Ja8V-jHAWnZdxG7OMY_SkPf0r6h22OfpXDA6G2LdI3p2A_7SKvRfaJPNPW0wu8RuxRsS6vTKHQfdJ6S9ft4T64b20acnntC3p4X2_I1W21eluV8lQUQImXceim9ROOctZpxjs4YD0Y3Foq60EYgc6yQtVG2wdopWztg0jEvgFuoxYQ8_HsDIu6-hnCww8_u_IX4BUPQVz8
ContentType Conference Proceeding
DBID 6IE
6IH
CBEJK
RIE
RIO
DOI 10.1109/IECON48115.2021.9589523
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan (POP) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP) 1998-present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
EISBN 9781665435543
1665435542
EISSN 2577-1647
EndPage 6
ExternalDocumentID 9589523
Genre orig-research
GrantInformation_xml – fundername: National Natural Science Foundation of China
  funderid: 10.13039/501100001809
GroupedDBID 6IE
6IH
ALMA_UNASSIGNED_HOLDINGS
CBEJK
M43
RIE
RIO
ID FETCH-LOGICAL-i133t-2ac44c4e9bbaa7022eb99c197fa18d8793e0b084d95afedb5adb104b0c312a1d3
IEDL.DBID RIE
IngestDate Wed Aug 27 02:26:41 EDT 2025
IsPeerReviewed false
IsScholarly true
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i133t-2ac44c4e9bbaa7022eb99c197fa18d8793e0b084d95afedb5adb104b0c312a1d3
PageCount 6
ParticipantIDs ieee_primary_9589523
PublicationCentury 2000
PublicationDate 2021-Oct.-13
PublicationDateYYYYMMDD 2021-10-13
PublicationDate_xml – month: 10
  year: 2021
  text: 2021-Oct.-13
  day: 13
PublicationDecade 2020
PublicationTitle IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society
PublicationTitleAbbrev IECON
PublicationYear 2021
Publisher IEEE
Publisher_xml – name: IEEE
SSID ssib042470056
Score 2.182921
Snippet This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Conferences
Consensus control
Industrial electronics
Numerical simulation
Protocols
Secure consensus
Sequential scaling attacks
Sufficient conditions
Two-timescale networks
Upper bound
Title Secure Consensus Control of Two-timescale Networks Subject to Sequential Scaling Attacks
URI https://ieeexplore.ieee.org/document/9589523
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF7anjyptOKbPXh002yyabJHEUsVWoS20FvZxwREacSmFPz1ziRpRfHgbQl5MZPZL7P7zXyM3SBmOu0zI6jTilAuMcImuRNO54PEQ4zxRTu648lgNFdPi2TRYrf7WhgAqMhnENCw2sv3hdvQUllfJ5nGxKnN2pi41bVau29HRSqltpYNhUuGuv9IUoAqw18eTAMjGTRX_5BRqVBkeMjGu-fX5JHXYFPawH3-as343xc8Yr3vej3-vEeiY9aCVZctqqV04CTJSXoWaxoRLZ0XOZ9tC1HJyqOLgE9qLvia4zRC6zK8LPi04lhj_L_xKZ6E9-V3ZUkV-T02Hz7M7kei0VEQL5iBliIyTimnQFtrTIqgDVZrJ3WaG5n5DCMUQhtmyuvE5OBtYrzFLM2GLpaRkT4-YZ1VsYJTxlNpTR5mgJYOlQKjaQ7QGqyyoKSJz1iXrLJ8r1tlLBuDnP99-IIdkGcICmR8yTrlxwauEONLe1059wuTsKg1
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA5zPuiTyib-Ng8-mq5p07V5FHFsug1hG-xtJOkVRFnFdQj-9d61daL44FsobQm55r7e5bv7GLtCzHQ6TYygTitCucgIG2VOOJ11oxRC3F90ojsad_szdT-P5g12vamFAYCSfAYeDcuz_DR3a0qVdXSUaAycttg24r7SVbXW19ejAhVTY8uaxCV93RmQGKBK8KcHA8FAevXzP4RUShzp7bHR1wwq-sizty6s5z5-NWf87xT3Wfu7Yo8_brDogDVg2WLzMpkOnEQ5SdFiRSMipvM849P3XJTC8mgk4OOKDb7i6EgoM8OLnE9KljV6gBc-wZvwvfymKKgmv81mvbvpbV_USgriCWPQQgTGKeUUaGuNiRG2wWrtpI4zI5M0wT0KvvUTlerIZJDayKQW4zTru1AGRqbhIWsu8yUcMR5LazI_AVxpXykwmryA1mCVBSVNeMxatCqL16pZxqJekJO_L1-ynf50NFwMB-OHU7ZLViJgkOEZaxZvazhHxC_sRWnoT5b1q4U
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IECON+2021+%E2%80%93+47th+Annual+Conference+of+the+IEEE+Industrial+Electronics+Society&rft.atitle=Secure+Consensus+Control+of+Two-timescale+Networks+Subject+to+Sequential+Scaling+Attacks&rft.au=Liang%2C+Kun&rft.au=He%2C+Wangli&rft.date=2021-10-13&rft.pub=IEEE&rft.eissn=2577-1647&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIECON48115.2021.9589523&rft.externalDocID=9589523