Secure Consensus Control of Two-timescale Networks Subject to Sequential Scaling Attacks
This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and frequency are given. Under this attack framework, a ε-dependent controller in a distributed manner is proposed. By virtue of the ε-dependent Lyap...
Saved in:
Published in | IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society pp. 1 - 6 |
---|---|
Main Authors | , |
Format | Conference Proceeding |
Language | English |
Published |
IEEE
13.10.2021
|
Subjects | |
Online Access | Get full text |
ISSN | 2577-1647 |
DOI | 10.1109/IECON48115.2021.9589523 |
Cover
Loading…
Abstract | This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and frequency are given. Under this attack framework, a ε-dependent controller in a distributed manner is proposed. By virtue of the ε-dependent Lyapunov function, stability of the error system is analyzed and sufficient conditions for secure consensus are obtained. Furthermore, the corresponding upper bound ε max is derived, which means secure consensus of two-timescale networks is ensured for ε ∈ (0, ε max ]. Finally, the effectiveness of the proposed secure control protocol is validated by a numerical simulation. |
---|---|
AbstractList | This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and frequency are given. Under this attack framework, a ε-dependent controller in a distributed manner is proposed. By virtue of the ε-dependent Lyapunov function, stability of the error system is analyzed and sufficient conditions for secure consensus are obtained. Furthermore, the corresponding upper bound ε max is derived, which means secure consensus of two-timescale networks is ensured for ε ∈ (0, ε max ]. Finally, the effectiveness of the proposed secure control protocol is validated by a numerical simulation. |
Author | Liang, Kun He, Wangli |
Author_xml | – sequence: 1 givenname: Kun surname: Liang fullname: Liang, Kun email: luckyliangkun@126.com organization: East China University of Science and Technology,Key Laboratory of Smart Manufacturing in Energy Chemical Processes, Ministry of Education,Shanghai,China – sequence: 2 givenname: Wangli surname: He fullname: He, Wangli email: wanglihe@ecust.edu.cn organization: East China University of Science and Technology,Key Laboratory of Smart Manufacturing in Energy Chemical Processes, Ministry of Education,Shanghai,China |
BookMark | eNotkMtOwzAURA0CCSj9Ahb4B1J8_YjjZRUVqFS1ixSJXWU7N8g0TSB2VPH3FNHFaM5idBZzR666vkNCHoHNAJh5Wi7KzVoWAGrGGYeZUYVRXFyQqdEF5LmSQp1ySW650jqDXOobMo0xOCa51Iyp_Ja8V-jHAWnZdxG7OMY_SkPf0r6h22OfpXDA6G2LdI3p2A_7SKvRfaJPNPW0wu8RuxRsS6vTKHQfdJ6S9ft4T64b20acnntC3p4X2_I1W21eluV8lQUQImXceim9ROOctZpxjs4YD0Y3Foq60EYgc6yQtVG2wdopWztg0jEvgFuoxYQ8_HsDIu6-hnCww8_u_IX4BUPQVz8 |
ContentType | Conference Proceeding |
DBID | 6IE 6IH CBEJK RIE RIO |
DOI | 10.1109/IECON48115.2021.9589523 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan (POP) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP) 1998-present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
EISBN | 9781665435543 1665435542 |
EISSN | 2577-1647 |
EndPage | 6 |
ExternalDocumentID | 9589523 |
Genre | orig-research |
GrantInformation_xml | – fundername: National Natural Science Foundation of China funderid: 10.13039/501100001809 |
GroupedDBID | 6IE 6IH ALMA_UNASSIGNED_HOLDINGS CBEJK M43 RIE RIO |
ID | FETCH-LOGICAL-i133t-2ac44c4e9bbaa7022eb99c197fa18d8793e0b084d95afedb5adb104b0c312a1d3 |
IEDL.DBID | RIE |
IngestDate | Wed Aug 27 02:26:41 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | true |
Language | English |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i133t-2ac44c4e9bbaa7022eb99c197fa18d8793e0b084d95afedb5adb104b0c312a1d3 |
PageCount | 6 |
ParticipantIDs | ieee_primary_9589523 |
PublicationCentury | 2000 |
PublicationDate | 2021-Oct.-13 |
PublicationDateYYYYMMDD | 2021-10-13 |
PublicationDate_xml | – month: 10 year: 2021 text: 2021-Oct.-13 day: 13 |
PublicationDecade | 2020 |
PublicationTitle | IECON 2021 – 47th Annual Conference of the IEEE Industrial Electronics Society |
PublicationTitleAbbrev | IECON |
PublicationYear | 2021 |
Publisher | IEEE |
Publisher_xml | – name: IEEE |
SSID | ssib042470056 |
Score | 2.182921 |
Snippet | This paper investigates secure consensus of two-timescale networks subject to a sequential scaling attack, in which constraints on the attack duration and... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Conferences Consensus control Industrial electronics Numerical simulation Protocols Secure consensus Sequential scaling attacks Sufficient conditions Two-timescale networks Upper bound |
Title | Secure Consensus Control of Two-timescale Networks Subject to Sequential Scaling Attacks |
URI | https://ieeexplore.ieee.org/document/9589523 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV1LS8NAEF7anjyptOKbPXh002yyabJHEUsVWoS20FvZxwREacSmFPz1ziRpRfHgbQl5MZPZL7P7zXyM3SBmOu0zI6jTilAuMcImuRNO54PEQ4zxRTu648lgNFdPi2TRYrf7WhgAqMhnENCw2sv3hdvQUllfJ5nGxKnN2pi41bVau29HRSqltpYNhUuGuv9IUoAqw18eTAMjGTRX_5BRqVBkeMjGu-fX5JHXYFPawH3-as343xc8Yr3vej3-vEeiY9aCVZctqqV04CTJSXoWaxoRLZ0XOZ9tC1HJyqOLgE9qLvia4zRC6zK8LPi04lhj_L_xKZ6E9-V3ZUkV-T02Hz7M7kei0VEQL5iBliIyTimnQFtrTIqgDVZrJ3WaG5n5DCMUQhtmyuvE5OBtYrzFLM2GLpaRkT4-YZ1VsYJTxlNpTR5mgJYOlQKjaQ7QGqyyoKSJz1iXrLJ8r1tlLBuDnP99-IIdkGcICmR8yTrlxwauEONLe1059wuTsKg1 |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3fS8MwEA5zPuiTyib-Ng8-mq5p07V5FHFsug1hG-xtJOkVRFnFdQj-9d61daL44FsobQm55r7e5bv7GLtCzHQ6TYygTitCucgIG2VOOJ11oxRC3F90ojsad_szdT-P5g12vamFAYCSfAYeDcuz_DR3a0qVdXSUaAycttg24r7SVbXW19ejAhVTY8uaxCV93RmQGKBK8KcHA8FAevXzP4RUShzp7bHR1wwq-sizty6s5z5-NWf87xT3Wfu7Yo8_brDogDVg2WLzMpkOnEQ5SdFiRSMipvM849P3XJTC8mgk4OOKDb7i6EgoM8OLnE9KljV6gBc-wZvwvfymKKgmv81mvbvpbV_USgriCWPQQgTGKeUUaGuNiRG2wWrtpI4zI5M0wT0KvvUTlerIZJDayKQW4zTru1AGRqbhIWsu8yUcMR5LazI_AVxpXykwmryA1mCVBSVNeMxatCqL16pZxqJekJO_L1-ynf50NFwMB-OHU7ZLViJgkOEZaxZvazhHxC_sRWnoT5b1q4U |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Abook&rft.genre=proceeding&rft.title=IECON+2021+%E2%80%93+47th+Annual+Conference+of+the+IEEE+Industrial+Electronics+Society&rft.atitle=Secure+Consensus+Control+of+Two-timescale+Networks+Subject+to+Sequential+Scaling+Attacks&rft.au=Liang%2C+Kun&rft.au=He%2C+Wangli&rft.date=2021-10-13&rft.pub=IEEE&rft.eissn=2577-1647&rft.spage=1&rft.epage=6&rft_id=info:doi/10.1109%2FIECON48115.2021.9589523&rft.externalDocID=9589523 |