Publication | Closed Access
Observer-Based Fixed-Time Secure Tracking Consensus for Networked High-Order Multiagent Systems Against DoS Attacks
131
Citations
31
References
2020
Year
EngineeringDistributed CoordinationNetworked ControlSynchronization ProtocolConsensus TrackingDenial-of-service AttackSelf-stabilizationNetwork AnalysisSystems EngineeringConsensus ProblemResilient Control SystemDistributed Control SystemComputer ScienceControl ProtocolDecentralised SystemDos Attacks
This article studies the secure tracking consensus problem of nonlinear multiagent systems (MASs) against denial-of-service (DoS) attacks. Two types of DoS attacks, i.e., connectivity-maintained attacks and connectivity-broken attacks, are considered. The resulting topologies caused by DoS attacks may destabilize the consensus performance of MASs. Especially under connectivity-broken attacks, the connectivity between agents is destroyed. To deal with these difficulties, a novel defense strategy consisting of distributed observation and decentralized control is proposed. First, a distributed fixed-time observer (DFTO) is prepared for the case of connectivity-maintained attacks, which can quickly and accurately estimate the leader's information for each follower. Besides, the adverse impact of DoS attacks is completely eliminated. Furthermore, to cope with the problem arising from connectivity-broken attacks, by using an online algorithm of updating label information, an improved resilient DFTO (RDFTO) is further developed, which can preserve those followers having directed paths from the leader to quickly and accurately estimate the leader's information, without being affected by DoS attacks. The developed DFTO and RDFTO have successfully eliminated or weakened the adverse effects caused by DoS attacks. Subsequently, based on the proposed DFTO/RDFTO with the power integrator technique, a fixed-time controller is finally constructed, which realizes the desired transient performance of consensus tracking in the finite-time interval. The effectiveness of the proposed defense strategy is verified by stability analysis and simulation examples.
| Year | Citations | |
|---|---|---|
Page 1
Page 1