2017
DOI: 10.1080/00207179.2017.1286040
|View full text |Cite
|
Sign up to set email alerts
|

Adaptive architectures for resilient control of networked multiagent systems in the presence of misbehaving agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
15
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 48 publications
(16 citation statements)
references
References 12 publications
1
15
0
Order By: Relevance
“…Other auhtors have developed SNMP and multi-agent systems (Barruiso et al, 2017;Moreira et al, 2016;Torre and Yucelen, 2018). The first model is a proposal for a mechanism to provide flexibility and dynamism using virtual agent organizations (VO) embedded in different wireless sensors, which are embedded in devices with limited computational resources.…”
Section: Related Workmentioning
confidence: 99%
“…Other auhtors have developed SNMP and multi-agent systems (Barruiso et al, 2017;Moreira et al, 2016;Torre and Yucelen, 2018). The first model is a proposal for a mechanism to provide flexibility and dynamism using virtual agent organizations (VO) embedded in different wireless sensors, which are embedded in devices with limited computational resources.…”
Section: Related Workmentioning
confidence: 99%
“…Then, according to (34), [I n + cKG i (z)λ h ] −1 is Schur stable. Therefore, the system states are bounded, even in the presence of the attack.…”
Section: B Internal Model Principle Approach For the Attackermentioning
confidence: 99%
“…Secure state estimation and control under sensor attack is considered in [32]- [33]. A resilient control protocol is presented in [34] for single and double integrator system based on local state emulator. In [35], an adaptive resilient control protocol is presented for the attack on sensor and actuator of the system.…”
Section: Introductionmentioning
confidence: 99%
“…However, the connectivity of the entire network may be damaged, and thus additional assumption that the proportion of attacked agents is restricted needs to be made to ensure network connectivity. In order not to remove the attacked agents, there are some mitigation methods for FDI attacks in References 24‐29. To be concrete, robust control methods were used in References 24 and 25 to ensure that the consensus errors were bounded where attack signals are assumed to be bounded and have low occurrence probabilities.…”
Section: Introductionmentioning
confidence: 99%
“…To be concrete, robust control methods were used in References 24 and 25 to ensure that the consensus errors were bounded where attack signals are assumed to be bounded and have low occurrence probabilities. Adaptive compensation methods based on reference models which simulate the agents' normal states were proposed in References 26 and 27 to make consensus errors arbitrarily small. An impulsive control method was introduced in Reference 28 to guarantee mean‐square boundedness of consensus error where only sensors of MASs are attacked.…”
Section: Introductionmentioning
confidence: 99%