2020
DOI: 10.1016/j.jfranklin.2019.12.032
|View full text |Cite
|
Sign up to set email alerts
|

Cooperative adaptive fault-tolerant control for multi-agent systems with deception attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
34
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 82 publications
(34 citation statements)
references
References 38 publications
0
34
0
Order By: Relevance
“…As shown in Fig. 1, the MAS configuration considered in this paper consists of sensors, state observers, ETM, controllers, actuators, and the fault detection mechanism, in which the communication network between agents may be subject to FDIAs [14,15]. Besides, when a fault happens in an agent, the fault detection mechanism is to detect the fault promptly.…”
Section: Problem Statement and Preliminariesmentioning
confidence: 99%
See 3 more Smart Citations
“…As shown in Fig. 1, the MAS configuration considered in this paper consists of sensors, state observers, ETM, controllers, actuators, and the fault detection mechanism, in which the communication network between agents may be subject to FDIAs [14,15]. Besides, when a fault happens in an agent, the fault detection mechanism is to detect the fault promptly.…”
Section: Problem Statement and Preliminariesmentioning
confidence: 99%
“…Compared with DoS attacks, FDIAs destroy the integrity and accuracy of the data by tampering with the transmitted information, and have stronger concealment [10]. However, research on the security of MAS under FDIA is still in the initial stage [11][12][13][14][15][16][17]. In [11,12], a control strategy with an adaptive attack compensator is proposed to ensure the uniformly ultimately boundedness of MAS under FDIA.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…Therefore, it is essential to discuss the impacts of cyber-attacks in the investigation of various MASs [23][24][25][26]. In general, cyber-attacks can be categorized into deception attacks [27][28][29], replay attacks [30][31][32] and DoS jamming attacks [33][34][35]. Among them, DoS jamming attack is the most important and difficult to address.…”
Section: Introductionmentioning
confidence: 99%