2020
DOI: 10.1109/tsmc.2018.2875250
|View full text |Cite
|
Sign up to set email alerts
|

Input-Based Event-Triggering Consensus of Multiagent Systems Under Denial-of-Service Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
62
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 193 publications
(62 citation statements)
references
References 35 publications
0
62
0
Order By: Relevance
“…A novel event-based switched system model is established by considering the effect of the event-triggering scheme and DoS attacks simultaneously. In [66], an input triggering approach is developed that is able to achieve secure consensus of MASs under DoS attacks within the switching system framework. In particular, the attack frequency and the attack duration introduced in [67] are used to restrict the adversaries and to derive the condition of achieving consensus.…”
Section: Cyber Attacksmentioning
confidence: 99%
“…A novel event-based switched system model is established by considering the effect of the event-triggering scheme and DoS attacks simultaneously. In [66], an input triggering approach is developed that is able to achieve secure consensus of MASs under DoS attacks within the switching system framework. In particular, the attack frequency and the attack duration introduced in [67] are used to restrict the adversaries and to derive the condition of achieving consensus.…”
Section: Cyber Attacksmentioning
confidence: 99%
“…In this section, a benchmark example borrowed from Reference is introduced to validate the main results. Considering a system with five following agents, each agent communicates with others via wireless communication network.…”
Section: A Simulation Examplementioning
confidence: 99%
“…The false data attack problem was also studied in Reference , where the impulsive control algorithm was devised to achieve the consensus goal, and the consensus error is also shown to be bounded. The deny‐of‐service (DoS) attack problem was discussed in Reference , in which the communication topology was assumed to be corrupted when the attack occurs. In this case, the system is modeled as a switched dynamical system with two subsystems, one is the system with normal operation and the other one is the system with attack.…”
Section: Introductionmentioning
confidence: 99%
“…For the sake of driving the networks to achieve synchronization, the proper controllers are designed. Up to now, many typical and useful control methods have been proposed, such as adaptive control, feedback control, pinning control, intermittent control, event‐triggered control, and impulsive control …”
Section: Introductionmentioning
confidence: 99%
“…For the sake of driving the networks to achieve synchronization, the proper controllers are designed. Up to now, many typical and useful control methods have been proposed, such as adaptive control, 9,10 feedback control, 11,12 pinning control, 13,14 intermittent control, 15,16 event-triggered control, 17,18 and impulsive control. 19,20 Recently, as discontinuous control approach, intermittent control has attracted increasing interest naturally in a variety of applications because this control method is more economic and can reduce the amount of the transmitted information.…”
Section: Introductionmentioning
confidence: 99%