2021
DOI: 10.1016/j.jfranklin.2021.07.012
|View full text |Cite
|
Sign up to set email alerts
|

Sampled-data-based event-triggered secure bipartite tracking consensus of linear multi-agent systems under DoS attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
15
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
5

Relationship

0
5

Authors

Journals

citations
Cited by 40 publications
(15 citation statements)
references
References 39 publications
0
15
0
Order By: Relevance
“…Remark Similar to the DoS attack model in the works of Cong et al 24 and Feng and Tesi, 30 we assume DoS attacks cause all channels to be corrupted synchronously, which implies that, for each agent, its neighbor information cannot be used in attacked time. Recently, the secure control problems with DoS attacks corrupting different channels individually have been effectively solved in the works of Lu and Yang, 25,26 Sun and Yang 27,28 .…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations
“…Remark Similar to the DoS attack model in the works of Cong et al 24 and Feng and Tesi, 30 we assume DoS attacks cause all channels to be corrupted synchronously, which implies that, for each agent, its neighbor information cannot be used in attacked time. Recently, the secure control problems with DoS attacks corrupting different channels individually have been effectively solved in the works of Lu and Yang, 25,26 Sun and Yang 27,28 .…”
Section: Resultsmentioning
confidence: 99%
“…Then, a sampled‐data output feedback secure control protocol is designed. It is quite different from the state feedback secure control strategy adopted in the works of Zhang et al, 20 Cong et al, 24 and Shi et al 29 Based on piecewise Lyapunov function method and average dwell time method, the influence of DoS attacks can be overcome effectively, and the secure control protocol is designed to make the system achieve bipartite consensus while maintaining the tolerance to DoS attacks. Moreover, compared with the works of An and Yang, 21 Guo et al 23 the celebrated backstepping design method is not utilized, the steps of constructing controller are simpler and the controller form is clearer.…”
Section: Introductionmentioning
confidence: 94%
See 2 more Smart Citations
“…Furthermore, the DoS attacks mentioned therein can lead to degradation of system performance, and in severe cases, even direct failure of the system to work at all. However, in the current research on the theory of complex systems, we find that in the field of multi-agent systems with small cluster samples, one's protection against DoS attacks is only limited to first-order linear systems, 25 there is not even a relevant study in the ELSs, [26][27][28][29][30][31] and it leads to results of little practical significance due to over-simplified and idealized models. In this article, we discuss how to protect against DoS attacks in more complex and practically applicable ELSs.…”
Section: Introductionmentioning
confidence: 99%