2022
DOI: 10.1016/j.arcontrol.2022.01.004
|View full text |Cite
|
Sign up to set email alerts
|

An overview on multi-agent consensus under adversarial attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

1
11
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(12 citation statements)
references
References 114 publications
1
11
0
Order By: Relevance
“…The auxiliary controller plays a crucial role in determining a consensus coupling voltage and regulating the energy flow between the MGs and the main energy grid. To achieve these goals, optimization strategies are employed, focusing on power loss mitigation, energy efficiency, and maximizing economic advantages [58][59][60][61][62]. This auxiliary control system contributes significantly to the overall stability and optimal performance of MGs.…”
Section: Auxiliary Control In Mgsmentioning
confidence: 99%
“…The auxiliary controller plays a crucial role in determining a consensus coupling voltage and regulating the energy flow between the MGs and the main energy grid. To achieve these goals, optimization strategies are employed, focusing on power loss mitigation, energy efficiency, and maximizing economic advantages [58][59][60][61][62]. This auxiliary control system contributes significantly to the overall stability and optimal performance of MGs.…”
Section: Auxiliary Control In Mgsmentioning
confidence: 99%
“…Furthermore, some restrictions on the communication network architecture are needed for certain types of cyberattacks. For instance, when a certain number of agents are attacking and being adversarial, with a specific resilient control scheme, such as mean-subsequence reduced (MSR) algorithms, sufficient conditions regarding the robustness of graphs are derived aiming to mitigate the negative impacts from the adversarial and resilient consensus [13]. Notably, MSR and double-integrator position based MSR (DP-MSR) algorithms were investigated in [69], where some necessary and sufficient conditions regarding the topology restrictions were given for resilient consensus of NASs with time-varying communication graphs and under scenarios with misbehaving agents.…”
Section: Recent Proactive Defense Strategies For Securing Complex Cyb...mentioning
confidence: 99%
“…Table 1 illustrates some recent surveys or overviews on the security issues in multiagent systems (MASs) [11][12][13], networked control systems [14,15], or CPSs [16]. The authors note that, at the time of writing, there is a scarcity of comprehensive surveys that examine the state-of-the-art advances and novel methodologies in secure control for complex cyberphysical networks.…”
Section: Introductionmentioning
confidence: 99%
“…Adversarial attacks and defenses in communicative MARL receive much less attention when compared to their counterparts in reinforcement learning (Mu et al 2022). Current frameworks in this area (Ishii, Wang, and Feng 2022;Yuan et al 2023) commonly follow the principle of passive defense, where agents treat all received messages equally and try to make relative safe decisions. Since perturbed messages are mixed with useful messages, this indiscriminate reception may lead to the result of "garbage in, garbage out".…”
Section: Introductionmentioning
confidence: 99%