2020
DOI: 10.1109/access.2020.2989743
|View full text |Cite
|
Sign up to set email alerts
|

Event-Triggered Resilient Consensus for Multi-Agent Networks Under Deception Attacks

Abstract: In this paper, a novel distributed algorithm derived from the event-triggered strategy is proposed for achieving resilient consensus of multi-agent networks (MANs) under deception attacks. These malicious deception attacks are intended to interfere with the communication channel causing periods in time at which the sending information among nodes is modified. In particular, we develop an event-triggered update rule which can mitigate the influence of the attackers and at the same time reduce the computing and … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
15
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 23 publications
(15 citation statements)
references
References 42 publications
(76 reference statements)
0
15
0
Order By: Relevance
“…It does not need to be equipped with an additional attack detector to detect attacks as in [10], [20]. In [24], an event-triggered mechanism is introduced to reduce the impact of malicious attack. But if the malicious attack occurs when the event generator is not triggered, the agent will receive the deception signals such that the consensus performance may be reduced.…”
Section: Resultsmentioning
confidence: 99%
“…It does not need to be equipped with an additional attack detector to detect attacks as in [10], [20]. In [24], an event-triggered mechanism is introduced to reduce the impact of malicious attack. But if the malicious attack occurs when the event generator is not triggered, the agent will receive the deception signals such that the consensus performance may be reduced.…”
Section: Resultsmentioning
confidence: 99%
“…where α > 0 represents the rate new information replaces old information and K P , K I > 0 are the PI estimator gains. Remarkably, the latter constants play an important role in the convergence rate of estimator (12), as the the estimation dynamics is demanded to converge fast enough to provide a good approximation of ĉ = ĉ(t) (which is determined by each component of y, i.e. lim t→∞ |ĉ(t)−y i (t)| = 0 for i = 1, .…”
Section: B Robustness Of the Sbdcmentioning
confidence: 99%
“…In addition, the latter estimators are designed so that inputs c i,1 = ζ i and c i,2 = ζ 2 i feed their dynamics. The DPIA is therefore constituted by such a system interconnection between (23) and a couple of PI-ACEs (12). In the sequel, we employ network G within the two setups S1 and S2 described in the previous subsections.…”
Section: Numerical Examples On the Dpia Criticalitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Recently, there have been a growing number of research results on event-triggered control, the aim of which is to reduce the computational and communication burden while ensuring satisfactory system performance. [32] developed a distributed algorithm derived from the event-triggered strategy for achieving resilient consensus multi-agent networks under deception attacks. [33] proposed an eventtriggered control design that guarantees synchronization for output passive agents.…”
Section: Introductionmentioning
confidence: 99%