2017
DOI: 10.1016/j.automatica.2017.03.008
|View full text |Cite
|
Sign up to set email alerts
|

Resilient consensus of second-order agent networks: Asynchronous update rules with delays

Abstract: We study the problem of resilient consensus of sampled-data multi-agent networks with double-integrator dynamics. The term resilient points to algorithms considering the presence of attacks by faulty/malicious agents in the network. Each normal agent updates its state based on a predetermined control law using its neighbors' information which may be delayed while misbehaving agents make updates arbitrarily and might threaten the consensus within the network. Assuming that the maximum number of malicious agents… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
110
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 187 publications
(110 citation statements)
references
References 34 publications
0
110
0
Order By: Relevance
“…Pick any agent i ∈ L m (θ , θ), and notice that it has a neighbor j (say) from the set (m−1) q=0 L q (θ , θ) at some time-step τ ∈ [(m − 1)T, mT ). The induction hypothesis coupled with (35) implies that c j,τ (θ) ≤ τ , and hence c i,τ +1 (θ) ≤ c j,τ (θ) + 1 ≤ τ + 1 based on (31). Appealing to (35) then reveals that c i,mT (θ) ≤ mT , thus completing the induction step.…”
Section: A Proof Of Theoremmentioning
confidence: 84%
See 2 more Smart Citations
“…Pick any agent i ∈ L m (θ , θ), and notice that it has a neighbor j (say) from the set (m−1) q=0 L q (θ , θ) at some time-step τ ∈ [(m − 1)T, mT ). The induction hypothesis coupled with (35) implies that c j,τ (θ) ≤ τ , and hence c i,τ +1 (θ) ≤ c j,τ (θ) + 1 ≤ τ + 1 based on (31). Appealing to (35) then reveals that c i,mT (θ) ≤ mT , thus completing the induction step.…”
Section: A Proof Of Theoremmentioning
confidence: 84%
“…We prove part (i) by inducting on the value of c i,t (θ). For the base case, suppose c i,t (θ) = 1 for some agent i ∈ V \ {v θ } at some time-step t. Based on (31), notice that this can happen if and only if v θ ∈ N i [t − 1]; the claim in part (i) then follows readily for the base case. Fix an integer m ≥ 2, and suppose that the assertion of part (i) holds for any agent i ∈ V \ {v θ } and at any time-step t, whenever c i,t (θ) ∈ {1, .…”
Section: A Proof Of Theoremmentioning
confidence: 94%
See 1 more Smart Citation
“…estimates; 8 end 9 Define R i (t k ) as the set of in-neighbors of ith interceptor whose time-to-go estimate is retained at time-step t k ; 10 The time-varying communication weights are defined as…”
Section: Algorithm 1: Local Filtering For Ith Interceptormentioning
confidence: 99%
“…The unknown dynamics caused by faulty interceptors make the cooperative guidance design for the normal interceptors difficult. Inspired by the time-to-go approximate model in [4] and the notion of network robustness [9]- [11], we integrate a local filtering algorithm with other cooperative guidance law and present a useful robust cooperative guidance law (RCGL). If the misbehavior of faulty interceptors can be characterized by a threat model (each faulty interceptor sends the same value to all of its out-neighbors at each time-step), the RCGL can reduce the variance of impact times between normal interceptors without identifying faulty interceptors.…”
Section: Introductionmentioning
confidence: 99%