Wenying Yuan, Qian Dong, Tianchi Tong, Jinsheng Sun
{"title":"Secure pinning synchronization on aperiodic intermittent event-triggered control in discrete-time complex networks against multi-pattern link attacks","authors":"Wenying Yuan, Qian Dong, Tianchi Tong, Jinsheng Sun","doi":"10.1016/j.cnsns.2024.108303","DOIUrl":null,"url":null,"abstract":"<div><p>This paper investigates the problem of secure synchronization in aperiodic intermittent event-triggered pinning control for discrete-time complex networks (DCNs) against multi-pattern link attacks. Firstly, in order to reduce communication burden and control cost, a novel aperiodic intermittent event-triggered control (AIEC) with discontinuous characteristics is designed based on periodic sampling, where triggering instants are determined by the intermittent control (IC). Secondly, multiple pattern attack are modeled, as they can interrupt different edges and change the network topology. In addition, multi-pattern attacks for each link are independent and their impact on the coupling topology is analyzed. Thirdly, under destroyed network topology, this paper designs aperiodic intermittent event-triggered pinning control (AIEPC) by combining pinning control (PC) with the AIEC. Meanwhile, based on PC, the isolated node and pinned nodes form a like-directed spanning tree with an asymmetrical coupling matrix, where rooted at the isolated node and only directed connections between the isolated node and pinned nodes. Fourthly, using the segmentation analysis method and the inequality iteration technique, a sufficient condition for exponential synchronization of error system is obtained by considering the instants neighboring different intermittent control and attack intervals. Finally, a simulation example on Chua’s circuit network is provided to verify the validity of the theoretical results achieved in this paper.</p></div>","PeriodicalId":3,"journal":{"name":"ACS Applied Electronic Materials","volume":null,"pages":null},"PeriodicalIF":4.3000,"publicationDate":"2024-08-23","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"ACS Applied Electronic Materials","FirstCategoryId":"100","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S100757042400488X","RegionNum":3,"RegionCategory":"材料科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0
Abstract
This paper investigates the problem of secure synchronization in aperiodic intermittent event-triggered pinning control for discrete-time complex networks (DCNs) against multi-pattern link attacks. Firstly, in order to reduce communication burden and control cost, a novel aperiodic intermittent event-triggered control (AIEC) with discontinuous characteristics is designed based on periodic sampling, where triggering instants are determined by the intermittent control (IC). Secondly, multiple pattern attack are modeled, as they can interrupt different edges and change the network topology. In addition, multi-pattern attacks for each link are independent and their impact on the coupling topology is analyzed. Thirdly, under destroyed network topology, this paper designs aperiodic intermittent event-triggered pinning control (AIEPC) by combining pinning control (PC) with the AIEC. Meanwhile, based on PC, the isolated node and pinned nodes form a like-directed spanning tree with an asymmetrical coupling matrix, where rooted at the isolated node and only directed connections between the isolated node and pinned nodes. Fourthly, using the segmentation analysis method and the inequality iteration technique, a sufficient condition for exponential synchronization of error system is obtained by considering the instants neighboring different intermittent control and attack intervals. Finally, a simulation example on Chua’s circuit network is provided to verify the validity of the theoretical results achieved in this paper.