Qiang Wang, Shaokang Ji, Xiaofei Wang, Xin Peng, Weimin Zhong
{"title":"具有切换拓扑和顺序缩放攻击的线性多代理系统的分布式量化安全两方共识","authors":"Qiang Wang, Shaokang Ji, Xiaofei Wang, Xin Peng, Weimin Zhong","doi":"10.1049/cth2.12641","DOIUrl":null,"url":null,"abstract":"<p>This paper considers the secure distributed control consensus problem of linear multi-agent systems (MASs) under switching topologies, subject to intermittent sequential scaling attacks, which was compelled to scaling factor, attack frequency, duration and cooperative-competitive networks. First, the scenario of a fixed topology is considered, and a novel control protocol combined with a logarithmic quantizer and relative state measurements of neighbouring agents is discussed. The sighed graph is utilized to characterize the communication topology determined by the information flow directions and captured by the graph Laplacian matrix. After that, sufficient conditions for effectiveness of the developed control methods in guiding the MASs to secure bipartite leader-following consensus are constructed. Second, the scenario of switching topologies is considered, and it is derived that the secure bipartite consensus will be achieved if the designed state feedback control protocol with the scaling factor, the attack duration, attack frequency and switching signal are selected properly. At last, to prove the effectiveness of the designed controllers, a simulation example depended on the real-word actual military is introduced.</p>","PeriodicalId":50382,"journal":{"name":"IET Control Theory and Applications","volume":"18 9","pages":"1114-1125"},"PeriodicalIF":2.2000,"publicationDate":"2024-04-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.12641","citationCount":"0","resultStr":"{\"title\":\"Distributed quantized secure bipartite consensus of linear multi-agent systems with switching topologies and sequential scaling attacks\",\"authors\":\"Qiang Wang, Shaokang Ji, Xiaofei Wang, Xin Peng, Weimin Zhong\",\"doi\":\"10.1049/cth2.12641\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<p>This paper considers the secure distributed control consensus problem of linear multi-agent systems (MASs) under switching topologies, subject to intermittent sequential scaling attacks, which was compelled to scaling factor, attack frequency, duration and cooperative-competitive networks. First, the scenario of a fixed topology is considered, and a novel control protocol combined with a logarithmic quantizer and relative state measurements of neighbouring agents is discussed. The sighed graph is utilized to characterize the communication topology determined by the information flow directions and captured by the graph Laplacian matrix. After that, sufficient conditions for effectiveness of the developed control methods in guiding the MASs to secure bipartite leader-following consensus are constructed. Second, the scenario of switching topologies is considered, and it is derived that the secure bipartite consensus will be achieved if the designed state feedback control protocol with the scaling factor, the attack duration, attack frequency and switching signal are selected properly. At last, to prove the effectiveness of the designed controllers, a simulation example depended on the real-word actual military is introduced.</p>\",\"PeriodicalId\":50382,\"journal\":{\"name\":\"IET Control Theory and Applications\",\"volume\":\"18 9\",\"pages\":\"1114-1125\"},\"PeriodicalIF\":2.2000,\"publicationDate\":\"2024-04-21\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"https://onlinelibrary.wiley.com/doi/epdf/10.1049/cth2.12641\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IET Control Theory and Applications\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://onlinelibrary.wiley.com/doi/10.1049/cth2.12641\",\"RegionNum\":4,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IET Control Theory and Applications","FirstCategoryId":"94","ListUrlMain":"https://onlinelibrary.wiley.com/doi/10.1049/cth2.12641","RegionNum":4,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
摘要
本文考虑了线性多代理系统(MASs)的安全分布式控制共识问题,该问题在切换拓扑结构下受到间歇性连续缩放攻击,并受缩放因子、攻击频率、持续时间和合作竞争网络的影响。首先,我们考虑了固定拓扑的情况,并讨论了一种与对数量化器和相邻代理的相对状态测量相结合的新型控制协议。利用叹息图来描述由信息流方向决定并由图拉普拉卡矩阵捕捉的通信拓扑。随后,构建了所开发的控制方法在引导 MAS 达成双向领导-跟随共识方面有效性的充分条件。其次,考虑了切换拓扑的情况,得出如果设计的状态反馈控制协议的缩放因子、攻击持续时间、攻击频率和切换信号选择得当,就能实现安全的两方共识。最后,为了证明所设计控制器的有效性,介绍了一个基于实际军事实战的仿真实例。
Distributed quantized secure bipartite consensus of linear multi-agent systems with switching topologies and sequential scaling attacks
This paper considers the secure distributed control consensus problem of linear multi-agent systems (MASs) under switching topologies, subject to intermittent sequential scaling attacks, which was compelled to scaling factor, attack frequency, duration and cooperative-competitive networks. First, the scenario of a fixed topology is considered, and a novel control protocol combined with a logarithmic quantizer and relative state measurements of neighbouring agents is discussed. The sighed graph is utilized to characterize the communication topology determined by the information flow directions and captured by the graph Laplacian matrix. After that, sufficient conditions for effectiveness of the developed control methods in guiding the MASs to secure bipartite leader-following consensus are constructed. Second, the scenario of switching topologies is considered, and it is derived that the secure bipartite consensus will be achieved if the designed state feedback control protocol with the scaling factor, the attack duration, attack frequency and switching signal are selected properly. At last, to prove the effectiveness of the designed controllers, a simulation example depended on the real-word actual military is introduced.
期刊介绍:
IET Control Theory & Applications is devoted to control systems in the broadest sense, covering new theoretical results and the applications of new and established control methods. Among the topics of interest are system modelling, identification and simulation, the analysis and design of control systems (including computer-aided design), and practical implementation. The scope encompasses technological, economic, physiological (biomedical) and other systems, including man-machine interfaces.
Most of the papers published deal with original work from industrial and government laboratories and universities, but subject reviews and tutorial expositions of current methods are welcomed. Correspondence discussing published papers is also welcomed.
Applications papers need not necessarily involve new theory. Papers which describe new realisations of established methods, or control techniques applied in a novel situation, or practical studies which compare various designs, would be of interest. Of particular value are theoretical papers which discuss the applicability of new work or applications which engender new theoretical applications.