Next Article in Journal
Modified Maximum Entropy Method and Estimating the AIF via DCE-MRI Data Analysis
Previous Article in Journal
Quantum Attacks on Sum of Even–Mansour Construction with Linear Key Schedules
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

On Consensus and Stability under Denial-of-Service Attacks

Faculty of Computer Science, Bialystok University of Technology, 15-351 Białystok, Poland
Entropy 2022, 24(2), 154; https://doi.org/10.3390/e24020154
Submission received: 2 December 2021 / Revised: 30 December 2021 / Accepted: 14 January 2022 / Published: 20 January 2022

Abstract

:
In the paper, discrete-time multi-agent systems under Denial-of-Service (DoS) attacks are considered. Since in the presence of DoS attacks the stability of the whole system may be disturbed, sufficient stability conditions for the multi-agent system under DoS attacks are delivered. The consensus problem for the special case of the considered system under DoS attacks is also examined by delivering sufficient conditions. Theoretical considerations are illustrated by numerical examples.

1. Introduction

Nowadays, cyber attacks on networks of cooperating devices are one of the most troublesome threats that disrupt or interrupt entire systems. A priority is to ensure the security of industrial control systems based on the flow of information and communication technologies. A major concern is that cyber-attackers may be able to break connections in control systems that are utilized in power grids, transportation, food distribution, and many other services important to society. Therefore, it is critical to assess and improve the security of such control systems and ensure resilience against cyber attacks. This will result in protecting the environment against financial losses and other possible damages. Motivated by the above, an enormous number of researchers have been attracted to work on these kind of problems; see for example [1,2,3,4,5,6,7].
In general, in the literature, the problem of how Denial-of-Service (DoS) attacks interrupt entire systems is explored from the point of view of feedback control, state estimation, and multi-agent consensus problems, and one can find different approaches to solutions of these problems. A very interesting approach focuses on multi-agent consensus problems under DoS attacks [8,9,10,11,12,13]. In the mentioned papers, authors characterize the communication topology of multi-agent systems with an undirected graph represented by nodes (agents) and edges (communication links).
In [8,9,10], researchers proposed control law and interaction rules to ensure consensus under DoS attacks. They considered the case in which the jamming attacker can target all communication links at once. In particular, Senejohnny et al. [8] used a self-triggering approach: when a triggering condition holds, each agent attempts to communicate.
In the modified problem formulation in [9], multiple jamming intruders attack individual communications links.
The works discussed above concern scalar dynamics, while in [11], the authors explore the same problem with multi-dimensional dynamics. In addition, an apparently different game-theoretical formulation of multi-agent systems under DoS attacks that target individual links is presented in [12,13].
Particularly interesting is the problem of how Denial-of-Service attacks disrupt the exponential stability of systems, which is investigated in, for example [1,14,15]; see also the references therein.
Following this lead, we decided to investigate the stability problem of systems under DoS attacks. In the first work devoted to this problem (see [16]), we examined stability in the presence of DoS attacks of multi-agent systems (MAS) defined on time scales. However, there is an enormous number of scientists who study such problems for systems with discrete time and only a narrow group of researchers who deal with similar problems on time scales. Moreover, this subject is also closely related to the problem of consensus with a leader for multi-agent systems. Taking all this into account, we decided to study behaviour (stability and leader-following consensus) of the discrete multi-agent systems. Since in the presence of DoS attacks, the information flow between devices can be interrupted, which in mathematical language means that stability of the whole system is disturbed, we propose sufficient conditions for the stability of the MAS. To tackle this problem, the distributed control law guaranteeing stability of the system dynamics despite DoS attacks is delivered. In order to improve the resilience of the network, we propose a control technique that modifies the coupling strength parameter after an attack on the system. In our previous paper, we examined only the stability of the system, paying no attention to the consensus problem. In this work, we cope with the leader-following consensus problem of the multi-agent system in the presence of DoS attacks by employing switched symmetric error systems and proving their exponential stability under arbitrary switching in base-of-Schur stability. This results in the formulation of sufficient conditions for the multi-agent system to achieve a consensus under DoS attacks. The main contribution of this paper can be described in terms of three aspects:
  • Discrete-time multi-agent systems under Denial-of-Service (DoS) attacks are investigated in terms of the leader-consensus problem in a DoS attacks situation, and sufficient conditions ensuring such a consensus are delivered;
  • Stability protocol under DoS attacks on the considered systems is proposed in order to guarantee stability of the system in the presence of DoS attacks;
  • Numerical analysis of the theoretical investigation is given to illustrate presented results.
We organize the paper as follows. In Section 2, the preliminaries from the graph theory are given, while in Section 3, we formulate the statement of the problem of behaviour of systems under DoS attacks. Further, in Section 4, we derive sufficient conditions guaranteeing exponential stability of the system under DoS attacks. Consensus problem analysis is given in Section 5. To be more precise, we deliver conditions under which the consensus is achieved in the multi-agent system with a leader in spite of DoS attacks. Illustrative examples are presented to verify the theoretical consideration. Finally, we conclude the paper in the last section.

2. Preliminaries

We start with some notions from graph theory. By G = ( V , E ) we denote a weighted communication graph of n agents, by V = { v 1 , v 2 , , v n } the set of nodes (vertices), and by E V × V the set of edges. If information flows from agent j to agent i, then we denote it as edge ( i , j ) . Entries of the adjacency matrix A = [ a i j ] R n × n are defined by a i j = 1 if ( i , j ) E , and a i j = 0 if ( i , j ) E . Matrix L = [ l i j ] R n × n is called a Laplacian matrix induced by the topology G if l i i = i j a i j and l i j = a i j , i j , where a i j are the entries of the adjacency matrix A. We observe that there exists at least one zero eigenvalue of matrix L with a corresponding eigenvector 1 n = [ 1 , , 1 ] T . Graph G is called undirected if for every ( i , j ) E we have ( j , i ) E . It is easy to see that matrices A and L are symmetric for any undirected graph, and we get 0 = λ 1 λ 2 λ n for λ i , i = 1 , , n with eigenvalues of L. Let us also recall that if there exists an edge between any two different vertices, then an undirected graph is connected. Moreover, we get λ 2 > 0 if the graph is connected.
Throughout the paper, all graphs are assumed to be finite, undirected, and without loops or multiple edges.
In the proposed model of MAS under DoS attacks, we employ discrete-time switched linear systems.
A discrete-time switched linear system under arbitrary switching is an inclusion of the following form,
x ( t + 1 ) { M κ x ( t ) } κ I , x ( 0 ) = x 0 ,
where x ( t ) R n is the state vector, x ( 0 ) is initial condition, M κ R n × n , and I is a finite index set. The switched system with a specific switching pattern is denoted by
x ( t + 1 ) = M κ ( t ) x ( t ) , x ( 0 ) = x 0 ,
where κ : Z + I is a piecewise continuous switching signal. Here, Z + denotes the set of all nonnegative integers.
Definition 1
([17]). Switched system (1) is exponentially stable if x ( t ) μ t x 0 with 0 < μ < 1 holds for any t Z + and any initial state x 0 .
The following theorem will be useful for deriving the main results.
Theorem 1
(cf. [17], Theorem 1). Let { M κ } κ I be a family of symmetric matrices. If all matrices in the family { M κ } κ I are Schur stable, then switched system (1) is exponentially stable under arbitrary switching.

3. Problem Statement

Consider a multi-agent networked system consisting of N agents. The interaction topology of a network is described by undirected graph G with the corresponding adjacency matrix A = [ a i j ] R N × N and the Laplacian matrix L. The neighbours of agent i are denoted by N i = { j V ( j , i ) E } . Each node of graph G represents a dynamic agent with the dynamics
x i ( t + 1 ) = a x i ( t ) + b u i ( t ) , t Z + , i = 1 , , N ,
where x i ( t ) R and u i ( t ) R denote the state and the control input at time t, respectively. The constant real parameters a and b (coupling strengths) will be specified later.
In the sequel, we assume that DoS attacks can occur on some or all transmission channels at any time. We define
  • D ( i , j ) ( Z + ) , i < j , to be the union of moments of DoS attacks on channel ( i , j ) E over Z + ;
  • Γ ( t ) : = { ( i , j ) E t D ( i , j ) ( Z + ) } to be the set of channels that are attacked at time t.
Since graph G is undirected, only edge ( i , j ) with i < j is considered and D ( i , j ) = D ( j , i ) .
We set Laplacian matrix L Γ ( t ) with entries l i j = 0 for ( j , i ) Γ ( t ) ; that is, if channel ( j , i ) is not attacked at time t. According to the definition, matrix L Γ ( t ) describes DoS attack at time t. Next, let us denote by Ω a set of all subsets of the set of all connections between every two different nodes in graph G. To be more precise, setting E = { ( i , j ) : 1 i , j N i < j } , we can write that Ω is the set of all subsets of the set E and, what follows, | Ω | = 2 | E | . One can observe that the definition of Γ gives an index for the attack modes. Therefore, for a given t N , there are 2 | E | 2 = 2 | E | possible different attack modes. By introducing a bijection map f : Ω { 1 , , 2 | E | } N , we define switching signal κ : Z + { 1 , , 2 | E | } = I as κ ( t ) : = f ( Γ ( t ) ) , which is piecewise continuous. In this way, every DoS attack mode is described by matrix A κ ( t ) as follows:
A κ ( t ) : = L L Γ ( t ) , t Z + .

4. Stability Protocol under DoS Attacks

In this section, we present how to design a control protocol that solves the stability problem under DoS attacks.
The state-feedback distributed control for multi-agent system (2) is proposed as follows
u i ( t ) = j N i , ( j , i ) Γ ( t ) a i j ( x j ( t ) x i ( t ) ) , i = 1 , , N .
Then the collective dynamics of a multi-agent system (2) following protocol (4) can be written in the following matrix form
x ( t + 1 ) = ( a I N b ( L L Γ ( t ) ) ) x ( t ) , x ( 0 ) = x 0 ,
where x = [ x 1 , , x N ] T , I N is an identity matrix of dimension N × N , and L and L Γ ( t ) are the Laplacian matrices of an appropriate dimension. According to Formulas (1) and (3), we obtain the switched system
x ( t + 1 ) { ( a I N b A κ ) x ( t ) } κ I , x ( 0 ) = x 0 R N
that represents multi-agent system (5) under DoS attacks. Here, x 0 denotes the initial state for system (5).
Theorem 2.
If all matrices in the family { a I N b A κ } κ I are Schur stable, then a multi-agent system (5) under DoS attacks is exponentially stable.
Proof. 
Observe that multi-agent system (5) under DoS attacks is described by a switched system (6). Since all matrices in the family { a I N b A κ } κ I are symmetric and Schur stable, the claim follows by Theorem 1. □
Let us define the following
s p e c ( A κ ) : = { λ j κ : j = 1 , , N } , κ I
and
λ m a x : = max j { 1 , , N } , κ I λ j κ .
Proposition 1.
Assume that a ( 1 , 1 ) in system (5). If for b < 0 holds a 1 b > λ m a x or for b > 0 holds 1 b 1 + a > λ m a x ; then, a multi-agent system (5) under DoS attacks will be exponentially stable.
Proof. 
First let us observe that, due to Theorem 2, if all matrices in the set { a I N b A κ } κ I are Schur stable, then system (5) has the equilibrium x ( t ) 0 exponentially stable, in spite of DoS attacks. We notice that s p e c { a I N b A κ } κ I = { a b λ j κ : j = 1 , , N , κ I } . Therefore, we have to show that | a b λ j κ | < 1 for all j = 1 , , N and κ I . Since 0 s p e c ( A κ ) , κ I , it follows that a ( 1 , 1 ) . We show that first condition, namely that for b < 0 , a 1 b > λ m a x holds, implies Schur stability of all matrices in { a I N b A κ } κ I . Indeed, since b < 0 , a 1 b > λ m a x and a ( 1 , 1 ) , it follows that:
a 1 b λ j κ < 0 and a + 1 b λ j κ > 0 ,
for all κ I , j { 1 , , N } . The proof for the second case is analogous. □
Remark 1.
Observe that if b = 0 in system (5), then it is enough that a ( 1 , 1 ) for system (5) to be exponentially stable.

5. Consensus with a Leader under DoS Attacks

In this section, we investigate multi-agent system (2) with a , b = 1 but with a leader. Therefore, the model of N agents is described as follows:
x i ( t + 1 ) = x i ( t ) + u i ( t ) , t 0 , i = 1 , 2 , , N ,
while the dynamics of a leader, labelled by l, are given by
x l ( t + 1 ) = x l ( t ) + f ( t ) , t 0 ,
where f : Z + R . If f ( t ) 0 , then x l ( t ) c o n s t a n t (constant reference state). In the opposite case, it is time-varying reference state.
Definition 2.
Multi-agent system (7) and (8) is said to achieve a consensus with a leader if
lim t | x i ( t ) x l ( t ) | = 0 , i { 1 , 2 , , N }
for any initial conditions: x l ( 0 ) , x i ( 0 ) , i = 1 , , N .
The state-feedback distributed consensus control for agent i is expressed as follows:
u i ( t ) = f ( t ) β j N i , ( j , i ) Γ ( t ) a i j x i ( t ) x j ( t ) + b i x i ( t ) x l ( t ) i = 1 , 2 , , N ,
where a i j ( i , j = 1 , 2 , , N ) is the ( i , j ) th entry of the adjacency matrix A R N × N , b i > 0 if there is information flow from a leader to agent i and b i = 0 ; otherwise, β > 0 is the coupling strength that will be specified later. We assume that not all b i ’s are equal to zero.
Remark 2.
One can observe that the assumption that there exists i { 1 , 2 , , N } such that b i 0 means that a leader always has influence on at least one agent. Moreover, since the entries of adjacency matrix are not all zeros at the same time, this implies that there is always information flow between agents, which ensures the leader’s influence is also spread over other agents. Finally, in the case b i 0 for all i = 1 , , N , we have the strongest leader-dependence situation when all agents are directly influenced by the leader.
On account of consensus protocol (10), we have
x ( t + 1 ) = f ( t ) 1 N + x ( t ) β L L Γ ( t ) + B x ( t ) + β B x l ( t ) 1 N ,
where x = [ x 1 , , x N ] T , B : = diag { b 1 , , b N } R N × N is a diagonal matrix with nonzero trace, 1 N is a column of N × 1 , and I N is an N × N -identity matrix. Now, applying Formulas (1) and (3), as in the previous section, we obtain the switched system
x ( t + 1 ) { f ( t ) 1 N + x ( t ) β A κ + B x ( t ) + β B x l ( t ) 1 n } κ I
that gathers all possible DoS attacks on system (11). Now let us define an error vector e ( t ) = [ e 1 ( t ) , , e N ( t ) ] T with e i = x i x l . Then we get
e ( t + 1 ) = x ( t + 1 ) x l ( t + 1 ) 1 N = f ( t ) 1 N + x ( t ) + I N β A κ ( t ) + B x ( t ) + β B x l ( t ) 1 N x l ( t + 1 ) 1 N = f ( t ) 1 N + I N β A κ ( t ) + B ( x ( t ) x l ( t ) 1 N ) + I N β A κ ( t ) + B x l ( t ) 1 N + β B x l ( t ) 1 N x l ( t + 1 ) 1 N = I N β A κ ( t ) + B e ( t ) β A κ ( t ) x l ( t ) 1 N .
Since A κ ( t ) x l ( t ) 1 N = 0 , we obtain
e ( t + 1 ) = I N β A κ ( t ) + B e ( t )
and an error-switched system is as follows
e ( t + 1 ) { I N β A κ + B e ( t ) } κ I .
Remark 3.
Observe that transformation of system (11) to system (13) results in solving the stability problem of system (13) instead of the consensus problem of system (11).
Theorem 3.
Multi-agent system (11) under DoS attacks achieves a consensus with a leader, provided that matrices in the family { I N β A κ + B } κ I are Schur stable.
Proof. 
Since, by assumption, all matrices in the family { I N β A κ + B } κ I are symmetric and Schur stable, by use of Theorem 1, we get that error-switched system (14) is exponentially stable under arbitrary switching. Now, let us observe that exponential stability of switched system (14) implies that
lim t | e i ( t ) | = lim t | x i ( t ) x l ( t ) | = 0 ,
which means that multi-agent system (11) under DoS attacks achieves a consensus with a leader. □
In order to give a simple condition on the coupling strength β that guarantees achieving a consensus with a leader, we set s p e c ( A κ + B ) = { γ j κ : j = 1 , , N } , κ I , and
γ m a x = max j { 1 , , N } , κ I γ j κ .
Proposition 2.
If β 0 , 2 γ m a x , with γ m a x > 0 given by Formula (15), then multi-agent system (11) under DoS attacks achieves a consensus with a leader.
Proof. 
First let us observe that s p e c ( I N β A κ + B κ I ) = { 1 β γ j κ : j = 1 , , N , κ I } . We show that | 1 β γ j κ | < 1 for all j = 1 , , N and κ I . Since β 0 , 2 γ m a x , it follows that
0 < β γ j κ < 2 1 < 1 β γ j κ < 1 | 1 β γ j κ | < 1 , j = 1 , , N , κ I .
The latter means that all matrices from the family { I N β A κ + B } κ I are Schur stable, and since they are also symmetric, by Theorem 1 we conclude that the error-switched system (14) is exponentially stable. It follows that
lim t | e i ( t ) | = lim t | x i ( t ) x l ( t ) | = 0 ,
and the proof is complete. □
Now we illustrate the above results by numerical examples.
Example 1.
Let us consider five agents with the dynamics described by (7) and two cases of leader’s dynamics, with constant ( x l ( t ) 1 ) and time-varying ( x l ( t + 1 ) = x l ( t ) + sin ( t 3 ) ) reference states. The initial conditions are X ( 0 ) = ( 1 , 0 , 1 , 1 , 0 ) . We assume that there is information flow from a leader to the third and fourth agents, that is, B = diag { 0 , 0 , 1 , 1 , 0 } , and we calculate that γ m a x 5 , 4 . In what follows, we apply the control law (10), and we examine the influence of the coupling strength β on the consensus with a leader under DoS attacks in the three cases. As the first one, we consider the system working without any interference and the matrix of the system of the form:
4 1 1 1 1 1 3 0 1 1 1 0 3 0 1 1 1 0 4 1 1 1 1 1 4
The second and the third cases are considered when DoS attacks take place and the matrices describing the attacked channels are the following:
2 0 0 1 1 0 2 0 1 1 0 0 1 0 0 1 1 0 4 1 1 1 0 1 3
and
2 1 1 0 0 1 1 0 0 0 1 0 3 0 1 0 0 0 1 0 0 0 1 0 1 .
The interaction topologies for every case are presented in Figure 1 without DoS attacks and in Figure 2 with two consecutive attacks, respectively.
Constant reference state
Figure 3 illustrates the case when x l ( t ) 1 . In the first simulation, we choose β = 0.35 (Figure 3a), which fulfils the constraints of Proposition 2, and in the second β = 0.5 (Figure 3b), which does not. It is apparent that the consensus with a leader is achieved in the first case under the proposed controller.
Time-varying reference state
Figure 4 shows the situation when f ( t ) = sin ( t 3 ) . As was already observed in the previous case if we choose β = 0.35, then it fulfils the constraints of Proposition 2 and the consensus is achieved (Figure 4a), while for β = 0.5 it does not (Figure 4b).

Funding

This research was funded by Bialystok University of Technology, grant no. WZ/WI-IIT/1/2020.

Data Availability Statement

Not applicable.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Cetinkaya, H.I.A.; Hayakawa, T. An Overview on Denial-of-Service Attacks in Control Systems: Attack Models and Security Analyses. Entropy 2019, 21, 210. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  2. Farraj, E.H.A.; Kundur, D. A cyber-physical control framework for transient stability in smart grids. IEEE Trans. Smart Grid 2016, 9, 1205–1215. [Google Scholar] [CrossRef]
  3. Li, H.; Lai, L.; Poor, H.V. Multicast routing for decentralized control of cyber physical systems with an application in smart grid. IEEE J. Sel. Areas Commun. 2012, 30, 1097–1107. [Google Scholar] [CrossRef]
  4. Manandhar, X.K.; Cao, F.H.; Liu, Y. Detection of faults and attacks including false data injection attack in smart grid using Kalman filter. IEEE Trans. Control Netw. Syst. 2014, 1, 370–379. [Google Scholar] [CrossRef]
  5. Lu, A.; Yang, G. Observer-based control for cyber-physical cystems under denial-of-service with a decentralized event-triggered scheme. IEEE Trans. Cybern. 2018, 50, 4886–4895. [Google Scholar] [CrossRef] [PubMed]
  6. Mustafa, A.; Modares, H. Attack Analysis and Resilient Control Design for Discrete-Time Distributed Multi-Agent Systems. IEEE Robot. Autom. Lett. 2019, 5, 369–376. [Google Scholar] [CrossRef]
  7. Zhang, H.; Wang, J. Adaptive sliding-mode observer design for a selective catalytic reduction system of ground-vehicle diesel engines. IEEE/ASME Trans. Mechatron. 2016, 21, 2027–2038. [Google Scholar] [CrossRef]
  8. Senejohnny, D.; Tesi, P.; De Persis, C. Self-triggered coordination over a shared network under Denial-of-Service. In Proceedings of the 2015 54th IEEE Conference on Decision and Control (CDC), Osaka, Japan, 15–18 December 2015; pp. 3469–3474. [Google Scholar] [CrossRef] [Green Version]
  9. Senejohnny, D.; Tesi, P.; Persis, C.D. A jamming-resilient algorithm for self-triggered network coordination. IEEE Trans. Control Netw. Syst. 2017, 5, 981–990. [Google Scholar] [CrossRef] [Green Version]
  10. Kikuchi, K.; Cetinkaya, A.; Hayakawa, T.; Ishii, H. Stochastic communication protocols for multi-agent consensus under jamming attacks. In Proceedings of the 2017 IEEE 56th Annual Conference on Decision and Control (CDC), Melbourne, VIC, Australia, 12–15 December 2017; pp. 1657–1662. [Google Scholar] [CrossRef]
  11. Feng, Z.; Hu, G. Distributed secure average consensus for linear multi-agent systems under DoS attacks. In Proceedings of the 2017 American Control Conference (ACC), Seattle, WA, USA, 24–26 May 2017; pp. 2261–2266. [Google Scholar] [CrossRef]
  12. Nugraha, Y.; Hayakawa, T.; Cetinkaya, A.; Ishii, H.; Zhu, Q. Subgame Perfect Equilibrium Analysis for Jamming Attacks on Resilient Graphs. In Proceedings of the 2019 American Control Conference (ACC), Philadelphia, PA, USA, 10–12 July 2019; pp. 2060–2065. [Google Scholar] [CrossRef]
  13. Nugraha, Y.; Hayakawa, T.; Cetinkaya, A.; Ishii, H.; Zhu, Q. Dynamic Resilient Network Games Considering Connectivity. In Proceedings of the 59th IEEE Conference on Decision and Control (CDC), Jeju, Korea, 14–18 December 2020; pp. 3779–3784. [Google Scholar] [CrossRef]
  14. Lu, A.; Yang, G. Distributed consensus control for multi-agent systems under denial-of-service. Inf. Sci. 2018, 439, 95–107. [Google Scholar] [CrossRef]
  15. Persis, C.D.; Tesi, P. Input-to-state stabilizing control under denial-of-service. IEEE Trans. Autom. Control 2015, 60, 2930–2944. [Google Scholar] [CrossRef]
  16. Girejko, E.; Malinowska, A.B. On Stability of Multi-Agent Systems on Time Scales under Denial-of-Service attacks. In Proceedings of the 2020 16th International Conference on Control, Automation, Robotics and Vision (ICARCV), Shenzhen, China, 13–15 December 2020; pp. 489–496. [Google Scholar] [CrossRef]
  17. Zhai, X.G.; Chen, M.I.; Yasuda, K. Stability and L2 Gain Analysis for a Class of Switched Symmetric Systems. In Proceedings of the 41st IEEE Conference on Decision and Control, Las Vegas, NV, USA, 10–13 December 2002; pp. 4395–4400. [Google Scholar]
Figure 1. The interaction topology of the system without DoS attacks.
Figure 1. The interaction topology of the system without DoS attacks.
Entropy 24 00154 g001
Figure 2. The interaction topologies of the systems with two DoS attacks.
Figure 2. The interaction topologies of the systems with two DoS attacks.
Entropy 24 00154 g002
Figure 3. The multi-agent system with a constant reference state. (a) β = 0.35; (b) β = 0.5.
Figure 3. The multi-agent system with a constant reference state. (a) β = 0.35; (b) β = 0.5.
Entropy 24 00154 g003
Figure 4. The multi-agent system with a time-varying reference state. (a) β = 0.35; (b) β = 0.5.
Figure 4. The multi-agent system with a time-varying reference state. (a) β = 0.35; (b) β = 0.5.
Entropy 24 00154 g004
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Girejko, E. On Consensus and Stability under Denial-of-Service Attacks. Entropy 2022, 24, 154. https://doi.org/10.3390/e24020154

AMA Style

Girejko E. On Consensus and Stability under Denial-of-Service Attacks. Entropy. 2022; 24(2):154. https://doi.org/10.3390/e24020154

Chicago/Turabian Style

Girejko, Ewa. 2022. "On Consensus and Stability under Denial-of-Service Attacks" Entropy 24, no. 2: 154. https://doi.org/10.3390/e24020154

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop