Next Article in Journal
Preparation and Characterization of Microencapsulated Phase Change Materials for Solar Heat Collection
Next Article in Special Issue
Energy Loss Reduction for Distribution Networks with Energy Storage Systems via Loss Sensitive Factor Method
Previous Article in Journal
Low-Cost I–V Tracer for PV Fault Diagnosis Using Single-Diode Model Parameters and I–V Curve Characteristics
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Event-Triggered Security Consensus for Multi-Agent Systems with Markov Switching Topologies under DoS Attacks

1
College of Intelligent Technology and Engineering, Chongqing University of Science and Technology, Chongqing 401331, China
2
College of Electronic and Information Engineering, Southwest University, Chongqing 400075, China
3
College of Safety Engineering, Chongqing University of Science and Technology, Chongqing 401331, China
*
Author to whom correspondence should be addressed.
Energies 2022, 15(15), 5353; https://doi.org/10.3390/en15155353
Submission received: 17 June 2022 / Revised: 18 July 2022 / Accepted: 20 July 2022 / Published: 23 July 2022

Abstract

:
This paper studies secure consensus control for multi-agent systems subject to denial-of-service (DoS) attacks. The DoS attacks cause changes in topologies, which will destroy the channels of communication and result in network paralysis. Unlike the existing publications with Markov switching, this paper mainly studies the topological structure changes of the subsystem models after DoS attacks. To ensure the consensus of systems, this paper designs an event triggered to reduce the use of the controller and decrease the influence of channel breaks off caused by DoS attacks. On this basis, different Lyapunov functions are established in each period of attack. Then, stochastic and Lyapunov stable theory is used to form the consensus criteria. Moreover, Zeno behavior is excluded by theoretical analysis. Finally, the simulation experiment proves the effectiveness of the proposed protocol.

1. Introduction

In recent years, multi-agent systems have attracted increasing attention from researchers because they are widely applied to UAV (Unmanned Aerial Vehicle) formation control [1], robot cooperative control [2], smart grid power allocation [3], and so on. One of the instrumental research directions for multi-agent systems is to design coordinated strategies, which describe the micro-communication among agents. There are many methods of study for multi-agent systems consensus, such as impulsive control [4], event-triggered control [5], model predictive control [6], integral sliding-mode control [7], model-free optimal control [8], and so on. However, the collaborative process is highly dependent on the channel.
In fact, due to the simple structure of agents, it is impossible to load complex protection protocols when communicating. Thus, multi-agent systems are easy to attack via DoS attacks [9,10], deception attacks [11], replay attacks [12], etc. Among these attacks, the DoS attacks do great damage to coordinations in multi-agent systems because they break off the channels and prevent information exchange between agents. Therefore, secure consensus for multi-agent systems under attacks has obtained more interest from investigators.
In [13], the authors used the random disturbance information and, considering the packet loss caused by DoS attacks, designed an observer to reconstruct the state of agents. The coupling probability constraint is transformed into the coupling deterministic constraint to resist the DoS attacks. In [14], a secure strategy was proposed to ensure the acceptable operation of multi-agent systems in the environment of DoS attacks. In [15], for attackers attacking different channels, a distributed controller was designed, and the authors considered the state feedback and observer controller so that consensus could still be reached in the environment of DoS attacks. For multi-agent systems in the presence of DoS attacks, the above paper [13,14,15,16] used different control strategies can achieve the goal of multi-agent consensus control. However, when systems are subject to attack, communication resources are restricted. To deal with it, in [17,18,19,20,21] event-triggered strategies were proposed to reduce the use of the controller and decrease the influence of channel break off caused by DoS attacks. In [17], researchers used the distributed sliding mode control method to study the control problem of a nonlinear second-order multi-agent system. In [19], the event-triggered distributed state estimation problem for linear multi-agent systems under DoS attacks was studied. In [20], a distributed event-triggered condition was designed to keep the whole system consistent in the case of multiple communication channel outages caused by irregular DoS attacks.
The above works assume the DoS attacks only destroy the local channels or the global channels when attacked. In fact, the topology of multi-agent systems tends to change because communications are interrupted. To cope with this problem, a switched system model was introduced in reference [22] to deal with changes caused by DoS attacks, and the quantitative relation between consensus performance and attack parameters was established. In [23], the secure consensus problem of multi-agent systems under DoS attacks on the communication topology was studied. The switched systems are usually composed of some subsystem models. The Markovian process has been proved to be effective for describing switching rules caused by the sudden change from the outer environment, topology switching and man-made intervention. In order to describe the process of topology random switching in multi-agent systems, paper [24,25] used the Markov process to establish a topological switching model. In the process of topology switching at present, the transition rates of model changes of different subsystems were given partially or even completely [26,27].
Nevertheless, there are a few works that consider the impact of each possible topology governed by the Markovian process. In fact, DoS attacks may cause the original possible topology to change, and cannot be ignored. Wang et al. [28] considered the impact of the attacks on the topology, but the controller was based on a continuous-time design, and did not consider the DoS attack energy-limited analysis. Moreover, due to the existence of external interference factors, the transition rates of each subsystem model switching are generally not accurate. In this case, the transition rates are deemed to be partly unknown or fully unknown. Meanwhile, DoS attacks cause changes to the possible topologies in the next switched period.
Motivated by the discussions above, we focus on the problem of leader-following multi-agent systems. This paper adopts an event-triggered strategy to control the consensus of multi-agent systems affected by DoS attacks during Markovian switching topologies. The main innovation points of this paper are as follows.
(1)
Different from the topology switching process in reference [20], this paper uses the Markov process to establish the topological switching process. We study the consensus of the topology in the random switching process under the DoS attack. Compared with reference [20], this paper also needs to analyze the random process, so the theoretical analysis process is more complex.
(2)
In order to describe the issue of energy-limited DoS attack, the DoS attack suffered by the multi-agent systems is further analyzed and the upper limit of DoS attack intensity is given, which will be more in line with practical application scenarios.
(3)
Because of the influence of the DoS attacks, the channels between agents will be interrupted. After each attack, the controller of the system will be updated after the communication recovery. Therefore, with the premise of ensuring the secure consensus of the multi-agent systems, an event-triggered control is designed based on stochastic process analysis, a recursive method, and an inequality method to reduce the use of the controller.
The structure of this paper is as follows: Section 2 introduces some preliminary knowledge, algebraic graph theory, the Markovian switching process, and control objectives. In Section 3, a security control scheme based on event triggering is proposed. In Section 4, the stability analysis is carried out. Section 5 gives a numerical example and Section 6 gives a conclusion.

2. Preliminaries

2.1. Notations

In this paper, The notations R and N denote the sets of real and natural numbers, respectively. The notations R and R n × n denote the n-dimensional vector space and n × n matrix space, respectively. The notation I N represents an N × N -dimensional matrix in which each element is 1. The notations | | · | | and ⊗ represent the Euclidean norm and the Kronecker product, respectively. The notation C T is the transpose of a matrix C. Moreover, S = 1 , 2 , , s represents that the switching signal set is driven by a Markov chain. For two sets, D 1 and D 2 , D 1 \ D 2 denotes the set of elements belonging to D 1 , but not those belonging to D 2 .

2.2. Graph Theory

We consider an undirected graph G = ( V , E t , A ) , where V = v 1 , v 2 , , v N represents the vertex set of follower agent nodes and E t represents the set of edges in the graph. The notation E i , j represents the node pair ( v i , v j ) , where the node v j can receive the information sent by the node v i . The neighbor agent node set of the agent node v i is defined as N i = j V | v i , v j E t . The notation A = a i j R n × n is the adjacency matrix of a directed graph. In the matrix A , when E i , j i E t , there is a i j > 0 the weight of the edge E i , j ; otherwise a i j = 0 . The Laplacian matrix of the figure G is L i j = a i j or L = D A , where D = d i a g d 1 m , d n m represents a degree matrix, the notation m is a subsystem mode of multi-agent system in the Markov switching topology process. The adjacency matrix of leader and follower is B = d i a g b 1 m , b 2 m , b 3 m b n m . If the node v 0 can send information to the node v i , then b i > 0 ; otherwise, b i = 0 .

2.3. Markovian Switching Process

The Markovian switching topology is defined as G ¯ r t = V , E r t , A r t , where G ¯ r t G ¯ 1 , G ¯ 2 , G ¯ 3 , · · · , G ¯ s . The notation r t represents the Markovian jump process. For different switching topology sets G ¯ m m S , its adjacency matrix is A m and its Laplacian matrix is L m , as defined in the Graph theory. In the Markovian process, the transition probabilities of different subsystems are determined by the following equation:
P r ( t + Δ t ) = n | r ( t ) = m = π m n ( h ) h + o ( h ) , m n 1 + π m n ( h ) h + o ( h ) , o t h e r w i s e
where lim h 0 o h h = 0 , o h is the little o notation and π m n h represents the transfer rate between different elements m to elements n in the set S from time t to time t + h and π m n h > 0 . Apart from this, the transition rates matrix composed of the transfer rates of different elements is expressed as follows, and the set of transition rates is defined as S.
= π 11 h π 12 h π 13 h π 1 s h π 21 h π 22 h π 23 h π 2 s h π 31 h π 32 h π 33 h π 3 s h π s 1 h π s 2 h π s 3 h π s s h

2.4. DoS Attack Model

DoS attack is a common cyber attack, which can directly attack the network communication channels. In this paper, we consider that the communication channels between agents are attacked, resulting in communication interruption between two adjacent agents, leaving them unable to transmit information. Without generality, the DoS attack is an energy-limited attack and a random discontinuous attack. Moreover, the DoS attacks are irregular, so intervals that systems suffer from are uncertain, and the whole attack process is random. Therefore, this increases the difficulty of establishing the consensus convergence criteria for this modeled multi-agent system.
Throughout this paper, the DoS attacks can be divided into two phases: one is the system suffered by DoS attacks, while the other is not. In this paper, t ^ k k N is defined as the attack time sequence of the DoS attacks, which means the kth DoS attack time and Δ k is the duration of the kth DoS attack. This time is not fixed and there is no distribution law. For the entire multi-agent systems that suffered every DoS attack, this paper defines Ω k = [ t ^ k , T ^ k ) to represent the attack interval of the kth DoS attack, where T ^ k = t ^ k + Δ k represents the end of the kth DoS attack. Ψ k = [ T ^ k , t ^ k + 1 ) is defined as the period from the end of the kth attack to the beginning of the k + 1 th attack without DoS attack, as shown in Figure 1.
Assumption 1
([21]). DoS attacks are assumed to have limited energy.
When the channel between agents is attacked, the total length of time Ξ 0 t 0 , t that agents cannot communicate is:
Ξ 0 t 0 , t = Ω k t 0 , t .
The system is not attacked, and the normal communication interval Ξ 1 t 0 , t between agents is defined as:
Ξ 1 t 0 , t = Ψ k t 0 , t = t 0 , t \ Ξ 0 t 0 , t .
Definition 1
([29]). N k ( t 0 , t ) represents the number of attacks on the entire multi-agent systems in ( t 0 , t ) , so the corresponding attack frequency Γ t 0 , t is defined as:
Γ t 0 , t = N k ( t 0 , t ) t t 0 .
Definition 2
([30]). The attack length rate is the total attack time Ξ 0 ( t 0 , t ) to the total system operation time ( t 0 , t ) so the corresponding length rate ς is defined as:
ς = Ξ 0 ( t 0 , t ) t t 0 .

3. Problem Formulation

The multi-agent systems considered in this paper include a leader agent and N follower agents. The dynamic model for the i-follower agent in the system is defined as
x ˙ i t = A x i t + B u i t , i = 1 , 2 , 3 , 4 , N ,
where x i ( t ) R n represents the state value of the i follower agent and u i t R n stands for the control input of the i follower agent. The notations A and B are the constant matrices with approximate dimensions, respectively. Assume that the pair (A, B) is stabilizable. The leader agent is defined as x 0 and its dynamic model is defined as:
x 0 ˙ t = A x 0 t .
For multi-agent systems with Markovian switching topology under DoS attacks, to reduce the consumption of communication resources between agents and maintain the good consensus effect of multi-agent systems, a distributed event-triggered control is used for consensus control. The controller is designed as
u i t = K r t y i t k i , t t k i , t k + 1 i ,
where t k i k = 1 , 2 , 3 , , k represents the triggering time sequence. The event trigger time is defined as t k + 1 i = inf t > t k i | f i ( t ) 0 , where f i ( t ) is the event trigger function. At the triggering instants, the agent i can sample the information of its neighbors to update its control protocol u i t . The notation K r t denotes the feedback control gain, y i ( t ) = j = 1 N a i j r t x j t x i t + b 0 i r t x 0 t x i t . The notation a i j r t represents the coupling weight value between agent i and j. If the two agents can establish communication exchange information, a i j r t > 0 ; otherwise, a i j r t = 0 . The notation b 0 i r t represents the coupling weight value between the agent i and the leader. If they can communicate, then b 0 i r t > 0 , otherwise, b 0 i r t = 0 .
For DoS attacks, the above assumption 1 indicates that the attacks are energy-limited, and do not always attack the channel, and they are intermittent. When the attacks work, the communication channel between the agents will be interrupted. Then, the agents cannot communicate normally. Moreover, the topology of the multi-agent systems will change. When the attacks stop, the channel will recover. In other words, only within attack time Ω k = [ t ^ k , t ^ k + Δ k ) will the topology of the subsystems change.
Remark 1.
In Ω k = [ t ^ k , t ^ k + Δ k ) , the communication channel of the agent is attacked, then the communication channel is interrupted, which means the information of the agent i and their neighbor, which cannot change adjacent to the agent, will not be collected. The worst case scenario is that the channels of agent i are all interrupted, in which case the agent i will not communicate with all of its neighbors, now u i t = 0 .
Through the above discussion, the control protocol is designed as
u i t = K r t y i t k i , t t ^ k 1 + Δ k 1 , t ^ k 0 , t [ t ^ k , t ^ k + Δ k ) ,
When the DoS attacks disappear, the communication channel will recover and information can be transmitted among agents again. If the event trigger condition is satisfied, the control protocol will work.
In the case of limited system communication resources, the adoption of this protocol can not only reduce the consumption of a large number of communication resources between agents, but can also maintain the consensus of the entire system. The measurement error function for the agent i is defined as
e i t = y i t k i y i t , t t k i , t k + 1 i .
The state error of multi-agent systems is δ i t = x i t x 0 t . In the communication area Ψ k , we can get the equation:
δ ˙ i ( t ) = A δ i ( t ) + B K ( r ( t ) ) y i ( t ) + e i ( t ) , i = 1 , 2 N ,
According to the notation δ t = δ 1 T t , δ 2 T t , δ 3 T t , , δ N T t T , using Kronecker, we can get:
δ ˙ ( t ) = I N A H ( r ( t ) ) B K ( r ( t ) ) δ ( t ) + I N B K ( r ( t ) ) e ( t ) ,
when the system is affected by an attack, the following is available:
δ ˙ t = I N A δ t ,
where H r t = L r t + B r t , δ 0 = δ 1 T 0 , δ 2 T 0 , δ 3 T 0 , , δ N T 0 T .
Definition 3.
Under uncertain random switching topologies and DoS attacks, if the following inequalities are satisfied, the multi-agent systems based on Markovian switching can achieve mean-square consensus.
E δ i t 2 ω E δ i 0 2 e σ t , t 0 ,
where ω > 0 , σ > 0 represent two positive constants, respectively.
Lemma 1.
(Schur Complement) linear matrix inequality
D = D 11 D 12 D 21 D 22 < 0 ,
equal to one of the following conditions holding:
( i )
D 11 < 0 , D 22 D 12 T D 11 1 D 12 < 0 ,
( i i )
D 22 < 0 , D 11 D 12 D 22 1 D 12 T < 0 .

4. Results

In this section, we provide sufficient conditions for secure consensus with Markov switching topologies under DoS attacks.

4.1. Stability Analysis

Theorem 1.
The secure consensus of leader-following multi-agent systems can be achieved under the following triggering condition.
f i ( t ) = | | e i t | | β | | y i t | | ,
where β = θ i β ^ 2 Q r B B T Q r 2 N i + b 0 i r , β ^ > 0 , 0 < θ < 1 . Given the constants α 1 > 0 , α 2 > 0 , if there are matrices Q > 0 , Q r > 0 with appropriate dimensions, r = 1 , 2 , 3 s makes the following matrix inequalities hold:
A T Q r + Q r A 2 λ * Q r B B T Q r + β ^ I N < 0 ,
Q 1 A T α 2 Q 1 Q 1 Q A < 0 ,
Γ t 0 , t η * ln γ ,
ς α 1 η * α 1 + α 2 ,
where η * 0 , α 1 , γ > 0 , λ * = min r S λ min H r t . The definition of Γ t 0 , t , ς has been given in Definitions 2 and 3, respectively.
Proof of Theorem 1. 
Firstly, the following Lyapunov function is constructed:
V ( δ ( t ) , r ( t ) , t ) = δ T ( t ) ( I N Q r ) δ ( t ) , t [ t ^ k 1 + Δ k 1 , t ^ k ) , δ T ( t ) ( I N Q ) δ ( t ) , t [ t ^ k , t ^ k + Δ k ) .
For the agent in the normal communication region [ t ^ k 1 + Δ k 1 , t ^ k ) and each r t = r S , the infinitesimal operator of the Lyapunov function is defined as:
V δ t , r ( t ) , t = lim Δ 0 + 1 Δ E V δ t + Δ t , r ( t + Δ t ) , t + Δ t V δ t , r ( t ) , t .
Using full probability formulas and conditional expectations:
V δ t , r , t = n = 1 s π r q h δ T t I N Q q δ t + 2 δ T t I N Q r δ ˙ t .
Similar to the calculation of Markov process in [31], we can get
n = 1 s π r q h δ T t ( I N Q q ) δ t = 0 ,
where Q q , q S . Taking the expected values on both sides of Equation (18) above, the following equation can be obtained:
( δ ( t ) , r , t ) = δ T ( t ) I N A T Q r + Q r A 2 H r Q r B B T Q r δ ( t ) + 2 δ T ( t ) I N Q r B B T Q r e ( t ) δ ^ T ( t ) I N A T Q r + Q r A 2 λ min H r Q r B B T Q r δ ^ ( t ) + 2 δ ^ T ( t ) I N Q r B B T Q r e ^ ( t ) i = 1 N δ ^ i T t A T Q r + Q r A 2 λ min H r Q r B B T Q r δ ^ i ( t ) + 2 i = 1 N δ ^ i T t Q r B B T Q r e ^ i ( t ) .
For the derivation of the above process, the same treatment method is adopted as in paper [21]. We adopt an orthogonal matrix W, such that δ ^ ( t ) = W I n δ ( t ) and e ^ ( t ) = W I n e ( t ) , where W T W = I N . Obviously, W T H W = diag λ min ( H ) , , λ max ( H ) , where i = 1 N δ ^ T ( t ) δ ^ ( t ) = i = 1 N δ T ( t ) δ ( t ) . The minimum eigenvalue of H r t is λ * = min r S λ min H r t in the whole Markov process. From Equation (12), we can get
( δ ( t ) , r , t ) β ^ i = 1 N δ i ( t ) 2 + 2 i = 1 N δ i ( t ) Q r B B T Q r e i ( t ) .
Notice that, according to the event trigger condition, one has
e i ( t ) β y i ( t ) = β j = 1 N a i j r x j t x i t + b 0 j r x 0 t x i t β j = 1 N a i j r x j t x i t + β b 0 j r x 0 t x i t β j = 1 N a i j r δ j t δ i t + β b 0 j r δ i t 2 β N i j N i δ i t + β b 0 j r δ i t = δ i t β 2 j N i N i + b 0 j r .
Substituting (22) into (21), it yields
( δ ( t ) , r , t ) β ^ i = 1 N δ i ( t ) 2 + 2 i = 1 N δ i ( t ) Q r B B T Q r e i ( t ) β ^ i = 1 N δ i ( t ) 2 + Q r B B T Q r 2 β i = 1 N δ i ( t ) 2 2 j N i N i + b 0 i r β ^ 1 θ i i = 1 N δ i ( t ) 2 α r V ( δ ( t ) , r ( t ) , t ) ,
where α r = β ^ 1 θ λ min Q r , θ ( 0 , 1 ) . The notation N i is the cardinality of the set N i . It is obvious that V ˙ ( δ ( t ) , r ( t ) , t ) < 0 and V ( δ ( t ) , r ( t ) , t ) > 0 in the area Ψ k . For the Markov process, combined with Equation (25), the following equation can be derived.
E { V ( δ ( t ) , r , t ) } α 1 E { V ( δ ( t ) , r ( t ) , t ) } , t t ^ k 1 + Δ k 1 , t ^ k .
The same analysis method is used to analyze the DoS attacks process. In the Ω k region, due to the attacks on the communication channels between agents, the information transmission between agents cannot be carried out, so some topological structures will change at this time. Therefore, the following equation can be obtained:
V δ t , r , t = 2 δ T t { ( I N Q ) { I N A } δ t δ T t { I N ( Q A + A T Q ) δ t .
According to Equation (13), the following formula will hold:
E { V ( δ ( t ) , r , t ) } α 2 E { V ( δ ( t ) , r ( t ) , t ) } , t [ t ^ k , t ^ k + Δ k ) .
According to Comparison Lemma, the whole process can be summarized as follows.
E V δ t , r , t e α 1 ( t T ^ k 1 ) E V a δ t , r ( t ) , t , t [ t ^ k 1 + Δ k 1 , t ^ k ) e α 2 ( t t ^ k ) E V b δ t , r ( t ) , t , t [ t ^ k , t ^ k + Δ k ) .
Here, we define E V t = E V δ t , r ( t ) , t to continue the analysis. In [ t ^ k 1 + Δ k 1 , t ^ k )
E V t e α 1 ( t t ^ k 1 Δ k 1 ) E V a t ^ k 1 + Δ k 1 γ e α 1 ( t t ^ k 1 Δ k 1 ) E V b t ^ k 1 + Δ k 1 γ k e α 1 Ξ 1 t 0 , t e α 2 Ξ 0 t 0 , t E V a t 0 .
If t [ t ^ k , t ^ k + Δ k ) , then
E V t e α 2 ( t t ^ k ) E V b t ^ k γ e α 2 ( t t ^ k ) E V a t ^ k γ k + 1 e α 1 Ξ 1 t 0 , t e α 2 Ξ 0 t 0 , t E V a t 0 ,
where γ = max λ max Q r t λ min Q , λ max Q λ min Q r t . According to Definition 2, we can get
E V t γ N k t 0 , t e α 1 Ξ 1 t 0 , t e α 2 Ξ 0 t 0 , t E V t 0 = γ N k t 0 , t e α 1 t t 0 Ξ 0 t 0 , t e α 2 Ξ 0 t 0 , t E V t 0 = e N k t 0 , t ln γ e α 1 t t 0 + Ξ 0 t 0 , t α 1 + α 2 E V t 0 = e N k t 0 , t ln γ e α 1 t t 0 + α 1 + α 2 ς t t 0 E V t 0 = e N k t 0 , t ln γ e α 1 + α 2 ς α 1 t t 0 E V t 0 .
Based on Equations (14) and (15), Equation (30) can be written as
E V t e η * t t 0 e α 1 + α 2 ς α 1 t t 0 E V t 0 = e α 1 + α 2 ς α 1 + η * t t 0 E V t 0 e η 1 t t 0 E V t 0 ,
where η 1 = α 1 α 1 + α 2 ς η * > 0 and η * 0 , α 1 . In conclusion, we can get E δ t 2 E V 0 . This means that the multi-agent systems secure consensus under mean-square consensus is proved. This completes the proof. □
Remark 2.
Since each DoS attack occurs in a random discontinuity when the entire system is running, it is necessary to use the induction method to analyze the whole process. If the stability condition of the entire system in the DoS attacks environment is to be obtained, this is similar to most previous literature processing, such as [21].

4.2. Elimination of Zeno’s Behavior

Next, we will show that in the context of this article, the Zeno behavior does not exist. If the Zeno behavior does not exist, then the minimum event interval between the two adjacent event trigger times will be greater than zero, as expressed in the formula: T ^ a = inf { t k i t k 1 i } > 0 .
Proof . 
Firstly, region Ξ 1 t 0 , t is analyzed. The proved method is similar to [21,31]. When t t ^ k + Δ k , t ^ k + 1 the derivation of the measurement error function e i ( t ) of the formula is: When t [ t ^ k + Δ k , t ^ k + 1 ) , the derivation of the measurement error function e i t of the formula is
d d t e i t j N i N a i j r t x ˙ i t x ˙ j t + b 0 i r t x ˙ i t x ˙ 0 t A j N i a i j r t x i t x j t + B j N i a i j r t u i t u j t + b 0 i r t A x i t + B u i t A x 0 t A j N i a i j r t x i t x j t + B j N i a i j r t u i t u j t + b 0 i r t A x i t A x 0 t + B u i t A y i t k i e i t + B j N i a i j r t u i t u j t + B b 0 i r t u i t A e i t + A y i t k i + B j N i a i j r t u i t u j t + B b 0 i r t u i t A e i t + Z i t k i ,
where Z i t k i = A y i t k i + B j N i a i j r t u i t u j t + B b 0 i r t u i t m a x let Γ i = e i t . The Equation (22) can be rewritten as:
d d t e i t = A Γ i + Z i t k i .
In the t k + 1 i = inf t > t k i | f i ( t ) 0 , the sufficient condition for the triggering condition is considered as follows:
Γ i = e i t β 1 + β y i t k i
when the event is triggered, considering y i t k i > 0 condition. Then, by adopting similar method in [32], there is a link φ i t k i y i t k i > 0 . So Γ i β 1 + β φ i t k i . If T ^ a = t k + 1 i t k i , we will get:
T ^ a = t k + 1 i t k i T i β 1 + β φ i t k i A β 1 + β φ i t k i + Z i t k i .
This set is non-empty and T a = inf { t k + 1 i t k i } > 0 , so in the normal communication region, the Zeno behavior will not occur. When the system is in DoS attack range Ξ 0 t 0 , t , it can be seen that the event trigger function will not be triggered. At this time, the Zeno behavior can be excluded. □
Remark 3.
Compared with the existing literature, this article has the following advantages: (i) It considers more complex communication topology, and therefore will be more general than Yang et al. [20], Xu et al. [21]; (ii) it clears the upper limit of DoS attacks, which will be more suitable for the application scenarios in real life compared with the research contents of Yang et al. [20], Wang et al. and other literature; (iii) it saves system control resources. Compared with the research work of Wang et al. [28], unnecessary waste of communication resources can be avoided and control efficiency can be improved.

5. Numerical Simulations

This section will give a simulation experiment to verify the effectiveness of the algorithm. Figure 2 is leader–follower system (1) and (2) as a system with one leader and three followers, where A = 0 1 2 1 , B = 1 0 0 2 . The topological structure corresponding to the DoS attacks is shown in Figure 3. The corresponding H matrices are given as follows:
H ( 1 ) = 3 1 1 1 3 1 1 1 3 , H ( 2 ) = 2 1 0 1 3 1 0 1 2 , H ( 3 ) = 1 0 0 0 2 1 0 1 2 .
Let β ^ = 0.15 , θ = 0.9 . The feedback gain matrix for different topologies K ( 1 ) , K ( 2 ) and K ( 3 ) are
K ( 1 ) = 0.8538 0.0402 0.0804 0.6214 , K ( 2 ) = 0.7538 0.0401 0.0802 0.5814 , K ( 3 ) = 0.6339 0.0401 0.0802 0.5620 .
The transmission probability matrix is chosen to be π r q = 1 0.5 0.5 0.2 1 0.8 0.7 0.3 1 . Suppose that the initial distribution of the Markov process obeys an invariant distribution π ¯ 1 = 0 . 5 ,   π ¯ 2 = 0 . 3 and π ¯ 3 = 0 . 2 . Choose λ min Q = 0 . 8557 , λ max Q = 2 . 0728 , λ min Q r t = 0 . 2765 ,   λ max Q r t = 0 . 8568 ,   γ = 7.4966 ,   α 1 = 0.0151 , α 2 = 1 . 46 , η * = 0.015 . Figure 4 shows the state error value of the agent. It is not difficult to see from Figure 5 that it exhibits the triggering instants for three agents. Figure 6 depicts the time period during which DoS emerges in multi-agent systems, and Figure 7 is the Markovian jump process, respectively.

6. Conclusions

In this paper, we mainly studied the secure consensus control of the multi-agent systems with Markovian switching systems under DoS attack. We used an event-trigger strategy to control the consensus of the leader–follower system. Unlike fixed topology, the topology was controlled by the Markov switching process. Moreover, we considered that DoS attacks cause changes in communication topologies, which lead to network paralysis. We used the stochastic technique, induction, Lyapunov functional protocol, and other related knowledge to design the mean square consensus condition to ensure that the system could reach a stable state. Finally, we used a simulation experiment to prove the validity of the proposed model. Further research works will consider the problem of communication delay in the topology switching process under DoS attacks.

Author Contributions

Conceptualization, H.L. and X.W.; methodology, H.L.; formal analysis, S.T.; investigation, S.T.; resources, Q.H.; data curation, S.T.; writing—original draft preparation, S.T.; visualization, S.T.; supervision, Q.H.; funding acquisition, Y.T. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China (61773321, 62173278), in part by the Science and Technology Research Program of Chongqing Municipal Education Commission in China (KJZD-K201901504, KJQN201901537 and KJZD-K202100104), in part by Natural Science Foundation of Chongqing (cstc2021jcyj-msxmX1212, cstc2021jcyj-msxmX0146), in part by the West Light Foundation of the Chinese Academy of Science, in part by the Open Foundation of Chongqing University of Science and Technology No. cqsrc202110, and in part by Bingtuan Science and Technology Program in China (No. 2021AB026).

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Acknowledgments

The authors wishe to thank the reviewers for their precious reviews.

Conflicts of Interest

The authors have no conflict of interest to declare.

References

  1. Zhou, Z.; Wang, H.; Wang, Y.; Xue, X.; Zhang, M. Distributed Formation Control for Multiple Quadrotor UAVs under Markovian Switching Topologies with Partially Unknown Transition Rates. J. Frankl. Inst. 2019, 356, 5706–5728. [Google Scholar] [CrossRef]
  2. Dong, X.; Yuan, C.; Stegagno, P.; Zeng, W.; Wang, C. Composite cooperative synchronization and decentralized learning of multi-robot manipulators with heterogeneous nonlinear uncertain dynamics. J. Frankl. Inst. 2019, 356, 5049–5072. [Google Scholar] [CrossRef]
  3. Guo, F.; Xu, Q.; Wen, C.; Wang, L.; Wang, P. Distributed secondary control for power allocation and voltage restoration in islanded DC microgrids. IEEE Trans. Sustain. Energy 2018, 9, 1857–1869. [Google Scholar] [CrossRef]
  4. Han, J.; Zhang, H.; Liang, X.; Wang, R. Distributed impulsive control for heterogeneous multi-agent systems based on event-triggered scheme. J. Frankl. Inst. 2019, 356, 9972–9991. [Google Scholar] [CrossRef]
  5. Sun, Y.; Shi, P.; Lim, C. Event-triggered sliding mode scaled consensus control for multi-agent systems. J. Frankl. Inst. 2022, 359, 981–998. [Google Scholar] [CrossRef]
  6. Dai, L.; Cao, Q.; Xia, Y.; Gao, Y. Distributed MPC for formation of multi-agent systems with collision avoidance and obstacle avoidance. J. Frankl. Inst. 2017, 354, 2068–2085. [Google Scholar] [CrossRef]
  7. Yang, Y.; Liu, F.; Yang, H.; Yuling, L.; Liu, Y. Distributed Finite-Time Integral Sliding-Mode Control for Multi-Agent Systems with Multiple Disturbances Based on Nonlinear Disturbance Observers. J. Syst. Sci. Complex. 2021, 34, 995–1013. [Google Scholar] [CrossRef]
  8. Jing, G.; Bai, H.; George, J.; Chakrabortty, A. Model-Free Optimal Control of Linear Multi-Agent Systems via Decomposition and Hierarchical Approximation. IEEE Trans. Control Netw. Syst. 2021, 8, 1069–1081. [Google Scholar] [CrossRef]
  9. Ni, H.; Xu, Z.; Cheng, J.; Zhang, D. Robust Stochastic Sampled-data-based Output Consensus of Heterogeneous Multi-agent Systems Subject to Random DoS Attack: A Markovian Jumping System Approach. Int. J. Control Autom. Syst. 2019, 17, 1687–1698. [Google Scholar] [CrossRef]
  10. Cheng, Z.; Yue, D.; Hu, S.; Ge, H.; Chen, L. Distributed event-triggered consensus of multi-agent systems under periodic DoS jamming attacks. Neurocomputing 2020, 400, 458–466. [Google Scholar] [CrossRef]
  11. He, W.; Mo, Z.; Han, Q.L.; Qian, F. Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks. IEEE/CAA J. Autom. Sin. 2020, 5, 1326–1334. [Google Scholar] [CrossRef]
  12. Arafa, M.; Tahoun, A. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. ISA Trans. 2021, 110, 1–14. [Google Scholar]
  13. Yang, Y.; Li, Y.; Xia, Y. MPC-based defense strategy for distributed networked control systems under DoS attacks. Syst. Control Lett. 2019, 128, 9–18. [Google Scholar] [CrossRef]
  14. Amullen, E.M.; Shetty, S.; Keel, L.H. Secured Formation Control for Multi-agent Systems Under DoS Attacks. In Proceedings of the 2016 IEEE Symposium on Technologies for Homeland Security (HST), Waltham, MA, USA, 10–11 May 2016; pp. 1–6. [Google Scholar]
  15. Lu, A.; Yang, G. Distributed Consensus Control for Multi-Agent Systems under Denial-of-Service. Inf. Sci. 2018, 439, 95–107. [Google Scholar] [CrossRef]
  16. Guo, X.; Liu, P.; Wang, J. Event-Triggered Adaptive Fault-Tolerant Pinning Control for Cluster Consensus of Heterogeneous Nonlinear Multi-Agent Systems Under Aperiodic DoS Attacks. IEEE Trans. Netw. Sci. Eng. 2021, 2, 1941–1956. [Google Scholar] [CrossRef]
  17. Yao, D.; Li, H.; Lu, R.; Shi, Y. Distributed Sliding-Mode Tracking Control of Second-Order Nonlinear Multiagent Systems: An Event-Triggered Approach. IEEE Trans. Cybern. 2020, 9, 3892–3902. [Google Scholar] [CrossRef]
  18. Zha, L.; Liu, J.; Cao, J. Resilient event-triggered consensus control for nonlinear muti-agent systems with DoS attacks. J. Frankl. Inst. 2019, 356, 7071–7090. [Google Scholar] [CrossRef]
  19. Sun, Y.; Yang, G. Event-Triggered Distributed State Estimation for Multiagent Systems Under DoS Attacks. IEEE Trans. Cybern. 2020, 99, 6901–6910. [Google Scholar] [CrossRef]
  20. Yang, Y.; Li, Y.; Yue, D. Event-trigger-based consensus secure control of linear multi-agent systems under DoS attacks over multiple transmission channels. Inf. Sci. 2020, 5, 105–118. [Google Scholar] [CrossRef]
  21. Xu, Y.; Fang, M.; Shi, P.; Wu, Z.G. Event-Based Secure Consensus of Mutiagent Systems Against DoS Attacks. IEEE Trans. Cybern. 2020, 8, 3468–3476. [Google Scholar] [CrossRef]
  22. Zhang, D.; Feng, G. A New Switched System Approach to Leader-Follower Consensus of Heterogeneous Linear Multiagent Systems With DoS Attack. IEEE Trans. Syst. 2021, 2, 1258–1266. [Google Scholar] [CrossRef]
  23. Zhu, J.; Liang, C.Y.; He, D.F.; Wang, X. A Novel Intermediate Estimator Based Secure Consensus Control for Multi-agent Systems with Application to Networked Multi-axis Motion Synchronization. Int. J. Control Autom. Syst. 2021, 4, 1470–1479. [Google Scholar] [CrossRef]
  24. Dai, J.; Guo, G. Exponential consensus of non-linear multi agent systems with semi-Markov switching topologies. IET Control Theory Appl. 2017, 18, 3363–3371. [Google Scholar] [CrossRef]
  25. Dai, J.; Guo, G. Event-based consensus for second-order multi-agent systems with actuator saturation under fixed and Markovian switching topologies. J. Frankl.-Inst.-Eng. Appl. Math. 2017, 14, 6098–6118. [Google Scholar] [CrossRef]
  26. Hu, Z.; Mu, X. Stabilization for switched stochastic systems with semi-Markovian switching signals and actuator saturation. Inf. Sci. 2019, 483, 419–431. [Google Scholar] [CrossRef]
  27. Wu, X.; Mu, X. Event-triggered control for networked nonlinear semi-Markovian jump systems with randomly occurring uncertainties and transmission delay. Inf. Sci. 2019, 487, 84–96. [Google Scholar] [CrossRef]
  28. Wang, X.; Yang, H.; Zhong, S. Improved results on consensus of nonlinear MASs with nonhomogeneous Markov switching topologies and DoS cyber attacks. J. Frankl.-Inst.-Eng. Appl. Math. 2021, 14, 7237–7253. [Google Scholar] [CrossRef]
  29. Dong, T.; Gong, Y. Leader-following secure consensus for second-order multi-agent systems with nonlinear dynamics and event-triggered control strategy under DoS attack. Neurocomputing 2019, 416, 95–102. [Google Scholar] [CrossRef]
  30. Zhi, F.; Wen, G.H.; Hu, G.Q. Distributed secure coordinated control for multiagent systems under strategic attacks. IEEE Trans. Cybern. 2017, 47, 1273–1284. [Google Scholar]
  31. Liu, Q.; Wang, Z.; He, X.; Zhou, D. Event-based Distributed Filtering over Markovian Switching Topologies. IEEE Trans. Autom. Control 2018, 64, 1595–1602. [Google Scholar] [CrossRef] [Green Version]
  32. Hu, W.; Liu, L. Cooperative output regulation of heterogeneous linear multi-agent systems by event-triggered control. IEEE Trans. Cybern. 2017, 47, 105–116. [Google Scholar] [CrossRef] [PubMed]
Figure 1. DoS attack model.
Figure 1. DoS attack model.
Energies 15 05353 g001
Figure 2. The communication network among agents.
Figure 2. The communication network among agents.
Energies 15 05353 g002
Figure 3. The communication network among agents under DoS attacks.
Figure 3. The communication network among agents under DoS attacks.
Energies 15 05353 g003
Figure 4. State error between agents.
Figure 4. State error between agents.
Energies 15 05353 g004
Figure 5. Triggering instants for three agents.
Figure 5. Triggering instants for three agents.
Energies 15 05353 g005
Figure 6. DoS attack sequence diagram.
Figure 6. DoS attack sequence diagram.
Energies 15 05353 g006
Figure 7. Markovian change process.
Figure 7. Markovian change process.
Energies 15 05353 g007
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Tian, Y.; Tian, S.; Li, H.; Han, Q.; Wang, X. Event-Triggered Security Consensus for Multi-Agent Systems with Markov Switching Topologies under DoS Attacks. Energies 2022, 15, 5353. https://doi.org/10.3390/en15155353

AMA Style

Tian Y, Tian S, Li H, Han Q, Wang X. Event-Triggered Security Consensus for Multi-Agent Systems with Markov Switching Topologies under DoS Attacks. Energies. 2022; 15(15):5353. https://doi.org/10.3390/en15155353

Chicago/Turabian Style

Tian, Yuan, Sheng Tian, Huaqing Li, Qi Han, and Xiaonan Wang. 2022. "Event-Triggered Security Consensus for Multi-Agent Systems with Markov Switching Topologies under DoS Attacks" Energies 15, no. 15: 5353. https://doi.org/10.3390/en15155353

APA Style

Tian, Y., Tian, S., Li, H., Han, Q., & Wang, X. (2022). Event-Triggered Security Consensus for Multi-Agent Systems with Markov Switching Topologies under DoS Attacks. Energies, 15(15), 5353. https://doi.org/10.3390/en15155353

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop