Next Article in Journal
Thermal Onsets of Viscous Dissipation for Radiative Mixed Convective Flow of Jeffery Nanofluid across a Wedge
Previous Article in Journal
On Laplacian Energy of r-Uniform Hypergraphs
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Containment Control Problem of Linear Multiagent Systems with External Disturbance and DoS Attacks

1
Institute of Information Technology, Wenzhou Polytechnic, Wenzhou 325035, China
2
Institute of Intelligent Systems and Decision, Wenzhou University, Wenzhou 325027, China
*
Author to whom correspondence should be addressed.
Symmetry 2023, 15(2), 384; https://doi.org/10.3390/sym15020384
Submission received: 3 December 2022 / Revised: 14 January 2023 / Accepted: 28 January 2023 / Published: 1 February 2023
(This article belongs to the Section Mathematics)

Abstract

:
This work investigates the containment control for linear multiagent systems. We assume that the systems are subject to periodic energy-limited denial-of-service (DoS) attacks, which prevent agent-to-agent data transmission. It is assumed that the DoS attacks occur periodically based on the time sequence method. It is also assumed that some devices can be used to predict the duration of DoS attacks and uniform lower bound of communication areas. To achieve containment control, state and disturbance estimators are proposed for each following agent to estimate the relative state information. Under suitable conditions, the containment control problem can be solved with the designed controllers and observers. Finally, we provide a simulation result to confirm the theoretical analysis.

1. Introduction

In recent years, the challenge of coordinated control for multiagent systems has attracted significant research attention due to its several potential applications in spacecraft formation flying, sensor networks, cooperative surveillance, etc. As one of the many cooperation issues, consensus has received wide attention in the past decades. Current research on consensus can be roughly divided into two types, i.e., consensus without a leader [1,2] and consensus with one or multiple leaders. For a single leader case, the followers eventually converge to the state of the leader, a phenomenon called consensus tracking or leader-following consensus problem [3,4,5]. However, for multiple leaders, the followers eventually converge to a convex hull spanned by the leaders, called the containment control problem [6,7,8]. In [6], based on the output of adjacent agents, a distributed dynamic output feedback controller was developed to address the challenge of distributed containment control and provided a necessary and sufficient condition, which was only related to the spectral properties of the topology matrix. The problem of containment control laws was solved for both continuous-time and discrete-time cases in [7]. Considering the unknown leaders, two distributed control protocols based on state feedback and dynamic output feedback were locally designed, and the challenge of adaptive containment control for MASs was solved in [8].
Due to external disturbances, the consensus disturbance rejection problem has attracted substantial attention. In [9], two distributed protocols were designed for a Lipschitz multiagent system, i.e., one was to attain global consensus without external disturbances, whereas the other was to reach consensus with a guaranteed H performance. Considering the input delays and disturbances of the system, a controller based on a predictor and disturbance observer was designed for each follower [10]. Consensus could be achieved and all signals in the closed-loop dynamics were eventually and uniformly bounded with the designed distributed protocol. Wang analyzed the consensus disturbance rejection problem for multiple-input multiple-output (MIMO) linear MASs in [5], and consensus was achieved and the external disturbance was suppressed with suitable control parameters and a large average dwell time.
System security is an intriguing and important issue. Network security issues have been broadly studied over the past decade [11,12]. When a multiagent system is attacked, data exchange among agents is interrupted or destroyed, resulting in the instability of the entire system [13,14,15,16]. Generally, two types of attacks exist in a multiagent system, i.e., one is to attack the dynamic behavior (or closed-loop dynamics) of the agents, whereas the other is to attack the communication among the agents. Any attack will seriously influence the consensus properties of the whole system. The second case includes denial-of-service (DoS) attacks as in [13,14,15]. Considering channel interference by an energy-constrained attacker, optimal DoS attack schedules were constructed in [13] to maximize the expected average estimation error. To minimize unnecessary network traffic, Zha et al. proposed a distributed event-triggered secure consensus control for multiagent systems (MASs) subject to DoS attacks [14]. A secure consensus comprising two different measurements was proposed in [15]. The formation control problem for nonlinear multiagent systems (MASs) under DoS attacks was emphatically studied in [16], and the distributed hybrid event-triggering strategies (HETSs) could be applied to preserve formation control.
With this background, we explore the challenge of containment control for the multiagent system with external disturbances and DoS attacks. The contributions of this paper are summarized as follows: (1) The containment control problem of linear MASs with an external perturbation is considered, unlike [5], which only analyzed consensus tracking problems for linear MASs with deterministic disturbances. (2) Three observers are designed to solve the containment control problem, unlike [5,17], which assessed the consensus challenge in a secure network environment. This paper suggests that data exchange among agents is interrupted due to DoS attacks. Data interruption among agents affects the connectivity of the entire network. Therefore, the convergence of the system cannot be guaranteed. Therefore, we provide a summary based on [5] to expand its scope of application.
The subsequent sections are organized as follows. Section 2 introduces the relevant graph theory and the preliminary work. In Section 3, a containment control protocol based on three different observers, with or without attacks is proposed. Simulation examples are provided for the efficacy of the protocol in Section 4. Section 5 presents the conclusions and our future work.

2. Preliminaries and Problem Statement

Notations and Preliminary Results

The notations used in this paper are standard. R and C represent the real number set and complex number set, respectively. R m × n is the set of m × n real matrices. I represents an identity matrix with a compatible dimension. T ( o r H ) denotes transpose (conjugate transpose). d i a g ( g 1 , g 2 , , g n ) represents a diagonal matrix with diagonal elements g i ( i = 1 , 2 , , n ) . Provided that the matrix A has n real eigenvalues, the largest and smallest eigenvalues are denoted by λ m a x ( A ) and λ m i n ( A ) , respectively. For symmetric matrices A and B, A > ( ) B means that A B is positive (semi-)definite. The n × m -dimensional zero matrix is denoted by 0 n × m . denotes the Euclidean norm, and ⊗ denotes the Kronecker product.
For the multiagent systems, a weighted graph G = { V , ε , A } can be used to represent the interaction relationships among N + M agents, where V = { 1 , 2 , , N + M } is a node set, ε V × V represents an edge set, and an adjacency matrix is A = [ a i j ] R ( N + M ) × ( N + M ) . We assume that agents 1 to N and agents N + 1 to N + M are followers and leaders, respectively, and each follower has at least one neighbor, but the leaders have no neighbors. Of note, ( i , j ) ε indicates that agent j can obtain the information from agent i. The elements in A are non-negative, i.e., a i j > 0 if and only if ( i , j ) ε and a i j = 0 otherwise. At the same time, self-loops do not exist, i.e., a i i = 0 , i V . A directed path from agent i to agent j is a sequence of edges of the form ( v i , v p ) , ( v p , v q ) , , ( v r , v j ) . Here, D = d i a g ( d 1 , d 2 , , d N + M ) denotes a degree matrix, where d i = j = 1 N + M a i j . Then, the Laplacian matrix of graph G is defined as
L = L 1 L 2 0 M × N 0 M × M
where L 1 R N × N and L 2 R N × M .
Assumption 1.
For each follower, there is at least one leader that gives a directed path to the follower.
Lemma 1
([18]). If Assumption 1 holds, then all the eigenvalues of L 1 have positive real parts, each entry of L 1 1 L 2 is nonnegative, and the sum of elements in each row of L 1 1 L 2 is equal to one. Moreover, there exists a diagonal matrix ϕ = d i a g ( ϕ 1 , ϕ 2 , , ϕ N ) with ϕ i > 0 , i = 1 , 2 , , N such that ϕ L 1 + L 1 T ϕ > 0 N , where L 1 T ϕ = 1 N .
Obviously, there is ϕ ( L 1 + ϕ 1 L 1 T ϕ ) > 0 from the above Lemma 1 that is Ω = L 1 + ϕ 1 L 1 T ϕ > 0 . Then, there exists an orthogonal matrix U ¯ , such that U ¯ T Ω U ¯ = d i a g ( ρ 1 , ρ 2 , , ρ N ) . Therefore, we can let ρ 0 = m i n { ρ 1 , ρ 2 , , ρ N } , and clearly, ρ 0 > 0 .
Definition 1
([18]). A set C R N is convex if ( 1 λ ) x + λ y C , for any x , y C , and any λ [ 0 , 1 ] . For a finite set of points X = { x 1 , , x q } , it the convex hull is defined as C o ( X ) = { i = 1 q a i x i | x i X , a i R N , a i 0 , i = 1 q a i = 1 } .
Herein, we consider multiagent systems comprising N followers and M leaders. Let F = { 1 , 2 , , N } be the set of followers and L = { N + 1 , N + 2 , , N + M } be the set of leaders. Here, all followers are assumed homogeneous, and their dynamics are given by
x ˙ i ( t ) = A x i + B u i ( t ) + D d i ( t ) , y i ( t ) = C x i ( t ) , i F .
and the dynamics of the leaders are described by
x ˙ i ( t ) = A x i ( t ) , y i ( t ) = C x i ( t ) , i L
where x i ( t ) R n is the agent i’s state, u i ( t ) R p is the agent i’s control input and y i ( t ) R q is the agent i’s measured output. A, B, C, and D are system matrices with appropriate dimensions. d i ( t ) R r is the external disturbance, generated by a linear exogenous system with the form
d ˙ i ( t ) = S d i ( t ) , i F .
where S is a constant matrix.
Then, we address the containment control problem of multiagent systems (1) and (2), which are defined as follows.
Definition 2.
For multiagent systems (1) and (2), containment control is achieved if the state of all followers asymptotically converges to the convex hull composed by the leaders as time goes infinity. That is, lim t x i C o ( x j ) = 0 holds for all i F , j L .
We always assumed that the state of the agent was difficult to obtain and the output of the agent could be obtained directly. To achieve the control objective, the relative output information was used based on the design of the observers and controller. With the developed control laws, the final state of the followers should converge asymptotically to the convex combination formed by the leaders, and the external disturbances should be suppressed. To complete further research, the following results and assumptions are given first, which are used later.
Lemma 2
([19]). Let S be a symmetric matrix partitioned into the block form S = S 11 S 12 S 21 S 22 , where S 11 and S 22 are symmetric and square, respectively. Then, S < 0 if and only if
S 11 < 0 , S 22 S 21 S 11 1 S 12 < 0
or equivalently
S 22 < 0 , S 11 S 12 S 22 1 S 21 < 0
Lemma 3
([20]). Suppose that Ω R n × n is a Hermitian matrix, such that λ m i n ( Ω ) I Ω λ m a x ( Ω ) I , where λ m a x ( Ω ) , λ m i n ( Ω ) is, respectively, the maximum and minimum eigenvalue of Ω.
Lemma 4
([21]). Given a symmetric positive definite matrix P, the following inequality holds
2 x T y x T P x + y T P 1 y ,
where x , y R n and P is a positive matrix.
Assumption 2.
The exosystem matrix S has different eigenvalues and only an imaginary part, meanwhile ( S , D ) is observable.
Assumption 3.
The system matrix D for the disturbance in (1) satisfies the matching condition that there is a matrix E R p × r such that D = B E .
Assumption 4
([5]). The matrix triplet ( A , B , C ) meets
(i)
rank( C B ) = rank(B) = p,
(ii)
rank ( Ω ) = n + p , where Ω = s I A B C 0 , s C , R e ( s ) 0 .
Let ξ i ( t ) = j F L a i j ( t ) ( x i ( t ) x j ( t ) ) be a relative state vector, i F , where the weight a i j ( t ) is chosen as follows in our problem:
a i j ( t ) = α i j if agent i is connected to agent j 0 otherwise ,
where α i j > 0   ( i F , j F L ) is the connection weight constant between agent i and agent j. For the considered multiagent system, it was assumed that the interconnection topology switched in a finite possible directed graph. The set of all possible topology graphs was denoted as M ˜ = { G 1 , G 2 , , G M } , with index set P = { 1 , 2 , , M } . The switching signal σ : [ 0 , ) P was used to represent the index of the topology digraph, i.e., at each time t, the underlying graph was G σ ( t ) . Define
λ ¯ = max ( λ m a x ( L 1 i T L 1 i ) | i P )
Then, we introduced the error vector for the followers
ξ ( t ) = ( L 1 σ ( t ) I n ) x F + ( L 2 σ ( t ) I n ) x L .
in which
ξ ( t ) = ( ξ 1 T , ξ 2 T , , ξ N T ) T , x L = ( x N + 1 T ( t ) , x N + 2 T ( t ) , , x N + M T ( t ) ) T , x F = ( x 1 T ( t ) , x 2 T ( t ) , , x N T ( t ) ) T .
It can be seen from Lemma 1 that the containment can be realized if ξ ( t ) 0 , i.e., x F ( L 1 σ ( t ) 1 L 2 σ ( t ) I n ) x L , as t .

3. Main Results

Since we could not obtain the state of agent i directly, we could only use the output y i to design control protocols. In order to achieve the control objective, an observer (7) was adopted to estimate the relative state ξ i ( t ) by agent i
ξ ^ i ( t ) = ω i ( t ) H ( j F L a i j ( t ) ( y i ( t ) y j ( t ) ) ) ω ˙ i ( t ) = ( G A F C ) ω i ( t ) + ( F ( I + C H ) G A H ) ( j F L a i j ( t ) ( y i ( t ) y j ( t ) ) ) ,
where ω i ( t ) R n is the internal state, H = B [ ( C B ) T ( C B ) ] 1 ( C B ) T , G = I + H C , and F R n × q was chosen such that G A F C was stable.
Remark 1.
The first condition of Assumption 4 can ensure the existence of H and we can conclude that G B = 0 and G D = 0 . At the same time, the second condition of Assumption 4 can guarantee that the matrix pair ( G A , C ) is detectable, and that F exists. Therefore, there is a W > 0 n such that
( G A ) T W + W ( G A ) 2 C T C < 0 n × n .
Then, we can design F = W 1 C T . Moreover, ( A , B ) is controllable from the second condition of Assumption 4.
In this part, the following observer was constructed to recover x i
x ^ ˙ i = A x ^ i + B u i + D d ^ i τ 0 ( τ i + 1 ) R C ( δ i ξ ^ i ) τ ˙ i = ( δ i ξ ^ i ) T Γ ( δ i ξ ^ i )
where δ i ( t ) = j F L a i j ( t ) ( x ^ i ( t ) x ^ j ( t ) ) , Γ = P 1 , and τ 0 is a positive constant.
From (7) and (9), the disturbance observer was designed as
z ˙ i ( t ) = S z i ( t ) + ( S Q Q A ) ξ ^ i ( t ) Q B K δ i ( t ) , d ^ i ( t ) = z i ( t ) + Q ξ ^ i ( t ) ,
where d ^ i ( t ) is the state of the disturbance observer and z i ( t ) is the internal state of the disturbance observer, and the gain matrices Q and K are given later.
Then, the distributed dynamic adaptive feedback control was given with the form
u i = K x ^ i E d ^ i
The design objective of this paper was to construct suitable gain matrices K , R , and Q to achieve containment control with the proposed protocols.

3.1. Containment Control of MASs with Directed Communication Graph without Attacks

In this part, we give one theorem for solving the containment control problem of MASs (1) and (2) under a directed communication topology.
Theorem 1.
Consider the multiagent system (1) and (2) with exogenous disturbance systems (3). Suppose that Assumptions 1–4 are satisfied. Gain matrices K , R and Q can be chosen as K = α 1 B T P 1 , R = P 1 1 C T , Q = α 2 P 2 1 D T , where P 1 > 0 and P 2 > 0 satisfy (12)–(14)
A T P 1 + P 1 A P 1 B B T P 1 + I n I n
A T P 1 + P 1 A C T C + I n 0
S T P 2 + P 2 S D T D + I n < 0
with α 1 = 1 2 , α 2 > 0 . and the following conditions hold:
γ 1 τ 0 2 λ ¯ λ m a x ( C T C ) τ 0 ρ 0 2 1 1 + τ ˜ α 2 1 + γ 2 + 4 γ 1 λ ¯ τ 0 ρ 0 λ m i n ( C P 1 1 P 1 1 C T )
in which γ 1 and γ 2 are positive constant and τ ˜ = max ( τ 1 , τ 2 , , τ N ) . Then, the containment control of MASs (1) and (2) can be achieved via the control protocol (11).
Proof. 
For convenience, let d ^ ( t ) = [ d ^ 1 T ( t ) , d ^ 2 T ( t ) , , d ^ N T ( t ) ] T , d ( t ) = [ d 1 T ( t ) , d 2 T ( t ) , ,   d N T ( t ) ] T , ξ ^ ( t ) = [ ξ ^ 1 T ( t ) , ξ ^ 2 T ( t ) , , ξ ^ N T ( t ) ] T , and δ ( t ) = [ δ 1 T ( t ) , δ 2 T ( t ) , , δ N T ( t ) ] T . Then, we can obtain the following closed-loop error dynamics
ξ ˙ ( t ) = ( I N A ) ξ ( t ) + ( I N B K ) δ ( t ) ( L 1 σ ( t ) D ) d ˜ ( t ) ,
where d ˜ ( t ) = d ^ ( t ) d ( t ) , and x ^ F ( t ) = [ x ^ 1 T ( t ) , x ^ 2 T ( t ) , , x ^ N T ( t ) ] T .
By (7) and (11), we can get
ξ ^ ˙ ( t ) = ( I N A ) ξ ^ ( t ) + ( I N ( G A F C A ) ) ( ξ ^ ( t ) ξ ( t ) ) + ( I N B K ) δ ( t ) ( L 1 σ ( t ) D ) d ˜ ( t ) .
δ ˙ ( t ) = ( I N ( A + B K ) ) δ ( t ) τ 0 ( L 1 σ ( t ) ( τ + I N ) R C ) η .
where η ( t ) = δ ( t ) ξ ^ ( t ) .
Let ξ ˜ ( t ) = ξ ^ ( t ) ξ ( t ) , according to the above formula, we get
ξ ˜ ˙ ( t ) = ( I N ( G A F C ) ) ξ ˜ .
η ˙ = ( I N A τ 0 L 1 σ ( t ) ( τ + I N ) R C ) η + ( L 1 σ ( t ) D ) d ˜ ( I N ( G A F C A ) ) ξ ˜ .
where τ = d i a g ( τ 1 , τ 2 , , τ N ) .
Combining (10) and (3), we have
d ˜ ˙ ( t ) = ( I N S L 1 σ ( t ) Q D ) d ˜ ( t ) + ( I N Q ( G A F C A ) ) ξ ˜ .
It is easy to see that if lim t δ = 0 , lim t d ˜ = 0 , lim t ξ ˜ = 0 , and lim t η ˜ = 0 , then lim t ξ = 0 , which means that the containment control is achieved. Thus, the containment control problem of MASs (1) and (2) is transformed into the stability problem of error systems (18)–(21).
Let σ ( t ) = p , and for any τ [ t j , t j + 1 ) , j = 0 , 1 , , consider the following multiple Lyapunov function (22) for error systems (18)–(21)
V ( t ) = V 1 ( t ) + V 2 ( t ) + V 3 ( t ) + V 4 ( t ) .
in which
V 1 ( t ) = δ T ( t ) ( ϕ P 1 ) δ ( t ) V 2 ( t ) = d ˜ T ( t ) ( ϕ P 2 ) d ˜ ( t ) V 3 ( t ) = ξ ˜ T ( t ) ( ϕ P 3 ) ξ ˜ ( t ) V 4 ( t ) = γ 1 2 i = 1 N Φ i ( τ i + 2 ) τ i
where P 3 satisfies the LMI
( G A F C ) T P 3 + P 3 ( G A F C ) + ( β + 1 ) I n < 0
and β = 4 γ 1 λ m a x ( ( G A F C A ) T ( G A F C A ) ) λ ¯ τ 0 ρ 0 λ m i n ( C P 1 1 P 1 1 C T ) + 1 γ 2 λ m a x ( ( G A F C A ) T ( G A F C A ) ) .
Then, taking the derivative of V 1 , V 2 , V 3 , V 4 and using Lemma 4, we can get
V ˙ 1 = δ T ( ϕ ( P 1 ( A + B K ) + ( A + B K ) T P 1 ) ) δ 2 δ T ( ϕ P 1 ) ( τ 0 L 1 p ( τ + I N ) R C ) η δ T ( ϕ ( P 1 A + A T P 1 2 α 1 P 1 B B T P 1 ) ) δ + δ T ( ϕ I n ) δ + τ 0 2 λ ¯ λ m a x ( C T C ) η T ( ϕ ( I N + τ ) 2 C T C ) η
V ˙ 2 = d ˜ T ( ϕ ( P 2 S + S T P 2 ) α 2 ( ϕ L 1 p + L 1 p T ϕ ) D T D ) d ˜ + 2 d ˜ T ( ϕ D T ( G A F C A ) ) ξ ˜ d ˜ T ( ϕ ( P 2 S + S T P 2 α 2 ( ϕ L 1 p + L 1 p T ϕ ) D T D ) ) d ˜ + γ 2 d ˜ T ( ϕ D T D ) d ˜ + λ m a x ( ( G A F C A ) T ( G A F C A ) ) γ 2 ξ ˜ T ( ϕ I n ) ξ ˜ .
V ˙ 3 = ξ ˜ T ( ϕ ( ( G A F C ) T P 3 + P 3 ( G A F C ) ) ) ξ ˜ .
V ˙ 4 = γ 1 i = 1 N Φ i ( 1 + τ i ) τ i ˙ = 2 γ 1 η T ( ϕ ( I N + τ ) P 1 ) η ˙ = γ 1 η T ( ϕ ( I N + τ ) ( A T P 1 + P 1 A ) τ 0 ( I N + τ ) ( ϕ L 1 p + L 1 p T ϕ ) ( I N + τ ) C T C ) η + 2 γ 1 η T ( ϕ ( I N + τ ) L 1 p P 1 D ) d ˜ 2 γ 1 η T ( ϕ ( I N + τ ) L 1 p P 1 ( G A F C A ) ) ξ ˜
According to Lemma 4, the following equalities hold
2 γ 1 η T ( ϕ ( I N + τ ) L 1 p P 1 D ) d ˜ γ 1 τ 0 ρ 0 4 η T ( ϕ ( I N + τ ) 2 C T C ) η + 4 γ 1 λ ¯ τ 0 ρ 0 λ m i n ( C P 1 1 P 1 1 C T ) d ˜ T ( ϕ D T D ) d ˜
2 γ 1 η T [ ϕ ( I N + τ ) L 1 P 1 ( G A F C A ) ] ξ ˜ γ 1 τ 0 ρ 0 4 η T ( ϕ ( I N + τ ) 2 C T C ) η + 4 γ 1 λ ¯ λ m a x ( G A F C A ) T ( G A F C A ) τ 0 ρ 0 λ m i n ( C P 1 1 P 1 1 C T ) ξ ˜ T ( ϕ I n ) ξ ˜
According α 1 = 1 2 and conditions (42), we can obtain
V ˙ δ T ( ϕ ( P 1 A + A T P 1 P 1 B B T P 1 + I n ) δ + η T ( γ 1 ϕ ( I N + τ ) ( P 1 A + A T P 1 C T C ) ) η + d ˜ T ( ϕ ( P 2 S + S T P 2 D T D ) ) d ˜ + ξ ˜ T ( ϕ ( ( G A F C ) T P 3 + P 3 ( G A F C ) + β I n ) ) ξ ˜ 1 λ m a x ( P 1 ) δ T ( ϕ P 1 ) δ T 1 λ m a x ( P 2 ) d ˜ T ( ϕ P 2 ) d ˜ 1 λ m a x ( P 3 ) ξ ˜ T ( ϕ P 3 ) ξ ˜ η T ( γ 1 2 ϕ ( 2 I N + 2 τ ) I n ) η 1 λ m a x ( P 1 ) V 1 1 λ m a x ( P 2 ) V 2 1 λ m a x ( P 3 ) V 3 η T ( γ 1 2 ϕ ( 2 I N + τ ) I n ) η 1 λ m a x ( P 1 ) V 1 1 λ m a x ( P 2 ) V 2 1 λ m a x ( P 3 ) V 3 V 4 l 1 V
where l 1 = min ( 1 λ m a x ( P 1 ) , 1 λ m a x ( P 2 ) , 1 λ m a x ( P 3 ) , 1 ) . Obviously, based on LMIs (12)–(14) and (23), we have V ˙ < 0 . Therefore, through Lyapunov’s theory, we can get lim t V ( t ) = 0 , so δ ( t ) 0 , η ( t ) 0 , d ˜ ( t ) 0 , and ξ ˜ ( t ) 0 . Then, according to the definition of δ ( t ) , the MASs (1) and (2) with external disturbance systems (3) achieve containment control with the control protocol (11). This completes the proof. □
Remark 2.
If there is no external perturbation, that is d i ( t ) = 0 , i F , the considered systems (1) and (2) can still achieve containment control with the designed control protocol (11) which is based on observers (9) and (10). Thus, the control protocol designed in this paper applies to more general systems because it is based on the relative output.
Remark 3.
Unlike article [5], which only discussed the case of a single leader, this paper primarily considered the problem of containment control for multiple leaders. Obviously, when M = 1 , the considered system in this paper becomes the system in [5], and the system can achieve the consensus if the conditions of Theorem 1 are satisfied. Moreover, article [17] only considered the consensus problem based on output feedback in the undirected communication topology. In this regard, this paper discussed the containment control problem based on adaptive observers in the directed communication topology, which means matrix L 1 associated with G is not the symmetric matrix, so it is more difficult to obtain the conditions for consensus.

3.2. Containment Control of MASs with DoS Attacks

In this part, the secure containment control problem is considered for systems (1) and (2) under denial-of-service (DoS) attacks. We make the following assumptions to make it easier to deal with the problem.
Assumption 5.
The attackers have limited energy. They can only attack the network a limited number of times instead of unlimited times, and the duration for each attack is upper-bounded.
Assumption 6.
When the attack occurs, all communication among agents is interrupted.
Remark 4.
It is reasonable to assume that the energy of the attackers is limited in Assumption 5 since it represents several practical scenarios. For instance, many digital devices used as attack tools work with batteries, and their attack times are limited due to limited battery energy. The challenge of energy-constrained attacks has been recently discussed, see [13] for more details. Assumption 6, which can also be found in [22], is often a reality in practice.
Based on Assumptions 5 and 6, we can divide the first-period n = 1 , [ 0 , T ] into two areas as shown in Figure 1, where the red area represents the communication area Π s   ( Π s = [ 0 , h ] ) without the DoS attacks, the green area Π α   ( Π α = [ h , T ) ) indicates the area where data transmission between agents is interrupted because of the DoS attacks.
Assumption 7.
For every attack period [ ( n 1 ) T , n T ] , n = 1 , , the period T has been identified.
Since, for t [ ( n 1 ) T + h , n T ] , the data exchange among agents is interrupted by cyberattacks, and the agents cannot communicate with their neighbors, the adaptive observer (9) can be modified as
x ^ ˙ i = A x ^ i + B u i + D d ^ i τ 0 ( τ i + 1 ) R C ( δ i ξ ^ i ) t [ ( n 1 ) T , ( n 1 ) T + h ) A x ^ i + B u i + D d ^ i t [ ( n 1 ) T + h , n T )
where τ ˙ i = ( δ i ξ ^ i ) T Γ ( δ i ξ ^ i ) , and thecontroller is still designed as u i = K x ^ i E d ^ i
The disturbance observers (10) and (7) are modified as
d ^ ˙ i ( t ) = z ˙ i ( t ) + Q ξ ^ ˙ i ( t ) t [ ( n 1 ) T , ( n 1 ) T + h ) S d ^ i ( t ) t [ ( n 1 ) T + h , n T )
where z ˙ i ( t ) = S z i ( t ) + ( S Q Q A ) ξ ^ i ( t ) Q B K δ i ( t ) ,
δ ˙ ( t ) = ( I N ( A + B K ) ) δ ( t )
ξ ^ ˙ i ( t ) = ω ˙ i ( t ) H ( j F L a i j ( t ) ( y ˙ i ( t ) y ˙ j ( t ) ) ) t [ ( n 1 ) T , ( n 1 ) T + h ) ( I N A ) ξ ^ ( t ) t [ ( n 1 ) T + h , n T )
where ω ˙ i ( t ) = ( G A F C ) ω i ( t ) + ( F ( I + C H ) G A H ) ( j F L a i j ( t ) ( y i ( t ) y j ( t ) ) )
Taking the same step as Section 3.1, we get
d ˜ ˙ ( t ) = ( I N S L 1 σ ( t ) Q D ) d ˜ ( t ) + ( I N Q ( G A F C A ) ) ξ ˜ t [ ( n 1 ) T , ( n 1 ) T + h ) ( I N S ) d ˜ ( t ) t [ ( n 1 ) T + h , n T )
δ ˙ ( t ) = ( I N ( A + B K ) ) δ ( t ) τ 0 ( L 1 σ ( t ) ( τ + I N ) R C ) η t [ ( n 1 ) T , ( n 1 ) T + h ) ( I N ( A + B K ) ) δ ( t ) t [ ( n 1 ) T + h , n T )
η ˙ ( t ) = ( I N A τ 0 L 1 σ ( t ) ( τ + I N ) R C ) η + ( L 1 σ ( t ) D ) d ˜ ( I N ( G A F C A ) ) ξ ˜ t [ ( n 1 ) T , ( n 1 ) T + h ) ( I N A ) η + ( I N B K ) δ t [ ( n 1 ) T + h , n T )
ξ ˜ ˙ ( t ) = ( I N ( G A F C ) ) ξ ˜ t [ ( n 1 ) T , ( n 1 ) T + h ) ( I N A ) ξ ˜ + ( I N B K ) δ t [ ( n 1 ) T + h , n T )
Then, we can establish the following result.
Theorem 2.
Provided that Assumptions 1–7 hold, consider there must exist 0 < ϖ < 1 , such that if h > ϖ T , the MASs (1) and (2) with exogenous disturbance systems (3) can reach consensus by employing the observer (34), the adaptive state estimator (31), and the disturbance observer (32) based on control protocol (11) with K = α 1 B T P 1 , R = P 1 1 C T , Q = α 2 P 2 1 D T , in which α 1 = 1 2 and α 2 are positive constants, and P 1 > 0 , P 2 > 0 are obtained by solving LMIs (39)–(41):
A T P 1 + P 1 A P 1 B B T P 1 + I n I n
A T P 1 + P 1 A C T C + I n 0
S T P 2 + P 2 S D T D + I n < 0
Then, the following conditions hold:
γ 1 τ 0 2 λ ¯ λ m a x ( C T C ) τ 0 ρ 0 2 1 1 + τ ˜ α 2 1 + γ 2 + 4 γ 1 λ ¯ τ 0 ρ 0 λ m i n ( C P 1 1 P 1 1 C T )
in which γ 1 and γ 2 are positive constants and τ ˜ = max ( τ 1 , τ 2 , , τ N ) .
Proof. 
Use the same Lyapunov function as for (22), in the communication area, for t [ ( n 1 ) T , ( n 1 ) T + h ] , from (30), we can obtain V ˙ l 1 V
Now, considering t [ ( n 1 ) T + h , n T ] , we take the derivative of V 1 , V 2 , V 3 , V 4
V ˙ 1 = δ T ( ϕ ( P 1 ( A + B K ) + ( A + B K ) T P 1 ) ) δ δ T ( ϕ ( P 1 A + A T P 1 2 α 1 P 1 B B T P 1 ) ) δ 1 λ m a x ( P 1 ) δ T ( ϕ P 1 ) δ
V ˙ 2 = d ˜ T ( ϕ ( P 2 S + S T P 2 ) d ˜ λ m a x ( D T D ) λ m i n ( P 2 ) d ˜ T ( ϕ P 2 ) d ˜
V ˙ 3 = ξ ˜ T ( ϕ ( A T P 3 + P 3 A ) ) ξ ˜ + 2 ξ ˜ T ( ϕ P 3 B K ) δ
2 ξ ˜ T ( ϕ P 3 B K ) ) δ ξ ˜ T ( ϕ λ m a x ( ( B K ) T B K ) ) ) ξ ˜ + δ T ( ϕ λ m a x 2 ( P 3 ) ) δ ξ ˜ T ( ϕ λ m a x ( ( B K ) T B K ) ) ) ξ ˜ + λ m a x 2 ( P 3 ) λ m i n ( P 1 ) δ T ( ϕ P 1 ) δ
V ˙ 4 = γ 1 i = 1 N Φ i ( 1 + τ i ) τ i ˙ = 2 γ 1 η T ( ϕ ( I N + τ ) P 1 ) η ˙ = γ 1 η T ( ϕ ( I N + τ ) ( A T P 1 + P 1 A ) η 2 γ 1 η T ( ϕ ( I N + τ ) P 1 B K ) δ
2 γ 1 η T ( ϕ ( I N + τ ) P 1 B K ) δ γ 1 δ T ( ϕ ( I N + τ ) I n ) δ + γ 1 η T ( ϕ ( I N + τ ) ( λ m a x 2 ( P 1 ) λ m a x ( ( B K ) T B K ) I n ) ) η
V ˙ 4 γ 1 η T ( ϕ ( I N + τ ) ( A T P 1 + P 1 A + λ m a x 2 ( P 1 ) λ m a x ( ( B K ) T B K ) I n ) η + γ 1 ( 1 + τ 0 ) λ m i n ( P 1 ) δ T ( ϕ P 1 ) δ γ 1 2 η T ( ϕ ( 2 I N + 2 τ ) ( ( λ m a x 2 ( P 1 ) + 1 ) ( λ m a x ( ( B K ) T B K ) ) I n ) η + γ 1 ( 1 + τ 0 ) λ m i n ( P 1 ) δ T ( ϕ P 1 ) δ γ 1 2 η T ( ϕ ( 4 I N + 2 τ ) ( ( λ m a x 2 ( P 1 ) + 1 ) ( λ m a x ( ( B K ) T B K ) ) I n ) η + γ 1 ( 1 + τ 0 ) λ m i n ( P 1 ) δ T ( ϕ P 1 ) δ 2 ( λ m a x 2 ( P 1 ) + 1 ) ( λ m a x ( ( B K ) T B K ) λ m i n ( P 1 ) V 4 + γ 1 ( 1 + τ 0 ) λ m i n ( P 1 ) δ T ( ϕ P 1 ) δ
V ˙ l 2 δ T ( ϕ P 1 ) δ + l 2 d ˜ T ( ϕ P 2 ) d ˜ + l 2 ξ ˜ T ( ϕ P 3 ) ) ξ ˜ + l 2 V 4 = l 2 V > 0
where l 2 = max ( 1 λ m a x ( P 1 ) + λ m a x 2 ( P 3 ) + γ 1 + γ 1 τ 0 λ m i n ( P 1 ) , λ m a x ( D T D ) λ m i n ( P 2 ) , λ m a x ( A T P 3 + P 3 A + λ m a x ( ( B K ) T B K ) I n ) λ m i n ( P 3 ) , 2 ( λ m a x 2 ( P 1 ) + 1 ) ( λ m a x ( ( B K ) T B K ) λ m i n ( P 1 ) )
(1)
For 0 t < h , V ( t ) V ( 0 ) e x p ( l 1 t ) and V ( h ) V ( 0 ) e x p ( l 1 h ) .
(2)
For h t < T , V ( t ) V ( h ) e x p ( l 2 ( t h ) ) V ( 0 ) e x p ( l 1 h + l 2 ( t h ) ) and V ( T ) V ( 0 ) e x p ( l 1 h + l 2 ( T h ) ) .
(3)
For T t < T + h , V ( t ) V ( T ) e x p ( l 1 ( t T ) ) V ( 0 ) e x p ( l 1 h l 1 ( t T ) + l 2 ( T h ) ) and V ( T + h ) V ( 0 ) e x p ( 2 l 1 h + l 2 ( T h ) ) .
(4)
For T + h t < 2 T , V ( t ) V ( T + h ) e x p ( l 2 ( t T h ) ) V ( 0 ) e x p ( 2 l 1 h + l 2 ( T h ) + l 2 ( t T h ) ) and V ( 2 T ) V ( 0 ) e x p ( 2 l 1 h + 2 l 2 ( T h ) )
By induction, we have
(5)
For k T t < k T + h , i.e., t h T < k t T
V ( t ) V ( k T ) e x p ( l 1 ( t k T ) ) V ( 0 ) e x p [ k l 1 h + k l 2 ( T h ) l 1 ( t k T ) ] V ( 0 ) e x p [ k l 1 h + k l 2 ( T h ) ] V ( 0 ) e x p [ h l 1 ( T h ) l 2 T ( t h ) ] × e x p ( T h T l 2 h ) V ( 0 ) e x p [ h l 1 ( T h ) l 2 T ( t h ) ] × e x p [ l 2 ( T h ) ]
(6)
For k T + h t < k T + T , i.e., t T T < k t h T
V ( t ) V ( k T + h ) e x p ( l 2 ( t k T h ) ) V ( 0 ) e x p [ ( k + 1 ) l 1 h + ( k + 1 ) l 2 ( T h ) ] V ( 0 ) e x p [ h l 1 ( T h ) l 2 T ( t h ) ] × e x p [ l 2 ( T h ) ]
Therefore, for any t > 0
V ( t ) V ( 0 ) e x p [ h l 1 ( T h ) l 2 T ( t h ) ] × e x p [ l 2 ( T h ) ]
If h > l 2 l 1 + l 2 T , then by defining ς h l 1 ( T h ) l 2 T > 0 , we have
δ ( t ) e x p [ l 2 ( T h ) ] λ m i n ( P 1 ) δ ( 0 ) e x p [ ς ( t h ) ]
which indicates the multiagent system can achieve containment control at the convergence rate of ς . The proof is completed. □
Remark 5.
We can use the parameter ς to estimate the exponential convergence rate of the controlled system. The parameter ς is ostensibly determined by Tand h but actually depends on the controller K. Obtaining a small ϖ in the application is interesting. Setting ϖ ¯ as the upper limit of ϖ, as long as the effective estimation of ϖ is satisfied 1 > ϖ ¯ ϖ , i.e., if h > ϖ ¯ T , then the multiagent system can achieve containment control by the proposed control law.
Remark 6.
For simplicity, this paper assumed that T and T h were fixed in each period. However, if the attack time is variable for each period i, the conclusion is also valid. For example, T i and T i h i are represented as the control period and attack period, respectively. According to our proof process, it is not difficult to see that the control law proposed can also solve the containment control problem under a DoS attack if T i is uniformly bounded and h i > ϖ ¯ T i . Additionally, the attack can be partitioned into multiple agents, which can discontinuously locate in every period only if the total attack time is inferior to ( 1 ϖ ) T i . In addition, a larger attack width T h results in a larger control gain.
Remark 7.
Clearly, when h = T , the problem of containment control with DoS attacks becomes the problem of secure containment control. Moreover, the containment control can be achieved if the conditions of Theorem 2 are satisfied. Unlike the problem in [17,18], here, we considered the system with DoS attacks. When the system is attacked, the connectivity of the network is affected, which may result in the instability of the entire system. Thus, it is more challenging to consider the containment control problem with DoS attacks.

4. Numerical Example

We give two examples to show the practical validity of Theorems 1 and 2. In this section, the system matrices of linear multiagent systems (1) and (2) are
A = 0 0 0 0.1 0 1 0 0 0 0 1 0 0 0 0 1 , B = 2 0 0 1 0 1 0 0 , C = 1 0.1 0.1 0 0.1 0.1 0 1 , S = 1 1 0 1 , E = 2 0 0 1
Then, we can get
H = 1.2500 2.500 1.2500 12.500 1.2500 12.5000 0 0 , G = 0 0.1250 0.1250 0 0 0.1250 0.1250 0 0 1.1250 1.1250 0 0 0 0 1.000
From (8), we get
F = 0.2281 0.0197 0.0227 0.0271 0.0210 0.0266 0 0
Example 1.
Assuming the considered system consists of four followers and two leaders, and the interaction topology is directed and switched, then the Laplacian matrix of G i ( i = 1 , 2 ) is as follows
L i = L 1 i L 2 i 0 0
where
L 11 = 2 1 0 0 1 3 1 0 0 0 1 1 0 1 0 1 , L 12 = 2 0 1 0 0 2 1 0 0 0 2 1 0 0 1 2 , L 21 = 1 0 0 1 0 0 0 0 , L 22 = 0 1 1 0 0 1 1 0
Take the parameter α 2 = 3 . Solving LMIs (12)–(14), we have
P 1 = 0.8089 0.0211 0.0200 0.0542 0.0211 0.9110 0.1836 0.0187 0.0200 0.1836 0.9128 0.0005 0.0542 0.0187 0.0005 0.9159 , P 2 = 3.3512 1.5060 1.5060 5.5300
Moreover, we can obtain
K = 0.8089 0.0211 0.0200 0.0542 0.0205 0.3637 0.3646 0.0096 , R = 1.2497 0.1277 0.1718 0.1180 0.1715 0.0265 0.0704 0.0051
Q = 2.4850 0.1692 0.1692 0 0.6768 0.3765 0.3765 0
The initial value was taken randomly. It can be intuitively seen from Figure 2 that MASs (1) and (2) could achieve containment control with the perturbation observer-based control law (11), conforming with the result obtained from Theorem 1. Figure 3 and Figure 4 show the relative state error ξ ˜ ( t ) and η ( t ) converge to zero, and Figure 5 shows the evolution of the adaptive parameters from which it can be seen that the adaptive parameters converge to finite steady-state values.
Then, we considered the containment control under DoS attacks. Here, we took h = 0.8 T , from Figure 6 we can see the relative state error converges to zero which means containment control was achieved, and from Figure 7 we can see the adaptive parameters converge to finite steady-state values. However, Figure 8 shows that containment control could not be achieved if the duration of the DoS attack was too big.

5. Conclusions

This paper explored the challenge of containment control for linear multiagent systems with and without attacks in the presence of certain perturbations. Using the relative output information among adjacent agents, we proposed a control law based on a relative state observer, state estimator, and disturbance estimator to address the containment control problem. However, mechanisms for identifying attacks and isolating them remain unavailable. Future research should discuss how to identify attackers and isolate attacks.

Author Contributions

H.L. proposed the framework of the paper under the undirected graph. X.X. popularized the model to the directed graph and with attack and completed the paper writing. L.G. is the leader of the course team, providing the paper creativity and organizing the implementation, and revising and reviewing the article. W.C. also did some simulation work. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Science Foundation of China under grant 62173188, Scientific Research Fund of Zhejiang Provincial Education under Y202250565.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Oh, K.; Park, M.C.; Ahn, H.S. A survey of multi-agent formation control. Automatica 2015, 53, 424–440. [Google Scholar] [CrossRef]
  2. Saber, R.O. Flocking for multi-agent dynamic systems: Algorithms and theory. IEEE Trans. Autom. Control 2006, 51, 401–420. [Google Scholar] [CrossRef]
  3. Fu, J.J.; Wang, J.Z. Observer-based finite-time coordinated tracking for general linear multi-agent systems. Automatica 2016, 66, 231–237. [Google Scholar] [CrossRef]
  4. Sun, J.; Geng, Z.; Lv, Y.; Li, Z.; Ding, Z. Distributed Adaptive Consensus Disturbance Rejection for Multi-Agent Systems on Directed Graphs. IEEE Trans. Control Netw. Syst. 2018, 5, 629–639. [Google Scholar] [CrossRef]
  5. Wang, P.; Wen, G.; Yu, X.; Yu, W.; Lv, Y. Consensus Disturbance Rejection for Linear Multiagent Systems With Directed Switching Communication Topologies. IEEE Trans. Control Netw. Syst. 2020, 7, 254–265. [Google Scholar] [CrossRef]
  6. Ma, Q.; Miao, G.Y. Distributed containment control of linear multi-agent systems. Neurocomputing 2014, 133, 399–403. [Google Scholar] [CrossRef]
  7. Li, Z.K.; Ren, W.; Liu, X.D.; Fu, M.Y. Distributed containment control of multi-agent systems with general linear dynamics in the presence of multiple leaders. Int. J. Robust Nonlinear Control 2013, 23, 534–547. [Google Scholar] [CrossRef]
  8. Zuo, S.; Song, Y.D.; Lewis, F.L.; Davoudi, A. Adaptive output containment control of heterogeneous multi-agent systems with unknown leaders. Automatica 2018, 92, 235–239. [Google Scholar] [CrossRef]
  9. Li, Z.; Liu, X.; Fu, M.; Xie, L. Global H∞ consensus of multi-agent systems with Lipschitz non-linear dynamics. IET Control Theory Appl. 2012, 6, 2041–2048. [Google Scholar] [CrossRef]
  10. Wang, C.; Sun, J.; Zuo, Z.; Ding, Z. Consensus disturbance rejection of network-connected dynamic systems with input delay and unknown network connectivity. IFAC Pap. Line 2017, 50, 10357–10362. [Google Scholar] [CrossRef]
  11. Zegzhda, D.; Lavrova, D.; Pavlenko, E.; Shtyrkina, A. Cyber attack prevention based on evoluttional cybernetics approach. Symmetry 2020, 12, 1931. [Google Scholar] [CrossRef]
  12. Zegzhda, D.; Lavrova, D.; Shtyrkina, A. multifractal analysis of internet backbone traffic for denial of service attacks. Autom. Control Comput. Sci. 2018, 52, 936–994. [Google Scholar] [CrossRef]
  13. Zhang, H.; Cheng, P.; Shi, L.; Chen, J. Optimal dental-of-service attack scheduling with energy constrain. IEEE Trans. Control Netw. Syst. 2015, 6, 3023–3028. [Google Scholar]
  14. Zha, L.; Liu, J.; Cao, J. Resilient event-triggered consensus control for nonlinear muti-agent systems with DoS attacks. J. Frankl. Inst. 2019, 356, 7071–7090. [Google Scholar] [CrossRef]
  15. Xu, Y.; Fang, M.; Shi, P.; Wu, Z. Event-based secure consensus of mutiagent systems against DoS attacks. IEEE Trans. Cybern. 2020, 50, 3468–3476. [Google Scholar] [CrossRef]
  16. Tang, Y.; Zhang, D.; Shi, P.; Zhang, W.; Qian, F. Event-based formation control for nonlinear multi-agent systems under DoS attacks. IEEE Trans. Autom. Control 2021, 66, 452–459. [Google Scholar] [CrossRef]
  17. Han, T.; Li, J.; Guan, Z.H.; Cai, C.X.; Zhang, D.X.; He, D.X. Containment control of multi-agent systems via a disturbance observer-based approach. J. Frankl. Inst. 2019, 356, 2919–2933. [Google Scholar] [CrossRef]
  18. Du, X.N.; Yu, H. Consensus of multi-agent systems with delayed sampled-data and directed topologies. Neurocomputing 2019, 363, 78–87. [Google Scholar] [CrossRef]
  19. Horn, R.; Johnson, C. Matrix Analysis; Cambridge University Press: New York, NY, USA, 1985. [Google Scholar]
  20. Bernstein, D. Matrix Mathematics: Theory, Facts, and Formulas; Princeton University Press: Princeton, NJ, USA, 2009. [Google Scholar]
  21. Jiang, B.; Wang, J.; Soh, Y. An adaptive technique for robust diagnosis of faults with independent effects on system outputs. Int. J. Control 2002, 75, 792–802. [Google Scholar] [CrossRef]
  22. Feng, Z.; Hu, G.; Wen, G. Distributed consensus tracking for multi-agent systems under two types of attacks. Int. J. Robust Nonlinear Control 2016, 26, 896–918. [Google Scholar] [CrossRef]
Figure 1. Attack strategy based on a time-sequence way with n = 1.
Figure 1. Attack strategy based on a time-sequence way with n = 1.
Symmetry 15 00384 g001
Figure 2. The containment errors.
Figure 2. The containment errors.
Symmetry 15 00384 g002
Figure 3. The relative state error ξ ˜ ( t ) under observer (7).
Figure 3. The relative state error ξ ˜ ( t ) under observer (7).
Symmetry 15 00384 g003
Figure 4. The relative state error η ( t ) of linear multiagent systems under observer (9).
Figure 4. The relative state error η ( t ) of linear multiagent systems under observer (9).
Symmetry 15 00384 g004
Figure 5. The variation trend of the adaptive parameters of observer (9).
Figure 5. The variation trend of the adaptive parameters of observer (9).
Symmetry 15 00384 g005
Figure 6. The containment errors.
Figure 6. The containment errors.
Symmetry 15 00384 g006
Figure 7. The variation trend of the adaptive parameters of observer (9).
Figure 7. The variation trend of the adaptive parameters of observer (9).
Symmetry 15 00384 g007
Figure 8. The containment errors.
Figure 8. The containment errors.
Symmetry 15 00384 g008
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Xu, X.; Luo, H.; Chen, W.; Gao, L. Containment Control Problem of Linear Multiagent Systems with External Disturbance and DoS Attacks. Symmetry 2023, 15, 384. https://doi.org/10.3390/sym15020384

AMA Style

Xu X, Luo H, Chen W, Gao L. Containment Control Problem of Linear Multiagent Systems with External Disturbance and DoS Attacks. Symmetry. 2023; 15(2):384. https://doi.org/10.3390/sym15020384

Chicago/Turabian Style

Xu, Xiaole, Huan Luo, Wenhai Chen, and Lixin Gao. 2023. "Containment Control Problem of Linear Multiagent Systems with External Disturbance and DoS Attacks" Symmetry 15, no. 2: 384. https://doi.org/10.3390/sym15020384

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop