1. Introduction
In recent decades, multi-agent systems (MASs) have become a research hotspot due to their wide range of applications in distributed cooperative control [
1], such as unmanned aerial vehicle (UAV) formations [
2], smart grids [
3], robot collaboration [
4], etc. As one of the fundamental problems in the cooperative control of MASs, formation control’s goal is to enable agents to form and maintain a specific spatial structure during movement while adapting to environmental changes [
5]. The research achievements of formation control for MASs have attracted widespread application in fields such as autonomous underwater vehicles (AUV) [
6], satellite formations [
7], etc. For instance, in work [
6], based on the characteristics of MASs, a multi-acoustic underwater vehicle formation control algorithm based on autonomous mobile agent behavior is proposed, which employs a distributed consensus coordination algorithm to achieve robust tracking. In work [
7], a hybrid system method and a novel hybrid ET mechanism are proposed, which accomplishe the bipartite consensus control problem of the satellite formation systems.
In an open network environment, malicious attackers often employ various cyberattacks to attempt to steal the information transmitted by agents and disrupt the normal operation of MASs. Common cyberattacks include denial-of-service (DoS) attacks, false data injection (FDI) attacks, man-in-the-middle (MITM) attacks, etc., [
8,
9,
10,
11,
12,
13,
14]. At present, a large number of studies have been conducted on DoS and FDI attacks. In work [
9], a multiple DoS attacks model based on discrete sampling data communication was established, and by designing an adaptive distributed control protocol, the secure consensus results of MASs with Euler–Lagrange dynamics and multiple DoS attacks are obtained. In addition, in [
11], a new dynamic-memory-weight-dependency security control protocol is proposed, which dynamically adjusts the weight of historical released packets according to DoS attacks to alleviate the influence of DoS attacks. In work [
14], in order to eliminate the negative impact of FDI attacks and reduce the burden of virtual control iterative calculations, a security control algorithm is designed, which combines the modified coordinate transformation and the dynamic surface control (DSC) method for nonlinear MASs suffering from FDI attacks. However, in the real network environment, multiple types of attacks may exist simultaneously, and meanwhile, few studies have focused on MASs suffering from MITM attacks. Therefore, how to defend against hybrid attacks has become a challenge for the formation problem of MASs. These attacks make the information exchange among agents in MASs very insecure [
15], seriously threatening the confidentiality and integrity of MASs. Confidentiality refers to ensuring that the data transmitted in network communication can only be accessed by authorized recipients, preventing the data from being intercepted or stolen by unauthorized third parties. Integrity refers to ensuring that data is not tampered with or damaged during transmission or storage. In order to solve the security problem of MASs, two effective methods are usually used, namely differential privacy techniques [
16,
17] and encryption–decryption algorithms [
18,
19,
20]. The principle of differential privacy technology is to inject carefully controlled random noise into the data, so that the presence or absence of any single data record will not have a significant impact on the final result of data analysis [
21]. However, it may reduce the accuracy and usability of the data [
21,
22]. In contrast, encryption–decryption algorithms use appropriate algorithms and keys to encrypt and decrypt data without affecting the original data [
23]. In work [
18], an encryption–decryption mechanism is designed to encrypt the estimated state into a series of finite-level codewords. After being received and processed by the corresponding decryption algorithm, they are used to design the consensus controller. In work [
20], a uniform-quantization-based encoding-decoding mechanism is introduced to solve the consensus tracking problem of a class of nonlinear discrete-time MASs. Above all, how to design an encryption–decryption mechanism to resist hybrid attacks and protect the formation security of MASs is the first motivation of this research.
In addition, another important factor to be considered for MASs is the cost of computing and communication. During MAS formations, agents will exchange information frequently, which may occupy a large amount of communication resources. If there are no effective methods adopted to save communication resources, it may even lead to the disintegration of the communication network. To alleviate the excessive occupation of communication resources, the event-triggering (ET) mechanism is widely applied. Currently, a large number of ET mechanisms are applied to MASs [
24,
25,
26]. For example, in [
25], in order to avoid continuous communication between neighboring agents, an intermittent communication strategy based on ET functions is established in the proposed distributed differentially private consensus algorithm. However, all the above-mentioned ET mechanisms are based on nodes. When an event occurs, the agent always needs to broadcast its communication data to all neighbors simultaneously, which can lead to some unnecessary consumption of communication resources. In recent years, another triggering mechanism, namely the edge-based ET mechanism, has attracted considerable attention [
27,
28,
29,
30]. For instance, In work [
30], a novel adaptive dynamic ET scheme is proposed by introducing dynamic threshold update rules related to each edge to reduce communication burden and lower resource consumption. When an event is triggered, information is exchanged between the two agents without involving all neighbors, which greatly reduces the consumption of communication resources. However, all the above-mentioned studies are based on a secure network environment. When the MAS formation is subjected to hybrid attacks, how to design an edge-based ET formation control protocol becomes a challenge, which is the second motivation of this paper.
As discussed above, this paper aims to design an encryption–decryption mechanism based on edge-events triggered formation control protocol for MASs under hybrid attacks. The main contributions of this study can be summarized as follows:
- 1.
An improved DHKE-based encryption–decryption mechanism is designed. This method is based on the DHKE protocol, the challenge–response mechanism and the hash function. The DHKE protocol is used to generate session keys between agents. The challenge–response mechanism is employed to complement the identity authentication function of the DHKE protocol and the hash functions provide security for identity authentication. Therefore, the improved DHKE-based encryption–decryption mechanism can resist MITM attacks and ensure the confidentiality and integrity of information.
- 2.
Under distributed DoS attacks, an edge-based ET formation control protocol for MASs is designed. This method only requires information from neighbors, and the triggering solely depends on edge events. Compared with [
24,
25,
26], which use node-based ET control, it can save communication resources more effectively.
- 3.
Under hybrid attacks, the sufficient conditions for MASs to achieve formation control are established which are verified through simulation.
Notations 1. represents the n-dimensional vector, and represents the real matrices. Let represent the transposed matrix of A. denotes the column vector with all ones, and denotes the N-dimensional identity matrix. The intersection and union are, respectively, represented as ∩ and ∪. The Kronecker product is denoted by represents the diagonal matrix. The maximum and minimum eigenvalues of symmetric matrix A are, respectively, denoted by and . The notation implies that Q is symmetric positive definite (positive semidefinite).
2. Preliminaries and Problem Formulation
2.1. System Description
A MAS consisting of
N agents is considered, in which each agent satisfies the following dynamic model:
where
,
, and
are the system state, the control input and the output of the
ith agent at instant
t, respectively.
,
and
are known constant matrices. Assume that
is stabilizable and
is detectable. In realistic MASs with output feedback, in order to infer the system state
from the output
, the following state observer is used:
where
represents the estimate of
and
F is the observer feedback gain matrix such that
is Hurwitz.
An undirected graph of order N is used to indicate the communication relationship of the MAS, where and , respectively, denotes the node set and edge set. is the adjacency matrix of the graph . If , then , which indicates that agents i and j exchange data with each other; else, . represents the set of agent i’s neighbors. A graph is said to be connected if there exists a path between any pair of distinct nodes; otherwise, it is disconnected. It is assumed that . The Laplacian matrix is given by , where and . The Laplacian matrix under attacks is denoted as .
A desired time-varying formation for the agents is denoted by
, where
is the piecewise continuously differentiable formation vector for agent
i. Inspired by [
31], not all formation functions are achievable, and they need to meet the feasibility condition:
where
is the formation compensation input of agent
i.
2.2. The Improved DHKE-Based Encryption-Decryption Mechanism
Due to the distributed architecture and frequent interaction between agents, the MASs (Equation (1)) are susceptible to network attacks such as MITM attacks. As one of the most common attacks in MASs, an attacker of MITM attempts to act as a legitimate middle agent between two communicating agents, thereby eavesdropping, stealing and even tampering with the data.
In this section, we focus on securing the online communication phase of the MAS against MITM attacks. Attacks targeting the offline initialization phase or physical compromise of agents are not considered.
The Diffie–Hellman key exchange (DHKE) protocol, as a key negotiation method, enables two agents to exchange keys over an insecure public channel without a pre-shared key, and ultimately generate a shared key. Additionally, the challenge–response mechanism can be used for identity authentication between agents, which effectively compensates for the lack of authentication in the DHKE mechanism. In order to detect and prevent MITM attacks to guarantee the confidentiality and integrity of inter-agent data transmission, an improved DHKE-based encryption–decryption mechanism is proposed for MAS (Equation (
1)).
The communication structure diagram of the MAS (Equation (
1)) with the improved DHKE-based encryption–decryption mechanism is shown in
Figure 1a. The event-triggered sequence on edge
is generated as
, which means agent
i only exchanges information with agent
j at triggering moments
. Before the data is transmitted, both agents need to first negotiate a key and the sender encrypts the data by the key. After receiving the encrypted data, the receiver decrypts it by using the same key. The improved DHKE-based encryption–decryption mechanism consists of three parts: (
a) Initialization, (
b) Key exchange and (
c) Encryption-decryption.
- (a)
Initialization. Before key exchange, agent i generates password and agent j generates random salt . Agent i stores the encrypted data which means is encrypted by and agent j stores .
It is emphasized that the and are provisioned to agents during an offline secure initialization phase. These parameters are not globally shared across the entire network, but are pairwise long-term credentials. Meanwhile, the encrypted storage of serves as a lightweight protection against accidental or non-invasive credential leakage. It is not intended to protect against full memory inspection attacks, which imply complete agent compromise and are beyond the considered threat model.
- (b)
Key exchange. As shown in the key exchange flowchart in
Figure 1b,
q is a large prime number and
a is the primitive root of
q. The key exchange part is divided into the following five steps:
Agent i sends signal C to declare its identity.
Agent j receives C and sends a random challenge number .
Agent i decrypts with stored locally to obtain . Next, select a secret large number x that satisfies and calculate q and . Then, generate challenge number and calculate . Finally, send to agent j.
Agent j retrieves stored locally and calculates . If , select a secret large number y that satisfies , calculate q and and send to agent i; else, key exchange will fail.
Agent i calculates . If , send a acknowledge signal to agent j to indicate successful key exchange; else, key exchange will fail.
Then, the two communication agents negotiate the known only to both of them. The negotiated key is a fresh session key and is independent of long-term credentials. Even if a long-term credential is compromised, only the corresponding communication links are affected, while other links remain secure.
- (c)
Encryption-decryption (AES-128-GCM). After completing the authenticated key exchange, the two agents obtain a shared
KEY =
axy mod q. Since
KEY is not necessarily 128-bit, a symmetric session key
is derived via a key derivation function (KDF)
where
extracts the first 128 bits. At each triggering moment
, agent
i forms the plaintext
. To ensure both confidentiality and integrity, agent i encrypts
using an authenticated encryption with associated data (AEAD) scheme, namely AES-128-GCM. A nonce
is generated using a monotonically increasing counter, which is initialized at session establishment and incremented by one for each transmitted packet, ensuring nonce uniqueness per session key. The associated data
includes the edge index
and the triggering instant
, which binds the ciphertext to a specific communication link and transmission time. The encryption process is given by
and agent
i sends packet
to agent
j. Upon receiving a packet, agent
j performs authenticated decryption using the shared session key
. Specifically, agent
j computes
If tag verification succeeds, then ; otherwise, the packet is discarded and treated as invalid, which provides integrity protection against malicious data modification.
By adopting AES-128-GCM, the proposed communication layer achieves authenticated encryption, i.e., confidentiality and integrity simultaneously. Any tampering with the nonce, ciphertext, tag, or associated data will be detected during tag verification, and the corresponding packet will be discarded. Meanwhile, it is noted that the key exchange procedure is executed only after the event trigger is triggered, rather than being executed in real-time within the control loop. The secret values used in the DHKE process are selected as large random integers and do not require online primality testing. Therefore, the computational overhead is acceptable for resource-constrained agents.
In order to present the improved DHKE-based encryption–decryption mechanism more clearly, Algorithm 1 is provided.
Remark 1. The improved DHKE-based EDM for MAS (Equation (1)) can effectively detect MITM attacks, which is mainly completed by judging the hash value. In addition, assume that the secret information, such as and , is shared in a secure manner, which is a prerequisite for the secure key exchange. In this case, and possess sufficient security. Since then, MITM attackers mainly attack through two methods: tampering with random challenges or . If attackers change by in order to impersonate agent j in step 2, it makes in step 4, and authentication fails. Similarly, if is tampered with, and authentication fails. tampering with the key component q or q. If q is changed to q in step 3, it makes and authentication fails. The same goes for changing q by q. Once authentication fails, the data to be transmitted will be discarded. Moreover, the confidentiality of data in MAS (1) is ensured by the negotiated . Note in Algorithm 1, x and y are secretly saved by agents i and j, respectively. Take agent i for an example; when receiving q from agent j, agent i can calculate the key q by and x. Even if the eavesdropper possesses a, q, q and q, the key q cannot be calculated. That is, attackers are unable to obtain the , thus ensuring the data security. Remark 2. The improved DHKE-based encryption–decryption mechanism is inspired by [
32]
. In contrast to the network attack environment in [
32]
, this paper adopts a cryptographic-based method to achieve the secure transmission of information under MITM attacks. The data is encrypted through AES-128-GCM using the key generated by the DHKE algorithm. Meanwhile, aiming at the deficiency that the DHKE algorithm cannot perform identity authentication, an improved DHKE-based encryption–decryption mechanism is proposed. This mechanism introduces a challenge–response mechanism to complement its identity authentication function, achieving the authentication and encryption of data in the network environment, thereby resisting MITM attacks. | Algorithm 1 The improved DHKE-based EDM |
Require: Hash function ; Function ; Encryption algorithm ; Decryption algorithm ; Password ; Random salt ; Encryption method ; Large prime number q and it’s primitive root a; Observer state ; Desired formation ; Ensure: Symmetric keys . : Agent i stores and agent j stores locally; fordo Step 1 Agent i: Send signal C to agent j; Step 2 Agent j: Generate and send random challenge number to agent i; Step 3 Agent i: Decrypt by ; Select a secret large prime number and calculate q; Calculate and q; Generate a challenge number ; Send ( q) to agent j; Step 4 Agent j: Retrieves ; Calculate q; if then Select a secret large prime number and calculate q; Calculate q; Send ( q) to agent i; else False; end if Step 5 Agent i: Calculate q; if then Send acknowledge character to agent j; else False; end if Agent i: Get ; Form plaintext ; Generate nonce using a session counter; Set associated data ; Compute ; Send to agent j; Agent j: if the packet is received by agent j then ; if tag verification succeeds then Recover and from ; else Discard the packet and set the desired value to 0; end if else Packet loss and set the desired value to 0; end if end for
|
Security Assumptions and Discussion: This part clarifies the security assumptions, threat model, and design rationale of the proposed authentication and key exchange mechanism as follows:
- (1)
Threat model and trust assumptions: We consider an open network environment where communication channels among agents are insecure and vulnerable to MITM attacks, eavesdropping, and message tampering. The proposed DHKE-based key establishment is designed under a classical adversary model. Resistance to quantum attacks (e.g., Shor’s algorithm) is beyond the scope of this work and is not considered in the present threat model. This work primarily focuses on secure formation control of MASs under classical computational assumptions. The investigation of quantum-resistant key establishment mechanisms in the context of formation control are an important direction, which is also one of the future research focuses. The primary objective of the proposed mechanism is to prevent impersonation and unauthorized key establishment during the online communication phase. It is assumed that each agent operates in a trusted execution environment. Physical capture or full logical compromise of an agent, including unrestricted access to its internal storage or runtime memory, is beyond the scope of this work. Once an agent is fully compromised, it is regarded as untrusted, and secure communication involving that agent cannot be guaranteed. This assumption is reasonable in secure control and MAS research.
- (2)
Long-term credential provisioning: Each legitimate agent is provisioned with long-term credentials ( and ) during an offline and secure initialization phase. These credentials are pairwise and used solely for authentication purposes. The encrypted local storage of provides a lightweight safeguard against accidental disclosure or non-invasive leakage of credentials. It is not intended to defend against full memory inspection attacks, which imply complete agent compromise and fall outside the considered threat model.
- (3)
Setup and cryptographic specification: Each agent is initialized during an offline and secure setup phase. During this phase, legitimate agents are provisioned with long-term authentication credentials (e.g., and ), as well as public system parameters (e.g., a and q) of the DHKE group. Meanwhile, the proposed mechanism relies on standard cryptographic primitives. The hash function is instantiated by a cryptographic hash (e.g., SHA-256). A symmetric session key is derived from the DHKE shared secret via a hash-based KDF. Data confidentiality and integrity are ensured by an authenticated encryption with the AEDA scheme, namely AES-128-GCM, with a 128-bit key. In addition, all random values used in the protocol, including the DHKE secrets and the initial nonce counter value, are generated using a cryptographically secure pseudo-random number generator (CSPRNG).
- (4)
Session key security and impact of compromise: A fresh session key is established through an authenticated DHKE. The session key is independent of long-term credentials and is used exclusively for subsequent data encryption and decryption. As a result, the compromise of a long-term credential affects only the corresponding communication links, while other links remain secure. This decentralized structure avoids system-wide security failure.
- (5)
Computational considerations: The key exchange and authentication procedures are executed only after the event trigger is triggered, rather than being executed in real-time within the control loop. The secret parameters in the DHKE process are selected as large random integers and do not require online primality testing. Therefore, the computational overhead is acceptable for resource-constrained agents.
- (6)
Comparison with PKI-based solutions: As shown in
Table 1, the PKI-based authentication mechanism relies on digital certificates and trusted third-party institutions, as well as online management processes such as certificate issuance, verification, and revocation. This often introduces higher management and communication costs in decentralized MASs. In contrast, the proposed mechanism in this paper does not rely on certificates or third-party institutions during the system operation phase. Although
and
require offline configuration during the initialization stage; they do not require online management mechanisms such as certificate verification or revocation afterwards. Thus, in specific MASs formation control scenarios, they have lower management complexity and operating costs. It is important to note that this proposed mechanism is not intended to replace the mature PKI-based solutions. Instead, it offers a lightweight alternative for MASs where certificate management is inconvenient or the infrastructure is limited.
- (7)
Random number generation: The proposed scheme relies on cryptographically secure random numbers for generating ephemeral Diffie–Hellman private exponents and nonces used in authenticated encryption. Each agent employs a cryptographically secure pseudo-random number generator (CSPRNG) instantiated as a hash-based deterministic random bit generator (Hash-DRBG) using SHA-256. The adopted CSPRNG follows a standard DRBG architecture, in which an internal state is initialized and periodically refreshed using entropy provided by the underlying platform, and random bits are generated through iterative hash-based expansion. The Hash-DRBG is seeded by the operating system’s entropy pool, which aggregates platform-dependent entropy sources, such as system-level noise sources and, when available, hardware-assisted randomness. These entropy sources are managed by the operating system and are not controlled directly by the proposed scheme. The CSPRNG is provided by the underlying operating system or cryptographic library and utilizes standard computational resources already available on each agent, without requiring additional hardware modules or trusted third-party infrastructures.
2.3. Edge-Based ET Formation Control Protocol
The improved DHKE-based encryption–decryption mechanism proposed can effectively detect and resist MITM attacks, ensuring that the key exchange process will not be deciphered by attackers. However, in the real network environment, MASs can also be threatened by DoS attacks. The purpose of DoS attacks is to block communication between agents, thereby disrupting the normal operation of MASs. DoS attacks on MASs are typically divided into global attacks and distributed attacks. Different from the global attacks in [
32,
33] that occur simultaneously on all channels, the distributed DoS attacks are independent on different channels, which are more covert and complex. Inspired by [
34], a distributed DoS attack model is constructed. The union of time intervals over which the channels indexed by
are attacked can be expressed as
where
refers to the set of edges under attacks at time
t,
is the union of time intervals with attack for edge
over
and
is the union of the time intervals without attacks. It is obvious that
and
hold. It can be inferred that there could be
different sets
from
to
, which means that the timeline is divided into
different types by the
different systems topology under attacks. For the sake of simplicity, they are referred to as the attack modes. The following provides an example to intuitively explain the division of attack modes. Assume that a MAS consists of 4 agents with edges
and
. Then, there are
different cases indexed by
, which correspond to 8 different topologies.
correspond to the time intervals for each system topology and attack mode as shown in
Figure 2.
Additionally, attackers need to consume energy before launching attacks, which means that they need to switch to a dormant state to prepare for the next attack after the last attack. Therefore, the frequency and duration of MITM and DoS attacks on each transmission channel should satisfy the following assumptions.
Assumption 1 ([
34])
. (Attack Duration). For channel , there exist and satisfyingfor any , where is the union of attack intervals of edge over . Edge may have been under attack at time , and represents the length of the interval from to the end of that attack. For edge , represents the average dwell time of two consecutive attacks off/on transitions.
The information transmission among agents in MAS (Equation (
1)) is not only affected by external attacks but also constrained by internal communication resources. Frequent communication between agents will take up a large amount of bandwidth. In order to alleviate the communication burden of MAS (Equation (
1)) under distributed DoS attacks, an edge-based ET formation control protocol is established as follows:
where
,
,
p is a constant,
K is a feedback gain matrix to be solved and
is the formation compensation input defined in (3). As shown in Equation (
9), the control input of agent
i relies on the reachability of its adjacent agents.
Then, define the estimation error as
. The event-triggering moments of edge
are determined by
where
is an upper bound on the interval between two triggering moments and the triggering function of edge
is
where
is a constant design matrix and
is the threshold of triggering function with
and
being given positive constants.
Remark 3. The ET mechanism has been widely used to save communication resources. As the edge-based ET mechanism (Equations (10) and (11)) is designed, events on each edge connected to agent i are triggered independently, and only when the trigger condition is met will the two agents on edge exchange information. In the meantime, τ is used to force events on edge to be triggered in case there is no communication for a long time. Therefore, compared with the node-based trigger mechanism in [
35,
36,
37]
, which needs to broadcast information to all neighbors at triggering moments, the method proposed in Equations (10) and (11) can alleviate the communication pressure in MAS (Equation (1)) because not all neighbor agents need to update their status at triggering moments. Define
,
and the formation error
, where
,
and
. It can be obtained from Equations (
1), (
2), (
3) and (
9) that the following applies:
Let
. From Equations (
1) and (
3) we can obtain
Then, we can obtain the derivative of
from Equation (
12) and the fact that
,
From Equations (
2) and (
3) and the definition of
, the derivative of
can be obtained as
Then the derivative of
is
Let the observer error be defined as
. Then, it follows that
and
The objective of this article is to design an edge-based ET formation control protocol (Equation (
9)) for MAS (Equation (
1)) such that the formation can be achieved under hybrid attacks. That is,
and
hold.
The subsequent proof relies on the following lemma:
Lemma 1 ([
38])
. For an undirected graph, zero is a simple eigenvalue of , if and only if the graph is connected. The smallest nonzero eigenvalue of satisfies . 3. Results
In this part, Theorem 1 provides sufficient conditions for the MAS (Equation (
1)) formation to be achievable in the presence of hybrid attacks. Meanwhile, Theorem 2 proves that Zeno behavior will not occur under the trigger mechanism (Equation (
10)).
Theorem 1. Suppose that is stabilizable and detectable. Consider the MAS (1) with the edge-based ET mechanism (Equation (10)) and control protocol (Equation (9)) under hybrid attacks, for given scalars , if there exist symmetric matrices P, Q such that and , matrices , , , scalars and subject to the following conditions:where , and , the desired time-varying formation under distributed hybrid attacks can be achieved. Proof. Consider the Lyapunov candidate function
with
According to Equations (16) and (17), the time derivative of
is given by
Based on the fact
,
and
, it can be deduced that
Meanwhile, according to the definition of
, one obtains
Then, the following formula holds:
By using Young’s inequality
, it can be obtained that
Owing to
being Hurwitz, there exists a matrix
R satisfying
and
with
[
39]. Then, taking the time derivative of
yields
Combining Equations (24)–(29) yields
Noting the fact that
and using Lemma 1, we can obtain that
. Since
, it is obvious that
holds, and hence, it can be concluded that
where
. If the conditions in Equations (
18)–(
20) hold, it is easy to obtain that
Define
(
,
) as the time instants where the attack mode changes. For
, it can be concluded from
that
where
and
. Then, from Equations (
7), (
8) and (
22) and the fact that
,
Based on Equations (33) and (34), it can be obtained that , that is, and . □
Remark 4. In Algorithm 1, when some of the links are subjected to MITM attacks, the transmitted data packets will be directly discarded, which is equivalent to a blockage occurring at these links. Therefore, Algorithm 1 treats the MITM attacks on the links as DoS attacks. Hence, in an environment that may be subject to both MITM and DoS attacks, any attack received can be regarded as a DoS attack. So, the stability analysis holds for any combination of the two types of attacks.
Theorem 2. Zeno behavior will not occur under the trigger mechanism (Equation (10)). Proof. Assume that Zeno behavior occurs at the edge
, which means there exists
T such that
. Then for any
, there exists
, such that
for any
. Because
and
are bounded,
is bounded too in finite time. Compute the derivative of
as
It follows that
where
is the upper bound of
for
.
Define a non-negative function
satisfying
and
. Therefore,
, where
satisfies Equation (37).
Note that the edge
is not triggered, which means the triggering functions (Equation (11)) are less than 0, if the following two inequalities hold:
Let and . Denote . Then, according to (38), the time interval between and satisfies , which further implies that . This contradicts the assumption that . Thus, there does not exist the Zeno behavior. □
4. Simulation Example
In this section, numerical simulations are conducted to verify the effectiveness of the improved DHKE-based encryption–decryption mechanism and the proposed edge-based ET formation control protocol. In this simulation example, a third-order MAS with 5 agents achieves time-varying formation under formation control protocol (Equation (
9)) and event trigger mechanism (Equation (
10)).
Consider MAS (Equation (
1)) with five agents, where
The communication relationship between agents is shown in
Figure 3 and the initial values of each agent are
and
. The desired formation function is described as
for
. If the desired time-varying formation
is formed, these five agents will be located at the five vertices of a regular pentagon and maintain an angular velocity rotation of
.
Choose
,
,
and
. From Theorem 1, the gain matrices can be obtained as
and
Under the condition that the sampling step size is s, the time t was simulated from 0 s to 10 s using MATLAB (version R2025a) software.
Figure 4 shows the attack situation on each edge, with the green area representing the attack interval. For convenience, only the attack situations on edge
and
are shown. Under the improved DHKE-based encryption–decryption mechanism, the two communicating agents will first generate a confidentiality key based on Algorithm 1, and then the sender encrypts the data with this key before transmitting it. After receiving the encrypted data, the recipient decrypts it using the key to obtain the original data.
Figure 5 shows (a) the norm of the formation error
of the two agents on edge
without MITM attacks and (b) the same for the case with MITM attacks. For the sake of simplicity, since the data packets that suffer from MITM attacks in Algorithm 1 will be directly discarded, this can equivalently convert the MITM attacks into DoS attacks. Therefore, only the MITM attacks are considered here. It can be seen that without MITM attacks, the convergence of
is relatively gentle. However, when subjected to the MITM attack,
fluctuates briefly within the attack range, but it can continue to converge after the attack is over. This indicates that the method used in this work can enable the formation to recover from the attack and will not affect the final realization of the formation.
Figure 6 describes the state observation error of each agent, and it can be seen that the error approaches 0. The formation situation of MAS is shown in
Figure 7, where
Figure 7a presents the agents’ position trajectory within 10 s and
Figure 7b shows the formation snapshots of the 5 agents every two seconds. In addition, the formation error is shown in
Figure 8, and it is easy to see that the formation shape is gradually stabilizing. The event-triggering instants of each edge are illustrated in
Figure 9, which shows that inter-agent communication occurs only when the triggering conditions are satisfied, thereby reducing the communication frequency.
Meanwhile, we compared the mechanism designed in this paper based on DHKE with the mechanism based on PKI authentication. The PKI-based mechanism adopts certificate-based authentication using ECDSA, combined with ECDHE for session key establishment. The computational overhead (CO) and formation convergence time (CT) of MAS formation control are presented in
Table 2. It should be noted that the CO calculated in this paper refers to the duration of time from the moment the event is triggered until the completion of data encryption. Moreover, the encryption and decryption methods of both schemes employ AES-128-GCM. As shown in
Table 2, the CO of the PKI-based mechanism is 16.73 ms, and the CT is 12.55 s. The CO and CT of the DHKE-based mechanism are 9.46 ms and 9.27 s, respectively. From the above data, it can be seen that compared with the PKI-based mechanism, the designed scheme reduces the CO by 43.4% and the convergence time of the formation by 26.1%. Overall, compared with the PKI-based mechanism, the mechanism designed in this paper has lower CO in the authentication and key establishment stages, and the CT of the formation is also faster. Therefore, this scheme provides a lightweight security communication option for MASs formation control scenarios where certificate management is inconvenient or the infrastructure is limited.