Next Article in Journal
Tool-Life Estimation Model in Milling Processes Using Multi-Head Cross-Covariance Attention Fusion-Based Dilated Dense Bi-Directional Gated Recurrent Unit
Previous Article in Journal
FAS-XAI: Fuzzy and Explainable AI for Interpretable Vetting of Kepler Exoplanet Candidates
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Dynamic Event-Triggered Cluster Synchronization Control of Complex Dynamical Networks Under Random Deception Attacks

1
School of Economics and Statistics, Guangzhou University, Guangzhou 510006, China
2
School of Mathematics and Systems Science, Guangdong Polytechnic Normal University, Guangzhou 510665, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(23), 3797; https://doi.org/10.3390/math13233797
Submission received: 14 October 2025 / Revised: 18 November 2025 / Accepted: 23 November 2025 / Published: 26 November 2025
(This article belongs to the Special Issue Dynamics on Complex Networks: Theory, Modelling, and Applications)

Abstract

This paper is concerned with the secure and resource-efficient cluster synchronization problem of a class of complex dynamical networks (CDNs) under random deception attacks. Each node in the CDNs is modeled by a nonlinear dynamical system with multiple time-varying delays and nonlinear couplings. The central aim is to make each cluster of nodes converge to the same reference trajectory that is distinct for each cluster regardless of the adverse effects of random deception attacks while ensuring communication efficiency for each node. Toward this aim, a distributed dynamic event-triggered mechanism is first proposed such that each node can make its own decisions to transmit or not its data of interest over the communication channel. Second, by suitably modeling the random deception attacks, secure and event-based cluster synchronization controllers are constructed, which incorporate both the effects of random deception attacks and intermittent data arrivals. Then, sufficient conditions ensuring the secure cluster synchronization of the delayed CDNs under randomly occurring deception attacks are established by constructing some appropriate Lyapunov functionals. Furthermore, tractable design criteria on the existence of desired cluster synchronization controllers are derived. Finally, an illustrative example is presented to validate the effectiveness of the main theoretical results.

1. Introduction

Complex dynamical networks (CDNs) have attracted extensive research attention in recent years due to their widespread applications in fields such as power systems, water and gas distribution systems, and transportation systems. Typically, a CDN is composed of a large number of nodes (or agents and subsystems) that interact with each other across both physical and cyber layers in such a way as to achieve some cooperative dynamical behaviors. Not surprisingly, there have been many fruitful results available on dynamical behavior analysis for CDNs, including state estimation [1], synchronization [2,3], and finite-/fixed-time control [4,5].
Synchronization, as one of the most important collective dynamical behaviors for dynamical systems, has been investigated for decades [6,7,8]. To analyze synchronization performance and further design synchronization controllers, several methods have been reported, such as the master stability function method [9], the matrix measure analysis method [10], and the Lyapunov function method [11]. It is noteworthy that a large portion of existing results on synchronization of CDNs focus on complete synchronization; namely, all nodes in the CDNs share the common dynamical behavior when the time approaches infinity. However, cluster synchronization finds broader applications than complete synchronization in both nature and practical applications [12], such as during neuron discharging in the brain, multi-objective search and rescue, and military surveillance and tracking. Under a cluster synchronization setting, nodes are first split into different groups which are called clusters. Then nodes are driven to keep synchronized with their peers in the same cluster but not with those in different clusters. In the presence of multiple external reference sources, the nodes in the same cluster are then regulated to synchronize with each reference source. Up till now, a great deal of effort has been devoted to cluster synchronization of CDNs [13,14,15,16,17]. For example, the prescribed-time cluster synchronization issue for complex networks is studied in [14]. In [15], a pinning control strategy is presented to synchronization a class of linearly coupled CDNs into different clusters. In [16], the finite/prescribed-time cluster synchronization problem is studied for a class of CDNs with asynchronous switching. In [17], the problem of cluster synchronization is extended to deal with parameter mismatches and time-varying delays in CDNs under impulsive control. Nevertheless, it should be pointed out that the above cluster synchronization methods are based on two ideal assumptions that (1) the data transmissions/exchanges on each node are continual at every continuous time t and (2) the network environment, providing a two-way communication medium for the CDNs, is safe in a sense that all data transmissions/exchanges between sender nodes and receiver nodes are secure without any interruption or corruption.
Due to the openness and insufficient protection of most communication networks, CDNs are actually vulnerable to malicious attacks, such as denial-of service (DoS) attacks [18,19] and deception attacks [20,21]. Apparently, such malicious attacks may degrade the desired synchronization performance of CDNs or even destabilize the closed-loop CDNs. This thus calls for secure synchronization controllers against the adversarial effects of malicious attacks on CDNs. So far, several effective secure control methods have been developed in the literature of cyber-physical systems, e.g., [22,23,24,25,26]. Among the various attacks, deception attacks generally violate the integrity of transmitted data by injecting arbitrary and falsified information [27,28,29]. For example, in [27], for a class of linearly coupled complex networks under deception attacks and disturbance estimator, the synchronization issue is solved.
Apart from the security issue of CDNs aforementioned, another significant issue of synchronization control of CDNs is to preserve resource efficiency. This is because the synchronization control objective relies on the information transmission or exchange among the interacting nodes, while such an information sharing process inevitably occupies and consumes excessive resources. Event-triggered transmission mechanisms have yet shown their benefits in reducing unnecessary data transmissions and further controller updates. More specifically, compared with a conventional time-triggered mechanism where data transmissions are invoked typically at periodic times, the decisions of ‘whether or not each node’s data should be transmitted’ are determined by some well-defined events when an event-triggered mechanism is employed. Thus, event-triggered mechanisms can effectively reduce the frequency of data transmissions and further the communication resource occupancy. Naturally, the problem of event-triggered synchronization control for CDNs has been widely explored in the last decade [30,31,32,33,34,35,36]. Nevertheless, it is mentioned that the above event-triggered synchronization methods all fall into the category of static triggering, wherein the triggering conditions are based on only system available information. Recently, another strategy of dynamic triggering is proposed in [37] and has been greatly developed in the past several years. A key feature of such dynamic triggering is that some auxiliary or internal dynamic variable is introduced into the triggering conditions such that the triggering intervals can be generally prolonged. In other words, dynamic triggering can often leads to more resource efficiency than its static counterpart. Applying dynamic triggering to synchronization control problems of CDNs has also attracted great interest, see, e.g., [38,39,40]. To our knowledge, there have been relatively few results available on cluster synchronization of CDNs while taking into account both dynamic event-triggered mechanism and security countermeasure against deceptive attacks, which gives rise to the second motivation of this study.
In this paper, we investigate the secure cluster synchronization problem for a class of CDNs under random deception attacks. The main contributions of this paper are listed as follows. (1) A general CDN model is formulated by taking into account both nonlinear model dynamics, multiple time-varying delays, nonlinear and delayed couplings. Unlike the linear coupled CDNs [14], the CDN model researched in this paper can simulate actual nonlinear systems more accurately. (2) A unified secure cluster synchronization control framework is established to simultaneously address nonlinear dynamics, multiple time-varying delays, and random deceptive attacks. Most existing secure control works focus on denial-of-service (DoS) attacks or single-type synchronization (e.g., complete synchronization) [6,7,8], while this paper addresses cluster synchronization with deceptive attacks and provides explicit attack tolerance bounds, which fills the gap in heterogeneous state synchronization under data tampering. (3) Tractable stability analysis and control design criteria are derived such that the resulting closed-loop CDN achieve secure cluster synchronization while maintaining efficient resource occupancy over the communication channels. A special case of secure static event-triggered cluster synchronization control design is also presented. The controller design integrates attack compensation terms to counteract the adverse effects of data tampering, and sufficient conditions for synchronization are derived via Lyapunov-Krasovskii functionals with some integral inequalities, which are less conservative than existing delay-independent criteria [16].
The rest of this paper is organized as follows: Section 2 shows the model description. Section 3 gives the main results. In Section 4, a numerical example is presented, and concluding remarks are given in Section 5.

2. Preliminaries and Problem Formulation

2.1. Notation

Denote N and N + as the set of natural numbers and non-negative integers, respectively. R n and R n × m stands for the set of n-dimensional real space and n × m dimensional real spaces, respectively. Denote I n R n × n as identity matrix, n N + . B > 0 ( B < 0 ) means that the matrix B is a positive (negative) definite matrix. The superscript ‘T’ indicates matrix transposition and ‘⊗’ is the Kronecker product. Matrices are all with appropriate dimensions without special description.
The interconnection topology among nodes is modeled by a digraph G ( V , E , A ) of order N N + with a set of nodes V = { 1 , 2 , , N } , a set of edges E V × V , and weighted adjacency matrix A = ( a i j ) N × N R N × N , where a i j is the weight of the directed edge ( j , i ) satisfying a i j 0 if ( j , i ) E and a i j = 0 otherwise. Moreover, it is assumed that a i i = 0 , i V to avoid self-loops.
Let M = 1 , 2 , , m ¯ be a cluster set with m ¯ 1 and { P 1 , , P m ¯ } be a partition of the initial node set V such that V = l = 1 m ¯ P l , and  P l P k = for l k , l , k M . Denote by P 1 = { l 0 + 1 , , l 1 } , ⋯, P k = { l k 1 + 1 , , l k } , ⋯, P m ¯ = { l m ¯ 1 + 1 , , l m ¯ } , l 0 = 0 , l m ¯ = N . Denote the total number of the nodes in the kth cluster by n k = P k , k M , where · represents the cardinality of the set. Other key notations can be found in the Table 1.

2.2. Modeling of CDNs

Consider a class of CDNs consisting of N interacting nodes, in which the dynamics of the ith node, i V , are described by the following coupling state-space equation
x ˙ i ( t ) = W ˘ 1 i f ˘ i ( x i ( t ) ) + W ˘ 2 i f ˘ i ( x i ( t τ 1 ( t ) ) ) + j = 1 N a i j Λ 1 g 1 ( x j ( t ) ) + j = 1 N b i j Λ 2 g 2 ( x j ( t τ 2 ( t ) ) ) + u i ( t ) ,
where x i ( t ) = ( x i 1 ( t ) , , x i n ( t ) ) T R n is the state vector of the ith node; W ˘ 1 i , W ˘ 2 i R n × n are the connection weight matrices; f ˘ i ( x i ( t ) ) = ( f ˘ i ( x i 1 ( t ) ) , , f ˘ i ( x i n ( t ) ) ) T , f ˘ i ( x i ( t τ 1 ( t ) ) ) = ( f ˘ i ( x i 1 ( t τ 1 ( t ) ) ) , , f ˘ i ( x i n ( t τ 1 ( t ) ) ) ) T are continuous non-delayed and delayed nonlinear functions, 0 τ 1 ( t ) τ 1 , 0 τ ˙ 1 ( t ) τ ¯ 1 < 1 ; A = ( a i j ) N × N R N × N is the non-delayed output-coupling weight matrix with a i i = j = 1 , j i N a i j , a i i 0 , i V ; j P k a i j = 0 , i P k , k M ; B = ( b i j ) N × N R N × N stands for the delayed output-coupling weight matrix with b i i = j = 1 , j i N b i j , b i i 0 , i V ; j P k b i j = 0 , i P k , k M ; Λ 1 = diag { λ 11 , , λ 1 n } > 0 , Λ 2 = diag { λ 21 , , λ 2 n } > 0 , represent the non-delayed inner-coupling matrix and delay inner-coupling matrix, respectively; g 1 ( x j ( t ) ) = ( g 11 ( x j 1 ( t ) ) , , g 1 n ( x j n ( t ) ) ) T means the nonlinearly non-delayed coupling vector function and g 2 ( x j ( t τ 2 ( t ) ) ) = ( g 21 ( x j 1 ( t τ 2 ( t ) ) ) , , g 2 n ( x j n ( t τ 2 ( t ) ) ) ) T means the nonlinearly delayed coupling vector function, where j = 1 , , N , 0 τ 2 ( t ) τ 2 , 0 τ ˙ 2 ( t ) τ ¯ 2 < 1 ; and u i ( t ) = ( u i 1 ( t ) , ⋯, u i n ( t ) ) T R n is the control input of the ith node. Besides, the initial state of system (1) is defined as x i ( r ) = ξ i ( r ) , r [ τ M , 0 ] , τ M = max { τ 1 , τ 2 } , i V .
Our objective is to synchronize the CDN (1) of N nodes with m ¯ desired heterogeneous states, which can be m ¯ different reference trajectories, m ¯ equilibrium points, m ¯ periodic orbits or m ¯ chaotic attractors, event in the presence of deception attacks. For this purpose, we denote such m ¯ desired heterogeneous states by s k ( t ) R n , k M , which are defined in accordance with the following equation:
s ˙ k ( t ) = W 1 k f k ( s k ( t ) ) + W 2 k f k ( s k ( t τ 1 ( t ) ) ) ,
where W 1 k = W ˘ 1 i , W 2 k = W ˘ 2 i , f k ( · ) = f ˘ i ( · ) , i P k = { l k 1 + 1 , , l k } , i V , k M . The initial state of system (2) is defined as s k ( r ) = ξ ^ k ( r ) , r [ τ 1 , 0 ] .
Combining the CDN in (1) and the heterogeneous states in (2), the objective is to design a suitable cluster synchronization controller u i ( t ) for each node i belonging to the cluster P k such that x i ( t ) s k ( t ) for any i P k and k M . Then, it is clear that
S ( t ) = ( s 1 ( t ) , , s 1 ( t ) n 1 , , s m ¯ ( t ) , , s m ¯ ( t ) ) n m ¯
denotes the desired cluster synchronization pattern under the proposed synchronization controller.
Furthermore, the nonlinear functions satisfy the following mild assumption.
Assumption 1 
([1]). There exist real constant matrices Γ 1 k and Γ 2 k with Γ 2 k Γ 1 k 0 , k M , such that for any w, v R n , the following inequality holds
( f k ( w ) f k ( v ) Γ 1 k ( w v ) ) T ( f k ( w ) f k ( v ) Γ 2 k ( w v ) ) 0 .
Remark 1. 
For the nonlinear function f k ( · ) which describes the internal dynamics of nodes in cluster k, the difference between its values at two arbitrary states w and v can be ‘sandwiched’ between two linear functions. In other words, f k ( · ) does not grow faster than a linear rate—this prevents unbounded nonlinearity from destabilizing the network. For example, let f k ( x ) = tanh ( x ) , we can choose Γ 1 k = 0 and Γ 2 k = I n . For any w and v, ( tanh ( w ) tanh ( v ) ) T ( tanh ( w ) tanh ( v ) I m ( w v ) ) 0 .
Assumption 2. 
There exist scalars δ 1 , δ 2 > 0 such that for any w , v R n × n , the following inequalities hold
( g 1 ( w ) g 1 ( v ) ) T ( g 1 ( w ) g 1 ( v ) ) δ 1 ( w v ) T ( w v ) , ( g 2 ( w ) g 2 ( v ) ) T ( g 2 ( w ) g 2 ( v ) ) δ 2 ( w v ) T ( w v ) .
Remark 2. 
For the coupling nonlinear functions g 1 ( · ) and g 2 ( · ) which describe interactions between nodes, the ‘size’ (Euclidean norm) of the difference between their values at two states w and v is at most a constant multiple of the ‘size’ of the state difference w v . For example, let g 1 ( t ) = ( 0.3 sin ( x 1 ) , 0.4 tanh ( x 2 ) ) T , we can choose δ 1 = 0.23 .

2.3. A Dynamic Event-Triggered Transmission Mechanism

To solve the above cluster synchronization problem, the widely-adopted synchronization controller takes the following form of
u i ( t ) = K i e i ( t ) = K i ( x i ( t ) s k ( t ) ) , i P k , k M ,
where K i > 0 is the controller gain to be designed and e i ( t ) represents the cluster synchronization error.
It is clear that the error signal e i ( t ) in (4) on node i P k has to be transmitted to the controller at every continuous time instant t. This may cause excessive usage of the limited computation and communication resources of each node and the network medium. In the following section, a dynamic event-triggered mechanism is considered under which the cluster synchronization controller in (4) can be updated in an intermittent manner.
For any i P k , let the triggering time sequence be denoted by { t q i } q = 1 + with 0 = t 1 i < t 2 i < < t q i < . Then, the following triggering mechanism specifies how the triggering times can be recursively determined
t q + 1 i = inf { t > t q i | π i η i ( t ) + θ i [ ζ i e i T ( t ) Ψ i e i ( t ) ( e i ( t ) e i ( t q i ) ) T Ψ i ( e i ( t ) e i ( t q i ) ) ] > 0 } ,
where Ψ i is positive define matrix, π i > 0 , θ i > 0 , ζ i ( 0 , 1 ) , i P k , and  η i ( t ) is an auxiliary dynamic variable satisfying
η ˙ i ( t ) = ϱ i η i ( t ) + ζ i e i T ( t ) Ψ i e i ( t ) ( e i ( t ) e i ( t q i ) ) T Ψ i ( e i ( t ) e i ( t q i ) ) ,
where η i ( 0 ) = η i 0 > 0 and ϱ i > 0 , i P k .
Remark 3. 
The triggered condition π i η i ( t ) + θ i [ ζ i e i T ( t ) Ψ i e i ( t ) ( e i ( t ) e i ( t q i ) ) T Ψ i ( e i ( t ) e i ( t q i ) ) ] > 0 in (5) means that only when the current data (error) e i ( t ) satisfying the inequality will be triggered and released. From the sensor’s perspective, this basically means that the continuous data e i ( t ) has no need to be persistently transmitted to the controller. Meanwhile, at the controller side, during  [ t q i , t q + 1 i ) , the controller will not be updated with any new data but instead using the previously triggered data e i ( t q i ) , namely, u i ( t ) = K i e i ( t ) for any t [ t q i , t q + 1 i ) . As a result, compared with the continuous-time cluster synchronization controller (4), the consumption of computation and communication resources of the sensor and controller can be significantly reduced under the above event-triggered cluster synchronization controller. On the other hand, the auxiliary dynamic variable η i ( t ) possesses an important non-negative feature which plays an important role in reducing the frequency of data transmissions. Specifically, it is easy to get that ζ i e i T ( t ) Ψ i e i ( t ) ( e i ( t ) e i ( t q i ) ) T Ψ i ( e i ( t ) e i ( t q i ) ) > π i η i ( t ) θ i during [ t q i , t q + 1 i ) . Then, it follows from (6) that η ˙ i ( t ) > ϱ i η i ( t ) π i η i ( t ) θ i , which leads to η i ( t ) 0 for t [ 0 , + ) based on the comparison principle.
Remark 4. 
π i and ϱ i primarily suppress unnecessary triggers by adjusting the auxiliary variable’s influence, while θ i and ζ i directly tune the sensitivity of the error-based triggering condition—properly selecting them balances communication resource savings and synchronization performance. The Table 2 shows the selection guidelines of parameters.

2.4. Modeling of Random Deception Attacks

Once the data packet ( t q i , e i ( t q i ) ) with its time stamp t q i is triggered, it will be released over certain communication network or channel. Such a released data packet is considered to be important for achieving the desired cluster synchronization objective. However, most realistic communication networks suffer from inherent security vulnerabilities due to their openness or insufficient protection against malicious cyber attacks. To make the desired cluster synchronization controller resilient and secure to malicious cyber attacks, it is thus imperative to incorporate cyber attacks into the controller design. In doing so, we first present the following random deception attack model
e ¯ i ( t ) = α ( t ) h ( e i ( t q i ) ) + ( 1 α ( t ) ) e i ( t q i ) , t [ t q i , t q + 1 i )
for any i P k , k M , where e ¯ i ( t ) represents the actually received data at the controller side, h ( e i ( t q i ) ) denotes the deception data or signal injected by attackers over the network or during network transmission. For simplicity and without loss of generality, it is assumed that h ( v ) = ( h 1 ( v ) , , h n ( v ) ) T , h i ( v ) , i = 1 , , n , is a continuous function, and for v 1 , v 2 R n , h ( · ) satisfies ( h ( v 1 ) h ( v 2 ) ) T ( h ( v 1 ) h ( v 2 ) ) ( v 1 v 2 ) T H ( v 1 v 2 ) , h ( 0 ) = 0 , where H R n × n is a known positive definite matrix. The function h ( · ) represents the adversary’s falsification strategy, for example, scaling, offsetting, or distorting the original error signal e i ( t q i ) to produce the attacked signal h ( e i ( t q i ) ) . The matrix H serves as a bound on the attack’s maximum allowable distortion. Such a bounding assumption on the deception signal is reasonable since (1) realistic adversaries are often energy-limited and may not be able to inject arbitrarily large data packets, and (2) arbitrarily large injection signalS may be easily detected by the existing anomaly detector via checking the data residue.
Furthermore, α ( t ) in (7) is a Bernoulli distribution variable satisfying Pr ( ff ( t ) = 1 ) = ff ¯ and Pr ( ff ( t ) = 0 ) = 1 ff ¯ , where α ¯ ( 0 , 1 ) is known constant. Such a stochastic variable is introduced to model the random characteristics of real-world deception attacks. Since our focus is placed on the deception attacks occurring within the network channels or during networked data transmission, it is mild to assume a homogeneous stochastic variable α ( t ) for all the network channels. The Bernoulli-distributed attack model adopted in this paper is a simplified yet practical choice, and its rationale lies in two key aspects aligned with real-world scenarios: First, it effectively captures the binary ’hit-or-miss’ nature of deception attacks—in actual communication channels, an attacker either injects falsified data (attack occurs) or does not interfere (no attack), and the Bernoulli variable directly maps this discrete stochasticity. Second, the model’s statistical property ( E [ α ( t ) ] = α ¯ ) enables tractable mean-square stability analysis, which is critical for deriving explicit linear matrix inequality (LMI) conditions and feasible controller gains—an essential step for validating the proposed secure synchronization framework through both theoretical proofs and numerical simulations.
Remark 5. 
While recent work on deception attacks focuses on output feedback PID control or switched system resilience, our study uniquely integrates dynamic event-triggered mechanisms with cluster synchronization, addressing the under-explored challenge of secure grouping in complex networks rather than full-network consensus. Unlike the static event-triggered designs, our auxiliary variable-based triggering rule (6) adaptively adjusts to random deception attacks. Compared to works handling asynchronous DoS attacks via linear auxiliary trajectories [19], we explicitly model deception attack dynamics with a Bernoulli variable and bounded disturbance matrix H, providing verifiable guidelines for H estimation that are absent in prior LMI-based resilient control frameworks.

2.5. The Problem to Be Addressed

Based on the dynamic event-triggered mechanism (5) and attack model (7), we are interested in constructing and design the following cluster synchronization controller
u i ( t ) = K i e ¯ i ( t ) , t [ t q i , t q + 1 i ) .
From (5)–(8), for  t [ t q i , t q + 1 i ) , the synchronization error dynamics can be written as
e ˙ i ( t ) = W 1 k f ¯ k ( e i ( t ) ) + W 2 k f ¯ k ( e i ( t τ 1 ( t ) ) ) + j = 1 N a i j Λ 1 g ¯ 1 ( e j ( t ) ) + j = 1 N b i j Λ 2 g ¯ 2 ( e j ( t τ 2 ( t ) ) ) + α ( t ) K i h ( e i ( t q i ) ) + ( 1 α ( t ) ) K i e i ( t q i ) ,
where f ¯ k ( e i ( t ) ) = f k ( x i ( t ) ) f k ( s k ( t ) ) , f ¯ k ( e i ( t τ 1 ( t ) ) ) = f k ( x i ( t τ ( t ) ) ) f k ( s k ( t τ 1 ( t ) ) ) , g ¯ 1 ( e i ( t ) ) = g 1 ( x i ( t ) ) g 1 ( s k ( t ) ) , g ¯ 2 ( e i ( t τ 2 ( t ) ) ) = g 2 ( x i ( t τ 2 ( t ) ) ) g 2 ( s k ( t τ 2 ( t ) ) ) , i P k , k M ,   i V .
Furthermore, let ϵ i ( t ) = e i ( t ) e i ( t q i ) , t [ t q i , t q + 1 i ) , e ˜ k ( t ) = ( e l k 1 + 1 T ( t ) , , e l k T ( t ) ) T , k M . The error system can be rewritten as, for  k M ,
e ˜ ˙ k ( t ) = W ¯ 1 k F ¯ k ( e ˜ k ( t ) ) + W ¯ 2 k F ¯ k ( e ˜ k ( t τ 1 ( t ) ) ) + j = 1 m ¯ A ˜ k j Λ 1 G ¯ 1 ( e ˜ j ( t ) ) + j = 1 m ¯ B ˜ k j Λ 2 G ¯ 2 ( e ˜ j ( t τ 2 ( t ) ) ) + ( α ( t ) α ¯ ) K ˜ k H ¯ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) + α ¯ K ˜ k H ¯ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) + ( 1 α ¯ ) K ˜ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) ( α ( t ) α ¯ ) K ˜ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) ,
where
W ¯ 1 = diag { W 1 k , , W 1 k } n k , W ¯ 2 = diag { W 2 k , , W 2 k } n k ,
F ¯ k ( e ˜ k ( t ) ) = ( f ¯ k T ( e l k 1 + 1 ( t ) ) , , f ¯ k T ( e l k ( t ) ) T ,
F ¯ k ( e ˜ k ( t τ 1 ( t ) ) ) = ( f ¯ k T ( e l k 1 + 1 ( t τ 1 ( t ) ) ) , , f ¯ k T ( e l k ( t τ 1 ( t ) ) ) ) T ,
A ˜ k j = a l k 1 + 1 , l j 1 + 1 a l k 1 + 1 , l j a l k , l j 1 + 1 a l k , l j R n k × n j ,
G ¯ 1 ( e ˜ j ( t ) ) = ( g ¯ 1 T ( e l j 1 + 1 ( t ) ) , , g ¯ 1 T ( e l j ( t ) ) ) T ,
B ˜ k j = b l k 1 + 1 , l j 1 + 1 b l k 1 + 1 , l j b l k , l j 1 + 1 b l k , l j R n k × n j ,
G ¯ 2 ( e ˜ j ( t τ 2 ( t ) ) ) = ( g ¯ 2 T ( e l j 1 + 1 ( t τ 2 ( t ) ) ) , , g ¯ 2 T ( e l j ( t τ 2 ( t ) ) ) ) T ,
K ˜ k = diag { K l k 1 + 1 , , K l k 1 + n k } n k ,
ϵ ˜ k ( t ) = ( ϵ l k 1 + 1 T ( t ) , , ϵ l k T ( t ) ) T ,
H ¯ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) = ( h T ( e l k 1 + 1 ( t ) ϵ l k 1 + 1 ( t ) ) , , h T ( e l k ( t ) ϵ l k ( t ) ) ) T .
The main problem to be addressed in this paper can now be stated as follows.
Problem 1. 
For the CDNs in (1), we aim to design a secure dynamic event-triggered cluster synchronization controller in the form of (8) such that the desired secure cluster synchronization objective is achieved regardless of the simultaneous effects of intermittent data transmission under (5) and random deception attacks under (7), i.e.,  E { i = l k 1 + 1 l k e i ( t ) } = 0 as t + for any k M and initial condition.
Before ending this section, some definitions, assumption, lemmas are recalled.
Definition 1 
([15]). Consider D = ( d i j ) R N × N . If
(1) d i j 0 , for  i j , and  d i i = j = 1 , j i N d i j = j = 1 , j i N d j i , i = 1 , 2 , , N .
(2) D is irreducible.
Then we say D D 1 .
Definition 2 
([15]). For an N × N matrix
D = D 11 D 12 D 1 m D 21 D 22 D 2 m D m 1 D m 2 D m m ,
with D i i R ( l i l i 1 ) × ( l i l i 1 ) , D i j R ( l i l i 1 ) × ( l j l j 1 ) , i, j = 1 , 2 , , m , if each block D i j is a zero-row-sum matrix, then we say D D 1 ( m ) . Furthermore, if  D i i D 1 , i = 1 , 2 , , d , then we say D D 2 ( m ) .
Assumption 3. 
The coupling matrix A in (1) satisfies A D 2 ( m ¯ ) , B D 2 ( m ¯ ) .
Remark 6. 
The non-delay coupling matrix A and delayed coupling matrix B must have two properties. (1) For each cluster, the sum of coupling weights from any node in the cluster to all other nodes in the same cluster is zero which ensures internal cluster balance. (2) Each submatrix of A and B corresponding to a single cluster is ’irreducible’, in other words, no isolated nodes in the cluster. For example, consider a CDN with 2 clusters: P 1 = { 1 , 2 } , P 2 = { 3 , 4 } . We can choose the non-delayed coupling matrix:
1 1 0 0 1 1 0 0 0 0 2 2 0 0 2 2 .
Lemma 1 
([41]). For any constant positive matrix M R m × m , scalar τ ^ τ ( t ) < τ ¯ and vector function e ˙ ( t ) : [ τ ¯ , τ ^ ] R m such that the following integration is well defined, then it holds that
( τ ¯ τ ^ ) t τ ¯ t τ ^ ( e ˙ ( ϑ ) ) T M e ˙ ( ϑ ) d ϑ e ( t τ ¯ ) e ( t τ ( t ) ) e ( t τ ^ ) T M M 0 2 M M M e ( t τ ¯ ) e ( t τ ( t ) ) e ( t τ ^ ) .
Lemma 2. 
(Schur Complement) Given matrices U 1 , U 2 , U 3 , where U 1 T = U 1 , U 3 T = U 3 > 0 , then U 1 + U 2 U 3 1 U 2 T < 0 if and only if
U 1 U 2 U 2 T U 3 < 0 , U 3 U 2 T U 2 U 1 < 0 .
Lemma 3. 
For any matrices R > 0 , Q and scalar ι, the following inequality holds
Q R 1 Q ι 2 R 2 ι Q .
For the sake of simplicity, some mathematical notations are introduced as follows.
e ( t ) = e ˜ 1 T ( t ) , , e ˜ m ¯ T ( t ) T , ϵ ( t ) = ϵ ˜ 1 T ( t ) , , ϵ ˜ m ¯ T ( t ) T ,
z ( t ) = ( e T ( t ) , e T ( t τ 1 ( t ) ) , e T ( t τ 1 ) , e T ( t τ 2 ( t ) ) , e T ( t τ 2 ) , F ¯ T ( e ( t ) ) , F ¯ T ( e ( t τ 1 ( t ) ) ) , G ¯ 1 T ( e ( t ) ) , G ¯ 2 T ( e ( t τ 2 ( t ) ) ) , H ¯ T ( e ( t ) ϵ ( t ) ) , ϵ T ( t ) ) T ,
Φ = ( ( 1 α ¯ ) K ˜ , 0 , 0 , 0 , 0 , W ˜ 1 , W ˜ 2 , A , B , α ¯ K ˜ , ( 1 α ¯ ) K ˜ ) ,
F ¯ ( e ( t ) ) = ( F ¯ 1 T ( e ˜ 1 ( t ) ) , , F ¯ m ¯ T ( e ˜ m ¯ ( t ) ) T ,
F ¯ ( e ( t τ 1 ( t ) ) ) = ( F ¯ 1 T ( e ˜ 1 ( t τ 1 ( t ) ) ) , , F ¯ m ¯ T ( e ˜ m ¯ ( t τ 1 ( t ) ) ) ) T ,
G ¯ 1 ( e ( t ) ) = ( G ¯ 1 T ( e ˜ 1 ( t ) ) , , G ¯ 1 T ( e ˜ m ¯ ( t ) ) ) T ,
G ¯ 2 ( e ( t τ 2 ( t ) ) ) = ( G ¯ 2 T ( e ˜ 1 ( t τ 2 ( t ) ) ) , , G ¯ 2 T ( e ˜ m ¯ ( t τ 2 ( t ) ) ) ) T ,
W ˜ 1 = diag { W ¯ 11 , , W ¯ 1 m ¯ } , W ˜ 2 = diag { W ¯ 21 , , W ¯ 2 m ¯ } ,
A = A ˜ 11 Λ 1 A ˜ 1 m ¯ Λ 1 A ˜ m ¯ 1 Λ 1 A ˜ m ¯ m ¯ Λ 1 ,
B = B ˜ 11 Λ 2 B ˜ 1 m ¯ Λ 2 B ˜ m ¯ 1 Λ 2 B ˜ m ¯ m ¯ Λ 2 ,
H ¯ ( e ( t ) ϵ ( t ) ) = ( H ¯ 1 T ( e ˜ 1 ( t ) ϵ ˜ 1 ( t ) ) , , H ¯ m ¯ T ( e ˜ m ¯ ( t ) ϵ ˜ m ¯ ( t ) ) ) T ,
ϵ ( t ) = ( ϵ ˜ 1 ( t ) , , ϵ ˜ m ¯ ( t ) ) T , K ˜ = diag { K ˜ 1 , , K ˜ m ¯ } ,
Θ 1 = diag { θ 1 Ψ 1 , , θ N Ψ N } ,
Θ 2 = diag { θ 1 ζ 1 Ψ 1 , , θ N ζ N Ψ N } ,
Θ 3 = diag { ζ 1 Ψ 1 , , ζ N Ψ N } ,
Ψ = diag { Ψ 1 , , Ψ N } ,
H = I N H = diag { H , , H } N ,
Γ ˜ k = Γ 1 k T + Γ 2 k T 2 , Γ ¯ k = Γ 1 k T Γ 2 k + Γ 2 k T Γ 1 k 2 ,
Γ ˜ = diag { Γ ˜ 1 , , Γ ˜ 1 , , Γ ˜ m ¯ , , Γ ˜ m ¯ } ,
Γ ¯ = diag { Γ ¯ 1 , , Γ ¯ 1 , , Γ ¯ m ¯ , , Γ ¯ m ¯ } .

3. Main Results

3.1. The Dynamic Event-Triggered Case

This subsection aims to deal with the secure cluster synchronization issue of CDNs (1) under dynamic event-triggered scheme and design suitable pinning controllers. Firstly, a theorem about secure cluster synchronization of CDNs under deception attacks is given.
Theorem 1. 
Consider the CDNs in (1), suppose that Assumptions 1–3 hold. For given parameters τ M > 0 , τ ¯ 1 , τ ¯ 2 [ 0 , 1 ) , π i > 0 , θ i > 0 , ζ i > 0 , η i ( 0 ) > 0 , ϱ i > 0 , i V ; α ¯ ( 0 , 1 ) , δ 1 > 0 , δ 2 > 0 , ρ k > 0 , ϖ k > 0 , n k , p k N + , k M , β > 0 , λ ( 0 , β ) , and matrices H > 0 and K i , i V , if there exist scalars ι q > 0 , q = 1 , , 6 , positive define matrices Q ˜ k , R ˜ 1 k , R ˜ 2 k , R ˜ 3 k , R ˜ 4 k , M ˜ 1 k , M ˜ 2 k , k M such that
ι 1 π i + λ ϱ i 0 , i V ,
D ˜ = D ¯ τ 1 2 Φ T τ 2 2 Φ T τ 1 2 M ˜ 1 1 0 τ 2 2 M ˜ 2 1 < 0
hold, where
D ¯ = D 11 + Θ 3 D 12 0 D 14 0 D 16 D 17 D 18 D 19 D 10 D 111 D 22 D 23 0 0 0 D 27 0 0 0 0 D 33 0 0 0 0 0 0 0 0 D 44 D 45 0 0 0 0 0 0 D 55 0 0 0 0 0 0 D 66 0 0 0 0 0 D 77 0 0 0 0 D 88 0 0 0 D 99 0 0 D 00 0 D ¯ 1111 , D 11 = ( 1 α ¯ ) ( Q ˜ K ˜ + K ˜ T Q ˜ ) + R ˜ 1 + R ˜ 3 + ι 1 Θ 2 + ι 4 δ 1 I n N ι 2 Γ ¯ + ι 6 H M ˜ 1 M ˜ 2 , D 12 = M ˜ 1 , D 14 = M ˜ 2 , D 16 = Q ˜ W ˜ 1 ι 2 Γ ˜ , D 17 = Q ˜ W ˜ 2 , D 18 = Q ˜ A , D 19 = Q ˜ B , D 10 = α ¯ Q ˜ K ˜ , D 111 = ι 6 H ( 1 α ¯ ) Q ˜ K ˜ , D 22 = ( 1 τ ¯ 1 ) R ˜ 1 + R ˜ 2 ι 2 Γ ¯ 2 M ˜ 1 , D 23 = M ˜ 1 , D 27 = ι 3 Γ ˜ , D 33 = R ˜ 2 M ˜ 1 , D 44 = ( 1 τ ¯ 2 ) R ˜ 3 + R ˜ 4 + ι 5 δ 2 I n N 2 M ˜ 2 , D 45 = M ˜ 2 , D 55 = R ˜ 4 M ˜ 2 , D 66 = ι 2 I n N , D 77 = ι 3 I n N , D 88 = ι 4 I n N , D 99 = ι 5 I n N , D 00 = ι 6 I n N , D ¯ 11 , 11 = D 11 , 11 Ψ , D 11 , 11 = ι 1 Θ 1 + ι 6 H , Q ˜ = diag { Q ˜ 1 , , Q ˜ m ¯ } , R ˜ 1 = diag { R ˜ 11 , , R ˜ 1 m ¯ } , R ˜ 2 = diag { R ˜ 21 , , R ˜ 2 m ¯ } , R ˜ 3 = diag { R ˜ 31 , , R ˜ 3 m ¯ } , R ˜ 4 = diag { R ˜ 41 , , R ˜ 4 m ¯ } , M ˜ 1 = diag { M ˜ 11 , , M ˜ 1 m ¯ } , M ˜ 2 = diag { M ˜ 21 , , M ˜ 2 m ¯ } ,
then the closed-loop networks (1) under dynamic event-triggered scheme (5) satisfying (6) is secure cluster synchronization for deception attacks satisfying (7).
Proof. 
Construct the following piecewise Lyapunov functional candidate
W ( t ) = exp { β t } V ( t ) + i = 1 N η i ( t ) ,
V ( t ) = V 1 ( t ) + V 2 ( t ) + V 3 ( t ) ,
where β > 0 , and 
V 1 ( t ) = k = 1 m ¯ e ˜ k T ( t ) Q ˜ k e ˜ k ( t ) , V 2 ( t ) = k = 1 m ¯ t τ 1 ( t ) t e ˜ k T ( ν ) R ˜ 1 k e ˜ k ( ν ) d ν + k = 1 m ¯ t τ 1 t τ 1 ( t ) e ˜ k T ( ν ) R ˜ 2 k e ˜ k ( ν ) d ν + k = 1 m ¯ t τ 2 ( t ) t e ˜ k T ( ν ) R ˜ 3 k e ˜ k ( ν ) d ν + k = 1 m ¯ t τ 2 t τ 2 ( t ) e ˜ k T ( ν ) R ˜ 4 k e ˜ k ( ν ) d ν , V 3 ( t ) = τ 1 k = 1 m ¯ τ 1 0 t + ϑ t e ˜ ˙ k T ( ν ) M ˜ 1 k e ˜ ˙ k T ( ν ) d ν d ϑ + τ 2 k = 1 m ¯ τ 2 0 t + ϑ t e ˜ ˙ k T ( ν ) M ˜ 2 k e ˜ ˙ k T ( ν ) d ν d ϑ
where Q ˜ k = diag { Q l k 1 + 1 , , Q l k } , R ˜ i k = diag { R i , l k 1 + 1 , , R i , l k } , i = 1 , 2 , 3 , 4 , M ˜ i k = diag { M i , l k 1 + 1 , , M i , l k } , i = 1 , 2 ; Q l , R i , l , M 1 l , M 2 l , i = 1 , 2 , 3 , l = 1 , , N , are symmetric positive define matrice with appropriate dimensions.
From Remark 3 and the definition of V ( t ) , we have W ( t ) > 0 . Then, we obtain
E { V ˙ 1 ( t ) } = E k = 1 m ¯ 2 e ˜ k T ( t ) Q ˜ k e ˜ ˙ k ( t ) ,
E { V ˙ 2 ( t ) } = E k = 1 m ¯ e ˜ k T ( t ) ( R ˜ 1 k + R ˜ 3 k ) e ˜ k ( t ) ( 1 τ ˙ 1 ( t ) ) k = 1 m ¯ e ˜ k T ( t τ 1 ( t ) ) R ˜ 1 k e ˜ k ( t τ 1 ( t ) ) ( 1 τ ˙ 2 ( t ) ) k = 1 m ¯ e ˜ k T ( t τ 2 ( t ) ) R ˜ 3 k e ˜ k ( t τ 2 ( t ) ) + ( 1 τ ˙ 1 ( t ) ) k = 1 m ¯ e ˜ k T ( t τ 1 ( t ) ) R ˜ 2 k e ˜ k ( t τ 1 ( t ) ) k = 1 m ¯ e ˜ k T ( t τ 1 ) R ˜ 2 k e ˜ k ( t τ 1 ) + ( 1 τ ˙ 2 ( t ) ) k = 1 m ¯ e ˜ k T ( t τ 2 ( t ) ) R ˜ 4 k e ˜ k ( t τ 2 ( t ) ) k = 1 m ¯ e ˜ k T ( t τ 2 ) R ˜ 4 k e ˜ k ( t τ 2 ) ,
E { V ˙ 3 ( t ) } = E τ 1 k = 1 m ¯ τ 1 0 e ˜ ˙ k T ( t ) M ˜ 1 k e ˜ ˙ k ( t ) d ϑ k = 1 m ¯ τ 1 0 e ˜ ˙ k T ( t + ϑ ) M ˜ 1 k e ˜ ˙ k ( t + ϑ ) d ϑ + τ 2 k = 1 m ¯ τ 2 0 e ˜ ˙ k T ( t ) M ˜ 2 k e ˜ ˙ k ( t ) d ϑ k = 1 m ¯ τ 2 0 e ˜ ˙ k T ( t + ϑ ) M ˜ 2 k e ˜ ˙ k ( t + ϑ ) d ϑ = E k = 1 m ¯ τ 1 2 e ˜ ˙ k T ( t ) M ˜ 1 k e ˜ ˙ k ( t ) + k = 1 m ¯ τ 2 2 e ˜ ˙ k T ( t ) M ˜ 2 k e ˜ ˙ k ( t ) τ 1 k = 1 m ¯ t τ 1 t e ˜ ˙ k T ( ϑ ) M ˜ 1 k e ˜ ˙ k ( ϑ ) d ϑ τ 2 k = 1 m ¯ t τ 2 t e ˜ ˙ k T ( ϑ ) M ˜ 2 k e ˜ ˙ k ( ϑ ) d ϑ .
From (17)–(19) and Lemma 1, we have
E { V ˙ 1 ( t ) } E k = 1 m ¯ e ˜ k T ( t ) Q ˜ k W ¯ 1 F ¯ k ( e ˜ k ( t ) ) + W ¯ 2 F ¯ k ( e ˜ k ( t τ 1 ( t ) ) ) + j = 1 m ¯ A ˜ k j Λ 1 G ¯ 1 ( e ˜ j ( t ) ) + j = 1 m ¯ B ˜ k j Λ 2 G ¯ 2 ( e ˜ j ( t τ 2 ( t ) ) ) + ( α ( t ) α ¯ ) K ˜ k H ¯ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) + α ¯ K ˜ k H ¯ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) + ( 1 α ¯ ) K ˜ k ( e ˜ k ( t ) ϵ ˜ k ( t ) ) ( α ( t ) α ¯ ) K ˜ k ( e ˜ k ( t ) ϵ ˜ k ( t ) )
E { V ˙ 2 ( t ) } E e T ( t ) ( R ˜ 1 + R ˜ 3 ) e ( t ) e T ( t τ 1 ) R ˜ 2 e ( t τ 1 ) e T ( t τ 2 ) R ˜ 4 e ( t τ 2 ) e T ( t τ 1 ( t ) ) ( ( 1 τ ¯ 1 ) R ˜ 1 R ˜ 2 ) e ( t τ 1 ( t ) ) e T ( t τ 2 ( t ) ) ( ( 1 τ ¯ 2 ) R ˜ 3 R ˜ 4 ) e ( t τ 2 ( t ) ) ,
E { V ˙ 3 ( t ) } = E k = 1 m ¯ τ 1 2 e ˜ ˙ k T ( t ) M ˜ 1 k e ˜ ˙ k ( t ) + k = 1 m ¯ τ 2 2 e ˜ ˙ k T ( t ) M ˜ 2 k e ˜ ˙ k ( t ) τ 1 k = 1 m ¯ t τ 1 t e ˜ ˙ k T ( ν ) M ˜ 1 k e ˜ ˙ k ( ν ) d ν τ 2 k = 1 m ¯ t τ 2 t e ˜ ˙ k T ( ν ) M ˜ 2 k e ˜ ˙ k ( ν ) d ν E e ( t ) e ( t τ 1 ( t ) ) e ( t τ 1 ) T M ˜ 1 M ˜ 1 0 2 M ˜ 1 M ˜ 1 M ˜ 1 × e ( t ) e ( t τ 1 ( t ) ) e ( t τ 1 ) + e ( t ) e ( t τ 2 ( t ) ) e ( t τ 2 ) T × M ˜ 2 M ˜ 2 0 2 M ˜ 2 M ˜ 2 M ˜ 2 e ( t ) e ( t τ 2 ( t ) ) e ( t τ 2 ) + τ 1 2 z T ( t ) Φ T M ˜ 1 Φ z T ( t ) + τ 2 2 z T ( t ) Φ T M ˜ 2 Φ z T ( t )
From Assumptions 1 and 2, we can obtain
e ( t ) F ¯ ( e ( t ) ) T Γ ¯ Γ ˜ I n N e ( t ) F ¯ ( t ) 0 ,
e ( t τ 1 ( t ) ) F ¯ ( e ( t τ 1 ( t ) ) ) T Γ ¯ Γ ˜ I n N e ( t τ 1 ( t ) ) F ¯ ( e ( t τ 1 ( t ) ) ) 0 ,
G ¯ 1 T ( e ( t ) ) G ¯ 1 ( e ( t ) ) δ 1 e T ( t ) e ( t ) ,
G ¯ 2 T ( e ( t τ 2 ( t ) ) ) G ¯ 2 ( e ( t τ 2 ( t ) ) ) δ 2 e T ( t τ 2 ( t ) ) e ( t τ 2 ( t ) ) .
The triggering condition in (5) can be rewritten as follows
i = 1 N π i η i ( t ) ϵ T ( t ) Θ 1 ϵ ( t ) + e T ( t ) Θ 2 e ( t ) > 0 .
From (20)–(27), we can further obtain
E { V ˙ ( t ) } E V ˙ 1 ( t ) + V ˙ 2 ( t ) + V ˙ 3 ( t ) + ι 1 ( i = 1 N π i η i ( t ) ϵ T ( t ) Θ 1 ϵ ( t ) + e T ( t ) Θ 2 e ( t ) ) ι 2 e ( t ) F ¯ ( e ( t ) ) T Γ ¯ Γ ˜ I n N e ( t ) F ¯ ( t ) ι 3 e ( t τ 1 ( t ) ) F ¯ ( e ( t τ 1 ( t ) ) ) T Γ ¯ Γ ˜ I n N × e ( t τ 1 ( t ) ) F ¯ ( e ( t τ 1 ( t ) ) ) ι 4 ( G ¯ 1 T ( e ( t ) ) G ¯ 1 ( e ( t ) ) δ 1 e T ( t ) e ( t ) ) + ι 5 ( δ 2 e T ( t τ 2 ( t ) ) e ( t τ 2 ( t ) ) )
G ¯ 2 T ( e ( t τ 2 ( t ) ) ) G ¯ 2 ( e ( t τ 2 ( t ) ) ) ι 6 ( H ¯ T ( e ( t ) ϵ ( t ) ) H ¯ ( e ( t ) ϵ ( t ) ) ( e ( t ) ϵ ( t ) ) T H ( e ( t ) ϵ ( t ) ) ) E τ 1 2 z T ( t ) Φ T M ˜ 1 Φ z T ( t ) + τ 2 2 z T ( t ) Φ T M ˜ 2 Φ z T ( t ) + z T ( t ) D z ( t ) + ι 1 i = 1 N π i η i ( t ) ,
where D = ( D i j ) 10 × 10 , ι i , i = 1 , , 5 are some positive constants.
Introducing a positive scalar λ ( 0 , β ) , one has from (13) that
E { W ˙ ( t ) + λ W ( t ) } = E { exp { β t } V ˙ ( t ) } + i = 1 N η ˙ i ( t ) + i = 1 N λ η i ( t ) ( β λ ) E { exp { β t } V ( t ) } E τ 1 2 z T ( t ) Φ T M ˜ 1 Φ z T ( t ) + τ 2 2 z T ( t ) Φ T M ˜ 2 Φ z T ( t ) + z T ( t ) D z ( t ) + ι 1 i = 1 N π i η i ( t ) ϵ T ( t ) Ψ ϵ ( t ) + e T ( t ) Θ 3 e ( t ) + i = 1 N λ η i ( t ) i = 1 N ϱ i η i ( t ) E z T ( t ) ( τ 1 2 Φ T M ˜ 1 Φ + τ 2 2 Φ T M ˜ 2 Φ + D ¯ ) z T ( t ) .
By applying Schur complement, one can obtain that (14) is equivalent to
τ 1 2 Φ T M ˜ 1 Φ + τ 2 2 Φ T M ˜ 2 Φ + D ¯ < 0 .
Then, it follows from (29) and (30) that E { W ˙ ( t ) } < λ W ( t ) , which implies lim t + E { i = l k 1 + 1 l k e i ( t ) } = 0 , k M . Hence, the CDNs in (1) under the proposed controller (8) achieves secure cluster synchronization. This completes the proof.    □
Based on Theorem 1, the synchronization controller design in terms of the desired controller gain matrices K i , i V , can be performed. Firstly, pre- and post- multiplying the inequality (14) by diag { I , Q ˜ , Q ˜ } , which yields
D ¯ τ 1 2 Φ ¯ T τ 2 2 Φ ¯ T τ 1 2 Q ˜ M ˜ 1 1 Q ˜ 0 τ 2 2 Q ˜ M ˜ 2 1 Q ˜ < 0 ,
where Φ ¯ = ( ( 1 α ¯ ) Q ˜ K ˜ , 0, 0, 0, 0, Q ˜ W ˜ 1 , Q ˜ W ˜ 2 , Q ˜ A , Q ˜ B , α ¯ Q ˜ K ˜ , ( 1 α ¯ ) Q ˜ K ˜ ) . Setting Q ˜ K ˜ = Ξ , then (31) can be rewritten as
D ^ τ 1 2 Φ ^ T τ 2 2 Φ ^ T τ 1 2 Q ˜ M ˜ 1 1 Q ˜ 0 τ 2 2 Q ˜ M ˜ 2 1 Q ˜ < 0 ,
where
D ^ 11 = ( 1 α ¯ ) ( Ξ + Ξ T ) + R ˜ 1 + R ˜ 3 + ι 1 Θ 2 + ι 4 δ 1 I n N ι 1 Γ ¯ + ι 5 H M ˜ 1 M ˜ 2 + Θ 3 ,
D ^ 10 = α ¯ Ξ , D ^ 111 = ι 6 H ( 1 α ¯ ) Ξ ,
Φ ^ = ( ( 1 α ¯ ) Ξ , 0 , 0 , 0 , 0 , Q ˜ W ˜ 1 , Q ˜ W ˜ 2 , Q ˜ A , Q ˜ B , α ¯ Ξ , ( 1 α ¯ ) Ξ ) T .
D ^ = D ^ 11 D 12 0 D 14 0 D 16 D 17 D 18 D 19 D ^ 10 D ^ 111 D 22 D 23 0 0 0 D 27 0 0 0 0 D 33 0 0 0 0 0 0 0 0 D 44 D 45 0 0 0 0 0 0 D 55 0 0 0 0 0 0 D 66 0 0 0 0 0 D 77 0 0 0 0 D 88 0 0 0 D 99 0 0 D 00 0 D ¯ 11 , 11 ,
In light of Lemma 3, one can get
D ^ τ 1 2 Φ ^ T τ 2 2 Φ ^ T 2 τ 1 2 Q ˜ + τ 1 2 M ˜ 1 0 2 τ 2 2 Q ˜ + τ 2 2 M ˜ 2 < 0 .
Based on the formulation above, the following theorem states a sufficient condition on the existence of the desired secure cluster dynamic event-triggered synchronization controller (8).
Theorem 2. 
Consider the CDNs in (1), suppose that Assumptions 1–3 hold. For given parameters τ M > 0 , τ ¯ 1 , τ ¯ 2 [ 0 , 1 ) , π i > 0 , θ i > 0 , ζ i > 0 , η i ( 0 ) > 0 , ϱ i > 0 , i V ; α ¯ ( 0 , 1 ) , δ 1 > 0 , δ 2 > 0 , ρ k > 0 , ϖ k > 0 , n k , p k N + , k M , β > 0 , λ ( 0 , β ) , and matrix H > 0 , if there exist scalers ι q > 0 , q = 1 , , 6 , some symmetric positive define matrices Q ˜ k , R ˜ 1 k , R ˜ 2 k , R ˜ 3 k , M ˜ k , k M , andΞ with appropriate dimensions, such that the inequalities (13) and (33) are satisfied, then the secure cluster synchronization problem is solved under the controller gain matrix given as
K ˜ = Q ˜ 1 Ξ .
Proof. 
By using Schur complement and Q ˜ M ˜ 1 1 Q ˜ 2 Q ˜ + M ˜ 1 , Q ˜ M ˜ 2 1 Q ˜ 2 Q ˜ + M ˜ 2 , The theorem can be conducted immediately from Theorem 1.    □
Remark 7. 
The LMIs (33) in Theorem 2 were solved using MATLAB R2023b with the Robust Control Toolbox (Version 6.15)—specifically, the lmilab environment and feasp function. This toolbox is widely adopted in control systems research for LMI-based design due to its compatibility with standard academic LMI formulations. Algorithm 1 is given to show how to solve LMI and compute controller gains.

3.2. The Static Event-Triggered Case

It is worth mentioning that the dynamic event-triggered mechanism in (5) includes the static one as a special case. In addition, the results for secure cluster synchronization of the CDNs in (1) under a static event-triggered mechanism can be developed straightforwardly from Theorem 1 by letting θ approach to + . Such a static event-triggered mechanism can be described by
t q + 1 i = inf { t > t q i | ζ i ( e i ( t ) ) T e i ( t ) ( e i ( t ) e i ( t q i ) ) T Ψ i ( e i ( t ) e i ( t q i ) ) 0 } ,
where ζ i ( 0 , 1 ) . Then the design criterion for secure cluster synchronization of the CDNs (1) under the above static event-triggered mechanism is stated as follows. The proof is omitted for concise.
Algorithm 1 LMI and Compute Controller Gains
Input: N, m ¯ , P = [ P 1 , P 2 , , P m ¯ ] , n, τ 1 , τ 2 , τ M = max ( τ 1 , τ 2 ) , W 1 k , W 2 k , Γ 1 k , Γ 2 k , δ 1 , δ 2 , A , B , Λ 1 , Λ 2 , α ¯ ( 0 , 1 ) , H > 0 , π i > 0 , θ i > 0 , ζ i ( 0 , 1 ) , ϱ i > 0 , η 0 > 0 ), ι q > 0 ( q = 1 , , 6 ) , β > 0 , λ ( 0 , β ) , tol = 10 8 , T sim , d t = 10 4 .
Output:  K i ( i = 1 , , N ) .
 1:
Step 1: Formulate LMI
 2:
1.1 Define block-diagonal decision matrices: Q, R 1 , R 2 , R 3 , R 4 , M 1 , M 2 , Ξ .
 3:
1.2 Compute auxiliary matrices for triggering and attacks: Θ 1 , Θ 2 , Θ 3 with Ψ i > 0 (predefined positive definite matrices, e.g.,  Ψ i = I n ).
 4:
1.3 Construct core LMI block D ¯ :
D 11 = ( 1 α ¯ ) ( Ξ + Ξ T ) + R 1 + R 3 + ι 1 Θ 2 + ι 4 δ 1 I n N ι 2 Γ ¯ + ι 6 H M 1 M 2 ,
D 12 = M 1 , D 14 = M 2 , D 16 = Q W ˜ 1 ι 2 Γ ˜ , D 10 = α ¯ Ξ , D 111 = ι 6 H ( 1 α ¯ ) Ξ ,
and fill remaining blocks ( D 22 , D 23 , ).
 5:
1.4 Form full LMI via Schur complement:
D ˜ = D ¯ τ 1 2 Φ T τ 2 2 Φ T τ 1 2 M 1 1 0 τ 2 2 M 2 1 < 0 ,
where Φ = [ ( 1 α ¯ ) Ξ , 0 , 0 , 0 , 0 , Q W ˜ 1 , Q W ˜ 2 , Q A , Q B , α ¯ Ξ , ( 1 α ¯ ) Ξ ] T .
 6:
1.5 Add constraints:
Q > 0 , R 1 > 0 , R 2 > 0 , R 3 > 0 , R 4 > 0 , M 1 > 0 , M 2 > 0 , ι 1 π i + λ ϱ i 0 ( i ) .
  Step 2: Solve LMI and Controller Gains
 7:
2.1 Call LMI solver (e.g., MATLAB feasp) to solve D ˜ < 0 with tolerance tol.
 8:
if no feasible solution exists then
 9:
   Print ’LMI infeasible: Relax H , τ 1 , τ 2 , or ι q ’ and terminate.
10:
else
11:
   Extract feasible matrices Q feas and Ξ feas .
12:
end if
13:
2.2 Calculate controller gains: K = Q feas 1 Ξ feas , and split K into per-node gains K i based on cluster partition P.
14:
return  K i
Theorem 3. 
Consider the CDNs in (1), suppose that Assumptions 1–3 hold. For given parameters τ M > 0 , τ ¯ 1 , τ ¯ 2 [ 0 , 1 ) , ζ i ( 0 , 1 ) , i V ; α ¯ ( 0 , 1 ) , δ 1 > 0 , δ 2 > 0 , ρ k > 0 , ϖ k > 0 , n k , p k N + , k M , and matrix H > 0 , if there exist scalers ι q > 0 , q = 1 , , 6 , some symmetric positive define matrices Q ˜ k , R ˜ 1 k , R ˜ 2 k , R ˜ 3 k , M ˜ k , k M , and Ξ ¯ with appropriate dimensions such that
Π ¯ = Υ ˘ τ 1 2 Φ ˘ T τ 2 2 Φ ˘ T 2 τ 1 2 Q ˜ + τ 1 2 M ˜ 1 0 τ 2 2 Q ˜ + τ 2 2 M ˜ 2 < 0 ,
where
Υ 11 = ( 1 α ¯ ) ( Ξ ¯ + Ξ ¯ T ) + R ˜ 1 + R ˜ 3 + ι 1 Θ 3 + ι 4 δ 1 I n N ι 2 Γ ¯ + ι 6 H M ˜ 1 M ˜ 2 , Υ 10 = α ¯ Ξ ¯ , Υ 111 = ι 6 H ( 1 α ¯ ) Ξ ¯ , Φ ˘ = ( ( 1 α ¯ ) Ξ ¯ , 0 , 0 , 0 , 0 , Q ˜ W ˜ 1 , Q ˜ W ˜ 2 , Q ˜ A , Q ˜ B , α ¯ Ξ ¯ , ( 1 α ¯ ) Ξ ¯ ) ,
Υ ˘ = Υ 11 D 12 0 D 14 0 D 16 D 17 D 18 D 19 Υ 10 Υ 111 D 22 D 23 0 0 0 D 27 0 0 0 0 D 33 0 0 0 0 0 0 0 0 D 44 D 45 0 0 0 0 0 0 D 55 0 0 0 0 0 0 D 66 0 0 0 0 0 D 77 0 0 0 0 D 88 0 0 0 D 99 0 0 D 00 0 D ˘ 11 , 11 ,
then the CDNs in (1) under the static event-triggered mechanism (35) achieves secure cluster synchronization against deception attacks satisfying (7). Furthermore, the controller gain matrix is determined as K ˜ = Q ˜ 1 Ξ ¯ .
Remark 8. 
The theoretical connection between the two mechanisms—where the static case (Theorem 3) emerges as a special case of the dynamic one when θ i + —-stems from the gradual ’elimination’ of the auxiliary variable η i ( t ) ’s influence: as θ i grows infinitely large, the dynamic triggering condition (5) simplifies to the static threshold rule (36), where only the error difference ζ i e i T ( t ) Ψ i e i ( t ) ( e i ( t ) e i ( t q i ) ) T Ψ i ( e i ( t ) e i ( t q i ) ) 0 determines triggering (the auxiliary η i ( t ) term becomes negligible).

4. An Illustrative Example

Consider a network of five nodes that are assigned into two clusters P 1 = { 1 , 2 } , P 2 = { 3 , 4 , 5 } . Moreover, the ith node described as (1) with Λ 1 = diag { 0.5 , 0.5 } , Λ 2 = diag { 0.2 , 0.2 } , W 11 = diag { 1.2 , 0.8 } , W 21 = diag { 0.2 , 0.2 } , W 12 = diag { 0.8 , 0.9 } , W 22 = diag { 0.2 , 0.5 } , f 1 ( x i ( t ) ) = [ 0.6 x i 1 ( t ) tanh ( 0.3 x i 1 ( t ) ) + 0.1 x i 2 ( t ) , 0.8 x i 2 ( t ) tanh ( 0.5 x i 2 ( t ) ) ] T with Γ 11 = 0.6 0.1 0 0.8 , Γ 21 = 0.9 0.1 0 1.3 , f 2 ( x i ( t ) ) = [ 0.3 x i 1 ( t ) tanh ( 0.2 x i 1 ( t ) ) + 0.2 x i 2 ( t ) , 0.4 x i 2 ( t ) tanh ( 0.4 x i 2 ( t ) ) ] with Γ 12 = 0.3 0.2 0 0.4 , Γ 22 = 0.1 0.2 0 0.8 , g 1 ( x i ( t ) ) = 0.8 x i 1 ( t ) 0.8 x i 2 ( t ) , g 2 ( x i ( t ) ) = 0.1 x i 1 ( t ) 0.1 x i 2 ( t ) , τ 1 ( t ) = 0.1 tanh ( t ) , τ 2 ( t ) = 0.2 tanh ( t ) , and
A = 2 2 1 0 1 2 2 0 1 1 1 1 4 2 2 1 1 1.5 3 1.5 1 1 1 1 2 , B = 3 3 0.1 0.1 0.2 1 1 0.2 0.2 0.4 1 1 3 2 1 0.5 0.5 1 2 1 0.1 0.1 1 1 2 .
Choose δ 1 = 0.8 , δ 2 = 0.1 , τ 1 = 0.1 , τ 2 = 0.2 , τ ¯ 1 = 0.1 , τ ¯ 2 ( t ) = 0.1 , π 1 = 0.2 , π 2 = 0.1 , π 3 = 0.1 , π 4 = 0.2 , π 5 = 0.2 , θ i = 1 , ζ i = 0.3 , ϱ i = 1 , η i ( 0 ) = 1 , i = 1 , , 5 . Via solving LMI (33), the feasible controller gains are given as K 1 = 28.8471 0.0463 28.2460 , K 2 = 28.7249 0.0463 28.1023 , K 3 = 29.7127 0.0280 29.9920 , K 4 = 28.9436 0.0745 29.3441 , K 5 = 28.6145 0.0786 29.1118 .
Applying the designed secure cluster synchronization controller, it is found that the CDNs can be synchronized into two clusters even in the presence of the simulated stochastic deception attacks. The related simulation results are shown in Figure 1, Figure 2, Figure 3, Figure 4, Figure 5 and Figure 6. Specifically, from Figure 1, it can be concluded that the nodes are not synchronized without controllers. Under the controllers, nodes in the same cluster are synchronized and not synchronized in the different cluster from Figure 2. Moreover, as shown in Figure 3, the trajectories of cluster errors e 1 x s ( t ) = i = 1 2 x i ( t ) s 1 ( t ) 2 , e 2 x s ( t ) = i = 3 5 x i ( t ) s 2 ( t ) 2 are approaching zero, such findings illustrate that the theoretical results are effective. In Figure 4, dynamic functions η i ( t ) , i = 1 , , 5 are described and we can conclude that the trajectories of dynamic functions η i ( t ) , i = 1 , , 5 are approaching zero while t + . Figure 5 show the dynamical event releasing instants and intervals of nodes in the CDNs as well as the occurring instants of the simulated stochastic deception attacks. Figure 6 show the static event releasing instants and intervals of nodes in the CDNs as well as the occurring instants of the simulated stochastic deception attacks. Figure 5 and Figure 6 intuitively illustrate two key improvements of the dynamic event-triggered mechanism: (1) it significantly reduces the number of triggering events; (2) it maintains more stable triggering intervals which avoided frequent unnecessary triggers caused by static threshold rigidness.

5. Conclusions

The secure cluster synchronization problem of CDNs under deception attacks has been investigated in this chapter. By taking into account both the effects of intermittent data transmissions under the distributed dynamic event-triggered mechanism and stochastic deception attacks, some sufficient conditions on the secure cluster synchronization performance analysis and controller design are established. Then, an illustrative example is given to show the effectiveness of the proposed theoretical methods and control schemes. In future work, we plan to explore two directions: (1) Markovian jump attack models: to capture time-varying attack probabilities (e.g., attackers may increase intensity during peak network traffic, leading to transition between ‘low-attack’ and ‘high-attack’ modes); and (2) Poisson-distributed attack models: to describe the random arrival of attack sequences. These extensions will allow us to address more complex attack behaviors while maintaining the core advantages of the dynamic event-triggered control framework proposed in this paper.

Author Contributions

Conceptualization, Y.Y. and L.L.; methodology, L.L.; software, Y.Y.; validation, L.L.; formal analysis, L.L.; investigation, Y.Y.; resources, L.L.; data curation, L.L.; writing—original draft preparation, Y.Y.; writing—review and editing, L.L.; visualization, Y.Y.; supervision, L.L.; project administration, Y.Y.; funding acquisition, L.L. All authors have read and agreed to the published version of the manuscript.

Funding

This work was funded by the Youth Doctor ’Sailing’ Project of Guangzhou Basic Research Plan for Basic and Applied Basic Research grant number 1749529.

Data Availability Statement

The original contributions presented in this study are included in the article. Further inquiries can be directed to the corresponding author.

Acknowledgments

The authors have reviewed and edited the output and take full responsibility for the content of this publication.

Conflicts of Interest

The authors declare no conflicts of interest.

References

  1. Hu, J.; Jia, C.Q.; Liu, H.J.; Yi, X.J.; Liu, Y.R. A survey on state estimation of complex dynamical networks. Int. J. Syst. Sci. 2021, 52, 3351–3367. [Google Scholar] [CrossRef]
  2. He, Z.L.; Li, C.D.; Nie, L.F. Synchronization of complex dynamical networks with saturated delayed impulsive control. ISA Trans. 2025, 157, 153–163. [Google Scholar] [CrossRef]
  3. Sun, J.; Guo, Y.X.; Zhang, C. Exponential synchronization of nonlinear complex dynamic networks via intermittent pinning control on time scales. Neurocomputing 2024, 578, 127375. [Google Scholar] [CrossRef]
  4. Wei, G.M.; Yuan, Z.Z.; Qi, W.H.; Cao, J.D.; Cheng, J.; Shi, K.B. Finite-time self-triggered synchronization for semi-Markov jump reaction-diffusion complex dynamical networks. J. Frankl. Inst. 2025, 362, 107765. [Google Scholar] [CrossRef]
  5. Shi, J.Y.; Zhou, P.P.; Jia, Q.; Cai, S.M. Fixed-time synchronization of multilayered complex dynamic networks via quantized variable-gain saturated control. Inf. Sci. 2024, 681, 121206. [Google Scholar] [CrossRef]
  6. Zhang, Y.X.; Sun, M.M.; Li, K.Z. Synchronization on complex dynamical networks via intermittently sampled-data pinning control. Physical A 2024, 654, 130109. [Google Scholar] [CrossRef]
  7. Chen, W.; Wang, X.P.; Ren, F.M.; Zeng, Z.G. Quasi-synchronization for variable-order fractional complex dynamical networks with hybrid delay-dependent impulses. Neural Netw. 2024, 173, 106161. [Google Scholar]
  8. Wang, L.; Liang, Q.Y.; She, Z.K.; Lv, J.H.; Wang, Q.G. A decomposition approach for synchronization of heterogeneous complex networks. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 853–863. [Google Scholar] [CrossRef]
  9. Pecora, L.M.; Carroll, T.L. Master stability functions for synchronized coupled systems. Phys. Rev. Lett. 1998, 80, 2109–2112. [Google Scholar] [CrossRef]
  10. Chen, M.Y. Some simple synchronization criteria for complex dynamical networks. IEEE Trans. Circuits Syst. 2006, 53, 1185–1189. [Google Scholar] [CrossRef]
  11. Yao, J.; Guan, Z.H.; Hill, D.J. Passivity-based control and synchronization of general complex dynamical networks. Automatica 2009, 45, 2107–2113. [Google Scholar] [CrossRef]
  12. Liao, B.; Wang, Y.; Xue, J.; Zhou, Z.; Zhang, S.; Chen, X. Dynamic Clustering-Based Time Synchronization for PLC-TWACS Integrated Multimodal Power IoT in Smart Park. IEEE Syst. J. 2024, 18, 1296–1307. [Google Scholar] [CrossRef]
  13. Shi, T.T.; Hu, C.; Jiang, H.J.; Zhu, Q.X.; Huang, T.W. Fixed-time leaderless cluster synchronization of spatiotemporal community networks with coopetition interactions. IEEE Trans. Cybern. 2025. early access. [Google Scholar] [CrossRef] [PubMed]
  14. Liu, X.Y.; Ho, D.; Xie, C.L. Prescribed-time cluster synchronization of complex networks via a smooth control approach. IEEE Trans. Cybern. 2020, 50, 1771–1775. [Google Scholar] [CrossRef]
  15. Wu, H.F.; Liu, S.; Wang, L.C. Cluster synchronization of complex dynamic networks under pinning control via a limited capacity communication channel. Nonlinear Anal. Hybrid Syst. 2025, 55, 101547. [Google Scholar] [CrossRef]
  16. Liu, L.; Zhou, W.N.; Huang, C. Finite/prescribed-time cluster synchronization of complex dynamical networks with multi-proportional delays and asynchronous switching. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 3683–3694. [Google Scholar] [CrossRef]
  17. Wang, X.; Park, J.H.; Yang, H.L.; Zhong, S.M. An improved impulsive control approach for cluster synchronization of complex networks with parameters mismatches. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 2561–2570. [Google Scholar] [CrossRef]
  18. Zhang, J.Y.; Ma, Y.C. Output feedback pinning control for complex dynamical networks subjected to multiple attacks. Chaos Solitons Fractals 2024, 181, 114625. [Google Scholar] [CrossRef]
  19. Hu, T.T.; Shi, K.B. Secure synchronization control for complex dynamic networks with event-triggered communication strategy under multi-channel denial-of-service attacks. ISA Trans. 2025, 158, 50–61. [Google Scholar] [CrossRef] [PubMed]
  20. Li, Y.; Song, F.Y.; Liu, J.L.; Xie, X.P.; Tian, E.G.; Fei, S.M. Round Robin-based synchronization control for discrete-time complex networks with probabilistic coupling delay and deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 4425–4436. [Google Scholar] [CrossRef]
  21. Yang, N.; Chen, S.S.; Su, H. Adaptive event-triggered impulsive control for stochastic complex networks with delays under deception attacks. Nonlinear Dyn. 2025, 113, 2259–2276. [Google Scholar] [CrossRef]
  22. Yang, N.; Fan, X.D.; Su, H. Dynamic event-triggered delayed impulsive control for stochastic T-S fuzzy complex networks under cyber attacks. J. Frankl. Inst. 2025, 362, 107863. [Google Scholar] [CrossRef]
  23. Ding, D.R.; Han, Q.L.; Wang, Z.D.; Ge, X.H. Recursive filtering of distributed cyber-physical systems with attack deception. IEEE Trans. Syst. Man Cybern. Syst. 2021, 51, 6466–6476. [Google Scholar] [CrossRef]
  24. Rajchakit, G.; Banu, K.A.; Aparna, T.; Lim, C.P. Event-triggered secure control for Markov jump neural networks with time-varying delays and subject to cyber-attacks via state estimation fuzzy approach. Int. J. Syst. Sci. 2025, 56, 211–226. [Google Scholar] [CrossRef]
  25. Javanmardi, S.; Nascita, A.; Pescapè, A.; Merlino, G.; Scarpa, M. An integration perspective of security, privacy, and resource efficiency in IoT-Fog networks: A comprehensive survey. Comput. Netw. 2025. early access. [Google Scholar] [CrossRef]
  26. Zhou, L.L.; Huang, M.Z.; Tan, F.; Zong, G.D.; Wang, Z.; Zhuang, G.M. Fixed-time discontinuous control for cluster secure synchronization of interlayer switching networks under attacks. IEEE Trans. Autom. Sci. Eng. 2025, 22, 18848–18859. [Google Scholar] [CrossRef]
  27. Sakthivel, N.; Rajkumar, V.; Sabarish Kumar, V. Synchronization of a complex dynamical networks using deception attacks subject to uncertainty and disturbance estimator. Eur. J. Control 2025, 83, 101208. [Google Scholar]
  28. Mi, J.; Wu, H.Q.; Cao, J.D. Finite-time secure synchronization for stochastic complex networks with delayed coupling under deception attacks: A two-step switching control scheme. Inf. Sci. 2025, 691, 121647. [Google Scholar] [CrossRef]
  29. Xu, Z.L.; Yang, N.; Li, A.D.; Lu, J.Q. Input-to-state stability of switched network control systems under unknown deception attacks. IEEE Trans. Cybern. 2024, 54, 5483–5492. [Google Scholar] [CrossRef] [PubMed]
  30. Wu, Y.B.; Guo, Z.R.; Xue, L.; Ahn, C.K.; Liu, J. Stabilization of complex networks under asynchronously intermittent event-triggered control. Automatica 2024, 161, 111493. [Google Scholar] [CrossRef]
  31. Xu, D.S.; Wang, X.F.; Su, H. Delay event-triggered control for stability analysis of complex networks. IEEE Trans. Circuits Syst. II Express Briefs 2022, 70, 1104–1108. [Google Scholar] [CrossRef]
  32. Wang, H.; Yang, X.; Xiang, Z.; Tang, R.Q.; Ning, Q. Synchronization of switched neural networks via attacked mode-dependent event-triggered control and its application in image encryption. IEEE Trans. Cybern. 2022, 53, 5994–6003. [Google Scholar] [CrossRef]
  33. Yang, X.S.; Feng, G.Y.; He, C.T.; Cao, J.D. Event-triggered dynamic output quantization control of switched T-S fuzzy systems with unstable modes. IEEE Trans. Fuzzy Syst. 2022, 30, 4201–4210. [Google Scholar] [CrossRef]
  34. Wang, X.L.; Ding, D.R.; Ge, X.H.; Dong, H.L.; Han, Q.L. Neural-network-based control with dynamic event-triggered mechanisms under DoS attacks and applications in load frequency control. IEEE Trans. Circuits Syst. I Regul. Pap. 2022, 69, 5312–5324. [Google Scholar] [CrossRef]
  35. Zhao, B.; Shi, G.; Liu, D. Event-triggered local control for nonlinear interconnected systems through particle swarm optimization-based adaptive dynamic programming. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 7342–7353. [Google Scholar] [CrossRef]
  36. Hu, T.T.; He, Z.; Zhang, X.J.; Zhong, S.M.; Shi, K.B.; Zhang, Y.Y. Adaptive fuzzy control for quasi-synchronization of uncertain complex dynamical networks with time-varying topology via event-triggered communication strategy. Inf. Sci. 2022, 582, 704–724. [Google Scholar] [CrossRef]
  37. Girard, A. Dynamic triggering mechanisms for event-triggered control. IEEE Trans. Automat. Control 2015, 60, 1992–1997. [Google Scholar] [CrossRef]
  38. Zhou, L.; Ma, Y.C.; Zou, J.H. Robust synchronization of Markovian jump complex dynamical networks under link attacks: Delay-dependent dynamic event-triggered control approach. J. Frankl. Inst. 2024, 361, 107251. [Google Scholar] [CrossRef]
  39. Yang, X.T.; Li, A.J.; Zhu, Q.X. Dynamic periodic event-triggered control of stochastic complex networks with time-varying delays. Neural Netw. 2025, 190, 107659. [Google Scholar] [CrossRef]
  40. Tang, W.; Sheng, Y.; Xiao, Q.; Huang, T.; Zeng, Z. Synchronization of complex dynamical networks on time scales via intermittent dynamic event-triggered control. IEEE Trans. Syst. Man Cybern. Syst. 2024, 54, 2897–2906. [Google Scholar] [CrossRef]
  41. Liu, Y.R.; Wang, Z.D.; Liu, X.H. Global exponential stability of generalized recurrent neural networks with discrete and distributed delays. Neural Netw. 2006, 19, 667–675. [Google Scholar] [CrossRef] [PubMed]
Figure 1. Trajectories of x i j ( t ) without controllers, i = 1 , , 5 , j = 1 , 2 .
Figure 1. Trajectories of x i j ( t ) without controllers, i = 1 , , 5 , j = 1 , 2 .
Mathematics 13 03797 g001
Figure 2. Trajectories of x i j ( t ) with controllers, i = 1 , , 5 , j = 1 , 2 .
Figure 2. Trajectories of x i j ( t ) with controllers, i = 1 , , 5 , j = 1 , 2 .
Mathematics 13 03797 g002
Figure 3. Trajectories of cluster errors e i j x s ( t ) under controllers, i , j = 1 , 2 .
Figure 3. Trajectories of cluster errors e i j x s ( t ) under controllers, i , j = 1 , 2 .
Mathematics 13 03797 g003
Figure 4. Trajectories of internal dynamic functions η i ( t ) , i = 1 , , 5 .
Figure 4. Trajectories of internal dynamic functions η i ( t ) , i = 1 , , 5 .
Mathematics 13 03797 g004
Figure 5. Dynamic event-triggered time and the attack time.
Figure 5. Dynamic event-triggered time and the attack time.
Mathematics 13 03797 g005
Figure 6. Static event-triggered time and the attack time.
Figure 6. Static event-triggered time and the attack time.
Mathematics 13 03797 g006
Table 1. Summary of Key Notations in the Paper.
Table 1. Summary of Key Notations in the Paper.
NotationTypeDefinition
NPositive integerTotal number of nodes in CDNs.
m ¯ Positive integerTotal number of clusters with M = { 1 , 2 , , m ¯ } .
P k SetIndex set of nodes belonging to the k-th cluster.
n k Positive integerNumber of nodes in the k-th cluster.
τ M Non-negative real numberMaximum delay in the CDNs.
α ( t ) Bernoulli random variableStochastic variable modeling random deception attacks.
α ¯ Real numberProbability of deception attacks occurring.
h ( · ) Continuous functionDeceptive signal injected by attackers into the communication channel.
H n × n positive definite matrixBounding matrix for the deceptive signal h ( · ) .
e ¯ i ( t ) n-dimensional real vectorActual error signal received by the controller (after possible attack modification).
t q i Non-negative real numberq-th event-triggering time of the i-th node.
η i ( t ) Non-negative real numberAuxiliary dynamic variable for the event-triggered mechanism.
π i , θ i , ζ i , ϱ i Positive real numbersTuning parameters for the dynamic event-triggered mechanism.
Ψ i n × n positive definite matrixWeighting matrix in the event-triggered condition.
K i n × n real matrixController gain matrix for the i-th node.
Γ 1 k , Γ 2 k n × n real matricesBounding matrices for the nonlinear function f k ( · ) .
δ 1 , δ 2 Positive real numbersLipschitz constants for the coupling functions g 1 ( · ) and g 2 ( · ) .
Q, R 1 , R 2 , R 3 , R 4 , M 1 , M 2 Block-diagonal positive definite matricesWeighting matrices introduced in the Lyapunov function for stability analysis.
Ξ Real matrixAuxiliary variable for controller gain design.
Table 2. Parameter → Effect on Triggering Frequency.
Table 2. Parameter → Effect on Triggering Frequency.
ParameterCore Effect on Triggering FrequencySimple Selection Guidelines
π i Larger π i → Lower frequencyChoose a moderate value (e.g., 0.1–0.5) based on resource constraints.
θ i Larger θ i →Higher frequencySet to a value that avoids excessive triggers (e.g., 1–5).
ζ i Larger ζ i (within ( 0 , 1 ) ) →Higher frequencySelect between 0.2–0.8.
ϱ i Larger ϱ i →Lower frequencyChoose a value matching the system’s time scale (e.g., 0.5–2).
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Yu, Y.; Liu, L. Secure Dynamic Event-Triggered Cluster Synchronization Control of Complex Dynamical Networks Under Random Deception Attacks. Mathematics 2025, 13, 3797. https://doi.org/10.3390/math13233797

AMA Style

Yu Y, Liu L. Secure Dynamic Event-Triggered Cluster Synchronization Control of Complex Dynamical Networks Under Random Deception Attacks. Mathematics. 2025; 13(23):3797. https://doi.org/10.3390/math13233797

Chicago/Turabian Style

Yu, Yuncai, and Ling Liu. 2025. "Secure Dynamic Event-Triggered Cluster Synchronization Control of Complex Dynamical Networks Under Random Deception Attacks" Mathematics 13, no. 23: 3797. https://doi.org/10.3390/math13233797

APA Style

Yu, Y., & Liu, L. (2025). Secure Dynamic Event-Triggered Cluster Synchronization Control of Complex Dynamical Networks Under Random Deception Attacks. Mathematics, 13(23), 3797. https://doi.org/10.3390/math13233797

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop