Next Article in Journal
A Simulated Weather-Driven Bio-Economic Optimization Model for Agricultural Planning
Previous Article in Journal
EGAN: Encrypting GAN Models Based on Self-Adversarial
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Dynamic Event-Triggered, Fixed-Time Control for Heterogeneous Multi-Agent Systems with Hybrid DoS Attacks

1
School of Automation, Shenyang Institute of Engineering, Shenyang 110136, China
2
Liaoning Key Laboratory of Regional Multi-Energy System Integration and Control, Shenyang 110136, China
3
School of Renewable Energy, Shenyang 110136, China
*
Author to whom correspondence should be addressed.
Mathematics 2025, 13(24), 4009; https://doi.org/10.3390/math13244009
Submission received: 24 November 2025 / Revised: 4 December 2025 / Accepted: 11 December 2025 / Published: 16 December 2025
(This article belongs to the Section E2: Control Theory and Mechanics)

Abstract

In this article, the fixed-time, quasi-consensus control problem for heterogeneous multi-agent systems (HMASs) under denial-of-service (DoS) attacks is investigated. Unlike most previous studies in this area, which focus on periodic (or single-type) DoS attacks with static event-triggered control, this paper ensures that HMASs achieve fixed-time quasi-consensus under aperiodic hybrid DoS attacks via dynamic event-triggered control. According to whether DoS attacks are known, two control protocols based on dynamic event-triggered conditions are given, which both ensure that HMASs achieve output quasi-consensus within a fixed time and exhibit less conservative triggering conditions than static event-triggered protocols. Moreover, the proof that the given dynamic event-triggered conditions can avoid Zeno-behavior is provided. Lastly, simulation examples are presented to support the obtained points.

1. Introduction

During the last few years, multi-agent systems (MASs) have been widely applied in practical fields, such as robotics [1], vehicle formation [2], and spacecraft [3]. As a foundational problem in MAS research, the issue of consensus, which aims to achieve state or output consensus for MASs, has attracted scholarly attention. Different from centralized systems, the control strategy of MASs depends on both the agent dynamics and communication networks. In ref. [4], a topology graph matrix was provided to describe the communications of MASs, and a control scheme based on this matrix was also proposed. However, this method is only applicable to multi-agent systems in which all agents share identical dynamics, i.e., homogeneous MASs. On this basis, considering the agent dynamics can be different in practical situations, a novel control scheme was investigated in [5], which can make heterogeneous multi-agent systems achieve consensus. Similar issues were also studied in [6,7]. Although these strategies provided can effectively control heterogeneous multi-agent systems (HMASs), only the basic state and output consensus issues were solved. Considering that the simple consensus control cannot meet different needs in practice, three cases were studied. Specifically, the containment control scheme making all agents asymptotically tend to the convex hull formed by leaders [8], the asynchronous control scheme making agent asymptotically have the dynamic characteristics completely opposite to the leader [9] and the quasi-consensus control scheme making the error between agent and leader converge to a bounded compact set [10] were all investigated.
The control schemes provided in the above-mentioned references always make MASs achieve asymptotic consensus. Nevertheless, letting MASs achieve consensus or quasi-consensus within a limited time is more in line with the actual demands of a control scheme. Motivated by this problem, how to design a consensus control strategy that makes MASs achieve finite-time consensus has attracted significant attention. In ref. [11], the network consensus problem was investigated, and a state-dependent sign function was used in a control approach that solves the finite-time consensus problem. Then, control strategies that solve the finite-time consensus issue for second-order [12], nonlinear [13] and non-holonomic chained-form [14] MASs were also investigated. For the purpose of further accelerating convergence, ref. [15] investigated the fast finite-time consensus control scheme, combing existing finite-time consensus control schemes and improved tracking algorithms. Although the control schemes provided in these references ensure MASs achieve consensus within finite time, these schemes’ convergence time depends on initial states, indicating that the convergence time cannot be estimated when the initial conditions are unknown. To overcome this limitation, fixed-time consensus control has been studied. In ref. [16], a control scheme based on hybrid-order system information was provided for achieving a fixed-time consensus that is invariant to initial conditions. Similar problems for first-order [17], second-order [18] and nonlinear stochastic [19] MASs were also investigated.
Considering that continuous controller updates and information transfer will cause communication congestion and energy loss, a series of discontinuous control schemes were investigated. Among these, the event-triggered control approach attracted wide attention due to its flexibility and reduced conservatism. In ref. [20], an event-triggered control scheme for linear MASs, which can make MASs achieve consensus and enables the triggering condition to exclude Zeno-behavior successfully, was provided. However, this control scheme can only solve the consensus issue of homogeneous MASs. In ref. [21], for the purpose of achieving consensus of HMASs based on event-triggered control, a triggering condition based on the agent system’s and its corresponding dynamic compensator’s information was designed. Although the event-triggered mechanisms provided in these two references can reduce the frequency of controller updates, continuous information transmission is inevitable, which may increase the communication costs. To solve this problem, a periodic event-triggered control approach for HMASs, which can avoid the continuous information transfer and controller update simultaneously, was provided in [22]. The event-triggered control schemes proposed in early references (including [20,21,22,23,24]) can only solve the asymptotic consensus problem. On this basis, ref. [25] provided a novel periodic event-triggered control scheme that enables MASs to solve the control problem within a fixed time.
The early research on the control of MASs (including the literature mentioned above) always overlooked the impact of cyber attacks on the systems. As information transfer of MASs is critical for achieving consensus, the threats posed by malicious cyber attacks disrupting communication networks cannot be neglected. In general, malicious cyber attacks fall into two categories: denial-of-service (DoS) attacks [26], which compromise service availability; and deception attacks [27], which inject false information. Among these, DoS attacks are more frequently launched by attackers because of their simple implementation and high destructive force. Since the communication networks of MASs can be changed or even broken by DoS attacks, providing proper control schemes under these conditions becomes a significant challenge, which has attracted considerable attention. In ref. [28], the consensus problem for MASs under a special case of DoS attacks, wherein it was assumed that the attacks were periodic, was investigated. Considering that aperiodic cyber attacks are more in line with reality, a novel control scheme for MASs with aperiodic DoS attacks was provided in ref. [29]. For the purpose of further reducing the communication burden, the event-triggered control scheme [30] and dynamic event-triggered control scheme [31] for MASs under DoS attacks have been considered, and the fixed-time consensus problem for MASs with different types of attacks was also considered in ref. [32].
Although the consensus issue for MASs under DoS attacks have been investigated for a while, obtaining important results, it is still difficult to design proper dynamic event-triggered control schemes that solve this issue.
  • Since DoS attacks disrupt the message communication between agents, a controller may not be able to receive system information and complete controller updates, even though the triggering condition has been met. To solve this problem, most of the existing control strategies assume that the real-time information of DoS attacks are known and have to stop triggering when the systems are under DoS attacks, which is difficult to achieve and makes the control scheme even more conservative.
  • Compared to the static event-triggered control strategy, the core advantage of the dynamic event-triggered control strategy lies in reducing the controller update frequency by decreasing the conservatism of the triggering condition. The key to this strategy lies in the design of the dynamic event-triggering condition. Currently, the most fundamental method is to add a non-negative dynamic term that approaches zero over time with respect to the static event-triggered condition. However, when the problem shifts from asymptotic consensus to fixed-time consensus in multi-agent systems (MASs), this traditional design faces a serious challenge: the dynamic term must not only remain non-negative to preserve the advantage of reduced conservatism, but it must also ensure that the system achieves consensus within a fixed time. These dual requirements make the design of the dynamic term particularly challenging. Consequently, although the dynamic event-triggered control strategy offers advantages in terms of reduced conservatism, the dual constraints in designing the dynamic event-triggering condition for fixed-time consensus scenarios have led to its limited adoption in existing research on fixed-time consensus problems for MASs.
Inspired by these problems, we have written this article.
This article investigates the fixed-time, quasi-consensus problem for HMASs under DoS attacks. Two dynamic event-triggered control schemes for HMASs under known and unknown DoS attacks are proposed. The main contributions are listed as follows.
  • Based on whether the DoS attacks are known or not, two different dynamic compensators and the corresponding consensus criteria are provided, which can achieve the fixed-time consensus between dynamic compensators and leader systems regardless of whether the attacks are known. Moreover, one additional consensus criterion based on a special case, which can reduce the conservatism of the given control schemes successfully, is also provided.
  • A new type of dynamic term is designed in this paper. On this basis, the dynamic event-triggered condition is constructed and a novel dynamic event-triggered control scheme is proposed. This scheme not only ensures HMASs achieve quasi-consensus within fixed time, but it also has lower conservatism than a static event-triggered control scheme, thereby reducing the update frequency of the controller.
The rest of this paper is arranged as follows. The preliminaries and problem formulation are provided in Section 2 and Section 3, respectively. The dynamic event-triggered control schemes for systems under known and unknown DoS attacks are provided in Section 4 and Section 5, respectively. The numerical examples are given in Section 6, and the conclusion is provided in Section 7.

2. Preliminaries

2.1. Notations

Take R m × n and R n as the set of m × n real matrices and n-dimensional Euclidean space, respectively, where · is the Euclidean norm of vectors or 2-norm of matrices; X > 0 ( X < 0 ) means that X is a symmetric positive (negative) definite matrix; λ min ( X ) and λ max ( X ) represent the minimum and maximum eigenvalues of X if X > 0 , respectively; I n represents the n × n -dimensional identity matrix; sign ( · ) represents the symbolic function; sign ( x ) = ( sign ( x 1 ) ,   sign ( x 2 ) , , sign ( x n ) ) T and sign ( x ) 2 = ( x 1 2 sign ( x 1 ) ,   x 2 2 sign ( x 2 ) , , x n 2 sign ( x n ) ) T for any x = ( x 1 ,   x 2 , , x n ) T R n . · represent a function satisfying x = inf { x | x x , x N } for any x 0 , where N is the set of natural numbers; and e represents the natural constant.

2.2. Topology Graph Knowledge of MASs

Consider that MASs consist of one leader and N agents. The communication networks of MASs can be described by a n × n -dimensional topology matrix H = [ h i j ] N × N , where h i j represents the element of H located in the i-th row and j-th column, and i, , j denote the index of the followers, i.e., i, j { 1 , 2 , , N } . To be specific, h i i = j = 1 N a i j + b i and h i j = a i j if i j . Moreover, a i j satisfies a i j = a j i > 0 if i j and there exists an undirected information channel between agents i and j; otherwise, a i j = 0 . Additionally, b i > 0 if there exists a information channel from leader to agent i; otherwise, b i = 0 . Agent i can receive information from leader if there exist a series of ϱ w { 1 , 2 , , N } for w = 1 , 2 , , s such that a i ϱ 1 , a ϱ 1 ϱ 2 , , a ϱ s 1 ϱ s , b ϱ s > 0 . Moreover, the communication networks of MASs can be called connected if each agent can receive information from the leader.
Lemma 1 
([4]).  H > 0 if the communication networks are connected.
Assumption 1. 
The communication networks of MASs without attacks are connected.

2.3. DoS Attacks

The topology graph matrix of MASs under DoS attacks can be represented as H σ ( t ) = [ h i j ( t ) ] N × N , where
  • σ ( t ) : [ 0 , + ) { 0 , 1 , 2 , , s } is a switching signal representing active DoS attacks mode at time instant t, with s being the total number of DoS attacks modes.
  • H 0 = H represents the topology matrix without DoS attacks.
  • H w ( w = 1 , 2 , , s ) corresponds to the topology matrix under the w-th DoS attacks mode.
  • h i j ( t ) = j = 1 N a i j ( t ) + b i ( t ) if i = j , h i j ( t ) = a i j ( t ) ; otherwise, a i j ( t ) ( b i ( t ) ) means the same thing to H σ ( t ) as a i j ( b i ) to H.
Meanwhile, based on [32], DoS attacks can be divided into two categories: connectivity-maintained attacks (CMA) and connectivity-broken attacks (CBA). Without loss of generality, the index of element of a DoS attack set can be rearranged such that the w-th DoS attack mode belongs to CMA for any w { 1 , 2 , , s } with s s ; otherwise, it belongs to CBA. Therefore, H w > 0 for any w { 0 , 1 , 2 , , s } .
Assumption 2. 
There are constants τ , T ̲ , T ¯ > 0 and a time sequence { T r } r = 0 with T 0 = 0 such that
1. 
T ̲ T r T r 1 T ¯ for any r = 1 , 2 ,
2. 
For any w { 0 , 1 , 2 , , s } , if σ ( t ) = w for some t [ T r , T r + 1 ) , there exists t ¯ w , t ̲ w [ T r , T r + 1 ) such that t ̲ w t t ¯ w , t ¯ w t ̲ w τ and σ ( t ) = w for t [ t ̲ w , t ¯ w ] .
Lemma 2 
([17]). If ϑ i 0 for i = 1 , 2 , , s , the following results can be obtained:
i = 1 s ϑ i g ( i = 1 s ϑ i ) g , 0 < g < 1 , i = 1 s ϑ i g s 1 g ( i = 1 s ϑ i ) g , g > 1 .
Lemma 3 
([33] (Young’s Inequality)). For any a , b 0 , the following result can be obtained:
a b a p p + b q q ,
where p , q > 0 , which satisfy
1 p + 1 q = 1 .
Based on Lemma 3, the next conclusion can be given.
Lemma 4. 
For any a , b 0 and χ > 0 , we have
a 2 b 2 3 χ 1 2 a 3 + 1 3 χ 1 b 3 .
Proof of Lemma 4. 
Take a ^ = χ 1 3 a 2 , b ^ = χ 1 3 b , p = 3 2 q = 3 , which is based on Lemma 3. Then, we have
a 2 b = a ^ b ^ a ^ p p + b ^ q q = 2 3 χ 1 2 a 3 + 1 3 χ 1 b 3 .     (4)

3. Problem Formulation

Consider the HMASs that are given as follows:
x ˙ i ( t ) = A i x i ( t ) + u i ( t ) + ω i ( t ) ,
y i ( t ) = C i x i ( t ) ,
x ˙ 0 ( t ) = A 0 x 0 ( t ) ,
y 0 ( t ) = C 0 x 0 ( t ) ,
where x i ( t ) , u i ( t ) , ω i ( t ) R n i , y i ( t ) R q represent the state, input, external disturbance, and output of agent i for i = 1 , 2 , , N , respectively; and x 0 ( t ) R n 0 , y 0 ( t ) R q represent the state and output of the leader.
Assumption 3. 
There is a constant γ > 0 such that ω i ( t ) γ for any t 0 and i = 1 , 2 , , N .
Assumption 4. 
There exists matrix Π i R n i × n 0 for i = 1 , 2 , , N such that
Π i A 0 = A i Π i , C i Π i = C 0 .
Definition 1. 
The fixed-time quasi-consensus problem for Systems (5)(8) is solved if there exist positive constants ϕ i , T max i > 0 for i = 1 , 2 , , N such that y i ( t ) y 0 ( t ) ϕ i for any t T max i .
The purpose of this paper was to design a control scheme that makes Systems (5)–(8) solve the fixed-time quasi-consensus problem.

4. Event-Based Control Scheme Under Known DoS Attacks

Consider the case that the DoS attacks are known, which means that σ ( t ) and H σ ( t ) can be known in advance.

4.1. Design of Dynamic Compensator

Although the control objective is to achieve the consensus of the outputs y i ( t ) , the heterogeneity of HMASs prevents the direct design of a unified consensus protocol. For ensuring HMASs achieve output consensus, the dynamic compensator should be introduced to transform the heterogeneous dynamics into equivalent isomorphic forms, enabling the control scheme to be directly applied. The dynamic compensators for each follower agent are provided as follows:
z ˙ i ( t ) = A 0 z i ( t ) β φ 2 i ( t ) α 1 sign ( φ 2 i ( t ) ) α 2 sign ( φ 2 i ( t ) ) 2 , if σ ( t ) = 0 ,
z ˙ i ( t ) = A 0 z i ( t ) β ( t ) φ 2 i ( t ) α 1 ( t ) sign ( φ 2 i ( t ) ) α 2 ( t ) sign ( φ 2 i ( t ) ) 2 , if σ ( t ) = 1 , 2 , , s ,
z ˙ i ( t ) = A 0 z i ( t ) , otherwise ,
where z i ( t ) represents the state of dynamic compensator of agent i, and φ 2 i ( t ) = j = 1 N a i j ( t ) ( z i ( t ) z j ( t ) ) + b i ( t ) ( z i ( t ) x 0 ( t ) ) and β , β ( t ) , α 1 , α 1 ( t ) , α 2 , α 2 ( t ) > 0 need to be calculated.
Proposition 1. 
Assume that Assumptions 1–4 hold. If there exists β , β w , α 1 , α 1 w , α 2 , α 2 w > 0 such that
p 1 > 0 , p 2 > 0 , p 3 > 0 ,
p 1 w > 0 , p 2 w > 0 , p 3 w > 0 ,
β ( t ) = β w , α 1 ( t ) = α 1 w , α 2 ( t ) = α 2 w , α 3 ( t ) = α 3 w , i f σ ( t ) = w , w { 1 , 2 , , s } ,
τ > 0 ,
then z i ( t ) x 0 ( t ) = 0 for any t T max , where
p 1 = 2 α 1 λ min ( H ) , p 2 = 2 ( β λ min ( H ) A 0 ) , p 3 = 2 α 2 ( N n 0 ) 1 2 ( λ min ( H ) ) 3 2 , p 1 w = 2 α 1 w λ min ( H w ) , p 2 w = 2 ( β w λ min ( H w ) A 0 ) , p 3 w = 2 α 2 w ( N n 0 ) 1 2 ( λ min ( H w ) ) 3 2 , τ = { 1 2 ( p 2 τ 1 + min { p 2 w } · τ 2 max { ln λ max ( H ) λ min ( H ) , ln λ max ( H w ) λ min ( H w ) } · τ 1 + τ 2 τ ) A 0 τ 3 , w { 1 , 2 , , s } } , T max = T ¯ ( 1 + ε 2 p ) , ε 2 = max { λ min ( H ) 1 2 e A 0 τ 3 p 2 p 3 ( e 1 2 p 2 τ 1 ) , λ min ( H w ) 1 2 e A 0 τ 3 λ ¯ w p 2 w p 3 w ( e 1 2 p 2 w τ 1 ) , w { 1 , 2 , , s } } , p = min { λ min ( H ) 1 2 p 1 p 2 1 ( 1 e 1 2 p 2 τ ) , λ min ( H w ) 1 2 p 1 w p 2 w 1 ( 1 e 1 2 p 2 w τ ) , w { 1 , 2 , , s } } ,
and τ 1 , τ 2 represent the minimum dwell time of σ ( t ) = 0 and σ ( t ) { 1 , 2 , , s } during t [ T r , T r + 1 ) ; and τ 1 , τ 2 and τ 3 represent the maximum dwell time of σ ( t ) = 0 , σ ( t ) { 1 , 2 , , s } and σ ( t ) { s + 1 , s + 2 , , s } during t [ T r , T r + 1 ) .
Proof of Proposition 1. 
Set ε 2 i ( t ) = z i ( t ) x 0 ( t ) and ε 2 ( t ) = ( ε 21 T ( t ) , ε 22 T ( t ) , , ε 2 N T ( t ) ) T . Then, we have z i ( t ) x 0 ( t ) = 0 if ε 2 ( t )  = 0. Define V 2 ( t ) = ε 2 T ( t ) ( H σ ( t ) I n 0 ) ε 2 ( t ) as the Lyapunov function and φ 2 ( t ) = ( φ 21 T ( t ) , φ 22 T ( t ) , , φ 2 N T ( t ) ) T . Then,
(i) Considering σ ( t ) = 0 , based on (7), (9) and the result of Lemma 2, we have
V ˙ 2 ( t ) = 2 ε 2 T ( t ) ( H I n 0 ) ( ( I N A 0 ) ε 2 ( t ) β φ 2 ( t ) α 1 sign ( φ 2 ( t ) ) α 2 sign ( φ 2 ( t ) ) 2 ) 2 A 0 V 2 ( t ) 2 β φ 2 ( t ) 2 2 α 1 φ 2 ( t ) 2 α 2 ( N n 0 ) 1 2 φ 2 ( t ) 3 p 1 V 2 1 2 ( t ) p 2 V 2 ( t ) p 3 V 2 3 2 ( t ) , σ ( t ) = 0 .     (16)
Set V 2 ( t ) = V 2 1 2 ( t ) . Then, we have
V ˙ 2 ( t ) 1 2 ( p 1 + p 2 V 2 ( t ) + p 3 V 2 2 ( t ) ) ,
which means that
V 2 ( t ) max { 0 , min { V 21 ( t ) , V 22 ( t ) } }
if σ ( t s ) = 0 for t s [ t 0 , t ) , where
V 21 ( t ) = e 1 2 p 2 ( t t 0 ) V 2 ( t 0 ) p 1 p 2 1 ( 1 e 1 2 p 2 ( t t 0 ) ) , V 22 ( t ) = p 2 p 3 ( e 1 2 p 2 ( t t 0 ) 1 ) .
According to the definitions of V 2 ( t ) and ε 2 ( t ) , we have
λ max ( H ) 1 2 V 2 ( t ) ε 2 ( t ) λ min ( H ) 1 2 V 2 ( t ) ,
which means that
ε 2 ( t ) max { 0 , min { ε ˜ 201 ( t ) , ε ˜ 202 ( t ) } } ,
where
ε ˜ 201 ( t ) = λ min ( H ) 1 2 ( e 1 2 p 2 ( t t 0 ) λ max ( H ) 1 2 ε 2 ( t 0 ) p 1 p 2 1 ( 1 e 1 2 p 2 ( t t 0 ) ) ) , ε ˜ 202 ( t ) = λ min ( H ) 1 2 p 2 p 3 ( e 1 2 p 2 ( t t 0 ) 1 ) .
(ii) Considering σ ( t ) = w { 1 , 2 , , s } , take V 2 w ( t ) = ε 2 T ( t ) ( H w I n 0 ) ε 2 ( t ) , which is based on (7) and (10). Then, we have
V ˙ 2 w ( t ) p 1 w V 2 w 1 2 ( t ) p 2 w V 2 w ( t ) p 3 w V 2 w 3 2 ( t ) .
Set V 2 w ( t ) = V 2 w 1 2 ( t ) . Then, we have
V 2 w ( t ) max { 0 , min { V 2 w 1 ( t ) , V 2 w 2 ( t ) } }
if σ ( t s ) = w { 1 , 2 , , s } for t s [ t 0 , t ) , where
V 2 w 1 ( t ) = e 1 2 p 2 w ( t t 0 ) V 2 w ( t 0 ) p 1 w p 2 w 1 ( 1 e 1 2 p 2 w ( t t 0 ) ) , V 2 w 2 ( t ) = p 2 w p 3 w ( e 1 2 p 2 w ( t t 0 ) 1 ) .
By a similar analysis that yields result (19), we have
ε 2 ( t ) max { 0 , min { ε ˜ 2 w 1 ( t ) , ε ˜ 2 w 2 ( t ) } } ,
where
ε ˜ 2 w 1 ( t ) = λ min ( H w ) 1 2 ( e 1 2 p 2 w ( t t 0 ) λ max ( H w ) 1 2 ε 2 ( t 0 ) p 1 w p 2 w 1 ( 1 e 1 2 p 2 w ( t t 0 ) ) ) , ε ˜ 2 w 2 ( t ) = λ min ( H w ) 1 2 p 2 w p 3 w ( e 1 2 p 2 w ( t t 0 ) 1 ) .
(iii) Considering σ ( t ) = w { s + 1 ,   s + 2 , , s } , which is based on (7) and (11), we have
ε 2 ( t ) e A 0 ( t t 0 ) ε 2 ( t 0 )
if σ ( t s ) = w { s + 1 , s + 2 , , s } for t s [ t 0 , t ) .
Based on the results of (i)–(iii) and Assumption 2, the following results can be given:
ε 2 ( T 1 ) ε 2 ,
ε 2 ( T r + 1 ) max { 0 , e τ ε 2 ( T r ) p } max { 0 , ε 2 ( T r ) p } , r = 1 , 2 , . ( 25 )
Therefore, based on (17), (19), (22) and (23), we have V 2 ( t ) = 0 for any t T max . □
Since most possible cases have been considered, the estimation of T max given by Proposition 1 is particularly conservative. The less conservative estimation of T max can be obtained based on a specific case.
Consider that σ ( t ) satisfies the next condition as follows:
σ ( t ) = 0 , t [ r T , r T + τ 01 ) , 1 , t [ r T + τ 01 , r T + τ 01 + τ 021 ) , 2 , t [ r T + τ 01 + τ 021 , r T + τ 01 + τ 021 + τ 022 ) , s , t [ r T + τ 01 + i = 1 s 1 τ 02 i , r T + τ 01 + i = 1 s τ 02 i ) , w , w { s + 1 , s + 2 , , s } , t [ r T + τ 01 + τ 02 , r T + τ 01 + τ 02 + τ 03 )
for r = 0 , 1 , 2 , , where τ 01 , τ 02 i , τ 02 , τ 03 > 0 are positive constants and satisfy i = 1 s τ 02 i = τ 02 and τ 01 + τ 02 + τ 03 = T .
In this case, the next conclusion can be obtained.
Corollary 1. 
Assume that Assumptions 1–4 hold and σ ( t ) satisfies Condition (26) if there exist β , β w , α 1 , α 1 w , α 2 , α 2 w > 0 such that Conditions (12)(14) and
τ > 0 .
Then, z i ( t ) x 0 ( t )   = 0 for any t T max , where
τ = 1 2 ( p 2 τ 01 + i = 1 s p 2 i τ 02 i ln λ max ( H ) λ min ( H ) i = 1 s ln λ max ( H i ) λ min ( H i ) ) A 0 τ 03 , T max = τ 01 , condition ( a ) is satisfied , τ 01 + i = 1 w τ 02 i , condition ( a ) is not satisfied and condition ( b ) is satisfied , ( 1 + ln p τ ) T , otherwise , p = 1 + p 1 ( 1 e τ ) p 2 , p 1 = e A 0 τ 03 e τ ^ s ε ^ 2 p ¯ s , p 2 = max { e A 0 τ 03 p ¯ w , w { 1 , 2 , , s } } , τ ^ w = 1 2 ( i = 1 w p 2 i τ 02 i i = 1 w ln λ max ( H i ) λ min ( H i ) ) , w { 1 , 2 , , s } , ε ^ 2 = λ min ( H ) 1 2 p 2 p 3 ( e 1 2 p 2 τ 01 1 ) , p ¯ w = λ min ( H w ) 1 2 ( p 1 w p 2 w 1 ( 1 e 1 2 p 2 w τ 02 w ) ) , w { 1 , 2 , , s } .
Condition (a): there exists τ 01 > 0 such that τ 01 < τ 01 and
p 2 e 1 2 p 2 τ 01 p 3 ( e 1 2 p 2 ( τ 01 τ 01 ) 1 ) p 1 p 2 1 ( 1 e 1 2 p 2 τ 01 ) 0 .
Condition (b): there exists w { 1 , 2 , , s } such that
e τ ^ w ε ^ 2 p ¯ w 0 .
The other symbols retain their meanings, as defined in Proposition 1.
Proof of Corollary 1. 
Based on the result of Proposition 1, we have
ε 2 ( t ) max { 0 , min { ε 2 r 11 ( t ) , ε 2 r 12 ( t ) } } , t [ 0 , τ 01 ) ,
ε 2 ( τ 01 + τ 021 ) max { 0 , e τ ^ 1 ε ^ 2 p ¯ 1 } ,
ε 2 ( τ 01 + i = 1 w τ 02 i ) max { 0 , e τ ^ w ε ^ 2 p ¯ w } ,
ε 2 ( t ) e A 0 ( t r T τ 01 τ 02 ) ε 2 ( r T + τ 01 + τ 02 ) , t [ r T + τ 01 + τ 02 , r T + τ 01 + τ 02 + τ 03 ) , ( 31 )
where
ε 2 r 11 ( t ) = λ min ( H ) 1 2 ( e 1 2 p 2 t λ max ( H ) 1 2 ε 2 ( r T ) p 1 p 2 1 ( 1 e 1 2 p 2 t ) ) , ε 2 r 12 ( t ) = λ min ( H ) 1 2 p 2 p 3 ( e 1 2 p 2 t 1 ) .
Based on (28)–(31), if Condition (a) is satisfied, then ε 2 ( t ) = 0 for any t τ 01 ; if Condition (a) is not satisfied and Condition (b) is satisfied, then ε 2 ( t ) = 0 for any t τ 01 + i = 1 w τ 02 i ; and if both Conditions (a) and (b) are not satisfied, then the next result can be obtained:
ε 2 ( ( r + 1 ) T ) max { 0 , e τ ε 2 ( r T ) p 2 } .
Moreover, it can be obtained that
ε 2 ( T ) p 1 .
According to Conditions (32) and (33), we have
ε 2 ( ( r + 1 ) T ) max { 0 , e r τ p 1 i = 0 r 1 e i τ p 2 } .
Therefore, ε 2 ( t ) = 0 for any t ( 1 + ln p τ ) T . The proof is thus finished. □

4.2. Dynamic Event-Triggered Control Scheme

Based on dynamic Compensator (9)–(11), the controller and event-triggered condition for Systems (5)–(8) are given as follows:
u i ( t ) = β i φ 1 i ( t k i ) α 1 i sign ( φ 1 i ( t k i ) ) α 2 i sign ( φ 1 i ( t k i ) ) 2 , t [ t k i , t k + 1 i ) ,
t k + 1 i = inf { t | t > t k i , φ 1 i ( t ) φ 1 i ( t k i ) > δ i ( φ 1 i ( t ) + ξ i ) + η i ( t ) } ,
where
η ˙ i ( t ) = μ 1 | η i ( t ) | 1 2 μ 2 η i ( t ) μ 3 | η i ( t ) | 3 2 ρ 1 i ( φ 1 i ( t ) φ 1 i ( t k i ) δ i ( φ 1 i ( t ) + ξ i ) ) ρ 2 i ( φ 1 i ( t ) φ 1 i ( t k i ) 2 2 ( δ i ( φ 1 i ( t ) + ξ i ) ) 2 ) ρ 3 i ( φ 1 i ( t ) φ 1 i ( t k i ) 3 4 ( δ i ( φ 1 i ( t ) + ξ i ) ) 3 ) + ξ ^ , t [ t k i , t k + 1 i ) , ( 37 )
and φ 1 i ( t ) = x i ( t ) Π i z i ( t ) , μ 1 , μ 2 , μ 3 , ξ ^ > 0 and η i ( 0 ) 0 for i { 1 , 2 , , N } . Moreover, β i , α 1 i , α 2 i , δ i , ξ i , ρ 1 i , ρ 2 i , ρ 3 i > 0 needs to be calculated.
Theorem 1. 
Assume that Assumptions 1–4 hold and dynamic Compensators (9)(11) satisfy Conditions (12)(15) (or Conditions (12)(14) and (26) and (27)) if there exists β i , α 1 i , α 2 i , δ i , ξ i , χ 1 i , χ 2 i , ρ 1 i , ρ 2 i , ρ 3 i > 0 for i = 1 , 2 , , N such that
p 1 i > 0 , p 2 i > 0 , p 3 i > 0 ,
ρ 1 i = 4 α 1 i ,
ρ 2 i = 2 β i χ 1 i 1 ,
ρ 3 i = 2 α 2 i ( n i 1 2 + 2 + 2 3 χ 2 i 1 ) .
Then, Systems (5)(8) with dynamic Compensators (9)(11), Controller (35) and event-triggered Condition (36) satisfy the following condition: y i ( t ) y 0 ( t ) ϕ i for t T max i , where
p 1 i = min { p 1 i 1 , μ 1 } , p 2 i = min { p 1 i 2 , μ 2 } , p 3 i = 1 2 · min { p 1 i 3 , μ 3 } , p 1 i 1 = 2 α 1 i 2 γ ρ 1 i δ i , p 1 i 2 = 2 β i ( 1 χ 1 i ) 2 A i 4 ρ 2 i δ i 2 , p 1 i 3 = 2 α 2 i ( 2 2 n i 1 2 4 3 χ 2 i 1 2 ) 16 ρ 3 i δ i 3 , ϕ i = C i q i , q i = min { ( q i p 1 i ( 1 θ ) ) 2 , q i p 2 i ( 1 θ ) , ( q i p 3 i ( 1 θ ) ) 2 3 } , q i = ρ 1 i δ i ξ i + 4 ρ 2 i δ i 2 ξ i 2 + 16 ρ 3 i δ i 3 ξ i 3 + ξ ^ , T max i = T max + T ˜ max i , T ˜ max i = 4 ln ( 1 + p 2 i p 1 i p 3 i ) θ p 2 i ,
and θ ( 0 , 1 ) and T max are obtained by Proposition 1 or Corollary 1.
Proof of Theorem 1. 
Based on the results of Proposition 1 and Corollary 1, z i ( t ) x 0 ( t ) = 0 for any t T max and i = 1 , 2 , , N . By Assumption 4, for t T max , y i ( t ) y 0 ( t ) = C i φ i ( t ) and
φ ˙ 1 i ( t ) = A i φ 1 i ( t ) + ω i ( t ) β i φ 1 i ( t k i ) α 1 i sign ( φ 1 i ( t k i ) ) α 2 i sign ( φ 1 i ( t k i ) ) 2 . ( 42 )
Set V 1 i ( t ) = V 1 i 1 ( t ) + V 1 i 2 ( t ) , where
V 1 i 1 ( t ) = φ 1 i T ( t ) φ 1 i ( t ) , V 1 i 2 ( t ) = η i ( t ) .
Based on (36) and (37), we have
η ˙ i ( t ) μ 1 | η i ( t ) | 1 2 ( μ 2 + ρ 1 i ) η i ( t ) μ 3 | η i ( t ) | 3 2 2 ρ 2 i η i 2 ( t ) 4 ρ 3 i | η i ( t ) | 3 + ξ ^ .
Since η i ( 0 ) 0 , which is based on (43), we have η i ( t ) 0 for any t 0 , which means that φ 1 i ( t ) 2 V 1 i ( t ) and y i ( t ) y 0 ( t ) C i V 1 i 1 2 ( t ) for t T max .
  • By taking the derivative of V 1 i ( t ) , we have
V ˙ 1 i ( t ) 2 γ V 1 i 1 1 2 ( t ) + 2 A i V 1 i 1 ( t ) 2 φ 1 i T ( t ) ( β i φ 1 i ( t k i ) + α 1 i sign ( φ 1 i ( t k i ) ) + α 2 i sign ( φ 1 i ( t k i ) ) 2 ) μ 1 η i 1 2 ( t ) μ 2 η i ( t ) μ 3 η i 3 2 ( t ) + ξ ^ ρ 1 i ( φ 1 i ( t ) φ 1 i ( t k i ) δ i ( φ 1 i ( t ) + ξ i ) ) ρ 2 i ( φ 1 i ( t ) φ 1 i ( t k i ) 2 2 ( δ i ( φ 1 i ( t ) + ξ i ) ) 2 ) ρ 3 i ( φ 1 i ( t ) φ 1 i ( t k i ) 3 4 ( δ i ( φ 1 i ( t ) + ξ i ) ) 3 ) . ( 44 )
Meanwhile, according to event-triggered Condition (36) and Lemma 2, we have
β i φ 1 i T ( t ) φ 1 i ( t k i ) = β i φ 1 i ( t ) 2 + β i φ 1 i T ( t ) ( φ 1 i ( t ) φ 1 i ( t k i ) ) β i ( 1 χ 1 i ) φ 1 i ( t ) 2 + β i χ 1 i 1 φ 1 i ( t ) φ 1 i ( t k i ) 2 , ( 45 )
α 1 i φ 1 i T ( t ) sign ( φ 1 i ( t k i ) ) = α 1 i φ 1 i T ( t k i ) sign ( φ 1 i ( t k i ) ) α 1 i ( φ 1 i T ( t ) φ 1 i T ( t k i ) ) sign ( φ 1 i ( t k i ) ) α 1 i φ 1 i ( t k i ) + α 1 i φ 1 i ( t ) φ 1 i ( t k i ) α 1 i φ 1 i ( t ) + 2 α 1 i φ 1 i ( t ) φ 1 i ( t k i ) , ( 46 )
α 2 i φ 1 i T ( t ) sign ( φ 1 i ( t k i ) ) 2 = α 2 i φ 1 i T ( t k i ) sign ( φ 1 i ( t k i ) ) 2 α 2 i ( φ 1 i T ( t ) φ 1 i T ( t k i ) ) sign ( φ 1 i ( t k i ) ) 2 α 2 i n i 1 2 φ 1 i ( t k i ) 3 + α 2 i φ 1 i ( t ) φ 1 i ( t k i ) φ 1 i ( t k i ) 2 α 2 i n i 1 2 ( 2 2 φ 1 i ( t ) 3 φ 1 i ( t ) φ 1 i ( t k i ) 3 ) + 2 α 2 i φ 1 i ( t ) φ 1 i ( t k i ) ( φ 1 i ( t ) 2 + φ 1 i ( t ) φ 1 i ( t k i ) 2 ) α 2 i n i 1 2 ( 2 2 φ 1 i ( t ) 3 φ 1 i ( t ) φ 1 i ( t k i ) 3 ) + 2 α 2 i φ 1 i ( t ) φ 1 i ( t k i ) 3 + 4 3 α 2 i χ 2 i 1 2 φ i ( t ) 3 + 2 3 α 2 i χ 2 i 1 φ 1 i ( t ) φ 1 i ( t k i ) 3 . ( 47 )
Therefore,
V ˙ 1 i ( t ) p 1 i 1 V 1 i 1 1 2 ( t ) p 2 i 1 V 1 i 1 ( t ) p 3 i 1 V 1 i 1 3 2 ( t ) μ 1 V 1 i 2 1 2 ( t ) μ 2 V 1 i 2 ( t ) μ 3 V 1 i 2 3 2 ( t ) + q i , t T max . ( 48 )
By utilizing the result of Lemma 2, we have
V ˙ 1 i ( t ) p 1 i V 1 i 1 2 ( t ) p 2 i V 1 i ( t ) p 3 i V 1 i 3 2 ( t ) + q i , t T max .
Set θ ( 0 , 1 ) . Then, we have
V ˙ 1 i ( t ) θ ( p 1 i V 1 i 1 2 ( t ) + p 2 i V 1 i ( t ) + p 3 i V 1 i 3 2 ( t ) ) ( 1 θ ) ( p 1 i V 1 i 1 2 ( t ) + p 2 i V 1 i ( t ) + p 3 i V 1 i 3 2 ( t ) ) + q i , t T max . ( 50 )
Hence,
V ˙ 1 i ( t ) θ ( p 1 i V 1 i 1 2 ( t ) + p 2 i V 1 i ( t ) + p 3 i V 1 i 3 2 ( t ) ) , t T max
if V 1 i ( t ) satisfies V 1 i ( t ) q i .
Then, by using the similar analysis given in Proposition 1 and Corollary 1, we have V 1 i ( t ) q i for any t T max i , which means that y i ( t ) y 0 ( t ) ϕ i for any t T max i . Hence, the proof is completed. □
Remark 1. 
Based on the conclusions of Proposition 1 and Theorem 1, the maximum dwell-time T max i and the size of the error bound ϕ i are mainly influenced by the parameters defined in (9), (10) and (35), (36), namely β , α 1 , α 2 , β w (which equals β ( t ) ); α 1 w (which equals α 1 ( t ) ); α 2 w (which equals α 2 ( t ) ); and β i , α 1 i , α 2 i , δ i and ξ i . Specifically, in most cases, the larger β , α 1 , α 2 , β w , α 1 w , α 2 w , β i , α 1 i and α 2 i are, the smaller T max i is; similarly, the smaller δ i and ξ i are, the smaller ϕ i is.
Next, the proof that event-triggered Condition (36) can avoid Zeno-behavior is given as follows.
Proposition 2. 
If Conditions (12)(15) (or Conditions (12)(14) and (26), (27)) and Condition (38) are satisfied, then the event-triggered Condition (36) can avoid Zeno-behavior for any given initial values.
Proof of Proposition 2. 
Set ψ i ( t ) = φ 1 i ( t ) φ 1 i ( t k i ) δ i ( φ 1 i ( t ) + ξ i ) . Then, based on Proposition 1, Corollary 1, Theorem 1 and η i ( t ) 0 , we have ψ i ( t k i ) = 0 , t k + 1 i inf { t | t > t k i , ψ i ( t ) > 1 } and
ψ ˙ i ( t ) = ( φ 1 i ( t ) + ξ i ) ( φ 1 i ( t ) φ 1 i ( t k i ) ) T ( A i φ 1 i ( t ) + ω i ( t ) β i φ 1 i ( t k i ) α 1 i sign ( φ 1 i ( t k i ) ) α 2 i sign ( φ 1 i ( t k i ) ) 2 + φ 2 i ( t ) ) φ 1 i ( t ) φ 1 i ( t k i ) δ i ( φ 1 i ( t ) + ξ i ) 2 φ 1 i ( t ) φ 1 i ( t k i ) φ 1 i T ( t ) ( A i φ 1 i ( t ) + ω i ( t ) β i φ 1 i ( t k i ) α 1 i sign ( φ 1 i ( t k i ) ) α 2 i sign ( φ 1 i ( t k i ) ) 2 + φ 2 i ( t ) ) φ 1 i ( t ) δ i ( φ 1 i ( t ) + ξ i ) 2 , ( 52 )
where
φ 2 i ( t ) = Π i ( β φ 2 i ( t ) + α 1 sign ( φ 2 i ( t ) ) + α 2 sign ( φ 2 i ( t ) ) 2 ) , if σ ( t ) = 0 and t < T max , φ 2 i ( t ) = Π i ( β w φ 2 i ( t ) + α 1 w sign ( φ 2 i ( t ) ) + α 2 w sign ( φ 2 i ( t ) ) 2 ) , if σ ( t ) = w { 1 , 2 , , s } and t < T max , φ 2 i ( t ) = 0 , if σ ( t ) = w { s + 1 , s + 2 , , s } or t T max .
Meanwhile, according to the results of Proposition 1, Corollary 1 and Theorem 1, we have φ 1 i ( t ) ϕ i and φ 2 i ( t ) = 0 for any t T max i . Hence, for any given initial values, there must exist positive constants φ 1 i and φ 2 i such that
φ 1 i ( t ) φ 1 i , φ 2 i ( t ) φ 2 i
for any t 0 .
Then, set φ 2 i max = max { Π i ( β φ 2 i + α 1 + α 2 φ 2 i 2 ) , Π i ( β 2 φ 2 i + α 1 w + α 2 w φ 2 i 2 ) } , which is based on (52) and (53). As such, we have
ψ ˙ i ( t ) A i β i I n i φ 1 i ( t ) + γ + α 1 i + α 2 i φ 1 i 2 + φ 2 i max + β i φ 1 i ( t ) φ 1 i ( t k i ) δ i ( φ 1 i ( t ) + ξ i ) + β i φ 1 i ( t ) φ 1 i ( t k i ) 2 δ i ( φ 1 i ( t ) + ξ i ) 2 + φ 1 i ( t ) φ 1 i ( t k i ) ( A i β i I n i φ 1 i ( t ) + γ + α 1 i + α 2 i φ 1 i 2 + φ 2 i max ) δ i ( φ 1 i ( t ) + ξ i ) 2 1 i ψ i 2 ( t ) + 2 i ψ i ( t ) + 3 i ,         ( 54 )
where
1 i = δ i β i , 2 i = β i + ϵ i , 3 i = δ i 1 ϵ i , ϵ i = max { A i β i I n i , ξ i 1 ( γ + α 1 i + α 2 i φ 1 i 2 + φ 2 i max ) } .
Therefore,
t k + 1 i t k i 0 1 1 1 i v 2 + 2 i v + 3 i d v ,
where v is a dummy variable.
The proof is thus completed. □
Remark 2. 
Based on the conclusion of Proposition 2, the following event-triggered condition can avoid Zeno-behavior:
t k + 1 i = inf { t | t > t k i , φ 1 i ( t ) φ 1 i ( t k i ) > δ i ( φ 1 i ( t ) + ξ i ) } .
Since η i ( t ) 0 , event-triggered Condition (36) is a sufficient condition for Condition (56), which means that the event-triggered condition can also avoid Zeno-behavior. Meanwhile, due to the existence of η i ( t ) , the controller under Condition (36) generally exhibits a lower update frequency than under Condition (56).

5. Event-Based Control Scheme Under Unknown DoS Attacks

5.1. Design of Dynamic Compensator

Consider the case that DoS attacks are unknown, which means that σ ( t ) and H σ ( t ) cannot be known in advance. Assume that it is known for each agent whether the topology graph is connected or not. Then, the dynamic compensators for Systems (5)–(8) are provided as follows:
z ˙ i ( t ) = A 0 z i ( t ) β φ 2 i ( t ) α 1 sign ( φ 2 i ( t ) ) α 2 sign ( φ 2 i ( t ) ) 2 , σ ( t ) { 0 , 1 , 2 , , s } ,
z ˙ i ( t ) = A 0 z i ( t ) , otherwise ,
where β , α 1 , α 2 > 0 need to be calculated and the other symbols have the same meanings as given before.
Proposition 3. 
Assume that Assumptions 1–4 hold, if there exist β , α 1 , α 2 > 0 such that
p 1 > 0 , p 2 > 0 , p 3 > 0 ,
p ^ 1 > 0 , p ^ 2 > 0 , p ^ 3 > 0 ,
τ ˜ > 0 .
Then, z i ( t ) x 0 ( t ) = 0 for any t T ^ max , where
p ^ 1 = min { 2 α 1 λ min ( H w ) , w { 1 , 2 , , s } } , p ^ 2 = min { 2 ( β λ min ( H w ) A 0 ) , w { 1 , 2 , , s } } , p ^ 3 = min { 2 α 2 ( N n 0 ) 1 2 ( λ min ( H w ) ) 3 2 , w { 1 , 2 , , s } } , τ ˜ = 1 2 ( p 2 τ 1 + p ^ 2 τ 2 max { ln λ max ( H ) λ min ( H ) , ln λ max ( H w ) λ min ( H w ) } · τ 1 + τ 2 τ ) A 0 τ 3 , w { 1 , 2 , , s } } , T ^ max = T ¯ ( 1 + ε ^ 2 p ^ ) , ε ^ 2 = max { λ min ( H ) 1 2 e A 0 τ 3 p 2 p 3 ( e 1 2 p 2 τ 1 ) , λ min ( H w ) 1 2 e A 0 τ 3 p ^ 2 p ^ 3 ( e 1 2 p ^ 2 τ 1 ) , w { 1 , 2 , , s } } , p ^ = min { λ min ( H ) 1 2 p 1 p 2 1 ( 1 e 1 2 p 2 τ ) , λ min ( H w ) 1 2 p ^ 1 p ^ 2 1 ( 1 e 1 2 p ^ 2 τ ) , w { 1 , 2 , , s } } ,
and the other symbols have the same meanings as given before.
Proof of Proposition 3. 
Let V 2 ( t ) and ε 2 ( t ) have the same meanings as given in Proposition 1. Then, it can be obtained that
V ˙ 2 ( t ) p 1 V 2 1 2 ( t ) p 2 V 2 ( t ) p 3 V 2 3 2 ( t ) , σ ( t ) = 0 ,
V ˙ 2 ( t ) p ^ 1 V 2 1 2 ( t ) p ^ 2 V 2 ( t ) p ^ 3 V 2 3 2 ( t ) , σ ( t ) = 1 , 2 , , s ,
ε 2 ( t ) e A 0 ( t t 0 ) ε 2 ( t 0 ) , if σ ( t ) = 0 for [ t 0 , t ) ,
and
λ max ( H ) 1 2 V 2 ( t ) ε 2 ( t ) λ min ( H ) 1 2 V 2 ( t ) , if σ ( t ) = 0 ,
λ max ( H w ) 1 2 V 2 ( t ) ε 2 ( t ) λ min ( H w ) 1 2 V 2 ( t ) , if σ ( t ) = w , w { 1 , 2 , , s } .
Then, by a similar analysis that yields Proposition 1, we have z i ( t ) x 0 ( t ) = 0 for any t T ^ max . The proof is thus completed. □

5.2. Dynamic Event-Triggered Control Scheme

Chose (35) and (36) as the controller and event-triggered condition, respectively. Based on dynamic Compensator (57) and (58) and Theorem 1, the next conclusion can be given directly.
Theorem 2. 
Assume that Assumptions 1–4 hold and dynamic Compensators (57) and (58) satisfy Conditions (59)(61) if there exist β i , α 1 i , α 2 i , δ i , ξ i , χ 1 i , χ 2 i , ρ 1 i , ρ 2 i , ρ 3 i > 0 for i = 1 , 2 , , N such that Conditions (38)(41). Then, Systems (5)(8) with dynamic Compensators (57) and (58), Controller (35) and event-triggered Condition (36) satisfy the following condition: y i ( t ) y 0 ( t ) ϕ i for any t T max i , where
T max i = T ^ max + T max i ,
and T ^ max is obtained by Proposition 3 and the other symbols have the same meanings as given before.
Moreover, the next result can be given directly.
Proposition 4. 
If Conditions (59)(61) and Condition (38) are satisfied, then the event-triggered Condition (36) can avoid Zeno-behavior for any given initial values.

6. Numerical Example

Consider Systems (5)–(8) as consisting of one leader and four agents, and the parameters are given as follows:
A 0 = 0.2 0.3 0.1 0.15 , A 1 = 0.4 0.3 1.2 0.75 , A 2 = 0.3 0.45 0.1 0.05 , A 3 = 0.15 0.45 0.3 0.5 , A 4 = 0.25 0.25 0.05 0 0.05 0.1 0.2 0.25 0.1 , C 0 = 1 1 , C 1 = 1 1 , C 2 = 1 2 , C 3 = 1 2 , C 4 = 1.5 0.5 0.5 , ω 1 ( t ) = ( 0.2 sin ( t ) 0.1 cos ( t ) ) T , ω 2 ( t ) = ( 0.2 cos ( t ) 0.2 sin ( t ) ) T , ω 3 ( t ) = ( 0.2 sin ( t ) 0.2 cos ( t ) ) T , ω 4 ( t ) = ( 0.15 sin ( t ) 0.1 cos ( t ) 0.1 sin ( t ) ) T .
Moreover, the topology graph of Systems (5)–(8) is such that
H σ ( t ) = H = 0.8 0.4 0 0 0.4 1.1 0.4 0 0 0.4 1.1 0.3 0 0 0.3 0.5 , σ ( t ) = 0 , H σ ( t ) = H 1 = 0.8 0.4 0 0 0.4 1.1 0.4 0 0 0.4 0.7 0.3 0 0 0.3 0.5 , σ ( t ) = 1 , H σ ( t ) = H 2 = 0.8 0.4 0 0 0.4 0.8 0.4 0 0 0.4 1.1 0.3 0 0 0.3 0.5 , σ ( t ) = 2 , σ ( t ) = 0 , t [ r T , r T + 1 ) , 1 , t [ r T + 1 , r T + 1.5 ) , 2 , t [ r T + 1.5 , r T + 2 ) , otherwise , t [ r T + 2 , ( r + 1 ) T ) , r = 0 , 1 , 2 , , T = 4 .
Case (a): Consider the case that DoS attacks are known. In this case, based on Corollary 1 and Theorem 1, choose (9)–(11), (35) and (36) as the dynamic compensators, controller and event-triggered condition for systems with the following parameters:
Π 1 = 1 0 2 1 , Π 2 = 1 1 0 1 , Π 3 = 1 1 1 0 , Π 4 = 1 0 0 1 1 1 , β = 5 , β 1 = 8 , β 2 = 7 , α 1 = α 2 = α 11 = α 21 = α 12 = α 22 = 1 , β 1 = 3 , β 2 = 2.5 , β 3 = 3.5 , β 4 = 3 , α i j = 1 , i { 1 , 2 } , j { 1 , 2 , 3 , 4 } , δ 1 = δ 4 = 0.02 , δ 2 = δ 3 = 0.03 , ξ 1 = ξ 2 = ξ 3 = ξ 4 = 0.1 , ξ ^ = 0.1 , μ 1 = μ 2 = μ 3 = 1 , χ 11 = χ 12 = χ 13 = χ 14 = 0.1 , χ 21 = χ 22 = χ 23 = χ 24 = 0.01 ,
where ρ 1 i , ρ 2 i and ρ 3 i can be provided by calculating (39)–(41). According to Figure 1, Systems (5)–(8) have achieved quasi-consensus. By Figure 2 and Figure 3 and Table 1, the event-triggered Condition (36) avoids Zeno-behavior and is less conservative than the static event-triggered condition (with a lower triggering frequency) in this example.
Case (b): Consider the case that the DoS attacks are unknown. In this case, based on Proposition 3 and Theorem 2, choose (57), (58), (35) and (36) as the dynamic compensators, controller and event-triggered condition for the systems with the following parameters:
β = 10 , α 1 = α 2 = 1 ,
where the values of the other parameters are the same as in the former example.
According to Figure 4, Systems (5)–(8) achieved quasi-consensus. As shown in Figure 5 and Figure 6 and Table 1, the event-triggered Condition (36) avoids Zeno-behavior and is less conservative than the static event-triggered condition (with a lower triggering frequency) in this example.
Based on the results of the numerical example, the following conclusions can be obtained: (i) By comparing Figure 1 with Figure 4, the convergence rate of the output errors under a control scheme for unknown DoS attacks is faster than those under a control scheme for known DoS attacks. (ii) By comparing Figure 2 and Figure 5, supported by Table 1, the controller update frequency under unknown DoS attacks is higher than under known DoS attacks. (iii) By comparing Figure 2 with Figure 3 and Figure 5 with Figure 6, as well as being supported by Table 1, the dynamic event-triggered control schemes given in this paper significantly reduce the controller update frequency.
Based on the results of Propositions 1 and 3, the control scheme for known DoS attacks adopts less conservative parameters compared to the control scheme for unknown DoS attacks, which leads to the slower convergence rate and lower controller update frequency (the results of (i) and (ii)). Moreover, (iii) demonstrates the superiority of the proposed dynamic event-triggered control schemes (significantly alleviating communication bandwidth demands).
A comparison between the control schemes proposed in this paper with existing representative works is shown in Table 2. Based on the comparison of Table 2, the advantage of the control schemes proposed in this paper lies in that they comprehensively possess all the advanced characteristics that are scattered in the existing literature. Specifically, unlike the methods presented in these references, this paper is the only one that simultaneously achieves the following: (1) control of heterogeneous agents, (2) a dynamic event-triggered mechanism, (3) resilience against aperiodic and unknown DoS attacks, and (4) fixed-time convergence. This integration results in a more comprehensive and capable solution.

7. Practical Significance and Challenges

The dynamic event-triggered control schemes for MASs under known and unknown DoS attacks provided in this paper have both theoretical value and practical significance, but they also face challenges in practical application. At the practical level, the following challenges apply: (1) The studies on HMASs under known and unknown DoS attacks have the potential to be applied to real-world scenarios, such as periodic maintenance and sudden interference, and they can provide a framework for designing cooperative control. (2) The designed dynamic event-triggered mechanism can significantly save communication resources and is suitable for platforms with limited bandwidth and energy, such as unmanned aerial vehicles and robots. (3) A fixed-time control scheme can provide a definite upper bound of the maximum dwell time, which is conducive to the prediction of the actual control results. The main challenges faced include the following: (1) The theoretical performance is relatively sensitive to the model accuracy. (2) The dynamic event-triggered mechanism increases real-time computing overhead and may exacerbate signal loss under extreme attacks. (3) Overly strict selection conditions for parameters may lead to conservative controller design. Our future work will focus on enhancing the robustness of the framework and advancing its implementation under physical constraints.

8. Conclusions

The fixed-time quasi-consensus problem of HMASs under DoS attacks was investigated in this paper. Based on the characteristics of CMA and CBA, Lyapunov stability theory and the method of solving fractional differentiation, considering whether the attacks are known, two dynamic compensators were designed, and the corresponding fixed-time consensus criteria were provided, which can ensure that the state of the dynamic compensator agrees with the state of the leader with in a fixed time. On this basis, the event-triggered control schemes were provided to solve the fixed-time consensus issue of HMASs under both known and unknown DoS attacks. Moreover, the proposed dynamic event-triggered condition not only avoids Zeno-behavior successfully but also exhibits lower conservatism than the static event-triggered condition. Finally, the results of the numerical example support the correctness of our theoretical conclusions. In the future, we would like to extend these conclusions to research on nonlinear MASs, stochastic MASs, time-varying MASs, etc.

Author Contributions

Conceptualization, J.H.; methodology, J.H.; software, H.J.; validation, H.J.; formal analysis, H.J.; investigation, H.J.; resources, J.H.; data curation, J.H.; writing—original draft preparation, J.H.; writing—review and editing, J.H.; visualization, J.H.; supervision, J.H.; project administration, J.H.; and funding acquisition, J.H. and H.J. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by the Basic Scientific Research Project of Liaoning Provincial Department of Education (LJ212411632039, LJ222411632036); the Liaoning Provincial Science and Technology Program Joint Initiative (Natural Science Foundation-Doctoral Research Startup Project) (2024-BSLH-160); the National Natural Science Foundation of China (62203311, 62473269); the Liaoning Province Key Research and Development Project (2024JH2/102500093); and the Liaoning Revitalization Talents Program (XLYC2403160).

Data Availability Statement

No data was used for the research described in this article.

Conflicts of Interest

The authors declare no conflicts of interest.

Abbreviations

The following abbreviations are used in this manuscript:
HMASsHeterogeneous multi-agent systems
DoSDenial-of-service
MASsMulti-agent systems

References

  1. Vidal, R.; Shakernia, O.; Sastry, S. Formation control of nonholonomic mobile robots omnidirectional visual servoing and motion segmentation. IEEE Int. Conf. Robot. Autom. 2003, 1, 584–589. [Google Scholar]
  2. Olfati-Saber, R.; Murray, R.M. Distibuted cooperative control of multiple vehicle formations using structural potential functions. In Proceedings of the 15th of IFAC World Congress, Barcelona, Spain, 21–26 July 2002. [Google Scholar]
  3. Lawton, J.R.; Bread, R.W. Synchronized multiple spacecraft rotations. Automatica 2002, 38, 1359–1364. [Google Scholar] [CrossRef]
  4. Fax, J.A.; Murray, R.M. Information flow and cooperative control of vehicle formations. IEEE Trans. Autom. Control 2004, 49, 1465–1476. [Google Scholar] [CrossRef]
  5. Zhang, H.; Han, J.; Wang, Y.; Jiang, H. H consensus for linear heterogeneous discrete-time multiagent systems with output feedback control. IEEE Trans. Cybern. 2019, 49, 3713–3721. [Google Scholar] [CrossRef] [PubMed]
  6. Yaghmaie, F.A.; Lewis, F.L.; Su, R. Output regulation of linear heterogeneous multi-agent systems via output and state feedback. Automatica 2016, 67, 157–164. [Google Scholar] [CrossRef]
  7. Han, J.; Zhang, H.; Jiang, H.; Sun, X. H consensus for linear heterogeneous multi-agent systems with state and output feedback control. Neurocomputing 2018, 275, 2635–2644. [Google Scholar] [CrossRef]
  8. Xiao, Q.; Lewis, F.L.; Zeng, Z. Containment control for multiagent systems under two intermittent control schemes. IEEE Trans. Autom. Control 2019, 64, 1236–1243. [Google Scholar] [CrossRef]
  9. Zhou, Y.; Wen, G.; Chen, G. Bipartite consensus tracking of heterogeneous multi-agent systems: A smooth output-feedback control approach. Automatica 2025, 178, 112363. [Google Scholar] [CrossRef]
  10. Zhang, W.; Ho, D.W.C.; Tang, Y.; Liu, Y. Quasi-consensus of heterogeneous-switched nonlinear multiagent systems. IEEE Trans. Cybern. 2020, 50, 3136–3146. [Google Scholar] [CrossRef]
  11. Cortés, J. Finite-time convergent gradient flows with applications to network consensus. Automatica 2006, 42, 1993–2000. [Google Scholar] [CrossRef]
  12. Zou, W.; Shi, P.; Xiang, Z.; Shi, Y. Finite-time consensus of second-order switched nonlinear multi-agent systems. IEEE Trans. Neural Netw. Learn. Syst. 2020, 31, 1757–1762. [Google Scholar] [CrossRef]
  13. Dong, Y.; Xian, J. Finite-time event-triggered consensus for non-linear multi-agent networks under directed network topology. IET Control Theory Appl. 2017, 11, 2458–2464. [Google Scholar] [CrossRef]
  14. Ning, B.; Han, Q. Prescribed finite-time consensus tracking for multiagent systems with nonholonomic chained-form dynamics. IEEE Trans. Autom. Control 2019, 64, 1686–1693. [Google Scholar] [CrossRef]
  15. He, S.; Wang, H.; Yu, W. Distributed fast finite-time tracking consensus of multi-agent systems with a dynamic leader. IEEE Trans. Circuits Syst. II 2022, 69, 2176–2180. [Google Scholar] [CrossRef]
  16. Mi, W.; Luo, L.; Zhong, S. Fixed-time consensus tracking for multi-agent systems with a nonholomonic dynamics. IEEE Trans. Autom. Control 2023, 68, 1161–1168. [Google Scholar] [CrossRef]
  17. Ning, B.; Jin, J.; Zheng, J.; Man, Z. Finite-time and fixed-time leader-following consensus for multi-agent systems with discontinuous inherent dynamics. Int. J. Control 2017, 91, 1259–1270. [Google Scholar] [CrossRef]
  18. Wang, L.; Wen, C.; Guo, F.; Cai, H.; Su, H. Robust cooperative output regulation of uncertain linear multi-agent systems not detectable by regulated output. Automatica 2019, 101, 309–317. [Google Scholar] [CrossRef]
  19. Chen, T.; Peng, S.; Zhang, Z. Finite-time and fixed-time consensus of nonlinear stochastic multi-agent systems with ROUs and RONs via impulsive control. IEEE Access 2019, 7, 136630–136640. [Google Scholar] [CrossRef]
  20. Zhu, W.; Jiang, Z.; Feng, G. Event-based consensus of multi-agent systems with general linear models. Automatica 2014, 50, 552–558. [Google Scholar] [CrossRef]
  21. Hu, W.; Liu, L. Cooperative output regulation of heterogeneous linear multi-agent systems by event-triggered control. IEEE Trans. On Cybern. 2017, 47, 105–116. [Google Scholar] [CrossRef]
  22. Zhang, H.; Han, J.; Wang, Y.; Jiang, H. H consensus for linear heterogeneous multiagent systems based on event-triggered output feedback control scheme. IEEE Trans. Cybern. 2019, 49, 2268–2279. [Google Scholar] [CrossRef]
  23. Guo, S.; Pan, Y.; Li, H.; Cao, L. Dynamic event-driven ADP for n-player nonzero-sum games of constrained nonlinear systems. IEEE Trans. Autom. Sci. Eng. 2025, 22, 7657–7669. [Google Scholar] [CrossRef]
  24. Pan, Y.; Chen, Y.; Liang, H. Event-triggered predefined-time control for full-state constrained nonlinear systems: A novel command filtering error compensation method. Sci. China Technol. Sci. 2024, 67, 2867–2880. [Google Scholar] [CrossRef]
  25. Han, J.; Jiang, H.; Zhao, Y.; Shi, J. Fixed-time event-triggered and periodic event-triggered containment control for heterogeneous multi-agent systems under DoS attacks. Syst. Control Lett. 2025, 204, 106208. [Google Scholar] [CrossRef]
  26. Lu, A.; Yang, G. Input-to-state stabilizing control for cyber-physical systems with multiple transmission channels under denial of service. IEEE Trans. Autom. Control 2018, 63, 1813–1820. [Google Scholar] [CrossRef]
  27. Huang, K.; Xiang, Z.; Deng, W.; Yang, C.; Wang, Z. False data injection attacks detection in smart grid: A structural sparse matrix separation method. IEEE Trans. Netw. Sci. Eng. 2021, 8, 2545–2558. [Google Scholar] [CrossRef]
  28. Xu, Y.; Fang, M.; Shi, P.; Wu, Z. Event-based secure consensus of mutiagent systems against DoS attacks. IEEE Trans. Cybern. 2020, 50, 3468–3476. [Google Scholar] [CrossRef]
  29. Zhang, Y.; Wu, Z.; Shi, P.; Huang, T.; Chakrabarti, P. Quantization-based event-triggered consensus of multiagent systems against aperiodic DoS attacks. IEEE Trans. Syst. Man Cybern. Syst. 2023, 53, 3774–3783. [Google Scholar] [CrossRef]
  30. Zhao, N.; Shi, P.; Wen, X. Dynamic event-triggered approach for networked control systems under denial of service attacks. Int. J. Robust Nonlinear Control 2021, 31, 1774–1795. [Google Scholar] [CrossRef]
  31. Sun, Y.; Yang, G. Distributed dynamic event-triggered strategy for the consensus of multi-agent systems under asynchronous denial-of-service attacks. J. Frankl. Inst. 2025, 363, 108224. [Google Scholar] [CrossRef]
  32. Yang, H.; Ye, D. Observer-based fixed-time secure tracking consensus for networked high-order multiagent systems against DoS attacks. IEEE Trans. Cybern. 2022, 52, 2018–2031. [Google Scholar] [CrossRef] [PubMed]
  33. Yang, W.H. On classes of summable functions and their fourier series. Proc. R. Soc. A 1912, 87, 225–229. [Google Scholar]
Figure 1. Output errors for agents with dynamic Compensators (9)–(11), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 4.9 ,   5 ] .
Figure 1. Output errors for agents with dynamic Compensators (9)–(11), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 4.9 ,   5 ] .
Mathematics 13 04009 g001
Figure 2. Triggered instants for agents with dynamic Compensators (9)–(11), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Figure 2. Triggered instants for agents with dynamic Compensators (9)–(11), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Mathematics 13 04009 g002
Figure 3. Triggered instants for agents with dynamic Compensators (9)–(11), Controller (35) and static event-triggered Condition: (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Figure 3. Triggered instants for agents with dynamic Compensators (9)–(11), Controller (35) and static event-triggered Condition: (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Mathematics 13 04009 g003
Figure 4. Output errors for agents with dynamic Compensators (57) and (58), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 4.9 ,   5 ] .
Figure 4. Output errors for agents with dynamic Compensators (57) and (58), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 4.9 ,   5 ] .
Mathematics 13 04009 g004
Figure 5. Triggered instants for agents with dynamic Compensators (57) and (58), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Figure 5. Triggered instants for agents with dynamic Compensators (57) and (58), Controller (35) and event-triggered Condition (36): (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Mathematics 13 04009 g005
Figure 6. Triggered instants for agents with dynamic Compensators (57) and (58), Controller (35) and static event-triggered Condition: (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Figure 6. Triggered instants for agents with dynamic Compensators (57) and (58), Controller (35) and static event-triggered Condition: (a) for t [ 0 ,   5 ] , and (b) for t [ 0 ,   1 ] .
Mathematics 13 04009 g006
Table 1. The comparison between dynamic and static periodical event-triggered conditions.
Table 1. The comparison between dynamic and static periodical event-triggered conditions.
Triggering ConditionCondition (36)Corresponding Static Event-Triggered Condition
Mean triggered times for case (a)6002465.5
Mean triggered times for case (b)618.752559.5
Table 2. The comparison between the control schemes proposed in this paper with existing representative works.
Table 2. The comparison between the control schemes proposed in this paper with existing representative works.
Source of the MethodThis PaperReference [9]Reference [25]Reference [31]
Heterogeneous AgentYesYesYesNo
Event-Triggered MechanismDynamicN/AStaticDynamic
Type of DoS AttacksAperiodic UnknownN/APeriodic KnownAperiodic Unknown
Convergence TypeFixed timeAsymptoticFixed timeAsymptotic
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Han, J.; Jiang, H. Dynamic Event-Triggered, Fixed-Time Control for Heterogeneous Multi-Agent Systems with Hybrid DoS Attacks. Mathematics 2025, 13, 4009. https://doi.org/10.3390/math13244009

AMA Style

Han J, Jiang H. Dynamic Event-Triggered, Fixed-Time Control for Heterogeneous Multi-Agent Systems with Hybrid DoS Attacks. Mathematics. 2025; 13(24):4009. https://doi.org/10.3390/math13244009

Chicago/Turabian Style

Han, Ji, and He Jiang. 2025. "Dynamic Event-Triggered, Fixed-Time Control for Heterogeneous Multi-Agent Systems with Hybrid DoS Attacks" Mathematics 13, no. 24: 4009. https://doi.org/10.3390/math13244009

APA Style

Han, J., & Jiang, H. (2025). Dynamic Event-Triggered, Fixed-Time Control for Heterogeneous Multi-Agent Systems with Hybrid DoS Attacks. Mathematics, 13(24), 4009. https://doi.org/10.3390/math13244009

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop