首页 | 本学科首页   官方微博 | 高级检索  
     检索      


Event-triggered bipartite consensus of second-order multi-agent systems under DoS attacks
Institution:1. School of Mathematics and Physics, Anqing Normal University, Anqing 246133, PR China;2. Department of Mathematics, University of Texas at San Antonio, San Antonio, TX 78249, USA;3. School of Mathematics, Southeast University, Nanjing 211189, PR China;4. Yonsei Frontier Lab, Yonsei University, Seoul 03722, South Korea;1. School of Information Science and Technology, Nantong University, Jiangsu 226019, China;2. Nantong University Xinglin College, Jiangsu 226007, China;3. School of Electrical Engineering, Nantong University, Jiangsu 226019, China;1. College of Information Science and Technology, Donghua University, Shanghai 201620, China;2. Engineering Research Center of Digitalized Textile and Fashion Technology, Ministry of Education, Shanghai 201620, China;1. School of Automation, Nanjing University of Science and Technology, Nanjing, Jiangsu 210094 PR China;2. School of Automation and Electrical Engineering, University of Science and Technology Beijing, Beijing 100083 PR China;1. Marine Electrical Engineering College, Dalian Maritime University, Dalian, Liaoning 116026, China;2. College of Science, Liaoning University of Technology, Jinzhou, Liaoning 121001, China;3. School of Navigation, Dalian Maritime University, Dalian, Liaoning 116026, China
Abstract:This paper is concerned with the secure bipartite consensus of second-order multi-agent systems under denial-of-service (DoS) attacks. The communication network is an antagonistic network, in which there is cooperative or competitive relationship between neighboring agents. Meanwhile, information cannot be transmitted when the system is attacked. A novel event-triggered control algorithm based on sampled data is proposed to save limited resources and exclude the Zeno behavior. By applying the convergence of monotone sequences, graph theory as well as the discrete-time Lyapunov function method, some sufficient conditions on threshold parameters, frequency and duration of DoS attacks, and sampling period are derived to ensure the bipartite consensus under DoS attacks. Finally, the correctness and advantages of theoretical results are demonstrated by a numerical simulation.
Keywords:
本文献已被 ScienceDirect 等数据库收录!
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号