Download PDF
Research Article  |  Open Access  |  27 Mar 2025

Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies

Views: 51 |  Downloads: 30 |  Cited:  0
Complex Eng. Syst. 2025, 5, 5.
10.20517/ces.2024.104 |  © The Author(s) 2025.
Author Information
Article Notes
Cite This Article

Abstract

In this paper, a dual-channel event-triggered control (ETC) protocol with a state estimator is designed in multi-agent systems with switching topologies under denial-of-service attacks. Firstly, an ETC protocol and a dynamic ETC protocol are designed in the communication channel and the controller–actuator channel, respectively. Different from the traditional single-channel ETC, the dual-channel ETC is designed to further save resources. Second, an estimator is introduced to avoid continuous communication between agents. The sufficient conditions for realizing consensus are obtained under denial-of-service attacks. Moreover, due to the unstable communication topology of multi-agent systems, we designed a distributed controller based on switching topologies. Finally, the feasibility of the proposed method is verified through numerical simulations.

Keywords

Dual-channel event-triggered, DoS attacks, MASs, switching topologies

1. INTRODUCTION

Cluster behaviors formed by multiple individuals in nature through self-organization and mutual collaboration can exhibit capabilities that surpass individual functions. Inspired by this, researchers had proposed the concept of multi-agent systems (MASs). In recent years, MASs have received more attention from researchers due to the wide range of applications in military, transportation and agriculture[1]. In the course of the study of the MAS system, consensus is one of the most important research elements for MASs. Consensus means that agents can communicate in network and achieve consensus. In the past few years, many researchers had studied and explored the consensus in MASs. In reference[2], the stable problem of finite-time of MASs was studied by analyzing the transmission control protocol over active queue management topologies. In reference[3], an adaptive dynamic protocol was designed, which achieves the consensus under the effects of uncertain delays. In reference[4], the sufficient condition of achieving prescribed-time consensus was extended to a bipartite cooperative–antagonistic network.

In general, the goal of consensus is to design appropriate protocols to achieve consensus in communication networks with limited communication resources. In practical engineering, each agent carries limited energy resources when performing certain functions (e.g., collecting information, exchanging communication information with neighboring agents, etc.) and the communication channel can only transmit a limited number of data bits. Therefore, designing control strategies to reduce resource consumption so that agents can operate stably for a longer period of time is a research direction of many researchers. Traditional solutions are through time-triggered control, such as sampling control[5] and pulse control[6]. In periodic sampling control strategies, systems sample data at fixed time intervals, and this design method saves resources, but lacks the flexibility to adjust the sampling moment spontaneously. For this reason, event-triggered control (ETC) has garnered the interest of researchers. In reference[7], a second-order dynamic system was studied; the ETC strategy of the system was decided by the states of each agent and its neighbor agent. In references[8, 9], model-based ETC strategies were designed in MASs where the continuity of adjacent states was no longer required. In references[10, 11], an ETC protocol was designed in the systems, which was only updated at the instants of triggering. In reference[12], a hybrid event triggering mechanism combining three dynamic triggering conditions, namely local state error, velocity-dependent triggering condition, and dynamic maximum triggering interval, is designed to achieve efficient utilization of communication resources. Above research on ETC employs multiple parameters to optimize communication efficiency, imposing increased demands on estimators or samplers. In references[13, 14, 15], a dual-channel ETC protocol was designed for agent communication and controller–actuator channels, and consensus could be achieved while saving controller resources. In references [16], an ETC protocol was designed for nonlinear systems.

In earlier work, event generation relies on continuous information from the agents themselves and their neighbors; the control protocols designed using this approach are still continuous. To solve these problems, some researchers proposed the concept of an estimator, which is to estimate the state of the agents instead of the actual state. In reference[17], resilience control under denial-of-service (DoS) attacks is achieved by estimating the dynamics of leaders and followers. In reference[18], consensus control is achieved in cooperative communication networks by combining estimators.

The above results regarding consensus are mostly obtained in a secure network environment. MASs may be affected by DoS attacks in practical applications. DoS attacks usually inject large amounts of data into the communication channel, paralyzing the channel. In order to solve the problem of the impact of DoS attacks, researchers had proposed many control schemes. In reference[19], directed spanning trees are utilized to achieve security consensus under DoS attacks. In reference[20], the timing of DoS attacks is not consistent for each communication channel which is a more realistic scenario. Besides, switching topology is widely used in MASs which also attracted the attention of scholars. In reference[21], the problem of the system reaching a consistent rate of convergence when each link is established randomly with independent probability cycles was analyzed. In reference[22], the consensus of MASs alternately switched by discrete and continuous under the same topological conditions was studied. Dual-channel ETC saves communication activity to necessary events which can significantly reduce communication traffic. It helps reduce the risk of communication resources being exhausted under DoS attacks, thus ensuring that the transmission of critical information is not compromised.

Inspired by the above discussions, this paper studied the consensus problem in MASs with switching topologies under DoS attacks; the major contributions are as follows.

● This paper investigates the MAS consensus under switching communication topologies, which allow agents to have more complex interaction patterns. By rigorously analyzing the relationship between event-triggered feedback parameters and DoS attack dynamics, we establish sufficient conditions for MAS consensus. The derived criteria systematically integrate topology switching constraints, and security thresholds against DoS attacks, ensuring both communication efficiency and robustness in dynamic networked environments.

● Based on the dual-channel framework, ETC protocols are developed for the controller–actuator channel and communication channel to save resources. By incorporating an exponential parameter, the Zeno behavior is eliminated in the controller–actuator channel.

Notations:$$ \Re^{n}, \Re^{n\times n} $$ denote the $$ n $$-dimensional space, $$ n\times n $$ real matrices, respectively. $$ \left|\cdot\right| $$ and $$ \left\|\cdot\right\| $$ represent the absolute value and 2-norm, respectively. $$ \otimes $$ denotes the Kronecker product. abs(·) denotes absolute values of elements of a matrix. $$ \mathit{λ}\left(\cdot\right) $$ and $$ \bar{\mathit{λ}}\left(\cdot\right) $$ represent the eigenvalue and singular eigenvalues of a matrix, respectively. $$ \mathbf{1}_{N} $$ denotes the matrix $$ N\times1 $$ with all ones. diag{·} represents a diagonal matrix.

2. MODEL AND PROBLEM DESCRIPTION

2.1. Graph theory

The communication topology between $$ N $$ agents can be represented by a leader-following undirected digraph $$ {\cal G} = \{ {\cal V}, {\cal E}, {\cal A}\} $$, where $$ {\cal V} = \left\{ {{v_1}, {v_2}, \ldots , {v_N}} \right\} $$ denotes the set of nodes, $$ {\cal E} = {\cal V} \times {\cal V} $$ represents the set of edges and an adjacency matrix $$ {\cal A} $$. The edge $$ {e_{ij}} $$ is represented by a pair of vertices $$ \left( {{v_j}, {v_i}} \right) $$. If $$ {a_{ij}} = 1 $$ and $$ {e_{ij}} \in {\cal E} $$, agent $$ j $$ can exchange information with agent $$ i $$; otherwise, $$ {a_{ij}} = 0 $$. If $$ {a_{ij}} = 1 $$, agents $$ i $$ and $$ j $$ are neighboring nodes of each other. The set of neighboring agents $$ i $$ is denoted by $$ {N_i} = \left\{ {j \in {\cal V}:{e_{ij}} \in {\cal E}} \right\} $$. If $$ i \ne j $$, the Laplace matrix of $$ {\cal G} $$ can be defined as $$ {l_{ii}} = \sum\nolimits_{j = 1, j \ne i}^N {{a_{ij}}} $$, $$ {l_{ij}} = - {a_{ij}} $$. The real part of the eigenvalues of the $$ L $$ matrix satisfies $$ 0{\rm{ = }}{\mathit{λ} _1}\left( L \right) \le {\mathit{λ} _2}\left( L \right) \le \cdots \le {\mathit{λ} _N}\left( L \right) $$. In particular, $$ {\mathit{λ} _1} = 0 $$ corresponds to a feature vector $$ {{\bf{1}}_N} $$. If $$ {{m_i}=1} $$, the follower agent $$ i $$ can exchange information with the leader; otherwise, $$ {{m_i}=0} $$. Define $$ H=L+M $$, $$ M = diag\left\{ {{m_1}, {m_2}, ..., {m_N}} \right\} $$.

Existence of all possible communication topologies for multi-agent systems can be represented by a set of connected undirected graphs $$ \mathcal{G}_{\rho}=\begin{Bmatrix}\mathcal{G}_{1}, \mathcal{G}_{2}\cdots\mathcal{G}_{O}\end{Bmatrix} $$, where $$ O>0 $$ is the number of switching topologies for the entire system. Considering the case of random switching topology, there exists a continuous edge probability matrix $$ \boldsymbol{\aleph}=\left(\ell_{ij}\right)_{N\times N} $$ and $$ 0\leq\ell_{ij}\leq1 $$. The probability of a connection between every two points is independent of each other. Since there are only two possibilities of connection or non-connection between two nodes, a sequence of $$ N(N-1) $$ independent Bernoulli trials is used to describe it. Consider a non-empty set of continuous time intervals $$ \{[t_k, t_{k+1})\mid k=0, 1, \ldots, M\} $$, where $$ t_{0}=0, \tau_{*}<t_{k+1}-t_{k}\leq\tau^{*}, \tau_{*}>0 $$ is a positive constant. The topology is invariant within each interval $$ [t_k, t_{k+1}) $$; the switching signals $$ \Upsilon $$ and $$ L_\Upsilon $$ are constant within this interval.

Remark 1According to the definition of the lower bound of switching time $$ \tau_{*} $$, the number of topology switches must be kept within a certain range. If switching occurs too frequently, the excessive switching may negatively affect both the dynamic performance and the stability of the system. This paper utilizes Bernoulli random switching, leveraging multiple iteration step sizes. By modulating the size of these multiples, one can regulate the frequency of random transitions between different communication topologies.

2.2. DoS attacks model

The DoS attacks usually involve injecting large amounts of data into a communication channel to paralyze the channel, with the main aim of preventing information interaction and affecting monitoring equipment. Some useful assumptions and common lemmas are presented for further analysis.

Assumption 1[23] The number of DoS attacks in the $$ [{t_0}, t] $$ is $$ N_0({t_0}, t) $$. We assume the constants $$ {N_1}>0 $$ and $$ {T^f} > 0 $$ such that

$$ \begin{equation} {N_0}({t_0}, t) \leqslant {N_1} + \frac{{t - {t_0}}}{{{T^f}}}, \end{equation} $$

Assumption 2[23] The total time of DoS attacks in the $$ [{t_0}, t] $$ is $$ \Xi_a({t_0}, t) $$. We assume the constants $$ {N_2}>0 $$ and $$ {T^d} > 0 $$ such that

$$ \begin{equation} \Xi_a ({t_0}, t) \leqslant {N_2} + \frac{{t - {t_0}}}{{{T^d}}}. \end{equation} $$

Remark 2Assumptions 1 and 2 limit the frequency and duration of attacks to make control meaningful. When the average attack frequency is greater than the sampling frequency of the system, the system is uncontrollable. In addition, these assumptions are justified by the fact that the duration is limited by energy.

2.3. Problem statement

First, consider a MAS that has one leader and $$ N $$ followers. In this system, the state of the leader $$ X_0 $$ is proposed as

$$ \begin{equation} {\dot x_0}(t) = A{x_0}(t) , \end{equation} $$

and followers’ dynamics is

$$ \begin{equation} {\dot x_i}(t) = A{x_i}(t) + B{u_i}(t), i \in \mathbb{S} , \end{equation} $$

where $$ \mathbb{S} = 1, 2, ..., N $$; $$ {x_0}(t) \in {\Re ^n} $$ is the states of the leader. The $$ {x_i}(t) \in {\Re ^n} $$ and $$ {u_i}(t) \in {\Re ^p} $$ are the states and control input of agent $$ i $$. The $$ A \in {\Re ^{n \times n}} $$ and $$ B \in {\Re ^{n \times p}} $$ are the constant matrices of the corresponding dimension. The following assumption is considered.

Assumption 3The topology graph of MASs $$ \mathcal{G} $$ is undirected and connected; the pair of $$ (A, B) $$ is stabilisable.

Lemma 1[24] Under Assumption 3, a unique solution denoted as P which satisfies the algebraic Riccati equation as follows

$$ \begin{equation} {A^T}P + PA - \kappa PB{B^T}P + P = 0, \end{equation} $$

where $$ \kappa>0 $$.

Definition 1Given initial conditions, the consensus of MASs is realized if

$$ \begin{equation} \mathop {\lim }\limits_{t \to \infty } \left\| {{x_i}(t) - {x_0}(t)} \right\| = 0, i\in \mathbb{S}. \end{equation} $$

Lemma 2[25]$$ {\cal G} $$ is structurally balanced; thus, there is a matrix $$ \Delta = diag\left\{ {{\Delta _1}, {\Delta _2}, \ldots , {\Delta _N}} \right\} > 0 $$ such that $$ \Delta H + {H^T}\Delta > 0 $$.

3. MAIN RESULT

The research aims to design a controller and dual-channel ETC protocol to achieve consensus of MASs under DoS attacks over switching topologies.

3.1. Controller design

Firstly, the follower's controller is designed as:

$$ \begin{equation} {u_i}(t) = \left\{ {\begin{array}{*{20}{l}} {K{\Gamma _i}(t), }&{t \in [t_k^i, t_{k + 1}^i) \subset \Xi_s ({t_0}, t)}, \\ {0, }&{t \in \Xi_a ({t_0}, t)} , \end{array}} \right. \end{equation} $$

$$ \begin{equation} \begin{array}{l} {\Gamma _i}(t) = \sum\limits_{{\rm{j}} = 1}^n {{a_{ij}}\left( {{{\hat x}_i}(t) - {{\hat x}_j}(t)} \right)} + {m_i}\left( {{{\hat x}_i}(t) - {x_0}(t)} \right), \end{array} \end{equation} $$

where $$ K $$ is a constant gain matrix; $$ \Xi_s ({t_0}, t) $$ is the period when the MASs without DoS attacks. In certain studies, the controller relied on the state value at the triggering instants. However, in this research, the controller employs an estimated value instead. The design of the estimator is outlined below:

$$ \begin{equation} \begin{array}{l} {\dot{\hat{x}}_{j}}(t) = A{{\hat x}_j}(t) + {\omega _j}B{u_j}(t), \quad t \in \left[ {t_k^j, t_{k + 1}^j} \right), \\{{\hat x}_j}\left( {t_k^j} \right) = {x_j}\left( {t_k^j} \right), \quad j = 1, 2, ...N. \end{array} \end{equation} $$

where $$ \omega_j>0 $$ is a constant; $$ \hat x_j $$ is the estimated state of $$ j $$th agent in $$ [t_k^j, t_{k + 1}^j) $$. When $$ t=t_k^j $$, there is $$ \hat x_j=x_j $$. The error variable $$ e_i(t) $$ of the $$ i $$th agent is

$$ \begin{equation} e_i(t)=\hat{x}_i(t)-x_i(t). \end{equation} $$

The time derivative of the error variable $$ e_i(t) $$ is

$$ \begin{equation} \dot{e}_{i}\left(t\right)=\dot{\hat{x}}_{i}\left(t\right)-\dot{x}_{i}\left(t\right)=Ae_{i}\left(t\right)-\left(1-\omega_{i}\right)BK\Gamma_{i}\left(t\right). \end{equation} $$

Consider a positive definite matrix $$ Q $$ that fulfills the given Riccati inequality

$$ \begin{equation} QA+A^TQ-2rQBB^TQ+rI_n<0, \end{equation} $$

where $$ r $$ is minimum eigenvalue of matrix $$ H $$. And matrix $$ K $$ is calculated by $$ K=B^TQ $$ in Equation (7). According to the tracking error $$ \psi_i(t)={x}_i(t)-{x}_0(t) $$. The time derivative of tracking error $$ \psi_i(t) $$ as

$$ \begin{equation} \dot{\psi}_{i}(t)=\dot{x}_i(t)-\dot{x}_0(t)=Ax_i(t)-Ax_0(t)+BK\Gamma_i(t). \end{equation} $$

Then we can obtain

$$ \begin{equation} \Gamma (t) = - (H \otimes {I_n})(\hat x(t) - {{\bf{1}}_N} \otimes {x_0}(t)) = - (H \otimes {I_n})(e(t) + \Psi (t)), \end{equation} $$

where $$ \Gamma (t)={(\Gamma _1^T(t), \Gamma _2^T(t), ..., \Gamma _N^T(t))^T} $$. Thus, Equation (13) can be rewritten in Kronecker forms as

$$ \begin{equation} \dot{\Psi}(t)=(I_N\otimes A)\Psi(t)-(H\otimes BK)\big(e(t)+\Psi(t)\big). \end{equation} $$

where $$ \Psi (t) = {(\Psi _1^T(t), \Psi _2^T(t), ..., \Psi _N^T(t))^T} $$, $$ e(t) = {(e_1^T(t), e_2^T(t), ..., e_N^{\text{T}}(t))^T} $$.

3.2. Dynamic event-triggered design

Considered a dynamic ETC protocol for agent $$ i $$ with a time-varying parameter threshold $$ {\theta _i}(t) $$

$$ \begin{equation} \begin{array}{l} t_1^i = 0, \hfill \\t_{k + 1}^i = \mathop {\inf }\limits_{l > t_k^i} \{ l:{\gamma _i}f\left( {{e_i}(t), {\Gamma _i}(t)} \right) \geqslant {\theta _i}(t), \forall t \in (t_k^i, l]\}, \hfill \\ \end{array} \end{equation} $$

where $$ f\left( {{e_i}(t), {\Gamma _i}(t)} \right) = (\frac{{{\varepsilon _2}}}{\tau } + {\varepsilon _3}){\left\| {{e_i}(t)} \right\|^2} - {\sigma _i}({\varepsilon _1} - \tau {\varepsilon _2}){\left\| {{\Gamma _i}(t)} \right\|^2} $$; $$ ({\varepsilon _1} - \tau {\varepsilon _2}) > 0 $$, $$ \tau > 0 $$, $$ \mathit{𝛾} _i > 0 $$ and $$ {\sigma _i} \in (0, 1] $$. Other parameters $$ {\varepsilon _1}, {\varepsilon _2}, {\varepsilon _3} $$ are as follows:

$$ \begin{equation} \begin{array}{l} {\varepsilon _1} = {r_1}{\mathit{λ} _{\min }}\left( {{H^{ - 2}}} \right) , \hfill \\ {\varepsilon _2} = {\mathit{λ} _{\max }}\left( {({I_N} \otimes 2QB{B^T}Q) - 2{r_1}({H^{ - 1}} \otimes {I_N})} \right) \hfill, \\ {\varepsilon _3} = {\mathit{λ} _{\max }}(H \otimes 2QB{B^T}Q) - {r_1}, \hfill \\ \end{array} \end{equation} $$

the constant $$ r_{1} > 0 $$ satisfies $$ 0<r_1<r $$ and $$ \varepsilon _2>0 $$, $$ \varepsilon _3>0 $$. $$ {\theta _i}(t) $$ is designed as:

$$ \begin{equation} {\dot \theta _i}(t) = - {\alpha _i}{\theta _i}(t) - f\left( {{e_i}(t), {\Gamma _i}(t)} \right), \end{equation} $$

where $$ {\alpha _i}>0 $$. $$ {\theta _i}(t) $$ represents a time-varying parameter that updates are contingent upon self-feedback, measurement discrepancies, neighbor errors, and leader errors. It is noteworthy that $$ {\theta _i}(t) $$ possesses a property crucial to the subsequent process of proving or deriving the conclusion, as outlined in

Lemma 3For predefined scalars $$ {\varepsilon _1}, {\varepsilon _2}, {\varepsilon _3}, {\alpha _i}, {\theta _i}(0) $$ we can obtain

$$ \begin{equation} \theta_i(t)>0, i=1, 2, ..., N. \end{equation} $$

Proof: Consider the system (14) with (16)(18), when $$ t \in \cup _{k = 1}^\infty (t_k^i, t_{k + 1}^i] = (0, \infty ) $$ there exists $$ {k^\prime } $$, $$ t \in (t_{{k^\prime }}^i, t_{{k^\prime } + 1}^i] $$. The following formula holds: when the required parameter is not satisfied, the inequality

$$ {\gamma _i}f\left( {{e_i}(t), {\Gamma _i}(t)} \right) < {\theta _i}(t), $$

applies. When $$ t=t_{k'+1}^i $$, one has

$$ {\dot \theta _i}(t) \geqslant - {\alpha _i}{\theta _i}(t) - \frac{1}{{{\gamma _i}}}{\theta _i}(t), $$

and thus,

$$ {\theta _i}(t) \geqslant {\theta _i}(t_k^i){e^{ - ({\alpha _i} + \frac{1}{{{\gamma _i}}})(t - t_k^i)}} > 0, t \in (t_{{k^\prime }}^i, t_{{k^\prime } + 1}^i], $$

from $$ t_1^i=0 $$, one has

$$ \begin{equation} \begin{array}{l} {\theta _i}(t) \ge {\theta _i}(t_k^i){e^{ - ({\alpha _i} + \frac{1}{{{\gamma _i}}})(t - t_k^i)}} \ge {\theta _i}(t_{k - 1}^i){e^{ - ({\alpha _i} + \frac{1}{{{\gamma _i}}})(t - t_{k - 1}^i)}} \\{\kern 20pt}\ge \cdots \ge {\theta _i}(0){e^{ - ({\alpha _i} + \frac{1}{{{\gamma _i}}})t}} > 0, t \in \left( {t_{{k^\prime }}^i, t_{{k^\prime } + 1}^i} \right]. \end{array} \end{equation} $$

It is detailed that $$ {\theta _i}(0)>0 $$. Thus, $$ {\theta _i}(t)>0 $$ holds for $$ [0, \infty ) $$.

Theorem 1Considering the MASs (3)(4), consensus among the MASs can be achieved if there exists

$$ \Im = {\mu _1} - \frac{{{\mu _1} + {\mu _2}}}{{{T^d}}} - \frac{{\ln ({\rho _1}{\rho _2})}}{{{T^f}}} > 0, $$

where $$ {\mu _1} = \min \left\{ {\frac{1}{N}\sum\limits_{i = 1}^N {{\alpha _i}} , {r_2}} \right\} $$, $$ {\mu _2}>0 $$ is a constant. $$ {\rho _1} = \frac{{{\mathit{λ} _{\max }}({I_N} \otimes Q)}}{{{\mathit{λ} _{\min }}({I_N} \otimes P)}} $$, and $$ \rho_{2}=\frac{\mathit{λ}_{\mathrm{max}}(I_{N}\otimes P)}{\mathit{λ}_{\mathrm{min}}(I_{N}\otimes Q)} $$, $$ PA+A^TP<\mu_2P $$ and $$ P>0 $$.

Proof: Consider the MASs (3)(4) and design the following Lyapunov function

$$ \begin{equation} \left.V\left(t\right)=\left\{ \begin{array}{c}V_{s}\left(t\right), t\in\Xi_{s}\left(t_{0}, t\right), \\V_{a}\left(t\right), t\in\Xi_{a}\left(t_{0}, t\right), \end{array}\right.\right. \end{equation} $$

when $$ t\in\Xi_{s} (t_{0}, t) $$, the system is free from attacks. During this period, design $$ V_s\left(t\right)=V_1\left(t\right)+V_2\left(t\right) $$ and

$$ \begin{equation} {V_1}\left( t \right) = {\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right), \end{equation} $$

$$ \begin{equation} V_2\left(t\right)=\sum\limits_{i=1}^N\theta_i\left(t\right). \end{equation} $$

The time derivative of $$ { V_1}\left( t \right) $$ is

$$ \begin{equation} { \begin{array}{l} {{\dot V}_1}\left( t \right) = 2{\Psi ^T}\left( t \right)({I_N} \otimes Q)\dot \Psi \left( t \right) \\{\kern 24pt}\le {\Psi ^T}\left( t \right)\left( {{I_N} \otimes \left( {QA + {A^T}Q} \right) - \left( {H \otimes 2QB{B^T}Q} \right)} \right)\Psi \left( t \right) \\{\kern 35pt} - {\Psi ^T}\left( t \right)\left( {H \otimes 2QB{B^T}Q} \right)e(t) \\{\kern 24pt}\le {\Psi ^T}\left( t \right)\left( {(r{I_N} - H) \otimes 2QB{B^T}Q} \right)\Psi \left( t \right) - {r}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right) \\{\kern 35pt} - {\Psi ^T}\left( t \right)\left( {H \otimes 2QB{B^T}Q} \right)e(t) \\{\kern 24pt}\le - {r}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right) - {e^T}(t)\left( {H \otimes 2QB{B^T}Q} \right)\Psi \left( t \right) \\{\kern 24pt}\le - ({r_1} + {r_2})({\Gamma ^T}(t)({H^{ - 2}} \otimes {Q})\Gamma (t) + 2{\Gamma ^T}(t)({H^{ - 1}} \otimes {Q})e(t) + {e^T}(t)\left( {{I_N} \otimes Q} \right)e(t)) \\{\kern 35pt} + {e^T}(t)\left( {H \otimes 2QB{B^T}Q} \right)\Gamma \left( t \right) + {e^T}(t)\left( {{I_N} \otimes 2QB{B^T}Q} \right)e\left( t \right) \\{\kern 24pt}\le - {r_1}{\Gamma ^T}(t)({H^{ - 2}} \otimes {Q})\Gamma (t) - {r_1}{e^T}(t)\left( {{I_N} \otimes Q} \right)e(t) - 2{r_1}{\Gamma ^T}(t)({H^{ - 1}} \otimes {Q})e(t) \\{\kern 35pt} + {e^T}(t)\left( {H \otimes 2QB{B^T}Q} \right)\Gamma \left( t \right) + {e^T}(t)\left( {{I_N} \otimes 2QB{B^T}Q} \right)e\left( t \right) \\{\kern 35pt} - {r_2}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right), \end{array}} \end{equation} $$

where $$ r = {r_1} + {r_2} $$. According to Young's inequality $$ pq \le \frac{1}{{2k}}{\left\| p \right\|^2} + \frac{k}{2}{\left\| q \right\|^2} $$, we can rewrite $$ {\dot V_1}\left( t \right) $$ that

$$ \begin{equation} { \begin{array}{l}{{\dot V}_1}\left( t \right) \le - {\varepsilon _1}{\left\| {\Gamma \left( t \right)} \right\|^2} + 2{\varepsilon _2}\left\| {e\left( t \right)} \right\|\left\| {\Gamma \left( t \right)} \right\| + {\varepsilon _3}{\left\| {e\left( t \right)} \right\|^2} - {r_2}{\Psi ^T}\left( t \right)\Psi \left( t \right) \\{\kern 23pt} \le - {\varepsilon _1}{\left\| {\Gamma \left( t \right)} \right\|^2} + 2{\varepsilon _2}\left( {\frac{1}{{2\tau }}{{\left\| {e\left( t \right)} \right\|}^2} + \frac{\tau }{2}{{\left\| {\Gamma \left( t \right)} \right\|}^2}} \right) + {\varepsilon _3}{\left\| {e\left( t \right)} \right\|^2} \\{\kern 34pt}- {r_2}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right) \\{\kern 23pt} \le - \sum\limits_{i = 1}^N {\left[ {\left( {{\varepsilon_1} - {\varepsilon_2}\tau } \right){{\left\| {{\eta _i}\left( t \right)} \right\|}^2}} \right.} - \left( {\frac{{{\varepsilon_2}}}{\tau } + 2{\varepsilon_3}} \right){\left\| {{e_i}\left( t \right)} \right\|^2}] \\{\kern 34pt}- {r_2}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right). \end{array}} \end{equation} $$

The time derivative of $$ {V_2}\left( t \right) $$ is

$$ \begin{equation} \begin{array}{l} {{\dot V}_2}\left( t \right) = \sum\limits_{i = 1}^N {{{\dot \theta }_i}} \left( t \right)\\ {\kern 24pt} = \sum\limits_{i = 1}^N {\left( { - {\alpha _i}{\theta _i}\left( t \right) - \left( {\frac{{{\varepsilon _2}}}{\tau } + {\varepsilon _3}} \right){{\left\| {{e_i}\left( t \right)} \right\|}^2}} \right.} + {\sigma _i}\left( {{\varepsilon _1} - {\varepsilon _2}\tau } \right){\left\| {{\Gamma _i}\left( t \right)} \right\|^2}). \end{array} \end{equation} $$

To sum up, we can obtain that

$$ \begin{equation} { \begin{array}{l} {{\dot V}_s}\left( t \right) = {{\dot V}_1}\left( t \right) + {{\dot V}_2}\left( t \right) \\{\kern 24pt} \le - \sum\limits_{i = 1}^N {\left[ {\left( {{\varepsilon _1} - {\varepsilon _2}\tau } \right){{\left\| {{\Gamma _i}\left( t \right)} \right\|}^2} - \left( {\frac{{{\varepsilon _2}}}{\tau } + {\varepsilon _3}} \right){{\left\| {{e_i}\left( t \right)} \right\|}^2}} \right]} \\{\kern 35pt} + \sum\limits_{i = 1}^N {\left( { - {\alpha _i}{\theta _i}\left( t \right) - \left( {\frac{{{\varepsilon _2}}}{\tau } + {\varepsilon _3}} \right){{\left\| {{e_i}\left( t \right)} \right\|}^2}} \right.} \\{\kern 35pt} + {\sigma _i}\left( {{\varepsilon _1} - {\varepsilon _2}\tau } \right){\left\| {{\Gamma _i}\left( t \right)} \right\|^2}) - {r _2}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right) \\{\kern 24pt} \le \sum\limits_{i = 1}^N {\left( { - {\alpha _i}{\theta _i}\left( t \right) + \left( {{\sigma _i} - 1} \right)\left( {{\varepsilon _1} - {\varepsilon _2}\tau } \right){{\left\| {{\Gamma _i}\left( t \right)} \right\|}^2}} \right)} - {r_2}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right) \\{\kern 24pt} \le - {\mu _1}{V_s}\left( t \right). \end{array}} \end{equation} $$

For $$ t\in\Xi_{a}\left(t_{0}, t\right) $$, there exist DoS attacks among the agents’ communication. We choose the following Lyapunov function

$$ \begin{equation} V_a\left(t\right)=\Psi^T\left(t\right)\left(I_N\otimes P\right)\Psi\left(t\right), \end{equation} $$

and its derivative is

$$ \begin{equation} \begin{aligned} \dot{V}_{a}\left(t\right)& =2\Psi^{T}\left(t\right)\left(I_{N}\otimes P\right)\left(I_{N}\otimes A\right)\Psi\left(t\right) \\ &=\Psi^T\left(t\right)(I_N\otimes(PA+A^TP))\Psi\left(t\right) \\ &\leq\mu_2V_a\left(t\right). \end{aligned} \end{equation} $$

From (27) and (29), we obtain

$$ \begin{equation} \left.V\left(t\right)\leq\left\{\begin{array}{l} e^{-\mu_1\left(t-t_{2\left(l-1\right)}\right)}V\left(t_{2\left(l-1\right)}\right), t\in\left[t_{2\left(l-1\right)}, t_{2l-1}\right), \\e^{\mu_2\left(t-t_{2l-1}\right)}V\left(t_{2l-1}\right), t\in\left[t_{2l-1}, t_{2l}\right).\end{array}\right.\right. \end{equation} $$

We can calculate that $$ {\mu_1}{\mu_2}>1 $$. For $$ t \in \left[ {{t_{2\left( {l - 1} \right)}}, {t_{2l - 1}}} \right) $$, it has

$$ \begin{equation} \begin{aligned} V\left(t\right)& \leq e^{-\mu_{1}\left(t-t_{2(l-1)}\right)}V\left(t_{2(l-1)}\right) \\ &\leq\rho_1e^{-\mu_1\left(t-t_{2(l-1)}\right)}V\left(t_{2(l-1)}^-\right) \\ &\leq\rho_{1}e^{-\mu_{1}\left(t-t_{2(l-1)}\right)}e^{\mu_{2}\left(t_{2(l-1)}-t_{2l-3}\right)}V\left(t_{2l-3}\right) \\ &\leq\cdots \\ &\leq{\rho_{1}}^{N(t_{0}, t)}{\rho_{2}}^{N(t_{0}, t)}e^{\mu_{2}\Xi_{a}(t_{0}, t)} \\ &{\kern 11pt}\times e^{-\mu_{1}(t-t_{0}-\Xi_{a}(t_{0}, t))}V\left(t_{0}\right). \end{aligned} \end{equation} $$

Under Assumptions 1-2, there is

$$ \begin{equation} (\rho_1\rho_2)^{N(t_0, t)}\leq(\rho_1\rho_2)^{N_1}e^{\frac{\ln(\rho_1\rho_2)}{T^f}(t-t_0)}, \end{equation} $$

and

$$ \begin{equation} \begin{aligned} &e^{\mu_{2}\Xi_{a}(t_{0}, t)}e^{-\mu_{1}(t-t_{0}-\Xi_{a}(t_{0}, t))} \leq e^{\mu_{2}(N_{2}+\frac{t-t_{0}}{T^{d}})}e^{-\mu_{1}(t-t_{0})}e^{\mu_{1}(N_{2}+\frac{t-t_{0}}{T^{d}})} \\ &{\kern 121pt} \leq e^{(\mu_1+\mu_2)N_2}e^{\frac{\mu_1+\mu_2}{T^d}(t-t_0)}e^{-\mu_1(t-t_0)}. \end{aligned} \end{equation} $$

The (31) can be scaled to

$$ \begin{equation} \begin{aligned} V\left(t\right)& \leq(\rho_1\rho_2)^{N_1}e^{\frac{\ln(\rho_1\rho_2)}{T^f}(t-t_0)} \times e^{(\mu_{1}+\mu_{2})N_{2}}e^{\frac{\mu_{1}+\mu_{2}}{T^{d}}(t-t_{0})}e^{-\mu_{1}(t-t_{0})}V (t_{0}) \\ &\leq(\rho_1\rho_2)^{N_1}e^{(\mu_1+\mu_2)N_2}\times e^{(\frac{\ln(\rho_{1}\rho_{2})}{T^{f}}+\frac{\mu_{1}+\mu_{2}}{T^{d}}-\mu_{1})(t-t_{0})}V\left(t_{0}\right). \end{aligned} \end{equation} $$

Therefore, as $$ t \in \left[ {{t_{2\left( {l - 1} \right)}}, {t_{2l - 1}}} \right) $$, we can obtain $$ V\left( t \right) \le {\varsigma _1}{e^{ - \beta \left( {t - {t_0}} \right)}}V\left( {{t_0}} \right) $$ where $$ \varsigma_1=(\rho_1\rho_2)^{N_1}e^{(\mu_1+\mu_2)N_2}. $$ And as $$ t \in \left[ {{t_{2\left( {l - 1} \right)}}, {t_{2l - 1}}} \right) $$, it has $$ V\left(t\right)\leq\varsigma_{2}e^{-\beta\left(t-t_{0}\right)}V\left(t_{0}\right) $$ as above, where $$ \varsigma_2={\rho_1}^{N(t_0, t)-1}\rho_2^{N(t_0, t)}e^{(\mu_1+\mu_2)N_2} $$. By analyzing the above two situations, we can obtain

$$ \begin{equation} V\left(t\right)\leq\varsigma e^{-\beta\left(t-t_0\right)}V\left(t_0\right), \end{equation} $$

where $$ \varsigma=\max{\{\varsigma_1, \varsigma_2\}}. $$ Similar to Theorem 1, the consensus of MASs was realized.

3.3. Zeno behavior analysis

In this chapter, we will analyze and confirm that Zeno behavior is excluded in the systems under two specific scenarios. There exists inequality

$$ \begin{equation} \begin{aligned} D^{+}\|e_{i}(t)\|& \leq\|\dot{x}_{i}(t)\|+\|\dot{\hat{x}}_{i}(t)\| \\ &\leq\left\|Ax_i(t)\right\|+\left\|(1+\omega_i)Bu_i(t)\right\|+\left\|A\hat{x}_i(t)\right\| \\ &=\|A\|\|e_i(t)\|+{Z}_k^i, \end{aligned} \end{equation} $$

where $$ Z_{_k}^{i}=2\|\dot{\hat{x}}_{i}(t)\|+\|(1+\omega_{i})Bu_{i}(t)\| $$. The proof that follows will be presented in two scenarios.

1. If $$ \|A\|\neq0 $$, from Equation (36), one can get

$$ \begin{equation} \|e_i(t)\|\leq\frac{Z_{_k}^{i}}{\|A\|}\Big(e^{\|A\|(t-t_k^i)}-1\Big). \end{equation} $$

For the designed ETC protocol, the triggering instants $$ t_{k+1}^i $$ satisfies

$$ \begin{equation} (\frac{{{\varepsilon _2}}}{\tau } + {\varepsilon _3})\parallel {e^T}_i(t){\parallel ^2} \ge {\sigma _i}({\varepsilon _1} - \tau {\varepsilon _2})\parallel {\Gamma _i}^T(t_{k + 1}^i){\parallel ^2} + \frac{{{\theta _i}(0)}}{{{\gamma _i}}}{e^{ - ({\alpha _i} + \frac{1}{{{\gamma _i}}})t_{k + 1}^i}}. \end{equation} $$

Then,

$$ \begin{equation} t_{k + 1}^i - t_k^i \ge \frac{1}{{\parallel A\parallel }}\ln \left( \begin{array}{l} 1 + \frac{{\parallel A\parallel }}{{\sqrt {(\frac{{{\varepsilon _2}}}{\tau } + {\varepsilon _3})} Z_k^i}}\\ \times \sqrt {{\sigma _i}({\varepsilon _1} - \tau {\varepsilon _2}){{\left\| {\Gamma _i^T(t_{k + 1}^i)} \right\|}^2}\frac{{{\theta _i}(0)}}{{{\gamma _i}}}{e^{ - ({\alpha _i} + \frac{1}{{{\gamma _i}}})t_{k + 1}^i}}} \end{array} \right). \end{equation} $$

Subsequently, we employ proof by contradiction to demonstrate that Zeno behavior does not occur. First, we suppose that the Zeno behavior of agent $$ i $$ will occur, indicating that $$ \sum_{k=0}^{\infty}\Delta_{k}^{i} $$ must converge, where $$ \Delta_{k}^{i}=t_{k+1}^{i}-t_{k}^{i} $$ is a positive sequence, and then $$ \lim_{m\to\infty}\sum_{k=0}^{m}\Delta_{k}^{i}=\lim_{k\to\infty}t_{k+1}^{i}-t_{0}=\infty $$, which is divergent. Thus, Zeno behavior does not occur.

2.if $$ \|A\|=0 $$, then $$ \left\|e^T_i(t)\right\|\leq Z_{_k}^{i}(t-t_k^i) $$ The proof process for this case is analogous to the first cases and therefore will not be reiterated here. It can be seen that the Zeno behavior of agent $$ i $$ will be excluded from the above two situations. If the MASs are subjected to DoS attacks, $$ {u_i}(t) = 0 $$; the Zeno behavior of the agent $$ i $$ also will not occur.

3.4. Dual-channel event-triggered consensus

In this part, based on the idea of dual channels, the ETC protocol between the controller and actuator channel with the communication channel is designed to save resources. The Zeno behavior in the controller and actuator channel can be eliminated by introducing the exponential parameter, and the ETC protocol in the controller and actuator channel can still work stably when the input signal is very small. In addition, the ETC protocol in the controller and actuator channel is designed before the communication channel, and it is designed to depend only on the input signal and does not require neighbor information. First, an equivalent controller $$ {\tilde u_i}\left( t \right) $$ is designed as

$$ \begin{equation} {\tilde u_i}\left( t \right) = \left\{ {\begin{array}{*{20}{l}} {{u_i}\left( {{t_k}} \right), }&{t \in \Xi_s ({t_0}, t)}, \\{0, }&{t \in \Xi_a ({t_0}, t)}. \end{array}} \right. \end{equation} $$

For $$ t \in \Xi_s ({t_0}, t) $$, the controller update time depends on the following ETC protocol

$$ \begin{equation} \begin{array}{l} {{\tilde u}_i}\left( t \right) = {u_i}\left( {t_k^i} \right), \forall t \in [t_k^i, t_{k + 1}^i), \\t_{k + 1}^i = \mathop {\inf }\limits_{l > t_k^i} {\kern 1pt} \left\{ {l:\left| \wp _i^u\left( t \right) \right| - {z_i}\left| {{{\tilde u}_i}\left( t \right)} \right| \ge {e^{ - {\upsilon _i}t}}, \forall t \in \left( {t_k^i, l} \right]} \right\}, \end{array} \end{equation} $$

where $$ \wp _i^u\left( t \right) = {{u_i}\left( t \right) - {{\tilde u}_i}\left( t \right)} $$, $$ 0 < {{\text{z}}_i} < 1 $$ and $$ {\upsilon _i} > 0 $$. Then, there exist $$ |\tilde{\alpha}_i(t)|\leq1 $$ and $$ |\tilde{\beta}_{i}(t)|\leq1 $$. Thus, we have

$$ \begin{equation} {\tilde u_i}\left( t \right) = \frac{{{u_i}\left( t \right) - {{\tilde \beta }_i}\left( t \right){e^{ - {\upsilon _i}t}}}}{{1 + {{\tilde \alpha }_i}\left( t \right){z_i}}}. \end{equation} $$

In that case, the tracking error $$ \psi_i(t) $$ is

$$ \begin{equation} {\dot \psi _i}(t) = A{\psi _i}(t) + {\hat \alpha _i}\left( t \right)BK{\hat \Gamma _i}(t) - {\hat \beta _i}\left( t \right)B, \end{equation} $$

where $$ {\hat \alpha _i}\left( t \right) = \frac{1}{{1 + {{\tilde \alpha }_i}\left( t \right){z_i}}} $$, $$ {\hat \beta _i}\left( t \right) = \frac{{{{\tilde \beta }_i}\left( t \right){e^{ - {\upsilon_i}t}}}}{{1 + {{\tilde \alpha }_i}\left( t \right){z_i}}} $$ and $$ {\hat \alpha _i}\left( t \right) < \frac{1}{{1 - {z_i}}} = {\bar \alpha _i} $$, $$ {\hat \beta _i}\left( t \right) \leqslant \frac{1}{{1 - {z_i}}}{e^{ - {\upsilon _i}t}} = \bar \beta {e^{ - {\upsilon _i}t}} $$. The tracking error $$ \psi $$ is written in the form as

$$ \begin{equation} \dot \Psi (t) = \left( {{I_N} \otimes A} \right)\Psi (t) + \left( {\hat \alpha \left( t \right)H \otimes B\hat K} \right)\left( {\Psi (t) + e(t)} \right) - \hat \beta \left( t \right) \otimes B, \end{equation} $$

where $$ \hat \alpha \left( t \right) = diag\left\{ {{{\hat \alpha }_1}\left( t \right), {{\hat \alpha }_2}\left( t \right), \ldots , {{\hat \alpha }_N}\left( t \right)} \right\} $$ and $$ \hat \beta \left( t \right) = {({\hat \beta _1}\left( t \right), {\hat \beta _2}\left( t \right), \ldots , {\hat \beta _N}\left( t \right))^T} $$. In the context of Equation (40), the following ETC protocol can be obtained

$$ \begin{equation} \begin{array}{l} t_1^i = 0, \hfill \\ t_{k + 1}^i = \mathop {\inf }\limits_{l > t_k^i} {\kern 1pt} \{ l:{{\hat \gamma }_i}\hat f\left( {{e_i}(t), {{\hat \Gamma }_i}(t)} \right) \geqslant {{\hat \theta }_i}(t), \forall t \in (t_k^i, l]\} \hfill, \\ \end{array} \end{equation} $$

where $$ \hat f\left( {{e_i}(t), {{\hat \Gamma }_i}(t)} \right) = \left( {\frac{{({{\hat \varepsilon }_2} + {\delta _1})}}{{{k_1}}} + {{\hat \varepsilon }_3}} \right){\left\| {{\Gamma _i}(t)} \right\|^2} - {{\hat \sigma }_i}({{\hat \varepsilon }_1} - {k_2}{{\hat \varepsilon }_4} - {k_1}({{\hat \varepsilon }_2} + {\delta _1})){\left\| {{{\hat \Gamma }_i}(t)} \right\|^2} + {\delta _3}{e^{ - 2{\upsilon_i}t}} $$, $$ {{\hat \sigma }_i}({{\hat \varepsilon }_1} - {k_2}{{\hat \varepsilon }_4} - {k_1}({{\hat \varepsilon }_2} + {\delta _1})) >0 $$ with $$ {k_1}, {k_2} > 0 $$, $$ {\hat \sigma _i} \in (0, 1] $$. Other parameters are designed as follows:

$$ \begin{equation} { \begin{aligned} & \hat{\varepsilon}_1=\bar{\mathit{λ}}_{\min}\left(\tilde{H}\Delta\tilde{H}^{T}\otimes P\right), \\ & \hat{\varepsilon}_2=\bar{\mathit{λ}}_{\max}\left(\tilde{H}\Delta\otimes P-\delta_2k_2\tilde{H}\otimes I_{n}\right), \\ & \hat{\varepsilon}_3=\overline{\mathit{λ}}_{\max}\left((\Delta\overline{\hat{\alpha}}H+H^{T}\overline{\hat{\alpha}}\Delta)\otimes\hat{W}+\delta_2k_2I_{N}\otimes I_{n}-\Delta\otimes P\right), \\ & \hat{\varepsilon}_4=\bar{\mathit{λ}}_{\max}\left(\delta_2\tilde{H}\tilde{H}^{T}\otimes I_{n}\right), \\ & \delta_{_1}=\overline{\mathit{λ}}_{\max}\left(\tilde{H}\Delta\overline{\hat{\alpha}}H\otimes\hat{W}\right), \\ & \delta_2=\bar{\mathit{λ}}_{\max}\left(\Delta\otimes P\right), \\ & \delta_3=\frac{\delta_{2}}{k_{2}}\left(\overline{\beta}\left\|B\right\|\right)^2, \end{aligned}} \end{equation} $$

where $$ \hat W = PB{B^T}P $$, $$ \dot{\hat{\theta}}_{i}(t)=-\widehat{\alpha}_{i}\hat{\theta}_{i}(t)-\hat{f}\left(e_{i}(t), \hat{\Gamma}_{i}(t)\right) $$, $$ \widehat{\alpha}_{i}>0 $$ and $$ \hat{\theta}_i(0)>0 $$.

Remark 3Dual-channel ETC ensures system stability by triggering actions only when necessary and adjusting parameters based on communication topology and agent dynamics to achieve system security consensus. Dual-channel ETC enhances the efficiency of the system by separating communication and control channels, reducing unnecessary communication. It also offers flexible triggering mechanisms, optimizing resource utilization and boosting overall system performance. Thus, while the dual-channel triggering protocol designed here is similar to the triggering form of the existing work, the design idea is different and from a practical point of view, the approach in this section is simpler and does not require additional wiring.

Remark 4In order to avoid continuous communication and further save communication resources, an estimator is introduced in this chapter. However, the use of the estimator leads to the inability to exclude Zeno behavior. A common approach is to use a constant trigger threshold to exclude Zeno behavior. However, this design will make $$ {\tilde u_i}\left( t \right) $$ can not reach $$ {u_i}(t) $$. Inspired by the references[26, 27], an exponential threshold $$ e^{ - {\upsilon _i}t} $$ is designed to solve problems caused by the estimator in this section. The designed controller update protocol still works properly when the input signal is extremely small.

Theorem 2Considering MASs (3)(4), with the control protocol (45), consensus among the MASs can be achieved if there exist

$$ \begin{equation} \hat{\Im }=\hat{\mu}_1-\frac{\hat{\mu}_1+\hat{\mu}_2}{T^d}-\frac{\ln\left(\hat{\rho}_1\hat{\rho}_2\right)}{T^f}>0. \end{equation} $$

Proof: for $$ t\in\Xi_s ({t_0}, t) $$, choose $$ \hat{V}_s(t)=\hat{V}_1(t)+\hat{V}_2(t) $$, and we have

$$ \begin{equation} \begin{aligned} & \hat V_1(t)=e^{T}(t)\left(\Delta\otimes P\right)e(t), \\ &\hat V_2(t)=\sum\limits_{i=1}^{N}\theta_{i}(t).\end{aligned} \end{equation} $$

Then, applying (48), $$ \hat{V}_{1}(t) $$ designed as

$$ \begin{equation} \begin{aligned}\dot{\hat{V}}_{1}(t)&=2\Psi^{T}(t)\left(\Delta\otimes P\right)\dot{\Psi}(t)\\&=\Psi^{T}(t)(\Delta\otimes(A^{T}P+PA)+(\Delta\hat{\alpha}\left(t\right)H+H^{T}\hat{\alpha}\left(t\right)\Delta)\otimes PB\hat{K})\Psi(t)\\&{\kern 10pt}+2\Psi^T(t)\left(\Delta\hat{\alpha}\left(t\right)H\otimes PB\hat{K}\right)e(t)-2\Psi^T(t)\left(\Delta\otimes P\right)\left(\hat{\beta}\left(t\right)\otimes B\right), \end{aligned} \end{equation} $$

where $$ \hat{K}=-B^TP $$. The time derivative of $$ {\hat V_1}\left( t \right) $$ is

$$ \begin{equation} \begin{aligned}\dot{\hat{V}}_{1}(t)&\leq-\Psi^{T}(t)\left(\Delta\otimes P\right)\Psi(t)-2\Psi^{T}(t)\left(\Delta\hat{\alpha}\left(t\right)H\otimes\hat{W}\right)e(t)-2\Psi^{T}(t)\left(\Delta\otimes P\right)\left(\hat{\beta}\left(t\right)\otimes B\right)\\&\leq-\Psi^{T}(t)\left(\Delta\otimes P\right)\Psi(t)-\Psi^{T}(t)\left(\Delta\otimes P\right)\Psi(t)-2\hat{\Gamma}^{T}(t)\left(\tilde{H}\Delta\hat{\alpha}\left(t\right)H\otimes\hat{W}\right)e(t)\\&{\kern10pt}+2e^T(t)\left(\Delta\hat{\alpha}\left(t\right)H\otimes\hat{W}\right)e(t)-2\Psi^T(t)\left(\Delta\otimes P\right)\left(\hat{\beta}\left(t\right)\otimes B\right).\end{aligned} \end{equation} $$

From

$$ \begin{equation} { \begin{aligned}-\hat{\Gamma}^{T}(t)\left(\tilde{H}\Delta\hat{\alpha}\left(t\right)H\otimes\hat{W}\right)e(t)&\leq\left\|\hat{\Gamma}^{T}(t)\left(\tilde{H}\Delta\hat{\alpha}\left(t\right)H\otimes\hat{W}\right)e(t)\right\| \\&\leq\left\|\hat{\Gamma}^{T}(t)\right\|\left\|\tilde{H}\Delta\bar{\hat{\alpha}}H\right.\left.\otimes\hat{W}\right\|\left\|e(t)\right\| \\&\leq\delta_{_1}\left\|\hat{\Gamma}(t)\right\|\|e(t)\|, \end{aligned}} \end{equation} $$

$$ \begin{equation} \begin{aligned}-2\Psi^T(t)\left(\Delta\otimes P\right)\left(\hat{\beta}\left(t\right)\otimes B\right)&\leq2\delta_{2}\left\|\Psi^{T}(t)\right\|\left\|\hat{\beta}\left(t\right)\otimes B\right\|\\&\leq2\delta_{2}\left(\frac{k_{2}}{2}\|\Psi(t)\|^{2}+\frac{1}{2k_{2}}\|\hat{\beta}\left(t\right)\otimes B\|^{2}\right)\\&\leq\delta_{2}k_{2}\left\|\Psi(t)\right\|^{2}+\delta_{3}\sum\limits_{i=1}^{N}e^{-2\upsilon_{i}t}, \end{aligned} \end{equation} $$

we obtain

$$ \begin{equation} \begin{aligned}\dot{\hat{V}}_{1}(t)&\leq-\Psi^{T}(t)\left(\Delta\otimes P\right)\Psi(t)+e^{T}(t)\left((\Delta\overline{\hat{\alpha}}H+H^{T}\overline{\hat{\alpha}}\Delta)\otimes\hat{W}\right)e(t)+2\delta_{1}\|\hat{\Gamma}(t)\|e(t)\|\\&{\kern10pt}+\delta_2k_2e^T(t)e(t)+\delta_2k_2\hat{\Gamma}^T(t)\left(\tilde{H}\tilde{H}^T\otimes I_n\right)\hat{\Gamma}(t)-2\delta_2k_2\hat{\Gamma}^T(t)\left(\tilde{H}\otimes I_n\right)e(t)+\delta_3\sum\limits_{i=1}^Ne^{-2\upsilon_it} \\&\leq-\hat{\Gamma}^{T}(t)\left(\tilde{H}\Delta\tilde{H}^{T}\otimes P\right)\hat{\Gamma}(t)-e^{T}(t)\left(\Delta\otimes P\right)e(t)\\&{\kern10pt}+2\hat{\Gamma}^T(t)\left(\tilde{H}\Delta\otimes P\right)e(t)+2\delta_{1}\left\|\hat{\Gamma}(t)\right\|\left\|e(t)\right\|+e^{T}(t)\left((\Delta\overline{\hat{\alpha}}H+H^{T}\overline{\hat{\alpha}}\Delta)\otimes\hat{W}\right)e(t)\\&{\kern10pt}+\delta_{2}k_{2}\hat{\Gamma}^{T}(t)\left(\tilde{H}\tilde{H}^{T}\otimes I_{n}\right)\hat{\Gamma}(t)+\delta_{3}\sum\limits_{i=1}^{N}e^{-2\upsilon_{i}t}-2\delta_2k_2\hat{\Gamma}^T(t)\left(\tilde{H}\otimes I_n\right)e(t)+\delta_2k_2e^T(t)e(t) \\&\leq(-\hat{\varepsilon}_{1}+k_{2}\hat{\varepsilon}_{4})\left\|\hat{\Gamma}(t)\right\|^{2}+2(\hat{\varepsilon}_{2}+\delta_{1})\left\|\hat{\Gamma}(t)\right\|\left\|e(t)\right\|+\hat{\varepsilon}_{3}\left\|e(t)\right\|^{2}+\delta_{3}\sum e^{-2\upsilon_{i}t}-\Psi^{T}(t)\left(\Delta\otimes P\right)\Psi(t).\end{aligned} \end{equation} $$

Applying Young's inequality, we get

$$ \begin{equation} \begin{gathered} {\kern32pt} \dot{\hat{V}}_{1}(t)\leq(-\hat{\varepsilon}_{1}+k_{2}\hat{\varepsilon}_{4})\left\|\hat{\Gamma}(t)\right\|^{2}+k_{1}(\hat{\varepsilon}_{2}+\delta_{1})\left\|\hat{\Gamma}(t)\right\|^{2}+\frac{(\hat{\varepsilon}_{2}+\delta_{1})}{k_{1}}\left\|e(t)\right\|^{2}+\hat{\varepsilon}_{3}\left\|e(t)\right\|^{2}+\delta_{3}\sum\limits_{i=1}^{N}e^{-2\upsilon_i t} \\\leq\left(-\hat{\varepsilon}_1+k_2\hat{\varepsilon}_4+k_1(\hat{\varepsilon}_2+\delta_1)\right)\left\|\hat{\Gamma}(t)\right\|^2+\left(\frac{(\hat{\varepsilon}_2+\delta_1)}{k_1}+\hat{\varepsilon}_3\right)\left\|e(t)\right\|^2+\delta_3\sum\limits_{i=1}^Ne^{-2\upsilon_i t} \\{\kern10pt}\leq\sum\limits_{i=1}^{N}\left(\left(-\hat{\varepsilon}_{1}+k_{2}\hat{\varepsilon}_{4}+k_{1}(\hat{\varepsilon}_{2}+\delta_{1})\right)\|\hat{\Gamma}_{i}(t)\|^{2}+(\frac{(\hat{\varepsilon}_{2}+\delta_{1})}{k_{1}}+\hat{\varepsilon}_{3})\|e_{i}(t)\|^{2}+\delta_{3}e^{-2\upsilon_i t}\right).\end{gathered} \end{equation} $$

Applying the derivatives of $$ \hat{V}_2(t) $$, then

$$ \begin{equation} \begin{aligned}\hat{V}_{s}(t)&=\dot{\hat{V}}_{1}(t)+\dot{\hat{V}}_{2}(t)\\&\leq-\sum\limits_{i=1}^{N}\widehat{\alpha}_{i}\hat{\theta}_{i}(t)-\sum\limits_{i=1}^{N}\left((1-\hat{\sigma}_{i})(\hat{\varepsilon}_{1}-k_{2}\hat{\varepsilon}_{4}-k_{1}(\hat{\varepsilon}_{2}+\delta_{1}))\left\|\hat{\Gamma}_{i}(t)\right\|^{2}\right)\\&\leq-\hat{\mu}_{1}\hat{V}_{s}(t).\end{aligned} \end{equation} $$

The subsequent process of proving the consensus is similar to Theorem 1 and is not given to avoid redundancy. Next, Zeno behavior exclusion is divided into two categories: the actuator channel and the communication channel. 1. For the controller–actuator channel, we have

$$ \begin{equation} \left| {\wp _i^u\left( t \right)} \right| \le {z_i}\left| {{{\tilde u}_i}\left( t \right)} \right| + {e^{ - {\upsilon_i}t}}, \end{equation} $$

where $$ \wp _i^u\left( t \right) = {u_i}\left( t \right) - {\tilde u_i}\left( t \right) $$ then we have

$$ \begin{equation} \begin{aligned}\frac{d}{dt}|\wp _i^u\left(t\right)|&=\frac{d}{dt}(\wp _i^u(t)\cdot \wp _i^u(t))^{\frac{1}{2}}\\&=sgn(\wp _i^u)\dot\wp _i^u\\&\leq\left|\dot{u}_i(t)\right|.\end{aligned} \end{equation} $$

Considering the event-triggered interval $$ [t_k^i, t_{k+1}^i), $$ there exist $$ |\wp _i^u(t_k)|=0 $$ and $$ \lim_{t\to t_{k+1}}|\wp _i^u(t)|=\nu_{i}|\tilde{u}_{i}(t)|+e^{-\upsilon{i}t} $$; then, we can obtain

$$ \begin{equation} t_{k+1}^{i}-t_{k}^{i}\geq\left(z_{i}|\tilde{u}_{i}(t)|+e^{-\upsilon_{i}t}\right)/\vartheta. \end{equation} $$

If Zeno behavior exists, it means infinite triggers within a limited time $$ T_{c} $$, i.e., $$ \sum_{k=0}^\infty\Delta_k^i=T_c, $$ where $$ \Delta_k^i=t_{k+1}^i-t_k^i $$. Then, we have $$ \sum_{k=0}^{\infty}\Delta_{k}^{i}=\lim_{k\to\infty}t_{k+1}^{i}-t_{0}^{i}=T_{c} $$, indicating $$ \lim_{k\to\infty}t_{k+1}^i=T_c $$. Thus, we have $$ \sum_{k=0}^\infty\Delta_k^i=\infty $$ and $$ \lim_{k\to\infty}t_{k+1}^i=\infty $$. This contradicts $$ \operatorname*{lim}_{k\to\infty}t_{k+1}^{i}=T_{c} $$; thus, Zeno behavior will not occur. For dynamic ETC protocol in the communication channel, similar to chapter 3.4., Zeno behavior can be excluded. This proof is finished.

4. NUMERICAL SIMULATION

The matrix parameters are designed as

$$ A=\begin{pmatrix}-2&&1&&-1\\0&&-1&&0\\1&&1&&0\end{pmatrix}, \quad B=\begin{pmatrix}0&&-1\\1&&0\\0&&1\end{pmatrix}. $$

The adjacency matrices $$ L $$ and $$ M $$ are replaced by $$ L_1, L_2, L_3 $$ and $$ M_1, M_2, M_3 $$. The matrices $$ K $$ and $$ Q $$ can also be calculated by

$$ K = {\left( {\begin{array}{*{20}{c}} {0.3940}&{0.4082}\\ {0.9093}&{0.3940}\\ {0.4288}&{0.2227} \end{array}} \right)^T}, \quad Q = \left( {\begin{array}{*{20}{c}} {0.4082}&{0.3940}&{0.2227}\\ {0.3940}&{0.9093}&{0.4288}\\ {0.2227}&{0.4288}&{0.6308} \end{array}} \right). $$

Choose $$ {\omega _i}{\text{ = 0}}{\text{.1}} $$, $$ {\theta _1}(0) = 90 $$, $$ {\theta _2}(0) = 92 $$, $$ {\theta _3}(0) = 70 $$, $$ {\theta _4}(0) = 62 $$, $$ {\theta _5}(0) = 93 $$. Set $$ {x_0} = {\left[ {3, - 1, 2} \right]^T} $$, $$ {x_1}\; =\; {\left[ {2.4, 2.3, 0.2} \right]^T} $$, $$ {x_2} = {\left[ { - 3.2, 1, 1.7} \right]^T} $$, $$ {x_3} = {\left[ {2, - 3, 1.5} \right]^T} $$, $$ {x_4} = {\left[ { - 1.5, - 0.5, - 2.8} \right]^T} $$, $$ {x_5} = {\left[ {1.1, 1, - 2.2} \right]^T} $$. The communication structure of the MASs will switch randomly among the three scenarios depicted in Figure 1. Figure 2 illustrates the state difference between each follower and the leader. From Figure 2, we can observe that the state errors between followers and leaders all converge to zero within six seconds. The state trajectories of the leader and followers are displayed in Figure 3, clearly showing that each agent can follow the leader. From Figure 2 and Figure 3, we can deduce that the MASs achieve leader-following consensus in finite time. Figure 4 presents the triggering times of five agents. As the state errors between followers and leader converge to zero, the increase of triggering times of followers slows down. Lastly, Figure 5 shows the network topology of the MASs.

Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies

Figure 1. Network topology of MASs.

Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies

2. State error of MASs.

Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies

3. State trajectory of agents.

Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies

4. Triggering times of followers.

Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies

5. Current topology of MASs.

5. CONCLUSIONS

This paper focuses on the consensus problem of MASs. Considering a MAS with a leader and $$ N $$ followers, a distributed controller is designed. To avoid continuous communication, an estimator is used to estimate the state of agents during the trigger interval so that the estimated state is used instead of the actual state to achieve the goal of intermittent communication. In order to further save communication resources, a dual-channel ETC is designed for the controller-actuator channel and communication channel, respectively. The continuous validity of the ETC protocol is ensured by introducing an exponential triggering threshold in the controller-actuator channel. Finally, it is verified through simulation that consensus control can be achieved while effectively saving controller resources and communication resources. Furthermore, applying our findings to address security control challenges in mobile robot systems under DoS attacks represents a crucial research direction. This study will facilitate future research efforts on the consensus of heterogeneous MASs, the implementation of security controls against hybrid cyber attacks, and the development of self-triggered protocols.

DECLARATIONS

Acknowledgments

We would like to express our great appreciation to the editors and reviewers.

Authors’ contributions

Conceptualization, methodology, numerical simulations, writing: Li, W.; Chen, X.

Formal analysis, review, editing: Chen, X.; Cheng, L.; Ma, J.; Zhao, F.

All authors have read and agreed to the published version of the manuscript.

Availability of data and materials

The authors generated all data and materials used in the research as an integral part of the study, with explicit details provided in the methodology section of the manuscript. These are available from the corresponding author upon reasonable request.

Financial support and sponsorship

This research was supported in part by the National Natural Science Foundation of China under Grants 62173175, 62406132 and 61877033, and in part by the Natural Science Foundation of Shandong Province under Grants ZR2024MF032 and ZR2024QF039.

Conflicts of interest

Chen, X. is the Guest Editor of the Special Issue of “Adaptive Event-Triggered Control and Optimization for Complex Systems”. He is not involved in any steps of editorial processing, notably including reviewer selection, manuscript handling, or decision-making, while the other authors have declared that they have no conflicts of interest.

Ethical approval and consent to participate

Not applicable.

Consent for publication

Not applicable.

Copyright

© The Author(s) 2025.

REFERENCES

1. Cheng W., Zhang K., Jiang B., Ding S. X. Fixed-time fault-tolerant formation control for heterogeneous multi-agent systems with parameter uncertainties and disturbances. IEEE Trans. Circuits Syst. Ⅰ Regul. Pap. 2021;68:2121-33.

2. Wang C., Chen X., Cao J., Qiu J., Liu Y., Luo Y. Neural network-based distributed adaptive pre-assigned finite-time consensus of multiple TCP/AQM networks. IEEE Trans. Circuits Syst. Ⅰ Regul. Pap. 2021;68:387-95.

3. Zamani N., Askari J., Kamali M., Aghdam A. Distributed adaptive consensus tracking control for non-linear multi-agent systems with time-varying delays. IET Control Theory Appl. 2020;14:3382-94.

4. Guo X., Liang J. Prescribed-time bipartite consensus for signed directed networks on time scales. Int. J. Control. 2021;96:508-16.

5. He W., Zhang B., Han Q. L., Qian F., Kurths J., Cao J. Leader-following consensus of nonlinear multiagent systems with stochastic sampling. IEEE Trans. Cybern. 2017;47:327-38.

6. He W., Chen G., Han Q., Qian F. Network-based leader-following consensus of nonlinear multi-agent systems via distributed impulsive control. Inf. Sci. 2017;380:145-58.

7. Luo Y., Xiao X., Cao J., Li A., Lin G. Event-triggered guaranteed cost consensus control for second-order multi-agent systems based on observers. Inf. Sci. 2021;546:283-297.

8. Li W., Zhang H., Sun S., Zhang J. Fully distributed event-triggered consensus protocols for multi-agent systems with physically interconnected network. Neurocomputing. 2020;418:191-9.

9. Li X., Tang Y., Karimi H. Consensus of multi-agent systems via fully distributed event-triggered control. Automatica. 2020;116:108898.

10. Hu A., Park J., Hu M. Consensus of nonlinear multiagent systems with intermittent dynamic event-triggered protocols. Nonlinear Dyn. 2021;104:1299-313.

11. Chen X., Feng J. E., Xu W., Cao J., Qiu J. Evolution modeling and control of networked dynamic games with event-triggering mechanism. Chaos. 2025;35:013102.

12. Chen C., Zou W., Xiang Z. Event-triggered consensus of multiple uncertain euler–lagrange systems with limited communication range. IEEE Trans. Syst. Man Cybern. Syst. 2023;53:5945-54.

13. Li K. Z. u, Teel A. R., Sun X. M., Wang X. F. Model-based dynamic event-triggered control for systems with uncertainty: a hybrid system approach. IEEE Trans. Autom. Control. 2021;66:444-51.

14. Hu W., Yang C., Huang T., Gui W. A distributed dynamic event-triggered control approach to consensus of linear multiagent systems with directed networks. IEEE Trans. Cybern. 2020;50:869-74.

15. Koike R., Endo T., Matsuno F. Output-based dynamic event-triggered consensus control for linear multiagent systems. Automatica. 2021;133:109863.

16. Xiang Z., Li P., Zou W. Event-triggered optimal control for a class of continuous-time switched nonlinear systems. IEEE Trans. Autom. Sci. Eng. 2025;22:1620-30.

17. He W., Li S., Ahn C. K., Guo J., Xiang Z. Sampled-data stabilization of stochastic interconnected cyber-physical systems under DoS attacks. IEEE Syst. J. 2022;16:3844-54.

18. Feng Z., Hu G. Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans. Control Syst. Technol. 2020;28:741-52.

19. Guo X. G., Liu P. M., Wang J. L., Ahn C. K. Event-triggered adaptive fault-tolerant pinning control for cluster consensus of heterogeneous nonlinear multi-agent systems under aperiodic DoS attacks. IEEE Trans. Netw. Sci. Eng. 2021;8:1941-56.

20. Yang Y., Li Y., Yue D. Event-trigger-based consensus secure control of linear multi-agent systems under DoS attacks over multiple transmission channels. Sci. China Inf. Sci. 2020;63:150208.

21. Chen Z., Cai L., Zhao C. Convergence time of average consensus with heterogeneous random link failures. Automatica. 2021;127:109496.

22. Lin X., Zheng Y., Wang L. Consensus of switched multi-agent systems with random networks. Int. J. Control. 2016;90:1113-22.

23. De Persis C., Tesi P. Input-to-state stabilizing control under denial-of-service. IEEE Trans. Automat. Contr. 2015;60:2930-44.

24. Qin J., Fu W., Zheng W. X., Gao H. On the bipartite consensus for generic linear multiagent systems with input saturation. IEEE Trans. Cybern. 2017;47:1948-58.

25. Bhowmick S., Panja S. Leader–follower bipartite consensus of linear multiagent systems over a signed directed graph. IEEE Trans. Circuits Syst. II. 2019;66:1436-40.

26. Chen X., Hu S., Yang T., Xie X., Qiu J. Event-triggered bipartite consensus of multiagent systems with input saturation and DoS attacks over weighted directed networks. IEEE Trans. Syst. Man Cybern. Syst. 2024;54:4054-65.

27. Hu S., Qiu J., Chen X., Zhao F., Jiang X. Dynamic event‐triggered control for leader‐following consensus of multiagent systems with the estimator. IET Control Theory Appl. 2022;16:475-84.

Cite This Article

Research Article
Open Access
Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies
Wenjie Li, ... Feng Zhao

How to Cite

Li, W.; Chen, X.; Cheng, L.; Ma, J.; Zhao, F. Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies. Complex Eng. Syst. 2025, 5, 5. http://dx.doi.org/10.20517/ces.2024.104

Download Citation

If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download.

Export Citation File:

Type of Import

Tips on Downloading Citation

This feature enables you to download the bibliographic information (also called citation data, header data, or metadata) for the articles on our site.

Citation Manager File Format

Use the radio buttons to choose how to format the bibliographic data you're harvesting. Several citation manager formats are available, including EndNote and BibTex.

Type of Import

If you have citation management software installed on your computer your Web browser should be able to import metadata directly into your reference database.

Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.

Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.

About This Article

Special Issue

© The Author(s) 2025. Open Access This article is licensed under a Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/), which permits unrestricted use, sharing, adaptation, distribution and reproduction in any medium or format, for any purpose, even commercially, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons license, and indicate if changes were made.

Data & Comments

Data

Views
51
Downloads
30
Citations
0
Comments
0
0

Comments

Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at [email protected].

0
Download PDF
Share This Article
Scan the QR code for reading!
See Updates
Contents
Figures
Related
Complex Engineering Systems
ISSN 2770-6249 (Online)

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/

Portico

All published articles are preserved here permanently:

https://www.portico.org/publishers/oae/