School of Automation and Electrical Engineering, Linyi University, Linyi 27600, Shandong, China.
Correspondence to: Prof. Xiangyong Chen, School of Automation and Electrical Engineering, Linyi University, West of North Section of Industrial Avenue, Lanshan District, Linyi 27600, Shandong, China; School of Control Science and Engineering, Dalian University of Technology, Dalian 116024, Liaoning, China. E-mail: [email protected]
Received: 31 Dec 2024 | First Decision: 5 Feb 2025 | Revised: 19 Feb 2025 | Accepted: 26 Feb 2025 | Published: 28 Mar 2025
Academic Editor: Wenwu Yu | Copy Editor: Fangling Lan | Production Editor: Fangling Lan
Abstract
In this paper, a dual-channel event-triggered control (ETC) protocol with a state estimator is designed in multi-agent systems with switching topologies under denial-of-service attacks. Firstly, an ETC protocol and a dynamic ETC protocol are designed in the communication channel and the controller–actuator channel, respectively. Different from the traditional single-channel ETC, the dual-channel ETC is designed to further save resources. Second, an estimator is introduced to avoid continuous communication between agents. The sufficient conditions for realizing consensus are obtained under denial-of-service attacks. Moreover, due to the unstable communication topology of multi-agent systems, we designed a distributed controller based on switching topologies. Finally, the feasibility of the proposed method is verified through numerical simulations.
Keywords
Dual-channel event-triggered, DoS attacks, MASs, switching topologies
Cluster behaviors formed by multiple individuals in nature through self-organization and mutual collaboration can exhibit capabilities that surpass individual functions. Inspired by this, researchers had proposed the concept of multi-agent systems (MASs). In recent years, MASs have received more attention from researchers due to the wide range of applications in military, transportation and agriculture[1]. In the course of the study of the MAS system, consensus is one of the most important research elements for MASs. Consensus means that agents can communicate in network and achieve consensus. In the past few years, many researchers had studied and explored the consensus in MASs. In reference[2], the stable problem of finite-time of MASs was studied by analyzing the transmission control protocol over active queue management topologies. In reference[3], an adaptive dynamic protocol was designed, which achieves the consensus under the effects of uncertain delays. In reference[4], the sufficient condition of achieving prescribed-time consensus was extended to a bipartite cooperative–antagonistic network.
In general, the goal of consensus is to design appropriate protocols to achieve consensus in communication networks with limited communication resources. In practical engineering, each agent carries limited energy resources when performing certain functions (e.g., collecting information, exchanging communication information with neighboring agents, etc.) and the communication channel can only transmit a limited number of data bits. Therefore, designing control strategies to reduce resource consumption so that agents can operate stably for a longer period of time is a research direction of many researchers. Traditional solutions are through time-triggered control, such as sampling control[5] and pulse control[6]. In periodic sampling control strategies, systems sample data at fixed time intervals, and this design method saves resources, but lacks the flexibility to adjust the sampling moment spontaneously. For this reason, event-triggered control (ETC) has garnered the interest of researchers. In reference[7], a second-order dynamic system was studied; the ETC strategy of the system was decided by the states of each agent and its neighbor agent. In references[8, 9], model-based ETC strategies were designed in MASs where the continuity of adjacent states was no longer required. In references[10, 11], an ETC protocol was designed in the systems, which was only updated at the instants of triggering. In reference[12], a hybrid event triggering mechanism combining three dynamic triggering conditions, namely local state error, velocity-dependent triggering condition, and dynamic maximum triggering interval, is designed to achieve efficient utilization of communication resources. Above research on ETC employs multiple parameters to optimize communication efficiency, imposing increased demands on estimators or samplers. In references[13, 14, 15], a dual-channel ETC protocol was designed for agent communication and controller–actuator channels, and consensus could be achieved while saving controller resources. In references [16], an ETC protocol was designed for nonlinear systems.
In earlier work, event generation relies on continuous information from the agents themselves and their neighbors; the control protocols designed using this approach are still continuous. To solve these problems, some researchers proposed the concept of an estimator, which is to estimate the state of the agents instead of the actual state. In reference[17], resilience control under denial-of-service (DoS) attacks is achieved by estimating the dynamics of leaders and followers. In reference[18], consensus control is achieved in cooperative communication networks by combining estimators.
The above results regarding consensus are mostly obtained in a secure network environment. MASs may be affected by DoS attacks in practical applications. DoS attacks usually inject large amounts of data into the communication channel, paralyzing the channel. In order to solve the problem of the impact of DoS attacks, researchers had proposed many control schemes. In reference[19], directed spanning trees are utilized to achieve security consensus under DoS attacks. In reference[20], the timing of DoS attacks is not consistent for each communication channel which is a more realistic scenario. Besides, switching topology is widely used in MASs which also attracted the attention of scholars. In reference[21], the problem of the system reaching a consistent rate of convergence when each link is established randomly with independent probability cycles was analyzed. In reference[22], the consensus of MASs alternately switched by discrete and continuous under the same topological conditions was studied. Dual-channel ETC saves communication activity to necessary events which can significantly reduce communication traffic. It helps reduce the risk of communication resources being exhausted under DoS attacks, thus ensuring that the transmission of critical information is not compromised.
Inspired by the above discussions, this paper studied the consensus problem in MASs with switching topologies under DoS attacks; the major contributions are as follows.
● This paper investigates the MAS consensus under switching communication topologies, which allow agents to have more complex interaction patterns. By rigorously analyzing the relationship between event-triggered feedback parameters and DoS attack dynamics, we establish sufficient conditions for MAS consensus. The derived criteria systematically integrate topology switching constraints, and security thresholds against DoS attacks, ensuring both communication efficiency and robustness in dynamic networked environments.
● Based on the dual-channel framework, ETC protocols are developed for the controller–actuator channel and communication channel to save resources. By incorporating an exponential parameter, the Zeno behavior is eliminated in the controller–actuator channel.
Notations:$$ \Re^{n}, \Re^{n\times n} $$ denote the $$ n $$-dimensional space, $$ n\times n $$ real matrices, respectively. $$ \left|\cdot\right| $$ and $$ \left\|\cdot\right\| $$ represent the absolute value and 2-norm, respectively. $$ \otimes $$ denotes the Kronecker product. abs(·) denotes absolute values of elements of a matrix. $$ \mathit{λ}\left(\cdot\right) $$ and $$ \bar{\mathit{λ}}\left(\cdot\right) $$ represent the eigenvalue and singular eigenvalues of a matrix, respectively. $$ \mathbf{1}_{N} $$ denotes the matrix $$ N\times1 $$ with all ones. diag{·} represents a diagonal matrix.
2. MODEL AND PROBLEM DESCRIPTION
2.1. Graph theory
The communication topology between $$ N $$ agents can be represented by a leader-following undirected digraph $$ {\cal G} = \{ {\cal V}, {\cal E}, {\cal A}\} $$, where $$ {\cal V} = \left\{ {{v_1}, {v_2}, \ldots , {v_N}} \right\} $$ denotes the set of nodes, $$ {\cal E} = {\cal V} \times {\cal V} $$ represents the set of edges and an adjacency matrix $$ {\cal A} $$. The edge $$ {e_{ij}} $$ is represented by a pair of vertices $$ \left( {{v_j}, {v_i}} \right) $$. If $$ {a_{ij}} = 1 $$ and $$ {e_{ij}} \in {\cal E} $$, agent $$ j $$ can exchange information with agent $$ i $$; otherwise, $$ {a_{ij}} = 0 $$. If $$ {a_{ij}} = 1 $$, agents $$ i $$ and $$ j $$ are neighboring nodes of each other. The set of neighboring agents $$ i $$ is denoted by $$ {N_i} = \left\{ {j \in {\cal V}:{e_{ij}} \in {\cal E}} \right\} $$. If $$ i \ne j $$, the Laplace matrix of $$ {\cal G} $$ can be defined as $$ {l_{ii}} = \sum\nolimits_{j = 1, j \ne i}^N {{a_{ij}}} $$, $$ {l_{ij}} = - {a_{ij}} $$. The real part of the eigenvalues of the $$ L $$ matrix satisfies $$ 0{\rm{ = }}{\mathit{λ} _1}\left( L \right) \le {\mathit{λ} _2}\left( L \right) \le \cdots \le {\mathit{λ} _N}\left( L \right) $$. In particular, $$ {\mathit{λ} _1} = 0 $$ corresponds to a feature vector $$ {{\bf{1}}_N} $$. If $$ {{m_i}=1} $$, the follower agent $$ i $$ can exchange information with the leader; otherwise, $$ {{m_i}=0} $$. Define $$ H=L+M $$, $$ M = diag\left\{ {{m_1}, {m_2}, ..., {m_N}} \right\} $$.
Existence of all possible communication topologies for multi-agent systems can be represented by a set of connected undirected graphs $$ \mathcal{G}_{\rho}=\begin{Bmatrix}\mathcal{G}_{1}, \mathcal{G}_{2}\cdots\mathcal{G}_{O}\end{Bmatrix} $$, where $$ O>0 $$ is the number of switching topologies for the entire system. Considering the case of random switching topology, there exists a continuous edge probability matrix $$ \boldsymbol{\aleph}=\left(\ell_{ij}\right)_{N\times N} $$ and $$ 0\leq\ell_{ij}\leq1 $$. The probability of a connection between every two points is independent of each other. Since there are only two possibilities of connection or non-connection between two nodes, a sequence of $$ N(N-1) $$ independent Bernoulli trials is used to describe it. Consider a non-empty set of continuous time intervals $$ \{[t_k, t_{k+1})\mid k=0, 1, \ldots, M\} $$, where $$ t_{0}=0, \tau_{*}<t_{k+1}-t_{k}\leq\tau^{*}, \tau_{*}>0 $$ is a positive constant. The topology is invariant within each interval $$ [t_k, t_{k+1}) $$; the switching signals $$ \Upsilon $$ and $$ L_\Upsilon $$ are constant within this interval.
Remark 1According to the definition of the lower bound of switching time $$ \tau_{*} $$, the number of topology switches must be kept within a certain range. If switching occurs too frequently, the excessive switching may negatively affect both the dynamic performance and the stability of the system. This paper utilizes Bernoulli random switching, leveraging multiple iteration step sizes. By modulating the size of these multiples, one can regulate the frequency of random transitions between different communication topologies.
2.2. DoS attacks model
The DoS attacks usually involve injecting large amounts of data into a communication channel to paralyze the channel, with the main aim of preventing information interaction and affecting monitoring equipment. Some useful assumptions and common lemmas are presented for further analysis.
Assumption 1[23] The number of DoS attacks in the $$ [{t_0}, t] $$ is $$ N_0({t_0}, t) $$. We assume the constants $$ {N_1}>0 $$ and $$ {T^f} > 0 $$ such that
Assumption 2[23] The total time of DoS attacks in the $$ [{t_0}, t] $$ is $$ \Xi_a({t_0}, t) $$. We assume the constants $$ {N_2}>0 $$ and $$ {T^d} > 0 $$ such that
Remark 2Assumptions 1 and 2 limit the frequency and duration of attacks to make control meaningful. When the average attack frequency is greater than the sampling frequency of the system, the system is uncontrollable. In addition, these assumptions are justified by the fact that the duration is limited by energy.
2.3. Problem statement
First, consider a MAS that has one leader and $$ N $$ followers. In this system, the state of the leader $$ X_0 $$ is proposed as
where $$ \mathbb{S} = 1, 2, ..., N $$; $$ {x_0}(t) \in {\Re ^n} $$ is the states of the leader. The $$ {x_i}(t) \in {\Re ^n} $$ and $$ {u_i}(t) \in {\Re ^p} $$ are the states and control input of agent $$ i $$. The $$ A \in {\Re ^{n \times n}} $$ and $$ B \in {\Re ^{n \times p}} $$ are the constant matrices of the corresponding dimension. The following assumption is considered.
Assumption 3The topology graph of MASs $$ \mathcal{G} $$ is undirected and connected; the pair of $$ (A, B) $$ is stabilisable.
Lemma 1[24] Under Assumption 3, a unique solution denoted as P which satisfies the algebraic Riccati equation as follows
$$ \begin{equation} {A^T}P + PA - \kappa PB{B^T}P + P = 0, \end{equation} $$
where $$ \kappa>0 $$.
Definition 1Given initial conditions, the consensus of MASs is realized if
where $$ K $$ is a constant gain matrix; $$ \Xi_s ({t_0}, t) $$ is the period when the MASs without DoS attacks. In certain studies, the controller relied on the state value at the triggering instants. However, in this research, the controller employs an estimated value instead. The design of the estimator is outlined below:
where $$ \omega_j>0 $$ is a constant; $$ \hat x_j $$ is the estimated state of $$ j $$th agent in $$ [t_k^j, t_{k + 1}^j) $$. When $$ t=t_k^j $$, there is $$ \hat x_j=x_j $$. The error variable $$ e_i(t) $$ of the $$ i $$th agent is
where $$ r $$ is minimum eigenvalue of matrix $$ H $$. And matrix $$ K $$ is calculated by $$ K=B^TQ $$ in Equation (7). According to the tracking error $$ \psi_i(t)={x}_i(t)-{x}_0(t) $$. The time derivative of tracking error $$ \psi_i(t) $$ as
where $$ {\alpha _i}>0 $$. $$ {\theta _i}(t) $$ represents a time-varying parameter that updates are contingent upon self-feedback, measurement discrepancies, neighbor errors, and leader errors. It is noteworthy that $$ {\theta _i}(t) $$ possesses a property crucial to the subsequent process of proving or deriving the conclusion, as outlined in
Lemma 3For predefined scalars $$ {\varepsilon _1}, {\varepsilon _2}, {\varepsilon _3}, {\alpha _i}, {\theta _i}(0) $$ we can obtain
$$ \begin{equation} \theta_i(t)>0, i=1, 2, ..., N. \end{equation} $$
Proof: Consider the system (14) with (16)(18), when $$ t \in \cup _{k = 1}^\infty (t_k^i, t_{k + 1}^i] = (0, \infty ) $$ there exists $$ {k^\prime } $$, $$ t \in (t_{{k^\prime }}^i, t_{{k^\prime } + 1}^i] $$. The following formula holds: when the required parameter is not satisfied, the inequality
when $$ t\in\Xi_{s} (t_{0}, t) $$, the system is free from attacks. During this period, design $$ V_s\left(t\right)=V_1\left(t\right)+V_2\left(t\right) $$ and
$$ \begin{equation} {V_1}\left( t \right) = {\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right), \end{equation} $$
where $$ r = {r_1} + {r_2} $$. According to Young's inequality $$ pq \le \frac{1}{{2k}}{\left\| p \right\|^2} + \frac{k}{2}{\left\| q \right\|^2} $$, we can rewrite $$ {\dot V_1}\left( t \right) $$ that
$$ \begin{equation} { \begin{array}{l}{{\dot V}_1}\left( t \right) \le - {\varepsilon _1}{\left\| {\Gamma \left( t \right)} \right\|^2} + 2{\varepsilon _2}\left\| {e\left( t \right)} \right\|\left\| {\Gamma \left( t \right)} \right\| + {\varepsilon _3}{\left\| {e\left( t \right)} \right\|^2} - {r_2}{\Psi ^T}\left( t \right)\Psi \left( t \right) \\{\kern 23pt} \le - {\varepsilon _1}{\left\| {\Gamma \left( t \right)} \right\|^2} + 2{\varepsilon _2}\left( {\frac{1}{{2\tau }}{{\left\| {e\left( t \right)} \right\|}^2} + \frac{\tau }{2}{{\left\| {\Gamma \left( t \right)} \right\|}^2}} \right) + {\varepsilon _3}{\left\| {e\left( t \right)} \right\|^2} \\{\kern 34pt}- {r_2}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right) \\{\kern 23pt} \le - \sum\limits_{i = 1}^N {\left[ {\left( {{\varepsilon_1} - {\varepsilon_2}\tau } \right){{\left\| {{\eta _i}\left( t \right)} \right\|}^2}} \right.} - \left( {\frac{{{\varepsilon_2}}}{\tau } + 2{\varepsilon_3}} \right){\left\| {{e_i}\left( t \right)} \right\|^2}] \\{\kern 34pt}- {r_2}{\Psi ^T}\left( t \right)\left( {{I_N} \otimes Q} \right)\Psi \left( t \right). \end{array}} \end{equation} $$
The time derivative of $$ {V_2}\left( t \right) $$ is
Therefore, as $$ t \in \left[ {{t_{2\left( {l - 1} \right)}}, {t_{2l - 1}}} \right) $$, we can obtain $$ V\left( t \right) \le {\varsigma _1}{e^{ - \beta \left( {t - {t_0}} \right)}}V\left( {{t_0}} \right) $$ where $$ \varsigma_1=(\rho_1\rho_2)^{N_1}e^{(\mu_1+\mu_2)N_2}. $$ And as $$ t \in \left[ {{t_{2\left( {l - 1} \right)}}, {t_{2l - 1}}} \right) $$, it has $$ V\left(t\right)\leq\varsigma_{2}e^{-\beta\left(t-t_{0}\right)}V\left(t_{0}\right) $$ as above, where $$ \varsigma_2={\rho_1}^{N(t_0, t)-1}\rho_2^{N(t_0, t)}e^{(\mu_1+\mu_2)N_2} $$. By analyzing the above two situations, we can obtain
Subsequently, we employ proof by contradiction to demonstrate that Zeno behavior does not occur. First, we suppose that the Zeno behavior of agent $$ i $$ will occur, indicating that $$ \sum_{k=0}^{\infty}\Delta_{k}^{i} $$ must converge, where $$ \Delta_{k}^{i}=t_{k+1}^{i}-t_{k}^{i} $$ is a positive sequence, and then $$ \lim_{m\to\infty}\sum_{k=0}^{m}\Delta_{k}^{i}=\lim_{k\to\infty}t_{k+1}^{i}-t_{0}=\infty $$, which is divergent. Thus, Zeno behavior does not occur.
2.if $$ \|A\|=0 $$, then $$ \left\|e^T_i(t)\right\|\leq Z_{_k}^{i}(t-t_k^i) $$ The proof process for this case is analogous to the first cases and therefore will not be reiterated here. It can be seen that the Zeno behavior of agent $$ i $$ will be excluded from the above two situations. If the MASs are subjected to DoS attacks, $$ {u_i}(t) = 0 $$; the Zeno behavior of the agent $$ i $$ also will not occur.
3.4. Dual-channel event-triggered consensus
In this part, based on the idea of dual channels, the ETC protocol between the controller and actuator channel with the communication channel is designed to save resources. The Zeno behavior in the controller and actuator channel can be eliminated by introducing the exponential parameter, and the ETC protocol in the controller and actuator channel can still work stably when the input signal is very small. In addition, the ETC protocol in the controller and actuator channel is designed before the communication channel, and it is designed to depend only on the input signal and does not require neighbor information. First, an equivalent controller $$ {\tilde u_i}\left( t \right) $$ is designed as
where $$ \wp _i^u\left( t \right) = {{u_i}\left( t \right) - {{\tilde u}_i}\left( t \right)} $$, $$ 0 < {{\text{z}}_i} < 1 $$ and $$ {\upsilon _i} > 0 $$. Then, there exist $$ |\tilde{\alpha}_i(t)|\leq1 $$ and $$ |\tilde{\beta}_{i}(t)|\leq1 $$. Thus, we have
$$ \begin{equation} {\tilde u_i}\left( t \right) = \frac{{{u_i}\left( t \right) - {{\tilde \beta }_i}\left( t \right){e^{ - {\upsilon _i}t}}}}{{1 + {{\tilde \alpha }_i}\left( t \right){z_i}}}. \end{equation} $$
In that case, the tracking error $$ \psi_i(t) $$ is
where $$ \hat \alpha \left( t \right) = diag\left\{ {{{\hat \alpha }_1}\left( t \right), {{\hat \alpha }_2}\left( t \right), \ldots , {{\hat \alpha }_N}\left( t \right)} \right\} $$ and $$ \hat \beta \left( t \right) = {({\hat \beta _1}\left( t \right), {\hat \beta _2}\left( t \right), \ldots , {\hat \beta _N}\left( t \right))^T} $$. In the context of Equation (40), the following ETC protocol can be obtained
where $$ \hat W = PB{B^T}P $$, $$ \dot{\hat{\theta}}_{i}(t)=-\widehat{\alpha}_{i}\hat{\theta}_{i}(t)-\hat{f}\left(e_{i}(t), \hat{\Gamma}_{i}(t)\right) $$, $$ \widehat{\alpha}_{i}>0 $$ and $$ \hat{\theta}_i(0)>0 $$.
Remark 3Dual-channel ETC ensures system stability by triggering actions only when necessary and adjusting parameters based on communication topology and agent dynamics to achieve system security consensus. Dual-channel ETC enhances the efficiency of the system by separating communication and control channels, reducing unnecessary communication. It also offers flexible triggering mechanisms, optimizing resource utilization and boosting overall system performance. Thus, while the dual-channel triggering protocol designed here is similar to the triggering form of the existing work, the design idea is different and from a practical point of view, the approach in this section is simpler and does not require additional wiring.
Remark 4In order to avoid continuous communication and further save communication resources, an estimator is introduced in this chapter. However, the use of the estimator leads to the inability to exclude Zeno behavior. A common approach is to use a constant trigger threshold to exclude Zeno behavior. However, this design will make $$ {\tilde u_i}\left( t \right) $$ can not reach $$ {u_i}(t) $$. Inspired by the references[26, 27], an exponential threshold $$ e^{ - {\upsilon _i}t} $$ is designed to solve problems caused by the estimator in this section. The designed controller update protocol still works properly when the input signal is extremely small.
Theorem 2Considering MASs (3)(4), with the control protocol (45), consensus among the MASs can be achieved if there exist
The subsequent process of proving the consensus is similar to Theorem 1 and is not given to avoid redundancy. Next, Zeno behavior exclusion is divided into two categories: the actuator channel and the communication channel. 1. For the controller–actuator channel, we have
Considering the event-triggered interval $$ [t_k^i, t_{k+1}^i), $$ there exist $$ |\wp _i^u(t_k)|=0 $$ and $$ \lim_{t\to t_{k+1}}|\wp _i^u(t)|=\nu_{i}|\tilde{u}_{i}(t)|+e^{-\upsilon{i}t} $$; then, we can obtain
If Zeno behavior exists, it means infinite triggers within a limited time $$ T_{c} $$, i.e., $$ \sum_{k=0}^\infty\Delta_k^i=T_c, $$ where $$ \Delta_k^i=t_{k+1}^i-t_k^i $$. Then, we have $$ \sum_{k=0}^{\infty}\Delta_{k}^{i}=\lim_{k\to\infty}t_{k+1}^{i}-t_{0}^{i}=T_{c} $$, indicating $$ \lim_{k\to\infty}t_{k+1}^i=T_c $$. Thus, we have $$ \sum_{k=0}^\infty\Delta_k^i=\infty $$ and $$ \lim_{k\to\infty}t_{k+1}^i=\infty $$. This contradicts $$ \operatorname*{lim}_{k\to\infty}t_{k+1}^{i}=T_{c} $$; thus, Zeno behavior will not occur. For dynamic ETC protocol in the communication channel, similar to chapter 3.4., Zeno behavior can be excluded. This proof is finished.
The adjacency matrices $$ L $$ and $$ M $$ are replaced by $$ L_1, L_2, L_3 $$ and $$ M_1, M_2, M_3 $$. The matrices $$ K $$ and $$ Q $$ can also be calculated by
Choose $$ {\omega _i}{\text{ = 0}}{\text{.1}} $$, $$ {\theta _1}(0) = 90 $$, $$ {\theta _2}(0) = 92 $$, $$ {\theta _3}(0) = 70 $$, $$ {\theta _4}(0) = 62 $$, $$ {\theta _5}(0) = 93 $$. Set $$ {x_0} = {\left[ {3, - 1, 2} \right]^T} $$, $$ {x_1}\; =\; {\left[ {2.4, 2.3, 0.2} \right]^T} $$, $$ {x_2} = {\left[ { - 3.2, 1, 1.7} \right]^T} $$, $$ {x_3} = {\left[ {2, - 3, 1.5} \right]^T} $$, $$ {x_4} = {\left[ { - 1.5, - 0.5, - 2.8} \right]^T} $$, $$ {x_5} = {\left[ {1.1, 1, - 2.2} \right]^T} $$. The communication structure of the MASs will switch randomly among the three scenarios depicted in Figure 1. Figure 2 illustrates the state difference between each follower and the leader. From Figure 2, we can observe that the state errors between followers and leaders all converge to zero within six seconds. The state trajectories of the leader and followers are displayed in Figure 3, clearly showing that each agent can follow the leader. From Figure 2 and Figure 3, we can deduce that the MASs achieve leader-following consensus in finite time. Figure 4 presents the triggering times of five agents. As the state errors between followers and leader converge to zero, the increase of triggering times of followers slows down. Lastly, Figure 5 shows the network topology of the MASs.
Figure 1. Network topology of MASs.
2. State error of MASs.
3. State trajectory of agents.
4. Triggering times of followers.
5. Current topology of MASs.
5. CONCLUSIONS
This paper focuses on the consensus problem of MASs. Considering a MAS with a leader and $$ N $$ followers, a distributed controller is designed. To avoid continuous communication, an estimator is used to estimate the state of agents during the trigger interval so that the estimated state is used instead of the actual state to achieve the goal of intermittent communication. In order to further save communication resources, a dual-channel ETC is designed for the controller-actuator channel and communication channel, respectively. The continuous validity of the ETC protocol is ensured by introducing an exponential triggering threshold in the controller-actuator channel. Finally, it is verified through simulation that consensus control can be achieved while effectively saving controller resources and communication resources. Furthermore, applying our findings to address security control challenges in mobile robot systems under DoS attacks represents a crucial research direction. This study will facilitate future research efforts on the consensus of heterogeneous MASs, the implementation of security controls against hybrid cyber attacks, and the development of self-triggered protocols.
DECLARATIONS
Acknowledgments
We would like to express our great appreciation to the editors and reviewers.
All authors have read and agreed to the published version of the manuscript.
Availability of data and materials
The authors generated all data and materials used in the research as an integral part of the study, with explicit details provided in the methodology section of the manuscript. These are available from the corresponding author upon reasonable request.
Financial support and sponsorship
This research was supported in part by the National Natural Science Foundation of China under Grants 62173175, 62406132 and 61877033, and in part by the Natural Science Foundation of Shandong Province under Grants ZR2024MF032 and ZR2024QF039.
Conflicts of interest
Chen, X. is the Guest Editor of the Special Issue of “Adaptive Event-Triggered Control and Optimization for Complex Systems”. He is not involved in any steps of editorial processing, notably including reviewer selection, manuscript handling, or decision-making, while the other authors have declared that they have no conflicts of interest.
1. Cheng W., Zhang K., Jiang B., Ding S. X. Fixed-time fault-tolerant formation control for heterogeneous multi-agent systems with parameter uncertainties and disturbances. IEEE Trans. Circuits Syst. Ⅰ Regul. Pap. 2021;68:2121-33.
2. Wang C., Chen X., Cao J., Qiu J., Liu Y., Luo Y. Neural network-based distributed adaptive pre-assigned finite-time consensus of multiple TCP/AQM networks. IEEE Trans. Circuits Syst. Ⅰ Regul. Pap. 2021;68:387-95.
3. Zamani N., Askari J., Kamali M., Aghdam A. Distributed adaptive consensus tracking control for non-linear multi-agent systems with time-varying delays. IET Control Theory Appl. 2020;14:3382-94.
4. Guo X., Liang J. Prescribed-time bipartite consensus for signed directed networks on time scales. Int. J. Control. 2021;96:508-16.
5. He W., Zhang B., Han Q. L., Qian F., Kurths J., Cao J. Leader-following consensus of nonlinear multiagent systems with stochastic sampling. IEEE Trans. Cybern. 2017;47:327-38.
6. He W., Chen G., Han Q., Qian F. Network-based leader-following consensus of nonlinear multi-agent systems via distributed impulsive control. Inf. Sci. 2017;380:145-58.
7. Luo Y., Xiao X., Cao J., Li A., Lin G. Event-triggered guaranteed cost consensus control for second-order multi-agent systems based on observers. Inf. Sci. 2021;546:283-297.
8. Li W., Zhang H., Sun S., Zhang J. Fully distributed event-triggered consensus protocols for multi-agent systems with physically interconnected network. Neurocomputing. 2020;418:191-9.
9. Li X., Tang Y., Karimi H. Consensus of multi-agent systems via fully distributed event-triggered control. Automatica. 2020;116:108898.
10. Hu A., Park J., Hu M. Consensus of nonlinear multiagent systems with intermittent dynamic event-triggered protocols. Nonlinear Dyn. 2021;104:1299-313.
11. Chen X., Feng J. E., Xu W., Cao J., Qiu J. Evolution modeling and control of networked dynamic games with event-triggering mechanism. Chaos. 2025;35:013102.
12. Chen C., Zou W., Xiang Z. Event-triggered consensus of multiple uncertain euler–lagrange systems with limited communication range. IEEE Trans. Syst. Man Cybern. Syst. 2023;53:5945-54.
13. Li K. Z. u, Teel A. R., Sun X. M., Wang X. F. Model-based dynamic event-triggered control for systems with uncertainty: a hybrid system approach. IEEE Trans. Autom. Control. 2021;66:444-51.
14. Hu W., Yang C., Huang T., Gui W. A distributed dynamic event-triggered control approach to consensus of linear multiagent systems with directed networks. IEEE Trans. Cybern. 2020;50:869-74.
15. Koike R., Endo T., Matsuno F. Output-based dynamic event-triggered consensus control for linear multiagent systems. Automatica. 2021;133:109863.
16. Xiang Z., Li P., Zou W. Event-triggered optimal control for a class of continuous-time switched nonlinear systems. IEEE Trans. Autom. Sci. Eng. 2025;22:1620-30.
17. He W., Li S., Ahn C. K., Guo J., Xiang Z. Sampled-data stabilization of stochastic interconnected cyber-physical systems under DoS attacks. IEEE Syst. J. 2022;16:3844-54.
18. Feng Z., Hu G. Secure cooperative event-triggered control of linear multiagent systems under DoS attacks. IEEE Trans. Control Syst. Technol. 2020;28:741-52.
19. Guo X. G., Liu P. M., Wang J. L., Ahn C. K. Event-triggered adaptive fault-tolerant pinning control for cluster consensus of heterogeneous nonlinear multi-agent systems under aperiodic DoS attacks. IEEE Trans. Netw. Sci. Eng. 2021;8:1941-56.
20. Yang Y., Li Y., Yue D. Event-trigger-based consensus secure control of linear multi-agent systems under DoS attacks over multiple transmission channels. Sci. China Inf. Sci. 2020;63:150208.
21. Chen Z., Cai L., Zhao C. Convergence time of average consensus with heterogeneous random link failures. Automatica. 2021;127:109496.
22. Lin X., Zheng Y., Wang L. Consensus of switched multi-agent systems with random networks. Int. J. Control. 2016;90:1113-22.
23. De Persis C., Tesi P. Input-to-state stabilizing control under denial-of-service. IEEE Trans. Automat. Contr. 2015;60:2930-44.
24. Qin J., Fu W., Zheng W. X., Gao H. On the bipartite consensus for generic linear multiagent systems with input saturation. IEEE Trans. Cybern. 2017;47:1948-58.
25. Bhowmick S., Panja S. Leader–follower bipartite consensus of linear multiagent systems over a signed directed graph. IEEE Trans. Circuits Syst. II. 2019;66:1436-40.
26. Chen X., Hu S., Yang T., Xie X., Qiu J. Event-triggered bipartite consensus of multiagent systems with input saturation and DoS attacks over weighted directed networks. IEEE Trans. Syst. Man Cybern. Syst. 2024;54:4054-65.
27. Hu S., Qiu J., Chen X., Zhao F., Jiang X. Dynamic event‐triggered control for leader‐following consensus of multiagent systems with the estimator. IET Control Theory Appl. 2022;16:475-84.
Cite This Article
Research Article
Open Access
Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies
Wenjie Li, ... Feng Zhao
How to Cite
Li, W.; Chen, X.; Cheng, L.; Ma, J.; Zhao, F. Dual-channel event-triggered consensus of multi-agent systems under DoS attacks over switching topologies. Complex Eng. Syst.2025, 5, 5. http://dx.doi.org/10.20517/ces.2024.104
Download Citation
If you have the appropriate software installed, you can download article citation data to the citation manager of your choice. Simply select your manager software from the list below and click on download.
Export Citation File:
Type of Import
Tips on Downloading Citation
This feature enables you to download the bibliographic information (also called citation data, header data, or metadata) for the articles on our site.
Citation Manager File Format
Use the radio buttons to choose how to format the bibliographic data you're harvesting. Several citation manager formats are available, including EndNote and BibTex.
Type of Import
If you have citation management software installed on your computer your Web browser should be able to import metadata directly into your reference database.
Direct Import: When the Direct Import option is selected (the default state), a dialogue box will give you the option to Save or Open the downloaded citation data. Choosing Open will either launch your citation manager or give you a choice of applications with which to use the metadata. The Save option saves the file locally for later use.
Indirect Import: When the Indirect Import option is selected, the metadata is displayed and may be copied and pasted as needed.
Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any
comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any
queries or need any help, please contact us at
[email protected].
Comments
Comments must be written in English. Spam, offensive content, impersonation, and private information will not be permitted. If any comment is reported and identified as inappropriate content by OAE staff, the comment will be removed without notice. If you have any queries or need any help, please contact us at [email protected].