Event-triggered Adaptive Fault-tolerant Pinning Control for Cluster Consensus of Heterogeneous Nonlinear Multi-agent Systems under Aperiodic DoS Attacks

Xiang Gui Guo, Pei Ming Liu, Jian Liang Wang, Choon Ki Ahn

Research output: Contribution to journalArticlepeer-review

Abstract

This paper presents an event-triggered cluster consensus scheme for heterogeneous nonlinear second-order multi-agent systems (MASs) subject to cyber attacks (i.e., aperiodic denial-of-service (DoS) attacks), actuator faults and integral quadratic constraints (IQCs) under directed communication topology containing a directed spanning tree. Based on local communication, an event-triggered adaptive fault-tolerant pinning control scheme is designed to achieve cluster consensus under simultaneous cyber attacks and actuator faults. The proposed control scheme does not require the communication topology to satisfy the in-degree balance between different clusters. Furthermore, the fault-tolerant control part only needs to estimate one parameter for each agent. Instead of requiring continuous information on its neighbors to determine the trigger instants as in the previous literature, an event-triggered mechanism that does not require periodic sampling of neighbors' information is developed to save network resources, and the Zeno behavior is excluded. Finally, a simulation example confirms the effectiveness and superiority of the proposed control scheme.

Original languageEnglish
JournalIEEE Transactions on Network Science and Engineering
DOIs
Publication statusAccepted/In press - 2021

Keywords

  • Actuators
  • Cyberattack
  • Fault tolerance
  • Fault tolerant systems
  • Multi-agent systems
  • Nonlinear dynamical systems
  • Uncertainty

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Event-triggered Adaptive Fault-tolerant Pinning Control for Cluster Consensus of Heterogeneous Nonlinear Multi-agent Systems under Aperiodic DoS Attacks'. Together they form a unique fingerprint.

Cite this