1. Introduction
With the rapid advancements in technology, Multi-Agent Systems (MASs) have found widespread applications across various domains. These systems are typically composed of multiple autonomous agents, each equipped with their own sensing, decision-making, and execution capabilities. In practical applications, these agents communicate and coordinate with each other through a network to achieve common goals. Guowei Dong [
1] studied nonlinear multi-agent systems in non-strict feedback form. He used the Nussbaum function to deal with the output dead zone problem. Eventually, the tracking error of the system converged to a small neighborhood within a finite time. Wang Wei [
2] focused on a class of nonlinear multi-agent systems with unmeasurable states. He designed an output feedback controller by using a state observer, and in this controller, an auxiliary system was designed to solve the problem of input saturation.
However, due to the openness and complexity of networks, MASs are vulnerable to a variety of security threats, with Denial-of-Service (DoS) attacks being a common method. A DoS attack aims to disable a system by depleting its resources or disrupting network communication. In the context of MASs, a DoS attack can lead to communication breakdowns, degradation in control performance, and even system collapse. To enhance the security and robustness of MASs against such attacks, it is crucial to study the adaptive event-triggered full-state constrained control of MASs under network attacks. Y. Wang [
3] designed a hybrid distributed control protocol to ensure consensus safety of MASs under DoS attacks, which was validated through numerical examples for its effectiveness in reducing the impact of attacks and maintaining system stability. The paper also provides a tolerance threshold for attack parameters to quantify the system’s resistance to DoS attacks. Tian-Yu Zhang [
4] introduces a distributed event-triggered controller for achieving consensus objectives of MASs under Impulsive and Random DoS (IRDoS) attacks. It also provides sufficient conditions for the attack duration and success probability under the premise of ensuring safe consensus of MASs. Hao Liu [
5] presents a new definition of complete DoS attacks and a dual-layer switching system model to describe asynchronous DoS attacks. Successful DoS attacks can partition the communication topology into multiple isolated subgraphs. Based on this, the original system is transformed into a dual-layer switching system with stable and unstable modes, where each unstable subsystem consists of a finite second-level unstable subsystem representing continuous successful DoS attacks. The paper employs a novel Dual-Mode Dependent Lyapunov Function (DMDLF) method to obtain the lower and upper bounds of the average dwell time (ADT) for each subsystem. The results show that it is possible to resist the effects of asynchronous DDoS attacks and achieve consistency in multi-agent outputs. K. Pan [
6] studied the scenario of implementing multi-channel Denial-of-Service (DoS) attacks in a multi-agent formation system (MAS). This study provides a distributed formation control protocol to achieve the desired formation in the presence of DoS attacks and adopts an online adjustment method to correct the interactions between adjacent agents. In addition, based on state information, the performance guarantee conditions for effectively regulating the state errors among all agents are derived. In other words, in the form of Linear Matrix Inequalities (LMIs), sufficient conditions for the stability of the system are derived with respect to the cognitive structure of the controller and the allowable duration of the attack. Y Xu [
7] proposed an innovative event-triggered control scheme. This scheme achieves cooperative control of a multi-agent system (MAS) under Denial-of-Service (DoS) attacks by utilizing the relative states (instead of absolute states) among agents. The core approach lies in designing a link-reference-based distributed state estimator, which is used to evaluate the relative states among agents during intermittent communication outages. Z Li [
8] addressed high-order uncertain nonlinear multi-agent systems subjected to DoS attacks and actuator faults. A method based on the logical relationship between the voltage signals of system components was adopted to detect DoS attacks, and an event-triggered mechanism was employed to reduce the resource consumption of system control. Ye D [
9] explored the distributed event-triggered consensus problem of nonlinear multi-agent systems under cyber attacks. Different from existing studies, it focused on the situation where the communication topology was frequently attacked by cyber threats, resulting in damaged communication links and paralyzed system topology. It was assumed that the attacks were recoverable, and agents could stop communicating when there was no directed spanning tree in the topological graph. The multiple Lyapunov function method was used to reduce the communication frequency. Liu J [
10] studied the security consensus control problem of discrete-time multi-agent systems (MASs). An algorithm was proposed to obtain the target gain matrix without any dynamic information, and the feasibility of this algorithm was proven using this gain matrix and the designed Lyapunov function. He H [
11] designed an adaptive fuzzy resilient control strategy for switched systems with deception attacks and state constraints. The Nussbaum function was used to solve the problem of unknown control directions, and a novel adaptive resilient controller and a mode-dependent switching law were designed to counteract the impacts of network attacks.
Despite the progress made in exploring the impact of network attacks on the consensus control of MASs, the key factor of state constraints has been largely overlooked. State-constrained consensus control aims to ensure that all agents in the MAS converge to a common state while satisfying state constraints. Such problems are prevalent in numerous fields, including unmanned aerial vehicle formations, multi-robot collaboration, and intelligent transportation systems. The presence of state constraints not only limits the movement range of agents but also may affect system stability and performance. Yanhui Zhang [
12] investigated the consensus tracking problem of nonlinear MASs with state constraints and unknown disturbances. For the case where the states of each follower and its neighbors are unmeasurable, the paper proposes an observer. Jianhui Wang [
13] established an adaptive consensus control method using backstepping techniques and Barrier Lyapunov Functions (BLFs) to ensure the performance of MASs under full state constraints, regardless of whether actuators fail. For uncertain nonlinear MASs, it also provides a finite-time neural network (NN) consensus control scheme to ensure synchronization of system signals within a finite time. Zhang [
14] proposed an adaptive fuzzy output feedback control method for a class of uncertain multi-input multi-output (MIMO) switched nonlinear systems with prescribed performance and unmeasurable states. Z Xu [
15], regarding nonlinear systems with full state constraints, used the Extended State Observer (ESO) and the Nonlinear Disturbance Observer (NDO) to solve the problems of unmeasurable states and unmeasurable disturbances in the system. Moreover, by using the Barrier Lyapunov Function (BLF) and the Prescribed Performance Function (PPF), the prescribed performance for system tracking and the constraints on system states were achieved. He Y [
16] designed a switched MIMO state observer to estimate unmeasurable system states and solved the problem of computational complexity in the backstepping process according to the command filter. When designing the Lyapunov function, the Barrier Lyapunov Function was adopted to limit the system states.
From a practical perspective, in the process of pursuing the achievement of expected control objectives, it is crucial to consider the associated costs. This includes the expenses incurred during the design, implementation, and maintenance stages of the controller, as well as the possible increase in production costs and the decrease in efficiency that may be caused by changes in the control strategy. Therefore, when formulating a control strategy, one cannot merely focus on the control effect but must also incorporate cost and efficiency factors into the comprehensive consideration to achieve the optimal balance between the control effect and economic benefits. In modern control systems, especially in networked control systems and distributed control systems, a large amount of data communication is required among multiple subsystems to achieve coordinated control. However, resources such as the bandwidth and transmission capacity of the communication network are often limited. The traditional time-triggered control method usually conducts data collection and control signal updates at a fixed sampling period, which will lead to a large amount of data transmission in the network, easily causing network congestion and reducing the real-time performance and reliability of the system. Event-triggered control, on the other hand, decides whether to perform data transmission and control actions according to the actual state changes of the system. Communication and control are only triggered when the system state meets specific triggering conditions, effectively reducing unnecessary data transmission and improving the utilization rate of communication resources. Heemels W P M H [
17] mainly introduced event-triggered control and self-triggered control. The former responds passively when the deviation between the state of the controlled object and the expected value exceeds the threshold, while the latter actively calculates the next operation time in advance. The differences between state feedback and output feedback in event-triggered control were also discussed, and how to implement these two types of control using existing wireless communication technologies was described. Their applications in the wireless control of the process industry were also mentioned. Girard A [
18] proposed a new class of dynamic event-triggered mechanisms, proved the stability of the closed-loop system under this mechanism, explored the influence of design parameters on the decay rate of the Lyapunov function, determined the lower limit of the execution interval time for linear systems, and studied the effect of parameters on the quadratic integral performance index. Xianming Zhang [
19] proposed an accumulative-error-based event-triggered control scheme for discrete-time linear systems, extended the looped functional method from continuous-time to discrete-time systems, derived LMI-based conditions for co-designing control gains and event-triggered parameters, applied the method to systems with input saturation to ensure convergence to a region of attraction, and validated the effectiveness through simulations of an unstable reactor and an inverted pendulum system. Xianming Zhang [
20] proposed an accumulated-state-error-based event-triggered sampling scheme for H-infinity control of sampled-data systems, proved the exclusion of Zeno behavior, constructed a novel looped-functional to establish stability and H-infinity performance criteria, co-designed the controller and event-triggering parameters via LMIs, and developed a self-triggered implementation strategy, validated through a batch reactor and an inverted pendulum system.
The existence of state constraints has a significant impact on the stability and performance of multi-agent systems (MASs). Moreover, saving communication resources also holds great significance in practical applications, especially when facing external disturbances such as network attacks. Currently, research that takes these several issues into account simultaneously remains largely unexplored, which brings broad research space and challenges to the relevant fields, especially when considering simultaneous constraints on system states, communication resources, and resilience against DoS attacks. The key challenges include:
Designing a detection mechanism that distinguishes between effective and ineffective DoS attacks without excessive communication.
Ensuring full-state constraints are not violated while maintaining tracking performance.
Reducing computational complexity in the controller design to facilitate real-time implementation.
Integrating event-triggering mechanisms to save communication resources without compromising stability.
Additionally, compared to existing methods such as those in [
3,
4,
5,
6,
7,
8,
9,
10,
11], this paper provides a more comprehensive framework that integrates DoS attack detection, event-triggered communication, and full-state constraints under a unified Lyapunov-based design. While references [
3,
8,
21] focus primarily on consensus under DoS attacks without explicit state constraints, and references [
15,
16] address state constraints without considering communication resources or attack resilience, our approach simultaneously tackles these challenges. Moreover, the proposed method distinguishes between effective and ineffective DoS attacks—a feature not commonly addressed in prior works that enhances practical applicability in real-world networked systems.
Compared with [
2,
5,
6,
7,
8,
15,
16,
17,
18], this paper includes the following innovations.
We design a Denial-of-Service (DoS) attack detection mechanism to counter DoS attacks against the controller of a multi-agent system. This mechanism incorporates an event-triggered mechanism to save system communication resources and mitigate the adverse consequences that may be brought about by network congestion.
A Barrier Lyapunov Function is designed, and a Prescribed Performance Function is added based on this function to limit the tracking error within the given prescribed function. This plays a very good role in the state constraint and control accuracy of the multi-agent system.
For the non-linear terms in the multi-agent system presented in this paper, fuzzy logic functions are used for processing. Moreover, to simplify the computational complexity, the dynamic surface technique is employed to handle the problem of differentiating the virtual control law during the use of the backstepping method. The dynamic surface technique approximates the derivative of the virtual controller with the aid of a first-order filter, thereby avoiding the direct differentiation of the virtual control law in the backstepping method. Specifically, by introducing a low-pass filter at each backstepping design stage, this filter can smoothly handle the changes in the virtual control law, effectively reducing the computational complexity. This approach not only simplifies the design process of the control law but also improves the real-time performance and stability of the control system, enabling the multi-agent system to operate more efficiently and reliably when facing complex tasks and environments.
2. Preliminary
2.1. Graph Theory
Graph theory is utilized to depict the interactions among agents in a network. The directed graph consists of a vertex set , an edge set , and an adjacency matrix . The nodes represent the followers, and an edge indicates information flow from agent i to agent j. The neighbor set of node i is denoted by . Each element of is defined as if and if . It is assumed that , and the topology is fixed. A directed graph has a spanning tree if there is a root node such that a directed path exists from the root to every other node in the graph. The Laplacian matrix is defined as if ; otherwise, . The degree matrix , where .
The leader adjacency matrix is defined as , where if and only if follower i can access the leader’s information; otherwise, . For the sake of simplicity, denote .
2.2. FLSs
To address the inherent unknown nonlinearities within the system, we will employ Fuzzy Logic Systems (FLSs). Fuzzy Logic Systems (FLSs) are often used to handle such nonlinear functions and have been shown to achieve good results, which are expressed as follows.
Rule:
then
where
and
denote fuzzy set. Moreover,
and
y represent the input and output of FLSs, respectively. Based on this, the FLS is described by
where
.
The fuzzy basis functions are defined as
where
. Denote
,
, then the equation can be rewritten as
2.3. Young’s Inequality
Lemma 1 ([
22])
. For any and , , , , and , the following inequality holds: Lemma 2 ([
22])
. Defining , when , the basis function satisfies the following: Lemma 3 ([
23])
. For any variable , such that the following inequality holds:where the constant . In this chapter, the target of the denial-of-service attack is to block the information transmission channels between internal components of the system, rendering the cooperative control strategy ineffective. Here, the denial-of-service attacks are categorized into effective attacks and ineffective attacks. We define
as the sequence of effective denial-of-service attacks, where
, and
is a natural number representing the total number of denial-of-service attacks. The time intervals for
l effective denial-of-service attacks are as follows:
is the duration of the
l effective denial-of-service attacks. An effective denial-of-service attack implies that there is at least one attempt to update the control input during the denial-of-service attack time interval.
We define
and
as the unions of effective and ineffective denial-of-service attacks, respectively.
For any
, it can be obtained that
Assumption 1 ([
8])
. For any , there exist and such that the inequality holds true. 2.4. Denial-of-Service (DoS) Attack Detection Mechanism
In this article, the mechanism of the TCP three-way handshake is borrowed. Through the request, response, and acknowledgment mode, it ensures that both communication parties have a consistent understanding of the connection status, thereby guaranteeing the subsequent reliable data transmission. The article involves the sending data signal (SDA) and the acknowledgment signal (ACK). The SDA is output by the sending-end component, and the ACK is output by the receiving-end component. Both of them are composed of high level (1) and low level (0). There are specific relationships between different signals. On the one hand, the value of the SDA is determined by specific conditions:
It is 0 when specific conditions are met, and 1 otherwise. At the same time, when the receiving end receives a low voltage level signal from the sending end, the SDA is 1, and it is 0 otherwise. On this basis, the value of
can be determined by the following signal states:
Furthermore, it can be concluded that , where represents the control input signal when there is an effective denial-of-service attack, represents the control input signal when there is no effective attack, and is the switching signal of the control input.
The SDA signal will change according to different mechanisms based on the system state. When the system is in a safe state, it follows the event-triggered mechanism; when it encounters an effective denial-of-service attack, it operates according to the periodic elastic mechanism. At the update moment , the SDA signal changes from a high level to a low level. After the receiving end receives the low-level SDA signal and updates the control input, the ACK signal changes from a low level to a high level. When the sending end receives the high-level ACK signal, the SDA signal changes back from a low level to a high level. After the operation is completed, the two respectively return to the high-level and low-level states. If the receiving end does not receive the low-level SDA signal, it means that the event-triggered condition is not met, or the event-triggered component is being effectively attacked. When both the SDA and ACK signals are at a low level, the detection mechanism is activated, and an attempt is made to update the control input at time intervals of .
The denial-of-service attack detection mechanism based on the SDA and ACK signals and the detection results are provided in
Table 1.
When it comes to the last situation, adopt a periodic update strategy, The SDA signal remains at a low level at intervals of , the detector checks the state of the event-triggered component at intervals of , and the event-triggered component is restored to a secure state when the channel becomes available again.
When under an ineffective denial-of-service attack, the relative threshold event-triggering mechanism is defined as follows:
wherein the event-triggering error
determines whether the control input
for an ineffective denial-of-service attack will be updated.
represents the intermediate transition control signal.
and
are parameters designed within the event-triggering mechanism.
Based on the above analysis, for the control input
, the controller update rules are defined as follows:
where
,
is a positive constant that determines the detection frequency of the detector.
2.5. System Construction
Inspired by graph theory, the communication mode of multi-agents is considered, and thus a multi-agent system with
N nodes is obtained. The mathematical model of the
i-th follower is as follows [
22]:
In which the state vector of the i-th follower is
, and its output signal is
.
is an unknown nonlinear function that cannot be described by a specific function among the followers.
is the control input that will be designed by the Lyapunov function later.
Assumption 2 ([
22])
. There exists a set of predefined constants . For , the following inequality holds:in which represents the Euclidean norm of a vector. Assumption 3 ([
22])
. The reference signal is a smooth function of time and can be transmitted to the root agent. Furthermore, it, along with its first and second derivatives with respect to time, are all bounded by known constants. Although Assumptions 1–3 are standard in the literature for ensuring system stability under DoS attacks, they may not cover more sophisticated threats such as deception attacks or unbounded disturbances. Future work could explore relaxing these assumptions by incorporating adaptive mechanisms or robust control techniques.
To ensure the clarity and systematic nature of the control strategy, the overall framework of the proposed adaptive event-triggered full-state constrained controller is first presented in
Figure 1. This framework integrates core modules such as DoS attack detection, an event-triggering mechanism, adaptive fuzzy control, and state constraint handling, forming a synergistic and organic whole.
5. Simulation Example
To validate the theoretical results, we need to construct a dynamic model of the single-link robotic arm shown in the
Figure 2 as the follower, then conduct simulation experiments.
The steps to perform this experiment are as follows:
where the angular displacement of the linkage and the motor shaft are
and
, the viscous friction constant is
and
, the armature current is
i, the armature voltage is
v, the inertia is
and
, the link mass is
M, the acceleration due to gravity is
g, the spring constant is
K, the torque constant is
, the center of gravity position of the link is
d, the back electromotive force (EMF) constant is
, the gear ratio is
N, and the armature resistance and inductance are
R and
L.
From the above formulas, we can determine that
We consider the multi-agent system in the figure, where agent 0 is the leader and agents 1, 2, and 3 are followers, with the communication topology shown in
Figure 3. The current leader–follower topology is simplified for clarity, but the proposed method can be extended to large-scale or directed graphs by leveraging graph-theoretic properties and distributed estimation techniques. The communication topology can be time-varying or switching, as long as the graph contains a directed spanning tree and the leader is reachable.
Leader trajectory:
, , , , , , , , , .
The initial states are as follows: , , and the other parameters are , , , , , , , , , , , , .
From the communication diagram, we have , . The simulation results are as follows.
Figure 4 shows the scenario where three agents track the trajectory of the leader.
Figure 5 displays the tracking errors between the three followers and the leader’s trajectory, respectively, as well as the performance function given in this paper. From
Figure 4,
Figure 5 and
Figure 6, it can be seen that the control strategy designed in this paper is very effective, and the system output error converges to a small neighborhood within a certain period of time.
Figure 7 and
Figure 8 present the control inputs and the update instants of the controller, respectively. These two figures indicate that the network attack detection mechanism and the event-triggered strategy designed in this paper have achieved good results.
From the simulation results, it can be observed that compared to conventional event-triggered mechanisms and the methods in [
3,
8], the proposed approach incorporates a relative threshold event-triggering condition and a DoS-aware update rule. This significantly reduces unnecessary controller updates and communication frequency, especially during ineffective DoS attacks, thereby alleviating network congestion and saving communication resources. Unlike methods that do not explicitly distinguish between effective and ineffective DoS attacks (e.g., [
3]), the proposed mechanism integrates a TCP-inspired DoS detection strategy. This allows the system to maintain stability and consistent tracking performance even under intermittent DoS attacks, enhancing resilience compared to typical event-triggered controls without attack adaptation. The combination of the Barrier Lyapunov Function (BLF) and Prescribed Performance Function (PPF) ensures that all state constraints are strictly satisfied and the tracking error converges to a predefined small neighborhood. In contrast, methods such as [
8] do not simultaneously address full-state constraints and prescribed performance under DoS attacks, which may lead to constraint violations or degraded accuracy.
6. Conclusions
We designed an innovative adaptive fuzzy state feedback control strategy, which was constructed for a special multi-agent system with unknown non-linear terms. This multi-agent system, composed of multiple non-linear systems, not only faces severe threats from network attacks but is also subject to full-state constraints and limitations of communication resources due to its extremely complex operating environment. When designing the controller, we adopted a distributed control algorithm. With the aid of the communication graph, the controller can obtain key information from neighboring nodes. This information interaction method enables the subsystems in the multi-agent system to flexibly adjust their own control strategies according to the states of surrounding nodes, thus operating better in a changeable network environment.
In addressing the crucial issue of network attacks, especially for the currently extremely common Denial-of-Service (DoS) attacks, inspired by the three-way handshake mechanism of the TCP network protocol, we designed a reliable DoS attack detection mechanism. This mechanism is based on the logical relationship between the voltage level signals output by the controller and actuator components. Moreover, this mechanism incorporates an event-triggered mechanism, which can effectively reduce the communication frequency between the controller and the actuator. In the past, frequent communication not only consumed a large amount of resources but also easily aggravated network congestion when suffering from DoS attacks. The application of this mechanism has successfully alleviated the network congestion problem caused by DoS attacks, ensuring that the control system can still maintain stable operation even under malicious network interference, guaranteeing the reliability and continuity of the system.
Regarding the problem of full-state constraints, when constructing the Lyapunov function, this paper innovatively introduces the Barrier Lyapunov Function and integrates the performance function, enabling the signals of the multi-agent system to be constrained within the given performance function interval.
Finally, to verify the effectiveness of the proposed method in the multi-agent system, this paper applies the Lyapunov stability theorem. Through theoretical derivation and analysis, it is proven that the outputs of all followers in the system can be consistent with the output of the leader. Meanwhile, the tracking error is successfully confined within a relatively small neighborhood. This conclusion has also been verified via MATLAB simulation. This result fully demonstrates that the designed control method has high-performance and high-precision characteristics in practical applications, can meet the strict requirements of practical engineering for system stability and control accuracy, and provides valuable theoretical support and technical reference for engineering practices in related fields.
In terms of controller design, the adaptive fuzzy event-triggered control strategy adopted in this paper demonstrates satisfactory asymptotic stability and resource efficiency under DoS attacks and state constraints. However, its convergence rate depends on the initial state, and the convergence time cannot be predetermined. In contrast, the fixed-time nonlinear feedback control proposed by Polyakov [
26] achieves strong robustness and convergence within a preset fixed time, independent of initial conditions, by leveraging bi-limit homogeneity and a polynomial feedback structure. Furthermore, the distributed fixed-time control strategy applied by Ning [
27] in microgrids exemplifies the effectiveness of this control method in multi-agent coordination, along with its adaptability to communication delays and topological changes. In future work, we will draw on the fixed-time control design methodologies from references [
26,
27] to extend the current asymptotic controller into a fixed-time controller with faster convergence, stronger robustness, and a convergence time independent of initial conditions. This enhancement will be particularly suited for application scenarios requiring higher security and real-time performance.Additionally, we will explore distributed implementation under time-varying topologies, integration of machine learning techniques into fuzzy approximation, and practical applications in the field of UAV formation control.