Next Article in Journal
Energy Absorption and Damage Analysis of Fragments in High-Speed Impact on Composite Honeycomb Sandwich Structures
Previous Article in Journal
Enhancing Agile Story Point Estimation: Integrating Deep Learning, Machine Learning, and Natural Language Processing with SBERT and Gradient Boosted Trees
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Group Consensus Using Event-Triggered Control for Second-Order Multi-Agent Systems under Asynchronous DoS Attack

School of Science, Jiangnan University, Wuxi 214122, China
*
Author to whom correspondence should be addressed.
These authors contributed equally to this work.
Appl. Sci. 2024, 14(16), 7304; https://doi.org/10.3390/app14167304
Submission received: 7 July 2024 / Revised: 13 August 2024 / Accepted: 17 August 2024 / Published: 19 August 2024

Abstract

:
This paper explores the group consensus problem of second-order multi-agent systems (MAS) under asynchronous denial-of-service (DoS) attacks. Asynchronous DoS attacks involve the interruption of certain communication links, allowing the MAS to be reimagined as a switching system with a persistent dwell time (PDT). The agents in each group can be divided into three types, which are inter-act agents, intra-act agents with zero in-degree, and other agents. Then, according to the properties of the different agents, suitable agents are pinned. By leveraging the concepts of switching topology and the PDT, a suitable event-triggered control protocol is designed, along with the establishment of conditions to ensure the group consensus of the MAS. Moreover, through the construction of topology-dependent Lyapunov functions, the achievement of group consensus within the MAS under asynchronous DoS attacks is demonstrated. Subsequently, a numerical example is presented to validate the effectiveness of the proposed results.

1. Introduction

In recent years, the consensus problem has gained significant attention within the field of multi-agent systems, owing to its extensive applications across various domains, including formation control [1,2,3], flocking behavior [4,5], and collaborative decision-making processes [6,7]. The primary objective in addressing the consensus problem is to develop an efficient control protocol that ensures all agents converge on a collectively agreed-upon value through iterative local information exchanges with their neighboring agents [8,9,10,11,12]. Generally, there are two approaches for multi-agent systems to achieve consensus: leader-following and leaderless consensus. The leader-following approach allows all followers to converge to the trajectory of a designated leader, thereby utilizing the leader’s state as the target for control. This method facilitates the achievement of prescribed behaviors among all agents and is widely applied in practical scenarios.
The exchange of information between agents occurs through wireless networks, which are inherently vulnerable to cyber-attacks. This vulnerability is particularly concerning in the context of information exchange, as cyber-attacks can manifest in various forms, including false data injection attacks [13,14] and repay attacks [15,16]. Notably, denial-of-service (DoS) attacks are a prevalent type of cyber-attack that can cause significant disruptions in information transmission across networks. Consequently, considerable research efforts have been directed towards establishing consensus in networked systems under the threat of DoS attacks, with the goal of maintaining operational integrity and ensuring communication reliability in these challenging environments [17,18,19].
To achieve consensus in multi-agent systems, various strategies such as containment control [20,21], tracking control [22,23,24], and observer-based control mechanisms [25,26] have been explored and implemented. Each of these approaches plays a distinct role in advancing the overarching goal of attaining systemic consensus within multi-agent environments. However, these control methods are predominantly continuous, which poses practical challenges in real-world applications. Consequently, addressing the constraints imposed by limited resources emerges as a critical issue that necessitates resolution. A promising strategy that offers a resource-efficient alternative is event-triggered control. This methodology predicates the updating and transmission of control signals based on specific events, defined by the violation of pre-established event-triggered thresholds. By employing a selective update mechanism, the frequency of control signal adjustments is inherently reduced, thereby optimizing resource utilization and significantly extending the operational lifespan of network components. In recent years, there has been a notable increase in scholarly investigations focused on the development of event-triggered control protocols, particularly regarding their applicability to systems characterized by both linear [27,28,29,30] and nonlinear [31,32] dynamics. These studies, tailored to various multi-agent systems, utilize system state errors to design the event-triggered function, demonstrating effective resource conservation.
Pinning control is a technique employed in multi-agent systems to tackle the challenges associated with implementing controllers across all nodes, particularly in the context of resource constraints. This method involves applying local feedback to a carefully selected subset of nodes, thereby reducing the number of controlled nodes while still achieving the desired consensus dynamics. Extensive research has been dedicated to refining consensus protocols for multi-agent systems, building upon the foundational concept of pinning control. For example, ref. [33] investigated the consensus of switching multi-agent systems through the application of pinning control, while ref. [34] established several consensus conditions specifically for bipartite consensus in multi-agent systems. Furthermore, to address the complexities of cooperative–competitive networks, ref. [35] derived exponential finite-time couple-group consensus conditions for agents.
In scenarios involving group consensus, agents are organized into subgroups during cooperative tasks, enabling synchronization of states among agents within the same subgroup, while those in different groups operate independently. This notion of group consensus serves not only as a theoretical framework but also reflects natural phenomena, such as the coordinated movement observed in bird flocks and collaborative behaviors in multi-species hunting scenarios. These real-world examples underscore the practical relevance and applicability of group consensus models in understanding and designing complex multi-agent systems. Consequently, there has been a significant research focus on developing group consensus protocols. Notably, ref. [36] introduced a novel group consensus protocol tailored for heterogeneous multi-agent systems, while ref. [37] established effective group consensus conditions for systems subject to additive noise. Additionally, ref. [38] explored finite-time group consensus for second-order multi-agent systems with input saturation, further contributing to the body of knowledge in this area.
However, to the best of the authors’ knowledge, there is little research on the group consensus of second-order multi-agent systems under consecutive asynchronous DoS attacks. In this study, the group consensus issue in second-order multi-agent systems under consecutive asynchronous DoS attacks is examined. The paper outlines several significant contributions to the field, as presented below:
  • In this discussion, we focus on asynchronous DoS attack. Different types of DoS attacks may occur during the attack phase, resulting in consecutive changes to the communication topology. Compared with other existing research on DoS attacks, there is little research on asynchronous DoS attacks, which is more practical.
  • Some group consensus conditions will be proposed based on switched theory with persistent dwell time. Compared with [39], the system considered in this paper is a second-order multi-agent system, which is more practical. Furthermore, ref. [39] studied normal leader-following consensus; however, we study group consensus in this paper, which is more complex.
  • In the DoS phase, MAS can be considered to be a switched system. An event-triggered controller will be developed to promote group consensus in an attack environment, leading to efficient resource utilization.
The rest of this paper is organized as follows. In Section 2, some preliminary theories and model descriptions are given. In Section 3, the main results about the group consensus of multi-agent systems are discussed. In Section 4, a simulation example is given to demonstrate the correctness of results. Finally, a conclusion is given in Section 5.

2. Preliminaries

2.1. Graph Theory and Notations

For the convenience of the following discussion, some notations will be used throughout this paper. R n denotes the n dimensional Euclidean space. R m × n denotes an m × n real matrix space. I n and 0 n denote an n dimensional identity matrix and a zero matrix, respectively. The term 1 n denotes an n dimensional column vector with all ones. For any symmetric matrix P, P < 0 means P is a negative definite matrix, and P > 0 means P is a positive definite matrix. The superscript ‘T’ means the transpose. The Kronecker product of matrices X and Y is denoted as X Y . In this paper, if not clearly stated, matrices are assumed to have compatible dimensions.
Throughout this paper, the networked system topology is represented by a weighted directed graph G = ( V , ε , A ) with the set of nodes V = { v 1 , v 2 , , v N } , the set of directed edges ε V × V , and a weighted adjacency matrix A = ( a i j ) N × N , whose entry a i j denotes connection and weight between agents v i and v j . If node v j can receive information from node v i , then a i j > 0 ; otherwise, a i j = 0 . The in-degree and out-degree of node i are defined as d e g i n ( i ) = j = 1 , j i N a j i and d e g o u t ( i ) = j = 1 , j i N a i j , respectively, and the Laplacian matrix L = ( l i j ) N × N is defined as l i j = a i j , i j , l i i = j = 1 , j i N a i j .
In this paper, we will split N agents into r groups ( r 2 ) . That means V = k = 1 r V k and V p V q = 0 for different p and q  ( p q ) . Let the symbol V k i denote the group to which the ith agent belongs. Further, the number of groups is the same as the number of virtual leaders.
The network topology in this paper we consider to be directed and weakly connected. Firstly, we learn some concepts related to inter-act agents and intra-act agents. Agent i is said to be an inter-act agent if i belongs to V ˜ k i , in which agent i can receive information from other groups. An agent that can only exchange information among agents in the group in which the agent belongs is said to be an intra-act agent. The set of intra-act agents is signed as V k i V ˜ k i .

2.2. Model Description

In this paper, we consider a nonlinear second-order multi-agent system with N agents:
x ˙ i ( t ) = v i ( t ) ,   v ˙ i ( t ) = f ( x i ( t ) , v i ( t ) ) + u i ( t ) . ( i = 1 , 2 , , N )
where x i ( t ) , v i ( t ) R n denote the position and velocity, respectively, of the ith agent, u i ( t ) R n is the designed control input, and f ( x i ( t ) , v i ( t ) ) is a nonlinear vector-valued continuous function describing the dynamics of agent i. The virtual leader of each group for multi-agent system (1) can be described by the following model:
  x ¯ ˙ k i ( t ) = v ¯ k i ( t ) ,   v ¯ ˙ k i ( t ) = f ( x ¯ k i ( t ) , v ¯ k i ( t ) ) . ( i = 1 , 2 , , N )
where x ¯ i ( t ) , v ¯ i ( t ) R n are the position and velocity, respectively, of the ith virtual leader.
Definition 1. 
The second-order group consensus in multi-agent systems (1) and (2) is said to be achieved if for any initial condition, the solutions of (1) and (2) satisfy
lim t | | x i ( t ) x ¯ k i ( t ) | | = 0 , lim t | | v i ( t ) v ¯ k i ( t ) | | = 0 .
Assumption A1. 
For the nonlinear function f ( x i ( t ) , v i ( t ) ) , there exist positive constants l 1 , l 2 such that for any x 1 , x 2 , y 1 , y 2 R n , the following inequality holds:
| | f ( x 1 , v 1 ) f ( x 2 , v 2 ) | | l 1 | | x 1 x 2 | | + l 2 | | v 1 v 2 | |
Lemma 1 
([40]). We have the following linear matrix inequality
S 11 S 12 S 21 S 22 > 0
where S 11 T = S 11 , S 22 T = S 22 , S 12 T = S 21 is equivalent to one of the following conditions:
(1) 
S 11 > 0 , S 22 S 21 S 11 1 S 12 > 0 ,
(2) 
S 22 > 0 , S 11 S 12 S 22 1 S 21 > > 0 .

3. Main Results

Now we are in a position to present a consensus protocol based on a pinning-event-triggered control approach to ensure that agents in each group can asymptotically follow the corresponding virtual leader.
Suppose the system error in each group is
x ˜ i ( t ) = x i ( t ) x ¯ k i ( t ) , v ˜ i ( t ) = v i ( t ) v ¯ k i ( t ) , i = 1 , 2 , , N
DoS attacks can be divided into synchronous attacks or asynchronous attacks according to the attack method. A synchronous attack means that all communication links are interrupted simultaneously. An asynchronous attack means only part of the communication links are interrupted. In this paper, an asynchronous DoS attack is considered, and the sleep phase of an asynchronous DoS attack is regarded as the τ -portion, and the activation phase is regarded as the T-portion.
Consecutive asynchronous attacks will destroy parts of communication links; thus, they may lead to the system switching among different communication topologies during the attack phase. Further, at the end of the attack, the MAS can return to the original topology. It is assumed that there are β types of asynchronous DoS attacks. Then, let the piecewise constant function δ ( t ) : [ 0 , ] Θ = { 0 , 1 , 2 , , β } denote the switching signal. When δ ( t ) = 0 , there is no DoS attack. When δ ( t ) = m , m { 1 , 2 , , β } , it denotes the appearance of the mth DoS attack. Inspired by [41], the following definition of an asynchronous attack is given.
Definition 2. 
A positive constant τ D is called the persistent dwell time (PDT) if there is an infinite number of disjoint intervals with lengths no smaller than τ D on which δ ( t ) is constant and consecutive intervals with this property are separated by no more than T, which is called the period of persistence.
Remark 1. 
In practice, an attacker’s energy is limited due to finite resources. The activation time of a DoS attack may have an upper bound. Moreover, there exists a limited number of DoS attacks. Thus, it is rational to introduce the length T and attack frequency f to limit the number of attacks during the attack time.
In this paper, the time instant of consecutive DoS attacks is as shown in Figure 1. As the figure shows, [ t s l , t s l + 1 ) stands for lth stage, and the DoS attack starts at t s l + 1 . During the τ -portion [ t s l , t s l + 1 ) , there is no DoS attack, and the communication topology is represented by G 0 . During the T-portion [ t s l + 1 , t s l + 1 ) , the MAS is under a consecutive asynchronous DoS attack, where t s l + 1 , t s l + 2 , , t s l + 1 mean the DoS instants. The communication topology of this period is represented by G m . Further, the length of the T-portion is represented by T l T , and the frequency of the T-portion is represented by f l = N ( t s l + 1 , t s l + 1 ) / T l f , where N ( t s l + 1 , t s l + 1 ) stands for the switching number during [ t s l + 1 , t s l + 1 ) . When the DoS attack ends, the communication topology will be restored to the original topology from t s l + 1 .
Let time sequence { t k i } ( k = 1 , 2 , ; i = 1 , 2 , , N ) denote the kth event trigger of the ith agent, and inspired by the pinning-event-triggered scheme, the control u i ( t ) for a multi-agent system can be designated as
u i ( t ) =   c j = 1 N a i j δ ( t ) [ x j ( t k i ) x i ( t k i ) + v j ( t k i ) v i ( t k i ) ] c d i δ ( t ) [ x i ( t k i ) x ¯ k i ( t k i ) + v i ( t k i ) v ¯ k i ( t k i ) ] + c j = 1 N l i j δ ( t ) ( x ¯ k j ( t k i ) + v ¯ k j ( t k i ) ) , i V ˜ k i   c j = 1 N a i j δ ( t ) [ x j ( t k i ) x i ( t k i ) + v j ( t k i ) v i ( t k i ) ] c d i δ ( t ) [ x i ( t k i ) x ¯ k i ( t k i ) + v i ( t k i ) v ¯ k i ( t k i ) ] , i V k i V ˜ k i a n d deg ( i ) in = 0 c j = 1 N a i j δ ( t ) [ x j ( t k i ) x i ( t k i ) + v j ( t k i ) v i ( t k i ) ] , i V k i V ˜ k i a n d deg ( i ) in 0
where c > 0 denotes the coupling strength, a i j δ ( t ) denotes the communication link of agent i when the communication topology changes into G δ ( t ) , and d i δ ( t ) > 0 denotes the pinning control gain of agent i when the communication topology changes into G δ ( t ) .
Remark 2. 
It is important to point out that when δ ( t ) = 0 , there is no DoS attack. If agent i is an intra-act agent, one has j = 1 N l i j 0 ( x ¯ k j ( t k i ) + v ¯ k j ( t k i ) ) = 0 . When the DoS attack occurs, we do not divide the group again; thus, l i j δ ( t ) = l 0 or l i j δ ( t ) = 0 , so we can still obtain j = 1 N l i j δ ( t ) ( x ¯ k j ( t k i ) + v ¯ k j ( t k i ) ) = 0 ,   i V k i V ˜ k i . Then u i ( t ) can be simplified into u i ( t ) = c ( j = 1 N l i j δ ( t ) ( x ˜ j ( t k i ) + v ˜ j ( t k i ) ) + d i δ ( t ) ( x ˜ i ( t k i ) + v ˜ i ( t k i ) ) ) .
Suppose Φ i δ ( t ) ( t ) = j = 1 N l i j δ ( t ) ( x ˜ j ( t ) + v ˜ j ( t ) ) + d i δ ( t ) ( x ˜ i ( t ) + v ˜ i ( t ) ) ; define e i δ ( t ) ( t ) = Φ i δ ( t ) ( t k i ) Φ i δ ( t ) ( t ) ; then choose the event trigger function as
g i δ ( t ) ( t ) = | | e i δ ( t ) ( t ) | | 2 α | | Φ i δ ( t ) ( t ) | | 2
where α > 0 is a positive constant. If g i δ ( t ) ( t ) 0 , then x i ( t k i ) will update to x i ( t k + 1 i ) , which can be expressed as follows:
t k + 1 i = i n f { t > t k i | g i δ ( t ) ( t ) 0 }
According to (1) and (2), by the use of the Kronecker product, we can obtain the compact form
x ˜ ˙ ( t ) = v ˜ ( t ) , v ˜ ˙ ( t ) = f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) c [ ( ( L δ ( t ) + D δ ( t ) ) I n ) ( x ˜ ( t ) + v ˜ ( t ) ) + e δ ( t ) ( t ) ] .
where
  f ( x ( t ) , v ( t ) ) = [ f T ( x 1 ( t ) , v 1 ( t ) ) , , f T ( x N ( t ) , v N ( t ) ) ] T ,   f ( x ¯ ( t ) , v ¯ ( t ) ) = [ f T ( x ¯ k 1 ( t ) , v ¯ k 1 ( t ) ) , , f T ( x ¯ k N ( t ) , v ¯ k N ( t ) ) ] T ,   x ˜ ( t ) = [ x ˜ 1 T ( t ) , , x ˜ N T ( t ) ] T , v ˜ ( t ) = [ v ˜ 1 T ( t ) , , v ˜ N T ( t ) ] T .
Based on the above analysis, we have the following theorem:
Theorem 1. 
For given non-zero scalars μ 1 > 1 , μ 2 > 1 , 0 < μ 3 < 1 , prescribed period of persistence T , and frequency f , if there exist matrices Q m > 0 , Q n > 0 , m , n { 1 , 2 , 3 , , β } , m n such that the following conditions hold:
(1). 
( δ + c 2 ) I N c L ¯ 0 c D + 2 c α ( H 0 ) T H 0 < 0 ;
(2). 
Γ m μ 1 Ω , Q m μ 2 Q n , Ω μ 3 Γ m ;
(3). 
PDT satisfies τ D > ( T f + 1 ) l n μ + ρ 2 T ρ 1 .
where L ¯ 0 = L 0 + ( L 0 ) T 2 , H δ ( t ) = L δ ( t ) + D δ ( t ) , μ = m a x { μ 1 , μ 2 , μ 3 } , δ = m a x { 3 l 1 + l 2 2 , 3 l 2 + l 1 2 + 1 } , and Ω , Γ m , ρ 1 , ρ 2 will be given in the proof,
then MAS (1) and (2) can achieve group consensus.
Proof. 
From condition (1), we can see that
δ I N c L ¯ 0 c D 0 < 0
since δ > 1 ; thus,
c L ¯ 0 + c D 0 I N 2 > 0
 □
According to Lemma 1, we have
c ( L 0 + ( L 0 ) T ) + 2 c D 0 I N I N I N > 0
When there is no DoS attack, namely, t [ t s l , t s l + 1 ) , and we assume that there are n event-triggered time instants, denoted by { t 1 i , t 2 i , , t n i } , when t [ t k i , t k + 1 i ) , we choose the positive definite Lyapunov function as follows:
V 0 ( t ) = 1 2 ξ T ( t ) ( c ( L 0 + ( L 0 ) T ) + 2 c D 0 I N I N I N I n ) ξ ( t )
where ξ ( t ) = [ x ˜ T ( t ) , v ˜ T ( t ) ] T .
Further, based on Assumption 1 and Young’s inequality, we can obtain
| | x ˜ ( t ) | | · | | f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) | | l 1 | | x ˜ ( t ) | | · | | x ˜ ( t ) | | + l 2 | | x ˜ ( t ) | | · | | v ˜ ( t ) | |   l 1 x ˜ T ( t ) x ˜ ( t ) + l 2 2 ( x ˜ T ( t ) x ˜ ( t ) + v ˜ T ( t ) v ˜ ( t ) )   = ( l 1 + l 2 2 ) x ˜ T ( t ) x ˜ ( t ) + l 2 2 v ˜ T ( t ) v ˜ ( t ) .
At the same time, one can obtain that
x ˜ T ( t ) ( f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) ) | | x ˜ ( t ) | | · | | f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) | | ; thus, we have x ˜ T ( t ) ( f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) ) ( l 1 + l 2 2 ) x ˜ T ( t ) x ˜ ( t ) + l 2 2 v ˜ T ( t ) v ˜ ( t ) . Similarly, we can obtain v ˜ T ( t ) ( f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) ) l 1 2 x ˜ T ( t ) x ˜ ( t ) + ( l 1 2 + l 2 ) v ˜ T ( t ) v ˜ ( t ) .
Calculate the derivative of Lyapunov function as
V ˙ 0 ( t ) = x ˜ T ( t ) v ˜ T ( t ) ( c ( L 0 + ( L 0 ) T ) + 2 c D 0 I N I N I N I n )   v ˜ ( t ) f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) ( c ( L 0 + D 0 ) I n ) ( x ˜ ( t ) + v ˜ ( t ) ) c e 0 ( t ) = x ˜ T ( t ) ( ( c ( L 0 + ( L 0 ) T ) + 2 c D 0 ) I n ) v ˜ ( t ) + x ˜ T [ f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) ]   x ˜ T ( t ) ( c ( L 0 + D 0 ) I n ) ( x ˜ ( t ) + v ˜ ( t ) ) c x ˜ T ( t ) e 0 ( t ) + v ˜ T ( t ) v ˜ ( t )   + v ˜ T ( t ) [ f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) ] v ˜ T ( t ) ( c ( L 0 + D 0 ) I n ) ( x ˜ ( t ) + v ˜ ( t ) ) c v ˜ T ( t ) e 0 ( t ) x ˜ T ( t ) ( ( c ( L 0 + ( L 0 ) T ) + 2 c D 0 ) I n ) v ˜ ( t ) + ( l 1 + l 2 2 ) x ˜ T ( t ) x ˜ ( t ) + l 2 2 v ˜ T ( t ) v ˜ ( t )   x ˜ T ( t ) ( c ( L 0 + D 0 ) I n ) x ˜ ( t ) x ˜ T ( t ) ( c ( L 0 + D 0 ) I n ) v ˜ ( t ) c x ˜ T ( t ) e 0 ( t ) + v ˜ T ( t ) v ˜ ( t )   + l 1 2 x ˜ T ( t ) x ˜ ( t ) + ( l 2 + l 1 2 ) v ˜ T ( t ) v ˜ ( t ) v ˜ T ( t ) ( c ( L 0 + D 0 ) I n ) x ˜ ( t )   v ˜ T ( t ) ( c ( L 0 + D 0 ) I n ) v ˜ ( t ) c v ˜ T ( t ) e 0 ( t ) = x ˜ T ( t ) [ ( ( 3 l 1 + l 2 2 ) I N c L ¯ 0 c D 0 ) I n ] x ˜ ( t ) c x ˜ T e 0 ( t ) c v ˜ T e 0 ( t )   + v ˜ T ( t ) [ ( ( 3 l 2 + l 1 2 + 1 ) I N c L ¯ 0 c D 0 ) I n ] v ˜ ( t )
According to the event-triggered condition, we can obtain
c x ˜ T ( t ) e 0 ( t ) = c i = 1 N x ˜ i T ( t ) e i 0 ( t ) c i = 1 N | | x ˜ i ( t ) | | · | | e i 0 ( t ) | | c 2 ( i = 1 N x ˜ i T ( t ) x ˜ i ( t ) + i = 1 N ( e i 0 ( t ) ) T e i 0 ( t ) )   = c 2 ( x ˜ T ( t ) x ˜ ( t ) + ( e 0 ( t ) ) T e 0 ( t ) ) c 2 ( x ˜ T ( t ) x ˜ ( t ) + α ( Φ 0 ) T ( t ) Φ 0 ( t ) )   = c 2 ( x ˜ T ( t ) x ˜ ( t ) + α ( x ˜ T ( t ) + v ˜ T ( t ) ) ( ( H 0 ) T H 0 I n ) ( x ˜ ( t ) + v ˜ ( t ) ) )   c 2 x ˜ T ( t ) x ˜ ( t ) + c α x ˜ T ( t ) ( ( H 0 ) T H 0 I n ) x ˜ ( t ) + c α v ˜ T ( t ) ( ( H 0 ) T H 0 I n ) v ˜ ( t )
where Φ 0 ( t ) = [ ( Φ 1 0 ) T ( t ) , ( Φ 2 0 ) T ( t ) , , ( Φ N 0 ) T ( t ) ] T . Similarly, we can obtain
c v ˜ T ( t ) e 0 ( t ) c 2 v ˜ T ( t ) v ˜ ( t ) + c α x ˜ T ( t ) ( ( H 0 ) T H 0 I n ) x ˜ ( t ) + c α v ˜ T ( t ) ( ( H 0 ) T H 0 I n ) v ˜ ( t )
Thus, we have
V 0 ˙ ( t ) x ˜ T ( t ) [ ( ( 3 l 1 + l 2 2 ) I N c L ¯ 0 c D 0 ) I n ] x ˜ ( t )   + v ˜ T ( t ) [ ( ( 3 l 2 + l 1 2 + 1 ) I N c L ¯ 0 c D 0 ) I n ] v ˜ ( t )   + c 2 x ˜ T ( t ) x ˜ ( t ) + c 2 v ˜ T ( t ) v ˜ ( t ) + 2 c α x ˜ T ( t ) ( ( H 0 ) T H 0 I n ) x ˜ ( t ) + 2 c α v ˜ T ( t ) ( ( H 0 ) T H 0 I n ) v ˜ ( t ) = x ˜ T ( t ) [ ( ( 3 l 1 + l 2 2 + c 2 ) I N c L ¯ 0 c D + 2 c α ( H 0 ) T H 0 ) I n ] x ˜ ( t )   + v ˜ T ( t ) [ ( ( 3 l 2 + l 1 2 + 1 + c 2 ) I N c L ¯ 0 c D 0 + 2 c α ( H 0 ) T H 0 ) I n ] v ˜ ( t )
Because δ = m a x { 3 l 1 + l 2 2 , 3 l 2 + l 1 2 + 1 } , we obtain
V 0 ˙ ( t ) x ˜ T ( t ) [ ( ( δ + c 2 ) I N c L ¯ 0 c D 0 + 2 c α ( H 0 ) T H 0 ) I n ] x ˜ ( t ) + v ˜ T ( t ) [ ( ( δ + c 2 ) I N c L ¯ 0 c D 0 + 2 c α ( H 0 ) T H 0 ) I n ] v ˜ ( t )
Let
Ψ = c L ¯ 0 + c D 0 ( δ + c 2 ) I N 2 c α ( H 0 ) T H 0 0 0 c L ¯ 0 + c D 0 ( δ + c 2 ) I N 2 c α ( H 0 ) T H 0
According to condition (1), we can have Ψ > 0 , so λ m i n ( Ψ ) > 0 ; therefore, we have
V 0 ˙ ( t ) λ m i n ( Ψ ) ξ T ( t ) ξ ( t )
For the convenience of the following discussion, we let
Ω = c ( L 0 + ( L 0 ) T ) + 2 c D 0 I N I N I N
then we obtain V 0 ( t ) = 1 2 ξ T ( t ) Ω ξ ( t ) , so λ m i n ( Ω ) 2 ξ T ( t ) ξ ( t ) V 0 ( t ) λ m a x ( Ω ) 2 ξ T ( t ) ξ ( t ) .
Thus, we have
V 0 ˙ ( t ) 2 λ m i n ( Ψ ) λ m a x ( Ω ) V 0 ( t )
Let ρ 1 = 2 λ m i n ( Ψ ) λ m a x ( Ω ) , then ρ 1 > 0 , and V ˙ 0 ( t ) ρ 1 V 0 ( t ) , t [ t k i , t k + 1 i ) . Then we can obtain
  V 0 ( t ) e ρ 1 ( t t n i ) V 0 ( t n i ) , t [ t n i , t s l + 1 )   V 0 ( t n i ) e ρ 1 ( t n i t n 1 i ) V 0 ( t n 1 i )
Thus, we can obtain
V 0 ( t ) e ρ 1 ( t t n i ) V 0 ( t n i )   e ρ 1 ( t t n 1 i ) V 0 ( t n 1 i )     e ρ 1 ( t t s l ) V 0 ( t s l )
When the system is under a consecutive asynchronous attack, namely, t [ t s l + 1 , t s l + 1 ) , the communication topology is switching; thus, we choose the Lyapunov function as follows:
V δ ( t ) ( t ) = 1 2 ξ T ( t ) ( Q δ ( t ) 0 0 Q δ ( t ) I n ) ξ T ( t )
Similarly, we assume that there are p event-triggered time instants, denoted by
{ t 1 i , t 2 i , , t p i } , when δ ( t ) = m . For convenience, let Γ m = Q m 0 0 Q m . When t [ t k i , t k + 1 i ) , calculate the derivative as
V ˙ m = x ˜ T ( t ) v ˜ T ( t ) ( Q m 0 0 Q m I n )   v ˜ ( t ) f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) c [ ( ( L m + D m ) I n ) ( x ˜ ( t ) + v ˜ ( t ) ) + e m ( t ) ] = x ˜ T ( t ) ( Q m I n ) v ˜ ( t ) + v ˜ T ( t ) ( Q m I n ) ( f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) )   c v ˜ ( t ) ( Q m I n ) e m ( t ) c v ˜ ( t ) ( Q m I n ) ( ( L m + D m ) I n ) ( x ˜ ( t ) + v ˜ ( t ) )
Similar to the analysis when there is no DoS attack, we can obtain
V ˙ m 1 2 ( x ˜ T ( t ) ( Q m I n ) x ˜ ( t ) + v ˜ T ( t ) ( Q m I n ) v ˜ ( t ) ) + l 1 2 x ˜ T ( t ) ( Q m I n ) x ˜ ( t )   + ( l 1 2 + l 2 ) v ˜ T ( t ) ( Q m I n ) v ˜ ( t ) + c α λ m a x ( Q m ) x ˜ T ( t ) ( H δ ( t ) ) T H m x ˜ ( t )   + c α λ m a x ( Q m ) v ˜ T ( t ) ( H m ) T H m v ˜ ( t ) + c 2 v ˜ T ( t ) ( Q m I n ) v ˜ ( t )   + c 2 x ˜ T ( t ) ( Q m H m I n ) x ˜ ( t ) c 2 v ˜ T ( t ) ( Q m H m I n ) v ˜ ( t )
The DoS attack considered here is effective. Therefore, Q m H m is semi-positive. So we can obtain
V ˙ m ( t ) 1 2 ( x ˜ T ( t ) ( Q m I n ) x ˜ ( t ) + v ˜ T ( t ) ( Q m I n ) v ˜ ( t ) ) + l 1 2 x ˜ T ( t ) ( Q m I n ) x ˜ ( t )   + ( l 1 2 + l 2 ) v ˜ T ( t ) ( Q m I n ) v ˜ ( t ) + c α λ m a x ( Q m ) x ˜ T ( t ) ( ( H m ) T H m I n ) x ˜ ( t )   + c α λ m a x ( Q m ) v ˜ T ( t ) ( ( H m ) T H m I n ) v ˜ ( t ) + c 2 v ˜ T ( t ) ( Q m I n ) v ˜ ( t )   + c 2 x ˜ T ( t ) ( Q m H m I n ) x ˜ ( t )
Let
K = 1 + l 1 2 Q m + c α λ m a x ( Q m ) ( H m ) T H m + c 2 Q m H m 0 0 1 + l 1 + 2 l 2 + c 2 Q m + c α λ m a x ( Q m ) ( H m ) T H m
Then we can obtain
V ˙ m ( t ) ξ T ( t ) ( K I n ) ξ ( t )
Meanwhile, it is clear that V ˙ m ( t ) λ m a x ( K ) ξ T ( t ) ξ ( t ) and 1 2 λ m i n ( Q m ) ξ T ( t ) ξ ( t ) V m ( t ) 1 2 λ m a x ( Q m ) ξ T ( t ) ξ ( t ) , so we can obtain V ˙ m ( t ) 2 λ m a x ( K ) λ m i n ( Q m ) V m ( t ) . Let ρ 2 = 2 λ m a x ( K ) λ m i n ( Q m ) , then ρ 2 > 0 and V ˙ m ( t ) ρ 2 V m ( t ) , t [ t k i , t k + 1 i ) . We suppose that when δ ( t ) = m , t [ t s l + m , t s l + m + 1 ) . Then we have
  V m ( t ) e ρ 2 ( t t p i ) V m ( t p i ) , t [ t p i , t s l + m + 1 )   V m ( t p i ) e ρ 2 ( t p i t p 1 i ) V m ( t p 1 i )
Thus, we can obtain
V m ( t ) e ρ 2 ( t t p i ) V m ( t p i )   e ρ 2 ( t t p 1 i ) V m ( t p 1 i )     e ρ 2 ( t t s l + m ) V m ( t s l + m )
When t [ t s l + 1 1 , t s l + 1 ) , we can obtain
V δ ( t ) ( t ) e ρ 2 ( t t s l + 1 1 ) V δ ( t s l + 1 1 ) ( t s l + 1 1 )
According to condition (2), one has
V δ ( t s l + 1 1 + ) ( t s l + 1 1 + ) μ 2 V δ ( t s l + 1 1 ) ( t s l + 1 1 )
Because V δ ( t ) ( t ) is a right-continuous function, then one has
V δ ( t s l + 1 1 ) ( t s l + 1 1 ) μ 2 V δ ( t s l + 1 1 ) ( t s l + 1 1 ) μ 2 e ρ 2 ( t s l + 1 1 t s l + 1 2 ) V δ ( t s l + 1 2 ) ( t s l + 1 2 )
So we have V δ ( t ) ( t ) μ 2 e ρ 2 ( t t s l + 1 2 ) V δ ( t s l + 1 2 ) ( t s l + 1 2 ) . Repeating the above step, we can obtain
V δ ( t ) ( t ) μ 2 N ( t s l + 1 , t s l + 1 ) 1 e ρ 2 ( t t s l + 1 ) V δ ( t s l + 1 ) ( t s l + 1 )
Similarly, according to condition (2), we can obtain
  V δ ( t s l + 1 + ) ( t s l + 1 + ) μ 3 V δ ( t s l + 1 ) ( t s l + 1 )   V δ ( t s l + 1 + ) ( t s l + 1 + ) μ 1 V δ ( t s l + 1 ) ( t s l + 1 )
When t [ t s l , t s l + 1 ) , there is no DoS attack; we have
V δ ( t s l + 1 ) ( t s l + 1 ) μ 1 V δ ( t s l + 1 ) ( t s l + 1 )   μ 1 e ρ 1 ( t s l + 1 t s l ) V δ ( t s l ) ( t s l )
Thus, when t [ t s l + 1 1 , t s l + 1 ) , we have
V δ ( t ) ( t ) μ 1 μ 2 N ( t s l + 1 , t s l + 1 ) 1 e ρ 2 ( t t s l + 1 ) e ρ 1 ( t s l + 1 t s l ) V δ ( t s l ) ( t s l )
Moreover, we can obtain
V δ ( t s l + 1 ) ( t s l + 1 ) μ 3 V δ ( t s l + 1 ) ( t s l + 1 )   μ 3 e ρ 2 ( t s l + 1 t s l + 1 1 ) V δ ( t s l + 1 1 ) ( t s l + 1 1 )   μ 3 μ 1 μ 2 N ( t s l + 1 , t s l + 1 ) 1 e ρ 2 ( t s l + 1 t s l + 1 ) e ρ 1 ( t s l + 1 t s l ) V δ ( t s l ) ( t s l )
Let μ = m a x { μ 1 , μ 2 , μ 3 } , then we can obtain
V δ ( t s l + 1 ) ( t s l + 1 ) μ N ( t s l + 1 , t s l + 1 ) + 1 e ρ 2 ( t s l + 1 t s l + 1 ) e ρ 1 ( t s l + 1 t s l ) V δ ( t s l ) ( t s l )
Furthermore, it is noted that T l T , f l f and N ( t s l + 1 , t s l + 1 ) = T l f l T f , τ l τ D ; then we have
V δ ( t s l + 1 ) ( t s l + 1 ) μ T f + 1 e ρ 2 T ρ 1 τ D V δ ( t s l ) ( t s l )
Let ω = μ T f + 1 e ρ 2 T ρ 1 τ D ; it is clear that ω < 1 according to condition (3). Similar to the above analysis, one has
V δ ( t s l ) ( t s l ) ω l 1 V δ ( t s 1 ) ( t s 1 )
Further, it is clear that t [ t s l , t s l + 1 ) ,
V δ ( t ) ( t ) μ T f e ρ 2 T V δ ( t s l ) ( t s l ) μ T f e ρ 2 T ω l 1 V δ ( t s 1 ) ( t s 1 )
Meanwhile, we can obtain
V δ ( t ) ( t ) ν 1 | | ξ ( t ) | | 2 , V δ ( t s 1 ) ( t s 1 ) ν 2 | | ξ ( t s 1 ) | | 2
where ν 1 = m i n { λ m i n ( Q m ) , λ m i n ( Ω ) } , ν 2 = m i n { λ m a x ( Q m ) , λ m a x ( Ω ) } .
Then we can obtain
| | ξ ( t ) | | 2 ν 2 ν 1 μ T f e ρ 2 T ω l 1 | | ξ ( t s 1 ) | | 2
Thus, we can obtain | | ξ ( t ) | | 0 as t , which means the error system is asymptotically stable. So the group consensus of MAS (1) and (2) with control protocol (3) can be achieved under a consecutive DoS attack.
Theorem 2. 
Under control protocol (3) and event-triggered function (4), the Zeno behavior can be excluded.
Proof. 
D + | | e δ ( t ) ( t ) | | | | e ˙ δ ( t ) ( t ) | | = | | Φ ˙ δ ( t ) ( t ) | | = | | ( ( L δ ( t ) + D δ ( t ) ) I n ) ( v ˜ ( t ) + f ( x ( t ) , v ( t ) ) f ( x ¯ ( t ) , v ¯ ( t ) ) c Φ δ ( t ) ( t k i ) ) | |   | | L δ ( t ) + D δ ( t ) | | ( | | v ˜ ( t ) | | + l 1 | | x ˜ ( t ) | | + l 2 | | v ˜ ( t ) | | + | | c Φ δ ( t ) ( t k i ) | | )   = | | L δ ( t ) + D δ ( t ) | | ( l 1 | | x ˜ ( t ) | | + ( l 2 + 1 ) | | v ˜ ( t ) | | + | | c Φ δ ( t ) ( t k i ) | | )
Let δ ¯ = m a x { l 1 | | L δ ( t ) + D δ ( t ) | | , ( l 2 + 1 ) | | L δ ( t ) + D δ ( t ) | | } and | | Λ δ ( t ) ( t k i ) | | = | | L δ ( t ) + D δ ( t ) | | · | | c Φ δ ( t ) ( t k i ) | | ; then
| | e ˙ ( t ) | | δ ¯ ( | | x ˜ ( t ) | | + | | v ˜ ( t ) | | ) + | | Λ δ ( t ) ( t k i ) | |   2 δ ¯ | | ξ ( t ) | | + | | Λ δ ( t ) ( t k i ) | |
According to the proof of theorem 1, we can obtain | | ξ ( t ) | | ν 2 ν 1 μ T f 2 e ρ 2 T 2 ω p 1 2 | | ξ ( t s 1 ) | | .
Then we can obtain
D + | | e i δ ( t ) ( t ) | | | | e ˙ i δ ( t ) ( t ) | | | | e ˙ δ ( t ) ( t ) | | 2 δ ¯ ν 2 ν 1 μ T f 2 e ρ 2 T 2 ω p 1 2 | | ξ ( t s 1 ) | | + | | Λ δ ( t ) ( t k i ) | |
So we have
| | e i δ ( t ) ( t ) | | t k i t | | e ˙ i δ ( t ) ( s ) | | d s ( 2 δ ¯ ν 2 ν 1 μ T f 2 e ρ 2 T 2 ω p 1 2 | | ξ ( t s 1 ) | | + | | Λ δ ( t ) ( t k i ) | | ) ( t t k i )
On the other hand, it is easy to see that | | e i δ ( t ) ( t ) | | α 1 + α | | Φ δ ( t ) i ( t k i ) | | is a sufficient condition for | | e i δ ( t ) ( t ) | | α | | Φ i δ ( t ) ( t ) | | . At triggering instant t k + 1 i , one can easily obtain that
| | e i δ ( t ) ( t k + 1 i ) α 1 + α | | Φ i δ ( t ) ( t k i ) | | ; then we have
| | e i δ ( t ) ( t k + 1 i ) | | ( 2 δ ¯ ν 2 ν 1 μ T f 2 e ρ 2 T 2 ω p 1 2 | | ξ ( t s 1 ) | | + | | Λ δ ( t ) ( t k i ) | | ) ( t k + 1 i t k i )
Thus,
α 1 + α | | Φ i δ ( t ) ( t k i ) | | ( 2 δ ¯ ν 2 ν 1 μ T f 2 e ρ 2 T 2 ω p 1 2 | | ξ ( t s 1 ) | | + | | Λ δ ( t ) ( t k i ) | | ) ( t k + 1 i t k i )
Then we can obtain the lower bound of the inter-event time:
t k + 1 i t k i α 1 + α | | Φ i δ ( t ) ( t k i ) | | 2 δ ¯ ν 2 ν 1 μ T f 2 e ρ 2 T 2 ω p 1 2 | | ξ ( t s 1 ) | | + | | Λ δ ( t ) ( t k i ) | | > 0
which means the Zeno behavior has been excluded.  □
Remark 3. 
A multi-agent system with an undirected communication topology is a special directed case. In an undirected topology, each agent can be affected by other nodes. Therefore, we just need to choose the inter-act agents to be pinned. Then the control protocol can be designated as
u i ( t ) =   c j = 1 N a i j [ x j ( t k i ) x i ( t k i ) + v j ( t k i ) v i ( t k i ) ] c d i [ x i ( t k i ) x k i ( t k i ) + v i ( t k i ) v k i ( t k i ) ] + c j = 1 N l i j ( x k j ( t k i ) + v k j ( t k i ) ) , i V ˜ k i   c j = 1 N a i j [ x j ( t k i ) x i ( t k i ) + v j ( t k i ) v i ( t k i ) ] , i V k i V ˜ k i
The conditions for group consensus of multi-agents with an undirected communication topology are similar to those of Theorems 1 and 2. We omit them here.

4. Numerical Simulation

In this section, we will give two simulation examples to demonstrate the efficacy of the results.
Example 1: Suppose that there are six nodes in the communication topology, which is shown in Figure 2. The adjacency matrix of this topology is given as follows:
A 0 = 0 1 0 0 0 0 0 0 0 1 0 0 1 0 0 0 0 0 0 0 1 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0
Let the nonlinear function be f ( x i ( t ) , v i ( t ) ) = 6 c o s ( 4 t ) + 0.01 c o s ( 2 x i ( t ) ) + 0.01 s i n ( 4 v i ( t ) ) . From Assumption 1, we can obtain l 1 = l 2 = 0.001 ; thus, δ = 1.002 . From the original communication topology, we can see that agents 1 and 4 are inter-act agents, and agent 6 is an intra-act agent with zero degree. So we should choose agents 1, 4, and 6 to be pinned. Furthermore, we divide the six agents into three group, where V 1 = { 1 , 2 } , V 2 = { 3 , 4 } , and V 3 = { 5 , 6 } . Choosing the system parameters in Table 1, we have the pinning matrix D 0 = d i a g { 4.2 , 0 , 0 , 4.2 , 0 , 4.2 } and the coupling strength of the multi-agent system c = 15 ; then, by some calculations, we can obtain that λ m a x ( ( δ + c 2 ) I N c L 0 ¯ c D 0 + 2 c α ( H 0 ) T H 0 ) = 0.6348 < 0 , which satisfies condition (1) of Theorem 1. Furthermore, we can obtain ρ 1 = 0.7557 , ρ 2 = 1.56 . Moreover, there are three types of asynchronous DoS attacks, which are shown in Figure 3.
Furthermore, choosing T = 2 , f = 5.5 , based on condition (2) of Theorem 1, we can obtain a persistent dwell time τ = 5.8 . The switching signal of the changing communication topology can be seen in Figure 4.
Here, we depict two types of event-triggered functions. The first one is the event-triggered function designed using the combinational measurements in this paper. The second one is the event-triggered function implemented by utilizing a sampled-event detector, which mainly depends on the state error, such as in [42]. Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10 demonstrate the comparison of the two different event-triggered functions. From Figure 5, Figure 6, Figure 7, Figure 8, Figure 9 and Figure 10, we can see that the multi-agent system achieves consensus at around 3 s with the event-triggered function designed using the combinational measurements; however, the multi-agent system achieves consensus at around 6 s with the event-triggered function designed using the state error. Further, Figure 11 demonstrates the event-triggered time instants of two different event-triggered functions. Moreover, in Table 1, we can see that the multi-agent system will trigger less frequently with the event-triggered function designed using combinational measurement, which can greatly save resources. (For a brief review, in Table 2, method 1 stands for the event-triggered function designed using combinational measurement, and method 2 stands for the event-triggered function designed using the state error.) Thus, regardless of the time the agent’s position and velocity states achieve consensus or the event-triggered time instants for a multi-agent system, it is clear that the method presented in this paper is more effective.
Furthermore, compared with [43], which also studies group consensus of a multi-agent system under DoS attack, there are two improved aspects in this paper. First, we consider asynchronous DoS attacks in this paper, but [43] studies synchronous DoS attacks. An asynchronous DoS attack means part of the communication links will be interpreted, but a synchronous DoS attack means all communication links are interpreted. Thus, an asynchronous DoS attack is more general, and a synchronous DoS attack can be seen as a special case of asynchronous DoS attack. Second, [43] makes use of feedback control to achieve group consensus, which is a continuous control method. However, we use event-triggered control in this paper, which is a discontinuous control method. Considering the limited resources in practical engineering, event-triggered control can avoid unnecessary control signal processing, which can greatly save resources.
Example 2: In this example, we increase the number of agents and increase the DoS attack intensity. Suppose that there are nine nodes in the communication topology, which is shown in Figure 12. The adjacency matrix of this topology is given as follows:
A 0 = 0 1 0 0 0 0 0 0 0 0 0 1 1 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 0 0 0 0 0 0 1 0 0 0 0 0 0 0 1 0 0
We choose a nonlinear function similar to Example 1; then, we can obtain l 1 = l 2 = 0.001 ; thus, δ = 1.002 . From the original communication topology, we can see that agents 3 and 4 are inter-act agents, and agent 8 is an intra-act agent with zero degree. So we should choose agents 3, 4 and 8 to be pinned. Furthermore, we divide the nine agents into three group, where V 1 = { 1 , 2 , 3 } , V 2 = { 4 , 5 , 6 } , and V 3 = { 7 , 8 , 9 } . Choosing the system parameters in Table 3, we have the pinning matrix D 0 = d i a g { 0 , 0 , 4.2 , 4.2 , 0 , 0 , 0 , 4.2 , 0 } and the coupling strength of the multi-agent system c = 15 ; then, by some calculations, we can obtain that λ m a x ( ( δ + c 2 ) I N c L 0 ¯ c D 0 + 2 c α ( H 0 ) T H 0 ) = 0.4686 < 0 , which satisfies condition (1) of Theorem 1. Furthermore, we can obtain ρ 1 = 0.9325 , ρ 2 = 1.24 . Moreover, there are two types of asynchronous DoS attacks, which are shown in Figure 13.
In this example, we choose T = 2.2 , f = 5.5 to describe the DoS attack. Compared with example 1, we lift the attack intensity by extending the active time of the DoS attack. Then, based on condition (2) of Theorem 1, we can obtain the persistent dwell time τ = 3.6 . Figure 14, Figure 15 and Figure 16 show 344 the position states of follower agents and leader agents, Figure 17, Figure 18 and Figure 19 show the velocity 345 states of follower agents and leader agents. Thus, from Figure 14, Figure 15, Figure 16, Figure 17, Figure 18 and Figure 19, we can see that the 346 group consensus of the multi-agent system can still be achieved by our method even in more complex conditions. The switching 343 signal of the changing communication topology can be seen in Figure 20 and the event-triggered time instants for agents can be seen in Figure 21.

5. Conclusions

In this paper, we mainly solve the group consensus of a second-order multi-agent system under an asynchronous DoS attack. An asynchronous DoS attack leads to continuous changes in the communication topologies; thus, we can change the multi-agent system into a switching system; then, we can use switching theory to solve the group consensus problem. Moreover, we use the persistent dwell time (PDT) to describe a DoS attack in this paper, which is greatly different from the average dwell time (ADT). For an ADT, there exists the chatter bound to constrain the number of switching intervals that are less than the average time interval length. Furthermore, an ADT requires that the length between two time intervals cannot be too short. But for the PDT, we use the T-portion to describe these short time intervals, which means that all of the time intervals will be considered equally no matter the number and length of short time intervals, greatly liberalizing the limit of the ADT. Thus, for general consensus of a multi-agent system under a DoS attack, we can try to combine the switching theory and the concept of the PDT to solve the consensus for multi-agents.
In the real world, group consensus of multi-agent systems is general, such as express deliveries with unmanned aerial vehicles. By the method in this paper, the unmanned aerial vehicles can be divided into different groups to deliver different freight to different destinations. Further, because of the vulnerability of the wireless communication, the formation of unmanned aerial vehicles may suffer cyber-attacks easily. Thus, by the method in this paper, we can embed the event-triggered controller in each agent and set the event-triggered threshold of our methods; then, if the intensity of the cyber-attack is strong enough to violate the event-triggered threshold, the controller will process the control signal to the agent. Then, the formation of unmanned aerial vehicles will be maintained.
However, there are also some limitations existing in our study. Firstly, there are limits to the multi-agent system model. While a second-order multi-agent system model effectively captures many complex scenarios, it cannot encompass all real-world complexities. For instance, helicopter systems may involve numerous variables, necessitating a high-order multi-agent system model. In this situation, it is hard to construct a Lyapunov function for an error system like in this paper. Thus, our method may be less effective, but one can try to combine a backstepping method and the event-triggered control of this paper to explore the group consensus of a high-order multi-agent system, which will be our future work. Secondly, our analysis is limited to DoS attacks. However, various other types of cyber-attacks exist in real-world applications. For example, deception attacks can also exist in the wireless communication of agents. But the PDT is not suitable to describe a deception attack. Thus, how to describe a deception attack is a problem that we will solve in the future.

Author Contributions

Conceptualization, Y.P.; methodology, Y.P.; validation, Y.P.; formal analysis, Y.P.; writing—original draft preparation, Y.P.; software, Y.P.; writing—review and editing, Y.P.; visualization, Y.P.; supervision, Y.Y. and C.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research received no external funding.

Data Availability Statement

The original contributions presented in the study are included in the article, further inquiries can be directed to the corresponding author.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Zhi, H.; Chen, L.; Li, C.; Guo, Y. Leader-Follower Affine Formation Control of Second-Order Nonlinear Uncertain Multi-Agent Systems. IEEE Trans. Circuits Syst. II-Express Briefs 2021, 68, 3547–3551. [Google Scholar] [CrossRef]
  2. Dong, X.; Yu, B.; Shi, Z.; Zhong, Y. Time-Varying Formation Control for Unmanned Aerial Vehicles: Theories and Applications. IEEE Trans. Control Syst. Technol. 2015, 23, 340–348. [Google Scholar] [CrossRef]
  3. Liang, S.; Wang, F.; Chen, Z.; Liu, Z. Formation control for discrete-time heterogeneous multi-agent systems. Int. J. Robust Nonlinear Control 2022, 32, 5848–5865. [Google Scholar] [CrossRef]
  4. Pei, H.; Chen, S.; Lai, Q. A local flocking algorithm of multi-agent dynamic systems. Int. J. Control 2015, 88, 2242–2249. [Google Scholar] [CrossRef]
  5. Shen, Y.; Kong, Z.; Ding, L. Flocking of Multi-Agent System with Nonlinear Dynamics via Distributed Event-Triggered Control. Appl. Sci. 2019, 9, 1336. [Google Scholar] [CrossRef]
  6. Zhang, Y. Study on the Attacking Intelligent Decision-Making Technology Based on the Game Theory. Autom. Control Comput. Sci. 2019, 53, 140–147. [Google Scholar] [CrossRef]
  7. Yukalov, V.I.; Yukalova, E.P.; Sornette, D. Information processing by networks of quantum decision makers. Phys. A Stat. Mech. Its Appl. 2018, 492, 747–766. [Google Scholar] [CrossRef]
  8. Zhu, Y.-K.; Guan, X.-P.; Luo, X.-Y. Finite-time consensus of heterogeneous multi-agent systems. Chin. Phys. B 2013, 22, 038901. [Google Scholar] [CrossRef]
  9. Li, Z.; Wang, Z.; Feng, Y. Fixed-time consensus of first-order multi-agent systems over signed directed graphs. Trans. Inst. Meas. Control 2021, 43, 2392–2401. [Google Scholar] [CrossRef]
  10. Zheng, Y.; Wang, L. Consensus of heterogeneous multi-agent systems without velocity measurements. Int. J. Control 2012, 85, 906–914. [Google Scholar] [CrossRef]
  11. Yu, W.; Ren, W.; Zheng, W.X.; Chen, G.; Lu, J. Distributed control gains design for consensus in multi-agent systems with second-order nonlinear dynamics. Automatica 2013, 49, 2107–2115. [Google Scholar] [CrossRef]
  12. Mahmoud, M.S.; Khan, G.D. Leader-following discrete consensus control of multi-agent systems with fixed and switching topologies. J. Frankl. Inst.-Eng. Appl. Math. 2015, 352, 2504–2525. [Google Scholar] [CrossRef]
  13. Wang, M.; Hu, J.; Cao, J. Resilient Consensus Control for Linear Multi-agent System Against the False Data Injection Attacks. Int. J. Control Autom. Syst. 2023, 21, 2112–2123. [Google Scholar] [CrossRef]
  14. Duan, Z.; Wei, A.; Zhang, X.; Mu, R. Sampled-data consensus control for nonlinear time-delay multi-agent systems under false data injection attacks. Nonlinear Dyn. 2023, 111, 12253–12266. [Google Scholar] [CrossRef]
  15. Franze, G.; Tedesco, F.; Famularo, D. Resilience Against Replay Attacks: A Distributed Model Predictive Control Scheme for Networked Multi-Agent Systems. IEEE-CAA J. Autom. Sin. 2021, 8, 628–640. [Google Scholar] [CrossRef]
  16. Tahoun, A.H.; Arafa, M. Cooperative control for cyber-physical multi-agent networked control systems with unknown false data-injection and replay cyber-attacks. ISA Trans. 2021, 110, 1–14. [Google Scholar] [CrossRef] [PubMed]
  17. Mahmoud, M.S.; Hamdan, M.M. Stabilization of distributed cyber physical systems subject to denial-of-service attack. Int. J. Control 2022, 95, 692–702. [Google Scholar] [CrossRef]
  18. Xu, Y.; Guo, G. Event triggered control of connected vehicles under multiple cyber attacks. Inf. Sci. 2022, 582, 778–796. [Google Scholar] [CrossRef]
  19. Shang, Y.; Liu, C.L.; Cao, K.C. Event-triggered consensus control of second-order nonlinear multi-agent systems under denial-of-service attacks. Trans. Inst. Meas. Control 2021, 43, 2272–2281. [Google Scholar] [CrossRef]
  20. Miao, G.; Cao, J.; Alsaedi, A.; Alsaadi, F.E. Event-triggered containment control for multi-agent systems with constant time delays. J. Frankl. Inst.-Eng. Appl. Math. 2017, 354, 6956–6977. [Google Scholar] [CrossRef]
  21. Miao, G.; Feng, Y.; Li, T. Containment control for multi-agent systems with input saturation. Ima J. Math. Control Inf. 2017, 34, 667–682. [Google Scholar] [CrossRef]
  22. Yu, M.; Yan, C.; Li, C. Event-triggered tracking control for couple-group multi-agent systems. J. Frankl. Inst.-Eng. Appl. Math. 2017, 354, 6152–6169. [Google Scholar] [CrossRef]
  23. Zhao, Y.; Liu, Y.; Wen, G.; Huang, T. Finite-Time Distributed Average Tracking for Second-Order Nonlinear Systems. IEEE Trans. Neural Netw. Learn. Syst. 2019, 30, 1780–1789. [Google Scholar] [CrossRef]
  24. Zhao, Y.; Duan, Z.; Wen, G.; Zhang, Y. Distributed finite-time tracking control for multi-agent systems: An observer-based approach. Syst. Control Lett. 2013, 62, 22–28. [Google Scholar] [CrossRef]
  25. Gao, L.; Cui, Y.; Chen, W. Admissible consensus for descriptor multi-agent systems via distributed observer-based protocols. J. Frankl. Inst.-Eng. Appl. Math. 2017, 354, 257–276. [Google Scholar] [CrossRef]
  26. Wen, C.; Liu, F.; Song, Q.; Feng, X. Observer-based consensus of second-order multi-agent systems without velocity measurements. Neurocomputing 2016, 179, 298–306. [Google Scholar] [CrossRef]
  27. Cai, Y.; Zhang, H.; Li, W.; Mu, Y.; He, Q. Distributed Bipartite Adaptive Event-Triggered Fault-Tolerant Consensus Tracking for Linear Multiagent Systems Under Actuator Faults. IEEE Trans. Cybern. 2022, 52, 11313–11324. [Google Scholar] [CrossRef]
  28. Yang, Q.; Sun, J.; Chen, J. Output Consensus for Heterogeneous Linear Multiagent Systems With a Predictive Event-Triggered Mechanism. IEEE Trans. Cybern. 2021, 51, 1993–2005. [Google Scholar] [CrossRef]
  29. Koike, R.; Endo, T.; Matsuno, F. Output-based dynamic event-triggered consensus control for linear multiagent systems. Automatica 2021, 133, 1993–2012. [Google Scholar] [CrossRef]
  30. Liang, J.; Liu, K.; Ji, Z.; Wang, X. Event-Triggered Consensus Control for Linear Multi-Agent Systems. IEEE ACCESS 2019, 7, 144572–144579. [Google Scholar] [CrossRef]
  31. Liuzza, D.; Dimarogonas, D.V.; di Bernardo, M.; Johansson, K.H. Distributed model based event-triggered control for synchronization of multi-agent systems. Automatica 2016, 73, 1–7. [Google Scholar] [CrossRef]
  32. Zhao, M.; Peng, C.; He, W.; Song, Y. Event-Triggered Communication for Leader-Following Consensus of Second-Order Multiagent Systems. IEEE Trans. Cybern. 2018, 48, 1888–1897. [Google Scholar] [CrossRef]
  33. Qi, Y.; Geng, H. Pinning consensus control for switched multi-agent systems: A switched adaptive dynamic programming method. Nonlinear Anal.-Hybrid Syst. 2023, 48, 101319. [Google Scholar] [CrossRef]
  34. Dai, H.; Guo, X.; Ji, L.; Li, H. Bipartite synchronization of multi-agent systems under deception attacks via pinning delayed-impulsive control. Int. J. Robust Nonlinear Control 2023, 33, 7718–7734. [Google Scholar] [CrossRef]
  35. Ji, L.; Wu, R.; Zhang, C.; Yang, S.; Li, H. Exponential finite-time couple-group consensus for agents in cooperative-competitive networks via pinning method. Asian J. Control 2023, 25, 2139–2152. [Google Scholar] [CrossRef]
  36. Zheng, Y.; Wang, L. A novel group consensus protocol for heterogeneous multi-agent systems. Int. J. Control 2015, 88, 2347–2353. [Google Scholar] [CrossRef]
  37. Li, C.; Zong, X. Group consensus of multi-agent systems with additive noises. Sci. China-Inf. Sci. 2022, 65, 202205. [Google Scholar] [CrossRef]
  38. Yang, P.; Zhang, A.; Bi, W. Finite-Time Group Consensus for Second-Order Multi-agent Systems with Input Saturation. Neural Process. Lett. 2022, 54, 4211–4228. [Google Scholar] [CrossRef]
  39. Liu, J.; Wang, X. Secure Consensus Control for Multi-agent Systems Subject to Consecutive Asynchronous DoS Attacks. Int. J. Control Autom. Syst. 2023, 21, 61–70. [Google Scholar] [CrossRef]
  40. Boyd, L.E.S.; Ghaoui, E.F. Linear Matrix Inequalities in System and Control Theory; Society for Industrial and Applied Mathematics: Philadelphia, PA, USA, 1994. [Google Scholar]
  41. Cui, Y.; Xu, L. Bounded average consensus for multi-agent systems with switching topologies by event-triggered persistent dwell time control. J. Frankl. Inst.-Eng. Appl. Math. 2019, 356, 9095–9121. [Google Scholar] [CrossRef]
  42. Hu, A.; Hu, M.; Guo, L. Event-Triggered Control For Cluster Consensus In Multi-Agent Networks. Asian J. Control 2016, 18, 1836–1844. [Google Scholar] [CrossRef]
  43. Xu, B.; Yang, Y. Group consensus of nonlinear multiagent system with switching topology under DoS attacks. Phys. A-Stat. Mech. Its Appl. 2022, 605, 127969. [Google Scholar] [CrossRef]
Figure 1. Diagram of time sequence in lth stage.
Figure 1. Diagram of time sequence in lth stage.
Applsci 14 07304 g001
Figure 2. Original topology.
Figure 2. Original topology.
Applsci 14 07304 g002
Figure 3. Three types of DoS attacks.
Figure 3. Three types of DoS attacks.
Applsci 14 07304 g003
Figure 4. The positive states of followers and leaders in group 1 for different event-triggered functions.
Figure 4. The positive states of followers and leaders in group 1 for different event-triggered functions.
Applsci 14 07304 g004
Figure 5. The positive states of followers and leaders in group 2 for different event-triggered functions.
Figure 5. The positive states of followers and leaders in group 2 for different event-triggered functions.
Applsci 14 07304 g005
Figure 6. The positive states of followers and leaders in group 3 for different event-triggered functions.
Figure 6. The positive states of followers and leaders in group 3 for different event-triggered functions.
Applsci 14 07304 g006
Figure 7. The velocity states of followers and leaders in group 1 for different event-triggered functions.
Figure 7. The velocity states of followers and leaders in group 1 for different event-triggered functions.
Applsci 14 07304 g007
Figure 8. The velocity states of followers and leaders in group 2 for different event-triggered functions.
Figure 8. The velocity states of followers and leaders in group 2 for different event-triggered functions.
Applsci 14 07304 g008
Figure 9. The velocity states of followers and leaders in group 3 for different event-triggered functions.
Figure 9. The velocity states of followers and leaders in group 3 for different event-triggered functions.
Applsci 14 07304 g009
Figure 10. The switching signals of agents.
Figure 10. The switching signals of agents.
Applsci 14 07304 g010
Figure 11. The event-triggered time instants of agents for different event-triggered functions.
Figure 11. The event-triggered time instants of agents for different event-triggered functions.
Applsci 14 07304 g011
Figure 12. Original topology.
Figure 12. Original topology.
Applsci 14 07304 g012
Figure 13. Two types of DoS attacks G 1 , G 2 .
Figure 13. Two types of DoS attacks G 1 , G 2 .
Applsci 14 07304 g013
Figure 14. The position states of followers and leaders in group 1 under DoS attack.
Figure 14. The position states of followers and leaders in group 1 under DoS attack.
Applsci 14 07304 g014
Figure 15. The position states of followers and leaders in group 2 under DoS attack.
Figure 15. The position states of followers and leaders in group 2 under DoS attack.
Applsci 14 07304 g015
Figure 16. The position states of followers and leaders in group 3 under DoS attack.
Figure 16. The position states of followers and leaders in group 3 under DoS attack.
Applsci 14 07304 g016
Figure 17. The velocity states of followers and leaders in group 1 under DoS attack.
Figure 17. The velocity states of followers and leaders in group 1 under DoS attack.
Applsci 14 07304 g017
Figure 18. The velocity states of followers and leaders in group 2 under DoS attack.
Figure 18. The velocity states of followers and leaders in group 2 under DoS attack.
Applsci 14 07304 g018
Figure 19. The velocity states of followers and leaders in group 3 under DoS attack.
Figure 19. The velocity states of followers and leaders in group 3 under DoS attack.
Applsci 14 07304 g019
Figure 20. The switching signal.
Figure 20. The switching signal.
Applsci 14 07304 g020
Figure 21. The event-triggered time instants for agents.
Figure 21. The event-triggered time instants for agents.
Applsci 14 07304 g021
Table 1. System parameters.
Table 1. System parameters.
System Parameters
c = 15    α = 0.05    μ = 1.1     T = 2     f = 5.5     d i = 4.2 , i = 1 , 4 , 6
Table 2. The comparison of two event-triggered functions.
Table 2. The comparison of two event-triggered functions.
AgentAgent 1Agent 2Agent 3Agent 4Agent 5Agent 6
Performance
trigger number (method 1)397193136443121422
trigger number (method 2)918387257912184940
Table 3. System parameters.
Table 3. System parameters.
System Parameters
c = 15    α = 0.05    μ = 1.1     T = 2.2     f = 5.5     d i = 4.2 , i = 1 , 4 , 6
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Pan, Y.; Yang, Y.; Yi, C. Group Consensus Using Event-Triggered Control for Second-Order Multi-Agent Systems under Asynchronous DoS Attack. Appl. Sci. 2024, 14, 7304. https://doi.org/10.3390/app14167304

AMA Style

Pan Y, Yang Y, Yi C. Group Consensus Using Event-Triggered Control for Second-Order Multi-Agent Systems under Asynchronous DoS Attack. Applied Sciences. 2024; 14(16):7304. https://doi.org/10.3390/app14167304

Chicago/Turabian Style

Pan, Yuhang, Yongqing Yang, and Chushu Yi. 2024. "Group Consensus Using Event-Triggered Control for Second-Order Multi-Agent Systems under Asynchronous DoS Attack" Applied Sciences 14, no. 16: 7304. https://doi.org/10.3390/app14167304

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop