Next Article in Journal
A Low Sampling Rate Receiver Design for Multi-Antenna Multi-User OFDM Systems
Previous Article in Journal
Intelligent Reflecting Surface–Assisted Wireless Secret Key Generation against Multiple Eavesdroppers
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Quasi-Consensus of Time-Varying Multi-Agent Systems with External Inputs under Deception Attacks

School of Automation, Guangdong University of Technology, Guangzhou 510006, China
*
Author to whom correspondence should be addressed.
Entropy 2022, 24(4), 447; https://doi.org/10.3390/e24040447
Submission received: 6 January 2022 / Revised: 21 February 2022 / Accepted: 2 March 2022 / Published: 23 March 2022
(This article belongs to the Topic Complex Systems and Artificial Intelligence)

Abstract

:
The quasi-consensus of a class of nonlinear time-varying multi-agent systems suffering from both external inputs and deception attacks is studied in this paper. This is different from a time-varying matrix, which is assumed to be bounded; further reasonable assumptions are supposed. In addition, impulsive deception attacks modeled with Bernoulli variables are considered. Sufficient conditions to achieve quasi-consensus are given, and the upper bounds of the error state related to the deception attacks is derived. Finally, a numerical simulation example is provided to show the validity of the obtained results.

1. Introduction

Systems with time-varying dynamics are more suitable to model objects in the real world compared with time-invariant systems. Owing to the time-varying parameters, the stability and stabilization of time-varying systems are more difficult to study even for linear systems. In recent years, results on the stability analysis of time-varying systems have been found in [1,2,3,4,5,6] and the references therein.
For example, a uniformly asymptotically stable function was proposed to study the asymptotic stability of linear time-varying systems in [5] and a nonlinear one in [6]. This approach was then extended to time-delayed systems [7], impulsive systems [8] and sampled-data systems [9]. Different from the method used in [5,6,7], the authors in [4] developed a novel lemma based on more general time-varying delayed systems.
Nevertheless, the consensus of time-varying multi-agent systems (MASs) has not been fully studied, as the analysis of time-varying systems is laborious. Moreover, time-varying dynamics in MASs mainly focus on the time delay and the communication topology [10,11,12].
For example, the uncertainty caused by unknown time-varying communication delays was considered in [10]; formation control with time-varying communication networks was studied in [12]. When studying systems with uncertain parameters, such as randomly occurring uncertainties and randomly occurring nonlinearities in [13,14,15], the norm of the time-varying term in the system matrix is always assumed to be less than one. Conservatively, this assumption is restrictive to adopt in practical works.
On the other hand, the consensus problems of MASs have been crucial issues over the past two decades [16]. The consensus of MASs means that all agents will reach the identical goal through exchanging information with neighbors [17],. It has been widely studied in practical applications, such as UAV irrigation and formation [18,19] and power grid energy distribution [20,21]. In practice, unexpected interferences, such as external inputs or cyber-attacks, may occur due to the complicated workspace. These unexpected interferences may lead to poor performance and even destroy the stability of systems. It is known that environment disturbances are inevitable and usually described by the Brownian motion.
Stochastic MASs modeled by It o ^ differential equations have been widely investigated in recent years [22]. However, the definition of consensus is not applicable if systems are disturbed by external inputs, and to describe the consensus in this case, the concept of quasi-consensus is proposed. Particularly, an error bound as controllable error for bounded external inputs is introduced in the quasi-consensus [23,24].
Significantly, working in an open environment typically brings about security problems [25]. Cyber-attacks are common, and they can destroy the stability of systems and seriously affect the equipment [26]. Hence, cyber-attacks are important factors when studying the stability of MASs. Generally, cyber-attacks are divided into two categories: denial-of-service (DoS) attacks [27,28] and deception attacks [29,30,31,32,33].
DoS attacks block communication networks, which leads to packet drops or packet time delays. For instance, the problem of communication topologies interrupted by DoS attacks with a definite probability was considered in [28].
Deception attacks relate to the situation that malicious adversaries can find and manipulate the transmitting information and control signal. False data injection attacks mean that false information can be injected to the controller or the feedback channel of the controller [29]. Furthermore, deception attacks can be divided into different categories: data replacement attacks, false data injection attacks and so on [30]. In [32], the quasi-consensus of a class of discrete-time multi-agent systems was studied using recursive linear matrix inequality and the stochastic analysis method.
In [33], in order to avoid certain adverse effects caused by system instability, load shedding and false data injection attacks, the authors designed a load frequency controller to provide a constant and uniform frequency in different operation cases of microgrids. The consensus of MASs in a given finite horizon were studied when the systems suffered from false data injection attacks [34].
To describe the randomness of deception attacks, Bernoulli variables were introduced in an attack scenario in [35]. Nevertheless, most of the existing results are on time-invariant MASs subjected to continuous-time deception attacks [29,31,32,33], while it is more practical and challenging for time-varying multi-agent systems under impulsive deception attacks.
With the above analysis, a consensus of time-varying MASs subject to both external inputs and deception attacks is missing in the literature, and how to release the restrictive assumption on the time-varying system matrix is meaningful and challenging. This paper aims to deal with the above problems, and the main contributions of this paper are summarized as follows:
(1)
Compared with the traditional assumption on the time-varying system matrix of MASs, more general and practical conditions are considered in this paper versus the analysis approaches used in [5].
(2)
Both false data injection attacks modeled with Bernoulli variables and external inputs are considered in this paper. Moreover, sufficient conditions for achieving the quasi-consensus are derived, and the error upper bounds related to the external inputs and deception attacks are also obtained.
The rest of this article is organized as follows. Some preliminaries are given in Section 2. Sufficient conditions for the quasi-consensus are provided in Section 3. In Section 4, an illustrative example is provided to verify the effectiveness of the proposed results. Finally, our conclusions are drawn in Section 5.
Notation 1.
Throughout this article, the following notations are adopted. λ max ( · ) and λ min ( · ) are the maximum and minimum eigenvalues of any real and symmetrical matrix, respectively. I n and 1 N denote the n-dimensional identity matrix and an N-dimensional column vector with all ones, respectively. N = { 1 , 2 , } , N [ 1 , N ] = { 1 , 2 , , N } , where N N . R = ( , + ) , R + = 0 , + ) , R n denotes an n-dimensional Euclidean space, and R n × m is the set of n × m real matrix. diag denotes a block-diagonal matrix. E [ · ] is the operator of expectation, and x = i = 1 n x i 2 denotes the Euclidean norm of vector x R n . C ( X ; Y ) indicates the continuous mapping from X to Y. D + g ( t ) denotes the Dini derivative of the function g : R R , and it is defined as:
D + g ( t ) = lim Δ 0 + g t + Δ g ( t ) Δ .

2. Preliminaries

2.1. Graph Theory

In general, a weighted undirected graph can be represented by G = ( V , E , A ) , where V = { v 1 , v 2 , , v N } , E V × V and A = [ a i j ] N × N R N × N , v i , v j V mean the set of vertexes, the set of edges and the adjacency matrix, respectively. When data can be transferred between agent i and j, i j , i , j N [ 1 , N ] , there exists an edge between v i and v j , that is ( v i , v j ) E , then a i j = 1 and a i i = 0 , otherwise a i j = 0 . L is Laplacian matrix of graph G , which can be denoted L = [ l i j ] N × N R N × N , and l i j = a i j , i j , l i i = j = 1 , j i N a i j .

2.2. The Model of MASs

Consider a class of nonlinear time-varying MASs composed of N agents with external disturbances. The dynamics of agent i , i N [ 1 , N ] can be described by
x ˙ i = A ( t ) x i ( t ) + β ( t ) f ( t , x i ( t ) ) , ω i ( t ) ) + u i t , t t 0 , x i t 0 = ζ i .
where x i ( t ) R n , u i ( t ) R n and ω i ( t ) R n represent the state, the control input and external disturbances of agent i, respectively. A ( t ) = A + α ( t ) T B ( t ) Q is a time-varying matrix, where A, T, and Q are constant matrices with suitable dimensions, and B ( t ) is a time-varying matrix. f ( · ) C R + × R n × R n ; R n is a nonlinear function, represents intrinsic dynamics of the agent. Assume that the initial time t 0 0 , the initial state of agent i is ζ i and ζ ^ = ( ζ 1 T , ζ 2 T , , ζ N T ) T .
The system considered in this article may be linear or non-linear, which mainly depends on the value of β ( t ) . Clearly, while β ( t ) 0 , (1) is a linear system.
Assumption 1.
Assume that the random variables α ( t ) and β ( t ) in system (1) both obey the Bernoulli distribution with the value 0 or 1. Their probabilities are set as follows:
P r α ( t ) = 1 = α , P r α ( t ) = 0 = 1 α , P r β ( t ) = 1 = β , P r β ( t ) = 0 = 1 β .
where α, β [ 0 , 1 ] are known constants. In addition, α ( t ) and β ( t ) are independent of each other.
Based on the above conditions, the following equations are established:
E α ( t ) α = 0 , E β ( t ) β = 0 .
In this article, a controller that suffers from false data injection attacks is considered, and it is designed as follows:
u i ( t ) = k = 1 [ U k j = 1 N a i j x i ( t ) x j ( t ) + ψ i ( t ) d k ξ i ( t ) ] δ ( t t k ) , i N [ 1 , N ] ,
where δ · is the Dirac function, ξ i ( t ) denotes the attack signal of the agent i, and d k means the strength of attack signal at the kth impulsive moment. U k R is the impulsive control gain. { t k } k = 1 + is the impulsive time sequence and satisfies 0 t 0 < t 1 < < t k < , lim k + t k = + . Let τ sup = sup k N { t k + 1 t k } and τ inf = inf k N { t k + 1 t k } > 0 . ψ i ( t ) is a Bernoulli variable related to agent i, which is introduced to denote the occurrence of an achievable attack. Hence, one finds:
P r ψ i ( t ) = 1 = ψ ¯ i , P r ψ i ( t ) = 0 = 1 ψ ¯ i .
where ψ ¯ i [ 0 , 1 ] are known constants.
Assumption 2.
The stochastic variables ψ i ( t k ) , i N [ 1 , N ] are mutually independent.
Remark 1.
The configuration of MAS with external inputs under deception attacks in this paper is shown in Figure 1. Deception attacks occur on the channel from sensor to controller, and the attackers inject false data to control signal at discrete-time instants, thus, reducing the accuracy of the system data.
According to the controller (4), MASs (1) suffering from false data injection attacks can be described as:
x ˙ i = A ( t ) x i ( t ) + β ( t ) f t , x i ( t ) , ω i ( t ) , t t 0 , t t k , Δ x i ( t k ) = U k j = 1 N a i j x i ( t k ) x j ( t k ) + ψ i ( t k ) d k ξ i ( t k ) , t = t k .
where Δ x i ( t k ) = x i ( t k + ) x i ( t k ) . Throughout the article, assume that x i ( t ) is right-hand continuous at t = t k , x i ( t k ) = x i ( t k + ) = lim c 0 + x i ( t k + c ) and x i ( t k ) = lim c 0 x i ( t k + c ) .
Notice that the stabilization problem of an error system is equal to the consensus of MASs. Therefore, define the error state e i ( t ) : = x i ( t ) x ¯ ( t ) = x i ( t ) 1 N i = 1 N x i ( t ) and ω ¯ i ( t ) : = ω i ( t ) 1 N i = 1 N ω i ( t ) . With the help of a Kronecker product, one yields e ( t ) = ( E I n ) x ( t ) = ( I N 1 N 1 N 1 N T ) I n x ( t ) and ω ¯ ( t ) = ( E I n ) ω ( t ) = ( I N 1 N 1 N 1 N T ) I n ω ( t ) , where x ( t ) = [ x 1 T ( t ) , x 2 T ( t ) , , x N T ( t ) ] T , e ( t ) = [ e 1 T ( t ) , e 2 T ( t ) , , e N T ( t ) ] T , ω ( t ) = [ ω 1 T ( t ) , ω 2 T ( t ) , , ω N T ( t ) ] T and ω ¯ ( t ) = [ ω ¯ 1 T ( t ) , ω ¯ 2 T ( t ) , , ω ¯ N T ( t ) ] T .
Then, the compact form error system under the false data injection attacks can be described as:
e ˙ ( t ) = I N A ( t ) e ( t ) + β ( t ) F ( t , e ( t ) , ω ¯ ( t ) ) , t t 0 , t t k , Δ e ( t k ) = e ( t k + ) e ( t k ) = ( U k L I n ) e ( t k ) + d k E Ψ ( t k ) I n ξ ( t k ) , t = t k .
where Ψ ( t k ) = diag ψ 1 ( t k ) , ψ 2 ( t k ) , , ψ N ( t k ) is a diagonal matrix, ξ ( t k ) = ξ 1 T ( t k ) , ξ 2 T ( t k ) , , ξ N T ( t k ) T as well as F ( t , e ( t ) , ω ¯ ( t ) ) = ( E I n ) f ( t , x ( t ) , ω ( t ) ) , where f ( t , x ( t ) , ω ( t ) ) = [ f T ( t , x 1 ( t ) , ω 1 ( t ) ) , , f T ( t , x N ( t ) , ω N ( t ) ) ] T .
Assumption 3.
The attack signal ξ ( t k ) , k N , is bound: ξ ( t k ) 2 < ξ ¯ , and ξ ¯ is a known positive constant.
Assumption 4.
For the nonlinear function f in system (1), there exist constants κ 1 , κ 2 0 that satisfy
| f T ( t , x 1 ( t ) , y 1 ( t ) ) f T ( t , x 2 ( t ) , y 2 ( t ) ) | × | f ( t , x 1 ( t ) , y 1 ( t ) ) f ( t , x 2 ( t ) , y 2 ( t ) ) | κ 1 x 1 ( t ) x 2 ( t ) 2 + κ 2 y 1 ( t ) y 2 ( t ) 2 .
Assumption 5.
Assume that the external disturbance ω ¯ ( t ) is bounded and there exists a positive constant ω ^ that satisfies
sup t t 0 ω ¯ ( t ) ω ^ ,
Lemma 1.
Ref. [36] Assume that ι R , Γ , Υ , Z a n d Λ are matrices with proper dimensions. Therefore, the Kronecker product has the properties
( 1 ) ( Γ Υ ) T = Γ T Υ T ; ( 2 ) ( ι Γ ) Υ = Γ ( ι Υ ) ; ( 3 ) ( Γ + Z ) Υ = Γ Υ + Z Υ ; ( 4 ) ( Γ Z ) ( Υ Λ ) = ( Γ Υ ) Z Λ .
Definition 1.
Ref. [37] For any given initial value of the system ζ ^ , if there exists a compact set ^ and a constant ϑ such that as t + , the error state e ( t ) converges to
^ = e R n N | E [ e ] ϑ ,
and then the MASs (1) is said to achieve quasi-consensus; ϑ is the upper bound of error; and if ϑ = 0 , MASs (1) is said to achieve consensus.
Definition 2.
Ref. [8] Given an impulsive sequence τ = { t k } k = 1 + , k N , let N τ ( t , s ) denotes the number of impulsive times in the interval ( s , t ] , exists two constants N 0 N and τ a v e > 0 , such that
N τ ( t , s ) t s τ a v e + N 0 .
τ a v e and N 0 are called the average impulsive interval and the elasticity number, respectively.

3. Main Results

Theorem 1.
Suppose that Assumptions 1–5 hold, if there exists a positive definite matrix P and positive scalars ε 1 , ε 2 , ε 3 , γ, κ 1 , κ 2 and γ 0 0 , such that
s t H ( v ) d v γ ( t s ) + γ 0 , 0 s < t ,
θ = ln ( Z sup σ ) τ sup + γ < 0 ,
0 < σ < 1 ,
where Λ ¯ ( t ) = P ( I N A ) + ( I N A ) T P + α [ P ( I N T B ( t ) Q ) + ( I N T B ( t ) Q ) T P ] + β ε 1 P P + β κ 2 ε 1 1 ( ε 2 + 1 ) I n N , b = λ min ( P ) , q = λ max ( P ) , H ( t ) = b 1 λ max ( Λ ¯ ( t ) ) , η = d ^ 2 ξ ¯ ψ ¯ q ( ε 3 1 + 1 ) , σ = d 2 ( ε 3 q b 1 + 1 ) , ρ = β κ 2 ε 1 1 ( ε 2 1 + 1 ) , ψ ¯ = max i N [ 1 , N ] ψ ¯ i , d ^ = max k N d k , G = ( I N + U k L ) I n , d = λ max ( G ) , Z sup = e γ τ sup + γ 0 and κ = max { κ 1 , κ 2 } .
Then, the time-varying multi-agent system (1) with external inputs and deception attacks can achieve quasi-consensus under the control protocol (4), and the upper bound of error can be estimated as
ϑ = ρ σ N 0 e γ 0 ω ^ 2 b θ + η Z sup b ( 1 σ Z sup ) + b 1 ρ Z sup ω ^ 2 τ sup ,
where Z sup = e γ τ sup + γ 0 .
Proof. 
Consider the following Lyapunov function:
V ( t , e ( t ) ) = e T ( t ) P e ( t ) .
For t [ t k , t k + 1 ) , k N , taking the Dini derivative of (12) gives:
D + V t , e t = 2 e T ( t ) P [ ( I N A ( t ) ) e ( t ) + β ( t ) F ( t , e ( t ) , ω ¯ ( t ) ) ] .
According to Assumption 1, one has:
2 e T ( t ) P ( I N A ( t ) ) e ( t ) = e T ( t ) ( P ( I N A ) + ( I N A ) T P ) e ( t ) + α e T ( t ) ( P ( I N T B ( t ) Q ) + ( I N T B ( t ) Q ) T P ) e ( t ) + ( α ( t ) α ) e T ( t ) ( P ( I N T B ( t ) Q ) + ( I N T B ( t ) Q ) T P ) e ( t ) .
2 e T ( t ) P β ( t ) F ( t , e ( t ) , ω ¯ ( t ) ) = β [ e T ( t ) P F ( t , e ( t ) , ω ¯ ( t ) ) + F T ( t , e ( t ) , ω ¯ ( t ) ) P e ( t ) ] + 2 ( β ( t ) β ) e T ( t ) P F ( t , e ( t ) , ω ¯ ( t ) ) .
Based on Assumption 4, it can be found that:
F T ( t , e ( t ) , ω ¯ ( t ) ) F ( t , e ( t ) , ω ¯ ( t ) ) = f T ( t , x ( t ) , ω ( t ) ) ( E I n ) T ( E I n ) f ( t , x ( t ) , ω ( t ) ) [ κ 1 x T ( t ) + κ 2 ω T ( t ) ] ( E I n ) ( E I n ) [ κ 1 x ( t ) + κ 2 ω ( t ) ] = κ 1 2 e T ( t ) e ( t ) + κ 1 κ 2 [ ω ¯ T ( t ) e ( t ) + e T ( t ) ω ¯ ( t ) ] + κ 2 2 ω ¯ T ( t ) ω ¯ ( t ) ( κ 1 2 + κ 1 κ 2 ε 2 ) e T ( t ) e ( t ) + ( κ 2 2 + κ 1 κ 2 ε 2 1 ) ω ¯ T ( t ) ω ¯ ( t ) ,
β [ e T ( t ) P F ( t , e ( t ) , ω ¯ ( t ) ) + F T ( t , e ( t ) , ω ¯ ( t ) ) P e ( t ) ] . β [ ε 1 e T ( t ) P P e ( t ) + ε 1 1 F T ( t , e ( t ) , ω ¯ ( t ) ) F ( t , e ( t ) , ω ¯ ( t ) ) ] β [ ε 1 e T ( t ) P P e ( t ) + ( κ 1 2 ε 1 1 + κ 1 κ 2 ε 2 ε 1 1 ) e T ( t ) e ( t ) + ( κ 2 2 ε 1 1 + κ 1 κ 2 ε 2 1 ε 1 1 ) ω ¯ T ( t ) ω ¯ ( t ) ] .
Substituting (14)–(17) into (13) and taking the mathematical expectation operation gives:
E [ D + V ( t , e ( t ) ) ] E { e T ( t ) ( P ( I N A ) + ( I N A ) T P ) e ( t ) + α e T ( t ) [ P ( I N T B ( t ) Q ) + ( I N T B ( t ) Q ) T P ] e ( t ) + β ε 1 e T ( t ) P P e ( t ) + ( β κ 1 2 ε 1 1 + β κ 1 κ 2 ε 2 ε 1 1 ) e T ( t ) e ( t ) + ( β κ 2 2 ε 1 1 + β κ 1 κ 2 ε 2 1 ε 1 1 ) ω ¯ T ( t ) ω ¯ ( t ) } .
Therefore, combining the above conditions with (18), we have:
E [ D + V ( t , e ( t ) ) ] H ( t ) E [ V ( t , e ( t ) ) ] + ρ ω ¯ T ( t ) ω ¯ ( t ) ,
where Λ ¯ ( t ) = P ( I N A ) + ( I N A ) T P + α [ P ( I N T B ( t ) Q ) + ( I N T B ( t ) Q ) T P ] + β ε 1 P P + β κ 2 ε 1 1 ( ε 2 + 1 ) I n N , b = λ min ( P ) , H ( t ) = b 1 λ max ( Λ ¯ ( t ) ) , ρ = β κ 2 ε 1 1 ( ε 2 1 + 1 ) and κ = max { κ 1 , κ 2 } .
For t [ t k , t k + 1 ) , k N and any positive number S, we establish a comparative differential equation as follows:
y ˙ ( t ) = H ( t ) y ( t ) + ρ ω ¯ T ( t ) ω ¯ ( t ) + S , y ( t k ) = Φ k
where Φ k = E [ V ( t k , e ( t k ) ) ] + S By solving and comparing the solutions of the differential equations, the following result is obtained:
E [ V S ( t , e ( t ) ) ] Φ k e t k t H ( v ) d v + ρ t k t ( ω ¯ T ( u ) ω ¯ ( u ) + S ) e u t H ( v ) d v d u .
For t [ t k , t k + 1 ) , k N , setting S 0 , one has:
E [ V ( t , e ( t ) ) ] E [ V ( t k , e ( t k ) ) ] e t k t H ( v ) d v + ρ t k t ω ¯ T ( u ) ω ¯ ( u ) e u t H ( v ) d v d u .
For t = t k , k N , according to (6), we obtain:
E [ V ( t k + , e ( t k + ) ) ] = E [ e T ( t k + ) P e ( t k + ) ] = E [ ( e T ( t k ) G T + W T ( t k ) ) × P ( G e ( t k ) + W ( t k ) ) ] = E [ e T ( t k ) G T P G e ( t k ) + e T ( t k ) G T P W ( t k ) + W T ( t k ) P G e ( t k ) + W T ( t k ) P W ( t k ) ] ,
where W ( t k ) = d k ( E Ψ ( t k ) I n ) ξ ( t k ) . As for the first term in (22), has:
E [ e T ( t k ) G T P G e ( t k ) ] = E { e T ( t k ) [ ( I N + U k L T ) I n ] P [ ( I N + U k L ) I n ] e ( t k ) } d 2 E [ V ( t k , e ( t k ) ) ] .
Then, we have:
E [ e T ( t k ) G T P W ( t k ) + W T ( t k ) P G e ( t k ) ] q E [ e T ( t k ) G T W ( t k ) + W T ( t k ) G e ( t k ) ] q E [ ε 3 e T ( t k ) G T G e ( t k ) + ε 3 1 W T ( t k ) W ( t k ) ] ε 3 d 2 q b 1 E [ V ( t k , e ( t k ) ) ] + ε 3 1 d ^ 2 ξ ¯ ψ ¯ q .
For the fourth term, we obtain:
E [ W T ( t k ) P W ( t k ) ] = E [ d k 2 ξ T ( t k ) ( E Ψ ( t k ) I n ) T P ( E Ψ ( t k ) I n ) ξ ( t k ) ] d ^ 2 ξ ¯ ψ ¯ q .
In summary, through (23)–(25), we reach the following conclusion:
E [ V ( t k + , e ( t k + ) ) ] d 2 ( ε 3 q b 1 + 1 ) E [ V ( t k , e ( t k ) ) + d ^ 2 ξ ¯ ψ ¯ q ( ε 3 1 + 1 ) σ E [ V ( t k , e ( t k ) ) ] + η ,
where σ = d 2 ( ε 3 q b 1 + 1 ) and η = d ^ 2 ξ ¯ ψ ¯ q ( ε 3 1 + 1 ) .
In this part, the mathematical induction method will be used to obtain the overall evolution process of the system, based on (21), which is proven as follows:
For t [ t 0 , t 1 ) , we have
E [ V ( t , e ( t ) ) ] E [ V ( t 0 , e ( t 0 ) ) ] e t 0 t H ( v ) d v + ρ t 0 t ω ¯ T ( u ) ω ¯ ( u ) e u t H ( v ) d v d u .
According to (21) and (26), for any t [ t m 1 , t m ) , m N , suppose that the following inequality holds:
E [ V ( t , e ( t ) ) ] σ m 1 E [ V ( t 0 , e ( t 0 ) ) ] e t 0 t H ( v ) d v + i = 0 m 2 ( σ m i 1 ρ t i t i + 1 ω ¯ T ( u ) ω ¯ ( u ) × e u t H ( v ) d v d u + σ i η e t m i 1 t H ( v ) d v ) + ρ t m 1 t ω ¯ T ( u ) ω ¯ ( u ) e u t H ( v ) d v d u .
For t [ t m , t m + 1 ) , m N , a comparative differential equation similar to (20) is established as follows:
y ˙ ( t ) = H ( t ) y ( t ) + ρ ω ¯ T ( t ) ω ¯ ( t ) + S , y ( t m ) = Φ m .
where Φ m = σ E [ V ( t m , e ( t m ) ) ] + S . By solving and comparing the solutions of the differential equations and S 0 , the following result is obtained:
E [ V ( t , e ( t ) ) ] σ E [ V ( t m , e ( t m ) ) ] e t m t H ( v ) d v + ρ t m t ω ¯ T ( u ) ω ¯ ( u ) e u t H ( v ) d v d u σ m E [ V ( t 0 , e ( t 0 ) ) ] e t 0 t H ( v ) d v + i = 0 m 1 ( σ m i ρ t i t i + 1 ω ¯ T ( u ) ω ¯ ( u ) × e u t H ( v ) d v d u + σ i η e t m i t H ( v ) d v ) + ρ t m t ω ¯ T ( u ) ω ¯ ( u ) e u t H ( v ) d v d u .
Based on the definition of N τ ( t , s ) in Definition 2, Assumption 5 and (30), for any t t 0 , one finds:
E [ V ( t , e ( t ) ) ] σ N τ ( t , t 0 ) E [ V ( t 0 , e ( t 0 ) ) ] e t 0 t H ( v ) d v + ρ t 0 t σ N τ ( t , u ) ω ¯ T ( u ) ω ¯ ( u ) e u t H ( v ) d v d u + η Z sup 1 ( σ Z inf ) N τ ( t , t 0 ) 1 σ Z sup + ρ Z sup ω ^ 2 τ sup ,
where Z sup = e γ τ sup + γ 0 and Z inf = e γ τ inf + γ 0 . Then, set θ = ln ( Z sup σ ) τ a v e + γ < 0 , and one has:
E [ V ( t , e ( t ) ) ] σ t t 0 τ a v e + N 0 e γ ( t t 0 ) + γ 0 E [ V ( t 0 , e ( t 0 ) ) ] + ρ t 0 t σ t u τ a v e + N 0 e γ ( t u ) + γ 0 ω ¯ T ( u ) ω ¯ ( u ) d u + η Z sup 1 ( σ Z inf ) t t 0 τ a v e + N 0 1 σ Z sup + ρ Z sup ω ^ 2 τ sup σ N 0 e γ 0 e θ ( t t 0 ) E [ V ( t 0 , e ( t 0 ) ) ] + ρ σ N 0 e γ 0 t 0 t e θ ( t u ) ω ¯ T ( u ) ω ¯ ( u ) d u + η Z sup 1 ( σ Z inf ) t t 0 τ a v e + N 0 1 σ Z sup + ρ Z sup ω ^ 2 τ sup .
It follows from (32) that:
lim t + E [ V ( t , e ( t ) ) ] ρ σ N 0 e γ 0 ω ^ 2 θ + η Z sup 1 σ Z sup + ρ Z sup ω ^ 2 τ sup .
As
E [ e ( t ) 2 ] 1 b E [ V ( t , e ( t ) ) ] .
In conclusion, the nonlinear time-varying multi-agent systems with external inputs under deception attacks can achieve quasi-consensus under impulsive protocol (4), and they have the upper bound of error:
ϑ = ρ σ N 0 e γ 0 ω ^ 2 b θ + η Z sup b ( 1 σ Z sup ) + b 1 ρ Z sup ω ^ 2 τ sup .
Remark 2.
Different from the works [31,32,35], the deception attacks in this paper mainly focus on the false data injection attacks in impulsive form. Note that the time-varying matrix in [37] assumes that B T ( t ) B ( t ) K I n with 0 < K < + , and this bounded condition is removed here. In [35], the quasi-consensus problem of time-invariant systems under deception attacks is considered. Compare with [35], this paper takes into account external inputs, deception attacks and time-varying dynamics, which have greater significance in practice.
Remark 3.
Based on the continuous time evolution characteristics of the system, a reasonable assumption is constructed as (9). In addition, it can be seen from (21) that the system is always unstable without a control protocol. If the system is stable, then (9) can be changed to:
s t H ( v ) d v γ ( t s ) γ 0 , 0 s < t .
Corollary 1.
Under Assumptions 1–5, if there exists a positive definite matrix P and positive scalars ε 1 , ε 2 , ε 3 , γ, κ 1 , κ 2 and γ 0 0 , the condition (34), and the following condition is satisfied:
θ ˜ = ln ( Z n d σ ) τ a v e γ < 0 ,
where Z n d = e γ τ inf γ 0 . Then, the nonlinear time-varying multi-agent system (1) with external inputs and deception attacks can achieve quasi-consensus under the control protocol (4), and the upper bound of error can be estimated as:
ϑ = ρ σ N 0 e γ 0 ω ^ 2 b θ ˜ + η Z n d b ( 1 σ Z n d ) + b 1 ρ Z n d ω ^ 2 τ sup .
Proof. 
As this inference only involves the assumption of continuous time evolution characteristics of the system, it only needs to prove the first part and the third part according to Theorem 1. According to the solution of (19) and comparison function (20), for t [ t k , t k + 1 ) , k N , setting S 0 , one can find:
E [ V ( t , e ( t ) ) ] E [ V ( t k , e ( t k ) ) ] e t k t H ( v ) d v + ρ t k t ω ¯ T ( u ) ω ¯ ( u ) e u t H ( v ) d v d u .
Similarly, we find that, as S 0
E [ V ( t , e ( t ) ) ] σ N 0 e γ 0 e θ ˜ ( t t 0 ) E [ V ( t 0 , e ( t 0 ) ) ] + ρ σ N 0 e γ 0 t 0 t e θ ˜ ( t u ) ω ¯ T ( u ) ω ¯ ( u ) d u + η Z n d 1 ( σ Z inf ) t t 0 τ a v e + N 0 1 σ Z n d + ρ Z n d ω ^ 2 τ sup ,
where Z inf = e γ τ sup γ 0 . When t + , we have:
lim t + E [ V ( t , e ( t ) ) ] ρ σ N 0 e γ 0 ω ^ 2 θ ˜ + η Z n d 1 σ Z n d + ρ Z n d ω ^ 2 τ sup .
Hence, the nonlinear time-varying multi-agent system with external inputs and deception attacks can achieve quasi-consensus under control protocol (4), and
ϑ = ρ σ N 0 e γ 0 ω ^ 2 b θ ˜ + η Z n d b ( 1 σ Z n d ) + b 1 ρ Z n d ω ^ 2 τ sup .

4. Numerical Examples

In this section, a numerical example is provided to verify the applicability of theoretical results. The undirected communication graph of time-varying MASs (1) is shown as Figure 2. From this, we know that
L = 2 1 1 0 1 3 1 1 1 1 2 0 0 1 0 1 .
We consider 3-dimensional time-varying MASs with four agents, i.e., x i ( t ) = [ x i 1 ( t ) , x i 2 ( t ) , x i 3 ( t ) ] T and i N [ 1 , 4 ] . Setting ω i ( t ) = [ 0.15 cos ( t ) , 0.2 sin ( t ) , 0.3 cos ( t ) ] T , t 0 = 0 and
ζ ^ = ( ζ 1 T , ζ 2 T , , ζ 4 T ) T = 0.7 0.2 1.3 0.3 0.2 2.4 2.5 0.7 1.6 0.4 0.4 1.4 T .
In addition, let f ( t , x i ( t ) , ω i ( t ) ) = [ sat ( x i 1 ( t ) ) + sat ( ω i 1 ( t ) ) , 0 , 0 ] T , where sat ( y ( t ) ) = 0.5 ( y ( t ) + 1 y ( t ) 1 ) . According to the control protocol designed in (4), Figure 3 describes an impulsive sequence with attack strength d ^ = 0.34 and impulsive control gain U k = 0.35 . On the one hand, we assume that ω ^ = 1.2 , P = I 12 , ξ i ( t ) = [ ξ i 1 ( t ) , ξ i 2 ( t ) , ξ i 3 ( t ) ] T and ξ i ( t ) = [ 0.15 cos ( t ) , 0.2 sin ( t ) , 0.3 cos ( t ) ] T , then ξ ¯ = 0.53 .
Considering the influence of an impulsive attack sequence, we adopt a distinctive impulsive signal { t k } k = 1 + , which satisfies (8) and is described as follows:
t k t k 1 = χ ˜ , if mod ( k , N 0 ) 0 , N 0 ( τ a v e χ ˜ ) + χ ˜ , if mod ( k , N 0 ) = 0 .
where χ ˜ and τ a v e are positive numbers that satisfy χ ˜ τ a v e , N 0 N . Hence, we find τ inf = inf k N { t k + 1 t k } = χ ˜ and τ sup = sup k N { t k + 1 t k } = N 0 ( τ a v e χ ˜ ) + χ ˜ . We choose χ ˜ = 0.2 , N 0 = 3 , τ a v e = 0.4 , according to (40), and we find that τ inf = 0.2 , τ sup = 0.8 . Choose that κ 1 = κ 2 = 0.5 , ε 1 = ε 2 = ε 3 = 1 , then κ = 0.5 . The parameters of system are set as follows:
A = 1.55 1.74 0 1 1 1 0.1 1.8 0.1 ,
with parameters T = diag { 0.4 , 0.3 , 0.3 } , Q = diag { 0.6 , 0.2 , 0.5 } and B ( t ) = diag { 0.2 cos ( t ) , 1.5 cos ( t ) , 0.4 cos ( t ) } . In addition, let E [ α ( t ) ] = α = 0.5 , E [ β ( t ) ] = β = 0.3 and ψ ¯ = 0.5 .
Based on the designed parameters and in consideration of s t H ( v ) d v 0.1 ( t s ) + 0.65 , then γ = 0.1 , γ 0 = 0.65 . σ = d 2 ( ε 3 q b 1 + 1 ) = 0.2 , θ = ln ( Z sup σ ) τ sup + γ = 1.037 < 0 .
As shown in Figure 4, the green curve represents the modulus of the average states of the agents of the time-varying MASs. According to the parameters selected above, the upper bound of error can be calculated ϑ = 0.5 , which is shown as Figure 5. When t + , the trajectories of states coincide and the MASs achieves consensus. It can be seen from Figure 5 that, when system (1) disturbed by both external disturbances and impulse deception attacks, the quasi-consensus can be achieved under the control protocol (4), and the error is kept within the error bound. If there is no external disturbances or impulse deception attacks, the consensus of the system can be obtained as shown in Figure 6.

5. Conclusions

In this paper, we studied the quasi-consensus of a class of time-varying MASs suffering from both external inputs and deception attacks. By utilizing the analysis method from [5], we relaxed the restrictive assumption on time-varying matrices. To describe the success of deception attacks, a stochastic variable that obeys a Bernoulli distribution was adopted. By employing the comparison principle, sufficient conditions to ensure quasi-consensus were derived. Finally, a simulation example was given to verify the theoretical results.

Author Contributions

Conceptualization, Z.Z.; methodology, Z.Z. and S.P.; software, Z.Z. and W.F.; validation, Z.Z., S.P. and W.F.; resources, Z.Z.; data curation, Z.Z.; writing—original draft preparation, Z.Z.; writing—review and editing, Z.Z., S.P. and W.F. All authors have read and agreed to the published version of the manuscript.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant 61973092, and in part by the Guangdong Basic and Applied Basic Research Foundation under Grant 2019A1515012104.

Institutional Review Board Statement

Not applicable.

Informed Consent Statement

Not applicable.

Data Availability Statement

Not applicable.

Conflicts of Interest

The authors declare no conflict of interest.

Abbreviations

The following abbreviations are used in this manuscript:
MASsMulti-agent systems
DoSDenial-of-service

References

  1. Xu, S.; Lam, J.; Zou, Y.; Li, J. Robust admissibility of time-varying singular systems with commensurate time delays. Automatica 2009, 45, 2714–2717. [Google Scholar] [CrossRef]
  2. Mazenc, F.; Malisoff, M.; Niculescu, S.I. Reduction model approach for linear time-varying systems with delays. IEEE Trans. Autom. Control 2014, 59, 2068–2082. [Google Scholar] [CrossRef]
  3. Chen, G.; Yang, Y. Relaxed conditions for the input-to-state stability of switched nonlinear time-varying systems. IEEE Trans. Autom. Control 2016, 62, 4706–4712. [Google Scholar] [CrossRef]
  4. Hu, W.; Zhu, Q.; Karimi, H.R. Some improved Razumikhin stability criteria for impulsive stochastic delay differential systems. IEEE Trans. Autom. Control 2019, 64, 5207–5213. [Google Scholar] [CrossRef]
  5. Zhou, B. On asymptotic stability of linear time-varying systems. Automatica 2016, 68, 266–276. [Google Scholar] [CrossRef]
  6. Zhou, B. Stability analysis of non-linear time-varying systems by Lyapunov functions with indefinite derivatives. IET Control Theory Appl. 2017, 11, 1434–1442. [Google Scholar] [CrossRef] [Green Version]
  7. Zhou, B.; Egorov, A.V. Razumikhin and Krasovskii stability theorems for time-varying time-delay systems. Automatica 2016, 71, 281–291. [Google Scholar] [CrossRef]
  8. Peng, S.; Deng, F. New criteria on p th moment input-to-state stability of impulsive stochastic delayed differential systems. IEEE Trans. Autom. Control 2017, 62, 3573–3579. [Google Scholar] [CrossRef]
  9. Zhang, W.; Han, Q.L.; Tang, Y.; Liu, Y. Sampled-data control for a class of linear time-varying systems. Automatica 2019, 103, 126–134. [Google Scholar] [CrossRef]
  10. Yang, J. A Consensus Control for a Multi-Agent System With Unknown Time-Varying Communication Delays. IEEE Access 2021, 9, 55844–55852. [Google Scholar] [CrossRef]
  11. Li, X.; Zhu, J. Event-triggered Weighted Average Consensus in Networks of Dynamic Agents with Time-varying Delay. IFAC-PapersOnLine 2021, 54, 127–132. [Google Scholar] [CrossRef]
  12. Xu, S.; Wang, B. Noisy Information Based Formation Control of Multi-Agent Systems in Time-Varying Communication Networks. IEEE Access 2021, 9, 70313–70321. [Google Scholar] [CrossRef]
  13. Hu, J.; Wang, Z.; Gao, H.; Stergioulas, L.K. Robust sliding mode control for discrete stochastic systems with mixed time delays, randomly occurring uncertainties, and randomly occurring nonlinearities. IEEE Trans. Ind. Electron. 2011, 59, 3008–3015. [Google Scholar] [CrossRef] [Green Version]
  14. Duan, Z.; Xiang, Z.; Karimi, H.R. Robust stabilisation of 2D state-delayed stochastic systems with randomly occurring uncertainties and nonlinearities. Int. J. Syst. Sci. 2014, 45, 1402–1415. [Google Scholar] [CrossRef]
  15. Zhang, Z.; Peng, S.; Liu, D.; Wang, Y.; Chen, T. Leader-Following Mean-Square Consensus of Stochastic Multiagent Systems With ROUs and RONs via Distributed Event-Triggered Impulsive Control. IEEE Trans. Cybern. 2020. [Google Scholar] [CrossRef]
  16. Almeida, R.; Girejko, E.; Hristova, S.; Malinowska, A. On leader-following consensus in multi-agent systems with discrete updates at random times. Entropy 2020, 22, 650. [Google Scholar] [CrossRef]
  17. Zhao, C.; Liu, X.; Zhong, S.; Shi, K.; Liao, D.; Zhong, Q. Secure consensus of multi-agent systems with redundant signal and communication interference via distributed dynamic event-triggered control. ISA Trans. 2021, 112, 89–98. [Google Scholar] [CrossRef]
  18. Ahirwar, S.; Swarnkar, R.; Bhukya, S.; Namwade, G. Application of drone in agriculture. Int. J. Curr. Microbiol. Appl. Sci. 2019, 8, 2500–2505. [Google Scholar] [CrossRef]
  19. Du, H.; Zhu, W.; Wen, G.; Duan, Z.; Lü, J. Distributed formation control of multiple quadrotor aircraft based on nonsmooth consensus algorithms. IEEE Trans. Cybern. 2017, 49, 342–353. [Google Scholar] [CrossRef]
  20. Chen, J.; Yan, S.; Yang, T.; Tan, S.C.; Hui, S.Y. Practical evaluation of droop and consensus control of distributed electric springs for both voltage and frequency regulation in microgrid. IEEE Trans. Power Electron. 2018, 34, 6947–6959. [Google Scholar] [CrossRef]
  21. Rahbari-Asr, N.; Zhang, Y.; Chow, M.Y. Consensus-based distributed scheduling for cooperative operation of distributed energy resources and storage devices in smart grids. IET Gener. Transm. Distrib. 2016, 10, 1268–1277. [Google Scholar] [CrossRef]
  22. Yu, J.; Yu, S.; Yan, Y. Fixed-time stability of stochastic nonlinear systems and its application into stochastic multi-agent systems. IET Control Theory Appl. 2021, 15, 126–135. [Google Scholar] [CrossRef]
  23. Zhang, W.; Ho, D.W.; Tang, Y.; Liu, Y. Quasi-consensus of heterogeneous-switched nonlinear multiagent systems. IEEE Trans. Cybern. 2019, 50, 3136–3146. [Google Scholar] [CrossRef]
  24. Zhang, W.; Tang, Y.; Han, Q.L.; Liu, Y. Sampled-Data Consensus of Linear Time-Varying Multiagent Networks With Time-Varying Topologies. IEEE Trans. Cybern. 2020. [Google Scholar] [CrossRef]
  25. Luo, H.; Wang, Y.; Zhan, R.; Zhang, X.; Wen, H.; Yang, S. Cluster-Delay Mean Square Consensus of Stochastic Multi-Agent Systems with Impulse Time Windows. Entropy 2021, 23, 1033. [Google Scholar] [CrossRef]
  26. Zhang, X.; Wang, S. Admissible consensus for descriptor multi-agent systems with exogenous disturbances. Entropy 2018, 20, 276. [Google Scholar] [CrossRef] [Green Version]
  27. Xu, Y.; Fang, M.; Pan, Y.J.; Shi, K.; Wu, Z.G. Event-triggered output synchronization for nonhomogeneous agent systems with periodic denial-of-service attacks. Int. J. Robust Nonlinear Control 2021, 31, 1851–1865. [Google Scholar] [CrossRef]
  28. Zhang, T.Y.; Ye, D. Distributed event-triggered control for multi-agent systems under intermittently random denial-of-service attacks. Inf. Sci. 2021, 542, 380–390. [Google Scholar] [CrossRef]
  29. Pang, Z.H.; Fan, L.Z.; Sun, J.; Liu, K.; Liu, G.P. Detection of stealthy false data injection attacks against networked control systems via active data modification. Inf. Sci. 2021, 546, 192–205. [Google Scholar] [CrossRef]
  30. He, W.; Qian, F.; Han, Q.L.; Chen, G. Almost sure stability of nonlinear systems under random and impulsive sequential attacks. IEEE Trans. Autom. Control 2020, 65, 3879–3886. [Google Scholar] [CrossRef]
  31. Shen, Z.; Yang, F.; Chen, J.; Zhang, J.; Hu, A.; Hu, M. Adaptive Event-Triggered Synchronization of Uncertain Fractional Order Neural Networks with Double Deception Attacks and Time-Varying Delay. Entropy 2021, 23, 1291. [Google Scholar] [CrossRef] [PubMed]
  32. Liu, L.; Sun, H.; Ma, L.; Zhang, J.; Bo, Y. Quasi-consensus control for a class of time-varying stochastic nonlinear time-delay multiagent systems subject to deception attacks. IEEE Trans. Syst. Man Cybern. Syst. 2020, 51, 6863–6873. [Google Scholar] [CrossRef]
  33. Javanmardi, H.; Dehghani, M.; Mohammadi, M.; Siamak, S.; Hesamzadeh, M.R. BMI-based load frequency control in microgrids under false data injection attacks. IEEE Syst. J. 2021. [Google Scholar] [CrossRef]
  34. Li, X.M.; Zhou, Q.; Li, P.; Li, H.; Lu, R. Event-triggered consensus control for multi-agent systems against false data-injection attacks. IEEE Trans. Cybern. 2019, 50, 1856–1866. [Google Scholar] [CrossRef]
  35. He, W.; Mo, Z.; Han, Q.L.; Qian, F. Secure impulsive synchronization in Lipschitz-type multi-agent systems subject to deception attacks. IEEE/CAA J. Autom. Sin. 2020, 7, 1326–1334. [Google Scholar] [CrossRef]
  36. Wang, Q.; Wang, J.L.; Wu, H.N.; Huang, T. Consensus and H Consensus of Nonlinear Second-Order Multi-Agent Systems. IEEE Trans. Netw. Sci. Eng. 2020, 7, 1251–1264. [Google Scholar] [CrossRef]
  37. Wen, G.; Zhai, X.; Peng, Z.; Rahmani, A. Fault-tolerant secure consensus tracking of delayed nonlinear multi-agent systems with deception attacks and uncertain parameters via impulsive control. Commun. Nonlinear Sci. Numer. Simul. 2020, 82, 105043. [Google Scholar] [CrossRef]
Figure 1. Configuration of time-varying MASs with external inputs under deception attacks.
Figure 1. Configuration of time-varying MASs with external inputs under deception attacks.
Entropy 24 00447 g001
Figure 2. Undirected communication graph of time-varying MASs (1).
Figure 2. Undirected communication graph of time-varying MASs (1).
Entropy 24 00447 g002
Figure 3. Impulsive sequence for d ^ = 0.34 and U k = 0.35 .
Figure 3. Impulsive sequence for d ^ = 0.34 and U k = 0.35 .
Entropy 24 00447 g003
Figure 4. State of four agents.
Figure 4. State of four agents.
Entropy 24 00447 g004
Figure 5. Trajectories of system errors under external inputs and impulse deception attacks.
Figure 5. Trajectories of system errors under external inputs and impulse deception attacks.
Entropy 24 00447 g005
Figure 6. Trajectories of system errors without external inputs or impulse deception attacks.
Figure 6. Trajectories of system errors without external inputs or impulse deception attacks.
Entropy 24 00447 g006
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Share and Cite

MDPI and ACS Style

Zeng, Z.; Peng, S.; Feng, W. Quasi-Consensus of Time-Varying Multi-Agent Systems with External Inputs under Deception Attacks. Entropy 2022, 24, 447. https://doi.org/10.3390/e24040447

AMA Style

Zeng Z, Peng S, Feng W. Quasi-Consensus of Time-Varying Multi-Agent Systems with External Inputs under Deception Attacks. Entropy. 2022; 24(4):447. https://doi.org/10.3390/e24040447

Chicago/Turabian Style

Zeng, Zixian, Shiguo Peng, and Wandian Feng. 2022. "Quasi-Consensus of Time-Varying Multi-Agent Systems with External Inputs under Deception Attacks" Entropy 24, no. 4: 447. https://doi.org/10.3390/e24040447

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop