{"title":"Self-triggered Impulsive Synchronization of Multi-agent Systems with Encrypted Communication*","authors":"Xuegang Tan, Jinde Cao","doi":"10.1109/ICIST52614.2021.9440569","DOIUrl":null,"url":null,"abstract":"This paper discusses the self-triggered impulsive synchronization of multi-agent systems (MASs) with encrypted communication. Using a chaotic encrypted scheme, the sampling data will be encrypted before communicating, and the encrypted data will be decrypted when an agent received these encrypted data from its neighbors and utilized into the event-based impulsive controller to realize the state synchronization of MASs. This scheme has a distinct superiority to solve the privacy protection of agents, and a simulation is given to demonstrate the effectiveness of the obtained results.","PeriodicalId":371599,"journal":{"name":"2021 11th International Conference on Information Science and Technology (ICIST)","volume":"34 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2021-05-21","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2021 11th International Conference on Information Science and Technology (ICIST)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICIST52614.2021.9440569","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This paper discusses the self-triggered impulsive synchronization of multi-agent systems (MASs) with encrypted communication. Using a chaotic encrypted scheme, the sampling data will be encrypted before communicating, and the encrypted data will be decrypted when an agent received these encrypted data from its neighbors and utilized into the event-based impulsive controller to realize the state synchronization of MASs. This scheme has a distinct superiority to solve the privacy protection of agents, and a simulation is given to demonstrate the effectiveness of the obtained results.