Junfeng Guo , Fei Wang , Chuan Zhang , Xin Sui , Ning Li
{"title":"基于钉住脉冲策略的复杂动态网络的安全集群同步:异质性与欺骗攻击","authors":"Junfeng Guo , Fei Wang , Chuan Zhang , Xin Sui , Ning Li","doi":"10.1016/j.ejcon.2025.101277","DOIUrl":null,"url":null,"abstract":"<div><div>Secure cluster synchronization of a class of complex dynamic networks (CDNs) is studied in this article. Firstly, this paper introduces a heterogeneous dynamic network model that is attacked by deception attacks and assumes that the occurrences of deception attacks are always subject to Bernoulli distribution. Secondly, a impulsive controller (the so-called pinning impulsive control) is designed for part of nodes. Then, based on the new impulsive differential inequality and Lyapunov stability theory, the secure synchronization criterion is given, and the specific synchronization error upper bound is estimated. Furthermore, this article theoretically analyzes the synchronization region related to impulsive gain, average impulsive interval, and the number of pinning nodes. Finally, several numerical simulation examples are used to verify the correctness of the theoretical results in this manuscript, and the relationship between the synchronous control region and the relevant control parameters is discussed in detail.</div></div>","PeriodicalId":50489,"journal":{"name":"European Journal of Control","volume":"85 ","pages":"Article 101277"},"PeriodicalIF":2.5000,"publicationDate":"2025-07-08","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Secure cluster synchronization of the complex dynamical networks with pinning impulsive strategies: When heterogeneity meets deception attacks\",\"authors\":\"Junfeng Guo , Fei Wang , Chuan Zhang , Xin Sui , Ning Li\",\"doi\":\"10.1016/j.ejcon.2025.101277\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>Secure cluster synchronization of a class of complex dynamic networks (CDNs) is studied in this article. Firstly, this paper introduces a heterogeneous dynamic network model that is attacked by deception attacks and assumes that the occurrences of deception attacks are always subject to Bernoulli distribution. Secondly, a impulsive controller (the so-called pinning impulsive control) is designed for part of nodes. Then, based on the new impulsive differential inequality and Lyapunov stability theory, the secure synchronization criterion is given, and the specific synchronization error upper bound is estimated. Furthermore, this article theoretically analyzes the synchronization region related to impulsive gain, average impulsive interval, and the number of pinning nodes. Finally, several numerical simulation examples are used to verify the correctness of the theoretical results in this manuscript, and the relationship between the synchronous control region and the relevant control parameters is discussed in detail.</div></div>\",\"PeriodicalId\":50489,\"journal\":{\"name\":\"European Journal of Control\",\"volume\":\"85 \",\"pages\":\"Article 101277\"},\"PeriodicalIF\":2.5000,\"publicationDate\":\"2025-07-08\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"European Journal of Control\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0947358025001062\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"European Journal of Control","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0947358025001062","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
Secure cluster synchronization of the complex dynamical networks with pinning impulsive strategies: When heterogeneity meets deception attacks
Secure cluster synchronization of a class of complex dynamic networks (CDNs) is studied in this article. Firstly, this paper introduces a heterogeneous dynamic network model that is attacked by deception attacks and assumes that the occurrences of deception attacks are always subject to Bernoulli distribution. Secondly, a impulsive controller (the so-called pinning impulsive control) is designed for part of nodes. Then, based on the new impulsive differential inequality and Lyapunov stability theory, the secure synchronization criterion is given, and the specific synchronization error upper bound is estimated. Furthermore, this article theoretically analyzes the synchronization region related to impulsive gain, average impulsive interval, and the number of pinning nodes. Finally, several numerical simulation examples are used to verify the correctness of the theoretical results in this manuscript, and the relationship between the synchronous control region and the relevant control parameters is discussed in detail.
期刊介绍:
The European Control Association (EUCA) has among its objectives to promote the development of the discipline. Apart from the European Control Conferences, the European Journal of Control is the Association''s main channel for the dissemination of important contributions in the field.
The aim of the Journal is to publish high quality papers on the theory and practice of control and systems engineering.
The scope of the Journal will be wide and cover all aspects of the discipline including methodologies, techniques and applications.
Research in control and systems engineering is necessary to develop new concepts and tools which enhance our understanding and improve our ability to design and implement high performance control systems. Submitted papers should stress the practical motivations and relevance of their results.
The design and implementation of a successful control system requires the use of a range of techniques:
Modelling
Robustness Analysis
Identification
Optimization
Control Law Design
Numerical analysis
Fault Detection, and so on.