{"title":"DoS攻击下多智能体系统的二部时变编队跟踪控制","authors":"Lianghao Ji , Kangyue Zhao , Chengmei Tang","doi":"10.1016/j.ins.2025.122589","DOIUrl":null,"url":null,"abstract":"<div><div>This study addresses the bipartite time-varying formation tracking control problem in multi-agent systems (MASs) with multiple leaders subjected to denial-of-service (DoS) attacks. Current DoS defense methods frequently impose stringent limitations on topological alterations, rendering them unsuitable for dynamic and complex attack scenarios. To tackle this challenge, we propose a security defense strategy utilizing a switching topology. This strategy integrates a minimum cost recovery approach that facilitates the localization and dynamic repair of communication links compromised by DoS attacks. Moreover, we designed a distributed adaptive compensator to compute the convex hull of multiple leaders' outputs, thereby addressing the formation tracking problem without dependence on global information. Furthermore, we introduce an enhanced event-triggered control scheme designed to minimize the wastage of communication resources in insecure environments. Finally, the stability of the system is analyzed utilizing Lyapunov theory, and the effectiveness of the proposed strategy is demonstrated through simulations conducted under DoS attack conditions.</div></div>","PeriodicalId":51063,"journal":{"name":"Information Sciences","volume":"721 ","pages":"Article 122589"},"PeriodicalIF":6.8000,"publicationDate":"2025-08-18","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Bipartite time-varying formation tracking control for multiagent systems with multiple leaders subject to DoS attacks\",\"authors\":\"Lianghao Ji , Kangyue Zhao , Chengmei Tang\",\"doi\":\"10.1016/j.ins.2025.122589\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This study addresses the bipartite time-varying formation tracking control problem in multi-agent systems (MASs) with multiple leaders subjected to denial-of-service (DoS) attacks. Current DoS defense methods frequently impose stringent limitations on topological alterations, rendering them unsuitable for dynamic and complex attack scenarios. To tackle this challenge, we propose a security defense strategy utilizing a switching topology. This strategy integrates a minimum cost recovery approach that facilitates the localization and dynamic repair of communication links compromised by DoS attacks. Moreover, we designed a distributed adaptive compensator to compute the convex hull of multiple leaders' outputs, thereby addressing the formation tracking problem without dependence on global information. Furthermore, we introduce an enhanced event-triggered control scheme designed to minimize the wastage of communication resources in insecure environments. Finally, the stability of the system is analyzed utilizing Lyapunov theory, and the effectiveness of the proposed strategy is demonstrated through simulations conducted under DoS attack conditions.</div></div>\",\"PeriodicalId\":51063,\"journal\":{\"name\":\"Information Sciences\",\"volume\":\"721 \",\"pages\":\"Article 122589\"},\"PeriodicalIF\":6.8000,\"publicationDate\":\"2025-08-18\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Information Sciences\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S0020025525007224\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"0\",\"JCRName\":\"COMPUTER SCIENCE, INFORMATION SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Information Sciences","FirstCategoryId":"94","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S0020025525007224","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"0","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
Bipartite time-varying formation tracking control for multiagent systems with multiple leaders subject to DoS attacks
This study addresses the bipartite time-varying formation tracking control problem in multi-agent systems (MASs) with multiple leaders subjected to denial-of-service (DoS) attacks. Current DoS defense methods frequently impose stringent limitations on topological alterations, rendering them unsuitable for dynamic and complex attack scenarios. To tackle this challenge, we propose a security defense strategy utilizing a switching topology. This strategy integrates a minimum cost recovery approach that facilitates the localization and dynamic repair of communication links compromised by DoS attacks. Moreover, we designed a distributed adaptive compensator to compute the convex hull of multiple leaders' outputs, thereby addressing the formation tracking problem without dependence on global information. Furthermore, we introduce an enhanced event-triggered control scheme designed to minimize the wastage of communication resources in insecure environments. Finally, the stability of the system is analyzed utilizing Lyapunov theory, and the effectiveness of the proposed strategy is demonstrated through simulations conducted under DoS attack conditions.
期刊介绍:
Informatics and Computer Science Intelligent Systems Applications is an esteemed international journal that focuses on publishing original and creative research findings in the field of information sciences. We also feature a limited number of timely tutorial and surveying contributions.
Our journal aims to cater to a diverse audience, including researchers, developers, managers, strategic planners, graduate students, and anyone interested in staying up-to-date with cutting-edge research in information science, knowledge engineering, and intelligent systems. While readers are expected to share a common interest in information science, they come from varying backgrounds such as engineering, mathematics, statistics, physics, computer science, cell biology, molecular biology, management science, cognitive science, neurobiology, behavioral sciences, and biochemistry.