Dynamic event-triggered consensus control for nonlinear multi-agent systems under DoS attacks

: In this paper, we investigated leader-following consensus control for nonlinear multi-agent systems (MASs) experiencing denial-of-service (DoS) attacks. We proposed a distributed control strategy incorporating an adaptive scheme and a state feedback control gain to eliminate the e ff ects of system nonlinear dynamics and uncertainties. In addition, we introduced a dynamic event-triggered control (DETC) to minimize the utilization of communication resources. Finally, we provided simulation results to show the validity of the proposed approach.


Introduction
In recent years, multi-agent consensus control has been recognized as a vital element of distributed collaborative control for applications such as distributed computing, unmanned aerial vehicle formation, and intelligent transportation systems.Researchers have shown significant interest in this area, and a wide range of control mechanisms have been explored in the past few years.These control mechanisms include adaptive [1][2][3][4], fault-tolerant [5], impulse [6,7], and sliding mode [8] methods.
In practical systems, the stability of the system state is susceptible to disruption from unexpected factors, including nonlinear dynamics and system uncertainties.Existing research has primarily focused on continuous-time systems, where the state information of intelligent agents is continuously transmitted between nodes, leading to significant network usage and energy consumption.However, the development of event-triggered control solves this problem by avoiding constant communication.Earlier studies on event-triggered control that can be found have investigated centralized, distributed, and self-triggered event-triggered control techniques [9][10][11].One researcher proposed an adaptive event-triggered control scheme for strongly connected networks that dynamically adjusted the triggering time interval on the basis of sampled data [12].Another mechanism using a dynamic event-triggering mechanism was proposed to reduce communication resource wastage compared with traditional event-triggering mechanisms [13].Others have assumed that system parameters such as the efficiency factor of the executor, external disturbances, and precursor control input signals are all unknown and introduced a fault-tolerant control to obtain sufficient conditions for consistent tracking [14].However, these findings primarily investigate traditional event triggering mechanisms.In [15,16], researchers proposed a dynamic event-triggered mechanism, which can significantly reduce the number of triggers and conserve communication resources.researchers respectively proposed centralized and distributed dynamic event-triggered mechanisms in [15,16], while scholars suggested both centralized and distributed mechanisms in [17], verifying their superiority.
However, the rapid growth of network information technologies has also led to a rise in cyber attacks.Among them, denial-of-service (DoS) attacks are the most common, being relatively easy to execute in the attack space.These attacks usually target the controller or exhaust the resources of the target system directly, resulting in the system being unable to provide normal services or communication.In some cases, these attacks cause the system to crash.Therefore, countering DoS attacks has received significant research attention.
Researchers studied the multi-agent systems(MASs) under DoS attacks in given attack frequency and upper bounds on attack duration [18,19].Compared with linear systems, nonlinear MASs are more widely used in real life.Among these, a secure controller based on event triggering was proposed to solve the lead-following consensus problem of second-order nonlinear systems [20].This is more common than linear systems.Another proposal was for an event-triggered adaptive fault-tolerant control strategy, which reduced the computational cost of heterogeneity [21].For nonperiodic DoS attacks, the upper bounds of network attacks, actuator failures, attack duration, and frequency are obtained.Another method uses a security mechanism employing a prediction-based switching observer scheme to address the issue of invalidation in event-triggered mechanisms during attack intervals [22].A novel framework for observer-based event-triggered containment control, taking into account the occurrence of DoS attacks, has also been introduced [23].This framework establishes a resilient event-triggered controller, using a specially designed observer.The goal is to achieve consistent control of MASs in the presence of DoS attacks.
Based on these observations, we aim to explore the security consensus problem of nonlinear MAS with external disturbances under DoS attacks in this paper.Our contributions are as follows.
1) In this paper, a nonlinear system with external disturbances is considered, and the effects of the nonlinear dynamics and uncertainty of the system are eliminated by designing an adaptive scheme and state-feedback control gains by updating the laws of the adaptive parameters online.
2) Compared with [22,23], a dynamic variable is introduced to adjust the triggering instances under DoS attacks.Therefore, the event-triggered mechanism proposed in this paper is more flexible and can effectively save communication resources.In addition, continuous communication between agents is not required to determine whether a trigger condition satisfies the trigger condition.Notation R is the set of real numbers, and R N×N is the set of N × N real matrix.∥•∥ represents a Euclidean norm of vectors or matrices.The superscripts A −1 and A T represent the inverse and transpose of matrix A. λ max (A) is the maximum eigenvalue, and λ min (A) is the minimum eigenvalue of matrix A. D + (•) denotes the righthand derivative of a function, and is Kronecker product.
diag {A 1 , • • • , A n } is the diagonal matrix.∩ is the intersection of sets, and ∪ denotes the union of sets.

Communication graphs
For a given MAS, the digraph G is (V, E), where V = {1, 2, • • • , N} is the set of nodes, and E ⊆ V × V represents the edge set of followers.The information exchange between each node can be described by the adjacency matrix A and the Laplacian matrix L. A = a i j ∈ R N×N if agents i and j communicate with one another, a i j = 1; otherwise a i j = 0 and L = l i j ∈ R n×n where L = D − A, The degree matrix D = diag(d i ) with d i = N i=1 a i j .In this paper, we assume that the agents are linked by a balancing topology, i.e., a i j = a ji .If the agent i communicates with the leader, then b i = 1; otherwise, b i = 0.

MAS modeling
For a leader-following system, the dynamics of the leader are described by the equation (2.1) The ith follower system is ẋi In the preceding, x(t) ∈ R n are positions of the agent, u i (t) ∈ R is the control input, A ∈ R n×n and B ∈ R n×p are system matrices, f (x) is a nonlinear function, and w i is the uncertainty input satisfying where ς i1 < 1,ς i2 and γ i are unknown constants.Lemma 1.If the nonlinear function f (t, x i (t)), i = 1, 2, ..., is continuously differentiable in a region S ∈ R 2 and x i (t 0 ) ∈ S , then for any x i (t 0 ) ∈ S , the following formula is satisfied: where where We also need some assumptions to ensure that the purpose is achieved.Assumption 2. A, B can be stabilized, and the digraph G is strongly connected.Next, we define the position errors e i (t): According to Definition 1, we have . (2.7) We also have where e(t) = [e 1 (t), e 2 (t), ,then Eq (2.8) can be expressed as where Definition 1. MAS (2.1) and (2.2) are said to have consensus if each agent's position state in the system satisfies lim (2.11)

Controller design
The distributed adaptive control input is where ēi = N j=1 a ji e ji , a ii = a i0 + N j=1, j i a i j .k i is the control gain determined based on the linear matrix inequality(LMI) where andP 0 is a positive definition matrix.Ψ i (t) is defined as where δix is the estimate of unknown parameters δ ix .The following describes the updated laws for the adaptive parameters: Since δ i is an unknown constant, defined as δi (t) = δi (t) − δ i , the adaptive error systems are described by It follows from Eq (2.12) that u(t) = ke(t) − ēΨ(t), (2.17) where Next, we define the event trigger time series as t j k for the jth agent.Therefore, the next triggering time t i k+1 for the ith agent can be expressed as The function H i (•) is given by where θ i > 0,α i , η i ∈ R n > 0. q i (t) is defined as the measurement error according to Eq (2.6): (2.21) where β i > 0, initial value χ i (0) > 0 could be randomly selected, and t i 0 = 0. Remark 1: The internal dynamic variable updates according to internal variables such as self-feedback, measurement error, and neighborhood error.In comparison with the conventional static triggering strategy [22,23], the dynamic event triggered control protocol we proposed can more effectively reduce network communication and save resources.

Cyber attack model
A DoS attack aims to block the communication channels so the targeted system cannot exchange information normally.Communication channels are not the only things affected by DoS attacks because the attacks can damage communication equipment along with hindering data transmission, measurement, and control channels simultaneously.DoS attacks are extremely destructive to the system, but their energy consumption requires attackers to replenish energy supplies after the attack is over, which takes time.Therefore, the time series can be split into two sections based on whether a DoS assault was launched.In the absence of the DoS attack, the system functions and communicates properly.However, in the presence of a DoS attack, communication is cut off, and the controller stops functioning.Here, we assume that the time interval of DoS attacks is {t m } m∈N , where t m is the moment of the DoS attack, and [t m , t m + ∆ m ] is the mth DoS time interval, and ∆ m is the time duration of the mth attack.The DoS attack interval is the same for all multi-agents.Thus, the set time instants where communication is blocked (the interval of the DoS attack) are Similarly, the sequence of time intervals without attacks is given by Because of the recovery mechanism, the MAS cannot immediately restore communication after the end of a DoS attack, and due to the event-triggering mechanism, there is an upper bound for the time when the two events occur consecutively.We assume that they can exist at the same time.Therefore, the actual DoS attack lasts longer, and consequently, the mth DoS attack's actual time frame may be described as t m , t m + ∆m .The new time period of the DoS attack is as follows: Assumption 2. Define n a (t 0 , t) as the number of attacks in the period [t 0 , t], so the attack frequency F a (t 0 , t) > 0 satisfies Assumption 3. Define N a (t 0 , t) as the total time interval of the DoS attack in the period [t 0 , t].The constants where 1 T 1 is the attack strength.Lemma 1.Previous research considers Eq (2.1) and this DoS attack model under Assumptions 2 and 3 [18].If the Lyapunov function where l 0 , l 1 , τ 0 , τ 1 are positive constants.T 1 , F 1 defined in Assumption 3 satisfies where 0 < η * < l 0 is the time to restore communication.ρ > 0,κ ≥ 1 is a constant satisfying Thus, we say that V(t) are bounded.Remark 2: Lemma 1 gives an upper bound on DoS attack frequency and duration, ensuring that the Lyapunov function remains stable over the entire time span [18].
Remark 3: The DoS attack considered in this paper mainly attacks the communication channels between agents.Thus, when the DoS attack comes, there is no information interaction between neighboring agents, and the event-triggering control is not triggered.In addition, we consider a DETC.Compared with the traditional event-triggering control, we introduce a dynamic variable that uses communication resources more effectively.In the simulation section below, we compare our method with the traditional event-triggering mechanism.

Stability analysis
In this section, we prove system stability.Our presentation has two sections: the stability study of the MAS (2.1) and (2.2) under a DoS attack and the proof of non-Zeno behavior.
Theorem 1.For the MAS (2.1) and (2.2) under DoS attacks, we consider Assumption 1 and the controller (2.12).If the LMI (2.13) satisfies (A + L ⊗ BK) T P + P(A + L ⊗ BK) ≤ ξ i P, where ξ i ∈ R n = σ i η i , σ i > 1, then a feasible solution exists and the MAS is said to achieve leader-following consensus.
Proof of Theorem 1.The system stability proof is also divided into two parts.The communication of the system is damaged under a DoS attack, but the system is not always in an impassable state.The proof is divided between DoS attacks and non-DoS attacks, as per the prior section.When there are non-DoS attacks in the system, we consider the Lyapunov function The preceding implies that χ i (t) ≥ χ i (0)e −(β i +θ i )t > 0, ( which leads to W(t) > 0.
The derivative of W is According to Eq (2. 3), the condition in Assumption 1, and the control protocol in Eq (2.12), we have Choosing Ψ i (t) as in Eq (2.15), we obtain then where When there are DoS attacks in the system, then communication and control channel blockages exist.In this case, the control input becomes 0, u i (t) = 0, so the Lyapunov function can be expressed as Similar to (4.4), (4.10) can be written as where l 1 = 1, and According to the conditions of (3) and Assumption 1, we know that τ 1 has an upper bound.From Lemma 1, we know that the system stabilizes in a limited time under a DoS attack.The proof is completed.
Next is the proof of no Zeno behavior.We assume that there is a positive constant T 0 such that lim k→∞ t i k = T 0 .Based on the property of limit, we know that for any ε 0 > 0, there exists N(ε 0 ) such that t i k ∈ (T 0 − ε 0 , T 0 + ε 0 ), ∀k ≥ N(ε 0 ).This means t i N(ε 0 +1) − t i N(ε 0 ) < 2ε 0 .According to (4.11), W(t) gradually decreases to 0, Then ξ m λ min (P) ∥e i (t)∥ 2 ≤ V(t) < W(t).Therefore, we have Because ∥e i (t)∥ and ∥q i (t)∥ are bounded, the Dini derivative of ∥q i (t)∥ is then, we can obtain then As a result, the aforementioned assumption is false, concluding the evidence that the agent i does not have Zeno behavior.□

Simulation
To show the efficacy of the proposed control strategy, we present a simulation example in this section.Our simulation uses MASs composed of six agents as shown in Figure 1, where agent 1 is the leader, and others are followers.The system is ẋi (t) = Ax i (t) + Bu i (t) + (−sin(x i (t)) + 1.5cos(2.5 * t)) + w i The system parameters are set as

Mathematical Biosciences and Engineering
Volume 21, Issue 2, 3304-3318.In this example, we consider the flight of an aircraft, ϕ = 0.002 is the angular velocity of the aircraft, and I 3 represents the identity matrix of 3 × 3. α i = 87.5, β i = 0.004, θ i = 3.5 η i = 0.21 0.105 0.105 0.21 0.21 0.105 Figures 2 and 3 show the response curves and consistency errors of the system state for all agents.They show that the followers' states converge toward those of the leader as time progresses.Figures 3  and 4 show the control input curves and event trigger time instant for all agents.There are four times DoS attacks, with T 0 = 3, F 0 = 4.The duration of the DoS attack is |Ξ a (0, 40)| = 3.5.In Table 1, we can see that the dynamic event-triggered mechanism proposed in this paper has far fewer triggering instances in the same time than the other two literatures [22,23], which can effectively save communication resources.In addition, continuous communication between agents is not required to determine whether a trigger condition satisfies a trigger condition.
Considering the static

Conclusions
In this paper, we propose a dynamic event-triggered adaptive control approach to address the leaderfollowing consensus problem for nonlinear MASs experiencing DoS attacks.We have presented a

Figure 1 .
Figure 1.Graph G in the example.

Figure 5 .
Figure 5. Event trigger time instant for all agents.
193)where Ā = A + ∆ A .According to Eqs (2.3), (2.12), and (2.14), we obtain u i (t).w i (t) has an upper bound, and M 1 , M 2 is their upper bound.Since only the trigger condition in Eq (2.19) is met and the event is triggered when ∥q