scispace - formally typeset
Search or ask a question
Author

Lijing Dong

Bio: Lijing Dong is an academic researcher from Beijing Jiaotong University. The author has contributed to research in topics: Consensus & Graph (abstract data type). The author has an hindex of 1, co-authored 1 publications receiving 1 citations.

Papers
More filters
Journal ArticleDOI
TL;DR: To solve the secure H ∞ consensus problems of multiagent systems under switching topologies, some modified definitions are presented and some graph-based Lyapunov functions, which are based on the solutions of some Lyap unov equations and the graph information, are designed for the H∞ performance analysis.

7 citations


Cited by
More filters
Journal ArticleDOI
TL;DR: In this paper , an aperiodic switching controller is proposed to improve the secure consensus of multi-agent system (MAS) under abnormal deception attacks based on a switching control strategy, which greatly reduces the number of actuator actions and reserves time for next execution.
Abstract: In this paper, we focus on the secure consensus of multiagent system (MAS) under abnormal deception attacks based on a switching control strategy. Due to the openness and shareability of communication network, abnormal deception attacks can be successfully launched into the MAS in a certain probability, which will cause the control signals transmitted through network to be completely modified. An aperiodic switching controller is proposed to improve the system’s ability to tolerate attacks, which also greatly reduces the number of actuator actions and reserves time for next execution. In order to reduce the conservatism of results, a novel Lyapunov–Krasovskii functional is constructed by introducing some extra looped functional terms and states variable to increase the storage of sampling information. A sufficient condition for the secure consensus of MAS is established according to the designed control protocol. Finally, a consensus control model about unmanned surface vehicles clusters is provided as an example to verify the effectiveness and feasibility of the proposed approach.

4 citations

Posted Content
09 Jul 2021
TL;DR: A secure-by-design approach in which the presence of a network manager monitors the system and broadcasts encrypted tasks (i.e. hidden edge weight assignments) to the agents involved is presented in this article.
Abstract: This work mainly addresses continuous-time multi-agent consensus networks where an adverse attacker affects the convergence performances of said protocol. In particular, we develop a novel secure-by-design approach in which the presence of a network manager monitors the system and broadcasts encrypted tasks (i.e. hidden edge weight assignments) to the agents involved. Each agent is then expected to decode the received codeword containing data on the task through appropriate decoding functions by leveraging advanced security principles, such as objective coding and information localization. Within this framework, a stability analysis is conducted for showing the robustness to channel tampering in the scenario where part of the codeword corresponding to a single link in the system is corrupted. A trade-off between objective coding capabilityand network robustness is also pointed out. To support these novelties, an application example on decentralized estimation is provided. Moreover, such an investigation on robust stability is as well extended in the discrete-time domain. Further numerical simulations are given to validate the theoretical results in both the time domains.

1 citations

Journal ArticleDOI
01 Dec 2022
TL;DR: A secure-by-design approach in which the presence of a network manager monitors the system and broadcasts encrypted tasks (i.e., hidden edge weight assignments) to the agents involved is presented in this article .
Abstract: This work mainly addresses continuous-time multiagent consensus networks where an adverse attacker affects the convergence performances of said protocol. In particular, we develop a novel secure-by-design approach in which the presence of a network manager monitors the system and broadcasts encrypted tasks (i.e., hidden edge weight assignments) to the agents involved. Each agent is then expected to decode the received codeword containing data on the task through appropriate decoding functions by leveraging advanced security principles, such as objective coding and information localization. Within this framework, a stability analysis is conducted for showing the robustness to channel tampering in the scenario where part of the codeword corresponding to a single link in the system is corrupted. A tradeoff between objective coding capability and network robustness is also pointed out. To support these novelties, an application example on decentralized estimation is provided. Moreover, an investigation of the robust agreement is as well extended in the discrete-time domain. Further numerical simulations are given to validate the theoretical results in both the time domains.

1 citations

Journal ArticleDOI
TL;DR: In this article , the authors studied the finite-time consensus tracking problem of MASs with unknown follower's states via sliding mode control (SMC) in the presence of actuator attacks.

1 citations

Journal ArticleDOI
TL;DR: In this paper , a new event-triggered mechanism and lag consensus control strategy are proposed to ensure that the DoS attack occurs nonperiodically, and the trigger interval is designed to ensure the Zeno behavior does not occur.
Abstract: Compared with previous studies, this paper focuses on the time delay phenomenon in the consensus state between the leader and followers and considers that the DoS attack occurs nonperiodically. First, a new event-triggered mechanism and lag consensus control strategy are proposed. Then, through the Lyapunov stability theory, algebraic knowledge, and graph theory, it is proved that followers and leader can achieve lag consistent under the DoS attack, and the trigger interval is designed to ensure that Zeno behavior does not occur. Finally, the correctness and effectiveness of the proposed theory and method are verified by numerical simulation.