Strategic Topology Switching for Security-Part I: Consensus & Switching Times

by   Yanbing Mao, et al.

This two-part paper considers strategic topology switching for the second-order multi-agent system under attack. In Part I, we propose a strategy on switching times that enables the strategic topology-switching algorithm proposed in Part II to reach the second-order consensus in the absence of attacks. The control protocol introduced to the multi-agent system is governed only by the relative positions of agents. Based on the stability of switched linear systems, the strategy on the dwell time of topology-switching signal is derived. The primary advantages of the strategy in achieving the second-order consensus are: 1) the control protocol relies only on relative position measurements, no velocity measurements are needed; 2) the strategy has no constraint on the magnitude of coupling strength. Simulations are provided to verify the effectiveness of strategic topology switching in achieving the second-order consensus.


page 1

page 2

page 3

page 4


Strategic Topology Switching for Security-Part II: Detection & Switching Topologies

This two-part paper considers strategic topology switching for the secon...

Two Models of Latent Consensus in Multi-Agent Systems

In this paper, we propose several consensus protocols of the first and s...

Consensus of second order multi-agents with actuator saturation and asynchronous time-delays

This article presents the consensus of a saturated second order multi-ag...

Novel Stealthy Attack and Defense Strategies for Networked Control Systems

This paper studies novel attack and defense strategies, based on a class...

State-switching control of the second-order chained form system

This paper addresses a motion planning problem of the second-order chain...

Second-Order Agents on Ring Digraphs

The paper addresses the problem of consensus seeking among second-order ...

Consensus of Multi-Agent Systems Using Back-Tracking and History Following Algorithms

This paper proposes two algorithms, namely "back-tracking" and "history ...

Please sign up or login with your details

Forgot password? Click here to reset