Background
The multi-agent system is an important research direction of the network control system, and the leader-follower system is an important research topic of the multi-agent system, and has wide practical application values, such as multi-unmanned formation control, cluster control, intelligent vehicle formation control and the like.
Because the intelligent agent has limited data processing capacity, if the data amount is excessive, the processing speed can be delayed and even cause network congestion, and therefore, the calculation for reducing the data amount by adopting an appropriate method has practical significance. Event trigger control provides a good idea for solving the problem, so that data can be transmitted and calculated only when certain trigger conditions are met, and the transmission, storage and calculation of the data can be greatly reduced. However, most leader-follower multi-agent systems do not consider the situation of the DoS network attack between the leader and the follower at present, so that the research on the situation has strong practical significance.
The invention provides a method for average residence time by adopting modal dependence, which solves the design problem of a consistency event trigger controller when a leader-follower multi-agent system has a DoS network attack.
Disclosure of Invention
The invention aims to provide a modal dependence-based average residence time method, which aims at the design of a consistency event trigger controller of a multi-agent system and solves the problem that consistency control cannot be realized when a DoS attack exists between a leader and a follower in the prior art. The technical scheme of the invention is implemented as follows:
1) establishing a leader-follower multi-agent system model and designing event triggering conditions;
2) establishing a DoS attack model and a switching system model;
3) the design event triggers the controller and the corresponding switching conditions.
The first step is as follows: considering that the leader is a high-order system and is not influenced by the dynamic of the follower, the model is
The model of the ith follower is
Therefore, the consistency control protocol of the ith follower of the multi-agent system is designed to be
The corresponding event trigger condition is designed as
Wherein
The second step is as follows: assuming that the DoS attack satisfies: (1)
(2)
when attack exists, communication between a leader and a follower is interrupted, a communication topological structure is changed, and the system is changed from stable to unstable at the moment, so that a switching system is adopted to describe the leader-follower multi-agent system when DoS attack exists; the system under attack corresponds to the unstable subsystem of the switching system, and the system under no attackThe system corresponds to a stabilizing subsystem; also, the switching system model may be expressed as follows:
the third step is as follows: in step two, the feedback gain is unknown, and the following method is adopted for design; given the parameters alpha > 0, beta > 0, mu1> 1 and 0 < mu2< 1, if matrix X is present1>0,X2> 0 and Y1, Y2 is such that
X1≤μ2X2;X2≤μ1X1
Wherein,
p is 1, 2; then, the controller gain can be designed to be
P is 1, 2; if leader-follower multi-agent consistency is met, the switching signals of the switching system also need to be met
The method is suitable for large-scale unmanned aerial vehicle formation flight control or intelligent vehicle formation control in the presence of network attacks.
The invention has the beneficial effects that:
the invention designs a consistency event triggering controller which can ensure that a multi-agent system can still ensure consistency when a leader-follower multi-agent system has a DoS attack. A multi-agent system under DoS attack is described by adopting a switching system, and a switching condition meeting the system consistency is provided by utilizing a mode-dependent average residence time method, and the condition that an event trigger condition does not have a Zeno phenomenon is ensured. Due to the design of the event trigger controller, the data volume processed by the system can be greatly reduced, and the calculation and transmission energy is saved. The method is suitable for large-scale unmanned aerial vehicle formation flight control or intelligent vehicle formation control in the presence of network attacks, and has great practical application value.
Detailed Description
In order to make the technical embodiments of the present invention more clearly understood, specific embodiments are given below: the distributed event-triggered delivery strategy for the ith follower of the present invention is shown in FIG. 1.
Establishing leader-follower multi-agent system model and designing event triggering conditions
Assume leader satisfaction
The kinetic equation of the ith follower is
Wherein,
n is the number of followers. The invention aims to realize the limsup when the DoS attack exists
t→∞||z(t)||≤δ,z(t)=col{z
1(t),z
2(t),...z
N(t)},z
i(t)=x
i(t)-x
0(t)。
For follower i, consider the following measurement error:
wherein,
the kth event for follower i triggers the time. Definition of
Selecting a coherency control protocol
Wherein, the matrix K is a feedback gain required to be designed.
Event trigger time of follower i
The following method may be employed for determination:
it should be noted that only in
At that moment, the i-th follower sends the current state information to its neighbors and updates the control data, and then the measurement error is reset to zero. In addition, the designed event triggering condition must ensure that the Zeno phenomenon is removed, otherwise, the system cannot normally operate, namely, the requirement of meeting the requirement
1) Establishing DoS attack model and switching system model
Suppose the DoS attack time is
Definition of R
n=[r
n,r
n+τ
n) And represents the nth time period of the DoS attack. Tau is
nActual interval lasting for nth attack and satisfying tau
n<r
n+1-r
nAnd T
max≥τ
n≥τ
minIs greater than 0. Is defined as follows
And
wherein
And
respectively, indicating the time intervals of communication interruption and communication. Thus, the control protocol of the follower i can be expressed as
Wherein,
the DoS attack is assumed to satisfy the following frequency and duration constraints:
wherein, T is more than or equal to 01≤T2,Nσ2(T1,T2) Is represented in the time interval T1,T2) Number of intra-DoS attacks.
Definition of z
i(t)=x
i(t)-x
0(t),
And z (t) col { z
1(t),z
2(t),...z
N(t) }, then one can obtain
As can be seen from equation (8), in the presence of a DoS attack, the leader-follower multi-agent system model can be described by the switching system. The switching system comprises two subsystems, a stable subsystem and an unstable subsystem. The multi-agent system corresponds to an unstable subsystem when an attack exists.
2) Designing event-triggered controllers and corresponding switching conditions
Assuming that a supporting tree exists in the communication topology of the leader-follower system when no DoS attack exists, the leader agent is a root node. Given the parameters alpha > 0, beta > 0, mu1> 1 and 0 < mu2< 1, if matrix X is present1>0,X2> 0 and Y1, Y2 is such that
X
1≤μ
2X
2,X
2≤μ
1X
1(11) Wherein,
p is 1, 2, and the DoS attack satisfies constraint (6) (7),
then, leader-follower multi-agent coherence can be satisfied, and z (t) satisfies
Wherein,
thus, the controller gain can be designed to be
P is 1, 2. In addition, the selected event trigger condition is satisfied
Wherein,
the preferred embodiments of the invention disclosed above are intended to be illustrative only. The preferred embodiments are not intended to be exhaustive or to limit the invention to the precise embodiments disclosed. Obviously, many modifications and variations are possible in light of the above teaching. The embodiments were chosen and described in order to best explain the principles of the invention and the practical application, to thereby enable others skilled in the art to best utilize the invention. The invention is limited only by the claims and their full scope and equivalents.