Distributed delay control strategy for leader-following cyber secure consensus in Riemann–Liouville fractional-order delayed multi-agent systems under denial-of-service attacks
Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph. By using the classical Lyapunov technique and alg...
Saved in:
Published in: | Partial differential equations in applied mathematics : a spin-off of Applied Mathematics Letters Vol. 11; p. 100871 |
---|---|
Main Authors: | , , , |
Format: | Journal Article |
Language: | English |
Published: |
Elsevier B.V
01-09-2024
Elsevier |
Subjects: | |
Online Access: | Get full text |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Summary: | Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph. By using the classical Lyapunov technique and algebraic graph theory some algebraic criteria are offered. The new aspect of this paper is how thoroughly it discusses denial-of-service (DoS) attacks in the context of fractional-order delayed systems and how to create defences to keep cybersecure consensus maintained. It suggests a distributed delay control approach that ensures agents can reach a consensus even with these difficulties and in the case of DoS (denial-of-service) attacks. This work is significant because it incorporates cybersecurity techniques to strengthen the system’s resilience against disruptive assaults, in addition to addressing the technical issues related to delays and fractional-order behaviours. This contribution is essential for enhancing the security and dependability of distributed systems in applications such as networked sensors and autonomous vehicles. To further demonstrate the applicability of our method, two instances are given. |
---|---|
ISSN: | 2666-8181 2666-8181 |
DOI: | 10.1016/j.padiff.2024.100871 |