Distributed delay control strategy for leader-following cyber secure consensus in Riemann–Liouville fractional-order delayed multi-agent systems under denial-of-service attacks

Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph. By using the classical Lyapunov technique and alg...

Full description

Saved in:
Bibliographic Details
Published in:Partial differential equations in applied mathematics : a spin-off of Applied Mathematics Letters Vol. 11; p. 100871
Main Authors: Piqueira, José Roberto Castilho, Alsinai, Ammar, Niazi, Azmat Ullah Khan, Jamil, Airish
Format: Journal Article
Language:English
Published: Elsevier B.V 01-09-2024
Elsevier
Subjects:
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Description
Summary:Considered distributed delay control strategy for Leader-Following cyber secure consensus in Riemann–Liouville fractional-order delayed Multi-Agent system under Denial-of-Service Attacks, where the associated topology is a switching weighted digraph. By using the classical Lyapunov technique and algebraic graph theory some algebraic criteria are offered. The new aspect of this paper is how thoroughly it discusses denial-of-service (DoS) attacks in the context of fractional-order delayed systems and how to create defences to keep cybersecure consensus maintained. It suggests a distributed delay control approach that ensures agents can reach a consensus even with these difficulties and in the case of DoS (denial-of-service) attacks. This work is significant because it incorporates cybersecurity techniques to strengthen the system’s resilience against disruptive assaults, in addition to addressing the technical issues related to delays and fractional-order behaviours. This contribution is essential for enhancing the security and dependability of distributed systems in applications such as networked sensors and autonomous vehicles. To further demonstrate the applicability of our method, two instances are given.
ISSN:2666-8181
2666-8181
DOI:10.1016/j.padiff.2024.100871