Resilient Distributed Optimization With Event‐Triggered Interaction Design for Multiagent Systems Under False Data Injection Attacks

ABSTRACT This article explores a novel design of a resilient interaction algorithm for multiagent systems (MAS) based on an event‐triggered mechanism, focusing on distributed optimization in the context of False Data Injection Attack (FDIA). A network‐level defense strategy is used based on a virtua...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:International journal of robust and nonlinear control Jg. 35; H. 16; S. 6778 - 6788
Hauptverfasser: Wan, Ying, Lu, Xiao, Shi, Xinli, Jürgen, Kurths, Cao, Jinde
Format: Journal Article
Sprache:Englisch
Veröffentlicht: Hoboken, USA John Wiley & Sons, Inc 10.11.2025
Wiley Subscription Services, Inc
Schlagworte:
ISSN:1049-8923, 1099-1239
Online-Zugang:Volltext
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
Beschreibung
Zusammenfassung:ABSTRACT This article explores a novel design of a resilient interaction algorithm for multiagent systems (MAS) based on an event‐triggered mechanism, focusing on distributed optimization in the context of False Data Injection Attack (FDIA). A network‐level defense strategy is used based on a virtual system framework, where virtual state variables are introduced to ensure that the local estimate of each agent converges to the optimal solution of the distributed optimization problem, even under unknown FDIA. The article further introduces an event‐triggered strategy that significantly reduces communication overhead, and proper selection criteria are given for picking suitable event‐triggered parameters therein. It is proved that the proposed algorithm also avoids the Zeno behavior. Additionally, a distributed detection method is designed to accurately identify and isolate compromised links, thereby further enhancing the system's resilience. Two numerical simulations are conducted to illustrate the performance of the proposed algorithm, and it is demonstrated that the algorithm can also maintain effectiveness for networks with relatively large‐scale sizes.
Bibliographie:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:1049-8923
1099-1239
DOI:10.1002/rnc.70008