An Improved Protocol to Consensus of Delayed MASs With UNMS and Aperiodic DoS Cyber-Attacks

نویسندگان

چکیده

The present research focuses on the issue of leader-following consensus for multi-agent systems (MASs) suffered from uncertain nonhomogeneous Markov switching (UNMS), time-varying delay, and denial service (DoS) cyber-attacks. Firstly, in contrast with existing results MASs, communication topology is governed by a UNMS jump process which transition rates (TRs) may be partially known or completely unknown. Secondly, changes topologies due to frequently aperiodic DoS cyber attacks are taken into consideration, destroy chains lead network paralysis MASs. By introducing concepts average ratio, novel mean-square conditions establish relationship between control gains sleeping, active periods signal MASs proposed. It shows that there no direct restriction delay system intervals sleeping period jamming signal. Finally, theoretical result validated numerical example.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An active security protocol against DoS attacks

Denial of Service (DoS ) attacks represent, in today's Internet, one of the most complex issues to address. A session is under a DoS attack if it cannot achieve its intended throughput due to the misbehavior of other sessions. Many research studies dealt with DoS, proposing models and/or architectures mostly based on an attack prevention approach. Prevention techniques lead to di erent models, ...

متن کامل

a comparison of teachers and supervisors, with respect to teacher efficacy and reflection

supervisors play an undeniable role in training teachers, before starting their professional experience by preparing them, at the initial years of their teaching by checking their work within the proper framework, and later on during their teaching by assessing their progress. but surprisingly, exploring their attributes, professional demands, and qualifications has remained a neglected theme i...

15 صفحه اول

HMAC-Based Authentication Protocol: Attacks and Improvements

As a response to a growing interest in RFID systems such as Internet of Things technology along with satisfying the security of these networks, proposing secure authentication protocols are indispensable part of the system design. Hence, authentication protocols to increase security and privacy in RFID applications have gained much attention in the literature. In this study, security and privac...

متن کامل

Application of an AODE Based Classifier to Detect DOS Attacks

Digital forensics often utilize network intrusion detection systems based on various data mining methods to detect and collect evidence on intrusion events such as Denial of Service (DOS) attacks. Findings of our experiments reveal that a classification model based on averaged one-dependence estimators (AODE) can be used for this purpose. AODE is an extension of Naïve Bayes method which relies ...

متن کامل

lexical decomposition awareness and its effect on delayed receptive and productive recognition and recall of vocabulary knowledge of morphologically complex english words: an iranian efl context

abstract lexical knowledge of complex english words is an important part of language skills and crucial for fluent language use (nation, 2001). the present study, thus, was an attempt to assess the role of morphological decomposition awareness as a vocabulary learning strategy on learners’ productive and receptive recall and recognition of complex english words. so 90 sophomores (female and ma...

15 صفحه اول

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Network Science and Engineering

سال: 2021

ISSN: ['2334-329X', '2327-4697']

DOI: https://doi.org/10.1109/tnse.2021.3098258