98%
921
2 minutes
20
In practical applications, not all nodes in networked swarm systems are cooperative. The noncooperative nodes are transformed from healthy ones because of cyber-attacks launched by malicious adversaries, hardware faults caused by low reliability individuals, or communication delay. In this article, an approximate fault detection method using residual threshold is shown to judge which agent is cooperative or not, and to reconstruct the communication topology. Then, the event-triggered technique is utilized to design the multileaders formation tracking protocol with resilience to noncooperative nodes. The Zeno behavior is considered to constrain the trigger condition. Finally, the comparison simulation results show the effectiveness and advantage for the proposed secure control method.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1109/TCYB.2025.3580666 | DOI Listing |
IEEE Trans Cybern
September 2025
In practical applications, not all nodes in networked swarm systems are cooperative. The noncooperative nodes are transformed from healthy ones because of cyber-attacks launched by malicious adversaries, hardware faults caused by low reliability individuals, or communication delay. In this article, an approximate fault detection method using residual threshold is shown to judge which agent is cooperative or not, and to reconstruct the communication topology.
View Article and Find Full Text PDFSensors (Basel)
February 2025
Software and Communication School, TianjinSino-German University of Applied Sciences, Tianjin 300350, China.
Topology control is important for extending networks lifetime and reducing interference. The accuracy of topology identification plays a crucial role in topology control. Traditional passive interception can only identify the connectivity among cooperative sensor networks with known protocol.
View Article and Find Full Text PDFSensors (Basel)
January 2025
Department of Computer Science, University of Hertfordshire, Hatfield AL10 9AB, UK.
IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.
View Article and Find Full Text PDFChaos
January 2025
School of Automation and Electrical Engineering, Linyi University, Linyi 276005, China.
This paper mainly focuses on investigating the discrete event dynamic decision-making process with two noncooperative intelligent agents, defined as event dynamic games (EDGs). We introduce a novel state space model and analyze the existence of its equilibrium solution. Additionally, we apply principles of network evolution to address the challenge of event dynamic game network modeling.
View Article and Find Full Text PDFSci Rep
December 2024
Wireless@VT, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, VA, USA.
Owing to the ability of reconfigurable intelligent surfaces (RISs) to control the propagation environment in their vicinity, they have emerged as an appealing solution to enhance the performance of next-generation wireless networks. While the effectiveness of RISs with complete channel state information (CSI) is well-documented, their performance with limited user information remains less explored. This is particularly pronounced when an RIS interferes with nodes in a potentially non-cooperating network, making CSI acquisition challenging.
View Article and Find Full Text PDF