Category Ranking

98%

Total Visits

921

Avg Visit Duration

2 minutes

Citations

20

Article Abstract

In practical applications, not all nodes in networked swarm systems are cooperative. The noncooperative nodes are transformed from healthy ones because of cyber-attacks launched by malicious adversaries, hardware faults caused by low reliability individuals, or communication delay. In this article, an approximate fault detection method using residual threshold is shown to judge which agent is cooperative or not, and to reconstruct the communication topology. Then, the event-triggered technique is utilized to design the multileaders formation tracking protocol with resilience to noncooperative nodes. The Zeno behavior is considered to constrain the trigger condition. Finally, the comparison simulation results show the effectiveness and advantage for the proposed secure control method.

Download full-text PDF

Source
http://dx.doi.org/10.1109/TCYB.2025.3580666DOI Listing

Publication Analysis

Top Keywords

noncooperative nodes
12
formation tracking
8
networked swarm
8
resilience noncooperative
8
event-triggered multiple
4
multiple leaders
4
leaders formation
4
tracking networked
4
swarm system
4
system resilience
4

Similar Publications

In practical applications, not all nodes in networked swarm systems are cooperative. The noncooperative nodes are transformed from healthy ones because of cyber-attacks launched by malicious adversaries, hardware faults caused by low reliability individuals, or communication delay. In this article, an approximate fault detection method using residual threshold is shown to judge which agent is cooperative or not, and to reconstruct the communication topology.

View Article and Find Full Text PDF

Topology control is important for extending networks lifetime and reducing interference. The accuracy of topology identification plays a crucial role in topology control. Traditional passive interception can only identify the connectivity among cooperative sensor networks with known protocol.

View Article and Find Full Text PDF

IEEE 802.11 is one of the most common medium access control (MAC) protocols used in wireless networks. The carrier sense multiple access with collision avoidance (CSMA/CA) mechanisms in 802.

View Article and Find Full Text PDF

This paper mainly focuses on investigating the discrete event dynamic decision-making process with two noncooperative intelligent agents, defined as event dynamic games (EDGs). We introduce a novel state space model and analyze the existence of its equilibrium solution. Additionally, we apply principles of network evolution to address the challenge of event dynamic game network modeling.

View Article and Find Full Text PDF

RIS-Aided coexistence in wireless networks using angular information.

Sci Rep

December 2024

Wireless@VT, Bradley Department of Electrical and Computer Engineering, Virginia Tech, Blacksburg, 24061, VA, USA.

Owing to the ability of reconfigurable intelligent surfaces (RISs) to control the propagation environment in their vicinity, they have emerged as an appealing solution to enhance the performance of next-generation wireless networks. While the effectiveness of RISs with complete channel state information (CSI) is well-documented, their performance with limited user information remains less explored. This is particularly pronounced when an RIS interferes with nodes in a potentially non-cooperating network, making CSI acquisition challenging.

View Article and Find Full Text PDF