Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Safety consistency control method for multi-agent system

A technology of multi-agent system and control method, applied in the direction of adaptive control, general control system, control/regulation system, etc., can solve the problems of increasing control cost, high connectivity, increasing deviation, etc. The effect of strong robustness and anti-interference

Active Publication Date: 2019-09-03
CHONGQING UNIV OF POSTS & TELECOMM
View PDF11 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

This method only selects the median of the neighbor information sequence for state update, which increases the deviation of its own state update; it needs to meet a high degree of network connectivity, that is, the r-robust graph; the network topology adopts a fixed communication topology, which cannot cope with flexible and scalable changed malicious node
[0007] (2) Remove the maximum or minimum value in the neighbor information sequence through adaptive parameters, and update the state with the retained information; for example, a security system with the ability to resist malicious attacks and communication delays proposed in Chinese patent CN105467839A Convergence control method, this method adaptively reduces the number of received information by constructing adaptive pruning parameters, and finally achieves the state consistency of all normal agents, but this method also needs to meet high network connectivity, That is, the r-robust graph; the number of malicious nodes that can be resisted is single, that is, when the network connectivity satisfies the 2-robust graph, any normal node can only be attacked by one malicious node
[0008] In summary, the current security consensus algorithms do not judge the optimal value of all neighbor information, which increases the deviation of their own state updates and the influence of malicious nodes on the state of the multi-agent system
In addition, the topology composed of normal nodes in the system requires high connectivity, which increases the computing and communication capabilities of each node and increases the control cost.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Safety consistency control method for multi-agent system
  • Safety consistency control method for multi-agent system
  • Safety consistency control method for multi-agent system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0034] A security consistency control method for a multi-agent system in this embodiment may refer to the following steps:

[0035] Step 1: For any normal agent in the system that is performing state convergence, sort the sequences containing neighbor delay information and self information in ascending order at time t, and use the security domain of the system to preprocess it, that is, remove the sequences that are not in the sequence The state value of malicious nodes in the security domain is obtained after preprocessing.

[0036] Among them, the security domain refers to the range [m(0), M(0)] formed by the maximum value M(0) and the minimum value m(0) of the initial state of each normal agent in the multi-agent system; V o Represents a normal set of nodes.

[0037] Step 2: Calculate the mean of the new sequence and standard deviation Taking one standard deviation from the mean as the constraint condition, that is, using Judgment and elimination of malicious val...

Embodiment 2

[0072] This embodiment takes figure 1 is the experimental topological graph, in which node V 1 , node V 2 , node V 4 and node V 6 is a normal node, node V 3 , node V 5 and node V 7 is a malicious node; the dotted line connecting a single point in the figure is the input edge between nodes at an odd moment, that is, V 7 to V 1 , V 3 to V 4 , V 5 to V 6 is the input edge between nodes at odd time; the dotted line connecting two points is the input edge between nodes at even time, that is, V 7 to V 6 , V 3 to V 2 , V 5 to V 4 is the input edge between nodes at even time; the solid line is the constant input edge, that is, V 6 to V 4 , V 4 to V 2 , V 2 to V 1 and V 1 to V 6 is a constant input edge. The communication step is set to 0.1s, and the delay upper bound T is set to 0.5s. The adjacency matrix A of the system is:

[0073]

[0074] normal node V 1 V 2 V 4 and V 6 initial value of x 1 (0)=1,x 2 (0)=2,x 4 (0)=4,x 6 (0)=6; malicious node V ...

Embodiment 3

[0079] This embodiment takes figure 2 is the experimental topological graph, in which node V 1 , node V 2 , node V 4 and node V 6 is a normal node, node V 3 , V 5 , V 7 , V 8 , V 9 , V 10 , V 11 and V 12 is a malicious node; the dotted line connected by a single point in the figure is the input edge between nodes at odd times, the dotted line connected by double points is the input edge between nodes at even time, and the solid line is a constant input edge. The communication step length is set to 0.1s, and the upper bound T of the delay is set to 0.5s. The system adjacency matrix A is:

[0080]

[0081] normal node V 1 , V 2 , V 4 and V 6 initial state value x 1 ,x 2 ,x 4 ,x 6 They are as follows: x 1 (0)=1,x 2 (0)=2, x 4 (0)=4, x 6 (0)=6;

[0082] malicious node V 3 , V 5 , V 7 and V 8 The corresponding initial state value x 3 ,x 5 ,x 7 ,x 8 They are as follows: x 3 (0)=3, x 5 (0)=5, x 7 (0)=7,x 8 (0)=8;

[0083] malicious node V 9 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention belongs to the field of multi-agent system control and particularly relates to a safety consistency control method for a multi-agent system. For any normal agent in the multi-agent system, the control method comprises steps: a sequence containing own information and neighbor delay information is ascended, the state values in the sequence that are not in the safety domain are removed, and a new sequence after preprocessing is thus obtained; the mean and the standard deviation of the new sequence are calculated with one standard deviation away from the mean as a constraint condition; the state values in the new sequence that are not in the constraint condition are eliminated until all kept state values in the new sequence meet the constraint condition; and the kept neighborinformation is used for own state updating. Malicious value judgment can be carried out on al neighbor information of a normal agent, and the anti-attack capability of the system is enhanced.

Description

technical field [0001] The invention belongs to the field of multi-agent system control, and is particularly aimed at a security consistency control method for a multi-agent system containing malicious agents, and specifically a security consistency control method for a multi-agent system. Background technique [0002] Multi-agent systems (MASs for short) is a new distributed computing technology. It has developed rapidly since its appearance in the 1970s, and has become a thinking method and tool for complex system analysis and simulation. [0003] In recent years, research on coordinated control of multi-agent systems inspired by swarm behavior has been widely used in wireless sensor networks, UAV formations, satellite formations, and swarm spacecraft sounding detection, and has become a research hotspot in the current control field. However, the actual environment in which the system exists is becoming more and more complex. As we all know, delays are ubiquitous in the n...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G05B13/02
CPCG05B13/024
Inventor 纪良浩高炎秋于南翔
Owner CHONGQING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products