1. Trang chủ
  2. » Giáo án - Bài giảng

adaptive consensus of distributed varying scale wireless sensor networks under tolerable jamming attacks

12 2 0

Đang tải... (xem toàn văn)

Tài liệu hạn chế xem trước, để xem đầy đủ mời bạn chọn Tải xuống

THÔNG TIN TÀI LIỆU

Thông tin cơ bản

Tiêu đề Adaptive Consensus of Distributed Varying Scale Wireless Sensor Networks Under Tolerable Jamming Attacks
Tác giả Jinping Mou
Trường học School of Mathematics and Information Engineering, Taizhou University
Chuyên ngành Wireless Sensor Networks, Consensus Control, Network Security
Thể loại Research Article
Năm xuất bản 2013
Thành phố Linhai
Định dạng
Số trang 12
Dung lượng 856,32 KB

Các công cụ chuyển đổi và chỉnh sửa cho tài liệu này

Nội dung

Mathematical Problems in EngineeringVolume 2013, Article ID 931934, 11 pages http://dx.doi.org/10.1155/2013/931934 Research Article Adaptive Consensus of Distributed Varying Scale Wirele

Trang 1

Mathematical Problems in Engineering

Volume 2013, Article ID 931934, 11 pages

http://dx.doi.org/10.1155/2013/931934

Research Article

Adaptive Consensus of Distributed Varying Scale Wireless

Sensor Networks under Tolerable Jamming Attacks

Jinping Mou

School of Mathematics and Information Engineering, Taizhou University, Linhai 317000, China

Correspondence should be addressed to Jinping Mou; mjptougaozhuanyong@163.com

Received 16 August 2013; Accepted 16 December 2013

Academic Editor: Kwok-Wo Wong

Copyright © 2013 Jinping Mou This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited

Consensus problem is investigated for a varying scale wireless sensor network (VSWSN) under tolerable jamming attacks, where the scale of the network is increasing or decreasing due to the newly joined nodes or the removed nodes, respectively; the tolerable jamming attack means that the attack strength is limited It supposes that during the communications, all nodes may encounter with the tolerable jamming attacks; when the attack power is larger than the given value, the attacked nodes fall asleep, or otherwise the nodes are awakened Under the sleep method, based on the Lyapunov method, it shows that if the communicating graph is the global limited intersectional connection (GLI connection) and the system has the enough dwell time in the intersectional topology, then under the designed consensus protocol, all nodes achieve the global average consensus

1 Introduction

In the past decades, distributed coordination of wireless

sensor network (WSN) has been widely investigated, such

as formation control, target-tracking, and environmental

monitoring [1,2] For the distributed coordination, consensus

is the fundamental requirement in which all states of sensors

achieve a common value, such as the average consensus [3],

and sample data-based consensus [4,5] The characteristics

of WSN including the unreliable links and the limited

energy supply render the challenges of developing algorithms

and optimizing topology to achieve the consensus control;

therefore, many topology optimization and algorithm

devel-opment problems have been studied

The early consensus work can be found in [6], where

the general methods of consensus control are proposed In

recent years, consensus problems coupling with optimizing

topology have been investigated For instance, under a

leader-following framework, the consensus problems were studied

[7, 8] More details can be found in [9–12] Based on

the sleeping-awaking method, consensus problem of the

Markovian switching WSN with multiple time delays was

studied [13] Based on the stochastic matrices, the consensus algorithm was proposed in [14]; more results are proposed in [15,16]

Recently, adaptive consensus problem has attracted much attention For instance, a distributed consensus protocol with

an adaptive law was proposed by adjusting the coupling weights [17] According to iterative learning method, an adaptive consensus protocol was designed for all follower agents to track a leader [11] More results are shown in [18,19] Notice that most of the above results on the consensus are associated with the fixed node set However, in the real applications, the scale of WSN often is varying due to the node removal or the new nodes joining the network, where the node removal means that some nodes quit from the network because the energy is exhausted

In recent years, the related consensus problems of the varying scale networks (VSNs) have risen researchers atten-tions, such as consensus of the scale-free network (SFN), where degree distribution follows a power law, at least asymp-totically [20,21] In the literature [22], consensus problem of varying scale wireless sensor network (VSWSN) was inves-tigated, where the varying topology of VSWSN is expressed

Trang 2

by the node attached component sequences As a result, the

global limited intersectional connection (GLI connection) is

the necessary condition of system achieving the global

con-sensus

2 Related Work

In fact, networks often encounter with some attacks, such as

jamming attacks, tampering attacks, and exhaustion attacks

Under some attacks, the networks may be broken down, the

coordinative behavior cannot be kept, and all nodes cannot

achieve the consensus In the literature [23], the

synchro-nization against the removed nodes of complex dynamical

networks was studied, where the communications are based

on the switching topology In recent years, consensus

prob-lem with the attacks has attracted some researchers attention

In [24], Wang et al studied consensus problem of networks

under the recoverable attacks, where after being attacked, the

system becomes paralyzed; in the next period, the system

recovers and achieves the consensus, and the relation between

the state of system and the attack signal is not considered

However, in real applications, the system often is

influ-enced by the attack signals whatever the topology is

opti-mized Namely, the dynamic state of the system is impacted

by the attack signals, and up to now, consensus problem of

VSWSNs with the tolerable jamming attack has not attracted

much attention

The main contribution of this paper is to investigate the

consensus problem of VSWSN under the tolerable jamming

attacks It begins with the introduction on communicating

graph Namely, all nodes communicate information among

the components; the communications among all different

node attached components are based on the intersectional

topologies Then the states of all components can be described

by the different stochastic equations (DSEs); the consensus

can be regarded that all trivial solutions of DSEs converge

to the same value The aim of this paper is to establish some

criteria of VSWSN under the tolerable jamming attacks

It should point out that the introduced topology in this

paper is different from the previous results In most

litera-tures, such as the node set of network is fixed, system switches

among the different spinning trees, or system communicates

information in the union connected topology, and the related

results cannot be applied for VSWSN because of the fixed

scale In fact, whatever VSWSN runs sleeping algorithm

in any surroundings, for example, system encounters with

attacks, the topology can be expressed by the node attached

sequences, the connectivity of the network can be shown by

local limited intersectional connection (LLI connection) or

GLI connection, and the general connection is the special

case of GLI connected

The outline of this paper is listed as follows InSection 3,

some basic concepts, notations, and problem formulation

are introduced InSection 4, the main results are proposed

In Section 5, a numeral example shows the reliability of

the proposed results In Section 6, several conclusions are

obtained

3 Preliminaries

3.1 Notations and Some Conceptions Notations Throughout this paper, ℵ = {0, 1, 2, , 𝜅, } denotes the topology set of the varying scale wireless sensor network (VSWSN); the elements of the set satisfy the follow-ing partial sequence:

0 ⪯ 1 ⪯ 2 ⪯ ⋅ ⋅ ⋅ ⪯ 𝜅1⪯ 𝜅2⪯ ⋅ ⋅ ⋅ , (1) where the listed topologies will appear in succession,0 is the initial topology, and𝜅1,𝜅2are called the adjacent topologies Accordingly, [𝑡𝜅1, 𝑡𝜅2) denotes the dwell time interval of topology 𝜅1; if 𝜅1 ̸= 𝜅2, then𝜅1 ≺ 𝜅2 denotes the relation between𝜅1and𝜅2

In order to express the varying topology, a discernible

where𝑡 ∈ [𝑡𝜅1, 𝑡𝜅2) According to 𝜃(𝑡), the varying topology of VSWSN can be denoted by a varying graph𝐺(𝜃(𝑡)) = 𝐺(𝜅1) = (𝑉(𝜅1), 𝐸(𝜅1), 𝐴(𝜅1)), where 𝑉(𝜅1) = 𝑉1(𝜅1) ∪ 𝑉2(𝜅1) denotes the varying node set,𝑉1(𝜅1) = {1𝜅1, 2𝜅1, , 𝑖𝜅1, , 𝛼𝜅1} refers

to the valid node set of which all elements inherit from the former topology, 𝑉2(𝜅1) = {1󸀠

𝜅 1, 2󸀠

𝜅 1, , 𝛽󸀠

𝜅 1} is the newly joined node set, and𝐸(𝜅1) = {(𝑖𝜅1, 𝑗𝜅1) | 𝑖𝜅1 ̸= 𝑗𝜅1, 𝑖𝜅1, 𝑗𝜅1 ∈ 𝑉(𝜅1)} stands for the edge set

𝑁𝑖(𝜅) = {𝑗𝜅 | 𝑖𝜅 ̸= 𝑗𝜅, 𝑖𝜅, 𝑗𝜅 ∈ 𝑉(𝜅)} refers to the neighbor set of node𝑖𝜅in the topology𝜅 𝐴(𝜅) = (𝑎𝑖𝑗(𝜅))𝑤𝜅 ∈ 𝑅𝑤 𝜅 ×𝑤 𝜅

stands for the weighted symmetric matrix, where𝑤𝜅 = 𝛼𝜅+

𝛽𝜅,𝑎𝑖𝑗(𝜅) takes value in 0 or 1 ∀𝑗𝜅 ∈ 𝑁𝑖(𝜅), 𝑎𝑖𝑗(𝜅) = 1 means that there exists information flow between the awaking nodes

𝑗𝜅and𝑖𝜅; if one of𝑗𝜅or𝑖𝜅is asleep, then𝑎𝑖𝑗(𝜅) = 0; if 𝑗𝜅 ∉

𝑁𝑖(𝜅), then 𝑎𝑖𝑗(𝜅) ≡ 0

𝐿(𝑤𝜅) = (𝑙𝑖𝑗(𝜅))𝑤𝜅×𝑤𝜅 is the Laplacian matrix, and𝑙𝑖𝜅𝑗𝜅 is defined by

𝑙𝑖𝑗(𝜅) ={{ {

𝑗 𝜅

𝑎𝑖𝑗(𝜅) , 𝑖𝜅= 𝑗𝜅, 𝑗𝜅 ∈ 𝑁𝑖(𝜅) ,

−𝑎𝑖𝑗(𝜅) , 𝑖𝜅 ̸= 𝑗𝜅, 𝑗𝜅∈ 𝑁𝑖(𝜅) (2) The following conceptions are used frequently [22]

Definition 1. ∀𝑖𝜅 ∈ 𝑉(𝜅); if there exists a component 𝐶󸀠𝑖(𝜅)

of𝐺(𝜅) such that 𝑖𝜅 ∈ 𝑉𝑖󸀠(𝜅), then 𝐶󸀠𝑖(𝜅) is said to be the node attached component of𝑖𝜅; if there exists the sequence

𝐶󸀠

𝑖(𝜅1), 𝐶󸀠

𝑖(𝜅2), such that 𝑖𝜅 ∈ 𝑉󸀠

𝑖(𝜅1), 𝑖𝜅 ∈ 𝑉󸀠

𝑖(𝜅2) , then sequence𝐶󸀠

𝑖(𝜅1), 𝐶󸀠

𝑖(𝜅2), is said to be the node attached component sequence of node𝑖𝜅

𝐶󸀠

𝑖(𝜅) denotes a component of 𝐺(𝜅), where 𝐶󸀠

𝑖(𝜅) = {𝑉󸀠

𝑖(𝜅), 𝐴󸀠

𝑖(𝜅), 𝐸󸀠

𝑖(𝜅)}, 𝑖𝜅 ∈ 𝑉󸀠

𝑖(𝜅) ⊂ 𝑉(𝜅), 𝐸󸀠

𝑖(𝜅) ⊂ 𝐸(𝜅)

𝑉󸀠

𝑖(𝜅) = 𝑉󸀠

𝑖1(𝜅) ∪ 𝑉󸀠

𝑖2(𝜅), where 𝑉󸀠

𝑖1(𝜅) refers to the valid node set of which all elements inherit from the former attached component of𝑖𝜅,𝑉󸀠

𝑖2(𝜅) is the newly joined node set

Definition 2. ∀𝑖𝜅, 𝑗𝜅 ∈ 𝑉(𝜅); if there exists two related attached component sequences𝐶󸀠

𝑖(𝜅1), 𝐶󸀠

𝑖(𝜅2), , 𝐶󸀠

𝑖(𝜅𝑟), and𝐶󸀠󸀠

𝑗(𝜅1), 𝐶󸀠󸀠

𝑗(𝜅2), , 𝐶󸀠󸀠

𝑗(𝜅𝑟), , respectively, and if there exists 𝜅0 ∈ ℵ and ℵ󸀠 = {𝜅𝑟, 𝜅𝑟, } ⊂ ℵ, such that

Trang 3

𝑖(𝜅𝑟) = 𝐶󸀠󸀠

𝑗(𝜅𝑟), where 𝜅0 ⪯ ⋅ ⋅ ⋅ ⪯ 𝜅𝑟 ⪯ ⋅ ⋅ ⋅ , then

the communicating graph is said to be the global limited

intersectional connection (GLI connection), and𝜅𝑟is called

the intersectional topology

Assumption 3 After the intersectional topology, the node

set may be varied For example, let𝜅1be the intersectional

topology, and 𝜅2 is the next topology of it; in[𝑡𝜅1, 𝑡𝜅2), all

nodes will not be removed, but at time𝑡𝜅2, some new nodes

will be removed and some nodes will be added

Remark 4 Under Assumption 3, it follows that between

every two adjacent intersectional topologies𝜅𝑟 and𝜅󸀠𝑟, each

node𝑖𝜅will appear in𝜅󸀠𝑟, where𝜅𝑟 ≺ 𝜅 ⪯ 𝜅󸀠𝑟

𝑖𝜅1and𝑖𝜅2refer to a node in the different topology, where

𝜅1 ̸= 𝜅2

3.2 Problem Statement In many applications, the

communi-cation topology of VSWSN is based on the multiple

compo-nents In this paper, the communication is the

component-based

For𝑖𝜅 ∈ 𝑉(𝜅), let 𝑥𝑖(𝑡, 𝜅) be the state of sensor 𝑖𝜅, where

𝑥𝑖(𝑡, 𝜅) ∈ 𝑅 Suppose the state of 𝑖𝜅is given by

where𝑢𝑖𝜅(𝑡) is the consensus protocol, and it is given by

𝑢𝑖𝜅(𝑡) = 𝜀̂𝑛𝜅 ∑

𝑗 𝜅 ∈𝑁 𝑖 (𝜅)

𝑎𝑖𝑗(𝜅) [𝑦𝑗(𝑡, 𝜅) − 𝑥𝑖(𝑡, 𝜅)] , 𝑡 ∈ [𝑡𝜅, 𝑡𝜅󸀠) ,

(4)

𝜅󸀠is the next topology of𝜅, 𝑦𝑗(𝑡, 𝜅) is the state of 𝑗𝜅 that is

measured by𝑖𝜅,𝑦𝑗(𝑡, 𝜅) = 𝑥𝑗(𝑡, 𝜅) + 𝑓𝑖𝑗(𝑡) + 𝑤𝑖𝑗(𝑡), 𝑓𝑖𝑗(𝑡) is the

measured attack signal,𝑓𝑖𝑗(𝑡) = 𝑓𝑗𝑖(𝑡), and 𝑤𝑖𝑗(𝑡) is the white

noise

Consider∀𝐶󸀠𝑖(𝜅) ⊂ 𝐺(𝜅); based on the dynamic (3) and

protocol (4), the dynamic state of component𝐶󸀠𝑖(𝜅) which

attaches on node𝑖𝜅is described by

̇𝑋𝑖

̂𝑛 𝜅(𝑡) = −𝜀̂𝑛𝜅𝐿𝑖̂𝑛𝜅𝑋𝑖̂𝑛𝜅(𝑡) + 𝜀̂𝑛𝜅Γ𝑖[𝐹𝑖̂𝑛𝜅(𝑡) + 𝑊̂𝑛𝑖𝜅(𝑡)] ,

𝑖𝜅∈ 𝑉𝑖

1(𝜅) , 𝑡 ∈ [𝑡𝜅, 𝑡𝜅󸀠) , (5) where 𝐿𝑖

̂𝑛 𝜅 = (𝑙𝑖𝜅𝑗𝜅)̂𝑛𝜅×̂𝑛𝜅, 𝑋𝑖

̂𝑛 𝜅(𝑘) = [𝑋𝑖

𝑝 𝜅(𝑘)𝑇, 𝑋𝑖

𝑞 󸀠

𝜅(𝑘)𝑇]𝑇,

̂𝑛𝜅 = 𝑝𝜅 + 𝑞𝜅,𝑋𝑝𝜅(𝑡) refers to the state vector of node set

𝑉1𝑖(𝜅) = {1𝜅, 2𝜅, , 𝑖𝜅, , 𝑝𝜅} ⊆ 𝑉1(𝜅), 𝑝𝜅 ≤ 𝛼𝜅, 𝑋𝑖𝑞󸀠

𝜅(𝑘)

is the state vector of the newly joined node set 𝑉2𝑖(𝜅) =

{1󸀠𝜅, 2󸀠𝜅, , 𝑖󸀠𝜅, , 𝑞󸀠𝜅}, 𝑞𝜅≤ 𝛽𝜅, and

𝑋𝑖𝑝𝜅(𝑡) = [𝑥1𝜅(𝑡, 𝜅) , , 𝑥𝑖(𝑡, 𝜅) , , 𝑥𝑝(𝑡, 𝜅)]𝑇,

𝑖𝜅∈ 𝑉𝑖

1(𝜅) ,

𝑋𝑖𝑞󸀠

𝜅(𝑡) = [𝑥1󸀠(𝑡, 𝜅) , , 𝑥𝑖󸀠(𝑡, 𝜅) , , 𝑥𝑞󸀠(𝑡, 𝜅)]𝑇,

𝑖󸀠𝜅∈ 𝑉2𝑖(𝜅) ,

Γ𝑖= diag {𝛽1𝑇, 𝛽𝑇2, , 𝛽𝑖𝑇, , 𝛽𝑇̂𝑛𝜅} ,

𝛽𝑇𝑖 = (𝑎𝑖1(𝜅) , 𝑎𝑖2(𝜅) , , 𝑎𝑖̂𝑛𝜅(𝜅)) ,

𝑊𝑖(𝑡) = diag {𝑊𝑡1, 𝑊𝑡2, , 𝑊𝑡𝑖, , 𝑊̂𝑛𝜅

𝑡 } ,

𝑊𝑡𝑖= (𝑤𝑖1(𝑡) , 𝑤𝑖2(𝑡) , , 𝑤𝑖𝑗(𝑡) , 𝑤𝑖̂𝑛𝜅(𝑡))𝑇,

𝐸 [𝑤𝑖𝑗(𝑡)] = 0, 𝐸 [𝑤𝑖𝑗(𝑡) 𝑤𝑖𝑗(𝑡)𝑇] = 1,

𝐹̂𝑛𝑖𝜅(𝑡) = diag {𝐹1(𝑡) , 𝐹2(𝑡) , , 𝐹𝑖(𝑡) , , 𝐹̂𝑛𝜅(𝑡)} ,

𝐹𝑖(𝑡) = (𝑓𝑖1(𝑡) , 𝑓𝑖2(𝑡) , , 𝑓𝑖𝑗(𝑡) , 𝑓𝑖̂𝑛𝜅(𝑡))𝑇

(6)

Remark 5 Analogously, if̂𝑛𝜅is substituted by𝑤𝜅, then system (5) refers to the whole system Namely,

̇𝑋𝑤𝜅(𝑡) = −𝜀𝑤𝜅𝐿𝑤𝜅𝑋𝑤𝜅(𝑡) + 𝜀𝑤𝜅Γ [𝐹𝑤𝜅(𝑡) + 𝑊𝑤𝜅(𝑡)] ,

𝑖𝜅 ∈ 𝑉1(𝜅) , 𝑡 ∈ [𝑡𝜅, 𝑡𝜅󸀠) (7) Consider∀𝑖𝜅 ∈ 𝑉𝑖

1(𝜅); let 𝑒𝑗(𝑡, 𝜅) = 𝑥𝑗(𝑡, 𝜅) − 𝑥0

𝑖(𝑡, 𝜅), 𝑒(𝑡, 𝜅) = 𝑋(𝑡, 𝜅) − 𝑥0

𝑖(𝑡, 𝜅) ⊗ 1̂𝑛𝜅, it obtains the systematic error

of (5) as follows:

𝑒𝑖(𝑡, 𝜅) = 𝑋𝑖̂𝑛𝜅(𝑡) − 1̂𝑛𝜅⊗ 𝑥0𝑖 (𝑡, 𝜅) = Φ𝜅𝑋𝑖̂𝑛𝜅(𝑡) , (8) where

𝑥0𝑖 (𝑡, 𝜅) = 1

̂𝑛𝜅𝑖𝜅∈𝑉∑𝑖(𝜅)𝑥𝑖(𝑡, 𝜅) ,

𝑒𝑖(𝑡, 𝜅) = (𝑒1(𝑡, 𝜅) , , 𝑒𝑖(𝑡, 𝜅) , , 𝑒̂𝑛(𝑡, 𝜅))𝑇,

Φ = 𝐼̂𝑛𝜅− 1

̂𝑛𝜅 × 1̂𝑛𝜅 ×̂𝑛𝜅,

(9)

where1̂𝑛𝜅×̂𝑛𝜅is thê𝑛𝜅× ̂𝑛𝜅matrix in which each entry is1 From (8), one gets

𝑖(𝑡, 𝜅) = Φ𝑖𝜅 ̇𝑋𝑖

̂𝑛 𝜅(𝑡) = Φ𝑖𝜅(−𝜀𝑖𝜅𝐿̂𝑛𝜅) 𝑋𝑖̂𝑛𝜅(𝑡) + Φ𝜅𝜀𝑖̂𝑛𝜅Γ𝑖[𝐹𝑖̂𝑛𝜅(𝑡) + 𝑊̂𝑛𝑖𝜅(𝑡)] (10)

Assumption 6 Suppose that each node can sense the strength

of the attack signal in its perceivable areas; in terms of carrier sense of ASCENT algorithm [25], every sensor is awake or asleep according to the attacks, namely,

𝑎𝑖𝑗(𝜅) ={{

{

1, 󵄩󵄩󵄩󵄩󵄩𝑓𝑖𝑗(𝑡)󵄩󵄩󵄩󵄩󵄩 ≤ 𝛼 (𝜅)󵄩󵄩󵄩󵄩󵄩𝑥𝑖(𝑡, 𝜅)󵄩󵄩󵄩󵄩󵄩

𝑑𝑖 𝜅

,

0, otherwise,

(11)

where𝛼(𝜅) is the constant and 𝑑𝑖𝜅 is the maximal degree of component which is attached by node𝑖𝜅

Trang 4

Assumption 7 Under criterion (11), the topology of VSWSN

is GLI connection

Definition 8 For VSWSN (7), the jamming attacks are said to

be the tolerable if VSWSN (7) satisfiesAssumption 7

Definition 9 Consider∀𝐶󸀠

𝑖(𝜅) ⊂ 𝐺(𝜅) and ∀𝑖𝜅, 𝑞𝜅∈ 𝑉𝑖(𝜅); if lim

𝑡 → ∞𝐸 (󵄩󵄩󵄩󵄩󵄩𝑥𝑖(𝑡, 𝜅) − 𝑥𝑞(𝑡, 𝜅)󵄩󵄩󵄩󵄩󵄩2

then VSWSN (5) is said to achieve the component consensus

In addition, if𝐶󸀠

𝑖(𝜅) = 𝐺(𝜅), and (12) holds, then VSWSN (5)

is said to achieve the global consensus

If lim𝑡 → ∞𝐸(‖𝑥𝑖(𝑡, 𝜅) − 𝑥0

𝑖(𝑡, 𝜅)‖2) = 0, then VSWSN (5) is said to achieve the component average consensus In

addition, if𝐶󸀠𝑖(𝜅) = 𝐺(𝜅) and (12) holds, then VSWSN (5) is

said to achieve the global average consensus

In the following section, the consensus problem under the

tolerable attacks is investigated via the error system (10)

Remark 10 According toAssumption 3, if VSWSN is

GLI-connected, then each intersectional topology is GLI-connected,

and it holds that∑𝑗𝜅∈𝑁𝑖𝜅𝑎𝑖𝑗(𝜅) > 0 According to the literature

[26], all eigenvalues of−𝐿𝑖

̂𝑛𝜅satisfy

0 = 𝜆1(𝜅) > 𝜆2(𝜅) ≥ ⋅ ⋅ ⋅ ≥ 𝜆̂𝑛𝜅(𝜅) ≥ −2Δ (𝜅) , (13)

where

Δ (𝜅) = max{{

{

𝑗 𝜅 ∈𝑁𝑖𝜅

𝑎𝑖𝑗(𝜅) | 𝑖𝜅∈ 𝑉 (𝜅)}}

}

For convenience,𝜆𝑖𝑗(𝜅) denotes the second largest

eigen-value of −𝐿(𝑤𝜅), 𝑖𝜅, 𝑗𝜅 ∈ 𝑉(𝜅), 𝜆𝑖(𝜅) refers to the second

largest eigenvalue of−𝐿(̂𝑛𝜅), 𝑖𝜅 ∈ 𝑉(𝜅), and 𝑗𝜅∉ 𝑉(𝜅)

Remark 11 If a sensor leaves from its neighbors and becomes

an isolated node, its state may not keep in coordination with

other nodes temporarily Note that if the communicating

graph is GLI-connected, the node has a chance to

commu-nicate with other nodes and keep coordination with other

nodes

Remark 12 In model (5), the state of each node may be

influenced by the attack signal function𝐹𝑖(𝑡)

Remark 13 System (5) achieves the component average

consensus refers that to the fact that the norm of 𝑒𝑖(𝑡, 𝜅)

converges to zero Similarly, if𝐶󸀠

𝑖(𝜅) = 𝐺(𝜅), then the global average consensus means that the norm of𝑒(𝑡, 𝜅) converges

to zero

4 Main Results

This section will investigate the consensus problem while the

system encounters with the jamming attacks The aim of this

section is to establish some consensus criteria of VSWSN

Let

𝛿𝑖𝑗(𝑡, 𝜅) = 12[𝑒𝑖𝑗(𝑡, 𝜅)𝑇𝑒𝑖𝑗(𝑡, 𝜅)] ,

𝛿𝑖(𝑡, 𝜅) = 1

2𝑒𝑖(𝑡, 𝜅)𝑇𝑒𝑖(𝑡, 𝜅) ,

𝛿𝑗(𝑡, 𝜅) = 12𝑒𝑗(𝑡, 𝜅)𝑇𝑒𝑗(𝑡, 𝜅) ,

(15)

where 𝑒𝑖𝑗(𝑡, 𝜅) = (𝑒1(𝑡, 𝜅)𝑇, , 𝑒𝑖(𝑡, 𝜅)𝑇, , 𝑒𝑗(𝑡, 𝜅)𝑇, ,

𝑒̂𝑛(𝑡, 𝜅)𝑇), then the update laws of 𝜀̂𝑛𝜅 (𝑛 = 0, 1, 2, ) are provided by

𝜀̂𝑛𝜅 = 𝑐 {𝐸 [𝛿𝑗(𝑡𝜅𝑚−1, 𝜅𝑚−1)] + 𝐸 [𝛿𝑗(𝑡𝜅𝑚, 𝜅𝑚)]} , (16)

where𝑚 ≥ 1 and 𝑐 is a positive constant, and one proposition

is obtained as follows

Proposition 14 𝛿𝑖𝑗(𝑡, 𝜅) satisfies

𝐸 [ ̇𝛿𝑖𝑗(𝑡, 𝜅)] ≤ 𝜀̂𝑛𝜅(𝜆𝑖𝑗𝜅𝐸 [𝛿𝑖𝑗(𝑡, 𝜅)] + Δ𝛿𝑖) , (17)

where Δ𝛿𝑖 = (1/2)𝐸[𝐹𝑖(𝑡)𝑇Γ𝑇Φ𝑇

𝜅Φ𝜅𝑋̂𝑛𝜅(𝑡) + 𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇

𝜅

Φ𝜅Γ𝐹𝑖(𝑡)].

Proof Note that

𝑖𝑗(𝑡, 𝜅)

=1

2[ ̇𝑒𝑖𝑗(𝑡, 𝜅)𝑇𝑒𝑖𝑗(𝑡, 𝜅) + 𝑒𝑖𝑗(𝑡, 𝜅)𝑇 𝑖𝑗̇𝑒 (𝑡, 𝜅)]

≤1

2[𝑋̂𝑛𝜅(𝑡)𝑇(−𝜀̂𝑛𝜅𝐿̂𝑛𝜅)𝑇Φ𝑇𝜅 + (𝐹𝑖(𝑡) + 𝑊 (𝑡))𝑇Γ𝑇𝜀𝑇̂𝑛𝜅Φ𝑇𝜅]

× Φ𝜅𝑋̂𝑛𝜅(𝑡) +1

2𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅

× [Φ𝜅(−𝜀̂𝑛𝜅𝐿̂𝑛𝜅) 𝑋̂𝑛𝜅(𝑡) + Φ𝜅𝜀̂𝑛𝜅Γ [𝐹𝑖(𝑡) + 𝑊 (𝑡)]]

=1

2[𝑋̂𝑛𝜅(𝑡)𝑇(−𝜀̂𝑛𝜅𝐿̂𝑛𝜅)𝑇Φ𝑇

𝜅Φ𝜅𝑋̂𝑛𝜅(𝑡) + (𝐹𝑖(𝑡) + 𝑊 (𝑡))𝑇

× Γ𝑇𝜀𝑇̂𝑛𝜅Φ𝑇𝜅Φ𝜅𝑋̂𝑛𝜅(𝑡) + 𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅Φ𝜅(−𝜀̂𝑛𝜅𝐿̂𝑛𝜅) 𝑋̂𝑛𝜅(𝑡) + 𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅Φ𝜅𝜀̂𝑛𝜅Γ (𝐹𝑖(𝑡) + 𝑊 (𝑡)) ] ;

(18)

Trang 5

then it holds that

𝐸 [ ̇𝛿𝑖𝑗(𝑡, 𝜅)] ≤ 𝐸 [12𝑋̂𝑛𝜅(𝑡)𝑇(−𝜀̂𝑛𝜅𝐿̂𝑛𝜅)𝑇Φ𝜅𝑇Φ𝜅𝑋̂𝑛𝜅(𝑡)]

+12𝐸 {[𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅Φ𝜅(−𝜀̂𝑛𝜅𝐿̂𝑛𝜅) 𝑋̂𝑛𝜅(𝑡)]

+ 𝐹𝑖(𝑡)𝑇Γ𝑇𝜀𝑇

̂𝑛 𝜅Φ𝑇

𝜅Φ𝜅𝑋̂𝑛𝜅(𝑡) + 𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅Φ𝜅𝜀̂𝑛𝜅Γ𝐹𝑖(𝑡) }

≤ 𝜀̂𝑛𝜅(𝜆𝑖𝑗𝜅𝐸 [𝑒𝑖𝑗(𝑡, 𝜅)𝑇𝑒𝑖𝑗(𝑡, 𝜅)] + Δ𝛿𝑖)

= 𝜀̂𝑛𝜅(𝜆𝑖𝑗𝜅𝐸 [𝛿𝑖𝑗(𝑡, 𝜅)] + Δ𝛿𝑖)

(19) This completes the proof

Let

𝛿𝑖(𝑡, 𝜅) = 𝛿1𝑖(𝑡, 𝜅) + 𝛿2𝑖(𝑡, 𝜅) , (20)

where

𝛿𝑖

1(𝑡, 𝜅) =12𝑒𝑖

1(𝑡, 𝜅)𝑇𝑒𝑖

1(𝑡, 𝜅) ,

𝛿2𝑖(𝑡, 𝜅) =1

2𝑒𝑖2(𝑡, 𝜅)𝑇𝑒𝑖2(𝑡, 𝜅) ,

𝑒𝑖1(𝑡, 𝜅) = (𝑒1(𝑡, 𝜅)𝑇, , 𝑒𝑖(𝑡, 𝜅)𝑇, , 𝑒𝑝(𝑡, 𝜅)𝑇) ,

𝑒𝑖2(𝑡, 𝜅) = (𝑒1󸀠(𝑡, 𝜅)𝑇, , 𝑒𝑖󸀠(𝑡, 𝜅)𝑇, , 𝑒𝑞󸀠(𝑡, 𝜅)𝑇) ;

(21)

underAssumption 6, it holds the following proposition

Proposition 15 Functions 𝛿𝑖𝑗(𝑡, 𝜅), 𝛿𝑖(𝑡, 𝜅), and 𝛿𝑗(𝑡, 𝜅)

sat-isfy the following inequality:

𝐸 [𝛿𝑖𝑗(𝑡, 𝜅𝑚)] ≤ exp [

[

𝜀̂𝑛𝜅𝑚(̂𝜆𝑖𝑗𝜅

𝑚𝑇𝜅𝑚+𝜅∑𝑚−1

𝑠𝑖=𝜅0

̂𝜆𝑖

𝑠𝑇𝑠)]

]

× 𝐸 [𝛿𝑖(𝑡0𝑖, 0𝑖)]

+ exp [ [

𝜀̂𝑛𝜅𝑚(̂𝜆𝑖𝑗𝜅

𝑚𝑇𝜅𝑚+𝜅∑𝑚−1

𝑠 𝑗 =𝜅 0

̂𝜆𝑗

𝑠𝑇𝑠)]

]

× 𝐸 [𝛿𝑗(𝑡0𝑗, 0𝑗)] + 𝑓 (𝑡, 𝜅𝑚) + 𝑔 (𝑡, 𝜅𝑚) ,

(22)

where ̂𝜆𝑖𝑗𝜅 = max{𝛼(𝜅) + 𝜆𝑖𝑗𝜅}, ̂𝜆𝑖

𝜅 = max{𝛼(𝜅) + 𝜆𝑖

𝜅}, 𝑇𝑠 =

𝑡𝜅𝑠− 𝑡𝜅𝑠−1, and

𝑔𝑖(𝑡, 𝜅𝑚) = exp [𝜀̂𝑛𝜅𝑚−1̂𝜆𝑖

𝜅 𝑚−1(𝑡 − 𝑡𝜅𝑚−2)] 𝛿2𝑖(𝑡𝜅𝑚−2, 𝜅𝑚−2) 𝑇𝜅𝑚−2 + exp [𝜀̂𝑛𝜅𝑚−1̂𝜆𝑖

𝜅 𝑚−1𝑇𝜅𝑚−1+ 𝜀̂𝑛𝜅𝑚−1̂𝜆𝑖

𝜅 𝑚−2𝑇𝜅𝑚−2]

× 𝛿2𝑖(𝑡𝜅𝑚−3, 𝜅𝑚−3) + ⋅ ⋅ ⋅ + exp [𝜀̂𝑛𝜅𝑚−1̂𝜆𝑖

𝜅 𝑚−1𝑇𝜅𝑚−1+ ⋅ ⋅ ⋅ + 𝜀̂𝑛𝜅1̂𝜆𝑖

𝜅 1𝑇𝜅1]

× 𝛿2𝑖(𝑡𝜅0, 𝜅0) ,

𝑔𝑗(𝑡, 𝜅𝑚) = exp [𝜀̂𝑛𝜅𝑚−1̂𝜆𝑗

𝜅 𝑚−1(𝑡 − 𝑡𝜅𝑚−2)] 𝛿2𝑗(𝑡𝜅𝑚−2, 𝜅𝑚−2) 𝑇𝜅𝑚−2 + exp [𝜀̂𝑛𝜅𝑚−1̂𝜆𝑗

𝜅𝑚−1𝑇𝜅𝑚−1+ 𝜀̂𝑛𝜅𝑚−1̂𝜆𝑗

𝜅𝑚−2𝑇𝜅𝑚−2]

× 𝛿2𝑗(𝑡𝜅𝑚−3, 𝜅𝑚−3) + ⋅ ⋅ ⋅ + exp [𝜀̂𝑛

𝜅𝑚−1̂𝜆𝑗

𝜅 𝑚−1𝑇𝜅𝑚−1+ ⋅ ⋅ ⋅ + 𝜀̂𝑛

𝜅󸀠1̂𝜆𝑗

𝜅 󸀠

1𝑇𝜅󸀠

1]

× 𝛿2𝑗(𝑡𝜅0󸀠, 𝜅0󸀠) ,

(23)

where𝜅0and𝜅󸀠0are the initial topologies of𝑖𝜅, 𝑗𝜅, respectively Proof From criterion (11), it is straightforward that

‖Γ𝐹𝑖(𝑡)‖ ≤ ‖𝑋̂𝑛𝜅(𝑡)‖; then

Δ𝛿𝑖= 12𝐸 [𝐹𝑖(𝑡)𝑇Γ𝑇Φ𝑇𝜅Φ𝜅𝑋̂𝑛𝜅(𝑡) + 𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅Φ𝜅Γ𝐹𝑖(𝑡)]

≤ 𝛼 (𝜅)

2 𝐸 [𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅Φ𝜅𝑋̂𝑛𝜅(𝑡) + 𝑋̂𝑛𝜅(𝑡)𝑇Φ𝑇𝜅Φ𝜅𝑋̂𝑛𝜅(𝑡)]

≤ 𝛼 (𝜅) 𝐸 [𝛿𝑖(𝑡, 𝜅)]

(24) Combine (24) with (19); it holds that

𝐸 [ ̇𝛿𝑖𝑗(𝑡, 𝜅)] ≤ 𝜀̂𝑛𝜅(𝛼 (𝜅) + 𝜆𝑖𝑗𝜅) 𝐸 [𝛿𝑖𝑗(𝑡, 𝜅)]

= 𝜀̂𝑛𝜅̂𝜆𝑖𝑗

then∀𝑡 ∈ [𝑡𝜅𝑚+1, 𝑡𝜅𝑚),

𝐸 [𝛿𝑖𝑗(𝑡, 𝜅𝑚+1)] ≤ 𝐸 [𝛿𝑖𝑗(𝑡𝜅𝑚, 𝜅𝑚)] exp (∫𝑡

𝑡𝜅𝑚𝜀𝜅𝑚̂𝜆𝑖𝑗

𝜅 𝑚𝑑𝑠) ,

≤ 𝐸 [𝛿𝑖𝑗(𝑡𝜅𝑚, 𝜅𝑚)] exp [𝜀𝜅𝑚̂𝜆𝑖𝑗

𝜅 𝑚(𝑡 − 𝑡𝜅𝑚)]

(26)

Trang 6

Notice that

𝐸 [𝛿𝑖𝑗(𝑡𝜅𝑚, 𝜅𝑚)] ≤ 𝐸 [𝛿𝑖(𝑡𝜅𝑚, 𝜅𝑚)] + 𝐸 [𝛿𝑗(𝑡𝜅𝑚, 𝜅𝑚)] ,

𝐸 [𝛿𝑖(𝑡𝜅𝑚, 𝜅𝑚)]

≤ exp [𝜀𝜅𝑚̂𝜆𝑖

𝜅 𝑚(𝑡𝜅𝑚− 𝑡𝜅𝑚−1)]

× 𝐸 [𝛿𝑖(𝑡𝜅𝑚−1, 𝜅𝑚−1)] ≤ ⋅ ⋅ ⋅

≤ exp [𝜀𝜅𝑚̂𝜆𝑖

𝜅 𝑚(𝑡𝜅𝑚− 𝑡𝜅𝑚−1) + 𝜀𝜅𝑚−1̂𝜆𝑖

𝜅 𝑚−1(𝑡𝜅𝑚−1− 𝑡𝜅𝑚−2) + ⋅ ⋅ ⋅ + 𝜀𝜅1̂𝜆𝑖

𝜅1(𝑡𝜅1− 𝑡𝜅0)] 𝐸 [𝛿𝑖(𝑡𝜅0, 𝜅0)]

+ 𝑔𝑖(𝑡, 𝜅𝑚) ,

= exp (𝜅∑𝑚−1

𝑠=𝜅 0

𝜀𝑠̂𝜆𝑖

𝑠𝑇𝑠) 𝐸 [𝛿𝑖(𝑡𝜅0, 𝜅0)]

+ 𝑔𝑖(𝑡, 𝜅𝑚) ,

(27)

𝐸 [𝛿𝑗(𝑡𝜅𝑚, 𝜅𝑚)]

≤ exp [𝜀𝜅𝑚̂𝜆𝑗

𝜅 𝑚(𝑡𝜅𝑚− 𝑡𝜅𝑚−1)]

× 𝐸 [𝛿𝑗(𝑡𝜅𝑚−1, 𝜅𝑚−1)] ≤ ⋅ ⋅ ⋅

≤ exp [𝜀𝜅𝑚̂𝜆𝑗

𝜅 𝑚(𝑡𝜅𝑚− 𝑡𝜅𝑚−1) + 𝜀𝜅𝑚−1̂𝜆𝑗

𝜅 𝑚−1(𝑡𝜅𝑚−1− 𝑡𝜅𝑚−2) + ⋅ ⋅ ⋅ + 𝜀𝜅1̂𝜆𝑗

𝜅1(𝑡𝜅1− 𝑡𝜅0) ] 𝐸 [𝛿𝑗(𝑡𝜅0, 𝜅0)]

+ 𝑔𝑗(𝑡, 𝜅𝑚) ,

= exp (∑𝜅𝑚

𝑠=𝜅0

𝜀𝑠̂𝜆𝑗

𝑠𝑇𝑠) 𝐸 [𝛿𝑗(𝑡𝜅0, 𝜅0)]

+ 𝑔𝑗(𝑡, 𝜅𝑚) ;

(28)

from inequalities (26), (27), and (28), it holds the inequality

(22) This completes the proof

Next, the consensus criterion is proposed as follows

Theorem 16 If subsystem (7) is the GLI-connected and the

each attack signal satisfies Assumption 6 , then under (4),

VSWSN (7) achieves the global average consensus if there is the

enough dwell time in the interactional topology𝜅𝑚, namely,

𝑇𝜅𝑚> max{{

{

1

̂𝜆𝑖𝑗

𝜅𝑚

(−𝜅∑𝑚−1

𝑠=𝜅 0

̂𝜆𝑖

𝑠𝑇𝑠) , 1

̂𝜆𝑖𝑗

𝜅𝑚

(−𝜅∑𝑚−1

𝑠=𝜅0󸀠

̂𝜆𝑗

𝑠𝑇𝑠)}} }

, (29)

and𝜀̂𝑛 satisfies (16).

a 3 2 1

(a)

3 5 b

1

2 4 2

(b)

3 5

1

2 4 c

3

(c) Figure 1: Two node attached components of nodes 1 and 3 in VSWSN

Proof For inequality (29), it follows that ̂𝜆𝑖𝑗𝜅

𝑚 < 0, ̂𝜆𝑖𝜅𝑚 ≤ 0, based onProposition 15, and if each attack signal satisfies

Assumption 6, then

lim

this completes the proof

Remark 17 In𝐸[𝛿𝑖𝑗(𝑡, 𝜅𝑚+1)] ≤ 𝐸[𝛿𝑖𝑗(𝑡𝜅𝑚, 𝜅𝑚)] exp[𝜀𝜅𝑚̂𝜆𝑖𝑗

𝜅(𝑡 −

𝑡𝜅𝑚)], even though ̂𝜆𝑖𝑗𝜅 < 0, it cannot ensure that the system achieves the average consensus; see simulation results of

Example 2 In addition, if adaptive parameter (16) is utilized, whatever𝐸[𝛿𝑖𝑗(𝑡𝜅𝑚, 𝜅𝑚)] tends to infinite, the system achieves the consensus, and this result is different from the literature [7]

Remark 18. Theorem 16shows that under the tolerable jam-ming attacks, if VSWSN is the GLI-connected and the value

of 𝜀̂𝑛𝜅 is chosen appropriately, then VSWSN achieves the consensus The numerical example of the following section shows the reliability

5 Numerical Example

Example 1 Suppose that VSWSN (7) is composed of the following two node attached components:

𝐶1𝜅= (𝑉1(𝜅) , 𝐸1(𝜅) , 𝐴1(𝜅)) ,

𝐶3𝜅= (𝑉3(𝜅) , 𝐸3(𝜅) , 𝐴3(𝜅)) , (31) where𝑇0(𝑡) = {1, 2, 3}, the figure of 𝑇0(𝑡) is shown inFigure 1,

𝑎, 𝑏, 𝑐 refer to the attack signals under the different topologies, and the circles refer to the sensible regions For convenience, the topology indexes of nodes are dropped in the following Suppose that

𝑉1(1) = {1, 2} , 𝑉3(2) = {1, 2, 5} ,

𝑉1(3) = {1, 2, 3, 4, 5} ,

𝑉3(1) = {3} , 𝑉3(2) = {3, 4} ,

𝑉3(3) = {1, 2, 3, 4, 5}

(32)

Trang 7

0 100 200 300 400 500

−8

−7

−6

−5

−4

−3

−2

−1

0

1

t (s)

x1(t)

x 2 (t)

x 3 (t)

(a) The dynamic states of all sensors

−6

−4

−2 0 2 4 6

t (s)

y 1 (t)

y 2 (t) yx30(t)(t)

(b) The errors among the average values and states of all nodes, where

𝑒𝑖(𝑡) = 𝑦 𝑖 (𝑡), 𝑖 = 1, 2, 3

100

150

200

250

300

350

400

t (s)

f 3 (t)

(c) State of the attack signal, where 𝑓 3 (𝑡) = 𝑓 𝑎 (𝑡)

0.8 1 1.2 1.4 1.6 1.8 2 2.2

t (s)

f 0 (t)

(d) The update law of 𝜀 𝜅1, where 𝑓 0 (𝑡) = 𝜀 𝜅1 Figure 2: The dynamic states of𝑋𝑘,𝑌𝑘, jamming attack signal and the update law of𝜀𝜅1in topology1

The related matrices are listed as follows:

𝐿1(1) = [ 1 −1−1 1 ] ,

𝐿1(2) = [

[

1 −1 0

−1 2 −1

0 −1 1

] ] ,

𝐿1(3) =

[ [ [ [

1 −1 0 0 0

−1 2 0 0 −1

0 0 1 −1 0

0 0 −1 1 0

0 −1 0 0 1

] ] ] ] ,

𝐿3(2) = [ 1 −1−1 1 ] ,

𝐿3(3) = 𝐿1(3)

(33)

Under protocol (4), the dynamic state of the node attached component is given by (5); the related parameters are listed below

In topology1, the second largest eigenvalue of −𝐿1(1) and

−𝐿3(1) is −2; the jamming attack signal is 𝑓𝑎(𝑡) = 2‖𝑥1(𝑡, 1)‖, 𝛼(1) = 1, the measured signals are 𝑓13(𝑡) = 𝑓23(𝑡) = 𝑓𝑎(𝑡), andAssumption 6cannot be satisfied; node 3 falls in sleeping

Trang 8

−6

−5

−4

−3

−2

−1

0

1

2

3

t (s)

x1(t)

x2(t) xx45(t)(t)

x3(t)

(a) The dynamic states of all sensors

−4

−3

−2

−1 0 1 2 3 4 5 6

t (s)

y1(t)

y2(t) yy45(t)(t)

x 0 (t)

y3(t)

(b) The errors among the average values and states of all nodes, where

𝑒 𝑖 (𝑡) = 𝑦𝑖(𝑡), 𝑖 = 1, 2, 3, 4, 5

0

10

20

30

40

50

60

70

80

90

t (s)

s1(t)

s2(t)

(c) 𝑠1(𝑡) is the attack signal, 𝑠2(𝑡) = 𝜀𝜅2

0 0.05 0.1 0.15 0.2 0.25

t (s)

f1(t)

f2(t)

f5(t)

(d) 𝑓1(𝑡), 𝑓2(𝑡), 𝑓5(𝑡) stand the measured attack signals by nodes 1, 2, and

5, respectively Figure 3: The dynamic states of𝑋𝑘,𝑌𝑘, attack signals, and the update law of𝜀𝜅2in topology2

(see topology1 ofFigure 1) Taking𝑐 = 0.1, suppose that 𝜀𝜅

satisfies (16); the simulation results are shown inFigure 2

In topology 2, according to carrier sense, node 3 is

awakened, node 5 joined the node attached component of

1, and node 4 joined the node attached component of 3

(see topology 2 ofFigure 1) For this topology, the second

largest eigenvalue of−𝐿1(2) and −𝐿3(2) is −1 Suppose that

the jamming attack signal is𝑓𝑏(𝑡) = ‖𝑥2(𝑡, 2)‖, 𝛼(1) = 0.2,

the measured signals are𝑓13(𝑡) = 𝑓23(𝑡) = 0.01𝑓𝑏(𝑡), and

Assumption 6is satisfied; taking 𝑐 = 0.1, suppose that 𝜀𝜅 satisfies (16); the simulation results are shown inFigure 3

In topology3, two node attached components are merged (see topology 3 ofFigure 1) For this topology, the second largest eigenvalue of−𝐿1(3) is −1 Suppose that the jamming attack signal is𝑓𝑐(𝑡) = ‖𝑥3(𝑡, 3)‖, 𝛼(1) = 0.3, the measured signals are 𝑓13(𝑡) = 𝑓31(𝑡) = 0.01 × [(4/25)𝑓𝑐(𝑡)], and

Assumption 6is satisfied; taking 𝑐 = 0.1, suppose that 𝜀𝜅 satisfies (16); the simulation results are shown inFigure 4

Trang 9

0.3

0.4

0.5

0.6

0.7

0.8

0.9

1

t (s)

x 1 (t)

x 2 (t) xx45(t)(t)

x 3 (t)

(a) The dynamic states of all sensors

−0.3

−0.2

−0.1 0 0.1 0.2 0.3 0.4

t (s)

y 1 (t)

y 2 (t) yy45(t)(t)

y 3 (t)

(b) The errors among the average values and states of all nodes, where

𝑒𝑖(𝑡) = 𝑦 𝑖 (𝑡), 𝑖 = 1, 2, 3, 4, 5

0.5

0.6

0.7

0.8

0.9

1

1.1

1.2

t (s) s(t)

(c) The state of the jamming attack signal, where 𝑠(𝑡) = 𝑓𝑐(𝑡)

0.2 0.25 0.3 0.35 0.4 0.45 0.5 0.55 0.6 0.65 0.7

t (s) s(t)

(d) The update law of 𝜀𝜅3, where 𝑠(𝑡) = 𝜀𝜅3 Figure 4: The dynamic states of𝑋𝑘,𝑌𝑘, jamming attack signal, and the update law of𝜀𝜅3in topology3

Example 2 FollowingExample 1, if𝜀𝜅is replaced by the gain

function𝑎(𝑡) = log(𝑡 + 2)/(𝑡 + 2) studied in [7], the system

with topology3 cannot achieve the consensus; the simulation

results are shown inFigure 5

6 Conclusion

This paper has investigated the consensus problem of VSWSN

under the tolerable jamming attacks It has disclosed the

relations among the attack power, initial values of the newly

joined nodes, dwell time, and GLI-connected topology

Ac-cording to the errors of the node attached components, the

adaptive parameters were provided; then the adaptive con-sensus protocol was obtained, and the designed protocol ensures that the system achieves the consensus whatever the values of the newly joined nodes The obtained results in this paper have extended some existing results which are associated with the fixed node set system In fact, according

to the attack power, this paper has provided a sleep method

of VSWSN when the system encounters with the jamming attacks Finally, simulation results have shown the effective-ness of the obtained results

For the future research, relations among the time delays of multiple hop-relays, accumulated errors, and the consensus will be considered

Trang 10

1

1.5

2

2.5

3

3.5

4

4.5

t (s)

x1(t)

x2(t) xx45(t)(t)

x3(t)

(a) The dynamic states of all sensors

−1.5

−1

−0.5 0 0.5 1 1.5 2 2.5

t (s)

y1(t)

y2(t) yy45(t)(t)

x 0 (t)

y3(t)

(b) The errors among the average values and states of all nodes, where

𝑒 𝑖 (𝑡) = 𝑦𝑖(𝑡), 𝑖 = 1, 2, 3, 4, 5

0 0.05 0.1 0.15 0.2 0.25 0.3 0.35 0.4

t (s) s(t)

(c) Curves of the gain function 𝑠(𝑡) = log(𝑡 + 2)/(𝑡 + 2) Figure 5: The dynamic states of𝑋𝑘,𝑌𝑘, and gain function𝑠(𝑡) ofExample 2

Acknowledgment

This work is supported by Cultivation Fund of Taizhou

Uni-versity (2013PY09)

References

[1] J Yick, B Mukherjee, and D Ghosal, “Wireless sensor network

survey,” Computer Networks, vol 52, no 12, pp 2292–2330, 2008.

[2] I F Akyildiz, W Su, Y Sankarasubramaniam, and E Cayirci,

“Wireless sensor networks: a survey,” Computer Networks, vol.

38, no 4, pp 393–422, 2002

[3] D Zhao, Z An, and Y Xu, “Time synchronization in wireless sensor networks using max and average consensus protocol,”

International Journal of Distributed Sensor Networks, vol 2013,

Article ID 192128, 10 pages, 2013

[4] Z.-G Wu, J H Park, H Su, B Song, and J Chu, “Expo-nential synchronization for complex dynamical networks with

sampled-data,” Engineering and Applied Mathematics, vol 349,

no 9, pp 2735–2749, 2012

[5] Z.-G Wu, J H Park, H Su, and J Chu, “Discontinuous Lyapunov functional approach to synchronization of time-delay

neural networks using sampled-data,” Nonlinear Dynamics, vol.

69, no 4, pp 2021–2030, 2012

[6] R Olfati-Saber and R M Murray, “Consensus problems in networks of agents with switching topology and time-delays,”

Ngày đăng: 02/11/2022, 08:57

Nguồn tham khảo

Tài liệu tham khảo Loại Chi tiết
[1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292–2330, 2008 Sách, tạp chí
Tiêu đề: Wireless sensor networksurvey,”"Computer Networks
[7] T. Li and J.-F. Zhang, “Mean square average-consensus under measurement noises and fixed topologies: necessary and suf- ficient conditions,” Automatica, vol. 45, no. 8, pp. 1929–1936, 2009 Sách, tạp chí
Tiêu đề: Mean square average-consensus undermeasurement noises and fixed topologies: necessary and suf-ficient conditions,”"Automatica
[8] W. Zhou, J. Mou, T. Wang, C. Ji, and J. Fang, “Quasi-average mean square consensus for wireless sensor networks under three topologies with respect to sleeping-awaking method,”Optimal Control Applications and Methods, vol. 34, no. 4, pp.379–395, 2013 Sách, tạp chí
Tiêu đề: Quasi-averagemean square consensus for wireless sensor networks underthree topologies with respect to sleeping-awaking method,”"Optimal Control Applications and Methods
[9] N. Abaid and M. Porfiri, “Leader-follower consensus over numerosity-constrained random networks,” Automatica, vol Sách, tạp chí
Tiêu đề: Leader-follower consensus overnumerosity-constrained random networks,” "Automatica
[10] L. Ding, Q.-L. Han, and G. Guo, “Network-based leader- following consensus for distributed multi-agent systems,” Auto- matica, vol. 49, no. 7, pp. 2281–2286, 2013 Sách, tạp chí
Tiêu đề: Network-based leader-following consensus for distributed multi-agent systems,”"Auto-"matica
[11] Y. Hu, H. Su, and J. Lam, “Adaptive consensus with a virtual leader of multiple agents governed by locally Lipschitz nonlin- earity,” International Journal of Robust and Nonlinear Control, vol. 23, no. 9, pp. 978–990, 2013 Sách, tạp chí
Tiêu đề: Adaptive consensus with a virtualleader of multiple agents governed by locally Lipschitz nonlin-earity,”"International Journal of Robust and Nonlinear Control
[12] Z. Ji, H. Lin, and H. Yu, “Leaders in multi-agent controllability under consensus algorithm and tree topology,” Systems &amp Sách, tạp chí
Tiêu đề: Leaders in multi-agent controllabilityunder consensus algorithm and tree topology,”
[13] W. Zhou, J. Mou, T. Wang, C. Ji, and J. Fang, “Target- synchronization of the distributed wireless sensor networks under the same sleeping-awaking method,” Journal of the Franklin Institute, vol. 349, no. 6, pp. 2004–2018, 2012 Sách, tạp chí
Tiêu đề: Target-synchronization of the distributed wireless sensor networksunder the same sleeping-awaking method,” "Journal of the"Franklin Institute
[14] F. Fagnani and S. Zampieri, “Randomized consensus algorithms over large scale networks,” IEEE Journal on Selected Areas in Communications, vol. 26, no. 4, pp. 634–649, 2008 Sách, tạp chí
Tiêu đề: Randomized consensus algorithmsover large scale networks,”"IEEE Journal on Selected Areas in"Communications
Erciyes, “A hybrid distributed mutual exclusion algorithm for cluster-based systems,” Mathematical Problems in Engineering, vol. 2013, Article ID 703414, 15 pages, 2013 Sách, tạp chí
Tiêu đề: A hybrid distributed mutual exclusion algorithm forcluster-based systems,”"Mathematical Problems in Engineering
Năm: 2013
[16] T. Botmart and P. Niamsup, “Delay-dependent synchronization for complex dynamical networks with interval time-varying and switched coupling delays,” Journal of Applied Mathematics, vol. 2013, Article ID 367457, 16 pages, 2013 Sách, tạp chí
Tiêu đề: Delay-dependent synchronizationfor complex dynamical networks with interval time-varyingand switched coupling delays,”"Journal of Applied Mathematics
[17] Z. Li, W. Ren, X. Liu, and L. Xie, “Distributed consensus of linear multi-agent systems with adaptive dynamic protocols,” Sách, tạp chí
Tiêu đề: Distributed consensus oflinear multi-agent systems with adaptive dynamic protocols
network measures and adaptive trees,” IEEE Transactions on Automatic Control, vol. 58, no. 1, pp. 19–31, 2013 Sách, tạp chí
Tiêu đề: IEEE Transactions on"Automatic Control
Năm: 2013
[19] Z. Li, W. Ren, X. Liu, and M. Fu, “Consensus of multi-agent systems with general linear and Lipschitz nonlinear dynamics using distributed adaptive protocols,” Institute of Electrical and Electronics Engineers, vol. 58, no. 7, pp. 1786–1791, 2013 Sách, tạp chí
Tiêu đề: Consensus of multi-agentsystems with general linear and Lipschitz nonlinear dynamicsusing distributed adaptive protocols,”"Institute of Electrical and"Electronics Engineers
[20] H. Wang and Y. Guo, “Consensus on scale-free network,” in Proceedings of the Amercia Control Conference (ACC ’08), pp Sách, tạp chí
Tiêu đề: Consensus on scale-free network,” in"Proceedings of the Amercia Control Conference (ACC ’08)
[21] H. Yang, L. Lan, and S. Zhang, “Consensus of synchronization- preferential scale free networks,” Physics Procedia, vol. 3, no. 5, pp. 1913–1920, 2010 Sách, tạp chí
Tiêu đề: Consensus of synchronization-preferential scale free networks,”"Physics Procedia
[22] J. Mou, W. Zhou, T. Wang, C. Ji, and D. Tong, “Consensus of the distributed varying scale wireless sensor networks,” Sách, tạp chí
Tiêu đề: Consensusof the distributed varying scale wireless sensor networks
[23] X. F. Wang and G. Chen, “Synchronization in scale-free dynam- ical networks: robustness and fragility,” IEEE Transactions on Circuits and Systems I, vol. 49, no. 1, pp. 54–62, 2002 Sách, tạp chí
Tiêu đề: Synchronization in scale-free dynam-ical networks: robustness and fragility,”"IEEE Transactions on"Circuits and Systems I
[24] Y.-W. Wang, H. O. Wang, J.-W. Xiao, and Z.-H. Guan, “Syn- chronization of complex dynamical networks under recoverable attacks,” Automatica, vol. 46, no. 1, pp. 197–203, 2010 Sách, tạp chí
Tiêu đề: Syn-chronization of complex dynamical networks under recoverableattacks,”"Automatica
[25] A. Cerpa and D. Estrin, “ASCENT: adaptive self-configuring sensor networks topologies,” IEEE Transactions on Mobile Computing, vol. 3, no. 3, pp. 272–285, 2004 Sách, tạp chí
Tiêu đề: ASCENT: adaptive self-configuringsensor networks topologies,” "IEEE Transactions on Mobile"Computing

TÀI LIỆU CÙNG NGƯỜI DÙNG

TÀI LIỆU LIÊN QUAN