#### Abstract

Compared with previous studies, this paper focuses on the time delay phenomenon in the consensus state between the leader and followers and considers that the DoS attack occurs nonperiodically. First, a new event-triggered mechanism and lag consensus control strategy are proposed. Then, through the Lyapunov stability theory, algebraic knowledge, and graph theory, it is proved that followers and leader can achieve lag consistent under the DoS attack, and the trigger interval is designed to ensure that Zeno behavior does not occur. Finally, the correctness and effectiveness of the proposed theory and method are verified by numerical simulation.

#### 1. Introduction

In recent years, distributed cooperative control of multi-agent systems (MASs) has been widely used in various fields, such as smart grid collaborative control [1], distributed optimal cooperation [2], coordinated defense systems [3], and so on. In cooperative control, the consensus has always been a hot topic in the research of multi-agent systems. Many researchers have studied the consensus of MASs from different perspectives [4–6]. The overall goal of leader-follower consensus is to drive the states of all followers in the network to track the state of the leader [7]. However, in the actual communication process, many factors, such as the limitation of communication speed, the limited bandwidth, and the asymmetry of information transmission, may lead to delay in transmitting and receiving information between agents [8]. At present, there are many research results on the consensus of communication delay systems. Reference [9] investigated the consensus problem of continuous-time nonlinear MASs with time-varying communication delay via reliable control. The tracking consensus regulation was studied in [10], where high-order MASs was subjected to Lipschitz nonlinear perturbations.

In order to solve the problem of limited resources to a certain extent, this paper introduces an event trigger mechanism to design a control protocol [11]. The event-trigger mechanism avoids the problem of continuous update of the controller, which not only reduces the amount of data in network transmission but also extends the service life of network components. The event-triggered distributed predictive control (DPC) problem was considered in [12], where multi-agent systems were subject to bounded disturbances. Reference [13] studied the event-triggered containment control problem for a class of networked nonlinear MASs subjected to limited communication resources and proposed a distributed containment output feedback control strategy with an event-triggered communication mechanism.

With the increasingly mature communication technology, the denial-of-service attacks always threaten the normal work of the network systems. The DoS attacks prevent legitimate users from accessing resources properly and even collapse the resources [14]. Therefore, in order to avoid DoS attacks causing damage to the system, some security control protocols have been proposed [15–18]. Reference [19] investigated the secure consensus for second-order MASs with nonlinear dynamics and event-triggered control strategy under DoS attacks. In [20], a distributed stochastic model predictive controller was designed for a networked control system with stochastic disturbances and denial-of-service (DoS) attacks. Reference [21] investigated the leader–follower robust consensus of heterogeneous multiagent systems with denial-of-service attacks. Reference [22] studied the secure consensus problem of multiagent systems under switching topologies, and the studied multiagent systems were affected by both denial-of-service (DoS) attacks and external disturbances. The observer-based output feedback control problem was studied in [23] for cyber–physical systems against randomly occurring packet dropout and periodic DoS attacks. The problem of event-triggered distributed state estimation was considered in [24] for linear multiagent systems under DoS attacks. The distributed event-triggered consensus problem of a generally linear multiagent system was considered in [25] with periodic DoS jamming attacks. Reference [26] applied an input-based triggering approach to investigate the secure consensus problem in multiagent systems under DoS attacks. Reference [27] studied secure L-F consensus of linear MASs under a directed communication network with denial-of-service (DoS) attacks. However, there are few studies on the consensus of nonlinear systems under DoS attacks. In practical applications, most systems are nonlinear, so it is necessary to study nonlinear systems and have practical application value. Compared with the above methods, the distributed control algorithm proposed in this paper achieves the lag consensus of MASs under DoS attacks.

The consensus considered in most of the above literatures was completely consistent . However, in the real network, there is a time lag between the state of leader (indexed the leader agent as node 0) and followers, where lag consensus can be denoted ( is time delay). In real life, being completely consistent may bring us trouble, and lag consistent can avoid such trouble. For example, many cars are on a road. If they need to reach a certain location at the same time, they may cause a traffic jam. But if they have an appropriate delay on the arrival time, they can pass smoothly and orderly. Reference [28] studied lag consensus of second-order nonlinear MASs. Reference [29] proposed a new distributed controller to solve the prescribed-time cluster lag consensus control for MASs. Reference [30] investigated the problem of cluster lag consensus for first-order MASs which can be formulated as moving agents in a capacity-limited network. Our three contributions in this paper as follows:(1)The denial-of-service attacks always threaten the normal work of the network systems. However, there are few studies on the consensus of nonlinear systems under DoS attacks, and the lag consensus in this paper is also rarely studied in this field.(2)DoS attacks are periodically initiated using known attack strategies in [16], [23], and [25]. However, in practical applications, we often do not predict how DOS attacks will work. Therefore, this paper considers that DoS attacks are nonperiodic and the attack strategy is unknown. In addition, the lag secure consensus of the system is studied in this case.(3)An event-triggered controller is designed for lag consensus, and the lag secure consensus is studied for second-order nonlinear MASs with event-triggered control strategy under DoS attack. Through the Lyapunov stability method, a sufficient condition is given for ensuring lag secure consensus of multiagent system.

*Notations.* represents the dimensional Euclidean space, the diagonal matrix is represented by . refers to the Euclidean norm. represents a positive integer. denotes the identity matrix*.* The Kronecker product is denoted by . For two sets and , means excluding elements belonging to in .

#### 2. Problem Formulation

##### 2.1. Graph Theory

For a multiagent system consisting of followers, the directed graph represents the communication topology, where is the agent set, represents the edge set, and the adjacency matrix of is represented by . represents that can transmit information to . If , then , and otherwise. is a diagonal matrix, where indicates that the leader can transmit information to node , otherwise . The Laplace matrix in satisfies the following definition:

represents the directed graph of the MASs composed of followers and a leader. Clearly, is a subgraph of .

##### 2.2. System Model

Considering that the MASs in this paper consists of N followers and a leader, the dynamics of the leader agent is given aswhere and represent the position and velocity of the leader respectively, and is a nonlinear function.

The dynamics of the *i*th follower agent can be described aswhere , is the position of the *i*th agent, the velocity of the *i*th agent can be expressed by , and represents the control input of the *i*th agent. is a nonlinear function.

*Assumption 1. *There exist two nonnegative constants and , so that satisfies the following condition:

*Assumption 2. *Assume that the graph is directed and at least one directed spanning tree exists.

##### 2.3. DoS Attack Model

The DoS attack [16–19] refers to intentionally attacking network protocols or a large number of illegal users who directly exhaust the resources of the attacked object. In this paper, DOS attacks are assumed to occur nonperiodic based on time series, and their attack energy is limited. The end of an attack requires stopping to add energy. DoS attacks can attack targets in many ways and its attack strategy is unknown. DoS attacks can affect the control channel so that the agent loses control. Let represents the attack sequence initiated by the denial of service attack at . represents the *m*th DoS time interval, where is length. Obviously, . For the given , similar to [27], letdenote the time instants set of communication rejected. represent the sets of time for communication areas.

*Definition 1. *(secure leader-following lag consensus [8]). A control law can achieve the secure lag consensus for MASs (1) and (2) under DoS attacks if the following conditions are satisfied:For any initial condition and , .

*Definition 2. *(attack frequency [27]). For any , the total number of DoS attacks occurring over is denoted by . Thus, the attack frequency is defined as

*Definition 3. *(attack length rate [19]). For any , the total time interval of DoS attacks occurring over is denoted by . Thus, the attack length rate is defined as

#### 3. Main Result

##### 3.1. Event-Triggered Control Scheme Design

Let represent the event trigger times for agent *i*. An event-triggered control protocol under the DoS attacks was given as follows:Where the triggering instant of agent *j* is represented by , and , and represent the control gain and a time delay, respectively. When , it means that the leader can send information to agent *i*, otherwise . The last successful update is represented by the subscript , which is described in [27] as follows:

Let

The Event-trigger error is defined as

The Event-trigger function is defined as follows:

The Event-trigger instant sequence of agent *i* is expressed as

In order to ensure that the agent does not have Zeno behavior, we adopt the following approach proposed in [31] to determine the event time instant of agent *i*:where represents event interval time, , and is defined as follows:

##### 3.2. Lag Consensus Analysis

The consensus error is given by

Combining with (9) and (12), systems (1) and (2) can be rewritten as

Let

Rewriting (18) as follows:

It is noticed that

From , we have

Then, we can getwhere .

Theorem 1. *Suppose that Assumption 1 and 2 holds. Let and satisfy , and . Lag secure consensus for MASs can be achieved under the following conditions:*(1)*There is a constant that makes the attack frequency in Definition 2 satisfy the following inequality:*(2)*The attack length rate in Definition 3 satisfies the following inequality:*

*Proof. *Consider two time sequences and . The set of attempted updates under DoS attacks is defined as follows:The agent can recover to a controllable state after the DoS attack, and there must be a time interval , which satisfies . Obviously, after an attack stops, it takes more than to launch the next attack. The *m*th time interval is defined as follows:Two sub-intervals and form a time interval , that iswhere and .

Under the time interval , the Lyapunov function is as follows:where .

Taking the time derivatives of , we haveThe last term of equality (30) can be written asThe second term of equality (30) can be written asBy (22), we havCombining (31) and (33), we havewhereLet, , , we obtainWhen , we have .

Then , whereWe consider system (2) in , choose the following Lyapunov function:where .

We know that when system (2) under DoS attacks, the controller cannot work, that is, . Therefore, can be written asDifferentiating , we obtainSubstituting (39), we haveIt is defined that , . Through (41), we can have .

It is defined that , where . Through the Comparison lemma, we can obtainIf , one hasIf , one haswhere .

By Definition 2, we can obtainTherefore, for any , combining (43) and (44), we can obtainNoticing thatThen combining (47) and (48), we haveBy Definition 3, we haveCombining (24) and (25), the previous inequality can be rewritten aswhere .

Next, we will prove that the proposed control strategy can exclude the Zeno behavior. The Zeno behavior is that in the event trigger control, the control is triggered infinitely in a finite time. The interevent time of the agent is proposed in (15). Let represent the set of agents with the latest interevent time of and represent the set of agents with the latest interevent time of . Let , we haveFor the agent in , with . Considering the agent in , from (53), we have , where . For the agent in , can ensure (53). To prove that the interevent time is greater than , we haveBy (39), we haveCombining (20) and (55), we havewhere .

Therefore, determines the minimum time for to evolve from to . Obviously, for the agent in , can be guaranteed (53). It is concluded that the controller (9) based on event trigger (13) guarantees that (51) holds for all agents, which means . That is, systems (1) and (2) can achieve the desired objectives under DoS attacks.

#### 4. Numerical Simulation

This section verifies the correctness and effectiveness of the proposed theory and method by an example. We construct a nonlinear second-order system with four followers and one leader, where the communication topology is shown in Figure 1.

By calculation, we have.

The initial values of the leader’s position and velocity in system (1) are -7 and 1, respectively. The initial value of the follower is . The nonlinear function is .

Let , , , and . By calculation, we have , , , , and , so that we can get , , and . Figure 2 shows the sequence of DoS attacks. Figures 3 and 4 show the trajectory of the position and velocity of the five agents, respectively. We can see that there is a delay in the consistent state between the leader and the follower. Therefore, the leader and the follower achieve lag consensus under the DoS attack. Errors of leader-following lag consensus are shown in Figures 5 and 6. Obviously, the lag error between followers and leader finally tends to 0, indicating that the multiagent system achieves lag consensus. Figures 5 and 6 show that the control protocol designed in this paper can effectively defend against nonperiodic DoS attacks. Figure 7 shows the event trigger instants for four agents. Obviously, this article can effectively avoid the Zeno behavior by setting the minimum event trigger interval.

#### 5. Conclusion

This paper focuses on the time-delay phenomenon in the consensus state of the leader and followers and studies the lag secure consensus problem of MASs under the nonperiodic DoS attack.

In order to achieve the lag consensus between a leader and followers, this paper proposes a security control strategy based on event triggering and derives the upper bound of the frequency and length rate of DoS attacks. Without exceeding the upper bound, the MASs can achieve lagging security consensus. In future works, we will study the high-order multiagent system with communication delay and discuss the lag consensus of MASs under DoS attack.

#### Data Availability

The data are available from the corresponding author upon request.

#### Conflicts of Interest

The authors declare that they have no conflicts of interest.

#### Acknowledgments

This work was supported in part by Humanities and Social Sciences Research of Ministry of Education (19YJCZH047), in part by the West Light Foundation of the Chinese Academy of Science, in part by the Scientific and Technological Research Program of Chongqing Municipal Education Commission (KJZD-K201901504and KJQN201901537), in part by the Research Foundation of The Natural Foundation of Chongqing City (cstc2021jcyj-msxmX0146), and in part by the Science and Technology Planning Project of Luzhou City (2021-JYJ-92). The authors would like to thank the support of China Scholarship Council.