首页 | 官方网站   微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 0 毫秒
1.
2.
This study investigates the key elements an online service or product provider needs to consider when adopting another single-factor or two-factor authentication system. We also uncover the conditions that make the new one-factor or two-factor authentication system more preferable. By using the probability of system failure, this study generalizes all possible combination of authentication systems into four different cases. This generalization allows us to compare different systems and to determine the key factors managers need to consider when adopting a new authentication system. The key factors are (1) additional implementation costs, (2) customer switching which is determined by the market share and customers' preferences, and (3) expected losses when the new system fails. This study also suggests that if the provider chooses an expensive new system, the provider needs to have a larger market share to justify the spending. Also, regulators can encourage the adoption of a more secure authentication system by changing the penalty a firm faces when the system fails. Finally, it could also be preferable to have both one-factor and two-factor authentication systems depending on the customers' characteristics.  相似文献   

3.
This paper addresses multi agent system (MAS) environments from an application perspective. It presents a structured view on environment-centric MAS applications. This comprises three base configurations, which MAS applications may apply directly or combine into a composite configuration. For each configuration, the paper presents key issues, requirements and opportunities (e.g. time management issues, real-world augmentation opportunities and state snapshot requirements). Thus, the paper delineates what environment technology may implement to serve MAS applications. Sample applications illustrate the configurations. Next, electronic institutions provide an example of an environment technology, addressing norms and laws in an agent society, already achieving some maturity. In comparison, application-domain specific environment technologies still are in embryonic stages.  相似文献   

4.
Improvement of the RFID authentication scheme based on quadratic residues   总被引:1,自引:0,他引:1  
RFID, with its capability of remote automatic identification, is taking the place of barcodes and becoming the new generation of electronic tags. However, information transmitted through the air is vulnerable to eavesdropping, interception, or modification due to its radio transmission nature; the prevalence of RFID has greatly increased security and privacy concerns. In 2008, Chen et al. proposed an RFID authentication scheme which can enhance security and privacy by using hash functions and quadratic residues. However, their scheme was found to be vulnerable to impersonation attacks. This study further demonstrates that their scheme does not provide location privacy and suffers from replay attacks. An improved scheme is also proposed which can prevent possible attacks and be applied in environments requiring a high level of security.  相似文献   

5.
This paper studies the dynamic optimization problem for multi-agent systems in the presence of external disturbances. Different from the existing distributed optimization results, we formulate an optimization problem of continuous-time mufti-agent systems with time-varying disturbance generated by an exosystem. Based on internal model and Lyapunov-based method, a distributed design is proposed to achieve the optimization. Finally, design. an example is given to illustrate the proposed optimization design.  相似文献   

6.
Numerous smart card based authentication protocols have been proposed to provide strong system security and robust individual privacy for communication between parties these days. Nevertheless, most of them do not provide formal analysis proof, and the security robustness is doubtful. Chang and Cheng (2011) proposed an efficient remote authentication protocol with smart cards and claimed that their proposed protocol could support secure communication in a multi-server environment. Unfortunately, there are opportunities for security enhancement in current schemes. In this paper, we identify the major weakness, i.e., session key disclosure, of a recently published protocol. We consequently propose a novel authentication scheme for a multi-server envi- ronment and give formal analysis proofs for security guarantees.  相似文献   

7.
We consider game-theoretic principles for design of cooperative and competitive (non-cooperative self-interested) multi-agent systems. Using economic concepts of tâtonnement and economic core, we show that cooperative multi-agent systems should be designed in games with dominant strategies that may lead to social dilemmas. Non-cooperative multi-agent systems, on the other hand, should be designed for games with no clear dominant strategies and high degree of problem complexity. Further, for non-cooperative multi-agent systems, the number of learning agents should be carefully managed so that solutions in the economic core can be obtained. We provide experimental results for the design of cooperative and non-cooperative MAS from telecommunication and manufacturing industries.  相似文献   

8.
This paper studies the consensus problems for a group of agents with switching topology and time-varying communication delays, where the dynamics of agents is modeled as a high-order integrator. A linear distributed consensus protocol is proposed, which only depends on the agent’s own information and its neighbors’ partial information. By introducing a decomposition of the state vector and performing a state space transformation, the closed-loop dynamics of the multi-agent system is converted into two decoupled subsystems. Based on the decoupled subsystems, some sufficient conditions for the convergence to consensus are established, which provide the upper bounds on the admissible communication delays. Also, the explicit expression of the consensus state is derived. Moreover, the results on the consensus seeking of the group of high-order agents have been extended to a network of agents with dynamics modeled as a completely controllable linear time-invariant system. It is proved that the convergence to consensus of this network is equivalent to that of the group of high-order agents. Finally, some numerical examples are given to demonstrate the effectiveness of the main results.  相似文献   

9.
This paper is concerned with the event-triggered containment control for stochastic multi-agent systems subject to packet dropouts. The adopted event-triggered protocol is with absolutely triggered conditions catering for the requirement of real-time to an extreme. In light of such a protocol, a novel definition of containment control in mean-square sense, named as χ-containment, is proposed to better describe the tracking dynamics of followers. Based on relative measurement outputs, the purpose of this paper is to design an output-feedback controller such that all followers converge into the convex hull spanned by leaders. First, with the help of the property of the Laplacian matrix, the containment control problem is transformed to an easily setting step by step. Then, sufficient conditions with the form of matrix inequalities are derived to guarantee the desired χ-containment which depends on the initial values and the event-triggered thresholds. By introducing a free matrix combined with an orthogonal basis of the null space of control matrix, the controller gain can be obtained by solving a set of linear matrix inequalities. Finally, a simulation example is given to verify the effectiveness of the designed control protocol.  相似文献   

10.
This paper considers the containment control problem for second-order multi-agent systems with time-varying delays. Both the containment control problem with multiple stationary leaders and the problem with multiple dynamic leaders are investigated. Sufficient conditions on the communication digraph, the feedback gains, and the allowed upper bound of the delays to ensure containment control are given. In the case that the leaders are stationary, the Lyapunov–Razumikhin function method is used. In the case that the leaders are dynamic, the Lyapunov–Krasovskii functional method and the linear matrix inequality (LMI) method are jointly used. A novel discretized Lyapunov functional method is introduced to utilize the upper bound of the derivative of the delays no matter how large it is, which leads to a better result on the allowed upper bound of the delays to ensure containment control. Finally, numerical simulations are provided to illustrate the effectiveness of the obtained theoretical results.  相似文献   

11.
In this paper, we consider the global consensus problem for discrete-time multi-agent systems with input saturation constraints under fixed undirected topologies. We first give necessary conditions for achieving global consensus via a distributed protocol based on relative state measurements of the agent itself and its neighboring agents. We then focus on two special cases, where the agent model is either neutrally stable or a double integrator. For the neutrally stable case, any linear protocol of a particular form, which solves the consensus problem for the case without input saturation constraints, also solves the global consensus problem for the case with input saturation constraints. For the double integrator case, we show that a subset of linear protocols, which solve the consensus problem for the case without saturation constraints, also solve the global consensus problem for the case with input saturation constraints. The results are illustrated by numerical simulations.  相似文献   

12.
13.
Finite-time formation control for multi-agent systems   总被引:5,自引:0,他引:5  
Feng  Long  Jie  Yanping   《Automatica》2009,45(11):2605-2611
In this paper, we develop a new finite-time formation control framework for multi-agent systems with a large population of members. In this framework, we divide the formation information into two independent parts, namely, the global information and the local information. The global formation information decides the geometric pattern of the desired formation. Furthermore, it is assumed that only a small number of agents, which are responsible for the navigation of the whole team, can obtain the global formation information, and the other agents regulate their positions by the local information in a distributed manner. This approach can greatly reduce the data exchange and can easily realize various kinds of complex formations. As a theoretical preparation, we first propose a class of nonlinear consensus protocols, which ensures that the related states of all agents will reach an agreement in a finite time under suitable conditions. And then we apply these consensus protocols to the formation control, including time-invariant formation, time-varying formation and trajectory tracking, respectively. It is shown that all agents will maintain the expected formation in a finite time. Finally, several simulations are worked out to illustrate the effectiveness of our theoretical results.  相似文献   

14.
This paper addresses consensus problems for discrete-time multi-agent systems with time-varying delays and switching interaction topologies and provides a class of effective consensus protocols that are built on repeatedly using the same state information at two time-steps. We show that those protocols can solve consensus problems under milder conditions than the popular consensus algorithm proposed by Jadbabaie et al., specifically, the presented protocols allow for the case that agents can only use delayed information of themselves, whereas the popular one is invalid. It is proved that if the union of the interaction topologies across the time interval with some given length always has a spanning tree, then in the presence of bounded time-varying delays, those protocols solve consensus problems.  相似文献   

15.
Real environments in which agents operate are inherently dynamic—the environment changes beyond the agents’ control. We advocate that, for multi-agent simulation, this dynamism must be modeled explicitly as part of the simulated environment, preferably using concepts and constructs that relate to the real world. In this paper, we describe such concepts and constructs, and we provide a formal framework to unambiguously specify their relations and meaning. We apply the formal framework to model a dynamic RoboCup Soccer environment and elaborate on how the framework poses new challenges for exploring the modeling of environments in multi-agent simulation.  相似文献   

16.
《Automatica》2013,49(7):2154-2159
This paper proposes a sweep coverage formulation for a multi-agent system to cover a region with uncertain workload density, and provides a decentralized coverage algorithm based on the formulation. To achieve the coverage, the covered region is divided into a finite number of stripes, and an algorithm is proposed by incorporating two operations on stripes: workload partition and sweeping. Theoretical analysis is given to estimate the error between the actual coverage time and the optimal time, and numerical analysis is provided to illustrate the proposed algorithm.  相似文献   

17.
This paper considers the distributed adaptive consensus problem for linear multi-agent systems with quantised relative information. By using a lemma in algebraic graph theory and introducing a projection operator in adaptive law, a novel distributed adaptive state feedback controller is designed with quantised relative state information. It is shown that the practical consensus for multi-agent systems with a uniform quantiser is achieved via the Lyapunov theory and the non-smooth analysis. In contrast with the existing quantised controllers, which rely on the minimum nonzero eigenvalue of the Laplacian matrix, the developed controller is only dependent on the number of nodes. Furthermore, a dynamic output feedback controller based on quantised relative output information is proposed. Finally, a simulation example is given to illustrate the effectiveness of the proposed control scheme.  相似文献   

18.
Many aspect mining techniques have been proposed for object-oriented systems. Unfortunately, aspect mining for multi-agent systems is an unexplored research area. The inherent specificities of multi-agent systems (such as autonomy, pro-activity, reactivity, and adaptability) make it difficult to understand, reuse and maintain their code. We propose, in this paper, a (semi-automatic) hybrid aspect mining approach for agent-oriented code. The technique is based on both static and dynamic analyzes. The main motivations of this work are (1) identifying cross-cutting concerns in existing agent-oriented code, and (2) making them explicitly available to software engineers involved in the evolution of agent-oriented code in order to facilitate its refactoring and, consequently, to improve its understandability, reusability and maintainability. The proposed approach is supported by a software tool, called MAMIT (MAS Aspect-MIning Tool), that we developed. The approach and the associated tool are illustrated using a concrete case study.  相似文献   

19.
In this paper, we study the problem of robust consensus tracking for a class of second-order multi-agent dynamic systems with disturbances and unmodeled agent dynamics. Contrary to previous approaches, we design continuous distributed consensus protocols to enable global asymptotic consensus tracking. Our focus is on consensus protocol design and stability analysis which also leads to the derivation of sufficient conditions for consensus tracking. We first consider the case of undirected information exchange with a symmetric and positive definite information-exchange matrix. We develop an identifier for each agent to estimate the unknown disturbances and unmodeled agent dynamics. Based on the identifier, we develop a consensus tracking protocol to enable global asymptotic consensus tracking using local information obtained from neighboring agents. The closed-loop stability is proven using Lyapunov analysis theory and an invariance-like theorem. We then extend the approach to the case of directed information exchange, whose information-exchange matrix is only of full rank so that the approach for undirected graphs cannot be directly applied. We show that global asymptotic consensus tracking can still be enabled under the new derived sufficient conditions by designing a new identifier, which utilizes the estimated information exchanged from neighboring agents, and constructing a new Lyapunov function. Examples and numerical simulations are provided to validate the effectiveness of the proposed robust consensus tracking method.  相似文献   

20.
分布式优化作为分布式协调控制领域中的一个基本而重要的研究课题,近年来,不同领域的众多学者对其产生了广泛的研究兴趣.本文总结归纳了分布式优化的研究现状和近期的研究成果,重点对离线分布式优化和在线分布式优化进行了阐述,并从算法设计和收敛性分析这两个角度进行了剖析.特别地,针对一类混合均衡问题,本文介绍了一类分布式求解算法.最后,阐述了当前尚未解决的问题和未来的研究方向.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司    京ICP备09084417号-23

京公网安备 11010802026262号