Abstract:We address the problem of distributed state estimation of a linear dynamical process in an attack-prone environment. Recent attempts to solve this problem impose stringent redundancy requirements on the measurement and communication resources of the network. In this paper, we take a step towards alleviating such strict requirements by exploring two complementary directions: (i) making a small subset of the nodes immune to attacks, or "trusted", and (ii) incorporating diversity into the network. We define graph… Show more
“…Theorem 2. Under the F -total malicious model, the normal agents with E-MSR using (23) and (5) reach resilient consensus if and only if the underlying graph is (F + 1, F + 1)robust. The safety interval is given by S = x(0),x(0) , and the consensus error level c is achieved if the parameter c 0 in the triggering function (3) satisfies…”
Section: Protocolmentioning
confidence: 99%
“…The initial values x i (0) of the nodes and the (constant) weights a ij (k) on the edges are indicated in the figure. Since the weights are all 1/2 (and thus γ = 1/2), for nodes having two neighbors, their own values are not used in the update rule (23). Moreover, for the node in the far left, a self-loop is shown to indicate that this node uses its own value.…”
Section: Protocolmentioning
confidence: 99%
“…In [31], a resilient version of distributed optimization is studied by employing MSR-like mechanisms to detect outliers in the neighbors' variables. Further, in [23], resilient distributed state estimation problem is studied, where another class of robust graphs relevant to the problem is introduced. In the robotics area, [6] applies MSR algorithms for cooperative robots and develops methods for the robots to find if and how the network for their interactions can be built with robust graph properties.…”
We consider resilient versions of discrete-time multiagent consensus in the presence of faulty or even malicious agents in the network. In particular, we develop event-triggered update rules which can mitigate the influence of the malicious agents and at the same time reduce the communication. Each regular agent updates its state based on a given rule using its neighbors' information. Only when the triggering condition is satisfied, the regular agents send their current states to their neighbors. Otherwise, the neighbors will continue to use the state received the last time. Assuming that a bound on the number of malicious nodes is known, we propose two update rules with event-triggered communication. They follow the socalled mean subsequence reduced (MSR) type algorithms and ignore values received from potentially malicious neighbors. We characterize the necessary connectivity in the network for the algorithms to perform correctly, which are stated in terms of the notion of graph robustness. A numerical example is provided to demonstrate the effectiveness of the proposed approach.
“…Theorem 2. Under the F -total malicious model, the normal agents with E-MSR using (23) and (5) reach resilient consensus if and only if the underlying graph is (F + 1, F + 1)robust. The safety interval is given by S = x(0),x(0) , and the consensus error level c is achieved if the parameter c 0 in the triggering function (3) satisfies…”
Section: Protocolmentioning
confidence: 99%
“…The initial values x i (0) of the nodes and the (constant) weights a ij (k) on the edges are indicated in the figure. Since the weights are all 1/2 (and thus γ = 1/2), for nodes having two neighbors, their own values are not used in the update rule (23). Moreover, for the node in the far left, a self-loop is shown to indicate that this node uses its own value.…”
Section: Protocolmentioning
confidence: 99%
“…In [31], a resilient version of distributed optimization is studied by employing MSR-like mechanisms to detect outliers in the neighbors' variables. Further, in [23], resilient distributed state estimation problem is studied, where another class of robust graphs relevant to the problem is introduced. In the robotics area, [6] applies MSR algorithms for cooperative robots and develops methods for the robots to find if and how the network for their interactions can be built with robust graph properties.…”
We consider resilient versions of discrete-time multiagent consensus in the presence of faulty or even malicious agents in the network. In particular, we develop event-triggered update rules which can mitigate the influence of the malicious agents and at the same time reduce the communication. Each regular agent updates its state based on a given rule using its neighbors' information. Only when the triggering condition is satisfied, the regular agents send their current states to their neighbors. Otherwise, the neighbors will continue to use the state received the last time. Assuming that a bound on the number of malicious nodes is known, we propose two update rules with event-triggered communication. They follow the socalled mean subsequence reduced (MSR) type algorithms and ignore values received from potentially malicious neighbors. We characterize the necessary connectivity in the network for the algorithms to perform correctly, which are stated in terms of the notion of graph robustness. A numerical example is provided to demonstrate the effectiveness of the proposed approach.
“…However, this algorithm works under the assumption that an agent can fully observe the true state in the non-faulty condition [25, Section II.A], as opposed to our model which deals with both observability and noisy measurement issues. Mitra and Sundaram [26] consider the more general LTI systems and characterize the fundamental limits on adversary-resilient algorithms. However, unlike our work, [26] deals with noiseless observations and the focus is on asymptotic analysis.…”
This work considers resilient, cooperative state estimation in unreliable multi-agent networks. A network of agents aims to collaboratively estimate the value of an unknown vector parameter, while an unknown subset of agents suffer Byzantine faults. Faulty agents malfunction arbitrarily and may send out highly unstructured messages to other agents in the network. As opposed to fault-free networks, reaching agreement in the presence of Byzantine faults is far from trivial. In this paper, we propose a computationally-efficient algorithm that is provably robust to Byzantine faults. At each iteration of the algorithm, a good agent (1) performs a gradient descent update based on noisy local measurements, (2) exchanges its update with other agents in its neighborhood, and (3) robustly aggregates the received messages using coordinate-wise trimmed means. Under mild technical assumptions, we establish that good agents learn the true parameter asymptotically in almost sure sense. We further complement our analysis by proving (high probability) finite-time convergence rate, encapsulating network characteristics.
“…results that draw upon these papers include state estimation [18][19][20][21], rendezvous of mobile agents [22,23], output synchronization [11], simultaneous arrival of interceptors [17], distributed optimization [29,31], reliable broadcast [33,43], clock synchronization [8], randomized quantized consensus [5], self-triggered coordination [26], and multi-hop communication [30].…”
There has been an increase in the use of resilient control algorithms based on the graph theoretic properties of r-and (r, s)robustness. These algorithms guarantee consensus of normally behaving agents in the presence of a bounded number of arbitrarily misbehaving agents if the values of the integers r and s are sufficiently large. However, determining an arbitrary graph's robustness is a highly nontrivial problem. This paper introduces a novel method for determining the r-and (r, s)robustness of digraphs using mixed integer linear programming; to the best of the authors' knowledge it is the first time that mixed integer programming methods have been applied to the robustness determination problem. The approach only requires knowledge of the graph Laplacian matrix, and can be formulated with binary integer variables. Mixed integer programming algorithms such as branch-and-bound are used to iteratively tighten the lower and upper bounds on r and s. Simulations are presented which compare the performance of this approach to prior robustness determination algorithms.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.