-
Algebraic Connectivity Control and Maintenance in Multi-Agent Networks under Attack
Authors:
Wenjie Zhao,
Diego Deplano,
Zhiwu Li,
Alessandro Giua,
Mauro Franceschelli
Abstract:
This paper studies the problem of increasing the connectivity of an ad-hoc peer-to-peer network subject to cyber-attacks targeting the agents in the network. The adopted strategy involves the design of local interaction rules for the agents to locally modify the graph topology by adding and removing links with neighbors. Two distributed protocols are presented to boost the algebraic connectivity o…
▽ More
This paper studies the problem of increasing the connectivity of an ad-hoc peer-to-peer network subject to cyber-attacks targeting the agents in the network. The adopted strategy involves the design of local interaction rules for the agents to locally modify the graph topology by adding and removing links with neighbors. Two distributed protocols are presented to boost the algebraic connectivity of the network graph beyond $k-2\sqrt{k-1}$ where $k\in \mathbb{N}$ is a free design parameter; these two protocols are achieved through the distributed construction of random (approximate) regular graphs. One protocol leverages coordinated actions between pairs of neighboring agents and is mathematically proven to converge to the desired graph topology. The other protocol relies solely on the uncoordinated actions of individual agents and it is validated by a spectral analysis through Monte-Carlo simulations. Numerical simulations offer a comparative analysis with other state-of-the-art algorithms, showing the ability of both proposed protocols to maintain high levels of connectivity despite attacks carried out with full knowledge of the network structure, and highlighting their superior performance.
△ Less
Submitted 26 June, 2024;
originally announced June 2024.
-
Novel Stability Conditions for Nonlinear Monotone Systems and Consensus in Multi-Agent Networks
Authors:
Diego Deplano,
Mauro Franceschelli,
Alessandro Giua
Abstract:
In this work, we characterize a class of nonlinear monotone dynamical systems that have a certain translation invariance property which goes by the name of plus-homogeneity; usually called "topical" systems. Such systems need not be asymptotically stable, since they are merely nonexpansive but not contractive. Thus, we introduce a stricter version of monotonicity, termed "type-K" in honor of Kamke…
▽ More
In this work, we characterize a class of nonlinear monotone dynamical systems that have a certain translation invariance property which goes by the name of plus-homogeneity; usually called "topical" systems. Such systems need not be asymptotically stable, since they are merely nonexpansive but not contractive. Thus, we introduce a stricter version of monotonicity, termed "type-K" in honor of Kamke, and we prove the asymptotic stability of the equilibrium points, as well as the convergence of all trajectories to such equilibria for type-K monotone and plus-homogeneous systems: we call them "K-topical". Since topical maps are the natural nonlinear counterpart of linear maps defined by row-stochastic matrices, which are a cornerstone in the convergence analysis of linear multi-agent systems (MASs), we exploit our results for solving the consensus problem over nonlinear K-topical MASs. We first provide necessary and sufficient conditions on the local interaction rules of the agents ensuring the K-topicality of a MAS. Then, we prove that the agents achieve consensus asymptotically if the graph describing their interactions contains a globally reachable node. Finally, several examples for continuous-time and discrete-time systems are discussed to corroborate the enforceability of our results in different applications.
△ Less
Submitted 12 January, 2023;
originally announced January 2023.
-
You Don't Know What I Know: On Notion of High-Order Opacity in Discrete-Event Systems
Authors:
Bohan Cui,
Xiang Yin,
Shaoyuan Li,
Alessandro Giua
Abstract:
In this paper, we investigate a class of information-flow security properties called opacity in partial-observed discrete-event systems. Roughly speaking, a system is said to be opaque if the intruder, which is modeled by a passive observer, can never determine the "secret" of the system for sure. Most of the existing notions of opacity consider secrets related to the actual behaviors of the syste…
▽ More
In this paper, we investigate a class of information-flow security properties called opacity in partial-observed discrete-event systems. Roughly speaking, a system is said to be opaque if the intruder, which is modeled by a passive observer, can never determine the "secret" of the system for sure. Most of the existing notions of opacity consider secrets related to the actual behaviors of the system. In this paper, we consider a new type of secret related to the knowledge of the system user. Specifically, we assume that the system user also only has partial observation of the system and has to reason the actual behavior of the system. We say a system is high-order opaque if the intruder can never determine that the system user knows some information of importance based on its own incomparable information. We provide the formal definition of high-order opacity. Two algorithms are provided for the verification of this new notion: one with doubly-exponential complexity for the worst case and the other with single-exponential complexity. Illustrative examples are provided for the new notion of high-order opacity.
△ Less
Submitted 31 March, 2022;
originally announced March 2022.
-
Non-Blockingness Verification of Bounded Petri Nets Using Basis Reachability Graphs -- An Extended Version With Benchmarks
Authors:
Chao Gu,
Ziyue Ma,
Zhiwu Li,
Alessandro Giua
Abstract:
In this paper, we study the problem of non-blockingness verification by tap** into the basis reachability graph (BRG). Non-blockingness is a property that ensures that all pre-specified tasks can be completed, which is a mandatory requirement during the system design stage. In this paper we develop a condition of transition partition of a given net such that the corresponding conflict-increase B…
▽ More
In this paper, we study the problem of non-blockingness verification by tap** into the basis reachability graph (BRG). Non-blockingness is a property that ensures that all pre-specified tasks can be completed, which is a mandatory requirement during the system design stage. In this paper we develop a condition of transition partition of a given net such that the corresponding conflict-increase BRG contains sufficient information on verifying non-blockingness of its corresponding Petri net. Thanks to the compactness of the BRG, our approach possesses practical efficiency since the exhaustive enumeration of the state space can be avoided. In particular, our method does not require that the net is deadlock-free.
△ Less
Submitted 11 June, 2021; v1 submitted 3 March, 2021;
originally announced March 2021.
-
Dynamic Max-Consensus and Size Estimation of Anonymous Multi-Agent Networks
Authors:
Diego Deplano,
Mauro Franceschelli,
Alessandro Giua
Abstract:
In this paper we propose a novel consensus protocol for discrete-time multi-agent systems (MAS), which solves the dynamic consensus problem on the max value, i.e., the dynamic max-consensus problem. In the dynamic max-consensus problem to each agent is fed a an exogenous reference signal, the objective of each agent is to estimate the instantaneous and time-varying value of the maximum among the s…
▽ More
In this paper we propose a novel consensus protocol for discrete-time multi-agent systems (MAS), which solves the dynamic consensus problem on the max value, i.e., the dynamic max-consensus problem. In the dynamic max-consensus problem to each agent is fed a an exogenous reference signal, the objective of each agent is to estimate the instantaneous and time-varying value of the maximum among the signals fed to the network, by exploiting only local and anonymous interactions among the agents. The absolute and relative tracking error of the proposed distributed control protocol is theoretically characterized and is shown to be bounded and by tuning its parameters it is possible to trade-off convergence time for steady-state error. The dynamic Max-consensus algorithm is then applied to solve the distributed size estimation problem in a dynamic setting where the size of the network is time-varying during the execution of the estimation algorithm. Numerical simulations are provided to corroborate the theoretical analysis.
△ Less
Submitted 8 September, 2020;
originally announced September 2020.
-
A framework for the analysis of supervised discrete event systems under attack
Authors:
Qi Zhang,
Carla Seatzu,
Zhiwu Li,
Alessandro Giua
Abstract:
This paper focuses on the problem of cyber attacks for discrete event systems under supervisory control. In more detail, the goal of the supervisor, who has a partial observation of the system evolution, is that of preventing the system from reaching a set of unsafe states. An attacker may act in two different ways: he can corrupt the observation of the supervisor editing the sensor readings, and…
▽ More
This paper focuses on the problem of cyber attacks for discrete event systems under supervisory control. In more detail, the goal of the supervisor, who has a partial observation of the system evolution, is that of preventing the system from reaching a set of unsafe states. An attacker may act in two different ways: he can corrupt the observation of the supervisor editing the sensor readings, and can enable events that are disabled by the supervisor. This is done with the aim of leading the plant to an unsafe state, and kee** the supervisor unaware of that before the unsafe state is reached. A special automaton, called attack structure is constructed as the parallel composition of two special structures. Such an automaton can be used by the attacker to select appropriate actions (if any) to reach the above goal, or equivalently by the supervisor, to validate its robustness with respect to such attacks.
△ Less
Submitted 1 May, 2020;
originally announced May 2020.
-
Verification of Nonblockingness in Bounded Petri Nets With Minimax Basis Reachability Graphs
Authors:
Chao Gu,
Ziyue Ma,
Zhiwu Li,
Alessandro Giua
Abstract:
This paper proposes a semi-structural approach to verify the nonblockingness of a Petri net. We construct a structure, called minimax basis reachability graph (minimax-BRG): it provides an abstract description of the reachability set of a net while preserving all information needed to test if the net is blocking. We prove that a bounded deadlock-free Petri net is nonblocking if and only if its min…
▽ More
This paper proposes a semi-structural approach to verify the nonblockingness of a Petri net. We construct a structure, called minimax basis reachability graph (minimax-BRG): it provides an abstract description of the reachability set of a net while preserving all information needed to test if the net is blocking. We prove that a bounded deadlock-free Petri net is nonblocking if and only if its minimax-BRG is unobstructed, which can be verified by solving a set of integer constraints and then examining the minimax-BRG. For Petri nets that are not deadlock-free, one needs to determine the set of deadlock markings. This can be done with an approach based on the computation of maximal implicit firing sequences enabled by the markings in the minimax-BRG. The approach we developed does not require the construction of the reachability graph and has wide applicability.
△ Less
Submitted 8 June, 2021; v1 submitted 31 March, 2020;
originally announced March 2020.
-
Revisiting delayed strong detectability of discrete-event systems
Authors:
Kuize Zhang,
Alessandro Giua
Abstract:
Among notions of detectability for a discrete-event system (DES), strong detectability implies that after a finite number of observations to every output/label sequence generated by the DES, the current state can be uniquely determined. This notion is strong so that by using it the current state can be easily determined. In order to keep the advantage of strong detectability and weaken its disadva…
▽ More
Among notions of detectability for a discrete-event system (DES), strong detectability implies that after a finite number of observations to every output/label sequence generated by the DES, the current state can be uniquely determined. This notion is strong so that by using it the current state can be easily determined. In order to keep the advantage of strong detectability and weaken its disadvantage, we can additionally take some "subsequent outputs" into account in order to determine the current state. Such a modified observation will make some DES that is not strongly detectable become "strongly detectable in a weaker sense", which we call "{\it $K$-delayed strong detectability}" if we observe at least $K$ outputs after the time at which the state need to be determined. In this paper, we study $K$-delayed strong detectability for DESs modeled by finite-state automata (FSAs), and give a polynomial-time verification algorithm by using a novel concurrent-composition method. Note that the algorithm applies to all FSAs. Also by the method, an upper bound for $K$ has been found, and we also obtain polynomial-time verification algorithms for $(k_1,k_2)$-detectability and $(k_1,k_2)$-D-detectability of FSAs firstly studied by [Shu and Lin, 2013]. Our algorithms run in quartic polynomial time and apply to all FSAs, are more effective than the sextic polynomial-time verification algorithms given by [Shu and Lin 2013] based on the usual assumptions of deadlock-freeness and having no unobservable reachable cycle. Finally, we obtain polynomial-time synthesis algorithms for enforcing delayed strong detectability, which are more effective than the exponential-time synthesis algorithms in the supervisory control framework in the literature.
△ Less
Submitted 30 October, 2019;
originally announced October 2019.
-
A Nonlinear Perron-Frobenius Approach for Stability and Consensus of Discrete-Time Multi-Agent Systems
Authors:
Diego Deplano,
Mauro Franceschelli,
Alessandro Giua
Abstract:
In this paper we propose a novel method to establish stability and, in addition, convergence to a consensus state for a class of discrete-time Multi-Agent System (MAS) evolving according to nonlinear heterogeneous local interaction rules which is not based on Lyapunov function arguments. In particular, we focus on a class of discrete-time MASs whose global dynamics can be represented by sub-homoge…
▽ More
In this paper we propose a novel method to establish stability and, in addition, convergence to a consensus state for a class of discrete-time Multi-Agent System (MAS) evolving according to nonlinear heterogeneous local interaction rules which is not based on Lyapunov function arguments. In particular, we focus on a class of discrete-time MASs whose global dynamics can be represented by sub-homogeneous and order-preserving nonlinear maps. This paper directly generalizes results for sub-homogeneous and order-preserving linear maps which are shown to be the counterpart to stochastic matrices thanks to nonlinear Perron-Frobenius theory. We provide sufficient conditions on the structure of local interaction rules among agents to establish convergence to a fixed point and study the consensus problem in this generalized framework as a particular case. Examples to show the effectiveness of the method are provided to corroborate the theoretical analysis.
△ Less
Submitted 24 July, 2019;
originally announced July 2019.
-
Joint State Estimation Under Attack of Discrete Event Systems
Authors:
Qi Zhang,
Carla Seatzu,
Zhiwu Li,
Alessandro Giua
Abstract:
The problem of state estimation in the setting of partially-observed discrete event systems subject to cyber attacks is considered. An operator observes a plant through a natural projection that hides the occurrence of certain events. The objective of the operator is that of estimating the current state of the system. The observation is corrupted by an attacker which can tamper with the readings o…
▽ More
The problem of state estimation in the setting of partially-observed discrete event systems subject to cyber attacks is considered. An operator observes a plant through a natural projection that hides the occurrence of certain events. The objective of the operator is that of estimating the current state of the system. The observation is corrupted by an attacker which can tamper with the readings of a set of sensors thus inserting some fake events or erasing some observations. The aim of the attacker is that of altering the state estimation of the operator. An automaton, called joint estimator, is defined to describe the set of all possible attacks. In more details, an unbounded joint estimator is obtained by concurrent composition of two state observers, the attacker observer and the operator observer. The joint estimator shows, for each possible corrupted observation, the joint state estimation, i.e., the set of states consistent with the uncorrupted observation and the set of states consistent with the corrupted observation. Such a structure can be used to establish if an attack function is harmful w.r.t. a misleading relation. Our approach is also extended to the case in which the attacker may insert at most n events between two consecutive observations.
△ Less
Submitted 14 December, 2021; v1 submitted 12 June, 2019;
originally announced June 2019.
-
On detectability of labeled Petri nets and finite automata
Authors:
Kuize Zhang,
Alessandro Giua
Abstract:
We study detectability properties for labeled Petri nets and finite automata. We first study weak approximate detectability (WAD) that implies that there exists an infinite observed output sequence of the system such that each prefix of the output sequence with length greater than a given value allows an observer to determine if the current state belongs to a given set. We also consider two new co…
▽ More
We study detectability properties for labeled Petri nets and finite automata. We first study weak approximate detectability (WAD) that implies that there exists an infinite observed output sequence of the system such that each prefix of the output sequence with length greater than a given value allows an observer to determine if the current state belongs to a given set. We also consider two new concepts called instant strong detectability (ISD) and eventual strong detectability (ESD). The former property implies that for each possible infinite observed output sequence each prefix of the output sequence allows reconstructing the current state. The latter implies that for each possible infinite observed output sequence, there exists a value such that each prefix of the output sequence with length greater than that value allows reconstructing the current state.
Results: WAD: undecidable for labeled Petri nets, PSPACE-complete for finite automata ISD: decidable and EXPSPACE-hard for labeled Petri nets, belongs to P for finite automata ESD: decidable under promptness assumption and EXPSPACE-hard for labeled Petri nets, belongs to P for finite automata SD: belongs to P for finite automata, strengthens Shu and Lin's 2011 results based on two assumptions of deadlock-freeness and promptness ISD<SD<ESD<WD<WAD for both labeled Petri nets and finite automata
△ Less
Submitted 30 June, 2019; v1 submitted 21 February, 2018;
originally announced February 2018.
-
Testing experiments on synchronized Petri nets
Authors:
M. Pocci,
I. Demongodin,
N. Giambiasi,
A. Giua
Abstract:
Synchronizing sequences have been proposed in the late 60's to solve testing problems on systems modeled by finite state machines. Such sequences lead a system, seen as a black box, from an unknown current state to a known final one. This paper presents a first investigation of the computation of synchronizing sequences for systems modeled by bounded synchronized Petri nets. In the first part of t…
▽ More
Synchronizing sequences have been proposed in the late 60's to solve testing problems on systems modeled by finite state machines. Such sequences lead a system, seen as a black box, from an unknown current state to a known final one. This paper presents a first investigation of the computation of synchronizing sequences for systems modeled by bounded synchronized Petri nets. In the first part of the paper, existing techniques for automata are adapted to this new setting. Later on, new approaches, that exploit the net structure to efficiently compute synchronizing sequences without an exhaustive enumeration of the state space, are presented.
△ Less
Submitted 9 July, 2013;
originally announced July 2013.
-
Decentralized Estimation of Laplacian Eigenvalues in Multi-Agent Systems
Authors:
Mauro Franceschelli,
Andrea Gasparri,
Alessandro Giua,
Carla Seatzu
Abstract:
In this paper we present a decentralized algorithm to estimate the eigenvalues of the Laplacian matrix that encodes the network topology of a multi-agent system. We consider network topologies modeled by undirected graphs. The basic idea is to provide a local interaction rule among agents so that their state trajectory is a linear combination of sinusoids oscillating only at frequencies function o…
▽ More
In this paper we present a decentralized algorithm to estimate the eigenvalues of the Laplacian matrix that encodes the network topology of a multi-agent system. We consider network topologies modeled by undirected graphs. The basic idea is to provide a local interaction rule among agents so that their state trajectory is a linear combination of sinusoids oscillating only at frequencies function of the eigenvalues of the Laplacian matrix. In this way, the problem of decentralized estimation of the eigenvalues is mapped into a standard signal processing problem in which the unknowns are the finite number of frequencies at which the signal oscillates.
△ Less
Submitted 20 June, 2012;
originally announced June 2012.