-
Resilient Average Consensus with Adversaries via Distributed Detection and Recovery
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consen…
▽ More
We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consensus algorithm for the multi-agent networks with general directed topologies. The proposed algorithm has two parts at each iteration: detection and averaging. For the detection part, we propose two distributed algorithms and one of them can detect malicious agents with only the information from direct in-neighbors. For the averaging part, we extend the applicability of an existing averaging algorithm where normal agents can remove the effects from malicious agents so far, after they are detected. Another important feature of our method is that it can handle the case where malicious agents are neighboring and collaborating with each other to mislead the normal ones from averaging. This case cannot be solved by existing detection approaches in related literature. Moreover, our algorithm is efficient in storage usage especially for large-scale networks as each agent only requires the values of neighbors within two hops. Lastly, numerical examples are given to verify the efficacy of the proposed algorithms.
△ Less
Submitted 29 May, 2024;
originally announced May 2024.
-
Secure Synchronization of Heterogeneous Pulse-Coupled Oscillators
Authors:
Jiaqi Yan,
Hideaki Ishii
Abstract:
In this paper, we consider the synchronization of heterogeneous pulse-coupled oscillators (PCOs), where some of the oscillators might be faulty or malicious. The oscillators interact through identical pulses at discrete instants and evolve continuously with different frequencies otherwise. Despite the presence of misbehaviors, benign oscillators aim to reach synchronization. To achieve this object…
▽ More
In this paper, we consider the synchronization of heterogeneous pulse-coupled oscillators (PCOs), where some of the oscillators might be faulty or malicious. The oscillators interact through identical pulses at discrete instants and evolve continuously with different frequencies otherwise. Despite the presence of misbehaviors, benign oscillators aim to reach synchronization. To achieve this objective, two resilient synchronization protocols are developed in this paper by adapting the real-valued mean-subsequence reduced (MSR) algorithm to pulse-based interactions. The first protocol relies on packet-based communication to transmit absolute frequencies, while the second protocol operates purely with pulses to calculate relative frequencies. In both protocols, each normal oscillator periodically counts the received pulses to detect possible malicious behaviors. By disregarding suspicious pulses from its neighbors, the oscillator updates both its phases and frequencies. The paper establishes sufficient conditions on the initial states and graph structure under which resilient synchronization is achieved in the PCO network. Specifically, the normal oscillators can either detect the presence of malicious nodes or synchronize in both phases and frequencies. Additionally, a comparison between the two algorithms reveals a trade-off between relaxed initial conditions and reduced communication burden.
△ Less
Submitted 20 March, 2024; v1 submitted 18 March, 2024;
originally announced March 2024.
-
Asynchronous Approximate Byzantine Consensus: A Multi-hop Relay Method and Tight Graph Conditions
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
We study a multi-agent resilient consensus problem, where some agents are of the Byzantine type and try to prevent the normal ones from reaching consensus. In our setting, normal agents communicate with each other asynchronously over multi-hop relay channels with delays. To solve this asynchronous Byzantine consensus problem, we develop the multi-hop weighted mean subsequence reduced (MW-MSR) algo…
▽ More
We study a multi-agent resilient consensus problem, where some agents are of the Byzantine type and try to prevent the normal ones from reaching consensus. In our setting, normal agents communicate with each other asynchronously over multi-hop relay channels with delays. To solve this asynchronous Byzantine consensus problem, we develop the multi-hop weighted mean subsequence reduced (MW-MSR) algorithm. The main contribution is that we characterize a tight graph condition for our algorithm to achieve Byzantine consensus, which is expressed in the novel notion of strictly robust graphs. We show that the multi-hop communication is effective for enhancing the network's resilience against Byzantine agents. As a result, we also obtain novel conditions for resilient consensus under the malicious attack model, which are tighter than those known in the literature. Furthermore, the proposed algorithm can be viewed as a generalization of the conventional flooding-based algorithms, with less computational complexity. Lastly, we provide numerical examples to show the effectiveness of the proposed algorithm.
△ Less
Submitted 12 March, 2024;
originally announced March 2024.
-
On a Discrete-Time Networked SIV Epidemic Model with Polar Opinion Dynamics
Authors:
Qiulin Xu,
Hideaki Ishii
Abstract:
This paper studies novel epidemic spreading problems influenced by opinion evolution in social networks, where the opinions reflect the public health concerns. A coupled bilayer network is proposed, where the epidemics spread over several communities through a physical network layer while the opinions evolve over the same communities through a social network layer. The epidemic spreading process i…
▽ More
This paper studies novel epidemic spreading problems influenced by opinion evolution in social networks, where the opinions reflect the public health concerns. A coupled bilayer network is proposed, where the epidemics spread over several communities through a physical network layer while the opinions evolve over the same communities through a social network layer. The epidemic spreading process is described by a susceptible-infected-vigilant (SIV) model, which introduces opinion-dependent epidemic vigilance state compared with the classical epidemic models. The opinion process is modeled by a polar opinion dynamics model, which includes infection prevalence and human stubbornness into the opinion evolution. By introducing an opinion-dependent reproduction number, we analyze the stability of disease-free and endemic equilibria and derive sufficient conditions for their global asymptotic stability. We also discuss the mutual effects between epidemic eradication and opinion consensus, and the possibility of suppressing epidemic by intervening in the opinions or implementing public health strategies. Simulations are conducted to verify the theoretical results and demonstrate the feasibility of epidemic suppression.
△ Less
Submitted 9 January, 2024;
originally announced January 2024.
-
Distributed Parameter Estimation with Gaussian Observation Noises in Time-varying Digraphs
Authors:
Jiaqi Yan,
Hideaki Ishii
Abstract:
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. The sensors aim to infer the true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension…
▽ More
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. The sensors aim to infer the true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension and mixing (DREM) algorithm to stochastic systems, with which the problem of estimating a $d$-dimensional vector parameter is transformed to that of $d$ scalar ones: one for each of the unknown parameters. For each of the scalar problem, both combine-then-adapt (CTA) and adapt-then-combine (ATC) diffusion-based estimation algorithms are given, where each sensor performs a combination step to fuse the local estimates in its in-neighborhood, alongside an adaptation step to process its streaming observations. Under weak conditions on network topology and excitation of regressors, we show that the proposed estimators guarantee that each sensor infers the true parameter, even if any individual of them cannot by itself. Specifically, it is required that the union of topologies over an interval with fixed length is strongly connected. Moreover, the sensors must collectively satisfy a cooperative persistent excitation (PE) condition, which relaxes the traditional PE condition. Numerical examples are finally provided to illustrate the established results.
△ Less
Submitted 8 November, 2023; v1 submitted 7 November, 2023;
originally announced November 2023.
-
Resilient Distributed Parameter Estimation in Sensor Networks
Authors:
Jiaqi Yan,
Kuo Li,
Hideaki Ishii
Abstract:
In this paper, we study the problem of parameter estimation in a sensor network, where the measurements and updates of some sensors might be arbitrarily manipulated by adversaries. Despite the presence of such misbehaviors, normally behaving sensors make successive observations of an unknown $d$-dimensional vector parameter and aim to infer its true value by cooperating with their neighbors over a…
▽ More
In this paper, we study the problem of parameter estimation in a sensor network, where the measurements and updates of some sensors might be arbitrarily manipulated by adversaries. Despite the presence of such misbehaviors, normally behaving sensors make successive observations of an unknown $d$-dimensional vector parameter and aim to infer its true value by cooperating with their neighbors over a directed communication graph. To this end, by leveraging the so-called dynamic regressor extension and mixing procedure, we transform the problem of estimating the vector parameter to that of estimating $d$ scalar ones. For each of the scalar problem, we propose a resilient combine-then-adapt diffusion algorithm, where each normal sensor performs a resilient combination to discard the suspicious estimates in its neighborhood and to fuse the remaining values, alongside an adaptation step to process its streaming observations. With a low computational cost, this estimator guarantees that each normal sensor exponentially infers the true parameter even if some of them are not sufficiently excited.
△ Less
Submitted 3 June, 2023;
originally announced June 2023.
-
Dynamic quantized consensus under DoS attacks: Towards a tight zooming-out factor
Authors:
Shuai Feng,
Maopeng Ran,
Hideaki Ishii,
Shengyuan Xu
Abstract:
This paper deals with dynamic quantized consensus of dynamical agents in a general form under packet losses induced by Denial-of-Service (DoS) attacks. The communication channel has limited bandwidth and hence the transmitted signals over the network are subject to quantization. To deal with agent's output, an observer is implemented at each node. The state of the observer is quantized by a finite…
▽ More
This paper deals with dynamic quantized consensus of dynamical agents in a general form under packet losses induced by Denial-of-Service (DoS) attacks. The communication channel has limited bandwidth and hence the transmitted signals over the network are subject to quantization. To deal with agent's output, an observer is implemented at each node. The state of the observer is quantized by a finite-level quantizer and then transmitted over the network. To solve the problem of quantizer overflow under malicious packet losses, a zooming-in and out dynamic quantization mechanism is designed. By the new quantized controller proposed in the paper, the zooming-out factor is lower bounded by the spectral radius of the agent's dynamic matrix. A sufficient condition of quantization range is provided under which the finite-level quantizer is free of overflow. A sufficient condition of tolerable DoS attacks for achieving consensus is also provided. At last, we study scalar dynamical agents as a special case and further tighten the zooming-out factor to a value smaller than the agent's dynamic parameter. Under such a zooming-out factor, it is possible to recover the level of tolerable DoS attacks to that of unquantized consensus, and the quantizer is free of overflow.
△ Less
Submitted 31 May, 2023;
originally announced June 2023.
-
Quantized Zero Dynamics Attacks against Sampled-data Control Systems
Authors:
Kosuke Kimura,
Hideaki Ishii
Abstract:
For networked control systems, cyber-security issues have gained much attention in recent years. In this paper, we consider the so-called zero dynamics attacks, which form an important class of false data injection attacks, with a special focus on the effects of quantization in a sampled-data control setting. When the attack signals must be quantized, some error will be necessarily introduced, pot…
▽ More
For networked control systems, cyber-security issues have gained much attention in recent years. In this paper, we consider the so-called zero dynamics attacks, which form an important class of false data injection attacks, with a special focus on the effects of quantization in a sampled-data control setting. When the attack signals must be quantized, some error will be necessarily introduced, potentially increasing the chance of detection through the output of the system. In this paper, we show however that the attacker may reduce such errors by avoiding to directly quantize the attack signal. We look at two approaches for generating quantized attacks which can keep the error in the output smaller than a specified level by using the knowledge of the system dynamics. The methods are based on a dynamic quantization technique and a modified version of zero dynamics attacks. Numerical examples are provided to verify the effectiveness of the proposed methods.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Distributed Parameter Estimation under Gaussian Observation Noises
Authors:
Jiaqi Yan,
Hideaki Ishii
Abstract:
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. They aim to infer true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension and mixing…
▽ More
In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. They aim to infer true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension and mixing (DREM) algorithm to stochastic systems, with which the problem of estimating a $d$-dimensional vector parameter is transformed to that of $d$ scalar ones: one for each of the unknown parameters. For each of the scalar problem, an estimation scheme is given, where each sensor fuses the regressors and measurements in its in-neighborhood and updates its local estimate by using least-mean squares. Particularly, a counter is also introduced for each sensor, which prevents any (noisy) measurement from being repeatedly used such that the estimation performance will not be greatly affected by certain extreme values. A novel excitation condition termed as \textit{local persistent excitation} (Local-PE) condition is also proposed, which relaxes the traditional persistent excitation (PE) condition and only requires that the collective signals in each sensor's in-neighborhood are sufficiently excited. With the Local-PE condition and proper step sizes, we show that the proposed estimator guarantee that each sensor infers the true parameter in mean square, even if any individual of them cannot. Numerical examples are finally provided to illustrate the established results.
△ Less
Submitted 21 March, 2023;
originally announced March 2023.
-
Cluster Forming of Multiagent Systems in Rolling Horizon Games with Non-uniform Horizons
Authors:
Yurid Nugraha,
Ahmet Cetinkaya,
Tomohisa Hayakawa,
Hideaki Ishii,
Quanyan Zhu
Abstract:
Consensus and cluster forming of multiagent systems in the face of jamming attacks along with reactive recovery actions by a defender are discussed. The attacker is capable to disable some of the edges of the network with the objective to divide the agents into a smaller size of clusters while, in response, the defender recovers some of the edges by increasing the transmission power. We consider r…
▽ More
Consensus and cluster forming of multiagent systems in the face of jamming attacks along with reactive recovery actions by a defender are discussed. The attacker is capable to disable some of the edges of the network with the objective to divide the agents into a smaller size of clusters while, in response, the defender recovers some of the edges by increasing the transmission power. We consider repeated games where the resulting optimal strategies for the two players are derived in a rolling horizon fashion. The attacker and the defender possess different computational abilities to calculate their strategies. This aspect is represented by the non-uniform values of the horizon lengths and the game periods. Theoretical and simulation based results demonstrate the effects of the horizon lengths and the game periods on the agents' states.
△ Less
Submitted 26 January, 2023;
originally announced January 2023.
-
A Rolling Horizon Game Considering Network Effect in Cluster Forming for Dynamic Resilient Multiagent Systems
Authors:
Yurid Nugraha,
Ahmet Cetinkaya,
Tomohisa Hayakawa,
Hideaki Ishii,
Quanyan Zhu
Abstract:
A two-player game-theoretic problem on resilient graphs in a multiagent consensus setting is formulated. An attacker is capable to disable some of the edges of the network with the objective to divide the agents into clusters by emitting jamming signals while, in response, the defender recovers some of the edges by increasing the transmission power for the communication signals. Specifically, we c…
▽ More
A two-player game-theoretic problem on resilient graphs in a multiagent consensus setting is formulated. An attacker is capable to disable some of the edges of the network with the objective to divide the agents into clusters by emitting jamming signals while, in response, the defender recovers some of the edges by increasing the transmission power for the communication signals. Specifically, we consider repeated games between the attacker and the defender where the optimal strategies for the two players are derived in a rolling horizon fashion based on utility functions that take both the agents' states and the sizes of clusters (known as network effect) into account. The players' actions at each discrete-time step are constrained by their energy for transmissions of the signals, with a less strict constraint for the attacker. Necessary conditions and sufficient conditions of agent consensus are derived, which are influenced by the energy constraints. The number of clusters of agents at infinite time in the face of attacks and recoveries are also characterized. Simulation results are provided to demonstrate the effects of players' actions on the cluster forming and to illustrate the players' performance for different horizon parameters.
△ Less
Submitted 9 January, 2023;
originally announced January 2023.
-
Two-Player Incomplete Games of Resilient Multiagent Systems
Authors:
Yurid Nugraha,
Tomohisa Hayakawa,
Hideaki Ishii,
Ahmet Cetinkaya,
Quanyan Zhu
Abstract:
Evolution of agents' dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this paper we focus on a game-theoretical approach of multiagent systems where the players have incomplete information on their opponents' strength. We consider repeated games with both simult…
▽ More
Evolution of agents' dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this paper we focus on a game-theoretical approach of multiagent systems where the players have incomplete information on their opponents' strength. We consider repeated games with both simultaneous and sequential player actions where players update their beliefs of each other over time. The effect of the players' optimal strategies according to Bayesian Nash Equilibrium and Perfect Bayesian Equilibrium on agents' consensus is examined. It is shown that an attacker with incomplete knowledge may fail to prevent consensus despite having sufficient resources to do so.
△ Less
Submitted 11 March, 2023; v1 submitted 3 December, 2022;
originally announced December 2022.
-
A State Feedback Controller for Mitigation of Continuous-Time Networked SIS Epidemics
Authors:
Yuan Wang,
Sebin Gracy,
César A. Uribe,
Hideaki Ishii,
Karl Henrik Johansson
Abstract:
The paper considers continuous-time networked susceptible-infected-susceptible (SIS) diseases spreading over a population. Each agent represents a sub-population and has its own healing rate and infection rate; the state of the agent at a time instant denotes what fraction of the said sub-population is infected with the disease at the said time instant. By taking account of the changes in behavior…
▽ More
The paper considers continuous-time networked susceptible-infected-susceptible (SIS) diseases spreading over a population. Each agent represents a sub-population and has its own healing rate and infection rate; the state of the agent at a time instant denotes what fraction of the said sub-population is infected with the disease at the said time instant. By taking account of the changes in behaviors of the agents in response to the infection rates in real-time, our goal is to devise a feedback strategy such that the infection level for each agent strictly stays below a pre-specified value. Furthermore, we are also interested in ensuring that the closed-loop system converges either to the disease-free equilibrium or, when it exists, to the endemic equilibrium. The upshot of devising such a strategy is that it allows health administration officials to ensure that there is sufficient capacity in the healthcare system to treat the most severe cases. We demonstrate the effectiveness of our controller via numerical examples.
△ Less
Submitted 9 October, 2022;
originally announced October 2022.
-
Event-Based Control for Synchronization of Stochastic Linear Systems with Application to Distributed Estimation
Authors:
Jiaqi Yan,
Yilin Mo,
Hideaki Ishii
Abstract:
This paper studies the synchronization of stochastic linear systems which are subject to a general class of noises, in the sense that the noises are bounded in covariance but might be correlated with the states of agents and among each other. We propose an event-based control protocol for achieving the synchronization among agents in the mean square sense and theoretically analyze the performance…
▽ More
This paper studies the synchronization of stochastic linear systems which are subject to a general class of noises, in the sense that the noises are bounded in covariance but might be correlated with the states of agents and among each other. We propose an event-based control protocol for achieving the synchronization among agents in the mean square sense and theoretically analyze the performance of it by using a stochastic Lyapunov function, where the stability of $c$-martingales is particularly developed to handle the challenges brought by the general model of noises and the event-triggering mechanism. The proposed event-based synchronization algorithm is then applied to solve the problem of distributed estimation in sensor network. Specifically, by losslessly decomposing the optimal Kalman filter, it is shown that the problem of distributed estimation can be resolved by using the algorithms designed for achieving the synchronization of stochastic linear systems. As such, an event-based distributed estimation algorithm is developed, where each sensor performs local filtering solely using its own measurement, together with the proposed event-based synchronization algorithm to fuse the local estimates of neighboring nodes. With the reduced communication frequency, the designed estimator is proved to be stable under the minimal requirements of network connectivity and collective system observability.
△ Less
Submitted 13 May, 2022;
originally announced May 2022.
-
Event-triggered Approximate Byzantine Consensus with Multi-hop Communication
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
In this paper, we consider a resilient consensus problem for the multi-agent network where some of the agents are subject to Byzantine attacks and may transmit erroneous state values to their neighbors. In particular, we develop an event-triggered update rule to tackle this problem as well as reduce the communication for each agent. Our approach is based on the mean subsequence reduced (MSR) algor…
▽ More
In this paper, we consider a resilient consensus problem for the multi-agent network where some of the agents are subject to Byzantine attacks and may transmit erroneous state values to their neighbors. In particular, we develop an event-triggered update rule to tackle this problem as well as reduce the communication for each agent. Our approach is based on the mean subsequence reduced (MSR) algorithm with agents being capable to communicate with multi-hop neighbors. Since delays are critical in such an environment, we provide necessary graph conditions for the proposed algorithm to perform well with delays in the communication. We highlight that through multi-hop communication, the network connectivity can be reduced especially in comparison with the common onehop communication case. Lastly, we show the effectiveness of the proposed algorithm by a numerical example.
△ Less
Submitted 19 April, 2022;
originally announced April 2022.
-
A Framework for Distributed Estimation with Reduced Communication via Event-Based Strategies
Authors:
Jiaqi Yan,
Yilin Mo,
Hideaki Ishii
Abstract:
This paper considers the problem of distributed estimation in a sensor network, where multiple sensors are deployed to infer the state of a linear time-invariant (LTI) Gaussian system. By proposing a lossless decomposition of Kalman filter, a framework of event-based distributed estimation is developed, where each sensor node runs a local filter using solely its own measurement, alongside with an…
▽ More
This paper considers the problem of distributed estimation in a sensor network, where multiple sensors are deployed to infer the state of a linear time-invariant (LTI) Gaussian system. By proposing a lossless decomposition of Kalman filter, a framework of event-based distributed estimation is developed, where each sensor node runs a local filter using solely its own measurement, alongside with an event-based synchronization algorithm to fuse the neighboring information. One novelty of the proposed framework is that it decouples the local filter from synchronization process. By doing so, we prove that a general class of triggering strategies can be applied in our framework, which yields stable distributed estimators under the minimal requirements of network connectivity and collective system observability. As compared with existing works, the proposed algorithm enjoys lower data size for each transmission. Moreover, the developed results can be generalized to achieve a distributed implementation of any Luenberger observer. By solving a semi-definite programming (SDP), we further present a low-rank estimator design to obtain the optimal gain of Luenberger observer such that the distributed estimation is realized under the constraint of message complexity. Numerical examples are finally provided to demonstrate the proposed methods.
△ Less
Submitted 17 April, 2022; v1 submitted 7 April, 2022;
originally announced April 2022.
-
Cluster Synchronization of Kuramoto Oscillators and the Method of Averaging
Authors:
Rui Kato,
Hideaki Ishii
Abstract:
Rigorous conditions for cluster synchronization of Kuramoto oscillators are presented. The method of averaging plays an important role in stability analysis, but the standard Lyapunov's second method is not applicable due to the lack of uniform continuity. This paper contributes to overcoming this difficulty with the help of nonmonotonic Lyapunov functions. Our extensions of averaging in stability…
▽ More
Rigorous conditions for cluster synchronization of Kuramoto oscillators are presented. The method of averaging plays an important role in stability analysis, but the standard Lyapunov's second method is not applicable due to the lack of uniform continuity. This paper contributes to overcoming this difficulty with the help of nonmonotonic Lyapunov functions. Our extensions of averaging in stability theory are key to derive the two interrelated cluster synchronization conditions: (i) the coupling strengths between clusters are sufficiently weak and/or (ii) the natural frequencies are largely different between clusters. Cluster phase cohesiveness in the absence of network partitions ensuring the existence of invariant manifolds is also investigated. Moreover, we apply our theoretical findings to brain networks and exhibit certain relations among network parameters and functional connectivity.
△ Less
Submitted 9 September, 2023; v1 submitted 6 April, 2022;
originally announced April 2022.
-
Resilient Consensus with Multi-hop Communication
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algor…
▽ More
In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algorithm is a powerful tool for achieving resilient consensus under minimal requirements for network structures, characterized by the class of robust graphs. Our analysis highlights that through multi-hop communication, the network connectivity can be reduced especially in comparison with the common one-hop communication case. Moreover, we analyze the multi-hop W-MSR algorithm with delays in communication since the values from different multi-hop neighbors may arrive at the agents at different time steps.
△ Less
Submitted 10 January, 2022;
originally announced January 2022.
-
Suppressing the endemic equilibrium in SIS epidemics: A state dependent approach
Authors:
Yuan Wang,
Sebin Gracy,
Hideaki Ishii,
Karl Henrik Johansson
Abstract:
This paper considers the susceptible-infected-susceptible (SIS) epidemic model with an underlying network structure among subpopulations and focuses on the effect of social distancing to regulate the epidemic level. We demonstrate that if each subpopulation is informed of its infection rate and reduces interactions accordingly, the fraction of the subpopulation infected can remain below half for a…
▽ More
This paper considers the susceptible-infected-susceptible (SIS) epidemic model with an underlying network structure among subpopulations and focuses on the effect of social distancing to regulate the epidemic level. We demonstrate that if each subpopulation is informed of its infection rate and reduces interactions accordingly, the fraction of the subpopulation infected can remain below half for all time instants. To this end, we first modify the basic SIS model by introducing a state dependent parameter representing the frequency of interactions between subpopulations. Thereafter, we show that for this modified SIS model, the spectral radius of a suitably-defined matrix being not greater than one causes all the agents, regardless of their initial sickness levels, to converge to the healthy state; assuming non-trivial disease spread, the spectral radius being greater than one leads to the existence of a unique endemic equilibrium, which is also asymptotically stable. Finally, by leveraging the aforementioned results, we show that the fraction of (sub)populations infected never exceeds half.
△ Less
Submitted 6 August, 2021; v1 submitted 31 May, 2021;
originally announced June 2021.
-
Quantized State Feedback Stabilization of Nonlinear Systems under Denial-of-Service
Authors:
Mingming Shi,
Shuai Feng,
Hideaki Ishii
Abstract:
This paper studies the resilient control of networked systems in the presence of cyber attacks. In particular, we consider the state feedback stabilization problem for nonlinear systems when the state measurement is sent to the controller via a communication channel that only has a finite transmitting rate and is moreover subject to cyber attacks in the form of Denial-of-Service (DoS). We use a dy…
▽ More
This paper studies the resilient control of networked systems in the presence of cyber attacks. In particular, we consider the state feedback stabilization problem for nonlinear systems when the state measurement is sent to the controller via a communication channel that only has a finite transmitting rate and is moreover subject to cyber attacks in the form of Denial-of-Service (DoS). We use a dynamic quantization method to update the quantization range of the encoder/decoder and characterize the number of bits for quantization needed to stabilize the system under a given level of DoS attacks in terms of duration and frequency. Our theoretical result shows that under DoS attacks, the required data bits to stabilize nonlinear systems by state feedback control are larger than those without DoS since the communication interruption induced by DoS makes the quantization uncertainty expand more between two successful transmissions. Even so, in the simulation, we show that the actual quantization bits can be much smaller than the theoretical value.
△ Less
Submitted 9 April, 2021;
originally announced April 2021.
-
Secure Consensus with Distributed Detection via Two-hop Communication
Authors:
Liwei Yuan,
Hideaki Ishii
Abstract:
In this paper, we consider a multi-agent resilient consensus problem, where some of the nodes may behave maliciously. The approach is to equip all nodes with a scheme to detect neighboring nodes when they behave in an abnormal fashion. To this end, the nodes exchange not only their own states but also information regarding their neighbor nodes. Such two-hop communication has long been studied in f…
▽ More
In this paper, we consider a multi-agent resilient consensus problem, where some of the nodes may behave maliciously. The approach is to equip all nodes with a scheme to detect neighboring nodes when they behave in an abnormal fashion. To this end, the nodes exchange not only their own states but also information regarding their neighbor nodes. Such two-hop communication has long been studied in fault-tolerant algorithms in computer science. We propose two distributed schemes for detection of malicious nodes and resilient consensus with different requirements on resources for communication and the structures of the networks. In particular, the detection schemes become effective under certain connectivity properties in the network so that the non-malicious nodes can share enough information about their neighbors. It is shown that the requirements are however less stringent than those for conventional algorithms. A numerical example is presented to demonstrate the performance of the proposed methods in wireless sensor networks.
△ Less
Submitted 13 January, 2021;
originally announced January 2021.
-
Resilient Consensus for Multi-Agent Systems under Adversarial Spreading Processes
Authors:
Yuan Wang,
Hideaki Ishii,
François Bonnet,
Xavier Défago
Abstract:
This paper addresses novel consensus problems for multi-agent systems operating in an unreliable environment where adversaries are spreading. The dynamics of the adversarial spreading processes follows the susceptible-infected-recovered (SIR) model, where the infection induces faulty behaviors in the agents and affects their state values. Such a problem setting serves as a model of opinion dynamic…
▽ More
This paper addresses novel consensus problems for multi-agent systems operating in an unreliable environment where adversaries are spreading. The dynamics of the adversarial spreading processes follows the susceptible-infected-recovered (SIR) model, where the infection induces faulty behaviors in the agents and affects their state values. Such a problem setting serves as a model of opinion dynamics in social networks where consensus is to be formed at the time of pandemic and infected individuals may deviate from their true opinions. To ensure resilient consensus among the noninfectious agents, the difficulty is that the number of infectious agents changes over time. We assume that a local policy maker announces the local level of infection in real-time, which can be adopted by the agent for its preventative measures. It is demonstrated that this problem can be formulated as resilient consensus in the presence of the socalled mobile malicious models, where the mean subsequence reduced (MSR) algorithms are known to be effective. We characterize sufficient conditions on the network structures for different policies regarding the announced infection levels and the strength of the epidemic. Numerical simulations are carried out for random graphs to verify the effectiveness of our approach.
△ Less
Submitted 11 January, 2022; v1 submitted 26 December, 2020;
originally announced December 2020.
-
Resilient Self/Event-Triggered Consensus Based on Ternary Control
Authors:
Hiroki Matsume,
Yuan Wang,
Hideaki Ishii
Abstract:
The paper considers the problem of multi-agent consensus in the presence of adversarial agents which may try to prevent and introduce undesired influence on the coordination among the regular agents. To our setting, we extend the so-called mean subsequence reduced algorithms with the aim to reduce the amount of communication via two measures: The agents exchange information in the form of ternary…
▽ More
The paper considers the problem of multi-agent consensus in the presence of adversarial agents which may try to prevent and introduce undesired influence on the coordination among the regular agents. To our setting, we extend the so-called mean subsequence reduced algorithms with the aim to reduce the amount of communication via two measures: The agents exchange information in the form of ternary data at each transmission and moreover keep the frequency of data exchange low by employing self- and event-triggered communication. We will observe that in hostile environments with adversaries, the self-triggered approach can bring certain advantages over the event-triggered counterpart.
△ Less
Submitted 24 December, 2020;
originally announced December 2020.
-
Linearization-Based Quantized Stabilization of Nonlinear Systems Under DoS Attacks
Authors:
Rui Kato,
Ahmet Cetinkaya,
Hideaki Ishii
Abstract:
Motivated by recent security issues in cyber-physical systems, this technical note studies the stabilization problem of networked control systems under Denial-of-Service (DoS) attacks. In particular, we consider to stabilize a nonlinear system with limited data rate via linearization. We employ a deterministic DoS attack model constrained in terms of attacks' frequency and duration, allowing us to…
▽ More
Motivated by recent security issues in cyber-physical systems, this technical note studies the stabilization problem of networked control systems under Denial-of-Service (DoS) attacks. In particular, we consider to stabilize a nonlinear system with limited data rate via linearization. We employ a deterministic DoS attack model constrained in terms of attacks' frequency and duration, allowing us to cover a large class of potential attacks. To achieve asymptotic stabilization, we propose a resilient dynamic quantizer in the sense that it does not saturate in the presence of packet losses caused by DoS attacks. A sufficient condition for stability is derived by restricting the average DoS frequency and duration. In addition, because of the locality of linearization, we explicitly investigate an estimate of the region of attraction, which can be expected to be reduced depending on the strength of DoS attacks. A simulation example is presented for demonstration of our results.
△ Less
Submitted 11 December, 2020;
originally announced December 2020.
-
Resilient Consensus Against Mobile Malicious Agents
Authors:
Yuan Wang,
Hideaki Ishii,
François Bonnet,
Xavier Défago
Abstract:
This paper addresses novel consensus problems in the presence of adversaries that can move within the network and induce faulty behaviors in the attacked agents. By adopting several mobile adversary models from the computer science literature, we develop protocols which can mitigate the influence of such malicious agents. The algorithms follow the class of mean subsequence reduced (MSR) algorithms…
▽ More
This paper addresses novel consensus problems in the presence of adversaries that can move within the network and induce faulty behaviors in the attacked agents. By adopting several mobile adversary models from the computer science literature, we develop protocols which can mitigate the influence of such malicious agents. The algorithms follow the class of mean subsequence reduced (MSR) algorithms, under which agents ignore the suspicious values received from neighbors during their state updates. Different from the static adversary models, even after the adversaries move away, the infected agents may remain faulty in their values, whose effects must be taken into account. We develop conditions on the network structures for both the complete and non-complete graph cases, under which the proposed algorithms are guaranteed to attain resilient consensus. Extensive simulations are carried out over random graphs to verify the effectiveness of our approach under uncertainties in the systems.
△ Less
Submitted 21 June, 2020;
originally announced June 2020.
-
Dynamic Quantized Consensus of General Linear Multi-agent Systems under Denial-of-Service Attacks
Authors:
Shuai Feng,
Hideaki Ishii
Abstract:
In this paper, we study multi-agent consensus problems under Denial-of-Service (DoS) attacks with data rate constraints. We first consider the leaderless consensus problem and after that we briefly present the analysis of leader-follower consensus. The dynamics of the agents take general forms modeled as homogeneous linear time-invariant systems. In our analysis, we derive lower bounds on the data…
▽ More
In this paper, we study multi-agent consensus problems under Denial-of-Service (DoS) attacks with data rate constraints. We first consider the leaderless consensus problem and after that we briefly present the analysis of leader-follower consensus. The dynamics of the agents take general forms modeled as homogeneous linear time-invariant systems. In our analysis, we derive lower bounds on the data rate for the multi-agent systems to achieve leaderless and leader-follower consensus in the presence of DoS attacks, under which the issue of overflow of quantizer is prevented. The main contribution of the paper is the characterization of the trade-off between the tolerable DoS attack levels for leaderless and leader-follower consensus and the required data rates for the quantizers during the communication attempts among the agents. To mitigate the influence of DoS attacks, we employ dynamic quantization with zooming-in and zooming-out capabilities for avoiding quantizer saturation.
△ Less
Submitted 21 November, 2021; v1 submitted 28 April, 2020;
originally announced April 2020.
-
Dynamic Resilient Network Games with Applications to Multi-Agent Consensus
Authors:
Yurid Nugraha,
Ahmet Cetinkaya,
Tomohisa Hayakawa,
Hideaki Ishii,
Quanyan Zhu
Abstract:
A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be…
▽ More
A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be performed continuously. For this two-stage game, which is played repeatedly over time, we characterize the optimal strategies for the attacker and the defender in terms of edge connectivity and the number of connected components of the graph. The resilient graph game is then applied to a multi-agent consensus problem. We study how the attacks and the recovery on the edges affect the consensus process. Finally, we also provide numerical simulation to illustrate the results.
△ Less
Submitted 7 July, 2020; v1 submitted 30 March, 2020;
originally announced March 2020.
-
Actuation attacks on constrained linear systems: a set-theoretic analysis
Authors:
P. A. Trodden,
J. M. Maestre,
H. Ishii
Abstract:
This paper considers a constrained discrete-time linear system subject to actuation attacks. The attacks are modelled as false data injections to the system, such that the total input (control input plus injection) satisfies hard input constraints. We establish a sufficient condition under which it is not possible to maintain the states of the system within a compact state constraint set for all p…
▽ More
This paper considers a constrained discrete-time linear system subject to actuation attacks. The attacks are modelled as false data injections to the system, such that the total input (control input plus injection) satisfies hard input constraints. We establish a sufficient condition under which it is not possible to maintain the states of the system within a compact state constraint set for all possible realizations of the actuation attack. The developed condition is a simple function of the spectral radius of the system, the relative sizes of the input and state constraint sets, and the proportion of the input constraint set allowed to the attacker.
△ Less
Submitted 15 November, 2019;
originally announced November 2019.
-
Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks
Authors:
Song Fang,
Karl Henrik Johansson,
Mikael Skoglund,
Henrik Sandberg,
Hideaki Ishii
Abstract:
In this paper, we introduce the concept of two-way coding, which originates in communication theory characterizing coding schemes for two-way channels, into control theory, particularly to facilitate the analysis and design of feedback control systems under injection attacks. Moreover, we propose the notion of attack decoupling, and show how the controller and the two-way coding can be co-designed…
▽ More
In this paper, we introduce the concept of two-way coding, which originates in communication theory characterizing coding schemes for two-way channels, into control theory, particularly to facilitate the analysis and design of feedback control systems under injection attacks. Moreover, we propose the notion of attack decoupling, and show how the controller and the two-way coding can be co-designed to nullify the transfer function from attack to plant, rendering the attack effect zero both in transient phase and in steady state.
△ Less
Submitted 4 September, 2019;
originally announced September 2019.
-
Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation
Authors:
Xin Wang,
Hideaki Ishii,
Linkang Du,
Peng Cheng,
Jiming Chen
Abstract:
With the proliferation of training data, distributed machine learning (DML) is becoming more competent for large-scale learning tasks. However, privacy concerns have to be given priority in DML, since training data may contain sensitive information of users. In this paper, we propose a privacy-preserving ADMM-based DML framework with two novel features: First, we remove the assumption commonly mad…
▽ More
With the proliferation of training data, distributed machine learning (DML) is becoming more competent for large-scale learning tasks. However, privacy concerns have to be given priority in DML, since training data may contain sensitive information of users. In this paper, we propose a privacy-preserving ADMM-based DML framework with two novel features: First, we remove the assumption commonly made in the literature that the users trust the server collecting their data. Second, the framework provides heterogeneous privacy for users depending on data's sensitive levels and servers' trust degrees. The challenging issue is to keep the accumulation of privacy losses over ADMM iterations minimal. In the proposed framework, a local randomization approach, which is differentially private, is adopted to provide users with self-controlled privacy guarantee for the most sensitive information. Further, the ADMM algorithm is perturbed through a combined noise-adding method, which simultaneously preserves privacy for users' less sensitive information and strengthens the privacy protection of the most sensitive information. We provide detailed analyses on the performance of the trained model according to its generalization error. Finally, we conduct extensive experiments using real-world datasets to validate the theoretical results and evaluate the classification performance of the proposed framework.
△ Less
Submitted 9 September, 2019; v1 submitted 30 July, 2019;
originally announced August 2019.
-
Efficient PageRank Computation via Distributed Algorithms with Web Clustering
Authors:
Atsushi Suzuki,
Hideaki Ishii
Abstract:
PageRank is a well-known centrality measure for the web used in search engines, representing the importance of each web page. In this paper, we follow the line of recent research on the development of distributed algorithms for computation of PageRank, where each page computes its own PageRank value by interacting with pages connected over hyperlinks. Our approach is novel in that it is based on a…
▽ More
PageRank is a well-known centrality measure for the web used in search engines, representing the importance of each web page. In this paper, we follow the line of recent research on the development of distributed algorithms for computation of PageRank, where each page computes its own PageRank value by interacting with pages connected over hyperlinks. Our approach is novel in that it is based on a reinterpretation of PageRank, which leads us to a set of algorithms with exponential convergence rates. We first employ gossip-type randomization for the page selections in the update iterations. Then, the algorithms are generalized to deterministic ones, allowing simultaneous updates by multiple pages. Finally, based on these algorithms, we propose a clustering-based scheme, in which groups of pages make updates by locally interacting among themselves many times to expedite the convergence. In comparison with other existing techniques, significant advantages can be exhibited in their convergence performance, as demonstrated via numerical examples using real web data, and also in the limited amount of communication required among pages.
△ Less
Submitted 23 July, 2019;
originally announced July 2019.
-
Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective
Authors:
Song Fang,
Mikael Skoglund,
Karl Henrik Johansson,
Hideaki Ishii,
Quanyan Zhu
Abstract:
In this paper, we obtain generic bounds on the variances of estimation and prediction errors in time series analysis via an information-theoretic approach. It is seen in general that the error bounds are determined by the conditional entropy of the data point to be estimated or predicted given the side information or past observations. Additionally, we discover that in order to achieve the predict…
▽ More
In this paper, we obtain generic bounds on the variances of estimation and prediction errors in time series analysis via an information-theoretic approach. It is seen in general that the error bounds are determined by the conditional entropy of the data point to be estimated or predicted given the side information or past observations. Additionally, we discover that in order to achieve the prediction error bounds asymptotically, the necessary and sufficient condition is that the "innovation" is asymptotically white Gaussian. When restricted to Gaussian processes and 1-step prediction, our bounds are shown to reduce to the Kolmogorov-Szegö formula and Wiener-Masani formula known from linear prediction theory.
△ Less
Submitted 11 May, 2021; v1 submitted 9 April, 2019;
originally announced April 2019.
-
Two-Way Coding in Control Systems Under Injection Attacks: From Attack Detection to Attack Correction
Authors:
Song Fang,
Karl Henrik Johansson,
Mikael Skoglund,
Henrik Sandberg,
Hideaki Ishii
Abstract:
In this paper, we introduce the method of two-way coding, a concept originating in communication theory characterizing coding schemes for two-way channels, into (networked) feedback control systems under injection attacks. We first show that the presence of two-way coding can distort the perspective of the attacker on the control system. In general, the distorted viewpoint on the attacker side as…
▽ More
In this paper, we introduce the method of two-way coding, a concept originating in communication theory characterizing coding schemes for two-way channels, into (networked) feedback control systems under injection attacks. We first show that the presence of two-way coding can distort the perspective of the attacker on the control system. In general, the distorted viewpoint on the attacker side as a consequence of two-way coding will facilitate detecting the attacks, or restricting what the attacker can do, or even correcting the attack effect. In the particular case of zero-dynamics attacks, if the attacks are to be designed according to the original plant, then they will be easily detected; while if the attacks are designed with respect to the equivalent plant as viewed by the attacker, then under the additional assumption that the plant is stabilizable by static output feedback, the attack effect may be corrected in steady state.
△ Less
Submitted 17 January, 2019; v1 submitted 16 January, 2019;
originally announced January 2019.
-
Resilient Consensus Through Event-based Communication
Authors:
Yuan Wang,
Hideaki Ishii
Abstract:
We consider resilient versions of discrete-time multi-agent consensus in the presence of faulty or even malicious agents in the network. In particular, we develop event-triggered update rules which can mitigate the influence of the malicious agents and at the same time reduce the necessary communication. Each regular agent updates its state based on a given rule using its neighbors' information. O…
▽ More
We consider resilient versions of discrete-time multi-agent consensus in the presence of faulty or even malicious agents in the network. In particular, we develop event-triggered update rules which can mitigate the influence of the malicious agents and at the same time reduce the necessary communication. Each regular agent updates its state based on a given rule using its neighbors' information. Only when the triggering condition is satisfied, the regular agents send their current states to their neighbors. Otherwise, the neighbors will continue to use the state received the last time. Assuming that a bound on the number of malicious nodes is known, we propose two update rules with event-triggered communication. They follow the so-called mean subsequence reduced (MSR) type algorithms and ignore values received from potentially malicious neighbors. We provide full characterizations for the necessary connectivity in the network for the algorithms to perform correctly, which are stated in terms of the notion of graph robustness. A numerical example is provided to demonstrate the effectiveness of the proposed approach.
△ Less
Submitted 17 June, 2019; v1 submitted 1 November, 2018;
originally announced November 2018.
-
Resilient Distributed Energy Management for Systems of Interconnected Microgrids
Authors:
Wicak Ananduta,
José María Maestre,
Carlos Ocampo-Martinez,
Hideaki Ishii
Abstract:
In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply with the distributed algorithm that is applied to the system, the performance of the system might be compromised. Specifically, it is considered th…
▽ More
In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply with the distributed algorithm that is applied to the system, the performance of the system might be compromised. Specifically, it is considered that adversarial agents (microgrids with their controllers) might implement control inputs that are different than the ones obtained from the distributed algorithm. By performing such behavior, these agents might have better performance at the expense of deteriorating the performance of the regular agents. This paper proposes a methodology to deal with this type of adversarial agents such that we can still guarantee that the regular agents can still obtain feasible, though suboptimal, control inputs in the presence of adversarial behaviors. The methodology consists of two steps: (i) the robustification of the underlying optimization problem and (ii) the identification of adversarial agents, which uses hypothesis testing with Bayesian inference and requires to solve a local mixed-integer optimization problem. Furthermore, the proposed methodology also prevents the regular agents to be affected by the adversaries once the adversarial agents are identified. In addition, we also provide a sub-optimality certificate of the proposed methodology.
△ Less
Submitted 14 September, 2018;
originally announced September 2018.
-
Data Rates for Stabilizing Control under Denial-of-Service Attacks
Authors:
Shuai Feng,
Ahmet Cetinkaya,
Hideaki Ishii,
Pietro Tesi,
Claudio De Persis
Abstract:
We study communication-constrained networked control problems for linear time-invariant systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Our work aims at exploring the relationship between system resilience and network bandwidth capacity. Given a class of DoS attacks, we first characterize time-invariant bit-rate…
▽ More
We study communication-constrained networked control problems for linear time-invariant systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Our work aims at exploring the relationship between system resilience and network bandwidth capacity. Given a class of DoS attacks, we first characterize time-invariant bit-rate bounds that are dependent on the unstable eigenvalues of the dynamic matrix of the plant and the parameters of DoS attacks, beyond which exponential stability of the closed-loop system can be guaranteed. Second, we design the time-varying bit-rate protocol and show that it can enable the system to maintain the comparable robustness as the one under the time-invariant bit-rate protocol and meanwhile promote the possibility of transmitting fewer bits especially when the attack levels are low. Our characterization clearly shows the trade-off between the communication bandwidth and resilience against DoS. An example is given to illustrate the proposed solution approach.
△ Less
Submitted 13 September, 2018;
originally announced September 2018.
-
A Frequency-Domain Characterization of Optimal Error Covariance for the Kalman-Bucy Filter
Authors:
Song Fang,
Hideaki Ishii,
Jie Chen,
Karl Henrik Johansson
Abstract:
In this paper, we discover that the trace of the division of the optimal output estimation error covariance over the noise covariance attained by the Kalman-Bucy filter can be explicitly expressed in terms of the plant dynamics and noise statistics in a frequency-domain integral characterization. Towards this end, we examine the algebraic Riccati equation associated with Kalman-Bucy filtering usin…
▽ More
In this paper, we discover that the trace of the division of the optimal output estimation error covariance over the noise covariance attained by the Kalman-Bucy filter can be explicitly expressed in terms of the plant dynamics and noise statistics in a frequency-domain integral characterization. Towards this end, we examine the algebraic Riccati equation associated with Kalman-Bucy filtering using analytic function theory and relate it to the Bode integral. Our approach features an alternative, frequency-domain framework for analyzing algebraic Riccati equations and reduces to various existing related results.
△ Less
Submitted 23 July, 2018;
originally announced July 2018.
-
Effects of Jamming Attacks on Wireless Networked Control Systems Under Disturbance
Authors:
Ahmet Cetinkaya,
Hideaki Ishii,
Tomohisa Hayakawa
Abstract:
Jamming attacks on wireless networked control systems are investigated for the scenarios where the system dynamics face exogenous disturbance. In particular, the control input packets are assumed to be transmitted from a controller to a remotely located linear plant over an insecure wireless communication channel that is subject to jamming attacks. The time-varying likelihood of transmission failu…
▽ More
Jamming attacks on wireless networked control systems are investigated for the scenarios where the system dynamics face exogenous disturbance. In particular, the control input packets are assumed to be transmitted from a controller to a remotely located linear plant over an insecure wireless communication channel that is subject to jamming attacks. The time-varying likelihood of transmission failures on this channel depends on the power of the jamming interference signal emitted by an attacker. We show that jamming attacks can prevent stability when the system faces disturbance, even if the attacked system without disturbance is stable. We also show that stability under jamming and disturbance can be achieved if the average jamming interference power is restricted in a certain way that we characterize in the paper. We illustrate our results on an example networked control system with a fading wireless channel, where the outage probability is affected by jamming attacks.
△ Less
Submitted 6 March, 2022; v1 submitted 6 February, 2018;
originally announced February 2018.
-
Randomized Transmission Protocols for Protection against Jamming Attacks in Multi-Agent Consensus
Authors:
Ahmet Cetinkaya,
Kaito Kikuchi,
Tomohisa Hayakawa,
Hideaki Ishii
Abstract:
Multi-agent consensus under jamming attacks is investigated. Specifically, inter-agent communications over a network are assumed to fail at certain times due to jamming of transmissions by a malicious attacker. A new stochastic communication protocol is proposed to achieve finite-time practical consensus between agents. In this protocol, communication attempt times of agents are randomized and unk…
▽ More
Multi-agent consensus under jamming attacks is investigated. Specifically, inter-agent communications over a network are assumed to fail at certain times due to jamming of transmissions by a malicious attacker. A new stochastic communication protocol is proposed to achieve finite-time practical consensus between agents. In this protocol, communication attempt times of agents are randomized and unknown by the attacker until after the agents make their communication attempts. Through a probabilistic analysis, we show that the proposed communication protocol, when combined with a stochastic ternary control law, allows agents to achieve consensus regardless of the frequency of attacks. We demonstrate the efficacy of our results by considering two different strategies of the jamming attacker: a deterministic attack strategy and a more malicious communication-aware attack strategy.
△ Less
Submitted 3 December, 2019; v1 submitted 5 February, 2018;
originally announced February 2018.
-
A Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked Control
Authors:
Ahmet Cetinkaya,
Hideaki Ishii,
Tomohisa Hayakawa
Abstract:
The control problem of a linear discrete-time dynamical system over a multi-hop network is explored. The network is assumed to be subject to packet drops by malicious and nonmalicious nodes as well as random and malicious data corruption issues. We utilize asymptotic tail-probability bounds of transmission failure ratios to characterize the links and paths of a network as well as the network itsel…
▽ More
The control problem of a linear discrete-time dynamical system over a multi-hop network is explored. The network is assumed to be subject to packet drops by malicious and nonmalicious nodes as well as random and malicious data corruption issues. We utilize asymptotic tail-probability bounds of transmission failure ratios to characterize the links and paths of a network as well as the network itself. This probabilistic characterization allows us to take into account multiple failures that depend on each other, and coordinated malicious attacks on the network. We obtain a sufficient condition for the stability of the networked control system by utilizing our probabilistic approach. We then demonstrate the efficacy of our results in different scenarios concerning transmission failures on a multi-hop network.
△ Less
Submitted 21 September, 2018; v1 submitted 18 November, 2017;
originally announced November 2017.
-
Resilient Randomized Quantized Consensus
Authors:
Seyed Mehran Dibaji,
Hideaki Ishii,
Roberto Tempo
Abstract:
We consider the problem of multi-agent consensus where some agents are subject to faults/attacks and might make updates arbitrarily. The network consists of agents taking integer-valued (i.e., quantized) states under directed communication links. The goal of the healthy normal agents is to form consensus in their state values, which may be disturbed by the non-normal, malicious agents. We develop…
▽ More
We consider the problem of multi-agent consensus where some agents are subject to faults/attacks and might make updates arbitrarily. The network consists of agents taking integer-valued (i.e., quantized) states under directed communication links. The goal of the healthy normal agents is to form consensus in their state values, which may be disturbed by the non-normal, malicious agents. We develop update schemes to be equipped by the normal agents whose interactions are asynchronous and subject to non-uniform and time-varying time delays. In particular, we employ a variant of the so-called mean subsequence reduced (MSR) algorithms, which have been long studied in computer science, where each normal agent ignores extreme values from its neighbors. We solve the resilient quantized consensus problems in the presence of totally/locally bounded adversarial agents and provide necessary and sufficient conditions in terms of the connectivity notion of graph robustness. Furthermore, it will be shown that randomization is essential both in quantization and in the updating times when normal agents interact in an asynchronous manner. The results are examined through a numerical example.
△ Less
Submitted 18 October, 2017;
originally announced October 2017.
-
Stabilization of Networked Control Systems under DoS Attacks and Output Quantization
Authors:
Masashi Wakaiki,
Ahmet Cetinkaya,
Hideaki Ishii
Abstract:
This paper addresses quantized output feedback stabilization under Denial-of-Service (DoS) attacks. First, assuming that the duration and frequency of DoS attacks are averagely bounded and that an initial bound of the plant state is known, we propose an output encoding scheme that achieves exponential convergence with finite data rates. Next we show that a suitable state transformation allows us t…
▽ More
This paper addresses quantized output feedback stabilization under Denial-of-Service (DoS) attacks. First, assuming that the duration and frequency of DoS attacks are averagely bounded and that an initial bound of the plant state is known, we propose an output encoding scheme that achieves exponential convergence with finite data rates. Next we show that a suitable state transformation allows us to remove the assumption on the DoS frequency. Finally, we discuss the derivation of state bounds under DoS attacks and obtain sufficient conditions on the bounds of DoS duration and frequency for achieving Lyapunov stability of the closed-loop system.
△ Less
Submitted 10 August, 2018; v1 submitted 24 September, 2017;
originally announced September 2017.
-
Analysis of Stochastic Switched Systems with Application to Networked Control Under Jamming Attacks
Authors:
Ahmet Cetinkaya,
Hideaki Ishii,
Tomohisa Hayakawa
Abstract:
We investigate the stability problem for discrete-time stochastic switched linear systems under the specific scenarios where information about the switching patterns and the probability of switches are not available. Our analysis focuses on the average number of times each mode becomes active in the long run and, in particular, utilizes their lower- and upper-bounds. This setup is motivated by cyb…
▽ More
We investigate the stability problem for discrete-time stochastic switched linear systems under the specific scenarios where information about the switching patterns and the probability of switches are not available. Our analysis focuses on the average number of times each mode becomes active in the long run and, in particular, utilizes their lower- and upper-bounds. This setup is motivated by cyber security issues for networked control systems in the presence of packet losses due to malicious jamming attacks where the attacker's strategy is not known a priori. We derive a sufficient condition for almost sure asymptotic stability of the switched systems which can be examined by solving a linear programming problem. Our approach exploits the dynamics of an equivalent system that describes the evolution of the switched system's state at every few steps; the stability analysis may become less conservative by increasing the step size. The computational efficiency is further enhanced by exploiting the structure in the stability analysis problem, and we introduce an alternative linear programming problem that has fewer variables. We demonstrate the efficacy of our results by analyzing networked control problems where communication channels face random packet losses as well as jamming attacks.
△ Less
Submitted 20 April, 2018; v1 submitted 25 April, 2017;
originally announced April 2017.
-
Resilient Consensus of Second-Order Agent Networks: Asynchronous Update Rules with Delays
Authors:
Seyed Mehran Dibaji,
Hideaki Ishii
Abstract:
We study the problem of resilient consensus of sampled-data multi-agent networks with double-integrator dynamics. The term resilient points to algorithms considering the presence of attacks by faulty/malicious agents in the network. Each normal agent updates its state based on a predetermined control law using its neighbors' information which may be delayed while misbehaving agents make updates ar…
▽ More
We study the problem of resilient consensus of sampled-data multi-agent networks with double-integrator dynamics. The term resilient points to algorithms considering the presence of attacks by faulty/malicious agents in the network. Each normal agent updates its state based on a predetermined control law using its neighbors' information which may be delayed while misbehaving agents make updates arbitrarily and might threaten the consensus within the network. Assuming that the maximum number of malicious agents in the system is known, we focus on algorithms where each normal agent ignores large and small position values among its neighbors to avoid being influenced by malicious agents. The malicious agents are assumed to be omniscient in that they know the updating times and delays and can collude with each other. We deal with both synchronous and partially asynchronous cases with delayed information and derive topological conditions in terms of graph robustness.
△ Less
Submitted 13 January, 2017; v1 submitted 12 January, 2017;
originally announced January 2017.
-
Networked Control under Random and Malicious Packet Losses
Authors:
Ahmet Cetinkaya,
Hideaki Ishii,
Tomohisa Hayakawa
Abstract:
We study cyber security issues in networked control of a linear dynamical system. Specifically, the dynamical system and the controller are assumed to be connected through a communication channel that face malicious attacks as well as random packet losses due to unreliability of transmissions. We provide a probabilistic characterization for the link failures which allows us to study combined effec…
▽ More
We study cyber security issues in networked control of a linear dynamical system. Specifically, the dynamical system and the controller are assumed to be connected through a communication channel that face malicious attacks as well as random packet losses due to unreliability of transmissions. We provide a probabilistic characterization for the link failures which allows us to study combined effects of malicious and random packet losses. We first investigate almost sure stabilization under an event-triggered control law, where we utilize Lyapunov-like functions to characterize the triggering times at which the plant and the controller attempt to exchange state and control data over the network. We then provide a look at the networked control problem from the attacker's perspective and explore malicious attacks that cause instability. Finally, we demonstrate the efficacy of our results with numerical examples.
△ Less
Submitted 16 June, 2016;
originally announced June 2016.
-
Stabilization of uncertain systems using quantized and lossy observations and uncertain control inputs
Authors:
Kunihisa Okano,
Hideaki Ishii
Abstract:
In this paper, we consider a stabilization problem of an uncertain system in a networked control setting. Due to the network, the measurements are quantized to finite-bit signals and may be randomly lost in the communication. We study uncertain autoregressive systems whose state and input parameters vary within given intervals. We derive conditions for making the plant output to be mean square sta…
▽ More
In this paper, we consider a stabilization problem of an uncertain system in a networked control setting. Due to the network, the measurements are quantized to finite-bit signals and may be randomly lost in the communication. We study uncertain autoregressive systems whose state and input parameters vary within given intervals. We derive conditions for making the plant output to be mean square stable, characterizing limitations on data rate, packet loss probabilities, and magnitudes of uncertainty. It is shown that a specific class of nonuniform quantizers can achieve stability with a lower data rate compared with the common uniform one.
△ Less
Submitted 6 March, 2017; v1 submitted 10 June, 2015;
originally announced June 2015.
-
Event-Triggered Control over Unreliable Networks Subject to Jamming Attacks
Authors:
Ahmet Cetinkaya,
Hideaki Ishii,
Tomohisa Hayakawa
Abstract:
Event-triggered networked control of a linear dynamical system is investigated. Specifically, the dynamical system and the controller are assumed to be connected through a communication channel. State and control input information packets between the system and the controller are attempted to be exchanged over the network only at time instants when certain triggering conditions are satisfied. We p…
▽ More
Event-triggered networked control of a linear dynamical system is investigated. Specifically, the dynamical system and the controller are assumed to be connected through a communication channel. State and control input information packets between the system and the controller are attempted to be exchanged over the network only at time instants when certain triggering conditions are satisfied. We provide a probabilistic characterization for the link failures which allows us to model random packet losses due to unreliability in transmissions as well as those caused by malicious jamming attacks. We obtain conditions for the almost sure stability of the closed-loop system, and we illustrate the efficacy of our approach with a numerical example.
△ Less
Submitted 15 March, 2016; v1 submitted 24 March, 2015;
originally announced March 2015.
-
Minimum data rate for stabilization of linear systems with parametric uncertainties
Authors:
Kunihisa Okano,
Hideaki Ishii
Abstract:
We study a stabilization problem of linear uncertain systems with parametric uncertainties via feedback control over data-rate-constrained channels. The objective is to find the limitation on the amount of information that must be conveyed through the channels for achieving stabilization and in particular how the plant uncertainties affect it. We derive a necessary condition and a sufficient condi…
▽ More
We study a stabilization problem of linear uncertain systems with parametric uncertainties via feedback control over data-rate-constrained channels. The objective is to find the limitation on the amount of information that must be conveyed through the channels for achieving stabilization and in particular how the plant uncertainties affect it. We derive a necessary condition and a sufficient condition for stabilizing the closed-loop system. These conditions provide limitations in the form of bounds on data rate and magnitude of uncertainty on plant parameters. The bounds are characterized by the product of the poles of the nominal plant and are less conservative than those known in the literature. In the course of deriving these results, a new class of nonuniform quantizers is found to be effective in reducing the required data rate. For scalar plants, these quantizers are shown to minimize the required data rate, and the obtained conditions become tight.
△ Less
Submitted 22 May, 2014;
originally announced May 2014.
-
The PageRank Problem, Multi-Agent Consensus and Web Aggregation -- A Systems and Control Viewpoint
Authors:
Hideaki Ishii,
Roberto Tempo
Abstract:
PageRank is an algorithm introduced in 1998 and used by the Google Internet search engine. It assigns a numerical value to each element of a set of hyperlinked documents (that is, web pages) within the World Wide Web with the purpose of measuring the relative importance of the page. The key idea in the algorithm is to give a higher PageRank value to web pages which are visited often by web surfers…
▽ More
PageRank is an algorithm introduced in 1998 and used by the Google Internet search engine. It assigns a numerical value to each element of a set of hyperlinked documents (that is, web pages) within the World Wide Web with the purpose of measuring the relative importance of the page. The key idea in the algorithm is to give a higher PageRank value to web pages which are visited often by web surfers. On its website, Google describes PageRank as follows: ``PageRank reflects our view of the importance of web pages by considering more than 500 million variables and 2 billion terms. Pages that are considered important receive a higher PageRank and are more likely to appear at the top of the search results." Today PageRank is a paradigmatic problem of great interest in various areas, such as information technology, bibliometrics, biology, and e-commerce, where objects are often ranked in order of importance. This article considers a distributed randomized approach based on techniques from the area of Markov chains using a graph representation consisting of nodes and links. We also outline connections with other problems of current interest to the systems and control community, which include ranking of control journals, consensus of multi-agent systems, and aggregation-based techniques.
△ Less
Submitted 6 December, 2013;
originally announced December 2013.
-
Ergodic Randomized Algorithms and Dynamics over Networks
Authors:
Chiara Ravazzi,
Paolo Frasca,
Roberto Tempo,
Hideaki Ishii
Abstract:
Algorithms and dynamics over networks often involve randomization, and randomization may result in oscillating dynamics which fail to converge in a deterministic sense. In this paper, we observe this undesired feature in three applications, in which the dynamics is the randomized asynchronous counterpart of a well-behaved synchronous one. These three applications are network localization, PageRank…
▽ More
Algorithms and dynamics over networks often involve randomization, and randomization may result in oscillating dynamics which fail to converge in a deterministic sense. In this paper, we observe this undesired feature in three applications, in which the dynamics is the randomized asynchronous counterpart of a well-behaved synchronous one. These three applications are network localization, PageRank computation, and opinion dynamics. Motivated by their formal similarity, we show the following general fact, under the assumptions of independence across time and linearities of the updates: if the expected dynamics is stable and converges to the same limit of the original synchronous dynamics, then the oscillations are ergodic and the desired limit can be locally recovered via time-averaging.
△ Less
Submitted 16 December, 2013; v1 submitted 5 September, 2013;
originally announced September 2013.