Skip to main content

Showing 1–50 of 58 results for author: Ishii, H

Searching in archive eess. Search in all archives.
.
  1. arXiv:2405.18752  [pdf, other

    cs.MA eess.SY

    Resilient Average Consensus with Adversaries via Distributed Detection and Recovery

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consen… ▽ More

    Submitted 29 May, 2024; originally announced May 2024.

    Comments: 16 pages

  2. arXiv:2403.12218  [pdf, other

    eess.SY

    Secure Synchronization of Heterogeneous Pulse-Coupled Oscillators

    Authors: Jiaqi Yan, Hideaki Ishii

    Abstract: In this paper, we consider the synchronization of heterogeneous pulse-coupled oscillators (PCOs), where some of the oscillators might be faulty or malicious. The oscillators interact through identical pulses at discrete instants and evolve continuously with different frequencies otherwise. Despite the presence of misbehaviors, benign oscillators aim to reach synchronization. To achieve this object… ▽ More

    Submitted 20 March, 2024; v1 submitted 18 March, 2024; originally announced March 2024.

  3. arXiv:2403.07640  [pdf, other

    cs.MA eess.SY

    Asynchronous Approximate Byzantine Consensus: A Multi-hop Relay Method and Tight Graph Conditions

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: We study a multi-agent resilient consensus problem, where some agents are of the Byzantine type and try to prevent the normal ones from reaching consensus. In our setting, normal agents communicate with each other asynchronously over multi-hop relay channels with delays. To solve this asynchronous Byzantine consensus problem, we develop the multi-hop weighted mean subsequence reduced (MW-MSR) algo… ▽ More

    Submitted 12 March, 2024; originally announced March 2024.

    Comments: arXiv admin note: text overlap with arXiv:2201.03214

  4. arXiv:2401.04556  [pdf, other

    physics.soc-ph eess.SY

    On a Discrete-Time Networked SIV Epidemic Model with Polar Opinion Dynamics

    Authors: Qiulin Xu, Hideaki Ishii

    Abstract: This paper studies novel epidemic spreading problems influenced by opinion evolution in social networks, where the opinions reflect the public health concerns. A coupled bilayer network is proposed, where the epidemics spread over several communities through a physical network layer while the opinions evolve over the same communities through a social network layer. The epidemic spreading process i… ▽ More

    Submitted 9 January, 2024; originally announced January 2024.

    Comments: 12 pages, 8 figures

  5. arXiv:2311.03911  [pdf, other

    eess.SP

    Distributed Parameter Estimation with Gaussian Observation Noises in Time-varying Digraphs

    Authors: Jiaqi Yan, Hideaki Ishii

    Abstract: In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. The sensors aim to infer the true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension… ▽ More

    Submitted 8 November, 2023; v1 submitted 7 November, 2023; originally announced November 2023.

  6. arXiv:2306.02017  [pdf, other

    eess.SY

    Resilient Distributed Parameter Estimation in Sensor Networks

    Authors: Jiaqi Yan, Kuo Li, Hideaki Ishii

    Abstract: In this paper, we study the problem of parameter estimation in a sensor network, where the measurements and updates of some sensors might be arbitrarily manipulated by adversaries. Despite the presence of such misbehaviors, normally behaving sensors make successive observations of an unknown $d$-dimensional vector parameter and aim to infer its true value by cooperating with their neighbors over a… ▽ More

    Submitted 3 June, 2023; originally announced June 2023.

  7. Dynamic quantized consensus under DoS attacks: Towards a tight zooming-out factor

    Authors: Shuai Feng, Maopeng Ran, Hideaki Ishii, Shengyuan Xu

    Abstract: This paper deals with dynamic quantized consensus of dynamical agents in a general form under packet losses induced by Denial-of-Service (DoS) attacks. The communication channel has limited bandwidth and hence the transmitted signals over the network are subject to quantization. To deal with agent's output, an observer is implemented at each node. The state of the observer is quantized by a finite… ▽ More

    Submitted 31 May, 2023; originally announced June 2023.

  8. arXiv:2303.11982  [pdf, other

    eess.SY

    Quantized Zero Dynamics Attacks against Sampled-data Control Systems

    Authors: Kosuke Kimura, Hideaki Ishii

    Abstract: For networked control systems, cyber-security issues have gained much attention in recent years. In this paper, we consider the so-called zero dynamics attacks, which form an important class of false data injection attacks, with a special focus on the effects of quantization in a sampled-data control setting. When the attack signals must be quantized, some error will be necessarily introduced, pot… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

    Comments: 8 pages

  9. arXiv:2303.11775  [pdf, other

    eess.SY

    Distributed Parameter Estimation under Gaussian Observation Noises

    Authors: Jiaqi Yan, Hideaki Ishii

    Abstract: In this paper, we consider the problem of distributed parameter estimation in sensor networks. Each sensor makes successive observations of an unknown $d$-dimensional parameter, which might be subject to Gaussian random noises. They aim to infer true value of the unknown parameter by cooperating with each other. To this end, we first generalize the so-called dynamic regressor extension and mixing… ▽ More

    Submitted 21 March, 2023; originally announced March 2023.

  10. arXiv:2301.11152  [pdf, ps, other

    eess.SY cs.GT cs.MA

    Cluster Forming of Multiagent Systems in Rolling Horizon Games with Non-uniform Horizons

    Authors: Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu

    Abstract: Consensus and cluster forming of multiagent systems in the face of jamming attacks along with reactive recovery actions by a defender are discussed. The attacker is capable to disable some of the edges of the network with the objective to divide the agents into a smaller size of clusters while, in response, the defender recovers some of the edges by increasing the transmission power. We consider r… ▽ More

    Submitted 26 January, 2023; originally announced January 2023.

    Comments: arXiv admin note: text overlap with arXiv:2301.03302

  11. arXiv:2301.03302  [pdf, ps, other

    eess.SY cs.GT cs.MA

    A Rolling Horizon Game Considering Network Effect in Cluster Forming for Dynamic Resilient Multiagent Systems

    Authors: Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu

    Abstract: A two-player game-theoretic problem on resilient graphs in a multiagent consensus setting is formulated. An attacker is capable to disable some of the edges of the network with the objective to divide the agents into clusters by emitting jamming signals while, in response, the defender recovers some of the edges by increasing the transmission power for the communication signals. Specifically, we c… ▽ More

    Submitted 9 January, 2023; originally announced January 2023.

  12. arXiv:2212.01570  [pdf, ps, other

    eess.SY cs.GT

    Two-Player Incomplete Games of Resilient Multiagent Systems

    Authors: Yurid Nugraha, Tomohisa Hayakawa, Hideaki Ishii, Ahmet Cetinkaya, Quanyan Zhu

    Abstract: Evolution of agents' dynamics of multiagent systems under consensus protocol in the face of jamming attacks is discussed, where centralized parties are able to influence the control signals of the agents. In this paper we focus on a game-theoretical approach of multiagent systems where the players have incomplete information on their opponents' strength. We consider repeated games with both simult… ▽ More

    Submitted 11 March, 2023; v1 submitted 3 December, 2022; originally announced December 2022.

    Comments: 9 pages, 6 figures. Accepted in IFAC-WC 2023

  13. arXiv:2210.04169  [pdf, ps, other

    eess.SY

    A State Feedback Controller for Mitigation of Continuous-Time Networked SIS Epidemics

    Authors: Yuan Wang, Sebin Gracy, César A. Uribe, Hideaki Ishii, Karl Henrik Johansson

    Abstract: The paper considers continuous-time networked susceptible-infected-susceptible (SIS) diseases spreading over a population. Each agent represents a sub-population and has its own healing rate and infection rate; the state of the agent at a time instant denotes what fraction of the said sub-population is infected with the disease at the said time instant. By taking account of the changes in behavior… ▽ More

    Submitted 9 October, 2022; originally announced October 2022.

  14. arXiv:2205.06612  [pdf, ps, other

    eess.SY

    Event-Based Control for Synchronization of Stochastic Linear Systems with Application to Distributed Estimation

    Authors: Jiaqi Yan, Yilin Mo, Hideaki Ishii

    Abstract: This paper studies the synchronization of stochastic linear systems which are subject to a general class of noises, in the sense that the noises are bounded in covariance but might be correlated with the states of agents and among each other. We propose an event-based control protocol for achieving the synchronization among agents in the mean square sense and theoretically analyze the performance… ▽ More

    Submitted 13 May, 2022; originally announced May 2022.

    Comments: arXiv admin note: text overlap with arXiv:2204.03364

  15. Event-triggered Approximate Byzantine Consensus with Multi-hop Communication

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: In this paper, we consider a resilient consensus problem for the multi-agent network where some of the agents are subject to Byzantine attacks and may transmit erroneous state values to their neighbors. In particular, we develop an event-triggered update rule to tackle this problem as well as reduce the communication for each agent. Our approach is based on the mean subsequence reduced (MSR) algor… ▽ More

    Submitted 19 April, 2022; originally announced April 2022.

    Comments: arXiv admin note: text overlap with arXiv:2201.03214

  16. arXiv:2204.03364  [pdf, other

    eess.SY

    A Framework for Distributed Estimation with Reduced Communication via Event-Based Strategies

    Authors: Jiaqi Yan, Yilin Mo, Hideaki Ishii

    Abstract: This paper considers the problem of distributed estimation in a sensor network, where multiple sensors are deployed to infer the state of a linear time-invariant (LTI) Gaussian system. By proposing a lossless decomposition of Kalman filter, a framework of event-based distributed estimation is developed, where each sensor node runs a local filter using solely its own measurement, alongside with an… ▽ More

    Submitted 17 April, 2022; v1 submitted 7 April, 2022; originally announced April 2022.

  17. arXiv:2204.02627  [pdf, ps, other

    eess.SY

    Cluster Synchronization of Kuramoto Oscillators and the Method of Averaging

    Authors: Rui Kato, Hideaki Ishii

    Abstract: Rigorous conditions for cluster synchronization of Kuramoto oscillators are presented. The method of averaging plays an important role in stability analysis, but the standard Lyapunov's second method is not applicable due to the lack of uniform continuity. This paper contributes to overcoming this difficulty with the help of nonmonotonic Lyapunov functions. Our extensions of averaging in stability… ▽ More

    Submitted 9 September, 2023; v1 submitted 6 April, 2022; originally announced April 2022.

  18. arXiv:2201.03214  [pdf, other

    cs.MA cs.DC eess.SY

    Resilient Consensus with Multi-hop Communication

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algor… ▽ More

    Submitted 10 January, 2022; originally announced January 2022.

  19. arXiv:2106.00122  [pdf, ps, other

    eess.SY

    Suppressing the endemic equilibrium in SIS epidemics: A state dependent approach

    Authors: Yuan Wang, Sebin Gracy, Hideaki Ishii, Karl Henrik Johansson

    Abstract: This paper considers the susceptible-infected-susceptible (SIS) epidemic model with an underlying network structure among subpopulations and focuses on the effect of social distancing to regulate the epidemic level. We demonstrate that if each subpopulation is informed of its infection rate and reduces interactions accordingly, the fraction of the subpopulation infected can remain below half for a… ▽ More

    Submitted 6 August, 2021; v1 submitted 31 May, 2021; originally announced June 2021.

  20. arXiv:2104.04333  [pdf, ps, other

    eess.SY math.OC

    Quantized State Feedback Stabilization of Nonlinear Systems under Denial-of-Service

    Authors: Mingming Shi, Shuai Feng, Hideaki Ishii

    Abstract: This paper studies the resilient control of networked systems in the presence of cyber attacks. In particular, we consider the state feedback stabilization problem for nonlinear systems when the state measurement is sent to the controller via a communication channel that only has a finite transmitting rate and is moreover subject to cyber attacks in the form of Denial-of-Service (DoS). We use a dy… ▽ More

    Submitted 9 April, 2021; originally announced April 2021.

    Comments: 13 pages, 2 figures, A short version has been accepted in a conference

  21. arXiv:2101.05087  [pdf, other

    eess.SY

    Secure Consensus with Distributed Detection via Two-hop Communication

    Authors: Liwei Yuan, Hideaki Ishii

    Abstract: In this paper, we consider a multi-agent resilient consensus problem, where some of the nodes may behave maliciously. The approach is to equip all nodes with a scheme to detect neighboring nodes when they behave in an abnormal fashion. To this end, the nodes exchange not only their own states but also information regarding their neighbor nodes. Such two-hop communication has long been studied in f… ▽ More

    Submitted 13 January, 2021; originally announced January 2021.

    Comments: 15 pages

  22. arXiv:2012.13757  [pdf, ps, other

    eess.SY cs.DC

    Resilient Consensus for Multi-Agent Systems under Adversarial Spreading Processes

    Authors: Yuan Wang, Hideaki Ishii, François Bonnet, Xavier Défago

    Abstract: This paper addresses novel consensus problems for multi-agent systems operating in an unreliable environment where adversaries are spreading. The dynamics of the adversarial spreading processes follows the susceptible-infected-recovered (SIR) model, where the infection induces faulty behaviors in the agents and affects their state values. Such a problem setting serves as a model of opinion dynamic… ▽ More

    Submitted 11 January, 2022; v1 submitted 26 December, 2020; originally announced December 2020.

    Comments: 16 pages, 15 figures

  23. arXiv:2012.13158  [pdf, other

    eess.SY

    Resilient Self/Event-Triggered Consensus Based on Ternary Control

    Authors: Hiroki Matsume, Yuan Wang, Hideaki Ishii

    Abstract: The paper considers the problem of multi-agent consensus in the presence of adversarial agents which may try to prevent and introduce undesired influence on the coordination among the regular agents. To our setting, we extend the so-called mean subsequence reduced algorithms with the aim to reduce the amount of communication via two measures: The agents exchange information in the form of ternary… ▽ More

    Submitted 24 December, 2020; originally announced December 2020.

    Comments: IEEE Conference on Decision and Control to appear, 2020

  24. arXiv:2012.06273  [pdf, ps, other

    eess.SY

    Linearization-Based Quantized Stabilization of Nonlinear Systems Under DoS Attacks

    Authors: Rui Kato, Ahmet Cetinkaya, Hideaki Ishii

    Abstract: Motivated by recent security issues in cyber-physical systems, this technical note studies the stabilization problem of networked control systems under Denial-of-Service (DoS) attacks. In particular, we consider to stabilize a nonlinear system with limited data rate via linearization. We employ a deterministic DoS attack model constrained in terms of attacks' frequency and duration, allowing us to… ▽ More

    Submitted 11 December, 2020; originally announced December 2020.

  25. arXiv:2006.11711  [pdf, ps, other

    eess.SY cs.DC

    Resilient Consensus Against Mobile Malicious Agents

    Authors: Yuan Wang, Hideaki Ishii, François Bonnet, Xavier Défago

    Abstract: This paper addresses novel consensus problems in the presence of adversaries that can move within the network and induce faulty behaviors in the attacked agents. By adopting several mobile adversary models from the computer science literature, we develop protocols which can mitigate the influence of such malicious agents. The algorithms follow the class of mean subsequence reduced (MSR) algorithms… ▽ More

    Submitted 21 June, 2020; originally announced June 2020.

  26. arXiv:2004.13815  [pdf, ps, other

    eess.SY cs.MA

    Dynamic Quantized Consensus of General Linear Multi-agent Systems under Denial-of-Service Attacks

    Authors: Shuai Feng, Hideaki Ishii

    Abstract: In this paper, we study multi-agent consensus problems under Denial-of-Service (DoS) attacks with data rate constraints. We first consider the leaderless consensus problem and after that we briefly present the analysis of leader-follower consensus. The dynamics of the agents take general forms modeled as homogeneous linear time-invariant systems. In our analysis, we derive lower bounds on the data… ▽ More

    Submitted 21 November, 2021; v1 submitted 28 April, 2020; originally announced April 2020.

  27. Dynamic Resilient Network Games with Applications to Multi-Agent Consensus

    Authors: Yurid Nugraha, Ahmet Cetinkaya, Tomohisa Hayakawa, Hideaki Ishii, Quanyan Zhu

    Abstract: A cyber security problem in a networked system formulated as a resilient graph problem based on a game-theoretic approach is considered. The connectivity of the underlying graph of the network system is reduced by an attacker who removes some of the edges whereas the defender attempts to recover them. Both players are subject to energy constraints so that their actions are restricted and cannot be… ▽ More

    Submitted 7 July, 2020; v1 submitted 30 March, 2020; originally announced March 2020.

    Comments: 12 pages, 13 figures

    Journal ref: IEEE Transactions on Control of Network Systems, vol. 8, pp: 246-259, 2021

  28. arXiv:1911.06736  [pdf, ps, other

    eess.SY math.OC

    Actuation attacks on constrained linear systems: a set-theoretic analysis

    Authors: P. A. Trodden, J. M. Maestre, H. Ishii

    Abstract: This paper considers a constrained discrete-time linear system subject to actuation attacks. The attacks are modelled as false data injections to the system, such that the total input (control input plus injection) satisfies hard input constraints. We establish a sufficient condition under which it is not possible to maintain the states of the system within a compact state constraint set for all p… ▽ More

    Submitted 15 November, 2019; originally announced November 2019.

    Comments: Submitted to the 21st IFAC World Congress (IFAC 2020)

  29. arXiv:1909.01999  [pdf, other

    eess.SY cs.IT cs.RO math.OC

    Two-Way Coding and Attack Decoupling in Control Systems Under Injection Attacks

    Authors: Song Fang, Karl Henrik Johansson, Mikael Skoglund, Henrik Sandberg, Hideaki Ishii

    Abstract: In this paper, we introduce the concept of two-way coding, which originates in communication theory characterizing coding schemes for two-way channels, into control theory, particularly to facilitate the analysis and design of feedback control systems under injection attacks. Moreover, we propose the notion of attack decoupling, and show how the controller and the two-way coding can be co-designed… ▽ More

    Submitted 4 September, 2019; originally announced September 2019.

    Comments: arXiv admin note: text overlap with arXiv:1901.05420

  30. arXiv:1908.01059  [pdf, other

    cs.LG cs.CR cs.DC cs.MA eess.SY stat.ML

    Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation

    Authors: Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen

    Abstract: With the proliferation of training data, distributed machine learning (DML) is becoming more competent for large-scale learning tasks. However, privacy concerns have to be given priority in DML, since training data may contain sensitive information of users. In this paper, we propose a privacy-preserving ADMM-based DML framework with two novel features: First, we remove the assumption commonly mad… ▽ More

    Submitted 9 September, 2019; v1 submitted 30 July, 2019; originally announced August 2019.

  31. arXiv:1907.09979  [pdf, ps, other

    eess.SY

    Efficient PageRank Computation via Distributed Algorithms with Web Clustering

    Authors: Atsushi Suzuki, Hideaki Ishii

    Abstract: PageRank is a well-known centrality measure for the web used in search engines, representing the importance of each web page. In this paper, we follow the line of recent research on the development of distributed algorithms for computation of PageRank, where each page computes its own PageRank value by interacting with pages connected over hyperlinks. Our approach is novel in that it is based on a… ▽ More

    Submitted 23 July, 2019; originally announced July 2019.

    Comments: 16 pages, 8 figures

  32. arXiv:1904.04765  [pdf, ps, other

    cs.IT cs.LG eess.SP math.ST stat.ML

    Generic Variance Bounds on Estimation and Prediction Errors in Time Series Analysis: An Entropy Perspective

    Authors: Song Fang, Mikael Skoglund, Karl Henrik Johansson, Hideaki Ishii, Quanyan Zhu

    Abstract: In this paper, we obtain generic bounds on the variances of estimation and prediction errors in time series analysis via an information-theoretic approach. It is seen in general that the error bounds are determined by the conditional entropy of the data point to be estimated or predicted given the side information or past observations. Additionally, we discover that in order to achieve the predict… ▽ More

    Submitted 11 May, 2021; v1 submitted 9 April, 2019; originally announced April 2019.

  33. arXiv:1901.05420  [pdf, other

    eess.SY eess.SP math.OC

    Two-Way Coding in Control Systems Under Injection Attacks: From Attack Detection to Attack Correction

    Authors: Song Fang, Karl Henrik Johansson, Mikael Skoglund, Henrik Sandberg, Hideaki Ishii

    Abstract: In this paper, we introduce the method of two-way coding, a concept originating in communication theory characterizing coding schemes for two-way channels, into (networked) feedback control systems under injection attacks. We first show that the presence of two-way coding can distort the perspective of the attacker on the control system. In general, the distorted viewpoint on the attacker side as… ▽ More

    Submitted 17 January, 2019; v1 submitted 16 January, 2019; originally announced January 2019.

  34. arXiv:1811.00691  [pdf, ps, other

    eess.SY

    Resilient Consensus Through Event-based Communication

    Authors: Yuan Wang, Hideaki Ishii

    Abstract: We consider resilient versions of discrete-time multi-agent consensus in the presence of faulty or even malicious agents in the network. In particular, we develop event-triggered update rules which can mitigate the influence of the malicious agents and at the same time reduce the necessary communication. Each regular agent updates its state based on a given rule using its neighbors' information. O… ▽ More

    Submitted 17 June, 2019; v1 submitted 1 November, 2018; originally announced November 2018.

    Comments: 11 pages

  35. arXiv:1809.05448  [pdf, other

    eess.SY

    Resilient Distributed Energy Management for Systems of Interconnected Microgrids

    Authors: Wicak Ananduta, José María Maestre, Carlos Ocampo-Martinez, Hideaki Ishii

    Abstract: In this paper, distributed energy management of interconnected microgrids, which is stated as a dynamic economic dispatch problem, is studied. Since the distributed approach requires cooperation of all local controllers, when some of them do not comply with the distributed algorithm that is applied to the system, the performance of the system might be compromised. Specifically, it is considered th… ▽ More

    Submitted 14 September, 2018; originally announced September 2018.

    Comments: 8 pages, Conference on Decision and Control (CDC) 2018

  36. arXiv:1809.04892  [pdf, other

    eess.SY

    Data Rates for Stabilizing Control under Denial-of-Service Attacks

    Authors: Shuai Feng, Ahmet Cetinkaya, Hideaki Ishii, Pietro Tesi, Claudio De Persis

    Abstract: We study communication-constrained networked control problems for linear time-invariant systems in the presence of Denial-of-Service (DoS) attacks, namely attacks that prevent transmissions over the communication network. Our work aims at exploring the relationship between system resilience and network bandwidth capacity. Given a class of DoS attacks, we first characterize time-invariant bit-rate… ▽ More

    Submitted 13 September, 2018; originally announced September 2018.

  37. arXiv:1807.08604  [pdf, other

    eess.SY cs.RO eess.SP math.OC

    A Frequency-Domain Characterization of Optimal Error Covariance for the Kalman-Bucy Filter

    Authors: Song Fang, Hideaki Ishii, Jie Chen, Karl Henrik Johansson

    Abstract: In this paper, we discover that the trace of the division of the optimal output estimation error covariance over the noise covariance attained by the Kalman-Bucy filter can be explicitly expressed in terms of the plant dynamics and noise statistics in a frequency-domain integral characterization. Towards this end, we examine the algebraic Riccati equation associated with Kalman-Bucy filtering usin… ▽ More

    Submitted 23 July, 2018; originally announced July 2018.

  38. arXiv:1802.01815  [pdf, ps, other

    eess.SY

    Effects of Jamming Attacks on Wireless Networked Control Systems Under Disturbance

    Authors: Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa

    Abstract: Jamming attacks on wireless networked control systems are investigated for the scenarios where the system dynamics face exogenous disturbance. In particular, the control input packets are assumed to be transmitted from a controller to a remotely located linear plant over an insecure wireless communication channel that is subject to jamming attacks. The time-varying likelihood of transmission failu… ▽ More

    Submitted 6 March, 2022; v1 submitted 6 February, 2018; originally announced February 2018.

    Comments: Improve wording; Correct typos

  39. arXiv:1802.01281  [pdf, ps, other

    eess.SY

    Randomized Transmission Protocols for Protection against Jamming Attacks in Multi-Agent Consensus

    Authors: Ahmet Cetinkaya, Kaito Kikuchi, Tomohisa Hayakawa, Hideaki Ishii

    Abstract: Multi-agent consensus under jamming attacks is investigated. Specifically, inter-agent communications over a network are assumed to fail at certain times due to jamming of transmissions by a malicious attacker. A new stochastic communication protocol is proposed to achieve finite-time practical consensus between agents. In this protocol, communication attempt times of agents are randomized and unk… ▽ More

    Submitted 3 December, 2019; v1 submitted 5 February, 2018; originally announced February 2018.

    Comments: Improved control law explanations and the numerical example

  40. arXiv:1711.06855  [pdf, ps, other

    eess.SY

    A Probabilistic Characterization of Random and Malicious Communication Failures in Multi-Hop Networked Control

    Authors: Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa

    Abstract: The control problem of a linear discrete-time dynamical system over a multi-hop network is explored. The network is assumed to be subject to packet drops by malicious and nonmalicious nodes as well as random and malicious data corruption issues. We utilize asymptotic tail-probability bounds of transmission failure ratios to characterize the links and paths of a network as well as the network itsel… ▽ More

    Submitted 21 September, 2018; v1 submitted 18 November, 2017; originally announced November 2017.

    Comments: Correct typos in Sections 3-6. Make changes in the proofs of Theorems 3.4 and 4.3

  41. arXiv:1710.06994  [pdf, ps, other

    eess.SY

    Resilient Randomized Quantized Consensus

    Authors: Seyed Mehran Dibaji, Hideaki Ishii, Roberto Tempo

    Abstract: We consider the problem of multi-agent consensus where some agents are subject to faults/attacks and might make updates arbitrarily. The network consists of agents taking integer-valued (i.e., quantized) states under directed communication links. The goal of the healthy normal agents is to form consensus in their state values, which may be disturbed by the non-normal, malicious agents. We develop… ▽ More

    Submitted 18 October, 2017; originally announced October 2017.

    Comments: 15 pages, 13 figures

  42. arXiv:1709.08149  [pdf, other

    eess.SY cs.CR

    Stabilization of Networked Control Systems under DoS Attacks and Output Quantization

    Authors: Masashi Wakaiki, Ahmet Cetinkaya, Hideaki Ishii

    Abstract: This paper addresses quantized output feedback stabilization under Denial-of-Service (DoS) attacks. First, assuming that the duration and frequency of DoS attacks are averagely bounded and that an initial bound of the plant state is known, we propose an output encoding scheme that achieves exponential convergence with finite data rates. Next we show that a suitable state transformation allows us t… ▽ More

    Submitted 10 August, 2018; v1 submitted 24 September, 2017; originally announced September 2017.

    Comments: We have added new results in Sections 3.6 and 4

  43. arXiv:1704.07647  [pdf, ps, other

    eess.SY

    Analysis of Stochastic Switched Systems with Application to Networked Control Under Jamming Attacks

    Authors: Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa

    Abstract: We investigate the stability problem for discrete-time stochastic switched linear systems under the specific scenarios where information about the switching patterns and the probability of switches are not available. Our analysis focuses on the average number of times each mode becomes active in the long run and, in particular, utilizes their lower- and upper-bounds. This setup is motivated by cyb… ▽ More

    Submitted 20 April, 2018; v1 submitted 25 April, 2017; originally announced April 2017.

    Comments: Change title of Section 3; Resize figures

  44. arXiv:1701.03430  [pdf, other

    eess.SY

    Resilient Consensus of Second-Order Agent Networks: Asynchronous Update Rules with Delays

    Authors: Seyed Mehran Dibaji, Hideaki Ishii

    Abstract: We study the problem of resilient consensus of sampled-data multi-agent networks with double-integrator dynamics. The term resilient points to algorithms considering the presence of attacks by faulty/malicious agents in the network. Each normal agent updates its state based on a predetermined control law using its neighbors' information which may be delayed while misbehaving agents make updates ar… ▽ More

    Submitted 13 January, 2017; v1 submitted 12 January, 2017; originally announced January 2017.

  45. arXiv:1606.05245  [pdf, ps, other

    eess.SY

    Networked Control under Random and Malicious Packet Losses

    Authors: Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa

    Abstract: We study cyber security issues in networked control of a linear dynamical system. Specifically, the dynamical system and the controller are assumed to be connected through a communication channel that face malicious attacks as well as random packet losses due to unreliability of transmissions. We provide a probabilistic characterization for the link failures which allows us to study combined effec… ▽ More

    Submitted 16 June, 2016; originally announced June 2016.

  46. arXiv:1506.03518  [pdf, ps, other

    eess.SY

    Stabilization of uncertain systems using quantized and lossy observations and uncertain control inputs

    Authors: Kunihisa Okano, Hideaki Ishii

    Abstract: In this paper, we consider a stabilization problem of an uncertain system in a networked control setting. Due to the network, the measurements are quantized to finite-bit signals and may be randomly lost in the communication. We study uncertain autoregressive systems whose state and input parameters vary within given intervals. We derive conditions for making the plant output to be mean square sta… ▽ More

    Submitted 6 March, 2017; v1 submitted 10 June, 2015; originally announced June 2015.

  47. arXiv:1503.06980  [pdf, ps, other

    eess.SY

    Event-Triggered Control over Unreliable Networks Subject to Jamming Attacks

    Authors: Ahmet Cetinkaya, Hideaki Ishii, Tomohisa Hayakawa

    Abstract: Event-triggered networked control of a linear dynamical system is investigated. Specifically, the dynamical system and the controller are assumed to be connected through a communication channel. State and control input information packets between the system and the controller are attempted to be exchanged over the network only at time instants when certain triggering conditions are satisfied. We p… ▽ More

    Submitted 15 March, 2016; v1 submitted 24 March, 2015; originally announced March 2015.

    Comments: Presented at IEEE CDC 2015; Corrected author names in references [7],[11]; Corrected ranges of rho and tilde{p} in Lemma A.1; Corrected indices in (51)

  48. arXiv:1405.5932  [pdf, ps, other

    eess.SY

    Minimum data rate for stabilization of linear systems with parametric uncertainties

    Authors: Kunihisa Okano, Hideaki Ishii

    Abstract: We study a stabilization problem of linear uncertain systems with parametric uncertainties via feedback control over data-rate-constrained channels. The objective is to find the limitation on the amount of information that must be conveyed through the channels for achieving stabilization and in particular how the plant uncertainties affect it. We derive a necessary condition and a sufficient condi… ▽ More

    Submitted 22 May, 2014; originally announced May 2014.

  49. arXiv:1312.1904  [pdf, ps, other

    eess.SY

    The PageRank Problem, Multi-Agent Consensus and Web Aggregation -- A Systems and Control Viewpoint

    Authors: Hideaki Ishii, Roberto Tempo

    Abstract: PageRank is an algorithm introduced in 1998 and used by the Google Internet search engine. It assigns a numerical value to each element of a set of hyperlinked documents (that is, web pages) within the World Wide Web with the purpose of measuring the relative importance of the page. The key idea in the algorithm is to give a higher PageRank value to web pages which are visited often by web surfers… ▽ More

    Submitted 6 December, 2013; originally announced December 2013.

  50. arXiv:1309.1349  [pdf, ps, other

    eess.SY

    Ergodic Randomized Algorithms and Dynamics over Networks

    Authors: Chiara Ravazzi, Paolo Frasca, Roberto Tempo, Hideaki Ishii

    Abstract: Algorithms and dynamics over networks often involve randomization, and randomization may result in oscillating dynamics which fail to converge in a deterministic sense. In this paper, we observe this undesired feature in three applications, in which the dynamics is the randomized asynchronous counterpart of a well-behaved synchronous one. These three applications are network localization, PageRank… ▽ More

    Submitted 16 December, 2013; v1 submitted 5 September, 2013; originally announced September 2013.

    Comments: 11 pages; submitted for publication. revised version with fixed technical flaw and updated references