Graph-theoretic approaches for analyzing the resilience of distributed control systems: A tutorial and survey

被引:11
作者
Pirani, Mohammad [1 ]
Mitra, Aritra [2 ]
Sundaram, Shreyas [3 ]
机构
[1] Univ Ottawa, Dept Mech Engn, Ottawa, ON, Canada
[2] Univ Penn, Dept Elect & Syst Engn, Philadelphia, PA USA
[3] Purdue Univ, Elmore Family Sch Elect & Comp Engn, W Lafayette, IN USA
关键词
Distributed control systems; Graph theory; Resilient distributed algorithms; CYBER-PHYSICAL SYSTEMS; REACHING APPROXIMATE AGREEMENT; STRUCTURAL CONTROLLABILITY; PARAMETER ESTIMATION; EFFECTIVE RESISTANCE; INTRUSION DETECTION; MULTIAGENT SYSTEMS; FAILURE-DETECTION; SENSOR SELECTION; FEEDBACK-CONTROL;
D O I
10.1016/j.automatica.2023.111264
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
As the scale of distributed control systems over networks increases and interactions between different subsystems become more sophisticated, questions of the resilience of such networks to attacks and faults increase in importance. The need to adapt (and redefine) classical system and control-theoretic notions to answer such questions using the language of graphs has recently started to gain attention as a fertile and important area of research. This paper presents an overview of graph-theoretic methods for analyzing the resilience of distributed control systems. We survey distributed algorithms that have been proposed to solve a variety of problems in networked systems, and summarize their resilience against adversarial actions in the context of the structure of the underlying networks. We also discuss graph-theoretic methods to quantify the attack impact, and reinterpret some system-theoretic notions of robustness from a graph-theoretic standpoint to mitigate the impact of the attacks. We conclude by introducing some avenues for further research in this field.& COPY; 2023 Elsevier Ltd. All rights reserved.
引用
收藏
页数:34
相关论文
共 264 条
[1]  
Abbas W, 2020, IEEE DECIS CONTR P, P3127, DOI 10.1109/CDC42340.2020.9304098
[2]  
Abbas W, 2020, P AMER CONTR CONF, P2544, DOI [10.23919/ACC45564.2020.9147656, 10.23919/acc45564.2020.9147656]
[3]   Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus [J].
Abbas, Waseem ;
Laszka, Aron ;
Koutsoukos, Xenofon .
IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2018, 5 (04) :2036-2048
[4]  
Abdelrazek M, 2010, 2010 AS PAC CLOUD WO, V50, P37
[5]  
Aji S, 2014, Estimating reachability set sizes in dynamic graphs
[6]   Error and attack tolerance of complex networks [J].
Albert, R ;
Jeong, H ;
Barabási, AL .
NATURE, 2000, 406 (6794) :378-382
[7]   Security Games for Vehicular Networks [J].
Alpcan, Tansu ;
Buchegger, Sonja .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2011, 10 (02) :280-290
[8]   Control Barrier Function Based Quadratic Programs for Safety Critical Systems [J].
Ames, Aaron D. ;
Xu, Xiangru ;
Grizzle, Jessy W. ;
Tabuada, Paulo .
IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2017, 62 (08) :3861-3876
[9]   Byzantine-resilient distributed state estimation: A min-switching approach [J].
An, Liwei ;
Yang, Guang-Hong .
AUTOMATICA, 2021, 129
[10]  
[Anonymous], 2013, P 2013 ACM S PRINCIP