Consensus Computation in Unreliable Networks: A System Theoretic Approach

被引:360
作者
Pasqualetti, Fabio [1 ]
Bicchi, Antonio [2 ]
Bullo, Francesco [1 ]
机构
[1] Univ Calif Santa Barbara, Ctr Control Dynam Syst & Computat, Santa Barbara, CA 93106 USA
[2] Univ Pisa, Ctr IR E Piaggio, I-56100 Pisa, Italy
关键词
Autonomous agents; consensus algorithms; distributed control; fault detection; intrusion detection; multi-agent systems; network topology; network theory (graphs); sensor networks; GENERIC PROPERTIES; LINEAR ITERATIONS; AGENTS;
D O I
10.1109/TAC.2011.2158130
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper addresses the problem of ensuring trustworthy computation in a linear consensus network. A solution to this problem is relevant for several tasks in multi-agent systems including motion coordination, clock synchronization, and cooperative estimation. In a linear consensus network, we allow for the presence of misbehaving agents, whose behavior deviate from the nominal consensus evolution. We model misbehaviors as unknown and unmeasurable inputs affecting the network, and we cast the misbehavior detection and identification problem into an unknown-input system theoretic framework. We consider two extreme cases of misbehaving agents, namely faulty (non-colluding) and malicious (Byzantine) agents. First, we characterize the set of inputs that allow misbehaving agents to affect the consensus network while remaining undetected and/or unidentified from certain observing agents. Second, we provide worst-case bounds for the number of concurrent faulty or malicious agents that can be detected and identified. Precisely, the consensus network needs to be 2k + 1 (resp. k + 1) connected for k malicious (resp. faulty) agents to be generically detectable and identifiable by every well behaving agent. Third, we quantify the effect of undetectable inputs on the final consensus value. Fourth, we design three algorithms to detect and identify misbehaving agents. The first and the second algorithm apply fault detection techniques, and affords complete detection and identification if global knowledge of the network is available to each agent, at a high computational cost. The third algorithm is designed to exploit the presence in the network of weakly interconnected subparts, and provides local detection and identification of misbehaving agents whose behavior deviates more than a threshold, which is quantified in terms of the interconnection structure.
引用
收藏
页码:90 / 104
页数:15
相关论文
共 30 条
[1]  
[Anonymous], 1997, Distributed Algorithms
[2]  
[Anonymous], 1988, MULTIVARIABLE CONTRO
[3]  
[Anonymous], 2001, ALGEBRAIC GRAPH THEO, DOI DOI 10.1007/978-1-4613-0163-9
[4]  
[Anonymous], 2000, MATRIX ANAL APPL LIN
[5]  
Basile G., 1991, Controlled and Conditioned Invariants in Linear Systems Theory
[6]   Area aggregation and time-scale modeling for sparse nonlinear networks [J].
Biyik, Emrah ;
Arcak, Murat .
SYSTEMS & CONTROL LETTERS, 2008, 57 (02) :142-149
[7]  
Bullo F., 2009, Lectures on Network Systems
[8]   A SPARSITY-BASED TECHNIQUE FOR IDENTIFYING SLOW-COHERENT AREAS IN LARGE POWER-SYSTEMS [J].
CHOW, JH ;
CULLUM, J ;
WILLOUGHBY, RA .
IEEE TRANSACTIONS ON POWER APPARATUS AND SYSTEMS, 1984, 103 (03) :463-473
[9]   Generic properties and control of linear structured systems: a survey [J].
Dion, JM ;
Commault, C ;
van der Woude, J .
AUTOMATICA, 2003, 39 (07) :1125-1144
[10]   THE BYZANTINE GENERALS STRIKE AGAIN [J].
DOLEV, D .
JOURNAL OF ALGORITHMS, 1982, 3 (01) :14-30