Low complexity resilient consensus in networked multi-agent systems with adversaries

Recently, many applications have arisen in distributed control that require consensus protocols. Concurrently, we have seen a proliferation of malicious attacks on large-scale distributed systems. Hence, there is a need for (i) consensus problems that take into consideration the presence of adversaries and specify correct behavior through appropriate conditions on agreement and safety, and (ii) algorithms for distributed control applications that solve such consensus problems resiliently despite breaches in security. This paper addresses these issues by (i) defining the adversarial asymptotic agreement problem, which requires that the uncompromised agents asymptotically align their states while satisfying an invariant condition in the presence of adversaries, and (ii) by designing a low complexity consensus protocol, the Adversarial Robust Consensus Protocol (ARC-P), which combines ideas from distributed computing and cooperative control. Two types of omniscient adversaries are considered: (i) Byzantine agents can convey different state trajectories to different neighbors in the network, and (ii) malicious agents must convey the same information to each neighbor. For each type of adversary, sufficient conditions are provided that ensure ARC-P guarantees the agreement and safety conditions in static and switching network topologies, whenever the number of adversaries in the network is bounded by a constant. The conservativeness of the conditions is examined, and the conditions are compared to results in the literature.

[1]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part I: Attacking the network , 2008, 2008 American Control Conference.

[2]  R.M. Murray,et al.  On the robustness of distributed algorithms , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[3]  Antonio Bicchi,et al.  Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.

[4]  Jean-Jacques E. Slotine,et al.  Contraction analysis of time-delayed communications and group cooperation , 2006, IEEE Transactions on Automatic Control.

[5]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[6]  Antonio Bicchi,et al.  Dynamic distributed intrusion detection for secure multi-robot systems , 2009, 2009 IEEE International Conference on Robotics and Automation.

[7]  Maria Gradinariu Potop-Butucaru,et al.  Byzantine Convergence in Robot Networks: The Price of Asynchrony , 2009, OPODIS.

[8]  Noa Agmon,et al.  Fault-tolerant gathering algorithms for autonomous mobile robots , 2004, SODA '04.

[9]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[10]  Antonio Bicchi,et al.  Identifying cyber attacks via local model information , 2010, 49th IEEE Conference on Decision and Control (CDC).

[11]  Ιωαννησ Τσιτσικλησ,et al.  PROBLEMS IN DECENTRALIZED DECISION MAKING AND COMPUTATION , 1984 .

[12]  M. Haenggi,et al.  Power-delay analysis of consensus algorithms on wireless networks with interference , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.

[13]  S. Bhat,et al.  On robust control algorithms for nonlinear network consensus protocols , 2008, 2008 American Control Conference.

[14]  Vijay Kumar,et al.  Leader-to-formation stability , 2004, IEEE Transactions on Robotics and Automation.

[15]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[16]  M. Spong,et al.  Agreement with non-uniform information delays , 2006, 2006 American Control Conference.

[17]  Antonio Bicchi,et al.  Consensus-based distributed intrusion detection for multi-robot systems , 2008, 2008 IEEE International Conference on Robotics and Automation.

[18]  Franco Blanchini,et al.  Set invariance in control , 1999, Autom..

[19]  Seif Haridi,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[20]  Richard M. Murray,et al.  Approximate distributed Kalman filtering in sensor networks with quantifiable performance , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[21]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[22]  Franco Blanchini,et al.  Set-theoretic methods in control , 2007 .

[23]  Nancy A. Lynch,et al.  Self-stabilizing robot formations over unreliable networks , 2009, TAAS.

[24]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[25]  Antonio Bicchi,et al.  Decentralized Cooperative Policy for Conflict Resolution in Multivehicle Systems , 2007, IEEE Transactions on Robotics.

[26]  N. Rouche,et al.  Stability Theory by Liapunov's Direct Method , 1977 .

[27]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[28]  André Teixeira,et al.  Networked control systems under cyber attacks with applications to power networks , 2010, Proceedings of the 2010 American Control Conference.

[29]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior , 2008, 2008 American Control Conference.

[30]  Giuseppe Prencipe,et al.  CORDA : distributed coordination of a set of autonomous mobile robots , 2001 .

[31]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.

[32]  René Vidal,et al.  Consensus with robustness to outliers via distributed optimization , 2010, 49th IEEE Conference on Decision and Control (CDC).

[33]  Antonio Bicchi,et al.  On the security of linear consensus networks , 2009, Proceedings of the 48h IEEE Conference on Decision and Control (CDC) held jointly with 2009 28th Chinese Control Conference.

[34]  G. Dini,et al.  Tolerating, Malicious Monitors in Detecting Misbehaving Robots , 2008, 2008 IEEE International Workshop on Safety, Security and Rescue Robotics.

[35]  Masafumi Yamashita,et al.  Distributed Anonymous Mobile Robots: Formation of Geometric Patterns , 1999, SIAM J. Comput..

[36]  Taylor T. Johnson,et al.  Safe Flocking in Spite of Actuator Faults using Directional Failure Detectors , 2011 .

[37]  Stephen P. Boyd,et al.  A scheme for robust distributed sensor fusion based on average consensus , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[38]  Daniel Liberzon,et al.  Switching in Systems and Control , 2003, Systems & Control: Foundations & Applications.

[39]  M. Degroot Reaching a Consensus , 1974 .

[40]  J. Shamma,et al.  Belief consensus and distributed hypothesis testing in sensor networks , 2006 .

[41]  John S. Baras,et al.  Average consensus over small world networks: A probabilistic framework , 2008, 2008 47th IEEE Conference on Decision and Control.

[42]  R. Olfati-Saber Ultrafast consensus in small-world networks , 2005, Proceedings of the 2005, American Control Conference, 2005..

[43]  Magnus Egerstedt,et al.  Graph Theoretic Methods in Multiagent Networks , 2010, Princeton Series in Applied Mathematics.

[44]  F. Bullo,et al.  Identifying cyber attacks under local model information , 2010 .

[45]  J.H. Manton,et al.  Stochastic Lyapunov Analysis for Consensus Algorithms with Noisy Measurements , 2007, 2007 American Control Conference.

[46]  Frank Harary,et al.  Connectivity in digraphs , 1971 .

[47]  Nancy A. Lynch,et al.  Reaching approximate agreement in the presence of faults , 1986, JACM.

[48]  Richard M. Murray,et al.  INFORMATION FLOW AND COOPERATIVE CONTROL OF VEHICLE FORMATIONS , 2002 .

[49]  Xenofon Koutsoukos,et al.  Consensus in networked multi-agent systems with adversaries , 2011 .