Control of Multilayer Mobile Autonomous Systems in Adversarial Environments: A Games-in-Games Approach

A mobile autonomous system (MAS) becomes pervasive especially in the vehicular and robotic networks. Multiple heterogeneous MAS networks can be integrated together as a multilayer MAS network to offer holistic services. The network connectivity of the multilayer MAS plays an important role in the information exchange between agents within and across different layers of the network. In this article, we establish a games-in-games framework to capture the uncoordinated nature of decision making under adversarial environment at different layers. Specifically, each network operator controls the mobile agents in his own subnetwork and designs a secure strategy to maximize the global network connectivity by considering the behavior of jamming attackers that aim to disconnect the network. The solution concept of metaequilibrium is proposed to characterize the system-of-systems behavior of the autonomous agents. For online implementation of the control, we design a resilient algorithm that improves the network algebraic connectivity iteratively. We show that the designed algorithm converges to a metaequilibrium asymptotically. Finally, we use case studies of a two-layer MAS network to corroborate the security and agile resilience of the network controlled by the proposed strategy.

[1]  Antoine Girard,et al.  Multiagent Flocking Under General Communication Rule , 2014, IEEE Transactions on Control of Network Systems.

[2]  Mehran Mesbahi,et al.  On maximizing the second smallest eigenvalue of a state-dependent graph Laplacian , 2006, IEEE Transactions on Automatic Control.

[3]  Nathan Albin,et al.  Maximizing algebraic connectivity in interconnected networks. , 2015, Physical review. E.

[4]  Quanyan Zhu,et al.  A Dynamic Game Approach to Strategic Design of Secure and Resilient Infrastructure Network , 2019, IEEE Transactions on Information Forensics and Security.

[5]  Quanyan Zhu,et al.  Optimal Secure Two-Layer IoT Network Design , 2017, IEEE Transactions on Control of Network Systems.

[6]  Michal Król,et al.  Wireless Sensor Networks and Multi-UAV systems for natural disaster management , 2017, Comput. Networks.

[7]  Mark W. Spong,et al.  Collision-Free Formation Control with Decentralized Connectivity Preservation for Nonholonomic-Wheeled Mobile Robots , 2015, IEEE Transactions on Control of Network Systems.

[8]  Jon C. Dattorro,et al.  Convex Optimization & Euclidean Distance Geometry , 2004 .

[9]  Huijuan Wang,et al.  Algebraic Connectivity of Interdependent Networks , 2014 .

[10]  Asuman E. Ozdaglar,et al.  Constrained Consensus and Optimization in Multi-Agent Networks , 2008, IEEE Transactions on Automatic Control.

[11]  Robert Babuska,et al.  Constrained distributed algebraic connectivity maximization in robotic networks , 2012, Autom..

[12]  M. Ani Hsieh,et al.  Maintaining network connectivity and performance in robot teams , 2008, J. Field Robotics.

[13]  Quanyan Zhu,et al.  iSTRICT: An Interdependent Strategic Trust Mechanism for the Cloud-Enabled Internet of Controlled Things , 2018, IEEE Transactions on Information Forensics and Security.

[14]  M. Fiedler Algebraic connectivity of graphs , 1973 .

[15]  Johan Löfberg,et al.  YALMIP : a toolbox for modeling and optimization in MATLAB , 2004 .

[16]  L. Shapley,et al.  Potential Games , 1994 .

[17]  Paul J. M. Havinga,et al.  Enabling mobility in heterogeneous wireless sensor networks cooperating with UAVs for mission-critical management , 2008, IEEE Wireless Communications.

[18]  Vijay Kumar,et al.  Maintaining Connectivity in Mobile Robot Networks , 2008, ISER.

[19]  Sebastian Magierowski,et al.  Vehicle Routing Problems for Drone Delivery , 2016, IEEE Transactions on Systems, Man, and Cybernetics: Systems.

[20]  David Tse,et al.  Fundamentals of Wireless Communication , 2005 .

[21]  Todd E. Humphreys,et al.  Unmanned Aircraft Capture and Control Via GPS Spoofing , 2014, J. Field Robotics.

[22]  Magnus Egerstedt,et al.  Graph-theoretic connectivity control of mobile robot networks , 2011, Proceedings of the IEEE.

[23]  Gordon F. Royle,et al.  Algebraic Graph Theory , 2001, Graduate texts in mathematics.

[24]  Antonio Scala,et al.  Networks of Networks: The Last Frontier of Complexity , 2014 .

[25]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[26]  Ian F. Akyildiz,et al.  Help from the Sky: Leveraging UAVs for Disaster Management , 2017, IEEE Pervasive Computing.

[27]  Gerald G. Brown,et al.  Solving Defender-Attacker-Defender Models for Infrastructure Defense , 2011, ICS 2011.

[28]  Dennis M. Akos,et al.  Who's Afraid of the Spoofer? GPS/GNSS Spoofing Detection via Automatic Gain Control (AGC) , 2012 .

[29]  Wenyuan Xu,et al.  Jamming sensor networks: attack and defense strategies , 2006, IEEE Network.

[30]  Quanyan Zhu,et al.  A Game- and Decision-Theoretic Approach to Resilient Interdependent Network Analysis and Design , 2020, SpringerBriefs in Electrical and Computer Engineering.

[31]  Stephen P. Boyd,et al.  Growing Well-connected Graphs , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[32]  Siddhartha S. Srinivasa,et al.  Decentralized estimation and control of graph connectivity in mobile sensor networks , 2008, ACC.

[33]  Bernhard Ganter,et al.  Formal Concept Analysis: Mathematical Foundations , 1998 .

[34]  Daizhan Cheng,et al.  Leader-following consensus of multi-agent systems under fixed and switching topologies , 2010, Syst. Control. Lett..