Consensus Computation in Unreliable Networks: A System Theoretic Approach

This paper addresses the problem of ensuring trustworthy computation in a linear consensus network. A solution to this problem is relevant for several tasks in multi-agent systems including motion coordination, clock synchronization, and cooperative estimation. In a linear consensus network, we allow for the presence of misbehaving agents, whose behavior deviate from the nominal consensus evolution. We model misbehaviors as unknown and unmeasurable inputs affecting the network, and we cast the misbehavior detection and identification problem into an unknown-input system theoretic framework. We consider two extreme cases of misbehaving agents, namely faulty (non-colluding) and malicious (Byzantine) agents. First, we characterize the set of inputs that allow misbehaving agents to affect the consensus network while remaining undetected and/or unidentified from certain observing agents. Second, we provide worst-case bounds for the number of concurrent faulty or malicious agents that can be detected and identified. Precisely, the consensus network needs to be 2k+1 (resp. k+1) connected for k malicious (resp. faulty) agents to be generically detectable and identifiable by every well behaving agent. Third, we quantify the effect of undetectable inputs on the final consensus value. Fourth, we design three algorithms to detect and identify misbehaving agents. The first and the second algorithm apply fault detection techniques, and affords complete detection and identification if global knowledge of the network is available to each agent, at a high computational cost. The third algorithm is designed to exploit the presence in the network of weakly interconnected subparts, and provides local detection and identification of misbehaving agents whose behavior deviates more than a threshold, which is quantified in terms of the interconnection structure.

[1]  P. Kokotovic,et al.  A singular perturbation approach to modeling and control of Markov chains , 1981 .

[2]  Jie Lin,et al.  Coordination of groups of mobile autonomous agents using nearest neighbor rules , 2003, IEEE Trans. Autom. Control..

[3]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior , 2008, 2008 American Control Conference.

[4]  G. Basile,et al.  Controlled and conditioned invariants in linear system theory , 1992 .

[5]  Jacob van der Woude,et al.  The Generic Number of Invariant Zeros of a Structured Linear System , 1999, SIAM J. Control. Optim..

[6]  C.N. Hadjicostis,et al.  Distributed function calculation via linear iterations in the presence of malicious agents — Part I: Attacking the network , 2008, 2008 American Control Conference.

[7]  J. Tokarzewski Finite Zeros in Discrete Time Control Systems , 2006 .

[8]  Wei Ren,et al.  Information consensus in multivehicle cooperative control , 2007, IEEE Control Systems.

[9]  Stephen P. Boyd,et al.  Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[10]  A. Willsky,et al.  Failure detection and identification , 1989 .

[11]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[12]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[13]  Carl D. Meyer,et al.  Matrix Analysis and Applied Linear Algebra , 2000 .

[14]  Francesco Bullo,et al.  Distributed Control of Robotic Networks , 2009 .

[15]  Nancy A. Lynch,et al.  Distributed Algorithms , 1992, Lecture Notes in Computer Science.

[16]  Emrah Biyik,et al.  Area Aggregation and Time Scale Modeling for Sparse Nonlinear Networks , 2006, Proceedings of the 45th IEEE Conference on Decision and Control.

[17]  R. A. Silverman,et al.  Introductory Real Analysis , 1972 .

[18]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[19]  Krzysztof Tchon,et al.  On generic properties of linear systems: An overview , 1983, Kybernetika.

[20]  Kurt Johannes Reinschke,et al.  Multivariable Control a Graph-theoretic Approach , 1988 .

[21]  Charles R. Johnson,et al.  Matrix analysis , 1985, Statistical Inference for Engineers and Data Scientists.

[22]  Antonio Bicchi,et al.  Distributed intrusion detection for secure consensus computations , 2007, 2007 46th IEEE Conference on Decision and Control.

[23]  M. Lewin On nonnegative matrices , 1971 .

[24]  Harry L. Trentelman,et al.  Control theory for linear systems , 2002 .

[25]  J. Pearson Linear multivariable control, a geometric approach , 1977 .

[26]  W. Wonham Linear Multivariable Control: A Geometric Approach , 1974 .

[27]  Joe Chow,et al.  A Sparsity-Based Technique for Identifying Slow-Coherent Areas in Large Power Systems , 1984, IEEE Transactions on Power Apparatus and Systems.

[28]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[29]  Paul M. Frank,et al.  Fault diagnosis in dynamic systems: theory and application , 1989 .

[30]  Christian Commault,et al.  Generic properties and control of linear structured systems: a survey , 2003, Autom..

[31]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.