Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus

To observe and control a networked system, especially in failure-prone circumstances, it is imperative that the underlying network structure be robust against node or link failures. A common approach for increasing network robustness is redundancy: deploying additional nodes and establishing new links between nodes, which could be prohibitively expensive. This paper addresses the problem of improving structural robustness of networks without adding extra links. The main idea is to ensure that a small subset of nodes, referred to as the trusted nodes, remains intact and functions correctly at all times. We extend two fundamental metrics of structural robustness with the notion of trusted nodes, network connectivity, and $r$-robustness, and then show that by controlling the number and location of trusted nodes, any desired connectivity and robustness can be achieved without adding extra links. We study the complexity of finding trusted nodes and construction of robust networks with trusted nodes. Finally, we present a resilient consensus algorithm with trusted nodes and show that, unlike existing algorithms, resilient consensus is possible in sparse networks containing few trusted nodes.

[1]  Edward F. Schmeichel,et al.  Toughness in Graphs – A Survey , 2006, Graphs Comb..

[2]  Robert E. Tarjan,et al.  Augmentation Problems , 1976, SIAM J. Comput..

[3]  Yevgeniy Vorobeychik,et al.  Improving network connectivity using trusted nodes and edges , 2017, 2017 American Control Conference (ACC).

[4]  Xenofon Koutsoukos,et al.  Resilient First-Order Consensus and Weakly Stable, Higher Order Synchronization of Continuous-Time Networked Multiagent Systems , 2018, IEEE Transactions on Control of Network Systems.

[5]  Mauricio Barahona,et al.  Spectral Measure of Structural Robustness in Complex Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.

[6]  N. Linial,et al.  Expander Graphs and their Applications , 2006 .

[7]  Tim Roughgarden,et al.  Preventing Unraveling in Social Networks: The Anchored k-Core Problem , 2015, SIAM J. Discret. Math..

[8]  Toshihide Ibaraki,et al.  Algorithmic Aspects of Graph Connectivity , 2008, Encyclopedia of Mathematics and its Applications.

[9]  Shreyas Sundaram,et al.  Robustness and Algebraic Connectivity of Random Interdependent Networks , 2015, ArXiv.

[10]  Shuai Liu,et al.  Resilient consensus for multi-agent systems with quantized communication , 2016, 2016 American Control Conference (ACC).

[11]  Scott Shenker,et al.  On a network creation game , 2003, PODC '03.

[12]  Marcin Dziubinski,et al.  Network Design and Defence , 2012, Games Econ. Behav..

[13]  Guy Kortsarz,et al.  Tight Approximation Algorithm for Connectivity Augmentation Problems , 2006, ICALP.

[14]  Mehran Mesbahi,et al.  Online algorithms for network formation , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[15]  Vijay Kumar,et al.  Formations for Resilient Robot Teams , 2017, IEEE Robotics and Automation Letters.

[16]  Noga Alon,et al.  Basic Network Creation Games , 2013, SIAM J. Discret. Math..

[17]  Magnus Egerstedt,et al.  Graph Theoretic Methods in Multiagent Networks , 2010, Princeton Series in Applied Mathematics.

[18]  Jun Zhao,et al.  On Connectivity and Robustness in Random Intersection Graphs , 2017, IEEE Transactions on Automatic Control.

[19]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[20]  Peng-Jun Wan,et al.  Distributed Construction of Connected Dominating Set in Wireless Ad Hoc Networks , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.

[21]  Magnus Egerstedt,et al.  Robust Graph Topologies for Networked Systems , 2012 .

[22]  Shreyas Sundaram,et al.  The Game-Theoretic Formation of Interconnections Between Networks , 2016, IEEE Journal on Selected Areas in Communications.

[23]  Shreyas Sundaram,et al.  Secure distributed observers for a class of linear time invariant systems in the presence of Byzantine adversaries , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[24]  Jochen Harant,et al.  Menger's Theorem , 2001, J. Graph Theory.

[25]  Shreyas Sundaram,et al.  Robustness of information diffusion algorithms to locally bounded adversaries , 2011, 2012 American Control Conference (ACC).

[26]  Deying Li,et al.  A polynomial‐time approximation scheme for the minimum‐connected dominating set in ad hoc wireless networks , 2003, Networks.

[27]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[28]  Shreyas Sundaram,et al.  A Notion of Robustness in Complex Networks , 2015, IEEE Transactions on Control of Network Systems.

[29]  Lewis Tseng,et al.  Iterative approximate byzantine consensus in arbitrary directed graphs , 2012, PODC '12.

[30]  Hideaki Ishii,et al.  Consensus of second-order multi-agent systems in the presence of locally bounded faults , 2015, Syst. Control. Lett..

[31]  Graham Farr,et al.  Fragmentability of Graphs , 2001, J. Comb. Theory, Ser. B.

[32]  Jochen Harant,et al.  Menger's Theorem , 2001 .

[33]  Shreyas Sundaram,et al.  Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.

[34]  Katta G. Murty,et al.  Mathematical programming: State of the art 1994 , 1994 .