Resilient Average Consensus With Adversaries via Distributed Detection and Recovery

In this article, we study the problem of resilient average consensus (RAC) in multiagent systems where some of the agents are subject to failures or attacks. The objective of RAC is for nonfaulty/normal agents to converge to the average of their initial values despite the erroneous effects from mali...

Full description

Saved in:
Bibliographic Details
Published inIEEE transactions on automatic control Vol. 70; no. 1; pp. 415 - 430
Main Authors Yuan, Liwei, Ishii, Hideaki
Format Journal Article
LanguageEnglish
Published New York IEEE 01.01.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE)
Subjects
Online AccessGet full text

Cover

Loading…
More Information
Summary:In this article, we study the problem of resilient average consensus (RAC) in multiagent systems where some of the agents are subject to failures or attacks. The objective of RAC is for nonfaulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative RAC algorithm for the multiagent networks with general directed topologies. The proposed algorithm has two parts at each iteration: 1) detection and 2) averaging. For the detection part, we propose two distributed algorithms and one of them can detect malicious agents with only the information from direct in-neighbors. For the averaging part, we extend the applicability of an existing averaging algorithm where normal agents can remove the effects from malicious agents so far, after they are detected. Another important feature of our method is that it can handle the case where malicious agents are neighboring and collaborating with each other to mislead the normal ones from averaging. This case cannot be solved by existing detection approaches in related literature. Moreover, our algorithm is efficient in storage usage especially for large-scale networks as each agent only requires the values of neighbors within two hops. Lastly, numerical examples are given to verify the efficacy of the proposed algorithms.
Bibliography:ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ISSN:0018-9286
1558-2523
DOI:10.1109/TAC.2024.3426387