Resilient Average Consensus With Adversaries via Distributed Detection and Recovery
In this article, we study the problem of resilient average consensus (RAC) in multiagent systems where some of the agents are subject to failures or attacks. The objective of RAC is for nonfaulty/normal agents to converge to the average of their initial values despite the erroneous effects from mali...
Saved in:
Published in | IEEE transactions on automatic control Vol. 70; no. 1; pp. 415 - 430 |
---|---|
Main Authors | , |
Format | Journal Article |
Language | English |
Published |
New York
IEEE
01.01.2025
The Institute of Electrical and Electronics Engineers, Inc. (IEEE) |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In this article, we study the problem of resilient average consensus (RAC) in multiagent systems where some of the agents are subject to failures or attacks. The objective of RAC is for nonfaulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative RAC algorithm for the multiagent networks with general directed topologies. The proposed algorithm has two parts at each iteration: 1) detection and 2) averaging. For the detection part, we propose two distributed algorithms and one of them can detect malicious agents with only the information from direct in-neighbors. For the averaging part, we extend the applicability of an existing averaging algorithm where normal agents can remove the effects from malicious agents so far, after they are detected. Another important feature of our method is that it can handle the case where malicious agents are neighboring and collaborating with each other to mislead the normal ones from averaging. This case cannot be solved by existing detection approaches in related literature. Moreover, our algorithm is efficient in storage usage especially for large-scale networks as each agent only requires the values of neighbors within two hops. Lastly, numerical examples are given to verify the efficacy of the proposed algorithms. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 0018-9286 1558-2523 |
DOI: | 10.1109/TAC.2024.3426387 |