IN Part-I paper [1], the proposed control protocol under. Strategic Topology Switching for Security Part II: Detection & Switching Topologies

Size: px
Start display at page:

Download "IN Part-I paper [1], the proposed control protocol under. Strategic Topology Switching for Security Part II: Detection & Switching Topologies"

Transcription

1 1 Strategic Topology Switching for Security Part II: Detection & Switching Topologies Yanbing Mao, Emrah Akyol, and Ziang Zhang arxiv: v1 cs.ma 3 Nov 17 Abstract This two-part paper considers strategic topology switching for the second-order multi-agent system under attack. In Part II, we propose a strategy on switching topologies to reveal zero-dynamics attack. We first study the detectability of zero-dynamics attack for the second-order multi-agent system under switching topology, which has requirements on the switching times and switching topologies. Based on the strategy on switching times proposed in Part I and the strategy on switching topologies proposed in Part II, a decentralized strategic topology-switching algorithm is derived. The primary advantages of the algorithm are: 1) in achieving consensus in the absence of attacks, control protocol does not need velocity measurements and the algorithm has no constraint on the magnitude of coupling strength; ) in revealing zero-dynamics attack, the algorithm has no constraint on the size of misbehaving-agent set; 3) in revealing zero-dynamics attack, if the Xor graph generated by every two-consecutive topologies has distinct eigenvalues, only one output is enough for the algorithm. Simulation examples are provided to verify the effectiveness of the strategic topologyswitching algorithm. Index Terms Multi-agent system, second-order consensus, strategic topology switching, zero-dynamics attack. I. INTRODUCTION IN Part-I paper 1, the proposed control protocol under switching topology is governed by only relative positions of agents, which is different from the well-studied control protocols that need both relative position measurements and velocity measurements 6. The second-order multi-agent system under the proposed control protocol are described by ẋ i = v i (1a) n v i = γ a σ ji (x j x i ), i = 1,, n (1b) j=1 where x i R is the position state, v i R is the velocity state, γ > is the coupling strength, σ :, ) S {1,,..., s}, s N, is the topology-switching signal, i.e., σ = p k S for t t k, t k+1 ) means the p th topology is activated over the time interval t k, t k+1 ), and a p k ij is the element of the coupling matrix that describes the activated p th topology of undirected communication network. The final objective of this two-part paper is the strategic topology-switching algorithm for the second-order multi-agent system under attack. The algorithm is based on two strategies that are the strategy on switching times and the strategy on Y. Mao, E. Akyol and Z. Zhang are with the Department of Electrical and Computer Engineering, Binghamton University SUNY, Binghamton, NY, 139 USA, ( ymao3@binghamton.edu; eakyol@binghamton.edu; zhangzia@binghamton.edu). Table I CONDITIONS ON DETECTABLE ATTACK Reference Conditions Dynamics 8 connectivity is not small than K + 1 Discrete 9 K is smaller than connectivity Discrete 1 size of linking (K M) is smaller than K Continuous switching topologies. The strategy on switching times studied in Part-I paper 1 enables the strategic topology-switching algorithm the ability of reaching the second-order consensus in the absence of attacks. In the following, we present the precise definition of the second-order consensus in this context. Definition 1: The second-order consensus in the multiagent system (1) is achieved, if and only if the following holds lim x i x j =, t lim v i v j =, i, j = 1,, n. t (a) (b) for any initial condition. The strategy on switching topologies studied in this Part-II paper enables the strategic topology-switching algorithm the ability of revealing zero-dynamics attack without constraint on the misbehaving-agent set. A. Related Work For the cyber-physical systems, several incidents, such as Stuxnet malware attack and Maroochy Shire Council Sewage control incident, has raised the attention to security challenge 7. One of the fundamental problems of security is the attack detection However, there exists an attack called stealthy attack, where the attacker s goal is to make the user accept false aggregation results, which are significantly different from the true results determined by the measured values, while not being detected by the user 16. The undetectable property has raised attention to the detectability of stealthy attack 8 1. For the large scaled networked system, due to the lack of centralized measurements, the multiagent systems are prone to attack 1. The obtained results of detectability of zero-dynamics attack in recent years are summarized in Table I, which shows that the detectability obtained therein has constraints on the connectivity of network topology and the size of misbehaving-agent set. To reveal zerodynamics attack, the strategic topology-switching algorithm studied in this two-part paper has no such constraints, i.e., the situation that all agents are misbehaving is allowed.

2 B. Motivation of Part-II Paper Recent experiment of stealthy false-data injection attacks on networked control system 17 showed the changes in the system dynamics could be used to reveal stealthy attack. To have changes in the system dynamics to reveal zero-dynamics attack, Teixeira et al. 11 considered the method of modifying input matrix or modifying output matrix. However, in more realistic situations, such as the defender or the system operator has no knowledge of the attack-beginning time, or the attacks happen infinitely over infinite time, to reveal zero-dynamics attack the system dynamics has to be time-varying, i.e., the system dynamics changes infinitely over infinite time. However, before using the time-varying dynamics to reveal zerodynamics attack, the question that whether the time-varying dynamics can destroy the system stability in the absence of attacks must be investigated. If the time-varying dynamics can destroy the stability of original system, the changes in system dynamics would be an attack, such as the topology attack 18, 19. For the dynamical networks, recent studies have highlighted the important role played by the network topology 3. For example, Menck et al. find that in the numerical simulations of artificially generated power grids, tree-like connection schemes, so-called dead ends and dead trees, can strongly diminish the stability; Schultz et al. 3 show that how the addition of links can change the synchronization properties of the network. These motivate us to consider the method of topology switching such that the multi-agent system can have changes in its system dynamics to reveal zero-dynamics attack. The strategy on switching times proposed in Part-I paper 1 shows that if the dwell time of switching topologies satisfies certain condition, the second-order consensus can be achieved, i.e., following the strategy on switching times, the time-varying dynamics of multi-agent system, which is caused by topology switching at switching time, does not destroy the agents ability of reaching consensus. Based on the work in Part-I paper 1, this Part-II paper focuses on the strategy on switching topologies that addresses the problem of switching to what topologies to reveal zero-dynamics attack. C. Contribution of Part-II Paper The contribution of this paper is threefold, which can be summarized as follows. Based on the detectability of attack, we propose a strategy on switching topologies which can reveal zero-dynamics without constraint on the size of misbehaving-agent set. Under the strategy setting that the Laplacian matrix of Xor graph generated by every two-consecutive topologies has distinct eigenvalues, only one output is enough to reveal zero-dynamics attack. Based on the strategy on switching times and the strategy on switching topologies, a strategic topologyswitching algorithm is proposed. To reveal zero-dynamics attack, the algorithm has no constraint on the size of misbehaving-agent set. To achieve the second-order consensus, the algorithm has no constraint on the magnitude of coupling strength and the control protocol does not need velocity measurements. Based on the strategy on switching times and the strategy on switching topologies, an attack-detection algorithm working under strategic topology-switching algorithm is derived. The remainder of this paper is organized as follows: Section II presents the preliminaries and problem formulation; in Section III, the detectability of zero-dynamics attack is studied; Section IV presents the strategic topology-switching algorithm. Numerical examples are given in Section V; finally, Section VI concludes the two-part paper. II. PRELIMINARIES AND PROBLEM FORMULATION A. Preliminaries 1) Notation: For a set V, V denotes the cardinality (i.e., size) of the set. In addition, for a set K V, V\K denotes the complement set of K with respect to V. R n and R m n denote the set of n-dimensional real vectors and the set of m n- dimensional real matrices, respectively. Let C denote the set of complex number. N represents the set of the natural numbers and N = N {}. Let I and n n be the identity matrix with compatible dimension and n-dimensional zero matrix, respectively. 1 n R n and n R n denote the vector with all ones and the vector with all zeros, respectively. The superscript stands for matrix transpose. ) Graph Theory: The interaction among n agents is modeled by an undirected graph G = (V, E), where V = {ϑ 1, ϑ,, ϑ n } is the set of vertices that represent n agents and E V V is the set of edges of the graph G. An undirected edge in G is denoted by a ij = (ϑ i, ϑ j ) E, where a ij = a ji = 1 if agents i and j interact with each other, and a ij = a ji = otherwise. Assume that there are no self-loops, i.e., for any ϑ i V, a ii / E. A path is a sequence of connected edges in a graph. A graph is a connected graph if there is a path between every pair of vertices. Lemma 1: 4 If the undirected graph G is connected, then its Laplacian L R n n has a simple zero eigenvalue (with eigenvector 1 n ) and all its other eigenvalues are positive and real. Lemma : 5 The Laplacian of a path graph P n has the eigenvalues as ( ) (k 1) π λ k = cos, k = 1,, n. (3) n B. Problem Formulation For simplicity, let K = {ϑ 1, ϑ, } V = {ϑ 1,, ϑ n } denote the set of misbehaving agents, and M = {ϑ 1, ϑ, } K denote the set of outputs. The multiagent system (1) with its output under attack can be described by ẋ i = v i, (4a) n v i = γ a σ ij (x j x i ) + g i u i (t κ), (4b) i=1 y i = x i + g i u i (t κ), i M (4c)

3 3 where γ > is the coupling strength; σ is the topology switching signal of the system under attack; g i is agent i s attack signal; u i (t κ) is the unit step function: u i (t κ) = 1 if t κ and i K, and u i (t κ) = otherwise; κ is the attack-beginning time. The agent under attack is usually named the misbehaving agent. Definition : 9 Consider multi-agent system (4), an agent i is misbehaving if there exists a time t such that g i u i (t κ). The multi-agent system (4) can be rewritten in the form of switched system under attack: {ż = Aσ z + Bg (5) y = C M z + D M g where z = x 1,, x n, v 1,, v n R n and A σ = n n I, (6) γl σ n n B B = K K V\K n n, (7) V\K K V\K V\K B K = e ϑ1,, e ϑ K R K K, (8) C M = e χ1 e χ M M (n M ), (9) D M = M n e χ1 e χ M M (n M ) (1) n g = g, (11) V\K g = g 1 u i (t κ),, g K u K (t κ), (1) with e ϑi R K and e χi R M are the i th vectors of the canonical basis. For the multi-agent system (1), consider the constant velocity v = 1 n v i = 1 n v i (t ). (13) n n i=1 Based on v, define fluctuations: x i = x i 1 n ṽ i = v i v, i=1 n x i () vt, i=1 (14a) (14b) where v is given by (13). It follows from (14a) and (14b) that 1 n x =, (15) 1 n ṽ =. (16) Using the defined fluctuations (14a) and (14b), with the same outputs in (5) that are in the absence of attacks, the multi-agent system (1) can be written equivalently as { z = A σ z (17) ỹ = C M z where z = x 1,, x n, ṽ 1,, ṽ n R n, A σ and C M are given by (6) and (9), respectively. Now we make the following assumptions on the attacker and defender. Assumption 1: Assume that attacker: 1) has the knowledge of topology switching sequences, including the switching times and the activated topologies at switching times; ) can modify the initial conditions arbitrarily if the attackbeginning time is the initial time; 3) can attack the second-order multi-agent system infinitely over infinite time. Assumption : Assume defender has no knowledge of the attack-beginning time and the misbehaving agents. To end this section, we present the following lemmas that can be used to derive the strategic topology-switching algorithm in the following section. Lemma 3: 1 Consider the following system: x = γl t x (τ)dτ + ṽ(), (18) where γ >, L R n n is the Laplacian matrix of a connected undirected graph; x () R n and ṽ () R n satisfy (15) and (16), respectively. The individual position solutions x i, i = 1,, n, are x i = n l= q li q l ( x () cos( γλ l t) + ṽ() γλl sin( ) γλ l t), t (19) where λ l (λ 1 = ), l =,, n, are the none-zero eigenvalues of L, q l = q l1,, q ln R n is the eigenvector associated with the eigenvalue λ l of L. Let σ = r S for t t k, t k+1 ), k N, the t dynamics in (17) can be rewritten as x = γl r t k x (τ)dτ + ṽ(t k ), t t k, t k+1 ). Therefore, Lemma 3 implies that the multi-agent agent system (1) under each fixed topology has a period P such that {ṽi = ṽ i (t + P), i = 1,, n x i = x i (t + P), t t k, t k+1 ), k N. Lemma 4: 1 Consider the function F = ϖ x x () + ṽ ṽ, (1) with ṽ = x R n. Along the system (18), if the Laplacian matrix L has distinct eigenvalues and ϖ satisfies < ϖ γλ i (L), i =,, n, () where λ i (L) denotes the i th eigenvalue of L and λ 1 (L) =. Then the following situation would never happen: F φ, t. (3) Lemma 5: 1 Consider the second-order multi-agent system (17). For the given period P satisfying (), scalars 1 > β >, α > and L N. If the dwell time τ satisfies (β 1 L L 1) α ξ < τ min τ = ˆτ max + mp, m N, (4)

4 4 with ξ < α, (5) < ˆτ max < ln β α, (6) < ˆτ max + m P ( ) β 1 L L 1 α ξ, (7) ξ = max {1 γλ i (L r ), 1 + γλ i (L r )}, (8) r S,i=1,,n where γ is the coupling strength and λ i (L r ) is the i th eigenvalue of the Laplacian matrix L r. Then the second-order consensus can be achieved by Definition 1. Remark 1: Lemma 5 is a strategy on switching times that when the multi-agent system (5) should have changes, which are caused by topology switching, in its dynamics to reveal zero-dynamics attack 17, such that the changes on the system dynamics do not destroy the system stability in the absence of attacks. Remark : In achieving the second-order consensus, the strategy on switching times Lemma 5 has no constraint on the magnitude of coupling strength γ >. The obtained solution in Lemma 3 shows the coupling strength can affect the required period P, which works with Lemma 5 implies that the coupling strength can control the dwell time of switching topologies, thus can affect the convergence speed of consensus. The strategic topology-switching algorithm and the attackdetection algorithm that are to be proposed in the following sections are illustrated by Figure 1, where the clock icon along communication link denotes the logic of link is driven by time, i.e., the topology-switching signal is time-dependent. on the detection of zero-dynamics attack by strategy setting on switching topologies. Before proceeding on, we present the formal definitions of undetectable attack and zero-dynamics attack of continuoustime multi-agent systems. Definition 3: (Undetectable Attack 1) For the multiagent systems (5) and (17). The attack signal g in (5) is undetectable if j M : y j = ỹ j, t. Definition 4: (Zero-Dynamics Attack 1) Consider the following two systems {ṗ = Ap + Bg (9) ȳ = Cp + Dg { q = Aq (3) ỹ = Cq where p, q R n, ȳ, ỹ R m with m n, g R o with o n, A R n n, B R n o, C R m n and D R m o. The attack signal g = g (κ) e λ(t κ), t κ with κ, is a zero-dynamics attack if g(κ) o and λ C satisfy λi A B p (κ) q (κ) n =. (31) C D g (κ) m The state and output of system (9) satisfy ȳ = ỹ, t (3) p = q + (p (κ) q (κ)) e λ(t κ), t κ. (33) Remark 3: The detailed proof of the results (3) and (33) can be found in 6. The resulted state (33) shows that through choosing the parameter λ, the attacker can achieve its attack objective: Re (λ) > : unstable system; Re (λ) =, Im (λ) : oscillating; Re (λ) < : modifying the steady-state value. The resulted output (3) means the undetectable property of zero-dynamics attack. Figure 1. Strategically Topology-Switching for the Second-Order Multi-Agent System: two communication links control four topologies. III. DETECTABILITY OF ZERO-DYNAMICS ATTACK This section will show the advantages of strategic topology switching in revealing zero-dynamics attack. A. Zero-Dynamics Attack Zero-dynamics attack is one class of stealthy attacks whose one important property is undetectable. This section will focus B. Strategy on Switching Topologies To better present the strategy on the switching topologies, we introduce the definition of components in a graph. Definition 5: 7 The components of a graph G are its maximal connected subgraphs; a subgraph is a trivial component if it has no edges; otherwise, it is a nontrivial component. Definition 6: The Xor graph G xor is a graph generated by two graphs G 1 and G that have same number of vertices: a xor ij = a 1 ij xor a ij. Based on the components of Xor graph, we can rewrite the agent set as V = C 1 C Cd where d is the number of the components of Xor graph and C q, q = 1,, d, is the set of all agents in the q th component. Obviously, C p Cq = if p q. Take the Xor graph generated in Figure as an example, the Xor graph has two nontrivial components as C 1 = {ϑ 1, ϑ, ϑ 3, ϑ 4 }, C = {ϑ 5, ϑ 6 }, and two trivial components as C 3 = {ϑ 7 }, C 4 = {ϑ 8 }.

5 5 Figure. Components of Xor Graph We present the following strategy on switching topology that can reveal zero-dynamics attack without constraint on the size of misbehaving-agent set. Theorem 1: Consider the multi-agent system under attack (5). If the strategy satisfies (r1) (r) after the attack begins at κ, the first topologyswitching signal is time-dependent, i.e, σ(t k ) where k = arg min {t r > κ}, is time-dependent; r N for the Xor graph generated by the two consecutive topologies around the time-dependent topologyswitching time t k defined in (r1): (ra) the Laplacian matrix of each nontrivial component has distinct eigenvalues, (rb) at least one agent in each component is equipped with the monitor output of position, then without constraint on the misbehaving-agent set, the strategy can reveal zero-dynamics attack. Proof of Theorem 1: Consider the requirement (rb) on the set of outputs. To finish the proof we can consider the extreme situation: only one agent in each component has output. Without loss of generality, we can let the first agent in each component has output. Thus, we can define a set of positions of the first agent in each component: O = { 1, 1 + C 1, 1 + C 1 + C,, 1 + } d C h, (34) h=1 where d is the number of components of the Xor graph generated by the two consecutive topologies around the topologyswitching time t k. Therefore, in this situation that only one output in each component is available, we can re-arrange the agents such that the multi-agent systems (5) and (17) can be written as {ż = Aσ z + Bg S 1 : (35) y j = x j + g j u j (t κ), j O { z = A σ z S : (36) ỹ j = x j, j O where O is given by (34). Without loss of generality, we assume the attack-begging time falls into the interval t k 1, t k ), k N. The strategy (r1) means after the attacker attacks at κ, the switching signal σ over two consecutive intervals κ, t k ) t k, δ) is timedependent. Consider the systems (35) and (36). Let z = z, t < κ, so during the time t t, κ), g K and the systems (35) and (36) are the same. Because over the two consecutive intervals κ, t k ) t k, δ), the topology-switching signals σ and σ in (35) and (36) are time-dependent. Hence, we can conclude A σ = A σ, t κ, t k ) t k, δ). Let z = z z with z () = z () z (), y j = y j ỹ j and x j = x j x j. From (35) and (36) we have { z = Aσ z + Bg y j = x j + g j u j (t κ), t κ, t k ) t k, δ), j O. (37) The rest proof can be finished by contradiction. We assume the multi-agent system (35) has zero-dynamics attack. Denote σ = 1 for t κ, t k ). By (31) we can obtain λin n A 1 B ē j ê j z(κ) g(κ) = n where g(κ) is given by (11) with (1), ē j = n ê j =. e j Noting the matrix in B (7), substituting x x z = z z = v ṽ B K = g K (κ) = n = B K K V\K V\K K V\K V\K, j O ej n x = v (38) and, (39a), (39b), (39c) g(κ), (39d) V\K and A 1 given by (6) into (38) yields, for j O, x(κ) λi I n n n n γl 1 λi n n BK v(κ) e j n n e n = j n n (4) Assume the topology switches from topology 1 to topology at instance t k. Let ξ = t k κ. If the multi-agent system (35) has zero-dynamics attack over the time t k, δ), z(κ)e λξ and g(κ)e λξ would be the state-zero direction and attack-zero direction for system (35) over the time interval.

6 6 t k, δ). Using the same analysis method to derive (4), we x(κ) λi I n n n n can obtain γl λi n n BK e λξ v(κ) e j n n e n = j n n, j O, which is equivalent to, for j O, λi I n n n n γl λi n n BK e j n n e j From Equations (4) and (41), we have x(κ) v(κ) n = n n. (41) λ x (κ) v (κ) = n, (4) B K + γl 1 x (κ) + λ v(κ) = n, (43) B K + γl x (κ) + λ v(κ) = n, (44) x j (κ) g j (κ) =, j O. (45) Considering the defined components of Xor graph, L 1 L can be written as L 1 L = diag {±L (C 1 ), ±L (C ),, ±L (C d )}, (46) where L (C q ) denote the Laplacian matrix of the q th, q {1,,, d}, component of Xor graph. Obviously, L (C q ) = 1 if C q = 1. Considering (46), from (4) (45) we can observe: (a) Equation (4) is equivalent to λ x (κ) = v (κ). (b) From (43) and (44), γ (L 1 L ) x (κ) = n. (c) If L (C q ), q {1,,, d}, has distinct eigenvalues, it has properties: (i) zero is one of its eigenvalues with multiplicity one; (ii) the eigenvector that corresponds to the eigenvalue zero is 1 Cq, q {1,,, d}. (d) Equation (45) is equivalent to x j (κ) = g j (κ), j O. (e) Combing properties (c) and (d) can yield the solution of Equation γ (L 1 L ) x (κ) = n as x j (κ) = x j+1 (κ) = = x O(ij+1) 1 (κ) = g j (κ), j O, where i j is index of element j in the set O, i.e., O(i j ) = j. Now, based on the above observations (a) (e) we consider the following two different cases. Case One λ = : In this case, if the Laplacian matrix of each component has distinct eigenvalues, from Lemma 1, observation (a), observation (e) and (43) or (44), we have B K = n which is equivalent to g 1 (κ) = = g K (κ) =, so there is no zero-dynamics attack by Definition 4. Case Two λ : In this case, if the Laplacian matrix of each component has distinct eigenvalues, observation (a) and observation (e) implies v j (κ) = ṽ j+1 (κ) = = v O(ij+1) 1 (κ) = λg j (κ), j O. (47) Considering Lemma 1 and observation (e), substituting (47) into (43) or (44) yields the same result as BK = λ x j (κ) 1 n, which is equivalent to g j (κ) = = g O(ij+1) 1 (κ) = λ x j (κ), j O. (48) From (48) and observation (d) we have g j (κ) = λ x j (κ) = x j (κ), j O, which is equivalent to (1 + λ ) x j (κ) =, which also implies x j (κ) =, j O, or λ = ±i. Considering observation (e) and (48), we can conclude g j (κ) = = g O(ij+1) 1 (κ) =, j O, if x j (κ) =, so there is no zero-dynamics attack by Definition 4. If λ = ±i, observation (a) means ±i x (κ) = v (κ), which means the requirements as x(κ) R n and v(κ) R n in Definition 4 are not satisfied. Therefore, the definition of zero-dynamics attack is ruled out. All these analysis results show that there is no zerodynamics attack, which contradicts the assumption. Remark 4: The strategy (r) in Theorem 1 implies that if the Laplacian matrix of each nontrivial component has distinct eigenvalues, then the minimum number of the outputs required to reveal zero-dynamics attack is equivalent to the number of components of Xor graph. Take Figure as an example, two nontrivial components are path graphs; with (k 1)π n < π, k = 1,, n, Lemma implies that the Laplacian matrix of path graph has distinct eigenvalues; hence, the Xor graph in Figure satisfies (ra) in Theorem 1; therefore, we can conclude if the topology set S includes these two graphs, the minimum number of outputs is four. If Xor graph has only one component and its Laplacian matrix has distinct eigenvalues, then only one output is enough to reveal zero-dynamics attack. Corollary 1: Consider the multi-agent system under attack (5). Under the topology-switching strategy: (r1) after the attack begins at κ, the first topologyswitching signal is time-dependent, i.e, σ(t k ), where k = arg min {t r > κ}, is time-dependent; r N (r) the switching topologies around the time-dependent topology-switching time t k, defined in (r1), satisfy that L σ(tk ) L σ(κ), t k > κ, has distinct eigenvalues; without constraint on the misbehaving-agent set, only one output of position is enough to reveal zero-dynamics attack. Proof of Corollary 1: The strategy (r) in Corollary 1 means the Xor graph has only one component that its Laplacian matrix has distinct eigenvalues, then the set O defined by (34) would be O = {1}. Then using the same proof of Theorem 1, this proof can be finished, here it is omitted. IV. STRATEGIC TOPOLOGY SWITCHING A. Finite- Consensus Algorithm To derive a decentralized strategic topology-switching algorithm, we re-use the finite-time consensus network. Lemma 6: 8 (Simplified Version Without External Disturbances) Consider the multi-agent system n ṙ i = α b ij (r j r i ) m n + β n b ij (r j r i ) p q, i = 1,, n j=1 j=1 (49)

7 7 Figure 3. Xor Graph Has Distinct Eigenvalues where b ij is the element of the coupling matrix that describes topology of an undirected connected communication network and its corresponding Laplacian matrix is denoted as L A, α >, β >, the odd numbers m >, n > p > and q > that satisfy m > n and p < q. Its global finite-time consensus can be achieved, i.e., r i 1 n r i () =, t T, i = 1,, n. (5) n i=1 Further, the setting time T is bounded by T < 1 λ (L A ) (n m n n α ) n m n + 1 β q. (51) q p Remark 5: Adjust parameters α > and β > in the finite-time consensus network (49) such that ) 1 (n m n n n λ (L A ) α m n + 1 β q < τ min, (5) q p where τ min satisfy the left-hand of (4). Therefore, the setting time T in (51) satisfies T < τ min. B. Strategic Topology-Switching Algorithm We make the following assumption on the topology set and the output set for the strategic topology-switching algorithm. Assumption 3: The topology set S includes at least two topologies: a) at least one topology that its Laplacian matrix has distinct eigenvalues; b) at least two topologies: b1) the Laplacian matrix of each nontrivial component of their Xor graph has distinct eigenvalues, and b) each component of their Xor graph is equipped with at least one output of position. Based on Lemma 4, Lemma 5 and Theorem 1, through employing the finite-time consensus network (49), the derived decentralized strategic topology-switching algorithm that can reveal zero-dynamics attack is described by Algorithm 1. Algorithm 1: Strategic Topology-Switching Algorithm Input: Topology set S satisfying Assumption 3, individual functions F i = ϖ x i + ṽ i with ϖ satisfying (), initial time t k =, initial topology G σ(tk ), initial topology-switching time t k+1 = t k + τ with τ generated by Lemma 5, loop-stopping criteria δ. 1 while F (t k 1 ) > δ do Input individuals F i (t k ) and F i (t k ) to agent i in the finite-time consensus network (49) at time t k ; 3 Output F (t k ) (1) and F (t k ) and from the finite-time consensus network (49) to the agents in (4) at time t k + τ min ; 4 Run until the time t k+1 = t k + τ; 5 if F (t k ) = then 6 Switch the topology of network (4b) to σ(t k+1 ) that satisfies: σ(t k+1 ) σ(t k ), L σ(tk+1 ) has distinct eigenvalues, 7 else Laplace matrix of each component of G xor = G σ(tk+1 ) xor G σ(tk ) has distinct eigenvalues; 8 Switch the topology of network (4b) to σ(t k+1 ) that satisfies: σ(t k+1 ) σ(t k ), 9 end 1 end Laplace matrix of each component of G xor = G σ(tk+1 ) xor G σ(tk ) has distinct eigenvalues; 11 Update the topology-switching time: t k 1 t k ; 1 Update the topology-switching time: t k t k+1. Theorem : Consider the multi-agent system under attack (5). If the topology-switching signal is generated by Algorithm 1, then the following properties hold. (i) (ii) (iii) In the absence of attacks, if the loop-stopping criteria δ = (in Line 1 of Algorithm 1), the agents can achieve the second-order consensus by Definition 1. In the absence of attacks, if the loop-stopping criteria δ > (in Line 1 of Algorithm 1), by finitely topology switching the agents can achieve the second-order consensus under admissible consensus error δ, i.e., F (t k) δ with < k < and F given by (1). Without constraint on the misbehaving-agent set, Algorithm 1 is able to reveal zero-dynamics attack. Proof of Theorem : Considering Lemma 5 and Lemma 4, the proofs of property (i) and property (ii) directly follows the proof of Theorem in Part-I paper 1, here it is omitted. Proof of property (iii): Line 4, Line 11 and Line 1 of Algorithm 1 mean all the topology-switching times, i.e., t k, k N, are time-dependent. So, the requirement (r1) in Theorem 1 is satisfied. Line 6 and Line 8 of Algorithm 1 implies the Laplacian matrix of each component of Xor graph, which is generated by every two-consecutive topologies, has distinct eigenvalues. Note the required topology set S in Input

8 8 of Algorithm 1 follows Assumption 3. Thus the requirement (r) in Theorem 1 is satisfied. Therefore, by Theorem 1 we can conclude the property (iii) under Algorithm 1, which completes the proof. Remark 6: In the extreme situation that only one output of position is available, by Corollary 1 the requirements on switching topology in Line 6 and Line 8 of Algorithm 1 would be changed as L σ(tk ) has distinct eigenvalues and L σ(tk+1 ) L σ(tk ) also has distinct eigenvalues. Because Lemma implies that the Laplacian matrix of a path graph has distinct eigenvalues, it is not difficult to choose such two topologies. Figure 3 provides one example on how to choose such two consecutive topologies: one path graph and one ring graph. C. Attack Detection Before proceeding on the attack-detection algorithm, consider the following multi-agent system under switching topology: ė x = e y, ė y = γl σ e x + η Λe x, (53a) (53b) where e x R n, e y R n, L σ is a Laplacian matrix of a connected undirected graph and Λ = diag{ 1 }{{} O(1),,, 1 }{{} O(),,, 1 }{{} O(d),,, } R n n, (54) with O given by (34). Now, we present the following lemmas that can be used to derive an attack-detection algorithm under strategic topology switching. Lemma 7: For the system ë x = ( η Λ γl ) e x + e y (), t (55) where e x R n, L R n n is the Laplacian matrix of a connected undirected graph and Λ is given by (54). If A = η Λ γl <, (56) the system solutions, e xi, i = 1,, n, are solved as e xi = n q li q l l=1 ( ) e x () cos( λl t) + ey() sin( λl t), t λl (57) where λ l, l = 1,, n, are the eigenvalues of the matrix A defined in (56) and q l = q l1,, q ln R n is the eigenvector associated with the eigenvalue λ l of A. Proof of Lemma 7: The proof is as the same as the proof of Lemma 3 in Part-I paper 1, here it is omitted. Let σ = r S for t t k, t k+1 ), k N, the dynamics (53) can be rewritten as ė x = γl r t k t e x (τ)dτ + e y (t k ), t t k, t k+1 ). Therefore, Lemma 7 implies that for the multi-agent agent system (53) under each fixed topology, there exist a period P such that { ( exi = e xi ( t + P), i = 1,, n, (58) e yi = e yi t + P), t tk, t k+1 ), k N. Remark 7: Lemma 7 shows that either the coupling strength γ > or the control gain η can control the period P that satisfies (58). Lemma 8: Consider the second-order multi-agent system under switching topology (53) with A r = η Λ γlr <, r S. (59) where Λ is given by (54). For the given common period P of P satisfying () and P satisfying (58), scalars 1 > β >, α > and L N. If the dwell time τ satisfies ϕ max < τ min τ = ˆτ max + m P, m N, (6) with { } ϕ max = (β 1 L L 1) max α ξ, L, α ϱ (61) α > max {ξ, ϱ}, (6) < ˆτ max < ln β α, (63) < ˆτ max + m P ϕ max (64) ξ = max i (L r ), 1 + γλ i (L r )}, r S,i=1,,n (65) ϱ = max i (A r ), 1 + λ i (A r )}, r S,i=1,,n (66) where λ i (L r ) and λ i (A r ) are the i th eigenvalues of the Laplacian matrix L r and the matrix A r, respectively. Then the system is globally uniformly asymptotically stable. Proof of Lemma 8: Noting (6), the left-hand of (6) implies the (β 1 L 1) L α ξ < τ min. Because P is a common period of P and P. Hence, we can conclude if Lemma 8 holds, Lemma 5 also holds. Then the rest proof is as the same as that of Lemma 5 in Part-I paper 1, here it is omitted. Inspired by the attack-detection algorithm proposed in 1, which is based on Luenberger observer. Using Luenberger observer under switching topology, we present the detection algorithm that has the minimum number of outputs for the zero-dynamics attack. Theorem 3: For the multi-agent system (35), consider the attack-detection filter ẋ = v, ( v = γl σ + η Λ ) x η Λy, Λr = Λx Λy, (67a) (67b) (67c) where x() = x(), v() = v() and Λ is given by (54). If (59) holds, the dwell time τ in Algorithm 1 is generated by Lemma 8, and the topology-switching signals in both the filter (67) and the multi-agent system (35) are the same and generated by Algorithm 1, then i) Λr d, t, if and only if g n, t, ii) in the absence of attacks, the filter errors e x = x x and e v = v v are globally uniformly asymptotically stable,

9 9 iii) in the absence of attacks, if the loop-stopping criteria δ = (in Line 1 of Algorithm 1), the agents can achieve the second-order consensus by Definition 1, iv) in the absence of attacks, if the loop-stopping criteria δ > (in Line 1 of Algorithm 1), by finitely topology switching the agents can achieve the second-order consensus under admissible consensus error δ, i.e., F (t k) δ with < k < and F given by (1). Proof of Theorem 3: (Proof of i)) Define the errors e x = x x, e v = v ṽ and e = e x, e y. From (35) and (67) we have where Ă σ = B = { ė = Ă σ e + Bg r j = e xj g j, j O n n I γl σ + η Λ n n (68), (69) n n BK + η Λ K V\K V\K K V\K V\K, (7) with Λ given by (54) and B K is given by (39b). Replace A σ and B in the proof of Theorem 1 by Ă σ (69) and B (7), respectively. Then using the same analysis method to obtain (41) we have e λi I n n x (κ) n n γl η Λ λi n n BK + η Λ e y (κ) e j n n e n j n = n, j O. (71) The third equation of (71) is equivalent to η Λe x (κ) = η Λg (κ) with g (κ) given by (39c) with (39d), from which (71) can be rewritten equivalently as λi I n n n n γl λi n n BK e j n n e j e x (κ) e y (κ) n = n n, j O. Then using the same proof of Theorem 1, we can conclude that there is no zero-dynamics attack. (Proof of ii)) In the absence of attacks, the dynamics (68) is equivalent to the dynamics (53). Hence, by Lemma 8 we can conclude ii) in Theorem 3. (Proof of iii)) Since, Lemma 8 implies Lemma 5, by Lemma 5 we can conclude iii) in Theorem 3 The Proof of iv) is as the same as the proof of (ii) in Theorem, here it is omitted. V. SIMULATION The simulations on a second-order multi-agent system with n = 4 agents will be presented to demonstrate the effectiveness of the proposed strategic topology-switching algorithm. Table II CANDIDATE TOPOLOGIES Index σ a σ 1 a σ 13 a σ 14 a σ 3 a σ 4 a σ In the simulation setting, the initial position and velocity conditions are chosen as x() = v() = 1,, 3, 4. To convincingly verify the effectiveness of Algorithm 1 in revealing zero-dynamics attack, we consider the extremely bad situation: all the agent are misbehaving agents, i.e., K = {ϑ 1, ϑ, ϑ 3, ϑ 4 }, the connectivity of each candidate topology is significantly low: one for path graph and two for ring graph, only one output of position is available, let M = {ϑ 1 }. Set the coupling strength in the multi-agent system (4) and the control gain in the filter (67) as γ = and η = 8. The candidate topologies are given in Table II. Because both the topology 3 and topology 1 are path graphs, the eigenvalues of the Laplacian matrices of topologies 1 and are enough to calculate the common period. The required eigenvalues of Laplacian matrices are solved as λ 1 (L 1 ), λ (L 1 ), λ 3 (L 1 ), λ 4 (L 1 ) =,.6,, 3.4, (7) λ 1 (L ), λ (L ), λ 3 (L ), λ 4 (L ) =,,, 4, (73) λ 1 (A 1 ), λ (A 1 ), λ 3 (A 1 ), λ 4 (A 1 ) =.5, 1, 1.6, 7.9, (74) λ 1 (A ), λ (A ), λ 3 (A ), λ 4 (A ) =.5, 1.3, 3.9, 1.1. (75) Using the solved eigenvalues (7) (75) and the state solutions (19) and (57), following (6) and (64), we can choose the dwell time τ = P +.1 = For simplicity, let the attack-beginning time is the initial time, i.e., κ = t =, which means the attacker can modify the initial conditions arbitrarily. A. Zero-Dynamics Attack Design First, we considered the topology set S = {, 3 } where the representations of and 3 are given in Table II. Obviously, the set S = {, 3 } does not satisfy the strategy (r) in Theorem 1. Thus, the attacker can easily design a zerodynamics attack such that Algorithm 1, with only one output of position, cannot reveal it. Let the attacker s goal is to attack the multi-agent system under Algorithm 1 to be unstable, while not being detected. To choose this goal, the attacker should first choose a positive λ. Following the zero-dynamics attack design method (31) in Definition 4, one of its zero-dynamics attack strategies is easily designed as introduce attack signal: g = e t, e t, 4e t, 4e t, modify the initial conditions: x () = v () =, 3, 5, 6. The trajectories of the attack-detection signal r 1 deigned by Theorem 3 and the state x 1 are shown in Figure 4,

10 1 which shows the attacker s goal of attacking the multi-agent system to be unstable while not being detected by the defender is achieved. Thus, using only one output, the designed zerodynamics attack is not revealed under the topology set S = {, 3 } attack-detection signal r 1 state x Figure 4. State x 1 : multi-agent system under attack is unstable; Attack- Detection Signal r 1 : the attack is not detected. B. Reveal Zero-Dynamics Attack In the extremely bad situation, the existing results 8 1, 14 for the multi-agent systems under fixed topology failure to work. This is manly because the misbehaving-agents set K = 1, and the connectivity of topology 1 (and topology ) is 1 (and ), and the output M = 1. All these violate the conditions on the connectivity of communication network, the size of misbehaving-agent set and the size of output set, which are summarized in Table I. Now we turn to the topology set S = {1, } to real the attack. As illustrated by Figure 3, the Xor graph generated by topologies 1 and has only one component that is a path graph. By Lemma, the Laplacian matrix of the Xor graph has distinct eigenvalues. Thus, by Corollary 1 we can conclude that using only one output, the strategic topology-switching algorithm Algorithm 1 is able to reveal the designed zerodynamics attack. The trajectory of the attack-detection signal is shown in Figure 5, which illustrates that with all the agents being misbehaving, using only one output of position, Algorithm 1 succeeds in revealing zero-dynamics attack. C. Filter in The Absence of Attacks Now using the same dwell time, we show the effectiveness of strategic topology switching for the filter (67) in estimating the states of the multi-agent system (1), i.e., the system (4) is in the absence of attacks. Input the attacker modified initial conditions to the filter (67), i.e., x () = v () =, 3, 5, 6. The trajectories of filter errors are shown in Figure 6, which illustrates that using the strategic-topology switching algorithm, the filter errors are indeed globally uniformly asymptotically stable. This simulation shows Algorithm 1 works successfully Attack-Detection Signal r Non-Zero Figure 5. Attack-Detection Signal r 1 : using only output of position, the designed zero-dynamics attack is revealed. for the filter to track the real multi-agent system in the absence of attacks. VI. CONCLUSION This two-part paper studies strategic topology switching for the second-order multi-agent system under attack. Based on the strategy on switching times studied in Part-I paper and the strategy on switching topologies studied in Part-II paper, we propose a strategic topology-switching algorithm. Two obvious merits of strategic topology-switching algorithm can be summarized as In achieving the second-order consensus in the absence of attacks, the velocity measurements are not needed for the control protocol and the algorithm has no constraint on the magnitude of coupling strength. In revealing zero-dynamics attack, the algorithm has no constraint on the set of misbehaving agents. Through strategy setting on switching topologies, only one monitor of position is enough to reveal zero-dynamics attack. The algorithm allows the system operator or the defender having no knowledge of the attack-beginning time, and allows the attacks happening infinitely over infinite time. This two-part paper studies the detection of a single attack strategy, that is zero-dynamics attack. This paper provides an insight that strategic topology switching can be a promising method for the detection of mixed attack strategies, such as zero-dynamics attack working with DoS attack, zero-dynamics attack working with topology attack, topology attack working with delay attack, etc. How to reveal such mixed attacks by strategic topology switching would be our future research work. REFERENCES 1 Y. Mao, E. Akyol, and Z. Zhang. Strategic topology switching for security Part I: consensus & switching times. submitted to IEEE Transactions on Control of Network Systems. W. Yu, G. Chen, and M. Cao. Some necessary and sufficient conditions for second-order consensus in multi-agent dynamical systems. Automatica, 46(6): , 1.

11 11 e x1 e x3 e v1 e v e x e x4 e v e v Figure 6. In Absence of Attack, Trajectories of Positions Differences and Velocities Differences Generated by Algorithm 1. 3 J. Mei, W. Ren, and J. Chen. Distributed consensus of second-order multi-agent systems with heterogeneous unknown inertias and control gains under a directed graph. IEEE Transactions on Automatic Control, 61(8): 19 34, X. Ai, S. Song, and K. You. Second-order consensus of multi-agent systems under limited interaction ranges. Automatica, 68: , J. Qin, C. Yu, and B. D. Anderson On leaderless and leader-following consensus for interacting clusters of second-order multi-agent systems. Automatica, 74: 14 1, W. Ren and W. Atkins. Distributed multi-vehicle coordinated control via local information exchange. International Journal of Robust and Nonlinear Control, 17(1 11): 1 133, 7. 7 A. A. Cárdenas, S. Amin, and S. Sastry. Research challenges for the security of control systems. In HotSec, pp. 1 6, 8. 8 S. Sundaram and C. N. Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Transactions on Automatic Control, 56(7): , F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable networks: A system theoretic approach. IEEE Transactions on Automatic Control, 57(1): 9-14, 1. 1 F. Pasqualetti, F. Dörfler, and F. Bullo. Attack detection and identification in cyber-physical systems. IEEE Transactions on Automatic Control, 58(11): , A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. Revealing stealthy attacks in control systems. In Communication, Control, and Computing (Allerton), 1 5th Annual Allerton Conference on, pp , 1. 1 A. Teixeira, I. Shames, H. Sandberg, and K. H. Johansson. A secure control framework for resource-limited adversaries. Automatica, 51: , Y. Mo, R. Chabukswar and B. Sinopoli. Detecting integrity attacks on SCADA systems. IEEE Transactions on Control Systems Technology, (4): , S. Weerakkody, X. Liu, S. H. Son and B. Sinopoli. A Graph-Theoretic Characterization of Perfect Attackability for Secure Design of Distributed Control Systems. IEEE Transactions on Control of Network Systems, 4(1): 6 7, Y. Chen, S. Kar, and J. M. Moura. Dynamic attack detection in cyberphysical systems with side initial state information. IEEE Transactions on Automatic Control, 6(9): , B. Przydatek, D. Song, and A. Perrig. SIA: Secure information aggregation in sensor networks. In Proceedings of the 1st international conference on Embedded networked sensor systems, pp , ACM, A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson. Attack models and scenarios for networked control systems. Proceedings of the 1st international conference on High Confidence Networked Systems, pp , ACM, F. Zhi, G. Hu and G. Wen. Distributed consensus tracking for multiagent systems under two types of attacks. International Journal of Robust and Nonlinear Control, 6(5): , J. Kim and L. Tong. On topology attack of a smart grid: Undetectable attacks and countermeasures. IEEE Journal on Selected Areas in Communications, 31(7): , 13. P. J. Menck, J. Heitzig, J. Kurths, and H. J. Schellnhuber. How dead ends undermine power grid stability. Nature Communication, 5, P. Kundur, J. Paserba, V. Ajjarapu, G. Andersson, A. Bose, C. Canizares, et al. Definition and classification of power system stability. IEEE Transactions on Power Systems, 19(3): , 4. S. H. Moghaddam and M. R. Jovanovic. Topology design for stochastically-forced consensus networks. IEEE Transactions on Control of Network Systems, DOI: 1.119/TCNS P. Schultz, T. Peron, D. Eroglu, T. Stemler, G. M. R. Ávila, F. A. Rodrigues, and J. Kurths. Tweaking synchronization by connectivity modifications. Physical Review E, 93(6): 611, C. Godsil and G. Royle. Algebraic Graph Theory. New York: Springer- Verlag, 1. 5 D. Spielman. Spectral graph theory (lecture 5 rings, paths, and cayley graphs). Online lecture notes. September 16, T. Geerts, Invariant subspaces and invertibility properties for singular systems: The general case. Linear Algebra and its Applicat., 183: 61-88, M. Newman. Networks: an introduction. Oxford university press, 1. 8 Z. Zuo and L. Tie. Distributed robust finite-time nonlinear consensus protocols for multi-agent systems. International Journal of Systems Science, 47(6): , 16.

MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY

MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY Jrl Syst Sci & Complexity (2009) 22: 722 731 MULTI-AGENT TRACKING OF A HIGH-DIMENSIONAL ACTIVE LEADER WITH SWITCHING TOPOLOGY Yiguang HONG Xiaoli WANG Received: 11 May 2009 / Revised: 16 June 2009 c 2009

More information

Complex Laplacians and Applications in Multi-Agent Systems

Complex Laplacians and Applications in Multi-Agent Systems 1 Complex Laplacians and Applications in Multi-Agent Systems Jiu-Gang Dong, and Li Qiu, Fellow, IEEE arxiv:1406.186v [math.oc] 14 Apr 015 Abstract Complex-valued Laplacians have been shown to be powerful

More information

Distributed Tracking Control for Multi-Agent Systems Under Two Types of Attacks

Distributed Tracking Control for Multi-Agent Systems Under Two Types of Attacks Preprints of the 9th World Congress The International Federation of Automatic Control Distributed Tracking Control for Multi-Agent Systems Under Two Types of Attacks Zhi Feng and Guoqiang Hu Abstract:

More information

Discrete-time Consensus Filters on Directed Switching Graphs

Discrete-time Consensus Filters on Directed Switching Graphs 214 11th IEEE International Conference on Control & Automation (ICCA) June 18-2, 214. Taichung, Taiwan Discrete-time Consensus Filters on Directed Switching Graphs Shuai Li and Yi Guo Abstract We consider

More information

Coding Sensor Outputs for Injection Attacks Detection

Coding Sensor Outputs for Injection Attacks Detection 53rd IEEE Conference on Decision and Control December 15-17, 2014 Los Angeles, California, USA Coding Sensor Outputs for Injection Attacks Detection Fei Miao Quanyan Zhu Miroslav Pajic George J Pappas

More information

Consensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication Topologies

Consensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication Topologies Proceedings of the World Congress on Engineering and Computer Science Vol I WCECS, October 9-,, San Francisco, USA Consensus Tracking for Multi-Agent Systems with Nonlinear Dynamics under Fixed Communication

More information

OUTPUT CONSENSUS OF HETEROGENEOUS LINEAR MULTI-AGENT SYSTEMS BY EVENT-TRIGGERED CONTROL

OUTPUT CONSENSUS OF HETEROGENEOUS LINEAR MULTI-AGENT SYSTEMS BY EVENT-TRIGGERED CONTROL OUTPUT CONSENSUS OF HETEROGENEOUS LINEAR MULTI-AGENT SYSTEMS BY EVENT-TRIGGERED CONTROL Gang FENG Department of Mechanical and Biomedical Engineering City University of Hong Kong July 25, 2014 Department

More information

Consensus of Information Under Dynamically Changing Interaction Topologies

Consensus of Information Under Dynamically Changing Interaction Topologies Consensus of Information Under Dynamically Changing Interaction Topologies Wei Ren and Randal W. Beard Abstract This paper considers the problem of information consensus among multiple agents in the presence

More information

Consensus Seeking in Multi-agent Systems Under Dynamically Changing Interaction Topologies

Consensus Seeking in Multi-agent Systems Under Dynamically Changing Interaction Topologies IEEE TRANSACTIONS ON AUTOMATIC CONTROL, SUBMITTED FOR PUBLICATION AS A TECHNICAL NOTE. 1 Consensus Seeking in Multi-agent Systems Under Dynamically Changing Interaction Topologies Wei Ren, Student Member,

More information

Multi-Robotic Systems

Multi-Robotic Systems CHAPTER 9 Multi-Robotic Systems The topic of multi-robotic systems is quite popular now. It is believed that such systems can have the following benefits: Improved performance ( winning by numbers ) Distributed

More information

Distributed Robust Consensus of Heterogeneous Uncertain Multi-agent Systems

Distributed Robust Consensus of Heterogeneous Uncertain Multi-agent Systems Distributed Robust Consensus of Heterogeneous Uncertain Multi-agent Systems Zhongkui Li, Zhisheng Duan, Frank L. Lewis. State Key Laboratory for Turbulence and Complex Systems, Department of Mechanics

More information

Theory and Applications of Matrix-Weighted Consensus

Theory and Applications of Matrix-Weighted Consensus TECHNICAL REPORT 1 Theory and Applications of Matrix-Weighted Consensus Minh Hoang Trinh and Hyo-Sung Ahn arxiv:1703.00129v3 [math.oc] 6 Jan 2018 Abstract This paper proposes the matrix-weighted consensus

More information

Dynamic State Estimation in the Presence of Compromised Sensory Data

Dynamic State Estimation in the Presence of Compromised Sensory Data 2015 IEEE 54th Annual Conference on Decision and Control (CDC) December 15-18, 2015. Osaka, Japan Dynamic State Estimation in the Presence of Compromised Sensory Data Yorie Nakahira, Yilin Mo Abstract

More information

Active Passive Networked Multiagent Systems

Active Passive Networked Multiagent Systems Active Passive Networked Multiagent Systems Tansel Yucelen and John Daniel Peterson Abstract This paper introduces an active passive networked multiagent system framework, which consists of agents subject

More information

On the Scalability in Cooperative Control. Zhongkui Li. Peking University

On the Scalability in Cooperative Control. Zhongkui Li. Peking University On the Scalability in Cooperative Control Zhongkui Li Email: zhongkli@pku.edu.cn Peking University June 25, 2016 Zhongkui Li (PKU) Scalability June 25, 2016 1 / 28 Background Cooperative control is to

More information

Consensus Seeking in Multi-agent Systems Under Dynamically Changing Interaction Topologies

Consensus Seeking in Multi-agent Systems Under Dynamically Changing Interaction Topologies IEEE TRANSACTIONS ON AUTOMATIC CONTROL, SUBMITTED FOR PUBLICATION AS A TECHNICAL NOTE. Consensus Seeking in Multi-agent Systems Under Dynamically Changing Interaction Topologies Wei Ren, Student Member,

More information

Distributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren, Member, IEEE

Distributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren, Member, IEEE IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 57, NO. 1, JANUARY 2012 33 Distributed Coordinated Tracking With Reduced Interaction via a Variable Structure Approach Yongcan Cao, Member, IEEE, and Wei Ren,

More information

Distributed Adaptive Consensus Protocol with Decaying Gains on Directed Graphs

Distributed Adaptive Consensus Protocol with Decaying Gains on Directed Graphs Distributed Adaptive Consensus Protocol with Decaying Gains on Directed Graphs Štefan Knotek, Kristian Hengster-Movric and Michael Šebek Department of Control Engineering, Czech Technical University, Prague,

More information

Consensus of Multi-Agent Systems with

Consensus of Multi-Agent Systems with Consensus of Multi-Agent Systems with 1 General Linear and Lipschitz Nonlinear Dynamics Using Distributed Adaptive Protocols arxiv:1109.3799v1 [cs.sy] 17 Sep 2011 Zhongkui Li, Wei Ren, Member, IEEE, Xiangdong

More information

Graph and Controller Design for Disturbance Attenuation in Consensus Networks

Graph and Controller Design for Disturbance Attenuation in Consensus Networks 203 3th International Conference on Control, Automation and Systems (ICCAS 203) Oct. 20-23, 203 in Kimdaejung Convention Center, Gwangju, Korea Graph and Controller Design for Disturbance Attenuation in

More information

A graph-theoretical characterization of power network vulnerabilities

A graph-theoretical characterization of power network vulnerabilities A graph-theoretical characterization of power network vulnerabilities Fabio Pasqualetti, Antonio Bicchi, and Francesco Bullo Abstract This work is concerned with the security of a power network against

More information

Resilient Distributed Optimization Algorithm against Adversary Attacks

Resilient Distributed Optimization Algorithm against Adversary Attacks 207 3th IEEE International Conference on Control & Automation (ICCA) July 3-6, 207. Ohrid, Macedonia Resilient Distributed Optimization Algorithm against Adversary Attacks Chengcheng Zhao, Jianping He

More information

Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries

Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries Secure Distributed Observers for a Class of Linear Time Invariant Systems in the Presence of Byzantine Adversaries Aritra Mitra and Shreyas Sundaram Abstract We study the problem of distributed state estimation

More information

Consensus Problem in Multi-Agent Systems with Communication Channel Constraint on Signal Amplitude

Consensus Problem in Multi-Agent Systems with Communication Channel Constraint on Signal Amplitude SICE Journal of Control, Measurement, and System Integration, Vol 6, No 1, pp 007 013, January 2013 Consensus Problem in Multi-Agent Systems with Communication Channel Constraint on Signal Amplitude MingHui

More information

Control Systems Security Metrics and Risk Management

Control Systems Security Metrics and Risk Management KTH ROYAL INSTITUTE OF TECHNOLOGY Control Systems Security Metrics and Risk Management Henrik Sandberg hsan@kth.se Department of Automatic Control, KTH, Stockholm, Sweden DISC Summer School, The Hague,

More information

Formation Control of Nonholonomic Mobile Robots

Formation Control of Nonholonomic Mobile Robots Proceedings of the 6 American Control Conference Minneapolis, Minnesota, USA, June -6, 6 FrC Formation Control of Nonholonomic Mobile Robots WJ Dong, Yi Guo, and JA Farrell Abstract In this paper, formation

More information

Linear Algebra and its Applications

Linear Algebra and its Applications Linear Algebra and its Applications 431 (9) 71 715 Contents lists available at ScienceDirect Linear Algebra and its Applications journal homepage: www.elsevier.com/locate/laa On the general consensus protocol

More information

Consensus of Hybrid Multi-agent Systems

Consensus of Hybrid Multi-agent Systems Consensus of Hybrid Multi-agent Systems Yuanshi Zheng, Jingying Ma, and Long Wang arxiv:52.0389v [cs.sy] 0 Dec 205 Abstract In this paper, we consider the consensus problem of hybrid multi-agent system.

More information

Dynamic Attack Detection in Cyber-Physical. Systems with Side Initial State Information

Dynamic Attack Detection in Cyber-Physical. Systems with Side Initial State Information Dynamic Attack Detection in Cyber-Physical 1 Systems with Side Initial State Information Yuan Chen, Soummya Kar, and José M. F. Moura arxiv:1503.07125v1 math.oc] 24 Mar 2015 Abstract This paper studies

More information

Zeno-free, distributed event-triggered communication and control for multi-agent average consensus

Zeno-free, distributed event-triggered communication and control for multi-agent average consensus Zeno-free, distributed event-triggered communication and control for multi-agent average consensus Cameron Nowzari Jorge Cortés Abstract This paper studies a distributed event-triggered communication and

More information

Distributed Fault Detection for Interconnected Second-Order Systems with Applications to Power Networks

Distributed Fault Detection for Interconnected Second-Order Systems with Applications to Power Networks Distributed Fault Detection for Interconnected Second-Order Systems with Applications to Power Networks Iman Shames 1 André H. Teixeira 2 Henrik Sandberg 2 Karl H. Johansson 2 1 The Australian National

More information

Distributed Adaptive Synchronization of Complex Dynamical Network with Unknown Time-varying Weights

Distributed Adaptive Synchronization of Complex Dynamical Network with Unknown Time-varying Weights International Journal of Automation and Computing 3, June 05, 33-39 DOI: 0.007/s633-05-0889-7 Distributed Adaptive Synchronization of Complex Dynamical Network with Unknown Time-varying Weights Hui-Na

More information

Consensus-Based Distributed Optimization with Malicious Nodes

Consensus-Based Distributed Optimization with Malicious Nodes Consensus-Based Distributed Optimization with Malicious Nodes Shreyas Sundaram Bahman Gharesifard Abstract We investigate the vulnerabilities of consensusbased distributed optimization protocols to nodes

More information

Discrete Double Integrator Consensus

Discrete Double Integrator Consensus Proceedings of the 47th IEEE Conference on Decision and Control Cancun, Mexico, Dec. 9-11, 28 Discrete Double Integrator Consensus David W. Casbeer, Randy Beard, and A. Lee Swindlehurst Abstract A distributed

More information

Formation Control and Network Localization via Distributed Global Orientation Estimation in 3-D

Formation Control and Network Localization via Distributed Global Orientation Estimation in 3-D Formation Control and Network Localization via Distributed Global Orientation Estimation in 3-D Byung-Hun Lee and Hyo-Sung Ahn arxiv:1783591v1 [cssy] 1 Aug 17 Abstract In this paper, we propose a novel

More information

Zero controllability in discrete-time structured systems

Zero controllability in discrete-time structured systems 1 Zero controllability in discrete-time structured systems Jacob van der Woude arxiv:173.8394v1 [math.oc] 24 Mar 217 Abstract In this paper we consider complex dynamical networks modeled by means of state

More information

Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays

Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays 136 IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL. 4, NO. 1, JANUARY 2017 Secure Consensus Control for Multi-Agent Systems With Attacks and Communication Delays Yiming Wu and Xiongxiong He Abstract This paper

More information

Finite-Time Resilient Formation Control with Bounded Inputs

Finite-Time Resilient Formation Control with Bounded Inputs Finite-Time Resilient Formation Control with Bounded Inputs James Usevitch, Kunal Garg, and Dimitra Panagou Abstract In this paper we consider the problem of a multiagent system achieving a formation in

More information

Stability Analysis for Switched Systems with Sequence-based Average Dwell Time

Stability Analysis for Switched Systems with Sequence-based Average Dwell Time 1 Stability Analysis for Switched Systems with Sequence-based Average Dwell Time Dianhao Zheng, Hongbin Zhang, Senior Member, IEEE, J. Andrew Zhang, Senior Member, IEEE, Steven W. Su, Senior Member, IEEE

More information

A Graph-Theoretic Characterization of Structural Controllability for Multi-Agent System with Switching Topology

A Graph-Theoretic Characterization of Structural Controllability for Multi-Agent System with Switching Topology Joint 48th IEEE Conference on Decision and Control and 28th Chinese Control Conference Shanghai, P.R. China, December 16-18, 29 FrAIn2.3 A Graph-Theoretic Characterization of Structural Controllability

More information

Average-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control

Average-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control Outline Background Preliminaries Consensus Numerical simulations Conclusions Average-Consensus of Multi-Agent Systems with Direct Topology Based on Event-Triggered Control Email: lzhx@nankai.edu.cn, chenzq@nankai.edu.cn

More information

Consensus, Flocking and Opinion Dynamics

Consensus, Flocking and Opinion Dynamics Consensus, Flocking and Opinion Dynamics Antoine Girard Laboratoire Jean Kuntzmann, Université de Grenoble antoine.girard@imag.fr International Summer School of Automatic Control GIPSA Lab, Grenoble, France,

More information

IN the multiagent systems literature, the consensus problem,

IN the multiagent systems literature, the consensus problem, IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II: EXPRESS BRIEFS, VOL. 63, NO. 7, JULY 206 663 Periodic Behaviors for Discrete-Time Second-Order Multiagent Systems With Input Saturation Constraints Tao Yang,

More information

Robust Connectivity Analysis for Multi-Agent Systems

Robust Connectivity Analysis for Multi-Agent Systems Robust Connectivity Analysis for Multi-Agent Systems Dimitris Boskos and Dimos V. Dimarogonas Abstract In this paper we provide a decentralized robust control approach, which guarantees that connectivity

More information

Obtaining Consensus of Multi-agent Linear Dynamic Systems

Obtaining Consensus of Multi-agent Linear Dynamic Systems Obtaining Consensus of Multi-agent Linear Dynamic Systems M I GRCÍ-PLNS Universitat Politècnica de Catalunya Departament de Matemàtica plicada Mineria 1, 08038 arcelona SPIN mariaisabelgarcia@upcedu bstract:

More information

Fast Linear Iterations for Distributed Averaging 1

Fast Linear Iterations for Distributed Averaging 1 Fast Linear Iterations for Distributed Averaging 1 Lin Xiao Stephen Boyd Information Systems Laboratory, Stanford University Stanford, CA 943-91 lxiao@stanford.edu, boyd@stanford.edu Abstract We consider

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

Finite-Field Consensus

Finite-Field Consensus Finite-Field Consensus Fabio Pasqualetti, Domenica Borra, and Francesco Bullo Abstract This work studies consensus networks over finite fields, where agents process and communicate values from the set

More information

Finite-Time Distributed Consensus in Graphs with Time-Invariant Topologies

Finite-Time Distributed Consensus in Graphs with Time-Invariant Topologies Finite-Time Distributed Consensus in Graphs with Time-Invariant Topologies Shreyas Sundaram and Christoforos N Hadjicostis Abstract We present a method for achieving consensus in distributed systems in

More information

arxiv: v1 [math.oc] 29 Sep 2018

arxiv: v1 [math.oc] 29 Sep 2018 Distributed Finite-time Least Squares Solver for Network Linear Equations Tao Yang a, Jemin George b, Jiahu Qin c,, Xinlei Yi d, Junfeng Wu e arxiv:856v mathoc 9 Sep 8 a Department of Electrical Engineering,

More information

Decentralized Stabilization of Heterogeneous Linear Multi-Agent Systems

Decentralized Stabilization of Heterogeneous Linear Multi-Agent Systems 1 Decentralized Stabilization of Heterogeneous Linear Multi-Agent Systems Mauro Franceschelli, Andrea Gasparri, Alessandro Giua, and Giovanni Ulivi Abstract In this paper the formation stabilization problem

More information

Scaling the Size of a Multiagent Formation via Distributed Feedback

Scaling the Size of a Multiagent Formation via Distributed Feedback Scaling the Size of a Multiagent Formation via Distributed Feedback Samuel Coogan, Murat Arcak, Magnus Egerstedt Abstract We consider a multiagent coordination problem where the objective is to steer a

More information

A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology

A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology Amir Amini, Amir Asif, Arash Mohammadi Electrical and Computer Engineering,, Montreal, Canada.

More information

RECENTLY, the study of cooperative control of multiagent

RECENTLY, the study of cooperative control of multiagent 24 IEEE/CAA JOURNAL OF AUTOMATICA SINICA, VOL., NO. 2, APRIL 24 Consensus Robust Output Regulation of Discrete-time Linear Multi-agent Systems Hongjing Liang Huaguang Zhang Zhanshan Wang Junyi Wang Abstract

More information

Consensus Problems in Complex-Weighted Networks

Consensus Problems in Complex-Weighted Networks Consensus Problems in Complex-Weighted Networks arxiv:1406.1862v1 [math.oc] 7 Jun 2014 Jiu-Gang Dong, Li Qiu Abstract Consensus problems for multi-agent systems in the literature have been studied under

More information

NCS Lecture 8 A Primer on Graph Theory. Cooperative Control Applications

NCS Lecture 8 A Primer on Graph Theory. Cooperative Control Applications NCS Lecture 8 A Primer on Graph Theory Richard M. Murray Control and Dynamical Systems California Institute of Technology Goals Introduce some motivating cooperative control problems Describe basic concepts

More information

Consensus Protocols for Networks of Dynamic Agents

Consensus Protocols for Networks of Dynamic Agents Consensus Protocols for Networks of Dynamic Agents Reza Olfati Saber Richard M. Murray Control and Dynamical Systems California Institute of Technology Pasadena, CA 91125 e-mail: {olfati,murray}@cds.caltech.edu

More information

Consensus of Heterogeneous Multi-Agent Systems with Intermittent Communication

Consensus of Heterogeneous Multi-Agent Systems with Intermittent Communication Journal of Systems Science and Information Aug., 2017, Vol. 5, No. 4, pp. 328 342 DOI: 10.21078/JSSI-2017-328-15 Consensus of Heterogeneous Multi-Agent Systems with Intermittent Communication Lü XU School

More information

arxiv: v2 [math.oc] 14 Dec 2015

arxiv: v2 [math.oc] 14 Dec 2015 Cooperative Output Regulation of Discrete-Time Linear Time-Delay Multi-agent Systems Yamin Yan and Jie Huang arxiv:1510.05380v2 math.oc 14 Dec 2015 Abstract In this paper, we study the cooperative output

More information

Revealing Stealthy Attacks in Control Systems

Revealing Stealthy Attacks in Control Systems Fiftieth Annual Allerton Conference Allerton House, UIUC, Illinois, USA October 1-5, 2012 Revealing Stealthy Attacks in Control Systems André Teixeira, Iman Shames, Henrik Sandberg, and Karl H. Johansson

More information

Research on Consistency Problem of Network Multi-agent Car System with State Predictor

Research on Consistency Problem of Network Multi-agent Car System with State Predictor International Core Journal of Engineering Vol. No.9 06 ISSN: 44-895 Research on Consistency Problem of Network Multi-agent Car System with State Predictor Yue Duan a, Linli Zhou b and Yue Wu c Institute

More information

Distributed Detection of Cyber Attacks and Faults for Power Systems

Distributed Detection of Cyber Attacks and Faults for Power Systems Preprints of the 19th World Congress The International Federation of Automatic Control Cape Town, South Africa. August 24-29, 214 Distributed Detection of Cyber Attacks and Faults for Power Systems Hiroaki

More information

Consensus Algorithms are Input-to-State Stable

Consensus Algorithms are Input-to-State Stable 05 American Control Conference June 8-10, 05. Portland, OR, USA WeC16.3 Consensus Algorithms are Input-to-State Stable Derek B. Kingston Wei Ren Randal W. Beard Department of Electrical and Computer Engineering

More information

Structural Consensus Controllability of Singular Multi-agent Linear Dynamic Systems

Structural Consensus Controllability of Singular Multi-agent Linear Dynamic Systems Structural Consensus Controllability of Singular Multi-agent Linear Dynamic Systems M. ISAL GARCÍA-PLANAS Universitat Politècnica de Catalunya Departament de Matèmatiques Minería 1, sc. C, 1-3, 08038 arcelona

More information

arxiv: v1 [physics.data-an] 28 Sep 2009

arxiv: v1 [physics.data-an] 28 Sep 2009 Synchronization in Networks of Coupled Harmonic Oscillators with Stochastic Perturbation and Time Delays arxiv:99.9v [physics.data-an] Sep 9 Yilun Shang Abstract In this paper, we investigate synchronization

More information

Discrete-Time Distributed Observers over Jointly Connected Switching Networks and an Application

Discrete-Time Distributed Observers over Jointly Connected Switching Networks and an Application 1 Discrete-Time Distributed Observers over Jointly Connected Switching Networks and an Application Tao Liu and Jie Huang arxiv:1812.01407v1 [cs.sy] 4 Dec 2018 Abstract In this paper, we first establish

More information

Distributed Receding Horizon Control of Cost Coupled Systems

Distributed Receding Horizon Control of Cost Coupled Systems Distributed Receding Horizon Control of Cost Coupled Systems William B. Dunbar Abstract This paper considers the problem of distributed control of dynamically decoupled systems that are subject to decoupled

More information

Research Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators

Research Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators Applied Mathematics Volume 212, Article ID 936, 12 pages doi:1.11/212/936 Research Article Mathematical Model and Cluster Synchronization for a Complex Dynamical Network with Two Types of Chaotic Oscillators

More information

Periodic Behaviors in Multi-agent Systems with Input Saturation Constraints

Periodic Behaviors in Multi-agent Systems with Input Saturation Constraints 5nd IEEE Conference on Decision and Control December 10-13, 013. Florence, Italy Periodic Behaviors in Multi-agent Systems with Input Saturation Constraints Tao Yang, Ziyang Meng, Dimos V. Dimarogonas,

More information

Distributed Frequency Control in Power Grids Under Limited Communication

Distributed Frequency Control in Power Grids Under Limited Communication Distributed Frequency Control in Power Grids Under Limited Communication Marzieh Parandehgheibi, Konstantin Turitsyn and Eytan Modiano Laboratory for Information and Decision Systems, Massachusetts Institute

More information

Distributed Tracking ControlforLinearMultiagent Systems With a Leader of Bounded Unknown Input

Distributed Tracking ControlforLinearMultiagent Systems With a Leader of Bounded Unknown Input 518 IEEE TRANSACTIONS ON AUTOMATIC CONTROL, VOL. 58, NO. 2, FEBRUARY 2013 Distributed Tracking ControlforLinearMultiagent Systems With a Leader of Bounded Unknown Input Zhongkui Li, Member,IEEE, Xiangdong

More information

Finite-Time Consensus based Clock Synchronization by Discontinuous Control

Finite-Time Consensus based Clock Synchronization by Discontinuous Control Finite- Consensus based Clock Synchronization by Discontinuous Control Mauro Franceschelli, Alessandro Pisano, Alessandro Giua, Elio Usai Dept. of Electrical and Electronic Engineering, Univ. of Cagliari,

More information

arxiv: v1 [math.oc] 24 Oct 2014

arxiv: v1 [math.oc] 24 Oct 2014 In-Network Leader Selection for Acyclic Graphs Stacy Patterson arxiv:1410.6533v1 [math.oc] 24 Oct 2014 Abstract We study the problem of leader selection in leaderfollower multi-agent systems that are subject

More information

Consensus Control of Multi-agent Systems with Optimal Performance

Consensus Control of Multi-agent Systems with Optimal Performance 1 Consensus Control of Multi-agent Systems with Optimal Performance Juanjuan Xu, Huanshui Zhang arxiv:183.941v1 [math.oc 6 Mar 18 Abstract The consensus control with optimal cost remains major challenging

More information

Tracking control for multi-agent consensus with an active leader and variable topology

Tracking control for multi-agent consensus with an active leader and variable topology Automatica 42 (2006) 1177 1182 wwwelseviercom/locate/automatica Brief paper Tracking control for multi-agent consensus with an active leader and variable topology Yiguang Hong a,, Jiangping Hu a, Linxin

More information

Event-Triggered Decentralized Dynamic Output Feedback Control for LTI Systems

Event-Triggered Decentralized Dynamic Output Feedback Control for LTI Systems Event-Triggered Decentralized Dynamic Output Feedback Control for LTI Systems Pavankumar Tallapragada Nikhil Chopra Department of Mechanical Engineering, University of Maryland, College Park, 2742 MD,

More information

Consensus Stabilizability and Exact Consensus Controllability of Multi-agent Linear Systems

Consensus Stabilizability and Exact Consensus Controllability of Multi-agent Linear Systems Consensus Stabilizability and Exact Consensus Controllability of Multi-agent Linear Systems M. ISABEL GARCÍA-PLANAS Universitat Politècnica de Catalunya Departament de Matèmatiques Minería 1, Esc. C, 1-3,

More information

Combining distance-based formation shape control with formation translation

Combining distance-based formation shape control with formation translation Combining distance-based formation shape control with formation translation Brian D O Anderson, Zhiyun Lin and Mohammad Deghat Abstract Steepest descent control laws can be used for formation shape control

More information

Lecture 4: Introduction to Graph Theory and Consensus. Cooperative Control Applications

Lecture 4: Introduction to Graph Theory and Consensus. Cooperative Control Applications Lecture 4: Introduction to Graph Theory and Consensus Richard M. Murray Caltech Control and Dynamical Systems 16 March 2009 Goals Introduce some motivating cooperative control problems Describe basic concepts

More information

Max-Consensus in a Max-Plus Algebraic Setting: The Case of Fixed Communication Topologies

Max-Consensus in a Max-Plus Algebraic Setting: The Case of Fixed Communication Topologies Max-Consensus in a Max-Plus Algebraic Setting: The Case of Fixed Communication Topologies Behrang Monajemi Nejad, Sid Ahmed Attia and Jörg Raisch Control Systems Group ( Fachgebiet Regelungssysteme ),

More information

CONTROL DESIGN FOR SET POINT TRACKING

CONTROL DESIGN FOR SET POINT TRACKING Chapter 5 CONTROL DESIGN FOR SET POINT TRACKING In this chapter, we extend the pole placement, observer-based output feedback design to solve tracking problems. By tracking we mean that the output is commanded

More information

Accepted Manuscript. Distributed Consensus Control for Multi-Agent Systems under Denial-of-Service. An-Yang Lu, Guang-Hong Yang

Accepted Manuscript. Distributed Consensus Control for Multi-Agent Systems under Denial-of-Service. An-Yang Lu, Guang-Hong Yang Accepted Manuscript Distributed Consensus Control for Multi-Agent Systems under Denial-of-Service An-Yang Lu, Guang-Hong Yang PII: S2-255(18)391-4 DOI: 1.116/j.ins.218.2.8 Reference: INS 13413 To appear

More information

r-robustness and (r, s)-robustness of Circulant Graphs

r-robustness and (r, s)-robustness of Circulant Graphs r-robustness and (r, s)-robustness of Circulant Graphs James Usevitch and Dimitra Panagou Abstract There has been recent growing interest in graph theoretical properties known as r- and (r, s)-robustness.

More information

Non-Collision Conditions in Multi-agent Robots Formation using Local Potential Functions

Non-Collision Conditions in Multi-agent Robots Formation using Local Potential Functions 2008 IEEE International Conference on Robotics and Automation Pasadena, CA, USA, May 19-23, 2008 Non-Collision Conditions in Multi-agent Robots Formation using Local Potential Functions E G Hernández-Martínez

More information

Chap. 3. Controlled Systems, Controllability

Chap. 3. Controlled Systems, Controllability Chap. 3. Controlled Systems, Controllability 1. Controllability of Linear Systems 1.1. Kalman s Criterion Consider the linear system ẋ = Ax + Bu where x R n : state vector and u R m : input vector. A :

More information

Distributed Cyber-Attack Detection in the Secondary Control of DC Microgrids

Distributed Cyber-Attack Detection in the Secondary Control of DC Microgrids Distributed Cyber-Attack Detection in the Secondary Control of DC Microgrids A. J. Gallo, M. S. Turan, P. Nahata, F. Boem, T. Parisini, G. Ferrari-Trecate Abstract The paper considers the problem of detecting

More information

Research Article Stabilization Analysis and Synthesis of Discrete-Time Descriptor Markov Jump Systems with Partially Unknown Transition Probabilities

Research Article Stabilization Analysis and Synthesis of Discrete-Time Descriptor Markov Jump Systems with Partially Unknown Transition Probabilities Research Journal of Applied Sciences, Engineering and Technology 7(4): 728-734, 214 DOI:1.1926/rjaset.7.39 ISSN: 24-7459; e-issn: 24-7467 214 Maxwell Scientific Publication Corp. Submitted: February 25,

More information

Research Article H Consensus for Discrete-Time Multiagent Systems

Research Article H Consensus for Discrete-Time Multiagent Systems Discrete Dynamics in Nature and Society Volume 05, Article ID 8084, 6 pages http://dx.doi.org/0.55/05/8084 Research Article H Consensus for Discrete- Multiagent Systems Xiaoping Wang and Jinliang Shao

More information

Decentralized Formation of Random Regular Graphs for Robust Multi-Agent Networks

Decentralized Formation of Random Regular Graphs for Robust Multi-Agent Networks Decentralized Formation of Random Regular Graphs for Robust Multi-Agent Networks A. Yasin Yazıcıoğlu, Magnus Egerstedt, and Jeff S. Shamma Abstract Multi-agent networks are often modeled via interaction

More information

Consensus Based Formation Control Strategies for Multi-vehicle Systems

Consensus Based Formation Control Strategies for Multi-vehicle Systems Proceedings of the 6 American Control Conference Minneapolis, Minnesota, USA, June 14-16, 6 FrA1.5 Consensus Based Formation Control Strategies for Multi-vehicle Systems Wei Ren Abstract In this paper

More information

Research Article Pinning-Like Adaptive Consensus for Networked Mobile Agents with Heterogeneous Nonlinear Dynamics

Research Article Pinning-Like Adaptive Consensus for Networked Mobile Agents with Heterogeneous Nonlinear Dynamics Mathematical Problems in Engineering, Article ID 69031, 9 pages http://dx.doi.org/10.1155/014/69031 Research Article Pinning-Like Adaptive Consensus for etworked Mobile Agents with Heterogeneous onlinear

More information

A Graph-Theoretic Characterization of Controllability for Multi-agent Systems

A Graph-Theoretic Characterization of Controllability for Multi-agent Systems A Graph-Theoretic Characterization of Controllability for Multi-agent Systems Meng Ji and Magnus Egerstedt Abstract In this paper we continue our pursuit of conditions that render a multi-agent networked

More information

Recent Advances in Consensus of Multi-Agent Systems

Recent Advances in Consensus of Multi-Agent Systems Int. Workshop on Complex Eng. Systems and Design, Hong Kong, 22 May 2009 Recent Advances in Consensus of Multi-Agent Systems Jinhu Lü Academy of Mathematics and Systems Science Chinese Academy of Sciences

More information

On the Failure of Power System Automatic Generation Control due to Measurement Noise

On the Failure of Power System Automatic Generation Control due to Measurement Noise 1 On the Failure of Power System Automatic Generation Control due to Measurement Noise Jiangmeng Zhang and Alejandro. D. Domínguez-García University of Illinois at Urbana-Champaign Urbana, Illinois 6181

More information

CHATTERING-FREE SMC WITH UNIDIRECTIONAL AUXILIARY SURFACES FOR NONLINEAR SYSTEM WITH STATE CONSTRAINTS. Jian Fu, Qing-Xian Wu and Ze-Hui Mao

CHATTERING-FREE SMC WITH UNIDIRECTIONAL AUXILIARY SURFACES FOR NONLINEAR SYSTEM WITH STATE CONSTRAINTS. Jian Fu, Qing-Xian Wu and Ze-Hui Mao International Journal of Innovative Computing, Information and Control ICIC International c 2013 ISSN 1349-4198 Volume 9, Number 12, December 2013 pp. 4793 4809 CHATTERING-FREE SMC WITH UNIDIRECTIONAL

More information

SJÄLVSTÄNDIGA ARBETEN I MATEMATIK

SJÄLVSTÄNDIGA ARBETEN I MATEMATIK SJÄLVSTÄNDIGA ARBETEN I MATEMATIK MATEMATISKA INSTITUTIONEN, STOCKHOLMS UNIVERSITET Consensus problems for multi-agent systems av Hongmei Zhao 2010 - No 2 MATEMATISKA INSTITUTIONEN, STOCKHOLMS UNIVERSITET,

More information

TOPOLOGY FOR GLOBAL AVERAGE CONSENSUS. Soummya Kar and José M. F. Moura

TOPOLOGY FOR GLOBAL AVERAGE CONSENSUS. Soummya Kar and José M. F. Moura TOPOLOGY FOR GLOBAL AVERAGE CONSENSUS Soummya Kar and José M. F. Moura Department of Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 15213 USA (e-mail:{moura}@ece.cmu.edu)

More information

Exact Consensus Controllability of Multi-agent Linear Systems

Exact Consensus Controllability of Multi-agent Linear Systems Exact Consensus Controllability of Multi-agent Linear Systems M. ISAEL GARCÍA-PLANAS Universitat Politècnica de Catalunya Departament de Matèmatiques Minería 1, Esc. C, 1-3, 08038 arcelona SPAIN maria.isabel.garcia@upc.edu

More information

The ϵ-capacity of a gain matrix and tolerable disturbances: Discrete-time perturbed linear systems

The ϵ-capacity of a gain matrix and tolerable disturbances: Discrete-time perturbed linear systems IOSR Journal of Mathematics (IOSR-JM) e-issn: 2278-5728, p-issn: 2319-765X. Volume 11, Issue 3 Ver. IV (May - Jun. 2015), PP 52-62 www.iosrjournals.org The ϵ-capacity of a gain matrix and tolerable disturbances:

More information