Next Article in Journal
Adaptive Hydraulic Potential Energy Transfer Technology and Its Application to Compressed Air Energy Storage
Next Article in Special Issue
Lyapunov-Based Large Signal Stability Assessment for VSG Controlled Inverter-Interfaced Distributed Generators
Previous Article in Journal
A Simple Pseudo-Homogeneous Reversible Kinetic Model for the Esterification of Different Fatty Acids with Methanol in the Presence of Amberlyst-15
Previous Article in Special Issue
A Distributed PV System Capacity Estimation Approach Based on Support Vector Machine with Customer Net Load Curve Features
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Resilient Multiscale Coordination Control against Adversarial Nodes

School of Mathematical Sciences, Tongji University, Shanghai 200092, China
Submission received: 11 June 2018 / Revised: 12 July 2018 / Accepted: 12 July 2018 / Published: 13 July 2018
(This article belongs to the Special Issue Distribution System Operation and Control)

Abstract

:
Multiscale consensus has been studied recently as a new concept in the field of multi-agent systems, which is able to accommodate many complicated coordination control tasks where values are measured in different scales due to, e.g., the constraints of physical environment. In this paper, we investigate the problem of resilient multiscale coordination control against a set of adversarial or non-cooperative nodes in directed networks. We design a multiscale filtering algorithm based upon local information which can withstand both faulty and Byzantine nodes. Building on the concept of network robustness, we establish necessary and sufficient conditions guaranteeing multiscale consensus with general time varying scales in the presence of globally bounded as well as locally bounded threats. In particular, for a network containing at most R faulty nodes, multiscale consensus is achieved if and only if the network is ( R + 1 , R + 1 ) -robust. The counterpart when having at most R Byzantine nodes instead is that the induced subnetwork of cooperative nodes is R + 1 -robust. Conditions guaranteeing resilient consensus for time-dependent networks are developed. Moreover, multiscale formation generation problems are introduced and solved as the generalizations. Finally, some numerical examples including applications in modular microgrids and power systems are worked out to demonstrate the availability of our theoretical results.

1. Introduction

Coordination control over cooperative multi-agent net-works consisting of multiple individual subsystems has played a significant role in today’s complex physical and engineered systems. A fundamental task of coordination control is reaching consensus collectively on global quantities of interest, such as the centroid of the network structure or the mean temperature of the environment, using only local information obtained by each agent in the network due to the limited communication capability [1]. Calculation and estimation through nearest neighbor interaction have been realized by a variety of consensus algorithms in the framework of distributed systems [2,3,4], where all individual agents can be measured by a unified scale enabling diverse applications such as traffic control, sensor networks, distributed optimization, and data aggregation.
In many physical-world applications, the states of agents tend to achieve agreement upon a certain consensus value but with different, possibly time-dependent, scales. For instance, in simultaneous coordination control of satellites running on orbits and their simulating robots on ground, prominent difference between the scales of vehicles’ position and speed in space and on ground entails multi-scaled coordination control [5,6]. Other examples include water distribution systems, closed queuing networks, and compartmental mass-action systems [7]. As an extension to standard consensus, Roy [8] recently introduced a novel concept of scaled consensus, in which agents’ states achieve asymptotically prescribed ratios in terms of multiple scales. It is noteworthy that the multiscale, or scaled, consensus offers a general basis for a wide range of consensus algorithms, which can be specialized to obtain standard consensus, cluster or group consensus [9], in which different subnetworks are allowed to achieve different consistent values, bipartite consensus [10] and sign consensus [11] by adopting appropriate scales.
Multiscale consensus has been explored for fixed strongly connected topology in [8] as well as switching topologies in [12], where the autonomous agents are described by continuous-time single integrators. Some scaled consensus protocols are proposed to solve the finite-time coordination control for continuous-time multi-vehicle systems in [13] and for discrete-time ones in [14]. In the recent work [15], multiscale consensus has been further characterized by sufficient and necessary conditions accommodating signal processing delays and signal transmission delays. All the aforementioned work assumes that all agents in the communication networks are cooperative. However, the performance of such systems deteriorates when one or more agents are compromised, potentially preventing the team of cooperative agents from achieving their goal. To the best of our knowledge, the problem of multiscale consensus in the presence of adversaries has not been addressed due to its complexity.
Large-scale cyber-physical systems are susceptible to adversarial or non-cooperative nodes due to malicious attacks (for instance, an attacker taking control of the communication module of certain agents trying to manipulate the entire network) or platform-level failures (for instance, a faulty robot sharing an incorrect location due to a defective Global Positioning System sensor). As such, resilience of consensus, and, more generally, information transmission, in the presence of adversarial nodes, has attracted significant attention in areas such as communication networks and mobile robotics over the past decades [16,17]. Recent remarkable efforts include a novel definition of network resilience by Zhang et al. and LeBlanc et al. [18,19], termed r-robustness, which facilitates purely local update rules for resilient consensus against malicious nodes. The advantage of the proposed approach is that the identities and actual number of non-cooperative nodes remain unknown to the cooperative nodes in the network. The results have later been generalized to the case of second-order multi-agent systems [20] and tolerance to communication delays is tackled in [21]. Furthermore, resilient flocking in time-dependent networks formed by mobile robot teams has been investigated in [22] and resilient opinion consensus in mobile social networks has been explored in [23]. It is worth mentioning that resilience to adversaries is conceptually distinct from resilience to disturbance or noise [24], and the methods used are very different.
Motivated by the aforementioned works, we in this paper consider the resilient multiscale coordination control for multi-agent systems in the presence of adversarial (faulty or malicious) nodes. The scope of the adversarial nodes is assumed to be either bounded by a constant in the whole network, which will be referred to as the globally bounded model, or by a constant in the neighborhood of each cooperative node, which will be referred to as the locally bounded model. The contribution of this paper is three-fold. First, compared with the previous resilient consensus results in e.g., [18,19,20], a generalization of the standard consensus protocol to multiscale consensus is proposed. We present sufficient and necessary conditions for multiscale consensus in time-invariant and time-varying networks that are modeled by directed graphs. Second, in the purview of multiscale consensus problems, arbitrary time-varying scales are addressed here, which largely extend the usual constant scales considered in e.g., [8,13,14,15] as well as the sign-preserving time-dependent scales studied in [12]. Finally, we introduce the multiscale resilient formation generation and formation tracking problems for both globally and locally bounded models in addition to resilient distributed estimation (i.e., multiscale consensus) as further generalizations, which are applicable in cooperative exploration and coordination tasks; e.g., [25,26].
The remainder of the paper is organized as follows. Section 2 introduces the resilient multiscale consensus problems. The main results are given in Section 3. Simulation tests are performed to illustrate their effectiveness in Section 4 and conclusions are presented in Section 5.

2. Resilient Multiscale Consensus Algorithms

2.1. Graph Theory

Let R and N be the sets of reals and non-negative integers, respectively. A time-dependent directed network (i.e., graph) over n vertices is denoted by G ( t ) = ( V , E ( t ) ) , where V = { v 1 , , v n } represents the vertex set characterizing the agents in the network, and E ( t ) V × V represents the directed edge set at t N . We consider a set partition of the vertex set as V = C A , in which C contains the set of cooperative nodes and A contains the set of adversarial nodes unknown a priori to the cooperative nodes. The information flow going from node v i to node v j is described by the edge ( v i , v j ) . The neighborhood of node v i at time t is signified by N i ( t ) = { v j : ( v j , v i ) E ( t ) } . When considering that time-invariant networks are taken into consideration, we suppress the dependence on t correspondingly. We sometimes do so in time-varying networks when no ambiguity will be caused within the context.
The following concepts of reachable sets and network robustness are introduced in [18], which have a close relationship with conventional graph-theoretic connectivity and play an essential role in resilient coordination [19,27].
Definition 1 (reachable set).
Suppose r , s N . S V is said to be an r-reachable set if there is a vertex v i S such that | N i S | r . Moreover, S is said to be an ( r , s ) -reachable set if | { v i S : | N i S | r } | s . Clearly, r-reachability is equal to ( r , 1 ) -reachability.
Definition 2 (network robustness).
Let r , s N . A digraph G is called r-robust if, for every pair of disjoint and nonempty subsets of V , at least one of them is r-reachable. Furthermore, G is ( r , s ) -robust if for every pair of disjoint nonempty subsets S 1 , S 2 V , at least one of the following three statements holds: (i) | { v i S 1 : | N i S 1 | r } | = | S 1 | , (ii) | { v i S 2 : | N i S 2 | r } | = | S 2 | , and (iii) | { v i S 1 : | N i S 1 | r } | + | { v i S 2 : | N i S 2 | r } | s .

2.2. Model Description

For a multi-agent system having the directed communication graph G ( t ) = ( V , E ( t ) ) with V = C A , each cooperative node v i C applies the following consensus update rule and communicates its value to its neighbors at every time-step t N :
x i ( t + 1 ) = f i { x j i ( t ) : v j N i ( t ) { v i } } ,
where x j i ( t ) R is the value sent from node v j to node v i at time t, and x j i ( t ) = x j ( t ) for v j C . Clearly, x i i ( t ) = x i ( t ) . Here, f i delineates the update function for cooperative node v i , which is to be designed so that the cooperative nodes could still reach the system’s goal withstanding the compromise of adversarial nodes, whose identity and number remain unknown. Adversarial nodes, on the other hand, can apply arbitrary and different update rules that are not known to the cooperative nodes. We will consider the following two sorts of adversarial nodes.
Definition 3 ( adversarial node).
A node v i A is faulty if it forwards value x i ( t ) to all of its neighbors at each time step, but implements some different update rule f i at some time step. A node v i A is called Byzantine if it applies some different update rule f i or it fails to forward the same value to all the neighbors at some time step.
A faulty node is non-cooperative due to, for example, a faulty sensor or actuator, or intentional manipulation when the network is realized through broadcast communication. Byzantine nodes are often regarded as the worst-case attackers [19,21], who usually have a complete knowledge of the whole system and send information to its neighbors in a point-to-point way. Note that both faulty and Byzantine nodes can update their states arbitrarily at each time step, and that all faulty nodes are also Byzantine by definition, but not vice versa.
According to the location and number of the adversarial nodes, here we study the following two sorts of models: (i) R -globally bounded model, in which the number of nodes in A is bounded by a constant R N ; and (ii) R -locally bounded model, in which | N i A | R for every v i C . In the R -locally bounded model, every cooperative node possesses no more than R adversarial neighbors. In both models, adversarial nodes threaten the group objective through stopping other agents from reaching valid states or driving their states into a dangerous range. Thus, strategies for resilient coordination are highly desirable.

2.3. Multiscale Filtering Strategy

Let t N . Given a scalar scale α i ( t ) 0 for agent v i V , we propose to deal with the multiscale consensus defined as follows.
Definition 4 (multiscale consensus).
The multi-agent system (1) is said to achieve multiscale consensus with respect to ( α 1 ( t ) , , α n ( t ) ) if lim t ( α i ( t ) x i ( t ) α j ( t ) x j ( t ) ) = 0 for any v i , v j C and any initial conditions { x i ( 0 ) } v i V .
It is obvious that multiscale consensus problems generalize standard consensus as well as cluster consensus problems [2,3]. It is also worth noting that Definition 4 admits general time-dependent scales, which are required restrictively to be invariant constants in [8,13,14,15] and sign-preserving in [12].
To accommodate the adversarial nodes in the network, we propose the following local filtering protocol, which extends the Weighted-Mean-Subsequence-Reduced (W-MSR) algorithm [18,19] for standard consensus. Specifically, the multiscale coordination consists of three steps, implemented at every time step t. Fix R N . First, every cooperative node v i C acquires the values { x j i ( t ) } of its neighbors, and generates a decreasing list for { α j ( t ) x j i ( t ) } . Second, the largest R values which are strictly larger than α i ( t ) x i ( t ) in this sorted list are deleted (if there are fewer than R larger values than α i ( t ) x i ( t ) , all of those values should be deleted). We apply a similar deletion process to the smaller values. The set of nodes that are deleted by node v i at time step t is denoted by R i ( t ) . Third, each v i C updates its value using the following rule:
x i ( t + 1 ) = sgn ( α i ( t ) ) v j ( N i ( t ) { v i } ) R i ( t ) w i j ( t ) α j ( t ) x j i ( t ) ,
where sgn ( · ) is the signum function, and w i j ( t ) are the weights satisfying (i) w i j ( t ) = 0 if v j N i ( t ) { v i } , (ii) there is some constant α ( 0 , 1 ) independent of t, such that w i j ( t ) | α i ( t ) | α > 0 for any v j ( N i ( t ) { v i } ) R i ( t ) , and (iii) v j ( N i ( t ) { v i } ) R i ( t ) w i j ( t ) | α i ( t ) | = 1 .
Notice that the above weights w i j ( t ) may be arbitrarily selected provided these three conditions are true. The algorithmic complexity is low and only local information is utilized. Hence, the algorithm can be regarded as purely distributed. No prior knowledge of the identities of adversarial nodes or the network topology is assumed for cooperative nodes. The above algorithm will be referred to as the multiscale filtering strategy with parameter R .

3. Consensus Analysis

Here, we present the consensus analysis for the multi-agent system in the presence of both faulty and Byzantine nodes. In every case, we study resilience results for both globally bounded threats and locally bounded threats. To begin with, set M ( t ) max v i C { α i ( t ) x i ( t ) } and m ( t ) min v i C { α i ( t ) x i ( t ) } . The update rule in (2) implies that
α i ( t + 1 ) x i ( t + 1 ) = | α i ( t ) | j ( N i ( t ) { v i } ) R i ( t ) w i j ( t ) α j ( t ) x j i ( t ) ,
which is a convex combination of { α j ( t ) x j i ( t ) } j ( N i ( t ) { v i } ) R i ( t ) . It is straightforward to see that, for all i C and t N , α i ( t + 1 ) x i ( t + 1 ) [ m ( t ) , M ( t ) ] holds in both R -globally and R -locally bounded models in the presence of faulty/Byzantine nodes when the multiscale filtering strategy with parameter R is applied. This means the interval [ m ( 0 ) , M ( 0 ) ] is always an invariant set in the sense that the scaled values of cooperative nodes remain in this range for all t.

3.1. Multiscale Coordination in the Presence of Faulty Nodes

In the following, we establish some necessary and sufficient conditions for multiscale coordination in the globally/locally bounded model with faulty nodes. We consider time-invariant networks first, and then extend the results to time-dependent networks. The proofs are based on the techniques in [19].
Theorem 1 (consensus in globally bounded model with faulty nodes).
Consider a time-invariant network characterized by a digraph G = ( V , E ) , where every cooperative node updates its value according to the multiscale filtering strategy with parameter R . Therefore, in the R -globally bound model having faulty nodes, multiscale consensus is reached if and only if G is ( R + 1 , R + 1 ) -robust.
Proof. 
(Necessity) Assume that G is not an ( R + 1 , R + 1 ) -robust graph. Thus, there are disjoint nonempty sets S 1 , S 2 V such that none of the statements (i)–(iii) in Definition 2 hold. Fix a < b . Let x i ( 0 ) = a α i ( 0 ) for any node v i S 1 , and x i ( 0 ) = b α i ( 0 ) for any node v i S 2 . For v i V { S 1 S 2 } , set x i ( 0 ) = c α i ( 0 ) for some fixed c ( a , b ) . Since | { v i S 1 : | N i S 1 | R + 1 } | + | { v i S 2 : | N i S 2 | R + 1 } | R , suppose that all nodes in { v i S 1 : | N i S 1 | R + 1 } and { v i S 2 : | N i S 2 | R + 1 } are faulty nodes and that they keep their values unchanged. Since there is at least one cooperative node in both S 1 and S 2 (because | { v i S 1 : | N i S 1 | R + 1 } | < | S 1 | and | { v i S 2 : | N i S 2 | R + 1 } | < | S 2 | ), the scaled values α i ( t ) x i ( t ) of such cooperative nodes cannot reach consensus by using the multiscale filtering strategy with parameter R . Therefore, multiscale consensus can not be achieved.
(Sufficiency) From the comments in the beginning of this section, we may assume that ρ M lim t M ( t ) ρ m lim t m ( t ) . If ρ M = ρ m , multiscale consensus is then reached. In what follows, we assume that ρ M > ρ m and will show that it does not hold by using contradiction.
Choose ε 0 > 0 satisfying ρ M ε 0 > ρ m + ε 0 . For t N and ε k > 0 , we define two sets A M ( t , ε k ) { v i V : α i ( t ) x i ( t ) > ρ M ε k } and A m ( t , ε k ) { v i V : α i ( t ) x i ( t ) < ρ m + ε k } . By the definition of ε 0 , A M ( t , ε 0 ) and A m ( t , ε 0 ) are disjoint. Fix ε < α | C | ε 0 1 α | C | and ε 0 > ε > 0 . Let t ε be the time step satisfying M ( t ) < ρ M + ε and m ( t ) > ρ m ε for all t t ε .
Recall that A M ( t ε , ε 0 ) and A m ( t ε , ε 0 ) are nonempty disjoint sets. Noting that G is ( R + 1 , R + 1 ) -robust with at most R faulty nodes, there must be a cooperative node in their union which contains more than or a number equal to R + 1 neighbors outside of its set. We suppose, without loss of generality, that v i A M ( t ε , ε 0 ) C has more than or equal to R + 1 neighbors outside of A M ( t ε , ε 0 ) . Since these neighbors’ values are at most equal to ρ M ε 0 and at least one of these values will be used by v i , we obtain
α i ( t ε + 1 ) x i ( t ε + 1 ) ( 1 α ) M ( t ε ) + α ( ρ M ε 0 ) ρ M α ε 0 + ( 1 α ) ε ,
where we have used the inequality M ( t ε ) ρ M + ε , and the fact that each cooperative node’s value is a convex combination of its own value and the values of its neighbors with coefficients larger than or equal to α and that the largest value v i will use at time t ε no more than M ( t ε ) according to the multiscale filtering strategy with parameter R . The expression (4) also applies to the updated value of any cooperative node outside A M ( t ε , ε 0 ) since such a node will adopt its own value (which is also less than or equal to ρ M ε 0 ) in the update process. Likewise, if v i A m ( t ε , ε 0 ) C , which has more than or a number equal to R + 1 neighbors outside of A m ( t ε , ε 0 ) , we derive a similar inequality
α i ( t ε + 1 ) x i ( t ε + 1 ) ρ m + α ε 0 ( 1 α ) ε ,
which also applies to the cooperative nodes outside A m ( t ε , ε 0 ) .
Now, define ε 1 = α ε 0 ( 1 α ) ε and let 0 < ε < ε 1 < ε 0 . Notice that the sets A M ( t ε + 1 , ε 1 ) and A m ( t ε + 1 , ε 1 ) are disjoint. The discussion in the above paragraph implies that | A M ( t ε + 1 , ε 1 ) C | < | A M ( t ε , ε 0 ) C | or | A m ( t ε + 1 , ε 1 ) C | < | A m ( t ε , ε 0 ) C | holds. We can recursively define ε k = α ε k 1 ( 1 α ) ε for each k 1 and note that ε k < ε k 1 . The above comments can be applied to every time step t ε + k provided there still exist cooperative nodes in A M ( t ε + k , ε k ) and A m ( t ε + k , ε k ) . Since there are | C | cooperative nodes in the entire graph, there is some T | C | such that either A M ( t ε + T , ε T ) C or A m ( t ε + T , ε T ) C is empty. However, ε T = α ε T 1 ( 1 α ) ε = α T ε 0 ( 1 α T ) ε α | C | ε 0 ( 1 α | C | ) ε > 0 as per the choice of ε . This means that every cooperative node at time t ε + T has a value of no more than ρ M ε T < ρ M or has a value of at least ρ m + ε T > ρ m . This contradicts the definition of ρ M or ρ m . The result then follows. ☐
For time-dependent networks, we show the following corollary.
Corollary 1.
Consider a time-varying network characterized by a digraph G ( t ) = ( V , E ( t ) ) , where every cooperative node updates its value according to the multiscale filtering strategy with parameter R . Denote by { t k } the time steps in which G ( t ) is ( R + 1 , R + 1 ) -robust. Therefore, in the R -globally bound model with faulty nodes, multiscale consensus is reached if | { t k } | = and there is a constant c such that | t k + 1 t k | c for all k.
Proof. 
We proceed similarly as in Theorem 1. We now set ε < α | C | c ε 0 1 α | C | c and ε 0 > ε > 0 . Define t ε to be the time step satisfying M ( t ) < ρ M + ε and m ( t ) > ρ m ε for all t t ε . By assumption, there is τ 1 { t ε , t ε + 1 , , t ε + c 1 } such that G ( τ 1 ) is ( R + 1 , R + 1 ) -robust. Let ε 1 = α ε 0 ( 1 α ) ε and 0 < ε < ε 1 < ε 0 . Reasoning as in the proof of Theorem 1, we see that | A M ( τ 1 + 1 , ε 1 ) C | < | A M ( τ 1 , ε 0 ) C | or | A m ( τ 1 + 1 , ε 1 ) C | < | A m ( τ 1 , ε 0 ) C | holds.
We can recursively define ε k = α ε k 1 ( 1 α ) ε for 1 k | C | c . Similarly as in Theorem 1, we can prove that every cooperative node v i satisfying α i ( τ 1 + 1 ) x i ( τ 1 + 1 ) ρ M ε 1 will satisfy α i ( τ 1 + k ) x i ( τ 1 + k ) ρ M ε k for each 1 k | C | c . In the same manner, every cooperative node v i satisfying α i ( τ 1 + 1 ) x i ( τ 1 + 1 ) ρ m + ε 1 will satisfy α i ( τ 1 + k ) x i ( τ 1 + k ) ρ m + ε k for each 1 k | C | c . Therefore, we have | A M ( τ 1 + k , ε k ) C | | A M ( τ 1 + k 1 , ε k 1 ) C | or | A m ( τ 1 + k , ε k ) C | | A m ( τ 1 + k 1 , ε k 1 ) C | for every 1 k | C | c irrespective of the graph structure. By assumption, there exists an infinite sequence of τ 1 , τ 2 , where G ( τ k ) is ( R + 1 , R + 1 ) -robust, both A M ( τ k , ε τ k τ 1 ) C and A m ( τ k , ε τ k τ 1 ) C are non-empty, and either | A M ( τ k + 1 , ε τ k + 1 τ 1 ) C | < | A M ( τ k , ε τ k τ 1 ) C | or | A m ( τ k + 1 , ε τ k + 1 τ 1 ) C | < | A m ( τ k , ε τ k τ 1 ) C | , or both, holds for k 1 . As there exist | C | cooperative nodes in the entire graph and | τ | C | τ 1 | | C | c , there is some T | C | c such that either A M ( τ 1 + T , ε T ) C or A m ( τ 1 + T , ε T ) C is empty. Recalling the definition of ε , we obtain ε T > 0 . This gives rise to a contradiction similarly as in the proof of Theorem 1. ☐
Next, we extend the above results to solve resilient formation generation problems for multi-agent systems in the presence of adversarial nodes. In standard formation generation problems, the aim is to design distributed protocols to guarantee that each pair of neighboring agents reach a desired relative position with respect to each other [3,4,28]. A certain pattern is thus formed by the agents as a whole. In the context of resilient multiscale coordination, we introduce the multiscale formation generation as follows.
Definition 5 (multiscale formation generation).
Let g = ( g 1 , , g n ) R n . The agents in G are said to achieve the multiscale formation g with respect to ( α 1 ( t ) , , α n ( t ) ) if lim t ( α i ( t ) x i ( t ) α j ( t ) x j ( t ) ) = g i g j for all v i , v j C and all initial conditions { x i ( 0 ) } v i V .
It is easy to see that the agents reach the multiscale formation g if there exists a vector h R n such that for v i C , α i ( t ) x i ( t ) tends to g i + h as time goes to infinity. To this end, we design the following formation generation rule for each v i C :
x i ( t + 1 ) = 1 α i ( t ) g i + sgn ( α i ( t ) ) · v j ( N i ( t ) { v i } ) R i ( t ) w i j ( t ) α j ( t ) x j i ( t ) g j ,
where the weights w i j ( t ) satisfy the same conditions in Section 2.3. In the formation control problem, we will modify the three-step multiscale filtering strategy with parameter R introduced in Section 2.3 in three places: first, the sorted list is created for { α j ( t ) x j i ( t ) g j } instead of { α j ( t ) x j i ( t ) } . Second, the largest R values that are strictly greater than α i ( t ) x i ( t ) g i instead of α i ( t ) x i ( t ) in the list are deleted. The same modification applies to the smaller values. Third, the update rule (2) is replaced by (6). We shall refer to this modified algorithm as the multiscale filtering-formation strategy with parameter R.
Corollary 2 (formation generation in globally bounded model with faulty nodes).
Consider a time-invariant graph characterized by a digraph G = ( V , E ) , where every cooperative node updates its value according to the multiscale filtering-formation strategy with parameter R . Therefore, in the R -globally bounded model having faulty nodes, multiscale formation g is reached if and only if G is ( R + 1 , R + 1 ) -robust.
For a time-dependent network G ( t ) = ( V , E ( t ) ) , let { t k } be the time steps where G ( t ) is ( R + 1 , R + 1 ) -robust. Therefore, in the R -globally bounded model having faulty nodes, multiscale formation g is reached if | { t k } | = and there is a constant c satisfying | t k + 1 t k | c for every k.
Proof. 
Let x ¯ j i ( t ) = x j i ( t ) g j / α j ( t ) and x ¯ j ( t ) = x j ( t ) g j / α j ( t ) for v i , v j V . Then, the update rule (6) becomes x ¯ i ( t + 1 ) = sgn ( α i ( t ) ) j ( N i ( t ) { v i } ) R i ( t ) w i j ( t ) α j ( t ) x ¯ j i ( t ) for v i C .
For time-invariant network topology, it follows from Theorem 1 that G is ( R + 1 , R + 1 ) -robust if and only if multiscale consensus is achieved for { x ¯ i ( t ) } v i C , which in turn is equivalent to having a vector h R n such that lim t α i ( t ) x i ( t ) = g i + h . The result then follows. In the case of time-varying topology, a similar argument applies by virtue of Corollary 1. ☐
For locally bounded models, where adversarial nodes are much more popular but the number of them are still bounded in every cooperative node’s neighborhood, we propose to characterize the network structure that is ideal for coping with fault nodes as follows.
Theorem 2 (consensus in locally bounded model with faulty nodes).
Consider a time-invariant network characterized by a digraph G = ( V , E ) , in which every cooperative node updates its value following the multiscale filtering strategy with parameter R . Therefore, in the R -locally bound model having faulty nodes, multiscale consensus is achieved if G is 2 R + 1 -robust. Moreover, G is R + 1 -robust if multiscale consensus in the R -locally bound model with faulty nodes is achieved.
Proof. 
(Necessity) Assume that G is not R + 1 -robust. Therefore, there exist disjoint nonempty sets S 1 , S 2 V such that every node in these two sets will have at most R neighbors outside the set. Suppose that there exist cooperative nodes in both S 1 and S 2 . Fix a < b . Let x i ( 0 ) = a α i ( 0 ) for any node v i S 1 , and x i ( 0 ) = b α i ( 0 ) for any node v i S 2 . For v i V { S 1 S 2 } , set x i ( 0 ) = c α i ( 0 ) for some fixed c ( a , b ) . Clearly, the scaled values α i ( t ) x i ( t ) of nodes in S 1 and S 2 will not achieve consensus under the multiscale filtering strategy with parameter R because they will not adopt any values from outside their own sets. Thus, multiscale consensus can not be reached.
(Sufficiency) We proceed similarly as in Theorem 1. Suppose that ρ M lim t M ( t ) and ρ m lim t m ( t ) . In what follows, we will prove ρ M = ρ m by contradiction. For this purpose, assume that ρ M > ρ m . Choose ε 0 > 0 so that ρ M ε 0 > ρ m + ε 0 . For t N and ε k > 0 , we consider two sets given by A M ( t , ε k ) { v i V : α i ( t ) x i ( t ) > ρ M ε k } and A m ( t , ε k ) { v i V : α i ( t ) x i ( t ) < ρ m + ε k } . By the definition of ε 0 , A M ( t , ε 0 ) and A m ( t , ε 0 ) are disjoint. Set ε < α | C | ε 0 1 α | C | and ε 0 > ε > 0 . Define t ε to be the time step satisfying M ( t ) < ρ M + ε and m ( t ) > ρ m ε for any t t ε .
Recall that the two sets A M ( t ε , ε 0 ) C and A m ( t ε , ε 0 ) C are nonempty and disjoint. Since G is 2 R + 1 -robust, one of these two sets must be 2 R + 1 -reachable if not both. We suppose, without loss of generality, that A M ( t ε , ε 0 ) C is 2 R + 1 -reachable, and hence there exists a node v i A M ( t ε , ε 0 ) C which has no less than 2 R + 1 neighboring nodes outside its set. Because there exist no more than R faulty nodes in N i , v i will adopt no less than one of its cooperative neighbors’ values outside A M ( t ε , ε 0 ) C under the multiscale filtering strategy with parameter R . Consequently, proceeding as in the proof of Theorem 1, we derive α i ( t ε + 1 ) x i ( t ε + 1 ) ρ M α ε 0 + ( 1 α ) ε . This also holds true for the renewed value of every cooperative node outside A M ( t ε , ε 0 ) C as such a node will adopt its own value in the renewal procedure. Analogously, if v i A m ( t ε , ε 0 ) C has more than or equal to 2 R + 1 neighbors outside its set, we have a similar bound α i ( t ε + 1 ) x i ( t ε + 1 ) ρ m + α ε 0 ( 1 α ) ε , which also applies to the cooperative nodes outside A m ( t ε , ε 0 ) C . Now by defining ε 1 = α ε 0 ( 1 α ) ε which satisfies 0 < ε < ε 1 < ε 0 , we can use the same proof in Theorem 1, by setting recursively ε k , for k 1 to produce the contradiction. We then proved the sufficiency part. ☐
Note that there is a gap between the sufficient condition and the necessary condition in Theorem 2. In fact, the example mentioned in ([19], Figure 4) can also be used to show that the sufficient condition here is sharp. In the case of time-dependent networks, we show the following result, which more or less can be shown in the same way as Corollary 1.
Corollary 3.
Given a time-dependent network characterized by a digraph G ( t ) = ( V , E ( t ) ) , where every cooperative node updates its value following the multiscale filtering strategy with parameter R . Let { t k } be the time steps where G ( t ) is 2 R + 1 -robust. Therefore, in the R -locally bounded model having faulty nodes, multiscale consensus is reached if | { t k } | = and there is a constant c satisfying | t k + 1 t k | c for every k.
In parallel with Corollary 2, we have the following result for resilient multiscale formation generation under the locally bounded model.
Corollary 4 (formation generation in locally bounded model with faulty nodes).
Consider a time-invariant network characterized by a digraph G = ( V , E ) , where every cooperative node updates its value following the multiscale filtering-formation strategy with parameter R . Therefore, in the R -locally bounded model containing faulty nodes, multiscale formation g is achieved if G is 2 R + 1 -robust. Moreover, G is R + 1 -robust if multiscale formation g in the R -locally bounded model with faulty nodes is achieved.
For time-dependent network G ( t ) = ( V , E ( t ) ) , let { t k } be the time steps where G ( t ) is ( R + 1 , R + 1 ) -robust. Therefore, in the R -locally bounded model having faulty nodes, multiscale formation g is reached if | { t k } | = and there is a constant c satisfying | t k + 1 t k | c for any k.

3.2. Multiscale Coordination in the Presence of Byzantine Nodes

In this subsection, we establish necessary and sufficient conditions for multiscale coordination in the globally and locally bounded model in the presence of Byzantine nodes. Recall that Byzantine nodes are able to forward different information to different neighbors at any time step, and thus they are harder to deal with. Define G C ( t ) = ( C , E C ( t ) ) to be the subnetwork of G ( t ) = ( V , E ( t ) ) induced by C , where E C ( t ) is made up of all directed edges among the cooperative nodes at time step t. Time-invariant network structure will be investigated first.
Theorem 3 (consensus in globally bounded model with Byzantine nodes).
Consider a time-invariant network characterized by a digraph G = ( V , E ) , in which every cooperative node updates its value following the multiscale filtering strategy with parameter R . Therefore, in the R -globally bounded model having Byzantine nodes, multiscale consensus is reached if and only if G C is R + 1 -robust.
Proof. 
(Necessity) Suppose that G C is not R + 1 -robust. Therefore, there exist two nonempty and disjoint sets S 1 , S 2 C which are not R + 1 reachable. Thereby, every node in these two sets has no more than R cooperative neighbors outside the set. Fix a < b . Let x i ( 0 ) = a α i ( 0 ) for any node v i S 1 , and x i ( 0 ) = b α i ( 0 ) for any node v i S 2 . For v i V { S 1 S 2 } , set x i ( 0 ) = c α i ( 0 ) for some fixed c ( a , b ) . Suppose that all Byzantine nodes always send the value a α i ( t ) to every node v i in S 1 , and the value b α i ( t ) to every node v i in S 2 at every time step t. Therefore, utilizing the multiscale filtering strategy having parameter R , nodes in S 1 and S 2 will not adopt values from outside their own sets. Thus, multiscale consensus can not be reached.
(Sufficiency) Similarly, we suppose that ρ M lim t M ( t ) and ρ m lim t m ( t ) . Assume that ρ M > ρ m . Choose ε 0 > 0 satisfying ρ M ε 0 > ρ m + ε 0 . For t N and ε k > 0 , we define two sets B M ( t , ε k ) { v i C : α i ( t ) x i ( t ) > ρ M ε k } and B m ( t , ε k ) { v i C : α i ( t ) x i ( t ) < ρ m + ε k } . As per the definition of ε 0 , B M ( t , ε 0 ) and B m ( t , ε 0 ) are disjoint. Fix ε < α | C | ε 0 1 α | C | which satisfies ε 0 > ε > 0 . Define t ε as the time step satisfying M ( t ) < ρ M + ε and m ( t ) > ρ m ε for every time step t t ε .
Recall that B M ( t ε , ε 0 ) and B m ( t ε , ε 0 ) are nonempty and disjoint. As G C is R + 1 -robust with at most R Byzantine nodes, there exists a node in B M ( t ε , ε 0 ) or B m ( t ε , ε 0 ) that has more than or equal to R + 1 cooperative neighboring nodes outside of its set. Without loss of generality, we assume that v i B M ( t ε , ε 0 ) has more than or equal to R + 1 cooperative neighboring nodes outside of B M ( t ε , ε 0 ) . With the same argument as in Theorem 1, we derive the inequality α i ( t ε + 1 ) x i ( t ε + 1 ) ρ M α ε 0 + ( 1 α ) ε . This expression also holds true for the renewed value of every cooperative node outside B M ( t ε , ε 0 ) . Likewise, if v i B m ( t ε , ε 0 ) which has more than or equal to R + 1 cooperative neighbors outside of B m ( t ε , ε 0 ) , we have similarly α i ( t ε + 1 ) x i ( t ε + 1 ) ρ m + α ε 0 ( 1 α ) ε , which also applies to the cooperative nodes outside B m ( t ε , ε 0 ) .
Define ε 1 = α ε 0 ( 1 α ) ε , satisfying 0 < ε < ε 1 < ε 0 . Notice that the sets B M ( t ε + 1 , ε 1 ) and B m ( t ε + 1 , ε 1 ) are disjoint. The discussion in the above paragraph implies that | B M ( t ε + 1 , ε 1 ) | < | B M ( t ε , ε 0 ) | or | B m ( t ε + 1 , ε 1 ) | < | B m ( t ε , ε 0 ) | holds. We can recursively define ε k = α ε k 1 ( 1 α ) ε for every k 1 and note that ε k < ε k 1 . The aforementioned discussion is applicable to every time step t ε + k provided B M ( t ε + k , ε k ) and B m ( t ε + k , ε k ) are non-empty. Since G C contains | C | cooperative nodes, there is some T | C | satisfying either B M ( t ε + T , ε T ) or B m ( t ε + T , ε T ) is in fact empty. On the other hand, ε T = α ε T 1 ( 1 α ) ε = α T ε 0 ( 1 α T ) ε α | C | ε 0 ( 1 α | C | ) ε > 0 according to the choice of ε . This implies that every cooperative node at time t ε + T has a value of no more than ρ M ε T < ρ M or have values no less than ρ m + ε T > ρ m . This contradicts the definition of ρ M or ρ m . We proved the sufficiency part. ☐
In the case of time-dependent networks, the following result can be established.
Corollary 5.
Consider a time-dependent network characterized by a digraph G ( t ) = ( V , E ( t ) ) , where every cooperative node updates its value following the multiscale filtering strategy with parameter R . Let { t k } be the time steps where G ( t ) is 2 R + 1 -robust. Therefore, in the R -globally bounded model having Byzantine nodes, multiscale consensus is reached if | { t k } | = and there is a constant c satisfying | t k + 1 t k | c for any k.
Proof. 
If G ( t ) becomes 2 R + 1 -robust, G C ( t ) must be R + 1 robust. It is due to the fact that there exist no more than R Byzantine nodes in the whole network. In view of Theorem 3, we may conclude the proof by resorting to a similar argument as that in Corollary 1. ☐
The following result is given for resilient multiscale formation generation under the globally bounded model.
Corollary 6 (formation generation in globally bounded model with Byzantine nodes).
Consider a time-invariant network characterized by a digraph G = ( V , E ) , in which every cooperative node updates its value following the multiscale filtering-formation strategy with parameter R . Therefore, in the R -globally bounded model containing Byzantine nodes, multiscale formation g is achieved if and only if G C is R + 1 -robust.
For a time-dependent network G ( t ) = ( V , E ( t ) ) , let { t k } signify the time steps where G ( t ) is 2 R + 1 -robust. Therefore, in the R -globally bounded model having Byzantine nodes, multiscale formation g is reached if | { t k } | = and there exists a constant c satisfying | t k + 1 t k | c for all k.
Now we move to locally bounded models having Byzantine nodes distributed over a time-invariant graph structure.
Theorem 4 (consensus in locally bounded model with Byzantine nodes).
Consider a time-invariant network characterized by a digraph G = ( V , E ) , where every cooperative node updates its value following the multiscale filtering strategy with parameter R . Therefore, in the R -locally bounded model containing Byzantine nodes, multiscale consensus is reached if and only if G C is R + 1 -robust.
Proof. 
(Necessity) The same proof in Theorem 3 gives the necessity.
(Sufficiency) Proceeding similarly as in Theorem 3, we suppose that ρ M lim t M ( t ) and ρ m lim t m ( t ) . Assume that ρ M > ρ m . Choose ε 0 > 0 satisfying ρ M ε 0 > ρ m + ε 0 . For t N and ε k > 0 , we signify two sets B M ( t , ε k ) { v i C : α i ( t ) x i ( t ) > ρ M ε k } and B m ( t , ε k ) { v i C : α i ( t ) x i ( t ) < ρ m + ε k } . By the definition of ε 0 , B M ( t , ε 0 ) and B m ( t , ε 0 ) turn out to be disjoint. Fix ε < α | C | ε 0 1 α | C | satisfying ε 0 > ε > 0 . Let t ε be the time step satisfying M ( t ) < ρ M + ε and m ( t ) > ρ m ε for any time step t t ε .
Recall that the sets B M ( t ε , ε 0 ) and B m ( t ε , ε 0 ) are both nonempty and disjoint. As G C is R + 1 -robust, there must be a node in B M ( t ε , ε 0 ) or B m ( t ε , ε 0 ) that has more than or an equal number of R + 1 cooperative neighboring nodes outside of its set. We suppose, without loss of generality, that v i B M ( t ε , ε 0 ) has more than or equal to R + 1 cooperative neighbors outside of B M ( t ε , ε 0 ) . Since there are no more than R Byzantine nodes in N i , v i will adopt at least one of its cooperative neighbors’ values outside B M ( t ε , ε 0 ) under the multiscale filtering strategy with parameter R . Based upon the same argument as in Theorem 1, we derive the estimation α i ( t ε + 1 ) x i ( t ε + 1 ) ρ M α ε 0 + ( 1 α ) ε . This also holds true for the renewed value of every cooperative node outside B M ( t ε , ε 0 ) . Analogously, if v i B m ( t ε , ε 0 ) which has more than or an equal number of R + 1 cooperative neighbors outside of B m ( t ε , ε 0 ) , we have α i ( t ε + 1 ) x i ( t ε + 1 ) ρ m + α ε 0 ( 1 α ) ε , which also applies to the cooperative nodes outside B m ( t ε , ε 0 ) .
Define ε 1 = α ε 0 ( 1 α ) ε , satisfying 0 < ε < ε 1 < ε 0 . The same reasoning in the proof of Theorem 3 (by recursively defining ε k = α ε k 1 ( 1 α ) ε for k 1 ) gives rise to the desired contradiction. We then proved the sufficiency part. ☐
For time-dependent networks, the following result can be established. The proof is similar to that of Corollary 5.
Corollary 7.
Consider a time-dependent network characterized by a digraph G ( t ) = ( V , E ( t ) ) , in which every cooperative node updates its value following the multiscale filtering strategy with parameter R . Let { t k } be the time steps where G ( t ) is 2 R + 1 -robust. Therefore, in the R -locally bounded model containing Byzantine nodes, multiscale consensus is reached if | { t k } | = and there is a constant c satisfying | t k + 1 t k | c for any k.
As an immediate consequence of Theorem 4 and Corollary 7, resilient multiscale formation generation in the locally bounded model containing Byzantine nodes is characterized in the following.
Corollary 8 (formation generation in locally bounded model with Byzantine nodes).
Consider a time-invariant network characterized by a digraph G = ( V , E ) , in which every cooperative node updates its value following the multiscale filtering-formation strategy with parameter R . Therefore, in the R -locally bounded model with Byzantine nodes, multiscale formation g is reached if and only if G C is R + 1 -robust.
For a time-dependent network G ( t ) = ( V , E ( t ) ) , let { t k } be the time steps where G ( t ) is 2 R + 1 -robust. Therefore, in the R -locally bounded model having Byzantine nodes, multiscale formation g is reached if | { t k } | = and there exists a constant c satisfying | t k + 1 t k | c for each k.

4. Numerical Simulations

In this section, we present a range of numerical examples (including two energy systems related ones) to illustrate our results.
Example 1 (Consensus against a single faulty node).
We investigate a ( 2 , 2 ) -robust network G = ( V , E ) with the node set V = { v 1 , , v 6 } (see Figure 1), in which node v 2 is compromised and becomes an adversarial node. The initial values of the six agents are taken as x 1 ( 0 ) = 2 , x 2 ( 0 ) = 2 , x 3 ( 0 ) = 3 , x 4 ( 0 ) = 1 , x 5 ( 0 ) = 0 , x 6 ( 0 ) = 1.5 , and the scales are chosen as α 1 ( t ) = α 2 ( t ) = α 3 ( t ) = 2 + sin ( t / 5 ) , α 4 ( t ) = α 5 ( t ) = α 6 ( t ) = 1 .
Since the network is ( 2 , 2 ) -robust, Theorem 1 (or Theorem 2) implies that multiscale consensus can be reached in the 1-globally bounded model with faulty nodes when we implement the multiscale filtering strategy with parameter 1. We assume that each cooperative node v i C takes the weight w i j ( t ) = | α i ( t ) | ( | N i | + 1 | R i ( t ) | ) 1 for v j ( N i { v i } ) R i ( t ) . In Figure 2a, we show the trajectories of the agents, where the node v 2 is faulty and keeps its value unchanged. In Figure 2b, we consider a different situation, where v 2 is more malicious (aiming to drive the states of the system to perhaps unsafe regions) and updates its value following x 2 ( t + 1 ) = ( x 1 ( t ) + x 3 ( t ) + x 4 ( t ) + x 6 ( t ) ) / 4 + t / 10 . We see that, in both cases, the cooperative nodes are able to reach multiscale consensus with respect to ( α 1 ( t ) , , α 6 ( t ) ) as supported by Theorem 1.
Note that the induced network G C is not 2-robust (by considering, e.g., the disjoint atom sets { v 1 } and { v 3 } ). Recall that a faulty node is also Byzantine. We clarify that the multiscale consensus behaviors observed here do not contradict Theorem 3 because Theorem 3 indicates that there exists one specific node that can be compromised to prevent multiscale consensus if G C is not 2-robust. Furthermore, it is also worthwhile to note that, although multiscale consensus is achieved in both Figure 2a,b, the adversarial node v 2 indeed affects the final trajectories of the cooperative nodes. This is allowed in our multiscale coordination framework because the value x i ( t ) for each cooperative node v i still lies in the interval [ m ( 0 ) / α i ( t ) , M ( 0 ) / α i ( t ) ] that is kept by cooperative nodes at all time step t.
Example 2 (Consensus against a single Byzantine node).
In this example, we consider the network topology used in Example 1 except that all communications are assumed to be bidirectional. Moreover, we suppose that v 3 is compromised (Byzantine) instead. Therefore, the cooperative node set is C = { v 1 , v 2 , v 4 , v 5 , v 6 } and the induced network G C becomes 2-robust. The same scales, initial values, and weights for the system are taken as in Example 1. To specify the Byzantine behavior of v 3 , we set x 3 ( t ) 3 , x 3 2 ( t ) 2 , and x 3 4 ( t ) = 2 x 4 ( t ) .
Figure 3 shows the trajectories of the agents reaching multiscale consensus in good agreement with the theoretical results in Theorems 3 and 4 using the multiscale filtering strategy with parameter R = 1 . Comparing Figure 3 with Figure 2, it is interesting to see that the states of the cooperative agents converge faster in Example 2: multiscale consensus is achieved well before t = 10 in Figure 3 but achieved only around t = 20 in Figure 2a,b. The more rapid consensus presumably results from (i) the higher density in the communication network; and (ii) the less connected compromised node v 3 in Example 2 as compared to v 2 in Example 1. In fact, the size of the neighborhood N 2 = { v 1 , v 3 , v 4 , v 5 , v 6 } nearly triples that of N 3 = { v 2 , v 4 } , which appears to be positively correlated to the convergence time regardless of the particular behavior (viz. faulty or Byzantine) of the respective adversarial node. This unravels that v 2 should be better protected, for example, in an infrastructure network, due to its central location in the network structure. A detailed investigation of the influence of node location, with certain quantative characterization such as node centralities [29], is likely to reveal more insightful results.
Example 3 (Consensus against multiple faulty nodes).
Here, we reinforce the network in Figure 1 by adding edges { v 1 , v 4 } , { v 1 , v 3 } , { v 3 , v 5 } and assume that all communications are bidirectional. The resulting network is sketched in Figure 4. It is direct to check that this network is ( 3 , 3 ) -robust.
We assume that two highly connected nodes v 2 and v 4 are compromised, posing a severe threat to the system performance. Namely, A = { v 2 , v 4 } and C = { v 1 , v 3 , v 5 , v 6 } . The same scales, initial values, and weights for the system are taken as in Example 1. The state update rules for v 2 and v 4 are described by x 2 ( t + 1 ) = 2 + t / 20 and x 4 ( t + 1 ) = 1 t / 20 , respectively. We perform the multiscale filtering strategy with parameter R = 2 as per Theorem 1. As expected, we observe from Figure 5 that the desired multiscale consensus is finally reached in spite of the interference of these two well-connected faulty agents.
Example 4 (Distributed battery power consensus on a modular microgrid).
In this example, we adopt our multiscale consensus theory to realize the power and capacity consensus of battery storage based upon a project located on DongAo Island in China [26]. The traditional power system on islands takes the form of diesel generators which often cause some air pollution and noises. To overcome these drawbacks and improve networking, some stand-alone modular microgrids based on decentralized batteries have been proposed, which essentially entail distributed power and capacity consensus control protocols. The structure of the battery storage system on DongAo Island can be abstracted as an undirected network on four modules, with each agent representing a module; see Figure 6. This network has a ( 2 , 2 ) -robust architecture.
The initial values (battery power) of the four agents are taken as x 1 ( 0 ) = 1 , x 2 ( 0 ) = 2 , x 3 ( 0 ) = 3 , x 4 ( 0 ) = 4 , and the scales are chosen to be α 1 ( t ) = α 2 ( t ) = 1 , α 3 ( t ) = α 4 ( t ) = 2 . Let g = ( 1 , 1 , 1 , 1 ) . We assume that module 2 failed due to some technical error at time t = 20 , namely, x 2 ( t ) = 0 for t 20 . We plot the power versus time in Figure 7 by using the multiscale formation generation scheme (6) and the multiscale filtering-formation strategy with parameter 1. The results in Figure 7 agree with Corollary 2. The remaining three functional modules ( v 1 , v 3 , and v 4 ) managed to achieve the desired multiscale formation and hence the consensus reaching process is robust against adversarial events.
Example 5 (Distributed frequency regulation in an electrical power network).
In a smart power grid, frequency regulation service provided by appropriate control of generation is essential for enhancing reliability and efficiency of its performance. Each component in the network is coordinated in a distributed manner to provide active power for the provision of ancillary frequency regulations [30]. Here, we consider the decentralized frequency control problem in the presence of a faulty component based on our resilient multiscale consensus theory. The power system consisting of four generators and the corresponding communication network describing the exchange of information between generator agents are shown in Figure 8.
We study frequency stability in the presence of a faulty agent represented by v 3 ; see Figure 8. Since C = { v 1 , v 2 , v 4 } , the subnetwork G C is 2-robust. The initial values (frequency) of the four agents are taken as x 1 ( 0 ) = x 2 ( 0 ) = x 3 ( 0 ) = x 4 ( 0 ) = 1 , and the scales are chosen to be α i ( t ) = i for i = 1 , , 4 . Let g = ( 1 , 1 , 1 , 1 ) . We assume that x 3 ( t ) = 1 + sin ( t / 5 ) . Figure 9 illustrates the evolution of frequency state with respect to time by using the multiscale formation generation scheme (6) and the multiscale filtering-formation strategy with parameter 1. As one would expect from Corollary 6, the states of these cooperative agents { v 1 , v 2 , v 4 } reach multiscale consensus withstanding the interference of faulty v 3 .

5. Conclusions

In this paper, we have investigated resilient multiscale coordination algorithms that are able to withstand the compromise of a subset of nodes in directed networks. We established necessary and sufficient conditions guaranteeing multiscale consensus with general time varying scales in the presence of faulty and Byzantine nodes. Both locally bounded and globally bounded adversaries are dealt with. It is shown that, for a fixed network with at most R faulty nodes, multiscale consensus is achieved if and only if the network is ( R + 1 , R + 1 ) -robust. On the other hand, for a network with at most R Byzantine nodes, multiscale consensus is achieved if and only if the induced subnetwork of cooperative nodes is R + 1 -robust. The theories are then tailored to accommodate time-dependent networks. Multiscale formation generation and formation tracking problems are also solved as the generalizations. We have illustrated the ability to achieve resilient multiscale consensus via extensive numerical examples including the battery storage system on DongAo Island and frequency regulation on power grid. In our future work, we will address distributed update rules that can further accommodate communication delays and external (possibly random) perturbations. Furthermore, extensions of the methods to deal with continuous-time multi-agent systems also seem appealing.

Funding

This work is supported by the National Natural Science Foundation of China under Grant No. 11505127.

Acknowledgments

The author is grateful to the anonymous reviewers for their constructive suggestions that have improved the presentation of the paper.

Conflicts of Interest

The author declares no conflict of interest.

References

  1. Jadbabaie, A.; Lin, J.; Morse, A.S. Coordination of groups of mobile autonomous agents using nearest neighbor rules. IEEE Trans. Autom. Control 2003, 48, 988–1001. [Google Scholar] [CrossRef] [Green Version]
  2. Olfati-Saber, R.; Fax, J.A.; Murray, R.M. Consensus and cooperation in networked multi-agent systems. Proc. IEEE 2007, 95, 215–233. [Google Scholar] [CrossRef]
  3. Cao, Y.; Yu, W.; Ren, W.; Chen, G. An overview of recent progress in the study of distributed multi-agent coordination. IEEE Trans. Ind. Inf. 2013, 9, 427–438. [Google Scholar] [CrossRef]
  4. Ge, X.; Yang, F.; Han, Q.L. Distributed networked control systems: A brief overview. Inf. Sci. 2017, 380, 117–131. [Google Scholar] [CrossRef]
  5. Sun, S.H.; Zhao, L.; Jia, Y.M. Similitude design method for motion reconstruction of space cooperative vehicles. J. Astronaut. 2014, 35, 802–810. [Google Scholar]
  6. Capello, E.; Punta, E.; Dabbene, F.; Guglieri, G.; Tempo, R. Sliding-mode control strategies for rendezvous and docking maneuvers. J. Guid. Control Dyn. 2017, 40, 1481–1487. [Google Scholar] [CrossRef]
  7. Haddad, W.M.; Chellaboina, V.; Hui, Q. Nonnegative and Compartmental Dynamical Systems; Princeton University Press: Princeton, NJ, USA, 2010. [Google Scholar]
  8. Roy, S. Scaled consensus. Automatica 2015, 51, 259–262. [Google Scholar] [CrossRef]
  9. Shang, Y. A combinatorial necessary and sufficient condition for cluster consensus. Neurocomputing 2016, 216, 611–616. [Google Scholar] [CrossRef] [Green Version]
  10. Qin, J.; Fu, W.; Zheng, W.X.; Gao, H. On the bipartite consensus for generic linear multiagent systems with input saturation. IEEE Trans. Cybern. 2017, 47, 948–1958. [Google Scholar] [CrossRef] [PubMed]
  11. Jiang, Y.; Zhang, H.; Chen, J. Sign-consensus of linear multi-agent systems over signed directed graphs. IEEE Trans. Ind. Electron. 2017, 64, 5075–5083. [Google Scholar] [CrossRef]
  12. Meng, D.; Jia, Y. Scaled consensus problems on switching networks. IEEE Trans. Autom. Control 2016, 61, 1664–1669. [Google Scholar] [CrossRef]
  13. Meng, D.; Jia, Y. Robust consensus algorithms for multiscale coordination control of multivehicle systems with disturbances. IEEE Trans. Ind. Electron. 2016, 63, 1107–1119. [Google Scholar] [CrossRef]
  14. Shang, Y. Finite-time scaled consensus through parametric linear iterations. Int. J. Syst. Sci. 2017, 48, 2033–2040. [Google Scholar] [CrossRef]
  15. Shang, Y. On the delayed scaled consensus problems. Appl. Sci. 2017, 7, 713. [Google Scholar] [CrossRef]
  16. Lynch, N.A. Distributed Algorithms; Morgan Kaufmann: San Mateo, CA, USA, 1996. [Google Scholar]
  17. Cárdenas, A.A.; Amin, S.; Sastry, S.S. Research challenges for the security of control systems. In Proceedings of the 3rd Conference on Hot Topics in Security, San Jose, CA, USA, 14 April 2008. [Google Scholar]
  18. Zhang, H.; Sundaram, S. Robustness of information diffusion algorithms to locally bounded adversaries. In Proceedings of the 2012 American Control Conference, Montreal, QC, Canada, 27–29 June 2012; pp. 5855–5861. [Google Scholar]
  19. LeBlanc, H.J.; Zhang, H.; Koutsoukos, X.; Sundaram, S. Resilient asymptotic consensus in robust networks. IEEE J. Sel. Areas Commun. 2013, 31, 766–781. [Google Scholar] [CrossRef]
  20. Dibaji, S.M.; Ishii, H. Consensus of second-order multi-agent systems in the presence of locally bounded faults. Syst. Control Lett. 2015, 79, 23–29. [Google Scholar] [CrossRef]
  21. Wu, Y.; He, X. Secure consensus control for multi-agent systems with attacks and communication delays. IEEE/CAA J. Autom. Sin. 2017, 4, 136–142. [Google Scholar] [CrossRef]
  22. Saulnier, K.; Saldaña, D.; Prorok, A.; Pappas, G.J.; Kumar, V. Resilient flocking for mobile robot teams. IEEE Robot. Autom. Lett. 2017, 2, 1039–1046. [Google Scholar] [CrossRef]
  23. Shang, Y. Hybrid consensus for averager-copier-voter networks with non-rational agents. Chaos Solitons Fractals 2018, 110, 244–251. [Google Scholar] [CrossRef]
  24. Trong, T.N.; Duc, M.N. Sliding surface in consensus problem of multi-agent rigid manipulators with neural network controller. Energies 2017, 10, 2127. [Google Scholar] [CrossRef]
  25. Zhang, F.; Leonard, N.E. Cooperative filters and control for cooperative exploration. IEEE Trans. Autom. Control 2010, 55, 650–663. [Google Scholar] [CrossRef]
  26. Zhang, X.; Huang, Y.; Li, L.; Yeh, W.C. Power and capacity consensus tracking of distributed battery storage systems in modular microgrids. Energies 2018, 11, 1439. [Google Scholar] [CrossRef]
  27. Zhang, H.; Fata, E.; Sundaram, S. A notion of robustness in complex networks. IEEE Trans. Control Netw. Syst. 2015, 2, 310–320. [Google Scholar] [CrossRef]
  28. Xiao, F.; Wang, L.; Chen, J.; Gao, Y. Finite-time formation control for multi-agent systems. Automatica 2009, 45, 2605–2611. [Google Scholar] [CrossRef]
  29. Shang, Y. Subgraph robustness of complex networks under attacks. IEEE Trans. Syst. Man Cybern. Syst. 2017. [Google Scholar] [CrossRef]
  30. Kundur, P. Power System Stability and Control, 2nd ed.; McGraw-Hill: New York, NY, USA, 2008. [Google Scholar]
Figure 1. A directed graph G with n = 6 nodes, which is ( 2 , 2 ) -robust.
Figure 1. A directed graph G with n = 6 nodes, which is ( 2 , 2 ) -robust.
Energies 11 01844 g001
Figure 2. Time evolution of the agents’ values: (a) v 2 maintains its value and (b) v 2 updates its value according to x 2 ( t + 1 ) = ( x 1 ( t ) + x 3 ( t ) + x 4 ( t ) + x 6 ( t ) ) / 4 + t / 10 .
Figure 2. Time evolution of the agents’ values: (a) v 2 maintains its value and (b) v 2 updates its value according to x 2 ( t + 1 ) = ( x 1 ( t ) + x 3 ( t ) + x 4 ( t ) + x 6 ( t ) ) / 4 + t / 10 .
Energies 11 01844 g002
Figure 3. Time evolution of the agents’ values, where v 3 forwards different values to its neighbors, viz. x 3 2 ( t ) = 2 and x 3 4 ( t ) = 2 x 4 ( t ) .
Figure 3. Time evolution of the agents’ values, where v 3 forwards different values to its neighbors, viz. x 3 2 ( t ) = 2 and x 3 4 ( t ) = 2 x 4 ( t ) .
Energies 11 01844 g003
Figure 4. A graph G with n = 6 nodes, which is ( 3 , 3 ) -robust.
Figure 4. A graph G with n = 6 nodes, which is ( 3 , 3 ) -robust.
Energies 11 01844 g004
Figure 5. Time evolution of the agents’ values, where v 2 and v 4 are faulty nodes following x 2 ( t + 1 ) = 2 + t / 20 and x 4 ( t + 1 ) = 1 t / 20 .
Figure 5. Time evolution of the agents’ values, where v 2 and v 4 are faulty nodes following x 2 ( t + 1 ) = 2 + t / 20 and x 4 ( t + 1 ) = 1 t / 20 .
Energies 11 01844 g005
Figure 6. Above: structure of modular microgrid on DongAo Island; Below: communication network G , which is ( 2 , 2 ) -robust.
Figure 6. Above: structure of modular microgrid on DongAo Island; Below: communication network G , which is ( 2 , 2 ) -robust.
Energies 11 01844 g006
Figure 7. Battery power in modules versus time, where v 2 breaks down at time t = 20 .
Figure 7. Battery power in modules versus time, where v 2 breaks down at time t = 20 .
Energies 11 01844 g007
Figure 8. Above: structure of a power system; Below: the topology of a communication network.
Figure 8. Above: structure of a power system; Below: the topology of a communication network.
Energies 11 01844 g008
Figure 9. Frequency state versus time, where v 3 is faulty following x 3 ( t ) = 1 + sin ( t / 5 ) .
Figure 9. Frequency state versus time, where v 3 is faulty following x 3 ( t ) = 1 + sin ( t / 5 ) .
Energies 11 01844 g009

Share and Cite

MDPI and ACS Style

Shang, Y. Resilient Multiscale Coordination Control against Adversarial Nodes. Energies 2018, 11, 1844. https://0-doi-org.brum.beds.ac.uk/10.3390/en11071844

AMA Style

Shang Y. Resilient Multiscale Coordination Control against Adversarial Nodes. Energies. 2018; 11(7):1844. https://0-doi-org.brum.beds.ac.uk/10.3390/en11071844

Chicago/Turabian Style

Shang, Yilun. 2018. "Resilient Multiscale Coordination Control against Adversarial Nodes" Energies 11, no. 7: 1844. https://0-doi-org.brum.beds.ac.uk/10.3390/en11071844

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop