Skip to main content Accessibility help
×
Home
Hostname: page-component-59b7f5684b-2bkkj Total loading time: 1.336 Render date: 2022-10-02T23:37:12.457Z Has data issue: true Feature Flags: { "shouldUseShareProductTool": true, "shouldUseHypothesis": true, "isUnsiloEnabled": true, "useRatesEcommerce": false, "displayNetworkTab": true, "displayNetworkMapGraph": true, "useSa": true } hasContentIssue true

Resilient tracking consensus over dynamic random graphs: A linear system approach

Published online by Cambridge University Press:  12 July 2022

Y. SHANG*
Affiliation:
Department of Computer and Information Sciences, Northumbria University, Newcastle, NE1 8ST, UK email: yilun.shang@northumbria.ac.uk
Rights & Permissions[Opens in a new window]

Abstract

Cooperative coordination in multi-agent systems has been a topic of interest in networked control theory in recent years. In contrast to cooperative agents, Byzantine agents in a network are capable to manipulate their data arbitrarily and send bad messages to neighbors, causing serious network security issues. This paper is concerned with resilient tracking consensus over a time-varying random directed graph, which consists of cooperative agents, Byzantine agents and a single leader. The objective of resilient tracking consensus is the convergence of cooperative agents to the leader in the presence of those deleterious Byzantine agents. We assume that the number and identity of the Byzantine agents are not known to cooperative agents, and the communication edges in the graph are dynamically randomly evolving. Based upon linear system analysis and a martingale convergence theorem, we design a linear discrete-time protocol to ensure tracking consensus almost surely in a purely distributed manner. Some numerical examples are provided to verify our theoretical results.

Type
Papers
Creative Commons
Creative Common License - CCCreative Common License - BY
This is an Open Access article, distributed under the terms of the Creative Commons Attribution licence (http://creativecommons.org/licenses/by/4.0/), which permits unrestricted re-use, distribution and reproduction, provided the original article is properly cited.
Copyright
© The Author(s), 2022. Published by Cambridge University Press

1 Introduction

Distributed cooperative control of multi-agent systems has been a rapidly emerging topic in networked control theory over the past decades. Reaching consensus is a primary goal, which concerns designing control protocols such that all agents reach a common state or output via information interaction with their nearest neighbors. This control issue can be roughly categorized into leaderless consensus [Reference Fornasier, Lisini, Orrieri and Savaré10, Reference Olfati-Saber and Murray20] and tracking consensus (or leader-follower consensus) [Reference Gong, Han and Lan12, Reference Song, Cao and Yu28, Reference You, Hua, Li and Jia33]. The former considers agreement seeking in a situation where no leader is present, while the objective of the latter is for other agents to follow the trajectory of a leader. Leaderless and tracking consensus problems have been extensively studied in fixed networks [Reference Burbano, DeLellis and diBernardo5, Reference Olfati-Saber and Murray20, Reference Song, Cao and Yu28], switching or time-varying networks [Reference Gong, Han and Lan12, Reference You, Hua, Li and Jia33], and random networks [Reference Razaee, Parisini and Polycarpou21, Reference Shang24]. An overview of some classical control theory results on consensus problems can be found in the review paper [Reference Olfati-Saber and Murray20], and more recent advances are reviewed in the works [Reference Amirkhani and Barshooi2, Reference Becchetti, Clementi and Natale4] from a broader perspective of system science.

In terms of consensus problems in large-scale networked systems, a realistic difficulty lies in the malicious behavior of some unknown adversaries due to cyber-physical attacks. In computer science, the strongest adversaries are dubbed as Byzantine agents [Reference Lamport, Shostak and Pease17], who do not follow a desired coordination strategy and potentially ruled by some sophisticated attackers. Byzantine agents are notoriously difficult to cope with as they may even collude with other agents to arbitrarily distort information exchange in the network [Reference LeBlanc, Zhang, Koutsoukos and Sundaram18, Reference Mitra, Richards, Bagchi and Sundaram19]. In this setting, (tracking) consensus problems are referred to as resilient (tracking) consensus because the control objective is to ensure all cooperative agents to converge in spite of the interference of potential Byzantine agents. To filter out the potential malicious behaviors, a class of Weighted-Mean-Subsequence-Reduced (W-MSR) algorithm is proposed in [Reference LeBlanc, Zhang, Koutsoukos and Sundaram18] to remove extremal values in the neighboring area of any cooperative agent. It is shown that if the communication graph is sufficiently robust with respect to the maximum number of Byzantine neighbors, resilient consensus can be achieved. The idea is that when the graph is sufficiently connected, scrapping some extremal neighbors at each time step of the iteration could ensure the states of cooperative agents (i) lie within the convex hull of their initial values and (ii) are updated towards a final convergence.

The idea of W-MSR algorithms has been later generalized to cope with resilient consensus for agents with higher-order [Reference Dibaji and Ishii7] and asynchronous [Reference Senejohnny, Sundaram, Persis and Tesi23] dynamics as well as hybrid multi-agent systems with both continuous-time and discrete-time agents [Reference Shang25, Reference Shang27]. Trusted agents have been introduced in [Reference Abbas, Laszka and Koutsoukos1] to relax the robustness requirement in W-MSR algorithms, where trusted agents are assumed to be insusceptible to attacks. In [Reference Shang26], the problem of constrained resilient consensus is considered by employing a projection-based method to push the states of cooperative agents back to their constraint sets. To achieve resilient consensus on relatively sparse networks, two-hop communications have been introduced to multi-agent control in discrete-time [Reference Yuan and Ishii34] and continuous-time [Reference Zhao, Lv, Yu, Wen and Chen35].

On top of these deterministic system dynamics, some randomness has also been incorporated recently in resilient consensus problems to reflect varied challenges in real-world complex systems. Randomized quantized states [Reference Dibaji, Ishii and Tempo8] and random faulty links [Reference Razaee, Parisini and Polycarpou21] have been factored in under the framework of almost sure convergence. In [Reference Shang24], mean square convergence for a class of hybrid systems containing some randomly interacting agents as well as misbehaving ones has been examined. Mean square consensus for a group of cooperative agents is shown in [Reference Fiore and Russo9] under the stochastic influence of malicious agents with differential privacy of their initial states corrupted by communication noise.

Most of the existing research on resilient consensus problems including those above only studies leaderless consensus. The W-MSR type algorithms do not differentiate leaders from malicious attackers. These protocols ensure convergence to the convex hull of cooperative agents regardless of how leaders/malicious agents behave. As a result, tracking consensus cannot be achieved via a traditional W-MSR algorithm if a leader moves out of the convex hull. To overcome this difficulty, a set of leaders taking the same constant reference value is introduced in [Reference Usevitch and Panagou29] to guarantee resilient tracking consensus in discrete-time multi-agent systems. The minimum number of leaders is determined based upon the maximum number of Byzantine agents in the communication graph. This method is further extended in [Reference Usevitch and Panagou30] to allow some piecewise constant trajectories for leaders by using a sliding-window analysis. Leader-following resilient consensus has been investigated in [Reference Razaee, Parisini and Polycarpou22] with a single leader in continuous-time multi-agent systems by employing some saturation functions to regulate the errors between the leader and followers. The leader agent may take a time-dependent bounded trajectory, where the bounds and the leader’s identity are assumed to be known to all cooperative agents.

Along this line, we here further study the resilient tracking consensus problem in multi-agent systems in the presence of Byzantine agents. To overcome the restrictions in the existing works such as the large number and identifiability of the leaders, we here design a new W-MSR-type resilient consensus protocol for systems with a single leader and adopt a linear system approach to show that almost sure resilient tracking consensus can be achieved for discrete-time agents over directed random graphs. The main novelties of this work are as follows. Firstly, in the previous research on resilient tracking consensus [Reference Razaee, Parisini and Polycarpou22, Reference Usevitch and Panagou29, Reference Usevitch and Panagou30], the communication topology is assumed to be a fixed graph and the system dynamic is deterministic. Here, we lift these restrictions by considering a general class of random graphs with time-dependent edge probabilities. The resilient tracking consensus will be guaranteed by a martingale convergence result benefiting from the construction of our linear system and communication topology. Secondly, the proposed distributed control protocol accommodates not only the conventional linear diffusive mechanism (i.e. the Laplacian-type coupling) but also a general nonlinear coupling function, which is more general than most existing work on resilient consensus problems; see for example [Reference Abbas, Laszka and Koutsoukos1, Reference Fiore and Russo9, Reference LeBlanc, Zhang, Koutsoukos and Sundaram18, Reference Razaee, Parisini and Polycarpou21, Reference Shang25]. Thirdly, compared to the work in [Reference Razaee, Parisini and Polycarpou22], we assume the leader is a trustworthy node whose value is always trusted by the followers. The identity of the leader is not revealed to other nodes (see Remark 4 below).

The rest of the paper is organized as follows. Section 2 prepares some preliminaries on graph theory and introduces the model of our multi-agent system. Section 3 presents the resilient tracking consensus analysis. Section 4 contains numerical simulation examples, and Section 5 concludes the paper.

2 Problem formulation

2.1 Graph theory

In a multi-agent system, the interaction topology of agents (i.e. vertices) is represented by a time-varying directed graph $\mathcal{G}(t)=(\mathcal{V},\mathcal{E}(t), \mathcal{A}(t))$ for $t\in\mathbb{N}$ , where $\mathbb{N}$ is the set of non-negative integers. The vertex set $\mathcal{V}=\{1, 2, \cdots, N\}$ is composed of all agents, and the edge set $\mathcal{E}(t)\subseteq\mathcal{V}\times\mathcal{V}$ describes the information interaction. Let $\mathbb{R}$ be the set of reals. The adjacency matrix of $\mathcal{G}(t)$ , $\mathcal{A}(t)=(a_{ij}(t))\in\mathbb{R}^{N\times N}$ , is a weighted random matrix, where $a_{ij}(t)>0$ when $(\,j,i)\in\mathcal{E}(t)$ , that is, agent j can send information to agent i at time t, and $a_{ij}(t)=0$ otherwise. We assume $a_{ij}(t)>0$ with probability $p_{ij}(t)$ and $a_{ij}(t)=0$ with probability $1-p_{ij}(t)$ . We mention that we do not require independence for the entries $a_{ij}(t)$ in the adjacency matrix with respect to i, j or t. This gives desirable flexibility in practical applications.

Denote by $\mathcal{N}_i^{\mathrm{in}}(t)=\{j\in\mathcal{V}:(\,j,i)\in\mathcal{E}(t)\}$ the set of in-neighbors of agent i. Similarly, the set of out-neighbors of i can be defined as $\mathcal{N}^{\mathrm{out}}_i(t)=\big\{j\in\mathcal{V}:i\in\mathcal{N}^{\mathrm{in}}_j(t)\big\}$ . The agents in the graph $\mathcal{G}(t)$ are divided into three categories, the cooperative agents in $\mathcal{C}$ , the Byzantine agents in $\mathcal{B}$ and a leader agent $\ell$ . In other words, $\mathcal{V}=\{\ell\}\cup\mathcal{C}\cup\mathcal{B}$ . The rules for these agents will be given in the next section. Fix $t\in\mathbb{N}$ . A vertex set $\mathcal{S}\subseteq\mathcal{V}$ is r-reachable at time t [Reference LeBlanc, Zhang, Koutsoukos and Sundaram18] if there exists a vertex $i\in\mathcal{S}$ such that $\big|\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{S}\big|\geqslant r$ . The graph $\mathcal{G}(t)$ is said to be leader-follower r-robust at time t [Reference Razaee, Parisini and Polycarpou22] if (i) $\big|\mathcal{N}^{\mathrm{out}}_{\ell}(t)\big|\geqslant r$ and (ii) for any $\mathcal{S}\subseteq\mathcal{V}\backslash\big(\{\ell\}\cup\mathcal{N}^{\mathrm{out}}_{\ell}(t)\big)$ , $\mathcal{S}$ is r-reachable. The concept of leader-follower r-robust is a natural generalization to the r-robustness notation which is first introduced in [Reference LeBlanc, Zhang, Koutsoukos and Sundaram18]. A directed graph $\mathcal{G}=(\mathcal{V},\mathcal{E})$ is called r-robust if for any two nonempty mutually exclusive sets $\mathcal{S}_1,\mathcal{S}_2\subseteq\mathcal{V}$ , at least one of them is r-reachable.

2.2 Model description

Recall that there are three types of agents in the graph $\mathcal{G}(t)$ : cooperative agents in $\mathcal{C}$ , Byzantine agents in $\mathcal{B}$ and the leader $\ell$ satisfying $\mathcal{V}=\{\ell\}\cup\mathcal{C}\cup\mathcal{B}$ . Byzantine is a traditional name that is used in computer science and control theory [Reference Lamport, Shostak and Pease17]. These agents are able to arbitrarily update their data and hence can potentially be malicious. Formally, Byzantine agents can include both faulty agents, which are due to random errors, and malicious agents, which may be controlled by some malicious attackers. Hence, Byzantine agents in $\mathcal{B}$ are potentially harmful and pose a serious threat to the collective control objective of the multi-agent systems [Reference LeBlanc, Zhang, Koutsoukos and Sundaram18, Reference Mitra, Richards, Bagchi and Sundaram19, Reference Shang25, Reference Shang27]. They can collude with other Byzantine agents, and their identity and number are not available to the cooperative agents. Cooperative agents in $\mathcal{C}$ on the other hand are those we have control upon. They usually take a diffusive agent dynamics, and the aim of resilient (tracking) consensus problem is to design appropriate distributed protocols for these cooperative agents so that they can reach an agreement in some sense despite the obstruction from potential Byzantine agents. The leader $\ell$ is also a cooperative agent by nature, but it does not receive information from other agents, namely, $\mathcal{N}_{\ell}(t)=\emptyset$ for all t. We will adopt a linear system design to enable the cooperative agents to track the leader’s trajectory in the sense of almost sure convergence.

Formally, the dynamics of any agent $i\in\mathcal{V}$ takes the following form

(2.1) \begin{align}x_i(t+1)=Ax_i(t)+Bu_i(t),\qquad t\in\mathbb{N},\end{align}

where $A\in\mathbb{R}^{n\times n}$ , $B\in\mathbb{R}^n$ , $x_i(t)\in\mathbb{R}^n$ means the state of agent i and $u_i(t)\in\mathbb{R}$ is its control input. Here, the linear system design enables us to accommodate vector state spaces (see e.g. [Reference Shang26]), which is more general than most of the existing work on resilient consensus problems. The control input $u_i(t)$ for cooperative agents $i\in\mathcal{C}$ will be designed below in (2.5). For a Byzantine agent $i\in\mathcal{B}$ , $u_i(t)$ can take any value [Using the unifying framework (2.1) for Byzantine agents is for the ease of presentation; essentially, no restriction is imposed on the behavior of Byzantine dynamics]. The leader agent $\ell$ assumes $u_{\ell}(t)=f(t)$ for some function $f:\mathbb{N}\rightarrow\mathbb{R}$ satisfying the following assumption.

Assumption 1. We assume $\lim_{t\rightarrow\infty}x_{\ell}(t)=x_f$ for some $x_f\in\mathbb{R}^n$ , and $\|x_{\ell}(t)-x_f\|=o\big(t^{-1}\big)$ as $t\rightarrow\infty$ . Here, $\|\cdot\|$ is the Euclidean norm in $\mathbb{R}^n$ .

Remark 1. The convergence here is more general compared to the constant reference states required in [Reference Usevitch and Panagou29, Reference Usevitch and Panagou30]. Under Assumption 1, the state $x_{\ell}(t)$ is obviously bounded. Although the convergence assumption is more restrictive compared with the boundedness requirement in [Reference Razaee, Parisini and Polycarpou22], the bounds information has to be shared with all cooperative agents therein, which is difficult to realize in a distributed manner in practice. It is also worth noting that the convergence here is non-probabilistic because $\ell$ is not influenced by other agents through random edges.

Remark 2. A simple example that satisfies Assumption 1 is $f(t)\equiv0$ . In fact, the dynamics for the leader reduces to $x_{\ell}(t+1)=Ax_{\ell}(t)$ by (2.1). It follows from the Jordan normal form, if any eigenvalue $\lambda$ of A has norm less than 1, Assumption 1 is met. The convergence is exponentially fast.

Denote by $\operatorname{det}(\lambda I_n-A)=\lambda^n+\alpha_1\lambda^{n-1}+\alpha_2\lambda^{n-2}+\cdots+\alpha_n$ the characteristic polynomial of A. If the pair (A, B) is controllable, we define the transformation matrix

(2.2) \begin{align} \Gamma=\left(B, AB, A^2B, \cdots, A^{n-1}B\right)\cdot\left(\begin{array}{c@{\quad}c@{\quad}c@{\quad}c@{\quad}c} 1&\alpha_1&\alpha_2&\cdots&\alpha_{n-1}\\[2pt] 0&1&\alpha_1&\cdots&\alpha_{n-2}\\[2pt] 0&0&1&\cdots&\alpha_{n-3}\\[-1pt] \vdots&\vdots&\vdots&\ddots&\vdots\\[2pt] 0&0&0&\cdots&1 \end{array}\right)\in\mathbb{R}^{n\times n}.\end{align}

Here, the controllability of (A, B) means the matrix $\left(B, AB, A^2B,\cdots, A^{n-1}B\right)$ has rank n [Reference Chen6]. The system (2.1) can be recast as the following canonical form [Reference Wang, Wang and Kong32] by using the similarity transformation $x_i(t)=\Gamma y_i(t)$ for $i\in\mathcal{V}$ :

(2.3) \begin{align}y_i(t+1)=\,\hat{\!A}y_i(t)+\hat{B}u_i(t),\qquad t\in\mathbb{N},\end{align}

where $\,\hat{\!A}=\Gamma^{-1}A\Gamma=\left(\begin{array}{c@{\quad}c@{\quad}c@{\quad}c@{\quad}c}-\alpha_1&-\alpha_2&-\alpha_3&\cdots&-\alpha_n\\[1pt]1&0&0&\cdots&0\\[1pt]0&1&0&\cdots&0\\[1pt]\vdots&\vdots&\vdots&\ddots&\vdots\\[1pt]0&0&0&\cdots&0\end{array}\right)\in\mathbb{R}^{n\times n}$ and $\hat{B}=\Gamma^{-1}B=$ $(1,0,0,\cdots,0)^{\operatorname{T}}\in\mathbb{R}^n$ , where $\operatorname{T}$ is the matrix transpose.

Write $y_i(t)=\left(y_{i,n-1}(t),y_{i,n-2}(t),\cdots,y_{i,0}(t)\right)^{\operatorname{T}}$ . Instead of transmitting vector states between agents in $\mathcal{G}(t)$ , we define a scalar value $z_i(t)$ for each agent $i\in\mathcal{V}$ :

(2.4) \begin{align}z_i(t)=y_{i,n-1}(t)+\sum_{k=1}^{n-1}\beta_ky_{i,n-1-k}(t),\end{align}

which encodes the components of $y_i(t)$ . We will see in the next section the information agents exchange over $\mathcal{G}(t)$ will be expressed by $z_i(t)$ . Here, $\beta_k\in\mathbb{R}$ for $k=1,2,\cdots, n-1$ are chosen such that the polynomial $\lambda^{n-1}+\beta_1\lambda^{n-2}+\beta_2\lambda^{n-3}+\cdots+\beta_{n-1}$ becomes Schur stable, meaning that its roots are in the open unit disk. A quick sufficient condition for Schur stability is, for example, $0<\beta_{n-1}<\beta_{n-2}<\cdots<\beta_1<1$ [Reference Bhattacharyya, Datta and Keel3].

2.3 Resilient tracking consensus protocol

In this subsection, we introduce the resilient tracking consensus strategy for cooperative agents, which is a purely distributed protocol.

Fix a parameter $r\in\mathbb{N}$ . For each $i\in\mathcal{C}$ , at time step $t\in\mathbb{N}$ , the agent i uses the encoded state information $z_j(t)$ $\big(\,j\in\mathcal{N}^{\mathrm{in}}_i(t)\big)$ from its in-neighbors and arranges the list $z_{\big(|\mathcal{N}^{\mathrm{in}}_i(t)|\big)}(t)\leqslant z_{\big(|\mathcal{N}^{\mathrm{in}}_i(t)|-1\big)}(t)\leqslant\cdots\leqslant z_{(1)}(t)$ . If at least r values in this list are larger than $z_i(t)$ , we remove the corresponding vertices j of the largest r values (except for $j=\ell$ ). If there are less than r such values, all of their corresponding vertices are removed (except for $j=\ell$ ). Analogously, if at least r values in this sorted list are smaller than $z_i(t)$ , we remove the corresponding vertices j of the smallest r values (except for $j=\ell$ ). If there are less than r such values, all of their corresponding vertices are removed (except for $j=\ell$ ). All removed vertices are recorded in the set $\mathcal{R}_i(t)$ . The strategy is shown in Tab. 1 below. The control input in (2.1) for agent i is taken as

(2.5) \begin{align}u_i(t)=&\sum_{k=1}^n\alpha_ky_{i,n-k}(t)-\sum_{k=1}^{n-1}\beta_ky_{i,n-k}(t)+z_i(t)\nonumber\\&+\gamma_i(t)\cdot\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)}a_{ij}(t)(z_j(t)-z_i(t)),\end{align}

where $0<\gamma_i(t)<\big(\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)}a_{ij}(t)\big)^{-1}$ . This control function $u_i(t)$ can be further generalized to accommodate a nonlinear diffusion; see Section 3.

Table 1. Processing for a cooperative agent $i\in \mathcal{C}$ .

Remark 3. The removal of extreme values is a key feature of W-MSR-type algorithms. The intuition behind is that the Byzantine agents might manipulate the system states by taking some extremely large or small values to deviate the states of cooperative agents. If these extreme values are removed, the system is more likely to achieve consensus. This rationale is also in line with our daily wisdom in many scoring systems in sports and competitions, where the top and bottom scores are removed to ensure a fair judgment. The meaning of the parameter r will be explained below.

Remark 4. In the above algorithm, the leader takes the role of a trustworthy node [Reference Abbas, Laszka and Koutsoukos1], whose value will always be trusted by a cooperative agent i. The idea of trustworthy nodes has been employed in the study of resilient leaderless consensus to effectively mitigate the influence of Byzantine agents [Reference Abbas, Laszka and Koutsoukos1, Reference Fu, Qin, Shi, Zheng and Kang11, Reference Huang, Wu, Chang, Tao and He15]. This assumption is also necessary in resilient tracking consensus because if the leader is not trusted, it plays a role essentially the same as a malicious agent and leader-following may not be feasible. A stronger condition that requires a leader being identifiable has been proposed in [Reference Razaee, Parisini and Polycarpou22], where the value of a leader is fed into the protocol differently from a cooperative agent (A convergence rate is estimated as a result of this).

Remark 5. Although the entry $a_{ij}(t)$ of the adjacency matrix is a random variable for any given time t, $\gamma_i(t)$ can be prescribed as a deterministic number. For example, if we know $a_{ij}(t)\leqslant M(t)$ holds for some $M(t)>0$ and all $i,j\in\mathcal{V}$ , $\gamma_i(t)$ can be chosen in the range of $(0,M(t)|\mathcal{N}^{\mathrm{in}}_i(t)|)$ .

The above strategy is pertinent to a parameter r, which we will use to bound the maximum number of Byzantine agents in the neighborhood of a cooperative agent. In particular, a vertex set $\mathcal{S}\subseteq\mathcal{V}$ is called r-local if for any $i\not\in\mathcal{S}$ , $|\mathcal{N}^{\mathrm{in}}_i(t)\cap\mathcal{S}|\leqslant r$ for any $t\in\mathbb{N}$ . If $\mathcal{B}$ is r-local, clearly any cooperative agent will have at most r Byzantine in-neighbors.

With the above resilient tracking consensus strategy, we will show that the cooperative agents in $\mathcal{C}$ can follow the leader $\ell$ in the sense of almost sure convergence as $t\rightarrow\infty$ . Specifically, we say the resilient tracking consensus is achieved for the multi-agent system (2.1) if $\|x_i(t)-x_{\ell}(t)\|\rightarrow0$ as $t\rightarrow\infty$ almost surely for any $i\in\mathcal{C}$ and initial configuration $\{x_i(0)\}_{i\in\mathcal{V}}$ .

3 Convergence analysis

In this section, we investigate the resilient tracking consensus of the linear system (2.1) in the presence of Byzantine agents in a dynamic random graph $\mathcal{G}(t)$ . Our main result is the following.

Theorem 1. Consider the multi-agent system (2.1) over the dynamic random graph $\mathcal{G}(t)=(\mathcal{V},\mathcal{E}(t),\mathcal{A}(t))$ with $\mathcal{V}=\{\ell\}\cup\mathcal{C}\cup\mathcal{B}$ , where $\ell$ is the leader agent, cooperative agents in $\mathcal{C}$ update their states following the strategy (2.5), and the set $\mathcal{B}$ of Byzantine agents is r-local. Suppose $\mathcal{G}(t)$ is leader-follower $(2r+1)$ -robust with positive probability for each $t\in\mathbb{N}$ and Assumption 1 holds. If (A, B) is controllable, then the resilient tracking consensus for (2.1) is achieved almost surely.

Remark 6. Fix $t\in\mathbb{N}$ . Define $\hat{\mathcal{E}}(t)=\{(i,\,j)\in\mathcal{V}\times\mathcal{V}:p_{ij}(t)>0\}$ . Note that the graph $\mathcal{G}(t)$ is a finite graph. Therefore, if the adjacency matrix $\mathcal{A}(t)$ has independent elements, the condition that $\mathcal{G}(t)$ is leader-follower $(2r+1)$ -robust with positive probability is equivalent to saying that the graph $(\mathcal{V},\hat{\mathcal{E}}(t))$ is leader-follower $(2r+1)$ -robust.

Proof. For any agent $i\in\mathcal{C}$ , by (2.3) and (2.5), we have

(3.1) \begin{align}y_i(t+1)=&\left(\begin{array}{c@{\quad}c@{\quad}c@{\quad}c@{\quad}c}-\alpha_1&-\alpha_2&-\alpha_3&\cdots&-\alpha_n\\1&0&0&\cdots&0\\0&1&0&\cdots&0\\\vdots&\vdots&\vdots&\ddots&\vdots\\0&0&0&\cdots&0\end{array}\right)y_i(t)+\left(\begin{array}{c}1\\[2pt]0\\[2pt]0\\[2pt]\vdots\\[2pt]0\end{array}\right)\cdot\left(\sum_{k=1}^n\alpha_ky_{i,n-k}(t)\right.\nonumber\\&\left.-\sum_{k=1}^{n-1}\beta_ky_{i,n-k}(t)+z_i(t)+\gamma_i(t)\cdot\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)}a_{ij}(t)(z_j(t)-z_i(t))\right).\end{align}

Noting that $y_i(t)=(y_{i,n-1}(t),y_{i,n-2}(t),\cdots,y_{i,0}(t))^{\operatorname{T}}$ for $t\in\mathbb{N}$ , we obtain

(3.2) \begin{align}y_{i, n-1}(t+1)=&-\sum_{k=1}^{n-1}\beta_ky_{i,n-k}(t)+z_i(t)\nonumber\\& +\gamma_i(t)\cdot\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)}a_{ij}(t)(z_j(t)-z_i(t)),\end{align}

and

(3.3) \begin{align} y_{i,n-2}(t+1)=y_{i,n-1}(t), \quad y_{i,n-3}(t+1)=y_{i,n-2}(t), \quad \cdots,\quad y_{i,0}(t+1)=y_{i,1}(t).\end{align}

It follows from the definition of $z_i(t)$ in (2.4) and (3.2) that for $i\in\mathcal{C}$ ,

(3.4) \begin{align} z_i(t+1)=z_i(t)+\gamma_i(t)\cdot\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)}a_{ij}(t)(z_j(t)-z_i(t)).\end{align}

Since $0<\gamma_i(t)<\big(\!\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)}a_{ij}(t)\big)^{-1}$ , $z_i(t+1)$ in (3.4) can be viewed as a convex combination of $z_i(t)$ and $z_j(t)$ for $j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)$ . Define $\overline{z}(t)=\max\{\{z_i(t)\}_{i\in\mathcal{C}},z_{\ell}(t)\}$ and $\underline{z}(t)=\min\{\{z_i(t)\}_{i\in\mathcal{C}},z_{\ell}(t)\}$ . Fix $t\in\mathbb{N}$ . For any agent $i\in\mathcal{C}$ , since $\mathcal{B}$ is r-local and the convex combination is in effect, there are at most r in-neighbors (excluding possibly $\ell$ ) taking values outside the range $[\underline{z}(t),\overline{z}(t)]$ at time $t+1$ . By our resilient tracking consensus strategy, any such neighbors will be removed in the update for agent i at time step $t+1$ with two possible exceptions: (i) a neighbor j has state $z_j(t+1)$ satisfying $\overline{z}(t)<z_j(t+1)\leqslant z_{\ell}(t+1)$ or (ii) a neighbor j has state $z_j(t+1)$ satisfying $\underline{z}(t)>z_j(t+1)\geqslant z_{\ell}(t+1)$ . In both cases, $\ell\in\mathcal{N}^{\mathrm{in}}_i(t)$ . Employing Assumption 1, we know there exists $0\leqslant\varepsilon(t)=o\big(t^{-1}\big)$ such that

(3.5) \begin{align}\underline{z}(t)-\varepsilon(t)\leqslant\underline{z}(t+1)\leqslant\overline{z}(t+1)\leqslant\overline{z}(t)+\varepsilon(t)\end{align}

for $t\in\mathbb{N}$ . This relationship holds regardless of the randomness of edges in $\mathcal{G}(t)$ .

For any cooperative agent $i\in\mathcal{C}$ , write $w_i(t)=(y_{i,n-2}(t), y_{i, n-3}(t),\cdots,y_{i,0}(t))^{\operatorname{T}}\in\mathbb{R}^{n-1}$ . Therefore, $y_i(t)=(y_{i,n-1}(t),w_i(t)^{\operatorname{T}})^{\operatorname{T}}$ . In view of (3.3), we obtain a new linear system

(3.6) \begin{align}w_i(t+1)=\,\tilde{\!A}w_i(t)+\tilde{B}z_i(t),\end{align}

where $\,\tilde{\!A}=\left(\begin{array}{c@{\quad}c@{\quad}c@{\quad}c@{\quad}c}-\beta_1&-\beta_2&-\beta_3&\cdots&-\beta_{n-1}\\[2pt]1&0&0&\cdots&0\\[2pt]0&1&0&\cdots&0\\[2pt]\vdots&\vdots&\vdots&\ddots&\vdots\\[2pt]0&0&0&\cdots&0\end{array}\right)\in\mathbb{R}^{(n-1)\times(n-1)}$ and $\tilde{B}=(1, 0, 0, \cdots,0)^{\operatorname{T}}$ $\in$ $\mathbb{R}^{n-1}$ , where $z_i(t)$ is given by (2.4).

Define $b(t)=\overline{z}(t)-\underline{z}(t)-2t\varepsilon(t)$ for $t\in\mathbb{N}$ and let $\mathcal{F}(t)$ be the $\sigma$ -algebra generated by $\{\{z_i(0)\}_{i\in\mathcal{V}},\{z_i(1)\}_{i\in\mathcal{V}}, \cdots,\{z_i(t)\}_{i\in\mathcal{V}}\}$ . By (3.5), we obtain $\mathbb{E}|b(t)|<\infty$ for $t\in\mathbb{N}$ and $\mathbb{E}(b(t)|\mathcal{F}(t-1))\leqslant b(t-1)$ for $t\geqslant1$ . Thus, b(t) is a super-martingale relevant to the filtration $\mathcal{F}(t)$ . There is some $b\geqslant0$ such that

(3.7) \begin{align}\lim_{t\rightarrow\infty}b(t)=\lim_{t\rightarrow\infty}(\overline{z}(t)-\underline{z}(t))=b,\end{align}

almost surely by employing the martingale convergence theorem [Reference Hall and Heyde14, p. 2] and our assumption of $\varepsilon(t)$ .

Next, we will show the limit $b=0$ . In fact, if this is not the case we define three random sets $\mathcal{I}_1(t)=\{i\in\mathcal{V}\backslash\mathcal{B}:z_i(t)=\overline{z}(t)\}\not=\emptyset$ , $\mathcal{I}_2(t)=\{i\in\mathcal{V}\backslash\mathcal{B}:z_i(t)=\underline{z}(t)\}\not=\emptyset$ , and $\mathcal{I}_3(t)=(\mathcal{V}\backslash\mathcal{B})\backslash(\mathcal{I}_1(t)\cup\mathcal{I}_2(t))$ . Clearly, these three sets partition $\mathcal{V}\backslash\mathcal{B}$ . We consider three cases depending on the location of leader $\ell$ : (i) $\ell\in\mathcal{I}_1(t)$ , (ii) $\ell\in\mathcal{I}_2(t)$ , and (iii) $\ell\in\mathcal{I}_3(t)$ .

(i) Suppose $\mathcal{I}_2(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)\not=\emptyset$ . We have, say, $i\in\mathcal{I}_2(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)$ . By our resilient tracking consensus strategy, $z_{\ell}(t)$ will be used in the update for agent i at time step $t+1$ via (3.4). Since $\mathcal{B}$ is r-local, it is easy to see our protocol guarantees any value outside $[\underline{z}(t),\overline{z}(t)]$ will not be used in the update for agent i at time step $t+1$ in this situation. Because of the convex combination in (3.4), agent i must take a larger value at the next time step, that is, $z_i(t+1)>z_i(t)$ .

If $\mathcal{I}_2(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)=\emptyset$ , by our assumption that $\mathcal{G}(t)$ is leader-follower $(2r+1)$ -robust with positive probability, we know $\mathcal{I}_2(t)$ is $(2r+1)$ -robust with positive probability. Hence, with positive probability there exists $i\in\mathcal{I}_2(t)$ such that i has at least $2r+1$ in-neighbors outside the set $\mathcal{I}_2(t)$ . As $\mathcal{B}$ is r-local, i has at least $r+1$ cooperative in-neighbors outside $\mathcal{I}_2(t)$ . By our algorithm, at least one of such neighbors will be used in the update for agent i at time step $t+1$ . Using the fact that $\mathcal{B}$ is r-local again, we know that any value outside $[\underline{z}(t),\overline{z}(t)]$ will not be used by i in the update at time $t+1$ . Therefore, via the convex combination in (3.4), we obtain $z_i(t+1)\geqslant z_i(t)$ and with positive probability $z_i(t+1)>z_i(t)$ .

(ii) This case can be shown analogously as in (i) by considering two situations: $\mathcal{I}_1(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)\not=\emptyset$ and $\mathcal{I}_1(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)=\emptyset$ . Consequently, we know that with positive probability there exists some agent $i\in\mathcal{I}_1(t)$ such that $z_i(t+1)\leqslant z_i(t)$ and with positive probability $z_i(t+1)<z_i(t)$ .

(iii) We first consider two situations $\mathcal{I}_2(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)\not=\emptyset$ and $\mathcal{I}_2(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)=\emptyset$ and proceed similarly as in case (i) to conclude there is some agent $i\in\mathcal{I}_2(t)$ satisfying $z_i(t+1)\geqslant z_i(t)$ and with positive probability $z_i(t+1)>z_i(t)$ . Then, we consider two situations $\mathcal{I}_1(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)\not=\emptyset$ and $\mathcal{I}_1(t)\cap\mathcal{N}^{\mathrm{out}}_{\ell}(t)=\emptyset$ and proceed similarly as in case (ii) to derive there exists agent $j\in\mathcal{I}_1(t)$ satisfying $z_j(t+1)\leqslant z_j(t)$ and with positive probability $z_j(t+1)<z_j(t)$ .

Combining (i), (ii), (iii) and noting that $\mathcal{G}(t)$ is a finite graph, we conclude that $\overline{z}(t)-\underline{z}(t)$ tends to zero in probability as $t\rightarrow\infty$ . But this is at odds with our assumption that $b>0$ in (3.7). Therefore, we have shown that almost surely

(3.8) \begin{align}\lim_{t\rightarrow\infty}(\overline{z}(t)-\underline{z}(t))=0.\end{align}

Using Assumption 1, (3.5) and (3.8), we obtain that there is some $c\in\mathbb{R}$ satisfying $\lim_{t\rightarrow\infty}z_i(t)=c$ almost surely for all $i\in\mathcal{C}\cup\{\ell\}$ . Moreover, by (2.4) we know that c is determined via the following

(3.9) \begin{align}c=\left(\Gamma^{-1}x_f\right)_{n-1}+\sum_{k=1}^{n-1}\beta_k\!\left(\Gamma^{-1}x_f\right)_{n-1-k},\end{align}

where $\Gamma^{-1}x_f=\left(\left(\Gamma^{-1}x_f\right)_{n-1},\left(\Gamma^{-1}x_f\right)_{n-2},\cdots,\left(\Gamma^{-1}x_f\right)_0\right)$ .

With the convergence of $z_i(t)$ at hand, we now move onto the convergence of $w_i(t)$ for $i\in\mathcal{C}$ . In doing so, define an error vector $\delta_i(t)=w_i(t)-c/\left(1+\sum_{k=1}^{n-1}\beta_k\right)1_{n-1}$ , where $1_{n-1}\in\mathbb{R}^{n-1}$ is an all one vector. Using (3.6), we arrive at

(3.10) \begin{align} \delta_i(t+1)& =\,\tilde{\!A}w_i(t)+\tilde{B}z_i(t)-\frac{c}{1+\sum_{k=1}^{n-1}\beta_k}1_{n-1}\nonumber\\[3pt] & =\,\tilde{\!A}\delta_i(t)+\,\tilde{\!A}\frac{c}{1+\sum_{k=1}^{n-1}\beta_k}1_{n-1}+ \tilde{B}z_i(t)-\frac{c}{1+\sum_{k=1}^{n-1}\beta_k}1_{n-1}\nonumber\\[3pt] & =\,\tilde{\!A}\delta_i(t)+\left[\left(\begin{array}{c@{\quad}c@{\quad}c@{\quad}c@{\quad}c}-\beta_1&-\beta_2&-\beta_3&\cdots&-\beta_{n-1}\\[1pt] 1&0&0&\cdots&0\\[1pt] 0&1&0&\cdots&0\\ \vdots&\vdots&\vdots&\ddots&\vdots\\[1pt] 0&0&0&\cdots&0\end{array}\right)\cdot\left(\begin{array}{c}1\\[1pt] 1\\[1pt] 1\\[1pt] \vdots\\ 1\end{array}\right)-\left(\begin{array}{c}1\\[1pt] 1\\[1pt] 1\\ \vdots\\[1pt] 1\end{array}\right)\right]\nonumber\\ &\qquad \cdot\frac{c}{1+\sum_{k=1}^{n-1}\beta_k}+\tilde{B}z_i(t)\nonumber\\[5pt] & =\,\tilde{\!A}\delta_i(t)-\tilde{B}c+\tilde{B}z_i(t).\end{align}

Denote by $\rho_i(t)=z_i(t)-c$ for $i\in\mathcal{C}$ and hence $\lim_{t\rightarrow\infty}\rho_i(t)=0$ almost surely. From (3.10), we have

(3.11) \begin{align}\delta_i(t+1)=\,\tilde{\!A}\delta_i(t)+\tilde{B}\rho_i(t).\end{align}

It is easy to see that the matrix $\,\tilde{\!A}$ is Schur stable because the characteristic polynomial $\operatorname{det}(\lambda I_{n-1}-\,\tilde{\!A})$ is a Schur stable polynomial as defined at the end of Section 2.2. Thanks to the Lyapunov stability theory [Reference Chen6, Theorem 5.D5], we obtain for any positive definite matrix $Q\in\mathbb{R}^{(n-1)\times(n-1)}$ there is a positive definite matrix $P\in\mathbb{R}^{(n-1)\times(n-1)}$ such that $P-Q=\tilde{A}^{\operatorname{T}}P\,\tilde{\!A}$ . For any cooperative agent $i\in\mathcal{C}$ , define the Lyapunov candidate function $\Theta_i(t)=\delta_i(t)^{\operatorname{T}}P\delta_i(t)$ and along the solution of (3.11) it follows

(3.12) \begin{align}\Theta_i(t+1)-\Theta_i(t)&=-\delta_i(t+1)^{\operatorname{T}}P\delta_i(t+1)-\delta_i(t)^{\operatorname{T}}P\delta_i(t)\nonumber\\&=-\delta_i(t)^{\operatorname{T}}Q\delta_i(t)+2\delta_i(t)^{\operatorname{T}}\tilde{A}^{\operatorname{T}}P\tilde{B}\rho_i(t)+\rho_i(t)^2\tilde{B}^{\operatorname{T}}P\tilde{B}.\end{align}

Recall that $\,\tilde{\!A}$ is stable. Applying the input-to-state stability result [Reference Jiang and Wang16, Example 3.4, Lemma 3.5] to the linear system (3.6), we derive that $w_i(t)$ is bounded for all $t\in\mathbb{N}$ . In light of the definition of $\delta_i(t)$ , we know $\delta_i(t)$ is also bounded. Since $\lim_{t\rightarrow\infty}\rho_i(t)=0$ almost surely, we obtain $\lim_{t\rightarrow\infty}|2\delta_i(t)^{\operatorname{T}}\tilde{A}^{\operatorname{T}}P\tilde{B}\rho_i(t)+\rho_i(t)^2\tilde{B}^{\operatorname{T}}P\tilde{B}|=0$ almost surely. By (3.12), it is not difficult to see $\lim_{t\rightarrow\infty}\Theta_i(t)=0$ almost surely for any cooperative agent $i\in\mathcal{C}$ . Indeed, if this is not true, $\delta_i(t)\not\rightarrow0$ as $n\rightarrow\infty$ by the definition of $\Theta_i(t)$ and the positive definiteness of P. Using (3.12) and the positive definiteness of Q, for any $t\in\mathbb{N}$ there are $\varepsilon>0$ and $\hat{t}\geqslant t$ such that $\Theta_i(\hat{t}+1)-\Theta_i(\hat{t})\leqslant-\varepsilon$ . This is in conflict with the fact that $\Theta_i(t)$ for all $t\in\mathbb{N}$ is lower bounded by zero.

Using the definition of $\Theta_i(t)$ again, we have $\lim_{t\rightarrow\infty}\delta_i(t)=0$ almost surely for $i\in\mathcal{C}$ . Thereby, $\lim_{t\rightarrow\infty}w_i(t)=c/\left(1+\sum_{k=1}^{n-1}\beta_k\right)1_{n-1}$ almost surely. Applying (3.3), we know $\lim_{t\rightarrow\infty}y_i(t)=c/\left(1+\sum_{k=1}^{n-1}\beta_k\right)1_n$ almost surely for all cooperative agents $i\in\mathcal{C}$ . As $x_i(t)=\Gamma y_i(t)$ , it follows that

(3.13) \begin{align}\lim_{t\rightarrow\infty}x_i(t)& =\frac{c}{\left(1+\sum_{k=1}^{n-1}\beta_k\right)}\Gamma1_n\nonumber\\& =\Gamma 1_n\frac{(1,\beta_1, \beta_2,\cdots,\beta_{n-1})\Gamma^{-1}x_f}{\left(1+\sum_{k=1}^{n-1}\beta_k\right)}\nonumber\\& =\Gamma\Gamma^{-1}x_f\nonumber\\& =x_f\end{align}

almost surely by using (3.9). This means all cooperative agents will track the evolution of the leader agent $\ell$ by Assumption 1. The proof is complete. $\Box$

Remark 7. As with W-MSR like protocols, our resilient tracking consensus strategy does not guarantee ditching all Byzantine agents nor does it guarantee keeping all cooperative agents at any time step. As a result, the transient trajectories are influenced by the Byzantine agents in general. However, distinct from leaderless consensus counterparts (e.g. [Reference Dibaji and Ishii7, Reference LeBlanc, Zhang, Koutsoukos and Sundaram18, Reference Razaee, Parisini and Polycarpou21, Reference Shang25, Reference Shang26]), the final consensus state goes with that of the leader (and hence not influenced by any Byzantine agents).

Remark 8. The above linear system analysis method can be applied to a more general control function $u_i(t)$ given as follows

(3.14) \begin{align}u_i(t)=&\sum_{k=1}^n\alpha_ky_{i,n-k}(t)-\sum_{k=1}^{n-1}\beta_ky_{i,n-k}(t)+z_i(t) +\gamma_i(t)\cdot\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)}a_{ij}(t)g_{ij}(z_j(t),z_i(t)),\end{align}

where $\gamma_i(t)$ is chosen as in (2.5) and the nonlinear function $g_{ij}:\mathbb{R}\times\mathbb{R}\rightarrow\mathbb{R}$ satisfies (i) $g_{ij}(z_1,z_2)=0$ if and only if $z_1=z_2$ and (ii) there exist two constants $0<q_i\leqslant q^{\prime}_i\leqslant1$ such that

(3.15) \begin{align}q_i\leqslant\frac{g_{ij}(z_1,z_2)}{z_1-z_2}\leqslant q^{\prime}_i\end{align}

for any $z_1\not=z_2$ . The control function $u_i(t)$ in (2.5) is a special case of (3.14) by taking $g_{ij}(z_1,z_2)=z_1-z_2$ . It is worth mentioning that the two bounds in (3.15) do not depend on any node j as we can always take the maximum and minimum over all nodes of $\mathcal{G}(t)$ (which is a finite graph) without loss of generality.

With this coupling function, Theorem 1 can be proved along the same line. In fact, when (2.5) is replaced by (3.14), the update rule (3.4) for an agent $i\in\mathcal{C}$ becomes

(3.16) \begin{align}z_i(t+1)=z_i(t)+\gamma_i(t)\cdot\sum_{j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)}a_{ij}(t)g_{ij}(z_j(t),z_i(t)).\end{align}

Although $z_i(t+1)$ is no longer a convex combination of $z_i(t)$ and $\{z_j(t)\}_{j\in\mathcal{N}^{\mathrm{in}}_i(t)\backslash\mathcal{R}_i(t)}$ , it is bounded by two convex combinations of them from the above and the below.

4 Numerical simulations

In this section, we present two examples to illustrate our theory.

Example 1. Consider a directed graph $\mathcal{G}$ over $N=8$ vertices with $\ell=1$ , $\mathcal{B}=\{2\}$ and $\mathcal{C}=\{3,4,\cdots,8\}$ ; see Figure 1. The time-dependent random graph $\mathcal{G}(t)$ is built upon $\mathcal{G}$ by assuming binary edge weights, namely, $a_{ij}(t)$ takes 1 or 0. The edge probabilities $p_{ij}(t)\equiv0.5$ and the corresponding weights $a_{ij}(t)$ are independent for all i, j, and t. It is straightforward to check that $\mathcal{G}$ is leader-follower 3-robust. Hence, $\mathcal{G}(t)$ is leader-follower 3-robust with positive probability for any $t\in\mathbb{N}$ ; c.f. Remark 6.

Figure 1. A leader-follower 3-robust graph $\mathcal{G}$ with $N=8$ agents: leader $\ell=1$ , Byzantine $\mathcal{B}=\{2\}$ and cooperative $\mathcal{C}=\{3,4,5,6,7,8\}$ .

The agents’ dynamics for $i\in\mathcal{V}$ and $t\in\mathbb{N}$ and are taken as

(4.1) \begin{align}x_i(t+1)=\left(\begin{array}{c@{\quad}c}0.5&1\\[3pt]0&0.5\end{array}\right)x_i(t)+\left(\begin{array}{c}0\\[3pt]1\end{array}\right)u_i(t),\end{align}

where $u_1(t)=f(t)\equiv0$ , $u_2(t)=0.2\cos(t/5)$ , and $u_i(t)$ for $i\in\mathcal{C}$ is given by (2.5) with $\alpha_1=-1$ , $\alpha_2=0.25$ , $\beta_1=0.5$ , $\gamma_i(t)\equiv0.2$ . It is easy to check that the pair (A, B) is stable, $x_f=(0,0)^{\operatorname{T}}$ , and all conditions in Theorem 1 are satisfied. Let $x_i(t)=(x_{i,1}(t),x_{i,2}(t))^{\operatorname{T}}$ for $i\in\mathcal{C}$ .

By choosing initial states randomly within $[-4,4]$ , we display the dynamical evolution of the multi-agent system in Figure 2. We observe that both components of the states of cooperative agents track the leader agent 1 and converge to the equilibrium $x_f$ as expected.

Figure 2. Resilient tracking consensus over the 2-dimensional state space with the leader agent 1 (red) and the Byzantine agent 2 (blue).

Figure 3. The animal interaction network of $N=12$ macaca fuscata. It has a leader $\ell=1$ , Byzantine $\mathcal{B}=\{2\}$ and cooperative $\mathcal{C}=\{3,4,\cdots,12\}$ .

In this example, the Byzantine agent $2\in\mathcal{N}^{\mathrm{out}}_1(t)$ with probability 0.5 and it influences half of the cooperative agents in $\mathcal{C}$ . Moreover, the Byzantine agent possesses a dynamics repeatedly oscillating around the equilibrium. All this represents a highly adverse scenario to the collective consensus task. Remarkably, our simple distributed protocol enables the cooperative agents to converge towards the leader’s equilibrium relatively quickly.

Example 2. As is known, determining robustness is an NP-hard problem [Reference Usevitch and Panagou31], which prevents us from considering large-scale empirical networks. In this example, we consider an animal interaction network of primates in Yakushima, Japan [Reference Griffin and Nunn13], which contains $N=12$ macaca fuscata with a leader; see Figure 3. Specifically, the directed graph $\mathcal{G}$ has a leader $\ell=1$ , a Byzantine agent in $\mathcal{B}=\{2\}$ and cooperative agents in $\mathcal{C}=\{3,4,\cdots,12\}$ . We construct a time-dependent random graph $\mathcal{G}(t)$ by assuming binary edge weights, namely $a_{ij}(t)$ takes 1 or 0 and edge probabilities $p_{ij}(t)\equiv p$ . The weights $a_{ij}(t)$ are independent for all i, j, and t. It is straightforward to verify that $\mathcal{G}$ is leader-follower 3-robust. Hence, $\mathcal{G}(t)$ is leader-follower 3-robust with positive probability for all $t\in\mathbb{N}$ . Note that the Byzantine agent 2 is highly connected in the network.

Let $n=1$ . The agents’ dynamics for $i\in\mathcal{V}$ and $t\in\mathbb{N}$ and are chosen as

(4.2) \begin{align}x_i(t+1)=\frac12 x_i(t)+u_i(t),\end{align}

where $u_1(t)=f(t)\equiv0$ , $u_2(t)=0.1\cos(t/20)$ , and $u_i(t)$ for $i\in\mathcal{C}$ is given by (2.5) with $\alpha_1=-0.5$ , $\gamma_i(t)\equiv 1/12$ . It is clear that $x_f=0,$ and all conditions in Theorem 1 are satisfied.

The initial configuration is chosen as $x_1(0)=-0.8$ , $x_2(0)=0.3$ , $x_3(0)=-0.1$ , $x_4(0)=-0.5$ , $x_5(0)=1$ , $x_6(0)=-0.7$ , $x_7(0)=0.2$ , $x_8(0)=0.6$ , $x_9(0)=0.7$ , $x_{10}(0)=-1$ , $x_{11}(0)=0.1$ , $x_{12}(0)=-0.3$ . In Figure 4(a) and (b), we show the state evolution for different edge probability $p=0.1$ and $p=0.8$ , respectively. In both cases, the followers are able to track the leader and a denser network tends to give rise to a faster convergence.

Figure 4. Resilient tracking consensus for the animal interaction network with the leader agent 1 (red) and the Byzantine agent 2 (blue) with edge density (a) $p=0.1$ and (b) $p=0.8$ .

5 Conclusion

In this paper, we adopt a linear system approach to solving the resilient tracking consensus problems over random graphs. The agents are divided into three categories, namely one leader, some Byzantine agents and cooperative agents. The consensus is reached when the cooperative agents collapse on the target position of the leader, despite the possibly malevolent action of the Byzantine agents. We provide sufficient conditions that guarantee almost sure tracking consensus of cooperative agents towards the leader over time-varying directed graphs with random edges. The designed control protocol is purely distributed and enables consensus against a bounded number of Byzantine agents. Our future work will include generalizing the linear system method to deal with other coordinated complex system problems.

Acknowledgement

The author is grateful to the anonymous reviewers for their careful reading and constructive suggestions.

Conflicts of interest

The author declares that they have no known competing financial interests or personal relationships that could have appeared to influence the work reported in this paper.

References

Abbas, W., Laszka, A. & Koutsoukos, X. (2018) Improving network connectivity and robustness using trusted nodes with application to resilient consensus. IEEE Trans. Contr. Netw. Syst. 5(4), 20362048.CrossRefGoogle Scholar
Amirkhani, A. & Barshooi, A. H. (2022) Consensus in multi-agent systems: a review. Artif. Intell. Rev. doi: 10.1007/s10462-021-10097-x.CrossRefGoogle Scholar
Bhattacharyya, S. P., Datta, A. & Keel, L. H. (2009) Linear Control Theory: Structure, Robustness, and Optimization, CRC Press, Boca Raton, FL.Google Scholar
Becchetti, L., Clementi, A. & Natale, E. (2020) Consensus dynamics: an overview. ACM SIGACT News, 51, 58104.CrossRefGoogle Scholar
Burbano, L. D. A., DeLellis, P. & diBernardo, M. (2016) Self-tuning proportional integral control for consensus in heterogeneous multi-agent systems. Euro. J. Appl. Math. 27, 923940.CrossRefGoogle Scholar
Chen, C.-T. (1998) Linear System Theory and Design, Oxford University Press, New York, USA.Google Scholar
Dibaji, S. M. & Ishii, H. (2015) Consensus of second-order multi-agent systems in the presence of locally bounded faults. Syst. Contr. Lett. 79, 2329.CrossRefGoogle Scholar
Dibaji, S. M., Ishii, H. & Tempo, R. (2018) Resilient randomized quantized consensus. IEEE Trans. Autom. Contr. 63(8), 25082522.CrossRefGoogle Scholar
Fiore, D. & Russo, G. (2019) Resilient consensus for multi-agent systems subject to differential privacy requirements. Automatica 106, 1826.CrossRefGoogle Scholar
Fornasier, M., Lisini, S., Orrieri, C. & Savaré, G. (2019) Mean-field optimal control as Gamma-limit of finite agent controls. Euro. J. Appl. Math. 30(6), 11531186.CrossRefGoogle Scholar
Fu, W., Qin, J., Shi, Y., Zheng, W. X. & Kang, Y. (2020) Resilient consensus of discrete-time complex cyber-physical networks under deception attacks. IEEE Trans. Ind. Inf. 16(7), 48684877.CrossRefGoogle Scholar
Gong, P., Han, Q.-L. & Lan, W. (2022) Finite-time consensus tracking for incommensurate fractional-order nonlinear multiagent systems with directed switching topologies. IEEE Trans. Cybern. 52(1), 6576.CrossRefGoogle Scholar
Griffin, R. H. & Nunn, C. L. (2012) Community structure and the spread of infectious disease in primate social networks. Evol. Ecol. 26, 779800.CrossRefGoogle Scholar
Hall, P. & Heyde, C. C. (1980) Martingale Limit Theory and its Application, Academic Press, New York.Google Scholar
Huang, J., Wu, Y., Chang, L., Tao, M. & He, X. (2019) Resilient consensus with switching networks and heterogeneous agents. Neurocomputing 341, 7079.CrossRefGoogle Scholar
Jiang, Z.-P. & Wang, Y. (2001) Input-to-state stability for discrete-time nonlinear systems. Automatica 37, 857869.CrossRefGoogle Scholar
Lamport, L., Shostak, R. & Pease, M. (1982) The byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382401.CrossRefGoogle Scholar
LeBlanc, H. J., Zhang, H., Koutsoukos, X. & Sundaram, S. (2013) Resilient asymptotic consensus in robust networks. IEEE J. Select. Areas Commun. 31(4), 766781.CrossRefGoogle Scholar
Mitra, A., Richards, J. A., Bagchi, S. & Sundaram, S. (2019) Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements. Autom. Robots 43, 743768.CrossRefGoogle Scholar
Olfati-Saber, R. & Murray, R. M. (2004) Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Autom. Contr. 49(9), 15201533.CrossRefGoogle Scholar
Razaee, H., Parisini, T. & Polycarpou, M. M. (2021) Almost sure resilient consensus under stochastic interaction: links failure and noisy channels. IEEE Trans. Autom. Contr. 66(12), 57275741.CrossRefGoogle Scholar
Razaee, H., Parisini, T. & Polycarpou, M. M. (2021) Resiliency in dynamic leader-follower multiagent systems. Automatica 125, 109384.CrossRefGoogle Scholar
Senejohnny, D. M., Sundaram, S., Persis, C. D. & Tesi, P. (2019) Resilience against misbehaving nodes in asynchronous networks. Automatica 104, 2633.CrossRefGoogle Scholar
Shang, Y. (2018) Hybrid consensus for averager-copier-voter networks with non-rational agents. Chaos Solitons Fractals 110, 244251.CrossRefGoogle Scholar
Shang, Y. (2020) Consensus of hybrid multi-agent systems With malicious nodes. IEEE Trans. Circ. Syst. Express Briefs 67(4), 685689.CrossRefGoogle Scholar
Shang, Y. (2020) Resilient consensus in multi-agent systems with state constraints. Automatica 122, 109288.CrossRefGoogle Scholar
Shang, Y. (2021) Resilient group consensus in heterogeneously robust networks with hybrid dynamics. Math. Method. Appl. Sci. 44, 14561469.CrossRefGoogle Scholar
Song, Q., Cao, J. & Yu, W. (2010) Second-order leader-following consensus of nonlinear multi-agent systems via pinning control. Syst. Contr. Lett. 59(9), 553562.CrossRefGoogle Scholar
Usevitch, J. & Panagou, D. (2018) Resilient leader-follower consensus to arbitrary reference values. In: Proceedings of the Annual American Control Conference, Milwaukee, WI, pp. 12921298.CrossRefGoogle Scholar
Usevitch, J. & Panagou, D. (2019) Resilient leader-follower consensus with time-varying leaders in discrete-time systems. In: Proceedings of the 58th IEEE Conference on Decision and Control, Nice, France, pp. 54325437.CrossRefGoogle Scholar
Usevitch, J. & Panagou, D. (2020) Determining r- and (r, s)-robustness of digraphs using mixed integer linear programming. Automatica 111, 108586.CrossRefGoogle Scholar
Wang, L., Wang, L. & Kong, Z. (2017) Two controllable canonical forms for single input complex network. In: Proceedings of the 29th Chinese Control and Decision Conference, Chongqing, China, pp. 14671472.CrossRefGoogle Scholar
You, X., Hua, C., Li, L. & Jia, X. (2020) Fixed-time leader-following consensus for high-order time-varying nonlinear multiagent systems. IEEE Trans. Autom. Contr. 65(12), 55105516.CrossRefGoogle Scholar
Yuan, L. & Ishii, H. (2021) Secure consensus with distributed detection via two-hop communication. Automatica 131, 109775.CrossRefGoogle Scholar
Zhao, D., Lv, Y., Yu, X., Wen, G. & Chen, C. (2022) Resilient consensus of higher order multiagent networks: an attack isolation-based approach. IEEE Trans. Autom. Contr. 67(2), 10011007.CrossRefGoogle Scholar
Figure 0

Table 1. Processing for a cooperative agent $i\in \mathcal{C}$.

Figure 1

Figure 1. A leader-follower 3-robust graph $\mathcal{G}$ with $N=8$ agents: leader $\ell=1$, Byzantine $\mathcal{B}=\{2\}$ and cooperative $\mathcal{C}=\{3,4,5,6,7,8\}$.

Figure 2

Figure 2. Resilient tracking consensus over the 2-dimensional state space with the leader agent 1 (red) and the Byzantine agent 2 (blue).

Figure 3

Figure 3. The animal interaction network of $N=12$ macaca fuscata. It has a leader $\ell=1$, Byzantine $\mathcal{B}=\{2\}$ and cooperative $\mathcal{C}=\{3,4,\cdots,12\}$.

Figure 4

Figure 4. Resilient tracking consensus for the animal interaction network with the leader agent 1 (red) and the Byzantine agent 2 (blue) with edge density (a) $p=0.1$ and (b) $p=0.8$.

You have Access Open access