This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

A Geometric Approach to Resilient Distributed Consensus Accounting for State Imprecision and Adversarial Agents

Christopher A. Lee and Waseem Abbas C. Lee is with the Electrical Engineering Department, and W. Abbas is with the Systems Engineering Department at the University of Texas at Dallas, Richardson, TX, USA (Emails: [email protected], [email protected]).
Abstract

This paper presents a novel approach for resilient distributed consensus in multiagent networks when dealing with adversarial agents imprecision in states observed by normal agents. Traditional resilient distributed consensus algorithms often presume that agents have exact knowledge of their neighbors’ states, which is unrealistic in practical scenarios. We show that such existing methods are inadequate when agents only have access to imprecise states of their neighbors. To overcome this challenge, we adapt a geometric approach and model an agent’s state by an ‘imprecision region’ rather than a point in d\mathbb{R}^{d}. From a given set of imprecision regions, we first present an efficient way to compute a region that is guaranteed to lie in the convex hull of true, albeit unknown, states of agents. We call this region the invariant hull of imprecision regions and provide its geometric characterization. Next, we use these invariant hulls to identify a safe point for each normal agent. The safe point of an agent lies within the convex hull of its normal neighbors’ states and hence is used by the agent to update it’s state. This leads to the aggregation of normal agents’ states to safe points inside the convex hull of their initial states, or an approximation of consensus. We also illustrate our results through simulations. Our contributions enhance the robustness of resilient distributed consensus algorithms by accommodating state imprecision without compromising resilience against adversarial agents.

I Introduction

In distributed multi-agent networks, agents work collaboratively to accomplish complex tasks by sharing information with each other. To make optimal decisions, they rely on this shared data. However, false or misleading information from a subset of agents–due to adversarial actions or other failures–can significantly compromise the network’s operations. Thus, to realize the full benefits of distributed decision-making, resilience to abnormal agents is crucial for the correct functioning of multi-agent systems. As such, there has been an increased interest in characterizing and imposing resilience in distributed systems.

Recent works on resilient distributed networks, particularly in resilient distributed consensus—a canonical problem in networked and distributed control systems–present a suite of algorithms and conditions on the network structure. If these conditions are satisfied, they guarantee the normal operations of the overall system [1, 2]. The main idea of such algorithms is to minimize the impact of information from adversarial or faulty agents, even without knowing their identities [3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18]. However, existing resilient consensus solutions often make the unrealistic assumption that agents can observe their neighbors’ exact, unperturbed states. In real-world applications, agents deal with imprecise data due to factors like sensor noise, environmental conditions, or hardware limitations [19, 20, 21, 22, 23]. As we demonstrate in this paper, applying current resilient algorithms in these ‘imprecise’ scenarios can lead to failures, even if the number of adversarial agents is below the theoretical threshold allowed by the solution. Therefore, new methods are needed, and this paper introduces strategies to handle both adversarial agents and imprecise states in multi-agent networks.

This paper introduces a new method to tackle the resilient distributed consensus problem, focusing on the commonly overlooked issue of state imprecision, that is, the observed states vary from the true state by a known bounded measure. There are existing studies that address a similar problem in a static scenario [24], however our formulation is developed independently and tailored towards the application of resilient consensus. Our approach ensures that all normal agents remain within the convex hull of their initial states and continuously converge towards a ball contained in the convex hull of the normal agents’ initial positions. The radius of the ball is dependent on the initial configuration, the actions of the attacker, and the stochastic discrepancy between true and observed states. However, the final state of each normal agent is guaranteed to be strictly contained in the initial convex hull of normal agents. We show that this approximation of “consensus” is achieved by the CPIH algorithm proposed in this paper, while existing distributed consensus algorithms fail to achieve even approximate consensus under imprecision. The crux of our method is ensuring that in each step of the state update process, a normal agent can find a point that is guaranteed to lie in the convex hull of its normal neighbors only. The agent then updates its state by moving towards that point, which is also referred to as the safe point [4, 3, 9, 25]. We show that existing methods fail to identify such safe points when faced with imprecision. In contrast, our approach successfully identifies these points and maintains the same level of resilience against adversarial agents as existing methods that do not account for state imprecision.

We summarize our key contributions as follows:

  • First, we show that current algorithms for resilient distributed consensus do not work well when agents have imprecise states (Section III). This is important because imprecise states are common in real-world applications.

  • Second, we introduce a new way to model these imprecise states. Instead of using points in d\mathbb{R}^{d}, we use what we call ‘imprecision regions’ containing true states of agents. We then introduce the notion of invariant hull which is essentially the largest region that is contained in the convex hull of normal agents’ true states when only their imprecision regions are known. We also provide a geometric characterization of invariant hulls and an efficient algorithm to compute them (Section IV).

  • Third, we develop a method that leverages these invariant hulls to identify a ‘safe point’ in the neighborhood of a normal agent. This neighborhood may contain up to Nvd+11\frac{N_{v}}{d+1}-1 adversaries. Here, NvN_{v} is the total number of nodes in the neighborhood of a normal agent vv and dd is the state dimension. This safe point allows the normal agent to update its state while ignoring any adversaries. We also illustrate our results through simulations (Section V).

The rest of the paper is organized as follows: Section II introduces preliminaries and notations. Section III reviews existing resilient consensus algorithms and show their inadequacy with imprecise states. Section IV introduces the invariant hull notion and discusses its computation and significance. Section V presents methods to compute safe point for resilient distributed consensus with imprecision, and present simulations. Finally, Section VI concludes the paper.

II Preliminaries

We consider a network of agents modeled by an undirected graph G=(V,E)G=(V,E), where VV represents agents and EE denotes interactions among agents. An edge between agents uu and vv is denoted by an unordered pair (u,v)(u,v). We use the terms agent and node interchangeably. Each agent uVu\in V has a dd-dimensional state vector whose value is updated over time. The state of agent uu at time tt is represented by a point xu(t)dx_{u}(t)\in\mathbb{R}^{d}. The neighborhood of uu is the set of nodes Nu={vV:(u,v)E}{u}N_{u}=~{}\{v\in V:\;(u,v)\in E\}\cup\{u\} (node uu is included in its neighborhood). For a given set of points Xd{X}\subset\mathbb{R}^{d}, we denote its convex hull by Conv(X)({X}). Also, we use terms points and states interchangeably.

Normal and Adversarial Agents – Agents in the network can either be normal or adversarial. Normal agents, denoted by VnVV_{n}\subseteq V, are the ones that interact with their neighbors synchronously and update their states according to a pre-defined state update rule, which is the consensus algorithm. Adversarial agents, denoted by VfVV_{f}\subset V, are the ones that can change their states arbitrarily. Moreover, an adversarial node can transmit different values to its different neighbors, which is referred to as the Byzantine model. The number of adversarial nodes in the neighborhood of a normal node uu is denoted by FuF_{u}. For a normal node uu, all nodes in its neighborhood are indistinguishable, that is, uu cannot identify which of its neighbors are adversarial.

Agent Imprecision – We consider that each agent has an imprecise information of its neighbor’s state. In other words, an agent uu having agent vv as a neighbor, acquires/observes an imprecise value of agent vv’s state, which could be due to perturbation as a result of improper calibration, hardware imprecision, or other measurement uncertainties. We denote this imprecise value of agents vv’s state by rvr_{v}, and associate a region of imprecision, BvdB_{v}\subset\mathbb{R}^{d} such that the true value of agent vv’s state, i.e., xvx_{v}, can be anywhere inside this BvB_{v}. An example of this imprecision model is a hypersphere with a center rvr_{v} and radius δ\delta. The true state value xvx_{v} can be anywhere inside this hypersphere of radius δ\delta (indicating the extent of imprecision). Another example of imprecision model is a hypercube, where imprecision in each coordinate is at most δ\delta, as shown in Figure 1.

Refer to caption
Figure 1: (a) An exact point xvx_{v} (no imprecision). (b) A disk imprecision region in 2\mathbb{R}^{2}. The observed point is rvr_{v}, which is the imprecise version of the exact point xvx_{v} that lies somewhere inside the disk. (c) A square imprecision region in 2\mathbb{R}^{2}.

Resilient Consensus Problem – In a network with both normal and adversarial agents, the aim of resilient vector consensus is to design a mechanism that ensures all normal agents update their states to eventually converge on a common state. This common state must lie within the convex hull of their initial states, denoted as X(0)={x1(0),x2(0),,xn(0)}X(0)=\{x_{1}(0),x_{2}(0),\cdots,x_{n}(0)\}. The mechanism must satisfy the following conditions:

  • Safety: At any time step tt, the state of any normal node vv must lie within Conv(X(0))\texttt{Conv}(X(0)).

  • Agreement: For every ϵ>0\epsilon>0, there exists a time tϵt_{\epsilon}, such that the states of any two normal agents uu and vv come within ϵ\epsilon of each other for all t>tϵt>t_{\epsilon}.

Next, we discuss the resilient consensus solutions with and without imprecision.

III Effect of Imprecision

In this section, first, we review a resilient distributed consensus algorithm guarantees convergence of normal nodes despite adversarial agents without considering any imprecision in agents’ states. Then, we consider imprecision and show that the existing resilient algorithms fail to achieve consensus and perform poorly under states’ imprecision.

III-A Resilient Consensus with No Imprecision

Several resilient consensus schemes have been proposed in the literature for the scalar and higher dimensional cases, e.g., [3, 4, 5, 6, 7, 8, 9, 10, 1, 11, 12, 13, 14, 15, 2]. The main approach, especially in higher dimensions d2d\geq 2, relies on the principle that in each round/step of the consensus algorithm, each normal node computes a point that lies in the convex hull of its normal neighbors’ state, and then updates its state by moving towards that point, which is sometimes referred to as the ‘safe point’. The computation of this safe point is a challenging endeavour, and various methods are employed. A useful way that results in superior resilience (in terms of the number of adversarial agents that can be allowed) is to obtain a safe point by computing a centerpoint of the agents’ states. A centerpoint is a generalization of median in higher dimensions, and is defined below.

Definition 3.1.

(Centerpoint) Given a set SS of NN points in d\mathbb{R}^{d}, a centerpoint pp is a point with the property that every closed halfspace of d\mathbb{R}^{d} containing pp must also contain at least Nd+1\frac{N}{d+1} points of SS.

The set of all centerpoints is referred to as the centerpoint region. Figure 6 illustrates an example. There are six points in 2\mathbb{R}^{2}, and any line passing through a centerpoint divides these six points into two regions, each containing at least two points, as in Figures 6(a) and (b). Figure 6(c) illustrates the centerpoint region for the given example.

Refer to caption
(a)
Refer to caption
(b)
Refer to caption
(c)
Figure 2: Illustration of centerpoint. In (a) and (b), centerpoint is denoted by ‘×\times’ and lines are passing through the centerpoint. The green shaded region in (c) is the centerpoint region.

The notion of centerpoint provides a complete characterization of the safe point. It is shown in [4] that a safe point for an agent vv is essentially a centerpoint of its neighbors’ states as long as the number of adversaries in the neighborhood of vv is bounded by Nvd+1\frac{N_{v}}{d+1}. Here, dd is the dimension of the state and NiN_{i} is the number of neighbors of vv. Moreover, a safe point may not exist if the number of adversaries is more than Nvd+1\frac{N_{v}}{d+1}. Thus, the centerpoint-based safe point computation is particularly useful.

Now, a resilient consensus algorithm based on centerpoints and considering no imprecision—agents observe their normal neighbors’ states exactly—can be designed as follows:

  • In each iteration tt, a normal agent uu gathers the state values of its neighbors in NuN_{u}, and computes a safe point su(t)s_{u}(t) by computing a centerpoint agents’ states.

  • Agent uu updates its states as follows:

    xu(t+1)=αu(t)su(t)+(1αu(t))xu(t),x_{u}(t+1)=\alpha_{u}(t)s_{u}(t)+(1-\alpha_{u}(t))x_{u}(t), (1)

    where αu(t)(0  1)\alpha_{u}(t)\in(0\;\;1) is a dynamically chosen parameter whose value depends on the application [3].

Analysis in [4] and [3] shows that the above scheme achieves resilient consensus as long as the number of adversaries in each normal agent uu is at most Nud+11\frac{N_{u}}{d+1}-1.

Next, we see how the above resilient consensus (and other safe point based) algorithms perform if we consider imprecise agents’ states.

III-B Resilient Solutions Do Not Work Under Imprecision

The fundamental premise of resilient consensus algorithms lies in computing safe points that are always inside the convex hull of normal agents’ true states. In the case of imprecision, however, the true states are unknown. Thus, computing a safe point is challenging, and the existing approaches prove inadequate. Note that, in general, true consensus is not possible when there is fixed imprecision in state values, however resilient consensus algorithms can fail to achieve approximate consensus as defined in Section I. For example, a centerpoint computed by a normal agent based on its neighbors’ observed states (due to imprecision) does not always lie in the convex hull of its normal neighbors’ true states and, therefore, is not a safe point. Figure 3 illustrates this situation.

In Figure 3(a), we have six agents that are in the neighborhood of a normal agent vv (including vv). One of the agents, uu, is an adversary. Note that vv remains oblivious to the identity of the adversarial agent within its neighborhood. Each agent has a state in 2\mathbb{R}^{2} accompanied by a region of imprecision, which we assume to be a square. The centerpoint region based on the observed states (represented by ‘\bullet’) is highlighted in green, whereas the convex hull of normal agents’ true states (indicated by ‘×\times’) is depicted as grey. Figure 3(b) reveals the challenge imprecision poses. The centerpoint region fails to remain entirely contained within the convex hull of the normal agents’ true states. Consequently, agent vv may select a centerpoint (indicated by ’\circ’) that does not qualify as a safe point. As a result, vv may update its state by moving in a direction outside the convex hull of normal agents’ true states, thus violating the safety condition of the resilient consensus.

Refer to caption
Figure 3: Centerpoint region based on the observed states (due to imprecision) is not contained entirely in the convex hull of normal agents’ initial states.

Figure 4 demonstrates examples of the run of the resilient consensus algorithm with and without the imprecision model. All six agents are pairwise adjacent, and there is one adversary. With no imprecision, all normal agents converge inside the convex hull of their initial states despite a single adversary, as shown by the state trajectories of agents in Figure 4(a). However, with imprecision (square regions), the resilient consensus algorithm fails as normal agents do not remain inside their initial states’ convex hull and continue moving farther away, as shown in Figure 4(b).

Thus, imprecision presents a significant obstacle to successfully operating resilient distributed algorithms. The primary hurdle arises from the difficulty in computing a safe point when dealing with imprecise observed states. Thus, it is imperative to explore new approaches to ensure the accurate computation of safe points, even in the presence of imprecision. We address this problem in the next section.

Refer to caption
(a)
Refer to caption
(b)
Figure 4: (a) Normal agents achieve resilient consensus with no imprecision. (b) Normal agents do not converge and move outside the convex hull of normal agents’ initial states due to imprecision.

IV Resilience in the Presence of Imprecision

In this section, we address the challenge of dealing with imprecision in resilient consensus algorithms and present our approach to mitigate its impact. Our main objective is to enable normal agents to compute safe points even when they encounter imprecise state values from their neighbors.

When a normal agent vv observes an imprecise state of its neighbor uu, the agent vv essentially observes an imprecision region associated with uu. This imprecision region contains the true state value of uu, and is termed as a potential region (as any value in this region can potentially be a true value of the agent). Consequently, agent uu effectively observes a collection of potential regions linked to its neighbors. By selecting one value (a point) from each potential region, we construct a potential configuration for the given set of potential regions. It is worth noting that the true values of the agents represent just one potential configuration among an infinite set. Our focus lies in identifying the largest region contained within the convex hull of any potential configuration from a given set of potential regions. We refer to this set as an invariant hull. Importantly, an invariant hull, associated with a given set of potential regions is a subset of the convex hull of the true states of agents. At a high level, an invariant hull, pertaining to a specific set of potential regions, is akin to the convex hull of a given set of points. Figure 5 illustrates these concepts. Figure 5(a) shows a set of potential regions (blue boxes) and the associated invariant hull. Figure 5(b) shows one potential configuration (set of points in potential regions indicated by ‘×\times’) and the associated convex hull of the potential configuration (grey shaded region). Note that the invariant hull is contained in the convex hull of the potential configuration shown. Similarly, if we choose any other potential configuration, the invariant hull will be contained in the convex hull of such a configuration.

Refer to caption
(a)
Refer to caption
(b)
Figure 5: (a) Invariant hull of a set of potential regions. (b) Invariant hull is a subset of the convex hull of an arbitrary potential configuration.

Next, we introduce some notations and formally define invariant hull.

xvx_{v} Actual/true state of agent vv;
rvr_{v} Observed state of agent vv;
BvB_{v} potential region of agent vv;
BVB_{V} Set of potential regions of agents in the set
V={v1,,vn}V=\{v_{1},\cdots,v_{n}\}.
Definition 4.1.

(Potential Configuration) For a given set of potential regions BV={B1,,Bn}B_{V}=\{B_{1},\cdots,B_{n}\}, a potential configuration is a set of points P(BV)={p1,,pn}P(B_{V})=\{p_{1},\cdots,p_{n}\} such that pvBvp_{v}\in B_{v} for each vv.

Now, we define the notion of invariant hull.

Definition 4.2.

(Invariant Hull) Consider a set of potential regions BVB_{V}. Let 𝒫(BV)\mathcal{P}(B_{V}) be the set of all possible potential configurations, and Conv(P) denotes the convex hull of a potential configuration P𝒫(BV)P\in\mathcal{P}(B_{V}). Then, the invariant hull of BVB_{V} is defined as,

IHull(BV)=P𝒫(BV)Conv(P).\texttt{IHull}(B_{V})=\bigcap\limits_{P\in\mathcal{P}(B_{V})}\texttt{Conv}(P). (2)

In simpler terms, for the invariant hull, we find all possible potential configurations of BVB_{V}, compute the convex hull of each such configuration, and finally compute the intersection of all such convex hulls. Consequently, the invariant hull is essentially a subset of the convex hull of any potential configuration of BVB_{V}, as Figure 5 illustrates. Also, the invariant hull is a convex set.

Next, we provide a geometric characterization of the invariant hull. Then, in Section IV-B, we present an efficient method to compute the invariant hull of BVB_{V}.

IV-A Characterization of Invariant Hull

First, we need to introduce notations to denote combinatorial families of sets.

  • Consider a set of potential regions BVB_{V}, then BVd+1B_{V}^{d+1} denotes a family of all (d+1)(d+1)-member subsets of BVB_{V} (i.e., subsets of BVB_{V} consisting of d+1d+1 potential regions). For example, consider V={v1,v2,v3,v4}V=\{v_{1},v_{2},v_{3},v_{4}\}, the corresponding BV={B1,B2,B3,B4}B_{V}=\{B_{1},B_{2},B_{3},B_{4}\}, and d=2d=2, then

    BV3=\displaystyle B_{V}^{3}= {{B1,B2,B3},{B1,B2,B4}{B1,B3,B4},\displaystyle\bm{\{}\;\{B_{1},B_{2},B_{3}\},\;\{B_{1},B_{2},B_{4}\}\;\{B_{1},B_{3},B_{4}\},
    {B2,B3,B4}}.\displaystyle\{B_{2},B_{3},B_{4}\}\;\bm{\}}.
  • Similarly, for QBVd+1Q\in B_{V}^{d+1}, the notation QdQ^{d} denotes the family of all dd-member subsets of QQ. For example, in the above example, if Q={B1,B2,B3}BV3Q=\{B_{1},B_{2},B_{3}\}\in B_{V}^{3}, then

    Q2={{B1,B2},{B1,B3},{B2,B3}}.Q^{2}=\bm{\{}\{B_{1},B_{2}\},\;\{B_{1},B_{3}\},\;\{B_{2},B_{3}\}\;\bm{\}}.

So, in general, a superscript on a set notation denotes the combinatorial family of the set.

The following lemma identifies the essential property for a point to be in the invariant hull of a set of potential regions.

Lemma 4.1.

Let QBVd+1={q1,..,qd+1}Q\in B_{V}^{d+1}=\{q_{1},..,q_{d+1}\} be a (d+1)(d+1)-member subset of potential regions. If IHull(Q)\texttt{IHull}(Q) is non-empty, then a point pIHull(Q)p\in\texttt{IHull}(Q) if and only if pp has the following property:

  1. fnum@PropertiesiProperty 1.Property 1.

    For every hyperplane hh passing through pp, at least one potential region qiQq_{i}\subset Q is contained in each of the associated halfspaces of hh.

    Proof.

    We prove the contrapositive. For a point pp, if pIHull(Q)p\notin\texttt{IHull}(Q), then by definition there exists a particular potential configuration σ𝒫(Q)\sigma\in\mathcal{P}(Q) such that pp and Conv(σ)\texttt{Conv}(\sigma) are disjoint. Then let hh denote a separating hyperplane, containing pp for which all points of σ\sigma are contained in hinnerh^{inner}, where hinnerh^{inner} is used to denote any halfspace of hh, with the opposite denoted houterh^{outer}. Since each of the d+1d+1 points of σ\sigma are selected from the d+1d+1 potential regions of QQ, it follows that every potential region of QQ extends into hinnerh^{inner}, and therefore no potential region is a subset of houterh^{outer}. Thus, if pIHull(Q)p\notin\texttt{IHull}(Q), then pp does not have Property 1.

    Similarly, if a point pp does not possess Property 1, then there is a hyperplane hh^{\prime} passing through pp such that no potential region of QQ is a subset of houterh^{outer}. Then it is possible to select σ𝒫(Q)\sigma\in\mathcal{P}(Q) such that σhinner\sigma\subset h^{inner}. Since phinner=p\cap h^{inner}=\emptyset, pp and σ\sigma are disjoint, and thus pIHull(Q)p\notin\texttt{IHull}(Q).  

    Corollary 4.2.

    For (d+1)(d+1)-region set QQ, it follows from Lemma 4.1 that IHull(Q)=Conv(Q)Conv(qiQdqi)\texttt{IHull}(Q)=\texttt{Conv}(Q)\setminus\texttt{Conv}(\bigcup\limits_{q_{i}\in Q^{d}}q_{i}). Here we have used the set notation of “ABA\setminus B” to refer to the set of all elements of AA that are not elements of BB. This can be seen by observing that no point with Property 1 may exist in the convex hull of a dd-member subset of QQ. Any hyperplane through pp and each of the dd members may only contain the remaining region of QQ in one or the other of its halfspaces, leaving one halfspace with no potential region as a subset.

    We now present an auxiliary lemma that will be used in proving Theorem 4.5 characterizing the invariant hulls.

    Lemma 4.3.

    If IHull(BV)\texttt{IHull}(B_{V}) is a convex polytope, and if point pp is a vertex of IHull(BV)\texttt{IHull}(B_{V}), then for all dd-region subsets fBVdf\in B_{V}^{d}, pint(Conv(f))p\notin int(\texttt{Conv}(f)), where int(Conv(f))int(\texttt{Conv}(f)) refers to the interior of Conv(f)\texttt{Conv}(f), or Conv(f)\texttt{Conv}(f) without its boundary points.

    Proof.

    Let fintf_{int} denote int(Conv(f))int(\texttt{Conv}(f)) in the following argument. Suppose ff is a set of dd potential regions of BVB_{V} such that pfintp\in f_{int} and pp is a vertex of IHull(BV)\texttt{IHull}(B_{V}). There are two possibilities: 1) fintIHull(BV)f_{int}\subset\texttt{IHull}(B_{V}), or 2) fintIHull(BV)f_{int}\not\subset\texttt{IHull}(B_{V}). In the first case, pint(IHull(BV))p\in int(\texttt{IHull}(B_{V})) and therefore pp is not a vertex. In the second case, since fintf_{int} is open, a dd-point configuration of fintf_{int} can always be found that includes p2pp_{2}\neq p with p2fintIHull(BV)p_{2}\in f_{int}\setminus\texttt{IHull}(B_{V}) such that Conv(IHull(BV)p)Conv(IHull(BV)p2)\texttt{Conv}(\texttt{IHull}(B_{V})\cup p)\neq\texttt{Conv}(\texttt{IHull}(B_{V})\cup p_{2}). But since IHull(BV)=Conv(IHull(BV))\texttt{IHull}(B_{V})=\texttt{Conv}(\texttt{IHull}(B_{V})) is invariant for any potential configuration by its definition, this is a contradiction, and therefore the assertion of Lemma 4.3 is true.  

    We now show that the the invariant convex hull of nn potential regions is the convex hull of the union of invariant hulls of each of the (nd+1){n}\choose{d+1} subsets of BVd+1B_{V}^{d+1}. First, we state a generalization of a theorem of Caratheodory to sets in d\mathbb{R}^{d}, that will be used in our proof.

    Theorem 4.4.

    [26] For a family of sets K𝕕K\in\mathbb{R^{d}}, with |K|d+1|K|\geq d+1, kiKd+1Conv(ki)=Conv(K)\bigcup\limits_{k_{i}\in K^{d+1}}\texttt{Conv}(k_{i})=\texttt{Conv}(K).

    Note: Here and throughout the paper, if KK is a family of point sets, then Conv(K)=Conv(kKK)\texttt{Conv}(K)=\texttt{Conv}(\bigcup\limits_{k\in K}K).
    In other words the convex hull of every point contained in the family of sets is equivalent to the union of the convex hulls of all of its (d+1)(d+1)-member subsets. Now, we state one of the main results of this section.

    Theorem 4.5.

    Let BV={B1,,Bn}B_{V}=\{B_{1},\cdots,B_{n}\} be a collection of nn potential regions of d\mathbb{R}^{d} and BVd+1B_{V}^{d+1} denote the family of (d+1)(d+1)-member subsets of BVB_{V}. Then,

    IHull(BV)=Conv(QBVd+1IHull(Q)).\texttt{IHull}(B_{V})=\texttt{Conv}(\bigcup\limits_{Q\in B_{V}^{d+1}}\texttt{IHull}(Q)). (3)
    Proof.

    We will show that all vertices of IHull(BV)\texttt{IHull}(B_{V}) are contained in QBVd+1IHull(Q)\bigcup\limits_{Q\in B_{V}^{d+1}}\texttt{IHull}(Q). If pp is a vertex of IHull(BV)\texttt{IHull}(B_{V}), clearly pConv(BV)p\in\texttt{Conv}(B_{V}). By Lemma 4.3, pp cannot be contained in the interior of the convex hull of any dd-member subset of BV)B_{V}). By Theorem 4.4, the convex hull of BVB_{V} in d\mathbb{R}^{d} is equal to the union of the convex hulls of its (d+1)(d+1)-member subsets. From Lemma 4.1 and Lemma 4.3, it follows that QBVd+1IHull(Q)\bigcup\limits_{Q\in B_{V}^{d+1}}\texttt{IHull}(Q) precisely contains all points that are in the interior of BVB_{V} but not interior to the convex hull of any dd-member subset. This implies that pQBVd+1IHull(Q)p\in\bigcup\limits_{Q\in B_{V}^{d+1}}\texttt{IHull}(Q). Furthermore for any QQ, every point xIHull(Q)x\in\texttt{IHull}(Q) is trivially a point in IHull(BV)\texttt{IHull}(B_{V}), since QBVQ\subset B_{V} and any point configuration of BVB_{V} has a subset of points from the potential regions of QQ. Since QBVd+1IHull(Q)\bigcup\limits_{Q\in B_{V}^{d+1}}\texttt{IHull}(Q) contains all vertices of IHull(BV)\texttt{IHull}(B_{V}) and contributes no points exterior to IHull(BV)\texttt{IHull}(B_{V}), it follows that IHull(BV)=Conv(QBVd+1IHull(Q))\texttt{IHull}(B_{V})=\texttt{Conv}(\bigcup\limits_{Q\in B_{V}^{d+1}}\texttt{IHull}(Q)).  

    IV-B Computing the Invariant Hull

    We now outline a procedure for computing the invariant hull of BVB_{V}, given that |BV|>d+1|B_{V}|>d+1. The procedure involves computing the equation of a tangent hyperplane equation to dd potential regions of d\mathbb{R}^{d}. In the case that potential regions are polygons in 2\mathbb{R}^{2}, linear-time algorithms have been developed to find outer tangent lines, that is the tangent lines that have all participating polygons on one side  [27].
    Let Q={q1,q2,,qd+1}BVd+1Q=\{q_{1},q_{2},\cdots,q_{d+1}\}\in B_{V}^{d+1}. As stated in Corollary 4.2, IHull(Q)\texttt{IHull}(Q)is equivalent to Conv(Q)Conv(Qd)\texttt{Conv}(Q)\setminus\texttt{Conv}(Q^{d}). A simple approach is to compute the vertices of IHull(Q)\texttt{IHull}(Q):

    1. 1.

      Select qiQq_{i}\in Q.

    2. 2.

      For each j=1,2,,d+1j=1,2,\cdots,d+1, and each fjQdf_{j}\in Q^{d} containing qiq_{i}, compute hyperplane hjh_{j} tangent to the dd members of fjf_{j} such that fjhouterf_{j}\subset h^{outer} and QfhinnerQ\setminus f\subset h^{inner}.

    3. 3.

      Compute point of intersection:{xd:h1x=h2x==hd+1x}\{x\in\mathbb{R}^{d}:h_{1}\cdot x=h_{2}\cdot x=\cdots=h_{d+1}\cdot x\}. Label xx as wiw_{i}.

    4. 4.

      Repeat steps 1-3 for all remaining qiQq_{i}\in Q.

    5. 5.

      IHull(Q)=Conv(qiQwi)\texttt{IHull}(Q)=\texttt{Conv}(\bigcup\limits_{\forall q_{i}\in Q}w_{i}).

    After repeating steps 1-5 for all QBVd+1Q\in B_{V}^{d+1}, the invariant hull of BVB_{V} is computed with any convex hull routine as:

    IHull(BV)=Conv(QBVd+1IHull(Q)),\texttt{IHull}(B_{V})=\texttt{Conv}(\bigcup\limits_{Q\in B_{V}^{d+1}}\texttt{IHull}(Q)),

    according to Theorem IV-B.

    Refer to caption
    (a)
    Refer to caption
    (b)
    Refer to caption
    (c)
    Refer to caption
    (d)
    Refer to caption
    (e)
    Refer to caption
    (f)
    Refer to caption
    (g)
    Figure 6: (a) Centerpoint region based on the intersection of the invariant hulls of subsets of potential regions. In each of (b)–(g), the green shaded region is contained entirely in the invariant hull of the five potential regions.

    V Resilient Consensus through Centerpoint using Invariant Hulls of Potential Regions

    In this section, we present a way for a normal agent vv to compute a safe point despite access to only imprecise states of neighbors. Moreover, the proposed approach allows FF number of adversaries in the neighborhood of vv, where FNvd+11F\leq\frac{N_{v}}{d+1}-1. The core of our method relies on the intersection of the invariant hulls of potential regions.

    First, consider the case with no imprecision, i.e., normal agents observe true states of their neighbors (as discussed in [4, 25]). In this ideal situation, a safe point for a normal agent vv is effectively the centerpoint of its neighbors’ states, provided the number of adversarial agents in the neighborhood of vv is FNvd+11F\leq\frac{N_{v}}{d+1}-1. This proposition is rooted in geometric principles. Specifically, a centerpoint of a given set of NvN_{v} points in d\mathbb{R}^{d} lies within the convex hull of any subset comprising more than dd+1Nv\frac{d}{d+1}N_{v} of those points [28, 29, 30]. To put it practically, if we select an arbitrary subset of neighbors of vv—comprising more than dd+1Nv\frac{d}{d+1}N_{v} neighbors—and compute the convex hull of their states, a centerpoint is guaranteed to lie within this hull. Since one such choice of more than dd+1Nv\frac{d}{d+1}N_{v} neighbors of a normal agent vv consists of only normal neighbors of vv, a centerpoint of the states of agent vv’s neighbors also lies within the convex hull of only the normal neighbors’ states.

    In cases where the observed states are imprecise, the approach to determining a safe point for a normal agent vv must be modified. As elaborated in Section III-B, the inherent imprecision precludes the use of convex hulls calculated from observed states. Instead of knowing a true state of the neighbor, vv only knows the potential region of the neighbor (containing the true state). So, instead of computing convex hulls of subsets of neighbors’ observed states, a normal agent computes the invariant hulls of subsets of potential regions of neighbors. Assume that a normal agent vv has NvN_{v} neighbors, of which at most Nvd+11\frac{N_{v}}{d+1}-1 are adversarial. For any subset of neighbors containing more than dd+1Nv\frac{d}{d+1}{N_{v}} neighbors, agent vv computes the invariant hull of the potential regions of the corresponding neighbors, and then computes the intersection of all such invariant hulls. This resulting intersection serves as a modified ‘centerpoint region’, constructed from the invariant hulls of potential regions. Importantly, every point in this new centerpoint region is guaranteed to lie within the convex hull of the true states of agent vv’s normal neighbors, and is thus a safe point (despite imprecise observed states). We illustrate this through an example below.

    Example: Consider a set of six potential regions in a plane, each corresponding to an agent. Note that the true states of these agents are ‘hidden’ within these potential regions. Among these six, one potential region belongs to an adversarial agent, though we don’t know which one. The green-shaded region in Figure 6(a) is the centerpoint region constructed using the intersection of invariant hulls of subsets of potential regions. To see this, consider a subset of five potential regions—calculated as dd+1N+1=5\frac{d}{d+1}N+1=5—and determine their invariant hull. As demonstrated in Figures 6(b)–6(g), the green centerpoint region is consistently enclosed within the invariant hull, regardless of which five potential regions are chosen. Notably, one of these choices in Figures 6(b)–6(g) includes the actual adversary. In this case, the computed invariant hull—by definition—remains a subset of the convex hull formed by the true states of normal agents. Therefore, the points in the green-shaded centerpoint region, which is contained entirely in the invariant hull, are assured to be safe points.

    Next, we outline the steps of the state update for each normal agent. An essential step is the computation of a safe point using the idea of invariant hulls, as described previously. The steps of the algorithm, which we call centerpoint of invariant hulls (CPIH) method, are as follows:

    For each node vVnv\in V_{n}.

    1. 1.

      At time tt compute k=dNvd+1+1k=\frac{dN_{v}}{d+1}+1.

    2. 2.

      For CBVkC\in B_{V}^{k}, compute IHull(C)\texttt{IHull}(C). ( Compute invariant hull of each kk-tuple of BVB_{V}).

    3. 3.

      If CBVkIHull(C)=\bigcap\limits_{C\in B_{V}^{k}}\texttt{IHull}(C)=\emptyset, set xv(t+1)=xv(t)x_{v}(t+1)=x_{v}(t). Otherwise, proceed to step 4. (Do nothing at time tt if safe region does not exist).

    4. 4.

      Select safe point pv(t)CBVkIHull(C)p_{v}(t)\in\bigcap\limits_{C\in B_{V}^{k}}\texttt{IHull}(C).

    5. 5.

      xv(t+1)=αv(t)pv(t)+(1αv(t))xv(t)x_{v}(t+1)=\alpha_{v}(t)p_{v}(t)+(1-\alpha_{v}(t))x_{v}(t).

    The value of αv(t)\alpha_{v}(t) is a dynamic weight that may be chosen in range [0,1][0,1] according to the application.

    The CPIH algorithm identifies a region that is a generalization of the centerpoint region in that the property of a CPIH safe point has identical properties to that of of a centerpoint with compact sets replacing the role of points. Thus each halfspace of a hyperplane that intersects a CPIH safe point contains at least Nd+1\lfloor\frac{N}{d+1}\rfloor compact sets (potential regions of BVB_{V}). As such, every dNd+1+1\frac{dN}{d+1}+1 potential regions contain a CPIH safe point.

    V-A Simulations and Discussion

    Refer to caption
    (a) δ=0.5\delta=0.5
    Refer to caption
    (b) δ=1\delta=1
    Refer to caption
    (c) δ=1.5\delta=1.5
    Figure 7: Implementation of CPIH algorithm. Normal agents remain inside the convex hull of their initial states and converge to a degree that depends on the level of state imprecision, as quantified by the parameter δ\delta.

    In order to verify that the CPIH Algorithm succeeds where the ordinary centerpoint-based consensus algorithm fails (as illustrated in Figure 4), we executed a series of simulations using the above algorithm. For simplicity, potential regions were chosen to be a square of width δ\delta centered around each node, and GG was chosen to be a complete graph. At each time step, agents received a uniformly random state estimate within the potential regions of each of its neighbors. For illustrative purposes, we chose a small range of values for δ\delta. For each value of δ\delta, a simulation was run for 50005000 time steps. Figure 7 shows the results.

    As may be inferred from Step 3 of the CPIH algorithm, this procedure will not, in general, result in uniform convergence of agents states. Instead, nodes will “cluster” into a region whose volume depends on the magnitude of δ\delta. While this may appear to be an unsatisfactory result, it nonetheless assures that nodes will remain within their initial convex hull, whereas this is not the case for the resilient consensus algorithms that do not account for imprecision. As a result, CPIH algorithm presents a tradeoff between network safety and convergence precision, which is of significance on its own, especially when safety is of high priority in a setting with imprecision. In real world situations, imprecision typically decreases with proximity. Future developments of CPIH could achieve a convergent consensus under such an imprecision model.

    VI Conclusion

    In this paper, we have demonstrated that traditional resilient consensus algorithms can fail when they do not account for state imprecision. To address this, we proposed an uncertainty-aware geometric solution ensuring resilience against adversaries and state imprecision. Specifically, we extended the centerpoint-based resilient consensus algorithm by introducing the concept of an ’invariant hull,’ which we call the CPIH algorithm. Through illustrative simulations, we have showcased the effectiveness of our algorithm under varying levels of uncertainty. In the future, we aim to explore the resilience-accuracy trade-off further by determining the conditions under which the invariant hull of imprecise regions becomes empty.

    References

    • [1] H. Ishii, Y. Wang, and S. Feng, “An overview on multi-agent consensus under adversarial attacks,” Annual Reviews in Control, vol. 53, pp. 252–272, 2022.
    • [2] M. Pirani, A. Mitra, and S. Sundaram, “Graph-theoretic approaches for analyzing the resilience of distributed control systems: A tutorial and survey,” Automatica, vol. 157, p. 111264, 2023.
    • [3] H. Park and S. A. Hutchinson, “Fault-tolerant rendezvous of multirobot systems,” IEEE Transactions on Robotics, vol. 33, no. 3, pp. 565–582, 2017.
    • [4] W. Abbas, M. Shabbir, J. Li, and X. Koutsoukos, “Resilient distributed vector consensus using centerpoint,” Automatica, vol. 136, p. 110046, 2022.
    • [5] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, “Resilient asymptotic consensus in robust networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 4, pp. 766–781, 2013.
    • [6] L. Su and N. Vaidya, “Multi-agent optimization in the presence of byzantine adversaries: Fundamental limits,” in American Control Conference (ACC), 2016, pp. 7183–7188.
    • [7] H. Mendes, M. Herlihy, N. Vaidya, and V. K. Garg, “Multidimensional agreement in byzantine systems,” Distributed Computing, vol. 28, no. 6, pp. 423–441, 2015.
    • [8] J. Yan, X. Li, Y. Mo, and C. Wen, “Resilient multi-dimensional consensus in adversarial environment,” Automatica, vol. 145, p. 110530, 2022.
    • [9] J. Yan, Y. Mo, X. Li, and C. Wen, “A “safe kernel” approach for resilient multi-dimensional consensus,” IFAC-PapersOnLine, vol. 53, no. 2, pp. 2507–2512, 2020.
    • [10] Y. Wang, H. Ishii, F. Bonnet, and X. Défago, “Resilient consensus for multi-agent systems under adversarial spreading processes,” IEEE Transactions on Network Science and Engineering, vol. 9, no. 5, pp. 3316–3331, 2022.
    • [11] J. Li, W. Abbas, and X. Koutsoukos, “Resilient distributed diffusion in networks with adversaries,” IEEE Transactions on Signal and Information Processing over Networks, vol. 6, pp. 1–17, 2019.
    • [12] Z. Yang and W. U. Bajwa, “Byrdie: Byzantine-resilient distributed coordinate descent for decentralized learning,” IEEE Transactions on Signal and Information Processing over Networks, vol. 5, no. 4, pp. 611–627, 2019.
    • [13] L. Su and N. H. Vaidya, “Byzantine-resilient multiagent optimization,” IEEE Transactions on Automatic Control, vol. 66, no. 5, pp. 2227–2233, 2020.
    • [14] J. Zhu, Y. Lin, A. Velasquez, and J. Liu, “Resilient distributed optimization,” in American Control Conference (ACC), 2023, pp. 1307–1312.
    • [15] K. Kuwaranancharoen, L. Xin, and S. Sundaram, “Byzantine-resilient distributed optimization of multi-dimensional functions,” in American Control Conference (ACC), 2020, pp. 4399–4404.
    • [16] J. Usevitch and D. Panagou, “Resilient leader-follower consensus to arbitrary reference values in time-varying graphs,” IEEE Transactions on Automatic Control, vol. 65, no. 4, pp. 1755–1762, 2019.
    • [17] M. Safi, S. M. Dibaji, and M. Pirani, “Resilient coordinated movement of connected autonomous vehicles,” European Journal of Control, vol. 64, p. 100613, 2022.
    • [18] S. M. Dibaji and H. Ishii, “Resilient consensus of second-order agent networks: Asynchronous update rules with delays,” Automatica, vol. 81, pp. 123–132, 2017.
    • [19] D. Jayasimha, “Fault tolerance in a multisensor environment,” in Proceedings of IEEE Symposium on Reliable Distributed Systems, 1994, pp. 2–11.
    • [20] E. F. Nakamura, A. A. Loureiro, and A. C. Frery, “Information fusion for wireless sensor networks: Methods, models, and classifications,” ACM Computing Surveys, vol. 39, no. 3, pp. 9–es, 2007.
    • [21] M. Löffler, Data imprecision in computational geometry.   Utrecht Univesity, 2009.
    • [22] J. Park, R. Ivanov, J. Weimer, M. Pajic, S. H. Son, and I. Lee, “Security of cyber-physical systems in the presence of transient sensor faults,” ACM Transactions on Cyber-Physical Systems, vol. 1, no. 3, pp. 1–23, 2017.
    • [23] G. Frehse, A. Hamann, S. Quinton, and M. Woehrle, “Formal analysis of timing effects on closed-loop properties of control software,” in IEEE Real-Time Systems Symposium, 2014, pp. 53–62.
    • [24] T. Nagai, S. Yasutome, and N. Tokura, “Convex hull problem with imprecise input,” in Discrete and Computational Geometry.   Berlin, Heidelberg: Springer Berlin Heidelberg, 2000, pp. 207–219.
    • [25] J. Li, W. Abbas, M. Shabbir, and X. Koutsoukos, “Byzantine resilient distributed learning in multirobot systems,” IEEE Transactions on Robotics, vol. 38, no. 6, pp. 3550–3563, 2022.
    • [26] I. Bárány, “A generalization of carathéodory’s theorem,” Discrete Mathematics, vol. 40, no. 2, pp. 141–152, 1982.
    • [27] M. Abrahamsen and B. Walczak, “Common tangents of two disjoint polygons in linear time and constant workspace,” ACM Trans. Algorithms, vol. 15, no. 1, dec 2018.
    • [28] J. Pach and P. K. Agarwal, Combinatorial Geometry.   John Wiley & Sons, 2011.
    • [29] J. Matousek, Lectures on Discrete Geometry.   Springer Science & Business Media, 2013, vol. 212.
    • [30] S. Ray and N. Mustafa, “An optimal generalization of the centerpoint theorem, and its extensions,” in Annual Symposium on Computational Geometry, 2007, pp. 138–141.