Distributed Estimation over Directed Graphs Resilient to Sensor Spoofing
Abstract
This paper addresses the problem of distributed estimation of an unknown dynamic parameter by a multi-agent system over a directed communication network in the presence of an adversarial attack on the agents’ sensors. The mode of attack of the adversaries is to corrupt the sensor measurements of some of the agents, while the communication and information processing capabilities of those agents remain unaffected. To ensure that all the agents, both normal as well as those under attack, are able to correctly estimate the parameter value, the Resilient Estimation through Weight Balancing (REWB) algorithm is introduced. The only condition required for the REWB algorithm to guarantee resilient estimation is that at any given point in time, less than half of the total number of agents are under attack. The paper discusses the development of the REWB algorithm using the concepts of weight balancing of directed graphs, and the consensus+innovations approach for linear estimation. Numerical simulations are presented to illustrate the performance of our algorithm over directed graphs under different conditions of adversarial attacks.
Directed Graphs, Distributed Estimation, Resilient Consensus, Weight-balancing
1 Introduction
The advancement in wireless sensor networks (WSNs) has diversified their areas of application to agriculture [1], healthcare [2], and renewable energy [3] to name a few. As a result the scale and complexity of the networks is also on the rise [4], [5]. This necessitates the use of more distributed approaches to signal processing over WSNs, and distributed estimation is a key aspect of it. Distributed estimation is about determining a parameter of interest locally at each sensor node with cooperation between neighboring nodes [6]. The increase in areas of application of WSNs has in turn made them more vulnerable to adversarial attacks [7]. A major mode of such attacks are aimed to manipulate the normal functioning of the sensor nodes and thus disrupt the overall signal processing capability of the WSNs. Some commonly used threat models are Byzantine [8], malicious [9], sensor spoofing [10], etc. Hence the distributed estimation algorithms need to be resilient to adversarial attacks in order to be more effective.
Different consensus algorithms resilient to adversarial attacks appear in the literature such as Mean-Subsequence-Reduced algorithm [11] and Median Consensus Algorithm [12]. These algorithms ensure consensus only for the normal agents, while the agents under attack may have arbitrary values. We are interested in a resilient distributed estimation algorithm, that will ensure that both the normal agents and the agents under attack can reach consensus over the true value of the parameter to be estimated. The consensus+innovations approach illustrated in [13] uses the consensus framework to design resilient algorithms for linear estimation. The Constant weight Saturated Innovation Update (CSIU) algorithm [14] is one such resilient estimation algorithm which ensures that all the agents are able to estimate the parameter of interest, provided less than three-tenth of the total agents are under attack. This was further improved in [15], where the Saturated Innovation Update (SIU) algorithm ensures all the agents’ estimate converge to the desired parameter value provided the adversaries attack less than half of the total agents. Also in [14], a new term resilience index was used to provide a bound for the fraction of sensor nodes under attack.
Both the CSIU and SIU algorithms are designed on undirected graphs representing bidirectional communication links between the agents. In many practical scenarios, the power levels at which sensor nodes broadcast information or, their interference and noise patterns, differ from node to node [16], [17]. The communication between nodes in such cases is unidirectional which is aptly represented by a directed graph. Here we consider a time-invariant network topology with unidirectional communication links between agents. To the best of our knowledge, an extension of the consensus+innovations approach to directed graphs is non-existent in the literature, except for the recent work [18]. However, we observed that for the algorithm presented in [18], choosing appropriate parameters is not an easy task. In contrast, we propose an algorithm which guarantees convergence over a given range of parameter values. Also, unlike [18], where the set of adversarial agents and the unknown parameter are fixed, our proposed algorithm works even when the set of agents under attack and the unknown parameter changes with time.
The model of attack by the adversaries is designed on the idea of sensor spoofing [10] where the sensor readings of the agents under attack are corrupted through data falsification or false data injection. Note that such an attack on the agents is restricted to their sensors. In particular, the agents under attack can perform computations and communicate with their neighbours. Also the agents under attack by the adversaries are not known a-priori by the normal agents. Moreover we allow for a more general scenario where the adversaries may attack different agents over time. We present an algorithm, Resilient Estimation through Weight Balancing (REWB), which ensures that all agents asymptotically converge to the value to be estimated provided less than half of the total number of agents are affected by adversaries. The agents operate in a distributed manner using only the local information available to them. The main contribution of this paper is the proposed REWB algorithm which ensures that over a directed communication network, both the normal agents as well as the agents under attack asymptotically estimate the actual value of the unknown parameter in the presence of a sensor spoofing attack by the adversaries.
Technically, the contributions we make in this paper can be summarized as follows:
-
•
We propose a novel REWB algorithm that estimates an unknown time-varying parameter with a decaying bound on its variations in the presence of sensor spoofing attacks by simultaneously balancing the unbalanced directed communication network (Algorithm 1). The REWB algorithm brings together the weight-balancing and consensus+innovation approaches over relative time-scales to achieve this.
-
•
We show that the proposed REWB algorithm ensures convergence of each agent, both normal as well as those under attack, to the actual value of the unknown parameter provided less than half of the total agents are under attack at any given time (Theorem 1).
-
•
As an intermediate result, we provide an explicit rate of convergence of the Laplacian of an unbalanced weighted digraph to the Laplacian of the associated balanced digraph (Lemma 1).
Notations. denotes the set of real numbers, and represents the -dimensional Euclidean space. For any set , the cardinality of the set is denoted by . and , of appropriate dimensions. For a real-valued vector , denotes the transpose of the vector, denotes its -norm and denotes its -norm. Similarly for a real-valued matrix , denotes the transpose of the matrix, and denotes its spectral norm. Among the eigenvalues of , represents the second lowest eigenvalue of in magnitude, while denotes its largest eigenvalue in magnitude. For a real-valued vector , diag represents a diagonal matrix with as the main diagonal.
The rest of the paper is organised as follows. Section-2 discusses the details of the problem such as the inter-agent communication network, the threat model of the adversaries and the concept of resilience index. Section-3 starts with the development of the REWB algorithm using the weight-balancing approach, followed by the details of the algorithm, finally leading to our main result. Some numerical simulations are presented in Section-4 to validate the performance of the REWB algorithm. Finally the conclusions are presented in Section-5.
2 Problem Formulation
2.1 System Model
Consider a system of agents where each agent is equipped with sensing, computing and communication capabilities - it can record measurements using its sensor, can perform computations using its own data and the information received from its neighbouring agents, and can also share its data with the neighbours. The aim of each agent is to estimate an unknown parameter in a distributed manner even while some agents’ sensor measurements are corrupted by adversaries. The precise model of sensor measurement corruption will be described shortly.
The communication among the agents is modelled as a directed graph , where the vertex set represents the set of agents. The set of directed edges represents the information exchange links between the agents, where if agent can send information to agent . A directed path from to is the sequence of directed edges . The set of in-neighbours of agent is defined as , and the corresponding in-degree is denoted as . The set of out-neighbours of agent- is defined as , and the corresponding out-degree is denoted as . A corresponding diagonal matrix is defined as . The adjacency matrix, is a square matrix of size defined as where if , and otherwise. The Laplacian, is defined as .
Definition 1 (Strongly Connected Graph )
A directed graph is said to be strongly connected if there exists a directed path between every pair of vertices in the graph.
The flow of information is such that each agent is able to receive information from its in-neighbours , and send its own data to its out-neighbours . So the information about any agent can be received by another agent either directly if a directed communication link exists between them, or indirectly via intermediate agent(s) provided the corresponding directed path exists. In order to ensure that the information about every agent reaches every other agent , we introduce the following assumption.
Assumption 1
The directed graph is Strongly Connected.
Now we proceed to model the effect of the adversaries, which attack the agents with a motive to disrupt the estimation process thus trying to prevent them from correctly estimating the value . At every time-step , the agents which are under attack by the adversaries are termed as the the set of Bad (or affected) agents, denoted as . The remaining agents form the set of Good (or normal) agents, denoted as . The set of bad agents can vary with time, and are also not known a-priori to the set of good agents. So for each , the set is partitioned into and . Thus . The attack model of the adversary is sensor spoofing attacks. Here the adversary introduces spurious signals into the sensor readings non-invasively [10]. The corruption of sensor readings remains undetected by commonly used filters [19]. So even after nullifying the noise in sensor readings, the effect of the spoofing attack would still percolate into the measurements available to the agent. The agents use these sensor measurements to estimate the unknown parameter. In order to specifically highlight the effect of the adversary, we consider the sensor measurements available to the agents to be free of the effect of any measurement noise. The sensor measurements available to the agents under attack are arbitrary values manipulated by the adversary. Accordingly, we model the sensor measurements recorded by the agents as
(1) |
where is a vector of arbitrary values reflecting the effect of the adversaries. In the above model there is no boundedness assumption or stochastic approximation considered for . This preserves the arbitrary nature of the data being manipulated by the adversary. So, if , then , and the estimation problem would be trivial as the sensor measurements directly provide the correct value of the parameter. Here we are interested in the non-trivial case where there exists some such that . This means some of the sensor measurements would be corrupted as . So each agent needs to perform some additional computations in order to estimate the true value of in a distributed manner. It should be noted that under this threat model, the bad agents are still able to perform their computations as per design as well as communicate with their neighbours.
The unknown time-varying parameter that is to be estimated is some physical quantity which can be measured by a sensor. So we can safely assume its Euclidean norm to be bounded. Moreover, we also assume that the variations in the unknown parameter asymptotically decay with time.
Assumption 2
The Euclidean norm of the unknown vector quantity that is to be estimated lies within an upper bound known to each agent :
(2) |
Also, the Euclidean norm of the variation in the unknown vector quantity has a decaying bound :
(3) |
As a consequence of (3), we have the time varying parameter eventually converging to some constant value . Specifically, .
Remark : The above assumption focuses on a particular subset of dynamic parameter estimation. Note that this is a modest extension from the static parameter estimation case.
Now to estimate in a distributed manner, for all each agent maintains its own estimate of denoted by , also referred to as the state of agent . In order to update the state, each agent follows the discrete-time single integrator dynamics :
(4) |
So at every time step, each agent performs the following steps in the given sequence :
-
-
broadcasts its own estimate to its out-neighbours
-
-
receives the estimates from its corresponding in-neighbours : ,
-
-
collects sensor measurement of :
- -
In a distributed estimation problem with as the state of agent and as the parameter of interest, the aim is to achieve
(5) |
For the resilient estimation problem considered here, the additional challenge is to achieve (5) even in the presence of adversaries attacking some of the agents. In order to quantify how resilient an algorithm is to the adversarial attacks, we use a measure called the Resilience Index [15]. The resilience index is an upper bound on the fraction of agents which are under attack by the adversaries at any time-step . So, for all , . Thus would indicate the trivial case where bad agents are totally absent. Having allows for the possibility of all the agents being under attack at any time-step .
3 Results
The aim of each agent in the multi-agent system under consideration, is to estimate an unknown static parameter in a distributed manner, as given in (5). The technique used for the distributed estimation of is based on the consensus+innovations approach [13]. Based on this approach we proceed to design an algorithm such that the desired objective, , is achieved through fulfilling the following two smaller goals simultaneously as :
-
:
the state of each agent, , approaches the average of the states of all agents,
-
:
approaches the unknown value to be estimated, .
3.1 Weight Balancing
In a Multi-Agent System (MAS), the communication network is usually modelled as a graph, with the nodes of the graph representing the agents and the edges between the nodes representing the corresponding communication links between the agents. When the flow of information between agents is bi-directional, the model used is an undirected graph. On the other hand, when the flow of information between agents is unidirectional, a directed graph (or digraph) is required to model it. The directed edges of the digraph represent the unidirectional communication links while preserving their direction of information flow. A weighted graph has each of its edges assigned a real or integer value, referred to as edge weights. Unless specifically mentioned, the edge weights are taken as unity.
In case of an undirected graph, the sum of edge weights of the incoming edges is equal to the sum of the edge weights of the outgoing ones. But this balance in edge weights does not necessarily hold true in the case of a digraph. To overcome this imbalance, we need to find a suitable weight vector , where each outgoing edge of agent is assigned the weight . These weights are said to balance the graph if . The notion of a balanced graph is formally defined below.
Definition 2 (Balanced Graph)
A graph of nodes is said to be balanced if there exists such that
(6) |
where
The weights which balance a given digraph are called the balancing weights of the corresponding digraph [17]. Note that an undirected graph is inherently balanced with as the vector of balancing weights. On the other hand, for a strongly connected digraph the vector of balancing weights is non-trivial. Note that this vector of balancing weights is also unique to the given digraph, up to scaling [17]. For example, consider the strongly connected digraph shown in Fig.1. For this digraph the vector of balancing weights is , which is non-trivial and unique up to scaling.
The SIU algorithm proposed in [15] for resilient estimation does not work in general for directed graphs. This is later illustrated through a numerical example in Fig.5 in Section 4. We propose to use the idea of balancing weights described above to achieve resilient estimation over digraphs. For the directed graph , we use the following update rule, proposed in [17], to iteratively compute a set of balancing weights. Let denote the weight at node at time-step . The initial set of weights assigned to the agents satisfy : , where represents the maximum out-degree and represents the diameter of the concerned digraph [17]. Then for all ,
(7) |
Let represent the vector of node-weights at time-step . Then the corresponding vector representation of (7) is given by :
(8) |
where . So for the limiting case, . Now from Lemma 1 of [17], we know that exists, and that the sequence converges to the vector of balancing weights. So we define here the vector of weights which balances the digraph as
(9) |
The time-varying weighted Laplacian matrix is represented as
(10) |
Then the Laplacian matrix for the limiting case can be defined using the result from (9) in (10) as
(11) |
Now as balances the digraph, satisfies the desired balancing condition expressed in (6). By definition of we have for all . So to arrive at the desired balanced graph condition, we need which is eventually achieved with converging to as . Next we state a lemma which provides an explicit rate for this convergence and additionally provides the rate of decay of to .
Lemma 1
Given and , there exists constants and , such that , for all .
3.2 Algorithm
Now we introduce our algorithm, Resilient Estimation through Weight Balancing (REWB). It consists of two main update steps : one for the state of the agents, and the other for the node weights.
The updates performed by agent at time-step are :
-
i)
Updating the estimate
(12) -
ii)
Updating the weight
(13)
The update law (12), used by agents to update their estimate of , is based upon the consensus+innovation approach. The first two terms, dealing with the agent’s own and neighbours’ estimates and the corresponding node-weights, constitute the consensus part of the update law. The third term, involving the measurements and a scaling factor , constitute the innovation part. These two parts working simultaneously through the same update law help in achieving the smaller goals and mentioned before. The above update law uses step-size parameters and to assign proper weightage to its consensus and innovation parts respectively. The parameters are defined as :
(14) |
where , , . The constant is defined as . Note that implies that, in the state update law (12), the weight of the innovation term decays faster than the weight of the consensus term.
The scaling factor, , is used in the innovation part in order to ensure that the effect of the adversaries on the state of an agent always remains bounded.
(15) |
where is the output of a dynamical system defined as
(16) |
The dynamics of and are defined as
(17) | ||||
(18) |
where, , , , , , . The above time-varying system in two variables plays a crucial role in proving our main result. From the definition of in (15), a corresponding diagonal matrix is defined as
(19) |
Let represent the matrix whose rows are the state vectors of the agents at time-step . Also let represent the matrix whose rows are the sensor measurements of the agents at time-step . Now we summarise our REWB algorithm as follows :
3.3 Main Result
The following theorem states our main result on resilient distributed estimation using the REWB algorithm.
Theorem 1
Remark 1
From Theorem-1 it can be inferred that as long as less than half the total number of agents are under attack by the adversaries, the REWB algorithm ensures that each agent correctly estimates . Also note that all the agents, even the bad agents, achieve consensus and estimate in a distributed manner.
Remark 2
As noted in Lemma 1, the dynamic weights converge to the balancing weights at an exponential rate (), whereas all time-varying signals in the dynamics of the state update rule converge at a polynomial rate ( etc.). Thus, the weights converge faster, which are in turn used in the state update rule. This two time-scales approach facilitates convergence of the algorithm.
4 Simulation Results
We evaluate the performance of our proposed REWB algorithm through numerical simulations. A random network, consisting of 100 agents with directed edges, is generated where each possible edge has a probability of . It models the communication network among the agents. Each agent estimates a scalar time-varying parameter with and . The required algorithm parameters are chosen as : , and . The initial weights are chosen as .
The noise term models the effect of the adversaries on the sensor measurements of agent . For each bad agent , at every time step, takes on a random value uniformly distributed between 0 and . Note that the REWB algorithm works for any other range also. We select the base resilience index to be , and correspondingly choose . At first we consider two cases with respect to the set of agents under attack and observe the performance of the REWB algorithm. In Fig. 2(a), has a fixed set of agents, while in Fig. 2(b), is allowed to vary with time. Both the plots in Fig. 2 show the error in estimation of by the agents, given by . From the proof of Theorem 1 we have , , . Then for a set of agents, we have . Fig. 2 shows that, regardless of adversaries attacking a fixed or varying set of agents, the REWB algorithm ensures that the estimation error always remains bounded by , and consequently dies down asymptotically.


Next we use two different variations in operating conditions compared to the one used in Fig. 2(a) and observe their effect in the performance of the REWB algorithm in Fig. 3. For the plot in Fig. 3(a), the resilience index is decreased to and correspondingly we choose . As can be observed the estimation error dies down much faster with a decrease in . Next for the plot Fig. 3(b), we simulate an increase in the degree of manipulation done by the adversaries on the sensor measurements by increasing the noise level. We assign , . As is evident from Fig. 3(b), a high value of is also quite efficiently handled by the REWB algorithm, with the estimation error remaining bounded by at all times and eventually converging to 0. From Fig. 2 and Fig. 3 it is evident that the REWB algorithm ensures that even the bad agents are able to eventually correctly estimate the true value of , along with the good agents. This is in accordance with the Remark stated in Section 3.3.


In Section 3.1, we mentioned that the SIU algorithm in [15] does not give convergence in general when applied over a directed network of agents. In Fig. 5, we compare the performance of our REWB algorithm with the SIU algorithm in estimating the value of a scalar constant parameter over a directed network of 100 agents with . The two plots on the left show how the states of the agents behave with time, while the two plots on the right show the net estimation error. Fig. 5(a) shows how on applying the SIU algorithm, the states of the agents diverge away from each other and never achieve consensus, leading to a constant estimation error. On the other hand, Fig. 5(b) shows how our REWB algorithm not only ensures the agents reach consensus but they also correctly estimate the value of . This is made possible by the introduction of the weight balancing idea while designing the REWB algorithm. The dynamics of the time-varying weights ensure that the weighted graph eventually approaches a balanced condition, and thus consensus is achieved.




5 Conclusion
In this paper we propose the Resilient Estimation through Weight Balancing (REWB) algorithm. It is a distributed estimation algorithm designed to work for a network of sensor nodes with directed communication links. The REWB algorithm is resilient to sensor spoofing type adversarial attacks while estimating an unknown time-varying parameter with a decaying bound on its variations. It ensures that along with the unaffected agents, even the agents under attack estimate the true value of the parameter in a distributed manner. The proposed algorithm is developed based on the consensus+innovation approach and uses the weight-balancing idea to ensure consensus over directed graph. Through numerical simulations it is shown that the proposed algorithm accurately estimates an unknown parameter under different attack conditions, provided less than half of the agents are under adversarial attack at any given point of time. Future direction of work is to consider other models of adversarial attacks.
6
Proof 6.2 (Proof of Lemma 1).
By definition, is a primitive matrix with spectral radius 1 [17]. Then by properties of primitive matrices : exists, and , where are the right and left eigen-vectors of corresponding to eigen-value 1, and . Then from (7) and (9) we have :
(21) |
Using the properties of discussed above we get , for all . Then from (21) we have
So by Theorem 8.3 in [20], there exists such that for all
(22) |
Using (10) and (11), and applying the properties of sub-multiplicativity of spectral norm we have
(23) |
Now are diagonal matrices and for any diagonal matrix we have . Applying this to (23) and using the result from (22) we get
(24) |
where .
From (10) using the sub-multiplicativity property of the norm and the result from (24) we get
(25) |
By choosing and applying to (24) and (25) we get :
7
Here we introduce some intermediate lemmas which will be useful in the proof of Theorem-1. At first, before proceeding to a time-varying system in two variables, we first analyse the dynamics of a scalar time-varying system. Consider a linear scalar time-varying system -
(26) |
where
(27) |
where are positive constants, and .
The following result is based upon the results introduced in Lemma 25 in [21] and Lemma 3 in [15]. It provides a relation between and under which the dynamics of the scalar time-varying system in (26) is bounded. It also gives the condition under which the system dynamics converges to zero, and the corresponding rate of convergence.
Proposition 7.3.
The following result provides the rate of convergence of a scalar system modified from (26).
Proposition 7.4 (Lemma 4 in [15]).
Consider the scalar time-varying linear system :
(28) |
where are given by :
where , and .
The system in (28) satisfies
for all , and for all initial conditions .
Now by using the results above we introduce the following lemma which proves the convergence of and introduced in (17) and (18).
Proof 7.6.
Step 1 : As are decreasing in , and , there exists a finite such that for all
(31) |
From (18) we can express as
(32) |
Let . Using the second part of Proposition 7.3, we obtain : as . Hence, such that . Using this, along with (31), in (32) provides
(33) |
for some constant .
Step 2 : From (17) and (31) we have
(34) |
Applying (33) we get
where and . Now as , there exists such that for all
(35) |
We define a new system -
(36) |
for all and initial condition . So by definition of we have :
(37) |
We define another new system :
(38) |
for all and initial condition . By definition . Also for , from (31) we have . Then for all . Now using Proposition 7.3 and (38) we have
Step 3 : By virtue of being a non-negative sequence which converges to 0, there exists a time such that . We choose the smallest value among all such possible . Then from the definition of we have . So from (36), for all .
(39) |
Also by definition of we have .
Let for all
By algebraic manipulation
where , .
Now , and since we have
So we have for all . Then using (36) we have
(40) |
Now combining the results from (37), (39) and (40) we get
(41) |
Step 4 : Let . Then from (33) we have
(42) |
As , we have
(43) |
So combining (42) and (43) we have
(44) |
Let us define a new matrix as .
The following lemma provides a bound for .
Lemma 7.7.
Given , where , , where , and , there exists such that for all .
Proof 7.8.
Using the property we can write
(48) |
where and . Now by definition . So we have
(49) |
Also, and are the Laplacians of the corresponding graph. As the graphs are strongly connected, we can infer :
i.e the 2nd lowest eigen-value of each of the Laplacians is strictly positive.
Let . Then using (49) we have
(50) |
Now suppose . Then we have
(51) |
where and .
Having and ensures that , and in turn .
We choose an such that . Then for all
(52) |
Then from (48), (50), (51) and (52) we have
(53) |
Now, as , there exists time such that for all
(54) |
8
Proof 8.9 (Proof of Theorem 1).
Let denote the average of the states of the agents : .
We define as the difference between the state of the agents and their average, and as the difference between the average value and the unknown parameter .
(55) | ||||
(56) |
Now the norm of the difference between the state of each agent and can be upper bounded as
(57) |
To show that the states converge to , we express and show that has a dynamics that converges to 0. In what follows, we firstly we use the method of induction to show that
(58) |
and in the process also define the dynamics of and . After that we express these dynamics as a linear time-varying system which is asymptotically stable. From there, using (57), (16) and (58) we arrive at our desired result.
Dynamics of :
(59) |
where , and . Expanding and using and , followed by applying norm and its properties of triangle-inequality and sub-multiplicativity we get
(60) |
Now applying Lemmas 1 and 7.7, and Assumption-2 in (8.9) :
(61) |
Applying norm to (59) and using (19), we get
(62) | ||||
Dynamics of :
(63) |
We define two diagonal matrices where if and if , and rest of the entries are equal to .
(64) |
Using (1) and (55) in (63), followed by applying the -norm and its properties of triangle-inequality and sub-multiplicativity we get
(65) |
Dynamics of and via method of Induction :
By the method of induction we wish to show (58), and in the process arrive at the dynamics of and .
Step 1 : at , as , and as .
Choosing , we have
(66) |
Step 2 : for some we assume that
(67) |
Step 3 : based on the assumption (67) from Step-2, we need to show that
(68) |
Applying (67) to (62) and using (16) we have
Now as , there exists and such that for all
(69) |
By appropriate choice of , and , (69) and (54) holds for all
(70) |
We define the dynamics of as -
(71) |
(72) |
Now from (64), (8.9), (72) and further using (16), (3) and , we get
(73) |
We define the dynamics of as
(74) |
Then from (70), (71) and (73), (74) we can infer (68). Thus from steps 1,2 and 3 we have (58).
9
For our REWB algorithm, the value of a constant , which is an upper bound to the parameter , is defined as . Here we provide a detailed proof of how we arrived at this value of .
10
In the proof for Lemma 7.7 in Appendix 7, we use the fact that the second eigenvalues of the matrices and are non-zero, where and . Here we provide a reasoning for the same.
- •
-
•
positive diagonal elements :
where represent the -th element, -th row, and -th column of matrix respectively.
-
•
non-diagonal elements in : .
-
•
non-diagonal elements in :
From the expression of the entries of and , one can deduce that these matrices will have a nonzero entry in the th position if the digraph has an edge between and . This shows that the connectivity of the graph corresponding to would be preserved in the new graph corresponding to and . Now, as and are valid Laplacians, and their corresponding graphs are connected, we can infer that the second eigenvalues of and are non-zero.
References
- [1] Loubna Hamami and Bouchaib Nassereddine “Application of wireless sensor networks in the field of irrigation: A review” In Computers and Electronics in Agriculture 179, 2020, pp. 105782
- [2] Carol Habib, Abdallah Makhoul, Rony Darazi and Raphaël Couturier “Health risk assessment and decision-making for patient monitoring and decision-support using Wireless Body Sensor Networks” In Information Fusion 47, 2019, pp. 10–22
- [3] Etimad Fadel et al. “A survey on wireless sensor networks for smart grid” In Computer Communications 71, 2015, pp. 22–33
- [4] I.. Akyildiz, Weilian Su, Y. Sankarasubramaniam and E. Cayirci “A survey on sensor networks” In IEEE Communications Magazine 40.8, 2002, pp. 102–114
- [5] I.F. Akyildiz, W. Su, Y. Sankarasubramaniam and E. Cayirci “Wireless sensor networks: a survey” In Computer Networks 38.4, 2002, pp. 393–422
- [6] Shaoming He, Hyo-Sang Shin, Shuoyuan Xu and Antonios Tsourdos “Distributed estimation over a low-cost sensor network: A Review of state-of-the-art” In Information Fusion 54, 2020, pp. 21–43
- [7] Haowen Chan and A. Perrig “Security and privacy in sensor networks” In Computer 36.10, 2003, pp. 103–105
- [8] Nitin H. Vaidya, Lewis Tseng and Guanfeng Liang “Iterative Approximate Byzantine Consensus in Arbitrary Directed Graphs” In Proceedings of the 2012 ACM Symposium on Principles of Distributed Computing, 2012, pp. 365–374
- [9] Bo Chen, Li Yu, Daniel W.C. Ho and Wen-An Zhang “Resilient Consensus Through Event-Based Communication” In IEEE Transactions on Control of Network Systems 7.1, 2020, pp. 471–482
- [10] Yasser Shoukry and Paulo Tabuada “Event-Triggered State Observers for Sparse Sensor Noise/Attacks” In IEEE Transactions on Automatic Control 61.8, 2016, pp. 2079–2091
- [11] Seyed Mehran Dibaji and Hideaki Ishii “Resilient consensus of second-order agent networks: Asynchronous update rules with delays” In Automatica 81, 2017, pp. 123–132
- [12] H. Zhang and S. Sundaram “A simple median-based resilient consensus algorithm” In 2012 50th Annual Allerton Conference on Communication, Control, and Computing (Allerton), 2012, pp. 1734–1741
- [13] Soummya Kar and Jose M.. Moura “Consensus + Innovations Distributed Inference over Networks” In IEEE Signal Processing Magazine, 2013, pp. 99–109
- [14] Yuan Chen, Soummya Kar and Jose M.. Moura “Resilient Distributed Estimation : Exponential Convergence under Sensor Attacks” In Proceedings for the IEEE Conference on Decision and Control 2018, 2018, pp. 7275–7282
- [15] Yuan Chen, Soummya Kar and Jose M.. Moura “Resilient Distributed Estimation : Sensor Attacks” In IEEE Transactions on Automatic Control 64.9, 2019, pp. 3772–3779
- [16] A.. Domínguez-García and C.. Hadjicostis “Distributed strategies for average consensus in directed graphs” In 2011 50th IEEE Conference on Decision and Control and European Control Conference, 2011, pp. 2124–2129
- [17] A. Makhdoumi and A. Ozdaglar “Graph balancing for distributed subgradient methods over directed graphs” In 2015 54th IEEE Conference on Decision and Control (CDC), 2015, pp. 1364–1371
- [18] Min Meng, Xiuxian Li and Gaoxi Xiao “Distributed Estimation Under Sensor Attacks: Linear and Nonlinear Measurement Models” In IEEE Transactions on Signal and Information Processing over Networks 7, 2021, pp. 156–165
- [19] Anomadarshi Barua and Mohammad Abdullah Al Faruque “Special Session: Noninvasive Sensor-Spoofing Attacks on Embedded and Cyber-Physical Systems” In 2020 IEEE 38th International Conference on Computer Design (ICCD), 2020, pp. 45–48
- [20] João P. Hespanha “Linear Systems Theory” Princeton University Press, 2018
- [21] Soummya Kar, Jose M.. Moura and Kavita Ramanan “Distributed Parameter Estimation in Sensor Networks: Nonlinear Observation Models and Imperfect Communication” In IEEE Transactions on Information Theory 58.6, 2012, pp. 3575–3605
- [22] Bojan Mohar “Eigenvalues, diameter, and mean distance in graphs” In Graphs and Combinatorics 7, 1991