This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Resilient Consensus with Multi-hop Communication

Liwei Yuan and Hideaki Ishii    \IEEEmembershipFellow, IEEE This work was supported in the part by JSPS under Grant-in-Aid for Scientific Research Grant No. 18H01460. The support provided by the China Scholarship Council is also acknowledged. L. Yuan and H. Ishii are with the Department of Computer Science, Tokyo Institute of Technology, Yokohama, 226-8502, Japan. (e-mail: [email protected]; [email protected]).
Abstract

In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algorithm is a powerful tool for achieving resilient consensus under minimal requirements for network structures, characterized by the class of robust graphs. Our analysis highlights that through multi-hop communication, the network connectivity can be reduced especially in comparison with the common one-hop communication case. Moreover, we analyze the multi-hop W-MSR algorithm with delays in communication since the values from different multi-hop neighbors may arrive at the agents at different time steps.

{IEEEkeywords}

Cyber security, distributed algorithms, multi-hop communication, resilient consensus.

1 Introduction

\IEEEPARstart

Cyber security of multi-agent systems and distributed algorithms has become an important research area in systems control in the last decade. For multi-agent systems, consensus is one of the fundamental problems [1], [2]. Based on consensus algorithms, various applications and distributed algorithms have been developed to solve different industrial problems, e.g., clock synchronization [3], energy management [4], distributed state estimation [5], distributed optimization [6, 7], and so on. As concerns for cyber security have rised in general, consensus problems in the presence of adversarial agents creating failures and attacks have attracted much attention; see, e.g., [8, 9, 10, 11]. One class of interdisciplinary problems that has been studied in both control and computer science is that of resilient consensus [12, 9, 13]. In these works, the adversarial agents are categorized into basically two types: Malicious agents and Byzantine agents. These agents are capable to manipulate their data arbitrarily and may even collaborate with each other. However, certain differences lie between them since malicious agents are limited as they must broadcast the same messages to all of their neighbors, while Byzantine agents can send individual messages to different neighbors (e.g., [9, 2, 14]).

Resilient consensus problems under the Byzantine model have a rich history in the area of distributed computing [2]. In [15], it has been shown that given a network with nn nodes and at most ff Byzantine nodes, a necessary and sufficient condition to reach resilient exact consensus is that n3f+1n\geq 3f+1 and the graph connectivity is no less than 2f+12f+1. Furthermore, in [16], it has been reported that under deterministic asynchronous updates, even one misbehaving agent can make it impossible for the system to reach exact consensus. Then, to avoid this constraint of exact consensus, the authors of [17] introduced the approximate Byzantine consensus problem in complete networks (i.e., all-to-all communication), where the non-adversarial, normal nodes are required to achieve approximate agreement by converging to a relatively small interval in finite time. In [13], the authors proposed a necessary and sufficient condition for the approximate Byzantine consensus problem in networks with general topologies.

In this paper, we study resilient asymptotic (approximate) consensus under malicious model from the viewpoint of the so-called mean subsequence reduced (MSR) algorithms, which are known for the simplicity and scalability (e.g., [18, 9, 13, 19, 20, 21, 22]). This line of work has gained much attention in the last decade as the malicious model can be widely assumed for broadcasting networks [9], wireless sensor networks [3], and so on. A basic assumption in MSR algorithms is the knowledge regarding an upper bound on the maximum number of malicious agents among the neighbors; this bound is denoted by ff throughout this paper. Such a bound represents the level of caution assumed by the system operator and can be set based on past experience, with possibly some safety margin. Then, at each iteration, each node eliminates extreme values received from neighbors to avoid being influenced by such potentially faulty values. In particular, it removes the ff largest values and the ff smallest values from neighbors. Moreover, the graph property called robustness is shown to be critical for the network structure, guaranteeing the success of resilient consensus algorithms in static networks [12, 9] as well as time-varying networks [23]. A recent work [24] attempts to check robustness of given graphs using mixed integer linear programming. Nevertheless, such robustness requires the networks to be relatively dense and complex. Therefore, how to enhance resilience of more sparse networks without changing the original network topologies has become an urgent problem.

There are several directions for developing solutions to tackle this problem. In [25], the authors improved the graph robustness by introducing trusted nodes, which are assumed to be fault-free with extra security measures. They also provided another alternative method [26] to enhance the graph robustness by introducing different types of nodes in the network and by assuming that the attackers can only compromise a certain type of nodes. On the other hand, the works [27, 28] pursue approaches based on detection of malicious agents in the network. Compared to MSR algorithms, which do not have such detection capabilities, the algorithms are applicable to more sparse networks with the same tolerance of adversaries. Furthermore, in [10], by introducing multi-hop communication in MSR algorithms, the authors solved the approximate Byzantine consensus problem with a weaker condition on network structures compared to that derived under the one-hop communication model [13]. In [29], the authors tackled the same problem under asynchronous updates based on rounds, which is different from the asynchrony setting used in this paper (see the discussions in Section VI). The work [30] studied Byzantine binary consensus under the local broadcast model (malicious model) using a flooding algorithm, where nodes relay their values over the entire network.

Multi-hop communication techniques are commonly used in the areas of wireless communication [31] and computer science [2]. Such techniques are also used for consensus problems in many works. In [32], a multi-hop relay technique is introduced in the consensus problem to increase the speed of consensus forming. In [33], a similar method based on multi-hop relay is developed to solve the global leader-following consensus problem. Moreover, application of multi-hop communication in wireless sensor networks from the viewpoint of control is investigated in [34]. It is clear that with multi-hop communication, each node can have more information for updating compared to the one-hop case. Thus, the network may have more resilience against adversary nodes. Yet, only few works have looked into resilient consensus with multi-hop communication. As mentioned earlier, the work [10] is restricted to the Byzantine adversary case. To the best of our knowledge, resilient consensus with multi-hop communication under malicious attacks still remains as an open problem. Moreover, for many applications of multi-agent systems, time delays in the communication among agents can happen naturally [35], [36]. Especially, in the multi-hop communication setting, the length of time delays should increase as the messages are relayed by more agents. It is hence of significant importance to extend our algorithm to the case of asynchronous updates with time delays. We must note that such a case is not considered in [10] and [30].

The main contribution of this paper can be outlined as follows. Inspired by the definition of graph robustness of [9], we extend this notion to the multi-hop setting and name it as robustness with ll hops. Specifically, we formally characterize the ability of normal nodes to be influenced by normal multi-hop neighbors outside a given node set in the malicious environment. Furthermore, we provide analysis for the properties of the new notion of robustness.

Unlike in the case with one-hop communication, the MSR algorithm in the multi-hop case may not exclude all the possible effects from malicious nodes if each normal node just eliminates the ff largest and the ff smallest received values. Since a malicious node can manipulate not only its own value but also the values it relays, such nodes can produce more than ff false values even if there are at most ff malicious nodes. To completely exclude the effects from malicious nodes, we propose the multi-hop weighted mean subsequence reduced (MW-MSR) algorithm. Normal nodes using the MW-MSR algorithm will exclude the extreme values which are produced precisely by ff multi-hop neighbors. To realize this trimming capability in the multi-hop setting requires the notion of message cover, which represents the set of nodes intersecting with a given set of different message paths.

In this paper, we consider the malicious model, which is suitable for broadcast network and is different from the Byzantine model studied in [10]. Then we derive necessary and sufficient graph conditions based on the new notion of robustness with ll hops for the proposed MW-MSR algorithms to achieve resilient consensus under synchronous updates and asynchronous updates with time delays in the communication. Moreover, we present examples to illustrate how multi-hop communication helps to improve graph robustness without changing the network topology. As a side result, we prove that for the case of unbounded path length in message relaying, our graph condition is equivalent to the necessary and sufficient graph condition for binary consensus under malicious attacks studied in [30].

The rest of this paper is organized as follows. In Section II, we outline preliminaries on graphs and the system model. In Sections III and IV, we present the MW-MSR algorithm and define graph robustness with multi-hop communication, respectively. Then in Sections V and VI, we derive tight graph conditions under which the MW-MSR algorithms guarantee resilient asymptotic consensus under synchronous and asynchronous updates, respectively. In Section VII, we provide some properties of the new robustness and in Section VIII, we present examples to demonstrate that multi-hop communication can improve robustness of graphs in general. Lastly, in Section IX, we conclude the paper. A preliminary version of this paper appeared as [37]. The current paper contains all the proofs of the theoretical results, further discussions, as well as more extensive simulations.

2 Preliminaries and Problem Formulation

In this section, we provide preliminaries on the network models and introduce the basic settings for the resilient consensus problems studied in this paper.

2.1 Network Model

First, we introduce the graph notions used in this paper. Consider the directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) consisting of the node set 𝒱={1,,n}\mathcal{V}=\{1,...,n\} and the edge set 𝒱×𝒱\mathcal{E}\subset\mathcal{V}\times\mathcal{V}. Here, the edge (j,i)(j,i)\in\mathcal{E} indicates that node ii can get information from node jj. A path from node i1i_{1} to imi_{m} is a sequence of distinct nodes (i1,i2,,im)(i_{1},i_{2},\dots,i_{m}), where (ij,ij+1)(i_{j},i_{j+1})\in\mathcal{E} for j=1,,m1j=1,\dots,m-1. Such a path is referred to as an (m1)(m-1)-hop path (or a path of length m1m-1) and also as (i1,im)(i_{1},i_{m})-path when the number of hops is not relevant but the source and destination nodes are. We also say that node imi_{m} is reachable from node i1i_{1}. An 𝒳u\mathcal{X}u-path is a path from a node in set 𝒳\mathcal{X} to node u𝒳u\notin\mathcal{X}. We also denote the set minus symbol by 𝒳𝒴\mathcal{X}\setminus\mathcal{Y}.

For node ii, let 𝒩il\mathcal{N}_{i}^{l-} be the set of nodes that can reach node ii via at most ll-hop paths, where ll is a positive integer. Also, let 𝒩il+\mathcal{N}_{i}^{l+} be the set of nodes that are reachable from node ii via at most ll-hop paths. The ll-th power of the graph 𝒢\mathcal{G}, denoted by 𝒢l\mathcal{G}^{l}, is a multigraph111 In a multigraph, two nodes can have multiple edges between them. with the same vertices as 𝒢\mathcal{G} and a directed edge from node jj to node ii is defined by a path of length at most ll from jj to ii in 𝒢\mathcal{G}. The adjacency matrix A=[aij]A=[a_{ij}] of 𝒢l\mathcal{G}^{l} is given by αaij<1\alpha\leq a_{ij}<1 if j𝒩ilj\in\mathcal{N}_{i}^{l-} and otherwise aij=0a_{ij}=0, where α>0\alpha>0 is a fixed lower bound. We assume that j=1,jinaij1\sum_{j=1,j\neq i}^{n}a_{ij}\leq 1 for all ii. Let L=[bij]L=[b_{ij}] be the Laplacian matrix of 𝒢l\mathcal{G}^{l}, whose entries are defined as bii=j=1,jinaijb_{ii}=\sum_{j=1,j\neq i}^{n}a_{ij} and bij=aij,ijb_{ij}=-a_{ij},i\neq j; we can see that the sum of the elements of each row of LL is zero.

2.2 Multi-hop Communication for Multi-agent Consensus

Here, we introduce the multi-agent system with multi-hop communication and the update rule used by the agents under no attacks. Consider a time-invariant network modeled by the directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}). Each node ii has a real-valued state xi[k]x_{i}[k]. The goal of the agents is to arrive at consensus in their state values asymptotically, that is, |xi[k]xj[k]|0|x_{i}[k]-x_{j}[k]|\rightarrow 0 as kk\rightarrow\infty for all i,j𝒱i,j\in\mathcal{V}. This is to be achieved by updating the states at each time step kk based on the information exchanged among the nodes. Their initial values xi[0]x_{i}[0] are given. Until we reach Section VI, we assume that no delay is present in the communication among nodes.

In this problem setting, the agents not only communicate with their direct neighbors as in conventional schemes, but also with their multi-hop neighbors. Let ll be the maximum number of hops allowed in the network. Specifically, node i1i_{1} can send messages of its own to an ll-hop neighbor il+1i_{l+1} via different paths. We represent a message as a tuple m=(w,P)m=(w,P), where w=value(m)w=\mathrm{value}(m)\in\mathbb{R} is the message content and P=path(m)P=\mathrm{path}(m) indicates the path via which message mm is transmitted. Moreover, nodes i1i_{1} and il+1i_{l+1} are, respectively, the message source and the message destination. When source node i1i_{1} sends out a message, PP is a path vector of length l+1l+1 with the source node being i1i_{1} and other entries being empty. Then the one-hop neighbor i2i_{2} receives this message from i1i_{1}, and it stores the value of node i1i_{1} for consensus and relays the value of node i1i_{1} to all the one-hop neighbors of i2i_{2} with the second entry of PP being i2i_{2} and other entries being unchanged. This relay procedure will continue until every entry of PP of this message is occupied, i.e., this message reaches node il+1i_{l+1}. We denote by 𝒱(P)\mathcal{V}(P) the set of nodes in PP.

We now outline the message exchanges among the agents. At each time kk, normal node ii conducts the following steps:

1. Transmit step: Transmit message mij[k]=(xi[k],Pij[k])m_{ij}[k]=(x_{i}[k],P_{ij}[k]) over each ll-hop path to node j𝒩il+j\in\mathcal{N}_{i}^{l+}.

2. Receive step: Receive messages mji[k]=(xj[k],Pji[k])m_{ji}[k]=(x_{j}[k],P_{ji}[k]) from j𝒩ilj\in\mathcal{N}_{i}^{l-}, whose destination is ii. Let i[k]\mathcal{M}_{i}[k] be the set of messages that node ii received in this step.

3. Update step: Update the state xi[k]x_{i}[k] as

xi[k+1]=gi(i[k]),x_{i}[k+1]=g_{i}(\mathcal{M}_{i}[k]), (1)

where gi()g_{i}(\cdot) is a real-valued function of the states received in this time step, to be defined later.

In the Transmit step and Receive step, nodes exchange messages with others that are up to ll hops away. Then in the Update step, node ii updates its state using the received values in i[k]\mathcal{M}_{i}[k]. Note that the adversary nodes may deviate from this specification as we describe in the next subsection.

In an agent network equipped with multi-hop communication, as the consensus update rule (1), we can extend the common one (e.g., [38]). Let ui[k]u_{i}[k] denote the control input for node ii at time kk. Each node updates as

xi[k+1]\displaystyle x_{i}[k+1] =xi[k]+ui[k],\displaystyle=x_{i}[k]+u_{i}[k], (2)
ui[k]\displaystyle u_{i}[k] =j𝒩ilaij[k](xi[k]xj[k]).\displaystyle=-\sum_{j\in\mathcal{N}_{i}^{l-}}a_{ij}[k](x_{i}[k]-x_{j}[k]).

This system can be given in the compact form as

x[k+1]\displaystyle x[k+1] =x[k]+u[k],\displaystyle=x[k]+u[k], (3)
u[k]\displaystyle u[k] =L[k]x[k],\displaystyle=-L[k]x[k],

where x[k]nx[k]\in\mathbb{R}^{n} and u[k]nu[k]\in\mathbb{R}^{n} are the state vector and control input vector, respectively, and L[k]L[k] is the Laplacian matrix of the ll-th power of 𝒢\mathcal{G} determined by the messages mij[k],i𝒱andj𝒩ilm_{ij}[k],i\in\mathcal{V}\ \text{and}\ j\in\mathcal{N}_{i}^{l-}. As a generalization of the one-hop result (e.g. [1], [36]), it is obvious that with ll-hop communication, consensus is possible if 𝒢l\mathcal{G}^{l} has a rooted spanning tree.

2.3 Threat Model

We introduce the threat model adopted in this paper. In the network, the node set 𝒱\mathcal{V} is partitioned into the set of normal nodes 𝒩\mathcal{N} and the set of adversary nodes 𝒜\mathcal{A}. The latter set 𝒜\mathcal{A} is unknown to the normal nodes at all times. Moreover, we constrain the class of adversaries as follows (see, e.g., [9]):

Definition 2.1

(ff-total set) The set of adversary nodes 𝒜\mathcal{A} is said to be ff-total if it contains at most ff nodes, i.e., |𝒜|f\left|\mathcal{A}\right|\leq f.

Definition 2.2

(Malicious nodes) An adversary node i𝒜i\in\mathcal{A} is said to be a malicious node if it can arbitrarily modify its own value and relayed values, but sends the same state and relayed values to its neighbors at each iteration. It can also decide not to send any value.222This behavior corresponds to the omissive/crash model [2].

As commonly done in the literature [9], [10], we assume that each normal node knows the value of ff and the topology information of the graph up to ll hops. Moreover, the malicious model is reasonable in applications such as wireless sensor networks, where neighbors’ information is obtained by broadcast communication. In the multi-hop setting studied in this paper, it is important to impose the following assumption.

Assumption 2.1

Each malicious node ii cannot manipulate the path values in the messages containing its own state xi[k]x_{i}[k] and those that it relays.

This is introduced for ease of analysis, but is not a strong constraint. In fact, manipulating message paths can be easily detected and hence does not create problems. We show how this can be done in Section II-E.

2.4 Resilient Asymptotic Consensus

We now introduce the type of consensus among the normal agents to be sought in this paper [9], [10], [12].

Definition 2.3

If for any possible sets and behaviors of the malicious agents and any state values of the normal nodes, the following two conditions are satisfied, then we say that the normal agents reach resilient asymptotic consensus:

  1. 1.

    Safety: There exists a bounded safety interval 𝒮\mathcal{S} determined by the initial values of the normal agents such that xi[k]𝒮,i𝒩,k+x_{i}[k]\in\mathcal{S},\forall i\in\mathcal{N},k\in\mathbb{Z}_{+}.

  2. 2.

    Agreement: There exists a state x𝒮x^{*}\in\mathcal{S} such that limkxi[k]=x,i𝒩\lim_{k\to\infty}x_{i}[k]=x^{*},\forall i\in\mathcal{N}.

The problem studied in this paper is to develop an MSR-based algorithm for agents that can make ll-hop communication to reach resilient consensus under the ff-total malicious model and to characterize conditions on the network topology for the algorithm to properly perform. Note that in general, for MSR-based algorithms with one-hop communication, resilient consensus can be achieved under the ff-total model with the necessary and sufficient condition expressed in terms of the so-called graph robustness; see, e.g., [8, 9], and the following sections for the definition of robust graphs and related discussions.

2.5 Discussion on Manipulation in Message Path Information

It is notable that multi-hop communication is vulnerable to false data injection in the information relayed by nodes, which can make the problem of resilient consensus more complicated than the one-hop case. Earlier, Assumption 2.1 was introduced stating that the malicious nodes however cannot manipulate the path information in messages that they relay. We briefly explain here how such attacks can be detected, inspired by the discussion in [10].

Such detection requires that each node can identify the neighbor from which it receives each message, which is commonly assumed (e.g., [10], [15]). Moreover, there are many methods to realize this function in real-world applications. For instance, by using the encryption technique of the RSA algorithm [39], each node can send out its value associated with a digital signature using its own private key. Then, using the sender’s public key, the receiver can confirm that this message is indeed sent by the particular sender.

In each iteration of the synchronous algorithm, there are three potential cases where a message sent to normal node ii is manipulated in its path information: (i) Node ii receives multiple messages along the same path PP; (ii) it receives messages along an unknown path PP^{\prime}; or (iii) it does not receive any message along a known path PP. Note that a normal node receives only one message along each path in each iteration when no adversarial node is present.

For case (i), this faulty behavior is caused either by duplicating messages or by manipulating path information in messages. We show that in both situations, the receiving node ii can find that there is at least one faulty node in path PP. It is obvious for the first situation. For the path manipulating situation, consider the case where a normal node hh receives a message m=(w,P)m=(w,P) directly from node jj but the path PP does not contain node jj. Then node hh knows that node jj is faulty, and will not forward the message. This indicates that in general, if there is a sequence of faulty nodes along a path, then the last one in the sequence must keep its own index within the path information in the messages that it transmits. Moreover, this argument also holds for case (ii), i.e., node ii knows that at least one node in path PP^{\prime} is faulty. Therefore, in cases (i) and (ii), from the perspective of node ii, manipulating the message path data is equivalent to having a faulty node in PP or PP^{\prime} sending additional messages with manipulated values, and thus it will remove any values in this path by the MW-MSR algorithm.

For case (iii), either a faulty node does not send/forward the message mm, or it manipulates the message path PP. In the latter case, for node ii, manipulating the message path is equivalent to having a faulty node in PP not sending/forwarding the message.

Actually, this analysis can be extended to the algorithms with asynchronous updates. In each update of such algorithms, consider the following three path manipulating cases for node ii: (i) Node ii receives multiple messages along one path PP at the same time step; (ii) it receives messages along an unknown path PP^{\prime}; or (iii) it does not receive any message along path PP in a period of time τ\tau, where τ\tau is the maximum time delay of normal agents. Note that in case (i) for the asynchronous algorithm, faulty nodes can send multiple messages along PP as long as these faulty messages do not arrive at node ii at the same time step and this behavior will not affect normal agents, since only the most recent values of multi-hop neighbors will be used in the asynchronous MW-MSR algorithm. The analysis of cases (ii) and (iii) is similar to that of the synchronous algorithm.

The above analysis is based on the assumption that there is no packet loss in the fault-free networks. In real-world applications, packet losses can happen even in fault-free networks. We note that there are methods to deal with this issue. Packet losses in the communication between two normal nodes can also cause the situation of case (iii) mentioned above. Like the one-hop W-MSR algorithm, if a packet loss happens in the communication from neighbor jj to node ii, then node ii may receive only |𝒩i|1|\mathcal{N}_{i}|-1 values at this particular time step and still remove ff largest and ff smallest received values; hence, node ii uses less information from normal nodes to update. This behavior will not violate the safety interval, but it may slow down the speed of consensus. If the packet loss behavior happens frequently in this transmission path, then node ii can consider this path containing faulty nodes.

3 Multi-hop Weighted MSR Algorithm

In this section, we introduce the multi-hop weighted MSR (MW-MSR) algorithm, which is designed to solve the resilient consensus problem under the multi-hop setting. We first introduce the notion of message cover which plays a key role in the trimming function of our MSR algorithm. Then we outline the structure of the MW-MSR algorithm and provide examples to illustrate the idea behind the algorithm.

The notion of message cover [10] is crucial in the update rule of our algorithm to be proposed in this section. It evaluates the effects of adversary nodes that can possibly manipulate the updates of normal nodes in a multi-hop communication setting. Its formal definition is given as follows.

Definition 3.1

For a graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}), let \mathcal{M} be a set of messages transmitted over 𝒢\mathcal{G}, and let 𝒫()\mathcal{P}(\mathcal{M}) be the set of message paths of all the messages in \mathcal{M}, i.e., 𝒫()={path(m):m}\mathcal{P}(\mathcal{M})=\{\mathrm{path}(m):m\in\mathcal{M}\}. A message cover of \mathcal{M} is a set of nodes 𝒯()𝒱\mathcal{T}(\mathcal{M})\subset\mathcal{V} whose removal disconnects all message paths, i.e., for each path P𝒫()P\in\mathcal{P}(\mathcal{M}), we have 𝒱(P)𝒯()\mathcal{V}(P)\cap\mathcal{T}(\mathcal{M})\neq\emptyset. In particular, a minimum message cover of \mathcal{M} is defined by

𝒯()argmin𝒯(): Cover of |𝒯()|.\mathcal{T}^{*}(\mathcal{M})\in\arg\min_{\begin{subarray}{c}\mathcal{T}(\mathcal{M}):\textup{ Cover of }\mathcal{M}\end{subarray}}\left|\mathcal{T}(\mathcal{M})\right|.

As a simple example, consider the set \mathcal{M} of paths connecting node ii to node jj which do not overlap. Then, its message cover must contain at least one node per path. Clearly, there may be multiple minimum message covers if the paths are of length greater than three.

1) At each time kk, normal node ii sends its own message to nodes in 𝒩il+\mathcal{N}_{i}^{l+}. Then, it obtains messages of the nodes in 𝒩il\mathcal{N}_{i}^{l-} and itself, whose set is denoted by i[k]\mathcal{M}_{i}[k], and sorts the values in i[k]\mathcal{M}_{i}[k] in an increasing order.
2) (a) Define two subsets of i[k]\mathcal{M}_{i}[k] based on the message values:
¯i[k]={mi[k]:value(m)>xi[k]},\overline{\mathcal{M}}_{i}[k]=\{m\in\mathcal{M}_{i}[k]:\mathrm{value}(m)>x_{i}[k]\},
¯i[k]={mi[k]:value(m)<xi[k]}.\underline{\mathcal{M}}_{i}[k]=\{m\in\mathcal{M}_{i}[k]:\mathrm{value}(m)<x_{i}[k]\}.
(b) Then, let ¯i[k]=¯i[k]\overline{\mathcal{R}}_{i}[k]=\overline{\mathcal{M}}_{i}[k] if the cardinality of a minimum cover of ¯i[k]\overline{\mathcal{M}}_{i}[k] is less than ff, i.e., |𝒯(¯i[k])|<f\left|\mathcal{T}^{*}(\overline{\mathcal{M}}_{i}[k])\right|<f. Otherwise, let ¯i[k]\overline{\mathcal{R}}_{i}[k] be the largest sized subset of ¯i[k]\overline{\mathcal{M}}_{i}[k] such that (i) for all m¯i[k]¯i[k]m\in\overline{\mathcal{M}}_{i}[k]\setminus\overline{\mathcal{R}}_{i}[k] and m¯i[k]m^{\prime}\in\overline{\mathcal{R}}_{i}[k] we have value(m)value(m)\mathrm{value}(m)\leq\mathrm{value}(m^{\prime}), and (ii) the cardinality of a minimum cover of ¯i[k]\overline{\mathcal{R}}_{i}[k] is exactly ff, i.e., |𝒯(¯i[k])|=f\left|\mathcal{T}^{*}(\overline{\mathcal{R}}_{i}[k])\right|=f.
(c) Similarly, let ¯i[k]=¯i[k]\underline{\mathcal{R}}_{i}[k]=\underline{\mathcal{M}}_{i}[k] if the cardinality of a minimum cover of ¯i[k]\underline{\mathcal{M}}_{i}[k] is less than ff, i.e., |𝒯(¯i[k])|<f\left|\mathcal{T}^{*}(\underline{\mathcal{M}}_{i}[k])\right|<f. Otherwise, let ¯i[k]\underline{\mathcal{R}}_{i}[k] be the largest sized subset of ¯i[k]\underline{\mathcal{M}}_{i}[k] such that (i) for all m¯i[k]¯i[k]m\in\underline{\mathcal{M}}_{i}[k]\setminus\underline{\mathcal{R}}_{i}[k] and m¯i[k]m^{\prime}\in\underline{\mathcal{R}}_{i}[k] we have value(m)value(m)\mathrm{value}(m)\geq\mathrm{value}(m^{\prime}), and (ii) the cardinality of a minimum cover of ¯i[k]\underline{\mathcal{R}}_{i}[k] is exactly ff, i.e., |𝒯(¯i[k])|=f\left|\mathcal{T}^{*}(\underline{\mathcal{R}}_{i}[k])\right|=f.
(d) Finally, let i[k]=¯i[k]¯i[k]\mathcal{R}_{i}[k]=\overline{\mathcal{R}}_{i}[k]\cup\underline{\mathcal{R}}_{i}[k].
3) Node ii updates its value as follows:
xi[k+1]=mi[k]i[k]ai[k]value(m),x_{i}[k+1]=\sum_{m\in\mathcal{M}_{i}[k]\setminus\mathcal{R}_{i}[k]}a_{i}[k]\mathrm{value}(m), (4)
where ai[k]=1/(|i[k]i[k]|)a_{i}[k]=1/(\left|\mathcal{M}_{i}[k]\setminus\mathcal{R}_{i}[k]\right|).
Algorithm 1 MW-MSR Algorithm

Now, we are ready to introduce the structure of the synchronous MW-MSR algorithm in Algorithm 1. Note that the one-hop version of the MW-MSR algorithm (i.e., with l=1l=1) is equivalent to the W-MSR algorithm in [9]. However, we can see that the difference between the MW-MSR algorithm and the W-MSR algorithm mainly lies in the trimming function in step 2 when l2l\geq 2. For general MSR algorithms of one-hop communication, the essential idea for the normal nodes to avoid being affected by adversary nodes is that each normal node ii will exclude the effects from ff neighbors with extreme values (possibly sent by faulty nodes). This can guarantee that values outside the safety interval will not be used by any normal node at any time step. In the one-hop case, for each normal node ii, the number of values received from such ff neighbors is exactly ff, i.e., node ii will trim away ff largest and ff smallest values at each step. This is because each neighbor sends only one value of its own to node ii at each step under the typical assumptions made in MSR-related works [9], [13].

Under the multi-hop setting, the situation changes significantly even if we assume that each node can only send out one value of its own to its neighbors at each step. Since each node relays the values from different neighbors, normal node ii can receive more than one value from one direct neighbor. Thus, in the MW-MSR algorithm, normal node ii cannot just trim away ff largest and ff smallest values at each step. Instead, it needs to trim away the largest and smallest values from exactly ff nodes within ll hops away, which is the generalization of the essential idea in the one-hop W-MSR algorithm.

Refer to caption
Refer to caption
Figure 1: (a) A 5-node graph. (b) Values removed by node 1 in one-hop and two-hop algorithms.

To characterize the number of the extreme values from exactly ff nodes for node ii, the notion of minimum message cover (MMC) is designed. Intuitively speaking, for normal node ii, ¯i[k]\overline{\mathcal{R}}_{i}[k] and ¯i[k]\underline{\mathcal{R}}_{i}[k] are the largest sized sets of received messages containing very large and small values that may have been generated or tampered by ff adversary nodes, respectively. Here, we focus on how ¯i[k]\underline{\mathcal{R}}_{i}[k] is determined, as ¯i[k]\overline{\mathcal{R}}_{i}[k] can be obtained in a similar way. When the cardinality of the MMC of set ¯i[k]\underline{\mathcal{M}}_{i}[k] is no more than ff, node ii simply takes ¯i[k]=¯i[k]\underline{\mathcal{R}}_{i}[k]=\underline{\mathcal{M}}_{i}[k]. Otherwise, node ii will check the first f+1f+1 values of ¯i[k]\underline{\mathcal{M}}_{i}[k], and if the MMC of these values is of cardinality ff, then it will check the first f+2f+2 values of ¯i[k]\underline{\mathcal{M}}_{i}[k]. This procedure will continue until for the first f+hf+h (h1h\geq 1) values of ¯i[k]\underline{\mathcal{M}}_{i}[k], the MMC of these values is of cardinality f+1f+1. Then ¯i[k]\underline{\mathcal{R}}_{i}[k] is taken as the first f+h1f+h-1 values of ¯i[k]\underline{\mathcal{M}}_{i}[k]. After sets ¯i[k]\overline{\mathcal{R}}_{i}[k] and ¯i[k]\underline{\mathcal{R}}_{i}[k] are determined, in the control input ui(k)u_{i}(k) computed by (4) in step 3, values in these sets are excluded. Note that this control is consistent with the one in (1) when f=0f=0.

We also illustrate the determination of such subsets through a simple example. Consider the network in Fig. 1 with initial states x[0]=[2 4 100 8 10]Tx[0]=[2\ 4\ 100\ 8\ 10]^{T}, where node 3 is set to be malicious (f=1f=1) and constantly broadcasts the value 100 as its own value as well as those in the relayed messages. We look at node 1 at time k=0k=0 and drop the time index kk. In the one-hop version of the MW-MSR algorithm, the input for node 1 is {x1,x2,x5,x3}\{x_{1},x_{2},x_{5},x_{3}\}, and it chooses ¯1[0]={x3=100}\overline{\mathcal{R}}_{1}[0]=\{x_{3}=100\} and ¯1[0]=\underline{\mathcal{R}}_{1}[0]=\emptyset in step 2 of the algorithm (since the value x1x_{1} is the smallest in the input).

In the two-hop version of the MW-MSR algorithm, node 1 receives the state values x2,x3,x_{2},x_{3}, and x5x_{5} directly from nodes 2, 3, and 5, respectively. Moreover, it receives the relayed values of node 4 through nodes 2, 3, and 5, denoted by x42,x43,x_{4}^{2},x_{4}^{3}, and x45x_{4}^{5}. Then the sorted input for node 1 is {x1,x2,x42,x45,x5,x43,x3}\{x_{1},x_{2},x_{4}^{2},x_{4}^{5},x_{5},x_{4}^{3},x_{3}\}, and node 1 checks the MMC of the subset of the largest values starting from the (f+1)(f+1)th value (since the values before the ffth one are definitely removed by node 1). First, it evaluates {x43,x3}\{x_{4}^{3},x_{3}\}, and the MMC of this message set is the node set {3}\{3\} with cardinality 1. Then, it evaluates {x5,x43,x3}\{x_{5},x_{4}^{3},x_{3}\} and the MMC of this message set can be found to be the node set {3,5}\{3,5\} with cardinality 2, which is bigger than f=1f=1. As a result, node 1 confirms that {x43,x3}\{x_{4}^{3},x_{3}\} is the largest sized set of the large values that may have been generated or tampered by ff adversary nodes. Therefore, node 1 chooses ¯1[0]={x43=100,x3=100}\overline{\mathcal{R}}_{1}[0]=\{x_{4}^{3}=100,x_{3}=100\} and ¯1[0]=\underline{\mathcal{R}}_{1}[0]=\emptyset in step 2 of the algorithm.

In this paper, the key question to be addressed is, under what conditions on the network can the above algorithm achieve resilient asymptotic consensus? Our approach is to develop a generalization of the results and analysis of the one-hop case. In particular, this necessitates us to extend the notion of graph robustness by taking account of multi-hop communication. This is carried out in the next section.

4 Robustness with Multi-hop Communication

In this section, we discuss the notion of graph robustness. This notion was first introduced in [9], which corresponds to the one-hop case. We provide its multi-hop generalization, which plays a crucial role in our resilient consensus problem.

As in the definition of robustness for the one-hop case [9], we start with the definition of rr-reachability. Specifically, when the communication is only one-hop, a node set is said to be rr-reachable if it contains at least one node that has at least rr incoming neighbors outside this set. This notion basically captures the capability of a set to be influenced by the outside of the set when the nodes apply the MSR algorithms with parameter r1r-1.

Refer to caption
Refer to caption
Figure 2: (a) Node ii has two independent paths originating from the outside of 𝒱1\mathcal{V}_{1} with respect to set ={j}\mathcal{F}=\{j\}. (b) Node ii only has one independent path sharing the same property.

In generalizing this notion to the case of multi-hop communication, it is crucial to extend the above-mentioned capability. In particular, the influence from the outside of the set may come from remote nodes and are not restricted to direct neighbors. With a slight change, in the multi-hop setting, we define the rr-reachability as follows.

Definition 4.1

Consider a graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) with ll-hop communication. For r+r\in\mathbb{Z}_{+}, set 𝒱\mathcal{F}\subset\mathcal{V}, and nonempty set 𝒱1𝒱\mathcal{V}_{1}\subset\mathcal{V}, a node i𝒱1i\in\mathcal{V}_{1} is said to be rr-reachable with ll-hop communication with respect to \mathcal{F} if it has at least rr independent paths (i.e., only node ii is the common node in these paths) of at most ll hops originating from nodes outside 𝒱1\mathcal{V}_{1} and all these paths do not have any node in set \mathcal{F} as an intermediate node (i.e., the nodes in \mathcal{F} can be source or destination nodes in these paths).

Intuitively speaking, for any set 𝒱\mathcal{F}\subset\mathcal{V} and for node i𝒱1i\in\mathcal{V}_{\text{1}} to have the above-mentioned property, there should be at least rr source nodes outside 𝒱1\mathcal{V}_{\text{1}} and at least one independent path of length at most ll hops from each of the rr source nodes to node ii, where such a path does not contain any internal node from the set \mathcal{F}. It is clear that for the one-hop case, to count the independent paths simply becomes to count the in-neighbors.

As an example, consider the graph in Fig. 2(a), where the two node sets 𝒱1\mathcal{V}_{1} and 𝒱2\mathcal{V}_{2} are taken as indicated and the set ={j}\mathcal{F}=\{j\}. Here, node i𝒱1i\in\mathcal{V}_{1} has two independent paths of at most two hops originating from the nodes outside 𝒱1\mathcal{V}_{1} with respect to the set \mathcal{F}. In contrast, in a similar graph shown in Fig. 2(b), such a property is lost and node ii has only one path from the outside of 𝒱1\mathcal{V}_{1} w.r.t. the set \mathcal{F}.

Refer to caption
Refer to caption
Figure 3: (a) The graph is not (2,2)(2,2)-robust with one hop, but it is (2,2)(2,2)-robust with 22 hops. (b) The graph is (2,2)(2,2)-robust with one hop and (3,3)(3,3)-robust with 22 hops.

Now, we are ready to generalize this notion to the entire graph and define rr-robustness and (r,s)(r,s)-robustness with ll hops as follows.

Definition 4.2

A directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) is said to be (r,s)(r,s)-robust with ll hops with respect to a given set 𝒱\mathcal{F}\subset\mathcal{V}, if for every pair of nonempty disjoint subsets 𝒱1,𝒱2𝒱\mathcal{V}_{\text{1}},\mathcal{V}_{\text{2}}\subset\mathcal{V}, at least one of the following conditions holds:

  1. 1.

    𝒵𝒱1r=𝒱1\mathcal{Z}_{\mathcal{V}_{1}}^{r}=\mathcal{V}_{1},

  2. 2.

    𝒵𝒱2r=𝒱2\mathcal{Z}_{\mathcal{V}_{2}}^{r}=\mathcal{V}_{2},

  3. 3.

    |𝒵𝒱1r|+|𝒵𝒱2r|s\left|\mathcal{Z}_{\mathcal{V}_{1}}^{r}\right|+\left|\mathcal{Z}_{\mathcal{V}_{2}}^{r}\right|\geq s,

where 𝒵𝒱ar\mathcal{Z}_{\mathcal{V}_{a}}^{\textit{r}} is the set of nodes in 𝒱a\mathcal{V}_{\textit{a}} (a=1,2a=1,2) that are rr-reachable with ll-hop communication with respect to \mathcal{F}. Moreover, if the graph 𝒢\mathcal{G} satisfies this property with respect to any set \mathcal{F} following the ff-total model, then we say that 𝒢\mathcal{G} is (r,s)(r,s)-robust with ll hops under the ff-total model. When it is clear from the context, we will just say 𝒢\mathcal{G} is (r,s)(r,s)-robust with ll hops. Furthermore, when the graph is (r,1)(r,1)-robust with ll hops, we also say it is rr-robust with ll hops.

Generally, robustness of a graph increases as the relay range ll increases. We will illustrate this point using the graphs in Fig. 3. Note that graph robustness with multi-hop communication needs to be checked for every possible set \mathcal{F} satisfying the ff-total model. In the context of this paper, we are interested to check (r,s)(r,s)-robustness under (r1)(r-1)-total model.

First, the graph in Fig. 3(a) is not (2,2)(2,2)-robust with one hop since for the sets {1,2}\{1,2\} and {3,4}\{3,4\}, none of the nodes has two in-neighbors outside the corresponding set. However, under the 1-total model, this graph is (2,2)(2,2)-robust with 22 hops. For instance, we first check the condition for the set ={1}\mathcal{F}=\{1\}. For sets {1,2}\{1,2\} and {3,4}\{3,4\}, all of the nodes 1, 3 and 4 have two independent paths of at most two hops originating from the outside of the set with node 1 not being the internal node. After checking all the possible subsets of 𝒱\mathcal{V}, one can confirm that this graph is (2,2)(2,2)-robust with 22 hops with respect to set ={1}\mathcal{F}=\{1\}. Since this graph is actually symmetric for each node, we can conclude that for the set ={v}\mathcal{F}=\{v\} (v=2,3,4v=2,3,4), this graph is (2,2)(2,2)-robust with 22 hops with respect to this set. Hence, this graph is (2,2)(2,2)-robust with 22 hops.

Next, we look at the graph in Fig. 3(b). When l=1l=1, this graph is (2,2)(2,2)-robust with 11 hop but not (3,3)(3,3)-robust with 11 hop. When l=2l=2, it becomes (3,3)(3,3)-robust with 22 hops. It is further noted that the level of robustness is constrained by the in-degrees of the nodes. In the graph of Fig. 3(b), each node has four incoming edges. As a result, for r4r\geq 4, this graph cannot be (r,s)(r,s)-robust with any number of hops. We elaborate more on this aspect in Section VII.

5 Synchronous Network

In this section, we analyze the MW-MSR algorithm under synchronous updates, i.e., each normal node will update its value using those received from all of its ll-hop neighbors in a synchronous manner with other nodes at each time kk.

5.1 Matrix Representation

First, we write the system in a matrix form. For ease of notation in our analysis, reorder the node indices so that the normal nodes take indices 1,,nN1,\dots,n_{N} and the malicious nodes are nN+1,,nn_{N}+1,\dots,n. Then the state vector and control input vector can be written as

x[k]=[xN[k]xF[k]],u[k]=[uN[k]uF[k]],x[k]=\begin{bmatrix}x^{N}[k]\\ x^{F}[k]\end{bmatrix},\medspace u[k]=\begin{bmatrix}u^{N}[k]\\ u^{F}[k]\end{bmatrix}, (5)

where the superscript NN stands for normal and FF for faulty. Regarding the control inputs uN[k]u^{N}[k] and uF[k]u^{F}[k], the normal nodes follow (4) while the malicious nodes may not. Hence, they can be expressed as

uN[k]=LN[k]x[k],uF[k]:arbitrary,\begin{array}[]{lll}u^{N}[k]=-L^{N}[k]x[k],\\ u^{F}[k]:\textup{arbitrary,}\end{array} (6)

where LN[k]nN×nL^{N}[k]\in\mathbb{R}^{n_{N}\times n} is the matrix formed by the first nNn_{N} rows of L[k]L[k] associated with normal nodes. The row sums of this matrix LN[k]L^{N}[k] are zero as in L[k]L[k]. Thus, we can rewrite the system as

x[k+1]=(In[LN[k]0])x[k]+[0InF]uF[k].x[k+1]=\left(I_{n}-\begin{bmatrix}L^{N}[k]\\ 0\end{bmatrix}\right)x[k]+\begin{bmatrix}0\\ I_{n_{F}}\end{bmatrix}u^{F}[k]. (7)

5.2 Consensus Analysis with Multi-hop Communication

Now we are ready to provide a necessary and sufficient condition for resilient consensus applying the synchronous MW-MSR algorithm. The following theorem is the first main contribution of this paper.

Theorem 5.1

Consider a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) with ll-hop communication, where each normal node updates its value according to the synchronous MW-MSR algorithm with parameter ff. Under the ff-total malicious model, resilient asymptotic consensus is achieved if and only if the network topology is (f+1,f+1)(f+1,f+1)-robust with ll hops. Moreover, the safety interval is given by

𝒮=[minxN[0],maxxN[0]].\mathcal{S}=\big{[}\min x^{N}[0],\max x^{N}[0]\big{]}.
Proof 5.2.

(Necessity) If 𝒢\mathcal{G} is not (f+1,f+1)(f+1,f+1)-robust with ll hops, then there are nonempty, disjoint subsets 𝒱1,𝒱2𝒱\mathcal{V}_{1},\mathcal{V}_{2}\subset\mathcal{V} such that none of the conditions in Definition 4.2 holds. Suppose that the initial value of each node in 𝒱1\mathcal{V}_{1} is aa and each node in 𝒱2\mathcal{V}_{2} takes bb, with a<ba<b. Let all other nodes have initial values taken from the interval (a,b)(a,b). Since |𝒵𝒱1f+1|+|𝒵𝒱2f+1|f|\mathcal{Z}_{\mathcal{V}_{1}}^{f+1}|+|\mathcal{Z}_{\mathcal{V}_{2}}^{f+1}|\leq f, suppose that all nodes in 𝒵𝒱1f+1\mathcal{Z}_{\mathcal{V}_{1}}^{f+1} and 𝒵𝒱2f+1\mathcal{Z}_{\mathcal{V}_{2}}^{f+1} are malicious and take constant values. Then there is still at least one normal node in both 𝒱1\mathcal{V}_{1} and 𝒱2\mathcal{V}_{2} since |𝒵𝒱1f+1|<|𝒱1||\mathcal{Z}_{\mathcal{V}_{1}}^{f+1}|<\left|\mathcal{V}_{1}\right| and |𝒵𝒱2f+1|<|𝒱2||\mathcal{Z}_{\mathcal{V}_{2}}^{f+1}|<\left|\mathcal{V}_{2}\right|, respectively. Then these normal nodes remove all the values of incoming neighbors outside of their respective sets since the message cover of these values has cardinality equal to ff or less. According to the synchronous MW-MSR algorithm, such normal nodes will keep their values and consensus cannot be achieved.

(Sufficiency) First, we show that the safety condition of resilient consensus is satisfied. Let x¯N[k]\overline{x}^{N}[k] and x¯N[k]\underline{x}^{N}[k] to be the maximum and minimum values of the normal nodes at time kk, respectively. We can show that x¯N[k]\overline{x}^{N}[k] is monotonically nonincreasing and x¯N[k]\underline{x}^{N}[k] is monotonically nondecreasing, and thus each of them has some limit. This can be directly shown from the definitions and the facts that the values used in the MW-MSR update rule always lie within the interval [x¯N[k],x¯N[k]]𝒮\big{[}\underline{x}^{N}[k],\overline{x}^{N}[k]\big{]}\subseteq\mathcal{S} for k0k\geq 0. Since at each time kk, in step 2 of Algorithm 1, node ii wipes out the possibly manipulated values from at most ff nodes within ll hops. Moreover, the update rule (7) uses a convex combination of the values in [x¯N[k],x¯N[k]]\big{[}\underline{x}^{N}[k],\overline{x}^{N}[k]\big{]}. Therefore, the safety condition is satisfied.

Then, we denote the limits of x¯N[k]\overline{x}^{N}[k] and x¯N[k]\underline{x}^{N}[k] by ω¯\overline{\omega} and ω¯\underline{\omega}, respectively. We will prove by contradiction to show that ω¯=ω¯\overline{\omega}=\underline{\omega}, and thus the normal nodes will reach consensus. Suppose that ω¯>ω¯\overline{\omega}>\underline{\omega}. We can then take ϵ0>0\epsilon_{0}>0 such that ω¯ϵ0>ω¯+ϵ0\overline{\omega}-\epsilon_{0}>\underline{\omega}+\epsilon_{0}. Fix ϵ<ϵ0αnN/(1αnN)\epsilon<\epsilon_{0}\alpha^{n_{N}}/(1-\alpha^{n_{N}}), where 0<ϵ<ϵ00<\epsilon<\epsilon_{0} and α\alpha is the minimum of all ai[k]a_{i}[k] in step 3 of the MW-MSR algorithm. For 1γnN1\leq\gamma\leq n_{N}, define ϵγ\epsilon_{\gamma} recursively as

ϵγ=αϵγ1(1α)ϵ.\epsilon_{\gamma}=\alpha\epsilon_{\gamma-1}-(1-\alpha)\epsilon.

So we have 0<ϵγ<ϵγ1ϵ00<\epsilon_{\gamma}<\epsilon_{\gamma-1}\leq\epsilon_{0} for all γ\gamma, since it holds that

ϵγ\displaystyle\epsilon_{\gamma} =αϵγ1(1α)ϵ=αγϵ0(1αγ)ϵ\displaystyle=\alpha\epsilon_{\gamma-1}-(1-\alpha)\epsilon=\alpha^{\gamma}\epsilon_{0}-(1-\alpha^{\gamma})\epsilon (8)
αnNϵ0(1αnN)ϵ>0.\displaystyle\geq\alpha^{n_{N}}\epsilon_{0}-(1-\alpha^{n_{N}})\epsilon>0.

At any time step kk and for any ϵt>0\epsilon_{t}>0, define two sets:

𝒵1(k,ϵt)\displaystyle\mathcal{Z}_{1}(k,\epsilon_{t}) ={i𝒱:xi[k]>ω¯ϵt},\displaystyle=\{i\in\mathcal{V}:x_{i}[k]>\overline{\omega}-\epsilon_{t}\},
𝒵2(k,ϵt)\displaystyle\mathcal{Z}_{2}(k,\epsilon_{t}) ={i𝒱:xi[k]<ω¯+ϵt}.\displaystyle=\{i\in\mathcal{V}:x_{i}[k]<\underline{\omega}+\epsilon_{t}\}.

By the definition of ϵ0\epsilon_{0}, 𝒵1(k,ϵ0)\mathcal{Z}_{1}(k,\epsilon_{0}) and 𝒵2(k,ϵ0)\mathcal{Z}_{2}(k,\epsilon_{0}) are disjoint.

Let kϵk_{\epsilon} be the time such that x¯N[k]<ω¯+ϵ\overline{x}^{N}[k]<\overline{\omega}+\epsilon and x¯N[k]>ω¯ϵ\underline{x}^{N}[k]>\underline{\omega}-\epsilon, kkϵ\forall k\geq k_{\epsilon}. Such a kϵk_{\epsilon} exists since x¯N[k]\overline{x}^{N}[k] and x¯N[k]\underline{x}^{N}[k] converge to ω¯\overline{\omega} and ω¯\underline{\omega}, respectively, in monotonic manners as discussed above. Consider the nonempty and disjoint sets 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}) and 𝒵2(kϵ,ϵ0)\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0}). Notice that the network is (f+1,f+1)(f+1,f+1)-robust with ll hops w.r.t. any set \mathcal{F} following the ff-total model and the set of malicious nodes 𝒜\mathcal{A} also satisfies the ff-total model. Hence, the network is (f+1,f+1)(f+1,f+1)-robust with ll hops w.r.t. the set 𝒜\mathcal{A} and at least one of the three conditions in Definition 4.2 holds. Also notice that the normal node with value x¯N[kϵ]\overline{x}^{N}[k_{\epsilon}] will definitely be in set 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}), and it is similar for the case of 𝒵2(kϵ,ϵ0)\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0}). Hence, all nodes in either 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}) or 𝒵2(kϵ,ϵ0)\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0}) have the (f+1)(f+1)-reachable property, or the union of the two sets contains at least f+1f+1 nodes having the (f+1)(f+1)-reachable property. Since there are at most ff malicious nodes, for all cases, there must exist a normal node in the union of 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}) and 𝒵2(kϵ,ϵ0)\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0}) such that it has at least f+1f+1 independent paths originating from different nodes outside of its set and these paths do not have any internal node in 𝒜\mathcal{A}.

Suppose that normal node i𝒵1(kϵ,ϵ0)𝒩i\in\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0})\cap\mathcal{N} has the (f+1)(f+1)-reachable property. Thus, node ii has at least f+1f+1 neighbors within ll hops outside set 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}), i.e., the values of these neighbors are smaller than xi[kϵ]x_{i}[k_{\epsilon}] and are at most equal to ω¯ϵ0\overline{\omega}-\epsilon_{0}. Moreover, the original values of these multi-hop neighbors of node ii will definitely reach node ii even if the source nodes are malicious (since the internal nodes of these paths are all normal and they relay the values as received, without making any changes). Hence, node ii will use at least one of these values to update its own. This is because in step 2(c) of Algorithm 1, node ii will remove values lower than its own value of which the cardinality of the minimum message cover is at most ff. As a result, among the neighbors within ll hops outside set 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}), the values from up to ff of them will be disregarded by node ii.

Now, in Algorithm 1, the update rule (4) of step 3 is applied. Here, each coefficient of the neighbors is lower bounded by α\alpha. Since the largest value that node ii will use at time kϵk_{\epsilon} is x¯N[kϵ]\overline{x}^{N}[k_{\epsilon}], placing the largest possible weight on x¯N[kϵ]\overline{x}^{N}[k_{\epsilon}] produces

xi[kϵ+1](1α)x¯N[kϵ]+α(ω¯ϵ0)\displaystyle x_{i}[k_{\epsilon}+1]\leq(1-\alpha)\overline{x}^{N}[k_{\epsilon}]+\alpha(\overline{\omega}-\epsilon_{0})
(1α)(ω¯+ϵ)+α(ω¯ϵ0)ω¯αϵ0+(1α)ϵ.\displaystyle~{}~{}\leq(1-\alpha)(\overline{\omega}+\epsilon)+\alpha(\overline{\omega}-\epsilon_{0})\leq\overline{\omega}-\alpha\epsilon_{0}+(1-\alpha)\epsilon.

Note that this upper bound also applies to the updated value of any normal node not in 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}), because such a node will use its own value in its update. Similarly, if node i𝒵2(kϵ,ϵ0)𝒩i\in\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0})\cap\mathcal{N} has the (f+1)(f+1)-reachable property, then xi[kϵ+1]ω¯+αϵ0(1α)ϵx_{i}[k_{\epsilon}+1]\geq\underline{\omega}+\alpha\epsilon_{0}-(1-\alpha)\epsilon. Again, any normal node not in 𝒵2(kϵ,ϵ0)\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0}) will have the same lower bound.

Next, consider the sets 𝒵1(kϵ+1,ϵ1)\mathcal{Z}_{1}(k_{\epsilon}+1,\epsilon_{1}) and 𝒵2(kϵ+1,ϵ1)\mathcal{Z}_{2}(k_{\epsilon}+1,\epsilon_{1}). By ϵ1<ϵ0\epsilon_{1}<\epsilon_{0}, these two sets are still disjoint. Since at least one of the normal nodes in 𝒵1(kϵ,ϵ0)\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0}) decreases at least to ω¯ϵ1\overline{\omega}-\epsilon_{1} (or below), or one of the nodes in 𝒵2(kϵ,ϵ0)\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0}) increases at least to ω¯+ϵ1\underline{\omega}+\epsilon_{1} (or above), it must hold |𝒵1(kϵ+1,ϵ1)𝒩|<|𝒵1(kϵ,ϵ0)𝒩|\left|\mathcal{Z}_{1}(k_{\epsilon}+1,\epsilon_{1})\cap\mathcal{N}\right|<\left|\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0})\cap\mathcal{N}\right|, |𝒵2(kϵ+1,ϵ1)𝒩|<|𝒵2(kϵ,ϵ0)𝒩|\left|\mathcal{Z}_{2}(k_{\epsilon}+1,\epsilon_{1})\cap\mathcal{N}\right|<\left|\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0})\cap\mathcal{N}\right|, or both. Recall that 0<ϵγ<ϵγ1ϵ00<\epsilon_{\gamma}<\epsilon_{\gamma-1}\leq\epsilon_{0}. As long as there are still normal nodes in 𝒵1(kϵ+γ,ϵγ)\mathcal{Z}_{1}(k_{\epsilon}+\gamma,\epsilon_{\gamma}) and/or 𝒵2(kϵ+γ,ϵγ)\mathcal{Z}_{2}(k_{\epsilon}+\gamma,\epsilon_{\gamma}), we can repeat the above analysis for time step kϵ+γk_{\epsilon}+\gamma, which will result in either |𝒵1(kϵ+γ,ϵγ)𝒩|<|𝒵1(kϵ+γ1,ϵγ1)𝒩|\left|\mathcal{Z}_{1}(k_{\epsilon}+\gamma,\epsilon_{\gamma})\cap\mathcal{N}\right|<\left|\mathcal{Z}_{1}(k_{\epsilon}+\gamma-1,\epsilon_{\gamma-1})\cap\mathcal{N}\right|, |𝒵2(kϵ+γ,ϵγ)𝒩|<|𝒵2(kϵ+γ1,ϵγ1)𝒩|\left|\mathcal{Z}_{2}(k_{\epsilon}+\gamma,\epsilon_{\gamma})\cap\mathcal{N}\right|<\left|\mathcal{Z}_{2}(k_{\epsilon}+\gamma-1,\epsilon_{\gamma-1})\cap\mathcal{N}\right|, or both.

Since |𝒵1(kϵ,ϵ0)𝒩|+|𝒵2(kϵ,ϵ0)𝒩|nN\left|\mathcal{Z}_{1}(k_{\epsilon},\epsilon_{0})\cap\mathcal{N}\right|+\left|\mathcal{Z}_{2}(k_{\epsilon},\epsilon_{0})\cap\mathcal{N}\right|\leq{n_{N}}, there must be some time step kϵ+Tk_{\epsilon}+T (with TnNT\leq{n_{N}}) such that either 𝒵1(kϵ+T,ϵT)𝒩\mathcal{Z}_{1}(k_{\epsilon}+T,\epsilon_{T})\cap\mathcal{N} or 𝒵2(kϵ+T,ϵT)𝒩\mathcal{Z}_{2}(k_{\epsilon}+T,\epsilon_{T})\cap\mathcal{N} is empty. In the former case, all normal nodes in the network at time step kϵ+Tk_{\epsilon}+T have values at most ω¯ϵT\overline{\omega}-\epsilon_{T}, while in the latter case all normal nodes at time step kϵ+Tk_{\epsilon}+T have values no less than ω¯+ϵT\underline{\omega}+\epsilon_{T}. By (8) and TnNT\leq n_{N}, it holds that ϵT>0\epsilon_{T}>0. Hence, we have contradiction to the fact that the largest value monotonically converges to ω¯\overline{\omega} (in the former case) or that the smallest value monotonically converges to ω¯\underline{\omega} (in the latter case). Hence, it must be the case that ϵ0=0\epsilon_{0}=0, proving that ω¯=ω¯\overline{\omega}=\underline{\omega}.

We emphasize that the graph condition based on the notion of robustness with ll hops is tight for our MW-MSR algorithm. Our notion captures the capability of agents to be influenced by the outside of the set in the multi-hop settings. We note that in [10], an idea similar to robustness is proposed, and based on it, a tight necessary and sufficient condition for Byzantine consensus using an MSR-type algorithm with multi-hop communication is provided. However, the focus there is on the Byzantine model and the condition is expressed in terms of the subgraph consisting of only the normal nodes. Part of the reason to focus on only the subgraph of normal nodes is that Byzantine nodes are more adversarial compared to malicious nodes as they can send different values to different neighbors. Hence, the subgraph of normal nodes has to be sufficiently robust to fight against the possible attacks. The condition there is an extension of the one for the one-hop case shown in [13]. Moreover, to meet the condition there, each node in 𝒢\mathcal{G} must have at least 2f+12f+1 incoming edges. This is different from the case for the malicious model studied in this paper, where at least 2f2f incoming edges are required. Further discussions on the minimum requirement for our algorithm to guarantee resilient consensus are given in Section 7.

6 Asynchronous Network

In this section, we analyze the MW-MSR algorithm under asynchronous updates with time delays in the communication among nodes.

We employ the control input taking account of possible delays in the values from the neighbors as

ui[k]=j𝒩ilaij[k]xjP[kτijP[k]],u_{i}[k]=\sum_{j\in\mathcal{N}_{i}^{l-}}a_{ij}[k]x_{j}^{P}[k-\tau_{ij}^{P}[k]], (9)

where xjP[k]x_{j}^{P}[k] denotes the value of node jj at time kk sent along path PP and τijP[k]+\tau_{ij}^{P}[k]\in\mathbb{Z}_{+} is the delay in this (j,i)(j,i)-path PP at time kk. The delays are time varying and may be different in each path, but we assume the common upper bound τ\tau on any normal path PP, over which all internal nodes are normal, as

0τijP[k]τ,j𝒩il,k+.0\leq\tau_{ij}^{P}[k]\leq\tau,\medspace j\in\mathcal{N}_{i}^{l-},\medspace k\in\mathbb{Z}_{+}. (10)

Hence, each normal node ii becomes aware of the value of each of its normal ll-hop neighbor jj on each normal (j,i)(j,i)-path PP at least once in τ\tau time steps, but possibly at different time instants [12]. Although we impose this bound on the delays for transmission of messages, the normal nodes need neither the value of this bound nor the information that whether a path PP is a normal one or not.

The structure of the asynchronous MW-MSR algorithm can be outlined as follows. At each time kk, each normal node ii chooses to update or not. If it chooses not to update, then it keeps its value as xi[k+1]=xi[k]x_{i}[k+1]=x_{i}[k]. Otherwise, it uses the most recently received values of all its ll-hop neighbors on each ll-hop path to update its value using the MW-MSR algorithm in Algorithm 1. Like the one-hop MSR algorithm, if node ii does not receive any value along some path PP originating from its ll-hop neighbor jj (i.e., the crash model), then node ii will take this value on path PP as an empty value and will discard this value when it applies the WM-MSR algorithm. As we discussed earlier in Section II-E, in the asynchronous case also, manipulating message paths is equivalent to manipulating message values only and hence can be disregarded in our analysis.

Let D[k]D[k] be a diagonal matrix whose iith entry is given by di[k]=j=1naij[k].d_{i}[k]=\sum_{j=1}^{n}a_{ij}[k]. Then, let the matrices Aγ[k]n×nA_{\gamma}[k]\in\mathbb{R}^{n\times n} for 0γτ0\leq\gamma\leq\tau and Lτ[k]n×(τ+1)nL_{\tau}[k]\in\mathbb{R}^{n\times(\tau+1)n} be given by

Aγ[k]={aij[k]ifijandτij[k]=γ,0otherwise,A_{\gamma}[k]=\left\{\begin{array}[]{lll}a_{ij}[k]&\textup{if}\thinspace i\neq j\thinspace\textup{and}\thinspace\tau_{ij}[k]=\gamma,\\ 0&\textup{otherwise,}\end{array}\right. (11)

and Lτ[k]=[D[k]A0[k]A1[k]Aτ[k]]L_{\tau}[k]=\Big{[}D[k]-A_{0}[k]\medspace-A_{1}[k]\medspace\cdots\medspace-A_{\tau}[k]\Big{]}, respectively. Note that the summation of each row of Lτ[k]L_{\tau}[k] is zero. The delay τij[k]\tau_{ij}[k] will be set to be one of the delays τijP[k]\tau_{ij}^{P}[k] corresponding to the normal paths as we discuss further later.

Now, the control input can be expressed as

uN[k]=LτN[k]z[k],uF[k]:arbitrary,\begin{array}[]{lll}u^{N}[k]=-L_{\tau}^{N}[k]z[k],\\ u^{F}[k]:\textup{arbitrary,}\end{array} (12)

where z[k]=[x[k]Tx[k1]Tx[kτ]T]Tz[k]=[x[k]^{T}x[k-1]^{T}\cdots x[k-\tau]^{T}]^{T} is a (τ+1)n(\tau+1)n-dimensional vector for k0k\geq 0 and LτN[k]L_{\tau}^{N}[k] is a matrix formed by the first nNn_{N} rows of Lτ[k]L_{\tau}[k]. Here, to simplify the discussion, we assume that z[0]z[0] consists of the given initial values of the agents. Then, the agent dynamics can be written as

x[k+1]=Γ[k]z[k]+[0InF]uF[k],x[k+1]=\Gamma[k]z[k]+\begin{bmatrix}0\\ I_{n_{F}}\end{bmatrix}u^{F}[k], (13)

where Γ[k]\Gamma[k] is an n×(τ+1)nn\times(\tau+1)n matrix given by Γ[k]=[In0][LτN[k]T0]T.\Gamma[k]=\begin{bmatrix}I_{n}&0\end{bmatrix}-\begin{bmatrix}L_{\tau}^{N}[k]^{T}&0\end{bmatrix}^{T}.

The main result of this section now follows. Here, the safety interval differs from the synchronous case and is given by

𝒮τ=[minzN[0],maxzN[0]].\mathcal{S}_{\tau}=\Big{[}\min z^{N}[0],\max z^{N}[0]\Big{]}. (14)
Theorem 6.1.

Consider a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) with ll-hop communication, where each normal node updates its value according to the asynchronous MW-MSR algorithm with parameter ff. Under the ff-total malicious model, resilient asymptotic consensus is achieved only if the underlying graph is (f+1,f+1)(f+1,f+1)-robust with ll hops. Moreover, if the underlying graph is (2f+1)(2f+1)-robust with ll hops, then resilient consensus is attained with the safety interval given by (14).

See the Appendix for the proof of this theorem.

Remark 6.2.

In comparison to the synchronous update case studied in the previous section, the graph condition to achieve resilient consensus under the asynchronous updates with delays is more restrictive. This is because when the nodes updates asynchronously, the normal nodes may not receive the same values from the malicious nodes, which creates a more adversarial situation for resilient consensus. Moreover, in the next section, in Lemma 7.7, we prove that under the ff-total model, a graph which is (2f+1)(2f+1)-robust with ll hops is also (f+1,f+1)(f+1,f+1)-robust with ll hops. For instance, the graph in Fig. 4 is 33-robust with 22 hops and hence (2,2)(2,2)-robust with 22 hops. Thus, as expected, the sufficient condition for the asynchronous algorithm guaranteeing resilient consensus is also sufficient for the synchronous algorithm.

Remark 6.3.

The difference in the network requirements discussed above for the synchronous and asynchronous algorithms is a consequence partly due to the deterministic nature in transmission times. In [8], it is shown that for an asynchronous algorithm with one-hop communication without delays, we can recover the tight necessary and sufficient network condition of the synchronous case, i.e., the graph to be (f+1,f+1)(f+1,f+1)-robust under the ff-total malicious model. It is interesting that this result requires randomization in agents’ communication instants whereas in the deterministic case, the sufficient graph condition remains to be (2f+1)(2f+1)-robustness, which coincides with the implication of Theorem 6.1. In the multi-hop setting, however, delays are critical and hence we do not pursue such results in this paper.

Refer to caption
Figure 4: The graph is not 22-robust with one hop, but it is 33-robust with 22 hops and (2,2)(2,2)-robust with 22 hops.

7 Discussions on Graph Robustness with Multi-hop Communication

In this section, we demonstrate some properties of graph robustness with ll hops, which generalize the properties of robustness with one hop in [9] when l=1l=1 for this new notion. Moreover, we provide the analysis of graph robustness with ll hops for the case where ll is sufficiently large. This corresponds to the case of unbounded path length.

7.1 Properties of Robustness with l Hops

As discussed earlier, our definition of robustness with ll hops is a generalization of the definition of robustness with one-hop communication from [9]. Here, we are interested in investigating how properties of robustness with the one-hop case can be extended to the multi-hop case. In what follows, we present a series of lemmas that analyze the generalized notion of robustness. Recall that robustness with ll hops is defined w.r.t. the given set \mathcal{F} satisfying the ff-total model, but we omit saying this when it is clear from the context in this section. Typically, we are interested in f=r1f=r-1 for rr-robustness.

The first result is simple, stating that (r,s)(r,s)-robustness with ll hops of a graph holds with smaller rr and ss.

Lemma 7.1.

If a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) is (r,s)(r,s)-robust with ll hops, then it is also (r,s)(r^{\prime},s^{\prime})-robust with ll hops when 0rrand 1ss0\leq r^{\prime}\leq r\ \text{and}\ 1\leq s^{\prime}\leq s.

In the second result, we show that the level of robustness of a given graph with ll hops does not decrease by adding edges to the graph nor by increasing the relay range ll.

Lemma 7.2.

Suppose that a directed subgraph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) of 𝒢=(𝒱,)\mathcal{G}^{\prime}=(\mathcal{V},\mathcal{E}^{\prime}) is (r,s)(r,s)-robust with ll hops, where \mathcal{E}\subseteq\mathcal{E}^{\prime}. Then 𝒢\mathcal{G}^{\prime} is (r,s)(r,s)-robust with ll hops. Moreover, 𝒢\mathcal{G} is (r,s)(r,s)-robust with ll^{\prime} hops, where lll^{\prime}\geq l.

The maximum robustness with ll hops for a graph consisting of nn nodes is the same as that with the one-hop case. The following lemma suggests that the bound n2f+1n\geq 2f+1 cannot be breached by introducing multi-hop communication to the MSR algorithms. This bound is dependent on the nature of the MSR algorithms, which cannot tolerate half or more of the agents to be adversarial.

Lemma 7.3.

No directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) on nn nodes is (n/2+1)(\lceil n/2\rceil+1)-robust with ll hops. Moreover, the complete graph 𝒦n\mathcal{K}_{n} is (n/2,s)(\lceil n/2\rceil,s)-robust with ll hops for 1sn1\leq s\leq n.

Proof 7.4.

We consider the nontrivial case with n3n\geq 3. Then pick 𝒱1\mathcal{V}_{1} and 𝒱2\mathcal{V}_{2} by taking any bipartition of 𝒱\mathcal{V} (i.e., 𝒱1𝒱2=\mathcal{V}_{1}\cap\mathcal{V}_{2}=\emptyset and 𝒱1𝒱2=𝒱\mathcal{V}_{1}\cup\mathcal{V}_{2}=\mathcal{V}) such that |𝒱1|=n/2|\mathcal{V}_{1}|=\lceil n/2\rceil and |𝒱2|=n/2|\mathcal{V}_{2}|=\lfloor n/2\rfloor. Neither 𝒱1\mathcal{V}_{1} nor 𝒱2\mathcal{V}_{2} has n/2+1\lceil n/2\rceil+1 nodes; thus, neither one has a node being (n/2+1)(\lceil n/2\rceil+1)-reachable with ll-hop communication. Hence, 𝒢\mathcal{G} is not (n/2+1)(\lceil n/2\rceil+1)-robust with ll hops.

The proof for the complete graph case follows an analysis similar to the one for the one-hop case [9].

The following lemma exposes that the notion of (r,s)(r,s)-robust graphs has a more complicated structure in the relation between the two parameters rr and ss.

Lemma 7.5.

If a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) is (r,s)(r,s)-robust with ll hops under the ff-total model, then it is also (r1,s+1)(r-1,s+1)-robust with ll hops under the ff-total model.

Proof 7.6.

Consider any nonempty disjoint subsets 𝒱1,𝒱2𝒱\mathcal{V}_{1},\mathcal{V}_{2}\subset\mathcal{V}. If |𝒵𝒱ar|=|𝒱a||\mathcal{Z}_{\mathcal{V}_{a}}^{r}|=|\mathcal{V}_{a}| or |𝒵𝒱ar1|=|𝒱a||\mathcal{Z}_{\mathcal{V}_{a}}^{r-1}|=|\mathcal{V}_{a}| for a=1,2a=1,2, then this pair of subsets satisfies conditions 1) or 2) of (r1,s+1)(r-1,s+1)-robustness with ll hops. Thus, assume |𝒵𝒱ar|<|𝒱a||\mathcal{Z}_{\mathcal{V}_{a}}^{r}|<|\mathcal{V}_{a}| and |𝒵𝒱ar1|<|𝒱a||\mathcal{Z}_{\mathcal{V}_{a}}^{r-1}|<|\mathcal{V}_{a}| for a=1,2a=1,2. Then condition 3) for (r,s)(r,s)-robustness with ll hops must be satisfied, i.e., |𝒵𝒱1r|+|𝒵𝒱2r|s|\mathcal{Z}_{\mathcal{V}_{1}}^{r}|+|\mathcal{Z}_{\mathcal{V}_{2}}^{r}|\geq s.

Since s1s\geq 1, at least one of 𝒵𝒱1r\mathcal{Z}_{\mathcal{V}_{1}}^{r}, 𝒵𝒱2r\mathcal{Z}_{\mathcal{V}_{2}}^{r} is nonempty. Suppose that 𝒵𝒱1r\mathcal{Z}_{\mathcal{V}_{1}}^{r} is nonempty. Then, we choose i𝒵𝒱1ri\in\mathcal{Z}_{\mathcal{V}_{1}}^{r}. Pick the new pair of nonempty disjoint subsets as 𝒱1=𝒱1{i}\mathcal{V}_{1}^{\prime}=\mathcal{V}_{1}\setminus\{i\} and 𝒱2=𝒱2\mathcal{V}_{2}^{\prime}=\mathcal{V}_{2}. Observe that if j𝒵𝒱1rj\in\mathcal{Z}_{\mathcal{V}_{1}^{\prime}}^{r} then j𝒵𝒱1r1j\in\mathcal{Z}_{\mathcal{V}_{1}}^{r-1}. Because node ii is the only difference between 𝒱1\mathcal{V}_{1}^{\prime} and 𝒱1\mathcal{V}_{1}, and node ii can only be part of one independent path whose destination is node jj. Consequently, even if node ii is on one independent path whose destination is node jj, node jj still has the (r1)(r-1)-reachable property, i.e., it has at least r1r-1 other independent paths of at most ll hops originating from nodes outside 𝒱1\mathcal{V}_{1} and these paths do not have any internal nodes from set \mathcal{F}. Then, by adding i𝒵𝒱1r𝒵𝒱1r1i\in\mathcal{Z}_{\mathcal{V}_{1}}^{r}\subseteq\mathcal{Z}_{\mathcal{V}_{1}}^{r-1} back into the set 𝒱1\mathcal{V}_{1}, we have

|𝒵𝒱1r1||𝒵𝒱1r|+1.|\mathcal{Z}_{\mathcal{V}_{1}}^{r-1}|\geq|\mathcal{Z}_{\mathcal{V}_{1}^{\prime}}^{r}|+1. (15)

Moreover, |𝒵𝒱1r|<|𝒱1||\mathcal{Z}_{\mathcal{V}_{1}^{\prime}}^{r}|<|\mathcal{V}_{1}^{\prime}| and |𝒵𝒱2r|<|𝒱2||\mathcal{Z}_{\mathcal{V}_{2}^{\prime}}^{r}|<|\mathcal{V}_{2}^{\prime}| (since 𝒱2=𝒱2\mathcal{V}_{2}^{\prime}=\mathcal{V}_{2}). The first inequality holds because if |𝒵𝒱1r|=|𝒱1||\mathcal{Z}_{\mathcal{V}_{1}^{\prime}}^{r}|=|\mathcal{V}_{1}^{\prime}| and from the observation we just proved (if j𝒵𝒱1rj\in\mathcal{Z}_{\mathcal{V}_{1}^{\prime}}^{r} then j𝒵𝒱1r1j\in\mathcal{Z}_{\mathcal{V}_{1}}^{r-1}), we have |𝒵𝒱1r1|=|𝒱1||\mathcal{Z}_{\mathcal{V}_{1}}^{r-1}|=|\mathcal{V}_{1}|, leading us to a contradiction.

Therefore, for nonempty disjoint subsets 𝒱1,𝒱2\mathcal{V}_{1}^{\prime},\mathcal{V}_{2}^{\prime}, it must hold that |𝒵𝒱1r|+|𝒵𝒱2r|s|\mathcal{Z}_{\mathcal{V}_{1}^{\prime}}^{r}|+|\mathcal{Z}_{\mathcal{V}_{2}^{\prime}}^{r}|\geq s. Together with (15), we have

|𝒵𝒱1r1|+|𝒵𝒱2r1||𝒵𝒱1r|+|𝒵𝒱2r|+1s+1,|\mathcal{Z}_{\mathcal{V}_{1}}^{r-1}|+|\mathcal{Z}_{\mathcal{V}_{2}}^{r-1}|\geq|\mathcal{Z}_{\mathcal{V}_{1}^{\prime}}^{r}|+|\mathcal{Z}_{\mathcal{V}_{2}^{\prime}}^{r}|+1\geq s+1,

suggesting that 𝒢\mathcal{G} is (r1,s+1)(r-1,s+1)-robust with ll hops under the ff-total model.

From this result, we can directly derive the following corollary, which indicates that if a graph is (2f+1)(2f+1)-robust with ll hops, then it is also (f+1,f+1)(f+1,f+1)-robust with ll hops.

Corollary 7.7.

If a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) is (r+s1)(r+s-1)-robust with ll hops, where 1r+s1n/21\leq r+s-1\leq\lceil n/2\rceil, then 𝒢\mathcal{G} is (r,s)(r,s)-robust with ll hops.

Similar to the one-hop case, robustness with ll hops can guarantee a certain level of graph connectivity and a minimum in-degree of the graph. The proof for the connectivity result is trivial and hence omitted.

Lemma 7.8.

If a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) is rr-robust with ll hops, then 𝒢\mathcal{G} is at least rr-connected.

Lemma 7.9.

If a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) is (r,s)(r,s)-robust with ll hops under the (r1)(r-1)-total model, where 0rn/20\leq r\leq\lceil n/2\rceil and 1sn1\leq s\leq n, then 𝒢\mathcal{G} has the minimum in-degree δ(𝒢)\delta(\mathcal{G}) as

δ(𝒢){r+s1ifs<r,2r2ifsr.\delta(\mathcal{G})\geq\left\{\begin{array}[]{lll}r+s-1&\textup{if}\ s<r,\\ 2r-2&\textup{if}\ s\geq r.\end{array}\right.
Proof 7.10.

The case for n2n\leq 2 and r1r\leq 1 is trivial. Consider the case for n3n\geq 3 and 2rn/22\leq r\leq\lceil n/2\rceil. Fix node i𝒱i\in\mathcal{V}. Choose 𝒱1={i}\mathcal{V}_{1}=\{i\} and 𝒱2=𝒱𝒱1\mathcal{V}_{2}=\mathcal{V}\setminus\mathcal{V}_{1}. Then, |𝒵𝒱2r|=0|\mathcal{Z}_{\mathcal{V}_{2}}^{r}|=0 and |𝒵𝒱1r|=|𝒱1||\mathcal{Z}_{\mathcal{V}_{1}}^{r}|=|\mathcal{V}_{1}|. Hence, node ii must have at least rr independent paths from outside and the number of the in-neighbors of node ii should be |𝒩i|r|\mathcal{N}_{i}^{-}|\geq r. (Note that the malicious nodes can be the source nodes of these independent paths.)

When s<rs<r, form 𝒱1\mathcal{V}_{1} by choosing s1s-1 in-neighbors of node ii along with node ii itself. Then, choose 𝒱2=𝒱𝒱1\mathcal{V}_{2}=\mathcal{V}\setminus\mathcal{V}_{1}. Since |𝒱1|=s<r|\mathcal{V}_{1}|=s<r, then, |𝒵𝒱2r|=0|\mathcal{Z}_{\mathcal{V}_{2}}^{r}|=0 and |𝒵𝒱1r|=|𝒱1||\mathcal{Z}_{\mathcal{V}_{1}}^{r}|=|\mathcal{V}_{1}|. The worst case is that the s1s-1 in-neighbors of node ii are all malicious, node ii should have at least rr independent paths from outside, and these paths do not contain any malicious nodes as internal nodes. This implies that node ii has additional rr in-neighbors outside of 𝒱1\mathcal{V}_{1}, thereby guaranteeing |𝒩i|r+s1|\mathcal{N}_{i}^{-}|\geq r+s-1.

When srs\geq r, form 𝒱1\mathcal{V}_{1} by choosing r2r-2 in-neighbors of node ii along with node ii itself. Then, choose 𝒱2=𝒱𝒱1\mathcal{V}_{2}=\mathcal{V}\setminus\mathcal{V}_{1}. Since |𝒱1|<r|\mathcal{V}_{1}|<r and srs\geq r, we have |𝒵𝒱2r|=0|\mathcal{Z}_{\mathcal{V}_{2}}^{r}|=0 and |𝒵𝒱1r|=|𝒱1||\mathcal{Z}_{\mathcal{V}_{1}}^{r}|=|\mathcal{V}_{1}|. Consider the worst case that the r2r-2 in-neighbors of node ii are all malicious. It must be that node ii has additional rr in-neighbors outside of 𝒱1\mathcal{V}_{1}, thereby guaranteeing |𝒩i|2r2|\mathcal{N}_{i}^{-}|\geq 2r-2. Since we choose i𝒱i\in\mathcal{V} arbitrarily, we have proved the bound for δ(𝒢)\delta(\mathcal{G}).

Here, we have extended the proof in [9] to the multi-hop case. From Lemma 7.9, we conclude that 𝒢\mathcal{G} should have the minimum in-degree no less than 2f2f to guarantee resilient consensus using the MW-MSR algorithm under the ff-total malicious model. This holds since the underlying graph 𝒢\mathcal{G} is at least (f+1,f+1)(f+1,f+1)-robust with ll hops for achieving resilient consensus. For MSR algorithms, nodes with 2f2f in-neighbors may not use any values from neighbors, which may appear problematic especially if there are multiple such nodes. However, there are examples such as cycle graphs333A cycle graph is an undirected graph consisting of only a single cycle. satisfying (f+1,f+1)(f+1,f+1)-robust with ll hops, while every node in cycle graphs has in-degree as 2f2f. Detailed analysis is given in the next subsection.

7.2 The Case of Unbounded Path Length

In this subsection, we discuss the relation of the graph conditions used in this paper and in the recent work [30]. The authors there studied the Byzantine binary consensus under the local broadcast model, which is essentially equivalent to the ff-total malicious mode studied in the current paper. The proposed algorithm in [30] is based on a non-iterative flooding algorithm, where nodes must relay their values over the entire network along with the path information. This model corresponds to the case of unbounded path length in our work, i.e. lll\geq l^{*}, where ll^{*} is the longest cycle-free path length of the network. Moreover, they propose a tight necessary and sufficient graph condition for their algorithm to achieve binary consensus under synchronous updates. Our aim in this part of the paper is to establish that our graph condition is equivalent to theirs for the case of unbounded path length (lll\geq l^{*}). Further, we will highlight that to achieve the same tolerance as the algorithm in [30], our algorithm does not in general require ll^{*}-hop communication necessarily for general graphs.

To show the equivalence between the two graph conditions, we introduce some graph notions from [30]. There, normal nodes update the states based on a modified certified propagation algorithm [40], i.e., when a normal node receives f+1f+1 same binary values from different paths excluding a suspicious set \mathcal{F}, it commits its value to this value. Hence, their graph notion is closely related to the partitions of sets 𝒱\mathcal{V} and \mathcal{F}.

Definition 7.11.

For disjoint node sets 𝒳,𝒴\mathcal{X},\mathcal{Y}, we say 𝒳𝒴\mathcal{X}\rightarrow\mathcal{Y} if and only if set 𝒳\mathcal{X} contains at least f+1f+1 distinct incoming neighbors of 𝒴\mathcal{Y}, i.e., |{i:(i,j),i𝒳,j𝒴}|>f|\{i:(i,j)\in\mathcal{E},i\in\mathcal{X},j\in\mathcal{Y}\}|>f. Denote 𝒳↛𝒴\mathcal{X}\not\rightarrow\mathcal{Y} when 𝒳𝒴\mathcal{X}\rightarrow\mathcal{Y} is not true.

Definition 7.12.

For disjoint node sets 𝒳,𝒴\mathcal{X},\mathcal{Y} and for set \mathcal{F}, we say 𝒳𝒴\mathcal{X}\stackrel{{\scriptstyle\mathcal{F}}}{{\rightsquigarrow}}\mathcal{Y} if and only if for every node u𝒴u\in\mathcal{Y}, there exist at least f+1f+1 disjoint 𝒳u\mathcal{X}u-paths that have only uu in common and none of them contains any internal node from the set \mathcal{F}. Denote 𝒳↝̸𝒴\mathcal{X}\stackrel{{\scriptstyle\mathcal{F}}}{{\not\rightsquigarrow}}\mathcal{Y} when 𝒳𝒴\mathcal{X}\stackrel{{\scriptstyle\mathcal{F}}}{{\rightsquigarrow}}\mathcal{Y} is not true.

Two graph notions are introduced next, called conditions NC and SC. They are known to be equivalent [30].

Definition 7.13.

(Condition NC) Given a graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}), condition NC is said to hold if for every partition ,𝒞,\mathcal{L},\mathcal{C},\mathcal{R} of 𝒱\mathcal{V}, and for every set \mathcal{F} with ||f|\mathcal{F}|\leq f, where both \mathcal{L}\setminus\mathcal{F} and \mathcal{R}\setminus\mathcal{F} are non-empty, we have that either 𝒞\mathcal{R}\cup\mathcal{C}\rightarrow\mathcal{L}\setminus\mathcal{F} or 𝒞\mathcal{L}\cup\mathcal{C}\rightarrow\mathcal{R}\setminus\mathcal{F}.

(Condition SC) Given a graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}), condition SC is said to hold if for every partition ,\mathcal{L},\mathcal{R} of 𝒱\mathcal{V}, and for every set \mathcal{F} with ||f|\mathcal{F}|\leq f, where both \mathcal{L}\setminus\mathcal{F} and \mathcal{R}\setminus\mathcal{F} are non-empty, we have that either \mathcal{L}\stackrel{{\scriptstyle\mathcal{F}}}{{\rightsquigarrow}}\mathcal{R}\setminus\mathcal{F} or \mathcal{R}\stackrel{{\scriptstyle\mathcal{F}}}{{\rightsquigarrow}}\mathcal{L}\setminus\mathcal{F}.

We are now ready to show that condition NC (and hence condition SC) is equivalent to our robust graph notion with multi-hop communication used in Theorem 5.1.

Proposition 7.14.

Consider a directed graph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}) with ll-hop communication where lll\geq l^{*}. The graph 𝒢\mathcal{G} is (f+1,f+1)(f+1,f+1)-robust with ll hops if and only if condition NC holds.

Proof 7.15.

We first show the only if part. Since the graph is (f+1,f+1)(f+1,f+1)-robust with ll hops under the ff-total model, at least one of the three conditions in Definition 4.2 holds. For every partition ,\mathcal{L},\mathcal{R} of 𝒱\mathcal{V}, and for every set ||f|\mathcal{F}|\leq f, where both \mathcal{L}\setminus\mathcal{F} and \mathcal{R}\setminus\mathcal{F} are non-empty, we conclude that there is at least one normal node ii in the union of \mathcal{L} and \mathcal{R} that has f+1f+1 independent paths from outside and these paths do not contain any internal nodes in \mathcal{F}. This can be seen in the proof of Theorem 5.1. Suppose that node ii\in\mathcal{L} has this property. For each independent path, there exists at least one edge that goes from the outside of \mathcal{L} to a node in \mathcal{L}, and thus, 𝒞\mathcal{R}\cup\mathcal{C}\rightarrow\mathcal{L}\setminus\mathcal{F}. The case for ii\in\mathcal{R} can be proved similarly.

Next, we show the if part by contradiction. Suppose that 𝒢\mathcal{G} is not (f+1,f+1)(f+1,f+1)-robust with ll hops. Then, none of the three conditions in Definition 4.2 holds. For every partition ,\mathcal{L},\mathcal{R} of 𝒱\mathcal{V}, and for every set ||f|\mathcal{F}|\leq f, where both \mathcal{L}\setminus\mathcal{F} and \mathcal{R}\setminus\mathcal{F} are non-empty, we conclude that all the normal nodes in the union of \mathcal{L} and \mathcal{R} have at most ff independent paths from outside where these paths do not contain any internal nodes in \mathcal{F}. Hence, ↝̸\mathcal{L}\stackrel{{\scriptstyle\mathcal{F}}}{{\not\rightsquigarrow}}\mathcal{R}\setminus\mathcal{F} and ↝̸\mathcal{R}\stackrel{{\scriptstyle\mathcal{F}}}{{\not\rightsquigarrow}}\mathcal{L}\setminus\mathcal{F} (i.e., condition SC does not hold), and thus we have contradiction.

Finally, since condition SC and condition NC are equivalent, we have proved that condition NC implies the (f+1,f+1)(f+1,f+1)-robustness with ll hops.

Although our condition coincides with those in [30] when lll\geq l^{*}, we note that the maximum robustness of a given graph does not require lll\geq l^{*} necessarily. That is, for a given graph under the ff-total model, our algorithm may not require ll^{*}-hop communication to get the same tolerance as the algorithm using ll^{*}-hop communication in [30]. We illustrate this fact by presenting the examples of cycle graphs.

Refer to caption
Figure 5: Illustration for cycle graphs.

From the example graph in Fig. 3(a), we can see that for any cycle graph, the following lemma holds. This indicates that resilient consensus is guaranteed using the MW-MSR algorithm in such graphs when one node behaves maliciously. In [30], it is reported that a cycle graph can tolerate one malicious node, but their algorithm uses the ll^{*}-hop communication. In this respect, as the following lemma suggests, our algorithm is efficient by exploiting the ability of the MW-MSR algorithm and the graph condition is tighter than the one in [30]. Moreover, note that a cycle graph is 2-connected, which is the minimum connectivity requirement for any MSR-based algorithm to guarantee resilient consensus for f=1f=1.

Lemma 7.16.

The cycle graph 𝒞n\mathcal{C}_{n} with n>2n>2 nodes is (2,2)(2,2)-robust with l/2\lceil l^{*}/2\rceil hops under the 11-total model.

Proof 7.17.

We need to show that for any node partition 𝒱1\mathcal{V}_{1}, 𝒱2\mathcal{V}_{2} of 𝒱\mathcal{V}, at least one of the conditions for (2,2)(2,2)-robustness with ll hops holds. Let \mathcal{F} be a set of a single node, i.e., ={m1}\mathcal{F}=\{m_{1}\} (satisfying the 1-total model). We first select a single node as set 𝒱1\mathcal{V}_{1}. Then, for any set \mathcal{F} and for any set 𝒱2\mathcal{V}_{2}, condition 1) for (2,2)(2,2)-robustness with ll hops holds. (The case is similar when we select non-neighboring nodes as set 𝒱1\mathcal{V}_{1}.) Second, we select two neighboring nodes as set 𝒱1\mathcal{V}_{1}. If node m1𝒱1m_{1}\notin\mathcal{V}_{1}, then condition 1) for (2,2)(2,2)-robustness with 2 hops holds. If node m1𝒱1m_{1}\in\mathcal{V}_{1}, then node m1m_{1} has 2 independent 2-hop paths originating from outside. To meet the conditions for (2,2)(2,2)-robustness with ll hops, we need to find another node having this property in 𝒱2\mathcal{V}_{2} (see the illustration in Fig. 5). The worst case is when all the remaining nodes are in 𝒱2\mathcal{V}_{2}. Then the middle node in 𝒱2\mathcal{V}_{2} has 2 shortest paths originating from outside, which are of length l/2\lceil l^{*}/2\rceil hops.

We can continue this process and select three neighboring nodes as set 𝒱1\mathcal{V}_{1}. We can follow an analysis as above: If node m1𝒱1m_{1}\in\mathcal{V}_{1} and all the remaining nodes are in 𝒱2\mathcal{V}_{2}, then the middle node in 𝒱2\mathcal{V}_{2} has 2 shortest paths originating from outside, which are shorter than the length l/2\lceil l^{*}/2\rceil hops. This process can be continued until we switch sets 𝒱1\mathcal{V}_{1} and 𝒱2\mathcal{V}_{2}. Hence, we conclude that the cycle graph 𝒞n\mathcal{C}_{n} is (2,2)(2,2)-robust with l/2\lceil l^{*}/2\rceil hops.

8 Numerical Examples

In this section, we conduct numerical simulations over networks using both synchronous and asynchronous versions of the proposed MW-MSR algorithm to verify their effectiveness.

Refer to caption
Figure 6: Time responses of the synchronous one-hop W-MSR algorithm.
Refer to caption
Figure 7: Time responses of the synchronous two-hop MW-MSR algorithm.
Refer to caption
Figure 8: Time responses of the synchronous one-hop W-MSR algorithm.
Refer to caption
(a) The states of all nodes.
Refer to caption
(b) Consensus error.
Figure 9: Time responses of the synchronous two-hop MW-MSR algorithm.

8.1 Synchronous MW-MSR Algorithm

In this part, we conduct simulations for the synchronous MW-MSR algorithm. Consider the undirected network in Fig. 3(a) with f=1f=1. Let the initial states be x[0]=[1 2 4 6]Tx[0]=[1\ 2\ 4\ 6]^{T}. This graph is not (2,2)(2,2)-robust with one hop, and hence, is not robust enough to tolerate f=1f=1 using the conventional one-hop W-MSR algorithm. Here we set node 1 to be malicious and let the value of node 1 evolve based on the sine function w.r.t. time. Then, normal nodes update their values using the one-hop W-MSR algorithm. The results are given in Fig. 6, and resilient consensus among normal nodes is not achieved.

Next, consider the two-hop case for this graph. For malicious node 1, we assume that it does not only manipulate its own value as in the one-hop case, but also relays false information. Specifically, when node 1 receives a message from node 4 and relays the value x4[k]x_{4}[k] to node 2, it manipulates this value based on the sine function w.r.t. time. Similarly, when node 1 receives a message from node 2 and relays the value x2[k]x_{2}[k] to node 4, it manipulates this value to a fixed value of 0.5. Then, we observe that resilient consensus is achieved as shown in Fig. 7.

8.2 Asynchronous MW-MSR Algorithm

In this part, we conduct simulations for the asynchronous MW-MSR algorithm. Consider the directed network in Fig. 4 with f=1f=1. Let the nodes take initial states as x[0]=[3 5 1 7 3 9]Tx[0]=[3\ 5\ 1\ 7\ 3\ 9]^{T}. This graph is not 22-robust with one hop (e.g., consider the sets {1,3,5}\{1,3,5\} and {2,4,6}\{2,4,6\}), and hence, is not robust enough to tolerate f=1f=1 using the one-hop W-MSR algorithm. Here, we set node 1 to be malicious and assume that the value of node 1 evolves based on the sine function w.r.t. time. Then, we apply the one-hop W-MSR algorithm and observe that resilient consensus among normal nodes is not achieved as shown in Fig. 8.

Next, consider the two-hop case for this graph. It becomes 33-robust with 22 hops, and hence, it is also (2,2)(2,2)-robust with 22 hops as Corollary 7.7 indicates. Therefore, in the two-hop case, it can tolerate one malicious node under both synchronous and asynchronous updates. For malicious node 1, we assume that it does not only manipulate its own value as in the one-hop case, but also relays false information. Specifically, when node 1 receives a message from node 3 and relays the value x3[k]x_{3}[k] to its other neighbors, it manipulates this value to a fixed value of 0.5. Similarly, when node 1 receives a message from node 6 and relays the value x6[k]x_{6}[k] to other neighbors, it manipulates this value to a fixed value of 9.5. Additionally, when node 1 receives a message from node 5 and relays the value x5[k]x_{5}[k] to other neighbors, it manipulates this value based on the sine function w.r.t. time. In Fig. 9, we plot the consensus error given by Δx0[k]=maxxN[k]minxN[k]\Delta x_{0}[k]=\max x^{N}[k]-\min x^{N}[k] and observe that resilient consensus is achieved.

Lastly, we examine the two-hop algorithm under asynchronous updates with delays. We consider the same attack, but let each normal node update in a periodic manner. Specifically, nodes 2, 3, 4, 5, and 6 update in every 1, 5, 4, 3, and 2 steps, respectively. The delays for the messages from one-hop neighbors and two-hop neighbors are set as 0 and 1 step, respectively. Fig. 10 shows the states as well as the consensus error given by Δxτ[k]=maxzN[k]minzN[k]\Delta x_{\tau}[k]=\max z^{N}[k]-\min z^{N}[k]. It indicates that consensus is attained despite the malicious attacks. Note that in this situation, we can only guarantee the nonincreasing property of Δxτ[k]\Delta x_{\tau}[k] (with τ=5\tau=5). Through these simulations, we have verified the effectiveness of the MW-MSR algorithms to achieve resilient consensus in small-scale networks.

Refer to caption
(a) The states of all nodes.
Refer to caption
(b) Consensus error.
Figure 10: Time responses of the asynchronous two-hop MW-MSR algorithm.

8.3 Simulations in Large Wireless Sensor Networks

In this part of the simulations, we create a WSN composed of 100 nodes located in a grid structure as shown in Fig. 11. Let the nodes take indices 0,1,,990,1,\dots,99 and the coordinate of node ii is (imod10,i10)(i\mod 10,\lfloor\frac{i}{10}\rfloor). Each node can communicate only with the nodes located within the communication radius of rr. Once rr is determined, the topology of the network is formed. Then we apply the one-hop, two-hop, and three-hop MW-MSR algorithms to the network. Recall that ff denotes the maximum number of malicious nodes in the network, and we increase ff from 0 to 11 by selecting the malicious nodes with indices in the order of 32,34,36,38,43,62,64,66,68,74,1432,34,36,38,43,62,64,66,68,74,14.

Refer to caption
Figure 11: The 100-node sensor network. The red nodes are set as malicious one by one as ff increases up to 11.

Here, we examine how the network connectivity affects the performance of the MW-MSR algorithms with different hops. Using different values for the number of malicious agents ff and the communication radius rr, the results of the one-hop algorithm are presented in Fig. 12(a). For each ff and each rr (corresponding to one cell in the figure), we compute the success rate of the algorithm to achieve resilient consensus over 50 Monte Carlo runs with randomly chosen initial values (within [0, 100]) of the normal agents for each run. The malicious nodes take values based on sine functions w.r.t. time. Similarly, we also conduct simulations for the two-hop and the three-hop algorithms and the results are given in Figs. 12(b) and (c), respectively.

One can see that by increasing the number of hops ll, the success rate of the algorithm to achieve resilient consensus increases almost for every value of ff. Such improvement is especially significant when f6f\leq 6 and r3r\leq 3. This verifies our intuition as well as theoretical findings that graph robustness increases as ll increases. However, the difference between the results for the two-hop and the three-hop algorithms is somewhat minor. One reason is that the maximum robustness under the ff-total model of a given graph is bounded by the minimum in-degree 2f2f. This may indicate that the two-hop communication for this graph already reaches the number of hops for the maximum graph robustness.

Refer to caption
(a) One-hop algorithm.
Refer to caption
(b) Two-hop algorithm.
Refer to caption
(c) Three-hop algorithm.
Figure 12: Success rate of the MW-MSR algorithm.
Refer to caption
(a) Consensus error for f=0,r=1.2f=0,r=1.2.
Refer to caption
(b) Consensus error for f=1,r=1.2f=1,r=1.2.
Refer to caption
(c) Consensus error for f=9,r=3.1f=9,r=3.1.
Figure 13: Consensus error of the MW-MSR algorithm.

In these simulations, the success rate for reaching consensus is determined by the level of consensus error at time k=70k=70. If the consensus error is below the threshold c=1c=1, then the run is considered as a success. Hence, if the consensus process is very slow, it may be considered as a failure. For example, observe that for the case of f=0f=0 (i.e., with no attacks) the success rate increases with larger r1.5r\leq 1.5 while the network is connected as long as r>1r>1.

We should remark that the process of consensus forming can be accelerated by increasing the number of hops, as discussed in [32] for the fault-free case. This can be clearly seen in all plots in Fig. 13, presenting the time responses of the consensus errors for several cases of ff and rr, where Δx1,Δx2\Delta x1,\Delta x2 and Δx3\Delta x3 stand for the consensus errors for the one-hop, two-hop, and three-hop algorithms, respectively. Based on these examples, we conclude that by introducing multi-hop communication to the MSR algorithms, it does not only improve the robustness of the network but also accelerates the convergence in consensus forming even in adversarial environments.

9 Conclusion

In this paper, we have investigated the resilient consensus problem when multi-hop communication is available. We have proposed generalized versions of MSR algorithms to correctly use the additional values received from multi-hop neighbors. Moreover, we have fully characterized the network requirement for the algorithms in terms of robustness with ll hops. By introducing multi-hop communication, the convergence of the resilient consensus process can be accelerated. Furthermore, it provides an effective way to enhance robustness of networks without increasing physical communication links. In future works, we intend to extend our algorithms to the asynchronous Byzantine consensus problem using multi-hop communication with a fixed number of hops.

\appendices

Appendix

Proof of Theorem 6.1

Proof 9.1.

(Necessity) Since the synchronous algorithm is a special case of the asynchronous algorithm, the necessary condition in Theorem 5.1 also holds here.

(Sufficiency) First, we show the safety condition. For k=0k=0, by the assumption on z[0]z[0], it holds zN[0]𝒮τz^{N}[0]\in\mathcal{S}_{\tau}, and thus xi[0]𝒮τ,i𝒩x_{i}[0]\in\mathcal{S}_{\tau},\forall i\in\mathcal{N}. Next, for k0k\geq 0, let x¯τN[k]\overline{x}^{N}_{\tau}[k] and x¯τN[k]\underline{x}^{N}_{\tau}[k] be the largest value and the smallest value, respectively, of the normal agents from time k,k1,,kτk,k-1,\dots,k-\tau. That is,

x¯τN[k]=max(xN[k],xN[k1],,xN[kτ]),x¯τN[k]=min(xN[k],xN[k1],,xN[kτ]).\begin{array}[]{lll}\overline{x}^{N}_{\tau}[k]=\max\left(x^{N}[k],x^{N}[k-1],\dots,x^{N}[k-\tau]\right),\\ \underline{x}^{N}_{\tau}[k]=\min\left(x^{N}[k],x^{N}[k-1],\dots,x^{N}[k-\tau]\right).\end{array} (16)

Then we prove that x¯τN[k]\overline{x}^{N}_{\tau}[k] is a nonincreasing function of k0k\geq 0. By (13), at time k0k\geq 0, each normal agent updates its value based on a convex combination of the neighbors’ values from kk to kτk-\tau. Moreover, the values outside of the interval determined by the normal agents’ values [x¯τN[k],x¯τN[k]][\underline{x}^{N}_{\tau}[k],\overline{x}^{N}_{\tau}[k]] will be ignored by step 2 of the MW-MSR algorithm. This is because in this step, node ii will remove the largest sized subsets of large and small values that can be manipulated by at most ff nodes within ll hops. Hence, we obtain xi[k+1]max(xN[k],xN[k1],,xN[kτ])x_{i}[k+1]\leq\max\left(x^{N}[k],x^{N}[k-1],\dots,x^{N}[k-\tau]\right) for any i𝒩i\in\mathcal{N}. We also have

xi[k]\displaystyle x_{i}[k] max(xN[k],xN[k1],,xN[kτ]),\displaystyle\leq\max\left(x^{N}[k],x^{N}[k-1],\dots,x^{N}[k-\tau]\right),
xi[k1]\displaystyle x_{i}[k-1] max(xN[k],xN[k1],,xN[kτ]),\displaystyle\leq\max\left(x^{N}[k],x^{N}[k-1],\dots,x^{N}[k-\tau]\right),
\displaystyle\vdots
xi[k+1τ]\displaystyle x_{i}[k+1-\tau] max(xN[k],xN[k1],,xN[kτ])\displaystyle\leq\max\left(x^{N}[k],x^{N}[k-1],\dots,x^{N}[k-\tau]\right)

for any i𝒩i\in\mathcal{N}. Therefore, x¯τN[k]\overline{x}^{N}_{\tau}[k] is nonincreasing in time as

x¯τN\displaystyle\overline{x}^{N}_{\tau} [k+1]=max(xN[k+1],xN[k],,xN[k+1τ])\displaystyle[k+1]=\max\left(x^{N}[k+1],x^{N}[k],\dots,x^{N}[k+1-\tau]\right)
max(xN[k],xN[k1],,xN[kτ])=x¯τN[k].\displaystyle\leq\max\left(x^{N}[k],x^{N}[k-1],\dots,x^{N}[k-\tau]\right)=\overline{x}^{N}_{\tau}[k].

We can similarly prove that x¯τN[k]\underline{x}^{N}_{\tau}[k] is nondecreasing in time. This indicates that for k0k\geq 0, we have xi[k]𝒮τx_{i}[k]\in\mathcal{S}_{\tau}, i𝒩\forall i\in\mathcal{N}. Thus, we have shown the safety condition.

Next, we show the convergence. As shown above, x¯τN[k]\overline{x}^{N}_{\tau}[k] and x¯τN[k]\underline{x}^{N}_{\tau}[k] are monotonically decreasing and increasing, respectively, and moreover bounded. Thus, both of their limits exist and are denoted by ω¯τ\overline{\omega}_{\tau} and ω¯τ\underline{\omega}_{\tau}, respectively. We claim that the limits satisfy ω¯τ=ω¯τ\overline{\omega}_{\tau}=\underline{\omega}_{\tau}, i.e., consensus is achieved. We prove by contradiction and assume that ω¯τ>ω¯τ\overline{\omega}_{\tau}>\underline{\omega}_{\tau}.

Recall that α\alpha lower bounds the nonzero entries of Γ[k]\Gamma[k]. Choose ϵ0>0\epsilon_{0}>0 small enough that ω¯τϵ0>ω¯τ+ϵ0\overline{\omega}_{\tau}-\epsilon_{0}>\underline{\omega}_{\tau}+\epsilon_{0}. Fix

ϵ<ϵ0α(τ+1)nN(1α(τ+1)nN), 0<ϵ<ϵ0.\epsilon<\frac{\epsilon_{0}\alpha^{(\tau+1)n_{N}}}{(1-\alpha^{(\tau+1)n_{N}})},\medspace 0<\epsilon<\epsilon_{0}. (17)

Define the sequence {ϵγ}\{\epsilon_{\gamma}\} by

ϵγ+1=αϵγ(1α)ϵ,γ=0,1,,(τ+1)nN1.\epsilon_{\gamma+1}=\alpha\epsilon_{\gamma}-(1-\alpha)\epsilon,\medspace\gamma=0,1,\dots,(\tau+1)n_{N}-1.

So we have 0<ϵγ+1<ϵγ0<\epsilon_{\gamma+1}<\epsilon_{\gamma} for all γ\gamma. In particular, they are positive because by (17), it holds that

ϵ(τ+1)nN\displaystyle\epsilon_{(\tau+1)n_{N}} =α(τ+1)nNϵ0m=0(τ+1)nN1αm(1α)ϵ\displaystyle=\alpha^{(\tau+1)n_{N}}\epsilon_{0}-\sum_{m=0}^{(\tau+1)n_{N}-1}\alpha^{m}(1-\alpha)\epsilon
=α(τ+1)nNϵ0(1α(τ+1)nN)ϵ>0.\displaystyle=\alpha^{(\tau+1)n_{N}}\epsilon_{0}-(1-\alpha^{(\tau+1)n_{N}})\epsilon>0.

Take kϵ+k_{\epsilon}\in\mathbb{Z}_{+} such that x¯τN[k]<ω¯τ+ϵ\overline{x}^{N}_{\tau}[k]<\overline{\omega}_{\tau}+\epsilon and x¯τN[k]>ω¯τϵ\underline{x}^{N}_{\tau}[k]>\underline{\omega}_{\tau}-\epsilon for kkϵk\geq k_{\epsilon}. Such kϵk_{\epsilon} exists due to the convergence of x¯τN[k]\overline{x}^{N}_{\tau}[k] and x¯τN[k]\underline{x}^{N}_{\tau}[k]. Then we can define the two disjoint sets as

𝒵1τ(kϵ+γ,ϵγ)={j𝒩:xj[kϵ+γ]>ω¯τϵγ},\mathcal{Z}_{1\tau}(k_{\epsilon}+\gamma,\epsilon_{\gamma})=\{j\in\mathcal{N}:x_{j}[k_{\epsilon}+\gamma]>\overline{\omega}_{\tau}-\epsilon_{\gamma}\},
𝒵2τ(kϵ+γ,ϵγ)={j𝒩:xj[kϵ+γ]<ω¯τ+ϵγ}.\mathcal{Z}_{2\tau}(k_{\epsilon}+\gamma,\epsilon_{\gamma})=\{j\in\mathcal{N}:x_{j}[k_{\epsilon}+\gamma]<\underline{\omega}_{\tau}+\epsilon_{\gamma}\}.

Next, we show that one of the two sets becomes empty in a finite number of steps, which contradicts the assumption on ω¯τ\overline{\omega}_{\tau} and ω¯τ\underline{\omega}_{\tau} being the limits. Consider the set 𝒵1τ(kϵ,ϵ0)\mathcal{Z}_{1\tau}(k_{\epsilon},\epsilon_{0}). Due to the definition of x¯τN[k]\overline{x}^{N}_{\tau}[k] and its limit ω¯τ\overline{\omega}_{\tau}, one or more normal nodes are contained in the union of the sets 𝒵1τ(kϵ+γ,ϵγ)\mathcal{Z}_{1\tau}(k_{\epsilon}+\gamma,\epsilon_{\gamma}) for 0γτ+10\leq\gamma\leq\tau+1. We claim that 𝒵1τ(kϵ,ϵ0)\mathcal{Z}_{1\tau}(k_{\epsilon},\epsilon_{0}) is in fact nonempty. To prove this, it is sufficient to show that if a normal node jj is not in 𝒵1τ(kϵ+γ,ϵγ)\mathcal{Z}_{1\tau}(k_{\epsilon}+\gamma,\epsilon_{\gamma}), then it is not in 𝒵1τ(kϵ+γ+1,ϵγ+1)\mathcal{Z}_{1\tau}(k_{\epsilon}+\gamma+1,\epsilon_{\gamma+1}) for γ=0,,τ\gamma=0,\dots,\tau.

Suppose that node jj satisfies xj[kϵ+γ]ω¯τϵγx_{j}[k_{\epsilon}+\gamma]\leq\overline{\omega}_{\tau}-\epsilon_{\gamma}. Every normal node updates its value to a convex combination of the multi-hop neighbors’ values at the current or previous times. Moreover, the values greater than x¯τN[kϵ+γ]\overline{x}^{N}_{\tau}[k_{\epsilon}+\gamma] are ignored in step 2 of the MW-MSR algorithm. Hence, the value of node jj at the next time step is upper bounded as

xj\displaystyle x_{j} [kϵ+γ+1](1α)x¯τN[kϵ+γ]+α(ω¯τϵγ)\displaystyle[k_{\epsilon}+\gamma+1]\leq(1-\alpha)\overline{x}^{N}_{\tau}[k_{\epsilon}+\gamma]+\alpha(\overline{\omega}_{\tau}-\epsilon_{\gamma}) (18)
(1α)(ω¯τ+ϵ)+α(ω¯τϵγ)\displaystyle\leq(1-\alpha)(\overline{\omega}_{\tau}+\epsilon)+\alpha(\overline{\omega}_{\tau}-\epsilon_{\gamma})
ω¯ταϵγ+(1α)ϵ=ω¯τϵγ+1.\displaystyle\leq\overline{\omega}_{\tau}-\alpha\epsilon_{\gamma}+(1-\alpha)\epsilon=\overline{\omega}_{\tau}-\epsilon_{\gamma+1}.

It thus follows that node jj is not in 𝒵1τ(kϵ+γ+1,ϵγ+1)\mathcal{Z}_{1\tau}(k_{\epsilon}+\gamma+1,\epsilon_{\gamma+1}). This means that the cardinality of the set 𝒵1τ(kϵ+γ,ϵγ)\mathcal{Z}_{1\tau}(k_{\epsilon}+\gamma,\epsilon_{\gamma}) is nonincreasing for γ=0,,τ+1\gamma=0,\dots,\tau+1. The same holds for 𝒵2τ(kϵ+γ,ϵγ)\mathcal{Z}_{2\tau}(k_{\epsilon}+\gamma,\epsilon_{\gamma}), and hence 𝒵2τ(kϵ,ϵ0)\mathcal{Z}_{2\tau}(k_{\epsilon},\epsilon_{0}) is nonempty too.

We next show that one of these two sets in fact becomes empty in finite time. Since the graph is (2f+1)(2f+1)-robust with ll hops w.r.t. any set \mathcal{F} satisfying the ff-total model, the graph is also (2f+1)(2f+1)-robust with ll hops w.r.t. set 𝒜\mathcal{A} (i.e., the set of adversarial nodes). Therefore, between the two nonempty disjoint sets 𝒵1τ(kϵ,ϵ0)\mathcal{Z}_{1\tau}(k_{\epsilon},\epsilon_{0}) and 𝒵2τ(kϵ,ϵ0)\mathcal{Z}_{2\tau}(k_{\epsilon},\epsilon_{0}), one of them has a normal agent with at least 2f+12f+1 independent paths originating from the nodes outside and these paths do not have any internal node in the set 𝒜\mathcal{A}.

Suppose that normal node i𝒵1τ(kϵ,ϵ0)i\in\mathcal{Z}_{1\tau}(k_{\epsilon},\epsilon_{0}) has this property. Since there are at most ff malicious nodes and node ii can only remove the values of which the cardinality of the minimum message cover is ff. Moreover, node ii is supposed to update once in at most τ\tau time steps. Therefore, when node ii makes an update at time kϵ+τk_{\epsilon}+\tau, it will use at least one delayed value from the normal nodes outside the set 𝒵1τ(kϵ,ϵ0)\mathcal{Z}_{1\tau}(k_{\epsilon},\epsilon_{0}), upper bounded by ω¯τϵτ\overline{\omega}_{\tau}-\epsilon_{\tau}. It thus follows that, at time kϵ+τk_{\epsilon}+\tau, when node ii makes an update, its value can be bounded as

xi[kϵ+τ+1](1α)x¯τN[kϵ+τ]+α(ω¯τϵτ).x_{i}[k_{\epsilon}+\tau+1]\leq(1-\alpha)\overline{x}^{N}_{\tau}[k_{\epsilon}+\tau]+\alpha(\overline{\omega}_{\tau}-\epsilon_{\tau}).

By (18), we have xi[kϵ+τ+1]ω¯τϵτ+1x_{i}[k_{\epsilon}+\tau+1]\leq\overline{\omega}_{\tau}-\epsilon_{\tau+1}. We can conclude that if node ii in 𝒵1τ(kϵ,ϵ0)\mathcal{Z}_{1\tau}(k_{\epsilon},\epsilon_{0}) has 2f+12f+1 independent paths originating from the nodes outside the set, then it goes outside of 𝒵1τ(kϵ+τ+1,ϵτ+1)\mathcal{Z}_{1\tau}(k_{\epsilon}+\tau+1,\epsilon_{\tau+1}) after τ+1\tau+1 steps. Consequently, |𝒵1τ(kϵ+τ+1,ϵτ+1)|<|𝒵1τ(kϵ,ϵ0)|\left|\mathcal{Z}_{1\tau}(k_{\epsilon}+\tau+1,\epsilon_{\tau+1})\right|<\left|\mathcal{Z}_{1\tau}(k_{\epsilon},\epsilon_{0})\right|. Likewise, it follows that if 𝒵2τ(kϵ,ϵ0)\mathcal{Z}_{2\tau}(k_{\epsilon},\epsilon_{0}) has a node having at least 2f+12f+1 independent paths originating from the nodes outside, then |𝒵2τ(kϵ+τ+1,ϵτ+1)|<|𝒵2τ(kϵ,ϵ0)|\left|\mathcal{Z}_{2\tau}(k_{\epsilon}+\tau+1,\epsilon_{\tau+1})\right|<\left|\mathcal{Z}_{2\tau}(k_{\epsilon},\epsilon_{0})\right|.

Since there are only nNn_{N} normal nodes, we can repeat the steps above until one of the sets 𝒵1τ(kϵ+τ+1,ϵτ+1)\mathcal{Z}_{1\tau}(k_{\epsilon}+\tau+1,\epsilon_{\tau+1}) and 𝒵2τ(kϵ+τ+1,ϵτ+1)\mathcal{Z}_{2\tau}(k_{\epsilon}+\tau+1,\epsilon_{\tau+1}) becomes empty, and it takes no more than (τ+1)nN(\tau+1)n_{N} steps. Once the set becomes empty, it remains so indefinitely. This contradicts the assumption that ω¯τ\overline{\omega}_{\tau} and ω¯τ\underline{\omega}_{\tau} are the limits. Therefore, we obtain ω¯τ=ω¯τ\overline{\omega}_{\tau}=\underline{\omega}_{\tau}.

References

  • [1] F. Bullo, J. Cortés, and S. Martinez, Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms. Princeton University Press, 2009.
  • [2] N. A. Lynch, Distributed Algorithms. Morgan Kaufmann, 1996.
  • [3] Y. Kikuya, S. M. Dibaji, and H. Ishii, “Fault-tolerant clock synchronization over unreliable channels in wireless sensor networks,” IEEE Transactions on Control of Network Systems, vol. 5, no. 4, pp. 1551–1562, 2017.
  • [4] S. Yang, S. Tan, and J. Xu, “Consensus based approach for economic dispatch problem in a smart grid,” IEEE Transactions on Power Systems, vol. 28, no. 4, pp. 4416–4426, 2013.
  • [5] A. Mitra, F. Ghawash, S. Sundaram, and W. Abbas, “On the impacts of redundancy, diversity, and trust in resilient distributed state estimation,” IEEE Transactions on Control of Network Systems, vol. 8, no. 2, pp. 713–724, 2021.
  • [6] A. Nedic and A. Ozdaglar, “Distributed subgradient methods for multi-agent optimization,” IEEE Transactions on Automatic Control, vol. 54, no. 1, pp. 48–61, 2009.
  • [7] S. Sundaram and B. Gharesifard, “Distributed optimization under adversarial nodes,” IEEE Transactions on Automatic Control, vol. 64, no. 3, pp. 1063–1076, 2018.
  • [8] S. M. Dibaji, H. Ishii, and R. Tempo, “Resilient randomized quantized consensus,” IEEE Transactions on Automatic Control, vol. 63, no. 8, pp. 2508–2522, 2018.
  • [9] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, “Resilient asymptotic consensus in robust networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 4, pp. 766–781, 2013.
  • [10] L. Su and N. H. Vaidya, “Reaching approximate Byzantine consensus with multi-hop communication,” Information and Computation, vol. 255, pp. 352–368, 2017.
  • [11] Y. Nugraha, A. Cetinkaya, T. Hayakawa, H. Ishii, and Q. Zhu, “Dynamic resilient network games with applications to multi-agent consensus,” IEEE Transactions on Control of Network Systems, vol. 8, no. 1, pp. 246–259, 2021.
  • [12] S. M. Dibaji and H. Ishii, “Resilient consensus of second-order agent networks: Asynchronous update rules with delays,” Automatica, vol. 81, pp. 123–132, 2017.
  • [13] N. H. Vaidya, L. Tseng, and G. Liang, “Iterative approximate Byzantine consensus in arbitrary directed graphs,” in Proc. ACM Symposium on Principles of Distributed Computing, 2012, pp. 365–374.
  • [14] A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson, “Attack models and scenarios for networked control systems,” in Proc. 1st International Conference on High Confidence Networked Systems, 2012, pp. 55–64.
  • [15] D. Dolev, “The Byzantine generals strike again,” Journal of Algorithms, vol. 3, no. 1, pp. 14–30, 1982.
  • [16] M. J. Fischer, N. A. Lynch, and M. S. Paterson, “Impossibility of distributed consensus with one faulty process,” Journal of the ACM, vol. 32, no. 2, pp. 374–382, 1985.
  • [17] D. Dolev, N. A. Lynch, S. S. Pinter, E. W. Stark, and W. E. Weihl, “Reaching approximate agreement in the presence of faults,” Journal of the ACM, vol. 33, no. 3, pp. 499–516, 1986.
  • [18] M. Azadmanesh and R. Kieckhafer, “Asynchronous approximate agreement in partially connected networks,” International Journal of Parallel and Distributed Systems and Networks, vol. 5, no. 1, pp. 26–34, 2002.
  • [19] W. Abbas, M. Shabbir, J. Li, and X. Koutsoukos, “Interplay between resilience and accuracy in resilient vector consensus in multi-agent networks,” in Proc. IEEE Conference on Decision and Control, 2020, pp. 3127–3132.
  • [20] D. M. Senejohnny, S. Sundaram, C. De Persis, and P. Tesi, “Resilience against misbehaving nodes in asynchronous networks,” Automatica, vol. 104, pp. 26–33, 2019.
  • [21] Y. Wang and H. Ishii, “An event-triggered approach to quantized resilient consensus,” International Journal of Robust and Nonlinear Control, vol. 30, no. 11, pp. 4188–4204, 2020.
  • [22] Y. Wang, H. Ishii, F. Bonnet, and X. Défago, “Resilient real-valued consensus in spite of mobile malicious agents on directed graphs,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 3, pp. 586–603, 2021.
  • [23] D. Saldana, A. Prorok, S. Sundaram, M. F. Campos, and V. Kumar, “Resilient consensus for time-varying networks of dynamic agents,” in Proc. American Control Conference, 2017, pp. 252–258.
  • [24] J. Usevitch and D. Panagou, “Determining r- and (r, s)-robustness of digraphs using mixed integer linear programming,” Automatica, vol. 111, no. 108586, 2020.
  • [25] W. Abbas, A. Laszka, and X. Koutsoukos, “Improving network connectivity and robustness using trusted nodes with application to resilient consensus,” IEEE Transactions on Control of Network Systems, vol. 5, no. 4, pp. 2036–2048, 2017.
  • [26] W. Abbas, A. Laszka, and X. Koutsoukos, “Diversity and trust to increase structural robustness in networks,” in Proc. American Control Conference, 2019, pp. 4043–4048.
  • [27] L. Yuan and H. Ishii, “Secure consensus with distributed detection via two-hop communication,” Automatica, vol. 131, art. no. 109775, 2021.
  • [28] C. Zhao, J. He, and J. Chen, “Resilient consensus with mobile detectors against malicious attacks,” IEEE Transactions on Signal and Information Processing over Networks, vol. 4, no. 1, pp. 60–69, 2018.
  • [29] D. Sakavalas, L. Tseng, and N. H. Vaidya, “Asynchronous Byzantine approximate consensus in directed networks,” in Proc. 39th Symposium on Principles of Distributed Computing, 2020, pp. 149–158.
  • [30] M. S. Khan, L. Tseng, and N. Vaidya, “Exact Byzantine consensus on arbitrary directed graphs under local broadcast model,” in Proc. International Conference on Principles of Distributed Systems, 2019, pp. 30:1–30:16.
  • [31] A. Goldsmith, Wireless Communications. Cambridge University Press, 2005
  • [32] Z. Jin and R. M. Murray, “Multi-hop relay protocols for fast consensus seeking,” in Proc. IEEE Conference on Decision and Control, 2006, pp. 1001–1006.
  • [33] Z. Zhao and Z. Lin, “Global leader-following consensus of a group of general linear systems using bounded controls,” Automatica, vol. 68, pp. 294–304, 2016.
  • [34] S. Manfredi, “Design of a multi-hop dynamic consensus algorithm over wireless sensor networks,” Control Engineering Practice, vol. 21, no. 4, pp. 381–394, 2013.
  • [35] W. Ren and Y. Cao, Distributed Coordination of Multi-agent Networks: Emergent Problems, Models, and Issues. Springer, 2011.
  • [36] M. Mesbahi and M. Egerstedt, Graph Theoretic Methods in Multi-agent Networks. Princeton University Press, 2010.
  • [37] L. Yuan and H. Ishii, “Resilient consensus with multi-hop communication,” in Proc. IEEE Conference on Decision and Control, 2021, pp. 2696–2701.
  • [38] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,” Proc. IEEE, vol. 95, no. 1, pp. 215–233, 2007.
  • [39] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
  • [40] L. Tseng, N. Vaidya, and V. Bhandari, “Broadcast using certified propagation algorithm in presence of Byzantine faults,” Information Processing Letters, vol. 115, no. 4, pp. 512–514, 2015.
{IEEEbiography}

[[Uncaptioned image]]Liwei Yuan received the B.E. degree in Electrical Engineering and Automation from Tsinghua University, China, in 2017, and the M.E. degree in Computer Science from Tokyo Institute of Technology, Japan, in 2019. He is currently working toward the Ph.D. degree in the Department of Computer Science at Tokyo Institute of Technology, Yokohama, Japan. His current research focuses on security in multi-agent systems and distributed algorithms.

{IEEEbiography}

[[Uncaptioned image]]Hideaki Ishii (M’02-SM’12-F’21) received the M.Eng. degree from Kyoto University, Kyoto, Japan, in 1998, and the Ph.D. degree from the University of Toronto, Toronto, ON, Canada, in 2002. He was a Postdoctoral Research Associate at the University of Illinois at Urbana-Champaign, Urbana, IL, USA, from 2001 to 2004, and a Research Associate at The University of Tokyo, Tokyo, Japan, from 2004 to 2007. Currently, he is a Professor at the Department of Computer Science, Tokyo Institute of Technology, Yokohama, Japan. His research interests are in networked control systems, multiagent systems, distributed algorithms, and cyber-security of control systems.

Dr. Ishii has served as an Associate Editor for the IEEE Control Systems Letters and the Mathematics of Control, Signals, and Systems and previously for Automatica, the IEEE Transactions on Automatic Control, and the IEEE Transactions on Control of Network Systems. He is the Chair of the IFAC Coordinating Committee on Systems and Signals since 2017. He is the IPC Chair for the IFAC World Congress 2023 to be held in Yokohama, Japan. He received the IEEE Control Systems Magazine Outstanding Paper Award in 2015. Dr. Ishii is an IEEE Fellow.