Resilient Consensus with Multi-hop Communication
Abstract
In this paper, we study the problem of resilient consensus for a multi-agent network where some of the nodes might be adversarial, attempting to prevent consensus by transmitting faulty values. Our approach is based on that of the so-called weighted mean subsequence reduced (W-MSR) algorithm with a special emphasis on its use in agents capable to communicate with multi-hop neighbors. The MSR algorithm is a powerful tool for achieving resilient consensus under minimal requirements for network structures, characterized by the class of robust graphs. Our analysis highlights that through multi-hop communication, the network connectivity can be reduced especially in comparison with the common one-hop communication case. Moreover, we analyze the multi-hop W-MSR algorithm with delays in communication since the values from different multi-hop neighbors may arrive at the agents at different time steps.
Cyber security, distributed algorithms, multi-hop communication, resilient consensus.
1 Introduction
Cyber security of multi-agent systems and distributed algorithms has become an important research area in systems control in the last decade. For multi-agent systems, consensus is one of the fundamental problems [1], [2]. Based on consensus algorithms, various applications and distributed algorithms have been developed to solve different industrial problems, e.g., clock synchronization [3], energy management [4], distributed state estimation [5], distributed optimization [6, 7], and so on. As concerns for cyber security have rised in general, consensus problems in the presence of adversarial agents creating failures and attacks have attracted much attention; see, e.g., [8, 9, 10, 11]. One class of interdisciplinary problems that has been studied in both control and computer science is that of resilient consensus [12, 9, 13]. In these works, the adversarial agents are categorized into basically two types: Malicious agents and Byzantine agents. These agents are capable to manipulate their data arbitrarily and may even collaborate with each other. However, certain differences lie between them since malicious agents are limited as they must broadcast the same messages to all of their neighbors, while Byzantine agents can send individual messages to different neighbors (e.g., [9, 2, 14]).
Resilient consensus problems under the Byzantine model have a rich history in the area of distributed computing [2]. In [15], it has been shown that given a network with nodes and at most Byzantine nodes, a necessary and sufficient condition to reach resilient exact consensus is that and the graph connectivity is no less than . Furthermore, in [16], it has been reported that under deterministic asynchronous updates, even one misbehaving agent can make it impossible for the system to reach exact consensus. Then, to avoid this constraint of exact consensus, the authors of [17] introduced the approximate Byzantine consensus problem in complete networks (i.e., all-to-all communication), where the non-adversarial, normal nodes are required to achieve approximate agreement by converging to a relatively small interval in finite time. In [13], the authors proposed a necessary and sufficient condition for the approximate Byzantine consensus problem in networks with general topologies.
In this paper, we study resilient asymptotic (approximate) consensus under malicious model from the viewpoint of the so-called mean subsequence reduced (MSR) algorithms, which are known for the simplicity and scalability (e.g., [18, 9, 13, 19, 20, 21, 22]). This line of work has gained much attention in the last decade as the malicious model can be widely assumed for broadcasting networks [9], wireless sensor networks [3], and so on. A basic assumption in MSR algorithms is the knowledge regarding an upper bound on the maximum number of malicious agents among the neighbors; this bound is denoted by throughout this paper. Such a bound represents the level of caution assumed by the system operator and can be set based on past experience, with possibly some safety margin. Then, at each iteration, each node eliminates extreme values received from neighbors to avoid being influenced by such potentially faulty values. In particular, it removes the largest values and the smallest values from neighbors. Moreover, the graph property called robustness is shown to be critical for the network structure, guaranteeing the success of resilient consensus algorithms in static networks [12, 9] as well as time-varying networks [23]. A recent work [24] attempts to check robustness of given graphs using mixed integer linear programming. Nevertheless, such robustness requires the networks to be relatively dense and complex. Therefore, how to enhance resilience of more sparse networks without changing the original network topologies has become an urgent problem.
There are several directions for developing solutions to tackle this problem. In [25], the authors improved the graph robustness by introducing trusted nodes, which are assumed to be fault-free with extra security measures. They also provided another alternative method [26] to enhance the graph robustness by introducing different types of nodes in the network and by assuming that the attackers can only compromise a certain type of nodes. On the other hand, the works [27, 28] pursue approaches based on detection of malicious agents in the network. Compared to MSR algorithms, which do not have such detection capabilities, the algorithms are applicable to more sparse networks with the same tolerance of adversaries. Furthermore, in [10], by introducing multi-hop communication in MSR algorithms, the authors solved the approximate Byzantine consensus problem with a weaker condition on network structures compared to that derived under the one-hop communication model [13]. In [29], the authors tackled the same problem under asynchronous updates based on rounds, which is different from the asynchrony setting used in this paper (see the discussions in Section VI). The work [30] studied Byzantine binary consensus under the local broadcast model (malicious model) using a flooding algorithm, where nodes relay their values over the entire network.
Multi-hop communication techniques are commonly used in the areas of wireless communication [31] and computer science [2]. Such techniques are also used for consensus problems in many works. In [32], a multi-hop relay technique is introduced in the consensus problem to increase the speed of consensus forming. In [33], a similar method based on multi-hop relay is developed to solve the global leader-following consensus problem. Moreover, application of multi-hop communication in wireless sensor networks from the viewpoint of control is investigated in [34]. It is clear that with multi-hop communication, each node can have more information for updating compared to the one-hop case. Thus, the network may have more resilience against adversary nodes. Yet, only few works have looked into resilient consensus with multi-hop communication. As mentioned earlier, the work [10] is restricted to the Byzantine adversary case. To the best of our knowledge, resilient consensus with multi-hop communication under malicious attacks still remains as an open problem. Moreover, for many applications of multi-agent systems, time delays in the communication among agents can happen naturally [35], [36]. Especially, in the multi-hop communication setting, the length of time delays should increase as the messages are relayed by more agents. It is hence of significant importance to extend our algorithm to the case of asynchronous updates with time delays. We must note that such a case is not considered in [10] and [30].
The main contribution of this paper can be outlined as follows. Inspired by the definition of graph robustness of [9], we extend this notion to the multi-hop setting and name it as robustness with hops. Specifically, we formally characterize the ability of normal nodes to be influenced by normal multi-hop neighbors outside a given node set in the malicious environment. Furthermore, we provide analysis for the properties of the new notion of robustness.
Unlike in the case with one-hop communication, the MSR algorithm in the multi-hop case may not exclude all the possible effects from malicious nodes if each normal node just eliminates the largest and the smallest received values. Since a malicious node can manipulate not only its own value but also the values it relays, such nodes can produce more than false values even if there are at most malicious nodes. To completely exclude the effects from malicious nodes, we propose the multi-hop weighted mean subsequence reduced (MW-MSR) algorithm. Normal nodes using the MW-MSR algorithm will exclude the extreme values which are produced precisely by multi-hop neighbors. To realize this trimming capability in the multi-hop setting requires the notion of message cover, which represents the set of nodes intersecting with a given set of different message paths.
In this paper, we consider the malicious model, which is suitable for broadcast network and is different from the Byzantine model studied in [10]. Then we derive necessary and sufficient graph conditions based on the new notion of robustness with hops for the proposed MW-MSR algorithms to achieve resilient consensus under synchronous updates and asynchronous updates with time delays in the communication. Moreover, we present examples to illustrate how multi-hop communication helps to improve graph robustness without changing the network topology. As a side result, we prove that for the case of unbounded path length in message relaying, our graph condition is equivalent to the necessary and sufficient graph condition for binary consensus under malicious attacks studied in [30].
The rest of this paper is organized as follows. In Section II, we outline preliminaries on graphs and the system model. In Sections III and IV, we present the MW-MSR algorithm and define graph robustness with multi-hop communication, respectively. Then in Sections V and VI, we derive tight graph conditions under which the MW-MSR algorithms guarantee resilient asymptotic consensus under synchronous and asynchronous updates, respectively. In Section VII, we provide some properties of the new robustness and in Section VIII, we present examples to demonstrate that multi-hop communication can improve robustness of graphs in general. Lastly, in Section IX, we conclude the paper. A preliminary version of this paper appeared as [37]. The current paper contains all the proofs of the theoretical results, further discussions, as well as more extensive simulations.
2 Preliminaries and Problem Formulation
In this section, we provide preliminaries on the network models and introduce the basic settings for the resilient consensus problems studied in this paper.
2.1 Network Model
First, we introduce the graph notions used in this paper. Consider the directed graph consisting of the node set and the edge set . Here, the edge indicates that node can get information from node . A path from node to is a sequence of distinct nodes , where for . Such a path is referred to as an -hop path (or a path of length ) and also as -path when the number of hops is not relevant but the source and destination nodes are. We also say that node is reachable from node . An -path is a path from a node in set to node . We also denote the set minus symbol by .
For node , let be the set of nodes that can reach node via at most -hop paths, where is a positive integer. Also, let be the set of nodes that are reachable from node via at most -hop paths. The -th power of the graph , denoted by , is a multigraph111 In a multigraph, two nodes can have multiple edges between them. with the same vertices as and a directed edge from node to node is defined by a path of length at most from to in . The adjacency matrix of is given by if and otherwise , where is a fixed lower bound. We assume that for all . Let be the Laplacian matrix of , whose entries are defined as and ; we can see that the sum of the elements of each row of is zero.
2.2 Multi-hop Communication for Multi-agent Consensus
Here, we introduce the multi-agent system with multi-hop communication and the update rule used by the agents under no attacks. Consider a time-invariant network modeled by the directed graph . Each node has a real-valued state . The goal of the agents is to arrive at consensus in their state values asymptotically, that is, as for all . This is to be achieved by updating the states at each time step based on the information exchanged among the nodes. Their initial values are given. Until we reach Section VI, we assume that no delay is present in the communication among nodes.
In this problem setting, the agents not only communicate with their direct neighbors as in conventional schemes, but also with their multi-hop neighbors. Let be the maximum number of hops allowed in the network. Specifically, node can send messages of its own to an -hop neighbor via different paths. We represent a message as a tuple , where is the message content and indicates the path via which message is transmitted. Moreover, nodes and are, respectively, the message source and the message destination. When source node sends out a message, is a path vector of length with the source node being and other entries being empty. Then the one-hop neighbor receives this message from , and it stores the value of node for consensus and relays the value of node to all the one-hop neighbors of with the second entry of being and other entries being unchanged. This relay procedure will continue until every entry of of this message is occupied, i.e., this message reaches node . We denote by the set of nodes in .
We now outline the message exchanges among the agents. At each time , normal node conducts the following steps:
1. Transmit step: Transmit message over each -hop path to node .
2. Receive step: Receive messages from , whose destination is . Let be the set of messages that node received in this step.
3. Update step: Update the state as
(1) |
where is a real-valued function of the states received in this time step, to be defined later.
In the Transmit step and Receive step, nodes exchange messages with others that are up to hops away. Then in the Update step, node updates its state using the received values in . Note that the adversary nodes may deviate from this specification as we describe in the next subsection.
In an agent network equipped with multi-hop communication, as the consensus update rule (1), we can extend the common one (e.g., [38]). Let denote the control input for node at time . Each node updates as
(2) | ||||
This system can be given in the compact form as
(3) | ||||
where and are the state vector and control input vector, respectively, and is the Laplacian matrix of the -th power of determined by the messages . As a generalization of the one-hop result (e.g. [1], [36]), it is obvious that with -hop communication, consensus is possible if has a rooted spanning tree.
2.3 Threat Model
We introduce the threat model adopted in this paper. In the network, the node set is partitioned into the set of normal nodes and the set of adversary nodes . The latter set is unknown to the normal nodes at all times. Moreover, we constrain the class of adversaries as follows (see, e.g., [9]):
Definition 2.1
(-total set) The set of adversary nodes is said to be -total if it contains at most nodes, i.e., .
Definition 2.2
(Malicious nodes) An adversary node is said to be a malicious node if it can arbitrarily modify its own value and relayed values, but sends the same state and relayed values to its neighbors at each iteration. It can also decide not to send any value.222This behavior corresponds to the omissive/crash model [2].
As commonly done in the literature [9], [10], we assume that each normal node knows the value of and the topology information of the graph up to hops. Moreover, the malicious model is reasonable in applications such as wireless sensor networks, where neighbors’ information is obtained by broadcast communication. In the multi-hop setting studied in this paper, it is important to impose the following assumption.
Assumption 2.1
Each malicious node cannot manipulate the path values in the messages containing its own state and those that it relays.
This is introduced for ease of analysis, but is not a strong constraint. In fact, manipulating message paths can be easily detected and hence does not create problems. We show how this can be done in Section II-E.
2.4 Resilient Asymptotic Consensus
We now introduce the type of consensus among the normal agents to be sought in this paper [9], [10], [12].
Definition 2.3
If for any possible sets and behaviors of the malicious agents and any state values of the normal nodes, the following two conditions are satisfied, then we say that the normal agents reach resilient asymptotic consensus:
-
1.
Safety: There exists a bounded safety interval determined by the initial values of the normal agents such that .
-
2.
Agreement: There exists a state such that .
The problem studied in this paper is to develop an MSR-based algorithm for agents that can make -hop communication to reach resilient consensus under the -total malicious model and to characterize conditions on the network topology for the algorithm to properly perform. Note that in general, for MSR-based algorithms with one-hop communication, resilient consensus can be achieved under the -total model with the necessary and sufficient condition expressed in terms of the so-called graph robustness; see, e.g., [8, 9], and the following sections for the definition of robust graphs and related discussions.
2.5 Discussion on Manipulation in Message Path Information
It is notable that multi-hop communication is vulnerable to false data injection in the information relayed by nodes, which can make the problem of resilient consensus more complicated than the one-hop case. Earlier, Assumption 2.1 was introduced stating that the malicious nodes however cannot manipulate the path information in messages that they relay. We briefly explain here how such attacks can be detected, inspired by the discussion in [10].
Such detection requires that each node can identify the neighbor from which it receives each message, which is commonly assumed (e.g., [10], [15]). Moreover, there are many methods to realize this function in real-world applications. For instance, by using the encryption technique of the RSA algorithm [39], each node can send out its value associated with a digital signature using its own private key. Then, using the sender’s public key, the receiver can confirm that this message is indeed sent by the particular sender.
In each iteration of the synchronous algorithm, there are three potential cases where a message sent to normal node is manipulated in its path information: (i) Node receives multiple messages along the same path ; (ii) it receives messages along an unknown path ; or (iii) it does not receive any message along a known path . Note that a normal node receives only one message along each path in each iteration when no adversarial node is present.
For case (i), this faulty behavior is caused either by duplicating messages or by manipulating path information in messages. We show that in both situations, the receiving node can find that there is at least one faulty node in path . It is obvious for the first situation. For the path manipulating situation, consider the case where a normal node receives a message directly from node but the path does not contain node . Then node knows that node is faulty, and will not forward the message. This indicates that in general, if there is a sequence of faulty nodes along a path, then the last one in the sequence must keep its own index within the path information in the messages that it transmits. Moreover, this argument also holds for case (ii), i.e., node knows that at least one node in path is faulty. Therefore, in cases (i) and (ii), from the perspective of node , manipulating the message path data is equivalent to having a faulty node in or sending additional messages with manipulated values, and thus it will remove any values in this path by the MW-MSR algorithm.
For case (iii), either a faulty node does not send/forward the message , or it manipulates the message path . In the latter case, for node , manipulating the message path is equivalent to having a faulty node in not sending/forwarding the message.
Actually, this analysis can be extended to the algorithms with asynchronous updates. In each update of such algorithms, consider the following three path manipulating cases for node : (i) Node receives multiple messages along one path at the same time step; (ii) it receives messages along an unknown path ; or (iii) it does not receive any message along path in a period of time , where is the maximum time delay of normal agents. Note that in case (i) for the asynchronous algorithm, faulty nodes can send multiple messages along as long as these faulty messages do not arrive at node at the same time step and this behavior will not affect normal agents, since only the most recent values of multi-hop neighbors will be used in the asynchronous MW-MSR algorithm. The analysis of cases (ii) and (iii) is similar to that of the synchronous algorithm.
The above analysis is based on the assumption that there is no packet loss in the fault-free networks. In real-world applications, packet losses can happen even in fault-free networks. We note that there are methods to deal with this issue. Packet losses in the communication between two normal nodes can also cause the situation of case (iii) mentioned above. Like the one-hop W-MSR algorithm, if a packet loss happens in the communication from neighbor to node , then node may receive only values at this particular time step and still remove largest and smallest received values; hence, node uses less information from normal nodes to update. This behavior will not violate the safety interval, but it may slow down the speed of consensus. If the packet loss behavior happens frequently in this transmission path, then node can consider this path containing faulty nodes.
3 Multi-hop Weighted MSR Algorithm
In this section, we introduce the multi-hop weighted MSR (MW-MSR) algorithm, which is designed to solve the resilient consensus problem under the multi-hop setting. We first introduce the notion of message cover which plays a key role in the trimming function of our MSR algorithm. Then we outline the structure of the MW-MSR algorithm and provide examples to illustrate the idea behind the algorithm.
The notion of message cover [10] is crucial in the update rule of our algorithm to be proposed in this section. It evaluates the effects of adversary nodes that can possibly manipulate the updates of normal nodes in a multi-hop communication setting. Its formal definition is given as follows.
Definition 3.1
For a graph , let be a set of messages transmitted over , and let be the set of message paths of all the messages in , i.e., . A message cover of is a set of nodes whose removal disconnects all message paths, i.e., for each path , we have . In particular, a minimum message cover of is defined by
As a simple example, consider the set of paths connecting node to node which do not overlap. Then, its message cover must contain at least one node per path. Clearly, there may be multiple minimum message covers if the paths are of length greater than three.
(4) |
Now, we are ready to introduce the structure of the synchronous MW-MSR algorithm in Algorithm 1. Note that the one-hop version of the MW-MSR algorithm (i.e., with ) is equivalent to the W-MSR algorithm in [9]. However, we can see that the difference between the MW-MSR algorithm and the W-MSR algorithm mainly lies in the trimming function in step 2 when . For general MSR algorithms of one-hop communication, the essential idea for the normal nodes to avoid being affected by adversary nodes is that each normal node will exclude the effects from neighbors with extreme values (possibly sent by faulty nodes). This can guarantee that values outside the safety interval will not be used by any normal node at any time step. In the one-hop case, for each normal node , the number of values received from such neighbors is exactly , i.e., node will trim away largest and smallest values at each step. This is because each neighbor sends only one value of its own to node at each step under the typical assumptions made in MSR-related works [9], [13].
Under the multi-hop setting, the situation changes significantly even if we assume that each node can only send out one value of its own to its neighbors at each step. Since each node relays the values from different neighbors, normal node can receive more than one value from one direct neighbor. Thus, in the MW-MSR algorithm, normal node cannot just trim away largest and smallest values at each step. Instead, it needs to trim away the largest and smallest values from exactly nodes within hops away, which is the generalization of the essential idea in the one-hop W-MSR algorithm.


To characterize the number of the extreme values from exactly nodes for node , the notion of minimum message cover (MMC) is designed. Intuitively speaking, for normal node , and are the largest sized sets of received messages containing very large and small values that may have been generated or tampered by adversary nodes, respectively. Here, we focus on how is determined, as can be obtained in a similar way. When the cardinality of the MMC of set is no more than , node simply takes . Otherwise, node will check the first values of , and if the MMC of these values is of cardinality , then it will check the first values of . This procedure will continue until for the first () values of , the MMC of these values is of cardinality . Then is taken as the first values of . After sets and are determined, in the control input computed by (4) in step 3, values in these sets are excluded. Note that this control is consistent with the one in (1) when .
We also illustrate the determination of such subsets through a simple example. Consider the network in Fig. 1 with initial states , where node 3 is set to be malicious () and constantly broadcasts the value 100 as its own value as well as those in the relayed messages. We look at node 1 at time and drop the time index . In the one-hop version of the MW-MSR algorithm, the input for node 1 is , and it chooses and in step 2 of the algorithm (since the value is the smallest in the input).
In the two-hop version of the MW-MSR algorithm, node 1 receives the state values and directly from nodes 2, 3, and 5, respectively. Moreover, it receives the relayed values of node 4 through nodes 2, 3, and 5, denoted by and . Then the sorted input for node 1 is , and node 1 checks the MMC of the subset of the largest values starting from the th value (since the values before the th one are definitely removed by node 1). First, it evaluates , and the MMC of this message set is the node set with cardinality 1. Then, it evaluates and the MMC of this message set can be found to be the node set with cardinality 2, which is bigger than . As a result, node 1 confirms that is the largest sized set of the large values that may have been generated or tampered by adversary nodes. Therefore, node 1 chooses and in step 2 of the algorithm.
In this paper, the key question to be addressed is, under what conditions on the network can the above algorithm achieve resilient asymptotic consensus? Our approach is to develop a generalization of the results and analysis of the one-hop case. In particular, this necessitates us to extend the notion of graph robustness by taking account of multi-hop communication. This is carried out in the next section.
4 Robustness with Multi-hop Communication
In this section, we discuss the notion of graph robustness. This notion was first introduced in [9], which corresponds to the one-hop case. We provide its multi-hop generalization, which plays a crucial role in our resilient consensus problem.
As in the definition of robustness for the one-hop case [9], we start with the definition of -reachability. Specifically, when the communication is only one-hop, a node set is said to be -reachable if it contains at least one node that has at least incoming neighbors outside this set. This notion basically captures the capability of a set to be influenced by the outside of the set when the nodes apply the MSR algorithms with parameter .


In generalizing this notion to the case of multi-hop communication, it is crucial to extend the above-mentioned capability. In particular, the influence from the outside of the set may come from remote nodes and are not restricted to direct neighbors. With a slight change, in the multi-hop setting, we define the -reachability as follows.
Definition 4.1
Consider a graph with -hop communication. For , set , and nonempty set , a node is said to be -reachable with -hop communication with respect to if it has at least independent paths (i.e., only node is the common node in these paths) of at most hops originating from nodes outside and all these paths do not have any node in set as an intermediate node (i.e., the nodes in can be source or destination nodes in these paths).
Intuitively speaking, for any set and for node to have the above-mentioned property, there should be at least source nodes outside and at least one independent path of length at most hops from each of the source nodes to node , where such a path does not contain any internal node from the set . It is clear that for the one-hop case, to count the independent paths simply becomes to count the in-neighbors.
As an example, consider the graph in Fig. 2(a), where the two node sets and are taken as indicated and the set . Here, node has two independent paths of at most two hops originating from the nodes outside with respect to the set . In contrast, in a similar graph shown in Fig. 2(b), such a property is lost and node has only one path from the outside of w.r.t. the set .


Now, we are ready to generalize this notion to the entire graph and define -robustness and -robustness with hops as follows.
Definition 4.2
A directed graph is said to be -robust with hops with respect to a given set , if for every pair of nonempty disjoint subsets , at least one of the following conditions holds:
-
1.
,
-
2.
,
-
3.
,
where is the set of nodes in () that are -reachable with -hop communication with respect to . Moreover, if the graph satisfies this property with respect to any set following the -total model, then we say that is -robust with hops under the -total model. When it is clear from the context, we will just say is -robust with hops. Furthermore, when the graph is -robust with hops, we also say it is -robust with hops.
Generally, robustness of a graph increases as the relay range increases. We will illustrate this point using the graphs in Fig. 3. Note that graph robustness with multi-hop communication needs to be checked for every possible set satisfying the -total model. In the context of this paper, we are interested to check -robustness under -total model.
First, the graph in Fig. 3(a) is not -robust with one hop since for the sets and , none of the nodes has two in-neighbors outside the corresponding set. However, under the 1-total model, this graph is -robust with hops. For instance, we first check the condition for the set . For sets and , all of the nodes 1, 3 and 4 have two independent paths of at most two hops originating from the outside of the set with node 1 not being the internal node. After checking all the possible subsets of , one can confirm that this graph is -robust with hops with respect to set . Since this graph is actually symmetric for each node, we can conclude that for the set (), this graph is -robust with hops with respect to this set. Hence, this graph is -robust with hops.
Next, we look at the graph in Fig. 3(b). When , this graph is -robust with hop but not -robust with hop. When , it becomes -robust with hops. It is further noted that the level of robustness is constrained by the in-degrees of the nodes. In the graph of Fig. 3(b), each node has four incoming edges. As a result, for , this graph cannot be -robust with any number of hops. We elaborate more on this aspect in Section VII.
5 Synchronous Network
In this section, we analyze the MW-MSR algorithm under synchronous updates, i.e., each normal node will update its value using those received from all of its -hop neighbors in a synchronous manner with other nodes at each time .
5.1 Matrix Representation
First, we write the system in a matrix form. For ease of notation in our analysis, reorder the node indices so that the normal nodes take indices and the malicious nodes are . Then the state vector and control input vector can be written as
(5) |
where the superscript stands for normal and for faulty. Regarding the control inputs and , the normal nodes follow (4) while the malicious nodes may not. Hence, they can be expressed as
(6) |
where is the matrix formed by the first rows of associated with normal nodes. The row sums of this matrix are zero as in . Thus, we can rewrite the system as
(7) |
5.2 Consensus Analysis with Multi-hop Communication
Now we are ready to provide a necessary and sufficient condition for resilient consensus applying the synchronous MW-MSR algorithm. The following theorem is the first main contribution of this paper.
Theorem 5.1
Consider a directed graph with -hop communication, where each normal node updates its value according to the synchronous MW-MSR algorithm with parameter . Under the -total malicious model, resilient asymptotic consensus is achieved if and only if the network topology is -robust with hops. Moreover, the safety interval is given by
Proof 5.2.
(Necessity) If is not -robust with hops, then there are nonempty, disjoint subsets such that none of the conditions in Definition 4.2 holds. Suppose that the initial value of each node in is and each node in takes , with . Let all other nodes have initial values taken from the interval . Since , suppose that all nodes in and are malicious and take constant values. Then there is still at least one normal node in both and since and , respectively. Then these normal nodes remove all the values of incoming neighbors outside of their respective sets since the message cover of these values has cardinality equal to or less. According to the synchronous MW-MSR algorithm, such normal nodes will keep their values and consensus cannot be achieved.
(Sufficiency) First, we show that the safety condition of resilient consensus is satisfied. Let and to be the maximum and minimum values of the normal nodes at time , respectively. We can show that is monotonically nonincreasing and is monotonically nondecreasing, and thus each of them has some limit. This can be directly shown from the definitions and the facts that the values used in the MW-MSR update rule always lie within the interval for . Since at each time , in step 2 of Algorithm 1, node wipes out the possibly manipulated values from at most nodes within hops. Moreover, the update rule (7) uses a convex combination of the values in . Therefore, the safety condition is satisfied.
Then, we denote the limits of and by and , respectively. We will prove by contradiction to show that , and thus the normal nodes will reach consensus. Suppose that . We can then take such that . Fix , where and is the minimum of all in step 3 of the MW-MSR algorithm. For , define recursively as
So we have for all , since it holds that
(8) | ||||
At any time step and for any , define two sets:
By the definition of , and are disjoint.
Let be the time such that and , . Such a exists since and converge to and , respectively, in monotonic manners as discussed above. Consider the nonempty and disjoint sets and . Notice that the network is -robust with hops w.r.t. any set following the -total model and the set of malicious nodes also satisfies the -total model. Hence, the network is -robust with hops w.r.t. the set and at least one of the three conditions in Definition 4.2 holds. Also notice that the normal node with value will definitely be in set , and it is similar for the case of . Hence, all nodes in either or have the -reachable property, or the union of the two sets contains at least nodes having the -reachable property. Since there are at most malicious nodes, for all cases, there must exist a normal node in the union of and such that it has at least independent paths originating from different nodes outside of its set and these paths do not have any internal node in .
Suppose that normal node has the -reachable property. Thus, node has at least neighbors within hops outside set , i.e., the values of these neighbors are smaller than and are at most equal to . Moreover, the original values of these multi-hop neighbors of node will definitely reach node even if the source nodes are malicious (since the internal nodes of these paths are all normal and they relay the values as received, without making any changes). Hence, node will use at least one of these values to update its own. This is because in step 2(c) of Algorithm 1, node will remove values lower than its own value of which the cardinality of the minimum message cover is at most . As a result, among the neighbors within hops outside set , the values from up to of them will be disregarded by node .
Now, in Algorithm 1, the update rule (4) of step 3 is applied. Here, each coefficient of the neighbors is lower bounded by . Since the largest value that node will use at time is , placing the largest possible weight on produces
Note that this upper bound also applies to the updated value of any normal node not in , because such a node will use its own value in its update. Similarly, if node has the -reachable property, then . Again, any normal node not in will have the same lower bound.
Next, consider the sets and . By , these two sets are still disjoint. Since at least one of the normal nodes in decreases at least to (or below), or one of the nodes in increases at least to (or above), it must hold , , or both. Recall that . As long as there are still normal nodes in and/or , we can repeat the above analysis for time step , which will result in either , , or both.
Since , there must be some time step (with ) such that either or is empty. In the former case, all normal nodes in the network at time step have values at most , while in the latter case all normal nodes at time step have values no less than . By (8) and , it holds that . Hence, we have contradiction to the fact that the largest value monotonically converges to (in the former case) or that the smallest value monotonically converges to (in the latter case). Hence, it must be the case that , proving that .
We emphasize that the graph condition based on the notion of robustness with hops is tight for our MW-MSR algorithm. Our notion captures the capability of agents to be influenced by the outside of the set in the multi-hop settings. We note that in [10], an idea similar to robustness is proposed, and based on it, a tight necessary and sufficient condition for Byzantine consensus using an MSR-type algorithm with multi-hop communication is provided. However, the focus there is on the Byzantine model and the condition is expressed in terms of the subgraph consisting of only the normal nodes. Part of the reason to focus on only the subgraph of normal nodes is that Byzantine nodes are more adversarial compared to malicious nodes as they can send different values to different neighbors. Hence, the subgraph of normal nodes has to be sufficiently robust to fight against the possible attacks. The condition there is an extension of the one for the one-hop case shown in [13]. Moreover, to meet the condition there, each node in must have at least incoming edges. This is different from the case for the malicious model studied in this paper, where at least incoming edges are required. Further discussions on the minimum requirement for our algorithm to guarantee resilient consensus are given in Section 7.
6 Asynchronous Network
In this section, we analyze the MW-MSR algorithm under asynchronous updates with time delays in the communication among nodes.
We employ the control input taking account of possible delays in the values from the neighbors as
(9) |
where denotes the value of node at time sent along path and is the delay in this -path at time . The delays are time varying and may be different in each path, but we assume the common upper bound on any normal path , over which all internal nodes are normal, as
(10) |
Hence, each normal node becomes aware of the value of each of its normal -hop neighbor on each normal -path at least once in time steps, but possibly at different time instants [12]. Although we impose this bound on the delays for transmission of messages, the normal nodes need neither the value of this bound nor the information that whether a path is a normal one or not.
The structure of the asynchronous MW-MSR algorithm can be outlined as follows. At each time , each normal node chooses to update or not. If it chooses not to update, then it keeps its value as . Otherwise, it uses the most recently received values of all its -hop neighbors on each -hop path to update its value using the MW-MSR algorithm in Algorithm 1. Like the one-hop MSR algorithm, if node does not receive any value along some path originating from its -hop neighbor (i.e., the crash model), then node will take this value on path as an empty value and will discard this value when it applies the WM-MSR algorithm. As we discussed earlier in Section II-E, in the asynchronous case also, manipulating message paths is equivalent to manipulating message values only and hence can be disregarded in our analysis.
Let be a diagonal matrix whose th entry is given by Then, let the matrices for and be given by
(11) |
and , respectively. Note that the summation of each row of is zero. The delay will be set to be one of the delays corresponding to the normal paths as we discuss further later.
Now, the control input can be expressed as
(12) |
where is a -dimensional vector for and is a matrix formed by the first rows of . Here, to simplify the discussion, we assume that consists of the given initial values of the agents. Then, the agent dynamics can be written as
(13) |
where is an matrix given by
The main result of this section now follows. Here, the safety interval differs from the synchronous case and is given by
(14) |
Theorem 6.1.
Consider a directed graph with -hop communication, where each normal node updates its value according to the asynchronous MW-MSR algorithm with parameter . Under the -total malicious model, resilient asymptotic consensus is achieved only if the underlying graph is -robust with hops. Moreover, if the underlying graph is -robust with hops, then resilient consensus is attained with the safety interval given by (14).
See the Appendix for the proof of this theorem.
Remark 6.2.
In comparison to the synchronous update case studied in the previous section, the graph condition to achieve resilient consensus under the asynchronous updates with delays is more restrictive. This is because when the nodes updates asynchronously, the normal nodes may not receive the same values from the malicious nodes, which creates a more adversarial situation for resilient consensus. Moreover, in the next section, in Lemma 7.7, we prove that under the -total model, a graph which is -robust with hops is also -robust with hops. For instance, the graph in Fig. 4 is -robust with hops and hence -robust with hops. Thus, as expected, the sufficient condition for the asynchronous algorithm guaranteeing resilient consensus is also sufficient for the synchronous algorithm.
Remark 6.3.
The difference in the network requirements discussed above for the synchronous and asynchronous algorithms is a consequence partly due to the deterministic nature in transmission times. In [8], it is shown that for an asynchronous algorithm with one-hop communication without delays, we can recover the tight necessary and sufficient network condition of the synchronous case, i.e., the graph to be -robust under the -total malicious model. It is interesting that this result requires randomization in agents’ communication instants whereas in the deterministic case, the sufficient graph condition remains to be -robustness, which coincides with the implication of Theorem 6.1. In the multi-hop setting, however, delays are critical and hence we do not pursue such results in this paper.

7 Discussions on Graph Robustness with Multi-hop Communication
In this section, we demonstrate some properties of graph robustness with hops, which generalize the properties of robustness with one hop in [9] when for this new notion. Moreover, we provide the analysis of graph robustness with hops for the case where is sufficiently large. This corresponds to the case of unbounded path length.
7.1 Properties of Robustness with l Hops
As discussed earlier, our definition of robustness with hops is a generalization of the definition of robustness with one-hop communication from [9]. Here, we are interested in investigating how properties of robustness with the one-hop case can be extended to the multi-hop case. In what follows, we present a series of lemmas that analyze the generalized notion of robustness. Recall that robustness with hops is defined w.r.t. the given set satisfying the -total model, but we omit saying this when it is clear from the context in this section. Typically, we are interested in for -robustness.
The first result is simple, stating that -robustness with hops of a graph holds with smaller and .
Lemma 7.1.
If a directed graph is -robust with hops, then it is also -robust with hops when .
In the second result, we show that the level of robustness of a given graph with hops does not decrease by adding edges to the graph nor by increasing the relay range .
Lemma 7.2.
Suppose that a directed subgraph of is -robust with hops, where . Then is -robust with hops. Moreover, is -robust with hops, where .
The maximum robustness with hops for a graph consisting of nodes is the same as that with the one-hop case. The following lemma suggests that the bound cannot be breached by introducing multi-hop communication to the MSR algorithms. This bound is dependent on the nature of the MSR algorithms, which cannot tolerate half or more of the agents to be adversarial.
Lemma 7.3.
No directed graph on nodes is -robust with hops. Moreover, the complete graph is -robust with hops for .
Proof 7.4.
We consider the nontrivial case with . Then pick and by taking any bipartition of (i.e., and ) such that and . Neither nor has nodes; thus, neither one has a node being -reachable with -hop communication. Hence, is not -robust with hops.
The proof for the complete graph case follows an analysis similar to the one for the one-hop case [9].
The following lemma exposes that the notion of -robust graphs has a more complicated structure in the relation between the two parameters and .
Lemma 7.5.
If a directed graph is -robust with hops under the -total model, then it is also -robust with hops under the -total model.
Proof 7.6.
Consider any nonempty disjoint subsets . If or for , then this pair of subsets satisfies conditions 1) or 2) of -robustness with hops. Thus, assume and for . Then condition 3) for -robustness with hops must be satisfied, i.e., .
Since , at least one of , is nonempty. Suppose that is nonempty. Then, we choose . Pick the new pair of nonempty disjoint subsets as and . Observe that if then . Because node is the only difference between and , and node can only be part of one independent path whose destination is node . Consequently, even if node is on one independent path whose destination is node , node still has the -reachable property, i.e., it has at least other independent paths of at most hops originating from nodes outside and these paths do not have any internal nodes from set . Then, by adding back into the set , we have
(15) |
Moreover, and (since ). The first inequality holds because if and from the observation we just proved (if then ), we have , leading us to a contradiction.
Therefore, for nonempty disjoint subsets , it must hold that . Together with (15), we have
suggesting that is -robust with hops under the -total model.
From this result, we can directly derive the following corollary, which indicates that if a graph is -robust with hops, then it is also -robust with hops.
Corollary 7.7.
If a directed graph is -robust with hops, where , then is -robust with hops.
Similar to the one-hop case, robustness with hops can guarantee a certain level of graph connectivity and a minimum in-degree of the graph. The proof for the connectivity result is trivial and hence omitted.
Lemma 7.8.
If a directed graph is -robust with hops, then is at least -connected.
Lemma 7.9.
If a directed graph is -robust with hops under the -total model, where and , then has the minimum in-degree as
Proof 7.10.
The case for and is trivial. Consider the case for and . Fix node . Choose and . Then, and . Hence, node must have at least independent paths from outside and the number of the in-neighbors of node should be . (Note that the malicious nodes can be the source nodes of these independent paths.)
When , form by choosing in-neighbors of node along with node itself. Then, choose . Since , then, and . The worst case is that the in-neighbors of node are all malicious, node should have at least independent paths from outside, and these paths do not contain any malicious nodes as internal nodes. This implies that node has additional in-neighbors outside of , thereby guaranteeing .
When , form by choosing in-neighbors of node along with node itself. Then, choose . Since and , we have and . Consider the worst case that the in-neighbors of node are all malicious. It must be that node has additional in-neighbors outside of , thereby guaranteeing . Since we choose arbitrarily, we have proved the bound for .
Here, we have extended the proof in [9] to the multi-hop case. From Lemma 7.9, we conclude that should have the minimum in-degree no less than to guarantee resilient consensus using the MW-MSR algorithm under the -total malicious model. This holds since the underlying graph is at least -robust with hops for achieving resilient consensus. For MSR algorithms, nodes with in-neighbors may not use any values from neighbors, which may appear problematic especially if there are multiple such nodes. However, there are examples such as cycle graphs333A cycle graph is an undirected graph consisting of only a single cycle. satisfying -robust with hops, while every node in cycle graphs has in-degree as . Detailed analysis is given in the next subsection.
7.2 The Case of Unbounded Path Length
In this subsection, we discuss the relation of the graph conditions used in this paper and in the recent work [30]. The authors there studied the Byzantine binary consensus under the local broadcast model, which is essentially equivalent to the -total malicious mode studied in the current paper. The proposed algorithm in [30] is based on a non-iterative flooding algorithm, where nodes must relay their values over the entire network along with the path information. This model corresponds to the case of unbounded path length in our work, i.e. , where is the longest cycle-free path length of the network. Moreover, they propose a tight necessary and sufficient graph condition for their algorithm to achieve binary consensus under synchronous updates. Our aim in this part of the paper is to establish that our graph condition is equivalent to theirs for the case of unbounded path length (). Further, we will highlight that to achieve the same tolerance as the algorithm in [30], our algorithm does not in general require -hop communication necessarily for general graphs.
To show the equivalence between the two graph conditions, we introduce some graph notions from [30]. There, normal nodes update the states based on a modified certified propagation algorithm [40], i.e., when a normal node receives same binary values from different paths excluding a suspicious set , it commits its value to this value. Hence, their graph notion is closely related to the partitions of sets and .
Definition 7.11.
For disjoint node sets , we say if and only if set contains at least distinct incoming neighbors of , i.e., . Denote when is not true.
Definition 7.12.
For disjoint node sets and for set , we say if and only if for every node , there exist at least disjoint -paths that have only in common and none of them contains any internal node from the set . Denote when is not true.
Two graph notions are introduced next, called conditions NC and SC. They are known to be equivalent [30].
Definition 7.13.
(Condition NC) Given a graph , condition NC is said to hold if for every partition of , and for every set with , where both and are non-empty, we have that either or .
(Condition SC) Given a graph , condition SC is said to hold if for every partition of , and for every set with , where both and are non-empty, we have that either or .
We are now ready to show that condition NC (and hence condition SC) is equivalent to our robust graph notion with multi-hop communication used in Theorem 5.1.
Proposition 7.14.
Consider a directed graph with -hop communication where . The graph is -robust with hops if and only if condition NC holds.
Proof 7.15.
We first show the only if part. Since the graph is -robust with hops under the -total model, at least one of the three conditions in Definition 4.2 holds. For every partition of , and for every set , where both and are non-empty, we conclude that there is at least one normal node in the union of and that has independent paths from outside and these paths do not contain any internal nodes in . This can be seen in the proof of Theorem 5.1. Suppose that node has this property. For each independent path, there exists at least one edge that goes from the outside of to a node in , and thus, . The case for can be proved similarly.
Next, we show the if part by contradiction. Suppose that is not -robust with hops. Then, none of the three conditions in Definition 4.2 holds. For every partition of , and for every set , where both and are non-empty, we conclude that all the normal nodes in the union of and have at most independent paths from outside where these paths do not contain any internal nodes in . Hence, and (i.e., condition SC does not hold), and thus we have contradiction.
Finally, since condition SC and condition NC are equivalent, we have proved that condition NC implies the -robustness with hops.
Although our condition coincides with those in [30] when , we note that the maximum robustness of a given graph does not require necessarily. That is, for a given graph under the -total model, our algorithm may not require -hop communication to get the same tolerance as the algorithm using -hop communication in [30]. We illustrate this fact by presenting the examples of cycle graphs.

From the example graph in Fig. 3(a), we can see that for any cycle graph, the following lemma holds. This indicates that resilient consensus is guaranteed using the MW-MSR algorithm in such graphs when one node behaves maliciously. In [30], it is reported that a cycle graph can tolerate one malicious node, but their algorithm uses the -hop communication. In this respect, as the following lemma suggests, our algorithm is efficient by exploiting the ability of the MW-MSR algorithm and the graph condition is tighter than the one in [30]. Moreover, note that a cycle graph is 2-connected, which is the minimum connectivity requirement for any MSR-based algorithm to guarantee resilient consensus for .
Lemma 7.16.
The cycle graph with nodes is -robust with hops under the -total model.
Proof 7.17.
We need to show that for any node partition , of , at least one of the conditions for -robustness with hops holds. Let be a set of a single node, i.e., (satisfying the 1-total model). We first select a single node as set . Then, for any set and for any set , condition 1) for -robustness with hops holds. (The case is similar when we select non-neighboring nodes as set .) Second, we select two neighboring nodes as set . If node , then condition 1) for -robustness with 2 hops holds. If node , then node has 2 independent 2-hop paths originating from outside. To meet the conditions for -robustness with hops, we need to find another node having this property in (see the illustration in Fig. 5). The worst case is when all the remaining nodes are in . Then the middle node in has 2 shortest paths originating from outside, which are of length hops.
We can continue this process and select three neighboring nodes as set . We can follow an analysis as above: If node and all the remaining nodes are in , then the middle node in has 2 shortest paths originating from outside, which are shorter than the length hops. This process can be continued until we switch sets and . Hence, we conclude that the cycle graph is -robust with hops.
8 Numerical Examples
In this section, we conduct numerical simulations over networks using both synchronous and asynchronous versions of the proposed MW-MSR algorithm to verify their effectiveness.





8.1 Synchronous MW-MSR Algorithm
In this part, we conduct simulations for the synchronous MW-MSR algorithm. Consider the undirected network in Fig. 3(a) with . Let the initial states be . This graph is not -robust with one hop, and hence, is not robust enough to tolerate using the conventional one-hop W-MSR algorithm. Here we set node 1 to be malicious and let the value of node 1 evolve based on the sine function w.r.t. time. Then, normal nodes update their values using the one-hop W-MSR algorithm. The results are given in Fig. 6, and resilient consensus among normal nodes is not achieved.
Next, consider the two-hop case for this graph. For malicious node 1, we assume that it does not only manipulate its own value as in the one-hop case, but also relays false information. Specifically, when node 1 receives a message from node 4 and relays the value to node 2, it manipulates this value based on the sine function w.r.t. time. Similarly, when node 1 receives a message from node 2 and relays the value to node 4, it manipulates this value to a fixed value of 0.5. Then, we observe that resilient consensus is achieved as shown in Fig. 7.
8.2 Asynchronous MW-MSR Algorithm
In this part, we conduct simulations for the asynchronous MW-MSR algorithm. Consider the directed network in Fig. 4 with . Let the nodes take initial states as . This graph is not -robust with one hop (e.g., consider the sets and ), and hence, is not robust enough to tolerate using the one-hop W-MSR algorithm. Here, we set node 1 to be malicious and assume that the value of node 1 evolves based on the sine function w.r.t. time. Then, we apply the one-hop W-MSR algorithm and observe that resilient consensus among normal nodes is not achieved as shown in Fig. 8.
Next, consider the two-hop case for this graph. It becomes -robust with hops, and hence, it is also -robust with hops as Corollary 7.7 indicates. Therefore, in the two-hop case, it can tolerate one malicious node under both synchronous and asynchronous updates. For malicious node 1, we assume that it does not only manipulate its own value as in the one-hop case, but also relays false information. Specifically, when node 1 receives a message from node 3 and relays the value to its other neighbors, it manipulates this value to a fixed value of 0.5. Similarly, when node 1 receives a message from node 6 and relays the value to other neighbors, it manipulates this value to a fixed value of 9.5. Additionally, when node 1 receives a message from node 5 and relays the value to other neighbors, it manipulates this value based on the sine function w.r.t. time. In Fig. 9, we plot the consensus error given by and observe that resilient consensus is achieved.
Lastly, we examine the two-hop algorithm under asynchronous updates with delays. We consider the same attack, but let each normal node update in a periodic manner. Specifically, nodes 2, 3, 4, 5, and 6 update in every 1, 5, 4, 3, and 2 steps, respectively. The delays for the messages from one-hop neighbors and two-hop neighbors are set as 0 and 1 step, respectively. Fig. 10 shows the states as well as the consensus error given by . It indicates that consensus is attained despite the malicious attacks. Note that in this situation, we can only guarantee the nonincreasing property of (with ). Through these simulations, we have verified the effectiveness of the MW-MSR algorithms to achieve resilient consensus in small-scale networks.


8.3 Simulations in Large Wireless Sensor Networks
In this part of the simulations, we create a WSN composed of 100 nodes located in a grid structure as shown in Fig. 11. Let the nodes take indices and the coordinate of node is . Each node can communicate only with the nodes located within the communication radius of . Once is determined, the topology of the network is formed. Then we apply the one-hop, two-hop, and three-hop MW-MSR algorithms to the network. Recall that denotes the maximum number of malicious nodes in the network, and we increase from 0 to 11 by selecting the malicious nodes with indices in the order of .

Here, we examine how the network connectivity affects the performance of the MW-MSR algorithms with different hops. Using different values for the number of malicious agents and the communication radius , the results of the one-hop algorithm are presented in Fig. 12(a). For each and each (corresponding to one cell in the figure), we compute the success rate of the algorithm to achieve resilient consensus over 50 Monte Carlo runs with randomly chosen initial values (within [0, 100]) of the normal agents for each run. The malicious nodes take values based on sine functions w.r.t. time. Similarly, we also conduct simulations for the two-hop and the three-hop algorithms and the results are given in Figs. 12(b) and (c), respectively.
One can see that by increasing the number of hops , the success rate of the algorithm to achieve resilient consensus increases almost for every value of . Such improvement is especially significant when and . This verifies our intuition as well as theoretical findings that graph robustness increases as increases. However, the difference between the results for the two-hop and the three-hop algorithms is somewhat minor. One reason is that the maximum robustness under the -total model of a given graph is bounded by the minimum in-degree . This may indicate that the two-hop communication for this graph already reaches the number of hops for the maximum graph robustness.






In these simulations, the success rate for reaching consensus is determined by the level of consensus error at time . If the consensus error is below the threshold , then the run is considered as a success. Hence, if the consensus process is very slow, it may be considered as a failure. For example, observe that for the case of (i.e., with no attacks) the success rate increases with larger while the network is connected as long as .
We should remark that the process of consensus forming can be accelerated by increasing the number of hops, as discussed in [32] for the fault-free case. This can be clearly seen in all plots in Fig. 13, presenting the time responses of the consensus errors for several cases of and , where and stand for the consensus errors for the one-hop, two-hop, and three-hop algorithms, respectively. Based on these examples, we conclude that by introducing multi-hop communication to the MSR algorithms, it does not only improve the robustness of the network but also accelerates the convergence in consensus forming even in adversarial environments.
9 Conclusion
In this paper, we have investigated the resilient consensus problem when multi-hop communication is available. We have proposed generalized versions of MSR algorithms to correctly use the additional values received from multi-hop neighbors. Moreover, we have fully characterized the network requirement for the algorithms in terms of robustness with hops. By introducing multi-hop communication, the convergence of the resilient consensus process can be accelerated. Furthermore, it provides an effective way to enhance robustness of networks without increasing physical communication links. In future works, we intend to extend our algorithms to the asynchronous Byzantine consensus problem using multi-hop communication with a fixed number of hops.
Appendix
Proof of Theorem 6.1
Proof 9.1.
(Necessity) Since the synchronous algorithm is a special case of the asynchronous algorithm, the necessary condition in Theorem 5.1 also holds here.
(Sufficiency) First, we show the safety condition. For , by the assumption on , it holds , and thus . Next, for , let and be the largest value and the smallest value, respectively, of the normal agents from time . That is,
(16) |
Then we prove that is a nonincreasing function of . By (13), at time , each normal agent updates its value based on a convex combination of the neighbors’ values from to . Moreover, the values outside of the interval determined by the normal agents’ values will be ignored by step 2 of the MW-MSR algorithm. This is because in this step, node will remove the largest sized subsets of large and small values that can be manipulated by at most nodes within hops. Hence, we obtain for any . We also have
for any . Therefore, is nonincreasing in time as
We can similarly prove that is nondecreasing in time. This indicates that for , we have , . Thus, we have shown the safety condition.
Next, we show the convergence. As shown above, and are monotonically decreasing and increasing, respectively, and moreover bounded. Thus, both of their limits exist and are denoted by and , respectively. We claim that the limits satisfy , i.e., consensus is achieved. We prove by contradiction and assume that .
Recall that lower bounds the nonzero entries of . Choose small enough that . Fix
(17) |
Define the sequence by
So we have for all . In particular, they are positive because by (17), it holds that
Take such that and for . Such exists due to the convergence of and . Then we can define the two disjoint sets as
Next, we show that one of the two sets becomes empty in a finite number of steps, which contradicts the assumption on and being the limits. Consider the set . Due to the definition of and its limit , one or more normal nodes are contained in the union of the sets for . We claim that is in fact nonempty. To prove this, it is sufficient to show that if a normal node is not in , then it is not in for .
Suppose that node satisfies . Every normal node updates its value to a convex combination of the multi-hop neighbors’ values at the current or previous times. Moreover, the values greater than are ignored in step 2 of the MW-MSR algorithm. Hence, the value of node at the next time step is upper bounded as
(18) | ||||
It thus follows that node is not in . This means that the cardinality of the set is nonincreasing for . The same holds for , and hence is nonempty too.
We next show that one of these two sets in fact becomes empty in finite time. Since the graph is -robust with hops w.r.t. any set satisfying the -total model, the graph is also -robust with hops w.r.t. set (i.e., the set of adversarial nodes). Therefore, between the two nonempty disjoint sets and , one of them has a normal agent with at least independent paths originating from the nodes outside and these paths do not have any internal node in the set .
Suppose that normal node has this property. Since there are at most malicious nodes and node can only remove the values of which the cardinality of the minimum message cover is . Moreover, node is supposed to update once in at most time steps. Therefore, when node makes an update at time , it will use at least one delayed value from the normal nodes outside the set , upper bounded by . It thus follows that, at time , when node makes an update, its value can be bounded as
By (18), we have . We can conclude that if node in has independent paths originating from the nodes outside the set, then it goes outside of after steps. Consequently, . Likewise, it follows that if has a node having at least independent paths originating from the nodes outside, then .
Since there are only normal nodes, we can repeat the steps above until one of the sets and becomes empty, and it takes no more than steps. Once the set becomes empty, it remains so indefinitely. This contradicts the assumption that and are the limits. Therefore, we obtain .
References
- [1] F. Bullo, J. Cortés, and S. Martinez, Distributed Control of Robotic Networks: A Mathematical Approach to Motion Coordination Algorithms. Princeton University Press, 2009.
- [2] N. A. Lynch, Distributed Algorithms. Morgan Kaufmann, 1996.
- [3] Y. Kikuya, S. M. Dibaji, and H. Ishii, “Fault-tolerant clock synchronization over unreliable channels in wireless sensor networks,” IEEE Transactions on Control of Network Systems, vol. 5, no. 4, pp. 1551–1562, 2017.
- [4] S. Yang, S. Tan, and J. Xu, “Consensus based approach for economic dispatch problem in a smart grid,” IEEE Transactions on Power Systems, vol. 28, no. 4, pp. 4416–4426, 2013.
- [5] A. Mitra, F. Ghawash, S. Sundaram, and W. Abbas, “On the impacts of redundancy, diversity, and trust in resilient distributed state estimation,” IEEE Transactions on Control of Network Systems, vol. 8, no. 2, pp. 713–724, 2021.
- [6] A. Nedic and A. Ozdaglar, “Distributed subgradient methods for multi-agent optimization,” IEEE Transactions on Automatic Control, vol. 54, no. 1, pp. 48–61, 2009.
- [7] S. Sundaram and B. Gharesifard, “Distributed optimization under adversarial nodes,” IEEE Transactions on Automatic Control, vol. 64, no. 3, pp. 1063–1076, 2018.
- [8] S. M. Dibaji, H. Ishii, and R. Tempo, “Resilient randomized quantized consensus,” IEEE Transactions on Automatic Control, vol. 63, no. 8, pp. 2508–2522, 2018.
- [9] H. J. LeBlanc, H. Zhang, X. Koutsoukos, and S. Sundaram, “Resilient asymptotic consensus in robust networks,” IEEE Journal on Selected Areas in Communications, vol. 31, no. 4, pp. 766–781, 2013.
- [10] L. Su and N. H. Vaidya, “Reaching approximate Byzantine consensus with multi-hop communication,” Information and Computation, vol. 255, pp. 352–368, 2017.
- [11] Y. Nugraha, A. Cetinkaya, T. Hayakawa, H. Ishii, and Q. Zhu, “Dynamic resilient network games with applications to multi-agent consensus,” IEEE Transactions on Control of Network Systems, vol. 8, no. 1, pp. 246–259, 2021.
- [12] S. M. Dibaji and H. Ishii, “Resilient consensus of second-order agent networks: Asynchronous update rules with delays,” Automatica, vol. 81, pp. 123–132, 2017.
- [13] N. H. Vaidya, L. Tseng, and G. Liang, “Iterative approximate Byzantine consensus in arbitrary directed graphs,” in Proc. ACM Symposium on Principles of Distributed Computing, 2012, pp. 365–374.
- [14] A. Teixeira, D. Pérez, H. Sandberg, and K. H. Johansson, “Attack models and scenarios for networked control systems,” in Proc. 1st International Conference on High Confidence Networked Systems, 2012, pp. 55–64.
- [15] D. Dolev, “The Byzantine generals strike again,” Journal of Algorithms, vol. 3, no. 1, pp. 14–30, 1982.
- [16] M. J. Fischer, N. A. Lynch, and M. S. Paterson, “Impossibility of distributed consensus with one faulty process,” Journal of the ACM, vol. 32, no. 2, pp. 374–382, 1985.
- [17] D. Dolev, N. A. Lynch, S. S. Pinter, E. W. Stark, and W. E. Weihl, “Reaching approximate agreement in the presence of faults,” Journal of the ACM, vol. 33, no. 3, pp. 499–516, 1986.
- [18] M. Azadmanesh and R. Kieckhafer, “Asynchronous approximate agreement in partially connected networks,” International Journal of Parallel and Distributed Systems and Networks, vol. 5, no. 1, pp. 26–34, 2002.
- [19] W. Abbas, M. Shabbir, J. Li, and X. Koutsoukos, “Interplay between resilience and accuracy in resilient vector consensus in multi-agent networks,” in Proc. IEEE Conference on Decision and Control, 2020, pp. 3127–3132.
- [20] D. M. Senejohnny, S. Sundaram, C. De Persis, and P. Tesi, “Resilience against misbehaving nodes in asynchronous networks,” Automatica, vol. 104, pp. 26–33, 2019.
- [21] Y. Wang and H. Ishii, “An event-triggered approach to quantized resilient consensus,” International Journal of Robust and Nonlinear Control, vol. 30, no. 11, pp. 4188–4204, 2020.
- [22] Y. Wang, H. Ishii, F. Bonnet, and X. Défago, “Resilient real-valued consensus in spite of mobile malicious agents on directed graphs,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 3, pp. 586–603, 2021.
- [23] D. Saldana, A. Prorok, S. Sundaram, M. F. Campos, and V. Kumar, “Resilient consensus for time-varying networks of dynamic agents,” in Proc. American Control Conference, 2017, pp. 252–258.
- [24] J. Usevitch and D. Panagou, “Determining r- and (r, s)-robustness of digraphs using mixed integer linear programming,” Automatica, vol. 111, no. 108586, 2020.
- [25] W. Abbas, A. Laszka, and X. Koutsoukos, “Improving network connectivity and robustness using trusted nodes with application to resilient consensus,” IEEE Transactions on Control of Network Systems, vol. 5, no. 4, pp. 2036–2048, 2017.
- [26] W. Abbas, A. Laszka, and X. Koutsoukos, “Diversity and trust to increase structural robustness in networks,” in Proc. American Control Conference, 2019, pp. 4043–4048.
- [27] L. Yuan and H. Ishii, “Secure consensus with distributed detection via two-hop communication,” Automatica, vol. 131, art. no. 109775, 2021.
- [28] C. Zhao, J. He, and J. Chen, “Resilient consensus with mobile detectors against malicious attacks,” IEEE Transactions on Signal and Information Processing over Networks, vol. 4, no. 1, pp. 60–69, 2018.
- [29] D. Sakavalas, L. Tseng, and N. H. Vaidya, “Asynchronous Byzantine approximate consensus in directed networks,” in Proc. 39th Symposium on Principles of Distributed Computing, 2020, pp. 149–158.
- [30] M. S. Khan, L. Tseng, and N. Vaidya, “Exact Byzantine consensus on arbitrary directed graphs under local broadcast model,” in Proc. International Conference on Principles of Distributed Systems, 2019, pp. 30:1–30:16.
- [31] A. Goldsmith, Wireless Communications. Cambridge University Press, 2005
- [32] Z. Jin and R. M. Murray, “Multi-hop relay protocols for fast consensus seeking,” in Proc. IEEE Conference on Decision and Control, 2006, pp. 1001–1006.
- [33] Z. Zhao and Z. Lin, “Global leader-following consensus of a group of general linear systems using bounded controls,” Automatica, vol. 68, pp. 294–304, 2016.
- [34] S. Manfredi, “Design of a multi-hop dynamic consensus algorithm over wireless sensor networks,” Control Engineering Practice, vol. 21, no. 4, pp. 381–394, 2013.
- [35] W. Ren and Y. Cao, Distributed Coordination of Multi-agent Networks: Emergent Problems, Models, and Issues. Springer, 2011.
- [36] M. Mesbahi and M. Egerstedt, Graph Theoretic Methods in Multi-agent Networks. Princeton University Press, 2010.
- [37] L. Yuan and H. Ishii, “Resilient consensus with multi-hop communication,” in Proc. IEEE Conference on Decision and Control, 2021, pp. 2696–2701.
- [38] R. Olfati-Saber, J. A. Fax, and R. M. Murray, “Consensus and cooperation in networked multi-agent systems,” Proc. IEEE, vol. 95, no. 1, pp. 215–233, 2007.
- [39] R. L. Rivest, A. Shamir, and L. Adleman, “A method for obtaining digital signatures and public-key cryptosystems,” Communications of the ACM, vol. 21, no. 2, pp. 120–126, 1978.
- [40] L. Tseng, N. Vaidya, and V. Bhandari, “Broadcast using certified propagation algorithm in presence of Byzantine faults,” Information Processing Letters, vol. 115, no. 4, pp. 512–514, 2015.
[]Liwei Yuan received the B.E. degree in Electrical Engineering and Automation from Tsinghua University, China, in 2017, and the M.E. degree in Computer Science from Tokyo Institute of Technology, Japan, in 2019. He is currently working toward the Ph.D. degree in the Department of Computer Science at Tokyo Institute of Technology, Yokohama, Japan. His current research focuses on security in multi-agent systems and distributed algorithms.
[]Hideaki Ishii (M’02-SM’12-F’21) received the
M.Eng. degree from Kyoto University, Kyoto, Japan, in 1998, and the
Ph.D. degree from the University of Toronto, Toronto,
ON, Canada, in 2002. He was a Postdoctoral Research
Associate at the University of Illinois at Urbana-Champaign,
Urbana, IL, USA, from 2001 to
2004, and a Research Associate at The University of Tokyo, Tokyo, Japan,
from 2004 to 2007.
Currently, he is a Professor at the Department of Computer Science,
Tokyo Institute of Technology, Yokohama, Japan.
His research interests
are in networked control systems, multiagent systems, distributed algorithms,
and cyber-security of control systems.
Dr. Ishii has served as an Associate Editor for the IEEE Control Systems Letters and the Mathematics of Control, Signals, and Systems and previously for Automatica, the IEEE Transactions on Automatic Control, and the IEEE Transactions on Control of Network Systems. He is the Chair of the IFAC Coordinating Committee on Systems and Signals since 2017. He is the IPC Chair for the IFAC World Congress 2023 to be held in Yokohama, Japan. He received the IEEE Control Systems Magazine Outstanding Paper Award in 2015. Dr. Ishii is an IEEE Fellow.