Resilient Strong Structural Controllability in Networks
using Leaky Forcing in Graphs
Abstract
This paper studies the problem of selecting input nodes (leaders) to make networks strong structurally controllable despite misbehaving nodes and edges. We utilize a graph-based characterization of network strong structural controllability (SSC) in terms of zero forcing in graphs, which is a dynamic coloring of nodes. We consider three types of misbehaving nodes and edges that disrupt the zero forcing process in graphs, thus, deteriorating the network SSC. Then, we examine a leader selection guaranteeing network SSC by ensuring the accuracy of the zero forcing process, despite misbehaving nodes/edges. Our main result shows that a network is resilient to misbehaving nodes/edges under one threat model if and only if it is resilient to the same number of failures under the other threat models. Thus, resilience against one threat model implies resilience against the other models. We then discuss the computational aspects of leader selection for resilient SSC and present a numerical evaluation.
Index Terms:
Strong structural controllability, zero forcing sets, resilience in networks, dynamics over graphs.I Introduction
The ability to control a network of agents through external control signals profoundly depends on the underlying network topology [1, 2, 3, 4, 5]. The control signals are injected into the network via a subset of agents, typically called leaders. Computing a minimum number of leaders and their locations within the network for complete controllability are central issues in the cooperative control of networks. A popular approach for the leader selection problem, which is well-studied, is to characterize network controllability from a graph-theoretic perspective. Then formulate an appropriate vertex selection problem in graphs that can be solved through various combinatorial methods.
To this end, several graph-based characterizations of network controllability have been presented, including those based on graph distances, zero forcing in graphs, dominating sets, matching in graphs, and others (e.g., [6, 7, 8, 9, 10, 11, 12]). The notion of zero forcing in graphs is particularly useful for strong structural controllability (SSC) in networks, which ascertains that for a given set of leaders, if the network is controllable for one set of edge weights, then it is controllable for all feasible edge weights. The zero forcing phenomenon, introduced in [13], is a dynamic coloring of nodes in a graph in which only a subset of nodes are initially colored, causing other nodes to change colors according to some rules. A set of initially colored nodes that eventually color the entire graph is called a zero forcing set of the graph. Interestingly, a leader set for the strong structural controllability of a network is directly related to the idea of a zero forcing set in the underlying network graph [6, 14, 15]. A set of leaders makes a given network strong structurally controllable if the corresponding nodes in the underlying graph constitute a zero forcing set.
In this paper, we consider the leader selection for resilient strong structural controllability, that is, the network remains SSC despite some misbehaving nodes or edges deviating from their normal functionalities. A single misbehaving agent or an edge (due to a fault or an adversary) can severely deteriorate the network’s controllability. Considering the susceptibility of networks to adversarial attacks and failures, the resilient SSC is a crucial paradigm in network control systems. We consider three different abnormal behaviors by nodes (agents) and edges. These misbehaving nodes and edges primarily disrupt the zero forcing process in the underlying network graph, affecting the network’s SSC. In particular, we examine leak nodes (agents that do not follow the rules of the zero forcing process), non-forcing edges (links that again disrupt the zero forcing process), and removable edges (links that are lost and affect interconnections between nodes). We then study the leader set guaranteeing the network SSC despite a given number of such misbehaving nodes/edges. For this, we utilize the idea of leaky forcing, a variant of zero forcing in graphs recently introduced in [16, 17]. Our main result shows that the resilient leader selection against one abnormal behavior implies resilience against the other two abnormal behaviors. The main contributions are below:
-
•
We study the resilient SSC problem in networks by connecting it to the notion of leaky forcing in graphs.
-
•
We consider three models of misbehaving nodes/edges in networks, including node leaks, non-forcing edges, and removable edges, and formulate leader selection in networks to guarantee that the network remains SSC despite such abnormal nodes/edges (Section III).
-
•
We show that a given leader set is resilient to misbehaving nodes/edges under one model if and only if it is resilient to the same number of misbehaving nodes/edges in the other model (Section IV).
-
•
Finally, we discuss computational aspects of selecting leaders for the resilient SSC and also present a numerical evaluation (Section V).
There have been works discussing the impact of nodes/edges addition and deletion on the network’s controllability, for instance, [18, 19, 20, 21]. Similarly, some researchers have considered the effects of actuators/input node failures on the overall controllability of systems. Some also propose methods to have a sufficient number of input nodes maintaining network controllability despite such failures [22, 23, 24, 25]. Our work differs from theirs as we consider node/edge misbehavior models beyond deletion. These misbehaving nodes/edges remain within the network disrupting the underlying graph-theoretic process required to ensure SSC. Our goal is to have leader sets guaranteeing SSC despite the existence of any such nodes/edges within the network. For this, we utilize the idea of leaky forcing in graphs.
The rest of the paper is organized as follows: Section II presents preliminary ideas related to network controllability and zero forcing in graphs. Section III explains various threat models and formulates the leader selection problems for the resilient SSC in networks. Section IV presents the main result regarding the equivalence of leader selection for resilient SSC under various threat models. Section V discusses the computational aspects and provide numerical illustrations. Finally, Section VI concludes the paper.
II Preliminaries
We consider a network of agents modeled by an undirected graph . The node set , and the edge set , represent agents and interconnections between agents, respectively. The edge between nodes and is denoted by an unordered pair . The neighborhood of is . The distance between nodes and , denoted by , is the number of edges in the shortest path between them. For a given graph with nodes, we define a family of symmetric matrices as below:
(1) |
Note that the location of zero and non-zero entries in every remains the same, and is entirely described by the edge set of .
II-A System Model and Graph Controllability
We consider the following leader-follower system defined over a graph .
(2) |
where is the system state, is the external input, (as in (1)) is the system matrix, and is the input matrix describing the leader (input) nodes. If , and is a set of leader nodes, then we define as follows:
(3) |
We observe that the family of matrices describes a number of system matrices defined over , including the Laplacian and adjacency matrices.
For a given graph , system matrix , and input matrix , the system in (2) is called controllable if there exists an input to drive the system from an arbitrary initial state to an arbitrary final state . In this case, we say that is a controllable pair. A pair is controllable if and only if the rank of the controllability matrix , defined below, is (i.e., full rank).
(4) |
Since leader nodes define the input matrix , we sometimes abuse the notation slightly and use is controllable to denote that is a controllable pair.
Definition 1
(Network Strong Structural Controllability) A network with a leader set is strong structurally controllable if and only if is a controllable pair for all .
Network strong structural controllability is a stronger notion compared to the (weak) structural controllability, which requires the existence of at least one matrix for which is a controllable pair.
II-B Network Controllability and Zero Forcing in Graphs
A central problem in network controllability is to compute a minimum leader set that makes the network strong structurally controllable (as defined above). The problem is often referred to as the minimum leader selection for network controllability. A graph-theoretic characterization of the minimum leader set rendering the network strong structurally controllable is remarkably useful here. Monshizadeh et al. characterized the minimum leader set for network strong structural controllability in [6] using the notion of zero forcing in graphs, which is related to the dynamic coloring of nodes. We introduce zero forcing ideas below and then state the main result from [6].
Definition 2
(Zero forcing) Given a graph whose nodes are initially colored either black or white. Consider the following node color changing rule: If is colored black and has exactly one white neighbor , change the color of to black. Zero forcing is the application of the above rule until no further color changes are possible.
Definition 3
(Force) A force is an application of the color changing rule due to which the color of a white node is changed to black by some black node . We say that forced and denote it by .
Definition 4
(Input and derived sets) For a graph with an initial set of black nodes , the derived set of , denoted by , is the set of black nodes obtained after applying the zero forcing rule exhaustively. The initial set of black nodes is the set of input nodes.
We note that for a given input set , the derived set is unique [13].
Definition 5
(Zero forcing set (ZFS) and zero forcing number) For a graph , an input set is a ZFS if (i.e., all nodes are colored black after the exhaustive application of the zero forcing rule). We denote a ZFS by . The number of nodes in the minimum ZFS is the zero forcing number of the graph and denoted by .
Figure 1 illustrates the zero forcing terms defined above.

A leader set for the strong structural controllability is closely related to the notion of ZFS of the network graph. A direct consequence of Theorems IV.4, IV.8, and Proposition IV.9 in [6] is the following result:
Theorem 2.1
Thus, ZFS in graphs is an important idea from the network controllability perspective and it completely characterizes the leader set for the strong structural controllability of the network. The above results implies that the minimum number of leaders needed for the network strong structural controllability is same as the zero forcing number of the network graph. We note that computing a minimum ZFS and zero forcing number are NP-hrad in general [26]. However, there are several heuristics to compute a small-sized ZFS, for instance, see [27, 28, 29, 30].
III Resilient Strong Structural Controllability (SSC) in Networks
The equivalence between ZFS and leader set for network SSC is significant. The zero forcing process can be disrupted by some nodes/edges abnormal behaviors or edge failures, and consequently, the network SSC can be adversely impacted. For instance, consider the network in Figure 2 with the leader set . If all nodes are normal, the ZF process initiated by the leader set will eventually color all nodes in (i.e., ), and the network will be strong structurally controllable with . However, if behaves abnormally in the sense that it does not force any other node, then the zero forcing process will be hindered and asserting that the network is not strong structurally controllable. Similarly, if we consider all nodes normal, but the edge is removed, the ZF process will again be disrupted, causing , which means the network is not strong structurally controllable with .



However, if , then the network remains SSC despite any single misbehaving node (refusing to force other nodes) or an edge. Thus, the network SSC can be preserved even in the presence of misbehaving nodes or edges through some redundant leader nodes selected carefully. Our goal here is to study: how we can guarantee resilient network SSC in the face of some misbehaving nodes and edges that might disrupt the zero forcing process and impact the network SSC.
Next, we will consider three different abnormal node and edge behaviors disrupting the zero forcing process. Then, we present leader selections guaranteeing all nodes in the network get colored due to the zero forcing process despite a certain number of misbehaving nodes and edges, thus achieving the resilient network SSC. Our main result (in Section IV) shows that resilience to one type of misbehaving nodes/edges implies resilience to the other kinds of misbehaving nodes/edges.
III-A Failure Models and Resilience Problems
We consider the following three node and edge misbehaviors that can be caused by the adversarial attack or other abnormality. All of these failures ultimately disrupt the zero forcing process.
1) Leak (non-forcing) nodes: A leak is a node that does not force any other node, i.e., considering to be a leak node that is colored black and has exactly one white neighbor, then does not force its white neighbor (which it should in case was normal). A set of all leaks is the leak set, denoted by .
The term ‘leak node’ is adapted from [16], where such a non-forcing behavior of nodes is introduced. Practically, a leak node can be realized in multiple ways. For instance, if an additional node , which is not a part of the original network and is colored white, becomes adjacent to exactly one node, say , in the network , then is unable to force any other node in . Figure 3 illustrates this situation.

Now the resilience problem is to have a (minimal) leader set such that all nodes are colored at the end of the zero forcing process despite leak nodes, which are unknown. For a given , computing such a leader set is referred to as the -leaky forcing set problem [16, 17]. We formally define the leaky derived set and leaky forcing set below:
Definition 6
(Leaky derived set) Given a graph , input set , and a leak set , then the set of black nodes obtained after applying the zero forcing rule exhaustively while considering the leaks in is the leaky derived set, denoted by .
Definition 7
(-leaky forcing set (-LFS)) An input set is an -LFS if for any leak set with leaks, . In other words, starting with , all nodes are colored black by iteratively applying the zero forcing rule with any leaks. The cardinality of the minimum -LFS is the -forcing number of , denoted by .
We note that for , the -forcing number is same as the zero forcing number. Further, we know [16],
(5) |
2) Non-forcing edges: Here, we consider edge attacks through which an edge cannot be used by either of its end nodes to force the other end node. We call such an edge as a non-forcing edge. In particular, an edge is a non-forcing edge if cannot force , and cannot force . In this case, the resilience problem is to find the -edge forcing set defined below:
Definition 8
(-Edge forcing set (-EFS)) For a given and a positive integer , let be an arbitrary subset of at most non-forcing edges (i.e., ). An input set is an -EFS if there is a zero forcing process that colors all nodes in without using the edges in to force nodes.
Figure 4 illustrates the non-forcing edge and -EFS. is a ZFS of in Figure 4(a). If the edge between and is non-forcing, then the derived set consists of only three nodes at the end of the zero forcing process. However, if the leader set is , then all nodes are colored as a result of the zero forcing process despite any single non-forcing edge.



3) Removable edges: The third failure model we consider is the one where a maximum of edges are removed from the graph to disrupt the zero forcing process. The corresponding resilience problem is to have enough leaders to guarantee that despite edge removals, the network remains strong structurally controllable, or equivalently all nodes are colored as a result of the zero forcing. In other words, the goal is to find a minimum size -forcing set with removable edges defined below:
Definition 9
-forcing set with removable edges (-FSR) For a given and , consider a subgraph , where and . Then, is an -FSR of if is a ZFS of every such . Note that an -FSR must also be a ZFS of .
We observe that making an edge non-forcing can be different from removing the edge. For instance, unlike a non-forcing edge, removing an edge can sometimes be useful, as Figure 5 illustrates. If edge in in Figure 5(a) is removed, then is a ZFS of the resulting graph (Figure 5(b)), thus, making the network controllable. However, if is a non-forcing edge (Figure 5(c)), then is no longer a ZFS of the network.



Next, we present the main result showing that a leader set resilient to one misbehavior model is also resilient to the other models.
IV Equivalence of Resilient Leader Selection for Various Failure Models
Here, for a given and , we show the equivalence between -LFS, -EFS and -FSR. As a result, we show that a leader set ensures resilient controllability against one misbehavior model if and only if it extends resilience to the other two models (discussed above). For instance, a leader set that is resilient to non-forcing nodes must also be resilient to non-forcing edges and removable edges simultaneously. We introduce the following terms as in [31, 17].
Definition 10
Consider a graph , input set and the corresponding derived set , then we define the following terms:
-
•
A chronological list of forces is a list of forces recorded in the order in which they are performed to construct the derived set.
-
•
A forcing process is a set of forces containing a chronological ordering of forces through which all nodes in are colored black (i.e., ).
-
•
A forcing chain is a sequence of forces , for . We denote such a forcing sequence by .
-
•
A maximal forcing chain is a forcing chain such that and does not force ant other node in .
-
•
A total forcing set of , denoted by , is a set of all possible forces given an input , i.e., if there is a forcing process in containing .
-
•
A total forcing set with leaks and input set , denoted by , is a set of all possible forces given an input set and leaks . In other words, if , then and there is a forcing process containing the force .
Next, consider , a ZFS , and a forcing process with . Then, we define the following notations:
(6) |
Similarly,
(7) |
We now state some results from [17] that will be used later.
Lemma 4.1
[17] Consider and a ZFS . Let and be two forcing processes. Then, is a forcing process with for any obtained from using . Here,
Lemma 4.2
[17] A set is a -LFS if and only if , there exists , , where .
Theorem 4.3
[17] A set is a -LFS if and only if is an -LFS for every set of of leaks and , there exists , , where .
IV-A Main Result
Our main result here is to show the following:
Theorem 4.4
Given a graph , input set , and a positive integer , the following statements are equivalent:
-
1.
is an -LFS.
-
2.
is an -EFS.
-
3.
is an -FSR.
We recall that notions of -LFS, -EFS, and -FSR are explained in Definitions 7, 8, and 9, respectively. To prove Theorem 4.4, we need some intermediate results.
Lemma 4.5
If is a -LFS of , then for every edge , there exists a zero forcing process that does not use , i.e., and .
Proof:
Consider a forcing process which contains . By Lemma 4.2, there exists a forcing process such that , where . It suffices to show that there exists a forcing process such that and , where . If , then . So, assume . Now, again consider and let be the set of black vertices obtained from such that is valid given , but . Note that at this point, and all of its neighbors except are colored black through . Moreover, a node can only force one node. Thus, will not force any node in , i.e., . Now, consider . Note that and . By Lemma 4.1, is a forcing process with input , which proves the desired claim.
Lemma 4.6
If is a -EFS, then is a -LFS
Proof:
Let be a forcing process with as input nodes. Consider to be be an arbitrary fixed leak. If is an end node of a forcing chain, then does not force any node. So, we assume that for some . Since is -EFS, there exists another forcing process such that is not forced by . Let , for some . Now, consider till the point becomes valid but is not colored black. Let be the set of black nodes till this point. Note that . Note that all nodes in are colored black and is the only node that can force. Consider . By Lemma 4.1, is a valid forcing process with input nodes coloring all nodes black. Note that is not forcing in , and hence is not forcing any node in . Thus, is a -LFS, which is the desired claim.
Lemma 4.7
Let be an -EFS, be a set of non-forcing edges, and be the derived set after forcing. If , then and can not be white simultaneously. Moreover, if exactly one end node of , say , is black, then .
Proof:
If both end nodes of are white, then none of the end nodes can force the other end node. Thus, zero forcing behavior of does not change even if is not a non-forcing edge. So, if we consider as the set of non-forcing edges, , implying that is not an -EFS, which is a contradiction. Similarly, let be such that and . Assume that is white and . Since has two white neighbors, can not force any node (including ) even if is not a non-forcing edge. Again, considering as the set of non-forcing edges will give . It means is not an -EFS, which is a contradiction.
Lemma 4.8
Let be an -LFS and be a set of leaks. Then , where is a derived set with leaks. Also, each has at most one white neighbor.
Proof:
Assume is white, i.e., . A white leak node does not change the zero forcing behavior of the black nodes. So, we consider . Since is an -LFS, so all nodes should be black for any leaks. However, all nodes are not black, which is a contradiction. For the second part, assume that there is leak node that is colored black and has two white neighbors. A black node with two white neighbors can not force any node, so we consider as a set of leaks. Since is -LFS, it should color all nodes black with leaks in , which is not the case. Hence a contradiction arises, proving the desired claim.
Next, we show the equivalence between -LFS and -EFS.
Theorem 4.9
For a given and , is an -LFS if and only if is an -EFS.
Proof:
(-LFS -EFS) We will prove using induction on . From Lemma 4.5, if is -LFS, then it is -EFS. So, our induction hypothesis is, if is -LFS, then is -EFS. Now, assume that is -LFS. Thus, must be -LFS implying that it is also -EFS (by our induction hypothesis). Let be a set of non-forcing edges. By Lemma 4.7, there is a forcing process such that for each , either both end nodes and are black, or one end node, say , is black with also colored black. Let be the set of black nodes with the forcing process . Next, for each , we consider one of its black end node as a leak, and denote the set of leaks by . There will be at most leaks. We observe that a black colored leak node can be ignored and deleted without altering the zero forcing behavior of the other black nodes. So, we consider . Since is -LFS with , is a ZFS of . As a result, all nodes in are colored black while considering as non-forcing edges, implying is an -EFS.
(-EFS -LFS) Again, we will use induction on . For , if is -EFS, then it is -LFS (by Lemma 4.6). Our induction hypothesis is that is -EFS implies it to be -LFS. Now assume to be -EFS. It means is -EFS and hence, -LFS (by the induction hypothesis). Consider to be a set of leaks. By Lemma 4.8, these leaks are colored black and each of them has at most one white neighbor. Next, we consider the edge between the leak and its white neighbor as a non-forcing edge. There will be at most such non-forcing edges, which we denote by . Since one end node (leak) of each non-forcing edge is colored black and a leak has at most one white neighbor (which is the other end node of the non-forcing edge), we can safely delete the non-forcing edge without affecting the zero forcing behavior of the black node. Thus, we get . Since is -EFS, it means is a ZFS of . Thus, all nodes will be colored black despite leaks. Hence, is -LFS, which proves the desired claim.
Lemma 4.10
If is -FSR then it is -EFS.
Proof:
By contraposition, let be a ZFS that is not a -EFS. It means there is an edge, say , such that every forcing process must use the edge, i.e., must be a forcing edge in any forcing process. Without the loss of generality, we assume forces . It implies that all the black neighbors of have at least two white neighbors and has only one white neighbor . Thus, by removing edge , can not be forced. Hence, is not a -FSR, which is the desired claim.
In the following, we show the equivalence of -EFS and -FSR.
Theorem 4.11
is -EFS if and only if is -FSR.
Proof:
(-EFS -FSR) We first note that if is a ZFP with as a ZFS, then there are at most edges used in . If we remove edges not used in to get , then will still be a ZFS of . Thus, if is an -EFS, it means for any edge set , where , there exist a forcing process with , say , coloring all nodes black without using edges in . Since edges in are not used in , we can remove them from while maintaining to be a ZFS of , i.e., is a forcing process of with , implying is an -FSR of .
(-FSR -EFS) We will prove using induction on . For , if is -FSR, then it is -EFS by Lemma 4.10. Thus, we make the induction hypothesis, if is -FSR, then it is -EFS. Assuming to be -FSR, we need to show that is -EFS. Let be a set of non-forcing edges. Since is -EFS (by the induction hypothesis), we apply forces such that each edge satisfies one of the two conditions (by Lemma 4.7): (i) Both end nodes of are colored black. (ii) If one node, say , is black, then all nodes in are also colored black. Note that the removal of edges in both cases (i) and (ii) will not change the zero forcing behavior of the black nodes. Thus, we remove these edges. Since is -FSR, it means that all nodes will be colored black at the end of the forcing process. Thus, all nodes are colored black in spite of non-forcing edges, i.e., is -EFS, which is the desired result.
V Computation and Numerical Illustration
Computing a minimum -LFS, and therefore, -EFS and -FSR, are NP hard problems (since minimum ZFS is NP-hard). Here, first, we illustrate the characterization of -LFS provided in Theorem 4.2. Then, we present a greedy algorithm to compute a small-sized -LFS and numerically evaluate it. A greedy algorithm for any can be designed using a similar approach and utilizing the characterization in Theorem 4.3.
For a given input set , we define to be the set of non-input nodes, each of which can be forced by at least two distinct nodes. More precisely,
(8) |
By Theorem 4.2, is -LFS if and only if . Consider the graph in Figure 6, where is a -LFS. To verify this, we need to show that for each , there exist zero forcing processes such that is forced by at least two distinct nodes. Table I outlines multiple zero forcing processes. We observe that for each , there exist zero forcing processes where is forced by two distinct forcers. For instance, is forced by and in ZFP 1 and ZFP 2, respectively. Similarly, is forced by and in ZFP 1 and ZFP 3, respectively.

ZFP 1 | ZFP 2 | ZFP 3 | ZFP 4 | ZFP 5 | ZFP 6 |
---|---|---|---|---|---|
Algorithm 1 presents a greedy heuristic to compute a -LFS. The main idea is to iteratively include nodes in the leader set to maximize the size of (as in (8)) until . Since every -LFS is a ZFS, we initialize in Algorithm 1 with a ZFS. As a result of this greedy selection, might contain some redundant nodes. Lines in Algorithm 1 remove such redundant nodes to reduce the size of -LFS.
Algorithm 1: Greedy Heuristics for 1-LFS |
given: , |
initialization: |
Compute ZFS , and assign |
Compute |
while |
end while |
-------- removing redundancies -------- |
for all |
if - |
end if |
end for |
return |
Figure 7 compares the greedy heuristic with the optimal solution for Erdös-Rényi (ER) and Barabási-Albert (BA) random graphs with nodes. In ER graphs, any two nodes are adjacent with a probability . BA graphs are obtained by attaching a new node (one at a time) to an existing graph through edges using a preferential attachment model. The optimal solution is computed using an exhaustive search. Also, each point on the plots averages randomly generated instances. Figures 7(a) and (c) plot the size of -LFS as a function of in BA graphs, and as a function of in ER graphs, respectively. Figures 7(b) and (d) plot the time taken by the greedy and optimal solutions to compute -LFS in BA and ER graphs, respectively. We observe that greedy and optimal solutions are very close, and the difference between the two solutions reduces as the graphs become dense. However, the difference in time to compute greedy and optimal solutions is orders of magnitude, even in small-sized graphs. We can design a similar greedy heuristic to compute an -LFS for ; however, the time complexity will increase significantly with increasing , and even the greedy heuristic will become inefficient for higher . Thus, more efficient heuristics are needed to compute -LFS for large values.
VI Conclusion
We studied the problem of maintaining SSC in networks despite misbehaving nodes and edges. We considered different models of misbehaving nodes/edges aiming to disrupt the zero forcing process in graphs, consequently deteriorating the network SSC. We showed that resilience to one type of misbehaving nodes/edges is possible if and only if resilience to other threat types is ensured. In other words, for a given leader set, if a network is strong structurally controllable despite misbehaving nodes/edges under one threat model, then the network remains to be strong structurally controllable in the presence of the same number of misbehaving nodes/edges under the other threat models. We also discussed the leader selection guaranteeing resilient SSC. Resilience is expensive in the context of SSC because many extra leaders are needed to nullify the effect of a small number of misbehaving nodes and edges.
In the future, we aim to address this problem by safeguarding a subset of nodes and edges, i.e., making them less susceptible to faults and adversarial attacks, and then analyzing how the number of leaders for resilient SSC is impacted in the presence of such ‘trusted’ nodes and edges. Since it would be expensive or infeasible to make every node/edge trusted, we would need to select them in the network carefully. Another interesting direction in this domain requiring more exploration is designing efficient heuristics to compute leaders for resilient SSC.
References
- [1] F. Pasqualetti, S. Zampieri, and F. Bullo, “Controllability metrics, limitations and algorithms for complex networks,” IEEE Transactions on Control of Network Systems, vol. 1, no. 1, pp. 40–52, 2014.
- [2] A. Clark, B. Alomair, L. Bushnell, and R. Poovendran, “Submodularity in input node selection for networked linear systems: Efficient algorithms for performance and controllability,” IEEE Control Systems Magazine, vol. 37, no. 6, pp. 52–74, 2017.
- [3] T. H. Summers, F. L. Cortesi, and J. Lygeros, “On submodularity and controllability in complex dynamical networks,” IEEE Transactions on Control of Network Systems, vol. 3, no. 1, pp. 91–101, 2015.
- [4] J. Li, X. Chen, S. Pequito, G. J. Pappas, and V. M. Preciado, “On the structural target controllability of undirected networks,” IEEE Transactions on Automatic Control, vol. 66, no. 10, pp. 4836–4843, 2020.
- [5] J. Ruths and D. Ruths, “Control profiles of complex networks,” Science, vol. 343, no. 6177, pp. 1373–1376, 2014.
- [6] N. Monshizadeh, S. Zhang, and M. K. Camlibel, “Zero forcing sets and controllability of dynamical systems defined on graphs,” IEEE Transactions on Automatic Control, vol. 59, pp. 2562–2567, 2014.
- [7] A. Chapman and M. Mesbahi, “On strong structural controllability of networked systems: A constrained matching approach.” in American Control Conference (ACC), 2013, pp. 6126–6131.
- [8] S. Zhang, M. Cao, and M. K. Camlibel, “Upper and lower bounds for controllable subspaces of networks of diffusively coupled agents,” IEEE Transactions on Automatic control, vol. 59, pp. 745–750, 2013.
- [9] J. Jia, H. L. Trentelman, W. Baar, and M. K. Camlibel, “Strong structural controllability of systems on colored graphs,” IEEE Transactions on Automatic Control, vol. 65, no. 10, pp. 3977–3990, 2019.
- [10] A. Yazıcıoğlu, W. Abbas, and M. Egerstedt, “Graph distances and controllability of networks,” IEEE Transactions on Automatic Control, vol. 61, no. 12, pp. 4125–4130, 2016.
- [11] H. J. Van Waarde, M. K. Camlibel, and H. L. Trentelman, “A distance-based approach to strong target control of dynamical networks,” IEEE Transactions on Automatic Control, vol. 62, pp. 6266–6277, 2017.
- [12] J. Jia, H. J. Van Waarde, H. L. Trentelman, and M. K. Camlibel, “A unifying framework for strong structural controllability,” IEEE Transactions on Automatic Control, vol. 66, no. 1, pp. 391–398, 2020.
- [13] AIM Minimum Rank Special Graphs Work Group, “Zero forcing sets and the minimum rank of graphs,” Linear Algebra and its Applications, vol. 428, no. 7, pp. 1628–1648, 2008.
- [14] S. S. Mousavi, M. Haeri, and M. Mesbahi, “On the structural and strong structural controllability of undirected networks,” IEEE Transactions on Automatic Control, vol. 63, no. 7, pp. 2234–2241, 2017.
- [15] M. Trefois and J.-C. Delvenne, “Zero forcing number, constrained matchings and strong structural controllability,” Linear Algebra and its Applications, vol. 484, pp. 199–218, 2015.
- [16] S. Dillman and F. Kenter, “Leaky forcing: a new variation of zero forcing,” arXiv preprint arXiv:1910.00168, 2019.
- [17] J. S. Alameda, J. Kritschgau, N. Warnberg, and M. Young, “On leaky forcing and resilience,” Discrete Applied Mathematics, vol. 306, pp. 32–45, 2022.
- [18] M. Pirani, A. Mitra, and S. Sundaram, “A survey of graph-theoretic approaches for analyzing the resilience of networked control systems,” arXiv preprint arXiv:2205.12498, 2022.
- [19] S. S. Mousavi, M. Haeri, and M. Mesbahi, “Robust strong structural controllability of networks with respect to edge additions and deletions,” in American Control Conference (ACC), 2017, pp. 5007–5012.
- [20] Y. Zhang and T. Zhou, “Minimal structural perturbations for controllability of a networked system: Complexities and approximations,” International Journal of Robust and Nonlinear Control, vol. 29, no. 12, pp. 4191–4208, 2019.
- [21] W. Abbas, M. Shabbir, Y. Yazıcıoğlu, and X. Koutsoukos, “Edge augmentation with controllability constraints in directed laplacian networks,” IEEE Control Systems Letters, vol. 6, pp. 1106–1111, 2021.
- [22] S. Pequito, G. Ramos, S. Kar, A. P. Aguiar, and J. Ramos, “The robust minimal controllability problem,” Automatica, vol. 82, pp. 261–268, 2017.
- [23] C.-L. Pu, W.-J. Pei, and A. Michaelson, “Robustness analysis of network controllability,” Physica A: Statistical Mechanics and its Applications, vol. 391, no. 18, pp. 4420–4425, 2012.
- [24] G. Ramos, D. Silvestre, and C. Silvestre, “The robust minimal controllability and observability problem,” International Journal of Robust and Nonlinear Control, vol. 31, no. 10, pp. 5033–5044, 2021.
- [25] Y. Zhang, “Controllability robustness under actuator failures: Complexities and algorithms,” arXiv preprint arXiv:1812.07745, 2018.
- [26] A. Aazami, “Hardness results and approximation algorithms for some problems on graphs,” Ph.D. dissertation, University of Waterloo, 2008.
- [27] B. Brimkov, C. C. Fast, and I. V. Hicks, “Computational approaches for zero forcing and related problems,” European Journal of Operational Research, vol. 273, no. 3, pp. 889–903, 2019.
- [28] B. Brimkov, D. Mikesell, and I. V. Hicks, “Improved computational approaches and heuristics for zero forcing,” INFORMS Journal on Computing, 2021.
- [29] A. Agra, J. O. Cerdeira, and C. Requejo, “A computational comparison of compact MILP formulations for the zero forcing number,” Discrete Applied Mathematics, vol. 269, pp. 169–183, 2019.
- [30] W. Abbas, M. Shabbir, A. Y. Yazicioğlu, and X. Koutsoukos, “Leader selection for strong structural controllability in networks using zero forcing sets,” in American Control Conference, 2022, pp. 1444–1449.
- [31] F. Barioli, W. Barrett, S. M. Fallat, H. T. Hall, L. Hogben, B. Shader, P. Van Den Driessche, and H. Van Der Holst, “Zero forcing parameters and minimum rank problems,” Linear Algebra and its Applications, vol. 433, no. 2, pp. 401–411, 2010.