• Nenhum resultado encontrado

Gossip Average Consensus in a Byzantine Environment Using Stochastic Set-Valued Observers

N/A
N/A
Protected

Academic year: 2021

Share "Gossip Average Consensus in a Byzantine Environment Using Stochastic Set-Valued Observers"

Copied!
16
0
0

Texto

(1)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Gossip Average Consensus in a Byzantine

Environment Using Stochastic Set-Valued

Observers

D. Silvestre, P. Rosa, R. Cunha, J. Hespanha and C. Silvestre

52nd IEEE Conference on Decision and Control, CDC 2013 Florence, Italy.

12th December 2013

(2)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Outline

1 Introduction 2 Problem Statement 3 Proposed Solution 4 Main Properties 5 Simulation Results 6 Concluding Remarks

(3)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Motivation

Average Consensus Problem - m nodes wish to agree on the

average of their initial values.

Robot Coordination - Fleet of robots wishes to agree on direction/speed or rendezvous point.

Sensor Network - Compute the mean of a noise corrupted set of sensor measurements.

(4)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Gossip Consensus

Pairs of nodes exchange their states at random times. Nodes transmit only to adjacent nodes in the connectivity graph.

Both nodes average their states.

See S. Boyd, A. Ghosh, B. Prabhakar, and D. Shah, ”Randomized gossip algorithms,” IEEE Transactions on Information Theory, vol.52, no.6, pp.2508 - 2530, June 2006.

(5)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Motivating Example

Take the network given by the following

graph and state at time instant k,

x(k) = [1, 2, 3, 4]|

The consensus algorithm will

asymptotically converge to all the nodes having xav= 2.5

If an attacker controlling one node in one time instant resets the state to

˜x1(k) = x1(k) + m(c − xav)

In this examplec = 5, but the attacker

can force the network to converge to any

constant c!

Gossip Algorithm

[2]

• Nodes transmit at random times, exponentially distributed, i.e.

• Each node transmits only to one adjacent node at each time.

• Both nodes average their values (symmetric

communications).

[2] S. Boyd, A. Ghosh,B. Prabhakar, D. Shah, "Randomized gossip algorithms,"

Information Theory, IEEE Transactions on , vol.52, no.6, pp. 2508- 2530, June 2006

tlk+1− tlk∼ Exp(λ)

2

3

4

1

(6)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Motivating Example

Take the network given by the following

graph and state at time instant k,

x(k) = [1, 2, 3, 4]|

The consensus algorithm will

asymptotically converge to all the nodes having xav= 2.5

If an attacker controlling one node in one time instant resets the state to

˜x1(k) = x1(k) + m(c − xav)

In this examplec = 5, but the attacker

can force the network to converge to any

constant c!

Gossip Algorithm

[2]

• Nodes transmit at random times, exponentially distributed, i.e.

• Each node transmits only to one adjacent node at each time.

• Both nodes average their values (symmetric

communications).

[2] S. Boyd, A. Ghosh,B. Prabhakar, D. Shah, "Randomized gossip algorithms,"

Information Theory, IEEE Transactions on , vol.52, no.6, pp. 2508- 2530, June 2006

tlk+1− tlk∼ Exp(λ)

2

3

4

11

(7)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Problem Outline

Take m agents running a consensus system of the form

(

x(k + 1) = U (k)x(k) + B(k)u(k) y(k) = C(k)x(k)

u(k) is the attacker signal, B(k) the matrix selecting which

nodes are corrupted and U (k) a matrix randomly selected.

Fault Detection Problem

Detect non-zero signalsu(k) using y(k) without the knowledge of

B(k).

(8)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks SVO

Proposed Solution

Worst-case Scenario

The probabilistic information of each event is discarded; Assumption on bounded initial conditions;

Use Set-Valued Observers (SVOs) to generate a set ˜X(k)

where the state can take values.

Stochastic Scenario

Includes the detection of faults which are possible but very unlikely;

May generate false positives;

Introduction of Stochastic Set-Valued Observers (SSVOs).

(9)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks SVO

SVOs vs. SSVOs

In both cases, we are addressing it as a Distinguishability problem between the measurements and a fault-free model; SSVOs are a generalization of SVOs and compute a

α-confidence set where the state is guaranteed to be with probabilitiy1 − α;

The generated set is a polytope containing points respecting the dynamics of the system and observations;

In the SSVOs, the dynamics representing unlikely events are discarded.

(10)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks SVO

Algorithm

Given the previous setX(k):

Using SVOs, the algorithm predicts ˜X(k + 1) using the dynamics;

Then, the set is intersected with the measurement set Y (k + 1).

X(k) X(k + 1)˜

Y (k + 1)

X(k + 1)

Using SSVOs, the algorithm predicts ¯X(k + 1) using the dynamics of likely events; Then, the set is intersected

with Y (k + 1) obtaining a smaller set. X(k) Y (k + 1) X(k + 1) ¯ X(k + 1)

(11)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Properties

The set ˜X(k) is bounded in terms of number of vertices and

hyper-volume;

The maximum magnitude of the attacker signal can be computed a priori using an optimization problem; The properties are generalized for the SSVOs case.

(12)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Simulation Results

Setup: 5 node network and initial statesxi(0) = i − 1 and a

nominal bound|xi| ≤ 5 and a horizon N = 1.

For a stochastic fault, the same pair is forced to communicate for 10 < k < 20.

The likelihood of detection increases with time.

An attacker injects the maximum undetectable signal at each time instant.

The magnitude of the signal decays very rapidly in simulation.

0 50 100 150 200 250 300 0 5 10 15 20 25 30 35 Detection time Number of detections

(13)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Simulation Results

Setup: 5 node network and initial statesxi(0) = i − 1 and a

nominal bound|xi| ≤ 5 and a horizon N = 1.

For a stochastic fault, the same pair is forced to communicate for 10 < k < 20.

The likelihood of detection increases with time.

An attacker injects the maximum undetectable signal at each time instant.

The magnitude of the signal decays very rapidly in simulation.

0 50 100 150 200 250 300 0 0.5 1 1.5 2 2.5 Time slot Fault magnitude

(14)

Introduction Problem Statement Proposed Solution Main Properties Simulation Results Concluding Remarks

Concluding Remarks

Contributions:

Recast of the fault detection problem to that of Distinguishability of two systems;

Upper bound on the magnitude of the attacker signal; The introduction of Stochastic Set-Valued Observers to deal with probabilistic faults.

Bounded number of vertices Bounded Hyper-volume In Simulation is shown:

Worst attacker signal magnitude decays very fast; Faults are more likely to be detected as time progresses.

(15)

The end

(16)

Gossip Average Consensus in a Byzantine

Environment Using Stochastic Set-Valued

Observers

D. Silvestre, P. Rosa, R. Cunha, J. Hespanha and C. Silvestre

52nd IEEE Conference on Decision and Control, CDC 2013 Florence, Italy.

12th December 2013

Referências

Documentos relacionados

V – Para a prática da anestesia, deve o médico anestesista responsável avaliar e definir previamente, na forma prevista no artigo 2º, o risco do procedimento

Adaptação de Teles (2009, p. No fundo, é basilar existir um planeamento, não só para saber para onde se quer ir, mas também para saber para onde não se quer ir. De igual forma,

O grupo utiliza ainda outros instrumentos de controlo de gestão para acompanhar os resultados, como é o caso do Uniform System que é uma ferramenta de

Não me interessa fazer um elenco das muitas mulheres (mais do que aquelas que se possa supor) que se dedicaram profissionalmente à pintura entre 1500 e 1700, mas sim explorar

 Há situações de exclusão social que resultam de doenças psiquiátricas, bem como do consumo excessivo e/ou dependência de álcool e drogas, nomeadamente nos

No caso das Instituições Sem Fins Lucrativos que não contratam funcionários e que dependem na íntegra do trabalho voluntário, como é o caso da Re-food Maia Centro, estes

Com a propagação da cidade segregada por gênero e as experimentações urbanas centradas na satisfação dos desejos relativos à sexualidade masculina, nasce um novo tipo de

ponto de vista dos direitos cívicos, políticos, sociais como de género.. Todos estes direitos foram instituídos muito rapidamente