{"title":"异构多智能体系统抗拜占庭攻击的弹性输出遏制","authors":"Xin Gong;Yang Cao;Xiuxian Li;Hong Lin;Zhan Shu;Guanghui Wen","doi":"10.1109/TSIPN.2025.3592314","DOIUrl":null,"url":null,"abstract":"This study focuses on addressing distributed Byzantine-resilient output containment issues for heterogeneous continuous-time multi-agent systems. Inspired by the digital twin technology which creates a virtual replica of a physical object or system, a virtual layer named twin layer is introduced in this work, which is parallel to the conventional cyber-physical layer. The twin layer is more secure than the cyber-physical layer, which generates the secure reference trajectory of each agent via real-time data processing and simulation. Moreover, it decouples the resilient output containment against Byzantine attacks (BA) into two defense sub-schemes: One on the twin layer against Byzantine edge attacks (sending wrong and different messages to neighbors) and the other on the cyber-physical layer against Byzantine node attacks (falsifying input signals). On the twin layer, we develop a topology-assignable distributed resilient estimator by utilizing a novel secure centroid approach, which enhances the resilience of the twin layer by adding a minimal fraction of trusted edges. It is proved that achieving strong <inline-formula><tex-math>$[({n+1})f+1]$</tex-math></inline-formula>-robustness towards the leader set is adequate for ensuring the resilience of the twin layer. On the cyber-physical layer, we design a decentralized adaptive controller against Byzantine node attacks and can also handle potential inter-layered controller faults. This novel adaptive controller has the merit of converging exponentially at an adjustable rate, whose error bound can be explicitly stated. Consequently, we manage to address the resilient containment problem against BAs, in which the agents subject to Byzantine node attacks can also achieve output containment instead of just the normal agents. The simulation examples confirm the efficacy of this newly developed hierarchical protocol, where both normal and Byzantine followers converge within the dynamic convex hull formed by the normal leaders.","PeriodicalId":56268,"journal":{"name":"IEEE Transactions on Signal and Information Processing over Networks","volume":"11 ","pages":"938-951"},"PeriodicalIF":3.0000,"publicationDate":"2025-07-28","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resilient Output Containment of Heterogeneous Multi-Agent Systems Against Byzantine Attacks\",\"authors\":\"Xin Gong;Yang Cao;Xiuxian Li;Hong Lin;Zhan Shu;Guanghui Wen\",\"doi\":\"10.1109/TSIPN.2025.3592314\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This study focuses on addressing distributed Byzantine-resilient output containment issues for heterogeneous continuous-time multi-agent systems. Inspired by the digital twin technology which creates a virtual replica of a physical object or system, a virtual layer named twin layer is introduced in this work, which is parallel to the conventional cyber-physical layer. The twin layer is more secure than the cyber-physical layer, which generates the secure reference trajectory of each agent via real-time data processing and simulation. Moreover, it decouples the resilient output containment against Byzantine attacks (BA) into two defense sub-schemes: One on the twin layer against Byzantine edge attacks (sending wrong and different messages to neighbors) and the other on the cyber-physical layer against Byzantine node attacks (falsifying input signals). On the twin layer, we develop a topology-assignable distributed resilient estimator by utilizing a novel secure centroid approach, which enhances the resilience of the twin layer by adding a minimal fraction of trusted edges. It is proved that achieving strong <inline-formula><tex-math>$[({n+1})f+1]$</tex-math></inline-formula>-robustness towards the leader set is adequate for ensuring the resilience of the twin layer. On the cyber-physical layer, we design a decentralized adaptive controller against Byzantine node attacks and can also handle potential inter-layered controller faults. This novel adaptive controller has the merit of converging exponentially at an adjustable rate, whose error bound can be explicitly stated. Consequently, we manage to address the resilient containment problem against BAs, in which the agents subject to Byzantine node attacks can also achieve output containment instead of just the normal agents. The simulation examples confirm the efficacy of this newly developed hierarchical protocol, where both normal and Byzantine followers converge within the dynamic convex hull formed by the normal leaders.\",\"PeriodicalId\":56268,\"journal\":{\"name\":\"IEEE Transactions on Signal and Information Processing over Networks\",\"volume\":\"11 \",\"pages\":\"938-951\"},\"PeriodicalIF\":3.0000,\"publicationDate\":\"2025-07-28\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Signal and Information Processing over Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11098672/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Signal and Information Processing over Networks","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11098672/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Resilient Output Containment of Heterogeneous Multi-Agent Systems Against Byzantine Attacks
This study focuses on addressing distributed Byzantine-resilient output containment issues for heterogeneous continuous-time multi-agent systems. Inspired by the digital twin technology which creates a virtual replica of a physical object or system, a virtual layer named twin layer is introduced in this work, which is parallel to the conventional cyber-physical layer. The twin layer is more secure than the cyber-physical layer, which generates the secure reference trajectory of each agent via real-time data processing and simulation. Moreover, it decouples the resilient output containment against Byzantine attacks (BA) into two defense sub-schemes: One on the twin layer against Byzantine edge attacks (sending wrong and different messages to neighbors) and the other on the cyber-physical layer against Byzantine node attacks (falsifying input signals). On the twin layer, we develop a topology-assignable distributed resilient estimator by utilizing a novel secure centroid approach, which enhances the resilience of the twin layer by adding a minimal fraction of trusted edges. It is proved that achieving strong $[({n+1})f+1]$-robustness towards the leader set is adequate for ensuring the resilience of the twin layer. On the cyber-physical layer, we design a decentralized adaptive controller against Byzantine node attacks and can also handle potential inter-layered controller faults. This novel adaptive controller has the merit of converging exponentially at an adjustable rate, whose error bound can be explicitly stated. Consequently, we manage to address the resilient containment problem against BAs, in which the agents subject to Byzantine node attacks can also achieve output containment instead of just the normal agents. The simulation examples confirm the efficacy of this newly developed hierarchical protocol, where both normal and Byzantine followers converge within the dynamic convex hull formed by the normal leaders.
期刊介绍:
The IEEE Transactions on Signal and Information Processing over Networks publishes high-quality papers that extend the classical notions of processing of signals defined over vector spaces (e.g. time and space) to processing of signals and information (data) defined over networks, potentially dynamically varying. In signal processing over networks, the topology of the network may define structural relationships in the data, or may constrain processing of the data. Topics include distributed algorithms for filtering, detection, estimation, adaptation and learning, model selection, data fusion, and diffusion or evolution of information over such networks, and applications of distributed signal processing.