1,901 research outputs found
A Message Passing Strategy for Decentralized Connectivity Maintenance in Agent Removal
In a multi-agent system, agents coordinate to achieve global tasks through
local communications. Coordination usually requires sufficient information
flow, which is usually depicted by the connectivity of the communication
network. In a networked system, removal of some agents may cause a
disconnection. In order to maintain connectivity in agent removal, one can
design a robust network topology that tolerates a finite number of agent
losses, and/or develop a control strategy that recovers connectivity. This
paper proposes a decentralized control scheme based on a sequence of
replacements, each of which occurs between an agent and one of its immediate
neighbors. The replacements always end with an agent, whose relocation does not
cause a disconnection. We show that such an agent can be reached by a local
rule utilizing only some local information available in agents' immediate
neighborhoods. As such, the proposed message passing strategy guarantees the
connectivity maintenance in arbitrary agent removal. Furthermore, we
significantly improve the optimality of the proposed scheme by incorporating
-criticality (i.e. the criticality of an agent in its
-neighborhood).Comment: 9 pages, 9 figure
Resilient and Decentralized Control of Multi-level Cooperative Mobile Networks to Maintain Connectivity under Adversarial Environment
Network connectivity plays an important role in the information exchange
between different agents in the multi-level networks. In this paper, we
establish a game-theoretic framework to capture the uncoordinated nature of the
decision-making at different layers of the multi-level networks. Specifically,
we design a decentralized algorithm that aims to maximize the algebraic
connectivity of the global network iteratively. In addition, we show that the
designed algorithm converges to a Nash equilibrium asymptotically and yields an
equilibrium network. To study the network resiliency, we introduce three
adversarial attack models and characterize their worst-case impacts on the
network performance. Case studies based on a two-layer mobile robotic network
are used to corroborate the effectiveness and resiliency of the proposed
algorithm and show the interdependency between different layers of the network
during the recovery processes.Comment: 9 pages, 6 figure
Adoption of vehicular ad hoc networking protocols by networked robots
This paper focuses on the utilization of wireless networking in the robotics domain. Many researchers have already equipped their robots with wireless communication capabilities, stimulated by the observation that multi-robot systems tend to have several advantages over their single-robot counterparts. Typically, this integration of wireless communication is tackled in a quite pragmatic manner, only a few authors presented novel Robotic Ad Hoc Network (RANET) protocols that were designed specifically with robotic use cases in mind. This is in sharp contrast with the domain of vehicular ad hoc networks (VANET). This observation is the starting point of this paper. If the results of previous efforts focusing on VANET protocols could be reused in the RANET domain, this could lead to rapid progress in the field of networked robots. To investigate this possibility, this paper provides a thorough overview of the related work in the domain of robotic and vehicular ad hoc networks. Based on this information, an exhaustive list of requirements is defined for both types. It is concluded that the most significant difference lies in the fact that VANET protocols are oriented towards low throughput messaging, while RANET protocols have to support high throughput media streaming as well. Although not always with equal importance, all other defined requirements are valid for both protocols. This leads to the conclusion that cross-fertilization between them is an appealing approach for future RANET research. To support such developments, this paper concludes with the definition of an appropriate working plan
A Dynamic Game Analysis and Design of Infrastructure Network Protection and Recovery
Infrastructure networks are vulnerable to both cyber and physical attacks.
Building a secure and resilient networked system is essential for providing
reliable and dependable services. To this end, we establish a two-player
three-stage game framework to capture the dynamics in the infrastructure
protection and recovery phases. Specifically, the goal of the infrastructure
network designer is to keep the network connected before and after the attack,
while the adversary aims to disconnect the network by compromising a set of
links. With costs for creating and removing links, the two players aim to
maximize their utilities while minimizing the costs. In this paper, we use the
concept of subgame perfect equilibrium (SPE) to characterize the optimal
strategies of the network defender and attacker. We derive the SPE explicitly
in terms of system parameters. Finally, we use a case study of UAV-enabled
communication networks for disaster recovery to corroborate the obtained
analytical results.Comment: 6 page
- …