142 research outputs found

    Robust Distributed Averaging: When are Potential-Theoretic Strategies Optimal?

    Full text link
    We study the interaction between a network designer and an adversary over a dynamical network. The network consists of nodes performing continuous-time distributed averaging. The adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two Stackelberg games to describe this competition where the order in which the players act is reversed in the two problems. Although the canonical equations provided by the Pontryagin's maximum principle seem to be intractable, we provide an alternative characterization for the optimal strategies that makes connection to potential theory. Finally, we provide a sufficient condition for the existence of a saddle-point equilibrium for the underlying zero-sum game.Comment: 32 pages, 1 figure, submitted to IEEE Transactions on Automatic Control. arXiv admin note: text overlap with arXiv:1304.005

    Secure Sensor Design Against Undetected Infiltration: Minimum Impact-Minimum Damage

    Full text link
    We propose a new defense mechanism against undetected infiltration into controllers in cyber-physical systems. To this end, we cautiously design the outputs of the sensors that monitor the state of the system. Different from the defense mechanisms that seek to detect infiltration, the proposed approach seeks to minimize the damage of possible attacks before they have been detected. Controller of a cyber-physical system could have been infiltrated into by an undetected attacker at any time of the operation. Disregarding such a possibility and disclosing system's state without caution benefits the attacker in his/her malicious objective. Therefore, secure sensor design can improve the security of cyber-physical systems further when incorporated along with other defense mechanisms. We, specifically, consider a controlled Gauss-Markov process, where the controller could have been infiltrated into at any time within the system's operation. In the sense of game-theoretic hierarchical equilibrium, we provide a semi-definite programming based algorithm to compute the optimal linear secure sensor outputs and analyze the performance for various scenarios numerically.Comment: Submitted to the IEEE Transactions on Automatic Contro

    Stability Structures of Conjunctive Boolean Networks

    Full text link
    A Boolean network is a finite dynamical system, whose variables take values from a binary set. The value update rule for each variable is a Boolean function, depending on a selected subset of variables. Boolean networks have been widely used in modeling gene regulatory networks. We focus in this paper on a special class of Boolean networks, termed as conjunctive Boolean networks. A Boolean network is conjunctive if the associated value update rule is comprised of only AND operations. It is known that any trajectory of a finite dynamical system will enter a periodic orbit. We characterize in this paper all periodic orbits of a conjunctive Boolean network whose underlying graph is strongly connected. In particular, we establish a bijection between the set of periodic orbits and the set of binary necklaces of a certain length. We further investigate the stability of a periodic orbit. Specifically, we perturb a state in the periodic orbit by changing the value of a single entry of the state. The trajectory, with the perturbed state being the initial condition, will enter another (possibly the same) periodic orbit in finite time steps. We then provide a complete characterization of all such transitions from one periodic orbit to another. In particular, we construct a digraph, with the vertices being the periodic orbits, and the (directed) edges representing the transitions among the orbits. We call such a digraph the stability structure of the conjunctive Boolean network

    Controllability of Conjunctive Boolean Networks with Application to Gene Regulation

    Full text link
    A Boolean network is a finite state discrete time dynamical system. At each step, each variable takes a value from a binary set. The value update rule for each variable is a local function which depends only on a selected subset of variables. Boolean networks have been used in modeling gene regulatory networks. We focus in this paper on a special class of Boolean networks, namely the conjunctive Boolean networks (CBNs), whose value update rule is comprised of only logic AND operations. It is known that any trajectory of a Boolean network will enter a periodic orbit. Periodic orbits of a CBN have been completely understood. In this paper, we investigate the orbit-controllability and state-controllability of a CBN: We ask the question of how one can steer a CBN to enter any periodic orbit or to reach any final state, from any initial state. We establish necessary and sufficient conditions for a CBN to be orbit-controllable and state-controllable. Furthermore, explicit control laws are presented along the analysis

    Distributed Discrete-time Optimization in Multi-agent Networks Using only Sign of Relative State

    Full text link
    This paper proposes distributed discrete-time algorithms to cooperatively solve an additive cost optimization problem in multi-agent networks. The striking feature lies in the use of only the sign of relative state information between neighbors, which substantially differentiates our algorithms from others in the existing literature. We first interpret the proposed algorithms in terms of the penalty method in optimization theory and then perform non-asymptotic analysis to study convergence for static network graphs. Compared with the celebrated distributed subgradient algorithms, which however use the exact relative state information, the convergence speed is essentially not affected by the loss of information. We also study how introducing noise into the relative state information and randomly activated graphs affect the performance of our algorithms. Finally, we validate the theoretical results on a class of distributed quantile regression problems.Comment: Part of this work has been presented in American Control Conference (ACC) 2018, first version posted on arxiv on Sep. 2017, IEEE Transactions on Automatic Control, 201

    Centralized Volatility Reduction for Electricity Markets

    Full text link
    Increased penetration of wind energy will make electricity market prices more volatile. As a result, market participants will bear increased financial risks, which impacts investment decisions and in turn, makes it harder to achieve sustainable energy goals. As a remedy, in this paper, we propose an insurance market that complements any wholesale market design. Our mechanism can be run by any suitable financial entity such as an independent system operator, with the aim of reducing the financial effects of volatile prices. We provide theoretical guarantees, analytically characterize the outcomes over a copperplate power system example, and numerically explore the same for a modified IEEE 14-bus test system.Comment: arXiv admin note: text overlap with arXiv:1704.0036

    Asymptotic Behavior of Conjunctive Boolean Networks Over Weakly Connected Digraphs

    Full text link
    A conjunctive Boolean network (CBN) is a finite state dynamical system, whose variables take values from a binary set, and the value update rule for each variable is a Boolean function consisting only of logic AND operations. We investigate the asymptotic behavior of CBNs by computing their periodic orbits. When the underlying digraph is strongly connected, the periodic orbits of the associated CBN has been completely understood, one-to-one corresponding to binary necklaces of a certain length given by the loop number of the graph. We characterize in the paper the periodic orbits of CBNs over an arbitrary weakly connected digraphs. We establish, among other things, a new method to investigate their asymptotic behavior. Specifically, we introduce a graphical-approach, termed system reduction, which turns the underlying digraph into a special weakly connected digraph whose strongly connected components are all cycles. We show that the reduced system uniquely determines the asymptotic behavior of the original system. Moreover, we provide a constructive method for computing the periodic orbit of the reduced system, which the system will enter for a given but arbitrary initial condition

    Graph-Theoretic Framework for Unified Analysis of Observability and Data Injection Attacks in the Smart Grid

    Full text link
    In this paper, a novel graph-theoretic framework is proposed to generalize the analysis of a broad set of security attacks, including observability and data injection attacks, that target the state estimator of a smart grid. First, the notion of observability attacks is defined based on a proposed graph-theoretic construct. In this respect, a structured approach is proposed to characterize critical sets, whose removal renders the system unobservable. It is then shown that, for the system to be observable, these critical sets must be part of a maximum matching over a proposed bipartite graph. In addition, it is shown that stealthy data injection attacks (SDIAs) constitute a special case of these observability attacks. Then, various attack strategies and defense policies, for observability and data injection attacks, are shown to be amenable to analysis using the introduced graph-theoretic framework. The proposed framework is then shown to provide a unified basis for analysis of four key security problems (among others), pertaining to the characterization of: 1) The sparsest SDIA; 2) the sparsest SDIA including a certain measurement; 3) a set of measurements which must be defended to thwart all potential SDIAs; and 4) the set of measurements, which when protected, can thwart any SDIA whose cardinality is below a certain threshold. A case study using the IEEE 14-bus system with a set of 17 measurements is used to support the theoretical findings

    Cash-settled options for wholesale electricity markets

    Full text link
    Wholesale electricity market designs in practice do not provide the market participants with adequate mechanisms to hedge their financial risks. Demanders and suppliers will likely face even greater risks with the deepening penetration of variable renewable resources like wind and solar. This paper explores the design of a centralized cash-settled call option market to mitigate such risks. A cash-settled call option is a financial instrument that allows its holder the right to claim a monetary reward equal to the positive difference between the real-time price of an underlying commodity and a pre-negotiated strike price for an upfront fee. Through an example, we illustrate that a bilateral call option can reduce the payment volatility of market participants. Then, we design a centralized clearing mechanism for call options that generalizes the bilateral trade. We illustrate through an example how the centralized clearing mechanism generalizes the bilateral trade. Finally, the effect of risk preference of the market participants, as well as some generalizations are discussed.Comment: Proc. 20th IFAC World Congress (IFAC WC 2017), Toulouse, France, July 9-14, 2017 (accepted

    Robust Distributed Averaging in Networks

    Full text link
    In this work, we consider two types of adversarial attacks on a network of nodes seeking to reach consensus. The first type involves an adversary that is capable of breaking a specific number of links at each time instant. In the second attack, the adversary is capable of corrupting the values of the nodes by adding a noise signal. In this latter case, we assume that the adversary is constrained by a power budget. We consider the optimization problem of the adversary and fully characterize its optimum strategy for each scenario.Comment: This is an elaborated version of our paper: "Consensus in the presence of an adversary," in Proceedings of the 3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys), 201
    corecore