Invariant Properties and Bounds on a Finite Time Consensus Algorithm

  • Chapter
  • First Online:
Transactions on Large-Scale Data- and Knowledge-Centered Systems XLI

Part of the book series: Lecture Notes in Computer Science ((TLDKS,volume 11390))

Abstract

Finite time consensus algorithms compute consensus values exactly and in a finite number of steps, contrasting with asymptotic consensus algorithms. In the literature, there exists few approaches deriving finite time convergence for discrete consensus algorithms. In this paper we focus on an analysis of finite time convergence based on the observability matrix for consensus networks. We introduce analytical results extending the applicability of network observability theory to consensus and other distributed algorithms. New analytical bounds on the number of steps to compute consensus are provided as well as counterexamples which are disproving a conjecture on the minimum of steps to compute consensus. A polynomial time algorithm is described to calculate empirically the exact number of steps to compute consensus values. We have implemented a consensus-based network intrusion detection system based on the observability matrix approach of consensus networks. This implementation validates empirically our analytical results. We also compare the performance of the finite time consensus with an implementation of the same intrusion detection system using asymptotic consensus. Although the finite time algorithm provides exact solutions, tests show that it needs less iterations to obtain a consensus solution.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
EUR 32.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or Ebook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free ship** worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    In a more general set up, the system in Eq. (5) includes a control term which is used to maintain the system in a desired region of its state space. The synthesis of such controller is the subject of research related to continuous consensus which yields finite time algorithms, see for example [32, 33] and references therein.

References

  1. **ao, L., Boyd, S., Kim, S.-J.: Distributed average consensus with least-mean-square deviation. J. Parallel Distrib. Comput. 67(1), 33–46 (2007)

    Article  Google Scholar 

  2. **ao, L., Boyd, S., Lall, S.: A scheme for robust distributed sensor fusion based on average consensus. In: Fourth International Symposium on Information Processing in Sensor Networks, IPSN 2005, April 2005, pp. 63–70 (2005)

    Google Scholar 

  3. **ao, L., Boyd, S.: Fast linear iterations for distributed averaging. Syst. Control. Lett. 53, 65–78 (2003)

    Article  MathSciNet  Google Scholar 

  4. Wang, X., Li, J., **ng, J., Wang, R., **e, L., Zhang, X.: A novel finite-time average consensus protocol for multi-agent systems with switching topology. Trans. Inst. Meas. Control. 40(2), 606–614 (2018). https://doi.org/10.1177/0142331216663617

    Article  Google Scholar 

  5. **ao, F., Wang, L., Chen, T.: Finite-time consensus in networks of integrator-like dynamic agents with directional link failure. IEEE Trans. Autom. Control. 59(3), 756–762 (2014)

    Article  MathSciNet  Google Scholar 

  6. Hui, Q., Haddad, W.M., Bhat, S.P.: Finite-time semistability and consensus for nonlinear dynamical networks. IEEE Trans. Autom. Control. 53(8), 1887–1900 (2008)

    Article  MathSciNet  Google Scholar 

  7. Cortés, J.: Finite-time convergent gradient flows with applications to network consensus. Automatica 42(11), 1993–2000 (2006). http://www.sciencedirect.com/science/article/pii/S000510980600269X

    Article  MathSciNet  Google Scholar 

  8. Ko, C.-K., Gao, X.: On matrix factorization and finite-time average-consensus. In: Proceedings of the 48th IEEE Conference on Decision and Control (CDC) Held Jointly with 2009 28th Chinese Control Conference, pp. 5798–5803, December 2009

    Google Scholar 

  9. Ko, C.-K.: On matrix factorization and scheduling for finite-time average-consensus. Ph.D. dissertation, California Institute of Technology (2010)

    Google Scholar 

  10. Kibangou, A.Y.: Graph Laplacian based matrix design for finite-time distributed average consensus. In: 2012 American Control Conference (ACC), pp. 1901–1906, June 2012

    Google Scholar 

  11. Dung, T.M., Alain, T., Kibangou, Y.: Distributed design of finite-time average consensus protocols. In: IFAC Proceedings Volumes 2013 4th IFAC Workshop on Distributed Estimation and Control in Networked Systems, vol. 46, no. 27, pp. 227–233 (2013). http://www.sciencedirect.com/science/article/pii/S1474667015402320

    Article  Google Scholar 

  12. Sundaram, S., Hadjicostis, C.N.: Finite-time distributed consensus in graphs with time-invariant topologies. In: 2007 American Control Conference, pp. 711–716, July 2007

    Google Scholar 

  13. Yuan, Y., Stan, G.-B., Shi, L., Barahona, M., Goncalves, J.: Decentralised minimum-time consensus. Automatica 49(5), 1227–1235 (2013)

    Article  MathSciNet  Google Scholar 

  14. Charalambous, T., Yuan, Y., Yang, T., Pan, W., Hadjicostis, C.N., Johansson, M.: Decentralised minimum-time average consensus in digraphs. In: 52nd IEEE Conference on Decision and Control, pp. 2617–2622, December 2013

    Google Scholar 

  15. Sundaram, S., Hadjicostis, C.N.: Distributed consensus and linear functional calculation in networks: an observability perspective. In: 2007 6th International Symposium on Information Processing in Sensor Networks, pp. 99–108, April 2007

    Google Scholar 

  16. Sundaram, S., Hadjicostis, C.N.: Distributed function calculation and consensus using linear iterative strategies. IEEE J. Sel. Areas Commun. 26(4), 650–660 (2008). https://doi.org/10.1109/JSAC.2008.080507

    Article  Google Scholar 

  17. Sundaram, S.: Linear Iterative Strategies for Information Dissemination and Processing in Distributed Systems. University of Illinois at Urbana-Champaign (2009). https://books.google.com.vn/books?id=K-LOAQAACAAJ

  18. Toulouse, M., Minh, B.Q., Curtis, P.: A consensus based network intrusion detection system. In: 2015 5th International Conference on IT Convergence and Security (ICITCS), pp. 1–6, August 2015

    Google Scholar 

  19. Bauso, D., Giarré, L., Pesenti, R.: Distributed consensus in noncooperative inventory games. Eur. J. Oper. Res. 192(3), 866–878 (2009). http://www.sciencedirect.com/science/article/pii/S0377221707010181

    Article  MathSciNet  Google Scholar 

  20. Akyildiz, I.F., Lo, B.F., Balakrishnan, R.: Cooperative spectrum sensing in cognitive radio networks: a survey. Phys. Commun. 4(1), 40–62 (2011). https://doi.org/10.1016/j.phycom.2010.12.003

    Article  Google Scholar 

  21. Li, Z., Yu, F.R., Huang, M.: A cooperative spectrum sensing consensus scheme in cognitive radios. In: IEEE INFOCOM 2009, pp. 2546–2550, April 2009

    Google Scholar 

  22. Olfati-Saber, R., Murray, R.M.: Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Autom. Control. 49(9), 1520–1533 (2004). https://doi.org/10.1109/tac.2004.834113

    Article  MathSciNet  MATH  Google Scholar 

  23. Chen, J., Patton, J.R., Zhang, H.-Y.: Design of unknown input observers and robust fault detection filters. Int. J. Control. 63(1), 85–105 (1996)

    Article  MathSciNet  Google Scholar 

  24. Isermann, R.: Model-based fault-detection and diagnosis - status and applications. Annu. Rev. Control. 29, 71–85 (2005)

    Article  Google Scholar 

  25. Teixeira, A., Sandberg, H., Johansson, K.H.: Networked control systems under cyber attacks with applications to power networks. In: Proceedings of the 2010 American Control Conference, pp. 3690–3696, June 2010

    Google Scholar 

  26. Pasqualetti, F., Bicchi, A., Bullo, F.: Consensus computation in unreliable networks: a system theoretic approach. IEEE Trans. Autom. Control. 57(1), 90–104 (2012)

    Article  MathSciNet  Google Scholar 

  27. Pasqualetti, F., Dörfler, F., Bullo, F.: Attack detection and identification in cyber-physical systems. IEEE Trans. Autom. Control. 58(11), 2715–2729 (2013)

    Article  MathSciNet  Google Scholar 

  28. Pasqualetti, F., Bicchi, A., Bullo, F.: On the security of linear consensus networks. In: Proceedings of the 48th IEEE Conference on Decision and Control (CDC) Held Jointly with 2009 28th Chinese Control Conference, pp. 4894–4901, December 2009

    Google Scholar 

  29. Silvestre, D., Rosa, P., Cunha, R., Hespanha, J.P., Silvestre, C.: Gossip average consensus in a byzantine environment using stochastic set-valued observers. In: 52nd IEEE Conference on Decision and Control, pp. 4373–4378, December 2013

    Google Scholar 

  30. Pasqualetti, F., Bicchi, A., Bullo, F.: Distributed intrusion detection for secure consensus computations. In: 2007 46th IEEE Conference on Decision and Control, pp. 5594–5599, December 2007

    Google Scholar 

  31. Ahlswede, R., Cai, N., Li, S.Y., Yeung, R.W.: Network information flow. IEEE Trans. Inf. Theor. 46(4), 1204–1216 (2000)

    Article  MathSciNet  Google Scholar 

  32. Ghosh, S., Lee, J.: Optimal synthesis for finite-time consensus under fixed graphs. In: 2011 50th IEEE Conference on Decision and Control and European Control Conference, pp. 2052–2057, December 2011

    Google Scholar 

  33. Ghosh, S., Lee, J.W.: Optimal distributed consensus on unknown undirected graphs. In: 2012 IEEE 51st IEEE Conference on Decision and Control (CDC), pp. 2244–2249, December 2012

    Google Scholar 

  34. Tavallaee, M., Bagheri, E., Lu, W., Ghorbani, A.A.: A detailed analysis of the KDD cup 99 data set. In: 2009 IEEE Symposium on Computational Intelligence for Security and Defense Applications, pp. 1–6, July 2009

    Google Scholar 

  35. Lippmann, R., Haines, J.W., Fried, D.J., Korba, J., Das, K.: Analysis and results of the 1999 DARPA off-line intrusion detection evaluation. In: Debar, H., Mé, L., Wu, S.F. (eds.) RAID 2000. LNCS, vol. 1907, pp. 162–182. Springer, Heidelberg (2000). https://doi.org/10.1007/3-540-39945-3_11. http://dl.acm.org/citation.cfm?id=645838.670722

    Chapter  Google Scholar 

  36. Lippmann, R., et al.: Evaluating intrusion detection systems: the 1998 DARPA off-line intrusion detection evaluation. In: Proceedings of DARPA Information Survivability Conference and Exposition, DISCEX 2000, pp. 12–26 (2000)

    Google Scholar 

  37. Kotenko, I., Doynikova, E.: Selection of countermeasures against network attacks based on dynamical calculation of security metrics. J. Def. Model. Simul. 15(2), 181–204 (2018). https://doi.org/10.1177/1548512917690278

    Article  Google Scholar 

Download references

Acknowledgments

Funding for this project comes from the Professorship Start-Up Support Grant VGU-PSSG-02 of the Vietnamese-German University. The authors thank this institution for supporting this research.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Michel Toulouse .

Editor information

Editors and Affiliations

Appendix

Appendix

Network intrusion detection systems monitor computer network infrastructures, seeking to identify malicious intends through the analysis of network traffic. Typically detection is broken down into two phases: an observation phase where network traffic information is collected and an analysis phase where the observed traffic is analyzed and categorized into benign or malignant network traffic. Traffic observation is performed through sensors that collect information about specific features of network traffic. As today’s computer networks are quite large, composed of several heterogeneous sub-networks, traffic observation often needs to be done distributively with sensors placed at different strategic locations. Figure 3 exemplifies this situation, showing sensors distributed across a supervised network, where each sensor is in charge of observing the local traffic of a sub-network.

Fig. 3.
figure 3

Topology of a network intrusion detection system.

Typically, in a large computer network, sensors are doing more than simply observing local traffic in sub-networks, they also perform analysis of the local sub-network traffic. In that case, sensors are full scale sensing and analytical devices. As traffic analysis is performed at the level of each sensor, local traffic can be classified and remedial actions can be taken if an intrusive behavior is detected. However, in some cases, a certain degree of aggregation of local analysis results can be helpful to address for example attacks from concurrent sources such as distributed denial of service (DDoS), to develop network wide coordinated responses to attacks or simply to increase the detection accuracy of each local analysis based on information from other sub-networks. If data aggregation is a key component of an intrusion detection system then this component must be designed to maintain the survivability and robustness of the system. Consensus algorithms are a relevant choice in this context as they provide protocols to compute aggregation functions in a completely distributed manner, eliminating issues such as single point of failure and others related to centralized computing of network data.

Toulouse et al. [18] have introduced a network intrusion detection system in which aggregation and fusion of local traffic analysis is computed distributively using an average consensus algorithm. In order to accomplish this task, sensors communicate with each other through what we call a consensus network. In Fig. 3, the consensus network is a ring network linking the four sensor nodes. While exchanging information with their neighbors in the consensus network, nodes repeatedly average a sum of values representing their diagnostic about the state of the local traffic as well as the diagnostic of their neighbors. Through local averaging, sensors approximate a consensus value which is used as measurement of some relevant network wide state of the monitored network system.

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer-Verlag GmbH Germany, part of Springer Nature

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Toulouse, M., Minh, B.Q., Minh, Q.T. (2019). Invariant Properties and Bounds on a Finite Time Consensus Algorithm. In: Hameurlain, A., Wagner, R., Dang, T. (eds) Transactions on Large-Scale Data- and Knowledge-Centered Systems XLI. Lecture Notes in Computer Science(), vol 11390. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-58808-6_2

Download citation

  • DOI: https://doi.org/10.1007/978-3-662-58808-6_2

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-662-58807-9

  • Online ISBN: 978-3-662-58808-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics

Navigation