Hideaki Ishii’s research while affiliated with Tokyo Institute of Technology and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (283)


Cluster Synchronization of Kuramoto Oscillators Via Extended Averaging Criteria
  • Article

December 2024

·

1 Read

IEEE Transactions on Automatic Control

Rui Kato

·

Hideaki Ishii

New stability conditions for cluster synchronization of Kuramoto oscillators are presented. Our approach is based on averaging criteria, but the standard method for stability analysis cannot be directly applied due to the lack of uniform continuity with respect to a perturbation parameter. First, we overcome this technical difficulty with the help of nonmonotonic Lyapunov functions. Our extensions of averaging criteria are the key to unify the existing cluster synchronization conditions: (i) the coupling weights between clusters are sufficiently small and/or (ii) the natural frequency differences between clusters are sufficiently large. The case where the existence of an invariant manifold is not ensured is also investigated. Moreover, we apply our theoretical findings to brain networks and demonstrate that our results are valid in a practical setting.


Reaching Resilient Leader-Follower Consensus in Time-Varying Networks via Multi-Hop Relays

November 2024

We study resilient leader-follower consensus of multi-agent systems (MASs) in the presence of adversarial agents, where agents' communication is modeled by time-varying topologies. The objective is to develop distributed algorithms for the nonfaulty/normal followers to track an arbitrary reference value propagated by a set of leaders while they are in interaction with the unknown adversarial agents. Our approaches are based on the weighted mean subsequence reduced (W-MSR) algorithms with agents being capable to communicate with multi-hop neighbors. Our algorithms can handle agents possessing first-order and second-order dynamics. Moreover, we characterize necessary and sufficient graph conditions for our algorithms to succeed by the novel notion of jointly robust following graphs. Our graph condition is tighter than the sufficient conditions in the literature when agents use only one-hop communication (without relays). Using multi-hop relays, we can enhance robustness of leader-follower networks without increasing communication links and obtain further relaxed graph requirements for our algorithms to succeed. Numerical examples are given to verify the efficacy of our algorithms.



Resilient Average Consensus with Adversaries via Distributed Detection and Recovery

May 2024

·

2 Reads

We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consensus algorithm for the multi-agent networks with general directed topologies. The proposed algorithm has two parts at each iteration: detection and averaging. For the detection part, we propose two distributed algorithms and one of them can detect malicious agents with only the information from direct in-neighbors. For the averaging part, we extend the applicability of an existing averaging algorithm where normal agents can remove the effects from malicious agents so far, after they are detected. Another important feature of our method is that it can handle the case where malicious agents are neighboring and collaborating with each other to mislead the normal ones from averaging. This case cannot be solved by existing detection approaches in related literature. Moreover, our algorithm is efficient in storage usage especially for large-scale networks as each agent only requires the values of neighbors within two hops. Lastly, numerical examples are given to verify the efficacy of the proposed algorithms.



Resilient Average Consensus with Adversaries via Distributed Detection and Recovery

January 2024

IEEE Transactions on Automatic Control

We study the problem of resilient average consensus in multi-agent systems where some of the agents are subject to failures or attacks. The objective of resilient average consensus is for non-faulty/normal agents to converge to the average of their initial values despite the erroneous effects from malicious agents. To this end, we propose a successful distributed iterative resilient average consensus algorithm for the multi-agent networks with general directed topologies. The proposed algorithm has two parts at each iteration: detection and averaging. For the detection part, we propose two distributed algorithms and one of them can detect malicious agents with only the information from direct in-neighbors. For the averaging part, we extend the applicability of an existing averaging algorithm where normal agents can remove the effects from malicious agents so far, after they are detected. Another important feature of our method is that it can handle the case where malicious agents are neighboring and collaborating with each other to mislead the normal ones from averaging. This case cannot be solved by existing detection approaches in related literature. Moreover, our algorithm is efficient in storage usage especially for large-scale networks as each agent only requires the values of neighbors within two hops. Lastly, numerical examples are given to verify the efficacy of the proposed algorithms.


FIGURE 1. Network of 16 nodes with communication radius R = √ 5.
FIGURE 2. Proposed approach by Algorithm 1: Time responses of phases (top) and relative phases (bottom) of the nodes.
FIGURE 3. Proposed approach by Algorithm 2: Time responses of phases (top) and relative phases (bottom) of the nodes.
FIGURE 4. Proposed approach by Algorithm 3: Time responses of phases (top) and relative phases (bottom) of the nodes.
FIGURE 5. Conventional method by [11]: Time responses of phases (top) and relative phases (bottom) of the nodes.

+2

Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks
  • Article
  • Full-text available

January 2024

·

8 Reads

·

1 Citation

IEEE Open Journal of Control Systems

This paper studies a clock synchronization problem for wireless sensor networks employing pulse-based communication when some of the nodes are faulty or even adversarial. The objective is to design resilient distributed algorithms for the nonfaulty nodes to keep the influence of the malicious nodes minimal and to arrive at synchronization in a safe manner. Compared with conventional approaches, our algorithms are more capable in the sense that they are applicable to networks taking noncomplete graph structures. Our approach is to extend the class of mean subsequence reduced (MSR) algorithms from the area of multi-agent consensus. First, we provide a simple detection method to find malicious nodes that transmit pulses irregularly. Then, we demonstrate that in the presence of adversaries avoiding to be detected, the normal nodes can reach synchronization by ignoring suspicious pulses. Two extensions of this algorithm are further presented, which can operate under more adversarial attacks and also with relaxed conditions on the initial phases. We illustrate the effectiveness of our results by numerical examples.

Download



Fig. 1: A network that is strongly 4-robust w.r.t. the set S = {1, 2, 3, 4}.
Fig. 2: The Euclidean norm of each sensor's estimation error, where the lines with 'x' are those of misbehaving sensors.
Resilient Distributed Parameter Estimation in Sensor Networks

June 2023

·

122 Reads

In this paper, we study the problem of parameter estimation in a sensor network, where the measurements and updates of some sensors might be arbitrarily manipulated by adversaries. Despite the presence of such misbehaviors, normally behaving sensors make successive observations of an unknown d-dimensional vector parameter and aim to infer its true value by cooperating with their neighbors over a directed communication graph. To this end, by leveraging the so-called dynamic regressor extension and mixing procedure, we transform the problem of estimating the vector parameter to that of estimating d scalar ones. For each of the scalar problem, we propose a resilient combine-then-adapt diffusion algorithm, where each normal sensor performs a resilient combination to discard the suspicious estimates in its neighborhood and to fuse the remaining values, alongside an adaptation step to process its streaming observations. With a low computational cost, this estimator guarantees that each normal sensor exponentially infers the true parameter even if some of them are not sufficiently excited.


Citations (51)


... In such a problem, agents connected over a network try to reach consensus on a common value while interacting with only neighboring agents. Stemming from this concept, extensive applications and algorithms have been devised to overcome various industrial challenges [4]- [7]. Concurrently, growing concerns over cyber security within MASs have amplified the significance of consensus protocols, especially in scenarios where adversarial agents induce failures or launch attacks, e.g., [8]- [11]. ...

Reference:

Reaching Resilient Leader-Follower Consensus in Time-Varying Networks via Multi-Hop Relays
Resilient Synchronization of Pulse-Coupled Oscillators Under Stealthy Attacks

IEEE Open Journal of Control Systems

... A new version of quantized zero-dynamics attacks called ϵ-stealthy attacks has been introduced in [16]. This attack method shares a concept similar to dynamical quantization to compensate quantization errors inside the attack dynamics. ...

Quantized Zero Dynamics Attacks Against Sampled-Data Control Systems
  • Citing Article
  • January 2023

IEEE Transactions on Automatic Control

... In Nazari et al. (2021) the bound on the convergence is shown to follow path-length of the comparator sequence and the network connectivity. Designing robust graph topologies for fault-tolerant distributed optimization is proposed by Wang et al. (2023). Some other works Ogiwara et al. (2015); Alenazi et al. (2014) are devoted to increasing the algebraic connectivity for faster synchronization and consensus over networks. ...

Resilient distributed optimization under mobile malicious attacks
  • Citing Article
  • January 2023

IFAC-PapersOnLine

... This may cause problems as the clocks may show the same readings at different time instants. As an extension of this work, in [26], we have developed an algorithm where the phases remain continuous at all times. Future research will also deal with other resilient techniques for problems in synchronization in the context of cyber security. ...

Resilient Synchronization of Pulse-coupled Oscillators with Time Continuity
  • Citing Article
  • January 2023

IFAC-PapersOnLine

... Furthermore, it is also interesting to consider a case where the players may not have a complete knowledge of the other players. This incomplete version of the game is considered in [23]. ...

Two-Player Incomplete Games of Resilient Multiagent Systems
  • Citing Article
  • January 2023

IFAC-PapersOnLine

·

Tomohisa Hayakawa

·

Hideaki Ishii

·

[...]

·

... In this paper, we develop distributed algorithms to tackle resilient leader-follower consensus in time-varying networks. In the literature, many efforts have been devoted to resilient consensus using the so-called mean subsequence reduced (MSR) algorithms [12], [13], [24]- [26]. In such algorithms, each normal agent disregards the most deviated states of neighbors to avoid being affected by possible faulty values from adversarial neighbors. ...

Event-Triggered Approximate Byzantine Consensus With Multi-Hop Communication
  • Citing Article
  • January 2023

IEEE Transactions on Signal Processing

... For SIR-type models, where the disease eventually dies out, objectives include reducing the peak infection level (the so called "flattening the curve" concept) [7], and limiting the total number of removed individuals [8]. For SIS-type models, where the disease can become endemic, a typical objective is to eliminate the disease entirely [9], and if not possible, then suppress and reduce the level of endemic infections [10]. Evidently, the control actions in the model should reflect real-world public health interventions. ...

A State Feedback Controller for Mitigation of Continuous-Time Networked SIS Epidemics
  • Citing Article
  • January 2022

IFAC-PapersOnLine

... In [9], the authors studied the asynchronous Byzantine consensus based on a flooding algorithm, where nodes relay their values over the entire network. Moreover, in our previous work [15], we studied the asynchronous Byzantine consensus using an algorithm which is of less complexity than that in [9]. To conclude, through multi-hop communication, the connectivity requirement becomes less stringent for guaranteeing the same level of resilience as for the one-hop case. ...

Asynchronous Approximate Byzantine Consensus via Multi-hop Communication
  • Citing Conference Paper
  • June 2022