This paper was converted on www.awesomepapers.org from LaTeX by an anonymous user.
Want to know more? Visit the Converter page.

Failure Detection and Isolation in Integrator Networks

Mohammad Amin Rahimian, Victor M. Preciado~{}^{*} The authors are with the Department of Electrical and Systems Engineering, University of Pennsylvania, Philadelphia, PA 19104-6228 USA. (email: preciado@seas.upenn.edu).
Abstract

Detection and isolation of link failures under the Laplacian consensus dynamics have been the focus of our previous study. Our results relate the failure of links in the network to jump discontinuities in the derivatives of the output responses of the nodes and exploit that relation to propose failure detection and isolation (FDI) techniques, accordingly. In this work, we extend the results to general linear networked dynamics. In particular, we show that with additional niceties of the integrator networks and the enhanced proofs, we are able to incorporate both unidirectional and bidirectional link failures. At the next step, we extend the available FDI techniques to accommodate the cases of bidirectional link failures and undirected topologies. Computer experiments with large networks and both directed and undirected topologies provide interesting insights as to the role of directionality, as well as the scalability of the proposed FDI techniques with the network size.

I Introduction

Multi-agent network systems have found promising applications in areas such as motion coordination of robots [1]. Cooperative dynamics over a network can be strongly affected by the network failures. Hence, studying the effects of link or node failures on the network dynamics is an important topic in network science and it has various practical implications [2, 3].

Fault Detection and Isolation (FDI) in networked systems is an active area of research with application to power networks [4], and security of cyber-physical systems [5]. In a systematic approach the so-called FDI filter uses available measurements to generate a residual signal, which is then used for fault diagnosis [6]. Various observer and Kalman filter techniques are used to obtain the residual signal [7], which can be then compared with a threshold signal to detect faults. In [8] the residual signal and threshold signals are generated using filtering techniques that allow for noise suppression and less conservative detection thresholds. Failures and attacks are modeled as disturbances in the descriptor systems approach that is adopted in [5], and some fundamental limitations of detection and identification in cyber-physical systems are established from systems-theoretic or graph-theoretic perspectives.

The mathematical framework for investigating the ability to detect and distinguish failures based on the observed output responses is established in [9], where conditions in terms of the inter-nodal distances to the observation points are provided for the detectability of links. Subsequent results in [10] provide a method for detection and isolation of failures under the Laplacian network dynamics. These results relate the presence of discontinuities in the derivatives of particular orders in the output responses of a subset of nodes to occurrence and location of link failures; and coupled with efficient sensor placement algorithms they can be used to pin down the location of failures in the network. In this paper, we analyze the particular case of networked single integrator dynamics and extend the proofs and FDI algorithms to allow for efficient sensor location in a (directed or undirected) integrator network where link failures can be either unidirectional or bidirectional.

The remainder of this paper is organized as follows. In Section II we set up the notation and give the preliminaries on weighted digraphs and their algebraic properties. Our main analytical findings are set forth in Section III where we first prove the results relating link failures to jump discontinuities of the output derivatives for single-integrator networks, and then consider the case when the links can fail simultaneously in both forward and reverse directions. In Section IV we flesh out the necessary formalism to accommodate both cases of unidirectional and bidirectional link failures within the framework of the previously developed sensor placement algorithms. Computer experiments on large networks in Section V elucidate the results and offer interesting insights on the effects of the network size and edge directionality. Section VI concludes the paper.

II Preliminaries

Throughout the paper, \varnothing is the empty set, \mathbb{N} denotes the set of all natural numbers, and \mathbb{R} denotes the set of all real numbers. Also, the set of integers {1,2,,k}\{1,2,\ldots,k\} is denoted by k\mathbb{N}_{k}, and any other set is represented by a calligraphic capital letter. The cardinality of a set 𝒳\mathcal{X} is denoted by |𝒳||\mathcal{X}|, and 𝒫(𝒳)={;𝒳}\mathcal{P}(\mathcal{X})=\{\mathcal{M};\mathcal{M}\subset\mathcal{X}\} denotes the power-set of 𝒳\mathcal{X}, which is the set of all its subsets. The difference of two sets 𝒳\mathcal{X} and 𝒴\mathcal{Y} is denoted by 𝒳\fgebackslash𝒴\mathcal{X}\fgebackslash\mathcal{Y} and is defined as {x;x𝒳x𝒴}\left\{x;x\in\mathcal{X}\wedge x\notin\mathcal{Y}\right\}, where \wedge is the logical conjunction. In addition the logical implication and bi-implication are denoted by \rightarrow and \leftrightarrow, respectively, and \vee denote the logical disjunction. The fixed integer nn represents the number of nodes in the network. Matrices are represented by capital letters, vectors are expressed by boldface lower-case letters, and the superscript T denotes the matrix transpose. Moreover, II denotes the identity matrix with proper dimension, 𝐞i\mathbf{e}_{i} is the ii-th unit vector in the standard basis of n\mathbb{R}^{n}, and mij:=[M]ijm_{ij}:=\left[M\right]_{ij} indicate the element of matrix MM which is located at its ii-th row and jj-th column.

A directed graph or digraph is defined as an ordered pair of sets 𝒢:=(𝒱,)\mathcal{G}:=(\mathcal{V},\mathcal{E}), where 𝒱={ν1,,νn}\mathcal{V}=\left\{{\nu}_{1},\ldots,{\nu}_{n}\right\} is a set of n=|𝒱|n=|\mathcal{V}| vertices and 𝒱×𝒱\mathcal{E}\subseteq\mathcal{V}\times\mathcal{V} is a set of directed edges. In the graphical representations, each edge ϵ:=(τ,ν)\epsilon:=({\tau},{\nu})\in\mathcal{E} is depicted by a directed arc from vertex τ𝒱{\tau}\in\mathcal{V} to vertex ν𝒱{\nu}\in\mathcal{V}. Vertices ν{\nu} and τ\tau are referred to as the head and tail of the edge ϵ\epsilon and a (ν,ν)(\nu,\nu) edge is called a self-loop on ν\nu. Given an integer kk\in\mathbb{N}, a set of (possibly repeated) indices {α1,α2,,αk}\{\alpha_{1},\alpha_{2},\ldots,\alpha_{k}\} \subseteq n\mathbb{N}_{n} and two vertices τ,ν\tau,\nu \in 𝒱\mathcal{V}, an ordered sequence of edges of the form 𝒲\mathcal{W} :=:= (τ,να1),(να1,να2),({\tau},{\nu}_{\alpha_{1}}),({\nu}_{\alpha_{1}},{\nu}_{\alpha_{2}}), \ldots , (ναk1,ναk),(ναk,ν)({\nu}_{\alpha_{k-1}},{\nu}_{\alpha_{k}}),({\nu}_{\alpha_{k}},{\nu}) is called a τν{\tau}{\nu} walk with start-node τ\tau, end-node ν\nu and length k+1k+1. A cycle on node ν\nu signifies a νν\nu\nu walk. For any {q,p}n\{{q},{p}\}\subset\mathbb{N}_{n}, Ωk(𝒢;νq,νp)\Omega^{k}(\mathcal{G};{\nu_{q},\nu_{p}}) is the set of all νqνp{\nu_{q}}{\nu_{p}} walks in 𝒢\mathcal{G} with length kk. Similarly for {q,r,p}\{{q},{r},{p}\} \subset n,\mathbb{N}_{n}, Ωk(𝒢;νq,νr,νp)\Omega^{k}(\mathcal{G};{\nu_{q},\nu_{r},\nu_{p}}) == {𝒲\{\mathcal{W} \in Ωk(𝒢;νq,νp);(νq,νr)\Omega^{k}(\mathcal{G};{\nu_{q},\nu_{p}});(\nu_{q},\nu_{r}) \in 𝒲}\mathcal{W}\}, i.e. the set of νqνp\nu_{q}\nu_{p} walks with length kk that include the edge (νq,νr)(\nu_{q},\nu_{r}). In the same venue, the integer dist(𝒢;νq,νp)=min{k:,Ωk(𝒢;νq,νp)}\textrm{dist}(\mathcal{G};{\nu_{q}},{\nu_{p}})=\min\{k\in\mathbb{N}:,\Omega^{k}(\mathcal{G};{\nu_{q},\nu_{p}})\neq\varnothing\} is referred to as the distance from νq{\nu_{q}} to νp{\nu_{p}} in 𝒢\mathcal{G}, and by convention, dist(𝒢;νq,νq)=0,qn\textrm{dist}(\mathcal{G};{\nu_{q}},{\nu_{q}})=0,\forall q\in\mathbb{N}_{n} and dist(𝒢;νq,νp)=\textrm{dist}(\mathcal{G};{\nu_{q}},{\nu_{p}})=\infty if k\forall k\in\mathbb{N}, Ωk(𝒢;νq,νp)=\Omega^{k}(\mathcal{G};{\nu_{q},\nu_{p}})=\varnothing. For ease of notation we usually use dist(νq,νp):=dist(𝒢;νq,νp)\textrm{dist}({\nu_{q}},{\nu_{p}}):=\textrm{dist}(\mathcal{G};{\nu_{q}},{\nu_{p}}). The diameter of 𝒢\mathcal{G}, denoted by diam(𝒢)\mbox{diam}(\mathcal{G}), is defined as the maximum distance between any pair of nodes νp,νq𝒱\nu_{p},\nu_{q}\in\mathcal{V}: diam(𝒢)=maxνq,νp𝒱dist(νq,νp)\mbox{diam}(\mathcal{G})=\max_{\nu_{q},\nu_{p}\in\mathcal{V}}\textrm{dist}(\nu_{q},\nu_{p}). A matrix An×nA\in\mathbb{R}^{n\times n} is called an in-weighting on 𝒢\mathcal{G} if {νp,νq}𝒱,(νq,νp)apq=0\forall\{\nu_{p},\nu_{q}\}\subset\mathcal{V},(\nu_{q},\nu_{p})\not\in\mathcal{E}\rightarrow a_{pq}=0. If AA is an in-weighting on 𝒢\mathcal{G}, then ω(𝒲,A)=(νq,νp)𝒲apq\omega(\mathcal{W},A)=\prod_{(\nu_{q},\nu_{p})\in\mathcal{W}}a_{pq} is referred to as the weight of walk 𝒲\mathcal{W} w.r.t. AA. Given a set of walks Ω\Omega in digraph 𝒢\mathcal{G} and the in-weighting AA on 𝒢\mathcal{G}, the function Φ(Ω,A)=𝒲Ωω(𝒲,A)\Phi(\Omega,A)=\sum_{\mathcal{W}\in\Omega}\omega(\mathcal{W},A) is defined, which finds use in the proof of the main results in Section III. Note that this function satisfies Φ(Ωk(𝒢;νq,νr,νp),A)=arqΦ(Ωk1(𝒢;νr,νp),A)\Phi(\Omega^{k}(\mathcal{G};{\nu_{q},\nu_{r},\nu_{p}}),A)=a_{rq}\Phi(\Omega^{k-1}(\mathcal{G};{\nu_{r},\nu_{p}}),A). It is also known that given an in-weighting AA on 𝒢\mathcal{G} and vertices {νq,νp}𝒱\{\nu_{q},\nu_{p}\}\subset\mathcal{V}, that [11, 12]:

Φ(Ωk(𝒢;νq,νp),A)=[Ak]pq.\displaystyle\Phi(\Omega^{k}(\mathcal{G};{\nu_{q},\nu_{p}}),A)=\left[A^{k}\right]_{pq}. (1)

The following definition comes handy in the statement and proof of the main theorem in the next section. At each time tft_{f} and for all pnp\in\mathbb{N}_{n} and kzk\in\mathbb{N}_{z}, define Δtf:n×z\Delta_{t_{f}}:\mathbb{N}_{n}\times\mathbb{N}_{z}\to\mathbb{R} as Δtf(p,k):=dkdtk(xp)(tf+)dkdtk(xp)(tf)\Delta_{t_{f}}(p,k):=\frac{{\textrm{d}}^{k}}{\textrm{d}t^{k}}({x}_{p})(t_{f}^{+})-\frac{{\textrm{d}}^{k}}{\textrm{d}t^{k}}(x_{p})(t_{f}^{-}). The function Δtf(p,k)\Delta_{t_{f}}(p,k) as defined, measures the jump in the kk-th derivative of the response of agent pp at the time of failure tft_{f}, and the parameter zdiam(𝒢)+1z\leqslant\mbox{diam}(\mathcal{G})+1 is a fixed integer, denoting the highest order of derivatives to which the designer has access.

III Failures in Networks of Single-Integrators

Let us consider a network of nn single-integrators, where each integrator is described by a single state xix_{i}, with the following dynamics:

𝐱˙(t)=A𝐱(t)+B𝐰(t),t>t0,\dot{\mathbf{x}}(t)=A\mathbf{x}(t)+B\mathbf{w}(t),\>t>t_{0}, (2)

where 𝐱(t)=(x1,,xn)Tn\mathbf{x}\left(t\right)=\left(x_{1},\ldots,x_{n}\right)^{T}\in\mathbb{R}^{n}, 𝐰(t)m\mathbf{w}(t)\in\mathbb{R}^{m}, BN×mB\in\mathbb{R}^{N\times m}, and AN×NA\in\mathbb{R}^{N\times N} is an in-weighting of graph 𝒢\mathcal{G}. We assume that the entries of 𝐰(t)\mathbf{w}\left(t\right) are (diam(𝒢)+1)\left(\mathrm{diam}(\mathcal{G})+1\right)-differentiable. Let us assume link ϵ¯=(νj,νi)\bar{\epsilon}=(\nu_{j},\nu_{i}) fails at time t=tft=t_{f}, resulting in a faulty connectivity graph 𝒢¯=(𝒱,\fgebackslash{ϵ¯})\bar{\mathcal{G}}=(\mathcal{V},\mathcal{E}\fgebackslash\{\bar{\epsilon}\}) for t>tft>t_{f}. The corresponding in-weighting of 𝒢¯\bar{\mathcal{G}}, denoted by A¯\bar{A}, is a perturbed version of AA that satisfies a¯ij=0\bar{a}_{ij}=0, and a¯qr=aqr\bar{a}_{qr}=a_{qr} for all qiq\neq i; i.e. entries on the ii-th row of AA are allowed to change while every other entry remains unaffected.

The following theorem characterizes the effect of link failures on the output derivatives of a network of single integrators:

Theorem 1.

Consider the dynamic network of single integrators in (2) with output equation yp(t)=xp(t)y_{p}(t)=x_{p}(t), and assume link ϵ¯=(νj,νi)\bar{\epsilon}=(\nu_{j},\nu_{i}) fails at time tft_{f}. Then, the output of node νp\nu_{p} satisfies:

Δtf(p,k)=Φ(Ωk1(νi,νp),A)q=1N(a¯iqaiq)xq(tf),\displaystyle\Delta_{t_{f}}({p,k})=\Phi(\Omega^{k-1}(\nu_{i},\nu_{p}),A)\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right)x_{q}(t_{f}), (3)

for k=dist(νj,νp)k=\mbox{\emph{dist}}(\nu_{j},\nu_{p}); and Δtf(p,k)=0\Delta_{t_{f}}({p,k})=0, for k<dist(νj,νp)k<\mbox{\emph{dist}}(\nu_{j},\nu_{p}).

Proof:

See the Appendix. ∎

The next lemma and the following corollary show in particular how the result of Theorem 1 agrees with and maps to the result of Theorem 1 in [13], where we consider the case of networked LTI agents. However, the proofs in [13] rely on Laplace domain techniques rather than the combinatorial arguments in the time-domains that helped us prove Theorem 1; indeed, the flexibilities in the latter case facilitate some extensions that are of particular interest to FDI scenarios.

Lemma 1.

Consider the failure of link ϵ¯=(νj,νi)\bar{\epsilon}=(\nu_{j},\nu_{i}) and suppose that k=dist(νj,νp)k=\mbox{\emph{dist}}(\nu_{j},\nu_{p}). If the failure of link ϵ¯\bar{\epsilon} is to induce a jump discontinuity in the kk-th derivative of the output response of node νp\nu_{p}, then it should be true that dist(νi,νp)\mbox{\emph{dist}}(\nu_{i},\nu_{p}) == k1k-1 << dist(νj,νp)\mbox{\emph{dist}}(\nu_{j},\nu_{p}) == kk.

Proof:

See the Appendix. ∎

The following is now immediate upon combining the results of Theorem 1 and Lemma 1.

Corollary 1.

Under the assumptions of Theorem 1,

Δtf(p,k)={ci,j,p,for k=(dist(νi,νp)+1),0,for k<(dist(νi,νp)+1),\displaystyle\Delta_{t_{f}}({p,k})=\left\{\begin{array}[]{ll}{c}_{i,j,p},&\mbox{for }k=(\mbox{\emph{dist}}(\nu_{i},\nu_{p})+1),\\ 0,&\mbox{for }k<(\mbox{\emph{dist}}(\nu_{i},\nu_{p})+1),\end{array}\right. (6)

where ci,j,p=Φ(Ωk1(νi,νp),A)q=1N(a¯iqaiq)xq(tf){c}_{i,j,p}=\Phi(\Omega^{k-1}(\nu_{i},\nu_{p}),A)\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right)x_{q}(t_{f}).

The condition stated in Lemma 1 is intuitive because dist(νi,νp)\mbox{{dist}}(\nu_{i},\nu_{p}) == k1k-1 << dist(νj,νp)\mbox{{dist}}(\nu_{j},\nu_{p}) == kk holds true only if there exist a shortest path of length kk connecting νj\nu_{j} to νp\nu_{p} and with (νj,νi)(\nu_{j},\nu_{i}) as its first edge. In other words, the failed link (νj,νi)(\nu_{j},\nu_{i}) contributes to the flow of information from νj\nu_{j} to νi\nu_{i} as an element of a shortest path from node νj\nu_{j} to node νi\nu_{i}. These observations are in perfect agreement with the sufficient conditions previously studied in [9]. On the other hand, Corollary 1 shows how Theorem 1 may follow as a special case of Theorem 1 in [13] (up to a known constant multiplier), after setting the relative degree r=1r=1 for the involved networked LTI systems. The proofs in the single-integrator case, however, admit additional niceties that we discuss next.

III-A Bidirectional Link Failures

To begin, note that the perturbed matrix A¯\bar{A} is not constrained in the way its entries on the ii-th row are modified, thence Theorem 1 continues to hold in the case where all or several of the edges incoming to node νi\nu_{i} are lost simultaneously. Indeed, it is perceivable for the faults in an agent’s hardware or internal structure to cause the failure of multiple links which are incoming to that agent. In the particular case of a faulty agent νi\nu_{i}, which looses all its incoming links at the instant of failure t=tft=t_{f}, the systems dynamics for t>tft>t_{f} is characterized by a¯iq=0\bar{a}_{iq}=0, qn\fgebackslash{i}\forall q\in\mathbb{N}_{n}\fgebackslash\{i\}. Hence, as a special case, Theorem 1 and the corresponding FDI techniques that are developed in Section IV may also be applied for the detection and isolation of single agent failures by mapping the isolated edges to their head vertices.

On the other hand, for certain applications, where communications are of a bidirectional nature, it is reasonable to consider link failures that simultaneously prevent either agents from communication in the other’s direction. Such a failure corresponds to the simultaneous elimination of both links ϵ¯\bar{\epsilon}, defined earlier, and ϵ^=(νi,νj)\hat{\epsilon}=(\nu_{i},\nu_{j}) leading to 𝒢^=(𝒱,\fgebackslash{ϵ¯,ϵ^})\hat{\mathcal{G}}=(\mathcal{V},\mathcal{E}\fgebackslash\{\bar{\epsilon},\hat{\epsilon}\}) as the information flow structure for t>tft>t_{f}. It is worth highlighting that undirected networks, where {τ,ν}𝒱\forall\{\tau,\nu\}\subset\mathcal{V}, (τ,ν)(ν,τ)(\tau,\nu)\in\mathcal{E}\leftrightarrow(\nu,\tau)\in\mathcal{E}, signify the special case that all, not just some, of the links are bidirectional. The FDI methods in this paper are designed to handle the cases where some of the links in the networks are bidirectional and the rest are unidirectional. It is worth pinpointing that, as an assumption of modeling each link is considered either bidirectional or unidirectional, but not both. In other words, if (τ,ν)(\tau,\nu)\in\mathcal{E} and (ν,τ)(\nu,\tau)\in\mathcal{E} and the link between the nodes τ\tau and ν\nu is specified as bidirectional, then (τ,ν)(\tau,\nu) fails if, and only if, (ν,τ)(\nu,\tau) fails; otherwise, the two links (τ,ν)(\tau,\nu) and (ν,τ)(\nu,\tau) are regarded as separate, and their failures as independent events. Accordingly, it is assumed that the set of all bidirectional links \mathcal{B} in the network, is known to the designer beforehand.

After modeling the failure of a bidirectional link as the simultaneous failures of two directed links, ϵ¯=(νj,νi)\bar{\epsilon}=(\nu_{j},\nu_{i}) and ϵ^=(νi,νj)\hat{\epsilon}=(\nu_{i},\nu_{j}), the proof of Theorem 1 can be adapted to yield:

Proposition 1.

In the case of the simultaneous failure of ϵ¯=(νj,νi)\bar{\epsilon}=(\nu_{j},\nu_{i}) and ϵ^=(νi,νj)\hat{\epsilon}=(\nu_{i},\nu_{j}), (6) still holds true if we substitute dist(νi,νp)+1\mbox{\emph{dist}}(\nu_{i},\nu_{p})+1 by max{dist(νj,νp)+1\max\{\mbox{\emph{dist}}(\nu_{j},\nu_{p})+1, dist(νi,νp)+1}\mbox{\emph{dist}}(\nu_{i},\nu_{p})+1\}.

Proof:

See the Appendix. ∎

We end this section by an intuitive remark that as each agent of the network system in (2) is a single-integrator, a jump discontinuity (because of a sudden network failure) at point νi\nu_{i} will appear to point νp\nu_{p} after several (length of path) steps of “integrations”. Thus, an agent at point νp\nu_{p} needs to make the same number of “differentiations” before observing the jump due to the failure at point νi\nu_{i}. In what follows we shall see how to determine the observation points along with the required number of differentiations at each point so that the occurrence and location of failures are always inferable from the observed jumped discontinuities.

IV Sensor Placement for Unidirectional and Bidirectional Links

It is assumed that at each instant of time, the designer is given access to the response of a subset of agents, as well as the nominal network information flow digraph 𝒢\mathcal{G} (prior to the link failure) and the set of bidirectional \mathcal{B}. Neither the location of the failure (nodes νi\nu_{i} and νj\nu_{j}), nor the time of failure tft_{f} are known to the designer. In the case of detection, the designer is interested in determining the existence of any single link failure in the network at the instant of failure. For the isolation problem, however, the designer would like to determine “instantaneously”, not only the existence of a failure, but also its location. That is to determine which link, if any, has failed and exactly at the same instant as it fails. The significance of “instantaneous” detection and isolation is better understood upon noting that if the time of failure is random and has a continuous sample space, then “simultaneous” failure of more than one link is a measure zero event; hence, justifying the focus of investigation in this paper, which is on the “single” (possibly bidirectional) link failures. Before shifting attention to the sensor placement problem, two assumptions are set forth:

Assumption 1.

For all pairs of nodes νp,νq𝒱\nu_{p},\nu_{q}\in\mathcal{V}, the in-weighting AA on digraph 𝒢\mathcal{G} satisfies Φ(Ωdist(νq,νp)(νq,νp),A)\Phi(\Omega^{\mbox{\emph{dist}}(\nu_{q},\nu_{p})}(\nu_{q},\nu_{p}),A) \neq 0, i.e., the sum of the weights of all shortest paths between them is nonzero.

Assumption 2.

Given the in-weightings AA and A¯\bar{A} of the faultless and the faulty network, 𝒢\mathcal{G} and 𝒢¯\bar{\mathcal{G}}, respectively, we have that q=1N(a¯iqaiq)xq(tf)0\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right)x_{q}(t_{f})\neq 0, where νi\nu_{i} is the head (or tail too, if the link is bidirectional) of the failed link and tft_{f} denotes the instant of failure.

The first assumption above is a provision of consistency that is assumed with regard to the in-weighting matrix AA. This assumptions is satisfied almost surely for any assignment of weights on the graph. In particular, it holds true for the Laplacian consensus networks considered in [10]. The second assumption involves the values of the agents states at the time failure tft_{f}. This condition also holds true, almost surely, for any in-weightings AA, its perturbed version A¯\bar{A}, and a random time of failure tf>t0t_{f}>t_{0}; since q=1N(a¯iqaiq)xq(tf)=0\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right)x_{q}(t_{f})=0 specifies a low-dimensional hyperplane in the agents’ state space that the agents almost surely avoid given a random time of failure.

To enable the designer to handle the desired FDI tasks, she is given access to the output response of a subset of nodes as well as their derivatives upto the zz-th order. In this section, we offer efficient procedures for determining such a subset of nodes, given the network topology and parameter zz; and in such a way that all link failures in the networks can be detected or isolated from the occurrence of jump discontinuities in the observed outputs and their derivatives. Furthermore, we would like to achieve this goal using as few observation points (sensors) as possible. From Corollary 1 it follows that if the existence of a jump discontinuity in the kk-th derivative of the output response of agent pp is to serve as the basis for a method to detect the failure of edge ϵ¯\bar{\epsilon} at time tft_{f}, then it should be true that dist(𝒢;νi,νp)\mbox{dist}({\mathcal{G}};{\nu}_{i},{\nu_{p}}) == k1k-1 << dist(𝒢;νj,νp)\mbox{dist}({\mathcal{G}};{\nu}_{j},{\nu_{p}}) == kk. The latter happens only if there exist a shortest path of length kk connecting νj\nu_{j} to νp\nu_{p} and with (νj,νi)(\nu_{j},\nu_{i}) as its first edge. In [10] we use this observation in the case of Laplacian network dynamics to define binary relations k,kz\mathcal{R}_{k},k\in\mathbb{N}_{z} and 0\mathcal{R}_{0} between the sets 𝒱\mathcal{V} and \mathcal{E} such that for all p𝒱p\in\mathcal{V} and ϵ\epsilon\in\mathcal{E} if (p,ϵ)k(p,\epsilon)\in\mathcal{R}_{k}, then the failure of link ϵ\epsilon produces a jump in the kthk-th derivative of the response of node pp and if (p,ϵ)0(p,\epsilon)\in\mathcal{R}_{0} then the failure of edge ϵ\epsilon does not produce a jump in any of the derivatives of the response of node pp upto the zz-th order. We now go ahead and redefine the binary relations per Proposition 1 to accommodate bidirectional link failures. Indeed, bidirectional links are treated specially as any of the two edges in reverse directions can provide us with the required relation for detection when a bidirectional failure occurs.

Definition 1.

We define the binary relations 0\mathcal{{R}}_{0} and k{\mathcal{R}}_{k} for kzk\in\mathbb{N}_{z}, between 𝒱\mathcal{V} and \mathcal{E}, as follows. For all p𝒱p\in\mathcal{V} and ϵ=(νq,νr)\epsilon=(\nu_{q},\nu_{r})\in\mathcal{E}, we have that:

  • If ϵ\epsilon\not\in\mathcal{B}, then (p,ϵ)k(p,\epsilon)\in\mathcal{R}_{k} if, and only if, dist(νq,νp)=k and dist(νr,νp)=k1\textrm{\emph{dist}}(\nu_{q},\nu_{p})=k\mbox{\emph{ and} }\textrm{\emph{dist}}(\nu_{r},\nu_{p})=k-1.

  • If ϵ\epsilon\in\mathcal{B}, then (p,ϵ)k(p,\epsilon)\in\mathcal{R}_{k} if, and only if, one of the following conditions is satisfied:

    • dist(νq,νp)=k and dist(νr,νp)=k1\textrm{\emph{dist}}(\nu_{q},\nu_{p})=k\mbox{ \emph{and} }\textrm{\emph{dist}}(\nu_{r},\nu_{p})=k-1, or

    • dist(νr,νp)=k and dist(νq,νp)=k1\textrm{\emph{dist}}(\nu_{r},\nu_{p})=k\mbox{ \emph{and} }\textrm{\emph{dist}}(\nu_{q},\nu_{p})=k-1.

The FDI problems can now be posed as follows.

Problem 1 (Detection).

Given a digraph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}), find a subset of nodes D𝒱\mathcal{M}_{D}\subseteq\mathcal{V} of minimum cardinality |D|\left|\mathcal{M}_{D}\right|, such that for all ϵ\epsilon\in\mathcal{E}, there exists a node pD{p}\in\mathcal{M}_{D} such that (p,ϵ)0({p},\epsilon)\not\in\mathcal{R}_{0}.

Problem 2 (Isolation).

Given a digraph 𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E}), find a subset of vertices I𝒱\mathcal{M}_{I}\subseteq\mathcal{V} with the smallest cardinality |I|\left|\mathcal{M}_{I}\right|, such that fI(I)=0f_{I}\left(\mathcal{M}_{I}\right)=0.

The idea for proposing efficient sensor placement algorithms that approximate the solutions of the above problems is by counting the number of edges that are not yet detectable or isolatable from the currently chosen nodes and add new nodes to the existing sets in a greedy manner: in each addition of a new node to the existing sensor set, we aim to decrease the number of edges that are not yet detectable or isolatable as much as possible. To this end, we define a correspondence :\mathcal{I}: 𝒫(𝒱)×\mathcal{P}(\mathcal{V})\times\mathcal{E} \to 𝒫((z{0})×𝒱)\mathcal{P}({(\mathbb{N}_{z}\cup\{0\})\times\mathcal{V}}) which maps an order pair (,ϵ)(\mathcal{M},\epsilon), comprised of a sensor set \mathcal{M} and an edge ϵ\epsilon, to the set of ordered pairs that specify the relations between edge ϵ\epsilon and nodes in \mathcal{M}. Accordingly, those edges ϵ1\epsilon_{1} and ϵ2\epsilon_{2} which produce the exact same pattern of jumps and at the exact same order of derivatives in the output responses of the nodes in \mathcal{M} would satisfy \mathcal{I} (,ϵ1)(\mathcal{M},\epsilon_{1}) == \mathcal{I} (,ϵ2)(\mathcal{M},\epsilon_{2}); and none of them can be identified using just the nodes in \mathcal{M}. We further define two set functions fDf_{D} and fIf_{I} which take a subset of nodes \mathcal{M} and map it to the number of edges that are, respectively, not detectable or not isolatable using the sensor set \mathcal{M}. In [13] these functions are shown to be supermodular; wherefore per the theory of submodular set coverings [14], adding nodes greedily with respect to these functions would guarantee that the chosen sensor set is within a factor log(||)\log(|\mathcal{E}|) of the minimal sensor sets that achieve detection or isolation goals (solutions of Problems 1 and 2). The following algorithms are proposed in [10], and included below for completeness, to implement this idea of supermodular greedy minimization.

Routine 1 Determine a Solution D\mathcal{M}_{D} to Problem 1
1:𝒢=(𝒱,)\mathcal{G}=(\mathcal{V},\mathcal{E})
2:D\mathcal{M}_{D}\Leftarrow\varnothing
3:while fD(D)0f_{D}(\mathcal{M}_{D})\neq 0 do
4:νqargmin{fD(D{νq})fD(D);νq𝒱\fgebackslashD}\nu_{q}\Leftarrow\arg\min\{f_{D}({\mathcal{M}}_{D}\cup\{\nu_{q}\})-f_{D}({\mathcal{M}}_{D});\nu_{q}\in\mathcal{V}\fgebackslash{\mathcal{M}}_{D}\}
5:DD{νq}{\mathcal{M}}_{D}\Leftarrow{\mathcal{M}}_{D}\cup\{\nu_{q}\}
6:end while
7:D{\mathcal{M}}_{D}
Routine 2 Determine a Solution I\mathcal{M}_{I} to Problem 2
1:𝒢=(𝒱,)&D\mathcal{G}=(\mathcal{V},\mathcal{E})\And\mathcal{M}_{D}
2:ID\mathcal{M}_{I}\Leftarrow\mathcal{M}_{D}
3:while fI(I)0&I𝒱f_{I}(\mathcal{M}_{I})\neq 0\And\mathcal{M}_{I}\neq\mathcal{V} do
4:νqargmin{fI(I{νq})fI(I);νq𝒱\fgebackslashI}\nu_{q}\Leftarrow\arg\min\{f_{I}({\mathcal{M}}_{I}\cup\{\nu_{q}\})-f_{I}({\mathcal{M}}_{I});\nu_{q}\in\mathcal{V}\fgebackslash{\mathcal{M}}_{I}\}
5:II{νq}{\mathcal{M}}_{I}\Leftarrow{\mathcal{M}}_{I}\cup\{\nu_{q}\}
6:end while
7:if fI(I)0f_{I}(\mathcal{M}_{I})\neq 0 then
8:I\mathcal{M}_{I}\Leftarrow\varnothing
9:end if
10:I{\mathcal{M}}_{I}

It was noted in Subsection III-A that the set of bidirectional links \mathcal{B}\subset\mathcal{E} should be made known to the designer. To facilitate the application of Algorithms 1 and 2 to the case of bidirectional link failures in networked single-integrator agents, we define an equivalence relation \sim on the set \mathcal{E} that identifies two parallel edges in reverse directions only if they are bidirectional. Specifically, for any {τ,ν}𝒱\{\tau,\nu\}\subset\mathcal{V} such that (τ,ν)(\tau,\nu)\in\mathcal{B} and (ν,τ)(\nu,\tau)\in\mathcal{B}, set (τ,ν)(ν,τ)(\tau,\nu)\sim(\nu,\tau), while for any two edges {α,β}\{\alpha,\beta\}\subset\mathcal{E} that {α,β}\fgebackslash\{\alpha,\beta\}\cap\mathcal{E}\fgebackslash\mathcal{B}\neq\varnothing, αβ\alpha\sim\beta iff α=β\alpha=\beta. The task of the equivalence relation \sim is to identify those edges who share the same head and tail but at opposite directions, only if they are bidirectional. Every other edge in the network is distinguished and therefore identified only with itself. With the afore-defined equivalence relation \sim, for any edge ϵ\epsilon\in\mathcal{E}, ϵ={ϵ^;ϵ^ϵ}\llbracket\epsilon\rrbracket=\{\hat{\epsilon}\in\mathcal{E};\hat{\epsilon}\sim\epsilon\} denotes the equivalence class of ϵ\epsilon, and for any subset of edges 𝒳\mathcal{X}\subset\mathcal{E}, (𝒳/)\left({\raisebox{1.99997pt}{$\mathcal{X}$}\left/\raisebox{-1.99997pt}{$\sim$}\right.}\right) is the quotient of 𝒳\mathcal{X} by \sim, which is the set of all equivalence classes of the elements of 𝒳\mathcal{X}. Last but not least, is the issue of self-loops which are specific to the case of single-integrator agents. In particular, every self-loop would always satisfy an 0\mathcal{R}_{0} relation with all nodes in the network and the proposed algorithms cannot be applied for the detection and isolation of a self-loop (νi,νi)(\nu_{i},\nu_{i}), although its value (weight) is allowed to change with the failure of a link incoming to node νi\nu_{i}. In the sequel, the set of all self-loops in 𝒢\mathcal{G} is denoted by \mathcal{H}. Next, changing the definitions of the correspondence ()\mathcal{I}(\cdot), and the supermodular functions fD()f_{D}(\cdot) and fI()f_{I}(\cdot) as follows, allows us to apply Algorithms 1 and 2 to single-integrator networks, while properly identifying bidirectional links and accommodating self-loops. Define for all 𝒱\mathcal{M}\subset\mathcal{V} and any of the equivalence classes in \fgebackslash/{\raisebox{1.99997pt}{$\mathcal{E}\fgebackslash\mathcal{H}$}\left/\raisebox{-1.99997pt}{$\sim$}\right.}:

fD:𝒫(𝒱)|\fgebackslash|{0},\displaystyle f_{D}:\mathcal{P}(\mathcal{V})\to\mathbb{N}_{|\mathcal{E}\fgebackslash\mathcal{H}|}\cup\{0\}, (7)
fD()=|{ι(\fgebackslash/):p,ϵι,(p,ϵ)0}|,\displaystyle f_{D}(\mathcal{M})=|\{\iota\in\left({\raisebox{1.99997pt}{$\mathcal{E}\fgebackslash\mathcal{H}$}\left/\raisebox{-1.99997pt}{$\sim$}\right.}\right):\forall p\in{\mathcal{M}},\forall\epsilon\in\iota,(p,\epsilon)\in\mathcal{R}_{0}\}|,
:𝒫(𝒱)×(\fgebackslash/)𝒫((z{0})×𝒱),\displaystyle\mathcal{I}:\mathcal{P}(\mathcal{V})\times\left({\raisebox{1.99997pt}{$\mathcal{E}\fgebackslash\mathcal{H}$}\left/\raisebox{-1.99997pt}{$\sim$}\right.}\right)\to\mathcal{P}({(\mathbb{N}_{z}\cup\{0\})\times\mathcal{V}}), (8)
(,ϵ)={(k,p)(z{0})×:(p,ϵ)k},\displaystyle\mathcal{I}(\mathcal{M},\llbracket{\epsilon}\rrbracket)=\{(k,p)\in(\mathbb{N}_{z}\cup\{0\})\times\mathcal{M}:(p,\epsilon)\in\mathcal{R}_{k}\},
fI:𝒫(𝒱)|\fgebackslash|{0},fI()=\displaystyle f_{I}:\mathcal{P}(\mathcal{V})\to\mathbb{N}_{|\mathcal{E}\fgebackslash\mathcal{H}|}\cup\{0\},\;f_{I}(\mathcal{M})= (9)
|{ι(\fgebackslash/):ϵ^\fgebackslash(),ϵ^ι,(,ι)=(,ϵ^)}|.\displaystyle|\{\iota\in\left({\raisebox{1.99997pt}{$\mathcal{E}\fgebackslash\mathcal{H}$}\left/\raisebox{-1.99997pt}{$\sim$}\right.}\right):\exists\hat{\epsilon}\in\mathcal{E}\fgebackslash(\mathcal{H}),\hat{\epsilon}\not\in\iota,\mathcal{I}(\mathcal{M},\iota)=\mathcal{I}(\mathcal{M},\llbracket{\hat{\epsilon}}\rrbracket)\}|.

V Computer Experiments with Large Networks

In the following subsections, the performance of the developed routines is tested for different random graph models and with varying model parameters.

V-A A Random Geometric Graph

In a random geometric graph model the nodes of the network are randomly and uniformly spread across a bounded region, and there is an undirected edge between a pair of nodes, wherever a certain distance threshold is met. The graph of Fig. 1(a) depicts one such graph instance with 5050 nodes and 200200 undirected edges, which are interpreted as pairs of bidirectional links. For this graph a total of nine nodes is sufficient for complete detection, whereas even with all of the nodes observed none of the bidirectional links can be isolated. In other words, for any bidirectional link in the network, there exists at least one other link whose removal will induce the same set of jumps in the entire node-set of the network.

The situation is rather different if the 200200 undirected edges of the network in Fig. 1(a) are regarded as 400400 unidirectional links. Then the output of Routine 1 has 2222 nodes that are indicated in Fig. 1(b), and by observing them the designer can isolate 280280 edges out of the total 400400. Observing all of the nodes in the network decreases the cardinality of the set of unresolved edges from 120120 to just 9393, out of the total 400400. It is worth highlighting that with the change in the interpretation of the links from bidirectional to unidirectional, matrix RR of the network remains the same, and so does the required highest order of derivatives z=7z=7.

Refer to caption
(a) Bidirectional Links
Refer to caption
(b) Pairs of Unidirectional Links in Opposite Directions
Figure 1: 1(a) With nine observation points and by observing order of derivatives upto z=7z=7, every link in this network is detectable, but none of them can be isolated. 1(b) When the undirected links are regarded as pairs of unidirectional links, the required number of observation points increases to 2222 nodes.

Next, each of the undirected edges in Fig. 1(a) is oriented randomly leading to a total of 200200 unidirectional edges in Fig. 2. In the latter, a total of 1717 nodes is sufficient for detection, and these 1717 nodes enable the isolation of all but 7575 edges of the digraph, which are highlighted in Fig. 3. For this directed network, by observing all of the nodes in the network, the cardinality of the set of unresolved links reduces to 3434.

Refer to caption
Figure 2: If the edges of the undirected random geometric graph are randomly oriented, then 1717 nodes would be enough to achieve the detection task. This also increases the required highest order of derivatives from z=7z=7 to z=9z=9.

The preceding results suggest that while detection is achievable more easily in undirected networks, the increased diversity brought about by the directionality of the links improves the isolation task for the case of directed networks.

Refer to caption
Figure 3: The 7575 edges that are highlighted cannot be isolated using the indicated observation points. However, even with all of the nodes observed, there still remain 3434 edges that cannot be isolated.

The focus of investigation in the following subsections is shifted to the Erdős-Rényi random graph model, for which the role of edge probability and graph size on the cardinality of the detection set and the highest order of derivatives required is explored.

V-B Erdős-Rényi Random Graphs: Directed versus Undirected

In a Erdős-Rényi random graph model every potential edge is either existent or not with a fixed probability pp, and independently of all the rest. This model is implemented for varying network sizes nn, and different edge probabilities pp. In Figs.4 and 5, the cardinality of the detection sets |D||\mathcal{M}_{D}| in several randomly generated instances are recorded, averaged, and plotted. The sample means in each case are computed over 5050 random instances and the error bars indicate the sample standard deviations for those instances. The plots in all cases confirm the increased difficulty of the detection process for the case of directed networks. Moreover, the cardinality of the detection sets does not scale fast with the network size; an observation which is of practical significance for large networks and complements the theoretical guarantees that are available from the submodular set covering literature. In the case of edge probabilities, however, it is observed that as the edge probabilities approach 11 leading to a complete graph, the number of nodes required for detection becomes increasingly large. It is worth highlighting that although for small pp the networks are sparse and can have large diameters, as the edge probability is increased beyond 0.30.3 the network diameter remains constant at 22 so that only the first three derivatives of any chosen sensor set need to be observed. Similarly for nn, as the network size is increased beyond 6060, the network diameters remain fixed at 33 and only the first four derivatives of the outputs in any chosen sensor set are observed.

Refer to caption
Figure 4: |D||\mathcal{M}_{D}| versus nn for Erdős-Rényi random graphs with p=0.1p=0.1
Refer to caption
Figure 5: |D||\mathcal{M}_{D}| versus pp for Erdős-Rényi random graphs with n=75n=75

VI Conclusions

In this paper, we developed FDI techniques for single-integrator networks that enable the designer to detect and isolate link failures based on the observed jumps in the derivatives of the output responses of a subset of nodes by relating the jumps in the derivatives at the time of failure to the distance of the failed link from the observation point. Our results covered both cases of unidirectional and bidirectional link failures. We also extended our previously developed sensor placement algorithms to accommodate both types of link failures (unidirectional and bidirectional). These algorithms were tested in large random networks, and the results suggest that link failures in directed networks are harder to detect but easier to isolate, as compared to undirected networks. The latter effect can be attributed to the increased diversity that is brought about by the directionality of the links. Moreover, both the cardinality of the detection sets and the required order of derivatives are shown to scale up reasonably well with the network size, and this agrees with the performance guarantees that are available from the theory of submodular set coverings and bound the size of the chosen sets to within a multiplicative log(||)\log(|\mathcal{E}|) factor of the minimal sensor set, where |||\mathcal{E}| is the size of the edge set.

[Proofs of The Main Results]

-A Theorem 1

Given an initial condition 𝐱0:=𝐱(t0)N\mathbf{x}_{0}:=\mathbf{x}(t_{0})\in\mathbb{R}^{N}, the solution to (2) for t0ttft_{0}\leq t\leq t_{f} is trivially given by:

𝐱(t)=eA(tt0)𝐱0+t0teA(tτ)B𝐰(τ)dτ, for tftt0.\mathbf{x}(t)=e^{A\left(t-t_{0}\right)}\mathbf{x}_{0}+\int_{t_{0}}^{t}\mathrm{e}^{A(t-\tau)}B\mathbf{w}(\tau)\,\mathrm{d}\tau,\mbox{ for }t_{f}\geqslant t\geqslant t_{0}. (10)

The evolution of states after failure is therefore governed by the state matrix A¯\bar{A}, instead of AA, as follows

𝐱(t)=(eA¯(ttf)𝐱f+tfteA¯(tτ)B𝐰(τ)dτ), for ttf,\mathbf{x}\left(t\right)=\left(e^{\bar{A}(t-t_{f})}\mathbf{x}_{f}+\int_{t_{f}}^{t}\mathrm{e}^{\bar{A}(t-\tau)}B\mathbf{w}(\tau)\,\mathrm{d}\tau\right),\mbox{ for }t\geqslant t_{f}, (11)

where 𝐱f:=𝐱(tf)\mathbf{x}_{f}:=\mathbf{x}(t_{f}^{-}), i.e., the state of the faultless evolution at the instant right before failure.

For any pNp\in\mathbb{N}_{N} fixed, differentiating (10) and (11) kk times and using the Leibniz integral rule yields for tf>t>t0t_{f}>t>t_{0} that:

dkdtkxp(t)=\displaystyle\frac{{d}^{k}}{{d}t^{k}}x_{p}(t)= (12)
𝐞pT(Ak𝐱(t)+m=0k2AmBdkm1dtkm1𝐰(t)+Ak1B𝐰(t)),\displaystyle\mathbf{e}_{p}^{T}\left(A^{k}\mathbf{x}(t)+\sum_{m=0}^{k-2}A^{m}B\frac{{d}^{k-m-1}}{{d}t^{k-m-1}}\mathbf{w}(t)+A^{k-1}B\mathbf{w}(t)\right),

and for t>tft>t_{f} that,

dkdtkxp(t)=\displaystyle\frac{{d}^{k}}{{d}t^{k}}x_{p}(t)= (13)
𝐞pT(A¯k𝐱(t)+m=0k2A¯mBdkm1dtkm1𝐰(t)+A¯k1B𝐰(t)).\displaystyle\mathbf{e}_{p}^{T}\left(\bar{A}^{k}\mathbf{x}(t)+\sum_{m=0}^{k-2}\bar{A}^{m}B\frac{{d}^{k-m-1}}{{d}t^{k-m-1}}\mathbf{w}(t)+\bar{A}^{k-1}B\mathbf{w}(t)\right).

Next, note that by differentiability of 𝐰(t)\mathbf{w}(t) and continuity of the states, dkdtk𝐰(t)|t=tf+\frac{{d}^{k}}{{d}t^{k}}\mathbf{w}(t)\big{|}_{t=t_{f}^{+}} == dkdtk𝐰(t)t=tf\frac{{d}^{k}}{{d}t^{k}}\mathbf{w}(t)_{t=t_{f}^{-}} == dkdtk𝐰(t)|t=tf,k\frac{{d}^{k}}{{d}t^{k}}\mathbf{w}(t)\big{|}_{t=t_{f}},\forall k\in\mathbb{N} and 𝐱(tf+)=𝐱(tf)\mathbf{x}(t_{f}^{+})=\mathbf{x}(t_{f}^{-}). Hence, subtracting the two equations in (12) and (13) for tf+t_{f}^{+} and tft_{f}^{-} yields:

Δtf(p,k)=𝐞pT(A¯kAk)𝐱(tf)+\displaystyle\Delta_{t_{f}}({p,k})=\mathbf{e}_{p}^{T}(\bar{A}^{k}-A^{k})\mathbf{x}(t_{f})+ (14)
𝐞pT(A¯k1Ak1)B𝐰(tf)+\displaystyle\mathbf{e}_{p}^{T}(\bar{A}^{k-1}-A^{k-1})B\mathbf{w}(t_{f})+ (15)
𝐞pTm=0k2(A¯mAm)B(dkm1dtkm1𝐰(t)|t=tf),\displaystyle\mathbf{e}_{p}^{T}\sum_{m=0}^{k-2}(\bar{A}^{m}-A^{m})B\left(\frac{{d}^{k-m-1}}{{d}t^{k-m-1}}\mathbf{w}(t)\bigg{|}_{t=t_{f}}\right), (16)

With pp, A¯\bar{A} and AA fixed in the preceding and kdist(νj,νp)k\in\mathbb{N}_{\textrm{dist}(\nu_{j},\nu_{p})}, for all mdist(νj,νp)m\in\mathbb{N}_{\textrm{dist}(\nu_{j},\nu_{p})}, define (q,m)=[A¯m]pq[Am]pq\nabla(q,m)=\left[\bar{A}^{m}\right]_{pq}-\left[A^{m}\right]_{pq}, so that (16) can be rewritten as:

Δtf(p,k)=q=1N(q,k)xq(tf)+q=1N(q,k1)[B𝐰(tf)]q\displaystyle\Delta_{t_{f}}({p,k})=\sum_{q=1}^{N}\nabla(q,k){x}_{q}(t_{f})+\sum_{q=1}^{N}\nabla(q,k-1)\left[B\mathbf{w}(t_{f})\right]_{q}
+m=0k2q=1N(q,m)[Bdkm1dtkm1𝐰(tf)]q\displaystyle+\sum_{m=0}^{k-2}\sum_{q=1}^{N}\nabla(q,m)\left[B\frac{{d}^{k-m-1}}{{d}t^{k-m-1}}\mathbf{w}(t_{f})\right]_{q} (17)

Next to compute (q,m)\nabla(q,m), substitute for [Am]pq\left[A^{m}\right]_{pq} and [A¯m]pq\left[\bar{A}^{m}\right]_{pq} from (1) to get:

(q,m)=Φ(Ωm(𝒢¯;νq,νp),A¯)Φ(Ωm(𝒢;νq,νp),A).\nabla(q,m)=\\ \Phi(\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{p}}),\bar{A})-\Phi(\Omega^{m}({\mathcal{G}};{\nu_{q},\nu_{p}}),{A}).

By partitioning the sets Ωm(𝒢¯;νq,νp)\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{p}}) and Ωm(𝒢;νq,νp)\Omega^{m}({\mathcal{G}};{\nu_{q},\nu_{p}}), (-A) can be rewritten as:

(q,m)=\displaystyle\nabla(q,m)= [Φ(Ωm(𝒢¯;νq,νp)\fgebackslashΩm(𝒢¯;νq,νi,νp),A¯)\displaystyle[\Phi(\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{p}})\fgebackslash\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{i},\nu_{p}}),\bar{A})
+Φ(Ωm(𝒢¯;νq,νi,νp),A¯)]\displaystyle+\Phi(\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{i},\nu_{p}}),\bar{A})]-
[Φ(Ωm(𝒢;νq,νp)\fgebackslashΩm(𝒢;νq,νi,νp),A)\displaystyle[\Phi(\Omega^{m}(\mathcal{G};\nu_{q},\nu_{p})\fgebackslash\Omega^{m}(\mathcal{G};{\nu_{q},\nu_{i},\nu_{p}}),A)
+Φ(Ωm(𝒢;νq,νi,νp),A)].\displaystyle+\Phi(\Omega^{m}(\mathcal{G};{\nu_{q},\nu_{i},\nu_{p}}),A)]. (18)

Next note that none of the walks in Ωm(𝒢;νq,νp)\Omega^{m}(\mathcal{G};\nu_{q},\nu_{p}) \fgebackslash\fgebackslash Ωm(𝒢;νq,νi,νp)\Omega^{m}(\mathcal{G};{\nu_{q},\nu_{i},\nu_{p}}) or Ωm(𝒢¯;νq,νp)\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{p}}) \fgebackslash\fgebackslash Ωm(𝒢¯;νq,νi,νp)\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{i},\nu_{p}}) can include (νγ,νi)(\nu_{\gamma},\nu_{i}) as an edge for any γN\gamma\in\mathbb{N}_{N}. This is true, since otherwise if there exists a walk 𝒲1\mathcal{W}_{1} that violates the above, then removing the segment of 𝒲1\mathcal{W}_{1} from νq\nu_{q} to νi\nu_{i}, which consists of at least two edges, one to reach νγ\nu_{\gamma} from νq\nu_{q} followed by the edge (νγ,νi)(\nu_{\gamma},\nu_{i}), yields a new νiνp\nu_{i}\nu_{p} walk 𝒲2\mathcal{W}_{2} with length at most m2m-2. Now (νj,νi)𝒲2(\nu_{j},\nu_{i})\mathcal{W}_{2} is a νjνp\nu_{j}\nu_{p} walk of length at most m1m-1 in 𝒢\mathcal{G}, which is a contradiction, since mdist(νj,νp)m\leqslant\textrm{dist}(\nu_{j},\nu_{p}). It next follows that Φ(Ωm(𝒢;νq,νp)\Phi(\Omega^{m}(\mathcal{G};\nu_{q},\nu_{p}) \fgebackslash\fgebackslash Ωm(𝒢;νq,νi,νp),\Omega^{m}(\mathcal{G};{\nu_{q},\nu_{i},\nu_{p}}), A)A) == Φ(Ωm(𝒢¯;νq,νp)\Phi(\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{p}}) \fgebackslash\fgebackslash Ωm(𝒢¯;νq,νi,νp),\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{i},\nu_{p}}), A¯)\bar{A}), as none of the walks involved include any of the edges (νq,νi)(\nu_{q},\nu_{i}) for qNq\in\mathbb{N}_{N}, and these are the only edges at which the digraphs 𝒢¯\bar{\mathcal{G}} and 𝒢\mathcal{G} or the in-weightings A¯\bar{A} and AA differ. Hence, (-A) simplifies into:

(q,m)=\displaystyle\nabla(q,m)= (19)
Φ(Ωm(𝒢¯;νq,νi,νp),A¯)Φ(Ωm(𝒢;νq,νi,νp),A)\displaystyle\Phi(\Omega^{m}(\bar{\mathcal{G}};{\nu_{q},\nu_{i},\nu_{p}}),\bar{A})-\Phi(\Omega^{m}(\mathcal{G};{\nu_{q},\nu_{i},\nu_{p}}),A)
=a¯iqΦ(Ωm1(𝒢¯;νi,νp),A¯)aiqΦ(Ωm1(𝒢;νi,νp),A).\displaystyle=\bar{a}_{iq}\Phi(\Omega^{m-1}(\bar{\mathcal{G}};\nu_{i},\nu_{p}),\bar{A})-a_{iq}\Phi(\Omega^{m-1}(\mathcal{G};\nu_{i},\nu_{p}),A). (20)

The last step in deriving a simplified expression for (q,m)\nabla(q,m) is to argue that Φ(Ωm1(𝒢;νi,νp),\Phi(\Omega^{m-1}(\mathcal{G};{\nu_{i},\nu_{p}}), A)=Φ(Ωm1(𝒢¯;νi,νp),A)=\Phi(\Omega^{m-1}(\bar{\mathcal{G}};{\nu_{i},\nu_{p}}), A¯)\bar{A}). To see why, note that since 𝒢¯\bar{\mathcal{G}} is derived upon removal of the edge (νj,νi)(\nu_{j},\nu_{i}) from 𝒢\mathcal{G}, it follows that

dist(νi,νp)=dist(𝒢¯;νi,νp)dist(νj,νp)1,\displaystyle\mbox{{dist}}({\nu}_{i},{\nu_{p}})=\mbox{{dist}}(\bar{\mathcal{G}};{\nu}_{i},{\nu_{p}})\geqslant\textrm{dist}(\nu_{j},\nu_{p})-1, (21)

where the digraph argument for the distance function indicate that the distances are calculated with respect to the edge-removed digraph 𝒢¯\bar{\mathcal{G}} as opposed to usual case where the distances are calculated with respect to the original digraph 𝒢\mathcal{G}. The inequalities in (21) together with dist(νj,νp)m\textrm{dist}(\nu_{j},\nu_{p})\geqslant m, implies that dist(νi,νp)\mbox{{dist}}({\nu}_{i},{\nu_{p}}) == dist(𝒢¯;νi,νp)\mbox{{dist}}(\bar{\mathcal{G}};{\nu}_{i},{\nu_{p}}) \geqslant m1m-1, so that none of the walks in Ωm1(𝒢;νi,νp)\Omega^{m-1}(\mathcal{G};{\nu_{i},\nu_{p}}) or Ωm1(𝒢¯;νi,νp)\Omega^{m-1}(\bar{\mathcal{G}};{\nu_{i},\nu_{p}}) can include any (νq,νi)(\nu_{q},\nu_{i}) edges, qN\forall q\in\mathbb{N}_{N}, and Φ(Ωm1(𝒢;νi,νp),\Phi(\Omega^{m-1}(\mathcal{G};{\nu_{i},\nu_{p}}), A)=Φ(Ωm1(𝒢¯;νi,νp),A)=\Phi(\Omega^{m-1}(\bar{\mathcal{G}};{\nu_{i},\nu_{p}}), A¯)\bar{A}); hence,

(q,m)\displaystyle\nabla(q,m) =(a¯iqaiq)Φ(Ωm1(𝒢;νi,νp),A),\displaystyle=\left(\bar{a}_{iq}-a_{iq}\right)\Phi(\Omega^{m-1}(\mathcal{G};\nu_{i},\nu_{p}),A), (22)

which upon replacement in (17) yields:

Δtf(p,k)=Φ(Ωk1(𝒢;νi,νp),A)q=1N(a¯iqaiq)xq(tf)+\displaystyle{\Delta}_{t_{f}}(p,k)=\Phi(\Omega^{k-1}(\mathcal{G};\nu_{i},\nu_{p}),A)\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right){x}_{q}(t_{f})+
Φ(Ωk2(𝒢;νi,νp),A)q=1N(a¯iqaiq)[B𝐰(tf)]q\displaystyle\Phi(\Omega^{k-2}(\mathcal{G};\nu_{i},\nu_{p}),A)\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right)\left[B\mathbf{w}(t_{f})\right]_{q}
+m=1k2Φ(Ωm1(𝒢;νi,νp),A)q=1N(a¯iqaiq)\displaystyle+\sum_{m=1}^{k-2}\Phi(\Omega^{m-1}(\mathcal{G};\nu_{i},\nu_{p}),A)\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right)
[Bdkm1dtkm1𝐰(tf)]q.\displaystyle\left[B\frac{{d}^{k-m-1}}{{d}t^{k-m-1}}\mathbf{w}(t_{f})\right]_{q}. (23)

To complete the proof, note that for mdist(νj,νp)1m\leqslant\textrm{dist}(\nu_{j},\nu_{p})-1, Ωm1(𝒢;νi,νp)=\Omega^{m-1}(\mathcal{G};\nu_{i},\nu_{p})=\varnothing, since for any 𝒲3Ωm1(𝒢;νi,νp)\mathcal{W}_{3}\in\Omega^{m-1}(\mathcal{G};\nu_{i},\nu_{p}), (νj,νi)𝒲3(\nu_{j},\nu_{i})\mathcal{W}_{3} is a νjνp\nu_{j}\nu_{p} walk of length mm which contradicts with mdist(νj,νi)1m\leqslant\textrm{dist}(\nu_{j},\nu_{i})-1. Thence, for kdist(νj,νp)k\leqslant\textrm{dist}(\nu_{j},\nu_{p}), (23) simplifies into Δtf(p,k)=Φ(Ωk1(𝒢;νi,νp),A)q=1N(a¯iqaiq)xq(tf){\Delta}_{t_{f}}(p,k)=\Phi(\Omega^{k-1}(\mathcal{G};\nu_{i},\nu_{p}),A)\sum_{q=1}^{N}\left(\bar{a}_{iq}-a_{iq}\right){x}_{q}(t_{f}), thus completing the proof for the case of the failure of the single link ϵ¯\bar{\epsilon}. That for k<dist(νj,νp)k<\textrm{dist}(\nu_{j},\nu_{p}), Δtf(p,k)=0{\Delta}_{t_{f}}(p,k)=0 also follows as Ωk1(𝒢;νi,νp)=\Omega^{k-1}(\mathcal{G};\nu_{i},\nu_{p})=\varnothing for any such kk. \blacksquare

-B Lemma 1

Notice that any shortest path from νi\nu_{i} to νp\nu_{p} of length k1k-1 gives a path of length kk from νj\nu_{j} to νp\nu_{p}, whence given k=dist(νj,νp)k=\mbox{{dist}}(\nu_{j},\nu_{p}), it follows that:

dist(νi,νp)k1.\displaystyle\mbox{{dist}}(\nu_{i},\nu_{p})\geqslant k-1. (24)

Also notice that if dist(νi,νp)\mbox{{dist}}(\nu_{i},\nu_{p})\leqslant k1k-1 there is no path of length k1{k-1} from νi\nu_{i} to νp\nu_{p}, i.e.

Φ(Ωk1(𝒢;νi,νp),A) is nonzero,\displaystyle\Phi(\Omega^{k-1}(\mathcal{G};\nu_{i},\nu_{p}),A)\mbox{ is nonzero,} (25)
only if dist(νi,νp)k1.\displaystyle\mbox{only if }\mbox{{dist}}(\nu_{i},\nu_{p})\leqslant k-1. (26)

Now (24) and (26) together imply that for the right-hand side of (3) in Theorem 1 to be non-zero when k=dist(νj,νp)k=\mbox{{dist}}(\nu_{j},\nu_{p}), it should be true that dist(νi,νp)+1\mbox{{dist}}(\nu_{i},\nu_{p})+1 == kk, which is the same as the claimed condition. \blacksquare

-C Proposition 1

To see how Theorem 1 applies to the case of bidirectional link failures, in parallelism with A¯\bar{A} and 𝒢¯\bar{\mathcal{G}} in the preceding, let A^A\hat{A}\neq A be an in-weighting on 𝒢^\hat{\mathcal{G}} that denotes the perturbed version of AA following the simultaneous failure of links ϵ¯\bar{\epsilon} and ϵ^\hat{\epsilon}. The perturbations only affect the entries of AA on its ii-th and jj-th rows, such that a^ij=a^ji=0\hat{a}_{ij}=\hat{a}_{ji}=0, while a^qr=aqr\hat{a}_{qr}={a}_{qr}, rN\forall r\in\mathbb{N}_{N} and qN\fgebackslash{i,j}\forall q\in\mathbb{N}_{N}\fgebackslash\{i,j\}. For any agent pNp\in\mathbb{N}_{N} and ttft\geqslant t_{f} the evolution of the state of agent pp following the simultaneous failure of links ϵ¯\bar{\epsilon} and ϵ^\hat{\epsilon} is given by (11) with A^\hat{A} substituted for A¯\bar{A}. Repeating the same procedure as in the proof of Theorem 1 leads to the proof of the proposition as follows.

For the case of simultaneous failure of ϵ¯\bar{\epsilon} and ϵ^\hat{\epsilon}, note that (12) to (18) continue to hold after substituting A^\hat{A} and 𝒢^\hat{\mathcal{G}} for A¯\bar{A} and 𝒢¯\bar{\mathcal{G}}, respectively. The transitions from (18) to (19) and (22) also carry through with the same replacements and upon the additional observation that the walks in Ωm(𝒢;νq,νp)\fgebackslashΩm(𝒢;νq,νi,νp)\Omega^{m}(\mathcal{G};\nu_{q},\nu_{p})\fgebackslash\Omega^{m}(\mathcal{G};{\nu_{q},\nu_{i},\nu_{p}}), Ωm(𝒢^;νq,νp)\fgebackslashΩm(𝒢^;νq,νi,νp)\Omega^{m}(\hat{\mathcal{G}};{\nu_{q},\nu_{p}})\fgebackslash\Omega^{m}(\hat{\mathcal{G}};{\nu_{q},\nu_{i},\nu_{p}}), Ωm1(𝒢;νi,νp)\Omega^{m-1}(\mathcal{G};{\nu_{i},\nu_{p}}) and Ωm1(𝒢^;νi,νp)\Omega^{m-1}(\hat{\mathcal{G}};{\nu_{i},\nu_{p}}) include neither any (νq,νi)(\nu_{q},\nu_{i}) edges, as stated in the previous case, nor any (νq,νj)(\nu_{q},\nu_{j}) edges, qN\forall q\in\mathbb{N}_{N}. The rest of the proof is identical to the previous case, except for A¯\bar{A} which should be replaced with A^\hat{A}. \blacksquare

References

  • [1] M. Mesbahi and M. Egerstedt, Graph Theoretic Methods in Multiagent Networks. Princeton University Press, 2010.
  • [2] M. A. Rahimian and A. G. Aghdam, “Structural controllability of multi-agent networks: Robustness against simultaneous failures,” Automatica, vol. 49, no. 11, pp. 3149 – 3157, 2013.
  • [3] J. Kleinberg, M. Sandler, and A. Slivkins, “Network failure detection and graph connectivity,” SIAM Journal on Computing, vol. 38, no. 4, pp. 1330–1346, 2008.
  • [4] W. Pan, Y. Yuan, H. Sandberg, J. Gonçalves, and G.-B. Stan, “Real-time fault diagnosis for large-scale nonlinear power networks,” in Proceedings of the 52nd IEEE Conference on Decision and Control, 2013, pp. 2340–2345.
  • [5] F. Pasqualetti, F. Dorfler, and F. Bullo, “Attack detection and identification in cyber-physical systems,” Automatic Control, IEEE Transactions on, vol. 58, no. 11, pp. 2715–2729, 2013.
  • [6] E. E. Tiniou, P. M. Esfahani, and J. Lygeros, “Fault detection with discrete-time measurements: An application for the cyber security of power networks,” in Proceedings of the 52nd IEEE Conference on Decision and Control, 2013, pp. 194–199.
  • [7] P. Menon and C. Edwards, “Robust fault estimation using relative information in linear multi-agent networks,” Automatic Control, IEEE Transactions on, vol. PP, no. 99, pp. 1–1, 2013.
  • [8] C. Keliris, M. Polycarpou, and T. Parisini, “A distributed fault detection filtering approach for a class of interconnected continuous-time nonlinear systems,” Automatic Control, IEEE Transactions on, vol. 58, no. 8, pp. 2032–2047, 2013.
  • [9] M. A. Rahimian, A. Ajorlou, and A. G. Aghdam, “Digraphs with distinguishable dynamics under the multi-agent agreement protocol,” Asian Journal of Control, 2014, in press.
  • [10] M. A. Rahimian and V. M. Preciado, “Detection and isolation of link failures under the agreement protocol,” in Proceedings of the 52nd IEEE Conference on Decision and Control, 2013, pp. 7364–7369.
  • [11] N. Biggs, Algebraic Graph Theory. Cambridge University Press, 1994.
  • [12] V. M. Preciado and A. Jadbabaie, “Moment-based spectral analysis of large-scale networks using local structural information,” IEEE/ACM Transactions on Networking, vol. 21, no. 2, pp. 373–382, Apr. 2013.
  • [13] M. A. Rahimian and V. M. Preciado, “Detection and isolation of failures in directed networks of lti systems,” arXiv preprint arXiv:1408.3164, 2014.
  • [14] L. Wolsey, “An analysis of the greedy algorithm for the submodular set covering problem,” Combinatorica, vol. 2, no. 4, pp. 385 – 393, 1982.