1. Introduction
Distributed coordination control algorithms are highly important in multi-UAV networks because of their fundamental role in various applications, including the formation control of UAVs, flocking, and distributed data fusion in networks [
1,
2,
3,
4,
5]. Practical large-scale multi-UAV networks are susceptible to multiple potential points of vulnerability, such as hardware failures or adversarial attacks, which can cause certain nodes to exhibit abnormal or adversarial behaviors [
6,
7]. The primary objective of resilient coordination control protocols is to guarantee that when an attack or failure compromises some nodes in multi-UAV networks, the remaining unaffected nodes can still achieve their objectives in a more relaxed setting [
8,
9,
10].
A central concern within this domain is devising strategies to alleviate or eliminate the influence of adversarial nodes. A class of algorithms known as the mean subsequence reduced (MSR) algorithms has emerged as a solution to this challenge [
11,
12,
13,
14,
15,
16]. The fundamental concept underlying MSR algorithms involves sorting and filtering the values received from their in-neighbors using a trimmed mean approach, based on a predefined upper bound number of adversarial nodes in the neighbors or network. The concept of
-robustness [
12], a graph-theoretic notion, was introduced to analyze the network topology of MSR algorithms to achieve consensus. This concept is more suitable for capturing information redundancy than the notion of connectivity. Subsequently, the MSR-based methods have been further extended to multi-UAV networks with different scenarios, such as containment control [
13] and leader–follower consensus [
14,
15]. The effectiveness of MSR-based methods in ensuring resilient consensus in one-dimensional networks where the states of nodes are scalars has been demonstrated. However, these outcomes refer to the
-robustness graph conditions. Verifying this property in arbitrary graphs is NP-hard, and no computationally efficient method is currently available to address this problem [
16]. References [
8,
17] provide a systematic review of the State-of-the-Art in graph-theory-based resilient consensus control for distributed systems.
To enhance the robustness of network structures, the concept of trusted nodes, which represents entities continually shielded from both attacks and failures through heightened security measures, including identity authentication, device hardening, or other cryptographic techniques, was introduced in [
18]. In [
18], the authors analyze the necessary graph conditions and incorporate trusted nodes into MSR algorithms to achieve resilient consensus. In [
19], a method based on trusted regions was proposed for designing resilient consensus algorithms in adversarial environments. Similar strategies were employed in [
20], where trusted nodes were employed to prevent data pollution from adversarial neighbors. However, the aforementioned methods mainly focus on one-dimensional scenarios, in which nodes’ states are scalars, and the consensus value is within an interval constrained by the maximum and minimum of regular nodes’ initial states. In scenarios where nodes’ states are represented as points or vectors in
, resilient consensus and containment are conducted to guarantee that all regular nodes converge to a point or within a defined space encompassed by the convex hull of either regular nodes or the leaders’ initial states. Notably, as discussed in [
21], resilient multi-dimensional consensus and containment control problems cannot be addressed by directly applying existing scalar algorithms to individual entries of the state through Kronecker product operations.
In recent research, the MSR algorithms were extended to more general
-dimensional space [
21,
22,
23,
24,
25,
26,
27,
28]. In these algorithms, each regular node iteratively updates its state by calculating a point guaranteed to lie in the convex hull formed by the states of regular neighbors. Existing algorithms compute this point through methods such as the Tverberg point [
21,
22], centerpoint [
23,
24], and intersection of multiple convex sets [
25,
26,
27,
28]. The outcomes obtained from these methods are elegant; however, the computational costs can be high, potentially growing exponentially with the number of adversarial nodes or neighbors. Moreover, all these findings are based on a predetermined parameter representing the maximum adversaries in multi-UAV networks or neighborhoods. Appropriately estimating this parameter may be impossible in practical applications, such as when addressing damaged sensors in extreme weather or real-time damaged robots in military wars. If the number of adversarial nodes exceeds the preset parameter, the coordination objective cannot be guaranteed.
In this paper, we extend the trusted-node-based approach to high-dimensional spaces. For resilient consensus control and resilient containment control in high-dimensional spaces, we design information filtering methods and resilient control algorithms, analyze the network topology conditions required for algorithm convergence, and provide corresponding proofs. Compared to traditional centralized or distributed control models [
21,
22,
23,
24,
25,
26,
27,
28], as shown in
Figure 1, we employ a hybrid control model that benefits from trusted nodes to solve the resilient multi-dimensional consensus and containment control problems in this paper. Trusted nodes follow the same distributed control protocol as regular nodes and can also be influenced by adversarial nodes during the update process. They differ from leaders, which are typically remotely controlled or autonomous and function as anchor nodes. The main contributions of this paper can be outlined as follows:
- (1)
A dynamic trusted convex hull method is proposed for regular nodes (including trusted nodes) to filter information in a
-dimensional space in a distributed manner. This method does not require a predetermined parameter specifying the maximum number of adversarial nodes in networks or neighborhoods, which is necessary in [
21,
22,
23,
24,
25,
26,
27,
28];
- (2)
Based on this method, a distributed local control protocol is designed for regular nodes (including trusted nodes) to achieve resilient multi-dimensional consensus and containment control. Compared to [
21,
22,
23,
24,
25,
26,
27,
28], the proposed protocol exhibits lower computational complexity and better tolerance of more adversarial nodes;
- (3)
The necessary and sufficient graph-theoretic conditions for the success of the proposed control protocol are derived. The newly defined graph conditions, namely
-dominating subgraphs, are easier to verify in arbitrary graphs than the classical
-robustness graph conditions [
11,
12,
13,
14,
15,
16].
The remainder of this paper is organized as follows: Preliminaries and problem formulation are provided in
Section 2. The algorithm design and theoretical analysis are provided in
Section 3 and
Section 4, respectively. The simulations are described in
Section 5, and
Section 6 concludes the paper.
Notations: Throughout this paper, the symbols , , and denote the sets of integers, positive integers, and real numbers, respectively. denotes the cardinality of a set . The separability of set by set is denoted by . Moreover, and are real numbers.
2. Preliminaries and Problem Formulation
2.1. Graph Theory
Consider a directed graph (digraph) denoted as , where is the node set and is the edge set. An edge indicates that node can directly acquire information from node . The set of neighbors for a node is denoted by . The adjacency matrix is defined by if ; otherwise, . A digraph is said to be a subgraph of if and . The path from node to node is denoted as the sequence , where for . If a directed path from to holds such that and , then the directed path is in subgraph . If there is a node in digraph that has a directed path to all other nodes, then contains a directed spanning tree. To avoid ambiguity and for convenience, in this paper, we use node indices , in a special font to refer to the nodes themselves, while explicitly indicating whether it is node or node , so as not to confuse them with other symbols.
To analyze the resilience of the algorithms developed in this paper, we introduce two new concepts that are extended from the notion of a connected dominating set [
29,
30]:
Definition 1. (-dominating subgraph) Consider a digraph ; a subgraph is said to be an -dominating subgraph if the following two conditions are met:
- (i)
contains a directed spanning tree.
- (ii)
, .
Definition 2. (-dominating subgraph with respect to ) Consider a digraph , where and are nonempty disjointed subsets of ; a subgraph is an -dominating subgraph with respect to if the following two conditions are met:
- (i)
, there exists that has a directed path from to in subgraph or .
- (ii)
, .
Based on the above definitions, we present the following new lemma and its proof:
Lemma 1. Consider a digraph . If is an -dominating subgraph, then for any pair of nonempty disjointed subsets , is satisfied, where , .
Proof. Three possible cases are considered:
- (i)
: Since is an -dominating subgraph, any node in has at least neighbors in . Therefore, ;
- (ii)
: Similarly to (i), ;
- (iii)
and : Since is a -dominating subgraph, there is a node that has a directed path to all other nodes in . If , by definition, there is a node in that must have a neighbor in , since node must have a directed path to node . Then, . If , by definition, there is a node in that must have a neighbor in , since node must have a directed path to node . Thus, . □
2.2. Problem Formulation
Consider a multi-UAV network consisting of sets of regular nodes, leaders, and adversarial nodes in an adversarial environment. These sets are denoted as , , and , respectively. Thus, . First, the set of regular nodes executes a predefined distributed control protocol with local information from neighbors. Second, the leaders can be autonomous or remotely controlled without implementing the proposed control protocol. In this paper, leaders are considered static, functioning as anchor nodes and defining a containment space for followers to reach and remain within. The leader set may be empty; in this case, we consider only regular and adversarial nodes. Finally, the adversarial nodes are nodes with full knowledge of the network that deviate from any predefined protocol rules. They may aim to hinder regular nodes from achieving coordination goals, or they may just be unable to execute the predefined distributed control protocol. The adversaries considered in this paper are malicious in the sense that they send the same misinformation to all out-neighbors.
In this paper, nodes are modeled as discrete-time multi-dimensional integrators with positions in
-dimensional space. The behavior of nodes is represented by the following dynamics:
where
is the local control input and
is the position of the nodes,
is the time step. In this paper, we use
to represent the positional information of node
. In a one-dimensional space,
is a scalar, whereas in two-dimensional or three-dimensional spaces,
is a vector. For convenience, we uniformly use
to denote it, so no strict distinction is made.
We aim to enhance the resilience of multi-UAV networks through trusted nodes, which are a very small set of regular nodes continuously safeguarded from both attacks and failures through augmented security investments, including identity authentication, device hardening, or other cryptographic techniques from practical implementation. Since the security investments are costly, the designated set of trusted nodes, denoted by
, must be small and meticulously constructed. Trusted nodes follow the same update rules as regular nodes and can also be influenced by adversarial nodes during the update process. Assume that each regular node is aware of the trusted nodes’ identity in the neighborhood [
18,
19]. This assumption means that the identity of trusted nodes is known to all regular nodes (including trusted nodes) within the neighborhood, while the identity of adversarial nodes remains unknown to regular nodes. All regular nodes in the multi-UAV network may become adversarial due to attacks or failures, except for a small set of trusted nodes. To clarify the problems, the following definition of the convex hull is provided:
Definition 3. (convex hull) The convex hull of a set of nodes is defined as In this paper, two coordination problems within multi-UAV networks are addressed using the proposed algorithm. Regular nodes can achieve (i) resilient multi-dimensional consensus when there are no leaders in the network or (ii) resilient multi-dimensional containment control when there are leaders in the network, regardless of the behaviors exhibited by the adversarial nodes. The problems are defined as follows [
23,
24]:
Problem 1. (Resilient Multi-Dimensional Consensus) Consider a multi-UAV network consisting of regular nodes and adversarial nodes in -dimensional space. For any behavior of adversarial nodes and any initial positions , the following holds:where .
Problem 2. (Resilient Multi-Dimensional Containment Control) Consider a multi-UAV network consisting of regular nodes, leaders, and adversarial nodes in -dimensional space. For any behavior of adversarial nodes and any initial positions , the following holds:where .
3. Algorithm Design
In this section, we provide the resilient multi-dimensional consensus and containment control protocol. In the introduction, we discussed how many algorithms prove highly effective in simple one-dimensional spaces for ensuring resilient consensus control. Consequently, one might naively attempt to extend these one-dimensional methods to high-dimensional spaces by applying them independently to each dimension of the node states via the Kronecker product, thereby achieving resilient control in higher dimensions. However, this approach only guarantees convergence to a hypercube determined by the nodes’ initial states—a limitation similarly noted in the literature [
21,
28].
Figure 2 illustrates an example in two-dimensional space, where node positions represent their initial states. If one-dimensional algorithms are merely applied separately to each dimension, the final convergence would be confined to the gray rectangular region. In contrast, the darker triangular region represents the more precise convex hull formed by the nodes’ initial states.
To facilitate the introduction of the proposed algorithm, we first define the safe convex hull as the convex hull formed by all regular nodes, trusted nodes, and leaders (when present). In the absence of leaders, the safe convex hull is constructed solely by regular and trusted nodes.
Definition 4. (safe convex hull) The safe convex hull is defined as Since this paper addresses two distinct problems—resilient consensus control (without leaders) and resilient containment control (with multiple leaders)—we must account for scenarios both with and without leaders. However, during information filtering and state updates, both leaders and trusted nodes are treated as authenticated participants whose state values are fully trusted. Specifically, trusted nodes are authenticated and execute the same algorithm as regular nodes. Leaders are authenticated and update their states via remote control. Regular nodes follow the prescribed algorithm, but may become adversarial due to faults or attacks, deviating from correct execution. Given these shared principles, we unify the algorithmic design for both problems in the subsequent discussion. Next, we give the definition of a trusted convex hull.
Definition 5. (trusted convex hull) The trusted convex hull of regular node at time step is a convex hull formulated by the set of trusted nodes and leaders in the neighborhood. This convex hull is represented by the following polytope: Figure 3 serves as a schematic diagram demonstrating how a regular node
constructs a trusted convex hull in two-dimensional space by utilizing trusted neighbor nodes, leaders within its neighborhood, and its own state. The positions of the nodes represent their real-time state values, and the nodes shown in the figure constitute only a portion of the entire network. According to the definition, for any regular node
, the trusted convex hull
is a subset of the convex hull formulated by all regular nodes, trusted nodes, and leaders. Then, it is confirmed that the trusted convex hull is a subset of the safe convex hull, that is
Note that the construction of the trusted convex hull is not contingent upon a preknown parameter specifying the maximum adversaries in the multi-UAV system or neighborhood. In other words, it can tolerate any regular node within the multi-UAV network becoming adversarial under attacks or failures, excluding a very small set of trusted nodes.
For any regular node
, it makes updates according to the resilient multi-dimensional consensus and containment control protocol, as outlined in Algorithm 1. The algorithm’s key steps are designed as follows: at any given time
, each regular node
receives state information from all neighboring nodes and constructs a trusted convex hull by combining its own trusted state value with those from trusted neighbors and leaders (if present); neighboring states falling within this convex hull are retained for subsequent state updates while external ones are discarded, with the preserved node set denoted as
, and the state update rule—similar to the MSR algorithm—utilizes only these filtered states from
to maintain distributed operation, as illustrated in
Figure 3, where a regular node
builds its trusted convex hull using trusted nodes and leaders in the neighborhood.
Algorithm 1: Resilient Multi-Dimensional Consensus and Containment Control Protocol |
At each time step , regular node , repeat the following operations: 1: Receive relative position information from neighbors , and store these positions in a list ; 2: Compute a dynamic trusted convex hull that is formulated by trusted nodes and leaders in ; 3: Compute a candidate node set where the positions in out of are removed and the others are reserved; 4: Compute a local control input using
where and for some ; 5: Update position according to (1) and transmit to neighbors . |
A novelty of the protocol is empowering regular nodes to compute and update using information derived from a safe convex hull, i.e., , ensuring immunity to arbitrary influence from adversarial nodes. During the updating process, the positions of nodes located outside the trusted convex hull are excluded and disregarded by node . If the set of trusted nodes is carefully arranged and the network topology satisfies specific conditions, then the regular nodes in the multi-UAV network can achieve collaborative objectives in a distributed manner regardless of the behavior of the adversarial nodes. Although adversarial nodes may be located in the trusted convex hull, they cannot have arbitrary control over the regular nodes. Next, we focus on the scenario where an adversarial node remains within the trust convex hull of a node , i.e., . According to the definition of a convex hull, the state value of node can necessarily be represented as a convex combination of other regular nodes (including trusted nodes and leaders) in the trusted convex hull, i.e., , where , , and . Let , , …, . Then, the influence of the adversarial node can be transformed into the effect of other regular nodes within the trust convex hull. It is evident that the adversarial node will not be able to arbitrarily control the state value of node , and can at most influence the weights of the nodes in the convex combination.
The computation of
and
in Algorithm 1 can be transformed into a classic convex problem in mathematics [
31,
32]. Since trusted nodes are expensive and protected from attacks by increased security investment, the number of trusted neighbors of any regular node
is as small as possible, and at least
. Thus, the computation of
is transformed into a computation of a convex hull of
points. According to the Quickhull algorithm in [
31,
32], the average complexity is
and the worst-case complexity is
. The computation of
involves calculating whether a point is within
. Since
points need to be determined, the complexity of this problem is
. In previous studies of multi-dimensional cases [
21,
22,
23,
24,
25,
26,
27,
28], the computation of a safe point relies on a preknown parameter specifying the maximum number of adversaries. Thus, the computation cost may increase exponentially with the number of adversarial nodes or neighbors; a detailed analysis of this can be seen in [
24,
28]. Our algorithm presented in this paper exhibits a significantly decreased computational cost, which is
at worst. The computational complexity analysis here only considers the scenario in a
-dimensional space, where any regular node
has enough trusted neighbors to form a
-dimensional trusted convex hull. It evaluates the complexity of computing such a trusted convex hull and the computational complexity of filtering received state information using this convex hull. When the number of trusted neighbors of node
is insufficient to form a
-dimensional trusted convex hull, the trusted convex hull of node
in Algorithm 1 will instead form a lower-dimensional trusted space, such as a closed convex polygon in a three-dimensional space. In this case, the computational complexity will also change. The trusted convex hull may be a point, a line, an area, or a space. The hull always contains the regular node
itself, which is considered trust by definition. In the worst,
is a single point of regular node
.
4. Theoretical Analysis
In this section, we analyze the convergence of multi-UAV network (1) under the designed control protocol. The number of regular nodes
in multi-UAV network (1) is denoted by
. Combining (1) and (8) yields the dynamics of the regular node
as
where
,
and
.
Note that is a convex combination of in and . From Algorithm 1, we know that is a candidate node set belonging to the trusted convex hull . Since , one has . Thus, is always located in the safe convex hull regardless of the adversarial nodes’ misleading. Next, we shall provide sufficient graph-theoretic conditions on network topology, under which resilient multi-dimensional consensus and containment control are achieved. To prove this, it is sufficient to prove that the consensus is achieved at any dimension since . Given the symmetry across different dimensions, without loss of generality, we concentrate solely on the first entry of nodes’ positions. The convergence of other entries can be proved using the same method.
For convenience, at any
, let
and
denote the maximum and minimum values, respectively, of the
-th entries of regular nodes’ positions at time step
. That is,
With the above preparations, we can now provide the main theoretical results.
4.1. Resilient Multi-Dimensional Consensus
First, we present the theoretical results for the resilient multi-dimensional consensus problem. Theorems 1 and 2 only consider the case where there is no leader node, and all regular nodes converge within the convex hull formed by the regular nodes (including trusted nodes). The proof of Theorem 1 follows the general structure of that for scalar systems [
11], with modifications to accommodate our specific information filtering and position updating rules. We begin by proving the safety condition, i.e.,
. Next, we prove the agreement condition by contradiction, showing that the agreement gap between all regular nodes converges to zero.
Theorem 1. Consider a multi-UAV network in -dimensional space consisting of regular nodes and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional consensus can be achieved through the control protocol outlined in Algorithm 1 if the subgraph induced by trusted nodes forms a -dominating subgraph.
Proof. First, we prove the safety condition . Since is a -dominating subgraph of , by definition, each regular node in must have at least trusted neighbors. Thus, . From (9), we can see that is a convex combination of nodes’ positions in . It is obtained that . Since this holds for any regular node , recalling (7), one has . By induction, we can obtain .
Next, we prove the agreement condition. Based on Algorithm 1, if an adversarial node
satisfies
, then
for any
. Consequently,
. Based on (9),
is determined by the positions at time step
within
. The following is obtained:
Then, and are monotone and bounded functions of , indicating that each function converges to some limit, denoted by a and b, respectively. It has been established that . If we can demonstrate that , then the consensus is guaranteed. We proceed to prove by contradiction that this assertion holds.
Let us assume that
, noting that
by definition. Consequently, we can define a constant
, such that
. For any positive real number
and at any time step
, we define the following two sets:
The former includes all regular and adversarial nodes that have a first entry larger than , and the latter includes all regular and adversarial nodes that have a first entry smaller than . Then, a small quantity can be chosen. Note that . Since and are convergence sequences, there exists , such that and , . Now, we consider the nonempty sets and . According to the definition of , these two sets are disjointed.
Since the subgraph is an -dominating subgraph, Lemma 1 indicates that a regular node in either or with at least one trusted neighbor situated outside its set exists. Let us assume that regular node has a trusted neighbor outside . By definition, the first entry of these trusted neighbors is at most equal to . According to the control protocol outlined in Algorithm 1, the trusted neighbors fall within and are utilized by node for position updating. Referring to (9) reveals that the position of regular node at each time step is a convex combination of its own position and the position of nodes in , where the weight has a lower bound .
Considering that the largest first entry that regular node
uses at
is
, assigning the maximum weight to
yields
Here,
satisfies
. Importantly, this upper bound also applies to the updated first entry of any regular node not in
; as such, the node utilizes its own position in updating. Similarly, if regular node
has a trusted neighbor outside
, applying the same analysis yields
Again, any regular node that is not in
has the same lower bound. Considering the sets
and
, according to the previous analysis, at least one regular node in
whose first entry will be less than
at time step
or one regular node in
whose first entry will be more than
at time step
exists. It must be that either
or
, or both. Since
,
and
are still disjointed. Let
,
. It is evident that
is a strictly decreasing sequence. We repeat the above analysis recursively for
steps, where
is straightforward. Since
, there must be some time step
where either
or
is empty. In the former case, all regular nodes at time step
have their first entry at
, at most, and in the latter case, all regular nodes at time step
have their first entry at
, at least. We aim to demonstrate that
, thereby contradicting the assertion that either
monotonically converges to
a or that
monotonically converges to
b. Recalling that
and
according to the definitions, we have
Thus, we obtain a contradiction. This contradiction indicates that must be zero, namely, . The consensus has been proven. □
In Theorem 1, a sufficient condition is proven to solve the resilient multi-dimensional consensus problem in an adversarial environment. The following result elaborates upon a sufficient and necessary condition for Algorithm 1 to succeed.
Theorem 2. Consider a multi-UAV network in -dimensional space, consisting of regular nodes and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional consensus can be achieved through the control protocol outlined in Algorithm 1, if and only if the following conditions are met:
- (i)
contains a directed spanning tree;
- (ii)
, either or .
Proof. (Sufficiency) Based on the two conditions, any regular node in must either be a trust node or have at least one trusted neighbor to ensure that is not empty. The subsequent analysis follows a similar approach to that outlined in Theorem 1.
(Necessity) We prove this via contradiction considering the following cases:
- (i)
does not contain a directed spanning tree.
- (ii)
, such that .
Case (i): Since the subgraph does not contain a directed spanning tree, by definition, a subset of trusted nodes must exist, and the following conditions are met:
- (1)
, ;
- (2)
, .
Consider the following initial positions: , , , and , where and are real vectors, such that . The initial positions of nontrusted nodes can be arbitrary. According to condition (1), , is a single point based on Algorithm 1. Hence, and . Similarly, from (9), we know that for ; this is true for any trusted node , we have for . Since , resilient multi-dimensional consensus cannot be achieved.
Case (ii): There exists at least one nontrusted node , such that . Consider the following initial positions: (1) ; (2) , , and , where and are real vectors, such that . Similarly to the analysis in Case (i), since , resilient multi-dimensional consensus cannot be achieved. □
In the resilient consensus control problem, the primary objective is to mitigate the influence of adversarial nodes, ensuring that the network can still reach consensus even in their presence. While resilient consensus algorithms guarantee convergence within the convex hull of regular nodes, the final convergence value varies depending on the network topology conditions and computational methods. As discussed in Algorithm Design, although adversarial nodes cannot prevent the network from achieving consensus, their state values still participate in the computation of the convergence process, affecting the weights assigned to state values and thus influencing the final convergence value of the network. Similarly, the selection and exclusion of state values from neighboring regular nodes during computation can have analogous effects. Note that resilient multi-dimensional consensus can be achieved if the topology conditions in Theorem 2 are satisfied. However, these conditions may not be practical, as a regular node might not have sufficient trusted neighbors to construct a
-dimensional trusted convex hull. In such cases, a lower-dimensional convex hull
is employed. Consequently, numerous positions of other regular nodes not in
are excluded and not utilized during the update step. Neglecting these positions involves disregarding useful information, potentially causing a consensus point to be significantly distant from the true average of the initial positions of all regular nodes (including trusted nodes), as illustrated in
Figure 4. In comparison, the sufficient condition in Theorem 1 is more prudent.
4.2. Resilient Multi-Dimensional Containment Control
Next, we provide the theoretical results of the resilient multi-dimensional containment control problem. Theorems 3 and 4 only consider the case where multiple leader nodes exist, and all regular nodes converge within the convex hull formed by the leader nodes. Proving that all regular nodes converge to the convex hull in any dimension is sufficient for proving that the regular nodes asymptotically converge to the convex hull of the leaders’ initial positions, , since . We concentrate solely on the first entry of nodes’ positions. The convergence of other entries can be proven using the same method.
Theorem 3. Consider a multi-UAV network in -dimensional space, consisting of regular nodes, leaders, and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional containment control can be achieved through the control protocol outlined in Algorithm 1 if the subgraph induced by trusted nodes forms a -dominating subgraph with respect to . In particular, all regular nodes will converge to the convex hull of leaders’ initial positions, regardless of the behaviors exhibited by adversarial nodes.
Proof. We concentrate solely on the first entry of nodes’ positions, that is, we prove that the first entry of each regular node finally reaches and remains in the interval . To prove this, we consider the following cases.
- (i)
All regular nodes are initially in , that is, ;
- (ii)
, such that , for any , . That is, the first entry of some regular nodes’ initial position is larger than , while the others are initially in ;
- (iii)
, such that , for any , ;
- (iv)
, such that , , such that , and for other , .
Case (i): We prove this via induction. First, , , . Since the subgraph is an -dominating subgraph with respect to , according to Definition 2, each regular node has at least trusted nodes or leaders in neighbors. Thus, . Based on Algorithm 1, if an adversarial node satisfies , then for any . Consequently, . Based on (9), is determined by the positions at time step within . Thus, we have . Therefore, all regular nodes will always be within the convex hull . The proof is complete.
Case (ii): We demonstrate that as . We prove this via two claims, as outlined below:
Claim (1): If
,
is nonincreasing. Similarly to the analysis in Case (i),
. Based on (9),
is determined by the positions at time step
within
. Thus, for each regular node
, we have
The proof of Claim (1) is complete.
Claim (2): If
, then after finite time steps,
will decrease. To establish this, we consider a set
containing all regular nodes that have at least one leader as a neighbor. We know such a set
is not empty, since for each regular node
,
, which has a directed path to it in
or
, exists. As discussed previously, each regular node
has at least
trusted nodes or leaders as neighbors and updates its position according to Algorithm 1. Define
. Hence, if
, there is at least one leader in
. Furthermore, (9) yields
Since the weight is lower bounded by
, we put the largest possible weight on
. Thus, the first inequality in (17) holds. At time step
, similarly, we put the largest possible weight on
; thus,
According to Claim (1), the second inequality in (18) holds. Recursive reasoning reveals that the first entry of any node in will be consistently smaller than from time .
Since
, we obtain
. Next, we denote
as containing all regular nodes that have at least one trusted node in
. Since
is an
-dominating subgraph with respect to
, if
, then at least one regular node in
that has a directed path from leaders to it in subgraph
exists. Thus,
. As discussed previously, each regular node
has at least
trusted nodes as neighbors and updates its position according to Algorithm 1. Recalling (16) yields
. At time step
, since regular node
has a trusted neighbor in
that belongs to
, we have
where the first inequality holds, since regular node
has a trusted neighbor in
whose weight is lower bounded by
and whose value is upper bounded by (17). Thus, we have
. As before, the first entry of any regular node in
will be smaller than
from
.
Similarly, we extend the previous analysis recursively to steps and deduce that the first entry of any regular node in will be below , where . Thus, the first entry of every regular node will be strictly smaller than from time step . That is, . Thus, the proof of Claim (2) is complete.
According to Claim (1) and Claim (2), as . Additionally, at any according to (9). Consequently, all regular nodes will ultimately converge and move in .
Case (iii): This analysis is similar to Case (ii) and consists of demonstrating that as and for any .
Case (iv): This analysis is a combination of Case (ii) and Case (iii). Thus, the proof is complete. □
Note that the same argument holds in the case of resilient multi-dimensional containment control. Similarly, we provide sufficient and necessary conditions for Algorithm 1 to succeed in resilient multi-dimensional containment control problems, which is not prudent for multi-dimensional cases, as discussed previously.
Theorem 4. Consider a multi-UAV network in -dimensional space consisting of regular nodes, leaders, and adversarial nodes, following the dynamics described in (1). Resilient multi-dimensional containment control can be achieved through the control protocol outlined in Algorithm 1 if, and only if , and exists, which has a directed path from to in subgraph or . In particular, all regular nodes will converge to the convex hull of leaders’ initial positions, , regardless of the behaviors exhibited by the adversarial nodes.
Proof. To conserve space, we omit this proof, which is similar to Theorem 2. □
Note that the graph-theoretic conditions developed in this paper are more straightforward to verify in practical applications than the classic
-robust graph conditions described in [
11,
12,
13,
14,
15,
16]. Verifying
-robust graph conditions in arbitrary graphs is NP-hard, and no computationally efficient method is currently available to address this problem [
16]. For the graph-theoretic conditions developed in this paper, the first step is to determine whether the set of trusted nodes and leaders forms a directed spanning tree. There are many classic spanning tree algorithms that can be used to make this determination. Next, we calculate the number of trusted nodes and leaders among the neighbors of each regular node (including trusted nodes) to determine whether the conditions are satisfied.