Next Article in Journal
The Poincaré Half-Plane for Informationally-Complete POVMs
Previous Article in Journal
Leakage Evaluation by Virtual Entropy Generation (VEG) Method
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Robust Consensus of Networked Evolutionary Games with Attackers and Forbidden Profiles  †

School of Mathematics and Statistics, Shandong Normal University, Jinan 250014, China
*
Author to whom correspondence should be addressed.
The research was supported by the National Natural Science Foundation of China under grants 61374065 and 61503225, and the Natural Science Fund for Distinguished Young Scholars of Shandong Province under grant JQ201613.
The research was supported by the National Natural Science Foundation of China under grants 61374065 and 61503225, and the Natural Science Fund for Distinguished Young Scholars of Shandong Province under grant JQ201613.
Entropy 2018, 20(1), 15; https://doi.org/10.3390/e20010015
Submission received: 2 November 2017 / Revised: 20 December 2017 / Accepted: 28 December 2017 / Published: 29 December 2017
(This article belongs to the Section Information Theory, Probability and Statistics)

Abstract

:
Using the algebraic state space representation, this paper studies the robust consensus of networked evolutionary games (NEGs) with attackers and forbidden profiles. Firstly, an algebraic form is established for NEGs with attackers and forbidden profiles. Secondly, based on the algebraic form, a necessary and sufficient condition is presented for the robust constrained reachability of NEGs. Thirdly, a series of robust reachable sets is constructed by using the robust constrained reachability, based on which a constructive procedure is proposed to design state feedback controls for the robust consensus of NEGs with attackers and forbidden profiles. Finally, an illustrative example is given to show that the main results are effective.

1. Introduction

Since J. M. Smith and G. R. Price’s pioneering works on evolutionary game theory (EGT) [1], the study of EGT has attracted many scholars’ research interests from biology, economics, social science, and so on. It has become a powerful tool to investigate various phenomena raised in social physics, economics and system science [2,3,4]. Evolutionary game played over a network is called a networked evolutionary game (NEG) [4], which mainly studies the influence of the network topology on the evolution of the game, and has been extensively investigated by biologists, physicists, economists and cyberneticists in the last two decades [5,6,7,8,9]. Among this literature, the evolution of cooperation is an important issue [10,11]. In addition, EGT over multilayer networks was also studied [12].
An NEG is mainly made up of three factors, that is, fundamental networked game (FNG), network graph and strategy updating rule (SUR). Among these factors, SUR is the most important one that determines the dynamics of the NEG. Some commonly used SURs include “Myopic Best Response Adjustment”, “Unconditional Imitation”, “Fermi Rule”, “Moran Rule”, and so on. For some comprehensive studies on NEGs, please refer to [13,14].
As an important issue in the study of NEGs, the strategy consensus problem plays an important role in studying the convergence of NEGs to a Nash equilibrium, which can describe the dynamic behaviour of NEGs and provide us a theoretical framework to explore certain kinds of social problems [15]. It is noted that, in the practical NEGs, there often exist attackers who may perturb the strategy choice of each player [16,17] as well as forbidden profiles [18] that correspond to some illegal (undesirable) strategy profiles. For example, in wireless sensor networks, malicious sensor nodes [19,20] who aim to maximize the damage to the networks while minimizing the chance of being caught by some attackers. A motivating example of forbidden profiles comes from a piece of chess board in Figure 1 of [21], where the authors showed that “the profile C2 → B3 is a forbidden move for the black king by the rules of chess.” Thus, it is meaningful to investigate the strategy consensus problem of NEGs with attackers and forbidden profiles.
Recently, Cheng has presented a new matrix product, which is called the semi-tensor product (STP) of matrices [22]. Using the STP, Cheng and his colleagues developed an algebraic state space representation (ASSR) approach for the analysis and control of finite-valued systems [22,23,24,25]. Particularly, the ASSR approach was successfully applied to logical dynamic systems [26,27,28,29,30,31,32,33,34,35,36,37,38,39,40,41,42] and NEGs [14,43,44,45,46]. Fornasini and Valcher presented some necessary and sufficient conditions for the observability and state observers of Boolean control networks [28]. The robust control problem of logical dynamic systems was considered in [33,34]. In [14], an ASSR framework was established for the modeling, analysis and control of NEGs.
In this paper, we study the robust consensus of NEGs with attackers and forbidden profiles by using the ASSR approach. It should be pointed out that our NEG model only considers synchronized strategy updates and average incomes, which is different from NEG models with random sequential strategy updates and total incomes. The main innovation point of this paper are twofold. For one thing, we propose the concept of robust constrained reachability for NEGs, which is effective in dealing with attackers and forbidden profiles. For another, we establish a constructive procedure to design state feedback controls for the robust consensus of NEGs with attackers and forbidden profiles, which is easily operated with the tool of MATLAB (R2016a, The MathWorks, Natick, US State).
In the sequel, the matrix product is the semi-tensor product of matrices, which is defined as: Given two matrices M R m × n and N R p × q . Set α = l c m ( n , p ) be the least common multiple of n and p. Then,
M N = ( M I α n ) ( N I α p ) ,
where ⊗ is the Kronecker product. When n = p , STP is equivalent to the conventional matrix product. Therefore, we omit the symbol “⋉” if no confusion arises in the following. For the detailed properties of STP, please see [22,23]. It is noted that the conventional matrix product requires n = p , while STP is applicable to any two real matrices. Thus, STP is a new matrix product. When considering a finite-valued system such as an NEG, if we identify each strategy as a canonical vector, then one can multiply these canonical vectors by STP (in this case, the conventional matrix product is not valid). In this way, one can convert the dynamics of an NEG into a linear form, which establishes a bridge between NEGs and classic control theory [14]. This is also the motivation for why we use STP to study the robust consensus of NEGs with attackers and forbidden profiles.
The rest of this paper is organized as follows. Section 2 formulates the problem investigated in this paper. In Section 3, the main results of this note are given. In Section 4, an illustrative example is given to show the obtained new results, which is followed by a brief conclusion in Section 5.
The notations of this paper are standard. N , Z + and R denote the sets of natural numbers, positive integers and real numbers, respectively. D k : = { 1 , 2 , , k } . Δ k : = { δ k 1 , δ k 2 , δ k k } , where δ k i denotes the i-th column of the identity matrix I k . An n × t matrix A is called a logical matrix, if A = [ δ n j 1 δ n j 2 δ n j t ] , which is briefly expressed as A = δ n [ j 1 j 2 j t ] . Denote the set of n × t logical matrices by L n × t . B l k l ( M ) denotes the l-th n × n block of an n × m n matrix M. For M , N R n × r , the Khatri–Rao product of M and N is defined as
M N : = [ C o l 1 ( M ) C o l 1 ( N ) , , C o l r ( M ) C o l r ( N ) ] ,
where C o l s ( M ) denotes the s-th column of the matrix M.

2. Problem Formulation

A networked evolutionary game, denoted by ( ( N , E ) , G, Π ) , consists of:
  • Network graph ( N , E ) , where N denotes the set of vertices (players), and E denotes the set of edges. Let N = N 1 N 2 N 3 with N i N j = , i , j = 1 , 2 , 3 , i j , where N 1 is the set of ordinary players, N 2 is the set of pseudo players who can control the evolutionary game, and N 3 is the set of attackers (In an NEG, attackers are selfish nodes in the network graph who use the network but do not cooperate. Attacker is different from stochastic player in NEGs with “Fermi rule", where stochastic player is also an ordinary player who may cooperate.) who may destroy the evolutionary game. Set | N 1 | = n , | N 2 | = m and | N 3 | = q .
  • Fundamental networked game, G, such that if ( i , j ) E , then i and j play the FNG repetitively with the strategy set S. Without loss of generality, for | S | = k , we let S = D k . Denote the strategies of each player in N 1 , N 2 and N 3 at time t by z i ( t ) D k , w j ( t ) D k and ξ l ( t ) D k , respectively, where i = 1 , , n , j = 1 , , m and l = 1 , , q .
  • Strategy updating rule, Π . Denote the λ -th step neighborhood of each player P i N by U λ ( i ) . When λ = 1 , we briefly denote by U ( i ) the one step neighborhood of P i . At each time instance, each player P i plays the FNG with its neighbors in U ( i ) , and its average payoff, denoted by c i , has the following form:
    c i ( P i , P j | j U ( i ) ) = j U ( i ) \ { i } c i j ( P i , P j ) | U ( i ) | 1 ,
    where c i j : S × S R denotes the payoff of P i playing with its neighbor P j , j U ( i ) . Throughout this paper, the strategy updating rule is described by the following fundamental evolutionary equation:
    P i ( t + 1 ) = f i ( { P j ( t ) , c j ( P j ( t ) , P k ( t ) | k U ( j ) ) | j U ( i ) } ) , t N , i N 1 ,
    where f i is determined by the following SUR (Unconditional Imitation with Fixed Priority): P i ( t + 1 ) is selected as the best strategy from strategies of its neighbors in U ( i ) at time t. Precisely, if j * = arg max j U ( i ) c j ( P j , P k | k U ( j ) ) , then P i ( t + 1 ) = P j * ( t ) . When the neighbors with maximum payoff are not unique, say, arg max j U ( i ) c j ( P j , P k | k U ( j ) ) : = { j 1 * , , j r * } , we choose j * = min { j 1 * , , j r * } .
We give an example to demonstrate how to use the SUR to determine the fundamental evolutionary equation.
Example 1.
Consider an NEG consisting of five players, in which the set of players is denoted by N = { P 1 , P 2 , P 3 , P 4 , P 5 } , and the network graph of the game is shown in Figure 1. The basic game of this NEG is the snowdrift game [14], whose payoff matrix is given in Table 1, where “cooperate” and “defect” are denoted by “1” and “2”, respectively. Hence, all the players have the same strategy set S = { 1 , 2 } . In this NEG, P 4 is assumed to be a pseudo player who can freely choose its own strategy at each step, while P 5 an attacker who may destroy the evolutionary game. Denote the strategies of P 1 , P 2 , P 3 , P 4 and P 5 at time t by P 1 ( t ) , P 2 ( t ) , P 3 ( t ) , P 4 ( t ) and P 5 ( t ) , respectively.
Using the SUR of this paper, f 1 , f 2 and f 3 can be figured out as in Table 2. From Table 2, one can clearly see the changes of each player’s payoff and strategy with the changes of its neighbors. However, it is not easy to analyze the evolution of the NEG according to Table 2. Thus, we need to establish a mathematical expression of the NEG based on Table 2.
Let “ δ 2 1 ” be the vector form of strategy “1” and “ δ 2 2 ” be the vector form of strategy “2”. Denote z 1 ( t ) = P 1 ( t ) , z 2 ( t ) = P 2 ( t ) , z 3 ( t ) = P 3 ( t ) , w ( t ) = P 4 ( t ) , and ξ ( t ) = P 5 ( t ) . According to Table 2, we can obtain the structural matrix of each f κ as follows:
z κ ( t + 1 ) = f κ ( z 1 ( t ) , z 2 ( t ) , z 3 ( t ) , w ( t ) , ξ ( t ) ) = M κ z 1 ( t ) z 2 ( t ) z 3 ( t ) w ( t ) ξ ( t ) , κ = 1 , 2 , 3 ,
where
M 1 = δ 2 [ 1 2 2 2 2 1 1 2 1 1 2 2 2 1 2 2 1 2 1 2 2 2 1 2 1 1 1 1 2 2 2 2 ] , M 2 = δ 2 [ 1 1 2 2 2 1 1 1 1 1 2 2 2 1 2 2 2 2 1 2 2 2 2 2 1 1 1 2 2 1 2 2 ] , M 3 = δ 2 [ 1 2 1 2 2 1 1 1 2 1 2 2 2 2 2 1 1 2 1 2 2 2 1 2 1 1 1 2 2 2 1 2 ] .
Noting that each column of M κ corresponds to a prescribed value of f κ in Table 2.
In the following, motivated by Example 1, we establish the algebraic form of NEGs with attackers.
Identify each strategy λ S = D k as the canonical vector form δ k λ , λ = 1 , 2 , , k . Let ξ ( t ) = ξ 1 ( t ) ξ q ( t ) , w ( t ) = w 1 ( t ) w m ( t ) and z ( t ) = z 1 ( t ) z n ( t ) . For each evolutionary dynamic equation (3), one can draw a table like Table 2. From the table, one can find a matrix M i L k × k m + n + q such that
z i ( t + 1 ) = M i ξ ( t ) w ( t ) z ( t ) , i = 1 , 2 , , n ,
where M i is called the structural matrix of f i .
Multiplying all the n Equations in (5) together, we obtain the algebraic form of NEGs with attackers as follows:
z ( t + 1 ) = L ξ ( t ) w ( t ) z ( t ) ,
where L = M 1 M 2 M n L k n × k n + m + q .
In this paper, we assume that the set of strategy profiles in N 1 takes values from the following forbidden profiles set (In an NEG, forbidden profiles set is a set strategy profiles which are illegal according to rules, laws and regulations of the game.):
C z = { δ k n i l : l = 1 , 2 , , r } ,
where 1 i 1 < i 2 < < i r k n and | C z | = r .
Now, we introduce the robust consensus problem studied in this paper.
Definition 1.
Consider the NEG (6) with attackers and forbidden profiles set C z . Let η Δ k and η n C z be given. The NEG is said to achieve robust consensus at η Δ k , if there exist a positive integer τ and a control sequence { w ( t ) : t N } such that
(i)
z ( t ; z ( 0 ) , w ( t ) , ξ ( t ) ) C z holds for t N , z ( 0 ) C z and ξ ( t ) Δ k q ;
(ii)
z ( t ; z ( 0 ) , w ( t ) , ξ ( t ) ) = η n holds for t τ , z ( 0 ) C z and ξ ( t ) Δ k q .
We aim to design a state feedback control in the form of
w 1 ( t ) = b 1 ( z 1 ( t ) , , z n ( t ) ) , w m ( t ) = b m ( z 1 ( t ) , , z n ( t ) ) ,
where b i : D k n D k are k-valued logical functions, which needs to be determined, under which the NEG (6) with attackers and forbidden profiles set C z achieves robust consensus at η Δ k .
Assume that the structural matrix of b i is B i , i = 1 , , m . Then, by using the Khatri–Rao product of matrices, the state feedback control (8) can be described in the following form:
w ( t ) = B z ( t ) ,
where B = B 1 B 2 B m L k m × k n is called the state feedback gain matrix. Thus, our objective becomes how to design the state feedback gain matrix B L k m × k n such that the robust consensus achieves.

3. Main Results

In this section, we firstly present a necessary and sufficient condition for the robust constrained reachability of NEGs with attackers and forbidden profiles, based on which we propose a constructive procedure to design the state feedback gain matrix B for the robust consensus of NEGs with attackers and forbidden profiles.
Firstly, we give the definition for the robust constrained reachability of NEGs with attackers and forbidden profiles, which is crucial to the robust consensus of NEGs.
Definition 2.
Consider the NEG (6) with attackers and forbidden profiles.
(i)
z d C z is said to be one step robustly reachable from z 0 C z , if there exists a control w Δ k m such that z d = L ξ w z 0 holds for any ξ Δ k q .
(ii)
A nonempty set Ω C z is said to be one step robustly reachable from z 0 C z , if there exist a control w Δ k m and z ξ Ω (depending on ξ) such that z ξ = L ξ w z 0 holds for any ξ Δ k q .
In the following, we present a criterion for the robust constrained reachability of NEGs with attackers and forbidden profiles.
Consider the NEG (6). Split L L k n × k m + n + q into k q blocks as
L = [ L 1 L 2 L k q ] ,
where L s L k n × k m + n , s = 1 , 2 , , k q . Split each L s into k m blocks as
L s = [ L s 1 L s 2 L s k m ] ,
where L s j L k n × k n , j = 1 , 2 , , k m .
Define
L ^ = [ L ^ 1 L ^ 2 L ^ k q ] R r × r k m + q ,
where L ^ s = [ L ^ s 1 L ^ s 2 L ^ s k m ] R r × r k m , and
L ^ s j = ( δ k n [ i 1 i 2 i r ] ) T L s j ( δ k n [ i 1 i 2 i r ] ) R r × r .
Obviously, L ^ s j is obtained from L s j by deleting all the elements in the rows and columns with indexes { 1 , 2 , , k n } \ { i 1 , i 2 , , i r } .
Lemma 1.
If δ k n i α = L s j δ k n i β , α , β { 1 , 2 , , r } , then δ r α = L ^ s j δ r β .
Proof. 
On one hand, it is easy to see from δ k n i α = L s j δ k n i β that ( δ k n [ i 1 i 2 i r ] ) T δ k n i α = ( δ k n [ i 1 i 2 i r ] ) T L s j δ k n i β . On the other hand, a simple calculation shows that
( δ k n [ i 1 i 2 i r ] ) T δ k n i α = δ r α
and
δ k n i β = δ k n [ i 1 i 2 i r ] δ r β .
Therefore, δ r α = L ^ s j δ r β . This completes the proof. ☐
Based on Definition 2 and Lemma 1, we have the following result on the robust constrained reachability of NEGs with attackers and forbidden profiles.
Theorem 1.
Consider the NEG (6) with attackers and forbidden profiles set C z .
(i)
z d = δ k n i α C z is one step robustly reachable from z 0 = δ k n i β C z , if and only if there exists a positive integer 1 j k m such that
s = 1 k q L ^ s j α , β = k q .
(ii)
A nonempty set Ω C z is one step robustly reachable from z 0 = δ k n i β C z , if and only if there exists a positive integer 1 j k m such that
s = 1 k q δ k n i α Ω L ^ s j α , β = k q .
Proof. 
We firstly prove conclusion (i).
(Necessity) Suppose that z d = δ k n i α C z is one step robustly reachable from z 0 = δ k n i β C z . Then, there exists a control w = δ k m j such that δ k n i α = L δ k q s δ k m j δ k n i β holds for any s = 1 , 2 , , k q . By Lemma 1, one can see that δ r α = L ^ s j δ r β holds for any s = 1 , 2 , , k q . Thus, ( L ^ s j ) α , β = 1 holds for any s = 1 , 2 , , k q , which implies that (14) holds.
(Sufficiency) Assuming that (14) holds for some integer 1 j k m , that is, ( L ^ s j ) α , β = 1 holds for any s = 1 , 2 , , k q , which implies that δ r α = L ^ s j δ r β holds for any s = 1 , 2 , , k q . Thus, ( δ k n [ i 1 i 2 i r ] ) δ r α = ( δ k n [ i 1 i 2 i r ] ) L ^ s j δ r β holds for any s = 1 , 2 , , k q . By the construction of L ^ s j , we can obtain that
( δ k n [ i 1 i 2 i r ] ) δ r α = Γ L s j ( δ k n [ i 1 i 2 i r ] ) δ r β ,
that is, δ k n i α = Γ L s j δ k n i β holds for any s = 1 , 2 , , k q , where
Γ : = ( δ k n [ i 1 i 2 i r ] ) ( δ k n [ i 1 i 2 i r ] ) T .
Noticing that only Γ δ k n i α = δ k n i α , one can see that
δ k n i α = L s j δ k n i β = L δ k q s δ k m j δ k n i β
holds for any s = 1 , 2 , , k q . By Definition 2, z d = δ k n i α C z is one step robustly reachable from z 0 = δ k n i β C z .
Next, we prove conclusion (ii).
(Necessity) Assuming that Ω is one step robustly reachable from z 0 = δ k n i β C z , then there exist a control w = δ k m j and z ξ = δ k n i α ( ξ ) Ω such that δ k n i α ( ξ ) = L δ k q s δ k m j δ k n i β = L s j δ k n i β holds for any ξ = δ k q s Δ k q . By Lemma 1, we know that δ r α ( ξ ) = L ^ s j δ r β holds for any s = 1 , 2 , , k q . Since C o l β ( L ^ s j ) is a logical vector, one can see that δ k n i α Ω L ^ s j α , β = 1 holds for any s = 1 , 2 , , k q , which implies that (15) holds.
(Sufficiency) Suppose that (15) holds for some integer 1 j k m . Since C o l β L ^ s j L r × 1 , we know that δ k n i α Ω L ^ s j α , β = 1 holds for s = 1 , 2 , , k q . Therefore, for each ξ = δ k q s Δ k q , there exists δ k n i α ( ξ ) Ω such that ( L ^ s j ) α ( ξ ) , β = 1 , which implies that δ r α ( ξ ) = L ^ s j δ r β holds for any ξ = δ k q s Δ k q . Thus, ( δ k n [ i 1 i 2 i r ] ) δ r α ( ξ ) = ( δ k n [ i 1 i 2 i r ] ) L ^ s j δ r β holds for any ξ = δ k q s Δ k q . By the construction of L ^ s j , we can obtain that
( δ k n [ i 1 i 2 i r ] ) δ r α ( ξ ) = Γ L s j ( δ k n [ i 1 i 2 i r ] ) δ r β ,
that is, δ k n i α ( ξ ) = Γ L s j δ k n i β holds for any ξ = δ k q s Δ k q , where Γ is given in (16). It is easy to see from Γ δ k n i α ( ξ ) = δ k n i α ( ξ ) and Γ δ k n i ρ δ k n i α ( ξ ) , ρ α ( ξ ) that
δ k n i α ( ξ ) = L s j δ k n i β = L δ k q s δ k m j δ k n i β
holds for any ξ = δ k q s Δ k q . By Definition 2, Ω is one step robustly reachable from z 0 = δ k n i β C z . This completes the proof. ☐
Based on the robust constrained reachability of NEGs with attackers and forbidden profiles, we inductively construct a series of robust reachable sets as follows. Let η n = δ k n c C z , where η Δ k and c is uniquely determined by η . For example, if η = δ k 1 , then c = 1 ; if η = δ k k , then c = k n . Define
Ω 1 ( η ) = { δ k n i α C z : there exists an integer 1 j k m such that s = 1 k q L ^ s j c , α = k q } ,
Ω γ ( η ) = { δ k n i α C z : there exists an integer 1 j k m such that s = 1 k q δ k n i α Ω γ 1 ( η ) L ^ s j α , α = k q } , γ 2 ,
where Ω 1 ( η ) represents the set of states that can robustly reach η n = δ k n c in one step, and Ω γ ( η ) is the set of states that can robustly reach Ω γ 1 ( η ) in one step. Then, based on a simple calculation, we have the following results.
Lemma 2.
If η n Ω 1 ( η ) , then Ω γ ( η ) Ω γ + 1 ( η ) holds for any γ Z + .
Lemma 3.
If η n Ω 1 ( η ) and there exists a positive integer γ such that Ω γ ( η ) = Ω γ + 1 ( η ) , then Ω χ ( η ) = Ω γ ( η ) holds for any integer χ γ .
Now, based on Lemmas 2 and 3, we give a sufficient condition for the robust consensus of NEGs with attackers and forbidden profiles.
Theorem 2.
The NEG (6) with attackers and forbidden profiles set C z achieves robust consensus at η Δ k , if there exists an positive integer 1 τ r such that
η n Ω 1 ( η ) , Ω τ ( η ) = C z .
Proof. 
Assuming that (19) holds, we prove that the NEG (6) with attackers and forbidden profiles set C z achieves robust consensus at η Δ k by constructing a state feedback gain matrix.
It is easy to see from η n Ω 1 ( η ) and Lemma 2 that Ω γ ( η ) Ω γ + 1 ( η ) holds for any γ = 1 , , τ 1 . For γ = 1 , 2 , , τ , let
Ω γ ( η ) = Ω γ ( η ) \ Ω γ 1 ( η ) ,
where Ω 0 ( η ) : = . Then, for γ 1 γ 2 { 1 , 2 , , τ } , Ω γ 1 ( η ) and Ω γ 2 ( η ) are disjoint sets. In addition, Ω τ ( η ) = C z implies that γ = 1 τ Ω γ ( η ) = C z . Therefore, for any integer 1 α r , there exists a unique integer 1 γ α τ such that δ k n i α Ω γ α ( η ) . We obtain the following two cases:
(i)
When γ α = 1 , there exists 1 σ α k m such that
s = 1 k q L ^ s σ α c , α = k q .
(ii)
When 2 γ α τ , there exists 1 σ α k m such that
s = 1 k q δ k n i α Ω γ α 1 ( η ) L ^ s σ α α , α = k q .
Set B = δ k m [ σ 1 σ 2 σ k n ] L k m × k n , where
σ l = σ α , if l = i α , α { 1 , 2 , , r } ; σ l { 1 , 2 , , k m } , otherwise .
Then, under the control w ( t ) = B z ( t ) , for any initial state z ( 0 ) = δ k n i α C z , it is easy to obtain that z ( γ α ; z ( 0 ) , w , ξ ) = η n holds for any { ξ ( t ) : t = 0 , 1 , , γ α 1 } Δ k q and any integer 1 α r . Since η n Ω 1 ( η ) , we can obtain that z ( t ; z ( 0 ) , w , ξ ) = η n holds for t τ , z ( 0 ) C z and { ξ ( t ) : t N } Δ k q , which implies that the NEG (6) with attackers and forbidden profiles set C z can achieve robust consensus at η under the control w ( t ) = δ k m [ σ 1 σ 2 σ k n ] z ( t ) . This completes the proof. ☐
Remark 1.
Based the proof of Theorem 2, one can design a state feedback control for the robust consensus of NEGs with attackers and forbidden profiles as follows:
(1)
Calculate Ω γ ( η ) , γ = 1 , 2 , , τ .
(2)
For any 1 α r which corresponds to a unique integer 1 γ α τ such that δ k n i α Ω γ α ( η ) , let 1 σ α k m be such that
s = 1 k q L ^ s σ α c , α = k q , γ α = 1 ; s = 1 k q δ k n i α Ω γ α 1 ( η ) L ^ s σ α α , α = k q , 2 γ α τ .
(3)
A state feedback gain matrix under which the NEG with attackers and forbidden profiles achieves consensus at η can be designed as B = δ k m [ σ 1 σ 2 σ k n ] , where
σ l = σ α , i f l = i α , α { 1 , 2 , , r } ; σ l { 1 , 2 , , k m } , o t h e r w i s e .
Finally, we prove that the condition (19) is also necessary for the robust consensus of NEGs with attackers and forbidden profiles.
Theorem 3.
If the NEG (6) with attackers and forbidden profiles set C z achieves robust consensus at η Δ k , then there exists an integer 1 τ r such that (19) holds.
Proof. 
Assume that the NEG (6) with attackers and forbidden profiles set C z achieves robust consensus at η Δ k . Then, one can obtain that
(i)
η n is one step robustly reachable from itself in one step.
(ii)
There exists a positive integer τ such that η n is robustly reachable from any z 0 C z at the τ -th step.
By Theorem 1, (17) and (18), conclusion (i) is equivalent to η n Ω 1 ( η ) , and conclusion (ii) is equivalent to Ω τ ( η ) = C z . Set τ be the smallest positive integer such that Ω τ ( η ) = C z . We prove that τ r .
In fact, η n Ω 1 ( η ) implies that | Ω 1 ( η ) | 1 . Now, we assume that | Ω γ ( η ) | γ holds for some integer 1 γ τ 1 . If | Ω γ + 1 ( η ) | < γ + 1 , and one can see from Ω γ ( η ) Ω γ + 1 ( η ) and | Ω γ ( η ) | γ that Ω γ ( η ) = Ω γ + 1 ( η ) . Thus, by Lemma 3, Ω γ ( η ) = Ω τ ( η ) = C z , which is a contradiction to the minimality of τ . Therefore, | Ω γ + 1 ( η ) | γ + 1 . By induction, | Ω γ ( η ) | γ holds for any integer 1 γ τ . When γ = τ , it is easy to see from r = | C z | = | Ω τ ( η ) | τ that τ r . This completes the proof. ☐
Remark 2.
Theorems 2 and 3 provide a necessary and sufficient condition for the robust consensus of NEGs with attackers and forbidden profiles. Compared with the computer simulation method (which is the main tool to study NEGs in the literature), the STP based theoretical framework avoids the blindness of finding a suitable control strategy. In addition, the STP based main results are easily operated via MATLAB.

4. An Illustrative Example

Consider an NEG consisting of five players, in which the set of players is denoted by N = { P 1 , P 2 , P 3 , P 4 , P 5 } and the network graph of the game is shown in Figure 2. The basic game of this NEG is the Boxed Pigs Game [14], whose payoff matrix is given in Table 3, where “Press” and “Wait” are denoted by “1” and “2”, respectively. Hence, all the players have the same strategy set S = { 1 , 2 } . In this NEG, P 4 is assumed to be a control, while P 1 is assumed to be an attacker. We suppose that P 1 , P 3 and P 5 denote small pigs, while P 2 and P 4 big pigs. Denote the strategies of P 1 , P 2 , P 3 , P 4 and P 5 at time t by x 1 ( t ) , x 2 ( t ) , x 3 ( t ) , x 4 ( t ) and x 5 ( t ) , respectively.
According to the SUR of this paper, we have the following evolutionary dynamic equations:
x 2 ( t + 1 ) = f 1 ( x 1 ( t ) , x 2 ( t ) , x 3 ( t ) , x 4 ( t ) , x 5 ( t ) ) , x 3 ( t + 1 ) = f 2 ( x 1 ( t ) , x 2 ( t ) , x 3 ( t ) , x 4 ( t ) , x 5 ( t ) ) , x 5 ( t + 1 ) = f 3 ( x 1 ( t ) , x 2 ( t ) , x 3 ( t ) , x 4 ( t ) , x 5 ( t ) ) ,
where f 1 , f 2 , f 3 are Boolean functions, which can be uniquely determined by the SUR.
Let “ δ 2 1 ” be the vector form of “1” and “ δ 2 2 ” be the vector form of “2”. Using the vector form of x j ( t ) , j = 1 , 2 , 3 , 4 , 5 and letting z ( t ) = x 2 ( t ) x 3 ( t ) x 5 ( t ) , w ( t ) = x 4 ( t ) , ξ ( t ) = x 1 ( t ) , by drawing a table like Table 2, we can obtain the algebraic form of the NEG as follows:
z ( t + 1 ) = L ξ ( t ) w ( t ) z ( t ) ,
where
L = δ 8 [ 1 1 1 1 8 8 8 5 4 1 1 1 8 8 8 8 1 1 1 5 8 5 5 5 4 4 4 5 8 8 8 8 ] .
For this example, we assume C z = { δ 8 1 , δ 8 3 } . Our objective is to design a state feedback control in the form of w ( t ) = B z ( t ) (if possible) such that the NEG with attacker ξ ( t ) = x 1 ( t ) and forbidden profiles set C z achieves robust consensus at η = δ 2 1 .
It is easy to see that
L ^ 1 1 = 1 1 0 0 , L ^ 2 1 = 1 1 0 0 , L ^ 1 2 = 0 1 0 0 , L ^ 2 2 = 0 0 0 0 .
Hence,
i = 1 2 L ^ i 1 1 , 1 = 2 , i = 1 2 L ^ i 1 1 , 2 = 2 ,
which together with (17) implies that Ω 1 ( η ) = C z . Therefore, by Theorem 2 and Remark 1, under the state feedback gain matrix
B = δ 2 [ 1 σ 2 1 σ 4 σ 5 σ 6 σ 7 σ 8 ] ,
where σ i { 1 , 2 } , i = 2 , 4 , 5 , 6 , 7 , 8 , the NEG with attacker ξ ( t ) = x 1 ( t ) and forbidden profiles set C z achieves robust consensus at η = δ 2 1 .

5. Conclusions

In this paper, we have considered the robust consensus of NEGs with attackers and forbidden profiles, and presented some new results. Based on the algebraic representation of NEGs with attackers and forbidden profiles, we have proposed a necessary and sufficient condition for the robust constrained reachability of NEGs, which is an effective tool for the robust consensus control design. In addition, by constructing a series of robust reachable sets, we have presented a constructive procedure to design state feedback controls for the robust consensus of NEGs with attackers and forbidden profiles.
It should be pointed out that one can check the robust consensus of NEGs based on the simulation from a table like Table 2. However, the simulation method may be somewhat blind. Compared with this classic method used in game theory, the STP based theoretical framework avoids the blindness of finding a suitable control strategy.

Acknowledgments

The authors would like to thank the reviewers for their constructive comments and suggestions which improved the quality of the paper.

Author Contributions

Yalu Li wrote the paper; Xueying Ding analyzed the data; Haitao Li contributed analysis tools.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Smith, J.M.; Price, G.R. The logic of animal conflict. Nature 1973, 246, 15–18. [Google Scholar] [CrossRef]
  2. Alexander, J.M. Random Boolean networks and evolutionary game theory. Philos. Sci. 2003, 70, 1289–1304. [Google Scholar] [CrossRef]
  3. Brown, J.S.; Vincent, T.L. A theory for the evolutionary game. Theor. Popul. Biol. 1987, 31, 140–166. [Google Scholar] [CrossRef]
  4. Nowark, M.A.; May, R.M. Evolutionary games and spatial chaos. Nature 1992, 359, 826–829. [Google Scholar] [CrossRef]
  5. Hauert, C.; Doebeli, M. Spatial structure often inhibits the evolution of cooperation in the snowdrift game. Nature 2004, 428, 643–646. [Google Scholar] [CrossRef] [PubMed]
  6. Li, Y.; Zhang, J.; Perc, M. Effects of compassion on the evolution of cooperation in spatial social dilemmas. Appl. Math. Comput. 2018, 320, 437–443. [Google Scholar] [CrossRef]
  7. Perc, M.; Jordan, J.; Rand, D.; Wang, Z.; Boccaletti, S. Statistical physics of human cooperation. Phys. Rep. 2017, 687, 1–51. [Google Scholar] [CrossRef]
  8. Santos, F.C.; Santos, M.D.; Pacheco, J.M. Social diversity promotes the emergence of cooperation in public goods games. Nature 2008, 454, 213–216. [Google Scholar] [CrossRef] [PubMed]
  9. Tembine, H.; Altman, E.; Azouzi, R.E.; Hayel, Y. Evolutionary game in wireless networks. IEEE Trans. Syst. Man Cybern. 2010, 40, 634–646. [Google Scholar] [CrossRef] [PubMed]
  10. Szolnoki, A.; Perc, M.; Danku, Z. Making new connections towards cooperation in the prisoner’s dilemma game. J. Funct. Anal. 2010, 21, 88–121. [Google Scholar]
  11. Perc, M.; Szolnoki, A.; Szabo, G. Restricted connections among distinguished players support cooperation. Phys. Rev. E 2008, 78, 066101. [Google Scholar] [CrossRef] [PubMed]
  12. Wang, Z.; Wang, L.; Szolnoki, A.; Perc, M. Evolutionary games on multilayer networks: A colloquium. Eur. Phys. J. B 2015, 88, 124. [Google Scholar] [CrossRef]
  13. Perc, M.; Szolnoki, A. Coevolutionary games—A mini review. Biosyst. 2010, 99, 109–125. [Google Scholar] [CrossRef] [PubMed]
  14. Cheng, D.; He, F.; Qi, H.; Xu, T. Modeling, analysis and control of networked evolutionary games. IEEE Trans. Autom. Control 2015, 60, 2402–2415. [Google Scholar] [CrossRef]
  15. Boyer, K.K.; Mcdermott, C. Strategic consensus in operations strategy. J. Oper. Manag. 1999, 17, 289–305. [Google Scholar] [CrossRef]
  16. Perc, M. Evolution of cooperation on scale-free networks subject to error and attack. New J. Phys. 2009, 11, 033027. [Google Scholar] [CrossRef]
  17. Sun, W.; Kong, X.; He, D.; You, X. Research on attack and deference in information security based on evolutionary game. Inf. Sci. 2008, 26, 1408–1412. [Google Scholar]
  18. Chassang, S.; Takahashi, S. Robustness to incomplete information in repeated games. Theor. Econ. 2011, 6, 49–93. [Google Scholar] [CrossRef]
  19. Shen, S.; Li, Y.; Xu, H.; Cao, Q. Signaling game based strategy of intrusion detection in wireless sensor networks. Comput. Math. Appl. 2011, 62, 2404–2416. [Google Scholar] [CrossRef]
  20. Agah, A.; Das, S. Preventing DoS attacks in wireless sensor networks: a repeated game theory approach. Int. J. Netw. Secur. 2007, 5, 145–153. [Google Scholar]
  21. Zhang, X.; Hao, Y.; Cheng, D. Incomplete-profile potential games. J. Frankl. Inst. 2017, in press. [Google Scholar] [CrossRef]
  22. Cheng, D.; Qi, H.; Li, Z. Analysis and Control of Boolean Networks: A Semi-Tensor Product Approach; Springer: London, UK, 2011. [Google Scholar]
  23. Cheng, D.; Qi, H.; Zhao, Y. An Introduction to Semi-Tensor Product of Matrices and Its Applications; World Scientific: Singapore, 2012. [Google Scholar]
  24. Li, H.; Zhao, G.; Meng, M.; Feng, J. A survey on applications of semi-tensor product method in engineering. Sci. China Inf. Sci. 2017, 61, 010202. [Google Scholar] [CrossRef]
  25. Lu, J.; Li, H.; Liu, Y.; Li, F. Survey on semi-tensor product method with its applications in logical networks and other finite-valued systems. IET Control Theory Appl. 2017, 11, 2040–2047. [Google Scholar] [CrossRef]
  26. Lu, J.; Zhong, J.; Huang, C.; Cao, J. On pinning controllability of Boolean control networks. IEEE Trans. Autom. Control 2016, 61, 1658–1663. [Google Scholar] [CrossRef]
  27. Chen, H.; Sun, J. Stability and stabilisation of context-sensitive probabilistic Boolean networks. IET Control Theory Appl. 2014, 8, 2115–2121. [Google Scholar] [CrossRef]
  28. Fornasini, E.; Valcher, M.E. Observability, reconstructibility and state observers of Boolean control networks. IEEE Trans. Autom. Control 2013, 58, 1390–1401. [Google Scholar] [CrossRef]
  29. Guo, Y.; Wang, P.; Gui, W.; Yang, C. Set stability and set stabilization of Boolean control networks based on invariant subsets. Automatica 2015, 61, 106–112. [Google Scholar] [CrossRef]
  30. Laschov, D.; Margaliot, M. A maximum principle for single-input Boolean control networks. IEEE Trans. Autom. Control 2011, 56, 913–917. [Google Scholar] [CrossRef]
  31. Li, F.; Tang, Y. Set stabilization for switched Boolean control networks. Automatica 2017, 78, 223–230. [Google Scholar] [CrossRef]
  32. Li, H.; Wang, Y.; Xie, L. Output tracking control of Boolean control networks via state feedback: Constant reference signal case. Automatica 2015, 59, 54–59. [Google Scholar] [CrossRef]
  33. Li, H.; Xie, L.; Wang, Y. On robust control invariance of Boolean control networks. Automatica 2016, 68, 392–396. [Google Scholar] [CrossRef]
  34. Li, H.; Song, P.; Yang, Q. Pinning control design for robust output tracking of k-valued logical networks. J. Frankl. Inst. 2017, 354, 3039–3053. [Google Scholar] [CrossRef]
  35. Liu, Y.; Chen, H.; Wu, B. Controllability of Boolean control networks with impulsive effects and forbidden states. Mathe. Methods Appl. Sci. 2014, 37, 1–9. [Google Scholar] [CrossRef]
  36. Meng, M.; Feng, J. Topological structure and the disturbance decoupling problem of singular Boolean networks. IET Control Theory Appl. 2014, 8, 1247–1255. [Google Scholar] [CrossRef]
  37. Xu, X.; Hong, Y. Matrix approach to model matching of asynchronous sequential machines. IEEE Trans. Autom. Control 2013, 58, 2974–2979. [Google Scholar] [CrossRef]
  38. Yang, M.; Li, R.; Chu, T. Controller design for disturbance decoupling of Boolean control networks. Automatica 2013, 49, 273–277. [Google Scholar] [CrossRef]
  39. Zhang, L.; Zhang, K. Controllability and observability of Boolean control networks with time-variant delays in states. IEEE Trans. Neural Netw. Learn. Syst. 2013, 24, 1478–1484. [Google Scholar] [CrossRef] [PubMed]
  40. Zhao, Y.; Cheng, D. On controllability and stabilizability of probabilistic Boolean control networks. Sci. China Inf. Sci. 2014, 57, 012202. [Google Scholar] [CrossRef]
  41. Zhong, J.; Lu, J.; Liu, Y.; Cao, J. Synchronization in an array of output-coupled Boolean networks with time delay. IEEE Trans. Neural Netw. Learn. Syst. 2014, 25, 2288–2294. [Google Scholar] [CrossRef] [PubMed]
  42. Zou, Y.; Zhu, J. Kalman decomposition for Boolean control networks. Automatica 2015, 54, 65–71. [Google Scholar] [CrossRef]
  43. Cheng, D. On finite potential games. Automatica 2014, 50, 1793–1801. [Google Scholar] [CrossRef]
  44. Guo, P.; Wang, Y.; Li, H. Algebraic formulation and strategy optimization for a class of evolutionary network games via semi-tensor product method. Automatica 2013, 49, 3384–3389. [Google Scholar] [CrossRef]
  45. Liu, X.; Zhu, J. On potential equations of finite games. Automatica 2015, 68, 245–253. [Google Scholar] [CrossRef]
  46. Zhu, B.; Xia, X.; Wu, Z. Evolutionary game theoretic demand-side management and control for a class of networked smart grid. Automatica 2016, 70, 94–100. [Google Scholar] [CrossRef]
Figure 1. Network graph of the NEG, where P 1 , P 2 and P 3 denote ordinary players, while P 4 and P 5 are control and attacker, respectively.
Figure 1. Network graph of the NEG, where P 1 , P 2 and P 3 denote ordinary players, while P 4 and P 5 are control and attacker, respectively.
Entropy 20 00015 g001
Figure 2. Network graph of the NEG, where P 1 , P 3 and P 5 denote small pigs, while P 2 and P 4 big pigs. P 1 and P 4 are assumed to be attacker and control, respectively.
Figure 2. Network graph of the NEG, where P 1 , P 3 and P 5 denote small pigs, while P 2 and P 4 big pigs. P 1 and P 4 are assumed to be attacker and control, respectively.
Entropy 20 00015 g002
Table 1. Payoff matrix of snowdrift game.
Table 1. Payoff matrix of snowdrift game.
x 1 \ x 2 12
1(3, 3)(2, 4)
2(4, 2)(0, 0)
Table 2. Payoffs → Dynamics of the NEG.
Table 2. Payoffs → Dynamics of the NEG.
Profile11111111112111211112211211112121122111222
c 1 65548440
c 2 66885544
c 3 68685454
c 4 65656565
c 5 66556555
f 1 12222112
f 2 11222111
f 3 12122111
Profile1211112112121211212212211122121222112222
c 1 65548440
c 2 66885544
c 3 54544040
c 4 84848484
c 5 55444544
f 1 11222122
f 2 11222122
f 3 21222221
Profile2111121112211212112221211212122122121222
c 1 65548440
c 2 55444400
c 3 68685454
c 4 54545454
c 5 88448844
f 1 12122212
f 2 22122222
f 3 12122212
Profile2211122112221212212222211222122222122222
c 1 65548440
c 2 55444440
c 3 54544040
c 4 40404040
c 5 44004400
f 1 11112222
f 2 11122122
f 3 11122212
Table 3. Payoff matrix of boxed pigs game.
Table 3. Payoff matrix of boxed pigs game.
x 1 \ x 2 12
1(1, 5)(−1, 9)
2(4, 4)(0, 0)

Share and Cite

MDPI and ACS Style

Li, Y.; Ding, X.; Li, H. Robust Consensus of Networked Evolutionary Games with Attackers and Forbidden Profiles . Entropy 2018, 20, 15. https://doi.org/10.3390/e20010015

AMA Style

Li Y, Ding X, Li H. Robust Consensus of Networked Evolutionary Games with Attackers and Forbidden Profiles . Entropy. 2018; 20(1):15. https://doi.org/10.3390/e20010015

Chicago/Turabian Style

Li, Yalu, Xueying Ding, and Haitao Li. 2018. "Robust Consensus of Networked Evolutionary Games with Attackers and Forbidden Profiles " Entropy 20, no. 1: 15. https://doi.org/10.3390/e20010015

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop