Systems and methods of resilient clock synchronization in presence of faults

Information

  • Patent Grant
  • 11509451
  • Patent Number
    11,509,451
  • Date Filed
    Thursday, February 25, 2021
    3 years ago
  • Date Issued
    Tuesday, November 22, 2022
    2 years ago
Abstract
The present disclosure provides an analytical framework to investigate judicious topology reweighting of radio networks of clocks, when distributed time transfer and synchronization are based on physical layers and subject to the presence of false timing signals. Protagonist clocks exchange timing information pairwise, which is modeled as clocks tending to follow the majority of their neighbors. Antagonist clocks inject false timing signals, thereby, influencing the timing synchronization of (some of) the other protagonist clocks they meet. A class of pursuit-evasion graphical games subject to complete state observations and exploitation of phase noise disturbances, is proposed in designing clock steering protocols for resilient time metrologies that will be immune to erroneous timing signals injected into remote time dissemination networks.
Description
TECHNICAL FIELD

The present disclosure generally relates to


BACKGROUND

The progress of high precise and accurate time transfer over large distances is closely related to the development of satellite communication technology. Both inter-satellite and terrestrial-satellite time transfer and synchronization rely on the underlying specific concepts of operations. Thus, the state-of-the-art tools for time transfer analysis and the methods for synchronization are generally accustomed and tailored approaches to a small number of problems of interest, Much of network effects pertaining to large-scale clock steering operations, energy efficiency, and robust, performance for mutual synchronization are largely missing, let alone in potential denied environments of having persistent and competing timing faults and misinformation spreads. Concerning larger networks with multiple constellations of timescales, it will likely be necessary to have more analytical frameworks and design principles not only to balance between total energy consumption, network stability, and time convergence but also to tolerate churns, due to clocks joining or leaving the network.







DETAILED DESCRIPTION

The present disclosure provides an analytical framework to investigate judicious topology reweighting of radio networks of clocks, when distributed time transfer and synchronization are based on physical layers and subject to the presence of false timing signals. Protagonist clocks exchange timing information pairwise, which is modeled as clocks tending to follow the majority of their neighbors. Antagonist clocks inject false timing signals, thereby, influencing the timing synchronization of (some of) the other protagonist clocks they meet. A class of pursuit-evasion graphical games subject to complete state observations and exploitation of phase noise disturbances, is proposed in designing clock steering protocols for resilient time metrologies that will be immune to erroneous timing signals injected into remote time dissemination networks.


Distributed synchronization in wireless communications is being subject to a growing diversity of threats, in part due to the pervasive integration of device-to-device communications, ad-hoc, and internet of things. Potential threats, whether deliberate or not, may have wide impacts on systematic biases and/or spread of misinformation across time difference of measurement data by multiple sensors [1], carrier and phase synchronization of distributed beamforming and space-time coding [2] and [3]. Adaptive control-theoretic approaches and resilience mechanisms are promising for circumvent threat impacts in networked multi-agent systems. Indeed, much work is underway in securing cyber-physical systems and networks [4]-[6].


In the context of packet and physical-layer based timing synchronization [7]-[11], information about the mutual timing synchronization is dispersed but can be easily misled by non-cooperative timing sources for various rational or irrational reasons. The main contribution of the work is to develop mathematical fundamentals and theoretical core technology for a proof-of-concept, in which multi-agent pursuit-evasion games have multiple protagonist and antagonist clocks competitively interacting on communications networks. An immediate application of the results here could be on the deployment of clock and timescale adjustments to enable resilient time metrologies despite of some clocks intentionally or unintentionally operate in disruptive manners.


This work is related to a large and growing multi-agent graphical game literature [12]-[13].Most of the previous works focus on protagonist and antagonist interactions among agents networked by communications graphs and computational complexity dependent only on local neighborhoods. None of the findings as previously stated, considers distributed topology designs towards aggregation of information and spread of misinformation influenced by re-weighting of network edges, which may be conceived as realistic implementations to dampen the spread of misinformation and balance edge weights for aggregation of information. Relative to these efforts, this study introduces transmitting signal powers received as dynamic selections of interconnection (edge) weights, proposes random transmit selection to address concerns of total energy efficiency and network scalability, and gives insights into new conceptual tools such as discrete-time linear-quadratic dynamic games for characterizing timing synchronization in the presence of antagonist interactions.


The Concept of a Radio Clock Network: A graphical game framework that allows formal modeling of adversarial behavior on networks of radio-limited clocks separated by large distances, is investigated. Each clock is regarded as an agent interchangeably, who has an attitude state with a certain degree of cooperation or defection. For instance, pursuit-evasion graphical games consider two opposing teams of networked agents; e.g., one Evader team E of protagonist agents that exchange clock pulses, thereby, leading to the formation of more accurate timing beliefs, and one Pursuer team P of antagonist agents that work together for spread of misinformation about timing.


Protagonist and Antagonist Graphs: For a systematic analysis, FIG. 1 illustrates the basic concept for the radio clock network. Furthermore, enabled through the use of time-varying communications graphs, such shared timing information can be made feasible. There are NX clocks in each team X and X=E, P. Each clock has its own independently operated local oscillator (LO) using an identical loop filter, εX(z)εX together with different free-oscillation frequencies







{

1

T
k
X


}


k
=
1


N
X






arising from random frequency offsets around a nominal value.


Timing pulse exchange between clocks or agents are resulted from bilateral communications enabled by a sequence of weighted undirected graphs custom characterX(n)(custom characterX,custom characterX(n),wX(n)) with a common vertex set custom characterX={1, . . . , NX}, a subset of custom characterX×custom characterXsatisfying (k, k)∈custom characterX(n) for all k ∈custom characterX, and the map wX:custom characterX×Ncustom characterR+(the nonegative real line) associating to each arc (k, l) of custom characterX(n) a strictly positive weight wklX(n). Each synchronization cycle n∈N is assumed to be larger than radio propagation and signal processing delays, which is necessary for preparation of the clock state transmission, interrogation by the LO measurements, and correction of the LO according to the measurement feedback.


Random Transmission, Local Views, and Coupling Factor: A central question for distributed pulse-coupled synchronization is to understand potential tradeoff between total energy consumption versus the synchronization locking time under the sequence of communication graphs (custom characterXcustom characterX(n)) and X=E, P. A first step towards developing and analyzing a framework for providing answers to this question is to consider a random transmit selection, with which the clock k and k∈custom characterX randomly decides transmitting a timing pulse at its local time tkX(n), and thereby, is postulated as a random variable for any given feedback cycle n∈N











Prob
X

(
x
)

=

{




1
-

β
k
X





x
=

Tx


mode







β
k
X




x
=

Rx


mode










(
1
)








where 0<βlX<1 and X=E, P denotes the selection factor and thus, defined as the probability that the clock or agent k is in the reception mode of its pulse signals. To prevent the clock from being unstable, an immediate need is to assign a rest period right after the pulsing of a signal, where the radio receiver of clock or agent k is shut off and all the timing signals arriving within this period are ignored.


Though this is a convention, since as stated above, a random indicator at the period n∈N characterizing random transmit selection by the agent k, is given by











I
k
X

(
n
)



{



0




with


probability


1

-

β
k
X






1



with


probability




β
k
X

.










(
2
)







Apart from the random transmit selection according to its indicator IkX(n), it is necessary to maintain knowledge of dispersed timing information, through which local clock neighbors of the clock k transmitting signal pulses; e.g.,












I
_

n
X

(
n
)



{



1




if




I
k
X

(
n
)


=
0





0




if




I
k
X

(
n
)


=
1.









(
3
)







In addition, larger views have a strong effect, in terms of reduction of synchronization errors. At the clock feedback cycle n, the interaction by the agent k with its neighbors can perturb the periodic pattern of its state function as it is explained in the view size; or equivalently, the set Neighbors ({k},custom characterX(n)) is defined as the set of clocks i∈custom characterX\{k}such that (i, k) ∈custom characterX(n) and where {k} denotes the singleton k.


In essence, for any clock or agent k from team X and X=E, P at the nth period, the ideal pulse-coupled oscillator model receives, in an interval of duration Tk around its local clock tick tkX(n) a combination ΔtkX(n+1) of the pulse waveforms transmitted by other agents or clocks:













t
k
X

(

n
+
1

)

=



t
k
X

(
n
)

+


ε
X


Δ



t
k
X

(

n
+
1

)


+

T
k
X

+


v
k
X

(
n
)







(
4
)













Δ



t
k
X

(

n
+
1

)


=




I
k
X

(
n
)




"\[LeftBracketingBar]"


Neighbors
(


{
k
}

,


𝒜
X

(
n
)


)



"\[RightBracketingBar]"



·




i


Neighbors

(


{
k
}

,


𝒜
X

(
n
)


)







I
_

i
X

(
n
)





w
ki
X

(
n
)

[



t
i
X

(
n
)

-


t
k
X

(
n
)


]








(
5
)








where vkX(n) depicts phase noise, and is assumed here to be a random process with independent identically distributed scalar with zero mean and given variance σkX. The local coupling coefficients wkiX, as noted, are selected so that wkiX(n)>0 and Σi∈Neighbors({k}custom characterX(n))wkiX(n))=1. In a sense, the selection of the coupling coefficients wkiX(n):











w
ki
X

(
n
)





p
ki
X

(
n
)





j


Neighbors

(


{
k
}

,


𝒜
X

(
n
)


)





p
kj
X

(
n
)







(
6
)








captures the abstraction of clocks meeting pairwise, within which time differences measured over low power channels should be weighted less when updating the clock. In addition, the actual power pkiX(n) of the timing pulse received by clock k transmitted from clock i is governed by













p
ki
X

(
n
)

=



p
i
X

(
n
)







"\[LeftBracketingBar]"


h
ki



"\[RightBracketingBar]"


2



d
ki
γ

(
n
)




;

X
=
E


,
P




(
7
)








where pi(n) denotes the power of the transmitted pulse signal, hki defined by the standard complex normal distribution CN(0, 1) is the quasi-static Rayleigh fading channel, dki(n) is the clock distance, and γ denotes the path loss exponent.


For simplicity, there is an additional innocuous assumption, where potential convergence properties of (4)-(5) are investigated under network frequency synchrony, implying that all the clocks share the same period TX=T1X=. . . =TNXX. Therefore, the state of any clock k can be updated

tkX(n)=nTXkX(n)   (8)

where τkX(n) is the timing phase with 0≤τkX(n)<TX. Consequently, it is also insightful to examine the social network of pulse-coupled synchronization (4)-(5) in view of (8) under frequency synchrony conditions; e.g.,
















τ
k
X

(

n
+
1

)

=



τ
k
X

(
n
)

+


ε
X


Δ



τ
k
X

(

n
+
1

)


+


v
k
X

(
n
)













(
9
)













Δ



τ
k
X

(

n
+
1

)


=




I
k
X

(
n
)




"\[LeftBracketingBar]"


Neighbors
(


{
k
}

,


𝒜
X

(
n
)


)



"\[RightBracketingBar]"



·




i


Neighbors

(


{
k
}

,


𝒜
X

(
n
)


)







I
_

i
X

(
n
)





w
ki
X

(
n
)

[



τ
i
X

(
n
)

-


τ
k
X

(
n
)


]








(
10
)








where |⋅| denotes the cardinality of the enclosed set of neighboring clocks of clock k.


Multi-Agent Dynamics: To understand the progress that is being made in implementing multi-agent dynamics, it is first necessary to characterizing each kth clock from team X and X=E, P at the nth period by a real state variable xkX(n) and an input ukX(n). Expressed in these local coordinates, the phases τkX(n) and measures of disagreement ΔτkX(n−1) of the distributed physical-layer synchronization (9)-(10) become
















x
k
X

(

n
+
1

)

=



x
k
X

(
n
)

+


ε
X




u
k
X

(
n
)


+


v
k
X

(
n
)













(
11
)














u
k
X

(
n
)

=




I
k
X

(
n
)




"\[LeftBracketingBar]"


Neighbors
(


{
k
}

,


𝒜
X

(
n
)


)



"\[RightBracketingBar]"



·




i


Neighbors

(


{
k
}

,


𝒜
X

(
n
)


)







I
_

i
X

(
n
)





w
ki
X

(
n
)

[



x
i
X

(
n
)

-


x
k
X

(
n
)


]








(
12
)








wherein a remark on the present model (11) is in order. Future and updated value of any clock in the network is a convex combination of its current value, as well as current values of its neighbors. Therefore, it is clear that the step size εX should be properly set to maintain convexity property or contraction characteristic of (11). To this end, for system stability, εX is appropriate in the range of 0<εX<1.


In this setting, the provision of Bernoulli random distributions will form an important part of the background for local views of selecting transmit clocks, in the set of cu gently active ones. Therefore, from a distributed synchronization viewpoint, a dock be indeed present in many of the local views of other docks exchanging thus, a number of pulse signals per period. By defining the notation custom characterX Neighbors({k},custom characterX(n))∪{k} for all neighbors of agent k, including itself, the cardinality of custom characterXas NkX, the vector containing the timing phases of custom characterX as xcustom characterX(n)[x1X(n), . . . , xNkXX(n)], and the vector of phase points vz←XX(n)[v1X(n), . . . , vNkXX(n)], the collective dynamics of the pulse-coupled discrete time synchronization (12) can be expressed as the stochastic difference equation

xcustom characterXX(n−1)=Acustom characterxX(n)xcustom characterXX(n)+vcustom characterXX(n)  (13)

where Acustom characterX(n) is a NkX×NkX matrix such that its elements [A custom characterXX(n) ]ii=1−εXon the main diagonal and








[


A

𝒩
k
X

X

(
n
)

]

ki

=



ε
X





I
k
X

(
n
)




"\[LeftBracketingBar]"


Neighbors
(


{
k
}

,


𝒜
X

(
n
)


)



"\[RightBracketingBar]"







I
_

k
X

(
n
)




w
ki
X

(
n
)



for


i



k
.






By construction, the matrix Acustom characterXX(n) in team X and X=E, P is nonnegative and stochastic due to the fact that the sum of the elements on each row sums to one. The expectation E {xcustom characterXX(n)} behaves as the deterministic discrete-time case; i.e., phase noise-free, where the aspects of the ergodic analysis and products of stochastic matrices in (13) are matters of critical importance for the stability properties of the multiagent systems with time-dependent communication links.


Standard Interference Functions: Of considerable concern are the facts that both necessary and sufficient conditions for the convergence of all the immediate neighbors from the local view custom characterX of team X and X=E, P together with agent k to a common value as n getting large, depend not only on the connectivity properties of the sequence of communication graphs but also on the associated weight functions. In effect, the received pulse signal power levels can be used as weighting factors. Essentially this striking feature of recent practice involves being able to improve network manageability, namely via judicious topology reweighting.


To this end, immediate neighbor i may update its weights on its out-going links wkiX(n) as described in (6), if agent custom character can receive pulse signal and/or information from agent i. For simplicity, the channel gain of agent i to agent custom character in team X and X=E, P that is available through channel estimation, is denoted as hkiX(n) at the period n. At agent custom character, the received pulse signal power of agent i is hkiX(n)piX(n) while the local network interference seen by agent i at agent custom character is Σj∈custom characterXhkjX(n)pjX(n)+σkX(n) where σkX(n) denotes the receiver noise power at agent custom character. Henceforth, under power vector pcustom characterXX(n)[p1X(n), . . . , pnlXX(n)], the signal-to-interference-plus-noise ratio (SINR) of agent i at agent custom character is piX(n)μkiX(pcustom characterXX) provided that











μ
ki
X

(

p

𝒩
k
X

X

)






h
ki
X

(
n
)






j



𝒩
k
X


\


{
i
}







h
ki
X

(
n
)




p
j
X

(
n
)



+


σ
k
X

(
n
)



.





(
14
)







Moreover, it is also worth noting that











μ
ki
X



(

p

𝒩
k
X

X

)


=



h
ki
X

(
n
)




R
ki
X

(

p

𝒩
k
X

X

)

-



h
ki
X

(
n
)




p
i
X

(
n
)








(
15
)








where RkX(pcustom characterXXj∈custom characterXhkjX(n)pjX(n)+σkX(n) denotes the total pulse power received at agent custom character of team X and X=E, P. It is plausible to view the power emission of agent i knowing only its own uplink gains and the total power received at each agent custom character.


As far as perceived the above background is concerned, it is appropriate to relate more closely at this point that, the interfering signals at clocks custom characterand custom character′ appear to clock i as independent noises. That said, the maximal ratio combining of the received pulse signals for clock i in team X and X=E, P at all its immediate neighboring clocks custom charactercustom characterX, yields an SINR constraint for clock or agent of the form












p
i
X

(
n
)






k



𝒩
i

X





μ
ki
X

(

p

𝒩
i
X

X

)







γ
i
X

(
n
)

.





(
16
)








Or, equivalently, for each n∈N











p
i
X

(
n
)





I
i
X

(

p

𝒩
i
X

X

)





γ
i
X

(
n
)



Σ

k


𝒩
i
X






μ
ki
X

(

p

𝒩
i
X

X

)








(
17
)








where the desired SINR custom character(n) for clock i in team X is embedded in the interference function IiX(pcustom characteriXX).


A more detailed review of the interference function IiX(pcustom characteriXX) is the property of positivity; i.e., IiX(pcustom characteriXX)>0 due to a nonzero background receiver noise. Also relevant is Σl∈custom characteriXμkiX(pcustom characteriX)≤Σk∈custom characteriXμkiX(pcustom characteriX) when pcustom characteriXX≥{acute over (p)}custom characteriXX. Thus, it follows that IiX(pcustom characteriXX≥IiX({acute over (p)}custom characteriXX) for any given custom character(n) and n∈N. In other words, the interference function IiX(pcustom characteriXXsatisfies the monotonicity property. And indeed, another observation of








i
α




μ
ki
X

(

p


𝒩

i

X

X

)


<


μ
ki
X

(


α

p



𝒩

i

X

X

)






for all α>1, which leads to the fact of αIiX(pcustom characteriXX)>IiX(αpcustom characteriXX). As such, the interference function IiX(pcustom characteriXX) further satisfies the scalability property. In this regard, if clock i has acceptable connections with its neighborhood custom characteriX under power vector pcustom characteriXX(n), then it will even have higher quality connections when all powers of custom characteriX are scaled up uniformly.


With all the measures such as positivity, monotonicity, and scalability, IiX(pcustom characteriXX) is considered as standard. If pcustom characteriXX is a feasible power vector satisfying the constrain (17), then iterations of IiX,(m)(pcustom characteriXX) yields a monotone decreasing sequence of feasible power vectors that converges to a unique fixed point pcustom characteriXX,* Furthermore, only when IiX(pcustom characteriXX) is feasible and for any initial power vector pcustom characteriXX, can the sequence of IiX,(m)(pcustom characteriXX) be expected to be monotonically increasing, thereby converging to the fixed point pcustom characteriXX,*. In essence, it is desirable in practice that clocks may have limited power emissions.


Mean-Square Stability Analysis: In relation to the weighted average wkix(n) governed by (6) of the residual difference (also known as the convex hull) of timing phases as measured with respect to other clocks or agents in team X and X=E, P, there exist real numbers emax≥emin>0, these bounds must then be placed in the context of the coupling or clustering coefficients of clocks or agents; e.g., emin≤wkiX(n)≤emax for all n∈N, building on the results presented above. Against these premises, the equilibrium point is mean-square stable if for any given initial state xcustom characterX(n0), Θcustom characterX(n)E{xcustom characterX(n)(xcustom characterX(n))T}is well defined for any n∈N, and








lim

n






Θ

𝒩
k
X

X

(
n
)


<


.






With that said, one can easily see the proof as follows)

Θcustom characterX(n+1)=Acustom characterX(nz,86 X(n)(Acustom characterX(n))Tcustom character  (18)

where for all n∈N, E{vz,86 X(n)(vz,86 X(n))T}=Σcustom characterXδ(0) and Σcustom characterX=diag (σ1X, . . . , σNkXX).


As noted previously, the result (13) can then be rewritten in a vector form; e.g.,

veccustom characterX(n+1))=Acustom characterX(n)⊗Acustom characterX(n)veccustom characterX(n)) +vec custom characterX)   (19)

where ⊗ denotes the Kronecker product of matrices and vec{⋅} represents the vectorize operator of enclosed matrices. Consequently, the mean-square stabilization of (19) is equivalent to the mean-square stabilization of

veccustom characterX(n+1))=Acustom characterX(n)⊗Acustom characterX(n)veccustom characterX(n))   20)

whose discrete-time solution is given by

veccustom characterXX(n+1) =(Acustom characterXX(n)⊗Acustom characterXX(n))(n+1−n0)veccustom characterXX(n0))   (21)

According to the algebraic graph theory, all the eigenvalues of Acustom characterXX(n) and n∈N associated with the cluster custom characterX of the clock or agent k in team X are found to be less than 1, and thus, the mean-quare stabilization is concluded herein.


Interference Averaging and Cluster Dynamics: Among variables influencing clocks or agents' transmit powers are inaccurate power measurements, the needed powers Iik(pcustom characterXX) are a vital resource to support the standard interference averaging power control iteration as follows:

pcustom characterXX(n+1)=πcustom characterXX(n)+(1−πcustom characterXX)Icustom characterXX(pcustom characterXX(n))   (22)

where Icustom characterXX(pcustom characterXX(n))[I1X(pcustom characterXX(n)), . . . , Icustom characterXX(pcustom characterXX(n))] is associated with the local view or neighborhood custom characterX of clock k in team X and X=E, P . Notice that IjX(pcustom characterXX(n)) denotes the effective interference of other clocks that clock j must overcome. The constant πcustom characterXX associated with the cluster custom characterX of clock or agent k is 0≤πcustom characterXX<1.


At each step of this iterative procedure, clock or agent j in team X and X=E,P is assigned to its cluster or local view custom character at which its SINR is attained. Using these local views custom character and j=1, . . . , NkX to receive the clock pulse signal of clock or agent j, the standard interference averaging power control iteration can be rewritten as:

pcustom characterXX(n+1)=Acustom characterXX,p(n)pcustom characterXX(n)+Bcustom characterXX,p(n)uz,87 XX(n)   (23)

where the power system coefficients are defined by A Xcustom characterXX,p(n)πcustom characterXXINkX×NkX and








B

𝒩
k
X


X
,
p


(

n
)




(

1
-

π

𝒩
k
X

X


)





diag
(


1


Σ

k


𝒩
1
X






μ

k

1

X

(


p

𝒩
k
X

X

(
n
)

)



,


,



1


Σ

k


𝒩

N
k

X






μ

k


N
k
X


X

(


p

𝒩
k
X

X

(
n
)

)




)

.






When effectively countering potential misbehaving clocks, the control variables ucustom characterX(n)[custom character1X(n), . . . , custom characterNlXX(n)]T are carefully designed to maintain appropriate qualities of communication link closures and to establish reliable grounds for time synchronization.


Protagonist and Antagonist Interactions: From the perspective of “no man is an island”, a main insight is that mutual timing synchronization is vulnerable to attacks; i.e., protagonist clocks are not immune from disruption by false timing injection from antagonist docks. Protagonist and antagonist interactions are now modeled as a multi--team adversarial system consisting of two opposing teams, each of them described by protagonist clocks or evaders custom characterE and antagonist clocks or pursuers custom characterP.


Specifically, the clock or agent i's state in each team evolves according to the dynamical equation (13). Communications between custom characterE and custom characterP teams are further described by a time-variant bipartite graph custom characterEP(n)=(custom charactere, custom characterP, EEP, custom characterEP(n)), where custom characterE={1, . . . , NE} and custom characterP={1, . . . , NP} are the sets of vertices, custom characterEPcustom characterE×custom characterP is the set of arcs, and custom characterEP(n) is the time-varying weighted adjacency matrix of custom characterEP(n). The (i,j)th entry of custom characterEP(n), [custom characterEP]ij(n), is nonzero if and only if at the period n∈N and for some antagonist agent j and j∈custom characterP, there is an arc (i, j)∈custom characterEp for some i∈custom characterE, implying that antagonist agents can observe other protagonist agents. Also relevance about the pursuit-evasion graph custom characterEP(n) are the in-degree matrix custom characterinEP(n) and the out-degree matrix custom characteroutEP(n).


Moreover, it is worthwhile noticing that the power pijEP(n) received at protagonist clock or agent i transmitted from antagonist clock or agent j at the period n is given by











p
ij
EP

(
n
)





G

i
,
j
,
Tx

P



G

i
,
j
,
Rx

E



λ
j
2





(

d

i
,
j

EP

)

2



(
n
)






p
j
P

(
n
)





(
24
)








where pjP(n) is the false timing signal power transmitted by the antagonist clock or agent j at the period n and whereas Gi,j,TxP is the antagonist clock or agent j's transmitter gain towards the direction of the protagonist clock or agent i, Gi,j,RxE is the protagonist clock or agent i's receiver gain towards the direction of the antagonist clock or agent j, λj denotes the carrier wavelength of the antagonist clock or agent j's false timing signal, and dijEP(n) is the distance between the opposing clocks or agents.


The edge weights [custom characterEP]ij(n) are chosen by the normalized power; e.g.,











[

𝒜
EP

]

ij



(
n
)





p
ij
EP

(
n
)





j


𝒩
i
EP





p
ij
EP

(
n
)







(
25
)








where custom characterEP denotes the cluster of antagonist clocks of the protagonist clock i, whose interactions between pairs of agents belonging to different teams are antagonistic.


Specifying Objectives and. Attributes: Throughout the present disclosure, the time-variant, weighted, and undirected graphs custom characterX(n) and X=E,P, describing the protagonist and antagonist relationships among agents, are presumably connected. In graph theoretic terms, the Laplacian matrix associated with the adjacency matrix custom characterX(n) defined as LX(n)=CX(n)−custom characterX(n), where CX (n) is the diagonal connectivity matrix, whose diagonal entries are the sums of the corresponding row entries of custom characterX(n); i.e.,

[CX]ii(n)=Σ(i,j)∈EX[custom characterX]ij(n), for all i∈[1, NX].


Under the mean-square stabilizability on the state-space model (21) describing the dynamics of each agent, team decision making for the interplay between individual agent protagonist and antagonist behaviors is next developed both in terms of random transmit selections and in terms of the weights of the “cooperative and sabotage interactions” among clocks. For illustration, multiple antagonist clocks tend to attract to other antagonist clocks and to the protagonist clocks that they can connect, whose local neighborhood tracking errors are given by











e

x
i
P

P

(
n
)

=





k



𝒩
i

P







[

𝒜
P

]

ki




(
n
)

[



x
k
P

(
n
)

-


x
i
P

(
n
)


]



+




j



𝒩
i

E







[

𝒜
EP

]

ji




(
n
)

[



x
j
E

(
n
)

-


x
i
P

(
n
)


]








(
26
)







Likewise, the cluster of protagonist clocks attract to other protagonist clocks yet seek to avoid antagonist clocks;











e

x
j
E

E

(
n
)

=





l


𝒩
j
E







[

𝒜
E

]

jl




(
n
)

[



x
l
E

(
n
)

-


x
j
E

(
n
)


]



+




i


𝒩
j
P







[

𝒜
EP

]

ji




(
n
)

[



x
i
P

(
n
)

-


x
j
E

(
n
)


]








(
27
)








Upon defining the cluster tracking error vectors








e

X

𝒩
i
P


P

(
n
)

[



e

X
1
P

P

(
n
)

,


,


e


X
P


N
i
P


P

(
n
)


]





and









e

X

𝒩
j
E


E

(
n
)

[



e

X
1
E

E

(
n
)

,


,


e


X
E


N
j
E


E

(
n
)


]

.





Then, it is straightforward to show

exNPP(n)=−[LP(n)+DinEP(n) ]xNP(n) custom characterEP(n) xNEE(n)   (28)
exNEE(n)=−[LE(n)−custom characteroutEP(n)]zNE(n) −(custom characterEP(n))TxNPP(n)   (29)


At this point, each antagonist clock with uip(n) minimizes its duster neighborhood tracking errors and energy consumption and whereas each protagonist clock with ujE(n) desires to make the tracking errors observed by antagonist clocks large and forces antagonist clocks to expend more energy. More precisely, these social behavior can be captured in a multi-attribute payoff associated with protagonist cluster NE and antagonist cluster NP, and thereby, relatively straightforward expressed in a simple quadratic functional











J


𝒩
P

,

𝒩
E



(

n
0

)

=




n
=


n
0

+
1


N



L

(

n
,


x

𝒩
P

P

(
n
)

,


x

𝒩
E

E

(
n
)

,


u

𝒩
P

P

(

n
-
1

)

,


u

𝒩
E

E

(

n
-
1

)


)






(
30
)








where n0 is the smallest element of the decision making horizon I={n0, . . . , N} and the payoff function L:I×RNP×RNE×RNP×RNE is given by

L(n,xPcustom characterp(n),xEcustom characterE(n),uPcustom characterP(n−1),uEcustom characterE(n−1)) (ePxcustom characterP(n))TRP−1(n)ePxcustom characterP(n)−(eExcustom characterE(n))TRE−1(n)eExcustom characterE(n) +(uPcustom characterP(n−1))TRP(n−1)uPcustom characterP(n−1) −(uEcustom characterE(n−1))TRE(n−1)uEcustom characterE(n−1)   (31)

and the selective weights RP(n) and RE(n) are positive definite, bounded and symmetric; whereas for UX(n){uXcustom characterX(n0),uXcustom characterX(n0+1), . . . , uXcustom characterX(n)}and VX(n){vXcustom characterX(n0),vXcustom characterX(n0+1), . . . , vXcustom characterX(n)}, the unique solutions xXcustom charactersX(n)xXcustom characterX(n;n0,xXcustom characterX(n0);UX(n−1),VX(n−1) satisfying the cluster dynamics shown in (13) and (23); e.g.,

XXcustom characterX(n+1)=AXcustom characterX(n)xXcustom characterX(n)+vXcustom characterX(n);X=E,P   (32)
PXcustom characterX(n+1)=AX,pcustom characterX(n)PXcustom characterX(n)+BX,pcustom characterX(n)uXcustom character(n)   (33)


Pursuit-Evasion Graphical. Games: Next it is critical to embark upon the multi-team adversarial systems that describe cluster dynamics of custom characterX interacting clocks or agents in opposing teams X and X=E,P, where antagonist team P purposefully wishes to influence protagonist tear P with its misinformation on timing. More formally, the multi-team dynamical systen for competitive time synchronization among protagonist and antagonist clocks is formed by aggregating (32) and (33) and for n∈I

z(n+1)=A(n)z(n)+BP(n)up(n)+BE(n)uE(n) +G(n)w(n);z(n0)   (34)

where zT(n)[XPcustom characterP(n),xEcustom characterE(n),PPcustom characterP(n),PEcustom characterE(n)]is the aggregate system state, uP(n)uPcustom characterP(n) is the cluster decision strategy of antagonist clocks, uE(n)uEcustom characterE(n) is the cluster decision strategy of protagonist clocks, and wT(n)[vPcustom characterP(n),vE custom characterE(n)] is the actuation noise sequence of identically distributed, zero mean independent Gaussian variables with covariance matrix given by QWding(Σpcustom characterPEcustom characterE). And the aggregate system coefficients are defined by

A(n)ccccSPcustom characterP(n) 00 0
0AEcustom characterE(n) 00
00 AP,pcustom characterP(n)0
00 0AE,pcustom characterE(n);
BP(n)c0
0
BP,pcustom characterP(n)
0; BE(n)c0
0
0
BE,pcustom characterE(n);
GT(n)cccc0 0I 0
00 0I.


Further let

T11(n)(LP(n)+custom characterinEP(n))TRP−1(n)(LP(n)+custom characterinEP(n)) +custom characterEP(n)RE−1(n)(custom characterEP(n))T T12(n)−(LP(n)+custom characterin EP)TRP−1(n)AEP(n) +custom characterEP(n)RE−1(n)(LE(n)−LoutEP(n)) T22(n)(custom characterEP(n))TRP−1(n)custom characterEP(n) +(LE(n)−custom characteroutEP(n))TRE−1(n)(LE(n)−custom characteroutEP(n))

then, the payoff function (31) can be rewritten as

L(n,z(n),uE(n),uE(n))=zT(n)Q(n−1)z(n) +uTP(n−1)RP(n−1)uP(n−1) −eET(n−1)RE(n−1)uE(n−1)   (35)

where the bounded symmetric matrix Q(n) is given by

Q(n)cccT(n)0 0
00 0
00 0; T(n)ccT11(n)T12(n)
T12T(n)T22(n)


Lastly, the payoff (30) in the final form of











J


𝒩
P

,

𝒩
E



(

n
0

)

=




n
=


n
0

+
1


N


[




z
T

(
n
)



Q

(

n
-
1

)



z

(
n
)


+



u
P
T

(

n
-
1

)




R
P

(

n
-
1

)




u
P

(

n
-
1

)


-







u
E
T

(

n
-
1

)




R
E

(

n
-
1

)




u
E

(

n
-
1

)



]






(
36
)








is a random variable and consequently the first of its statistical moments must be selected for optimization.


By construction, the matrices APcustom characterP(n), AEcustom characterE(n), AP,pcustom characterE(n), and AE,pcustom characterE(n) are invertible. Consequently, the matrices [A(n)−λI,BP(n)]and [A(n)−λI, BE(n)] have full row rank for all λ∈C0+. In other words, both (A(n), BP(n)) and (A(n), BE(n)) are individually stabilizable. In particular, it also implies that (A(n), [BP(n), BE(n)]) is also stabilizable. Thus, for any initial state z(n0), there exist pursuit-evasion strategies based on edge weights such that the solution of the dynamical game described by (34.) is stabilizable.


Stochastic Linear-Quadratic Gaines: In the sequel, the application of the theory of dynamic games tcresilient synchronization of protagonist and antagonist timing transfers is considered. The analysis is motivated by the widespread of information available across protagonist and antagonist clock clusters and more explicitly, both opposing teams are aware of the dynamic parameters of the discrete-time linear-quadratic dynamic game; e.g., (A(n), BP(n), BE(n)); the payoff functional parameters (Q(n), RP(n), RE(n)); and the planning horizon I; during the game, at time instant n, n=n0, n0+1, . . . , N, both teams have access to the system state z(n).


Recall that payoff uncertainty is introduced by allowing the dynamics of the subject game to be perturbed by the phase noises of the Gaussian process type, meaning that the payoff (36) is now a random number. When the influence of the process noise sequence W(n){n0, n0+1, . . . , n} is taken into account, this defines an expectation denoted by Ew(n){⋅} for the payoff functional










J

(



{


u
P

(
n
)

}


n
=

n
0



N
-
1


,



{


u
E

(
n
)

}


n
=

n
0



N
-
1


;

z

(

n
0

)



)

=


E
w





{




n
=

n
0



N
-
1



[




z
T

(

n
+
1

)



Q

(
n
)



z

(

n
+
1

)




u
P
T

(
n
)




R
P

(
n
)




u
P

(
n
)


-



u
E
T

(
n
)




R
E

(
n
)




u
E

(
n
)



]


}

.






(
37
)







Under the assumption of complete state information, the bulk of the following analysis characterizes the value function denoted by Vn(z(n)), where z(n) is satisfying (34) and n=n0,n0+1, . . . . ,N−1. In particular, one can set up the dynamic programming recursion and











V
N

=


(

z

(
N
)

)

=
0







V
n

(

z

(
n
)

)

=


min


u
P

(
n
)




max


u
E

(
n
)




E

w

(
n
)





{




z
T

(

n
+
1

)



Q

(
n
)



z

(

n
+
1

)


+



u
P
T

(
n
)




R
P

(
n
)




u
P

(
n
)


-



u
E
T

(
n
)




R
E

(
n
)




u
E

(
n
)


+


V

n
+
1


[



A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)



]


}

.









(
38
)







Intuitively, the value function associated with the subject game is quadratic in the state and has therefore has the form

Vv(z(n))=zT(n)P(n)z(n)+p(n)   (39)

where P(n) are real, symmetric matrices and p(n) are scalars. It is seen that the substitution of (39) into the dynamic programming recursion (38) yields the boundary conditions P(N)=0 and p(N)=0.


Moreover, it is particularly relevant to observe that













z
T

(
n
)



P

(
n
)



z

(
n
)


+

p

(
n
)


=


min


u
P

(
n
)



max


u
E

(
n
)



E

w

(
n
)





{




u
P
T

(
n
)




R
P

(
n
)




u
P

(
n
)


-



u
E
T

(
n
)




R
E

(
n
)




u
E

(
n
)


+



[



A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)


+


G

(
n
)



w

(
n
)



]

T







[


Q

(
n
)

+

P
(


n
+
1

)


]


[




A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)


+


G

(
n
)



w

(
n
)



]

+

p

(

n
+
1

)





}

.






(
40
)








Or equivalently, it follows that













z
T

(
n
)



P

(
n
)



z

(
n
)


+

p

(
n
)


=


min


u
P

(
n
)



max


u
E

(
n
)




{




u
P
T

(
n
)




R
P

(
n
)




u
P

(
n
)


-



u
E
T

(
n
)




R
E

(
n
)




u
E

(
n
)


+




[



A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)



]

T

[



Q

(
n
)

+

P

(

n
+
1

)


]

[




A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)



]

+

Tr


{




G
T

(
n
)

[


Q

(
n
)

+

P

(

n
+
1

)


]



G

(
n
)



Q
W


}


+

p

(

n
+
1

)


}

.






(
41
)







Next, based on the analysis in [14], the forward recursive matrix-valued equation for


P(n) is similarly obtained, and thereby, summarized as follows

P(n+1)=AT(n){P(n)−P(n)[BP(n)SB−1(P(n))BPT(n) +BP(n)SB−1(P(n))BPT(n)P(n)BE(n)[RE(n) −BET(n)P(n)BE(n)]−qBET(n)−BET(n)+BE(n)[RE(n) −BET(n)P(n)BE(n)]−1Bphd ET(n)P(n)BP(n)SB−1(P(n))BPT(n) +BE(n)[RE(n)−BET(n)P(n)BE(n)]−1BET(n)P(n)BP(n) ⋅SB−1(P(n))BPT(n)P(n)BE(n)[RE(n)−BET(n)P(n)BE(n)]−1BET(n)+BE(n)[BET(n)P(n)BE(n)−RE(n)]−1BET(n)]⋅P(n)}A(n)+Q(n)   (42)

and

SB−1(P(n))BPT(n)P(n)BP(n)+RP(n)+BPT(n)P(n)BE(n) ⋅[RE(n)−BET(n)BE(n)]−1BET(n)P(n)BP(n)   (43)

where the initial condition


In turn, the scalar forward recursive equation can be shown together with the initial condition p(n0)=0

p(n+1)=p(n)+Tr{GT(n)P(n)G(n)QW}.   (44)


In view of (42) and (43), it can be easily inferred that a necessary and sufficient condition for the existence of a solution P(n), and thereby, a solution to the discrete-time linear-quadratic dynamic game (34) is given by

RP(n)+BPT(n)P(n)BP(n)>0   (45)
RE(n)>BET(n)P(n)BE(n).   (46)


Consequently, the value of the subject protagonist and antagonist team dynamic game is given by

V0(z(n0))=zT(n0)[P(N)−Q(N)]z(n0).   (47)


Clock Steering with Complete State Observations: Briefly, the closed-form solutions to the discrete-time linear-quadratic dynamic game are obtained as follows. Protagonist clocks have access to the state z(n) at decision instant n. They then adapt short-term actions, i.e., SINRs (23) for iterative power emissions in accordance with the self-enforcing decision policy for “evasion” effects

uE*(n)=[RE(n)−BET(n)P(N−n−1)BE(n)]−1 BET(n) ⋅{I−P(N−n−1)BP(n)SB−1(P(N−n−n 1))BPT(n) ⋅{I+P(N−n−1)BE(n)[RE(n)−BET(n)P(N−n−1)BE(n)]−1⋅[BET(n)]}P(N−n−1)A(n)z(n)   (48)


Moreover, dynamic distributed reweighting for resilient time synchronization is protagonist clocks' long-term objective, whose success depends on unavoidable counter-measures by antagonist clocks. In fact, antagonist clocks exploit the available information, including z(n) to inject misinformation about timing signals by means of the pursuit decision strategy for “sabotage purposes”; e.g.,

uP8(n)=−SP−1(P(N−n−1))BPT(n){I+P(N−n−1) ⋅BE(n)[RE(n)−BET(n)P(N−n−1)BE(n)]−1BE(n)}⋅P(N−n−1)A(n)z(n).   (49)


Clock Steering with Knowledge of State Observations and Phase Noise Disturbances: A discussion of other relevant solutions for solving stochastic dynamic games would not be complete without mentioning potential impacts of the knowledge of environmental disturbances and uncertainties. As before, protagonist and antagonist clocks do have complete state information. In addition, the sample realizations of the random variable w(n) associated with the clock phase noises, are known and available at decision instant n for clock steering. As such, protagonist and antagonist clocks all agree on the fact that they are not only competing against each other, but simultaneously also against technological limitations.


Similar to the analysis in [14], a general trend is to consider the expectation after the optimization operation for the dynamic programming recursion; i.e











V
n

(

z

(
n
)

)

=


E

w

(
n
)





{



min


max




u
P

(
n
)





u
E

(
n
)






{




z
T

(

n
+
1

)



Q

(
n
)



z

(

n
+
1

)


+



u
P
T

(
n
)




R
P

(
n
)




u
P

(
n
)


-



u
E
T

(
n
)




R
E

(
n
)




u
E

(
n
)


+


V

n
+
1


[



A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)


+


G

(
n
)



w

(
n
)



]


}


}

.






(
50
)







The prior discussion emphasized the relevance of the value function that is quadratic in the state; e.g.,

Vn(z(n))=zT(n)P(n)z(n)+p(n)   (51)

which goes hand in hand with the process of













z
T

(
n
)



P

(
n
)



z

(
n
)


+

p

(
n
)


=


E

w

(
n
)





{



min


max




u
P

(
n
)





u
E

(
n
)






{




u
P
T

(
n
)




R
P

(
n
)




u
P

(
n
)


-



u
E
T

(
n
)




R
E

(
n
)




u
E

(
n
)


+




[



A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)


+


G

(
n
)



w

(
n
)



]

T


[


Q

(
n
)

+

P

(

n
+
1

)


]

[



A

(
n
)



z

(
n
)


+



B
P

(
n
)




u
P

(
n
)


+



B
E

(
n
)




u
E

(
n
)


+


G

(
n
)



w

(
n
)


+


G

(
n
)



w

(
n
)



]

+

p

(

n
+
1

)


}


}

.






(
52
)







Given this outlook, the optimal strategies for clock steering resulted from the optimization in (52) and the exploitation of inherent clock phase noise uncertainty, are obtained as follows. They are being deployed by protagonist and antagonist clocks to anticipate for the element of surprise.

uP*(n)=−SP−1(P(N−n−1))BPT(n){I+P(N−n−1) ⋅BE(n)[RE(n)−BET(n)P(N−n−1 ) BE(n)]−1BE(n)}⋅P(N−n−1)[A(n)z(n)+G(n)w(n)].   (53)

and

uE*(n)=[RE(n)−BET(n)P(N−n−1) BE(n)]−1BET(n) ⋅{I−P(N−n−1)BP(n)SB−1(P(N−n−1))BPT(n) ⋅[I+P(N−n−1)BE(n)[RE(n)−BET(n)P(N−n−1)BE(n)]−1 ⋅BET(n)]}P(N−n−1)[A(n)z(n)+G(n)w(n)].   (54)


Detection and Localization of Compromised Clocks: As an attempt in identifying misbehaving clocks, standard deviations σNk(n) of the clocks can be used; e.g.,










σ
2




𝒩
k

(
n
)



1

N
k







i
=
1

Nk




[



z
i

(
n
)

-


1

N
k







k
=
1

Nk




z
k

(
n
)




]

2






(
55
)








for analyzing situations, in which they measure how far a clock k deviates from the “wisdom of crowds” of its neighbors, custom character and custom character=|≡Nk. To this end, this sort of cyber-attack indicators for clock k characterizes the extent its timing signals dispersed from the proper consensus with respect to its social network, and thereby, determining whether it is likely influenced by malicious and/or compromised clocks.


Conclusions: The present innovation has presented an analysis on physical-layer time synchronization in ad-hoc wireless networks, which employed coupled discrete-time oscillators corrupted by phase noises together with the assumption that these protagonist clocks were able to communicate with other nearby clocks. Bernoulli timing pulse arrival patterns were assumed, which allowed identification or discovery of peer clocks to not only act as random choice of neighbors and peer sampling, but also to address important concerns for total energy efficiency and network scalability. Mean-square stabilization and time-varying graph theoretics were used to facilitate the stability analysis of clusters of protagonist or protagonist clocks.


Intricate interactions via clock pulse power transmissions among remote clocks were observed and analyzed for positivity, monotonicity, and scalability, and thereby, leading to a framework for understanding of the convergence of common power controls. Also related to reweight the time synchronization network was the values of the SINRs for transmissions, which were further optimized to ensure acceptable connections in the presence of interferences caused by friendly neighboring clocks.


A further consideration was that sentient intruders, meaning that antagonist clocks could potentially inject false timing signals into the network synchronization dynamics of interest. The main tool for investigating the susceptibility of the spread of misinformation about timing signals was the class of discrete-time linear-quadratic dynamic games. In particular, the expected payoff for distributed time synchronization network was employed as an effective measure for the cluster of protagonist docks to dynamically reweight the interaction topology, and thereby, reducing the effect of the false timing signals on the synchronization network.


Unique to resilient time synchronization under antagonist interactions, proper power controls for the weights on the edges of the network governed by evasion policies with complete state feedback observations could help protagonist clocks maintaining residual timing errors below a given level while making the tracking errors observed by antagonist clocks large and forcing them to expend more energy. Unquestionably, nearly all distributed time synchronization has revolved around uncertain physical processes, i.e., phase noises. Therefore, the exploitation of the knowledge of environmental disturbances, from which the sample realizations of clock phase noises were taken into account, was significant for resilient consensus and persistent spread of misinformation. Interestingly, the value function provided a guarantee to the antagonist clocks; that is, as long as they keep their optimal play. Otherwise, the actually realized payoff would be better off for the protagonist clocks.


To achieve computational tractability of distributed pulse coupled synchronization, further work will be focused on time-scale separation arising from clustering. For instance, multiple tune-scale properties of the distributed synchronization network are utilized for potential decomposition for a set of smaller, numerically tractable cluster-level sub-problems.


The following references cited above are hereby incorporated by reference in their entirety.


[1] D. Li, K.D. Wong, Y.H. Hu, and A.M. Sayeed, “Detection, Classification, and Tracking of Targets,” IEEE Signal Processing Magazine, Vol. 19. No. 2, pp. 17-29, 2002


[2] J.N. Laneman and G.W. Wornell, “Distributed Space-Time Coded Protocols for Exploiting Cooperative Diversity in Wireless Neworks,” IEEE Transactions on Information Theory, Vol. 49, No. 10, pp. 2415-2425, 2003


[3] R. Mudumbal, J. Hespanha, and U. Madhow, “Scalable Feedback Control for Distributed Beamforming in Sensor Networks,” Proceedings of IEEE int'l Symposium on Information Theory, pp. 137-141, 2005


[4] H. LeBlanc, H. Zhang, S. Sundaram, and X. Koutsoukos, “Consensus of Multi-agent Networks in the Presence of Adversaries Using Only Local Information,” Proceedings of the 1st International Conference on High Confidence Networked Systems, pp. 1-10, 2012


[5] M. Thu and S. MartAnez, “On Distributed Constrained Formation Control in Operator†“Vehicle Adversarial Networks,” Automatica, Vol. 49, No. 12, pp. 3571-3582, 2013


[6] G.D. Torre, T. Yucelen, and JD. Peterson, “Resilient Networked Multiagent Systems: A Distributed Adaptive Control Approach,” 53th IEEE Conference Decision and Control. pp. 5367-5372. 2014


[7] F. Sivrikaya and B.F. Yener, “Time Synchronization in Sensor Networks: A Survey,” IEEE Network, Vol. 18, No. 4, pp. 45–50, 2004


[8] E. Sourour and M. Nakagawa, “ Mutual Decentralized Synchronization for Iltitervehicle Communications.†IEEE Transactions on Vehicular Technology, Vol. 48, No. 6, pp. 2015-2027, 1999


[9] D. Lucarelli and I-J Wang, “ Decentralized Synchronization Protocols with Nearest Neighbor Communication, †in Proceedings of ACM SenSys 2004, 2004


[10] Y.-W. Hong, and A. Scaglione, “A Scalable Synchronization Protocol for Large Scale Sensor Networks and Its Applications,” IEEE Journal on Selected Areas in Comm., Vol. 23, No. 5, pp. 1085-1099, 2005


[11] O. Simeone, U. Spagnolini, G, Scutari, and Y, Bar-Ness, “Physical-layer Distributed Synchronization in Wireless Networks and Applications,” Physical Communication, pp. 67-83, 2008


[12] K.G. Va voudakis, F.L. Lewis, and G.R. Hudas, “Multi-Agent Differential Graphical Games: Online Adaptive Learning Solution for Synchronization with Optimality,” Automatica, Vol. 48, No. 8, pp. 1598-1611, 2012


[13] M. Abouheaf, K. Vamvoudakis, F.L. Lewis, S. Haesaert, and R. Babuska, “Multi-Agent Discrete-Time Graphical Games and Reinforcement Learning Solutions,” Automatica, Vol. 50, no. 12, pp. 3038-3053, 2014


[14] M. Pachter and K. Pham, “Discrete-Time Linear-Quadratic Dynamic Games,” Journal of Optimization Theory and Applications, Edited by A. Miele, Vol. 146, No. 1, pp. 151-179, 2010


By virtue of the foregoing disclosure, it should be appreciated with the present innovation relates to radio controlled timing metrology, methods of performing distributed time synchronization and correct-by-design yet risk-averse clock steering in the presence of timing faults and misinformation and a judicious network topology adaptation for carrying out such methods.


A radio controlled time metrology is consisted of a radio wireless communication network of a plurality of distributed pulse coupled discrete-time clocks supported by the corresponding distributed discrete-time phase lock loops using identical loop filters and different free-oscillation frequencies arising from random frequency offsets. Associated with the the distributed network with radio clocks is a reconfigurable topology being modelled as a sequence of weighted undirected graphs. Methods of iterative risk-averse clock steering, distributed time synchronization, and judicious topology adaptation such that: in nominal conditions, distributed radio clocks autonomously exchange timing pulse signals with each other, each of the clock self-directly performing timing sharing with risk-averse power control and reliably receiving of its neighboring timing signals; and in case of experiencing timing faults and misinformation spreads, time synchronization, clock steering and topology adaptation are protected by risk-averse decision making via pursuit-evasion game-theoretic optimization operations.


In one or more embodiments, the present innovation can be used and applied to a multitude of applications requiring time comparison with high precision and accuracy over large distances; e.g., distributed synchronization in wireless communications; universal time metrology with intercontinental links to connect major time keeping laboratories in North America, Europe and Japan; high precision and high accuracy time transfer and synchronization for robust positioning, navigation and timing.


According to aspects of the present disclosure, network topology of radio clocks is adapted to choose effective clock steering operations in the presence of persistent and competing timing faults and misinformation spreads. The present innovation also optimizes topology dynamisms in terms of power controls distributed among incumbent clocks as needed to achieve resilient time synchronization. As such, the synchronization of radio networks of clocks tackling both scalability and energy efficiency issues of stochastically synchronizing clocks is to embrace a distributed paradigm in which randomly selected clocks transmits its synchronizing signals in some periods while in others listen to the signals received by other clocks according to via Bernoulli distributions.


According to one of the embodiments of the invention, intricate interactions via clock pulse power transmissions among the clocks are observed and analyzed for positivity, monotonicity, and scalability, and thereby, leading to the framework for understanding of the convergence of common power controls. Also related to reweight the time synchronization network was the values of the signal-to-interference-plus-noise ratios (SINRs) for transmissions, which are then optimized to ensure acceptable connections in the presence of interferences caused by friendly neighboring clocks.


Another embodiment of the disclosure considers the event of sentient intruders, meaning that adversarial clocks could potentially inject false timing signals into the incumbent network of time transfers and synchronizations. Another object of the present invention is a method of investigating the susceptibility of the spread of misinformation about timing signals comprising the class of discrete-time linear-quadratic dynamic games. In particular, the expected payoff for distributed time synchronization network is employed as an effective measure for the cluster of the clocks to dynamically reweight the interaction topology, and thereby, reducing the effect of the false timing signals from ill-behaved clocks on the synchronization network.


An object of the present innovation is a radio controlled time metrology comprising: (i) a network of distributed clocks; (ii) a radio frequency communication network interconnecting the clocks; (iii) a plurality of discrete-time clocks composed of distributed discrete-time phase lock loops with the identical loop filters and different free-oscillation frequencies; and (iv) analog frontends and digital signal processing means to transmit and receive clock pulse signal powers. Characterized in that it further comprises control means for steering the clocks and network topology adjustment such that: in nominal conditions, a subset of radio clocks exchange timing data with neighboring clocks situated within the coverage area, each of the clock autonomously implementing its random transmit and receive selection, allocating its transmit powers for timing pulses based on interference average power control iterations, and assigning rest periods right after the pulsing of timing signals, and each of the clock contributing to local coupling and network topology adjustments when time differences to be scaled appropriately in accordance of channel qualities, and in the event of timing faults and/or misinformation spreads, clock steering operations are switched from interference average power control interactions to risk hedging and anticipative countermeasures for clock steering via the framework of pursuit-evasion graphical games for worst-case distributed time synchronization.


Yet another object of the innovation is unique to resilient time svnchronizatian under adversarial encounter interactions caused by ill-behaved clocks comprising: (i) proper power controls for the weights on the edges of the network governed by evasion policies for clock steering operations with complete state feedback observations could help well-intent clocks maintaining residual timing errors below a given level while making the tracking errors observed by ill-behaved clocks large and forcing them to expend more energy; (ii) the exploitation of the prior knowledge of environmental disturbances, from which the sample realizations of clock phase noises are taken into account for resilient consensus and persistent spread of misinformation; and (iii) the value funs ion provided the best possible performance to the malicious docks; that is, as long as they keep their optimal play. Otherwise, the actually realized payoff would be better off for the incumbent clocks.


An exemplary radio network of coupled discrete-tithe oscillators corrupted by phase noises together with the operational assumption that these the clocks are able to communicate with other nearby clocks. Mean-square stabilization and time-varying graph theoretic constructs are feasible to facilitate the stability analysis of clusters of incumbent and/or ill-behaved clocks.


The different embodiments of the innovation carefully design clock steering operations supported by interference averaging powe iterations from the physical layer perspective for learningwl adaptation to maintain appropriate qualities of conrrxrunication link closure for distributed time transfers and to establish reliable grounds for mutual time synchronization in cases of effectively compensating and/or countering potential misbehaving clocks. The functional block diagram of adversarial encounters of timing misinformation spreads according to the invention, showing in particular the application of the theory of dynamic games to resilient synchronization of well-intent clocks in the presence of misbehaving timing transfers. Both tractable analysis and competitive engagements are motivated by the widespread of information available across well-intent and misbehaving clock clusters and more explicitly, both opposing teams are aware of the dynamic parameters of the discrete-time linear-quadratic dynamic game, and thus influencing time synchronization errors and convergent rates. Resilient clock steering policies for well-intent clocks are anticipative and risk hedging that are enabled by self-enforcing equilibrium decision strategies and resulted from the dynamic game and thus, no need to wait for misinformation spreads happening first.


Mass production of small earth stations; e.g., the so-called very small aperture terminals (VSAT's) and direct broadcast satellites employing higher frequencies (Ku-and Ka-bands rather than C-band) and more directional satellite antennas (spot beams) are best suited for timing measurements of high precision and accuracy. It is now feasible for time keeping institutions to set up dedicated low-cost on-site earth stations with receive and- transmit capability without reliance on the stringent requirement of colocation.


Other uses for the invention are near real-time command control of global navigation satellite systems (GNSS), enabling agile support of the warfighter tot include the abilities to correct misleading information on positioning, navigation and timing; rekey specific crypto nets; and leverage multi-input multi-output antenna characteristics and radio/optical transceiver systems. Resilient time synchronization will therefore enable multi-GNSS constellations to be controlled from one ground antenna and thus, eliminating the need for overseas stations.


Additional information is provided in APPENDIX-A, attached hereto, the contents of which are hereby incorporated by reference in its entirety.


While the disclosure has been described with reference to exemplary embodiments, it will be understood by those skilled in the art that various changes may be made and equivalents may be substituted for elements thereof without departing from the scope of the disclosure. In addition, many modifications may be made to adapt a particular system, device or component thereof to the teachings of the disclosure without departing from the essential scope thereof. Therefore, it is intended that the disclosure not be limited to the particular embodiments disclosed for carrying out this disclosure, but that the disclosure will include all embodiments falling within the scope of the appended claims. Moreover, the use of the terms first, second, etc. do not denote any order or importance, but rather the terms first, second, etc. are used to distinguish one element from another.


In the preceding detailed description of exemplary embodiments of the disclosure, specific exemplary embodiments in which the disclosure may be practiced are described in sufficient detail to enable those skilled in the art to practice the disclosed embodiments. For example, specific details such as specific method orders, structures, elements, and connections have been presented herein. However, it is to be understood that the specific details presented need not be utilized to practice embodiments of the present disclosure. It is also to be understood that other embodiments may be utilized and that logical, architectural, programmatic, mechanical, electrical and other changes may be made without departing from general scope of the disclosure. The following detailed description is, therefore, not to be taken in a limiting sense, and the scope of the present disclosure is defined by the appended claims and equivalents thereof.


References within the specification to “one embodiment,” “an embodiment,” “embodiments”, or “one or more embodiments” are intended to indicate that a particular feature, structure, or characteristic described in connection with the embodiment is included in at least one embodiment of the present disclosure. The appearance of such phrases in various places within the specification are not necessarily all referring to the same embodiment, nor are separate or alternative embodiments mutually exclusive of other embodiments. Further, various features are described which may be exhibited by some embodiments and not by others. Similarly, various requirements are described which may be requirements for some embodiments but not other embodiments.


It is understood that the use of specific component, device and/or parameter names and/or corresponding acronyms thereof, such as those of the executing utility, logic, and/or firmware described herein, are for example only and not meant to imply any limitations on the described embodiments. The embodiments may thus be described with different nomenclature and/or terminology utilized to describe the components, devices, parameters, methods and/or functions herein, without limitation. References to any specific protocol or proprietary name in describing one or more elements, features or concepts of the ebodiments are provided solely as examples of one implementation, and such references do not limit the extension of the claimed embodiments to embodiments in which different element, feature, protocol, or concept names are utilized. Thus, each term utilized herein is to be given its broadest interpretation given the context in which that terms is utilized.


The terminology used herein is for the purpose of describing particular embodiments only and is not intended to be limiting of the disclosure. As used herein, the singular forms “a”, “an” and “the” are intended to include the plural forms as well, unless the context clearly indicates otherwise. It will be further understood that the terms “comprises” and/or “comprising,” when used in this specification, specify the presence of stated features, integers, steps, operations, elements, and/or components, but do not preclude the presence or addition of one or more other features, integers, steps, operations, elements, components, and/or groups thereof.


The description of the present disclosure has been presented for purposes of illustration and description, but is not intended to be exhaustive or limited to the disclosure in the form disclosed. Many modifications and variations will be apparent to those of ordinary skill in the art without departing from the scope of the disclosure. The described embodiments were chosen and described in order to best explain the principles of the disclosure and the practical application, and to enable others of ordinary skill in the art to understand the disclosure for various embodiments with various modifications as are suited to the particular use contemplated.

Claims
  • 1. A radio controlled time metrology comprising: a network of distributed clocks;a radio frequency communication network interconnecting the clocks;a plurality of discrete-time clocks composed of distributed discrete-time phase lock loops with identical loop filters and different free-oscillation frequencies;analog frontends and digital signal processing means to transmit and receive clock pulse signal powers;a controller for steering the clocks and network topology adjustment such that: a subset of radio clocks exchange timing data with neighboring clocks situated within the coverage area, each of the clock autonomously implementing its random transmit and receive selection, allocating its transmit powers for timing pulses based on interference average power control iterations, andassigning rest periods right after the pulsing of timing signals, and each of the clock contributing to local coupling and network topology adjustments when time differences to be scaled appropriately in accordance of channel qualities, andin the event of timing faults and/or misinformation spreads, clock steering operations are switched from interference average power control interactions to risk hedging and anticipative countermeasures for clock steering via the framework of pursuit-evasion graphical games for worst-case distributed time synchronization.
CROSS-REFERENCE TO RELATED APPLICATIONS

This application claims the benefit of priority under 35 U.S.C. § 119(e) to U.S. Provisional Application Ser. No. 62/982,889 entitled “Resilient Synchronization of Radio Networks of Clocks,” filed 28-Feb.-2020, the contents of which are incorporated herein by reference in their entirety.

STATEMENT REGARDING FEDERALLY SPONSORED RESEARCH OR DEVELOPMENT

The invention described herein was made by employees of the United States Government and may be manufactured and used by or for the Government of the United States of America for governmental purposes without the payment of any royalties thereon or therefore.

US Referenced Citations (1)
Number Name Date Kind
20100254311 Simeone Oct 2010 A1
Non-Patent Literature Citations (19)
Entry
K. D. Pham, “Resilient Synchronization of Radio Networks of Clocks: A Pursuit-Evasion Graphical Game Approach,” IEEE Aerospace Conference, Big Sky, MT, 2019.
“Resilient Synchronization of Radio Networks of Clocks: A Pursuit-Evasion Graphical Game Approach”, Invited Presentations, the Washington DC and Northern Virginia Chapter, Arlington, VA, Feb. 13, 2018.
K. D. Pham, “Resilient Synchronization of Radio Networks of Clocks: A Pursuit-Evasion Graphical Game Approach,” EEE Aerospace Conference, Big Sky, MT, 2019.
K. D. Pham, “Coordination and Consensus over Networks: A Risk-Averse Protocol,” IFAC Networked & Autonomous Air and Space Systems, Santa Fe, NM, 2018.
K. D. Pham, “Resilient Synchronization of Radio Networks of Clocks: A Pursuit-Evasion Graphical Game Approach”, Invited Presentations, the Washington DC and Northern Virginia Chapter, Arlington, VA, Feb. 13, 2018.
61588-2009—IEC/IEEE International Standard—Precision Clock Synchronization Protocol for Networked Measuremenl and Control Systems.
E. Lisove et al., “Game theory applied to secure clock synchronization with IEEE 1588,” 2016 IEEE International Symposium on Precision Clock Synchronization for Measurement, Control, and Communication (ISPCS), Sep. 4-9, 2016.
G. Giorgi et al., “Performance Analysis of Kalman-Filter-Based Clock Synchronization in IEEE 1588 Networks,” IEEE Transactions on Instrumentation and Measurement (vol. 60, Issue: 8, Aug. 2011) pp. 2902-2909 Date of Publication: Jun. 27, 2011.
H. Song et al., “Attack-resilient time synchoronization for wireless sensor network,” Ad Hoc Networks, vol. 5/Iss. 1 (2007) 112-125.
K. Sun et al., “Secure and resilient clock synchronization in wireless sensor networks,” IEEE J. Selected Areas of Comm., vol. 24/lss 2 (2006) 395-408.
R. Tan et al., “Resilience Bounds of Sensing-Based network Clock Synchronization,” 2018 2018 IEEE 24th International Conference on Parallel and Distributed Systems (ICPADS), Dec. 11-13, 2018.
K. F. Hasan et al., “Time synchronization in vehicular ad-hoc networks: A survey on theory and practice.” Vehicular Comm., vol. 14 (2018) 39-51.
L. Han et al., “A dstributed time synchronization solution without satellite time reference for mobile communications,” IEEE Comm Lett, vol. 17/Iss. 7 (2013) 1447-1450.
B. Wang et al., “Precise and continuous time and frequency synchronization at the 5x10A-19 accuracy level,” Scientific Reports 2, 556 (2012).
K. G. Shin et al., Clock synchronization of a large multiprocessor system in the presence of malicious faults, IEEE Transactions on Computers, vol. C36/Iss. 1 (1987) 2-12.
Y. Kikuya et al., “Resilient clock synchronization over unreliable channels in WSNs,” 2017 IEEE 56th Annual Conference on Decision and Control (CDC), Dec. 12-15, 2017.
L. Lamport et al., “Synchronizing clocks in the presence of faults,” J. Assoc. Comput. Machinery, vol. 32/Iss. 1 (1985)52-78.
J. Bund et al., “Fault tolerant gradient clock synchronization,” PODC '19: Proceedings of the 2019 ACM Symposium an Principles of Distributed Computing Jul. 2019 pp. 357-365.
Meinberg, “Time Synchoronization in Telecom Networks,” available at https://www.meinbergglobal.com/english/info/time-synchronization-telecom-networks.htm, published at least by Mar. 19, 2015, accessed Jul. 6, 2022.
Provisional Applications (1)
Number Date Country
62982889 Feb 2020 US