-
Survey of Distributed Algorithms for Resource Allocation over Multi-Agent Systems
Authors:
Mohammadreza Doostmohammadian,
Alireza Aghasi,
Mohammad Pirani,
Ehsan Nekouei,
Houman Zarrabi,
Reza Keypour,
Apostolos I. Rikos,
Karl H. Johansson
Abstract:
Resource allocation and scheduling in multi-agent systems present challenges due to complex interactions and decentralization. This survey paper provides a comprehensive analysis of distributed algorithms for addressing the distributed resource allocation (DRA) problem over multi-agent systems. It covers a significant area of research at the intersection of optimization, multi-agent systems, and d…
▽ More
Resource allocation and scheduling in multi-agent systems present challenges due to complex interactions and decentralization. This survey paper provides a comprehensive analysis of distributed algorithms for addressing the distributed resource allocation (DRA) problem over multi-agent systems. It covers a significant area of research at the intersection of optimization, multi-agent systems, and distributed consensus-based computing. The paper begins by presenting a mathematical formulation of the DRA problem, establishing a solid foundation for further exploration. Real-world applications of DRA in various domains are examined to underscore the importance of efficient resource allocation, and relevant distributed optimization formulations are presented. The survey then delves into existing solutions for DRA, encompassing linear, nonlinear, primal-based, and dual-formulation-based approaches. Furthermore, this paper evaluates the features and properties of DRA algorithms, addressing key aspects such as feasibility, convergence rate, and network reliability. The analysis of mathematical foundations, diverse applications, existing solutions, and algorithmic properties contributes to a broader comprehension of the challenges and potential solutions for this domain.
△ Less
Submitted 28 January, 2024;
originally announced January 2024.
-
Linearly Solvable Mean-Field Traffic Routing Games
Authors:
Takashi Tanaka,
Ehsan Nekouei,
Ali Reza Pedram,
Karl Henrik Johansson
Abstract:
We consider a dynamic traffic routing game over an urban road network involving a large number of drivers in which each driver selecting a particular route is subject to a penalty that is affine in the logarithm of the number of drivers selecting the same route. We show that the mean-field approximation of such a game leads to the so-called linearly solvable Markov decision process, implying that…
▽ More
We consider a dynamic traffic routing game over an urban road network involving a large number of drivers in which each driver selecting a particular route is subject to a penalty that is affine in the logarithm of the number of drivers selecting the same route. We show that the mean-field approximation of such a game leads to the so-called linearly solvable Markov decision process, implying that its mean-field equilibrium (MFE) can be found simply by solving a finite-dimensional linear system backward in time. Based on this backward-only characterization, it is further shown that the obtained MFE has the notable property of strong time-consistency. A connection between the obtained MFE and a particular class of fictitious play is also discussed.
△ Less
Submitted 19 January, 2020; v1 submitted 3 March, 2019;
originally announced March 2019.
-
Steady-state Analysis of a Neural-cognition Based Human-social Behavior Model
Authors:
Jieqiang Wei,
Ehsan Nekouei,
Junfeng Wu,
Vladimir Cvetkovic,
Karl H. Johansson
Abstract:
We consider an extension of the Rescorla-Wagner model which bridges the gap between conditioning and learning on a neural-cognitive, individual psychological level, and the social population level. In this model, the interaction among individuals is captured by a Markov process. The resulting human-social behavior model is a recurrent iterated function systems which behaves differently from the cl…
▽ More
We consider an extension of the Rescorla-Wagner model which bridges the gap between conditioning and learning on a neural-cognitive, individual psychological level, and the social population level. In this model, the interaction among individuals is captured by a Markov process. The resulting human-social behavior model is a recurrent iterated function systems which behaves differently from the classical Rescorla-Wagner model due to randomness. Convergence and ergodicity properties of the internal states of agents in the proposed model are studied.
△ Less
Submitted 22 September, 2018;
originally announced September 2018.
-
A Game-theoretic Framework for Security-aware Sensor Placement Problem in Networked Control Systems
Authors:
Mohammad Pirani,
Ehsan Nekouei,
Henrik Sandberg,
Karl Henrik Johansson
Abstract:
This paper studies the sensor placement problem in a networked control system for improving its security against cyber-physical attacks. The problem is formulated as a zero-sum game between an attacker and a detector. The attacker's decision is to select $f$ nodes of the network to attack whereas the detector's decision is to place $f$ sensors to detect the presence of the attack signals. In our f…
▽ More
This paper studies the sensor placement problem in a networked control system for improving its security against cyber-physical attacks. The problem is formulated as a zero-sum game between an attacker and a detector. The attacker's decision is to select $f$ nodes of the network to attack whereas the detector's decision is to place $f$ sensors to detect the presence of the attack signals. In our formulation, the attacker minimizes its visibility, defined as the system $L_2$ gain from the attack signals to the deployed sensors' outputs, and the detector maximizes the visibility of the attack signals. The equilibrium strategy of the game determines the optimal locations of the sensors. The existence of Nash equilibrium for the attacker-detector game is studied when the underlying connectivity graph is a directed or an undirected tree. When the game does not admit a Nash equilibrium, it is shown that the Stackelberg equilibrium of the game, with the detector as the game leader, can be computed efficiently. Finally, the attacker-detector game is studied in a cooperative adaptive cruise control algorithm for vehicle platooning problem. The existence of Nash equilibrium is investigated for both directed and undirected platoons and the effect of the position of the reference vehicle on the game value is studied. Our results show that, under the optimal sensor placement strategy, an undirected topology provides a higher security level for a networked control system compared with its corresponding directed topology.
△ Less
Submitted 21 September, 2018;
originally announced September 2018.
-
Linearly Solvable Mean-Field Road Traffic Games
Authors:
Takashi Tanaka,
Ehsan Nekouei,
Karl Henrik Johansson
Abstract:
We analyze the behavior of a large number of strategic drivers traveling over an urban traffic network using the mean-field game framework. We assume an incentive mechanism for congestion mitigation under which each driver selecting a particular route is charged a tax penalty that is affine in the logarithm of the number of agents selecting the same route. We show that the mean-field approximation…
▽ More
We analyze the behavior of a large number of strategic drivers traveling over an urban traffic network using the mean-field game framework. We assume an incentive mechanism for congestion mitigation under which each driver selecting a particular route is charged a tax penalty that is affine in the logarithm of the number of agents selecting the same route. We show that the mean-field approximation of such a large-population dynamic game leads to the so-called linearly solvable Markov decision process, implying that an open-loop $ε$-Nash equilibrium of the original game can be found simply by solving a finite-dimensional linear system.
△ Less
Submitted 15 August, 2018;
originally announced August 2018.
-
Privacy-aware Minimum Error Probability Estimation: An Entropy Constrained Approach
Authors:
Ehsan Nekouei,
Henrik Sandberg,
Mikael Skoglund,
Karl H. Johansson
Abstract:
This paper studies the design of an optimal privacyaware estimator of a public random variable based on noisy measurements which contain private information. The public random variable carries non-private information, however, its estimate will be correlated with the private information due to the estimation process. It is assumed that the estimate of the public random variable is revealed to an u…
▽ More
This paper studies the design of an optimal privacyaware estimator of a public random variable based on noisy measurements which contain private information. The public random variable carries non-private information, however, its estimate will be correlated with the private information due to the estimation process. It is assumed that the estimate of the public random variable is revealed to an untrusted party. The objective is to design an estimator for the public random variable such that the leakage of the private information, via the estimation process, is kept below a certain level. The privacy metric is defined as the discrete conditional entropy of the private random variable, which carries the private information, given the output of the estimator. A binary loss function is considered for the estimation of the public random variable. It is shown that the optimal privacy-aware estimator is the solution of a (possibly infinite-dimensional) convex optimization problem. We next study the optimal perfect privacy estimator which ensures that the estimate of the public random variable is independent of the private information. A necessary and sufficient condition is derived which guarantees that an estimator satisfies the perfect privacy requirement. It is shown that the optimal perfect privacy estimator is the solution of a linear optimization problem. A sufficient condition for the existence of the optimal perfect privacy estimator is derived when the estimator has access to discretized measurements of sensors.
△ Less
Submitted 7 August, 2018;
originally announced August 2018.
-
Privacy of Information Sharing Schemes in a Cloud-based Multi-sensor Estimation Problem
Authors:
Ehsan Nekouei,
Mikael Skoglund,
Karl H. Johansson
Abstract:
In this paper, we consider a multi-sensor estimation problem wherein each sensor collects noisy information about its local process, which is only observed by that sensor, and a common process, which is simultaneously observed by all sensors. The objective is to assess the privacy level of (the local process of) each sensor while the common process is estimated using cloud computing technology. Th…
▽ More
In this paper, we consider a multi-sensor estimation problem wherein each sensor collects noisy information about its local process, which is only observed by that sensor, and a common process, which is simultaneously observed by all sensors. The objective is to assess the privacy level of (the local process of) each sensor while the common process is estimated using cloud computing technology. The privacy level of a sensor is defined as the conditional entropy of its local process given the shared information with the cloud. Two information sharing schemes are considered: a local scheme, and a global scheme. Under the local scheme, each sensor estimates the common process based on its the measurement and transmits its estimate to a cloud. Under the global scheme, the cloud receives the sum of sensors' measurements. It is shown that, in the local scheme, the privacy level of each sensor is always above a certain level which is characterized using Shannon's mutual information. It is also proved that this result becomes tight as the number of sensors increases. We also show that the global scheme is asymptotically private, i.e., the privacy loss of the global scheme decreases to zero at the rate of O(1/M) where M is the number of sensors.
△ Less
Submitted 2 February, 2018;
originally announced February 2018.
-
Nash Equilibrium Approximation under Communication and Computation Constraints in Large-Scale Non-cooperative Games
Authors:
Ehsan Nekouei,
Tansu Alpcan,
Girish Nair
Abstract:
This paper studies the problem of Nash equilibrium approximation in large-scale heterogeneous mean-field games under communication and computation constraints. A deterministic mean-field game is considered in which the non-linear utility function of each agent depends on its action, the average of other agents' actions (called the mean variable of that agent) and a deterministic parameter. It is s…
▽ More
This paper studies the problem of Nash equilibrium approximation in large-scale heterogeneous mean-field games under communication and computation constraints. A deterministic mean-field game is considered in which the non-linear utility function of each agent depends on its action, the average of other agents' actions (called the mean variable of that agent) and a deterministic parameter. It is shown that the equilibrium mean variables of all agents converge uniformly to a constant, called asymptotic equilibrium mean (AEM), as the number of agents tends to infinity. The AEM, which depends on the limit of empirical distribution of agents' parameters, determines the asymptotic equilibrium behavior of agents. Next, the problem of approximating the AEM at a processing center under communication and computation constraints is studied. Three approximation methods are proposed to substantially reduce the communication and computation costs of approximating AEM at the processing center. The accuracy of the proposed approximation methods is analyzed and illustrated through numerical examples.
△ Less
Submitted 19 September, 2017; v1 submitted 19 April, 2017;
originally announced April 2017.
-
Impact of Optimal Storage Allocation on Price Volatility in Electricity Markets
Authors:
Amin Masoumzadeh,
Ehsan Nekouei,
Tansu Alpcan,
Deb Chattopadhyay
Abstract:
Recent studies show that the fast growing expansion of wind power generation may lead to extremely high levels of price volatility in wholesale electricity markets. Storage technologies, regardless of their specific forms e.g. pump-storage hydro, large-scale or distributed batteries, are capable of alleviating the extreme price volatility levels due to their energy usage time shifting, fast-rampin…
▽ More
Recent studies show that the fast growing expansion of wind power generation may lead to extremely high levels of price volatility in wholesale electricity markets. Storage technologies, regardless of their specific forms e.g. pump-storage hydro, large-scale or distributed batteries, are capable of alleviating the extreme price volatility levels due to their energy usage time shifting, fast-ramping and price arbitrage capabilities. In this paper, we propose a stochastic bi-level optimization model to find the optimal nodal storage capacities required to achieve a certain price volatility level in a highly volatile electricity market. The decision on storage capacities is made in the upper level problem and the operation of strategic/regulated generation, storage and transmission players is modeled at the lower level problem using an extended Cournot-based stochastic game. The South Australia (SA) electricity market, which has recently experienced high levels of price volatility, is considered as the case study for the proposed storage allocation framework. Our numerical results indicate that 80% price volatility reduction in SA electricity market can be achieved by installing either 340 MWh regulated storage or 420 MWh strategic storage. In other words, regulated storage firms are more efficient in reducing the price volatility than strategic storage firms.
△ Less
Submitted 1 March, 2017;
originally announced March 2017.
-
Convergence Analysis of Quantized Primal-dual Algorithm in Network Utility Maximization Problems
Authors:
Ehsan Nekouei,
Tansu Alpcan,
Girish Nair,
Robin Evans
Abstract:
This paper investigates the asymptotic and non-asymptotic behavior of the quantized primal dual algorithm in network utility maximization problems, in which a group of agents maximize the sum of their individual concave objective functions under linear constraints. In the asymptotic scenario, we use the information theoretic notion of differential entropy power to establish universal lower bounds…
▽ More
This paper investigates the asymptotic and non-asymptotic behavior of the quantized primal dual algorithm in network utility maximization problems, in which a group of agents maximize the sum of their individual concave objective functions under linear constraints. In the asymptotic scenario, we use the information theoretic notion of differential entropy power to establish universal lower bounds on the exponential convergence rates of joint primal dual, primal and dual variables under optimum achieving quantization schemes. These results provide trade offs between the speed of exponential convergence, the agents objective functions, the communication bit rates, and the number of agents and constraints. In the non-asymptotic scenario, we obtain lower bounds on the mean square distance of joint primal dual, primal and dual variables from the optimal solution for any finite time instance. These bounds hold regardless of the quantization scheme used.
△ Less
Submitted 22 April, 2016; v1 submitted 3 April, 2016;
originally announced April 2016.