2023
DOI: 10.1016/j.jfranklin.2022.08.031
|View full text |Cite
|
Sign up to set email alerts
|

A resilient distributed optimization algorithm based on consensus of multi-agent system against two attack scenarios

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
0
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 35 publications
0
0
0
Order By: Relevance
“…where δ ij (t) is the malicious signal injected into the communication link (j, i) ∈ E. In contrast to prior works [8], [9], [13], [14] which limit the number of attacks while leaving their magnitude unrestricted, we do not impose any restrictions on the number of attacks. However, we assume that the attacks have a bounded magnitude, i.e., the injections satisfy the following assumption.…”
Section: B Problem Statementmentioning
confidence: 99%
See 3 more Smart Citations
“…where δ ij (t) is the malicious signal injected into the communication link (j, i) ∈ E. In contrast to prior works [8], [9], [13], [14] which limit the number of attacks while leaving their magnitude unrestricted, we do not impose any restrictions on the number of attacks. However, we assume that the attacks have a bounded magnitude, i.e., the injections satisfy the following assumption.…”
Section: B Problem Statementmentioning
confidence: 99%
“…In contrast to the work in [11], [12], which focus on denial-ofservice attacks on the communication network, this paper aims to design a resilient distributed optimization algorithm against false data injection (FDI) attacks. A novel filtering strategy is proposed in [13], ensuring that the local estimates of the agents converge to the original optimization problem under FDI attacks on the communication network. However, this strategy comes with certain limitations, including restrictions on the maximum number of links that can be attacked and constraints on the network's connectivity.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations