2020
DOI: 10.1109/access.2020.3002577
|View full text |Cite
|
Sign up to set email alerts
|

Finite-Time Consensus-Based Clock Synchronization Under Deception Attacks

Abstract: This paper concentrates on the finite-time clock synchronization problem for wireless sensor networks (WSNs) under deception attacks. Compared with adding additional communication links to a network, we introduce a new mechanism termed as "trusted link" to improve the resilience of the network, and show that with small changes (set a fraction of links as the trusted links) in the network structure the network robustness for deception attacks can be improved significantly. Then, an iterative learning control ba… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…A node identity-based algorithm is proposed called NiSTS by Wang et al in [10] for message manipulation attack detection and elimination. Consensus clock synchronization for WSNs under deception attacks has been analyzed recently [11]. However, many state-of-the-art CTS algorithms [12][13][14][15][16] are not yet studied and analyzed under security threats.…”
Section: Related Workmentioning
confidence: 99%
“…A node identity-based algorithm is proposed called NiSTS by Wang et al in [10] for message manipulation attack detection and elimination. Consensus clock synchronization for WSNs under deception attacks has been analyzed recently [11]. However, many state-of-the-art CTS algorithms [12][13][14][15][16] are not yet studied and analyzed under security threats.…”
Section: Related Workmentioning
confidence: 99%
“…These nodes will be protected from attack at all times so that resilient consensus can be achieved under milder connectivity. A similar edge-oriented version is examined in [19], where trusted links are proposed to improve network robustness and achieve convergence in finite time. Another effort along this line is to endow agents with diverse vulnerabilities or weaknesses [20], where a malicious agent can only attack a particular type of weakness, and hence consensus may be achieved in a relatively sparse network.…”
Section: Introductionmentioning
confidence: 99%
“…In some applications, it is desired that the cooperative tasks be completed in a finite time. Compared with asymptotic consensus, finite-time consensus has such advantages as anti-disturbance (Li et al, 2019; Pei, 2020) and better robustness (Wu and He, 2020). Given this, some researchers turned their attention to the finite-time consensus of MASs, where consensus was reached within limited time.…”
Section: Introductionmentioning
confidence: 99%