2018
DOI: 10.1109/tsipn.2017.2742859
|View full text |Cite
|
Sign up to set email alerts
|

Resilient Consensus with Mobile Detectors Against Malicious Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
37
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 64 publications
(37 citation statements)
references
References 39 publications
0
37
0
Order By: Relevance
“…A malicious agent is misbehaving due to, for example, stubborn traits, and it sends information in a broadcast manner [8], [16]. Byzantine agents on the other hand are often thought of as one of the most dangerous attackers [18], [23], [25], who typically possess a thorough intelligence of the entire network and hence can potentially collude with other Byzantine agents to manipulate the network by sending wrong information in a point-to-point manner. By the above definitions, both malicious and Byzantine agents can renew their opinions in an arbitrary way at every time step, and hence all malicious agents turn out to be Byzantine, but not vice versa.…”
Section: B Opinion Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…A malicious agent is misbehaving due to, for example, stubborn traits, and it sends information in a broadcast manner [8], [16]. Byzantine agents on the other hand are often thought of as one of the most dangerous attackers [18], [23], [25], who typically possess a thorough intelligence of the entire network and hence can potentially collude with other Byzantine agents to manipulate the network by sending wrong information in a point-to-point manner. By the above definitions, both malicious and Byzantine agents can renew their opinions in an arbitrary way at every time step, and hence all malicious agents turn out to be Byzantine, but not vice versa.…”
Section: B Opinion Modelmentioning
confidence: 99%
“…Resilient learning-based protocols are introduced in [24] to find optimal solutions to consensus problems in the presence of malicious attackers and uncertainties in system. By utilizing mobile detectors, it is shown in [25] that consensus can be maintained against Byzantine agents whose number is not restrained by the network connectedness. However, to our knowledge, only single state value is assumed in the prior works, which are thus unable to capture individuals in social networks who have private opinions deviating from the opinions they express.…”
Section: Introductionmentioning
confidence: 99%
“…In stationary scenarios, the convergence state is independent of time, that is, X 0 i = X 0 i−1 = X 0 . Therefore, equation (25) turns to:…”
Section: ) Stationary State Estimationmentioning
confidence: 99%
“…Assume the convergence point X 0 i is a combination of a time-independent value and a time-dependent value, such that X 0 i = X 0 + ρ i . After taking original values into (25), we get (27) into the time-independent and timedependent components to get…”
mentioning
confidence: 99%
“…For example, in [25], [30], detection techniques using unknown input observers are proposed, in which case the initial values of all normal nodes can be found though they require the global knowledge of the network topology. Methods based on more local information can be found in, e.g., [1], [8], [37]. This paper is organized as follows.…”
Section: Introductionmentioning
confidence: 99%