2018
DOI: 10.1007/s10514-018-9813-7
|View full text |Cite
|
Sign up to set email alerts
|

Resilient distributed state estimation with mobile agents: overcoming Byzantine adversaries, communication losses, and intermittent measurements

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
47
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
2
1

Relationship

2
5

Authors

Journals

citations
Cited by 50 publications
(47 citation statements)
references
References 76 publications
0
47
0
Order By: Relevance
“…Proof. (Theorem 2) Let us begin by noting that given any desired convergence rate ρ ∈ (0, 1), each node i ∈ S ∩ R can choose its observer gain l i to guarantee |e i [k]| ≤ αρ k , ∀k ∈ N, based on the observer (15…”
Section: Appendix B Proof Of Propositionmentioning
confidence: 99%
See 2 more Smart Citations
“…Proof. (Theorem 2) Let us begin by noting that given any desired convergence rate ρ ∈ (0, 1), each node i ∈ S ∩ R can choose its observer gain l i to guarantee |e i [k]| ≤ αρ k , ∀k ∈ N, based on the observer (15…”
Section: Appendix B Proof Of Propositionmentioning
confidence: 99%
“…Next, in line 16, node i considers the set M i [k]∪{J i [k]\M i [k]}, and appends/retains only those 2f +1 nodes that have the lowest freshness-indices. 10 The rationale behind breaking up the "appending" operation into two steps (lines [15][16] is to avoid the possibility of having multiple appearances of a single node in M i [k]. Note that for both Case 1 and Case 2, the values of M i , v i and φ i at the beginning of time-step k + 1 are initialized with their values at the end of time-step k (lines 14 and 18); their values at the end of time-step k + 1 will naturally depend on the new information available to node i at time k+1.…”
mentioning
confidence: 99%
See 1 more Smart Citation
“…results that draw upon these papers include state estimation [18][19][20][21], rendezvous of mobile agents [22,23], output synchronization [11], simultaneous arrival of interceptors [17], distributed optimization [29,31], reliable broadcast [33,43], clock synchronization [8], randomized quantized consensus [5], self-triggered coordination [26], and multi-hop communication [30].…”
Section: Introductionmentioning
confidence: 99%
“…However, allowing for sophisticated attack models comes at the expense of rather stringent requirements on the communication network topology. Specifically, the guarantees provided in [14], [15] hold only when the network exhibits a sufficient amount of redundancy in both its measurement and communication resources. We are thus motivated to ask: Can one relax the redundancy requirements on the network, and yet, tolerate a worst-case attack model?…”
Section: Introductionmentioning
confidence: 99%