Browsing by Subject "Malicious nodes"
Now showing items 1-4 of 4
-
Conference Object
Distributed function calculation via linear iterations in the presence of malicious agents - Part I: Attacking the network
(2008)We consider the problem of distributed function calculation in the presence of faulty or malicious agents. In particular, we consider a setup where each node has an initial value and the goal is for (a subset of) the nodes ...
-
Conference Object
Distributed function calculation via linear iterations in the presence of malicious agents - Part II: Overcoming malicious behavior
(2008)Given a network of interconnected nodes, each with a given initial value, we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of these initial values, despite the ...
-
Conference Object
Privacy-preserving asymptotic average consensus
(2013)In this paper, we develop and analyze a distributed privacy-preserving average consensus algorithm that enables all of the components of a distributed system, each with some initial value, to asymptotically reach average ...
-
Conference Object
The wireless control network: Monitoring for malicious behavior
(2010)We consider the problem of stabilizing a plant with a network of resource constrained wireless nodes. In a companion paper, we developed a protocol where each node repeatedly transmits an appropriate (stabilizing) linear ...