dc.contributor.author | Oliva, G. | en |
dc.contributor.author | Cioaba, S. | en |
dc.contributor.author | Hadjicostis, Christoforos N. | en |
dc.creator | Oliva, G. | en |
dc.creator | Cioaba, S. | en |
dc.creator | Hadjicostis, Christoforos N. | en |
dc.date.accessioned | 2019-04-08T07:47:33Z | |
dc.date.available | 2019-04-08T07:47:33Z | |
dc.date.issued | 2017 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/44430 | |
dc.description.abstract | In this paper we provide a distributed methodology to allow a network of agents, tasked to execute a distributed algorithm, to overcome Man-in-the-middle attacks that aim at steering the result of the algorithm towards inconsistent values or dangerous configurations. We want the agents to be able to restore the correct result of the algorithm in spite of the attacks. To this end, we provide a distributed algorithm to let the set of agents, interconnected by an undirected network topology, construct several $edge-disjoint spanning trees$ by assigning a label to their incident edges. The ultimate objective is to use these spanning trees to run multiple instances of the same distributed algorithm in parallel, in order to be able to detect Man-in-the- middle attacks or other faulty or malicious link behavior (e.g., when the instances yield different results) and to restore the correct result (when the majority of instances is unaffected). The proposed algorithm is lightweight and asynchronous, and is based on iterated depth-first visits on the graph. We complement the paper with a thorough analysis of the performance of the proposed algorithms. IEEE | en |
dc.source | IEEE Transactions on Control of Network Systems | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-85028716681&doi=10.1109%2fTCNS.2017.2746344&partnerID=40&md5=f34f14c15cf93524a7c530be94550f90 | |
dc.subject | Parallel algorithms | en |
dc.subject | Restoration | en |
dc.subject | Network protocols | en |
dc.subject | Network architecture | en |
dc.subject | Algorithm design and analysis | en |
dc.subject | Control systems | en |
dc.subject | Control system analysis | en |
dc.subject | Trees (mathematics) | en |
dc.subject | Distributed algorithms | en |
dc.subject | Protocols | en |
dc.subject | Edge detection | en |
dc.subject | Edge disjoint spanning trees | en |
dc.subject | Edge-disjoint spanning trees | en |
dc.subject | Electronic mail | en |
dc.subject | Image edge detection | en |
dc.subject | Man in the middle attacks | en |
dc.subject | Man-in-the-middle attacks | en |
dc.subject | Software agents | en |
dc.subject | Tree packing | en |
dc.subject | Tree packing problem | en |
dc.subject | Vegetation | en |
dc.title | Distributed Calculation of Edge-Disjoint Spanning Trees for Robustifying Distributed Algorithms against Man-in-the-Middle Attacks | en |
dc.type | info:eu-repo/semantics/article | |
dc.identifier.doi | 10.1109/TCNS.2017.2746344 | |
dc.description.issue | Journal Article | en |
dc.author.faculty | Πολυτεχνική Σχολή / Faculty of Engineering | |
dc.author.department | Τμήμα Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών / Department of Electrical and Computer Engineering | |
dc.type.uhtype | Article | en |
dc.source.abbreviation | IEEE Trans.Control Netw.Syst. | en |
dc.contributor.orcid | Hadjicostis, Christoforos N. [0000-0002-1706-708X] | |
dc.gnosis.orcid | 0000-0002-1706-708X | |