Show simple item record

dc.contributor.authorOliva, G.en
dc.contributor.authorCioaba, S.en
dc.contributor.authorHadjicostis, Christoforos N.en
dc.creatorOliva, G.en
dc.creatorCioaba, S.en
dc.creatorHadjicostis, Christoforos N.en
dc.date.accessioned2019-04-08T07:47:33Z
dc.date.available2019-04-08T07:47:33Z
dc.date.issued2017
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/44430
dc.description.abstractIn this paper we provide a distributed methodology to allow a network of agents, tasked to execute a distributed algorithm, to overcome Man-in-the-middle attacks that aim at steering the result of the algorithm towards inconsistent values or dangerous configurations. We want the agents to be able to restore the correct result of the algorithm in spite of the attacks. To this end, we provide a distributed algorithm to let the set of agents, interconnected by an undirected network topology, construct several $edge-disjoint spanning trees$ by assigning a label to their incident edges. The ultimate objective is to use these spanning trees to run multiple instances of the same distributed algorithm in parallel, in order to be able to detect Man-in-the- middle attacks or other faulty or malicious link behavior (e.g., when the instances yield different results) and to restore the correct result (when the majority of instances is unaffected). The proposed algorithm is lightweight and asynchronous, and is based on iterated depth-first visits on the graph. We complement the paper with a thorough analysis of the performance of the proposed algorithms. IEEEen
dc.sourceIEEE Transactions on Control of Network Systemsen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85028716681&doi=10.1109%2fTCNS.2017.2746344&partnerID=40&md5=f34f14c15cf93524a7c530be94550f90
dc.subjectParallel algorithmsen
dc.subjectRestorationen
dc.subjectNetwork protocolsen
dc.subjectNetwork architectureen
dc.subjectAlgorithm design and analysisen
dc.subjectControl systemsen
dc.subjectControl system analysisen
dc.subjectTrees (mathematics)en
dc.subjectDistributed algorithmsen
dc.subjectProtocolsen
dc.subjectEdge detectionen
dc.subjectEdge disjoint spanning treesen
dc.subjectEdge-disjoint spanning treesen
dc.subjectElectronic mailen
dc.subjectImage edge detectionen
dc.subjectMan in the middle attacksen
dc.subjectMan-in-the-middle attacksen
dc.subjectSoftware agentsen
dc.subjectTree packingen
dc.subjectTree packing problemen
dc.subjectVegetationen
dc.titleDistributed Calculation of Edge-Disjoint Spanning Trees for Robustifying Distributed Algorithms against Man-in-the-Middle Attacksen
dc.typeinfo:eu-repo/semantics/article
dc.identifier.doi10.1109/TCNS.2017.2746344
dc.description.issueJournal Articleen
dc.author.facultyΠολυτεχνική Σχολή / Faculty of Engineering
dc.author.departmentΤμήμα Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών / Department of Electrical and Computer Engineering
dc.type.uhtypeArticleen
dc.source.abbreviationIEEE Trans.Control Netw.Syst.en
dc.contributor.orcidHadjicostis, Christoforos N. [0000-0002-1706-708X]
dc.gnosis.orcid0000-0002-1706-708X


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record