dc.contributor.author | Sundaram, S. | en |
dc.contributor.author | Hadjicostis, Christoforos N. | en |
dc.creator | Sundaram, S. | en |
dc.creator | Hadjicostis, Christoforos N. | en |
dc.date.accessioned | 2019-04-08T07:48:23Z | |
dc.date.available | 2019-04-08T07:48:23Z | |
dc.date.issued | 2008 | |
dc.identifier.isbn | 978-1-4244-2079-7 | |
dc.identifier.uri | http://gnosis.library.ucy.ac.cy/handle/7/44916 | |
dc.description.abstract | We consider the problem of distributed function calculation in the presence of faulty or malicious agents. In particular, we consider a setup where each node has an initial value and the goal is for (a subset of) the nodes to calculate a function of these values in a distributed manner. We focus on linear iterative strategies for function calculation, where each node updates its value at each time-step to be a weighted average of its own previous value and those of its neighbors; after a sufficiently large number of time-steps, each node is expected to have enough information to calculate the desired function of the initial node values. We study the susceptibility of such strategies to misbehavior by some nodes in the network; specifically, we consider a node to be malicious if it updates its value arbitrarily at each time-step, instead of following the predefined linear iterative strategy. If the connectivity of the network topology is 2f or less, we show that it is possible for a set of f malicious nodes to conspire in a way that makes it impossible for a subset of the other nodes in the network to correctly calculate an arbitrary function of all node values. Our analysis is constructive, in that it provides a specific scheme for the malicious nodes to follow in order to obfuscate the network in this fashion. ©2008 AACC. | en |
dc.source | Proceedings of the American Control Conference | en |
dc.source | Proceedings of the American Control Conference | en |
dc.source.uri | https://www.scopus.com/inward/record.uri?eid=2-s2.0-52449121020&doi=10.1109%2fACC.2008.4586680&partnerID=40&md5=9bc68b4a9186759162624627e2c504ab | |
dc.subject | Initial values | en |
dc.subject | Iterative strategy | en |
dc.subject | Malicious nodes | en |
dc.subject | Arbitrary functions | en |
dc.subject | Computer programming languages | en |
dc.subject | Distributed functions | en |
dc.subject | Electric network topology | en |
dc.subject | Network topologies | en |
dc.subject | Time stepping | en |
dc.subject | Weighted averaging | en |
dc.title | Distributed function calculation via linear iterations in the presence of malicious agents - Part I: Attacking the network | en |
dc.type | info:eu-repo/semantics/conferenceObject | |
dc.identifier.doi | 10.1109/ACC.2008.4586680 | |
dc.description.startingpage | 1350 | |
dc.description.endingpage | 1355 | |
dc.author.faculty | Πολυτεχνική Σχολή / Faculty of Engineering | |
dc.author.department | Τμήμα Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών / Department of Electrical and Computer Engineering | |
dc.type.uhtype | Conference Object | en |
dc.contributor.orcid | Hadjicostis, Christoforos N. [0000-0002-1706-708X] | |
dc.gnosis.orcid | 0000-0002-1706-708X | |