Show simple item record

dc.contributor.authorSundaram, S.en
dc.contributor.authorHadjicostis, Christoforos N.en
dc.creatorSundaram, S.en
dc.creatorHadjicostis, Christoforos N.en
dc.date.accessioned2019-04-08T07:48:24Z
dc.date.available2019-04-08T07:48:24Z
dc.date.issued2008
dc.identifier.isbn978-1-4244-2079-7
dc.identifier.urihttp://gnosis.library.ucy.ac.cy/handle/7/44917
dc.description.abstractGiven a network of interconnected nodes, each with a given initial value, we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of these initial values, despite the presence of some malicious (or faulty) nodes. Our scheme utilizes a linear iterative strategy where, at each time-step, each node updates its value to be a weighted average of its own previous value and those of its neighbors. We consider a node to be malicious if, instead of following the predefined linear iterative strategy, it updates its value arbitrarily at each time-step (perhaps by conspiring and coordinating with other malicious nodes). When there are up to f malicious nodes, we show that any node in the network is guaranteed to be able to calculate any arbitrary function of all initial node values if the graph of the network is at least (2f +1)-connected. Specifically, we show that under this condition, the nodes can calculate their desired functions after running the linear iteration for a finite number of timesteps (upper bounded by the number of nodes in the network) using almost any set of weights (i.e., for all weights except for a set of measure zero). Our approach treats the problem of fault-tolerant distributed consensus, where all nodes have to calculate the same function despite the presence of faulty or malicious nodes, as a special case. ©2008 AACC.en
dc.sourceProceedings of the American Control Conferenceen
dc.sourceProceedings of the American Control Conferenceen
dc.source.urihttps://www.scopus.com/inward/record.uri?eid=2-s2.0-52449119147&doi=10.1109%2fACC.2008.4586681&partnerID=40&md5=dcb200627f006317e6182272fd954cc7
dc.subjectSet theoryen
dc.subjectInterconnected nodesen
dc.subjectLinear iterationen
dc.subjectInitial valuesen
dc.subjectFinite numbersen
dc.subjectIterative strategyen
dc.subjectMalicious nodesen
dc.subjectFault-toleranten
dc.subjectDistributed consensusen
dc.subjectArbitrary functionsen
dc.subjectComputer programming languagesen
dc.subjectDistributed functionsen
dc.subjectTime steppingen
dc.subjectWeighted averagingen
dc.subjectMalicious behaviorsen
dc.subjectNumber of nodesen
dc.titleDistributed function calculation via linear iterations in the presence of malicious agents - Part II: Overcoming malicious behavioren
dc.typeinfo:eu-repo/semantics/conferenceObject
dc.identifier.doi10.1109/ACC.2008.4586681
dc.description.startingpage1356
dc.description.endingpage1361
dc.author.facultyΠολυτεχνική Σχολή / Faculty of Engineering
dc.author.departmentΤμήμα Ηλεκτρολόγων Μηχανικών και Μηχανικών Υπολογιστών / Department of Electrical and Computer Engineering
dc.type.uhtypeConference Objecten
dc.contributor.orcidHadjicostis, Christoforos N. [0000-0002-1706-708X]
dc.gnosis.orcid0000-0002-1706-708X


Files in this item

FilesSizeFormatView

There are no files associated with this item.

This item appears in the following Collection(s)

Show simple item record