메뉴 건너뛰기




Volumn , Issue , 2012, Pages 5-14

Low complexity resilient consensus in networked multi-agent systems with adversaries

Author keywords

Adversary; Byzantine; Consensus; Multi agent network; Resilience

Indexed keywords

ADVERSARY; BYZANTINE; CONSENSUS; MULTIAGENT NETWORKS; RESILIENCE;

EID: 84860630870     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2185632.2185637     Document Type: Conference Paper
Times cited : (50)

References (26)
  • 1
    • 0009768331 scopus 로고
    • The Byzantine generals strike again
    • D. Dolev. The Byzantine generals strike again. Journal of Algorithms, 3(1):14 - 30, 1982.
    • (1982) Journal of Algorithms , vol.3 , Issue.1 , pp. 14-30
    • Dolev, D.1
  • 2
    • 0022754708 scopus 로고
    • Reaching approximate agreement in the presence of faults
    • DOI 10.1145/5925.5931
    • D. Dolev, N. A. Lynch, S. S. Pinter, E. W. Stark, and W. E. Weihl. Reaching approximate agreement in the presence of faults. Journal of the ACM, 33(3):499 - 516, 1986. (Pubitemid 16589617)
    • (1986) Journal of the ACM , vol.33 , Issue.3 , pp. 499-516
    • Dolev, D.1    Lynch, N.A.2    Pinter, S.S.3    Stark, E.W.4    Weihl, W.E.5
  • 3
    • 4644317383 scopus 로고    scopus 로고
    • Information flow and cooperative control of vehicle formations
    • J. A. Fax and R. M. Murray. Information flow and cooperative control of vehicle formations. IEEE Trans. on Aut. Control, 49(9):1465 - 1476, 2004.
    • (2004) IEEE Trans. on Aut. Control , vol.49 , Issue.9 , pp. 1465-1476
    • Fax, J.A.1    Murray, R.M.2
  • 4
    • 0040083859 scopus 로고
    • Connectivity in digraphs
    • Volume 186 of Lect. Notes in Math,Springer Berlin/Heidelberg
    • D. Geller and F. Harary. Connectivity in digraphs. In Recent Trends in Graph Theory, volume 186 of Lect. Notes in Math., pages 105-115. Springer Berlin/Heidelberg, 1971.
    • (1971) Recent Trends in Graph Theory , pp. 105-115
    • Geller, D.1    Harary, F.2
  • 6
    • 84860645696 scopus 로고    scopus 로고
    • Safe flocking in spite of actuator faults using directional failure detectors
    • T. T. Johnson and S. Mitra. Safe flocking in spite of actuator faults using directional failure detectors. Journal of Nonlinear Sys. and App., 2(1-2):73-95, 2011.
    • (2011) Journal of Nonlinear Sys. and App , vol.2 , Issue.1-2 , pp. 73-95
    • Johnson, T.T.1    Mitra, S.2
  • 9
  • 11
    • 0004215089 scopus 로고    scopus 로고
    • Morgan Kaufmann Publishers Inc., San Francisco, California
    • N. A. Lynch. Distributed Algorithms. Morgan Kaufmann Publishers Inc., San Francisco, California, 1997.
    • (1997) Distributed Algorithms
    • Lynch, N.A.1
  • 14
    • 64149119332 scopus 로고    scopus 로고
    • Consensus and cooperation in networked multi-agent systems
    • R. Olfati-Saber, J. A. Fax, and R. M. Murray. Consensus and cooperation in networked multi-agent systems. Proceedings of the IEEE, 95(1):215-233, 2007.
    • (2007) Proceedings of the IEEE , vol.95 , Issue.1 , pp. 215-233
    • Olfati-Saber, R.1    Fax, J.A.2    Murray, R.M.3
  • 15
    • 79951919001 scopus 로고    scopus 로고
    • Belief consensus and distributed hypothesis testing in sensor networks
    • Volume 331 of Lecture Notes in Control and Information Sciences, Springer Berlin/Heidelberg
    • R. Olfati-Saber, E. Franco, E. Frazzoli, and J. Shamma. Belief consensus and distributed hypothesis testing in sensor networks. In Networked Embedded Sensing and Control, volume 331 of Lecture Notes in Control and Information Sciences, pages 169-182. Springer Berlin/Heidelberg, 2006.
    • (2006) Networked Embedded Sensing and Control , pp. 169-182
    • Olfati-Saber, R.1    Franco, E.2    Frazzoli, E.3    Shamma, J.4
  • 16
    • 62749205479 scopus 로고    scopus 로고
    • Distributed intrusion detection for secure consensus computations
    • DOI 10.1109/CDC.2007.4434297, 4434297, Proceedings of the 46th IEEE Conference on Decision and Control 2007, CDC
    • F. Pasqualetti, A. Bicchi, and F. Bullo. Distributed intrusion detection for secure consensus computations. In IEEE Conf. on Decision and Control, pages 5594 -5599, Dec. 2007. (Pubitemid 351278031)
    • (2007) Proceedings of the IEEE Conference on Decision and Control , pp. 5594-5599
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 18
    • 84855392746 scopus 로고    scopus 로고
    • Consensus computation in unreliable networks: A system theoretic approach
    • Jan.
    • F. Pasqualetti, A. Bicchi, and F. Bullo. Consensus computation in unreliable networks: A system theoretic approach. IEEE Trans. on Aut. Control, 57(1):90-104, Jan. 2012.
    • (2012) IEEE Trans. on Aut. Control , vol.57 , Issue.1 , pp. 90-104
    • Pasqualetti, F.1    Bicchi, A.2    Bullo, F.3
  • 20
    • 84976810569 scopus 로고
    • Reaching agreement in the presence of faults
    • M. Pease, R. Shostak, and L. Lamport. Reaching agreement in the presence of faults. J. ACM, 27(2):228-234, 1980.
    • (1980) J. ACM , vol.27 , Issue.2 , pp. 228-234
    • Pease, M.1    Shostak, R.2    Lamport, L.3
  • 22
    • 52449121020 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterations in the presence of malicious agents; part I: Attacking the network
    • June
    • S. Sundaram and C. Hadjicostis. Distributed function calculation via linear iterations in the presence of malicious agents; part I: Attacking the network. In American Control Conf., pages 1350 -1355, June 2008.
    • (2008) American Control Conf. , pp. 1350-1355
    • Sundaram, S.1    Hadjicostis, C.2
  • 23
    • 52449119147 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterations in the presence of malicious agents; part II: Overcoming malicious behavior
    • June
    • S. Sundaram and C. Hadjicostis. Distributed function calculation via linear iterations in the presence of malicious agents; part II: Overcoming malicious behavior. In American Control Conf., pages 1356 -1361, June 2008.
    • (2008) American Control Conf. , pp. 1356-1361
    • Sundaram, S.1    Hadjicostis, C.2
  • 24
    • 79960124958 scopus 로고    scopus 로고
    • Distributed function calculation via linear iterative strategies in the presence of malicious agents
    • July
    • S. Sundaram and C. Hadjicostis. Distributed function calculation via linear iterative strategies in the presence of malicious agents. IEEE Trans. on Aut. Control, 56(7):1495 -1508, July 2011.
    • (2011) IEEE Trans. on Aut. Control , vol.56 , Issue.7 , pp. 1495-1508
    • Sundaram, S.1    Hadjicostis, C.2
  • 25
    • 77957775842 scopus 로고    scopus 로고
    • Networked control systems under cyber attacks with applications to power networks
    • July
    • A. Teixeira, H. Sandberg, and K.H. Johansson. Networked control systems under cyber attacks with applications to power networks. In American Control Conf., pages 3690-3696, July 2010.
    • (2010) American Control Conf. , pp. 3690-3696
    • Teixeira, A.1    Sandberg, H.2    Johansson, K.H.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.