Secure consensus with distributed detection via two-hop communication
From MaRDI portal
Publication:2665414
DOI10.1016/j.automatica.2021.109775zbMath1478.93648arXiv2101.05087OpenAlexW3174405995MaRDI QIDQ2665414
Publication date: 19 November 2021
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://arxiv.org/abs/2101.05087
Multi-agent systems (93A16) Networked control (93B70) Consensus (93D50) Wireless sensor networks as related to computer science (68M18)
Related Items (3)
Secure gossip against intermittently malicious agents ⋮ Secure multi-dimensional consensus algorithm against malicious attacks ⋮ Resilient consensus in continuous-time networks with \(\ell\)-hop communication and time delay
Cites Work
- Unnamed Item
- Unnamed Item
- Unnamed Item
- Consensus of second-order multi-agent systems in the presence of locally bounded faults
- Distributed fault detection for interconnected second-order systems
- Multidimensional agreement in Byzantine systems
- Stability analysis for multi-agent systems using the incidence matrix: quantized communication and formation control
- Easy impossibility proofs for distributed consensus problems
- Approximate agreement under mobile Byzantine faults
- Reaching approximate Byzantine consensus with multi-hop communication
- Resilient consensus of second-order agent networks: asynchronous update rules with delays
- Fault-Tolerant Consensus in Directed Graphs
- Iterative approximate byzantine consensus in arbitrary directed graphs
- Event-Based Distributed Clock Synchronization for Wireless Sensor Networks
- On the composition of authenticated Byzantine Agreement
- The Byzantine Generals Problem
- Unreliable failure detectors for reliable distributed systems
- Improving Network Connectivity and Robustness Using Trusted Nodes With Application to Resilient Consensus
- Resilient Randomized Quantized Consensus
- Consensus Problems in Networks of Agents With Switching Topology and Time-Delays
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Consensus Computation in Unreliable Networks: A System Theoretic Approach
- Resilient Distributed Optimization Algorithm Against Adversarial Attacks
This page was built for publication: Secure consensus with distributed detection via two-hop communication