A trust‐based resilient consensus algorithm for distributed optimization considering node and edge attacks
نویسندگان
چکیده
Summary Distributed optimization algorithms have various advantages and wide applications, while the distributed nature also makes them flimsy in face of external attacks. In this paper two Byzantine attack models are designed, which edge model is seldom considered before. A resilient consensus algorithm based on trusted nodes edges proposed to defend against models. The agreement optimality guaranteed with theoretical analysis. simulation results comparison experiments verify be more effective than compared one. perspective attackers, recommended analysed experiments.
منابع مشابه
A non-consensus based distributed optimization algorithm
In this paper we introduce a discrete-time, distributed optimization algorithm executed by a set of agents whose interactions are subject to a communication graph. The algorithm can be applied to optimization costs that are expressed as sums of functions, where each function is associated to an agent. The algorithm can be applied to continuously differentiable cost functions, it is not consensu...
متن کاملEntropy-based Consensus for Distributed Data Clustering
The increasingly larger scale of available data and the more restrictive concerns on their privacy are some of the challenging aspects of data mining today. In this paper, Entropy-based Consensus on Cluster Centers (EC3) is introduced for clustering in distributed systems with a consideration for confidentiality of data; i.e. it is the negotiations among local cluster centers that are used in t...
متن کاملResilient Distributed Constraint Optimization Problems
Dynamic distributed constraint optimization problems (Dynamic DCOPs) are useful in modeling various distributed combinatorial optimization problems that are dynamically changing over time. Previous attempts assume that it is possible for agents to take on a new solution each time the problem changes. However, in some applications, it is necessary to commit to a single solution at the start of t...
متن کاملDistribution Feeder Reconfiguration Considering Distributed Generators using Cuckoo Optimization Algorithm
In many countries the power systems are going to move toward creating a competitive structure for selling and buying electrical energy. These changes and the numerous advantages of the distributed generation units (DGs) in term of their technology enhancement and economical considerations have created more incentives to use these kinds of generators than before. Therefore, it is necessary to st...
متن کاملDistributed detection of node replication attacks resilient to many compromised nodes in wireless sensor networks
ABSTRACT In large-scale sensor networks, sensor nodes are at high risk of being captured and compromised. Once a sensor node is compromised, all the secret keys, data, and code stored on it are exposed to the attacker. The attacker can insert arbitrary malicious code in the compromised node. Moreover, he can easily replicate it in a large number of clones and deploy them on the network. This no...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Robust and Nonlinear Control
سال: 2022
ISSN: ['1049-8923', '1099-1239']
DOI: https://doi.org/10.1002/rnc.6568