Resilient Distributed Estimation Through Adversary Detection

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Resilient Distributed State Estimation for LTI Systems

Consider a linear time-invariant (LTI) dynamical system monitored by a network of sensors, modeled as nodes of an underlying directed communication graph. We study the problem of collaboratively estimating the state of the system when certain nodes are compromised by adversarial attacks. Specifically, we consider a Byzantine adversary model, where a compromised node possesses complete knowledge...

متن کامل

Protecting Clock Synchronization: Adversary Detection through Network Monitoring

Today, industrial networks are often used for safetycritical applications with real-time requirements. The architecture of such applications usually has a time-triggered nature that has message scheduling as a core property. Real-time scheduling can be applied only in networks where nodes share the same notion of time, i.e., they are synchronized. Therefore, clock synchronization is one of the ...

متن کامل

Tamper Resilient Circuits: The Adversary at the Gates

We initiate the investigation of gate-tampering attacks against cryptographic circuits. Our model is motivated by the plausibility of tampering directly with circuit gates and by the increasing use of tamper resilient gates among the known constructions that are shown to be resilient against wiretampering adversaries. We prove that gate-tampering is strictly stronger than wire-tampering. On the...

متن کامل

A Distributed Challenge Detection System for Resilient Networks

The network has become essential to our daily life. With the increase in dependence, challenges to the normal operation of the network bear ever more severe consequences. Challenges include malicious attacks, misconfigurations, faults, and operational overloads. Understanding challenges is needed to build resilience mechanism. A crucial part of resilience strategy involves real-time detection o...

متن کامل

Mistreatment-resilient distributed caching

The distributed partitioning of autonomous, self-aware nodes into cooperative groups, within which scarce resources could be effectively shared for the benefit of the group, is increasingly emerging as a hallmark of many newly-proposed overlay and peer-topeer applications. Distributed caching protocols in which group members cooperate to satisfy local requests for objects is a canonical example...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Signal Processing

سال: 2018

ISSN: 1053-587X,1941-0476

DOI: 10.1109/tsp.2018.2813330