Resilient Distributed Estimation Through Adversary Detection
نویسندگان
چکیده
منابع مشابه
Resilient Distributed State Estimation for LTI Systems
Consider a linear time-invariant (LTI) dynamical system monitored by a network of sensors, modeled as nodes of an underlying directed communication graph. We study the problem of collaboratively estimating the state of the system when certain nodes are compromised by adversarial attacks. Specifically, we consider a Byzantine adversary model, where a compromised node possesses complete knowledge...
متن کاملProtecting Clock Synchronization: Adversary Detection through Network Monitoring
Today, industrial networks are often used for safetycritical applications with real-time requirements. The architecture of such applications usually has a time-triggered nature that has message scheduling as a core property. Real-time scheduling can be applied only in networks where nodes share the same notion of time, i.e., they are synchronized. Therefore, clock synchronization is one of the ...
متن کاملTamper Resilient Circuits: The Adversary at the Gates
We initiate the investigation of gate-tampering attacks against cryptographic circuits. Our model is motivated by the plausibility of tampering directly with circuit gates and by the increasing use of tamper resilient gates among the known constructions that are shown to be resilient against wiretampering adversaries. We prove that gate-tampering is strictly stronger than wire-tampering. On the...
متن کاملA Distributed Challenge Detection System for Resilient Networks
The network has become essential to our daily life. With the increase in dependence, challenges to the normal operation of the network bear ever more severe consequences. Challenges include malicious attacks, misconfigurations, faults, and operational overloads. Understanding challenges is needed to build resilience mechanism. A crucial part of resilience strategy involves real-time detection o...
متن کاملMistreatment-resilient distributed caching
The distributed partitioning of autonomous, self-aware nodes into cooperative groups, within which scarce resources could be effectively shared for the benefit of the group, is increasingly emerging as a hallmark of many newly-proposed overlay and peer-topeer applications. Distributed caching protocols in which group members cooperate to satisfy local requests for objects is a canonical example...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Signal Processing
سال: 2018
ISSN: 1053-587X,1941-0476
DOI: 10.1109/tsp.2018.2813330