• DocumentCode
    2383333
  • Title

    Distributed function calculation via linear iterations in the presence of malicious agents — Part II: Overcoming malicious behavior

  • Author

    Sundaram, Shreyas ; Hadjicostis, Christoforos N.

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Illinois at Urbana-Champaign, Urbana, IL
  • fYear
    2008
  • fDate
    11-13 June 2008
  • Firstpage
    1356
  • Lastpage
    1361
  • Abstract
    Given a network of interconnected nodes, each with a given initial value, we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of these initial values, despite the presence of some malicious (or faulty) nodes. Our scheme utilizes a linear iterative strategy where, at each time-step, each node updates its value to be a weighted average of its own previous value and those of its neighbors. We consider a node to be malicious if, instead of following the predefined linear iterative strategy, it updates its value arbitrarily at each time-step (perhaps by conspiring and coordinating with other malicious nodes). When there are up to f malicious nodes, we show that any node in the network is guaranteed to be able to calculate any arbitrary function of all initial node values if the graph of the network is at least (2f +1)-connected. Specifically, we show that under this condition, the nodes can calculate their desired functions after running the linear iteration for a finite number of time- steps (upper bounded by the number of nodes in the network) using almost any set of weights (i.e., for all weights except for a set of measure zero). Our approach treats the problem of fault-tolerant distributed consensus, where all nodes have to calculate the same function despite the presence of faulty or malicious nodes, as a special case.
  • Keywords
    distributed sensors; fault tolerance; functional analysis; linear systems; multi-agent systems; distributed function calculation; fault-tolerant distributed consensus; finite number; interconnected nodes; linear iterative strategy; malicious agents; Control systems; Electronic mail; Engineering profession; Fault tolerance; Iterative methods; Linear systems; Multiagent systems; Network topology; Observability; Protocols;
  • fLanguage
    English
  • Publisher
    ieee
  • Conference_Titel
    American Control Conference, 2008
  • Conference_Location
    Seattle, WA
  • ISSN
    0743-1619
  • Print_ISBN
    978-1-4244-2078-0
  • Electronic_ISBN
    0743-1619
  • Type

    conf

  • DOI
    10.1109/ACC.2008.4586681
  • Filename
    4586681