Resilient consensus protocol in the presence of trusted nodes
Title | Resilient consensus protocol in the presence of trusted nodes |
Publication Type | Conference Paper |
Year of Publication | 2014 |
Authors | Waseem Abbas, Yevgeniy Vorobeychik, Xenofon Koutsoukos |
Conference Name | 7th International Symposium on Resilient Control Systems (ISRCS) |
Date Published | Aug |
Conference Location | Denver, CO |
Keywords | adversarial attacks, adversary, Buildings, connected dominating set, consensus, dominating set, graph robustness, network theory (graphs), Network topology, nonlocal information access, Protocols, resilience, resilient consensus protocol, resilient distributed consensus problem, Robustness, Topology, Tree graphs, trusted nodes notion, Vanderbilt |
Abstract | In this paper, we propose a scheme for a resilient distributed consensus problem through a set of trusted nodes within the network. Currently, algorithms that solve resilient consensus problem demand networks to have high connectivity to overrule the effects of adversaries, or require nodes to have access to some non-local information. In our scheme, we incorporate the notion of trusted nodes to guarantee distributed consensus despite any number of adversarial attacks, even in sparse networks. A subset of nodes, which are more secured against the attacks, constitute a set of trusted nodes. It is shown that the network becomes resilient against any number of attacks whenever the set of trusted nodes form a connected dominating set within the network. We also study a relationship between trusted nodes and the network robustness. Simulations are presented to illustrate and compare our scheme with the existing ones. |
URL | http://www.vuse.vanderbilt.edu/~koutsoxd/www/Publications/ISRCS2014_RC.pdf |
DOI | 10.1109/ISRCS.2014.6900100 |
Citation Key | 6900100 |
- resilience
- Vanderbilt
- dominating set
- adversary
- graph robustness
- Consensus
- Buildings
- Tree graphs
- Topology
- network topology
- network theory (graphs)
- Robustness
- Protocols
- connected dominating set
- adversarial attacks
- nonlocal information access
- resilient distributed consensus problem
- trusted nodes notion
- resilient consensus protocol