A Secure High-dimension Consensus Mechanism against Adversaries

被引:0
|
作者
Luo, Xiaoyu [1 ,2 ]
Zhao, Chengcheng [3 ,4 ]
He, Jianping [1 ,2 ]
机构
[1] Shanghai Jiao Tong Univ, Minist Educ China, Dept Automat, Key Lab Syst Control & Informat Proc, Shanghai 200240, Peoples R China
[2] Shanghai Engn Res Ctr Intelligent Control & Manag, Shanghai 200240, Peoples R China
[3] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou, Zhejiang, Peoples R China
[4] Univ Victoria, Dept Elect & Comp Engn, Victoria, BC, Canada
关键词
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper investigates the problem of high-dimension consensus against adversaries for multi-agent systems. Most of the existing works focus on each-dimension consensus separately. Differently, we introduce the incremental norm, i.e., the norm of local state vector's deviation for two consecutive iterations, to characterize the property of high-dimension consensus. Then, inspired by the existing two-hop-based secure one-dimension consensus, an adversary defense mechanism (ADM) against adversaries is proposed, where two-hop neighboring information is used to constrain the effect of adversaries on the performance of high-dimension consensus in a tolerable range. Specifically, if and only if the incremental norm of adversaries' state is bounded by their neighbors' maximum and minimum incremental norms, their normal neighboring agents use the transmitted state for local state update. We also show that under ADM, when adversaries do not collaborate/neighbor with each other, high-dimension consensus can be achieved and the final state is bounded by initial states of all normal agents. Finally, extensive simulations are conducted to demonstrate the effectiveness of the proposed defense mechanism.
引用
收藏
页码:789 / 794
页数:6
相关论文
共 50 条
  • [1] Quantum secure direct communication with high-dimension quantum superdense coding
    Wang, C
    Deng, FG
    Li, YS
    Liu, XS
    Long, GL
    [J]. PHYSICAL REVIEW A, 2005, 71 (04):
  • [2] High-dimension Bell inequalities
    Wu Y.
    Guo G.
    [J]. Front. Comput. Sci. China, 2008, 2 (190-192): : 190 - 192
  • [3] Encryption Schemes Secure Against Profiling Adversaries
    Diaz-Santiago, Sandra
    Chakraborty, Debrup
    [J]. E-BUSINESS AND TELECOMMUNICATIONS, ICETE 2012, 2014, 455 : 172 - 191
  • [4] Quantile regression in high-dimension with breaking
    Gabriela Ciuperca
    [J]. Journal of Statistical Theory and Applications, 2013, 12 (3): : 288 - 305
  • [5] Privacy amplification secure against active adversaries
    Maurer, U
    Wolf, S
    [J]. ADVANCES IN CRYPTOLOGY - CRYPTO'97, PROCEEDINGS, 1997, 1294 : 307 - 321
  • [6] Quantile regression in high-dimension with breaking
    Ciuperca, Gabriela
    [J]. JOURNAL OF STATISTICAL THEORY AND APPLICATIONS, 2013, 12 (03): : 288 - 305
  • [7] Perfectly Secure Message Transmission Against Rational Adversaries
    Fujita, Maiki
    Koshiba, Takeshi
    Yasunaga, Kenji
    [J]. IEEE Journal on Selected Areas in Information Theory, 2022, 3 (02): : 390 - 404
  • [8] A Secure Scalar Product Protocol Against Malicious Adversaries
    Bo Yang
    Yong Yu
    Chung-Huang Yang
    [J]. Journal of Computer Science and Technology, 2013, 28 : 152 - 158
  • [9] High-dimension to high-dimension screening for detecting genome-wide epigenetic and noncoding RNA regulators of gene expression
    Ke, Hongjie
    Ren, Zhao
    Qi, Jianfei
    Chen, Shuo
    Tseng, George C.
    Ye, Zhenyao
    Ma, Tianzhou
    [J]. BIOINFORMATICS, 2022, 38 (17) : 4078 - 4087
  • [10] Confirmer signature schemes secure against adaptive adversaries
    Camenisch, J
    Michels, M
    [J]. ADVANCES IN CRYPTOLOGY - EUROCRYPT 2000, 2000, 1807 : 243 - 258