Tolerating Malicious Monitors in Detecting Misbehaving Robots

被引:3
|
作者
Bicchi, Antonio [1 ]
Fagiolini, Adriano [1 ]
Dini, Gianluca [2 ]
Savino, Ida Maria [2 ]
机构
[1] Univ Pisa, Fac Engn, Interdepartmental Res Ctr E Piaggio, I-56100 Pisa, Italy
[2] Univ Pisa, Fac Engn, Dipartimento Informat, I-56100 Pisa, Italy
关键词
distributed detection; malicious monitors; monitor failure; robust consensus;
D O I
10.1109/SSRR.2008.4745886
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers a multi-agent system and focuses on the detection of motion misbehavior. Previous work by the authors proposed a solution, where agents act as local monitors of their neighbors and use locally sensed information as well as data received from other monitors. In this work, we consider possible failure of monitors that may send incorrect information to their neighbors due to spontaneous or even malicious malfunctioning. In this context, we propose a distributed software architecture that is able to tolerate such failures. Effectiveness of the proposed solution is shown through preliminary simulation results.
引用
收藏
页码:109 / +
页数:2
相关论文
共 50 条
  • [31] DCAP: Detecting misbehaving flows via collaborative aggregate policing
    Chuah, CN
    Subramanian, L
    Katz, RH
    [J]. ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2003, 33 (05) : 5 - 18
  • [32] Dynamically Detecting and Tolerating IF-Condition Data Races
    Qi, Shanxiang
    Muzahid, Abdullah A.
    Ahn, Wonsun
    Torrellas, Josep
    [J]. 2014 20TH IEEE INTERNATIONAL SYMPOSIUM ON HIGH PERFORMANCE COMPUTER ARCHITECTURE (HPCA-20), 2014, : 120 - 131
  • [33] Malicious Event Detecting in Twitter Communities
    Amato, Flora
    Cozzolino, Giovanni
    Mazzeo, Antonino
    Romano, Sara
    [J]. INTELLIGENT INTERACTIVE MULTIMEDIA SYSTEMS AND SERVICES 2016, 2016, 55 : 63 - 72
  • [34] Detecting Malicious Driving with Machine Learning
    Yardy, Kevin
    Almehmadi, Abdulaziz
    El-Khatib, Khalil
    [J]. 2019 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2019,
  • [35] Proposal of a method detecting malicious processes
    Yamamoto, Takumi
    Kawauchi, Kiyoto
    Sakurai, Shoji
    [J]. 2014 28TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2014, : 518 - 523
  • [36] Detecting malicious logins as graph anomalies
    Powell, Brian A.
    [J]. JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2020, 54
  • [37] A toolkit for detecting and analyzing malicious software
    Weber, M
    Schmid, M
    Schatz, M
    Geyer, D
    [J]. 18TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2002, : 423 - 431
  • [38] Detecting malicious behavior in cooperative diversity
    Dehnie, Sintayehu
    Sencar, Huserv T.
    Memon, Nasir
    [J]. 2007 41ST ANNUAL CONFERENCE ON INFORMATION SCIENCES AND SYSTEMS, VOLS 1 AND 2, 2007, : 895 - +
  • [39] Detecting Malicious Activity with DNS Backscatter
    Fukuda, Kensuke
    Heidemann, John
    [J]. IMC'15: PROCEEDINGS OF THE 2015 ACM CONFERENCE ON INTERNET MEASUREMENT CONFERENCE, 2015, : 197 - 210
  • [40] Analyzing and Detecting Malicious Flash Advertisements
    Ford, Sean
    Cova, Marco
    Kruegel, Christopher
    Vigna, Giovanni
    [J]. 25TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, 2009, : 363 - 372