Switching Topology for Resilient Consensus using Wi-Fi Signals

被引:0
|
作者
Wheeler, Thomas [1 ]
Bharathi, Ezhil [1 ]
Gil, Stephanie [1 ,2 ]
机构
[1] Arizona State Univ, REACT Lab, Tempe, AZ 85281 USA
[2] Arizona State Univ, Comp Sci, Tempe, AZ 85281 USA
关键词
ASYMPTOTIC CONSENSUS; COORDINATION; NETWORKS; AGENTS;
D O I
10.1109/icra.2019.8793788
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Securing multi-robot teams against malicious activity is crucial as these systems accelerate towards widespread societal integration. This emerging class of "physical networks" requires research into new methods of security that exploit their physical nature. This paper derives a theoretical framework for securing multi-agent consensus against the Sybil attack by using the physical properties of wireless transmissions. Our framework uses information extracted from the wireless channels to design a switching signal that stochastically excludes potentially untrustworthy transmissions from the consensus. Intuitively, this amounts to selectively ignoring incoming communications from untrustworthy agents, allowing for consensus to the true average to be recovered with high probability if initiated after a certain observation time T-0 that we derive. This work is different from previous work in that it allows for arbitrary malicious node values and is insensitive to the initial topology of the network so long as a connected topology over legitimate nodes in the network is feasible. We show that our algorithm will recover consensus and the true graph over the system of legitimate agents with an error rate that vanishes exponentially with time.
引用
收藏
页码:2018 / 2024
页数:7
相关论文
共 50 条
  • [21] Wi-Fi
    李景色
    今日科苑, 2013, (07) : 56 - 58
  • [22] To Wi-Fi or not to
    Scalise, D
    HOSPITALS & HEALTH NETWORKS, 2005, 79 (12): : 26 - 26
  • [24] Wi-Fi
    Rikitianskaia, Maria
    INTERNET HISTORIES, 2022, 6 (03): : 343 - 344
  • [25] Wi-Fi
    Anon
    Database and Network Journal, 2006, 36 (01): : 16 - 18
  • [26] Surveying Wi-Fi security - Presentation of Wi-Fi security measures, varius Wi-Fi attacks and a classification survey of Wi-Fi Networks in Thessaloniki
    Violettas, George E.
    Theodoroy, Tryfon L.
    Chalkias, Konstantinos
    Stephanides, George
    WINSYS 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS, 2008, : 96 - 101
  • [27] Human Activity Recognition Using Wi-Fi Signals based on Tokenized Signals with Attention
    Lee, Jaekwon
    Zhang, Lu
    Kim, Donghyun
    Toh, Kar-Ann
    2024 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, ISCAS 2024, 2024,
  • [28] Wi-Fi tracker: An organization Wi-Fi tracking system
    Mingkhwan, A.
    2006 CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING, VOLS 1-5, 2006, : 1353 - 1356
  • [29] Wi-Fi calling - Extending the reach of VoLTE to Wi-Fi
    Norell, Lennart
    Lundström, Anders
    Österlund, Håkan
    Johansson, Henrik
    Nilsson, Daniel
    Ericsson Review (English Edition), 2015, 92 (01): : 62 - 69
  • [30] Wi-Wri : Fine-grained Writing Recognition Using Wi-Fi Signals
    Cao, Xiaoxiao
    Chen, Bing
    Zhao, Yanchao
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 1366 - 1373