2015
DOI: 10.1109/tsp.2015.2441039
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Identification of the Most Critical Node for Average Consensus

Abstract: In communication networks, cyber attacks, such as resource depleting attacks, can cause failure of nodes and can damage or significantly slow down the convergence of the average consensus algorithm. In particular, if the network topology information is learned, an intelligent adversary can attack the most critical node in the sense that deactivating it causes the largest destruction, among all the network nodes, to the convergence speed of the average consensus algorithm. Although a centralized method can undo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

1
40
0

Year Published

2015
2015
2023
2023

Publication Types

Select...
6
2

Relationship

1
7

Authors

Journals

citations
Cited by 27 publications
(41 citation statements)
references
References 41 publications
1
40
0
Order By: Relevance
“…In addition to malicious acts, some topologies may have environmental and natural risks such as falling trees, earthquakes, landslides which can render some sensor nodes permanently inoperable. Since, even a single node has a crucial factor in the integrity of the WSN, the most critical node could be detected before performing any of these attack types [14]- [16]. Although, defense strategies for node specific attacks were developed (e.g., [17]), they still require to sacrifice some sensor nodes.…”
Section: Introductionmentioning
confidence: 99%
“…In addition to malicious acts, some topologies may have environmental and natural risks such as falling trees, earthquakes, landslides which can render some sensor nodes permanently inoperable. Since, even a single node has a crucial factor in the integrity of the WSN, the most critical node could be detected before performing any of these attack types [14]- [16]. Although, defense strategies for node specific attacks were developed (e.g., [17]), they still require to sacrifice some sensor nodes.…”
Section: Introductionmentioning
confidence: 99%
“…On the other hand, examples of topology based schemes include: the eigenvector centrality metric [23], which uses the largest eigenvector of the adjacency matrix, the Hybrid Interactive Linear Programming Rounding (HILPR) algorithm [13], which analyses the effect that a node has on the pair-wise connectivity of a network upon its removal, the GREEDY Critical Node Detection Problem approach (GREEDY-CNDP) [24] and the β − disruptor approach proposed in [25], both of which propose an efficient algorithm to minimize pairwise connectivity upon removal of k nodes, the degree centrality metric [16] [17] which uses the degree of each node, the dynamic programming approach in [26] which proposes polynomial time algorithms to find maximally disconnected graphs with maximum number of maximal connected components and minimum largest component sizes and algebraic connectivity based approaches [27] [28] [29] [30] [31] [32] which attempt to minimize the algebraic connectivity upon node removal.…”
Section: Introductionmentioning
confidence: 99%
“…In addition, when multiple critical nodes need to be found the approach becomes computationally expensive with the number of subgraphs that need to be considered increasing combinatorially with the network size. For this reason, a number of suboptimal solutions have been proposed in literature [30][31] [28] [29]. These suboptimal solutions utilize the elements of the Fiedler vector which is the eigenvector associated with the second smallest eigenvalue of the Laplacian of the network.…”
Section: Introductionmentioning
confidence: 99%
“…The node criticality problem has also been viewed as an algebraic connectivity minimization problem, where the most critical nodes are the ones which minimize the algebraic connectivity of the network [11]. Since the solution of the optimization problem becomes computationally expensive to find as the size of the network increases, a number of suboptimal solutions have been proposed in literature [12][13] [14]. Another set of approaches that exist in literature are based on the ability of nodes to fragment the network when removed.…”
Section: Introductionmentioning
confidence: 99%