2018 IEEE Conference on Decision and Control (CDC) 2018
DOI: 10.1109/cdc.2018.8619772
|View full text |Cite
|
Sign up to set email alerts
|

On the Impact of Trusted Nodes in Resilient Distributed State Estimation of LTI Systems

Abstract: We address the problem of distributed state estimation of a linear dynamical process in an attack-prone environment. Recent attempts to solve this problem impose stringent redundancy requirements on the measurement and communication resources of the network. In this paper, we take a step towards alleviating such strict requirements by exploring two complementary directions: (i) making a small subset of the nodes immune to attacks, or "trusted", and (ii) incorporating diversity into the network. We define graph… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(19 citation statements)
references
References 25 publications
0
19
0
Order By: Relevance
“…Theorem 2. Under the F -total malicious model, the normal agents with E-MSR using (23) and (5) reach resilient consensus if and only if the underlying graph is (F + 1, F + 1)robust. The safety interval is given by S = x(0),x(0) , and the consensus error level c is achieved if the parameter c 0 in the triggering function (3) satisfies…”
Section: Protocolmentioning
confidence: 99%
See 2 more Smart Citations
“…Theorem 2. Under the F -total malicious model, the normal agents with E-MSR using (23) and (5) reach resilient consensus if and only if the underlying graph is (F + 1, F + 1)robust. The safety interval is given by S = x(0),x(0) , and the consensus error level c is achieved if the parameter c 0 in the triggering function (3) satisfies…”
Section: Protocolmentioning
confidence: 99%
“…The initial values x i (0) of the nodes and the (constant) weights a ij (k) on the edges are indicated in the figure. Since the weights are all 1/2 (and thus γ = 1/2), for nodes having two neighbors, their own values are not used in the update rule (23). Moreover, for the node in the far left, a self-loop is shown to indicate that this node uses its own value.…”
Section: Protocolmentioning
confidence: 99%
See 1 more Smart Citation
“…However, this algorithm works under the assumption that an agent can fully observe the true state in the non-faulty condition [25, Section II.A], as opposed to our model which deals with both observability and noisy measurement issues. Mitra and Sundaram [26] consider the more general LTI systems and characterize the fundamental limits on adversary-resilient algorithms. However, unlike our work, [26] deals with noiseless observations and the focus is on asymptotic analysis.…”
Section: B Related Literaturementioning
confidence: 99%
“…results that draw upon these papers include state estimation [18][19][20][21], rendezvous of mobile agents [22,23], output synchronization [11], simultaneous arrival of interceptors [17], distributed optimization [29,31], reliable broadcast [33,43], clock synchronization [8], randomized quantized consensus [5], self-triggered coordination [26], and multi-hop communication [30].…”
Section: Introductionmentioning
confidence: 99%