2016
DOI: 10.1109/tac.2015.2477904
|View full text |Cite
|
Sign up to set email alerts
|

Robust Distributed Averaging: When are Potential-Theoretic Strategies Optimal?

Abstract: We study the interaction between a network designer and an adversary over a dynamical network.The network consists of nodes performing continuous-time distributed averaging. The adversary strategically disconnects a set of links to prevent the nodes from reaching consensus. Meanwhile, the network designer assists the nodes in reaching consensus by changing the weights of a limited number of links in the network. We formulate two Stackelberg games to describe this competition where the order in which the player… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
18
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 10 publications
(18 citation statements)
references
References 20 publications
0
18
0
Order By: Relevance
“…Robustifying network operations in the presence of nonidealities of physical nature (such as switching topologies and transmission delays [1], [2]; noisy links [3]; quantization [4]; random link failures [5]), as well as securing them against misbehavior of nodes and malicious adversarial attacks have been important areas of research in network security [6], [7]. Most research in this arena has been focused on applications such as consensus formation, or distributed averaging, and selected behavior of the adversary that leads to disruption of the underlying operation [8], [9]. In this paper, our goal is to analyze network interdiction's influence on the operations of the consensus dynamics from a computational perspective.…”
Section: Introductionmentioning
confidence: 99%
See 4 more Smart Citations
“…Robustifying network operations in the presence of nonidealities of physical nature (such as switching topologies and transmission delays [1], [2]; noisy links [3]; quantization [4]; random link failures [5]), as well as securing them against misbehavior of nodes and malicious adversarial attacks have been important areas of research in network security [6], [7]. Most research in this arena has been focused on applications such as consensus formation, or distributed averaging, and selected behavior of the adversary that leads to disruption of the underlying operation [8], [9]. In this paper, our goal is to analyze network interdiction's influence on the operations of the consensus dynamics from a computational perspective.…”
Section: Introductionmentioning
confidence: 99%
“…Our work is based on the modeling framework and analysis described in the recent paper [8], which adopted the setting of distributed averaging (as network operation). Without the presence of an adversary, distributed averaging involves the computation of the average of the initial values stored at each node of a graph in a distributed way, where, in an evolving process, each node (agent) updates its value as a linear combination of the values of its neighbors.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations