2018
DOI: 10.1007/978-3-030-00533-7_17
|View full text |Cite
|
Sign up to set email alerts
|

Swarm Attack: A Self-organized Model to Recover from Malicious Communication Manipulation in a Swarm of Simple Simulated Agents

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
7
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
6
1
1

Relationship

2
6

Authors

Journals

citations
Cited by 11 publications
(7 citation statements)
references
References 18 publications
0
7
0
Order By: Relevance
“…Compared to the latest works in swarms (Canciani et al, 2019;Maître et al, 2020;Prasetyo et al, 2019;Primiero et al, 2018), to the best of our knowledge, in this paper we study for the first time the interplay between different option quality, zealot quantity and proportion of informed agents, by extending the preliminary studies in Prasetyo et al (2020) and , in which either all agents or none of the agents were able to measure the quality of their opinion and disseminate differentially based on that. In particular, we introduce here the explicit distinction between informed and uninformed agents, and study for the first time the case in which these two types of agents co-exist in the swarm at the same time.…”
Section: Related Workmentioning
confidence: 93%
“…Compared to the latest works in swarms (Canciani et al, 2019;Maître et al, 2020;Prasetyo et al, 2019;Primiero et al, 2018), to the best of our knowledge, in this paper we study for the first time the interplay between different option quality, zealot quantity and proportion of informed agents, by extending the preliminary studies in Prasetyo et al (2020) and , in which either all agents or none of the agents were able to measure the quality of their opinion and disseminate differentially based on that. In particular, we introduce here the explicit distinction between informed and uninformed agents, and study for the first time the case in which these two types of agents co-exist in the swarm at the same time.…”
Section: Related Workmentioning
confidence: 93%
“…Sargeant and Tomlinson ( 2016 ) study a wider range of attacker strategies, such as eavesdropping, data manipulation, and denial of service in robot swarms. Primiero et al ( 2018 ) show that the propagation of deceitful information through the swarm can be prevented if robots probabilistically change their belief.…”
Section: Related Workmentioning
confidence: 99%
“…They performed a preliminary study on their effect on the best-of-n with four mechanisms: voter, majority, cross inhibition, and k-unanimity (q-voter). In [22], the authors also looked at the effects of malicious adversarial zealots in a data communication manipulation scenario, proposing a probabilistic decision-making rule to increase resilience. A very recent extension has been applied and evaluated the same scheme to a simulated swarm robotics scenario [14].…”
Section: State Of the Artmentioning
confidence: 99%