329 research outputs found

    Resilience against misbehaving nodes in asynchronous networks

    Get PDF
    When dealing with network systems, a fundamental challenge is to ensure their functioning even when some of the network nodes do not operate as intended due to faults or attacks. The objective of this paper is to address the problem of resilient consensus in a context where the nodes have their own clocks, possibly operating in an asynchronous way, and can make updates at arbitrary time instants. The results represent a first step towards the development of resilient event-triggered and self-triggered coordination protocols. (C) 2019 Elsevier Ltd. All rights reserved

    Resilience of coordination networks: data availability and integrity

    Get PDF
    With the advent of new concepts like Internet of Things (IoT), Industrial 4.0, Smart Cities, Smart Grid, new opportunities are brought into several industrial and societal domains ranging from transportation and electric power generation to traffic flow management and health care. Many of the above mentioned sectors and industries are essential to the health, safety, and security of our society and are considered critical infrastructure. This emphasizes the importance of rendering such systems “resilient” against malfunctioning due to genuine failures or cyberattacks. Real-time availability and integrity of data are crucial to ensure normal operation of the system. The first factor is related to to the fact that data flow can be occasionally interrupted, while the second factor is related to the fact that the data content might be corrupted. Given these important factors, this thesis investigates the problem of designing coordination protocols over digital communication channels, which are resilient against the lack of data and unreliable information. The results are divided in two parts. Part I is concerned with resilience against the absence of data and information accessibility due to genuine failure or cyberattacks, which results in Denial-of-Service (DoS). In particular, we are concerned with jamming attacks as we are mainly interested in wireless sensor networks. We design resilient consensus and synchronization protocols for both shared and peer-to-peer communication networks. Part II is concerned with resilience against unreliable information in the network which could be the result of genuine fault/error in the control system operation or cyberattack. The nodes that communicate untrustworthy data in the network are considered misbehaving. We investigate a resilient consensus protocol against several type of misbehavior resulting from error in operations such as, data acquisition, data transmission, control logic, and update time scheduler

    A Survey of Resilient Coordination for Cyber-Physical Systems Against Malicious Attacks

    Full text link
    Cyber-physical systems (CPSs) facilitate the integration of physical entities and cyber infrastructures through the utilization of pervasive computational resources and communication units, leading to improved efficiency, automation, and practical viability in both academia and industry. Due to its openness and distributed characteristics, a critical issue prevalent in CPSs is to guarantee resilience in presence of malicious attacks. This paper conducts a comprehensive survey of recent advances on resilient coordination for CPSs. Different from existing survey papers, we focus on the node injection attack and propose a novel taxonomy according to the multi-layered framework of CPS. Furthermore, miscellaneous resilient coordination problems are discussed in this survey. Specifically, some preliminaries and the fundamental problem settings are given at the beginning. Subsequently, based on a multi-layered framework of CPSs, promising results of resilient consensus are classified and reviewed from three perspectives: physical structure, communication mechanism, and network topology. Next, two typical application scenarios, i.e., multi-robot systems and smart grids are exemplified to extend resilient consensus to other coordination tasks. Particularly, we examine resilient containment and resilient distributed optimization problems, both of which demonstrate the applicability of resilient coordination approaches. Finally, potential avenues are highlighted for future research.Comment: 35 pages, 7 figures, 5 table

    Time constrained fault tolerance and management framework for k-connected distributed wireless sensor networks based on composite event detection

    Get PDF
    Wireless sensor nodes themselves are exceptionally complex systems where a variety of components interact in a complex way. In enterprise scenarios it becomes highly important to hide the details of the underlying sensor networks from the applications and to guarantee a minimum level of reliability of the system. One of the challenges faced to achieve this level of reliability is to overcome the failures frequently faced by sensor networks due to their tight integration with the environment. Failures can generate false information, which may trigger incorrect business processes, resulting in additional costs. Sensor networks are inherently fault prone due to the shared wireless communication medium. Thus, sensor nodes can lose synchrony and their programs can reach arbitrary states. Since on-site maintenance is not feasible, sensor network applications should be local and communication-efficient self-healing. Also, as per my knowledge, no such general framework exist that addresses all the fault issues one may encounter in a WSN, based on the extensive, exhaustive and comprehensive literature survey in the related areas of research. As one of the main goals of enterprise applications is to reduce the costs of business processes, a complete and more general Fault Tolerance and management framework for a general WSN, irrespective of the node types and deployment conditions is proposed which would help to mitigate the propagation of failures in a business environment, reduce the installation and maintenance costs and to gain deployment flexibility to allow for unobtrusive installation

    Engineering Emergence: A Survey on Control in the World of Complex Networks

    Get PDF
    Complex networks make an enticing research topic that has been increasingly attracting researchers from control systems and various other domains over the last two decades. The aim of this paper was to survey the interest in control related to complex networks research over time since 2000 and to identify recent trends that may generate new research directions. The survey was performed for Web of Science, Scopus, and IEEEXplore publications related to complex networks. Based on our findings, we raised several questions and highlighted ongoing interests in the control of complex networks.publishedVersio

    Collaboration Enforcement In Mobile Ad Hoc Networks

    Get PDF
    Mobile Ad hoc NETworks (MANETs) have attracted great research interest in recent years. Among many issues, lack of motivation for participating nodes to collaborate forms a major obstacle to the adoption of MANETs. Many contemporary collaboration enforcement techniques employ reputation mechanisms for nodes to avoid and penalize malicious participants. Reputation information is propagated among participants and updated based on complicated trust relationships to thwart false accusation of benign nodes. The aforementioned strategy suffers from low scalability and is likely to be exploited by adversaries. To address these problems, we first propose a finite state model. With this technique, no reputation information is propagated in the network and malicious nodes cannot cause false penalty to benign hosts. Misbehaving node detection is performed on-demand; and malicious node punishment and avoidance are accomplished by only maintaining reputation information within neighboring nodes. This scheme, however, requires that each node equip with a tamper-proof hardware. In the second technique, no such restriction applies. Participating nodes classify their one-hop neighbors through direct observation and misbehaving nodes are penalized within their localities. Data packets are dynamically rerouted to circumvent selfish nodes. In both schemes, overall network performance is greatly enhanced. Our approach significantly simplifies the collaboration enforcement process, incurs low overhead, and is robust against various malicious behaviors. Simulation results based on different system configurations indicate that the proposed technique can significantly improve network performance with very low communication cost
    corecore