Article ID Journal Published Year Pages File Type
717350 IFAC Proceedings Volumes 2012 6 Pages PDF
Abstract

In this work, we consider two types of adversarial attacks on a network of nodes seeking to reach consensus. The first type involves an adversary that is capable of breaking a specific number of links at each time instant. In the second attack, the adversary is capable of corrupting the values of the nodes by adding a noise signal. In this latter case, we assume that the adversary is constrained by a power budget. We consider the optimization problem of the adversary and fully characterize its optimum strategy for each scenario.

Related Topics
Physical Sciences and Engineering Engineering Computational Mechanics