A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks
DOI10.1016/J.AUTOMATICA.2012.06.072zbMATH Open1252.93011OpenAlexW1983915728WikidataQ57581657 ScholiaQ57581657MaRDI QIDQ694835FDOQ694835
Authors: Shreyas Sundaram, Shai Revzen, George Pappas
Publication date: 13 December 2012
Published in: Automatica (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1016/j.automatica.2012.06.072
Recommendations
- Global dynamics and control of malicious signal transmission in wireless sensor networks
- Exploring the behavior of malware propagation on mobile wireless sensor networks: stability and control analysis
- Resilient stabilization of multi-hop control networks subject to malicious attacks
- A probabilistic characterization of random and malicious communication failures in multi-hop networked control
- Networked Control Under Random and Malicious Packet Losses
- Adversarial control in a delay tolerant network
- Security control of networked systems with deception attacks and packet dropouts: a discrete-time approach
- Reputation-based networked control with data-corrupting channels
- Security and infiltration of networks: A structural controllability and observability perspective
- The Wireless Control Network: A New Approach for Control Over Networks
Information theory (general) (94A15) Communication networks in operations research (90B18) Large-scale systems (93A15)
Cites Work
- Consensus and Cooperation in Networked Multi-Agent Systems
- Dissemination of information in communication networks. Broadcasting, gossiping, leader election, and fault-tolerance.
- Title not available (Why is that?)
- Title not available (Why is that?)
- Generic properties and control of linear structured systems: A survey
- Title not available (Why is that?)
- Coding for Errors and Erasures in Random Network Coding
- Distributed asynchronous deterministic and stochastic gradient optimization algorithms
- Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents
- Consensus Computation in Unreliable Networks: A System Theoretic Approach
- Strong detectability and observers
- Resilient Network Coding in the Presence of Byzantine Adversaries
- Research on system zeros: a survey
- Title not available (Why is that?)
- Broadcast in radio networks tolerating byzantine adversarial behavior
Cited In (2)
This page was built for publication: A control-theoretic approach to disseminating values and overcoming malicious links in wireless networks
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q694835)