Robust Network Agreement on Logical InformationRobust Network Agreement on Logical Information • April 29th, 2011
Contract Type FiledApril 29th, 2011Abstract: Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent’s communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent’s communication neighbors. The protocol allows the construction of a robust Boolean map that is able to tolerate incorrect information spread by some agents, due to spontaneous failure or malicious intents. Effectiveness of the proposed method is shown through an implementation on a low–cost platform.
Robust Network Agreement on Logical InformationRobust Network Agreement on Logical Information • April 29th, 2011
Contract Type FiledApril 29th, 2011Abstract: Logical consensus is an approach to distributed decision making which is based on the availability of a network of agents with incomplete system knowledge. The method requires the construction of a Boolean map which defines a dynamic system allowing the entire network to consent on a unique, global decision. Previous work by the authors proved the method to be viable for applications such as intrusion detection within a structured environment, when the agent’s communication topology is known in advance. The current work aims at providing a fully distributed protocol, requiring no a priori knowledge of each agent’s communication neighbors. The protocol allows the construction of a robust Boolean map that is able to tolerate incorrect information spread by some agents, due to spontaneous failure or malicious intents. Effectiveness of the proposed method is shown through an implementation on a low–cost platform.