Papers
Topics
Authors
Recent
Detailed Answer
Quick Answer
Concise responses based on abstracts only
Detailed Answer
Well-researched responses based on abstracts and relevant paper content.
Custom Instructions Pro
Preferences or requirements that you'd like Emergent Mind to consider when generating responses
Gemini 2.5 Flash
Gemini 2.5 Flash 62 tok/s
Gemini 2.5 Pro 48 tok/s Pro
GPT-5 Medium 14 tok/s Pro
GPT-5 High 13 tok/s Pro
GPT-4o 93 tok/s Pro
Kimi K2 213 tok/s Pro
GPT OSS 120B 458 tok/s Pro
Claude Sonnet 4 38 tok/s Pro
2000 character limit reached

Trustworthy Distributed Average Consensus based on Locally Assessed Trust Evaluations (2309.00920v1)

Published 2 Sep 2023 in cs.MA

Abstract: This paper proposes a distributed algorithm for average consensus in a multi-agent system under a fixed bidirectional communication topology, in the presence of malicious agents (nodes) that may try to influence the average consensus outcome by manipulating their updates. The proposed algorithm converges asymptotically to the average of the initial values of the non-malicious nodes, which we refer to as the trustworthy average, as long as the underlying topology that describes the information exchange among the non-malicious nodes is connected. We first present a distributed iterative algorithm that assumes that each node receives (at each iteration or periodically) side information about the trustworthiness of the other nodes, and it uses such trust assessments to determine whether or not to incorporate messages received from its neighbors, as well as to make proper adjustments in its calculation depending on whether a previously trustworthy neighbor becomes untrustworthy or vice-versa. We show that, as long as the trust assessments for each non-malicious node eventually reflect correctly the status (malicious or non-malicious) of its neighboring nodes, the algorithm guarantees asymptotic convergence to the trustworthy average. We subsequently discuss how the proposed algorithm can be enhanced with functionality that enables each node to obtain trust assessments about its neighbors by utilizing information that it receives from its two-hop neighbors at infrequent, perhaps randomly chosen, time instants.

Citations (1)

Summary

We haven't generated a summary for this paper yet.

List To Do Tasks Checklist Streamline Icon: https://streamlinehq.com

Collections

Sign up for free to add this paper to one or more collections.

Lightbulb On Streamline Icon: https://streamlinehq.com

Continue Learning

We haven't generated follow-up questions for this paper yet.