Assume that each node assigns equal weights to each incoming edge. Then, for instance, the update equation for x1 is x1 (t+1) = (x2+x3+x4)/3. Assume that each node can measure the state of the...

1 answer below »
Assume that each node assigns equal weights to each incoming edge. Then, for instance, the update equation for x1 is x1 (t+1) = (x2+x3+x4)/3. Assume that each node can measure the state of the incoming neighbors. Then, for instance, node x1 can measure independently the state of x2, x3, and x4 at each time step (and itself, x1). Using the measured values, each node aims to compute the state of all other nodes.1. Which node can reconstruct the state of the other nodes?2. You are an attacker that aims to prevent x1 from calculating the correct state of theother nodes, while remaining undetected from x1. As an attacker, you can target asubset of the other nodes (inject an input signal into some nodes). What is a smallest set of nodes that you need to target? How would you choose the attack inputs?3. Repeat the analysis for x3.4. Assume that an attacker can only compromise 1 node. Using the measurementscollected by x1, which are contained in the attached matrix, determine which node has been compromised.



Microsoft Word - HW3.docx Consider the following consensus network: Assume that each node assigns equal weights to each incoming edge. Then, for instance, the update equation for x1 is x1 (t+1) = (x2+x3+x4)/3. Assume that each node can measure the state of the incoming neighbors. Then, for instance, node x1 can measure independently the state of x2, x3, and x4 at each time step (and itself, x1). Using the measured values, each node aims to compute the state of all other nodes. 1. Which node can reconstruct the state of the other nodes? 2. You are an attacker that aims to prevent x1 from calculating the correct state of the other nodes, while remaining undetected from x1. As an attacker, you can target a subset of the other nodes (inject an input signal into some nodes). What is a smallest set of nodes that you need to target? How would you choose the attack inputs? 3. Repeat the analysis for x3. 4. Assume that an attacker can only compromise 1 node. Using the measurements collected by x1, which are contained in the attached matrix, determine which node has been compromised. Microsoft Word - HW3.docx Consider the following consensus network: Assume that each node assigns equal weights to each incoming edge. Then, for instance, the update equation for x1 is x1 (t+1) = (x2+x3+x4)/3. Assume that each node can measure the state of the incoming neighbors. Then, for instance, node x1 can measure independently the state of x2, x3, and x4 at each time step (and itself, x1). Using the measured values, each node aims to compute the state of all other nodes. 1. Which node can reconstruct the state of the other nodes? 2. You are an attacker that aims to prevent x1 from calculating the correct state of the other nodes, while remaining undetected from x1. As an attacker, you can target a subset of the other nodes (inject an input signal into some nodes). What is a smallest set of nodes that you need to target? How would you choose the attack inputs? 3. Repeat the analysis for x3. 4. Assume that an attacker can only compromise 1 node. Using the measurements collected by x1, which are contained in the attached matrix, determine which node has been compromised.
Answered Same DayMay 18, 2021

Answer To: Assume that each node assigns equal weights to each incoming edge. Then, for instance, the update...

Rahul answered on May 25 2021
141 Votes
Matlab_25052020/~$nsensus Network.docx
Matlab_25052020/Consensus Network.docx
Consensus Network
a. x5 is node which ca
n reconstruct the state of the other nodes
Explanation: x3 is the value depend only on the incoming value of x6 so x3 is calculated with x6 .
x3(n +1) = x6(n)
x6(n+1) = (x3(n) + x4(n) + x5(n))/3;
x3(n) = x6(n-1)
x6(n+1) = (x6(n-1) + x4(n) + x5(n))/3
x5(n+1) = x2(n) + x6(n))/2;
x4(n+1) = (x2(n) + x5(n) + x6(n))/3
x4(n+1) = (2*x5(n+1) + x5(n) )/3
x4(n) = (2*x5(n) + x5(n-1) )/3
x6(n+1) = (x6(n-1) + (2*x5(n) + x5(n-1) )/3)+ x5(n))/3
Similarly x2 is also dependent on the x5. So from this equation we can say all node depend on the value of x5. So x5 can reconstruct all the value of the node.
b. x1 is used to find all the value in the network. x1 takes the input from x3, x4 and x2. So as attacker I don’t want to put the error in 2,3 and 4 nodes because they are directly connected with x1. So for the error there are two main option x5 and x6. x5 and x6 can act as malicious nodes.
By the following method we can put the error
x5(n+1) = (x2(n) + x6(n))/2 + u1(n)
x6(n+1) = (x3(n) + x4(n) + x5(n))/3 + u2(n)
u1(n) and u2(n) are the errors at each time steps. They...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here