Table 4: Exact consensus speed test result.
Compromised Topology Subsets Steps Best Average Worst
1
Ring 9 9 8 0.429 0.851 1.398
Ring 25 25 Rank test is degenerate
Torus 9 9 3 0.288 0.599 0.825
Torus 25 25 8 1.124 5.608 9.991
Petersen 10 5 0.361 0.797 1.289
2
Ring 9 Theoretically impossible
Ring 25 Theoretically impossible
Torus 9 36 5 0.458 2.714 5.186
Torus 25 300 12 2.345 133.514 272.231
Petersen 45 8 0.659 5.909 10.695
and analysis have shown that this strategy is only rea-
sonably applicable for attack scenarios involving 1 or
2 compromised nodes or for network configurations
that are impacted by no more than 2 nodes failures or
disappearances or by one link failure. However these
scenarios are not too constraining. The algorithm has
a procedure to identify and phase out compromised
nodes once consensus has been computed, so that
malicious actors will not accumulate in the system.
The very short communication phase means that pro-
portionally very few configuration changes can occur
during a communication phase.
An open question is looming in the context of dis-
tributed edge computing. Beyond the above limited
scenarios of dynamic networks, can the linear en-
coding scheme of exact consensus be a substitute to
the less communication efficient but more robust val-
ues diffusion gossip and flooding algorithms? Likely
some answers to this question can be found in re-
search on time-varying multihop networks in network
coding and applications of observability theory to
complex networks. This is the direction of our future
research on exact consensus algorithms.
ACKNOWLEDGMENTS
Funding for this project comes from the Professor-
ship Start-Up Support Grant VGU-PSSG-02 of the
Vietnamese-German University. The authors thank
this institution for supporting this research.
REFERENCES
Ahlswede, R., Cai, N., Li, S. Y., and Yeung, R. W. (2000).
Network information flow. IEEE Trans. Inf. Theor.,
46(4):1204–1216.
Ahmad, M. A., Azuma, S., and Sugie, T. (2012). Dis-
tributed function calculation in switching topology
networks. SICE Journal of Control, Measurement,
and System Integration, 5(6):342–348.
Babai, L. (1995). Handbook of combinatorics (vol. 2).
chapter Automorphism Groups, Isomorphism, Recon-
struction, pages 1447–1540. MIT Press, Cambridge,
MA, USA.
Bahga, A. and Madisetti, V. K. (2016). Blockchain platform
for industrial internet of things. Journal of Software
Engineering and Applications, 9(10):533–546.
Carvin, D., Owezarski, P., and Berthou, P. (2014). A gen-
eralized distributed consensus algorithm for monitor-
ing and decision making in the iot. In 2014 Interna-
tional Conference on Smart Communications in Net-
work Technologies (SaCoNeT), pages 1–6.
Christidis, K. and Devetsikiotis, M. (2016). Blockchains
and smart contracts for the internet of things. IEEE
Access, 4:2292–2303.
Colistra, G., Pilloni, V., and Atzori, L. (2014). The prob-
lem of task allocation in the internet of things and
the consensus-based approach. Computer Networks,
73:98 – 111.
Cortes, J., Martinez, S., and Bullo, F. (2006). Robust ren-
dezvous for mobile autonomous agents via proximity
graphs in arbitrary dimensions. IEEE Transactions on
Automatic Control, 51(8):1289–1298.
Li, S., Oikonomou, G., Tryfonas, T., Chen, T. M., and
Xu, L. D. (2014). A distributed consensus algorithm
for decision making in service-oriented internet of
things. IEEE Transactions on Industrial Informatics,
10(2):1461–1468.
Pasqualetti, F., Bicchi, A., and Bullo, F. (2007). Dis-
tributed intrusion detection for secure consensus com-
putations. In Decision and Control, 2007 46th IEEE
Conference on, pages 5594–5599.
Pasqualetti, F., Bicchi, A., and Bullo, F. (2009). On the
security of linear consensus networks. In Proceedings
of the 48h IEEE Conference on Decision and Control
(CDC) held jointly with 2009 28th Chinese Control
Conference, pages 4894–4901.
Peng, K. and Yang, Y. (2009). Leader-following consen-
sus problem with a varying-velocity leader and time-
varying delays. Physica A: Statistical Mechanics and
its Applications, 388(2):193 – 208.
Pilloni, V., Atzori, L., and Mallus, M. (2017). Dy-
namic involvement of real world objects in the iot: A
Applicability and Resilience of a Linear Encoding Scheme for Computing Consensus
183