{"id":"https://openalex.org/W4414798809","doi":"https://doi.org/10.1109/jiot.2025.3617342","title":"Privacy-Preserving Average Consensus for Swarm Systems Subject to DoS Attacks","display_name":"Privacy-Preserving Average Consensus for Swarm Systems Subject to DoS Attacks","publication_year":2025,"publication_date":"2025-10-03","ids":{"openalex":"https://openalex.org/W4414798809","doi":"https://doi.org/10.1109/jiot.2025.3617342"},"language":"en","primary_location":{"id":"doi:10.1109/jiot.2025.3617342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3617342","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":null,"display_name":"Chenrui Zhu","orcid":null},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Chenrui Zhu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5056037931","display_name":"Bo Jiang","orcid":"https://orcid.org/0000-0003-4341-2032"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Bo Jiang","raw_affiliation_strings":["East-China Research Institute of Computer Technology, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"East-China Research Institute of Computer Technology, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5014246118","display_name":"Baojun Zhang","orcid":"https://orcid.org/0000-0001-5438-8723"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Baojun Zhang","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5069322836","display_name":"Xu Hong","orcid":"https://orcid.org/0000-0002-1121-101X"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Hong Xu","raw_affiliation_strings":["East-China Research Institute of Computer Technology, Shanghai, China"],"raw_orcid":null,"affiliations":[{"raw_affiliation_string":"East-China Research Institute of Computer Technology, Shanghai, China","institution_ids":[]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5047431460","display_name":"Yiming Wu","orcid":"https://orcid.org/0000-0001-9766-2307"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Yiming Wu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-9766-2307","affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5041210918","display_name":"Ming Xu","orcid":"https://orcid.org/0000-0001-9332-5258"},"institutions":[{"id":"https://openalex.org/I50760025","display_name":"Hangzhou Dianzi University","ror":"https://ror.org/0576gt767","country_code":"CN","type":"education","lineage":["https://openalex.org/I50760025"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Ming Xu","raw_affiliation_strings":["School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China"],"raw_orcid":"https://orcid.org/0000-0001-9332-5258","affiliations":[{"raw_affiliation_string":"School of Cyberspace, Hangzhou Dianzi University, Hangzhou, China","institution_ids":["https://openalex.org/I50760025"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":6,"corresponding_author_ids":[],"corresponding_institution_ids":["https://openalex.org/I50760025"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.30654704,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":"12","issue":"24","first_page":"53659","last_page":"53669"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9871000051498413,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10064","display_name":"Complex Network Analysis Techniques","score":0.9681000113487244,"subfield":{"id":"https://openalex.org/subfields/3109","display_name":"Statistical and Nonlinear Physics"},"field":{"id":"https://openalex.org/fields/31","display_name":"Physics and Astronomy"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9559999704360962,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/implementation","display_name":"Implementation","score":0.6238999962806702},{"id":"https://openalex.org/keywords/consensus-algorithm","display_name":"Consensus algorithm","score":0.5809999704360962},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.47290000319480896},{"id":"https://openalex.org/keywords/swarm-behaviour","display_name":"Swarm behaviour","score":0.4708000123500824},{"id":"https://openalex.org/keywords/consensus","display_name":"Consensus","score":0.43389999866485596},{"id":"https://openalex.org/keywords/protocol","display_name":"Protocol (science)","score":0.42750000953674316},{"id":"https://openalex.org/keywords/multi-agent-system","display_name":"Multi-agent system","score":0.4059999883174896},{"id":"https://openalex.org/keywords/communications-protocol","display_name":"Communications protocol","score":0.36899998784065247},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.3499000072479248}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7419999837875366},{"id":"https://openalex.org/C26713055","wikidata":"https://www.wikidata.org/wiki/Q245962","display_name":"Implementation","level":2,"score":0.6238999962806702},{"id":"https://openalex.org/C2983222225","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus algorithm","level":2,"score":0.5809999704360962},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.47290000319480896},{"id":"https://openalex.org/C181335050","wikidata":"https://www.wikidata.org/wiki/Q14915018","display_name":"Swarm behaviour","level":2,"score":0.4708000123500824},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.4578999876976013},{"id":"https://openalex.org/C107107730","wikidata":"https://www.wikidata.org/wiki/Q2994424","display_name":"Consensus","level":3,"score":0.43389999866485596},{"id":"https://openalex.org/C2780385302","wikidata":"https://www.wikidata.org/wiki/Q367158","display_name":"Protocol (science)","level":3,"score":0.42750000953674316},{"id":"https://openalex.org/C41550386","wikidata":"https://www.wikidata.org/wiki/Q529909","display_name":"Multi-agent system","level":2,"score":0.4059999883174896},{"id":"https://openalex.org/C12269588","wikidata":"https://www.wikidata.org/wiki/Q132364","display_name":"Communications protocol","level":2,"score":0.36899998784065247},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.35690000653266907},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.3499000072479248},{"id":"https://openalex.org/C199845137","wikidata":"https://www.wikidata.org/wiki/Q145490","display_name":"Network topology","level":2,"score":0.3465000092983246},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.33059999346733093},{"id":"https://openalex.org/C47458327","wikidata":"https://www.wikidata.org/wiki/Q910404","display_name":"Random graph","level":3,"score":0.31279999017715454},{"id":"https://openalex.org/C192126672","wikidata":"https://www.wikidata.org/wiki/Q1068715","display_name":"Telecommunications network","level":2,"score":0.31189998984336853},{"id":"https://openalex.org/C35341882","wikidata":"https://www.wikidata.org/wiki/Q8795","display_name":"Internet Protocol","level":3,"score":0.29339998960494995},{"id":"https://openalex.org/C81860439","wikidata":"https://www.wikidata.org/wiki/Q251212","display_name":"Internet of Things","level":2,"score":0.2915000021457672},{"id":"https://openalex.org/C104954878","wikidata":"https://www.wikidata.org/wiki/Q1648707","display_name":"Routing protocol","level":3,"score":0.28839999437332153},{"id":"https://openalex.org/C63479239","wikidata":"https://www.wikidata.org/wiki/Q7353546","display_name":"Robustness (evolution)","level":3,"score":0.28450000286102295},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.2687999904155731},{"id":"https://openalex.org/C94523657","wikidata":"https://www.wikidata.org/wiki/Q4085781","display_name":"Wireless ad hoc network","level":3,"score":0.257099986076355},{"id":"https://openalex.org/C130120984","wikidata":"https://www.wikidata.org/wiki/Q2835898","display_name":"Distributed algorithm","level":2,"score":0.2522999942302704},{"id":"https://openalex.org/C169337768","wikidata":"https://www.wikidata.org/wiki/Q2446723","display_name":"Swarm robotics","level":3,"score":0.25049999356269836}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/jiot.2025.3617342","is_oa":false,"landing_page_url":"https://doi.org/10.1109/jiot.2025.3617342","pdf_url":null,"source":{"id":"https://openalex.org/S2480266640","display_name":"IEEE Internet of Things Journal","issn_l":"2327-4662","issn":["2327-4662","2372-2541"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Internet of Things Journal","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[{"id":"https://openalex.org/G243339209","display_name":null,"funder_award_id":"2024YFB4504500","funder_id":"https://openalex.org/F4320335777","funder_display_name":"National Key Research and Development Program of China"}],"funders":[{"id":"https://openalex.org/F4320335777","display_name":"National Key Research and Development Program of China","ror":null}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":44,"referenced_works":["https://openalex.org/W1571323288","https://openalex.org/W1988084557","https://openalex.org/W1998345701","https://openalex.org/W2021821379","https://openalex.org/W2024387789","https://openalex.org/W2042733674","https://openalex.org/W2096241946","https://openalex.org/W2109426455","https://openalex.org/W2130758224","https://openalex.org/W2160643434","https://openalex.org/W2523012541","https://openalex.org/W2792700081","https://openalex.org/W2803277648","https://openalex.org/W2862543972","https://openalex.org/W2916583047","https://openalex.org/W2921500732","https://openalex.org/W2942228371","https://openalex.org/W2943125317","https://openalex.org/W2950032093","https://openalex.org/W2955025111","https://openalex.org/W2963112534","https://openalex.org/W2963245972","https://openalex.org/W2964008526","https://openalex.org/W2964208174","https://openalex.org/W2968601629","https://openalex.org/W2972791298","https://openalex.org/W2982097845","https://openalex.org/W3022323082","https://openalex.org/W3038283795","https://openalex.org/W3178207259","https://openalex.org/W3183461338","https://openalex.org/W4205157386","https://openalex.org/W4246789570","https://openalex.org/W4285164525","https://openalex.org/W4378365062","https://openalex.org/W4392939456","https://openalex.org/W4393379199","https://openalex.org/W4395056664","https://openalex.org/W4399415844","https://openalex.org/W4400275344","https://openalex.org/W4400488096","https://openalex.org/W4404056984","https://openalex.org/W4405812539","https://openalex.org/W4407212553"],"related_works":[],"abstract_inverted_index":{"warm":[0,46],"systems":[1,47,187],"have":[2,48],"attracted":[3,49],"growing":[4,50],"interest":[5,51],"due":[6,52],"to":[7,43,53,89,102,130,138,236],"Internet":[8,54],"of":[9,55,106,117,125,159,210,220,240],"Things":[10,56],"(IoT)":[11,57],"advancements":[12,58],"and":[13,21,59,67,216],"their":[14,60],"applications":[15,61],"in":[16,29,62,75,122,154],"multi-robot":[17,63],"control,":[18,64],"environmental":[19,65],"mapping,":[20,66],"intelligent":[22,68],"transportation.":[23,69],"Average":[24,70],"consensus":[25,71,99,112,170,180],"protocols":[26,72],"are":[27,73,234],"crucial":[28,74],"these":[30,76],"scenarios,":[31,77],"but":[32,78],"current":[33,79],"implementations":[34,80],"require":[35,81],"frequent":[36,82],"interagent":[37,83],"data":[38,84],"exchange,":[39,85],"posing":[40,86],"significant":[41,87],"risks":[42,88],"network":[44,90,199,215,233],"security.":[45,91],"In":[92],"this":[93],"paper,":[94],"we":[95,135],"present":[96],"a":[97,177,228],"privacy-preserving":[98,179],"algorithm":[100,171],"designed":[101,161],"ensure":[103,217],"the":[104,107,114,118,123,139,143,157,167,185,197,202,208,214,218,238],"privacy":[105],"initial":[108,119],"state":[109,133],"while":[110],"achieving":[111],"on":[113,213,227],"precise":[115],"average":[116,169,222],"values,":[120],"even":[121],"presence":[124],"denial-of-service":[126],"(DoS)":[127],"attacks.":[128,190],"First,":[129],"protect":[131],"agent":[132],"privacy,":[134],"introduce":[136],"perturbation":[137],"transmitted":[140],"information":[141],"among":[142],"agents":[144],"using":[145],"independently":[146],"generated":[147],"random":[148],"noises":[149],"drawn":[150],"from":[151],"Laplace":[152],"distributions,":[153],"conjunction":[155],"with":[156,172],"utilization":[158],"specifically":[160],"pseudo-random":[162],"values.":[163],"Then,":[164],"by":[165],"synthesizing":[166],"perturbed":[168],"an":[173],"event-triggered":[174,203],"control":[175],"strategy,":[176],"distributed":[178],"protocol":[181],"is":[182],"established":[183],"for":[184],"swarm":[186],"under":[188,196],"DoS":[189,211],"The":[191],"presented":[192],"results":[193,226],"indicate":[194],"that":[195],"given":[198],"communication":[200],"conditions,":[201],"mechanism":[204],"can":[205],"effectively":[206],"withstand":[207],"impact":[209],"attacks":[212],"achievement":[219],"accurate":[221],"consensus.":[223],"Finally,":[224],"experimental":[225],"UAV-swarm":[229],"board":[230],"based":[231],"Wi-Fi":[232],"provided":[235],"validate":[237],"effectiveness":[239],"obtained":[241],"theoretical":[242],"results.":[243]},"counts_by_year":[],"updated_date":"2025-12-11T23:09:37.256380","created_date":"2025-10-10T00:00:00"}
