{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T12:49:13Z","timestamp":1769777353912,"version":"3.49.0"},"reference-count":55,"publisher":"Informa UK Limited","issue":"3","content-domain":{"domain":["www.tandfonline.com"],"crossmark-restriction":true},"short-container-title":["International Journal of Control"],"published-print":{"date-parts":[[2021,3,4]]},"DOI":"10.1080\/00207179.2019.1618496","type":"journal-article","created":{"date-parts":[[2019,5,11]],"date-time":"2019-05-11T00:17:51Z","timestamp":1557533871000},"page":"807-822","update-policy":"https:\/\/doi.org\/10.1080\/tandf_crossmark_01","source":"Crossref","is-referenced-by-count":10,"title":["Resilient group consensus in the presence of Byzantine agents"],"prefix":"10.1080","volume":"94","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5755-6371","authenticated-orcid":false,"given":"Halil Yi\u011fit","family":"\u00d6ks\u00fcz","sequence":"first","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Bo\u011fazi\u00e7i University","place":["\u0130stanbul, Turkey"]}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0166-9932","authenticated-orcid":false,"given":"Mehmet","family":"Akar","sequence":"additional","affiliation":[{"name":"Department of Electrical and Electronics Engineering, Bo\u011fazi\u00e7i University","place":["\u0130stanbul, Turkey"]}]}],"member":"301","published-online":{"date-parts":[[2019,5,22]]},"reference":[{"key":"e_1_3_3_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.2015.2406323"},{"key":"e_1_3_3_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.888039"},{"key":"e_1_3_3_4_1","doi-asserted-by":"publisher","DOI":"10.1137\/090766188"},{"key":"e_1_3_3_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2014.2322942"},{"key":"e_1_3_3_6_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1974.10480137"},{"key":"e_1_3_3_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.automatica.2017.03.008"},{"key":"e_1_3_3_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2017.2771363"},{"key":"e_1_3_3_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/5925.5931"},{"key":"e_1_3_3_10_1","doi-asserted-by":"crossref","unstructured":"Erkan \u00d6. F. Cihan O. & Akar M. (2017). Distributed consensus with multi-equilibria in directed networks. In The 2017 American Control Conference will be held Wednesday through Friday May 24-26 in Seattle WA (pp. 4681\u20134685).","DOI":"10.23919\/ACC.2017.7963678"},{"key":"e_1_3_3_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfranklin.2017.10.028"},{"key":"e_1_3_3_12_1","volume-title":"Algebraic graph theory","author":"Godsil C.","year":"2013","unstructured":"Godsil, C., & Royle, G. F. (2013). Algebraic graph theory (Vol. 207). New York, NY: Springer Science & Business Media."},{"key":"e_1_3_3_13_1","doi-asserted-by":"crossref","unstructured":"Haseltalab A. & Akar M. (2015). Approximate byzantine consensus in faulty asynchronous networks. In The 2015 American Control Conference was held Wednesday through Friday July 1\u20133 in downtown Chicago IL (pp. 1591\u20131596).","DOI":"10.1109\/ACC.2015.7170960"},{"key":"e_1_3_3_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2017.2782729"},{"key":"e_1_3_3_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.06.072"},{"key":"e_1_3_3_16_1","doi-asserted-by":"crossref","unstructured":"Ju L. Li H. Liu Y. Xue W. Li K. & Chi Z. (2010). An improved intrusion detection scheme based on weighted trust evaluation for wireless sensor networks. In Proceedings of the 5th international conference on ubiquitous information technologies and applications (CUTE) Sanya China (pp. 1\u20136).","DOI":"10.1109\/ICUT.2010.5677764"},{"key":"e_1_3_3_17_1","doi-asserted-by":"crossref","unstructured":"Karlof C. & Wagner D. (2003). Secure routing in wireless sensor networks: Attacks and countermeasures. In 2003 Proceedings of the first IEEE international workshop on sensor network protocols and applications 2003 Anchorage AK (pp. 113\u2013127).","DOI":"10.1109\/SNPA.2003.1203362"},{"key":"e_1_3_3_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.262588"},{"key":"e_1_3_3_19_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2011.561442"},{"key":"e_1_3_3_20_1","doi-asserted-by":"publisher","DOI":"10.1038\/35023164"},{"key":"e_1_3_3_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_3_3_22_1","doi-asserted-by":"crossref","unstructured":"LeBlanc H. J. & Koutsoukos X. (2012). Resilient asymptotic consensus in asynchronous robust networks. In 2012 50th annual Allerton conference on communication control and computing (Allerton) Monticello IL (pp. 1742\u20131749).","DOI":"10.1109\/Allerton.2012.6483432"},{"key":"e_1_3_3_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2013.130413"},{"key":"e_1_3_3_24_1","doi-asserted-by":"crossref","unstructured":"LeBlanc H. J. Zhang H. Sundaram S. & Koutsoukos X. (2012). Consensus of multi-agent networks in the presence of adversaries using only local information. In Proceedings of the 1st international conference on high confidence networked systems Beijing China (pp. 1\u201310).","DOI":"10.1145\/2185505.2185507"},{"key":"e_1_3_3_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jpdc.2014.05.005"},{"key":"e_1_3_3_26_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2014.985717"},{"key":"e_1_3_3_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.physa.2005.02.086"},{"key":"e_1_3_3_28_1","doi-asserted-by":"crossref","unstructured":"McLain T. & Beard R. (2000). Trajectory planning for coordinated rendezvous of unmanned air vehicles. In AIAA guidance navigation and control conference and exhibit Denver CO (p. 4369).","DOI":"10.2514\/6.2000-4369"},{"key":"e_1_3_3_29_1","doi-asserted-by":"crossref","unstructured":"\u00d6ks\u00fcz H. Y. & Akar M. (2017). Distributed consensus in resilient networks. In 56th IEEE conference on decision and control (CDC) Melbourne VIC (pp. 6383\u20136388).","DOI":"10.1109\/CDC.2017.8264622"},{"key":"e_1_3_3_30_1","doi-asserted-by":"crossref","unstructured":"\u00d6ks\u00fcz H. Y. & Akar M. (2018a). Approximate byzantine group consensus in robust networks. In American control conference (ACC) Milwaukee WI (pp. 6590\u20136595).","DOI":"10.23919\/ACC.2018.8431228"},{"key":"e_1_3_3_31_1","doi-asserted-by":"crossref","unstructured":"\u00d6ks\u00fcz H. Y. & Akar M. (2018b). Distributed multi-equilibria consensus in the presence of Byzantine adversaries and time delays. In 26th mediterranean conference on control and automation (MED) Zadar Croatia (pp. 1\u20139).","DOI":"10.1109\/MED.2018.8442971"},{"key":"e_1_3_3_32_1","doi-asserted-by":"crossref","unstructured":"\u00d6ks\u00fcz H. Y. & Akar M. (2019). Distributed resilient consensus: A non-parametric approach. Transactions of the Institute of Measurement and Control 41(8) 2124\u20132134.","DOI":"10.1177\/0142331218785673"},{"key":"e_1_3_3_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2004.834113"},{"issue":"1","key":"e_1_3_3_34_1","first-page":"1","article-title":"A survey of attacks, security mechanisms and challenges in wireless sensor networks","volume":"4","author":"Padmavathi D. G.","year":"2009","unstructured":"Padmavathi, D. G., & Shanmugapriya, M. (2009). A survey of attacks, security mechanisms and challenges in wireless sensor networks. International Journal of Computer Science and Information Security (IJCSIS), 4(1), 1\u20139.","journal-title":"International Journal of Computer Science and Information Security (IJCSIS)"},{"key":"e_1_3_3_35_1","doi-asserted-by":"crossref","unstructured":"Parno B. Perrig A. & Gligor V. (2005). Distributed detection of node replication attacks in sensor networks. In IEEE symposium on security and privacy Oakland CA (pp. 49\u201363).","DOI":"10.1109\/SP.2005.8"},{"key":"e_1_3_3_36_1","doi-asserted-by":"crossref","unstructured":"Pasqualetti F. Bicchi A. & Bullo F. (2007). Distributed intrusion detection for secure consensus computations. In 46th IEEE conference on decision and control New Orleans LA (pp. 5594\u20135599).","DOI":"10.1109\/CDC.2007.4434297"},{"key":"e_1_3_3_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2011.2158130"},{"key":"e_1_3_3_38_1","volume-title":"Foundations of mathematical analysis","author":"Ponnusamy S.","year":"2011","unstructured":"Ponnusamy, S. (2011). Foundations of mathematical analysis. New York, NY: Springer Science & Business Media."},{"key":"e_1_3_3_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207170902948027"},{"key":"e_1_3_3_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2005.846556"},{"key":"e_1_3_3_41_1","doi-asserted-by":"crossref","unstructured":"Salda\u00f1a D. Prorok A. Sundaram S. Campos M. F. & Kumar V. (2017). Resilient consensus for time-varying networks of dynamic agents. In American control conference (ACC) Seattle WA (pp. 252\u2013258).","DOI":"10.23919\/ACC.2017.7962962"},{"key":"e_1_3_3_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/LCOMM.2015.2499190"},{"key":"e_1_3_3_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2018.10.001"},{"key":"e_1_3_3_44_1","doi-asserted-by":"crossref","unstructured":"Sundaram S. & Hadjicostis C. N. (2008a). Distributed function calculation via linear iterations in the presence of malicious agents-Part I: Attacking the network. In American Control Conference (ACC) Seattle WA (pp. 1350\u20131355).","DOI":"10.1109\/ACC.2008.4586680"},{"key":"e_1_3_3_45_1","doi-asserted-by":"crossref","unstructured":"Sundaram S. & Hadjicostis C. N. (2008b). Distributed function calculation via linear iterations in the presence of malicious agents-Part II: Overcoming malicious behavior. In American control conference (ACC) Seattle WA (pp. 1356\u20131361).","DOI":"10.1109\/ACC.2008.4586681"},{"key":"e_1_3_3_46_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2017.1286040"},{"key":"e_1_3_3_47_1","doi-asserted-by":"crossref","unstructured":"Tseng L. & Vaidya N. (2013). Iterative approximate byzantine consensus under a generalized fault model. In International conference on distributed computing and networking Mumbai India (pp. 72\u201386).","DOI":"10.1007\/978-3-642-35668-1_6"},{"key":"e_1_3_3_48_1","doi-asserted-by":"crossref","unstructured":"Tseng L. & Vaidya N. (2014). Iterative approximate consensus in the presence of byzantine link failures. In Networked systems (pp. 84\u201398). Marrakech Morocco: Springer.","DOI":"10.1007\/978-3-319-09581-3_7"},{"key":"e_1_3_3_49_1","doi-asserted-by":"crossref","unstructured":"Vaidya N. H. (2014). Iterative byzantine vector consensus in incomplete graphs. In International conference on distributed computing and networking Coimbatore India (pp. 14\u201328).","DOI":"10.1007\/978-3-642-45249-9_2"},{"key":"e_1_3_3_50_1","doi-asserted-by":"crossref","unstructured":"Vaidya N. H. Tseng L. & Liang G. (2012). Iterative approximate byzantine consensus in arbitrary directed graphs. In Proceedings of the 2012 ACM symposium on principles of distributed computing Madeira Portugal (pp. 365\u2013374).","DOI":"10.1145\/2332432.2332505"},{"key":"e_1_3_3_51_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2015.1072876"},{"key":"e_1_3_3_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCSI.2008.2003373"},{"key":"e_1_3_3_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2010.03.009"},{"key":"e_1_3_3_54_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.sysconle.2010.03.009"},{"key":"e_1_3_3_55_1","doi-asserted-by":"crossref","unstructured":"Zhang H. & Sundaram S. (2012). Robustness of information diffusion algorithms to locally bounded adversaries. In American control conference (ACC) Montreal QC (pp. 5855\u20135861).","DOI":"10.1109\/ACC.2012.6315661"},{"key":"e_1_3_3_56_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207179.2015.1043581"}],"container-title":["International Journal of Control"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207179.2019.1618496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,29]],"date-time":"2026-01-29T20:26:24Z","timestamp":1769718384000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.tandfonline.com\/doi\/full\/10.1080\/00207179.2019.1618496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,22]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,3,4]]}},"alternative-id":["10.1080\/00207179.2019.1618496"],"URL":"https:\/\/doi.org\/10.1080\/00207179.2019.1618496","relation":{},"ISSN":["0020-7179","1366-5820"],"issn-type":[{"value":"0020-7179","type":"print"},{"value":"1366-5820","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,5,22]]},"assertion":[{"value":"The publishing and review policy for this title is described in its Aims & Scope.","order":1,"name":"peerreview_statement","label":"Peer Review Statement"},{"value":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcon20","URL":"http:\/\/www.tandfonline.com\/action\/journalInformation?show=aimsScope&journalCode=tcon20","order":2,"name":"aims_and_scope_url","label":"Aim & Scope"},{"value":"2018-04-24","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-08","order":2,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-05-22","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}