Fig 1 - uploaded by Ernesto Del Prete
Content may be subject to copyright.

Scheme of the part of the testbed involved in the study.
Context in source publication
Context 1
... water flow is managed by actuators (pumps and valves). For the sake of simplicity, in this work we adopt only a part of the entire test bed taking into account the system shown in Figure 1. The adopted system is composed by two tanks equipped with a sensor, two valves and a centrifugal pump which generates a water flow from a water reservoir. ...
Similar publications
Citations
... Many distributed control and estimation strategies are designed based on consensus algorithms [1], [2], which increase the capabilities of individual agents with limited communication and sensing ranges, establishing themselves in applications such as mobile robots [3], the sub-systems of a plant [4], wireless sensor networks [5], [6], or strategies applied to blockchain [7]. In these contexts, cyber attacks are particularly critical as they can easily affect the operation of physical processes [8]. In particular, privacy attacks are mostly passive and may require access to private data, or make inferences about specific information based on public data [9], [10]. ...
Distributed average consensus is a fundamental feature of multi-agents systems; yet, in several cases agents are reluctant to disclose their initial conditions, e.g., due to their sensitivity about private data.
Consequently, ensuring the privacy of such information against honest but curious neighbours becomes a mandatory necessity. In this paper we propose to implement a privacy-preserving consensus strategy that exploits, for this purpose, unpredictable chaotic phenomena, such as the trend of variables in a Chua oscillator. The initial conditions are then split into two fragments, one of which always remains hidden in the node, while the other is exchanged after undergoing oscillator-dependent manipulation, adding an extra layer of security to what is exchanged over the network. In this way, the combination of the two fragments converges to the average of the true initial conditions of each node. The paper is complemented by a simulation campaign aimed at numerically demonstrating the effectiveness of the proposed approach.