The effect of leaders on the consistency of group behaviour

This paper addresses the effects of leaders on the consistency of group behaviour. First, a mathematical model is established so that the group attempts to reach a common velocity direction. The action range of leaders is formulated by their communication range. The followers update their states according to the states of both the other followers in the vicinity and the leaders which can communicate with the current follower. After establishing a system model, we then conduct simulations to discover the effects of leaders on the consistency of a group behaviour. Finally, we obtain the following results: (a) the leader is very useful in compelling the group to be consistent, even when the impact factor of the leader is very small; (b) the total consistency of the group is determined not only by the communication range of the leader, but also by the communication range of the followers.

[1]  Yang Xiao,et al.  Notice of RetractionStochastic event capture using single robot moving along a certain track , 2009, 2009 Fifth International Conference on Mobile Ad-hoc and Sensor Networks.

[2]  Reuven R. Levary,et al.  An adaptive expert system approach for intrusion detection , 2006, Int. J. Secur. Networks.

[3]  Elisa Bertino,et al.  Workflow authorisation in mediator-free environments , 2006, Int. J. Secur. Networks.

[4]  Paul Rabinovich,et al.  Secure message delivery in publish/subscribe networks using overlay multicast , 2007, Int. J. Secur. Networks.

[5]  Qijun Gu,et al.  Defence against packet injection in ad hoc networks , 2007, Int. J. Secur. Networks.

[6]  Xuemin Shen,et al.  A self-encryption authentication protocol for teleconference services , 2006, Int. J. Secur. Networks.

[7]  Myung J. Lee,et al.  A lightweight encryption and authentication scheme for wireless sensor networks , 2006, Int. J. Secur. Networks.

[8]  Mahalingam Ramkumar,et al.  Secure collaborations over message boards , 2006, Int. J. Secur. Networks.

[9]  Yang Xiao,et al.  Studying Bio-Inspired Coalition Formation of Robots for Detecting Intrusions Using Game Theory , 2010, IEEE Transactions on Systems, Man, and Cybernetics, Part B (Cybernetics).

[10]  Yu Liu,et al.  Modelling misbehaviour in ad hoc networks: a game theoretic approach for intrusion detection , 2006, Int. J. Secur. Networks.

[11]  Yang Xiao,et al.  Bio-inspired communications among robots, sensors, and RFID tags , 2009, 2009 International Conference on Mechatronics and Automation.

[12]  Jianping Pan,et al.  Vulnerabilities in distance-indexed IP traceback schemes , 2007, Int. J. Secur. Networks.

[13]  Hsiao-Hwa Chen,et al.  DKMS: distributed hierarchical access control for multimedia networks , 2007, Int. J. Secur. Networks.

[14]  Xinyuan Wang The loop fallacy and deterministic serialisation in tracing intrusion connections through stepping stones , 2006, Int. J. Secur. Networks.

[15]  Yi-Bing Lin,et al.  End-to-end security mechanisms for SMS , 2006, Int. J. Secur. Networks.

[16]  H. Jonathan Chao,et al.  Design and analysis of a multipacket signature detection system , 2007, Int. J. Secur. Networks.

[17]  Bo Sheng,et al.  Elliptic curve cryptography-based access control in sensor networks , 2006, Int. J. Secur. Networks.

[18]  Yang Xiao,et al.  Surveillance and Tracking System with Collaboration of Robots, Sensor Nodes, and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[19]  Chik How Tan,et al.  Low-power authenticated group key agreement for heterogeneous wireless networks , 2006, Int. J. Secur. Networks.

[20]  Xiannuan Liang,et al.  Stochastic Capturing Moving Intrusions by Mobile Sensors , 2009 .

[21]  Yang Xiao,et al.  Bio-inspired visual attention in agile sensing for target detection , 2009, Int. J. Sens. Networks.

[22]  Vicsek,et al.  Novel type of phase transition in a system of self-driven particles. , 1995, Physical review letters.

[23]  Jamal N. Al-Karaki,et al.  Analysis of routing security-energy trade-offs in wireless sensor networks , 2006, Int. J. Secur. Networks.

[24]  Nirwan Ansari,et al.  Adaptive trust-based anonymous network , 2007, Int. J. Secur. Networks.

[25]  Jianqing Zhang,et al.  Application-Aware Secure Multicast for Power Grid Communications , 2010, 2010 First IEEE International Conference on Smart Grid Communications.

[26]  Vasileios Karyotis,et al.  A novel framework for mobile attack strategy modelling and vulnerability analysis in wireless ad hoc networks , 2006, Int. J. Secur. Networks.

[27]  Hairong Qi,et al.  Load-balanced key establishment methodologies in wireless sensor networks , 2006, Int. J. Secur. Networks.

[28]  Mark A. Shayman,et al.  On pairwise connectivity of wireless multihop networks , 2007, Int. J. Secur. Networks.

[29]  Mercedes Pascual,et al.  Computational Ecology: From the Complex to the Simple and Back , 2005, PLoS Comput. Biol..

[30]  Jingyuan Zhang,et al.  A bio-inspired time synchronization algorithm for wireless sensor networks , 2010, 2010 2nd International Conference on Computer Engineering and Technology.

[31]  Mohamed G. Gouda,et al.  Vulnerability analysis of certificate graphs , 2006, Int. J. Secur. Networks.

[32]  Kamil Saraç,et al.  Single packet IP traceback in AS-level partial deployment scenario , 2007, Int. J. Secur. Networks.

[33]  Min Chen,et al.  Architecture and protocol design for a pervasive robot swarm communication networks , 2011, Wirel. Commun. Mob. Comput..

[34]  J. Toner,et al.  Flocks, herds, and schools: A quantitative theory of flocking , 1998, cond-mat/9804180.

[35]  Yang Xiao,et al.  A boundary surveillance strategy based on critical line in wireless sensor networks , 2009, 2009 International Conference on Mechatronics and Automation.

[36]  Athanasios V. Vasilakos,et al.  Stochastic event capturing with a single mobile robot in rectangular perimeters , 2013, Telecommun. Syst..

[37]  Neil F. Adams Social Behaviors of the California Sea Lion, Bottlenose Dolphin and Orca Whale , 2011 .

[38]  Mohan S. Kankanhalli,et al.  Building trust in peer-to-peer systems: a review , 2006, Int. J. Secur. Networks.

[39]  Chik How Tan,et al.  A new signature scheme without random oracles , 2006, Int. J. Secur. Networks.

[40]  Robert A. Malaney Securing Wi-Fi networks with position verification: extended version , 2007, Int. J. Secur. Networks.

[41]  Benjamin W. P. Ramsey,et al.  Subjective audio quality over a secure IEEE 802.11n network , 2011, Int. J. Secur. Networks.

[42]  Peng Liu,et al.  Secure and privacy-preserving information aggregation for smart grids , 2011, Int. J. Secur. Networks.

[43]  Yang Xiao,et al.  A critical line based boundary surveillance strategy in wireless sensor networks , 2013, Telecommun. Syst..

[44]  Taieb Znati,et al.  End-to-end pairwise key establishment using node disjoint secure paths in wireless sensor networks , 2007, Int. J. Secur. Networks.

[45]  Yang Xiao,et al.  Divide- and conquer-based surveillance framework using robots, sensor nodes, and RFID tags , 2011, Wirel. Commun. Mob. Comput..

[46]  Riccardo Bettati,et al.  Analysis of flow-correlation attacks in anonymity network , 2007, Int. J. Secur. Networks.

[47]  Yang Xiao,et al.  Primate social systems, scent-marking and their applications in mobile and static sensor networks , 2009, Int. J. Sens. Networks.

[48]  Yi Mu,et al.  Convertible identity-based anonymous designated ring signatures , 2006, Int. J. Secur. Networks.

[49]  Joseph B. Evans,et al.  Wireless networking security: open issues in trust, management, interoperation and measurement , 2006, Int. J. Secur. Networks.

[50]  R. Solé,et al.  Ecological networks and their fragility , 2006, Nature.

[51]  N. Mermin,et al.  Absence of Ferromagnetism or Antiferromagnetism in One- or Two-Dimensional Isotropic Heisenberg Models , 1966 .

[52]  Matthew K. Franklin,et al.  A survey of key evolving cryptosystems , 2006, Int. J. Secur. Networks.

[53]  I. Couzin,et al.  Effective leadership and decision-making in animal groups on the move , 2005, Nature.

[54]  Georgios Kalogridis,et al.  Privacy protection system and metrics for hiding electrical events , 2011, Int. J. Secur. Networks.

[55]  Chuanyi Ji,et al.  Optimal worm-scanning method using vulnerable-host distributions , 2007, Int. J. Secur. Networks.

[56]  Kevin McCann,et al.  Structural asymmetry and the stability of diverse food webs , 2006, Nature.

[57]  Shivakant Mishra,et al.  Limiting DoS attacks during multihop data delivery in wireless sensor networks , 2006, Int. J. Secur. Networks.

[58]  Deepa Kundur,et al.  Towards modelling the impact of cyber attacks on a smart grid , 2011, Int. J. Secur. Networks.

[59]  Craig W. Reynolds Flocks, herds, and schools: a distributed behavioral model , 1987, SIGGRAPH.

[60]  Pei Cao,et al.  Hash-AV: fast virus signature scanning by cache-resident filters , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..

[61]  Aggelos Kiayias,et al.  Secure scalable group signature with dynamic joins and separable authorities , 2006, Int. J. Secur. Networks.

[62]  Neeraj Suri,et al.  An approach to synthesise safe systems , 2006, Int. J. Secur. Networks.

[63]  Yang Xiao,et al.  Bio-inspired true coalition formation on intrusion detection by mobile robots , 2009, 2009 5th International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[64]  Yang Xiao,et al.  Primate-Inspired Scent Marking for Mobile and Static Sensors and RFID Tags , 2009, 2009 Proceedings of 18th International Conference on Computer Communications and Networks.

[65]  Yang Xiao,et al.  Modeling collaborative robots for detecting intrusions , 2009, 2009 International Symposium on Collaborative Technologies and Systems.

[66]  George Kesidis,et al.  A taxonomy of internet traceback , 2006, Int. J. Secur. Networks.

[67]  Yang Xiao,et al.  Primate-Inspired Communication Methods for Mobile and Static Sensors and RFID Tags , 2011, TAAS.

[68]  Thomas Johansson,et al.  Three ways to mount distinguishing attacks on irregularly clocked stream ciphers , 2006, Int. J. Secur. Networks.