Resilient distributed optimization algorithm against adversary attacks

In the distributed optimization, multiple agents aim to minimize the average of all local cost functions corresponding to one decision variable. Recently, the resilient algorithms for distributed optimization against attacks have received some attention, where it is assumed that the maximum number of tolerable attacks is strictly limited by the network connectivity. To relax this assumption, in this paper, we propose a resilient distribution optimization algorithm by exploiting the trusted agents, which cannot be compromised by adversary attacks. We prove that local variables of all normal agents can converge under the proposed algorithm if the trusted agents induce the connected dominating set of the original network. Furthermore, we exploit that the final solution of normal agents will converge to the convex optima set of the weighted average of all normal agents' local functions. We also show that the amount of tolerable adversary agents is not limited by the network connectivity under the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed algorithm.

[1]  Shreyas Sundaram,et al.  Consensus-based distributed optimization with malicious nodes , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[2]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[3]  Nitin H. Vaidya,et al.  Byzantine Multi-Agent Optimization: Part I , 2015, ArXiv.

[4]  Yevgeniy Vorobeychik,et al.  Resilient consensus protocol in the presence of trusted nodes , 2014, 2014 7th International Symposium on Resilient Control Systems (ISRCS).

[5]  Shreyas Sundaram,et al.  Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.

[6]  Leslie Lamport,et al.  Reaching Agreement in the Presence of Faults , 1980, JACM.

[7]  Martin J. Wainwright,et al.  Dual Averaging for Distributed Optimization: Convergence Analysis and Network Scaling , 2010, IEEE Transactions on Automatic Control.

[8]  Ling Shi,et al.  Time synchronization in WSNs: A maximum value based consensus approach , 2011, IEEE Conference on Decision and Control and European Control Conference.

[9]  Nitin H. Vaidya,et al.  Fault-Tolerant Multi-Agent Optimization: Part III , 2015, ArXiv.

[10]  Nitin H. Vaidya,et al.  Robust Multi-agent Optimization: Coping with Byzantine Agents with Input Redundancy , 2016, SSS.

[11]  Shreyas Sundaram,et al.  Secure local filtering algorithms for distributed optimization , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[12]  Nitin H. Vaidya,et al.  Fault-Tolerant Distributed Optimization (Part IV): Constrained Optimization with Arbitrary Directed Networks , 2015, ArXiv.

[13]  Angelia Nedic,et al.  Distributed Optimization Over Time-Varying Directed Graphs , 2015, IEEE Trans. Autom. Control..

[14]  Nitin H. Vaidya,et al.  Matrix Representation of Iterative Approximate Byzantine Consensus in Directed Graphs , 2012, ArXiv.

[15]  B. Gharesifard,et al.  Distributed Optimization Under Adversarial Nodes , 2016, IEEE Transactions on Automatic Control.

[16]  Nitin H. Vaidya,et al.  Byzantine Multi-Agent Optimization: Part II , 2015, ArXiv.

[17]  Florian Dörfler,et al.  Attack Detection and Identification in Cyber-Physical Systems -- Part II: Centralized and Distributed Monitor Design , 2012, ArXiv.

[18]  Asuman E. Ozdaglar,et al.  Distributed Subgradient Methods for Multi-Agent Optimization , 2009, IEEE Transactions on Automatic Control.

[19]  Raphael Yuster,et al.  Connected Domination and Spanning Trees with Many Leaves , 2000, SIAM J. Discret. Math..