Privacy preserving consensus under interception attacks

In this paper, we consider the privacy preserving problem of consensus protocol. First, we introduce a privacy preserving scheme, where each node produces and transmits a sequence of random values with their mean equaling to the node's initial state. We show that the network can reach average consensus with privacy preserving scheme, and provide a sufficient condition under which the initial state of one node can be inferred completely. Further, we study the privacy preserving performance when there exists an attacker who can intercept the data transmitted on the edges. In a ring network, aiming at the attacker with limited power, we find the optimal attacking strategy to maximize the probability of the privacy disclosure. Finally, the simulations verify the derived theoretical results.

[1]  Ling Shi,et al.  Event-based attack against remote state estimation , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[2]  Christoforos N. Hadjicostis,et al.  Privacy-preserving asymptotic average consensus , 2013, 2013 European Control Conference (ECC).

[3]  Vladimir Kolesnikov Advances and impact of secure function evaluation , 2009, Bell Labs Technical Journal.

[4]  Richard M. Murray,et al.  Consensus problems in networks of agents with switching topology and time-delays , 2004, IEEE Transactions on Automatic Control.

[5]  Ling Shi,et al.  Optimal Sensor Power Scheduling for State Estimation of Gauss–Markov Systems Over a Packet-Dropping Network , 2012, IEEE Transactions on Signal Processing.

[6]  Yilin Mo,et al.  Privacy Preserving Maximum Consensus , 2015, 2015 54th IEEE Conference on Decision and Control (CDC).

[7]  Xiao Fan Wang,et al.  Fast consensus seeking in multi-agent systems with time delay , 2013, Syst. Control. Lett..

[8]  Richard M. Murray,et al.  Privacy preserving average consensus , 2014, 53rd IEEE Conference on Decision and Control.

[9]  Chao Yang,et al.  False data injection attack on consensus‐based distributed estimation , 2017 .

[10]  Geir E. Dullerud,et al.  Differentially private iterative synchronous consensus , 2012, WPES '12.

[11]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[12]  Chao Yang,et al.  Nodes selection strategy in cooperative tracking problem , 2016, Autom..

[13]  Vijay Gupta,et al.  Protecting privacy of topology in consensus networks , 2015, 2015 American Control Conference (ACC).

[14]  Cynthia Dwork,et al.  Differential Privacy , 2006, Encyclopedia of Cryptography and Security.

[15]  Ling Shi,et al.  Online Deception Attack against Remote State Estimation , 2014 .

[16]  B.H. Khalaj,et al.  Secure consensus averaging in sensor networks using random offsets , 2007, 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications.