On Distributed Optimization in the Presence of Malicious Agents

In this paper, we consider an unconstrained distributed optimization problem over a network of agents, in which some agents are adversarial. We solve the problem via gradientbased distributed optimization algorithm and characterize the effect of the adversarial agents on the convergence of the algorithm to the optimal solution. The attack model considered is such that agents locally perturb their iterates before broadcasting it to neighbors; and we analyze the case in which the adversarial agents cooperate in perturbing their estimates and the case where each adversarial agent acts independently. Based on the attack model adopted in the paper, we show that the solution converges to the neighborhood of the optimal solution and depends on the magnitude of the attack (perturbation) term. The analyses presented establishes conditions under which the malicious agents have enough information to obstruct convergence to the optimal solution by the non-adversarial agents.

[1]  John S. Baras,et al.  Trust is the Cure to Distributed Consensus with Adversaries , 2019, 2019 27th Mediterranean Conference on Control and Automation (MED).

[2]  Shreyas Sundaram,et al.  Secure local filtering algorithms for distributed optimization , 2016, 2016 IEEE 55th Conference on Decision and Control (CDC).

[3]  Mark Maybury,et al.  Detecting Malicious Insiders in Military Networks , 2006 .

[4]  Jianhua Zhang,et al.  A Distributed Optimization Algorithm for Attack-Resilient Wide-Area Monitoring of Power Systems: Theoretical and Experimental Methods , 2014, GameSec.

[5]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[6]  Anna Scaglione,et al.  A Case of Distributed Optimization in Adversarial Environment , 2019, ICASSP 2019 - 2019 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[7]  Albert S. Berahas,et al.  Balancing Communication and Computation in Distributed Optimization , 2017, IEEE Transactions on Automatic Control.

[8]  Yurii Nesterov,et al.  Introductory Lectures on Convex Optimization - A Basic Course , 2014, Applied Optimization.

[9]  Guang-Hong Yang,et al.  Distributed Secure State Estimation in the Presence of Malicious Agents , 2021, IEEE Transactions on Automatic Control.

[10]  Qing-Guo Wang,et al.  Resilient distributed optimization algorithm against adversary attacks , 2017, 2017 13th IEEE International Conference on Control & Automation (ICCA).

[11]  Stephen P. Boyd,et al.  Distributed Optimization and Statistical Learning via the Alternating Direction Method of Multipliers , 2011, Found. Trends Mach. Learn..

[12]  Ming Li,et al.  Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks , 2012, 2012 Proceedings IEEE INFOCOM.

[13]  Pramod K. Varshney,et al.  Consensus based Detection in the Presence of Data Falsification Attacks , 2015, ArXiv.

[14]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.