Resilient Distributed Optimization Algorithm against Adversary Attacks

被引:0
|
作者
Zhao, Chengcheng [1 ,2 ]
He, Jianping [3 ]
Wang, Qing-Guo [4 ]
机构
[1] Zhejiang Univ, State Key Lab Ind Control Technol, Hangzhou, Zhejiang, Peoples R China
[2] Zhejiang Univ, Innovat Joint Res Ctr Ind Cyber Phys Syst, Hangzhou, Zhejiang, Peoples R China
[3] Shanghai Jiao Tong Univ, Dept Automat, Shanghai 200240, Peoples R China
[4] Univ Johannesburg, Inst Intelligent Syst, Johannesburg, South Africa
关键词
CONSENSUS;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In the distributed optimization, multiple agents aim to minimize the average of all local cost functions corresponding to one decision variable. Recently, the resilient algorithms for distributed optimization against attacks have received some attention, where it is assumed that the maximum number of tolerable attacks is strictly limited by the network connectivity. To relax this assumption, in this paper, we propose a resilient distribution optimization algorithm by exploiting the trusted agents, which cannot be compromised by adversary attacks. We prove that local variables of all normal agents can converge under the proposed algorithm if the trusted agents induce the connected dominating set of the original network. Furthermore, we exploit that the final solution of normal agents will converge to the convex optima set of the weighted average of all normal agents' local functions. We also show that the amount of tolerable adversary agents is not limited by the network connectivity under the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed algorithm.
引用
收藏
页码:473 / 478
页数:6
相关论文
共 50 条
  • [31] Resilient Distributed Optimization
    Zhu, Jingxuan
    Lin, Yixuan
    Velasquez, Alvaro
    Liu, Ji
    [J]. 2023 AMERICAN CONTROL CONFERENCE, ACC, 2023, : 1307 - 1312
  • [32] Network Adversary Attacks against Secure Encryption Schemes
    Gligor, Virgil D.
    Parno, Bryan
    Shin, Ji Sun
    [J]. IEICE TRANSACTIONS ON COMMUNICATIONS, 2015, E98B (02) : 267 - 279
  • [33] Resilient Exponential Consensus with Time-Varying Adversary Attacks and Asynchronous Events
    Xia, Weiguo
    Liu, Ji
    Li, Shuang
    Sun, Xi-Ming
    Han, Min
    [J]. 2019 IEEE 58TH CONFERENCE ON DECISION AND CONTROL (CDC), 2019, : 5438 - 5443
  • [34] Robust and Resilient Distributed MPC for Cyber-Physical Systems Against DoS Attacks
    Dai, Yufan
    Li, Manyun
    Zhang, Kunwu
    Shi, Yang
    [J]. IEEE Transactions on Industrial Cyber-Physical Systems, 2023, 1 : 44 - 55
  • [35] Resilient Distributed Parameter Estimation for Sensor Networks Against Sparse-Varying Attacks
    Lei, Xuqiang
    Wen, Guanghui
    Chen, Guanrong
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2024, : 7331 - 7340
  • [36] Security based Resilient Distributed Energy Management Against DoS and FDI Coordinated Attacks
    Chen, Zhuxiang
    Zhang, Huifeng
    Tian, Yazhang
    [J]. 2023 35TH CHINESE CONTROL AND DECISION CONFERENCE, CCDC, 2023, : 1032 - 1037
  • [37] A resilient distributed optimization algorithm based on consensus of multi-agent system against two attack scenarios
    Xu, Chentao
    Liu, Qingshan
    [J]. JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2023, 360 (12): : 9096 - 9114
  • [38] Cluster-based resilient distributed estimation through adversary detection
    Gao, Fengyue
    Yu, Quan
    Bai, Lin
    Wang, Jingchao
    Choi, Jinho
    [J]. IET COMMUNICATIONS, 2020, 14 (03) : 451 - 457
  • [39] Distributed H∞ Estimation Resilient to Biasing Attacks
    Ugrinovskii, Valery
    [J]. IEEE TRANSACTIONS ON CONTROL OF NETWORK SYSTEMS, 2020, 7 (01): : 458 - 470
  • [40] A Resilient Distributed Boosting Algorithm
    Filmus, Yuval
    Mehalel, Idan
    Moran, Shay
    [J]. INTERNATIONAL CONFERENCE ON MACHINE LEARNING, VOL 162, 2022,