Data injection attack on decentralized optimization

Sissi Xiaoxiao Wu, Hoi To Wai, Anna Scaglione, Angelia Nedic, Amira Leshem

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

12 Scopus citations

Abstract

This paper studies the security aspect of gossip-based decentralized optimization algorithms for multi agent systems against data injection attacks. Our contributions are two-fold. First, we show that the popular distributed projected gradient method (by Nedić et al.) can be attacked by coordinated insider attacks, in which the attackers are able to steer the final state to a point of their choosing. Second, we propose a metric that can be computed locally by the trustworthy agents processing their own iterates and those of their neighboring agents. This metric can be used by the trustworthy agents to detect and localize the attackers. We conclude the paper by supporting our findings with numerical experiments.

Original languageAmerican English
Title of host publication2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3644-3648
Number of pages5
ISBN (Print)9781538646588
DOIs
StatePublished - 10 Sep 2018
Externally publishedYes
Event2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Calgary, Canada
Duration: 15 Apr 201820 Apr 2018

Publication series

NameICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
Volume2018-April
ISSN (Print)1520-6149

Conference

Conference2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018
Country/TerritoryCanada
CityCalgary
Period15/04/1820/04/18

Bibliographical note

Funding Information:
This work is supported by the National Natural Science Foundation of China under Grant 009989, the US National Science Foundation EAGER CCF 1553746, NSF CCF-BSF 1714672, and BSF Grant 2016660.

Publisher Copyright:
© 2018 IEEE.

Keywords

  • Data injection attack
  • Decentralized optimization
  • Gossip algorithms

Fingerprint

Dive into the research topics of 'Data injection attack on decentralized optimization'. Together they form a unique fingerprint.

Cite this