Data injection attack on decentralized optimization

Sissi Xiaoxiao Wu, Hoi To Wai, Anna Scaglione, Angelia Nedic, Amira Leshem

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

15 Scopus citations

Abstract

This paper studies the security aspect of gossip-based decentralized optimization algorithms for multi agent systems against data injection attacks. Our contributions are two-fold. First, we show that the popular distributed projected gradient method (by Nedić et al.) can be attacked by coordinated insider attacks, in which the attackers are able to steer the final state to a point of their choosing. Second, we propose a metric that can be computed locally by the trustworthy agents processing their own iterates and those of their neighboring agents. This metric can be used by the trustworthy agents to detect and localize the attackers. We conclude the paper by supporting our findings with numerical experiments.

Original languageEnglish
Title of host publication2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Proceedings
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages3644-3648
Number of pages5
ISBN (Print)9781538646588
DOIs
StatePublished - 10 Sep 2018
Event2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018 - Calgary, Canada
Duration: 15 Apr 201820 Apr 2018

Publication series

NameICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
Volume2018-April
ISSN (Print)1520-6149

Conference

Conference2018 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2018
Country/TerritoryCanada
CityCalgary
Period15/04/1820/04/18

Bibliographical note

Publisher Copyright:
© 2018 IEEE.

Funding

This work is supported by the National Natural Science Foundation of China under Grant 009989, the US National Science Foundation EAGER CCF 1553746, NSF CCF-BSF 1714672, and BSF Grant 2016660.

FundersFunder number
US National Science FoundationCCF 1553746
National Science Foundation2016660, CCF-BSF 1714672
National Natural Science Foundation of China009989

    Keywords

    • Data injection attack
    • Decentralized optimization
    • Gossip algorithms

    Fingerprint

    Dive into the research topics of 'Data injection attack on decentralized optimization'. Together they form a unique fingerprint.

    Cite this