Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents

被引:343
作者
Sundaram, Shreyas [1 ,2 ]
Hadjicostis, Christoforos N. [1 ,2 ,3 ]
机构
[1] Univ Illinois, Dept Elect & Comp Engn, Champaign, IL 61820 USA
[2] Univ Illinois, Coordinated Sci Lab, Champaign, IL 61820 USA
[3] Univ Cyprus, Dept Elect & Comp Engn, CY-1678 Nicosia, Cyprus
基金
美国国家科学基金会;
关键词
Distributed consensus; distributed function calculation; fault-tolerant consensus; multi-agent systems; networked control; observability theory; structured systems; wireless broadcast model; CONSENSUS; STABILITY; SYSTEMS; NUMBER;
D O I
10.1109/TAC.2010.2088690
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Given a network of interconnected nodes, each with its own value (such as a measurement, position, vote, or other data), we develop a distributed strategy that enables some or all of the nodes to calculate any arbitrary function of the node values, despite the actions of malicious nodes in the network. Our scheme assumes a broadcast model of communication (where all nodes transmit the same value to all of their neighbors) and utilizes a linear iteration where, at each time-step, each node updates its value to be a weighted average of its own previous value and those of its neighbors. We consider a node to be malicious or faulty if, instead of following the predefined linear strategy, it updates its value arbitrarily at each time-step (perhaps conspiring with other malicious nodes in the process). We show that the topology of the network completely characterizes the resilience of linear iterative strategies to this kind of malicious behavior. First, when the network contains or fewer vertex-disjoint paths from some node x(j) to another node x(i), we provide an explicit strategy for malicious nodes to follow in order to prevent node x(i) from receiving any information about x(j)'s value. Next, if node x(i) has at least 2f + 1 vertex-disjoint paths from every other (non-neighboring) node, we show that x(i) is guaranteed to be able to calculate any arbitrary function of all node values when the number of malicious nodes is or less. Furthermore, we show that this function can be calculated after running the linear iteration for a finite number of time-steps (upper bounded by the number of nodes in the network) with almost any set of weights (i.e., for all weights except for a set of measure zero).
引用
收藏
页码:1495 / 1508
页数:14
相关论文
共 38 条
[1]  
[Anonymous], 2001, Introduction to Graph Theory
[2]  
[Anonymous], 1996, Mobile Computing
[3]  
Barnett V., 1996, OUTLIERS STAT DATA
[4]  
Bhandari V., 2005, P 24 ANN ACM S PRINC, P138, DOI 10.1145/1073814.1073841
[5]  
Cormen T., 2001, Introduction to Algorithms
[6]   Distributed algorithms for reaching consensus on general functions [J].
Cortes, Jorge .
AUTOMATICA, 2008, 44 (03) :726-737
[7]   Generic properties and control of linear structured systems: a survey [J].
Dion, JM ;
Commault, C ;
van der Woude, J .
AUTOMATICA, 2003, 39 (07) :1125-1144
[8]   PERFECTLY SECURE MESSAGE TRANSMISSION [J].
DOLEV, D ;
DWORK, C ;
WAARTS, O ;
YUNG, M .
JOURNAL OF THE ACM, 1993, 40 (01) :17-47
[9]   Computing and communicating functions over sensor networks [J].
Giridhar, A ;
Kumar, PR .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2005, 23 (04) :755-764
[10]   On the robustness of distributed algorithms [J].
Gupta, Vijay ;
Langbort, Cedric ;
Murray, Richard M. .
PROCEEDINGS OF THE 45TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2006, :3473-+