Localization of Data Injection Attacks on Distributed M-Estimation

被引:0
作者
Shalom, Or [1 ]
Leshem, Amir [1 ]
Scaglione, Anna [2 ,3 ]
机构
[1] Bar Ilan Univ, Fac Engn, IL-5290002 Ramat Gan, Israel
[2] Cornell Univ, Sch ECE, New York, NY 10044 USA
[3] Cornell Tech, New York, NY 10044 USA
来源
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS | 2022年 / 8卷
关键词
Distributed projected gradient; decentralized optimization; data injection attacks; convex optimization; m-Estimators; PROJECTION ALGORITHMS; STATE ESTIMATION; OPTIMIZATION; CONSENSUS; NETWORKS; SCHEME;
D O I
10.1109/TSIPN.2022.3188450
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper examines data injection attacks on distributed statistical estimation. We consider a dynamically changing distributed network consisting of N agents exchanging information over time. The N agents share the common goal of minimizing a joint objective function, which is the average of the private objective functions in a distributed manner. The private objective function is a realization of an objective function known to all the agents, but uses private data known to the agent alone. The agents' data are independent and identically distributed. We have previously proposed a novel data injection attack on the Distributed Projected Gradient (DPG) algorithm which is performed locally by malicious nodes in the network that steer the network's final state to a state of their choice. The proposed attack cannot be detected using previously described techniques. We propose a new detection and localization scheme, performed in a single instance unlike other methods that require the algorithm to run for many instances to acquire statistics over time. This detection and localization scheme is performed by each agent and is purely local, and does not involve decisions made by other agents. Whenever an agent suspects another agent to be an attacker, it will block its data, and maintain convergence to the true optimal state. We provide exponential bounds for the probability of false alarm and probability of attacker detection and localization. Simulations show that when all the attackers are detected and isolated by each agent, the network will recover and converge to the true optimal state.
引用
收藏
页码:655 / 669
页数:15
相关论文
共 69 条
  • [1] Online Detection of Stealthy False Data Injection Attacks in Power System State Estimation
    Ashok, Aditya
    Govindarasu, Manimaran
    Ajjarapu, Venkataramana
    [J]. IEEE TRANSACTIONS ON SMART GRID, 2018, 9 (03) : 1636 - 1646
  • [2] A Physical Layer Security Scheme for Mobile Health Cyber-Physical Systems
    Atat, Rachad
    Liu, Lingjia
    Ashdown, Jonathan
    Medley, Michael J.
    Matyjas, John D.
    Yi, Yang
    [J]. IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (01): : 295 - 309
  • [3] Enabling cyber-physical communication in 5G cellular networks: Challenges, spatial spectrum sensing, and cyber-security
    [J]. Liu, Lingjia (lingjialiu@gmail.com), 1600, Institution of Engineering and Technology, United States (02):
  • [4] Barbarossa S, 2014, ACADEMIC PRESS LIBRARY IN SIGNAL PROCESSING, VOL 2: COMMUNICATIONS AND RADAR SIGNAL PROCESSING, P329, DOI 10.1016/B978-0-12-396500-4.00007-7
  • [5] Convergence of a Multi-Agent Projected Stochastic Gradient Algorithm for Non-Convex Optimization
    Bianchi, Pascal
    Jakubowicz, Jeremie
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2013, 58 (02) : 391 - 405
  • [6] Blanchard P, 2017, ADV NEUR IN, V30
  • [7] Distributed optimization and statistical learning via the alternating direction method of multipliers
    Boyd S.
    Parikh N.
    Chu E.
    Peleato B.
    Eckstein J.
    [J]. Foundations and Trends in Machine Learning, 2010, 3 (01): : 1 - 122
  • [8] Randomized gossip algorithms
    Boyd, Stephen
    Ghosh, Arpita
    Prabhakar, Balaji
    Shah, Devavrat
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2006, 52 (06) : 2508 - 2530
  • [9] Anonymous Heterogeneous Distributed Detection: Optimal Decision Rules, Error Exponents, and the Price of Anonymity
    Chen, Wei-Ning
    Wang, I-Hsiang
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2019, 65 (11) : 7390 - 7406
  • [10] Resilient Distributed Estimation: Sensor Attacks
    Chen, Yuan
    Kar, Soummya
    Moura, Jose M. F.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2019, 64 (09) : 3772 - 3779