Localization of Data Injection Attacks on Distributed M-Estimation

被引:0
作者
Shalom, Or [1 ]
Leshem, Amir [1 ]
Scaglione, Anna [2 ,3 ]
机构
[1] Bar Ilan Univ, Fac Engn, IL-5290002 Ramat Gan, Israel
[2] Cornell Univ, Sch ECE, New York, NY 10044 USA
[3] Cornell Tech, New York, NY 10044 USA
来源
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS | 2022年 / 8卷
关键词
Distributed projected gradient; decentralized optimization; data injection attacks; convex optimization; m-Estimators; PROJECTION ALGORITHMS; STATE ESTIMATION; OPTIMIZATION; CONSENSUS; NETWORKS; SCHEME;
D O I
10.1109/TSIPN.2022.3188450
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
This paper examines data injection attacks on distributed statistical estimation. We consider a dynamically changing distributed network consisting of N agents exchanging information over time. The N agents share the common goal of minimizing a joint objective function, which is the average of the private objective functions in a distributed manner. The private objective function is a realization of an objective function known to all the agents, but uses private data known to the agent alone. The agents' data are independent and identically distributed. We have previously proposed a novel data injection attack on the Distributed Projected Gradient (DPG) algorithm which is performed locally by malicious nodes in the network that steer the network's final state to a state of their choice. The proposed attack cannot be detected using previously described techniques. We propose a new detection and localization scheme, performed in a single instance unlike other methods that require the algorithm to run for many instances to acquire statistics over time. This detection and localization scheme is performed by each agent and is purely local, and does not involve decisions made by other agents. Whenever an agent suspects another agent to be an attacker, it will block its data, and maintain convergence to the true optimal state. We provide exponential bounds for the probability of false alarm and probability of attacker detection and localization. Simulations show that when all the attackers are detected and isolated by each agent, the network will recover and converge to the true optimal state.
引用
收藏
页码:655 / 669
页数:15
相关论文
共 69 条
  • [21] Local design of distributed H-consensus filtering over sensor networks under multiplicative noises and deception attacks
    Han, Fei
    Dong, Hongli
    Wang, Zidong
    Li, Gongfa
    [J]. INTERNATIONAL JOURNAL OF ROBUST AND NONLINEAR CONTROL, 2019, 29 (08) : 2296 - 2314
  • [22] Vision-based Cooperative Estimation via Multi-agent Optimization
    Hatanaka, Takeshi
    Fujita, Masayuki
    Bullo, Francesco
    [J]. 49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 2492 - 2497
  • [23] Fast Distributed Gradient Methods
    Jakovetic, Dusan
    Xavier, Joao
    Moura, Jose M. F.
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (05) : 1131 - 1146
  • [24] Data-Driven Distributed Local Fault Detection for Large-Scale Processes Based on the GA-Regularized Canonical Correlation Analysis
    Jiang, Qingchao
    Ding, Steven X.
    Wang, Yang
    Yan, Xuefeng
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS, 2017, 64 (10) : 8148 - 8157
  • [25] Distributed convex optimization via continuous-time coordination algorithms with discrete-time communication
    Kia, Solmaz S.
    Cortes, Jorge
    Martinez, Sonia
    [J]. AUTOMATICA, 2015, 55 : 254 - 264
  • [26] Asynchronous Gossip-Based Random Projection Algorithms Over Networks
    Lee, Soomin
    Nedic, Angelia
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2016, 61 (04) : 953 - 968
  • [27] On Feasibility and Limitations of Detecting False Data Injection Attacks on Power Grid State Estimation Using D-FACTS Devices
    Li, Beibei
    Xiao, Gaoxi
    Lu, Rongxing
    Deng, Ruilong
    Bao, Haiyong
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2020, 16 (02) : 854 - 864
  • [28] Secure Distributed Detection of Sparse Signals via Falsification of Local Compressive Measurements
    Li, Chengxi
    Li, Gang
    Kailkhura, Bhavya
    Varshney, Pramod K.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2019, 67 (18) : 4696 - 4706
  • [29] Li GQ, 2020, INT CONF ACOUST SPEE, P8758, DOI [10.1109/ICASSP40776.2020.9053030, 10.1109/icassp40776.2020.9053030]
  • [30] Neural Networks-Aided Insider Attack Detection for the Average Consensus Algorithm
    Li, Gangqiang
    Wu, Sissi Xiaoxiao
    Zhang, Shengli
    Li, Qiang
    [J]. IEEE ACCESS, 2020, 8 : 51871 - 51883