Resilient Distributed Optimization Algorithm With Fixed Step Size Against Malicious Attacks

IF 3 3区 计算机科学 Q2 ENGINEERING, ELECTRICAL & ELECTRONIC
Linyao Cao;Wenhua Gao;Jiahong Zhao
{"title":"Resilient Distributed Optimization Algorithm With Fixed Step Size Against Malicious Attacks","authors":"Linyao Cao;Wenhua Gao;Jiahong Zhao","doi":"10.1109/TSIPN.2025.3613875","DOIUrl":null,"url":null,"abstract":"Solving distributed optimization problems relies on information exchange between nodes in multi-agent networks. In an unreliable network environment with malicious attacks, compromised nodes deliberately disseminate falsified data to disrupt the optimization process. The security and robustness of the multi-agent system can be improved by designing the fault-tolerant mechanism (FTM) and the resilient distributed optimization (RDO) algorithm. This paper introduces a new fault-tolerant mechanism based on K-Medoids clustering (M-FTM) to address the challenges posed by malicious attacks. Compared with the existing <inline-formula><tex-math>$ F$</tex-math></inline-formula>-local filtering mechanism, M-FTM reduces the network connectivity requirement from <inline-formula><tex-math>$ (2F +1)$</tex-math></inline-formula>-robust to <inline-formula><tex-math>$ (F +1)$</tex-math></inline-formula>-robust, where <inline-formula><tex-math>$ F$</tex-math></inline-formula> is the number of malicious nodes in the network. This article addresses high-dimensional optimization problems, for which the resilient DIGing algorithm and the resilient Push-DIGing algorithm with fixed step size are proposed. The effectiveness of the algorithms is verified through consensus and convergence analysis. Numerical experiments show that the proposed algorithms can effectively resist malicious attacks. Additionally, M-FTM not only doubles the runtime efficiency of algorithm but also enables its operation under low network connectivity conditions.","PeriodicalId":56268,"journal":{"name":"IEEE Transactions on Signal and Information Processing over Networks","volume":"11 ","pages":"1278-1285"},"PeriodicalIF":3.0000,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Signal and Information Processing over Networks","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11177226/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
引用次数: 0

Abstract

Solving distributed optimization problems relies on information exchange between nodes in multi-agent networks. In an unreliable network environment with malicious attacks, compromised nodes deliberately disseminate falsified data to disrupt the optimization process. The security and robustness of the multi-agent system can be improved by designing the fault-tolerant mechanism (FTM) and the resilient distributed optimization (RDO) algorithm. This paper introduces a new fault-tolerant mechanism based on K-Medoids clustering (M-FTM) to address the challenges posed by malicious attacks. Compared with the existing $ F$-local filtering mechanism, M-FTM reduces the network connectivity requirement from $ (2F +1)$-robust to $ (F +1)$-robust, where $ F$ is the number of malicious nodes in the network. This article addresses high-dimensional optimization problems, for which the resilient DIGing algorithm and the resilient Push-DIGing algorithm with fixed step size are proposed. The effectiveness of the algorithms is verified through consensus and convergence analysis. Numerical experiments show that the proposed algorithms can effectively resist malicious attacks. Additionally, M-FTM not only doubles the runtime efficiency of algorithm but also enables its operation under low network connectivity conditions.
针对恶意攻击的固定步长弹性分布式优化算法
分布式优化问题的求解依赖于多智能体网络中节点间的信息交换。在存在恶意攻击的不可靠网络环境下,受损节点故意传播伪造数据,破坏优化过程。通过设计容错机制(FTM)和弹性分布优化(RDO)算法,可以提高多智能体系统的安全性和鲁棒性。本文提出了一种基于K-Medoids聚类(M-FTM)的容错机制来解决恶意攻击带来的挑战。与现有的$ F$-local过滤机制相比,M-FTM将网络连通性要求从$ (2F +1)$-robust降低到$ (F +1)$-robust,其中$ F$为网络中恶意节点的数量。针对高维优化问题,提出了弹性DIGing算法和固定步长弹性Push-DIGing算法。通过一致性和收敛性分析验证了算法的有效性。数值实验表明,该算法能够有效抵御恶意攻击。此外,M-FTM不仅使算法的运行效率提高了一倍,而且可以在低网络连接条件下运行。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 求助全文
来源期刊
IEEE Transactions on Signal and Information Processing over Networks
IEEE Transactions on Signal and Information Processing over Networks Computer Science-Computer Networks and Communications
CiteScore
5.80
自引率
12.50%
发文量
56
期刊介绍: The IEEE Transactions on Signal and Information Processing over Networks publishes high-quality papers that extend the classical notions of processing of signals defined over vector spaces (e.g. time and space) to processing of signals and information (data) defined over networks, potentially dynamically varying. In signal processing over networks, the topology of the network may define structural relationships in the data, or may constrain processing of the data. Topics include distributed algorithms for filtering, detection, estimation, adaptation and learning, model selection, data fusion, and diffusion or evolution of information over such networks, and applications of distributed signal processing.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
确定
请完成安全验证×
copy
已复制链接
快去分享给好友吧!
我知道了
右上角分享
点击右上角分享
0
联系我们:info@booksci.cn Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。 Copyright © 2023 布克学术 All rights reserved.
京ICP备2023020795号-1
ghs 京公网安备 11010802042870号
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术官方微信