{"title":"针对恶意攻击的固定步长弹性分布式优化算法","authors":"Linyao Cao;Wenhua Gao;Jiahong Zhao","doi":"10.1109/TSIPN.2025.3613875","DOIUrl":null,"url":null,"abstract":"Solving distributed optimization problems relies on information exchange between nodes in multi-agent networks. In an unreliable network environment with malicious attacks, compromised nodes deliberately disseminate falsified data to disrupt the optimization process. The security and robustness of the multi-agent system can be improved by designing the fault-tolerant mechanism (FTM) and the resilient distributed optimization (RDO) algorithm. This paper introduces a new fault-tolerant mechanism based on K-Medoids clustering (M-FTM) to address the challenges posed by malicious attacks. Compared with the existing <inline-formula><tex-math>$ F$</tex-math></inline-formula>-local filtering mechanism, M-FTM reduces the network connectivity requirement from <inline-formula><tex-math>$ (2F +1)$</tex-math></inline-formula>-robust to <inline-formula><tex-math>$ (F +1)$</tex-math></inline-formula>-robust, where <inline-formula><tex-math>$ F$</tex-math></inline-formula> is the number of malicious nodes in the network. This article addresses high-dimensional optimization problems, for which the resilient DIGing algorithm and the resilient Push-DIGing algorithm with fixed step size are proposed. The effectiveness of the algorithms is verified through consensus and convergence analysis. Numerical experiments show that the proposed algorithms can effectively resist malicious attacks. Additionally, M-FTM not only doubles the runtime efficiency of algorithm but also enables its operation under low network connectivity conditions.","PeriodicalId":56268,"journal":{"name":"IEEE Transactions on Signal and Information Processing over Networks","volume":"11 ","pages":"1278-1285"},"PeriodicalIF":3.0000,"publicationDate":"2025-09-24","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Resilient Distributed Optimization Algorithm With Fixed Step Size Against Malicious Attacks\",\"authors\":\"Linyao Cao;Wenhua Gao;Jiahong Zhao\",\"doi\":\"10.1109/TSIPN.2025.3613875\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Solving distributed optimization problems relies on information exchange between nodes in multi-agent networks. In an unreliable network environment with malicious attacks, compromised nodes deliberately disseminate falsified data to disrupt the optimization process. The security and robustness of the multi-agent system can be improved by designing the fault-tolerant mechanism (FTM) and the resilient distributed optimization (RDO) algorithm. This paper introduces a new fault-tolerant mechanism based on K-Medoids clustering (M-FTM) to address the challenges posed by malicious attacks. Compared with the existing <inline-formula><tex-math>$ F$</tex-math></inline-formula>-local filtering mechanism, M-FTM reduces the network connectivity requirement from <inline-formula><tex-math>$ (2F +1)$</tex-math></inline-formula>-robust to <inline-formula><tex-math>$ (F +1)$</tex-math></inline-formula>-robust, where <inline-formula><tex-math>$ F$</tex-math></inline-formula> is the number of malicious nodes in the network. This article addresses high-dimensional optimization problems, for which the resilient DIGing algorithm and the resilient Push-DIGing algorithm with fixed step size are proposed. The effectiveness of the algorithms is verified through consensus and convergence analysis. Numerical experiments show that the proposed algorithms can effectively resist malicious attacks. Additionally, M-FTM not only doubles the runtime efficiency of algorithm but also enables its operation under low network connectivity conditions.\",\"PeriodicalId\":56268,\"journal\":{\"name\":\"IEEE Transactions on Signal and Information Processing over Networks\",\"volume\":\"11 \",\"pages\":\"1278-1285\"},\"PeriodicalIF\":3.0000,\"publicationDate\":\"2025-09-24\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Signal and Information Processing over Networks\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/11177226/\",\"RegionNum\":3,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Signal and Information Processing over Networks","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/11177226/","RegionNum":3,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
Resilient Distributed Optimization Algorithm With Fixed Step Size Against Malicious Attacks
Solving distributed optimization problems relies on information exchange between nodes in multi-agent networks. In an unreliable network environment with malicious attacks, compromised nodes deliberately disseminate falsified data to disrupt the optimization process. The security and robustness of the multi-agent system can be improved by designing the fault-tolerant mechanism (FTM) and the resilient distributed optimization (RDO) algorithm. This paper introduces a new fault-tolerant mechanism based on K-Medoids clustering (M-FTM) to address the challenges posed by malicious attacks. Compared with the existing $ F$-local filtering mechanism, M-FTM reduces the network connectivity requirement from $ (2F +1)$-robust to $ (F +1)$-robust, where $ F$ is the number of malicious nodes in the network. This article addresses high-dimensional optimization problems, for which the resilient DIGing algorithm and the resilient Push-DIGing algorithm with fixed step size are proposed. The effectiveness of the algorithms is verified through consensus and convergence analysis. Numerical experiments show that the proposed algorithms can effectively resist malicious attacks. Additionally, M-FTM not only doubles the runtime efficiency of algorithm but also enables its operation under low network connectivity conditions.
期刊介绍:
The IEEE Transactions on Signal and Information Processing over Networks publishes high-quality papers that extend the classical notions of processing of signals defined over vector spaces (e.g. time and space) to processing of signals and information (data) defined over networks, potentially dynamically varying. In signal processing over networks, the topology of the network may define structural relationships in the data, or may constrain processing of the data. Topics include distributed algorithms for filtering, detection, estimation, adaptation and learning, model selection, data fusion, and diffusion or evolution of information over such networks, and applications of distributed signal processing.