TY - GEN
T1 - Resilience to Malicious Activity in Distributed Optimization for Cyberphysical Systems
AU - Yemini, Michal
AU - Nedic, Angelia
AU - Gil, Stephanie
AU - Goldsmith, Andrea J.
N1 - Publisher Copyright:
© 2022 IEEE.
PY - 2022
Y1 - 2022
N2 - Enhancing resilience in distributed networks in the face of malicious agents is an important problem for which many key theoretical results and applications require further development and characterization. This work develops a new algorithmic and analytical framework for achieving resilience to malicious agents in distributed optimization problems where a legitimate agent's dynamic is influenced by the values it receives from neighboring agents and its own self-serving target function. We show that by utilizing stochastic values of trust between agents it is possible to recover convergence to the system's global optimal point even in the presence of malicious agents. Additionally, we provide expected convergence rate guarantees in the form of an upper bound on the expected squared distance to the optimal value. Finally, we present numerical results that validate the analytical convergence guarantees we present in this paper even when the malicious agents are the majority of agents in the network.
AB - Enhancing resilience in distributed networks in the face of malicious agents is an important problem for which many key theoretical results and applications require further development and characterization. This work develops a new algorithmic and analytical framework for achieving resilience to malicious agents in distributed optimization problems where a legitimate agent's dynamic is influenced by the values it receives from neighboring agents and its own self-serving target function. We show that by utilizing stochastic values of trust between agents it is possible to recover convergence to the system's global optimal point even in the presence of malicious agents. Additionally, we provide expected convergence rate guarantees in the form of an upper bound on the expected squared distance to the optimal value. Finally, we present numerical results that validate the analytical convergence guarantees we present in this paper even when the malicious agents are the majority of agents in the network.
UR - http://www.scopus.com/inward/record.url?scp=85141772648&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=85141772648&partnerID=8YFLogxK
U2 - 10.1109/CDC51059.2022.9992416
DO - 10.1109/CDC51059.2022.9992416
M3 - Conference contribution
AN - SCOPUS:85141772648
T3 - Proceedings of the IEEE Conference on Decision and Control
SP - 4185
EP - 4192
BT - 2022 IEEE 61st Conference on Decision and Control, CDC 2022
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 61st IEEE Conference on Decision and Control, CDC 2022
Y2 - 6 December 2022 through 9 December 2022
ER -