论文标题
具有对手的网络中的弹性分布扩散
Resilient Distributed Diffusion in Networks with Adversaries
论文作者
论文摘要
在本文中,我们研究了在存在的对手的存在下,网络代理必须通过处理流数据来估计感兴趣的状态的弹性分布分布扩散,以进行多任务估计。我们表明,总体上扩散策略对不遵守基于扩散的信息处理规则的恶意药物没有弹性。特别是,通过利用用于扩散信息的自适应权重,我们开发了时间相关的攻击模型,这些攻击模型可以驱动正常剂量收敛到攻击者选择的状态。我们表明,对系统完全了解的攻击者始终可以将其目标代理推动其所需的估计。此外,一个没有完全了解系统的攻击者,包括目标代理的流数据或它们在扩散算法中使用的参数,仍然可以成功地通过近似所需信息来部署攻击。攻击模型可用于固定状态和非平稳状态估计。此外,我们介绍并分析了一种具有弹性的分布分布式扩散算法,该算法对任何数据伪造攻击都具有弹性,在该数据伪造攻击中,在正常药物的局部邻里邻里的妥协药物的数量是有限的。提出的算法保证,如果选择适当的参数,则所有正常剂都会融合到其真实目标状态。我们还从正确的估计值中分析了分布式扩散的弹性与其性能之间的权衡。最后,我们使用固定和非平稳的多目标定位评估了提出的攻击模型和弹性分布扩散算法。
In this paper, we study resilient distributed diffusion for multi-task estimation in the presence of adversaries where networked agents must estimate distinct but correlated states of interest by processing streaming data. We show that in general diffusion strategies are not resilient to malicious agents that do not adhere to the diffusion-based information processing rules. In particular, by exploiting the adaptive weights used for diffusing information, we develop time-dependent attack models that drive normal agents to converge to states selected by the attacker. We show that an attacker that has complete knowledge of the system can always drive its targeted agents to its desired estimates. Moreover, an attacker that does not have complete knowledge of the system including streaming data of targeted agents or the parameters they use in diffusion algorithms, can still be successful in deploying an attack by approximating the needed information. The attack models can be used for both stationary and non-stationary state estimation.In addition, we present and analyze a resilient distributed diffusion algorithm that is resilient to any data falsification attack in which the number of compromised agents in the local neighborhood of a normal agent is bounded. The proposed algorithm guarantees that all normal agents converge to their true target states if appropriate parameters are selected. We also analyze trade-off between the resilience of distributed diffusion and its performance in terms of steady-state mean-square-deviation (MSD) from the correct estimates. Finally, we evaluate the proposed attack models and resilient distributed diffusion algorithm using stationary and non-stationary multi-target localization.