An anti-consensus strategy based on continuous perturbation updates in opposite directions
In modern society, multi-agent consensus is applied in many applications such as distributed machine learning, wireless sensor networks and so on. However, some agents might behave abnormally subject to external attack or internal faults, and thus fault-tolerant consensus problem is studied recently...
Saved in:
Published in | Journal of high speed networks Vol. 29; no. 1; pp. 15 - 25 |
---|---|
Main Authors | , , , , |
Format | Journal Article |
Language | English |
Published |
London, England
SAGE Publications
01.01.2023
Sage Publications Ltd |
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | In modern society, multi-agent consensus is applied in many applications such as distributed machine learning, wireless sensor networks and so on. However, some agents might behave abnormally subject to external attack or internal faults, and thus fault-tolerant consensus problem is studied recently, among which Q-consensus is one of the state-of-the-art and effective methods to identify all the faulty agents and achieve consensus for normal agents in general networks. To fight against Q-consensus algorithm, this paper proposes a novel strategy, called split attack, which is simple but capable of breaking consensus convergence. By aggregating all the states of neighboring nodes with an extra perturbation, the normal nodes are split into sub-groups and converge to two separate values, so that consensus is broken. Two scenarios, including the introduction of additional faulty nodes and compromise of the original nodes, are considered. More specifically, in the former case, two additional faulty nodes are adopted, each of which is responsible to mislead parts of the normal nodes. While in the latter one, two original normal nodes are compromised to mislead the whole system. Moreover, the compromised nodes selection is fundamentally a classification problem, and thus optimized through CNN. Finally, the numerical simulations are provided to verify the proposed schemes and indicate that the proposed method outperforms other attack methods. |
---|---|
Bibliography: | ObjectType-Article-1 SourceType-Scholarly Journals-1 ObjectType-Feature-2 content type line 14 |
ISSN: | 0926-6801 1875-8940 |
DOI: | 10.3233/JHS-220001 |