TY - GEN
T1 - Resilient distributed optimization algorithm against adversary attacks
AU - Zhao, Chengcheng
AU - He, Jianping
AU - Wang, Qing Guo
N1 - Publisher Copyright:
© 2017 IEEE.
PY - 2017/8/4
Y1 - 2017/8/4
N2 - In the distributed optimization, multiple agents aim to minimize the average of all local cost functions corresponding to one decision variable. Recently, the resilient algorithms for distributed optimization against attacks have received some attention, where it is assumed that the maximum number of tolerable attacks is strictly limited by the network connectivity. To relax this assumption, in this paper, we propose a resilient distribution optimization algorithm by exploiting the trusted agents, which cannot be compromised by adversary attacks. We prove that local variables of all normal agents can converge under the proposed algorithm if the trusted agents induce the connected dominating set of the original network. Furthermore, we exploit that the final solution of normal agents will converge to the convex optima set of the weighted average of all normal agents' local functions. We also show that the amount of tolerable adversary agents is not limited by the network connectivity under the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed algorithm.
AB - In the distributed optimization, multiple agents aim to minimize the average of all local cost functions corresponding to one decision variable. Recently, the resilient algorithms for distributed optimization against attacks have received some attention, where it is assumed that the maximum number of tolerable attacks is strictly limited by the network connectivity. To relax this assumption, in this paper, we propose a resilient distribution optimization algorithm by exploiting the trusted agents, which cannot be compromised by adversary attacks. We prove that local variables of all normal agents can converge under the proposed algorithm if the trusted agents induce the connected dominating set of the original network. Furthermore, we exploit that the final solution of normal agents will converge to the convex optima set of the weighted average of all normal agents' local functions. We also show that the amount of tolerable adversary agents is not limited by the network connectivity under the proposed algorithm. Numerical results demonstrate the effectiveness of the proposed algorithm.
UR - http://www.scopus.com/inward/record.url?scp=85029901426&partnerID=8YFLogxK
U2 - 10.1109/ICCA.2017.8003106
DO - 10.1109/ICCA.2017.8003106
M3 - Conference contribution
AN - SCOPUS:85029901426
T3 - IEEE International Conference on Control and Automation, ICCA
SP - 473
EP - 478
BT - 2017 13th IEEE International Conference on Control and Automation, ICCA 2017
PB - IEEE Computer Society
T2 - 13th IEEE International Conference on Control and Automation, ICCA 2017
Y2 - 3 July 2017 through 6 July 2017
ER -