2018
DOI: 10.48550/arxiv.1805.11194
|View full text |Cite
Preprint
|
Sign up to set email alerts
|

Cybersecurity in Distributed and Fully-Decentralized Optimization: Distortions, Noise Injection, and ADMM

Eric Munsing,
Scott Moura

Abstract: As problems in machine learning, smartgrid dispatch, and IoT coordination problems have grown, distributed and fully-decentralized optimization models have gained attention for providing computational scalability to optimization tools. However, in applications where consumer devices are trusted to serve as distributed computing nodes, compromised devices can expose the optimization algorithm to cybersecurity threats which have not been examined in previous literature. This paper examines potential attack vecto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
6
0

Year Published

2022
2022
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(6 citation statements)
references
References 22 publications
0
6
0
Order By: Relevance
“…The detection models discussed above are data-driven with no detectability guarantees. Conversely, [10] proposes an analytical detection method for convex problems via checking the convexity of the attacker's subproblem in the ADMM algorithm. The method in [10] estimates the Hessian matrices for the objectives of the neighboring agents' local subproblems.…”
Section: Introductionmentioning
confidence: 99%
See 3 more Smart Citations
“…The detection models discussed above are data-driven with no detectability guarantees. Conversely, [10] proposes an analytical detection method for convex problems via checking the convexity of the attacker's subproblem in the ADMM algorithm. The method in [10] estimates the Hessian matrices for the objectives of the neighboring agents' local subproblems.…”
Section: Introductionmentioning
confidence: 99%
“…Conversely, [10] proposes an analytical detection method for convex problems via checking the convexity of the attacker's subproblem in the ADMM algorithm. The method in [10] estimates the Hessian matrices for the objectives of the neighboring agents' local subproblems. If the estimated Hessians are not positive semidefinite, which is necessary for convexity, then there is data manipulation.…”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…A comparison between the performance of the centralized and decentralized detectors is made in [20] and it is shown that each detector can outperform the other ones on a certain system and attack configurations. Recently blockchain-based systems on peer-to-peer networks are proposed for securing the distributed applications of power systems (e.g., the DSE) [21], [22].…”
Section: Introductionmentioning
confidence: 99%