+ All Categories
Home > Documents > Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu,...

Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu,...

Date post: 29-Dec-2015
Category:
Upload: kimberly-mcdonald
View: 216 times
Download: 0 times
Share this document with a friend
Popular Tags:
18
Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and Department of Electrical and Computer Engineering University of Maryland, College Park, MD
Transcript
Page 1: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks

Xiangyang Liu, and John S. Baras

Institute for Systems Research and

Department of Electrical and Computer Engineering

University of Maryland, College Park, MD

Page 2: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Outline

Introduction Motivation Trust-Aware Consensus Simulations Conclusion

Page 3: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Introduction

CooperationCooperation

Cooperation

Agent

Agent Agent

Agent

Cooperation

Co

op

era

tion

• Distributed sensor fusion. Goal: all agents reach consensus on ML estimate.

[1] Xiao, Lin, Stephen Boyd, and Sanjay Lall. "A scheme for robust distributed sensor fusion based on average consensus." Information Processing in Sensor Networks, 2005. IPSN 2005. Fourth International Symposium on. IEEE, 2005.

• Distributed Coordination. Goal: all agents reach decision on same direction (location)

[2] Jadbabaie, Ali, Jie Lin, and A. Stephen Morse. "Coordination of groups of mobile autonomous agents using nearest neighbor rules." Automatic Control, IEEE Transactions on 48.6 (2003): 988-1001.

Agent

Without supervisor

Page 4: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Introduction

CooperationCooperation

Cooperation

Agent

Agent

Agent

Cooperation

Co

op

era

tion

Agent

Link Jam & Noise Injection:

[3]Khanafer, Ali, Behrouz Touri, and Tamer Basar. "Consensus in the presence of an adversary." 3rd IFAC Workshop on Distributed Estimation and Control in Networked Systems (NecSys). 2012.

Malicious Agent

Malicious agent:• Multiparty secure computation[4] Garay, Juan A., and Rafail Ostrovsky. "Almost-everywhere secure computation." Advances in Cryptology–EUROCRYPT 2008. Springer Berlin Heidelberg, 2008. 307-323.• Consensus with Byzantine adversaries (System theory)[5] Pasqualetti, Fabio, Antonio Bicchi, and Francesco Bullo. "Consensus computation in unreliable networks: A system theoretic approach." Automatic Control, IEEE Transactions on 57.1 (2012): 90-104.

trust

Page 5: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Motivation

Good Node Malicious Node

Goal: Detect malicious nodes and isolate them from consensus algorithm.

Page 6: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Trust-Aware Consensus

Good Node

Malicious Node

Trust Evidence

Local Trust

Decision rules

Global Trust

Trust Propagation

Trust-Aware Consensus

Embed trust into consensus

Page 7: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Trust-Aware Consensus

Trust Evidence

Local Trust

Node i’s trust evidence:

Clustering-Based

Distance-Based

Consistency-BasedDecision rules:

Page 8: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Trust-Aware Consensus

Clustering-Based

Distance-Based

Page 9: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Trust-Aware Consensus

Consistency-Based

message broadcast by node l and heard by node i

message broadcast by node j about what it hears from node l

Page 10: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Trust-Aware Consensus

Local Trust

Global Trust

Trust Propagation

3

4

5

MaliciousNormal Header

Page 11: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Trust-Aware Consensus

Trust Evidence

Local Trust

Decision rules

Global Trust

Trust Propagation

Trust-Aware Consensus

Embed trust into consensus

Page 12: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Simulations

Adversary outputs constant message. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Page 13: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Simulations

Adversary switches randomly between several messages. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Page 14: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Simulations

Adversary takes random noise strategy. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Page 15: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Simulations

Adversary takes fixed noise strategy. Figure on the left has no trust propagation. Figure on the right has trust propagation.

Page 16: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Simulations

3

4

5

Left: adversary takes constant strategy. Right: adversary takes random noise strategy.

The communication graph has connectivity 2.

Page 17: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Conclusion

• Developed trust model with various decision rules based

on local evidence in the setting of Byzantine adversaries.

• Trust-Aware consensus algorithm proposed is flexible

and can be extended to incorporate more complicated

trust models and decision rules.

• Simulations show our algorithm can effectively detect

malicious strategies even in sparse networks of

connectivity , where is the number of adversaries.

Page 18: Using Trust in Distributed Consensus with Adversaries in Sensor and Other Networks Xiangyang Liu, and John S. Baras Institute for Systems Research and.

Thank you!

{xyliu, baras}@umd.edu

http://www.isr.umd.edu/~baras

Questions?


Recommended