Trust is the Cure to Distributed Consensus with Adversaries
Title | Trust is the Cure to Distributed Consensus with Adversaries |
Publication Type | Conference Paper |
Year of Publication | 2019 |
Authors | Baras, John S., Liu, Xiangyang |
Conference Name | 2019 27th Mediterranean Conference on Control and Automation (MED) |
Date Published | jul |
Keywords | access protocols, Byzantine adversary detection, composability, compositionality, Computer science, Computer Theory and Trust, consensus iteration process, decision making, decision making problem, decision theory, distributed consensus algorithm, distributed consensus problems, Distributed optimization, economic engineering networked systems, energy harvesting, false trust, graph theory, Hardware, Iterative methods, Nonvolatile memory, optimisation, policy-based governance, Policy-Governed Secure Collaboration, Power supplies, Program processors, pubcrawl, resilience, Resiliency, Scalability, social engineering networked systems, Task Analysis, trust evaluation mechanism, trust graph model, trust propagation scheme, trust-aware consensus algorithm |
Abstract | Distributed consensus is a prototypical distributed optimization and decision making problem in social, economic and engineering networked systems. In collaborative applications investigating the effects of adversaries is a critical problem. In this paper we investigate distributed consensus problems in the presence of adversaries. We combine key ideas from distributed consensus in computer science on one hand and in control systems on the other. The main idea is to detect Byzantine adversaries in a network of collaborating agents who have as goal reaching consensus, and exclude them from the consensus process and dynamics. We describe a novel trust-aware consensus algorithm that integrates the trust evaluation mechanism into the distributed consensus algorithm and propose various local decision rules based on local evidence. To further enhance the robustness of trust evaluation itself, we also introduce a trust propagation scheme in order to take into account evidences of other nodes in the network. The resulting algorithm is flexible and extensible, and can incorporate more complex designs of decision rules and trust models. To demonstrate the power of our trust-aware algorithm, we provide new theoretical security performance results in terms of miss detection and false alarm rates for regular and general trust graphs. We demonstrate through simulations that the new trust-aware consensus algorithm can effectively detect Byzantine adversaries and can exclude them from consensus iterations even in sparse networks with connectivity less than 2f+1, where f is the number of adversaries. |
URL | https://ieeexplore.ieee.org/document/8798516 |
DOI | 10.1109/MED.2019.8798516 |
Citation Key | baras_trust_2019 |
- resilience
- Iterative methods
- Nonvolatile memory
- optimisation
- policy-based governance
- Policy-Governed Secure Collaboration
- Power supplies
- Program processors
- pubcrawl
- Hardware
- Resiliency
- Scalability
- social engineering networked systems
- Task Analysis
- trust evaluation mechanism
- trust graph model
- trust propagation scheme
- trust-aware consensus algorithm
- decision theory
- composability
- Computer Theory and Trust
- access protocols
- Byzantine adversary detection
- computer science
- consensus iteration process
- Decision Making
- decision making problem
- Compositionality
- distributed consensus algorithm
- distributed consensus problems
- distributed optimization
- economic engineering networked systems
- energy harvesting
- false trust
- graph theory