Detecting and Localizing Adversarial Nodes Usig Neural Networks

Gangqiang Li, Sissi Xiaoxiao Wu, Shengli Zhang, Hoi To Wai, Anna Scaglione

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Scopus citations

Abstract

This work proposes a new method for securing the gossip algorithm for average consensus on communication networks. The gossip algorithm is appealing for its ability to harness distributed computational resources while adapting to arbitrarily connected networks without coordination overhead, however it is inherently vulnerable to the insider attack by adversarial node since each node locally updates its local states and passes information to its neighbors without supervision. In light of this, this work proposes new methods for detecting and localizing adversarial nodes using a neural network system. We show that our neural network-based method delivers a significantly improved detection and localization performance, compared to the state of the art.

Original languageEnglish (US)
Title of host publication2018 IEEE 19th International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018
PublisherInstitute of Electrical and Electronics Engineers Inc.
ISBN (Print)9781538635124
DOIs
StatePublished - Aug 24 2018
Event19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018 - Kalamata, Greece
Duration: Jun 25 2018Jun 28 2018

Publication series

NameIEEE Workshop on Signal Processing Advances in Wireless Communications, SPAWC
Volume2018-June

Other

Other19th IEEE International Workshop on Signal Processing Advances in Wireless Communications, SPAWC 2018
Country/TerritoryGreece
CityKalamata
Period6/25/186/28/18

Keywords

  • Gossip algorithm
  • average consensus
  • insider attacks
  • neural networks

ASJC Scopus subject areas

  • Electrical and Electronic Engineering
  • Computer Science Applications
  • Information Systems

Fingerprint

Dive into the research topics of 'Detecting and Localizing Adversarial Nodes Usig Neural Networks'. Together they form a unique fingerprint.

Cite this