Abstract
Recently, gossip-based algorithms have received significant attention for data aggregation in distributed environments. The main advantage of gossip-based algorithms is their robustness in dynamic and fault-prone environments with unintentional faults such as link failure and channel noise. However, the robustness of such algorithms in hostile environments with intentional faults has remained unexplored. In this paper, we call attention to the risks which may be caused by the use of gossip algorithms in hostile environments, i.e., when some malicious nodes collude to skew aggregation results by violating the normal execution of the protocol. We first introduce a model of hostile environment and then examine the behavior of randomized gossip algorithms in this model using probabilistic analysis. Our model of hostile environment is general enough to cover a wide range of attacks. However, to achieve stronger results, we focus our analysis on fully connected networks and some powerful attacks. Our analysis shows that in the presence of malicious nodes, after some initial steps, randomized gossip algorithms reach a point at which the lengthening of gossiping is harmful, i.e., the average accuracy of the estimates of the aggregate value begins to decrease strictly.
Similar content being viewed by others
Notes
For example, the Sybil attack can be prevented by assigning a central authority for managing identities, or mitigated by increasing the cost of obtaining new identities. DoS attacks can be mitigated by enhancing computation and communication capacities. Hyperactive nodes can be detected through data sharing between nodes. Moreover, when data sharing is not feasible, the effect of hyperactive nodes can be reduced by forcing nodes to run the averaging algorithm as fast as possible.
References
Aysal, T.C., Barner, K.E.: Convergence of consensus models with stochastic disturbances. IEEE Trans. Inf. Theory 56(8), 4101–4113 (2010)
Aysal, T.C., Coates, M.J., Rabbat, M.G.: Distributed average consensus with dithered quantization. IEEE Trans. Signal Process. 56(10), 4905–4918 (2008)
Aysal, T.C., Yildiz, M., Sarwate, A., Scaglione, A.: Broadcast gossip algorithms for consensus. IEEE Trans. Signal Process. 57(7), 2748–2761 (2009)
Benezit, F., Dimakis, A.G., Thiran, P., Vetterli, M.: Order-optimal consensus through randomized path averaging. IEEE Trans. Inf. Theory 56(10), 5150–5167 (2010)
Boyd, S., Ghosh, A., Prabhakar, B., Shah, D.: Randomized gossip algorithms. IEEE Trans. Inf. Theory 52(6), 2508–2530 (2006)
Chen, J., Pandurangan, G., Xu, D.: Robust computation of aggregates in wireless sensor networks: distributed randomized algorithms and analysis. IEEE Trans. Parallel Distrib. Syst. 17(9), 987–1000 (2006)
Cybenko, G.: Load balancing for distributed memory multiprocessors. J. Parallel Distrib. Comput. 7, 279–301 (1989)
Dimakis, A., Kar, S., Moura, J., Rabbat, M., Scaglione, A.: Gossip algorithms for distributed signal processing. Proc. IEEE 98(11), 1847–1864 (2010)
Dudley, R.M.: Real analysis and probability. Cambridge University Press, Cambridge (2002)
Fagnani, F., Zampieri, S.: Average consensus with packet drop communication. SIAM J. Control Optim. 48(1), 102–133 (2007)
Hatano, Y., Das, A.K., Mesbahi, M.: Agreement in presence of noise: pseudogradients on random geometric networks. In: Proceedings of the 44th IEEE Conference on Decision and Control, and 2005 European Control Conference (2005)
Lamport, L., Shostak, R., Pease, M.: The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 4(3), 382–401 (1982)
Kar, S., Moura, J.M.F.: Distributed average consensus in sensor networks with random link failures and communication channel noise. In: Proceedings of the 41st Asilomar Conference on Signals, Systems Computer, pp. 676–680 (2007)
Kempe, D., Dobra, A., Gehrkey, J.: Gossip-Based computation of aggregate information. In: Proceedings of the 44th Annual IEEE Symposium on Foundations of Computer, Science, pp. 482–491 (2003)
Przydatek, B., Song, D., Perrig, A.: SIA: Secure information aggregation in sensor networks. In: Proceedings of the 1st International Conference on Embedded Networked Sensor Systems, pp. 255–265 (2003)
Rajagopal, R., Wainwright, M.J.: Network-based consensus averaging with general noisy channels. IEEE Trans. Signal Process. 59(1), 350–364 (2011)
Sakuma, J., Kobayashi, S.: Large-scale k-means clustering with user-centric privacy-preservation. Knowl. Inf. Syst. 25, 253–279 (2010)
Ustebay, D., Oreshkin, B., Coates, M., Rabbat, M.: Greedy gossip with eavesdropping. IEEE Trans. Signal Process. 58(7), 3765–3776 (2010)
Wagner, D.: Resilient aggregation in sensor networks. In: Proceedings of the 2nd ACM Workshop on Security of Ad Hoc and Sensor, Networks, pp. 78–87 (2005)
Xiao, L., Boyd, S., Kim, S.-J.: Distributed average consensus with least-mean-square deviation. J. Parallel Distrib. Comput. 67(1), 33–46 (2007)
Yildiz, M.E., Scaglione, A.: Coding with side information for rate constrained consensus. IEEE Trans. Signal Process. 56(8), 3753–3764 (2008)
Zhou, R., Hwang, K., Cai, M.: GossipTrust for fast reputation aggregation in peer-to-peer networks. IEEE Trans. Knowl. Data Eng. 20(9), 1282–1295 (2008)
Acknowledgments
This work was supported in part by the Iran Telecommunication Research Center Grant T-500-19242.
Author information
Authors and Affiliations
Corresponding author
Appendices
Appendix A: Proof of Theorem 3
Proof
We use conditional expectation to prove the theorem. Let the event \(\mathcal {A}\) occur at \(t+1\), \(i\) and \(j\) be the participants of the gossip update, and \(x(t)=x=(x_1,\ldots ,x_n)\). Then,
Then, by taking the expectation over all \(i,j\in \mathcal {H}\), and applying straightforward calculations, we have
Taking the expectation over \(x\) yields
Now, suppose the event \(\mathcal {B}\) occurs at \(t+1\), \(i\in \mathcal {H}\) and \(j\in \mathcal {M}\) be the participants of the gossip update, \(x_j^t=x_m\), and \(x(t)=x=(x_1,\ldots ,x_n)\). Then,
On the other hand,
Then, taking the expectation over \(x_m\) yields
Taking the expectation over all \(i\in \mathcal {H}\) and \(j\in \mathcal {M}\), and then taking the expectation over \(x\), implies
If the event \(\mathcal {C}\) occurs, \(\textit{ASE}(t)\) remains unchanged, and then
Putting together all the pieces yields:
Then, using (11), (30), (31), and (32), we have
To obtain \(E[S(t+1)]\), we should first compute \(E[S(t+1)|\mathcal {A}]\), \(E[S(t+1)|\mathcal {B}]\), and \(E[S(t+1)|\mathcal {C}]\). Due to its similarity to \(E[\textit{ASE}(t+1)]\), we present only the results and omit the proofs.
On the other hand,
Thus, using (33), (34), and (35), we have
This relation completes the proof. \(\square \)
Appendix B: Proof of Lemma 4
Proof
Let the event \(\mathcal {B}\) occur at \(t+1\), \(i\in \mathcal {H}\) and \(j\in \mathcal {M}\) be the participants of the gossip update, \(x_j^t=x_m\), and \(x(t)=x=(x_1,\ldots ,x_n)\). Then,
Taking the expectation over \(x_m\), we have
Taking the expectation over all \(i\in \mathcal {H}\) and \(j\in \mathcal {M}\), we have
Taking the expectation over \(x\), and using (11), we have
Hence, \(E[S(t+1)|\mathcal {B}]>E[S(t)]\). On the other hand, due to (33) and (35), if the event \(\mathcal {A}\) or the event \(\mathcal {C}\) occurs at \(t+1\), then \(E[S(t)]\) remains unchanged. Therefore, \(E[S(t+1)]>E[S(t)]\) for any \(t\ge 0\). \(\square \)
Rights and permissions
About this article
Cite this article
Mousazadeh, M., Tork Ladani, B. Randomized gossip algorithms under attack. Int. J. Inf. Secur. 13, 391–402 (2014). https://doi.org/10.1007/s10207-013-0221-x
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10207-013-0221-x