Next Article in Journal
Passive Current Control Design for MMC in HVDC Systems through Energy Reshaping
Previous Article in Journal
Comparative Analysis of FPGA-Based Pair-HMM Accelerator Structures
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks

Key Laboratory of Advanced Control and Optimization for Chemical Processes, East China University of Science and Technology, Shanghai 200237, China
*
Author to whom correspondence should be addressed.
Electronics 2019, 8(9), 966; https://doi.org/10.3390/electronics8090966
Submission received: 1 July 2019 / Revised: 26 August 2019 / Accepted: 27 August 2019 / Published: 30 August 2019
(This article belongs to the Section Systems & Control Engineering)

Abstract

:
Motivated by the increasing risk of data leaks in distributed networks, we consider the privacy-preserving problem in a consensus network in the presence of an eavesdropper who is able to intercept the data transmitted on the network. First, we introduce a consensus protocol with privacy-preserving function, and analyze its convergence and its privacy-preserving effect. Second, we propose a criterion to measure the degree of network privacy leaks in the existence of the eavesdropper. Particularly, we consider the networks with ring topology and small-world topology, where we find a suboptimal eavesdropping strategy that maximizes the probability of privacy leaks. Finally, we verify all the derived results by numerical examples.

1. Introduction

As a typical distributed algorithm, the consensus protocol has been widely used in many fields, including control engineering, computer science, Cyber–Physical Systems (CPS) and Internet-of-Things (IoT). Distributed networks applying consensus protocol, where each node exchanges information with its connected neighbors so that the whole network reaches an agreement, have been investigated extensively from protocol design and stability analysis to performance optimization [1,2,3,4,5,6,7]. The implementations of the consensus protocol at the software level are usually done by the Paxos algorithm [8], the Byzantine Fault-Tolerant (BFT) algorithm [9], etc.
For flexibility, distributed networks are often designed in a way that the nodes can freely join or leave the network. Malicious attacks are conducted when an adversary node joins the network, which has brought attention to network security issues as various hostile attacks have caused serious economic and social consequences [10,11,12,13,14].
A distributed network reaches consensus when each node exchanges its state with its neighboring nodes, with the initial states of all the nodes broadcasted to the whole network [15]. This is an unwanted property in some cases. For example, in distributed decision-making, if it is required that every individual makes their own decision independently, it is necessary to keep the participants’ initial perspectives secret while achieving an agreement. In IoT applications, distributed privacy preserving is also an urgent issue. For instance, in multi-agent rendezvous problems, a group of agents tries to rendezvous at a certain geographic location, while in some applications, the participating agents may want to keep their initial location secret to the others [16]. Another case is that, in smart grids, the data aggregation of the users’ power consumption information requires frequent reading on a smart meter, which might cause unauthorized users’ information sharing; thus, it is necessary to develop a privacy-enhanced data aggregation scheme [17,18].
Some remarkable works have been done in distributed privacy preserving. Basically, they are of two categories: the usage of cryptography and the usage of intensionally generated noises. Researches using cryptography are often involved with quantification and cypher keys [19,20,21,22]. Kishida in [19] proposed a real-time signal encryption method by combining a quantizer with the Paillier cryptosystem, which ensures the privacy of the recursion of the consensus protocol with a length-reduced key. The reduce of the length of the key is due to the changing sensitivity of the quantizer which maps real-valued states into integers. Guo et al. in [20] encoded the information with authority traceability using elliptic curve based chameleon hashing. Yang et al. in [21] introduced homomorphic encryption into a distributed projected gradient-based algorithm to reach privacy preserving distributed optimization. Different from the cryptography methods, in the studies which used intensionally generated noises, properly conceived noises were added into the transmitted data to confuse the eavesdropper from directly reading the data [23,24,25,26]. Huang et al. proposed a privacy-preserving protocol by adding independent and exponentially decaying Laplacian noise in the process of consensus update [23]. Manitara et al. in [24] also proposed a noise-adding protocal to achieve privacy preserving average consensus. However, different from the independent true random Laplacian noise in [23], the noise added in [24] is a pseudo-random sequence with finite steps, within which the sum the the sequence is fixed to zero to ensure unbiased average consensus. Similar works has been done by Mo et al. [25] and He et al. [26]. In [25], the added noise is conceived as a linear combination of a standard normal distributed random sequence with time-varying coefficients, which also ensures exact average consensus. In [26], the distribution of the added noise is not fixed, but a criterion is proposed to measure the privacy-preserving performance. Under the criterion, the optimal noise distribution is obtained. In [27,28], distributed privacy preserving consensus is used in cooperative driving and vehicular networks, which improves driving security, enhances infrastructure utilization, reduces fuel consumption and at the same time protect the vehicle privacy in platooning applications.
In most of the above mentioned privacy preserving protocols, a fact is that, if the neighboring set of the nth node contains the neighboring set of the ith node, the nth node can speculate the initial state of the ith node [24,25]. It implies that if parts of the neighbors’ information of the ith node can be intercepted by the nth node, then the privacy of the ith node can be inferred. Due to the intensive coupling between nodes in distributed networks, the data transmitted on the network are easily intercepted. In this paper, we consider the privacy preserving problem in the case when an eavesdropper can intercept the information transmitted on the network.
Moreover, it is worth mentioning that this work is an extension of [29]. The networks this paper mainly focus on are the networks of embedded devices such as sensor networks and social networks such as independent consensus decision making, which are vulnerable under eavesdropping attacks. In this paper, we first introduce a privacy-preserving average consensus protocol, and analyze the condition under which all/part of the initial states of nodes will be exposed. In the scenario where an eavesdropper with limited power can intercept the data transmitted on the edges, we propose a criterion to measure the degree of privacy leak, and then study the relationship between the criterion and the power allocation scheme. Since the ring network and the small-world network have typical network structure, we mainly discuss the privacy preserving problem in these two types of network, and find a sub-optimal eavesdropping strategy with which the degree of privacy leaks is maximized. The differences of this paper from [29] are that, (1) we prove the exact average consensus of the proposed privacy-preserving scheme, which was not given in [29]; (2) we consider the scenario where the eavesdropper infers the initial states of the nodes, and give the inferring method and the condition where the inferring method proceeds successfully, which was not considered in [29]; (3) we specify the eavesdropping strategy in the ring network and the small-world network by providing more details in analysis. The main contributions of this paper are summarized as below.
  • We provide a new scheme to achieve privacy-preserving average consensus by splitting the node initial states, which is different from the works in [24,25]. We also reveal the condition where the privacy preserving of the proposed scheme can be breached.
  • We propose a criterion to measure the degree of privacy leaks. Under the criterion, when the eavesdropper is with limited power, we find a suboptimal eavesdropping strategy in ring and small-world network.
  • We explore the convergence performance of our proposed privacy preserving consensus scheme under different noise distributions. We reveal the relationship between the convergence step and variances of the noises by numerical simulations. Besides, we also show that the privacy disclosure of our scheme is smaller than that of the scheme in [24] under certain condition.
The remainder of the paper is organized as follows. In Section 2, we briefly introduce an average consensus protocol, and then propose a privacy-preserving scheme to prevent the initial states of the nodes from being directly sent to the neighbors. We also prove that the proposed privacy-preserving scheme does not affect the exact average consensus of the whole network. In Section 3, we reveal the deducing method conducted by the eavesdropper which infers the initial state of a node under certain condition, and propose a criterion to measure the degree of privacy leaks. Further, we find the optimal attacking strategy of the eavesdropper, which helps us resist the hostile attacks effectively. The optimization of the eavesdropping strategy for ring network and small world network is studied in Section 4 and a numerical example is provided to verify the derived results in Section 5. Section 6 concludes this whole paper.
Notations: R n × m denotes the set of n by m matrices. e i denotes the ith canonical basis in R n with a 1 in the ith entry and zeros elsewhere. E [ X ] denotes the expectation of the random value X. The transpose of a matrix (or a vector) Y is denoted by Y T . The spectral radius i.e., the greatest absolute value among all the eigen-values of matrix A is denoted by ρ ( A ) . The identity matrix is denoted by I. Denote the vector with all the entries are equal to one (or zero) with appropriate dimensions as 1 (or 0 ).

2. Problem Formulation

2.1. Preliminaries

We model a distributed network as an undirected graph G = ( V , E ) , with the nodes V = { 1 , 2 , , n } being the individuals/devices in the network and the edges E V × V representing the communication links between these individuals/devices. Denote the set of the neighbors of node i by N ( i ) = { j V : ( i , j ) E , j i } . Node i and node j can directly communicate if ( i , j ) E . The whole network topology is described by the adjacency matrix A d R n × n , whose entries a i j = 1 if ( i , j ) E , otherwise a i j = 0 , besides, a i i = 0 . Define the Laplacian matrix L = { l i j } by letting l i j = a i j if i j , and l i i = j = 1 n a i j . Thus, the number of neighbors, namely the degree of node i is l i i .
We briefly introduce a consensus protocol proposed in [1], where each node updates its state based on the difference from the states of its neighboring nodes,
x i ( k + 1 ) = x i ( k ) + ε j N ( i ) x j ( k ) x i ( k ) ,
where ε is a positive real number less than max { l i i } to ensure the stability of the iteration in (1). According to the definition of the adjacency matrix A d , (1) can also be written as
x i ( k + 1 ) = x i ( k ) + ε j = 1 n a i j x j ( k ) x i ( k ) .
Define the state vector x ( k ) [ x 1 ( k ) , , x n ( k ) ] T , and recall the relationship between A d and the Laplacian matrix L, The node state iteration in (2) can be written as a matrix form
x ( k + 1 ) = P ε x ( k ) ,
where P ε = I ε L .
To give the condition under which the iteration in (3) reaches asymptotic average consensus, we have the following lemmas.
Lemma 1.
(refer to [1]) The Laplacian matrix L has one and only one eigenvalue that is equal to zero, with all the other eigenvalues greater than zero, if the undirected graph G is connected, namely the degree of all the nodes in G is at least one.
Lemma 2.
(refer to [30]) Matrix P ε satisfies
lim k P ε k = 1 1 T n ,
if and only if (1) 1 T P ε = 1 T , and P ε 1 = 1 , (2) the spectral radius ρ ( P ε ) = 1 . If such, P ε is called adoubly stochasticmatrix.
Theorem 1.
The iteration in (3) reaches asymptotic average consensus, if the undirected graph G is connected.
Proof. 
Please refer to Appendix A. □
It can be noticed from (1) that the initial states are directly sent to the neighboring nodes, which might cause a privacy breach. To prevent the initial states from being acquired by the neighboring nodes, we have to propose a privacy-preserving average consensus protocol.

2.2. Analysis of Privacy Disclosure

Without loss of generality, we assume that node n infers the initial states of the other nodes in the network. Denote the set of the neighboring nodes of node n as N ( n ) = { j 1 , , j m } , and define an observation matrix C = [ e j 1 , , e j m , e n ] T R ( m + 1 ) × n , where e i represents a vector whose ith entry is 1 and all the other entries are 0. At time step k, the states of the nodes observed by node n is
y ( k ) = C x ( k ) .
According to (3), the current observation and history observations of node n are given by the following equations
y ( 0 ) = C x ( 0 ) , y ( 1 ) = C P ε x ( 0 ) ,   y ( k ) = C P ε k x ( 0 ) .
To ensure that number of the above equations is no less than n, let k = n 1 , we have
y ( 0 ) y ( 1 ) y ( n 1 ) = C C P ε C P ε n 1 x ( 0 ) .
Thus, if node n wants to infer the initial states of all the nodes in the network, x ( 0 ) in (5) must has a unique solution. This means that the rank of the matrix on the right hand side of (5) must be n. Otherwise, if the rank is less than n, x ( 0 ) can be represented by
x ( 0 ) = η + γ ,
where η K , K is the null space of the matrix on the right hand side of (5), γ is a special solution of (5). Therefore, for any vector ζ K , namely ζ K , we have
ζ T x ( 0 ) = ζ T η + ζ T γ = 0 + ζ T γ = ζ T γ .
In that for any two special solutions γ 1 and γ 2 of (5), γ 1 γ 2 K ; thus, ζ T γ 1 = ζ T γ 2 . This means that for a given ζ K , ζ T x ( 0 ) can be calculated by the malicious node.
Remark 1.
([31]) A null space of a matrix A is the set of all the solutions of equation A x = 0 . If K is the null space of A, the space that is orthogonal to K is denoted by K , which is the set of all the linear combinations of the row vectors of A.
The above analysis indicates that a malicious node in the network can obtain more information than expected. If the rank of the matrix on the right hand side of (5) is n, full information of the initial states of all the nodes in the network is disclosed. If the rank is less than n, the malicious node can deduce more information than what it directly observed. In Section 5.1, a numerical example is given to show that even a node is not directly connected to the malicious node, its initial state can still be acquired by the malicious node. Thus, it is necessary to develop a privacy-preserving consensus protocol to protect the initial states from being acquired by the malicious node.

2.3. Privacy Preserving Scheme

In this subsection, we propose a privacy-preserving scheme for distributed average consensus by decomposing the initial states of the nodes into a plurality of different values. At different time steps, the values obtained by the decomposition are respectively injected to the distributed consensus iteration. The scheme is stated as follows.
  • Each node i generates a random integer m i , with m i { 2 , 3 , , M } and M being a given positive integer.
  • Mark the real initial state of node i as x i r ( 0 ) , and reset the initial state of each node as x i ( 0 ) = 0 for state update, and denote x r ( 0 ) = [ x 1 r ( 0 ) , x 2 r ( 0 ) , x n r ( 0 ) ] T R n .
  • Each node generates m i numbers r i ( 1 ) , r i ( 2 ) , , r i ( m i ) . These numbers can be arbitrary as long as r i ( k ) 0 , k = 1 , 2 , , m i and
    k = 1 m i r i ( k ) = m i · x i r ( 0 ) .
  • At time step k, inject the number d i ( k ) into the state of each node, where
    d i ( k ) = r i ( k ) / m i , i f 1 k m i 0 , o t h e r w i s e .
Remark 2.
The superscript ‘r’ in x i r ( 0 ) means ‘real’, it distinguishes the real initial state from the fake one x i ( 0 ) , which is reset to zero to deceive the eavesdropper in this scheme.
According to the above four steps, each node updates its state by
x i ( 0 ) = 0 , i 1 , 2 , , n
x i ( k + 1 ) = x i ( k ) + ε j N i x j ( k ) x i ( k ) + d i ( k + 1 ) .
Equation (10) can be written in a matrix form by
x ( k + 1 ) = P ε x ( k ) + d ( k + 1 ) .
By using the above scheme, the privacy of x r ( 0 ) can be protected because the real initial states of nodes are hidden in a group of pseudo-random number.
Performance evaluation: The scheme above is not executed by one single device, instead, it is performed simultaneously by n independent devices. For each device in the network, in step 1 and step 3, the generation of m i 1 random numbers can be achieved by a hardware noise generator. One approach is to subtract the input signal from the output of an analog circuit whose gain is 0 dB to obtain the resistance thermal noise. The thermal noise is then amplified and sampled to obtain a discrete random sequence. Note that a hardware noise generator does not increase the execution time of the processor. In step 2, allocating a new memory piece for x i r ( 0 ) to preserve the real initial state and setting the current initial state into zero only need to be executed for once before the iteration starts; thus, step 2 has computational time complexity of O ( 1 ) . In Step 3, since r i ( k ) , ( k = 1 , , m i 1 ) are randomly generated, to ensure (7) is satisfied, r i ( m i ) is calculated by r i ( m i ) = m i x i r ( 0 ) k = 1 m i 1 r i ( k ) , which takes m i 1 operations of addition, thus is with computational time complexity of O ( m i ) . Step 4 is executed with m i operations of division, also with computational time complexity of O ( m i ) .
Overall, this privacy-preserving consensus scheme has computational time complexity of O ( m i ) , which is acceptable and applicable.
Theorem 2.
The privacy-preserving scheme in (10) ensures the exact average consensus.
Proof. 
Please refer to Appendix A. □
The proposed privacy-preserving scheme ensures privacy preserving if it is assumed that the eavesdropper does not try to infer the initial states of other nodes, because the scheme only blocks the direct streaming of the node state information. It is necessary to find the condition under which the initial states of all/part of the nodes might be deduced by the eavesdropper, thus to investigate the network privacy-preserving performance under eavesdropping attacks.

3. Main Results

3.1. Analysis of Privacy Preserving

In a standard consensus protocol, the initial state of a node can easily be speculated by the other nodes. By using the privacy-preserving scheme in (10), all the nodes can keep their real initial states hidden in the sequence d ( k ) while reaching average consensus. Hence, the problem of deducing x r ( 0 ) actually can be transformed into computing d ( k ) , k = 1 , 2 , , M . In this section, we mainly find the condition for deducing the initial states successfully by the nth node with the proposed privacy-preserving protocol.
According to (4) and (11), we can obtain
x ( k ) = P ε k x ( 0 ) + i = 0 k 1 P ε k 1 i d ( i + 1 ) ,
y ( k ) = C P ε k x ( 0 ) + C i = 0 k 1 P ε k 1 i d ( i + 1 ) .
Recalling that x ( 0 ) = 0 , we have:
Y = F D ,
where
F = C 0 0 C P ε C 0 C P ε M 1 C P ε M 2 C R ( m + 1 ) M × n M ,
Y = y ( 1 ) y ( 2 ) y ( M ) , D = d ( 1 ) d ( 2 ) d ( M ) R n M × 1 .
For a fixed network topology, F is a constant matrix. In order to derive the real initial state x r ( 0 ) from D, we need to utilize the information Y to solve Equation (14). We define
s i = e i , if i N ( n ) 0 , otherwise ,
where 0 R n is zero vector. Further, define
C ˜ = [ s 1 , s 2 , , s n ] T R n × n , y ˜ ( k ) = C ˜ x ( k ) R n × 1 ,
where y ˜ ( k ) can be obtained from y ( k ) for a given C. Using the above arguments, it is easy to obtain the following theorem.
Theorem 3.
If the ith row of P ε , denoted by P ε i , satisfies P ε i C ˜ = P ε i for all i = 1 , 2 , , n , i.e., N ( i ) i N ( n ) n , then the nth node can deduce the initial state of the ith node.
Proof. 
Please refer to Appendix A. □
As discussed above, the initial state of node i can be deduced if the condition N ( i ) i N ( n ) n is satisfied, i.e., node i is a neighbor of node n and all the neighbors of node i are neighbors of node n.

3.2. Privacy Preservation in the Presence of an Eavesdropper

In this subsection, motivated by some practical applications, we consider the case where an eavesdropper with limited energy allocated intends to speculate the initial states of the nodes in a network. It is addressed in [32] that when an eavesdropper intercepts the information transmitted on a wireless channel, a certain amount of energy is consumed due to the activation of antennas. Thus, the eavesdropper tends to find an optimal eavesdropping strategy so that the privacy of the network being listened to is obtained with least energy consumed. Conversely, from the perspective of the network, if the optimal strategy of the eavesdropper is known, it in turn helps the system designer to decide the corresponding anti-eavesdropping scheme to preserve the privacy of the nodes.
In the remainder of this paper, if we say the eavesdropper attacks the edge ( i , j ) , it means that the eavesdropper intercepts the information transmitted on the edge ( i , j ) .
Assumption 1.
The eavesdropper knows the network topology, and intercepts the data transmitted on the link between node i and node j according to a probability λ i , j , ( i , j ) E . The probability λ i , j is a linear function of μ i , j , i.e., λ i , j = κ · μ i , j , where μ i , j is the power allocated by the eavesdropper to attack the edge ( i , j ) and κ is a positive constant. The total sum of the power that the eavesdropper consumes is denoted by T, which means that ( i , j ) E μ i , j = T . In this paper, we assume κ = 1 / T ; thus, ( i , j ) E λ i , j = 1 .
As discussed above, we know that the initial state of node i will be exposed when some conditions are satisfied. To better illustrate this, we consider the case in Figure 1. Assume that the eavesdropper wants to infer the initial state of node 1, i.e., let i = 1 .
  • At time step k, when the information transmitted on edge ( 1 , 2 ) and ( 1 , 5 ) is exposed, the eavesdropper can easily utilize the obtained information to predict the state of node 1 at time step k + 1 , denoted as x ^ 1 ( k + 1 ) , which does not contain the offset d 1 ( k + 1 ) . According to the information transmitted from node 1 to node 5 at time step k + 1 , x 1 ( k + 1 ) , the eavesdropper can further obtain the injected value which equals x 1 ( k + 1 ) x ^ 1 ( k + 1 ) . The eavesdropper can derive the injected value at each step, then the initial state of node 1 can be deduced after several interactions.
  • At time step k, when the information passed on edge ( 1 , 2 ) and ( 5 , 6 ) have been exposed, because the information sent from node 5 to its neighbors are identical, the eavesdropper can speculate all the information sent to node 1, then it can complete the speculation in a similar way.
Therefore, when the network is in the situation similar to the case in Figure 1, for example, the information passed on edge ( 1 , 5 ) and ( 2 , 4 ) is exposed, the eavesdropper can obtain the injected value of each step respectively, then the initial state of node 1 can be deduced by several iterations.
Remark 3.
If the information of at least one edge ( i , j ) , j N i has been successfully intercepted by the eavesdropper, and for each node j N i , the information of at least one edge ( j , s ) , s N j has been intercepted successfully, then the initial state of node i can be successfully inferred by the eavesdropper.
In the following, we propose a criterion to measure the degree of privacy disclosure. First, we describe whether the leak of the data transmitted on edge ( i , j ) at time step k as a binary random value γ i , j ( k ) . When γ i , j ( k ) = 1 , the information flowing on the edge ( i , j ) are intercepted successfully, otherwise γ i , j ( k ) = 0 . Then we define the attacking matrix A r ( k ) , which satisfies
A r [ i , j ] ( k ) = γ i , j ( k ) , i f l i j = 1 0 , o t h e r w i s e .
Recall that E [ γ i , j ( k ) ] = λ i , j , we denote E [ A r ( k ) ] as A t .
A t ( i , j ) = λ i , j , i f l i j = 1 0 , o t h e r w i s e .
To investigate the influence of the eavesdropper on the performance of privacy preserving, we define P i as the probability of privacy disclosure of the ith node, i = 1 , , n i.e., the probability of deducing the initial state of the ith node successfully by the eavesdropper.
Theorem 4.
If an eavesdropper can intercept the information transmitted on edges in the network, the probability of privacy disclosure P i for all i can be calculated by
P i = W i W i , W i = m N ( i ) [ 1 υ = 1 n ( 1 e υ T A t e m ) ] , W i = m N ( i ) [ 1 υ = 1 , υ i n ( 1 e υ T A t e m ) ] .
Proof. 
Please refer to Appendix A. □

4. Privacy Preserving in Two Typical Networks

In this section, we will discuss privacy preserving in the presence of an eavesdropper in two typical networks: the ring network and the small world network. The reason we select the ring network is that, in the ring network, all the nodes and edges have homogeneous topological conditions: each node in the network is connected with two neighboring nodes. This is important to our analysis because later in this section, we inspect how the number of edges attacked has an influence on the privacy disclosure. The homogeneous topological conditions of the edges help exclude the influence of the positions of edges selected. The reason we select the small-world network is that many real world networks, for example, the World Wide Web, the Internet, social networks of acquaintance and neural networks etc., have the topology of a small-world network [33]. A small-world network is defined to be a network where the expectation of the length of the shortest path between two selected nodes grows linearly to the logarithm of the number of nodes n in the network.
Intuitively, the probability P i in the case when attacking some “key” edges is certainly larger than the one in the case when attacking those “trivial” edges. For an eavesdropper with limited power, allocating the power to launch the attack on different edges results in different privacy-preserving effects. From the perspective of the eavesdropper, it intends to find an optimal attacking strategy resulting in the maximal probability of privacy disclosure. As a defender, we are also interested into acquiring optimal attacking strategy of the eavesdropper to protect network security more effectively. In the following, we formulate an optimization problem, which helps find a suboptimal attacking strategy of the eavesdropper in two typical networks. Denote the probability of the privacy disclosure of the whole network as P = i = 1 n P i .
( P 0 ) : max A t P , s . t . ( i , j ) E λ i , j = 1 , 0 λ i , j 1 .

4.1. Ring Network

In a ring network (as in Figure 2), nodes are homogeneously symmetrical. An application of the ring network topology is in distributed independent decision making. In that case, a number of decision makers have to rate on a certain issue. The final rating of the issue is the average of the ratings from all the decision makers. To equalise the weight of the ratings from each decision maker, the decision makers should be in the same condition when assessing the issue. When interconnection is required and a centralized information collector is excluded, a good choice is that the decision makers communicate in a ring topology in that: (1) every decision maker is in the same topological condition; (2) least communication links are needed, thus the possibility that the ratings interact each other is minimized. To ensure that the ratings are based on independent assessments by the decision makers, it is required that each decision maker does not know the others’ ratings; thus, a distributed privacy preserving average consensus scheme is needed. According to Theorem 4, we derive P i as follows:
P i = W i W i , W i = H i 2 · H i , H i = 1 ( 1 λ i , i + 1 ) ( 1 λ i + 1 , i + 2 ) , W i = λ i 2 , i 1 · ( 1 λ i 1 , i ) · ( 1 λ i , i + 1 ) · λ i + 1 , i + 2 .
We rewrite Equation (17) as
P i = λ i 1 , i · λ i , i + 1 + λ i 1 , i · λ i + 1 , i + 2 + λ i 2 , i 1 · λ i , i + 1 λ i 2 , i 1 · λ i 1 , i · λ i , i + 1 λ i 1 , i · λ i , i + 1 · λ i + 1 , i + 2 .
In order to simplify the notation, we use λ i to replace λ i , i + 1 , particularly, λ n represents λ n , 1 . Due to the special structure of ring network, we can calculate P by
P = P 1 + P 2 + + P n = i = 1 n λ i · λ i + 1 + 2 i = 1 n λ i · λ i + 2 2 i = 1 n λ i · λ i + 1 · λ i + 2 .
In the following, we discuss two cases, respectively.
Case 1.
When the eavesdropper only attacks two edges, it means only two variables in λ 1 , λ 2 , , λ n are nonzero numbers. The eavesdropper has many choices, for example, it can attack two adjacent edges, such that λ i and λ i + 1 are not zero, we can obtain the probability P = λ i · λ i + 1 with the constraint λ i + λ i + 1 = 1 . The eavesdropper can also choose two edges ( i , i + 1 ) and ( i + 2 , i + 3 ) , then λ i and λ i + 2 are not zero, we can calculate P = 2 λ i · λ i + 2 with the constraint being λ i + λ i + 2 = 1 . Besides the above two cases, the eavesdropper can also choose two edges ( i , i + 1 ) and ( i + k , i + k + 1 ) , where k ( 2 , n 2 ) , then λ i and λ i + k are not zero. In this case, we can obtain P = 0 . Using all the above arguments, it is easy to derive the optimal attacking strategy, i.e., λ i = λ i + 2 = 0.5 for any i, and the corresponding maximal probability P = 0.5 .
Case 2.
When the eavesdropper chooses three edges, we can find an optimal attacking strategy, using the similar method as above discussed. We choose three edges as shown in Figure 3. Noting that λ i , λ i + 1 , λ i + 2 are not zero, we can obtain P = λ i · λ i + 1 + λ i + 1 · λ i + 2 + 2 λ i · λ i + 2 2 λ i · λ i + 1 · λ i + 2 with the constraint λ i + λ i + 1 + λ i + 2 = 1 .
Obviously, the index of i does not influence the optimal value of P. Without loss of generality, let  i = 1 . The optimization problem P 0 in this case can be rewritten as
max λ 1 , λ 2 , λ 3 λ 1 · λ 2 + λ 2 · λ 3 + 2 λ 1 · λ 3 2 λ 1 · λ 2 · λ 3 . s . t . 0 λ 1 , λ 2 , λ 3 1 , λ 1 + λ 2 + λ 3 = 1 .
We use the Kuhn–Tucker Conditions [34] to solve this problem. The inequality constraint can be noted as h i ( λ ) 0 , i [ 1 , 6 ] ,
h 1 ( λ ) = λ 1 0 , h 2 ( λ ) = λ 1 1 0 , h 3 ( λ ) = λ 2 0 , h 4 ( λ ) = λ 2 1 0 , h 5 ( λ ) = λ 3 0 , h 6 ( λ ) = λ 3 1 0 .
The equality condition is Φ ( λ ) = λ 1 + λ 2 + λ 3 1 = 0 . And Γ denotes the optimization function. Then we have
Γ ( λ ) + i = 1 6 ζ i h i ( λ ) + ψ Φ ( λ ) = 0 , ζ i h i ( λ ) = 0 , Φ ( λ ) = 0 .
Finally, we can obtain the result as λ 1 = λ 3 = 0.5 , λ 2 = 0 , and P = 0.5 .
We choose three edges as shown in Figure 4, where λ i , λ i + 1 , λ i + 3 0 . We can obtain P = λ i · λ i + 1 + 2 λ i · λ i + 3 with λ i + λ i + 1 + λ i + 3 = 1 . For i = 1 , the optimal attacking strategy is λ 2 = λ 4 = 0.5 , and P = 0.5 . As shown in Figure 5, when the chosen three edges λ i , λ i + 2 , λ i + 4 0 , with λ i + λ i + 2 + λ i + 4 = 1 , we can calculate P = 2 λ i · λ i + 2 + 2 λ i + 2 · λ i + 4 . For i = 1 , the optimal attacking strategy is λ 3 = 0.5 , λ 1 + λ 5 = 0.5 , and P = 0.5 . In the case in Figure 6, the analysis is similar to the case of attacking two edges. Overall, we conclude that when the eavesdropper chooses three edges, the optimal attacking strategy is λ i + 2 = 0.5 , λ i + λ i + 4 = 0.5 , and P = 0.5 .

4.2. Small-World Network

An application of the small-world network topology is in the distributed wireless sensor networks. A network of wireless sensors tends to be deployed in complicated unmanned environments. Sensor nodes might join or leave the network due to the instability of telecommunication caused by the changing of the geo-locations of the sensors and the multi-path effect of wireless signals. Moreover, the power of communication is limited so that the maximum communication distance between two sensor nodes might be small, which makes the senor nodes have relatively a small number of neighbors. These features make a wireless sensor network acts like a small-world network. In that a wireless sensor network is designed to give a state estimation of the system it observes, the estimations of different sensors have to be aggregated to reach their average. To prevent the data aggregation process from being eavesdropped by a malicious third party, a privacy preserving average consensus scheme is also needed. In this subsection, we try to solve the optimization problem P 0 in a more complicated case, and propose a suboptimal attacking strategy for a small-world network. Here, we use the Sequential Least Squares Programming optimization algorithm (SLSQP) introduced in [35]. Since the optimization algorithm might fall into a local optimum, the searching results depend on the position of the starting point. We therefore search from different starting points separately and average the result at each time in order to approximate the global optimal solution. The procedures are listed in Algorithm 1.
Algorithm 1 Suboptimal attacking strategy in arbitrary network
  • Generate a network.
  • Each nonzero element in A t is treated as a variable v i [ 0 , 1 ] , and let V = [ v 1 , v 2 , v n ] .
  • Write down the relationship between the probability of privacy leakage P and each variable, and denote final optimization results P o p t i m a l = 0 , V o p t i m a l = [ 0 , 0 , 0 ] .
  • In the kth search, define the initial value of each variable as V 0 ( k ) . Then use the SLSQP algorithm to find the optimal result. Denote the maximal P as P o ( k ) , the corresponding V is V o ( k ) . If  P o ( k ) > P o p t i m a l , then we update P o p t i m a l and V o p t i m a l with P o ( k ) and V o ( k ) .
  • If k + 1 < 1000 , then generate a new initial set V 0 ( k + 1 ) , and repeat step 4, or stop the optimization process.
where V 0 ( k ) is generated by the following procedure:
  • Randomly select some variables from V, and the number of variables selected is random.
  • The selected variable is assigned with a random value between [ 0 , 1 ] .
Next, we further investigate the performance of privacy preserving by Algorithm 1 in small-world networks. In recent years, complex networks have been widely investigated due to the universal phenomenon of small-world network features found in nature [33,36,37,38]. As Remark 3 states, in a general network topology, if the information of at least one edge connected to node j N i is exposed, along with the information of at least one edge connected to node i is intercepted, then the eavesdropper can infer the initial state of node i successfully.
Note that, in a network, the degrees of some nodes might be equal to 1, i.e., the nodes have only one neighbor. Once the information flowing on the only edge is intercepted, the initial state of the node is easily deduced by the eavesdropper. For those nodes with degrees greater than 1, the eavesdropper must intercept the information of multiple edges to deduce the initial state of these nodes. From the perspective of power saving, the eavesdropper is more inclined to attack the edge connecting to the node whose degree is 1.
In the following, we generate a small-world network by setting the number of nodes N = 20 , the number of initial edges of each node K = 2 , and the probability of reconnection P r e c o n n e c t = 0.1 . By solving Algorithm 1, the derived optimal attacking strategy is λ 13 , 16 + λ 17 , 18 = 1 and λ 10 , 11 + λ 16 , 17 = 1 for the networks in Figure 7 and Figure 8, respectively.
Further, we can find that attacking the node with a degree that is greater than 1 results in the best attacking effect. For example, in Figure 7, the degree of node 16 and node 17 equals 1. When the probability of obtaining the information on the unique edge of node 16 is λ 13 , 16 , by Theorem 4, we can calculate P 16 = λ 13 , 16 , thus P = P 16 + P 17 = λ 13 , 16 + λ 17 , 18 = 1 .
The above result reveals that, in a network where each participant divides the information into several parts and then sends out each part at each time step separately, if a participant has only one neighbor, i.e., one channel to communicate, the eavesdropper can fully monitor the dynamics of the participant as long as it can capture the information through the channel. For other participants with multiple channels, it is necessary to monitor multiple channels at the same time in order to obtain the initial information of the participant, along with consuming much more power of the eavesdropper. Thus, in the case where the initial information of each participant is equally important, the eavesdropper is more willing to intercept the information of those participants who have one single information channel.
Besides the above case, the eavesdropper will focus on those nodes whose degrees are relatively small. A special case is, when the neighbors of node i are connected to each other, if the eavesdropper obtains the information passed on any edges between a pair of nodes, it is equivalent to getting the information sent out from node j N i separately. In the following, we validate the above discussion in a small-world model.
Set N = 20 , K = 4 , P r e c o n n e c t = 0.2 . In Figure 9, the optimal attacking strategy given by Algorithm 1 is λ 4 , 5 = 0.5 , λ 4 , 8 = 0.5 . We can calculate P = 0.25 . Note that node 4 is the only node whose degree is 2. Attacking two edges connected to node 4 with identical power leads to the highest extent of privacy leak.
Figure 10 is a small-world model under the condition N = 20 , K = 4 , P r e c o n n e c t = 0.5 . Node 0 has the minimum degree equaling 3. Moreover, two neighbors of node 0, i.e., node 1 and node 2, are connected each other. When the eavesdropper can obtain the information transmitted on ( 1 , 2 ) , it can intercept the information from node 1 and node 2. Then combining with the information on the edge ( 0 , 18 ) , the eavesdropper can fully infer the initial state of the 0th node. Using Algorithm 1, we derive the optimal attacking strategy, i.e., λ 1 , 2 = 0.5 , λ 0 , 18 = 0.5 , which results in P = 0.25 .
By setting N = 20 , K = 4 , P r e c o n n e c t = 0.5 , we generate a small world model as shown in Figure 11. By Algorithm 1, we can obtain the optimal attacking strategy as λ 8 , 10 = 0.5 , λ 14 , 16 = 0.5 , with P = 0.5 . In this case, node 10 and node 14 are connected, with their degrees being 2 and 3, respectively. When the eavesdropper get the information on edge ( 8 , 10 ) and ( 14 , 16 ) , it can infer the initial information of node 10 and 14 successfully. Due to the limited power of the eavesdropper, when λ 8 , 10 = λ 14 , 16 = 0.5 , we can calculate P 10 = 0.25 and P 14 = 0.25 by Theorem 4. Thus, P = P 10 + P 14 = 0.5 .
Overall, we summarize the following results: (1) If there is a node whose degree is 1, the eavesdropper can infer the initial state of this node by intercepting the only edge of the node. (2) Attacking the edges connecting to the node with relatively smaller degree usually brings better eavesdropping effect. (3) The effect of privacy disclosure depends not only on the degree of the node but also on the degree of its neighbors.

5. Numerical Examples

5.1. An Example of Privacy Disclosure

As shown in Figure 12, suppose node n is the malicious node who wants to obtain the initial states of all the other nodes. Set x ( 0 ) = [ 1 , 3 , 7 , 5 , 4 ] T , ε = 1 / 6 . Matrices C and P ε are
C = 0 1 0 0 0 0 0 1 0 0 0 0 0 1 0 1 0 0 0 0 , P ε = 1 / 2 1 / 6 1 / 6 1 / 6 0 1 / 6 2 / 3 0 0 1 / 6 1 / 6 0 5 / 6 0 0 1 / 6 0 0 5 / 6 0 0 1 / 6 0 0 5 / 6 .
The observations at step 0 and step 1 are given by the following equations
y ( 0 ) = C x ( 0 ) = [ 3 , 7 , 5 , 1 ] T , y ( 1 ) = C P ε x ( 0 ) = [ 17 6 , 6 , 29 6 , 3 ] T .
By selecting five independent linear equations from the above, node n can obtain
x n ( 0 ) = 1 , x j 1 ( 0 ) = 3 , x j 2 ( 0 ) = 7 , x j 3 ( 0 ) = 5 , 1 6 x n ( 0 ) + 2 3 x j 1 ( 0 ) + 0 x j 2 ( 0 ) + 0 x j 3 ( 0 ) + 1 6 x s ( 0 ) = 17 6 .
Thus, x s ( 0 ) = 4 can be solved by node n. Note that node s is not directly connected to node n. This example shows that the attacker can deduce the initial states of some nodes under certain conditions, even though theses nodes are not directly connected to the malicious node.

5.2. Convergence and Exact Average Consensus Evaluation

In this subsection, we consider a network consisting of 50 nodes as shown in Figure 13. The real initial state x i r ( 0 ) is set as the following vector
x i r ( 0 ) = [ 57 , 75 , 90 , 4 , 1 , 11 , 28 , 21 , 32 , 86 , 78 , 14 , 20 , 3 , 17 , 92 , 78 , 23 , 72 , 37 , 22 , 87 , 39 , 45 , 41 , 62 , 15 , 45 , 84 , 59 , 52 , 58 , 33 , 44 , 59 , 30 , 69 , 71 , 60 , 3 , 64 , 96 , 37 , 87 , 70 , 93 , 90 , 88 , 35 , 73 ] T ,
of which the average value of the entries is 51. Matrix P ε is set following the rules in Section 2.1, namely P ε = I ε L , where L is the Laplacian matrix of the graph in Figure 13 and ε = 1 / ( 2 max { l i i } ) . For each node i, by setting m i = 200 , We investigate the privacy preserving performance and average consensus convergence of our scheme proposed in Section 2.3 under different distributions and different variances of the random series r i ( k ) .
First, we run the scheme under different distributions of r i ( k ) . These distributions are exponential distributions, normal distributions and uniform distributions that for each node i, the variance of r i ( k ) remains unchange regardless of the change of the distributions to exclude the influence of the variances. For the exponential distribution of the random sequence in each node i, to ensure that the random sequence r i ( k ) satisfies (7), the parameter of the exponential distribution is set to be 1 / x i r ( 0 ) , namely r i ( k ) E ( 1 / x i r ( 0 ) ) ; thus, the mean of the exponential distribution is x i r ( 0 ) and the variance is [ x i r ( 0 ) ] 2 . For the normal distribution of the random sequence in each node i, to ensure that the random sequence r i ( k ) satisfies (7) and the variance remains the same as that of the exponential distribution correspondingly, the mean of the normal distribution is set to be x i r ( 0 ) and the variance is set to be [ x i r ( 0 ) ] 2 , namely r i ( k ) N ( x i r ( 0 ) , [ x i r ( 0 ) ] 2 ) . For the uniform distribution of the random sequence in each node i, to ensure that the random sequence r i ( k ) satisfies (7) and the variance remains the same as that of the previous two distributions correspondingly, the lower bound of the uniform distribution is set to be x i r ( 0 ) 3 x i r ( 0 ) and the upper bound of the uniform distribution is set to be x i r ( 0 ) + 3 x i r ( 0 ) , namely r i ( k ) U ( x i r ( 0 ) 3 x i r ( 0 ) , x i r ( 0 ) + 3 x i r ( 0 ) ) ; thus the mean of the uniform distribution is x i r ( 0 ) and the variance is [ x i r ( 0 ) ] 2 . Note that, in order to eliminate the residuals, each distribution is modified by r i ( k ) : = r i ( k ) [ 1 m i k = 1 m i r i ( k ) x i r ( 0 ) ] . We select node 25 to show how the random sequence r i ( k ) is distributed under those three different distributions in Figure 14.
Under these three different distributions of r i ( k ) , we run the scheme proposed in Section 2.3, the results are shown in Figure 15, Figure 16 and Figure 17. It can be seen that, all the nodes’ states converge to the real average of the initial condition x r ( 0 ) , which is 51, under different distributions of r i ( k ) . This also verifies Theorem 2 that the scheme ensures exact average consensus.
Then, we inspect the convergence step by running the above simulation 1000 times under each distribution, respectively. The scheme is considered to reach average consensus when the variance of x i ( k ) , i = 1 , , 50 is smaller than 1 . 0 × 10 4 . At that point of time, the very step k is considered the convergence step. To eliminate the effect of randomness, the convergence steps are averaged within the 1000 times of simulation under those three distributions respectively, and are then recorded in Table 1. It can be seen that, the convergence step has very slight change under different distributions of r i ( k ) . This is because the variances of these random sequences are designed to be the same.
Further, we inspect how the variance of the random sequence r i ( k ) influence the convergence step. We magnify the variances of the normal distribution and the uniform distribution by 10 1000 times, and examine the average convergence steps within 1000 simulations under these different variances. The result is shown in Figure 18. Note that, for the exponential distribution, the variance is fixed when its mean is fixed, so we cannot change the variance of r i ( k ) of an exponential distribution when its mean is fixed to x i r ( 0 ) .
It can be seen from Figure 18 that when the scales of the variances are the same, the convergence steps are the same regardless of the distribution of r i ( k ) . Besides, both the convergence steps of normal distribution and uniform distribution increases linearly with the increasing of the logarithm of the scale of the variances.

5.3. Privacy Preserving Performance Comparison

In this subsection, we compare the privacy preserving performances between our proposed scheme in Section 2.3 (denoted as “state-split method”) and the scheme proposed in [24] (denoted as “Manitara’s method”). For both the state-split method and the Manitara’s method, we examine the node states privacy disclosure with changing variances of the random sequence r i ( k ) . The simulation parameters are set the same as in Section 5.2 unless stated deliberately.
In Figure 19 and Figure 20, Manitara’s method is inspected. The left side shows the node state evolution when the variance of r i ( k ) is 100 times of that in Section 5.2. And the right side shows the case when the variance is 0.01 times of that in Section 5.2. It can be seen that, the privacy preserving performance is effective when the variance is large, because the node states are mixed in the random noises. However, when the variance is small, the influence of the random noises is nearly neglected. Thus, the eavesdropper in the network might obtain the initial states under a considerable accuracy when the variance of r i ( k ) is small.
In Figure 21 and Figure 22, The state-split method is inspected. The left side shows the node state evolution when the variance of r i ( k ) is 100 times of that in Section 5.2. And the right side shows the case when the variance is 0.01 times of that in Section 5.2. It can be seen that, the privacy preserving performance of the state-split method is effective both when the variance is large or small, because the node state always starts from the fake initial state x i ( 0 ) , which is designed to be 0 to deceive the eavesdropper. The real initial state x i ( 0 ) is split and hidden in the random sequence r i ( k ) .
The above comparison indicates that the state-split method achieves better privacy preserving performance than Manitara’s method does when the variance of the adding random sequence is small. This is a desired feature especially when the system cannot provide noises of large variance. For example, in an analog system, the noise might be generated by an amplifier whose saturation voltage is limited, thus, the variance of noise provided might be relatively small.

6. Conclusions

In this paper, we proposed a privacy-preserving scheme for a distributed average consensus problem by splitting the nodes’ initial states into several parts and each part is sent to the neighbors at different time steps to block the direct streaming of the node state information. We also analysed the case where the eavesdropper tries to deduce the initial states. We found that under the condition that a node and its neighbors are all the neighbors of the eavesdropper, the initial state of the node can be deduced by the eavesdropper even if the proposed privacy preserving scheme is applied. Further, in the case where an eavesdropper can intercept the data transmitted on the edges, we proposed a criterion to measure the degree of privacy leaks. Under this criterion, for the eavesdropper with limited power, we found a suboptimal attacking strategy in a ring network and a small-world network, respectively. To find the optimal attacking strategy for an arbitrary network, we have provided an optimization algorithm which can be solved by SLSQP, and obtained some heuristic results by the numerical simulations. Specifically, we have explored that the variance of the distribution of the random sequence would influence the convergence step of the consensus protocol with privacy preserving. Besides, we compared the privacy-preserving performance of our proposed scheme with that of a previous study. The result showed that our scheme achieved better privacy preserving when the variance of the random sequence is relatively small.

Author Contributions

Conceptualization by W.Y.; Formal analysis by D.L.; Methodology by H.Z.; Writing, review and editing by D.L. and H.Z.

Funding

This work was supported in part by the National Natural Science Foundation of China under Grant (61973123, 61573143), the projects sponsored by the development fund for Shanghai talents, the Shanghai Natural Science Foundation under Grant 18ZR1409700, and the Programme of Introducing Talents of Discipline to Universities (the 111 Project) under Grant B17017.

Conflicts of Interest

The authors declare no conflict of interest. The funders had no role in the design of the study; in the collection, analyses, or interpretation of data; in the writing of the manuscript, or in the decision to publish the results.

Appendix A. Proofs of Theorems

Proof of Theorem 1.
P ε is a doubly stochastic matrix because: (1) 1 T P ε = 1 T ε 1 T L = 1 T ; (2) P ε 1 = 1 ε L 1 = 1 ; (3) L is symmetric, it has orthogonal decomposition L = ε Q Λ L Q T , where Q is an orthogonal matrix and Λ L is a diagonal matrix with the diagonal entries being the eigenvalues of L. Thus, P ε = I ε L = Q I ε Λ L Q T . Because G is connected, Λ L has one and only one diagonal entry equaling zero according to Lemma 1, with ε < max { l i i } , I ε Λ L has one and only one diagonal entry equaling one, with all the other diagonal entries’ magnitudes less than one. Hence P ε satisfies the conditions in Lemma 2.
In that P ε is doubly stochastic, according to Lemma 2 we have
lim k x ( k ) = lim k P ε k x ( 0 ) = 1 1 T n x ( 0 ) = 1 n i = 1 n x i ( 0 ) · 1 ,
which indicates that the entries of x ( ) is exactly the average of all the initial states. □
Proof of Theorem 2.
Denote d ( k ) = d 1 ( k ) , d 2 ( k ) , , d n ( k ) T . The iteration in (10) can be rewritten as
x ( k + 1 ) = P ε x ( k ) + d ( k + 1 ) ;
thus, according to Lemma 2, we have
lim k x ( k ) = lim k P ε x ( k 1 ) + d ( k ) = lim k P ε 2 x ( k 2 ) + P ε d ( k 1 ) + d ( k ) = = lim k P ε k x ( 0 ) + P ε k 1 d ( 1 ) + + P ε k m i d ( m i ) + P ε k m i 1 d ( m i + 1 ) + = 1 1 T n x ( 0 ) + 1 1 T n l = 1 d ( l ) .
According to (7)–(9),
lim k x ( k ) = 1 1 T n x ( 0 ) + 1 1 T n l = 1 d ( l ) = 0 + 1 1 T n 1 m i l = 1 m i r i ( l ) = 1 1 T n x r ( 0 ) .
Recall that x r ( 0 ) denotes the real initial states; thus, the exact average consensus is achieved. □
Proof of Theorem 3.
For any k [ 1 , M 1 ] , it can be derived that
y ˜ ( k ) = C ˜ i = 0 k 1 P ε k 1 i d ( i + 1 ) .
Note that P ε i C ˜ = P ε i , which means that the ith node is a neighbor of the nth node. Thus, x i ( k ) lies in the ith line of y ( k ) , then
P ε i y ˜ ( k ) = P ε i i = 0 k 1 P ε k 1 i d ( i + 1 ) = P ε i x i ( k ) .
At time step k + 1 , the state x i ( k + 1 ) can be derived from y ( k + 1 ) . Hence,
d i ( k + 1 ) = x i ( k + 1 ) P ε i x i ( k ) .
In this way, d i ( 2 ) , d i ( 3 ) , , d i ( M ) can also be obtained. Note that d i ( 1 ) lies in y ( 1 ) = C d ( 1 ) . Therefore, the sequence d i ( k ) of k = 1 , 2 , , M is obtained. Combing (7) and (8), x i r ( 0 ) can be calculated. Thus, the initial state of the ith node is derived. □
Proof of Theorem 4.
Note that A t ( i , j ) denotes the attacking probability of the edge ( i , j ) , which equals e i T A t e j .
For the mth node within the neighboring set of node i, we regard that the mth node is in dangerous state if at least one edge connected to it has been intercepted. We use 1 υ = 1 n ( 1 e υ T A t e m ) to represent the probability of the initial state of the mth node exposed to the eavesdropper, thus W i is the probability of initial states of all the neighbors of the ith node exposed to the eavesdropper. However, according to the results in Remark 3, in order to deduce the privacy information of node i, we should not only let all the neighbors of node i enter into the dangerous state, but also need to ensure that at least one edge ( i , j ) , j N i is exposed. Thus, we use the gap between W i and W i to denote the probability of privacy disclosure of the ith node. □

References

  1. Olfati-Saber, R.; Murray, R.M. Consensus problems in networks of agents with switching topology and time-delays. IEEE Trans. Autom. Control 2004, 49, 1520–1533. [Google Scholar] [CrossRef]
  2. Miao, G.; Li, G.; Li, T.; Liu, Y. H consensus control for heterogeneous multi-agent via output under markov switching topologies. Electronics 2018, 7, 453. [Google Scholar] [CrossRef]
  3. Shi, L.; Xie, L. Optimal sensor power scheduling for state estimation of Gauss–Markov systems over a packet-dropping network. IEEE Trans. Signal Process. 2012, 60, 2701–2705. [Google Scholar] [CrossRef]
  4. Chen, Z.; Zhang, H.T. Analysis of joint connectivity condition for multiagents with boundary constraints. IEEE Trans. Cybern. 2013, 43, 437–444. [Google Scholar] [CrossRef] [PubMed]
  5. Yang, W.; Wang, X.; Shi, H. Fast consensus seeking in multi-agent systems with time delay. Syst. Control Lett. 2013, 62, 269–276. [Google Scholar] [CrossRef]
  6. Yang, W.; Wang, Z.; Zuo, Z.; Yang, C.; Shi, H. Nodes selection strategy in cooperative tracking problem. Automatica 2016, 74, 118–125. [Google Scholar] [CrossRef] [Green Version]
  7. Hu, W.; Liu, L.; Feng, G. Consensus of linear multi-agent systems by distributed event-triggered strategy. IEEE Trans. Cybern. 2015, 46, 148–157. [Google Scholar] [CrossRef]
  8. Gray, J.; Lamport, L. Consensus on transaction commit. ACM Trans. Database Syst. 2006, 31, 133–160. [Google Scholar] [CrossRef]
  9. Lamport, L.; Shostak, R.; Pease, M. The Byzantine generals problem. ACM Trans. Program. Lang. Syst. 1982, 4, 382–401. [Google Scholar] [CrossRef]
  10. Kefayati, M.; Talebi, M.S.; Khalaj, B.H.; Rabiee, H.R. Secure consensus averaging in sensor networks using random offsets. In Proceedings of the 2007 IEEE International Conference on Telecommunications and Malaysia International Conference on Communications, Penang, Malaysia, 14–17 May 2007; pp. 556–560. [Google Scholar]
  11. Zhang, H.; Cheng, P.; Wu, J.; Shi, L.; Chen, J. Online deception attack against remote state estimation. IFAC Proc. Vol. 2014, 47, 128–133. [Google Scholar] [CrossRef]
  12. Qi, Y.; Cheng, P.; Shi, L.; Chen, J. Event-based attack against remote state estimation. In Proceedings of the 2015 54th IEEE Conference on Decision and Control (CDC), Osaka, Japan, 15–18 December 2015; pp. 6844–6849. [Google Scholar]
  13. Lei, L.; Yang, W.; Yang, C.; Shi, H. False data injection attack on consensus-based distributed estimation. Int. J. Robust Nonlinear Control 2017, 27, 1419–1432. [Google Scholar] [CrossRef]
  14. Zhao, C.; He, J.; Cheng, P.; Chen, J. Analysis of consensus-based distributed economic dispatch under stealthy attacks. IEEE Trans. Ind. Electron. 2016, 64, 5107–5117. [Google Scholar] [CrossRef]
  15. Kolesnikov, V. Advances and impact of secure function evaluation. Bell Labs Tech. J. 2009, 14, 187–192. [Google Scholar] [CrossRef]
  16. Qin, J.; Ma, Q.; Shi, Y.; Wang, L. Recent advances in consensus of multi-agent systems: A brief survey. IEEE Trans. Ind. Electron. 2016, 64, 4972–4983. [Google Scholar] [CrossRef]
  17. Fan, C.I.; Huang, S.Y.; Lai, Y.L. Privacy-enhanced data aggregation scheme against internal attackers in smart grid. IEEE Trans. Ind. Inform. 2013, 10, 666–675. [Google Scholar] [CrossRef]
  18. Li, S.; Xue, K.; Yang, Q.; Hong, P. PPMA: Privacy-preserving multisubset data aggregation in smart grid. IEEE Trans. Ind. Inform. 2017, 14, 462–471. [Google Scholar] [CrossRef]
  19. Kishida, M. Encrypted Average Consensus with Quantized Control Law. In Proceedings of the 2018 IEEE Conference on Decision and Control (CDC), Miami Beach, FL, USA, 17–19 December 2018; pp. 5850–5856. [Google Scholar]
  20. Guo, S.; Zeng, D.; Xiang, Y. Chameleon hashing for secure and privacy-preserving vehicular communications. IEEE Trans. Parallel Distrib. Syst. 2013, 25, 2794–2803. [Google Scholar] [CrossRef]
  21. Lu, Y.; Zhu, M. Privacy preserving distributed optimization using homomorphic encryption. Automatica 2018, 96, 314–325. [Google Scholar] [CrossRef] [Green Version]
  22. Zhou, Y.; Liu, T.; Tang, F.; Wang, F.; Tinashe, M. A Privacy-preserving authentication and key agreement scheme with deniability for IoT. Electronics 2019, 8, 450. [Google Scholar] [CrossRef]
  23. Huang, Z.; Mitra, S.; Dullerud, G. Differentially private iterative synchronous consensus. In Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, Raleigh, NC, USA, 15 October 2012; ACM: New York, NY, USA, 2012; pp. 81–90. [Google Scholar] [Green Version]
  24. Manitara, N.E.; Hadjicostis, C.N. Privacy-preserving asymptotic average consensus. In Proceedings of the 2013 European Control Conference (ECC), Zurich, Switzerland, 17–19 July 2013; pp. 760–765. [Google Scholar]
  25. Mo, Y.; Murray, R.M. Privacy preserving average consensus. IEEE Trans. Autom. Control 2016, 62, 753–765. [Google Scholar] [CrossRef]
  26. He, J.; Cai, L.; Guan, X. Preserving data-privacy with added noises: Optimal estimation and privacy analysis. IEEE Trans. Inf. Theory 2018, 64, 5677–5690. [Google Scholar] [CrossRef]
  27. Petrillo, A.; Pescape, A.; Santini, S. A collaborative approach for improving the security of vehicular scenarios: The case of platooning. Comput. Commun. 2018, 122, 59–75. [Google Scholar] [CrossRef]
  28. Santini, S.; Salvi, A.; Valente, A.; Pescape, A.; Segata, M.; Cigno, R. Platooning Maneuvers in Vehicular Networks: A Distributed and Consensus-Based Approach. IEEE Trans. Intell. Veh. 2019, 4, 59–72. [Google Scholar] [CrossRef]
  29. Zhou, H.; Yang, W.; Yang, C.; Tang, Y.; Shi, H. Optimal eavesdropping problem in privacy preserving consensus. In Proceedings of the IECON 2017-43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, 29 October–1 November 2017; pp. 5929–5934. [Google Scholar]
  30. Xiao, L.; Boyd, S. Fast linear iterations for distributed averaging. Syst. Control Lett. 2004, 53, 65–78. [Google Scholar] [CrossRef]
  31. Horn, R.A.; Johnson, C.R. Matrix Analysis; Cambrige Univeristy Press: Cambrige, UK, 2012. [Google Scholar]
  32. Zappone, A.; Lin, P.H.; Jorswieck, E. Optimal energy-efficient design of confidential multiple-antenna systems. IEEE Trans. Inf. Forensics Secur. 2017, 13, 237–252. [Google Scholar] [CrossRef]
  33. Wang, X.F.; Chen, G. Complex networks: small-world, scale-free and beyond. IEEE Circuits Syst. Mag. 2003, 3, 6–20. [Google Scholar] [CrossRef]
  34. Gale, D.; Kuhn, H.W.; Tucker, A.W. Linear programming and the theory of games. Act. Anal. Prod. Alloc. 1951, 13, 317–335. [Google Scholar]
  35. Kraft, D. Algorithm 733: TOMP–Fortran modules for optimal control calculations. ACM Trans. Math. Softw. (TOMS) 1994, 20, 262–281. [Google Scholar] [CrossRef]
  36. Watts, D.J.; Strogatz, S.H. Collective dynamics of small-world networks. Nature 1998, 393, 440–442. [Google Scholar] [CrossRef]
  37. Hong, H.; Choi, M.Y.; Kim, B.J. Collective synchronization on small-world networks. Phys. Rev. E 2002, 65, 026139. [Google Scholar] [CrossRef]
  38. Wang, X.F.; Chen, G. Synchronization in small-world dynamical networks. Int. J. Bifurc. Chaos 2002, 12, 187–192. [Google Scholar] [CrossRef]
Figure 1. Network structure.
Figure 1. Network structure.
Electronics 08 00966 g001
Figure 2. Ring network.
Figure 2. Ring network.
Electronics 08 00966 g002
Figure 3. Attacking mode 1.
Figure 3. Attacking mode 1.
Electronics 08 00966 g003
Figure 4. Attacking mode 2.
Figure 4. Attacking mode 2.
Electronics 08 00966 g004
Figure 5. Attacking mode 3.
Figure 5. Attacking mode 3.
Electronics 08 00966 g005
Figure 6. Attacking mode 4.
Figure 6. Attacking mode 4.
Electronics 08 00966 g006
Figure 7. Small-world network 1.
Figure 7. Small-world network 1.
Electronics 08 00966 g007
Figure 8. Small-world network 2.
Figure 8. Small-world network 2.
Electronics 08 00966 g008
Figure 9. Small-world network 3.
Figure 9. Small-world network 3.
Electronics 08 00966 g009
Figure 10. Small-world network 4.
Figure 10. Small-world network 4.
Electronics 08 00966 g010
Figure 11. Small-world model.
Figure 11. Small-world model.
Electronics 08 00966 g011
Figure 12. A case of privacy disclosure.
Figure 12. A case of privacy disclosure.
Electronics 08 00966 g012
Figure 13. Network topology of 50 nodes.
Figure 13. Network topology of 50 nodes.
Electronics 08 00966 g013
Figure 14. Three different distributions of r i ( k ) in node 25.
Figure 14. Three different distributions of r i ( k ) in node 25.
Electronics 08 00966 g014
Figure 15. States evolution under exponential distribution of r i ( k ) .
Figure 15. States evolution under exponential distribution of r i ( k ) .
Electronics 08 00966 g015
Figure 16. States evolution under normal distribution of r i ( k ) .
Figure 16. States evolution under normal distribution of r i ( k ) .
Electronics 08 00966 g016
Figure 17. States evolution under uniform distribution of r i ( k ) .
Figure 17. States evolution under uniform distribution of r i ( k ) .
Electronics 08 00966 g017
Figure 18. Convergence step vs. variance of r i ( k ) .
Figure 18. Convergence step vs. variance of r i ( k ) .
Electronics 08 00966 g018
Figure 19. Manitara’s method under large variance.
Figure 19. Manitara’s method under large variance.
Electronics 08 00966 g019
Figure 20. Manitara’s method under small variance.
Figure 20. Manitara’s method under small variance.
Electronics 08 00966 g020
Figure 21. State-split method under large variance.
Figure 21. State-split method under large variance.
Electronics 08 00966 g021
Figure 22. State-split method under small variance.
Figure 22. State-split method under small variance.
Electronics 08 00966 g022
Table 1. Average convergence step under different distributions.
Table 1. Average convergence step under different distributions.
DistributionConvergence Step
Exponential374.188
Normal374.357
Uniform374.440

Share and Cite

MDPI and ACS Style

Li, D.; Zhou, H.; Yang, W. Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks. Electronics 2019, 8, 966. https://doi.org/10.3390/electronics8090966

AMA Style

Li D, Zhou H, Yang W. Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks. Electronics. 2019; 8(9):966. https://doi.org/10.3390/electronics8090966

Chicago/Turabian Style

Li, Dengke, Han Zhou, and Wen Yang. 2019. "Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks" Electronics 8, no. 9: 966. https://doi.org/10.3390/electronics8090966

APA Style

Li, D., Zhou, H., & Yang, W. (2019). Privacy-Preserving Consensus over a Distributed Network against Eavesdropping Attacks. Electronics, 8(9), 966. https://doi.org/10.3390/electronics8090966

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop