Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing
This paper considers the problem of optimal distributed detection with independent identical sensors in the presence of Byzantine attacks. By considering the attacker to be strategic in nature, we address the issue of designing the optimal fusion rule and the local sensor thresholds that minimize the probability of error at the fusion center (FC). We first consider the problem of finding the optimal fusion rule under the constraint of fixed local sensor thresholds and fixed Byzantine strategy. Next, we consider the problem of joint optimization of the fusion rule and local sensor thresholds for a fixed Byzantine strategy. Then we extend these results to the scenario where both the FC and the Byzantine attacker act in a strategic manner to optimize their own utilities. We model the strategic behavior of the FC and the attacker using game theory and show the existence of Nash Equilibrium. We also provide numerical results to gain insights into the solution.
Optimum decision fusion in the presence of malicious nodes—often referred to as Byzantines—is hindered by the necessity of exactly knowing the statistical behavior of Byzantines. In this paper, we focus on a simple, yet widely adopted, setup in which a fusion center (FC) is asked to make a binary decision about a sequence of system states by relying on the possibly corrupted decisions provided by local nodes. We propose a game-theoretic framework, which permits to exploit the superior performance provided by optimum decision fusion, while limiting the amount of a priori knowledge required. We use numerical simulations to derive the optimum behavior of the FC and the Byzantines in a game-theoretic sense, and to evaluate the achievable performance at the equilibrium point of the game. We analyze several different setups, showing that in all cases, the proposed solution permits to improve the accuracy of data fusion. We also show that, in some cases, it is preferable for the Byzantines to minimize the mutual information between the status of the observed system and the reports submitted to the FC, rather than always flipping the decision made by the local nodes.
In this paper, we consider the problem of distributed Bayesian detection in the presence of Byzantines in the network. It is assumed that a fraction of the nodes in the network are compromised and reprogrammed by an adversary to transmit false information to the fusion center (FC) to degrade detection performance. The problem of distributed detection is formulated as a binary hypothesis test at the FC based on 1-bit data sent by the sensors. The expression for minimum attacking power required by the Byzantines to blind the FC is obtained. More specifically, we show that above a certain fraction of Byzantine attackers in the network, the detection scheme becomes completely incapable of utilizing the sensor data for detection. We analyze the problem under different attacking scenarios and derive results for both asymptotic and non-asymptotic cases. It is found that asymptotics-based results do not hold under several non-asymptotic scenarios. When the fraction of Byzantines is not sufficient to blind the FC, we also provide closed form expressions for the optimal attacking strategies for the Byzantines that most degrade the detection performance.
2018
We consider a variant of the decision fusion problem in the presence of Byzantines where the two states of the system under observation are not equiprobable. In this setup, the Byzantines can not adopt a simple corruption strategy consisting in flipping the local decisions regardless of the estimated state of the system. Doing so, in fact, they would reveal their presence to the fusion center, since their reports would not follow the expected statistics. On its side, the fusion center can exploit the knowledge of the a-priori probabilities to improve its decision. In view of the above observations, we first introduce a new corruption strategy for the Byzantines, which permits them to make the statistics of their reports indistinguishable from those of the honest nodes. Then, we adopt the perspective of the fusion center and we propose a nearly-optimum, efficient, fusion strategy based on message passing, to face with the new attack. We do so in the most challenging scenario wherein ...
IEEE Signal Processing Letters, 2015
In this letter, we consider the problem of distributed Bayesian detection in the presence of data falsifying Byzantines in the network. The problem of distributed detection is formulated as a binary hypothesis test at the fusion center (FC) based on 1-bit data sent by the sensors. Adopting Chernoff information as our performance metric, we study the detection performance of the system under Byzantine attack in the asymptotic regime. The expression for minimum attacking power required by the Byzantines to blind the FC is obtained. More specifically, we show that above a certain fraction of Byzantine attackers in the network, the detection scheme becomes completely incapable of utilizing the sensor data for detection. When the fraction of Byzantines is not sufficient to blind the FC, we also provide closed form expressions for the optimal attacking strategies for the Byzantines that most degrade the detection performance.
The problem of Byzantine (malicious sensors) threats in a distributed detection framework for inference networks is addressed. Impact of Byzantines is mitigated by suitably adding Stochastic Resonance (SR) noise. Previously, Independent Malicious Byzantine Attack (IMBA), where each Byzantine decides to attack the network independently relying on its own observation was considered. In this paper, we present further results for Cooperative Malicious Byzantine Attack (CMBA), where Byzantines collaborate to make the decision and use this information for the attack. In order to analyze the network performance, we consider KL-Divergence (KLD)
53rd IEEE Conference on Decision and Control, 2014
Decision fusion in adversarial setting is receiving increasing attention due to its relevance in several applications including sensor networks, cognitive radio, social networks, distributed network monitoring. In most cases, a fusion center has to make a decision based on the reports provided by local agents, e.g. the nodes of a multi-sensor network. In this paper, we consider a setup in which the fusion center makes its decision on the status of an observed system by relying on the decisions made by a pool of local nodes and by taking into account the possibility that some nodes maliciously corrupt their reports to induce a decision error. We do so by casting the problem into a game-theoretic framework and looking for the existence of an equilibrium point defining the optimum strategies for the fusion center and the malicious nodes. We analyze two different strategies for the fusion center: a strategy recently introduced by Varshney et al. in a cognitive radio setup and a new approach based on soft identification of malicious nodes. The superior performance of the new decision scheme are demonstrated by resorting to the game-theoretic framework introduced previously.
In distributed detection based on consensus algorithm, all nodes reach the same decision by locally exchanging information with their neighbors. Due to the distributed nature of the consensus algorithm , an attacker can induce a wrong decision by corrupting just a few measurements. As a countermeasure, we propose a modified algorithm wherein the nodes discard the corrupted measurements by comparing them to the expected statistics under the two hypothesis. Although the nodes with corrupted measurements are not considered in the protocol, under proper assumptions on network topology, the convergence of the distributed algorithm can be preserved. On his hand, the attacker may try to corrupt the measurements up to a level which is not detectable to avoid that the corrupted measurements are discarded. We describe the interplay between the nodes and the attacker in a game-theoretic setting and use simulations to derive the equilibrium point of the game and evaluate the performance of the proposed scheme.
IEEE Transactions on Signal Processing, 2000
The problem of distributed inference with M-ary quantized data at the sensors is investigated in the presence of Byzantine attacks. We assume that the attacker does not have knowledge about either the true state of the phenomenon of interest, or the quantization thresholds used at the sensors. Therefore, the Byzantine nodes attack the inference network by modifying modifying the symbol corresponding to the quantized data to one of the other M symbols in the quantization alphabetset and transmitting the false symbol to the fusion center (FC). In this paper, we find the optimal Byzantine attack that blinds any distributed inference network. As the quantization alphabet size increases, a tremendous improvement in the security performance of the distributed inference network is observed.
Aerospace and Electronic …, 1990
IEEE Sensors Journal
We address the problem of centralized detection of a binary event in the presence of falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidth-constrained under−attack spatially uncorrelated distributed wireless sensor network (WSN). The SNs send their quantized test statistics over orthogonal channels to the fusion center (FC), which linearly combines them to reach a final decision. First (considering that the FC and the attacker do not act strategically), we derive (i) the FC optimal weight combining; (ii) the optimal SN to FC transmit power, and (iii) the test statistic quantization bits that maximize the probability of detection (P d). We also derive an expression for the attacker strategy that causes the maximum possible FC degradation. But in these expressions, both the optimum FC strategy and the attacker strategy require a − priori knowledge that cannot be obtained in practice. The performance analysis of sub-optimum FC strategies is then characterized, and based on the (compromised) SNs willingness to collaborate, we also derive analytically the sub-optimum attacker strategies. Then, considering that the FC and the attacker now act strategically, we re-cast the problem as a minimax game between the FC and the attacker and prove that the Nash Equilibrium (NE) exists. Finally, we find this NE numerically in the simulation results and this gives insight into the detection performance of the proposed strategies.
2013 International Conference on Computing, Networking and Communications (ICNC), 2013
This paper considers the problem of optimal Byzantine attacks or data falsification attacks on distributed detection mechanism in tree-based topologies. First, we show that when more than a certain fraction of individual node decisions are falsified, the decision fusion scheme becomes completely incapable. Second, under the assumption that there is a cost associated with attacking each node (which represent resources invested in capturing a node or cloning a node in some cases), we address the problem of minimum cost Byzantine attacks and formulate it as the bounded knapsack problem (BKP). An algorithm to solve our problem in polynomial time is presented. Numerical results provide insights into our solution.
2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), 2014
This paper considers the problem of performance analysis of data fusion schemes in the presence of Byzantine attacks. First, we analyze the security performance of data fusion schemes with Byzantines. We show that when more than a certain fraction of Byzantines are present in the network, the raw data fusion schemes become completely incapable (blind). More specifically, we obtain a closed form expression for the lower bound on the fraction of Byzantines needed to blind the fusion center as a function of attacker's strength. Next, we investigate the global detection performance in the presence of Byzantine attacks, and analytically characterize the effect of Byzantines on detection performance. Numerical results provide insights into our analysis.
This thesis addresses the problem of detection of an unknown binary event. In particular, we consider centralized detection, distributed detection, and network security in wireless sensor networks (WSNs). The communication links among SNs are subject to limited SN transmit power, limited bandwidth (BW), and are modeled as orthogonal channels with path loss, flat fading and additive white Gaussian noise (AWGN). We propose algorithms for resource allocations, fusion rules, and network security. In the first part of this thesis, we consider the centralized detection and calculate the optimal transmit power allocation and the optimal number of quantization bits for each SN. The resource allocation is performed at the fusion center (FC) and it is referred as a centralized approach. We also propose a novel fully distributed algorithm to address this resource allocation problem. What makes this scheme attractive is that the SNs share with their neighbors just their individual transmit power at the current states. Finally, the optimal soft fusion rule at the FC is derived. But as this rule requires a-priori knowledge that is difficult to attain in practice, suboptimal fusion rules are proposed that are realizable in practice. The second part considers a fully distributed detection framework and we propose a two-step distributed quantized fusion rule algorithm where in the first step the SNs collaborate with their neighbors through error-free, orthogonal channels. In the second step, local 1-bit decisions generated in the first step are shared among neighbors to yield a consensus. A binary hypothesis testing is performed at any arbitrary SN to optimally declare the global decision. Simulations show that our proposed quantized two-step distributed detection algorithm approaches the performance of the unquantized centralized (with a FC) detector and its power consumption is shown to be 50% less than the existing (unquantized) conventional algorithm. Finally, we analyze the detection performance of under-attack WSNs and derive attacking and defense strategies from both the Attacker and the FC perspective. We re-cast the problem as a minimax game between the FC and Attacker and show that the Nash Equilibrium (NE) exists. We also propose a new non-complex and efficient reputation-based scheme to identify these compromised SNs. Based on this reputation metric, we propose a novel FC weight computation strategy ensuring that the weights for the identified compromised SNs are likely to be decreased. In this way, the FC decides how much a SN should contribute to its final decision. We show that this strategy outperforms the existing schemes.
IEEE Transactions on Signal Processing, 2014
In this paper, we consider the problem of distributed detection in tree topologies in the presence of Byzantines. The expression for minimum attacking power required by the Byzantines to blind the fusion center (FC) is obtained. More specifically, we show that when more than a certain fraction of individual node decisions are falsified, the decision fusion scheme becomes completely incapable. We obtain closed form expressions for the optimal attacking strategies that minimize the detection error exponent at the FC. We also look at the possible counter-measures from the FC's perspective to protect the network from these Byzantines. We formulate the robust topology design problem as a bi-level program and provide an efficient algorithm to solve it. We also provide some numerical results to gain insights into the solution.
—We address the problem of centralized detection of a binary event in the presence of β fraction falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidth-constrained under − attack spatially uncorrelated distributed wireless sensor network (WSN). The SNs send their one-bit test statistics over orthogonal channels to the fusion center (FC), which linearly combines them to reach to a final decision. Adopting the modified deflection coefficient as an alternative function to be optimized, we first derive in a closed-form the FC optimal weights combining. But as these optimal weights require a − priori knowledge that cannot be attained in practice, this optimal weighted linear FC rule is not implementable. We also derive in a closed-form the expressions for the attacker "flipping probability" (defined in paper) and the minimum fraction of compromised SNs that makes the FC incapable of detecting. Next, based on the insights gained from these expressions, we propose a novel and non-complex reliability-based strategy to identify the compromised SNs and then adapt the weights combining proportional to their assigned reliability metric. In this way, the FC identifies the compromised SNs and decreases their weights in order to reduce their contributions towards its final decision. Finally, simulation results illustrate that the proposed strategy significantly outperforms (in terms of FC's detection capability) the existing compromised SNs identification and mitigation schemes.
We consider a setup in which a Fusion Center (FC) makes a binary decision on the sequence of system states by relying on local observations provided by both honest and byzantine nodes, i.e., nodes that deliberately alter the result of the local decision to induce an error at the fusion center. In this setting, we assume a Markovian information model for the status with a given transition probability that can be perfectly estimated at the FC. Hence, we consider an attacking strategy where the byzantine nodes can coordinate their attacks by producing correlated reports, with the aim of mimicking the behavior of the original information and at the same time minimizing the information conveyed to the FC about the sequence of states. In this scenario, we derive a nearly-optimal fusion scheme based on message passing (MP) and factor graphs. Experimental results show that, although the proposed detector is able to mitigate the effect of Byzantines, the coordination of the efforts is very harmful and significantly impairs the detection performance.
Journal of Parallel and Distributed Computing, 2006
A Boolean value of given a priori probability distribution is transmitted to a deciding agent by several processes. Each process fails independently with given probability, and faulty processes behave in a Byzantine way. A deciding agent has to make a decision concerning the transmitted value on the basis of messages obtained by processes. We construct a deterministic decision strategy which has the provably highest probability of correctness. It computes the decision in time linear in the number of processes. Decision optimality may be alternatively approached from a local, rather than global, point of view. Instead of maximizing the total probability of correctness of a decision strategy, we may try to find, for every set of values conveyed by processes, the conditionally most probable original value that could yield this set. We call such a strategy locally optimal, as it locally optimizes the probability of a decision, given a set of relayed values, disregarding the impact of such a choice on the overall probability of correctness. We construct a locally optimal decision strategy which again computes the decision value in time linear in the number of processes. We establish the surprising fact that, in general, local probability maximization may lead to a decision strategy which does not have the highest probability of correctness. However, if the probability distribution of the Boolean value to be conveyed is uniform, and all processes have the same failure probability smaller than 1 2 , this anomaly does not occur. We first design and analyze our strategies in the synchronous setting and then show how they should be modified to work in asynchronous systems.
Information Fusion in Distributed Sensor Networks with Byzantines
Distributed sensor networks consist of a set of spatially distributed sensors that operate as data collectors or decision makers to monitor a shared phenomenon. This is a common case in many real world situations like air-traffic control, economic and finance, medical diagnosis, electric power networks, wireless sensor networks, cognitive radio networks, online reputation systems, and many others. Usually, in centralized networks, if there are no power, channel, communication or privacy constraints, the sensors can send the full raw information they collect to a FC. However, real life situations are different and several constraints must be considered e.g. when sensors are spatially distributed over a large territorial area, when the channel bandwidth is limited, or even when the sensors are supplied with short life power sources. To address these limitations, sensors must perform some local processing before sending a compressed version of the collected information to the FC. The abstraction level of the information summary can vary a lot. For instance, it can be a quantized set of the raw information, a soft summary statistic like an average or a likelihood value, or even a single information bit. By means of a fusion rule, the FC integrates the information received from the sensors to make a global decision regarding the system or phenomena under observation. The definition of the fusion rule depends on the a-priori information available about the sensors, the transmission channel and the phenomena as well as the type of information provided by the sensors. Fusion rules can be as simple as voting rules or sophisticated statistical rules. Since the behavior of the sensors in the networks could be different due to noise or intentional acts, the interplay between the sensors or between them and the FC could be modeled using Game Theory, which is a mathematical field that studies the situations of competition and/or cooperation, between decision makers or agents. This chapter is divided into two parts. In the first part, we briefly introduce some basic notions of detection theory and outline some detection techniques used locally
IEEE Transactions on Information Forensics and Security, 2015
In this paper, the problem of distributed detection in tree networks in the presence of Byzantines is considered. Closed form expressions for optimal attacking strategies that minimize the miss detection error exponent at the fusion center (FC) are obtained. We also look at the problem from the network designer's (FC's) perspective. We study the problem of designing optimal distributed detection parameters in a tree network in the presence of Byzantines. Next, we model the strategic interaction between the FC and the attacker as a Leader-Follower (Stackelberg) game. This formulation provides a methodology for predicting attacker and defender (FC) equilibrium strategies, which can be used to implement the optimal detector. Finally, a reputation based scheme to identify Byzantines is proposed and its performance is analytically evaluated. We also provide some numerical examples to gain insights into the solution.
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.