Distributed Detection in the Presence of Byzantine Attacks

Distributed detection in the presence of cooperative (Byzantine) attack is considered. It is assumed that a fraction of the monitoring sensors are compromised by an adversary, and these compromised (Byzantine) sensors are reprogrammed to transmit fictitious observations aimed at confusing the decision maker at the fusion center. For detection under binary hypotheses with quantized sensor observations, the optimal attacking distributions for Byzantine sensors that minimize the detection error exponent are obtained using a ldquowater-fillingrdquo procedure. The smallest error exponent, as a function of the Byzantine sensor population, characterizes the power of attack. Also obtained is the minimum fraction of Byzantine sensors that destroys the consistency of detection at the fusion center. The case when multiple measurements are made at the remote nodes is also considered, and it is shown that the detection performance scales with the number of sensors differently from the number of observations at each sensor.

[1]  S.A. Kassam,et al.  Robust techniques for signal processing: A survey , 1985, Proceedings of the IEEE.

[2]  Pramod K. Varshney,et al.  Distributed Detection and Data Fusion , 1996 .

[3]  Rick S. Blum,et al.  The good, bad and ugly: distributed detection of a known signal in dependent Gaussian noise , 2000, IEEE Trans. Signal Process..

[4]  Peter J. Huber,et al.  Robust Statistics , 2005, Wiley Series in Probability and Statistics.

[5]  Zhi-Quan Luo,et al.  Distributed signal processing in sensor networks , 2006 .

[6]  Pramod K. Varshney,et al.  Distributed detection with multiple sensors I. Fundamentals , 1997, Proc. IEEE.

[7]  Rick S. Blum,et al.  Distributed detection with multiple sensors I. Advanced topics , 1997, Proc. IEEE.

[8]  J. Tsitsiklis Decentralized Detection' , 1993 .

[9]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.

[10]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[11]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[12]  Birgit Pfitzmann,et al.  Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .

[13]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[14]  P. J. Huber A Robust Version of the Probability Ratio Test , 1965 .

[15]  M. Vetterli Distributed signal processing for sensor networks , 2005, IEEE 6th Workshop on Signal Processing Advances in Wireless Communications, 2005..

[16]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2004, IEEE INFOCOM 2004.

[17]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.

[18]  Zhi-Quan Luo,et al.  Distributed signal processing in sensor networks [from the guest Editors] , 2006, IEEE Signal Processing Magazine.

[19]  Parameswaran Ramanathan,et al.  Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.

[20]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[21]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[22]  B. Ripley,et al.  Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.

[23]  Lang Tong,et al.  Distributed Source Coding in the Presence of Byzantine Sensors , 2007, IEEE Transactions on Information Theory.

[24]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.