Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing

Byzantine attacks on sensor systems estimating the value of an unknown deterministic parameter based on quantized observations are studied. Initially, asymptotically optimum processing is investigated for the family of attacks that would pass bad data detectors at the sensors. Bad data detectors check that the sensor data fits the models employed by the estimation approach when it assumes no attack is present. It is then shown that it is possible to identify the attacked sensors, under stated assumptions, with perfect accuracy as the number of observations K from each sensor tends to infinity. If the number of sensors tends to infinity while having a finite K, it is shown that the attacked sensors can be identified with a given accuracy that can be set by K, allowing considerable design flexibility. Next, the performance of any estimation approach employed by the sensor system under any general attack is described for cases where any number of observations and sensors are employed. A classification for these general attacks which categorizes them according to the information available to the attacking entity is introduced. Solving optimization problems over these attack classes leads to expressions which describe the performance of any specific estimation algorithm under the most devastating attacks with full information and the generally less effective information free attacks. Constraints are considered to account for some attack detection performed by the sensor system.

[1]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[2]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.

[3]  Amy R. Reibman,et al.  Design of quantizers for decentralized estimation systems , 1993, IEEE Trans. Commun..

[4]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[5]  Kang Yen,et al.  Sensor network security: a survey , 2009, IEEE Communications Surveys & Tutorials.

[6]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[7]  Yunghsiang Sam Han,et al.  Optimal distributed detection in the presence of Byzantines , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[8]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[9]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[10]  Ananthram Swami,et al.  Quantization for Maximin ARE in Distributed Estimation , 2007, IEEE Transactions on Signal Processing.

[11]  Jun Fang,et al.  Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks , 2009, IEEE Transactions on Information Theory.

[12]  Pramod K. Varshney,et al.  Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[13]  Yunghsiang Sam Han,et al.  Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.

[14]  X.R. Li,et al.  Optimal sensor data quantization for best linear unbiased estimation fusion , 2004, 2004 43rd IEEE Conference on Decision and Control (CDC) (IEEE Cat. No.04CH37601).

[15]  S. Marano,et al.  Distributed Detection in the Presence of Byzantine Attack in Large Wireless Sensor Networks , 2006, MILCOM 2006 - 2006 IEEE Military Communications conference.

[16]  Pramod K. Varshney,et al.  Mitigation of Byzantine attacks for target location estimation in wireless sensor networks , 2012, 2012 46th Annual Conference on Information Sciences and Systems (CISS).

[17]  S. Varadhan,et al.  Large deviations , 2019, Graduate Studies in Mathematics.

[18]  Vasileios Megalooikonomou,et al.  Quantizer design for distributed estimation with communication constraints and unknown observation statistics , 2000, IEEE Trans. Commun..

[19]  Pramod K. Varshney,et al.  Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks , 2011, 2011 Conference Record of the Forty Fifth Asilomar Conference on Signals, Systems and Computers (ASILOMAR).

[20]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[21]  Ananthram Swami,et al.  Minimax Quantization for Distributed Maximum Likelihood Estimation , 2006, 2006 IEEE International Conference on Acoustics Speech and Signal Processing Proceedings.

[22]  Srdjan Capkun,et al.  On the requirements for successful GPS spoofing attacks , 2011, CCS '11.

[23]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[24]  Amir Dembo,et al.  Large Deviations Techniques and Applications , 1998 .

[25]  John A. Gubner,et al.  Distributed estimation and quantization , 1993, IEEE Trans. Inf. Theory.

[26]  Alejandro Ribeiro,et al.  Bandwidth-constrained distributed estimation for wireless sensor networks-part II: unknown probability density function , 2006, IEEE Transactions on Signal Processing.

[27]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[28]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.