Reduced-rank Least Squares Parameter Estimation in the Presence of Byzantine Sensors

In this paper, we study the impact of the presence of byzantine sensors on the reduced-rank linear least squares (LS) estimator. A sensor network with N sensors makes observations of the physical phenomenon and transmits them to a fusion center which computes the LS estimate of the parameter of interest. It is well-known that rank reduction exploits the bias-variance tradeoff in the full-rank estimator by putting higher priority on highly informative content of the data. The low-rank LS estimator is constructed using this highly informative content, while the remaining data can be discarded without affecting the overall performance of the estimator. We consider the scenario where a fraction 0 < α < 1 of the N sensors are subject to data falsification attack from byzantine sensors, wherein an intruder injects a higher noise power (compared to the unattacked sensors) to the measurements of the attacked sensors.Our main contribution is an analytical characterization of the impact of data falsification attack of the above type on the performance of reduced-rank LS estimator. In particular, we show how optimally prioritizing the highly informative content of the data gets affected in the presence of attacks. A surprising result is that, under sensor attacks, when the elements of the data matrix are all positive the error performance of the low- rank estimator experiences a phenomenon wherein the estimate of the mean-squared error comprises negative components. A complex nonlinear programming-based recipe is known to exist that resolves this undesirable effect; however, the phenomenon is oftentimes considered very objectionable in the statistical literature. On the other hand, to our advantage this effect can serve to detect cyber attacks on sensor systems. Numerical results are presented to complement the theoretical findings of the paper.

[1]  Petre Stoica,et al.  Maximum likelihood parameter and rank estimation in reduced-rank multivariate linear regressions , 1996, IEEE Trans. Signal Process..

[2]  H. Vincent Poor,et al.  Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks , 2018, IEEE Signal Processing Magazine.

[3]  Rick S. Blum,et al.  Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.

[4]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[5]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[6]  Yunghsiang Sam Han,et al.  Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.

[7]  Rick S. Blum,et al.  Network topology risk assessment of stealthy cyber attacks on advanced metering infrastructure networks , 2017, 2017 51st Annual Conference on Information Sciences and Systems (CISS).

[8]  Rick S. Blum,et al.  After-attack performance of parameter estimation systems , 2014, 2014 48th Annual Conference on Information Sciences and Systems (CISS).

[9]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[10]  J. Scott Goldstein,et al.  Reduced-rank adaptive filtering , 1997, IEEE Trans. Signal Process..

[11]  Louis L. Scharf,et al.  The SVD and reduced rank signal processing , 1991, Signal Process..

[12]  Ruixin Niu,et al.  Source Location with Quantized Sensor Data Corrupted by False Information , 2018, 2018 21st International Conference on Information Fusion (FUSION).

[13]  Rick S. Blum,et al.  Distributed estimation in the presence of attacks for large scale sensor networks , 2014, 2014 48th Annual Conference on Information Sciences and Systems (CISS).

[14]  Soummya Kar,et al.  Resilient Distributed Parameter Estimation With Heterogeneous Data , 2018, IEEE Transactions on Signal Processing.

[15]  L. Scharf,et al.  Statistical Signal Processing: Detection, Estimation, and Time Series Analysis , 1991 .

[16]  W. A. Thompson The Problem of Negative Estimates of Variance Components , 1962 .

[17]  Yunghsiang Sam Han,et al.  Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data , 2014, IEEE Signal Processing Letters.

[18]  Soummya Kar,et al.  Resilient Distributed Estimation: Sensor Attacks , 2017, IEEE Transactions on Automatic Control.

[19]  Ying Liu,et al.  Secure Distributed Estimation Over Wireless Sensor Networks Under Attacks , 2018, IEEE Transactions on Aerospace and Electronic Systems.

[20]  Yunghsiang Sam Han,et al.  Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques , 2014, IEEE Transactions on Information Forensics and Security.

[21]  Rick S. Blum,et al.  GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[22]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[23]  Rick S. Blum,et al.  Attack Detection in Sensor Network Target Localization Systems With Quantized Data , 2017, IEEE Transactions on Signal Processing.