Distributed event detection under Byzantine attack in wireless sensor networks

We present two novel distributed event detection algorithms based on a statistical approach that tolerate Byzantine attacks where malicious (compromised) sensors send false sensing data to the gateway leading to increased false alarm rate. We study the problem of Byzantine attack function optimization and the decision threshold optimization and consider two practical cases in our algorithms. In the first case, the Channel State Information (CSI) between the event generating source and sensors is unknown while CSI between the sensors and gateway is known. In the second case, the CSI between the source and sensors as well as between sensors and gateway are unknown. We develop an optimal event detection decision rule under Byzantine attacks for the first case and a novel low-complexity event detection algorithm based on Gaussian approximation and Moment Matching for the second case which considers a global decision. We evaluate our algorithms through extensive simulations. Simulation results show the Receiver Operating Characteristics (ROC) curves under different cases and scenarios, and therefore provide useful upper bounds for various centralized and distributed scheme designs. We also show that our algorithms provide superior detection performance when compared to local decision based schemes.

[1]  Yunghsiang Sam Han,et al.  Optimal distributed detection in the presence of Byzantines , 2013, 2013 IEEE International Conference on Acoustics, Speech and Signal Processing.

[2]  D. Dowson,et al.  The Fréchet distance between multivariate normal distributions , 1982 .

[3]  M. Fréchet Sur quelques points du calcul fonctionnel , 1906 .

[4]  Van Trees,et al.  Detection, Estimation, and Modulation Theory. Part 1 - Detection, Estimation, and Linear Modulation Theory. , 1968 .

[5]  H. Vincent Poor,et al.  Optimal Power Allocation for Distributed Detection Over MIMO Channels in Wireless Sensor Networks , 2007, IEEE Transactions on Signal Processing.

[6]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[7]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[8]  Julien Penders,et al.  Energy Harvesting for Autonomous Wireless Sensor Networks , 2010, IEEE Solid-State Circuits Magazine.

[9]  S. Manesis,et al.  A Survey of Applications of Wireless Sensors and Wireless Sensor Networks , 2005, Proceedings of the 2005 IEEE International Symposium on, Mediterrean Conference on Control and Automation Intelligent Control, 2005..

[10]  D. Janakiram,et al.  Outlier Detection in Wireless Sensor Networks using Bayesian Belief Networks , 2006, 2006 1st International Conference on Communication Systems Software & Middleware.

[11]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[12]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[13]  VARUN CHANDOLA,et al.  Anomaly detection: A survey , 2009, CSUR.

[14]  Iain B. Collings,et al.  Distributed Detection in Sensor Networks Over Fading Channels With Multiple Antennas at the Fusion Centre , 2014, IEEE Transactions on Signal Processing.

[15]  Pierluigi Salvo Rossi,et al.  Performance Analysis and Design of Maximum Ratio Combining in Channel-Aware MIMO Decision Fusion , 2013, IEEE Transactions on Wireless Communications.

[16]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[17]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .