Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks

Estimation of an unknown deterministic vector from quantized sensor data is considered in the presence of spoofing attacks, which alter the data presented to several sensors. Contrary to the previous work, a generalized attack model is employed which manipulates the data using transformations with arbitrary functional forms determined by some attack parameters whose values are unknown to the attacked system. For the first time, necessary and sufficient conditions are provided under which the transformations provide a guaranteed attack performance in terms of Cramer-Rao Bound (CRB) regardless of the processing the estimation system employs, thus defining a highly desirable attack. Interestingly, these conditions imply that, for any such attack when the attacked sensors can be perfectly identified by the estimation system, either the Fisher information matrix (FIM) for jointly estimating the desired and attack parameters is singular or that the attacked system is unable to improve the CRB for the desired vector parameter through this joint estimation even though the joint FIM is nonsingular. It is shown that it is always possible to construct such a highly desirable attack by properly employing a sufficiently large dimension attack vector parameter relative to the number of quantization levels employed, which was not observed previously. To illustrate the theory in a concrete way, we also provide some numerical results which corroborate that under the highly desirable attack, attacked data are not useful in reducing the CRB.

[1]  Rick S. Blum,et al.  Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.

[2]  Donggang Liu,et al.  Attack-resistant location estimation in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[3]  S. Nash,et al.  A Numerical Comparison of Barrier and Modified Barrier Methods for Large-Scale Bound-Constrained Optimization , 1994 .

[4]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[5]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[6]  Jun Fang,et al.  Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks , 2009, IEEE Transactions on Information Theory.

[7]  S. Kay Fundamentals of statistical signal processing: estimation theory , 1993 .

[8]  Haralabos C. Papadopoulos,et al.  Sequential signal encoding from noisy measurements using quantizers with dynamic bias control , 2001, IEEE Trans. Inf. Theory.

[9]  Alexander M. Haimovich,et al.  Noncoherent MIMO Radar for Location and Velocity Estimation: More Antennas Means Better Performance , 2010, IEEE Transactions on Signal Processing.

[10]  G.B. Giannakis,et al.  Distributed compression-estimation using wireless sensor networks , 2006, IEEE Signal Processing Magazine.

[11]  Donggang Liu,et al.  Attack-Resistant Location Estimation in Wireless Sensor Networks , 2008, TSEC.

[12]  New York Dover,et al.  ON THE CONVERGENCE PROPERTIES OF THE EM ALGORITHM , 1983 .

[13]  S. J. Roome,et al.  Digital radio frequency memory , 1990 .

[14]  J. S. Wood,et al.  Theory of acoustic field invariants in layered waveguides , 1993 .

[15]  M. Skolnik,et al.  Introduction to Radar Systems , 2021, Advances in Adaptive Radar Detection and Range Estimation.

[16]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[17]  William S. Hodgkiss,et al.  Mirages in shallow water matched‐field processing , 1995 .

[18]  D. Rubin,et al.  Maximum likelihood from incomplete data via the EM - algorithm plus discussions on the paper , 1977 .

[19]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[20]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[21]  W. Kuperman,et al.  Robust time reversal focusing in the ocean. , 2003, The Journal of the Acoustical Society of America.

[22]  Rick S. Blum,et al.  Distributed joint spoofing attack identification and estimation in sensor networks , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[23]  G. McLachlan,et al.  The EM algorithm and extensions , 1996 .

[24]  Ruixin Niu,et al.  False information detection with minimum mean squared errors for Bayesian estimation , 2015, 2015 49th Annual Conference on Information Sciences and Systems (CISS).

[25]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[26]  Stephen P. Boyd,et al.  Relaxed maximum a posteriori fault identification , 2009, Signal Process..

[27]  P.K. Varshney,et al.  Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.

[28]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[29]  R. Michael Buehrer,et al.  Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.

[30]  Ananthram Swami,et al.  Quantization for Maximin ARE in Distributed Estimation , 2007, IEEE Transactions on Signal Processing.

[31]  S BlumRick,et al.  Noncoherent MIMO radar for location and velocity estimation , 2010 .

[32]  Merril I. Skolnik,et al.  Introduction to radar systems /2nd edition/ , 1980 .

[33]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[34]  Alejandro Ribeiro,et al.  Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case , 2006, IEEE Transactions on Signal Processing.

[35]  Yunghsiang Sam Han,et al.  Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.