Variable-Rate Distributed Source Coding in the Presence of Byzantine Sensors

The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown number of sensors have been reprogrammed by a malicious intruder to undermine the reconstruction at the fusion center. Three different forms of the problem are considered. The first is a variable-rate setup, in which the decoder adaptively chooses the rates at which the sensors transmit. An explicit characterization of the variable-rate minimum achievable sum rate is stated, given by the maximum entropy over the set of distributions indistinguishable from the true source distribution by the decoder. In addition, two forms of the fixed-rate problem are considered, one with deterministic coding and one with randomized coding. The achievable rate regions are given for both these problems, with a larger region achievable using randomized coding, though both are suboptimal compared to variable-rate coding.

[1]  Lang Tong,et al.  Distributed Inference in the Presence of Byzantine Sensors , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.

[2]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.

[3]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[4]  Jack K. Wolf,et al.  Noiseless coding of correlated information sources , 1973, IEEE Trans. Inf. Theory.

[5]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[6]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.

[7]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[8]  Lang Tong,et al.  Capacity of Cooperative Fusion in the Presence of Byzantine Sensors , 2006, ArXiv.

[9]  Toby Berger,et al.  The CEO problem [multiterminal source coding] , 1996, IEEE Trans. Inf. Theory.

[10]  Giuseppe Longo,et al.  The information theory approach to communications , 1977 .

[11]  Tracey Ho,et al.  Correction of adversarial errors in networks , 2005, Proceedings. International Symposium on Information Theory, 2005. ISIT 2005..

[12]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[13]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[14]  Helmut Kurth,et al.  Certifying open source - the Linux experience , 2004, IEEE Security & Privacy Magazine.