Optimal distributed detection in the presence of Byzantines

This paper considers the problem of optimal distributed detection with independent identical sensors in the presence of Byzantine attacks. By considering the attacker to be strategic in nature, we address the issue of designing the optimal fusion rule and the local sensor thresholds that minimize the probability of error at the fusion center (FC).We first consider the problem of finding the optimal fusion rule under the constraint of fixed local sensor thresholds and fixed Byzantine strategy. Next, we consider the problem of joint optimization of the fusion rule and local sensor thresholds for a fixed Byzantine strategy. Then we extend these results to the scenario where both the FC and the Byzantine attacker act in a strategic manner to optimize their own utilities. We model the strategic behavior of the FC and the attacker using game theory and show the existence of Nash Equilibrium. We also provide numerical results to gain insights into the solution.

[1]  Pramod K. Varshney,et al.  Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[2]  Pramod K. Varshney,et al.  Distributed detection with multiple sensors I. Fundamentals , 1997, Proc. IEEE.

[3]  John N. Tsitsiklis,et al.  Decentralized detection by a large number of sensors , 1988, Math. Control. Signals Syst..

[4]  W. Press,et al.  Numerical Recipes: The Art of Scientific Computing , 1987 .

[5]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[6]  Pramod K. Varshney,et al.  Distributed Detection and Data Fusion , 1996 .

[7]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[8]  Tongtong Li,et al.  On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks , 2010, 2010 44th Annual Conference on Information Sciences and Systems (CISS).

[9]  Mort Naraghi-Pour,et al.  Secure detection in wireless sensor networks using a simple encryption method , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[10]  Rick S. Blum,et al.  Distributed detection with multiple sensors I. Advanced topics , 1997, Proc. IEEE.

[11]  Pramod K. Varshney,et al.  Optimal Byzantine attacks on distributed detection in tree-based topologies , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).

[12]  Tongtong Li,et al.  Cooperative sensing in cognitive networks under malicious attack , 2011, 2011 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[13]  Wei Shi,et al.  Optimal binary distributed detection , 1999, Conference Record of the Thirty-Third Asilomar Conference on Signals, Systems, and Computers (Cat. No.CH37020).

[14]  Richard D. Wesel,et al.  Optimal bi-level quantization of i.i.d. sensor observations for binary hypothesis testing , 2002, IEEE Trans. Inf. Theory.