Attack Detection in Sensor Network Target Localization Systems With Quantized Data

We consider a sensor network focused on target localization, where sensors measure the signal strength emitted from the target. Each measurement is quantized to one bit and sent to the fusion center. A general attack is considered at some sensors that attempts to cause the fusion center to produce an inaccurate estimation of the target location. The attack is a combination of man-in-the-middle, hacking, and spoofing attacks that can effectively change both signals going into and coming out of the sensor nodes in a realistic manner. We show that the essential effect of attacks is to alter the naive estimate of the distance between the target and each attacked sensor, which ignores the existence of attacks, to a different extent, giving rise to a geometric inconsistency among the attacked and unattacked sensors. With the help of two secure sensors, a class of detectors are proposed to detect the attacked sensors by scrutinizing the existence of the geometric inconsistency. We show that the false alarm and miss probabilities of the proposed detectors decrease exponentially as the number of measurement samples increases, which implies that with sufficient measurement samples, the proposed detectors can identify the attacked and unattacked sensors with any required accuracy. Numerical results show that compared to the cases where all sensors are employed without detecting attacks or only the secure sensors are employed, the localization performance can be significantly improved if we employ the secure sensors and the sensors which are declared as unattacked by the proposed detector.

[1]  Moe Z. Win,et al.  Fundamental Limits of Wideband Localization— Part I: A General Framework , 2010, IEEE Transactions on Information Theory.

[2]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[3]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[4]  Robert H. Deng,et al.  Secure localization with attack detection in wireless sensor networks , 2011, International Journal of Information Security.

[5]  Azzedine Boukerche,et al.  Secure localization algorithms for wireless sensor networks , 2008, IEEE Communications Magazine.

[6]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[7]  Rick S. Blum,et al.  Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.

[8]  P.K. Varshney,et al.  Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.

[9]  Srdjan Capkun,et al.  Secure positioning in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[10]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[11]  Rick S. Blum,et al.  Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.

[12]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[13]  Péter Molnár,et al.  Maximum likelihood methods for bearings-only target localization , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[14]  R. Michael Buehrer,et al.  Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.

[15]  Rick S. Blum,et al.  Distributed joint spoofing attack identification and estimation in sensor networks , 2015, 2015 IEEE China Summit and International Conference on Signal and Information Processing (ChinaSIP).

[16]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[17]  Pramod K. Varshney,et al.  Target Localization in Wireless Sensor Networks Using Error Correcting Codes , 2013, IEEE Trans. Inf. Theory.

[18]  Pramod K. Varshney,et al.  Channel Aware Target Localization With Quantized Data in Wireless Sensor Networks , 2009, IEEE Transactions on Signal Processing.

[19]  Mark L. Fowler,et al.  Strategies for information injection for networks estimating emitter location , 2015, IEEE Transactions on Aerospace and Electronic Systems.