Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation

We address the problem of centralized detection of a binary event in the presence of falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidth constrained under-attack spatially uncorrelated distributed wireless sensor network. The SNs send their quantized test statistics over orthogonal channels to the fusion center (FC), which linearly combines them to reach a final decision. First (considering that the FC and the attacker do not act strategically), we derive: the FC optimal weight combining; the optimal SN to FC transmit power; and the test statistic quantization bits that maximize the probability of detection (Pd). We also derive an expression for the attacker strategy that causes the maximum possible FC degradation. But in these expressions, both the optimum FC strategy and the attacker strategy require a-priori knowledge that cannot be obtained in practice. The performance analysis of sub-optimum FC strategies is then characterized, and based on the (compromised) SNs willingness to collaborate, we also derive analytically the sub-optimum attacker strategies. Then, considering that the FC and the attacker now act strategically, we recast the problem as a minimax game between the FC and the attacker and prove that the Nash equilibrium (NE) exists. Finally, we find this NE numerically in the simulation results and this gives insight into the detection performance of the proposed strategies.

[1]  Laurence T. Yang,et al.  Optimal data fusion of collaborative spectrum sensing under attack in cognitive radio networks , 2014, IEEE Network.

[2]  Shuguang Cui,et al.  Optimal Linear Cooperation for Spectrum Sensing in Cognitive Radio Networks , 2008, IEEE Journal of Selected Topics in Signal Processing.

[3]  H. Urkowitz Energy detection of unknown deterministic signals , 1967 .

[4]  H. Nikaidô On von Neumann’s minimax theorem , 1954 .

[5]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[6]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[7]  Carlos A. Pomalaza-Raez,et al.  Modeling primary user emulation attacks and defenses in cognitive radio networks , 2009, 2009 IEEE 28th International Performance Computing and Communications Conference.

[8]  Pramod K. Varshney,et al.  Distributed Detection and Data Fusion , 1996 .

[9]  Masoumeh Nasiri-Kenari,et al.  Multiple antenna spectrum sensing in cognitive radios , 2010, IEEE Transactions on Wireless Communications.

[10]  Sergio Barbarossa,et al.  Distributed Detection and Estimation in Wireless Sensor Networks , 2013, ArXiv.

[11]  S. Shankar Sastry,et al.  Instrumenting wireless sensor networks for real-time surveillance , 2006, Proceedings 2006 IEEE International Conference on Robotics and Automation, 2006. ICRA 2006..

[12]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[13]  Gregory J. Pottie,et al.  Instrumenting the world with wireless sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[14]  Venugopal V. Veeravalli,et al.  Asymptotic results for decentralized detection in power constrained wireless sensor networks , 2004, IEEE Journal on Selected Areas in Communications.

[15]  Peter C. Mason,et al.  Defense against spectrum sensing data falsification attacks in mobile ad hoc networks with cognitive radios , 2009, MILCOM 2009 - 2009 IEEE Military Communications Conference.

[16]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[17]  Mounir Ghogho,et al.  Quantized fusion rules for energy-based distributed detection in wireless sensor networks , 2014, 2014 Sensor Signal Processing for Defence (SSPD).

[18]  Mounir Ghogho,et al.  Optimal quantization and power allocation for energy-based distributed sensor detection , 2014, 2014 22nd European Signal Processing Conference (EUSIPCO).

[19]  Pramod K. Varshney,et al.  On the performance analysis of data fusion schemes with Byzantines , 2014, 2014 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[20]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[21]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[22]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[23]  H. Vincent Poor,et al.  Optimal Power Allocation for Distributed Detection Over MIMO Channels in Wireless Sensor Networks , 2007, IEEE Transactions on Signal Processing.

[24]  Rick S. Blum,et al.  Distributed detection with multiple sensors I. Advanced topics , 1997, Proc. IEEE.

[25]  Alejandro Ribeiro,et al.  Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case , 2006, IEEE Transactions on Signal Processing.

[26]  Mounir Ghogho,et al.  Distributed Two-Step Quantized Fusion Rules Via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks , 2016, IEEE Transactions on Signal and Information Processing over Networks.

[27]  Majid Khabbazian,et al.  Secure Cooperative Sensing Techniques for Cognitive Radio Systems , 2008, 2008 IEEE International Conference on Communications.

[28]  Zhu Han,et al.  Byzantine Attack and Defense in Cognitive Radio Networks: A Survey , 2015, IEEE Communications Surveys & Tutorials.

[29]  Yuping Zhao,et al.  A New Cooperative Detection Technique with Malicious User Suppression , 2009, 2009 IEEE International Conference on Communications.

[30]  Qihui Wu,et al.  Performance analysis of probabilistic soft SSDF attack in cooperative spectrum sensing , 2014, EURASIP J. Adv. Signal Process..

[31]  J. Tsitsiklis Decentralized Detection' , 1993 .

[32]  Yunghsiang Sam Han,et al.  Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.

[33]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.