Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks

The Internet of Things (IoT) improves pervasive sensing and control capabilities via the aid of modern digital communication, signal processing, and massive deployment of sensors but presents severe security challenges. Attackers can modify the data entering or communicated from the IoT sensors, which can have a serious impact on any algorithm using these data for inference. This article describes how to provide tight bounds (with sufficient data) on the performance of the best unbiased algorithms estimating a parameter from the attacked data and communications under any assumed statistical model describing how the sensor data depends on the parameter before attack. The results hold regardless of the unbiased estimation algorithm adopted, which could employ deep learning, machine learning, statistical signal processing, or any other approach. Example algorithms that achieve performance close to these bounds are illustrated. Attacks that make the attacked data useless for reducing these bounds are also described. These attacks provide a guaranteed attack performance in terms of the bounds regardless of the algorithms the unbiased estimation system employs. References are supplied that provide various extensions to all of the specific results presented in this article and a brief discussion of low-complexity encryption and physical layer security is provided.

[1]  Yunghsiang Sam Han,et al.  Distributed Detection in Tree Topologies With Byzantines , 2013, IEEE Transactions on Signal Processing.

[2]  Matthieu R. Bloch,et al.  Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.

[3]  Peng Ning,et al.  A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.

[4]  Merril I. Skolnik,et al.  Introduction to radar systems /2nd edition/ , 1980 .

[5]  Matthieu R. Bloch,et al.  Physical-Layer Security: From Information Theory to Security Engineering , 2011 .

[6]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[7]  Rick S. Blum,et al.  Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.

[8]  Rick S. Blum,et al.  Asymptotic analysis of a new low complexity encryption approach for the Internet of Things, smart cities and smart grid , 2017, 2017 IEEE International Conference on Smart Grid and Smart Cities (ICSGSC).

[9]  Mohsen Guizani,et al.  Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring , 2017, IEEE Wireless Communications.

[10]  Wade Trappe,et al.  Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..

[11]  Rick S. Blum,et al.  GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).

[12]  H. Vincent Poor,et al.  Authenticating Users Through Fine-Grained Channel Information , 2018, IEEE Transactions on Mobile Computing.

[13]  Rick S. Blum,et al.  On the estimation and secrecy capabilities of stochastic encryption for parameter estimation in IoT , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).

[14]  S. J. Roome,et al.  Digital radio frequency memory , 1990 .

[15]  Rick S. Blum,et al.  A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation With Quantized Data , 2016, IEEE Transactions on Information Theory.

[16]  Rick S. Blum,et al.  Attack Detection in Sensor Network Target Localization Systems With Quantized Data , 2017, IEEE Transactions on Signal Processing.

[17]  Venugopal V. Veeravalli,et al.  MMSE estimation in a sensor network in the presence of an adversary , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).

[18]  Amitav Mukherjee,et al.  Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.

[19]  Xiaodong Wang,et al.  Asymptotically Optimal Stochastic Encryption for Quantized Sequential Detection in the Presence of Eavesdroppers , 2017, IEEE Transactions on Information Theory.

[20]  Imre Csiszár,et al.  Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.

[21]  R. Michael Buehrer,et al.  Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.

[22]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[23]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[24]  Yue Zhao,et al.  Minimum Sparsity of Unobservable Power Network Attacks , 2016, IEEE Transactions on Automatic Control.

[25]  Pramod K. Varshney,et al.  Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.

[26]  H. Vincent Poor,et al.  Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.

[27]  Dong-Yang Liu Attack-resistant location estimation in wireless sensor networks , 2013 .

[28]  Lang Tong,et al.  Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.

[29]  Rick S. Blum,et al.  Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.

[30]  Prasant Mohapatra,et al.  Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.

[31]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.

[32]  Gustavus J. Simmons,et al.  Authentication Theory/Coding Theory , 1985, CRYPTO.

[33]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[34]  Pramod K. Varshney,et al.  Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[35]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[36]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[37]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[38]  Yunghsiang Sam Han,et al.  Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.

[39]  Rick S. Blum,et al.  Cybersecurity and Power Electronics: Addressing the Security Vulnerabilities of the Internet of Things , 2017, IEEE Power Electronics Magazine.

[40]  H. Vincent Poor,et al.  Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.

[41]  Rick S. Blum,et al.  Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding , 2018, IEEE Transactions on Information Forensics and Security.

[42]  Alexander M. Haimovich,et al.  Noncoherent MIMO Radar for Location and Velocity Estimation: More Antennas Means Better Performance , 2010, IEEE Transactions on Signal Processing.

[43]  H Vincent Poor,et al.  Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.

[44]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.