Distributed estimation in the presence of attacks for large scale sensor networks

Distributed estimation using quantized data in the presence of Byzantine attacks is considered. Several subsets of sensors are assumed to be tampered with by different adversaries. Under the control of adversaries, the compromised sensors transmit fictitious data to the fusion center (FC) in order to undermine the estimation performance of the sensor network. First, we show that it is possible to asymptotically identify the attacked sensors and categorize them into different groups corresponding to different attacks, provided it is known that the set of unattacked sensors is larger than any set of attacked sensors taken over by one attack. Next, we consider joint estimation of the statistical description of the attacks and the parameter to be estimated. It can be shown that the corresponding Fisher Information Matrix (FIM) is singular. To overcome this, a modified quantization approach is proposed, which will provide a nonsingular FIM. Thus, the statistical properties of the attacks and the parameter to be estimated can be accurately estimated with sufficient data, provided that the number of time samples at each sensor is not less than 2. Furthermore, the FIM is employed to provide necessary and sufficient conditions under which utilizing the compromised sensors in the proposed fashion will lead better estimation performance when compared to approaches where the compromised sensors are ignored. Finally, numerical results imply that for some cases, significant estimation performance gain can be achieved by taking advantage of compromised sensors.

[1]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.

[2]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[3]  P.K. Varshney,et al.  Channel-aware distributed detection in wireless sensor networks , 2006, IEEE Signal Processing Magazine.

[4]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[5]  Peng Ning,et al.  A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.

[6]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[7]  Pramod K. Varshney,et al.  Channel Aware Target Localization With Quantized Data in Wireless Sensor Networks , 2009, IEEE Transactions on Signal Processing.

[8]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[9]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2011, IEEE Trans. Signal Process..

[10]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[11]  Pramod K. Varshney,et al.  Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.