Asymptotically Optimum Distributed Estimation in the Presence of Attacks

Distributed estimation of a deterministic mean-shift parameter in additive zero-mean noise is studied when using quantized data in the presence of Byzantine attacks. Several subsets of sensors are assumed to be tampered with by adversaries using different attacks such that the compromised sensors transmit fictitious data. First, we consider the task of identifying and categorizing the attacked sensors into different groups according to distinct types of attacks. It is shown that increasing the number K of time samples at each sensor and enlarging the size N of the sensor network can both ameliorate the identification and categorization, but to different extents. As K→∞, the attacked sensors can be perfectly identified and categorized, while with finite but sufficiently large K, as N→∞, it can be shown that the fusion center can also ascertain the number of attacks and obtain an approximate categorization with a sufficiently small percentage of sensors that are misclassified. Next, in order to improve the estimation performance by utilizing the attacked observations, we consider joint estimation of the statistical description of the attacks and the parameter to be estimated after the sensors have been well categorized. When using the same quantization approach successfully employed without attacks, it can be shown that the corresponding Fisher Information Matrix (FIM) is singular. To overcome this, a time-variant quantization approach is proposed, which will provide a nonsingular FIM, provided that K ≥ 2. Furthermore, the FIM is employed to provide necessary and sufficient conditions under which utilizing the compromised sensors in the proposed fashion will lead to better estimation performance when compared to approaches where the compromised sensors are ignored.

[1]  Jun Fang,et al.  Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks , 2009, IEEE Transactions on Information Theory.

[2]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.

[3]  Peng Ning,et al.  A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.

[4]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[5]  Haralabos C. Papadopoulos,et al.  Sequential signal encoding from noisy measurements using quantizers with dynamic bias control , 2001, IEEE Trans. Inf. Theory.

[6]  Zhi-Quan Luo,et al.  Universal decentralized estimation in a bandwidth constrained sensor network , 2005, IEEE Transactions on Information Theory.

[7]  G.B. Giannakis,et al.  Distributed compression-estimation using wireless sensor networks , 2006, IEEE Signal Processing Magazine.

[8]  Reza Soosahabi,et al.  Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.

[9]  P.K. Varshney,et al.  Channel-aware distributed detection in wireless sensor networks , 2006, IEEE Signal Processing Magazine.

[10]  Pramod K. Varshney,et al.  Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.

[11]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[12]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[13]  Pramod K. Varshney,et al.  Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.

[14]  Pramod K. Varshney,et al.  Channel Aware Target Localization With Quantized Data in Wireless Sensor Networks , 2009, IEEE Transactions on Signal Processing.

[15]  Pramod K. Varshney,et al.  Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.

[16]  P.K. Varshney,et al.  Target Location Estimation in Sensor Networks With Quantized Data , 2006, IEEE Transactions on Signal Processing.

[17]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[18]  Amir Dembo,et al.  Large Deviations Techniques and Applications , 1998 .

[19]  Alejandro Ribeiro,et al.  Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case , 2006, IEEE Transactions on Signal Processing.