The Internet of Things: Secure Distributed Inference

The growth in the number of devices connected to the Internet of Things (IoT) poses major challenges in security. The integrity and trustworthiness of data and data analytics are increasingly important concerns in IoT applications. These are compounded by the highly distributed nature of IoT devices, making it infeasible to prevent attacks and intrusions on all data sources. Adversaries may hijack devices and compromise their data. As a result, reactive countermeasures, such as intrusion detection and resilient analytics, become vital components of security. This article overviews algorithms for secure distributed inference in IoT.

[1]  Pramod K. Varshney,et al.  Data Falsification Attacks on Consensus-Based Detection Systems , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[2]  Song Tan,et al.  Survey of Security Advances in Smart Grid: A Data Driven Approach , 2017, IEEE Communications Surveys & Tutorials.

[3]  Shreyas Sundaram,et al.  Consensus-based distributed optimization with malicious nodes , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[4]  Antonio Bicchi,et al.  Consensus Computation in Unreliable Networks: A System Theoretic Approach , 2010, IEEE Transactions on Automatic Control.

[5]  Soummya Kar,et al.  Consensus + innovations distributed inference over networks: cooperation and sensing in networked systems , 2013, IEEE Signal Processing Magazine.

[6]  Tao Zhang,et al.  Fog and IoT: An Overview of Research Opportunities , 2016, IEEE Internet of Things Journal.

[7]  Hossam S. Hassanein,et al.  Towards a Practical Crowdsensing System for Road Surface Conditions Monitoring , 2018, IEEE Internet of Things Journal.

[8]  Ivana Tomić,et al.  A Survey of Potential Security Issues in Existing Wireless Sensor Network Protocols , 2017, IEEE Internet of Things Journal.

[9]  Paulo Tabuada,et al.  Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks , 2012, IEEE Transactions on Automatic Control.

[10]  Xuemin Shen,et al.  Connected Vehicles: Solutions and Challenges , 2014, IEEE Internet of Things Journal.

[11]  Fan Ye,et al.  Mobile crowdsensing: current state and future challenges , 2011, IEEE Communications Magazine.

[12]  Pramod K. Varshney,et al.  A unified approach to the design of decentralized detection systems , 1995 .

[13]  Soummya Kar,et al.  Resilient Distributed Estimation: Sensor Attacks , 2017, IEEE Transactions on Automatic Control.

[14]  Soummya Kar,et al.  Resilient Distributed Estimation Through Adversary Detection , 2017, IEEE Transactions on Signal Processing.

[15]  Stephen P. Boyd,et al.  Fast linear iterations for distributed averaging , 2003, 42nd IEEE International Conference on Decision and Control (IEEE Cat. No.03CH37475).

[16]  Firas Hassan,et al.  Resilient distributed parameter estimation in heterogeneous time-varying networks , 2014, HiCoNS.

[17]  John N. Tsitsiklis,et al.  Decentralized detection by a large number of sensors , 1988, Math. Control. Signals Syst..

[18]  Peter D. Barnes,et al.  Byzantine-Resilient locally optimum detection using collaborative autonomous networks , 2017, 2017 IEEE 7th International Workshop on Computational Advances in Multi-Sensor Adaptive Processing (CAMSAP).

[19]  Fan Chung,et al.  Spectral Graph Theory , 1996 .

[20]  Soummya Kar,et al.  Dynamic Attack Detection in Cyber-Physical Systems With Side Initial State Information , 2015, IEEE Transactions on Automatic Control.

[21]  Michele Zorzi,et al.  The internet of energy: a web-enabled smart grid system , 2012, IEEE Network.

[22]  Xiaohua Ge,et al.  Distributed Secure Estimation Over Wireless Sensor Networks Against Random Multichannel Jamming Attacks , 2017, IEEE Access.

[23]  Shreyas Sundaram,et al.  Distributed Function Calculation via Linear Iterative Strategies in the Presence of Malicious Agents , 2011, IEEE Transactions on Automatic Control.

[24]  J. Tsitsiklis Decentralized Detection' , 1993 .

[25]  Ling Shi,et al.  Jamming Attacks on Remote State Estimation in Cyber-Physical Systems: A Game-Theoretic Approach , 2015, IEEE Transactions on Automatic Control.

[26]  Rodrigo Roman,et al.  On the features and challenges of security and privacy in distributed internet of things , 2013, Comput. Networks.

[27]  José M. F. Moura,et al.  Detection in Sensor Networks: The Saddlepoint Approximation , 2007, IEEE Transactions on Signal Processing.

[28]  Hokeun Kim,et al.  Authentication and Authorization for the Internet of Things , 2017, IT Professional.

[29]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[30]  John N. Tsitsiklis,et al.  Distributed Asynchronous Deterministic and Stochastic Gradient Optimization Algorithms , 1984, 1984 American Control Conference.

[31]  Jaganathan Venkatesh,et al.  Modular and Personalized Smart Health Application Design in a Smart City Environment , 2018, IEEE Internet of Things Journal.

[32]  Ali H. Sayed,et al.  Diffusion strategies for adaptation and learning over networks: an examination of distributed strategies and network behavior , 2013, IEEE Signal Processing Magazine.

[33]  Waheed Uz Zaman Bajwa,et al.  ByRDiE: Byzantine-Resilient Distributed Coordinate Descent for Decentralized Learning , 2017, IEEE Transactions on Signal and Information Processing over Networks.

[34]  Yunghsiang Sam Han,et al.  Distributed Bayesian Detection in the Presence of Byzantine Data , 2013, IEEE Transactions on Signal Processing.

[35]  Nitin H. Vaidya,et al.  Fault-Tolerant Multi-Agent Optimization: Optimal Iterative Distributed Algorithms , 2016, PODC.

[36]  Biao Chen,et al.  Quantized Consensus by the ADMM: Probabilistic Versus Deterministic Quantizers , 2015, IEEE Transactions on Signal Processing.

[37]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[38]  Waheed Uz Zaman Bajwa,et al.  RD-SVM: A resilient distributed support vector machine , 2016, 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP).

[39]  Tze Meng Low,et al.  High-Assurance SPIRAL: End-to-End Guarantees for Robot and Car Control , 2017, IEEE Control Systems.

[40]  Shreyas Sundaram,et al.  Resilient Asymptotic Consensus in Robust Networks , 2013, IEEE Journal on Selected Areas in Communications.

[41]  Marco Stolpe,et al.  The Internet of Things: Opportunities and Challenges for Distributed Data Analysis , 2016, SIGKDD Explor..

[42]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[43]  Rick S. Blum,et al.  Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.

[44]  Zhu Han,et al.  Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.