Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing

被引:19
作者
Alnajjab, Basel [1 ]
Zhang, Jiangfan [1 ]
Blum, Rick S. [1 ]
机构
[1] Lehigh Univ, Dept Elect & Comp Engn, Bethlehem, PA 18015 USA
关键词
Byazntine attacks; Fisher information; sensor networks; spoofing attacks; DISTRIBUTED ESTIMATION;
D O I
10.1109/TSP.2015.2477804
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
080906 [电磁信息功能材料与结构]; 082806 [农业信息与电气工程];
摘要
Byzantine attacks on sensor systems estimating the value of an unknown deterministic parameter based on quantized observations are studied. Initially, asymptotically optimum processing is investigated for the family of attacks that would pass bad data detectors at the sensors. Bad data detectors check that the sensor data fits the models employed by the estimation approach when it assumes no attack is present. It is then shown that it is possible to identify the attacked sensors, under stated assumptions, with perfect accuracy as the number of observations from each sensor tends to infinity. If the number of sensors tends to infinity while having a finite, it is shown that the attacked sensors can be identified with a given accuracy that can be set by, allowing considerable design flexibility. Next, the performance of any estimation approach employed by the sensor system under any general attack is described for cases where any number of observations and sensors are employed. A classification for these general attacks which categorizes them according to the information available to the attacking entity is introduced. Solving optimization problems over these attack classes leads to expressions which describe the performance of any specific estimation algorithm under the most devastating attacks with full information and the generally less effective information free attacks. Constraints are considered to account for some attack detection performed by the sensor system.
引用
收藏
页码:6659 / 6672
页数:14
相关论文
共 28 条
[1]
Agrawal K, 2011, CONF REC ASILOMAR C, P1669, DOI 10.1109/ACSSC.2011.6190303
[2]
A survey on sensor networks [J].
Akyildiz, IF ;
Su, WL ;
Sankarasubramaniam, Y ;
Cayirci, E .
IEEE COMMUNICATIONS MAGAZINE, 2002, 40 (08) :102-114
[3]
[Anonymous], 2004, CONVEX OPTIMIZATION
[4]
[Anonymous], 2000, Large Deviations (Fields Institute Monographs vol 14)
[5]
Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[6]
Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
[7]
Dembo A., 2009, LARGE DEVIATIONS TEC, V38
[8]
Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks [J].
Fang, Jun ;
Li, Hongbin .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2009, 55 (12) :5682-5699
[9]
DISTRIBUTED ESTIMATION AND QUANTIZATION [J].
GUBNER, JA .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1993, 39 (04) :1456-1459
[10]
Kailkhura B, 2013, INT CONF ACOUST SPEE, P2925, DOI 10.1109/ICASSP.2013.6638193