Attacks on Sensor Network Parameter Estimation with Quantization: Performance and Asymptotically Optimum Processing
Byzantine attacks on sensor systems estimating the value of an unknown deterministic parameter based on quantized observations are studied. Initially, asymptotically optimum processing is investigated for the family of attacks that would pass bad data detectors at the sensors. Bad data detectors check that the sensor data fits the models employed by the estimation approach when it assumes no attack is present. It is then shown that it is possible to identify the attacked sensors, under stated assumptions, with perfect accuracy as the number of observations K from each sensor tends to infinity. If the number of sensors tends to infinity while having a finite K, it is shown that the attacked sensors can be identified with a given accuracy that can be set by K, allowing considerable design flexibility. Next, the performance of any estimation approach employed by the sensor system under any general attack is described for cases where any number of observations and sensors are employed. A classification for these general attacks which categorizes them according to the information available to the attacking entity is introduced. Solving optimization problems over these attack classes leads to expressions which describe the performance of any specific estimation algorithm under the most devastating attacks with full information and the generally less effective information free attacks. Constraints are considered to account for some attack detection performed by the sensor system.
B. Alnajjab et al., "Attacks on Sensor Network Parameter Estimation with Quantization: Performance and Asymptotically Optimum Processing," IEEE Transactions on Signal Processing, vol. 63, no. 24, pp. 6659 - 6672, Institute of Electrical and Electronics Engineers (IEEE), Dec 2015.
The definitive version is available at https://doi.org/10.1109/TSP.2015.2477804
Electrical and Computer Engineering
Keywords and Phrases
Byazntine Attacks; Fisher Information; Sensor Networks; Spoofing Attacks
International Standard Serial Number (ISSN)
Article - Journal
© 2015 Institute of Electrical and Electronics Engineers (IEEE), All rights reserved.
01 Dec 2015