Distributed Detection in the Presence of Byzantine Attacks

Distributed detection in the presence of cooperative (Byzantine) attack is considered. It is assumed that a fraction of the monitoring sensors are compromised by an adversary, and these compromised (Byzantine) sensors are reprogrammed to transmit fictitious observations aimed at confusing the decisi...

Ausführliche Beschreibung

Gespeichert in:
Bibliographische Detailangaben
Veröffentlicht in:IEEE transactions on signal processing 2009-01, Vol.57 (1), p.16-29
Hauptverfasser: Marano, S., Matta, V., Lang Tong
Format: Artikel
Sprache:eng
Schlagworte:
Online-Zugang:Volltext bestellen
Tags: Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
container_end_page 29
container_issue 1
container_start_page 16
container_title IEEE transactions on signal processing
container_volume 57
creator Marano, S.
Matta, V.
Lang Tong
description Distributed detection in the presence of cooperative (Byzantine) attack is considered. It is assumed that a fraction of the monitoring sensors are compromised by an adversary, and these compromised (Byzantine) sensors are reprogrammed to transmit fictitious observations aimed at confusing the decision maker at the fusion center. For detection under binary hypotheses with quantized sensor observations, the optimal attacking distributions for Byzantine sensors that minimize the detection error exponent are obtained using a ldquowater-fillingrdquo procedure. The smallest error exponent, as a function of the Byzantine sensor population, characterizes the power of attack. Also obtained is the minimum fraction of Byzantine sensors that destroys the consistency of detection at the fusion center. The case when multiple measurements are made at the remote nodes is also considered, and it is shown that the detection performance scales with the number of sensors differently from the number of observations at each sensor.
doi_str_mv 10.1109/TSP.2008.2007335
format Article
fullrecord <record><control><sourceid>proquest_RIE</sourceid><recordid>TN_cdi_proquest_miscellaneous_1671297836</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>4663901</ieee_id><sourcerecordid>1671297836</sourcerecordid><originalsourceid>FETCH-LOGICAL-c492t-2a056f17c4e83c7b26542daf252c0eda2f10666abe3107d03cc946aa8f465c23</originalsourceid><addsrcrecordid>eNp9kL1LA0EQxRdRMEZ7weYQFJuLs993djF-gqBgCrtls5nDjcmd7m6K-Ne7IcHCwmZmYH7vMfMIOaYwoBTqy_Hry4ABVOuiOZc7pEdrQUsQWu3mGSQvZaXf9slBjDMAKkSteuTqxscU_GSZcFrcYEKXfNcWvi3SOxYvASO2DouuKa5X37ZNvsVimJJ1H_GQ7DV2HvFo2_tkfHc7Hj2UT8_3j6PhU-lEzVLJLEjVUO0EVtzpCVNSsKltmGQOcGpZQ0EpZSfIKegpcOdqoaytGqGkY7xPzje2n6H7WmJMZuGjw_ncttgto-GiUrSSMoMX_4JUacpqXXGV0dM_6KxbhjZ_YbIZ5YxRyBBsIBe6GAM25jP4hQ0rQ8GsMzc5c7PO3Gwzz5Kzra-Nzs6bYFvn468uuzLQ-YI-OdlwHhF_10IpXgPlP7sRh_k</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>861132210</pqid></control><display><type>article</type><title>Distributed Detection in the Presence of Byzantine Attacks</title><source>IEEE Electronic Library (IEL)</source><creator>Marano, S. ; Matta, V. ; Lang Tong</creator><creatorcontrib>Marano, S. ; Matta, V. ; Lang Tong</creatorcontrib><description>Distributed detection in the presence of cooperative (Byzantine) attack is considered. It is assumed that a fraction of the monitoring sensors are compromised by an adversary, and these compromised (Byzantine) sensors are reprogrammed to transmit fictitious observations aimed at confusing the decision maker at the fusion center. For detection under binary hypotheses with quantized sensor observations, the optimal attacking distributions for Byzantine sensors that minimize the detection error exponent are obtained using a ldquowater-fillingrdquo procedure. The smallest error exponent, as a function of the Byzantine sensor population, characterizes the power of attack. Also obtained is the minimum fraction of Byzantine sensors that destroys the consistency of detection at the fusion center. The case when multiple measurements are made at the remote nodes is also considered, and it is shown that the detection performance scales with the number of sensors differently from the number of observations at each sensor.</description><identifier>ISSN: 1053-587X</identifier><identifier>EISSN: 1941-0476</identifier><identifier>DOI: 10.1109/TSP.2008.2007335</identifier><identifier>CODEN: ITPRED</identifier><language>eng</language><publisher>New York, NY: IEEE</publisher><subject>Applied sciences ; Batteries ; Byzantine attack ; Consistency ; Costs ; Cryptography ; Data mining ; Decision making ; distributed detection ; Error detection ; Exact sciences and technology ; Exponents ; Information, signal and communications theory ; Jamming ; Miscellaneous ; Monitoring ; network defense ; Optimization ; Sensor fusion ; Sensor phenomena and characterization ; Sensors ; Signal design ; Signal processing ; Telecommunications and information theory ; Wireless sensor networks</subject><ispartof>IEEE transactions on signal processing, 2009-01, Vol.57 (1), p.16-29</ispartof><rights>2009 INIST-CNRS</rights><rights>Copyright The Institute of Electrical and Electronics Engineers, Inc. (IEEE) 2009</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c492t-2a056f17c4e83c7b26542daf252c0eda2f10666abe3107d03cc946aa8f465c23</citedby><cites>FETCH-LOGICAL-c492t-2a056f17c4e83c7b26542daf252c0eda2f10666abe3107d03cc946aa8f465c23</cites></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/4663901$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>314,776,780,792,4010,27900,27901,27902,54733</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/4663901$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc><backlink>$$Uhttp://pascal-francis.inist.fr/vibad/index.php?action=getRecordDetail&amp;idt=21020778$$DView record in Pascal Francis$$Hfree_for_read</backlink></links><search><creatorcontrib>Marano, S.</creatorcontrib><creatorcontrib>Matta, V.</creatorcontrib><creatorcontrib>Lang Tong</creatorcontrib><title>Distributed Detection in the Presence of Byzantine Attacks</title><title>IEEE transactions on signal processing</title><addtitle>TSP</addtitle><description>Distributed detection in the presence of cooperative (Byzantine) attack is considered. It is assumed that a fraction of the monitoring sensors are compromised by an adversary, and these compromised (Byzantine) sensors are reprogrammed to transmit fictitious observations aimed at confusing the decision maker at the fusion center. For detection under binary hypotheses with quantized sensor observations, the optimal attacking distributions for Byzantine sensors that minimize the detection error exponent are obtained using a ldquowater-fillingrdquo procedure. The smallest error exponent, as a function of the Byzantine sensor population, characterizes the power of attack. Also obtained is the minimum fraction of Byzantine sensors that destroys the consistency of detection at the fusion center. The case when multiple measurements are made at the remote nodes is also considered, and it is shown that the detection performance scales with the number of sensors differently from the number of observations at each sensor.</description><subject>Applied sciences</subject><subject>Batteries</subject><subject>Byzantine attack</subject><subject>Consistency</subject><subject>Costs</subject><subject>Cryptography</subject><subject>Data mining</subject><subject>Decision making</subject><subject>distributed detection</subject><subject>Error detection</subject><subject>Exact sciences and technology</subject><subject>Exponents</subject><subject>Information, signal and communications theory</subject><subject>Jamming</subject><subject>Miscellaneous</subject><subject>Monitoring</subject><subject>network defense</subject><subject>Optimization</subject><subject>Sensor fusion</subject><subject>Sensor phenomena and characterization</subject><subject>Sensors</subject><subject>Signal design</subject><subject>Signal processing</subject><subject>Telecommunications and information theory</subject><subject>Wireless sensor networks</subject><issn>1053-587X</issn><issn>1941-0476</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2009</creationdate><recordtype>article</recordtype><sourceid>RIE</sourceid><recordid>eNp9kL1LA0EQxRdRMEZ7weYQFJuLs993djF-gqBgCrtls5nDjcmd7m6K-Ne7IcHCwmZmYH7vMfMIOaYwoBTqy_Hry4ABVOuiOZc7pEdrQUsQWu3mGSQvZaXf9slBjDMAKkSteuTqxscU_GSZcFrcYEKXfNcWvi3SOxYvASO2DouuKa5X37ZNvsVimJJ1H_GQ7DV2HvFo2_tkfHc7Hj2UT8_3j6PhU-lEzVLJLEjVUO0EVtzpCVNSsKltmGQOcGpZQ0EpZSfIKegpcOdqoaytGqGkY7xPzje2n6H7WmJMZuGjw_ncttgto-GiUrSSMoMX_4JUacpqXXGV0dM_6KxbhjZ_YbIZ5YxRyBBsIBe6GAM25jP4hQ0rQ8GsMzc5c7PO3Gwzz5Kzra-Nzs6bYFvn468uuzLQ-YI-OdlwHhF_10IpXgPlP7sRh_k</recordid><startdate>200901</startdate><enddate>200901</enddate><creator>Marano, S.</creator><creator>Matta, V.</creator><creator>Lang Tong</creator><general>IEEE</general><general>Institute of Electrical and Electronics Engineers</general><general>The Institute of Electrical and Electronics Engineers, Inc. (IEEE)</general><scope>97E</scope><scope>RIA</scope><scope>RIE</scope><scope>IQODW</scope><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>7SP</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><scope>F28</scope><scope>FR3</scope></search><sort><creationdate>200901</creationdate><title>Distributed Detection in the Presence of Byzantine Attacks</title><author>Marano, S. ; Matta, V. ; Lang Tong</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c492t-2a056f17c4e83c7b26542daf252c0eda2f10666abe3107d03cc946aa8f465c23</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2009</creationdate><topic>Applied sciences</topic><topic>Batteries</topic><topic>Byzantine attack</topic><topic>Consistency</topic><topic>Costs</topic><topic>Cryptography</topic><topic>Data mining</topic><topic>Decision making</topic><topic>distributed detection</topic><topic>Error detection</topic><topic>Exact sciences and technology</topic><topic>Exponents</topic><topic>Information, signal and communications theory</topic><topic>Jamming</topic><topic>Miscellaneous</topic><topic>Monitoring</topic><topic>network defense</topic><topic>Optimization</topic><topic>Sensor fusion</topic><topic>Sensor phenomena and characterization</topic><topic>Sensors</topic><topic>Signal design</topic><topic>Signal processing</topic><topic>Telecommunications and information theory</topic><topic>Wireless sensor networks</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Marano, S.</creatorcontrib><creatorcontrib>Matta, V.</creatorcontrib><creatorcontrib>Lang Tong</creatorcontrib><collection>IEEE All-Society Periodicals Package (ASPP) 2005-present</collection><collection>IEEE All-Society Periodicals Package (ASPP) 1998-Present</collection><collection>IEEE Electronic Library (IEL)</collection><collection>Pascal-Francis</collection><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Electronics &amp; Communications Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts – Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><collection>ANTE: Abstracts in New Technology &amp; Engineering</collection><collection>Engineering Research Database</collection><jtitle>IEEE transactions on signal processing</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Marano, S.</au><au>Matta, V.</au><au>Lang Tong</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Distributed Detection in the Presence of Byzantine Attacks</atitle><jtitle>IEEE transactions on signal processing</jtitle><stitle>TSP</stitle><date>2009-01</date><risdate>2009</risdate><volume>57</volume><issue>1</issue><spage>16</spage><epage>29</epage><pages>16-29</pages><issn>1053-587X</issn><eissn>1941-0476</eissn><coden>ITPRED</coden><abstract>Distributed detection in the presence of cooperative (Byzantine) attack is considered. It is assumed that a fraction of the monitoring sensors are compromised by an adversary, and these compromised (Byzantine) sensors are reprogrammed to transmit fictitious observations aimed at confusing the decision maker at the fusion center. For detection under binary hypotheses with quantized sensor observations, the optimal attacking distributions for Byzantine sensors that minimize the detection error exponent are obtained using a ldquowater-fillingrdquo procedure. The smallest error exponent, as a function of the Byzantine sensor population, characterizes the power of attack. Also obtained is the minimum fraction of Byzantine sensors that destroys the consistency of detection at the fusion center. The case when multiple measurements are made at the remote nodes is also considered, and it is shown that the detection performance scales with the number of sensors differently from the number of observations at each sensor.</abstract><cop>New York, NY</cop><pub>IEEE</pub><doi>10.1109/TSP.2008.2007335</doi><tpages>14</tpages><oa>free_for_read</oa></addata></record>
fulltext fulltext_linktorsrc
identifier ISSN: 1053-587X
ispartof IEEE transactions on signal processing, 2009-01, Vol.57 (1), p.16-29
issn 1053-587X
1941-0476
language eng
recordid cdi_proquest_miscellaneous_1671297836
source IEEE Electronic Library (IEL)
subjects Applied sciences
Batteries
Byzantine attack
Consistency
Costs
Cryptography
Data mining
Decision making
distributed detection
Error detection
Exact sciences and technology
Exponents
Information, signal and communications theory
Jamming
Miscellaneous
Monitoring
network defense
Optimization
Sensor fusion
Sensor phenomena and characterization
Sensors
Signal design
Signal processing
Telecommunications and information theory
Wireless sensor networks
title Distributed Detection in the Presence of Byzantine Attacks
url https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-02-12T21%3A17%3A39IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_RIE&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Distributed%20Detection%20in%20the%20Presence%20of%20Byzantine%20Attacks&rft.jtitle=IEEE%20transactions%20on%20signal%20processing&rft.au=Marano,%20S.&rft.date=2009-01&rft.volume=57&rft.issue=1&rft.spage=16&rft.epage=29&rft.pages=16-29&rft.issn=1053-587X&rft.eissn=1941-0476&rft.coden=ITPRED&rft_id=info:doi/10.1109/TSP.2008.2007335&rft_dat=%3Cproquest_RIE%3E1671297836%3C/proquest_RIE%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=861132210&rft_id=info:pmid/&rft_ieee_id=4663901&rfr_iscdi=true