Distributed Inference in the Presence of Byzantine Sensors

A wireless sensor network designed for distributed detection undergoes a Byzantine attack in which a fraction of sensors cooperatively transmit fictitious signals to impair the detection capability of the fusion center. The optimal attacking distributions are derived and the fundamental tradeoff between detection power (best asymptotic exponent of the miss detection error probability) and the attacking power (fraction of compromised sensors) is characterized. Also considered is a hierarchical network made of m-sensors clusters. For large m the optimal miss detection error exponent is found to be a binary divergence, and the asymptotic performance is shown to scale with the number n of clusters but, remarkably, not with the cluster size m. The optimal test, in this case, reduces to a kind of infected-cluster counting.

[1]  Lang Tong,et al.  Cooperative sensor networks with misinformed nodes , 2005, IEEE Transactions on Information Theory.

[2]  S.A. Kassam,et al.  Robust techniques for signal processing: A survey , 1985, Proceedings of the IEEE.

[3]  Ming Dong,et al.  On distributed fault-tolerant detection in wireless sensor networks , 2006, IEEE Transactions on Computers.

[4]  Lang Tong,et al.  Capacity of Cooperative Fusion in the Presence of Byzantine Sensors , 2006, ArXiv.

[5]  Haiyun Luo,et al.  Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..

[6]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[7]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[8]  P. J. Huber A Robust Version of the Probability Ratio Test , 1965 .

[9]  Parameswaran Ramanathan,et al.  Fault tolerance in collaborative sensor networks for target detection , 2004, IEEE Transactions on Computers.

[10]  Peter J. Huber,et al.  Robust Statistics , 2005, Wiley Series in Probability and Statistics.

[11]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[12]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[13]  Elaine Shi,et al.  Designing secure sensor networks , 2004, IEEE Wireless Communications.