Capacity of Cooperative Fusion in the Presence of Byzantine Sensors

The problem of cooperative fusion in the presence of Byzantine sensors is considered. An information theoretic formulation is used to characterize the Shannon capacity of sensor fusion. It is shown that when less than half of the sensors are Byzantine, the effect of Byzantine attack can be entirely mitigated, and the fusion capacity is identical to that when all sensors are honest. But when at least half of the sensors are Byzantine, they can completely defeat the sensor fusion so that no information can be transmitted reliably. A capacity achieving transmit-then-verify strategy is proposed for the case that less than half of the sensors are Byzantine, and its error probability and coding rate is analyzed by using a Markov decision process modeling of the transmission protocol.

[1]  Miroslaw Malek,et al.  The consensus problem in fault-tolerant computing , 1993, CSUR.

[2]  Birgit Pfitzmann,et al.  Information-Theoretic Pseudosignatures and Byzantine Agreement for t ≥ n/3 , 2007 .

[3]  Leslie Lamport,et al.  The Byzantine Generals Problem , 1982, TOPL.

[4]  Danny Dolev,et al.  The Byzantine Generals Strike Again , 1981, J. Algorithms.

[5]  David A. Wagner,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Ad Hoc Networks.

[6]  Zygmunt J. Haas,et al.  Securing ad hoc networks , 1999, IEEE Netw..

[7]  Tracey Ho,et al.  Byzantine modification detection in multicast networks using randomized network coding , 2004, International Symposium onInformation Theory, 2004. ISIT 2004. Proceedings..

[8]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[9]  Radia J. Perlman,et al.  Network layer protocols with Byzantine robustness , 1988 .

[10]  Lang Tong,et al.  Cooperative sensor networks with misinformed nodes , 2005, IEEE Transactions on Information Theory.

[11]  C. Karlof,et al.  Secure routing in wireless sensor networks: attacks and countermeasures , 2003, Proceedings of the First IEEE International Workshop on Sensor Network Protocols and Applications, 2003..

[12]  Yunghsiang Sam Han,et al.  A witness-based approach for data fusion assurance in wireless sensor networks , 2003, GLOBECOM '03. IEEE Global Telecommunications Conference (IEEE Cat. No.03CH37489).

[13]  Lang Tong,et al.  Distributed Inference in the Presence of Byzantine Sensors , 2006, 2006 Fortieth Asilomar Conference on Signals, Systems and Computers.

[14]  Adrian Perrig,et al.  Security and Privacy in Sensor Networks , 2003, Computer.