DocumentCode :
52920
Title :
Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks
Author :
Nadendla, V. Sriram Siddhardh ; Han, Yunghsiang S. ; Varshney, Pramod K.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
Volume :
62
Issue :
10
fYear :
2014
fDate :
15-May-14
Firstpage :
2681
Lastpage :
2695
Abstract :
The problem of distributed inference with M-ary quantized data at the sensors is investigated in the presence of Byzantine attacks. We assume that the Byzantine nodes attack the inference network by modifying the symbol corresponding to the quantized data to one of the other symbols in the quantization alphabet-set and transmitting falsified symbol to the fusion center (FC). In this paper, we find the optimal Byzantine attack that blinds any distributed inference network. As the quantization alphabet size increases, a tremendous improvement in the security performance of the distributed inference network is observed. In addition to the perfect channel case, in Appendix A , we also analyze the optimal Byzantine attack when the channel between the nodes and the FC is noisy and is modelled as a discrete M-ary channel. We also investigate the optimal attack within the restricted space of highly-symmetric attack strategies, that maximally degrades the performance of the inference network in the presence of resource-constrained Byzantine attacks. A reputation-based scheme for identifying malicious nodes is also presented as the network´s strategy to mitigate the impact of Byzantine threats on the inference performance of the distributed sensor network. We also provide asymptotic analysis to find the optimal reputation-based scheme as a function of the fraction of compromised nodes in the network.
Keywords :
distributed sensors; quantisation (signal); sensor fusion; telecommunication security; Byzantine node attack; FC; M-ary quantized data; asymptotic analysis; discrete M-ary channel; distributed inference network; distributed sensor network; falsified symbol transmission; fusion center; malicious nodes; optimal Byzantine attack; optimal reputation-based scheme; quantization alphabet-set; resource-constrained Byzantine attacks; symmetric attack strategy; Equations; Estimation; Quantization (signal); Security; Sensor fusion; Sensor phenomena and characterization; Byzantine attacks; Distributed inference; fisher information; kullback-leibler divergence; network-security; sensor networks;
fLanguage :
English
Journal_Title :
Signal Processing, IEEE Transactions on
Publisher :
ieee
ISSN :
1053-587X
Type :
jour
DOI :
10.1109/TSP.2014.2314072
Filename :
6778791
Link To Document :
بازگشت