DocumentCode
52920
Title
Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks
Author
Nadendla, V. Sriram Siddhardh ; Han, Yunghsiang S. ; Varshney, Pramod K.
Author_Institution
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
Volume
62
Issue
10
fYear
2014
fDate
15-May-14
Firstpage
2681
Lastpage
2695
Abstract
The problem of distributed inference with M-ary quantized data at the sensors is investigated in the presence of Byzantine attacks. We assume that the Byzantine nodes attack the inference network by modifying the symbol corresponding to the quantized data to one of the other symbols in the quantization alphabet-set and transmitting falsified symbol to the fusion center (FC). In this paper, we find the optimal Byzantine attack that blinds any distributed inference network. As the quantization alphabet size increases, a tremendous improvement in the security performance of the distributed inference network is observed. In addition to the perfect channel case, in Appendix A , we also analyze the optimal Byzantine attack when the channel between the nodes and the FC is noisy and is modelled as a discrete M-ary channel. We also investigate the optimal attack within the restricted space of highly-symmetric attack strategies, that maximally degrades the performance of the inference network in the presence of resource-constrained Byzantine attacks. A reputation-based scheme for identifying malicious nodes is also presented as the network´s strategy to mitigate the impact of Byzantine threats on the inference performance of the distributed sensor network. We also provide asymptotic analysis to find the optimal reputation-based scheme as a function of the fraction of compromised nodes in the network.
Keywords
distributed sensors; quantisation (signal); sensor fusion; telecommunication security; Byzantine node attack; FC; M-ary quantized data; asymptotic analysis; discrete M-ary channel; distributed inference network; distributed sensor network; falsified symbol transmission; fusion center; malicious nodes; optimal Byzantine attack; optimal reputation-based scheme; quantization alphabet-set; resource-constrained Byzantine attacks; symmetric attack strategy; Equations; Estimation; Quantization (signal); Security; Sensor fusion; Sensor phenomena and characterization; Byzantine attacks; Distributed inference; fisher information; kullback-leibler divergence; network-security; sensor networks;
fLanguage
English
Journal_Title
Signal Processing, IEEE Transactions on
Publisher
ieee
ISSN
1053-587X
Type
jour
DOI
10.1109/TSP.2014.2314072
Filename
6778791
Link To Document