Secure Estimation Under Causative Attacks

被引:5
作者
Sihag, Saurabh [1 ]
Tajer, Ali [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
Estimation; Inference algorithms; Data models; Sociology; Parameter estimation; security; tradeoffs; WIRELESS SENSOR NETWORKS; CYBER-PHYSICAL SYSTEMS; DISTRIBUTED ESTIMATION; STATE ESTIMATION; LOCALIZATION;
D O I
10.1109/TIT.2020.2985956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of secure parameter estimation when an estimation algorithm is prone to causative attacks. Causative attacks, in general, target decision-making algorithms (e.g., inference or learning algorithm) to alter their decisions in specific scenarios (e.g., distort parameter estimates for specific ranges of the parameter of interest). Such attacks influence the decisions via tampering with the mechanisms through which an algorithm acquires the statistical model of the population about which it aims to form a decision. Such attacks are viable, for instance, by contaminating the historical or training data, or by compromising an expert who provides the statistical model. In the presence of causative attacks, inference algorithms operate under a distorted statistical model for the data samples. This paper introduces a notion of secure parameter estimation and formalizes a framework under which secure estimation can be formulated and analyzed. The central premise underlying the secure estimation framework is that forming secure estimates introduces a new dimension to the estimation objective, pertaining to detecting attacks and isolating the true model. Since detection and isolation decisions themselves are imperfect, their inclusion induces an inherent coupling between the desired secure estimation objective and the auxiliary detection and isolation decisions that need to be formed in conjunction with the estimates. This paper establishes the fundamental interplay among these decisions, and characterizes the general decision rules in closed-forms for any desired estimation cost function. Furthermore, to circumvent the computational complexity associated with growing parameter dimension or attack complexity, a scalable estimation algorithm is provided, which is shown to enjoy certain optimality guarantees. Finally, the theory developed is applied to secure parameter estimation in sensor networks.
引用
收藏
页码:5145 / 5166
页数:22
相关论文
共 40 条
  • [1] Robust Distributed Estimation by Networked Agents
    Al-Sayed, Sara
    Zoubir, Abdelhak M.
    Sayed, Ali H.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2017, 65 (15) : 3909 - 3921
  • [2] Bai CZ, 2014, P AMER CONTR CONF, P3029, DOI 10.1109/ACC.2014.6859155
  • [3] Bandyopadhyay S, 2014, P AMER CONTR CONF, P634, DOI 10.1109/ACC.2014.6858896
  • [4] Barreno Marco, 2006, P 2006 ACM S INF COM, P16
  • [5] Boyd S., 2004, CONVEX OPTIMIZATION
  • [6] Ebinger P, 2009, IEEE MILIT COMMUN C, P1671
  • [7] Fawzi Hamza, 2011, 2011 49th Annual Allerton Conference on Communication, Control, and Computing (Allerton), P337
  • [8] Secure Estimation and Control for Cyber-Physical Systems Under Adversarial Attacks
    Fawzi, Hamza
    Tabuada, Paulo
    Diggavi, Suhas
    [J]. IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2014, 59 (06) : 1454 - 1467
  • [9] SIMULTANEOUS SIGNAL DETECTION AND ESTIMATION UNDER MULTIPLE HYPOTHESES
    FREDRIKSEN, A
    MIDDLETON, D
    VANDELINDE, D
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1972, 18 (05) : 607 - +
  • [10] Minimax-Optimal Hypothesis Testing With Estimation-Dependent Costs
    Jajamovich, Guido H.
    Tajer, Ali
    Wang, Xiaodong
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2012, 60 (12) : 6151 - 6165