Secure Estimation Under Causative Attacks

被引:5
作者
Sihag, Saurabh [1 ]
Tajer, Ali [1 ]
机构
[1] Rensselaer Polytech Inst, Dept Elect Comp & Syst Engn, Troy, NY 12180 USA
基金
美国国家科学基金会;
关键词
Estimation; Inference algorithms; Data models; Sociology; Parameter estimation; security; tradeoffs; WIRELESS SENSOR NETWORKS; CYBER-PHYSICAL SYSTEMS; DISTRIBUTED ESTIMATION; STATE ESTIMATION; LOCALIZATION;
D O I
10.1109/TIT.2020.2985956
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of secure parameter estimation when an estimation algorithm is prone to causative attacks. Causative attacks, in general, target decision-making algorithms (e.g., inference or learning algorithm) to alter their decisions in specific scenarios (e.g., distort parameter estimates for specific ranges of the parameter of interest). Such attacks influence the decisions via tampering with the mechanisms through which an algorithm acquires the statistical model of the population about which it aims to form a decision. Such attacks are viable, for instance, by contaminating the historical or training data, or by compromising an expert who provides the statistical model. In the presence of causative attacks, inference algorithms operate under a distorted statistical model for the data samples. This paper introduces a notion of secure parameter estimation and formalizes a framework under which secure estimation can be formulated and analyzed. The central premise underlying the secure estimation framework is that forming secure estimates introduces a new dimension to the estimation objective, pertaining to detecting attacks and isolating the true model. Since detection and isolation decisions themselves are imperfect, their inclusion induces an inherent coupling between the desired secure estimation objective and the auxiliary detection and isolation decisions that need to be formed in conjunction with the estimates. This paper establishes the fundamental interplay among these decisions, and characterizes the general decision rules in closed-forms for any desired estimation cost function. Furthermore, to circumvent the computational complexity associated with growing parameter dimension or attack complexity, a scalable estimation algorithm is provided, which is shown to enjoy certain optimality guarantees. Finally, the theory developed is applied to secure parameter estimation in sensor networks.
引用
收藏
页码:5145 / 5166
页数:22
相关论文
共 40 条
  • [31] Vempaty A, 2011, 2011 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), P1310, DOI 10.1109/WCNC.2011.5779320
  • [32] Wilson C, 2016, IEEE INT SYMP INFO, P2479, DOI 10.1109/ISIT.2016.7541745
  • [33] Decentralized estimation in an inhomogeneous sensing environment
    Xiao, JJ
    Luo, ZQ
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2005, 51 (10) : 3564 - 3575
  • [34] Yong SZ, 2015, IEEE DECIS CONTR P, P5162, DOI 10.1109/CDC.2015.7403027
  • [35] Yuzhe X., 2012, DISTRIBUTED ESTIMATI
  • [36] WHEN IS THE GENERALIZED LIKELIHOOD RATIO TEST OPTIMAL
    ZEITOUNI, O
    ZIV, J
    MERHAV, N
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1992, 38 (05) : 1597 - 1601
  • [37] NoC-Sprinting: Interconnect for Fine-Grained Sprinting in the Dark Silicon Era
    Zhan, Jia
    Xie, Yuan
    Sun, Guangyu
    [J]. 2014 51ST ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2014,
  • [38] Asymptotically Optimum Distributed Estimation in the Presence of Attacks
    Zhang, Jiangfan
    Blum, Rick S.
    Lu, Xuanxuan
    Conus, Daniel
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (05) : 1086 - 1101
  • [39] A Robust Iterated Extended Kalman Filter for Power System Dynamic State Estimation
    Zhao, Junbo
    Netto, Marcos
    Mili, Lamine
    [J]. IEEE TRANSACTIONS ON POWER SYSTEMS, 2017, 32 (04) : 3205 - 3216
  • [40] Minimum entropy approach for multisensor data fusion
    Zhou, YF
    Leung, H
    [J]. PROCEEDINGS OF THE IEEE SIGNAL PROCESSING WORKSHOP ON HIGHER-ORDER STATISTICS, 1997, : 336 - 339