Distributed source coding in the presence of Byzantine sensors

被引:12
作者
Kosut, Oliver [1 ]
Tong, Lang [1 ]
机构
[1] Cornell Univ, Sch Elect & Comp Engn, Ithaca, NY 14853 USA
基金
美国国家科学基金会;
关键词
Byzantine attack; distributed source coding; network security; sensor fusion; Slepian-Wolf coding;
D O I
10.1109/TIT.2008.921867
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The distributed source coding problem is considered when the sensors, or encoders, are under Byzantine attack; that is, an unknown group of sensors have been reprogrammed by a malicious intruder to undermine the reconstruction at the fusion center. Three different forms of the problem are considered. The first is a variable-rate setup, in which the decoder adaptively chooses the rates at which the sensors transmit. An explicit characterization of the variable-rate achievable sum rates is given for any number of sensors and any groups of traitors. The converse is proved constructively by letting the traitors simulate a fake distribution and report the generated values as the true ones. This fake distribution is chosen so that the decoder cannot determine which sensors are traitors while maximizing the required rate to decode every value. Achievability is proved using a scheme in which the decoder receives small packets of information from a sensor until its message can be decoded, before moving on to the next sensor. The sensors use randomization to choose from a set of coding functions, which makes it probabilistically impossible for the traitors to cause the decoder to make an error. Two forms of the fixed-rate problem are considered, one with deterministic coding and one with randomized coding. The achievable rate regions are given for both these problems, and it is shown that lower rates can be achieved with randomized coding.
引用
收藏
页码:2550 / 2565
页数:16
相关论文
共 17 条
[1]  
[Anonymous], INFORM THEORY APPROA
[2]  
AWERBUCH B, 2002, ACM WORKSH WIR SEC W
[3]   The CEO problem [J].
Berger, T ;
Zhang, Z ;
Viswanathan, H .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (03) :887-902
[4]   PROOF OF DATA COMPRESSION THEOREM OF SLEPIAN AND WOLF FOR ERGODIC SOURCES [J].
COVER, TM .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1975, 21 (02) :226-228
[5]   THE BYZANTINE GENERALS STRIKE AGAIN [J].
DOLEV, D .
JOURNAL OF ALGORITHMS, 1982, 3 (01) :14-30
[6]  
HO T, 2004, IEEE P INT S INF THE, P143
[7]   A survey of secure wireless ad hoc routing [J].
Hu, YC ;
Perrig, A .
IEEE SECURITY & PRIVACY, 2004, 2 (03) :28-39
[8]  
JAGGI THS, 2005, P INT S INF THEOR AP
[9]  
KOSUT O, 2006, P 44 ANN ALL C COMM
[10]   THE BYZANTINE GENERALS PROBLEM [J].
LAMPORT, L ;
SHOSTAK, R ;
PEASE, M .
ACM TRANSACTIONS ON PROGRAMMING LANGUAGES AND SYSTEMS, 1982, 4 (03) :382-401