On the Performance Analysis of Binary Hypothesis Testing with Byzantine Sensors

被引:0
作者
Ni, Yuqing [1 ]
Ding, Kemi [2 ]
Yang, Yong [3 ]
Shi, Ling [1 ]
机构
[1] Hong Kong Univ Sci & Technol, Dept Elect & Comp Engn, Hong Kong, Peoples R China
[2] Arizona State Univ, Sch Elect Comp & Energy Engn, Tempe, AZ 85287 USA
[3] Guangdong Polytech Normal Univ, Sch Mechatron Engn, Guangzhou, Peoples R China
来源
PROCEEDINGS OF THE 38TH CHINESE CONTROL CONFERENCE (CCC) | 2019年
关键词
Hypothesis testing; Byzantine attacks; Network security; DISTRIBUTED DETECTION;
D O I
10.23919/chicc.2019.8866367
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
We investigate the impact of Byzantine attacks in distributed detection under binary hypothesis testing. It is assumed that a fraction of the transmitted sensor measurements are compromised by the injected data from a Byzantine attacker, whose purpose is to confuse the decision maker at the fusion center. From the perspective of a Byzantine attacker, under the injection energy constraint, an optimization problem is formulated to maximize the asymptotic missed detection error probability, which is based on the Kullback-Leibler divergence. The properties of the optimal attack strategy are analyzed by convex optimization and parametric optimization methods. Based on the derived theoretic results, a coordinate descent algorithm is proposed to search the optimal attack solution. Simulation examples are provided to illustrate the effectiveness of the obtained attack strategy.
引用
收藏
页码:8889 / 8894
页数:6
相关论文
共 16 条
  • [1] Aubin J.P., 1990, Set-Valued Analysis, DOI 10.1007/978-0-8176-4848-0
  • [2] Bartle R. G., 2000, Introduction to Real Analysis, V3
  • [3] Submodular Sparse Sensing for Gaussian Detection With Correlated Observations
    Coutino, Mario
    Chepuri, Sundeep Prabhakar
    Leus, Geert
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (15) : 4025 - 4039
  • [4] Cover T M., 1991, Elements of Information Theory. Telecommunications and signal processing
  • [5] Duchi JC., 2016, DERIVATIONS LINEAR A
  • [6] Efficient Byzantine Sequential Change Detection
    Fellouris, Georgios
    Bayraktar, Erhan
    Lai, Lifeng
    [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 2018, 64 (05) : 3346 - 3360
  • [7] Approximating the Kullback Leibler Divergence between Gaussian Mixture Models
    Hershey, John R.
    Olsen, Peder A.
    [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL IV, PTS 1-3, 2007, : 317 - 320
  • [8] Asymptotic Analysis of Distributed Bayesian Detection with Byzantine Data
    Kailkhura, Bhavya
    Han, Yunghsiang S.
    Brahma, Swastik
    Varshney, Pramod K.
    [J]. IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (05) : 608 - 612
  • [9] Distributed Detection in the Presence of Byzantine Attacks
    Marano, Stefano
    Matta, Vincenzo
    Tong, Lang
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (01) : 16 - 29
  • [10] Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks
    Rawat, Ankit Singh
    Anand, Priyank
    Chen, Hao
    Varshney, Pramod K.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2011, 59 (02) : 774 - 786