Distributed Detection with Multiple Sensors in the Presence of Sybil Attacks

被引:1
|
作者
Hashlamoun, Wael [1 ]
Brahma, Swastik [2 ]
Varshney, Pramod K. [3 ]
机构
[1] Birzeit Univ, Dept ECE, Birzeit, Palestine
[2] Univ Cincinnati, Dept CS, Cincinnati, OH 45221 USA
[3] Syracuse Univ, Dept EECS, Syracuse, NY 13244 USA
来源
2022 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM 2022) | 2022年
关键词
Sensor Networks; Distributed Detection; Sybil Attack; Data Falsification; Game Theory; INFERENCE;
D O I
10.1109/GLOBECOM48099.2022.10001514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of distributed detection in the presence of a Sybil attack where a malicious sensor node can send multiple falsified decisions using multiple fake identities to a Fusion Center (FC) to degrade its decision-making performance. We study the problem under the Neyman-Pearson (NP) setup. We find that, due to the Sybil attack, the decisions received at the FC become correlated and that the degree of correlation is dependent on the number of fake identities used. The paper characterizes the optimal Sybil attack that blinds the FC, i.e., makes the FC incapable of making an informed decision. We find that if the sum of the local detection and false alarm probabilities of the sensor nodes is 1, the FC can be made blind when at least 50% of the decisions are sent using fake identities. However, if this condition is not met, then all decisions would have to be sent using fake identities in order to blind the FC. The paper also investigates strategic interactions between the FC and the Sybil attacker using Game Theory and proves the existence of a Nash Equilibrium (NE). Numerical results are presented to gain important insights.
引用
收藏
页码:2770 / 2775
页数:6
相关论文
共 50 条
  • [41] Detecting and preventing Sybil attacks in wireless sensor networks
    Wadii, Jlassi
    Rim, Haddad
    Ridha, Bouallegue
    2019 IEEE 19TH MEDITERRANEAN MICROWAVE SYMPOSIUM (MMS 2019), 2019,
  • [42] Secure Vehicular Platoon Management against Sybil Attacks
    Junaidi, Danial Ritzuan
    Ma, Maode
    Su, Rong
    SENSORS, 2022, 22 (22)
  • [43] Footprint: Detecting Sybil Attacks in Urban Vehicular Networks
    Chang, Shan
    Qi, Yong
    Zhu, Hongzi
    Zhao, Jizhong
    Shen, Xuemin
    IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2012, 23 (06) : 1103 - 1114
  • [44] Detecting Sybil attacks in vehicular ad hoc networks
    Hamdan S.
    Hudaib A.
    Awajan A.
    International Journal of Parallel, Emergent and Distributed Systems, 2021, 36 (02) : 69 - 79
  • [45] Audit Bit Based Distributed Bayesian Detection in the Presence of Byzantines
    Hashlamoun, Wael
    Brahma, Swastik
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (04): : 643 - 655
  • [46] Change Detection for Large Distributed Sensor Networks With Multitriggered Local Sensors
    Quarisa, Matthew W.
    Blostein, Steven D.
    IEEE ACCESS, 2022, 10 : 44789 - 44803
  • [47] Detection of Data Integrity Attacks in Distributed State Estimation
    Xia, Yuanyuan
    Su, Shuangping
    Su, Housheng
    Zhang, Xinting
    Luo, Weijie
    Yang, Wen
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2021, 51 (12): : 7735 - 7744
  • [48] False Discovery Rate Based Distributed Detection in the Presence of Byzantines
    Vempaty, Aditya
    Ray, Priyadip
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 2014, 50 (03) : 1826 - 1840
  • [49] At a glance of sybil detection in OSN
    Kansara, Krishna B.
    Shekokar, Narendra M.
    2015 IEEE INTERNATIONAL SYMPOSIUM ON NANOELECTRONIC AND INFORMATION SYSTEMS, 2015, : 47 - 52
  • [50] On Covert Data Falsification Attacks on Distributed Detection Systems
    Kailkhura, Bhavya
    Han, Yunghsiang S.
    Brahma, Swastik
    Varshney, Pramod K.
    2013 13TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT): COMMUNICATION AND INFORMATION TECHNOLOGY FOR NEW LIFE STYLE BEYOND THE CLOUD, 2013, : 412 - 417