On Covert Data Falsification Attacks on Distributed Detection Systems

被引:0
|
作者
Kailkhura, Bhavya [1 ]
Han, Yunghsiang S. [2 ]
Brahma, Swastik [1 ]
Varshney, Pramod K. [1 ]
机构
[1] Syracuse Univ, Dept EECS, Syracuse, NY 13244 USA
[2] Natl Taiwan Univ Sci & Technol, Dept EE, New Taipei, Taiwan
来源
2013 13TH INTERNATIONAL SYMPOSIUM ON COMMUNICATIONS AND INFORMATION TECHNOLOGIES (ISCIT): COMMUNICATION AND INFORMATION TECHNOLOGY FOR NEW LIFE STYLE BEYOND THE CLOUD | 2013年
关键词
Distributed detection; Data falsification attack; Byzantines;
D O I
暂无
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.
引用
收藏
页码:412 / 417
页数:6
相关论文
共 50 条
  • [31] Subspace-Aided Data-Driven Robust Distributed Detection With Cooperative Fault Sensing for Large-Scale Systems
    Li, Biao
    Yang, Ying
    IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2024, 20 (08) : 10387 - 10397
  • [32] Optimal Training and Data Power Allocation in Distributed Detection With Inhomogeneous Sensors
    Ahmadi, Hamid R.
    Vosoughi, Azadeh
    IEEE SIGNAL PROCESSING LETTERS, 2013, 20 (04) : 339 - 342
  • [33] Optimization of distributed detection systems under neyman-pearson criterion
    Xiang, Ming
    2006 9TH INTERNATIONAL CONFERENCE ON INFORMATION FUSION, VOLS 1-4, 2006, : 933 - 938
  • [34] Detection of Bad Data in Phasor Measurement Units Using Distributed Approach
    Thomas, Polly
    Skariah, Emil Ninan
    Varghese, Sheena Thomas
    2017 INNOVATIONS IN POWER AND ADVANCED COMPUTING TECHNOLOGIES (I-PACT), 2017,
  • [35] Cloud Processing versus Independent Processing of Independent Data Sets for Distributed Detection
    Liu, Xingchuan
    Zhu, Jiang
    Song, Chunyi
    Xu, Zhiwei
    PROCEEDINGS OF 2020 IEEE 15TH INTERNATIONAL CONFERENCE ON SIGNAL PROCESSING (ICSP 2020), 2020, : 32 - 36
  • [36] A Theoretical Study of Anomaly Detection in Big Data Distributed Static and Stream Analytics
    Amen, Bakhtiar
    Grigoris, Antonio
    IEEE 20TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS / IEEE 16TH INTERNATIONAL CONFERENCE ON SMART CITY / IEEE 4TH INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2018, : 1177 - 1182
  • [37] Optimization of distributed detection systems under the minimum average misclassification risk criterion
    Magarini, M
    Spalvieri, A
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2000, 46 (04) : 1649 - 1653
  • [38] Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques
    Kailkhura, Bhavya
    Brahma, Swastik
    Dulek, Berkan
    Han, Yunghsiang S.
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2015, 10 (07) : 1499 - 1512
  • [39] COUNTEREXAMPLES IN DISTRIBUTED DETECTION
    CHERIKH, M
    KANTOR, PB
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1992, 38 (01) : 162 - 165
  • [40] Distributed Fault Detection and Isolation of Continuous-Time Non-Linear Systems
    Boem, Francesca
    Ferrari, Riccardo M. G.
    Parisini, Thomas
    EUROPEAN JOURNAL OF CONTROL, 2011, 17 (5-6) : 603 - 620