@article{65f4a38ff93949fd895cb799a6d7ac28,
title = "Minimum Byzantine Effort for Blinding Distributed Detection in Wireless Sensor Networks",
abstract = "In this work, we consider the general problem of distributed detection in the presence of Byzantines using wireless sensor networks. Instead of attempting to mitigate Byzantine attacks as a system designer, we investigate the issue from the perspective of a Byzantine attacker. The probability for each individual sensor to be compromised (compromising probability) required to blind the system operation is adopted as the attack measure. Under the system setting that the fusion center (FC) declares the most likely hypothesis to be true based on the M-ary data from N local sensors, a Byzantine attack policy that can blind the FC with the minimum compromising probability for each individual sensor is derived under the assumption that the Byzantine attacker knows the statistics of the local outputs. The closed-form expression for a blind-achieving Byzantine transition probability that is used to alter the statistics of the local outputs of compromised sensors is also established. Our results indicate that the statistics of the local outputs is essential for the minimization of an attacker's effort.",
keywords = "Byzantine attacks, Distributed detection, distributed inference network security, wireless sensor networks",
author = "Lin, {Hsuan Yin} and Chen, {Po Ning} and Han, {Yunghsiang S.} and Varshney, {Pramod K.}",
note = "Funding Information: Manuscript received July 13, 2019; revised November 1, 2019; accepted December 14, 2019. Date of publication January 8, 2020; date of current version January 24, 2020. The associate editor coordinating the review of this manuscript and approving it for publication was Prof. Ba Ngu Vo. This work was supported in part by the Minister of Science and Technology of Taiwan under Grant MOST 103-2911-I-011-515/104-2911-I-011-503, in part by the National Natural Science Foundation of China under Grant No. 61671007, in part by the Start Fund of Dongguan University of Technology under Grant KCYXM2017025, and in part by the Army Research Office of the USA under Grant W911NF-14-1-0339. A part of the work was completed during a visit to the Center for Advanced Security Research Darmstadt (CASED), Technische Universit{\"a}t Darmstadt, Germany, during 2014-2016. This article was presented in part at the IEEE International Symposium on Information Theory, Barcelona, Spain, July 2016. (Corresponding author: Po-Ning Chen.) H.-Y. Lin was with the Institute of Communication Engineering, National Chiao Tung University, Hsinchu 30010, Taiwan. He is now with the Simula UiB, N-5008 Bergen, Norway (e-mail: hsuan-yin.lin@ieee.org). Publisher Copyright: {\textcopyright} 1991-2012 IEEE.",
year = "2020",
doi = "10.1109/TSP.2020.2964241",
language = "English (US)",
volume = "68",
pages = "647--661",
journal = "IRE Transactions on Audio",
issn = "1053-587X",
publisher = "Institute of Electrical and Electronics Engineers Inc.",
}