On covert data falsification attacks on distributed detection systems

Bhavya Kailkhura, Yunghsiang S. Han, Swastik Brahma, Pramod K. Varshney

Research output: Chapter in Book/Report/Conference proceedingConference contribution

10 Scopus citations

Abstract

In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.

Original languageEnglish (US)
Title of host publication13th International Symposium on Communications and Information Technologies
Subtitle of host publicationCommunication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013
Pages412-417
Number of pages6
DOIs
StatePublished - Dec 31 2013
Event13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013 - Surat Thani, Thailand
Duration: Sep 4 2013Sep 6 2013

Publication series

Name13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013

Other

Other13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013
CountryThailand
CitySurat Thani
Period9/4/139/6/13

Keywords

  • Byzantines
  • Data falsification attack
  • Distributed detection

ASJC Scopus subject areas

  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'On covert data falsification attacks on distributed detection systems'. Together they form a unique fingerprint.

  • Cite this

    Kailkhura, B., Han, Y. S., Brahma, S., & Varshney, P. K. (2013). On covert data falsification attacks on distributed detection systems. In 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013 (pp. 412-417). [6645893] (13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013). https://doi.org/10.1109/ISCIT.2013.6645893