TY - GEN
T1 - On covert data falsification attacks on distributed detection systems
AU - Kailkhura, Bhavya
AU - Han, Yunghsiang S.
AU - Brahma, Swastik
AU - Varshney, Pramod K.
PY - 2013
Y1 - 2013
N2 - In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.
AB - In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.
KW - Byzantines
KW - Data falsification attack
KW - Distributed detection
UR - http://www.scopus.com/inward/record.url?scp=84891122861&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84891122861&partnerID=8YFLogxK
U2 - 10.1109/ISCIT.2013.6645893
DO - 10.1109/ISCIT.2013.6645893
M3 - Conference contribution
AN - SCOPUS:84891122861
SN - 9781467355803
T3 - 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013
SP - 412
EP - 417
BT - 13th International Symposium on Communications and Information Technologies
T2 - 13th International Symposium on Communications and Information Technologies: Communication and Information Technology for New Life Style Beyond the Cloud, ISCIT 2013
Y2 - 4 September 2013 through 6 September 2013
ER -