Distributed detection in wireless sensor networks (WSNs) under Byzantine attacks is studied in this paper. A new kind of Byzantine attacks, neighborhood malicious Byzantine attacks (NMBA), is proposed. In this type of Byzantine attacks, part of sensors is conquered and reprogrammed by an intelligent adversary. These sensors then are conducted to send false information to the fusion center (FC) in order to confuse it. We see that the attacking performance of NMBA is very close to that of collaborative malicious Byzantine attacks (CMBA) and outperforms independent malicious Byzantine attacks (IMBA). Decision fusion becomes impossible when attacking power which is the fraction of compromised sensors in WSNs exceeds a specific value. A closed-form expression for the value is derived. For mitigating attacking effect brought by NMBA, a strategy for estimating the attacking power is proposed. Furthermore, a scheme to identify Byzantine attackers is presented. Two kinds of discrepancy distance are constructed in this paper to help in identifying Byzantine attackers. We prove that most of Byzantine attackers are identified and performance of the identifying scheme is proved to be excellent. A data fusion scheme based on both dynamic threshold and the identifying scheme is analyzed in this paper. Numerical results are also provided to support the schemes and approaches.
1. Introduction
Wireless sensor networks (WSNs) consist of a large number of tiny power-limited sensors that are densely and spatially deployed to monitor physical phenomena. When detecting a target in the region of interest (ROI), all the sensors in network report their findings to the fusion center (FC) where a global-final decision is made. For the advantage of easy deployment and fast self-organization, WSNs have been widely used [1]. Due to the increasing importance of being used in both military and civilian applications, it is imperative to incorporate secure localization and detection into WSNs. However, limited by both the processing capability and power supply of sensor nodes, secure detection in WSNs has been a challenging task. WSNs are also vulnerable to tampering. A serious threat to WSNs is Byzantine attacks where some authenticated sensor nodes have been fully controlled by an intelligent adversary. These compromised sensors are dispatched to disrupt or confuse the FC. While Byzantine attacks may, in general, refer to many types of Byzantine behaviors [2, 3], our focus in this paper is on Byzantine attacks in terms of data-falsification. In this type of attack, compromised nodes are reprogrammed and then forced to send falsified data to the FC in order to undermine the inference performance of network. The main goal of Byzantine attackers is to havoc performance of the FC as much as possible so that decider at the FC is unable to utilize sensors' information to determine the presence of target correctly.
An important task that WSNs need to perform is target detection, which is imperative for an accurate tracking of target. In the context of Byzantine attackers attempting to disrupt the network, a reliable algorithm of detection needs to be introduced. In [4, 5], several algorithms have been developed for secure detection and localization in WSNs. The techniques based on direction of arrival (DOA) and time of arrival (TOA) (or time-difference-of-arrival (TDOA)) have been investigated in [4] and [5], respectively. However, the TDOA is not suitable for detecting target because sensor nodes are narrow band and lack accurate synchronization. Several researchers have focused on developing techniques that do not suffer from imperfect time synchronization. For example, scheme of measuring intensity of signal energy is used to detect target. Therefore, convenience of the energy-based method gives feasibility to detect and localize a target through detecting energy. In [6, 7], each cognitive radio adopts an effective detection scheme based harvesting energy to make its decision and determine whether there is a licensed user requesting to occupy the spectrum band. Each cognitive radio sensor detects intensity of signal and measures the energy received. If the measured energy is greater than a properly predefined threshold, the current spectrum is busy. Otherwise, the current spectrum is idle. We adopt this scheme in this paper to detect whether there is a target in the ROI.
Marano et al. have investigated distributed detection in the presence of Byzantine attacks in [8, 9], where Byzantine attackers are assumed to have a complete knowledge about the true hypotheses. In their system model, the authors assumed that the FC did not know which sensor node was Byzantine attacker. Though the FC did not know which sensor node was Byzantine attacker, it knew average percentage of compromised sensor nodes or upper bound of the average. Vempaty et al. have also analyzed the problem of distributed detection under Byzantine attacks in [10]. However, they did not assume that the Byzantine sensors had a complete knowledge about true hypotheses. Instead, they assumed that the Byzantine sensors made decisions about the presence of target through their own observations. In other words, each Byzantine sensor potentially flips the local decision made at the node. The performance of network has also been analyzed in the context of presence of independent and collaborative Byzantine attacks, respectively, in [10]. In addition to the analysis of distributed detection in the presence of Byzantine attacks, an adaptive learning scheme that mitigated the effect brought by Byzantine attackers has been proposed by Vempaty et al. in [10]. The scheme identifies Byzantine sensors through observing the ratio value of deviations between the estimated behavior of ith sensor and the expected behavior of an Honest sensor to the estimated behavior of ith sensor and the expected behavior of a Byzantine sensor. If the value is greater than 1, the FC declares the sensor to be Byzantine. Otherwise, the FC tags the sensor as Honest. In order to maximize the performance of decision fusion, the FC then removes those decisions that are from sensors tagged as Byzantine when the FC makes a global decision at the next time.
In literature [10, 11], analysis of performance of the network under independent and collaborative malicious Byzantine attacks has been performed, respectively. When a target enters into the monitoring region, the ith compromised sensor node has a detection and makes a local/original decision. In the case of independent malicious Byzantine attacks (IMBA), the local decision of ith compromised sensor completely depends on its own observation. In the case of collaborative Byzantine attacks (CMBA), the local decision of ith compromised sensor depends on not only its own observation but also decisions from the remaining compromised sensors. In the scenario of IMBA, though Byzantine sensor can make multiple observations in a proper time window and average these observations in order to reduce the effect of additive noise, it is not effective significantly when Byzantine sensor nodes stay far away from a target in the ROI. In addition, a sensor that adopts IMBA has no way to conquer a certain degree of blind flipping of its own decision. In the situation of CMBA, each Byzantine sensor communicates with the left compromised sensors and refers to their decisions before determining its own local decision. Although CMBA produces remarkable improvement in attacking effect, much energy has been consumed in communication among Byzantine sensors, especially when Byzantine sensor nodes are deployed sparsely. In addition to analysis of performance of distributed detection in the presence of Byzantine attacks, the blinding attacking power α has been obtained. The blinding attacking power () is equal to 0.5 and 0.35 in the case of IMBA and CMBA, respectively [11]. Motivated by this, we propose a new Byzantine attacks model named after neighborhood malicious Byzantine attacks (NMBA). NMBA is such a kind of attacks model where each compromised sensor node in the network determines whether there is a target or not in the ROI depending on not only its own local decision but also a certain amount of decisions coming from Honest sensors which are nearest around the compromised sensor. Then each Byzantine sensor node employs a majority strategy among decisions to make a final local decision. At last the Byzantine sensor node flips the final local decision confidently and sends false decision to the FC.
Attacking power α which is also termed indicator of the vulnerability of the sensor networks is a crucial performance metric [12, 13]. We assume that there are a large number of sensor nodes deployed in the ROI. According to the law of large numbers, α is equal to the ratio of number of compromised sensors to the total number of sensors in the network (). In practice, although the FC knows the presence of Byzantine sensors in the network, decider at the FC can hardly determine the exact attacking power [14]. If the decider knows the attacking power, it is convenient for the FC to adopt a robust strategy to mitigate the negative effect caused by Byzantine attackers [15, 16]. In this paper, we propose a simple and effective scheme to determine the attacking power in the perspective of decider at the FC. After the attacking power is estimated, two kinds of discrepancy distance which are used to help in identifying Byzantine sensors are constructed in this paper.
An effective scheme of decision fusion plays an important role in the FC [17–19]. Many literatures focused on the mitigation of Byzantine attacks and developed algorithms to design a static and identical threshold for decision making at the FC [11, 14]. Several authors have proposed online learning of normal trajectory patterns for detection in trajectory in [20]. In this paper, we propose an effective scheme based on both dynamic threshold and identifying Byzantine attackers for decision fusion at the FC.
The paper is organized as follows. In Section 2, we describe our system model including detection model and NMBA attacking model. In order to formulate the problem of distributed detection in WSNs clearly, we divide the process of decision fusion into three hierarchies or stages in this section. The attacks model of NMBA is proposed at the first stage which is different from independent Byzantine attacks and collaborative Byzantine attacks. The performance metric is also presented. In Section 3, we determine the optimal attacking strategy in the perspective of Byzantine attackers and closed-form expression for blinding region is derived. Comparison among IMBA, CMBA, and NMBA is also performed and numerical results are provided at the same time. From the perspective of network designer, we propose a fusion scheme based on dynamic threshold to make a reliable global decision and analyze how the FC identifies Byzantine attackers to enhance the fusion performance in Section 4. The attacking power is also estimated. Finally, we present our conclusion in Section 5.
2. System Model
2.1. Detection Model
A network with N sensor nodes which are spatially deployed in the ROI is considered. All sensor nodes in this network are independent on functionality. Each sensor makes a decision independently after detection. As illustrated in Figure 1, the sensor nodes which are denoted as symbol of plus are shown to be deployed on a regular grid and intensity of energy attenuated as the distance from the target that is represented as blue star increases. It is worth mentioning that the detection scheme based on harvesting energy is capable of handling any kind of deployment as long as the location information of each sensor node is available at the FC. The uniform sensor deployment shown in Figure 1 is only a special case. In any one kind of deployment, N sensor nodes can correctly detect a target when the target intrudes at the position , where and denote the coordinate of this target location in 2D Cartesian. We introduce an isotropic intensity of signal attenuation model as follows:
where is the signal amplitude received at ith sensor and is the emitted power measured at a reference distance . n is the power decay exponent, and is the Euclidean distance between the target and ith sensor:
in which are the coordinate of ith sensor. For simplicity but without loss of generality in this paper, we let , [10]. As a result, (1) can be expressed as
Equation (3) is a quite general model for signal attenuation of electromagnetic wave that propagates isotropically in free space. However, when the signal of energy arrives at ith sensor, it has been contaminated by additive white Gaussian noise in practice. Therefore, the signal amplitude received at ith sensor is expressed as , in which is Gaussian noise which follows standard normal distribution. Here, we assume that all sensors in the network have the identical additive white Gaussian noise, that is, , .
The sensors are deployed in a regular grid. Each sensor independently harvests the energy propagated from target.
Each sensor node needs to quantize the received signal of energy because of its limitations of bandwidth and energy and sends quantized binary measurements to the FC. Threshold of quantizers is adopted in this work for its simplicity of both easy implementation and analysis as follows:
where and are local decisions made by ith sensor after quantizing the received signal and a predefined threshold adopted by ith sensor, respectively. In this paper, we assume that all of the sensors share the identical threshold; that is, , .
In this work, the classical distribution detection model is taken into account where two hypotheses are considered. Each sensor solves hypothesis testing problem and makes a local decision on either hypothesis (target is absent) or (target is present). We consider the scenario that the adversary knows the complete information about the location of sensors and is capable of attacking all the sensors simultaneously. Due to the constraint of budget, the Byzantine attackers conquer only a part of nodes in the network to deteriorate capability of inference performance of network. These Byzantine sensors transmit false decision to the FC in order to deteriorate inference performance of the network. We assume that the channel between the FC and local sensors is error-free. The original or local one-bit decision generated at ith sensor node is denoted as , . Then the ith sensor reports one-bit decision to the FC where if ith sensor is Honest. For a Byzantine sensor, the local original decision need not be equal to in our attacks model.
Let and be the number of Honest and Byzantine sensors, respectively. The total number of sensors can be expressed as and the number of Byzantine sensor nodes is equal to . In the perspective of Byzantine attackers, conquering N sensors is not a wise strategy for the adversary itself at the risk of exposed activity. The main goal of adversary is to compromise a fraction of sensors to degrade the performance of the FC instead of capturing the network with a huge cost. Therefore, we have . We use and to denote the probability of detection and false-alarm of ith sensor, respectively. We use H to present a sensor node to be Honest and . The detection probability of ith sensor can be expressed as
Similarly, the false-alarm probability of sensor can be expressed as
where is the complementary distribution function of the standard Gaussian
When a target intrudes into the ROI, each sensor node starts to sense and record the energy propagated from the target using detection scheme based on harvesting energy [21]. We let each sensor perform K observations in a small time window T where target is assumed to be static. This is a reasonable assumption. For example, if the sampling rate of each sensor is 6000 Hz, a target with a speed of 100 km/h only moves 0.25 m during sampling intervals [22]. The jth observation at ith sensor node can be expressed as , and . A local/original decision matrix is generated where is the vector of local/original decision at the ith sensor node. And , and . The FC receives N vectors of decisions from local sensors. Then, a decision matrix is formulated at the FC; that is, , where , and . The local/original decision matrix is equal to D if there is no presence of Byzantine attackers.
In order to formulate the problem in the process of decision fusion, we divide the process into three hierarchies/stages. As illustrated in Figure 2, ith sensor makes a local/original vector of and sends the vector into the FC after is probably “attacked” at the first stage. A decision matrix D is formulated from which the vector of global decision is mapped at the second stage. At the last stage, a global-final decision z is mapped from vector z at the FC.
Model of three hierarchies. is the vector of local decision made by ith sensor , is the vector of decision sent to the FC, . is the decision matrix formulated at the FC, z is global decision vector, and z is global-final decision.
2.2. Byzantine Attacks Model
In the attacks model of NMBA, the ith Byzantine sensor has exactly () neighbors to consult and . In order to facilitate analysis, we assume that the scenario of many Byzantine sensors flocking together does not happen. Namely, the whole Byzantine sensor nodes are deployed sparsely by intelligent adversary in the ROI. In the case of N sensors deployed on a regular grid, NMBA has several neighborhood types including diamond type and square type. For each Byzantine sensor, its neighborhood nodes are those sensors that are the nearest and Honest around it in specific neighborhood type. We assume that each Byzantine sensor knows the identifications of the remaining compromised sensors. Each Byzantine sensor consults all of its neighborhood nodes to make a wise and tricky decision. In Figure 3, the type of square neighborhood is presented and the case of is considered. Clearly, each Byzantine sensor node consults its eight neighbors and makes a decision based on decisions from its neighbors.
Square type of NMBA in the case of M. The blue star is a intruding target and symbol plus is denoted as sensor. Byzantine sensors are denoted as plus symbol covered with diamond. Each Byzantine sensor has 9 decisions after consulting its 8 neighborhood nodes.
We make the conditional i.i.d. assumption under which observations from sensors are conditionally independent and identically distributed. The jth observation at ith sensor then has the distributions
If ith sensor is Honest, its observation follows distributions p and q under hypotheses and , respectively. Therefore, we have
Similarly, we have distributions x and y under the same hypotheses for Byzantine sensor as follows:
In the attacks model of NMBA, the ith Byzantine sensor makes an initial decision independently and gets the decisions from its neighborhood sensors. As a result, a set of decisions is obtained where the represents the decision from the lth neighbor of ith Byzantine sensor. Then, the ith Byzantine sensor makes its local or original decision using a majority strategy, that is, the original local decision , where and are indicator function and threshold adopted by the ith Byzantine sensor, respectively. Therefore, we have the following equations:
where , , and Γ denotes the set of all permutations of the sensors. After using majority strategy to make a local decision, the ith Byzantine sensor flips confidently its decision with probability of . Specifically, we have
Thus, we get
Therefore, we have
Substituting (9) and (15) in (8) and after simplification, we obtain
2.3. Performance Metric
In the perspective of Byzantine attackers, the primary objective is to deteriorate the inference performance of FC as much as possible. On the contrary, the FC wants to make inference performance as much highly excellent as possible in order to guarantee valid detection. In this paper, we adopt Kullback-Leibler divergence (KLD) as the network performance that characterizes inference performance at the FC. KLD is very important in probability theory and is widely employed as information-theoretic distance measure to characterize detection performance [23, 24]. The KLD between the distributions and for ith sensor can be expressed as
The FC receives ith sensor's decisions and under and , respectively. In the perspective of Byzantine attackers, they try to minimize the KLD as much as possible so that the FC can hardly make a right decision between and . On the other hand, network designer wants to maximize KLD of each sensor's decision to mitigate the negative effect caused by Byzantine attackers. In the next section, we explore the optimal strategy of Byzantine attacks that impair the detection performance as much as possible by minimizing KLD.
3. Optimal Strategy for Byzantine Attackers
3.1. Optimal Strategy for Byzantine Attacks
As explored in Section 2, the Byzantine attackers attempt to make the nodes that have been compromised have small KL divergence as much as possible. Byzantine attackers have the optimal superiority on degrading inference performance of FC when is equal to zero. In the case of , the FC cannot distinguish the distributions under or . In other words, the data from sensors conveys no information. We refer to this case as the FC being blinded completely when
Substituting (16) in (18) and after simplification, the condition to make is equivalent to
where the close-form expression of function is denoted as the following equation:
where and are the number of neighborhood nodes and threshold adopted by ith Byzantine sensor, respectively.
As mentioned above, the KL distance between and is equal to zero; that is, , if and only if . The FC is incapable of distinguishing the two distributions under and when KLD is equal to zero. The attackers then project interests in the minimum attacking power that can just make the ability of inference of the FC destroyed. Thus, the minimum attacking power in the context of NMBA is denoted as
For the sake of minimizing α to reach , we have the following equation depending on operating point :
Because of , we have the following inequality:
To prove inequality (23), we apply the monotonic property of the function of . Due to the function possessing differentiability, we have the following inequality:
Therefore, is a monotonically increasing function when . As a result, inequality (23) is certified. After certifying (23), we have the following equation:
where is the ceiling function. Therefore, function in (19) reaches the maximum value point only when . Therefore, for a pair of fixed operating points , we have
When the intelligent adversary poses attacking power α which is greater than , the FC is trapped into a dilemma where the decider cannot utilize any information from sensors to make a correct decision. The situation refers to the fusion center's entering into the blinding region where the FC is blinded completely.
3.2. Numerical Results
In this subsection, numerical results are presented to support our analysis of optimal attacking strategy for Byzantine attackers. We consider the network where sensors are deployed on regular grid in the ROI under the Byzantine attacks model of NMBA. We set the power at the reference point () as 200 and the signal amplitude arriving at the local sensor is contaminated by AWGN with mean value and standard deviation . A target intrudes at position . We consider the square type of NMBA where all the Byzantine sensors adopt identical number of neighborhood nodes and optimal threshold; that is, and , . Attacking power α is observed in the case of square type of NMBA over and . In the blinding region, the FC is incapable of utilizing any information to make a decision to determine whether there is a target in the ROI. Byzantine users try to pay as much low cost as possible when the FC has been completely blinded by them. Attacking power α in blinding region is a convex function of threshold η under the NMBA attacking model. Therefore, it is possible for Byzantine attackers to adopt the least attacking power to blind the FC. From the numerical results presented in Figure 4, we see that the attacking power α reaches minimum value only when in the case of NMBA when . The minimum value of α is equal to 0.3844. The result is intuitive and also indicates that the optimal threshold associates with the number of neighborhood nodes, M. The other cases of NMBA are presented in Table 1. We observe that the minimum value of is just obtained at the point where the optimal threshold η is got. In Figure 5, we present that optimal threshold increases with the increase in the value of M. We observe that is always equivalent to when M is even and is equal to the maximum integer that is not larger than when M is odd. It is clear that optimal threshold Byzantine attacker associates with the number of its neighborhood. In Figures 6 and 7, it is shown that is the monotonically decreasing function of M in the condition that η is always equal to . As illustrated in Figures 5 and 6, IMBA is a particular case when . Under condition of , each Byzantine sensor makes a judgement only depending on its own observation and flips its decision confidently prior to sending to the FC. When , each Byzantine sensor consults with two neighborhood nodes around it before making a decision and the minimum attacking power in the blinding region is equal to 0.5. When M is equal to 2, the attacking effect brought by NMBA matches with IMBA. of NMBA decreases monotonically with the increase of M and it reaches 0.3844 when M increases to 9. decreases to 0.3752 when M increases to 25. The exact value of corresponding to M and is presented in Table 2. In addition, as we can see from Figures 6 and 7, the number of neighborhood nodes that each Byzantine sensor node consults including itself should be odd for better attacking efficiency. To further analyze the attacks of NMBA, we compare it with IMBA and CMBA in terms of KL distance about attacking power. As we discussed above, IMBA is a special case of NMBA when . L out of fusion rule has been used for CMBA among the Byzantine sensors. And Byzantine sensors collaborate together to make decisions about the presence of target. If the attacking power is greater than 0.5, the FC can be blinded completely by any kinds of attacking strategies adopted by Byzantine attackers. Therefore, our analysis about detection performance is under the condition of . In Figures 8 and 9, we plot the of three attacking models against α in the case and , respectively. From the numerical results presented in Figures 8 and 9, we can see that the of NMBA is very close to CMBA and outperforms IMBA significantly. Though the performance of NMBA is very close to CMBA, the difference of KL distance between them varies with attacking power. In Figures 8 and 9, KL distance of CMBA is greater than that of NMBA in the region of and , respectively. However, CMBA performs better when α meets the condition of and in Figures 8 and 9, respectively. For CMBA, the blinding point C which is marked by black-square in Figures 8 and 9 is determined by the total number of Byzantine sensor nodes instead of M. For NMBA, the blinding point B which is marked by blue-square in Figures 8 and 9 is determined by the number of neighborhood nodes. For NMBA, M is larger and is smaller. Furthermore, and when M is equal to 9 and 25, respectively.
α at , and .
η
1
2
3
4
5
6
7
8
9
1
0.5000
2
0.5000
0.5000
3
0.5434
0.4310
0.5434
4
0.5952
0.4310
0.4310
0.5952
5
0.6469
0.4509
0.4042
0.4509
0.6469
6
0.6959
0.4785
0.4042
0.4042
0.4785
0.6959
7
0.7410
0.5100
0.4145
0.3913
0.4145
0.5100
0.7410
8
0.7814
0.5438
0.4298
0.3913
0.3913
0.4298
0.5438
0.7814
9
0.8171
0.5790
0.4484
0.3970
0.3844
0.3970
0.4484
0.5790
0.8171
at , and .
1/1
2/1
3/2
4/2
5/3
6/3
7/4
8/4
9/5
0.5000
0.5000
0.4310
0.4310
0.4042
0.4042
0.3913
0.3913
0.3844
Attacking power α versus η when , η varying from 1 to 9. Byzantine sensors have the smallest α when .
Optimal threshold η versus M, M varying from 1 to 9. The optimal threshold increases with the increment of M and it is always equal to .
versus M, M varying from 1 to 9 in condition of . monotonically decreases with M. It is clear that Byzantine attacker more easily blinds the FC when each Byzantine sensor has more neighborhood nodes.
versus M, M varying from 1 to 25 in condition of . monotonically decreases with M. It is clear that Byzantine attacker more easily blinds the FC when each Byzantine sensor has more neighborhood nodes.
KLD decreases monotonically with attacking power α when . KLD of IMBA decreases to 0 when . KLD of NMBA decreases to 0 when in the condition of . KLD of CMBA decreases to 0 when .
KLD decreases monotonically with attacking power α when . KLD of IMBA decreases to 0 when . KLD of NMBA decreases to 0 when in the condition of . KLD of CMBA decreases to 0 when .
4. Fusion Center Decision Strategy
In this section, let us solve the problem of identifying Byzantine attackers to enhance inference performance of the FC. In order to explain the problem well, we have defined three types of decision which include local/original decision, global decision, and global-final decision. As we discussed in Section 2, a decision matrix is formulated at the FC after K observations in a time window T at tth global-final decision making, . We let the FC make a corresponding global decision over vector of decision at jth observation. And a vector of global decision is formulated over , for any , . Majority vote which is simple and effective scheme is adopted to make a global-final decision over the vector , where “1” represents the presence of target and “0” represents the absence of target, respectively. However, we project our focus on designing a rule to construct vector of global decision . We propose a scheme of making global decision that the FC can adaptively adjust its threshold for to make a corresponding global decision . The information of elements in decision matrix is also utilized to estimate probability of miss detection and false alarm, respectively. In order to evaluate the fusion scheme, performance metric introduced in this work is the accuracy of fusion scheme in terms of identifying Byzantine sensors.
We define an intuitive distance between the global-final decision and local/original decisions as
Similarly, another intuitive distance is also defined as the following equation:
In (29), measures the degree of discrepancy between the global-final decision and K local/original decisions that are from ith sensor. Similarly, in (28) measures the degree of discrepancy between the global-final decision and N local/original decisions generated at jth observation. The distance is larger and the ith sensor is closer to behavior of Byzantine. On the contrary, the distance of is smaller and the probability of ith sensor being tagged as Byzantine attacker by the FC is lower. Similarly, when the distance of is larger, the decision generated at jth observation is worse. The FC regards the jth observation as excellent and we believe that the network performs well when is small. For simplicity, we let probability of miss detection equal probability of false alarm; that is, in the context of the attacks model of NMBA.
4.1. Scheme of Identifying Byzantine Attackers
If one sensor's local/original decision is different from global-final decision, it is labeled as Byzantine. It is worth mentioning that Honest sensors are classified probably into Byzantine group when they behave like Byzantine. Similarly, the Byzantine attackers can also be probably labeled as Honest. We use and to denote the total effective number of elements “0” and “1” in decision matrix, respectively. and vary with the order of j and take part in making global decision. Here, we represent (28) and (29) again as follows:
Suppose the network with N sensors including Byzantine and Honest, where the probability of miss detection and false-alarm is zero, that is, , and Byzantine attackers always know the true natural state. Attacking power brought by the attackers is estimated through the following expression:
where and are denoted as the total number of “0” and “1,” respectively.
Based on Proposition 1 and constrained by its conditions, we have the following equation for estimating the attacking power at the global decision making:
Taking the scenario of Byzantine attackers without knowledge about true natural state into consideration in practical application, we have the following.
Proposition 2.
Suppose the network of size N containing both Honest sensors and Byzantine sensor nodes, where decision matrix is made at tth global-final decision after N sensors taking K observations in the time window T. The network is not completely blinded by adversary. The estimation of least attacking power has a lower bound which can be expressed as
It is clear that and , . In (33), is used to compute the maximum distance of decisions between two certain vectors of observation which are from two sensors tagged as Honest at the th global decision making.
during the process of identifying Byzantine sensors. After estimating the attacking power, , the FC approximately knows how many sensors have been compromised by an adversary among sensors that participate in the jth global decision making. The FC then takes an action to identify Byzantine sensors to help the next global decision making. is defined as the set of identities of sensors that are tagged as Honest at the . These sensors will participate in the jth global decision making. It is clear that , . We define a sequence over , in which is used for presenting the element with order m, . If , then . The identity i is greater than l when if or when ; otherwise, , . The sequence can be expressed as
where matches only a specific identity. There are identities and . In order to find the sequence of , we define a function over :
where is an indicator function, and and .
The FC have obtained the approximate knowledge about the attacking power posed by the adversary at jth global decision making. The FC has also known each sensor's sequence in . Therefore, sensors whose sequences are dropped into the region from to are judged to be Byzantine attackers. The decisions from Byzantine attackers are removed at the global decision making. The identities of remaining sensors which are trusted by the FC at jth global decision making can be expressed as
and . The attacking power at tth global-final decision making is estimated by the following equation:
4.2. Rule of Decision Fusion Based on Dynamic Threshold
As we described in Section 2, the process of making a global-final decision is divided into three stages. A local/original decision matrix is generated at the first stage. A decision matrix is formulated after being probably attacked. A vector of global decision is computed and obtained over vectors of decision through applying a policy of fusion at the middle stage. At last, the decider at the FC has a global-final decision . In this paper, we put our focus on proposing an effective method of decision fusion to get an excellent vector of global decision , which can easily help to make a global-final decision at the last stage. The rule of decision fusion based on dynamic threshold is that threshold () for jth global decision making varies with j. The number of sensors which participate in jth global decision making is denoted as . In addition, always associates with tightly, which is expressed as
Here, q out of m fusion rule in [13] has been used for designing threshold , which is given by
where is a floor function and is the inverse function of which has been introduced in Section 2. β is a predefined constraint of miss detection. a and b are given by
respectively. Therefore, we get the jth global decision :
In order to evaluate the identifying scheme, we define , , , and as the accuracy of identifying Byzantine attackers. and are formulated as accuracy of Honest sensors tagged as Honest and Byzantine, respectively. Similarly, and are defined as accuracy of Byzantine sensors identified as Honest and Byzantine, respectively. We have the equations as follows:
Therein, is the number of Honest sensors identified as Byzantine and the number of Byzantine sensors identified as Honest is denoted as . and have been described in Section 2.
4.3. Numerical Results
In this subsection, we analyze the performance of scheme of identifying Byzantine attackers through numerical results. There are also 100 sensor nodes that contain Byzantine and Honest nodes which are considered in our simulation. Meanwhile, global-final decision making is performed 100 times in our simulation. The power at the reference point () is set as 200 and the signal amplitude arriving at the local sensor has been contaminated by AWGN with mean value and standard deviation . A target intrudes at position . The true attacking power is fixed to 0.3 and .
In Figures 10, 11, 12, and 13, we show that decreases following the increase of j and has stable tendency to a fixed level. The sum of and is always equal to and is greater than . and verge to and , respectively. And when j exceeds a certain number and when in the scheme of identifying Byzantine attackers. Threshold for global decision making varies with j and verges to constant value when is equal to zero. The attacking power is estimated after each global decision making. Part of sensors is judged to be Byzantine from sensors. The left sensors then participate in next global decision making. With the conducting of global decision making, there are no sensors tagged as Byzantine until jth reaches a certain number. At the FC, the total number of sensors tagged as Byzantine is computed as . We plot , , , and versus t in Figures 14 and 15 under different cases. As illustrated in Figures 14 and 15, is close to 0.3, which is black line with cross. And is close to 0.7, which is denoted as blue line with cross. and are presented as black line with star and blue line with star in the Figures 14 and 15, respectively. It is clear that few Byzantine sensors are judged to be Honest by this identifying scheme. In other words, the Byzantine attackers are almost found out. We also can find that the scheme performs well at identifying Byzantine attackers.
, , , , and are plotted versus j when .
, , , , and are plotted versus j when .
, , , , and are plotted versus j when .
, , , , and are plotted versus j when .
, , , and versus t. , , , and vibrate with t in different cases of M and K. is very close to 0.3 and vibrates under 0.7. is very close to 0 and vibrates above 0.
, , , and versus t. , , , and vibrate with t in different cases of M and K. is very close to 0.3 and vibrates under 0.7. is very close to 0 and vibrates above 0.
5. Conclusion
We have divided the process of data fusion into three hierarchies/stages in this paper. In addition, two problems have been put forward at the first and second stage, respectively. At the first stage, we proposed neighborhood malicious Byzantine attacks model. Distributed detection under neighborhood malicious Byzantine attacks has been taken into consideration. We have shown that NMBA is an intelligent strategy adopted by an adversary. The attacking performance of NMBA has also been analyzed. We have also proved that attacking effect of NMBA matches with CMBA's when the attacking power is lower 0.3844 and NMBA always outperforms IMBA in any case. It has been analyzed that data fusion is incapable when the attacking power enters the blinding region and the closed-form expression for blinding region has been derived. At the second stage, a data fusion rule based on dynamic threshold has been put forward and we have proposed an effective way of identifying Byzantine attackers. Consequently, we have shown that most Byzantine attackers are identified through the scheme and significant improvement of performance of this scheme in terms of accuracy is obtained. Based on the scheme of identifying Byzantine attackers, a data fusion scheme with dynamic threshold has been explored at this stage.
Footnotes
Appendices
Conflict of Interests
The authors declare that there is no conflict of interests regarding the publication of this paper.
Acknowledgments
The authors specifically acknowledge the financial support through the National Science Foundation of China (Grant no. 61001086), the Fundamental Research Funds for the Central University (Grant no. ZYGX2011X004), and the project Sponsored by Academic Training Funds, University of Electronic Science and Technology of China (Grant no. 201506075013).
References
1.
ChamberlandJ.-F.VeeravalliV. V.Wireless sensors in distributed detection applicationsIEEE Signal Processing Magazine2007243162510.1109/msp.2007.3615982-s2.0-34249727076
2.
LamportL.ShostakR.PeaseM.The byzantine generals problemACM Transactions on Programming Languages and Systems19824338240110.1145/357172.357176
3.
ChenH.JilkovV. P.LiX. R.Optimizing decision fusion in the presence of byzantine dataProceedings of the 17th International Conference on Information FusionJuly 2014182-s2.0-84910678253
4.
StoicaP.NehoraiA.Performance study of conditional and unconditional direction-of-arrival estimationIEEE Transactions on Acoustics, Speech, and Signal Processing199038101783179510.1109/29.60109ZBL0732.620982-s2.0-0025503031
5.
LiuD.LiuK.MaY.YuJ.Joint TOA and DOA localization in indoor environment using virtual stationsIEEE Communications Letters20141881423142610.1109/LCOMM.2014.23330062-s2.0-84906284041
6.
AlthunibatS.GranelliF.An objection-based collaborative spectrum sensing for cognitive radio networksIEEE Communications Letters20141881291129410.1109/LCOMM.2014.23298442-s2.0-84906235089
7.
LuX.WangP.NiyatoD.HossainE.Dynamic spectrum access in cognitive radio networks with RF energy harvestingIEEE Wireless Communications201421310211010.1109/MWC.2014.68450542-s2.0-84903763704
8.
MaranoS.MattaV.TongL.Distributed detection in the presence of Byzantine attacksIEEE Transactions on Signal Processing2009571162910.1109/TSP.2008.20073352-s2.0-58649109373
9.
MaranoS.MattaV.TongL.Distributed inference in the presence of byzantine sensorsProceedings of the 40th Asilomar Conference on Signals, Systems, and Computers (ACSSC '06)November 2006Pacific Grove, Calif, USA28128410.1109/acssc.2006.3566322-s2.0-44049083063
10.
VempatyA.OzdemirO.AgrawalK.ChenH.VarshneyP. K.Localization in wireless sensor networks: byzantines and mitigation techniquesIEEE Transactions on Signal Processing20136161495150810.1109/tsp.2012.22363252-s2.0-84875028178
11.
RawatA. S.AnandP.ChenH.VarshneyP. K.Collaborative spectrum sensing in the presence of byzantine attacks in cognitive radio networksIEEE Transactions on Signal Processing201159277478610.1109/tsp.2010.20912772-s2.0-78651372721
12.
HeX. F.DaiH. Y.NingP.A Byzantine attack defender: the conditional frequency checkProceedings of the IEEE International Symposium on Information Theory (ISIT '12)July 2012Cambridge, Mass, USAIEEE97597910.1109/isit.2012.62847092-s2.0-84867514395
13.
AbdelhakimM.LightfootL. E.RenJ.LiT.Distributed detection in mobile access wireless sensor networks under byzantine attacksIEEE Transactions on Parallel and Distributed Systems201325495095910.1109/tpds.2013.742-s2.0-84896320313
14.
SoltanmohammadiE.OroojiM.Naraghi-PourM.Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodesIEEE Transactions on Information Forensics and Security20128120521510.1109/tifs.2012.22292742-s2.0-84872103134
15.
KailkhuraB.BrahmaS.HanY. S.VarshneyP. K.Distributed detection in tree topologies with byzantinesIEEE Transactions on Signal Processing201462123208321910.1109/TSP.2014.23217352-s2.0-84901437414
16.
TalaricoS.SchmidN. A.AlkhweldiM.ValentiM. C.Distributed estimation of a parametric field: algorithms and performance analysisIEEE Transactions on Signal Processing20146251041105310.1109/tsp.2013.22886842-s2.0-84894529462
17.
ZhangP.KohJ. Y.LinS.NevatI.Distributed event detection under byzantine attack in wireless sensor networksProceedings of the 9th IEEE International Conference on Intelligent Sensors, Sensor Networks and Information Processing (ISSNIP '14)April 2014SingaporeIEEE1610.1109/issnip.2014.68276092-s2.0-84903691900
18.
LiuQ.WangX.RaoN. S. V.Fusion of state estimates over long-haul sensor networks with random loss and delayIEEE/ACM Transactions on Networking201523264465610.1109/tnet.2014.23031232-s2.0-84894256113
19.
El-AyadiM. H.Nonstochastic adaptive decision fusion in distributed-detection systemsIEEE Transactions on Aerospace and Electronic Systems20023841158117110.1109/taes.2002.11457402-s2.0-0036821520
20.
LaxhammarR.FalkmanG.Online learning and sequential anomaly detection in trajectoriesIEEE Transactions on Pattern Analysis and Machine Intelligence20133661158117310.1109/tpami.2013.1722-s2.0-84901845356
21.
ChenY.YangJ.TrappeW.MartinR. P.Detecting and localizing identity-based attacks in wireless and sensor networksIEEE Transactions on Vehicular Technology20105952418243410.1109/tvt.2010.20449042-s2.0-77953789262
22.
NiuR.VarshneyP. K.Target location estimation in sensor networks with quantized dataIEEE Transactions on Signal Processing200654124519452810.1109/TSP.2006.8820822-s2.0-33947187995
23.
CoverT. M.ThomasJ. A.Elements of Information Theory1991New York, NY, USAJohn Wiley & Sons10.1002/0471200611
24.
KullbackS.Information Theory and Statistics1997New York, NY, USADoverMR1461541