Binary hypothesis testing with byzantine sensors: Fundamental tradeoff between security and efficiency

X Ren, J Yan, Y Mo - IEEE Transactions on Signal Processing, 2018 - ieeexplore.ieee.org
IEEE Transactions on Signal Processing, 2018ieeexplore.ieee.org
This paper studies binary hypothesis testing based on measurements from a set of sensors,
a subset of which can be compromised by an attacker. The measurements from a
compromised sensor can be manipulated arbitrarily by the adversary. The asymptotic
exponential rate, with which the probability of error goes to zero, is adopted to indicate the
detection performance of a detector. In practice, we expect the attack on sensors to be
sporadic, and therefore the system may operate with all the sensors being benign for an …
This paper studies binary hypothesis testing based on measurements from a set of sensors, a subset of which can be compromised by an attacker. The measurements from a compromised sensor can be manipulated arbitrarily by the adversary. The asymptotic exponential rate, with which the probability of error goes to zero, is adopted to indicate the detection performance of a detector. In practice, we expect the attack on sensors to be sporadic, and therefore the system may operate with all the sensors being benign for an extended period of time. This motivates us to consider the tradeoff between the detection performance of a detector, i.e., the probability of error, when the attacker is absent (defined as efficiency) and the worst case detection performance when the attacker is present (defined as security). We first provide the fundamental limits of this tradeoff, and then propose a detection strategy that achieves these limits. We then consider a special case, where there is no tradeoff between security and efficiency. In other words, our detection strategy can achieve the maximal efficiency and the maximal security simultaneously. Two extensions of the secure hypothesis testing problem are also studied and fundamental limits and achievability results are provided: first, a subset of sensors, namely “secure” sensors, are assumed to be equipped with better security countermeasures and hence are guaranteed to be benign; and second, detection performance with unknown number of compromised sensors. Numerical examples are given to illustrate the main results.
ieeexplore.ieee.org
以上显示的是最相近的搜索结果。 查看全部搜索结果