Distributed Detection with Multiple Sensors in the Presence of Sybil Attacks

被引:1
|
作者
Hashlamoun, Wael [1 ]
Brahma, Swastik [2 ]
Varshney, Pramod K. [3 ]
机构
[1] Birzeit Univ, Dept ECE, Birzeit, Palestine
[2] Univ Cincinnati, Dept CS, Cincinnati, OH 45221 USA
[3] Syracuse Univ, Dept EECS, Syracuse, NY 13244 USA
关键词
Sensor Networks; Distributed Detection; Sybil Attack; Data Falsification; Game Theory; INFERENCE;
D O I
10.1109/GLOBECOM48099.2022.10001514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of distributed detection in the presence of a Sybil attack where a malicious sensor node can send multiple falsified decisions using multiple fake identities to a Fusion Center (FC) to degrade its decision-making performance. We study the problem under the Neyman-Pearson (NP) setup. We find that, due to the Sybil attack, the decisions received at the FC become correlated and that the degree of correlation is dependent on the number of fake identities used. The paper characterizes the optimal Sybil attack that blinds the FC, i.e., makes the FC incapable of making an informed decision. We find that if the sum of the local detection and false alarm probabilities of the sensor nodes is 1, the FC can be made blind when at least 50% of the decisions are sent using fake identities. However, if this condition is not met, then all decisions would have to be sent using fake identities in order to blind the FC. The paper also investigates strategic interactions between the FC and the Sybil attacker using Game Theory and proves the existence of a Nash Equilibrium (NE). Numerical results are presented to gain important insights.
引用
收藏
页码:2770 / 2775
页数:6
相关论文
共 50 条
  • [31] Distributed Multiple Attacks Detection via Consensus AA-GMPHD Filter
    Yang, Chaoqun
    Cao, Xianghui
    He, Lidong
    Zhang, Heng
    IEEE TRANSACTIONS ON SYSTEMS MAN CYBERNETICS-SYSTEMS, 2023, 53 (12): : 7526 - 7536
  • [32] Privacy-preserving detection of Sybil attacks in vehicular ad hoc networks
    Zhou, Tong
    Choudhury, Romit Roy
    Ning, Peng
    Chakrabarty, Krishnendu
    2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 195 - +
  • [33] Using radio device fingerprinting for the detection of impersonation and Sybil attacks in wireless networks
    Sieka, Bartlomiej
    SECURITY AND PRIVACY IN AD-HOC AND SENSOR NETWORKS, 2006, 4357 : 179 - 192
  • [34] Asymptotically Optimum Distributed Estimation in the Presence of Attacks
    Zhang, Jiangfan
    Blum, Rick S.
    Lu, Xuanxuan
    Conus, Daniel
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (05) : 1086 - 1101
  • [35] Distributed inference in the presence of Byzantine sensors
    Marano, Stefano
    Matta, Vincenzo
    Tong, Lang
    2006 FORTIETH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-5, 2006, : 281 - +
  • [36] A Sybil Attack Detection Scheme based on ADAS Sensors for Vehicular Networks
    Lim, Kiho
    Islam, Tariqul
    Kim, Hyunbum
    Joung, Jingon
    2020 IEEE 17TH ANNUAL CONSUMER COMMUNICATIONS & NETWORKING CONFERENCE (CCNC 2020), 2020,
  • [37] Detection method to eliminate Sybil attacks in Vehicular Ad-hoc Networks
    Zhang, Zhaoyi
    Lai, Yingxu
    Chen, Ye
    Wei, Jingwen
    Wang, Yuhang
    AD HOC NETWORKS, 2023, 141
  • [38] Performance Evaluation and Detection of Sybil Attacks in Vehicular Ad-Hoc Networks
    Grover, Jyoti
    Kumar, Deepak
    Sargurunathan, M.
    Gaur, M. S.
    Laxmi, Vijay
    RECENT TRENDS IN NETWORK SECURITY AND APPLICATIONS, 2010, 89 : 473 - 482
  • [39] Towards Efficient Detection of Sybil Attacks in Location-based Social Networks
    Xu, Zhiwei
    Chen, Bo
    Meng, Xuying
    Liu, Limin
    2017 IEEE SYMPOSIUM SERIES ON COMPUTATIONAL INTELLIGENCE (SSCI), 2017, : 741 - 747
  • [40] Mitigating Sybil Attacks in Federated Learning
    Samy, Ahmed E.
    Girdzijauskas, Sarunas
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, ISPEC 2023, 2023, 14341 : 36 - 51