Distributed Detection with Multiple Sensors in the Presence of Sybil Attacks

被引:1
|
作者
Hashlamoun, Wael [1 ]
Brahma, Swastik [2 ]
Varshney, Pramod K. [3 ]
机构
[1] Birzeit Univ, Dept ECE, Birzeit, Palestine
[2] Univ Cincinnati, Dept CS, Cincinnati, OH 45221 USA
[3] Syracuse Univ, Dept EECS, Syracuse, NY 13244 USA
关键词
Sensor Networks; Distributed Detection; Sybil Attack; Data Falsification; Game Theory; INFERENCE;
D O I
10.1109/GLOBECOM48099.2022.10001514
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
This paper considers the problem of distributed detection in the presence of a Sybil attack where a malicious sensor node can send multiple falsified decisions using multiple fake identities to a Fusion Center (FC) to degrade its decision-making performance. We study the problem under the Neyman-Pearson (NP) setup. We find that, due to the Sybil attack, the decisions received at the FC become correlated and that the degree of correlation is dependent on the number of fake identities used. The paper characterizes the optimal Sybil attack that blinds the FC, i.e., makes the FC incapable of making an informed decision. We find that if the sum of the local detection and false alarm probabilities of the sensor nodes is 1, the FC can be made blind when at least 50% of the decisions are sent using fake identities. However, if this condition is not met, then all decisions would have to be sent using fake identities in order to blind the FC. The paper also investigates strategic interactions between the FC and the Sybil attacker using Game Theory and proves the existence of a Nash Equilibrium (NE). Numerical results are presented to gain important insights.
引用
收藏
页码:2770 / 2775
页数:6
相关论文
共 50 条
  • [41] Sybil Attacks and Their Defenses in the Internet of Things
    Zhang, Kuan
    Liang, Xiaohui
    Lu, Rongxing
    Shen, Xuemin
    IEEE INTERNET OF THINGS JOURNAL, 2014, 1 (05): : 372 - 383
  • [42] A Survey of Techniques to Prevent Sybil Attacks
    John, RincyMedayil
    Cherian, Jacob P.
    Kizhakkethottam, Jubilant J.
    PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON SOFT-COMPUTING AND NETWORKS SECURITY (ICSNS 2015), 2015,
  • [43] A new multiple decisions fusion rule for targets detection in multiple sensors distributed detection systems with data fusion
    Aziz, Ashraf M.
    INFORMATION FUSION, 2014, 18 : 175 - 186
  • [44] Detection of DoS attacks using intrusion detection sensors
    Ramakrishna, P
    Maarof, MA
    APOC 2002: ASIA-PACIFIC OPTICAL AND WIRELESS COMMUNICATIONS; NETWORK DESIGN AND MANAGEMENT, 2002, 4909 : 69 - 80
  • [45] Robust Detection in the Presence of Integrity Attacks
    Mo, Yilin
    Hespanha, Joao
    Sinopoli, Bruno
    2012 AMERICAN CONTROL CONFERENCE (ACC), 2012, : 3541 - 3546
  • [46] Resilient Detection in the Presence of Integrity Attacks
    Mo, Yilin
    Hespanha, Joao P.
    Sinopoli, Bruno
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (01) : 31 - 43
  • [47] Detection of communication attacks on spatially distributed systems with multiple interconnected actuator/sensor pairs
    Demetriou, Michael A.
    2018 IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2018, : 2896 - 2901
  • [48] Multiple Time Series Fisher Periodicity Test for the Detection of the Distributed New Shrew Attacks
    Cotae, Paul
    Kang, Myong
    Velazquez, Alexander
    2016 INTERNATIONAL CONFERENCE ON COMMUNICATIONS (COMM 2016), 2016, : 9 - 14
  • [49] Collaborative Detection and Prevention of Sybil Attacks against RPL-Based Internet of Things
    Khan, Muhammad Ali
    Bin Rais, Rao Naveed
    Khalid, Osman
    CMC-COMPUTERS MATERIALS & CONTINUA, 2023, 77 (01): : 827 - 843
  • [50] P2DAP - Sybil Attacks Detection in Vehicular Ad Hoc Networks
    Zhou, Tong
    Roy, Romit
    Ning, Choudhury Peng
    Chakrabarty, Krishnendu
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2011, 29 (03) : 582 - 594