Please wait a minute...
Journal of ZheJiang University (Engineering Science)  2019, Vol. 53 Issue (3): 563-570    DOI: 10.3785/j.issn.1008-973X.2019.03.018
Computer Technology     
Performance analysis of distributed detection under sensing data falsification attack
Xiao-yan ZHENG(),Hui-fang CHEN*(),Lei XIE
College of Information Science and Electronic Engineering, Zhejiang University, Hangzhou 310027, China
Download: HTML     PDF(970KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

The performance of distributed detection in the presence of sensing data falsification (SDF) attack was studied for the security problem of distributed detection. A probabilistic inverse SDF attack model was defined to characterize the malicious behavior falsifying initial sensing data. Taking the detection probability, false-alarm probability and error probability as the performance metrics, closed-form performance expressions for consensus-based distributed detection with defined SDF attack model were derived, and the steady-state and transient-state performance of distributed detection under SDF attack was analyzed. Using the deflection coefficient as objective function, the blind condition was deduced, which is the attack strategy of malicious nodes to make distributed detection system invalid. Simulation results show that the system performance degradation is caused by the SDF attack and different attack parameters have effect on the performance of consensus-based distributed detection.



Key wordsdistributed detection      security      sensing data falsification (SDF) attack      consensus algorithm      deflection coefficient     
Received: 17 March 2018      Published: 04 March 2019
CLC:  TN 92  
Corresponding Authors: Hui-fang CHEN     E-mail: 21631151@zju.edu.cn;chenhf@zju.edu.cn
Cite this article:

Xiao-yan ZHENG,Hui-fang CHEN,Lei XIE. Performance analysis of distributed detection under sensing data falsification attack. Journal of ZheJiang University (Engineering Science), 2019, 53(3): 563-570.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2019.03.018     OR     http://www.zjujournals.com/eng/Y2019/V53/I3/563


感知数据错误化攻击下分布式检测的性能分析

针对分布式检测的安全问题,研究分布式检测中感知数据错误化(SDF)攻击及其对检测性能造成的影响. 定义一种概率型翻转攻击模型描述攻击者篡改初始感知数据的恶意行为. 以检测概率、虚警概率和错误概率为性能指标,推导在所提出的攻击模型下分布式系统检测性能的闭合表达式,进而分析SDF攻击下分布式检测系统的稳态性能和瞬态性能. 以偏移系数为目标函数,推导使分布式检测失效的盲化条件,即分布式系统无法检测出目标的真实状态时所对应的恶意节点攻击策略. 仿真结果表明:SDF攻击会恶化系统检测性能,且不同攻击参数会对检测性能造成不同程度的影响.


关键词: 分布式检测,  安全,  感知数据错误化(SDF)攻击,  一致性算法,  偏移系数 
Fig.1 Distributed detection network schematic diagram
Fig.2 Impact of different attack parameters on deflection coefficient
Fig.3 Impact of different attack parameters on error probability
Fig.4 Receiver operating characteristic (ROC) curves with different attack parameters
Fig.5 Probability of detection and probability of false alarm as functions of iteration steps without attack
Fig.6 Probability of detection and probability of false alarm as functions of iteration steps with attack
[1]   KAILKHURA B, HAN Y S, BRAHMA S, et al Distributed Bayesian detection in the presence of Byzantine Data[J]. IEEE Transactions on Signal Processing, 2015, 63 (19): 5250- 5263
doi: 10.1109/TSP.2015.2450191
[2]   STANKOVIC S S, ILIC N, STANKOVIC M S, et al Distributed change detection based on a consensus algorithm[J]. IEEE Transactions on Signal Processing, 2011, 59 (12): 5686- 5697
doi: 10.1109/TSP.2011.2168219
[3]   孙小静. 无线传感器网络中分布式检测的相关问题研究[D]. 南京: 东南大学, 2017.
SUN Xiao-jing. Some issues on distributed detection in wireless sensor network [D]. Nanjing: Southeast University, 2017.
[4]   LI Z, YU F R, HUANG M A distributed consensus-based cooperative spectrum-sensing scheme in cognitive radios[J]. IEEE Transactions on Vehicular Technology, 2010, 59 (1): 383- 393
doi: 10.1109/TVT.2009.2031181
[5]   ZHANG W, WANG Z, GUO Y, et al. Distributed cooperative spectrum sensing based on weighted average consensus [C] // IEEE GLOBECOM. Houston: IEEE, 2011: 1–6.
[6]   ALONSO-ROMAN D, BEFERULL-LOZANO B. Adaptive consensus-based distributed detection in WSN with unreliable links [C] // IEEE ICASSP. Shanghai: IEEE, 2016: 4438–4442.
[7]   GUO J, ROGERS U, LI X, et al Secrecy constrained distributed detection in sensor networks[J]. IEEE Transactions on Signal and Information Processing over Networks, 2018, 4 (2): 378- 391
doi: 10.1109/TSIPN.2017.2705479
[8]   ZHANG W, GUO Y, LIU H, et al Distributed consensus-based weight design for cooperative spectrum sensing[J]. IEEE Transactions on Parallel and Distributed Systems, 2015, 26 (1): 54- 64
doi: 10.1109/TPDS.2014.2307951
[9]   LIU S, ZHU H, LI S, et al. An adaptive deviation-tolerant secure scheme for distributed cooperative spectrum sensing [C] // IEEE GLOBECOM. Anaheim: IEEE, 2012: 603–608.
[10]   SADREAZAMI H, MOHAMMADI A, ASIF A, et al Distributed graph-based statistical approach for intrusion detection in cyber-physical systems[J]. IEEE Transactions on Signal and Information Processing over Networks, 2018, 4 (1): 137- 147
doi: 10.1109/TSIPN.2017.2749976
[11]   KAILKHURA B, BRAHMA S, VARSHNEY P K Data falsification attacks on consensus-based detection systems[J]. IEEE Transactions on Signal and Information Processing over Networks, 2017, 3 (1): 145- 158
doi: 10.1109/TSIPN.2016.2607119
[12]   米士超. 基于无线传感器网络的分布式估计及安全机制设计[D] 上海: 上海交通大学, 2015.
MI Shi-chao. Distributed estimation and security mechanism for wireless sensor networks [D]. Shanghai: Shanghai Jiao Tong University, 2015.
[13]   YAN Q, LI M, JIANG T, et al. Vulnerability and protection for distributed consensus-based spectrum sensing in cognitive radio networks [C] // IEEE INFOCOM. Orlando: IEEE, 2012: 900–908.
[14]   VOSOUGHI A, CAVALLARO J R, MARSHALL A Trust-aware consensus-inspired distributed cooperative spectrum sensing for cognitive radio ad hoc networks[J]. IEEE Transactions on Cognitive Communications and Networking, 2016, 2 (1): 24- 37
doi: 10.1109/TCCN.2016.2584080
[15]   GENTZ R, WU S X, WAI H T, et al Data injection attacks in randomized gossiping[J]. IEEE Transactions on Signal and Information Processing over Networks, 2016, 2 (4): 523- 538
[16]   ZHAO C, HE J, CHEN J Resilient consensus with mobile detectors against malicious attacks[J]. IEEE Transactions on Signal and Information Processing over Networks, 2018, 4 (1): 60- 69
doi: 10.1109/TSIPN.2017.2742859
[17]   WANG P, CHEN C, ZHU S, et al. An optimal reputation-based detection against SSDF attacks in industrial cognitive radio network [C] // IEEE ICCA. Ohrid: IEEE, 2017: 729–734.
[18]   FENG H, LIANG L, LEI H Distributed outlier detection algorithm based on credibility feedback in wireless sensor networks[J]. IET Communications, 2017, 11 (8): 1291- 1296
doi: 10.1049/iet-com.2016.0986
[19]   周明. 认知无线电网络合作频谱感知中的SSDF攻击及其防御机制[D]. 杭州: 浙江大学, 2016.
ZHOU Ming. SSDF attack and defense strategies in cooperative spectrum sensing of cognitive radio networks [D]. Hangzhou: Zhejiang University, 2016.
[1] Dong LI,Yu LU,Jun-qing YU. Security of source address validation improvement binding table in software defined network[J]. Journal of ZheJiang University (Engineering Science), 2020, 54(8): 1543-1549.
[2] Dong-xiang KE,Li-min PAN,Sen-lin LUO,Han-qing ZHANG. Android malicious behavior recognition and classification method based on random forest algorithm[J]. Journal of ZheJiang University (Engineering Science), 2019, 53(10): 2013-2023.
[3] WANG Hua, HAN Tong-yang, ZHOU Ke. KeyGraph-based community detection algorithm for public security intelligence[J]. Journal of ZheJiang University (Engineering Science), 2017, 51(6): 1173-1180.
[4] YOU Lu-jin, LU Xing-jian, HE Gao-qi. Research on sub-health in cloud environment[J]. Journal of ZheJiang University (Engineering Science), 2017, 51(6): 1181-1189.
[5] LI Xiao-dong, ZHU Yue-fei, LIU Sheng-li, XIAO Rui-qing. Permission-based Android application security evaluation method[J]. Journal of ZheJiang University (Engineering Science), 2017, 51(3): 590-597.
[6] FU Hong xun, ZHAO You qun, LIN Fen, DU Xian bin, NI Xin wei. Theoretical and experimental analysis on steady-state cornering properties of mechanical elastic wheel[J]. Journal of ZheJiang University (Engineering Science), 2017, 51(2): 344-349.
[7] JIA Chi qian, FENG Dong qin. Security assessment for industrial control systems based on fuzzy analytic hierarchy process[J]. Journal of ZheJiang University (Engineering Science), 2016, 50(4): 759-765.
[8] LIANG Yao, FENG Dong qin. Security risks assessment for physical layer of industrial control system based on attack gain[J]. Journal of ZheJiang University (Engineering Science), 2016, 50(3): 589-.
[9] CHEN Jian-hong, QIAO Qing, ZHANG Bao, WU Wen-jian, LI Wei, SHENG De-ren.
Critical pressure ratio characteristics of steam turbine governing stage
[J]. Journal of ZheJiang University (Engineering Science), 2014, 48(11): 2072-2079.
[10] ZHOU Tian-Shu, LI Jin-Song, YANG Yi-Bing, CHEN Yun-Ai, XUE Mo-Guo, DIAO Jun-Beng. Improvement of data authenticity assurance process
in regional health information system
[J]. Journal of ZheJiang University (Engineering Science), 2010, 44(8): 1484-1489.
[11] JIANG Li, CHEN Jian, BENG Ling-Di, CHEN Xiao-Beng. Security policy for information erasing and leaking in multithreaded codes[J]. Journal of ZheJiang University (Engineering Science), 2010, 44(5): 854-862.
[12] GU Chen-Jun, LIAO Yong-Jian, CHEN Gang-Sheng. Efficient identity-based encryption algorithm in wireless sensor networks[J]. Journal of ZheJiang University (Engineering Science), 2009, 43(8): 1396-1400.
[13] HUANG Yong, CHEN Xiao-Ping, CHEN Wen-Zhi. Dynamically modified union model combining confidentiality and integrity[J]. Journal of ZheJiang University (Engineering Science), 2009, 43(8): 1377-1382.