2013 IEEE International Conference on Acoustics, Speech and Signal Processing 2013
DOI: 10.1109/icassp.2013.6638193
|View full text |Cite
|
Sign up to set email alerts
|

Optimal distributed detection in the presence of Byzantines

Abstract: This paper considers the problem of optimal distributed detection with independent identical sensors in the presence of Byzantine attacks. By considering the attacker to be strategic in nature, we address the issue of designing the optimal fusion rule and the local sensor thresholds that minimize the probability of error at the fusion center (FC). We first consider the problem of finding the optimal fusion rule under the constraint of fixed local sensor thresholds and fixed Byzantine strategy. Next, we conside… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
31
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
3
3
1

Relationship

2
5

Authors

Journals

citations
Cited by 39 publications
(33 citation statements)
references
References 13 publications
2
31
0
Order By: Relevance
“…As opposed to [10], due to the particular characteristics of the setup studied in [6], in some cases it is possible for the decision fusion center to make reliable decisions even when the number of Byzantines exceeds the number of honest nodes. The works that most closely resemble the present paper are [1], [11], which generalize the analysis carried out in [10]. In these works the authors consider the case of corrupted nodes, even if at the end the nodes act as in the case of corrupted reports, since the Byzantines do not take advantage of the knowledge of the observed sequences x i .…”
Section: Prior Work and Contributionmentioning
confidence: 86%
See 3 more Smart Citations
“…As opposed to [10], due to the particular characteristics of the setup studied in [6], in some cases it is possible for the decision fusion center to make reliable decisions even when the number of Byzantines exceeds the number of honest nodes. The works that most closely resemble the present paper are [1], [11], which generalize the analysis carried out in [10]. In these works the authors consider the case of corrupted nodes, even if at the end the nodes act as in the case of corrupted reports, since the Byzantines do not take advantage of the knowledge of the observed sequences x i .…”
Section: Prior Work and Contributionmentioning
confidence: 86%
“…A first attempt to cast the decision fusion process under byzantine attacks into a game-theoretic framework can be found in [11]. In that paper, the FC is given the possibility of setting the local sensor threshold for the hypothesis testing problem at the nodes and the fusion rule, while the Byzantines can choose the flipping probability P mal .…”
Section: B the Decision Fusion Game: Definitionmentioning
confidence: 99%
See 2 more Smart Citations
“…The robustness of distributed detection systems against attacks is of utmost importance for the functioning of distributed detection systems. The problem of optimal distributed detection with independent identical sensors in the presence of Byzantine attacks is considered in [15]. By considering an attacker to be strategic in nature, we address the issue of designing the optimal fusion rule and the local sensor thresholds that minimize the probability of error at the fusion center (FC).…”
Section: Distributed Inference In the Presence Of Byzantine (Unreliabmentioning
confidence: 99%