TY - JOUR
T1 - Data injection attacks in randomized gossiping
AU - Gentz, Reinhard
AU - Wu, Sissi Xiaoxiao
AU - Wai, Hoi To
AU - Scaglione, Anna
AU - Leshem, Amir
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2016
Y1 - 2016
N2 - The subject of this paper is the detection and mitigation of data injection attacks in randomized average consensus gossip algorithms. It is broadly known that the main advantages of randomized average consensus gossip are its fault tolerance and distributed nature. Unfortunately, the flat architecture of the algorithm also increases the attack surface for a data injection attack. Even though we cast our problem in the context of sensor network security, the attack scenario is identical to existing models for opinion dynamics (the so-called DeGroot model) with stubborn agents steering the opinions of the group toward a final state that is not the average of the network initial states. We specifically propose two novel strategies for detecting and locating attackers and study their detection and localization performance numerically and analytically. Our detection and localization methods are completely decentralized and, therefore, nodes can directly act on their conclusions and stop receiving information from nodes identified as attackers. As we show by simulation, the network can often recover in this fashion, leveraging the resilience of randomized gossiping to reduced network connectivity.
AB - The subject of this paper is the detection and mitigation of data injection attacks in randomized average consensus gossip algorithms. It is broadly known that the main advantages of randomized average consensus gossip are its fault tolerance and distributed nature. Unfortunately, the flat architecture of the algorithm also increases the attack surface for a data injection attack. Even though we cast our problem in the context of sensor network security, the attack scenario is identical to existing models for opinion dynamics (the so-called DeGroot model) with stubborn agents steering the opinions of the group toward a final state that is not the average of the network initial states. We specifically propose two novel strategies for detecting and locating attackers and study their detection and localization performance numerically and analytically. Our detection and localization methods are completely decentralized and, therefore, nodes can directly act on their conclusions and stop receiving information from nodes identified as attackers. As we show by simulation, the network can often recover in this fashion, leveraging the resilience of randomized gossiping to reduced network connectivity.
KW - Attack detection
KW - data injection attack
KW - decentralized learning
KW - randomized gossip protocol
UR - http://www.scopus.com/inward/record.url?scp=85028388358&partnerID=8YFLogxK
U2 - 10.1109/tsipn.2016.2614898
DO - 10.1109/tsipn.2016.2614898
M3 - ???researchoutput.researchoutputtypes.contributiontojournal.article???
AN - SCOPUS:85028388358
SN - 2373-776X
VL - 2
SP - 523
EP - 538
JO - IEEE Transactions on Signal and Information Processing over Networks
JF - IEEE Transactions on Signal and Information Processing over Networks
IS - 4
M1 - 7581021
ER -