• DocumentCode
    112018
  • Title

    Distributed Detection in Tree Networks: Byzantines and Mitigation Techniques

  • Author

    Kailkhura, Bhavya ; Brahma, Swastik ; Dulek, Berkan ; Han, Yunghsiang S. ; Varshney, Pramod K.

  • Author_Institution
    Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
  • Volume
    10
  • Issue
    7
  • fYear
    2015
  • fDate
    Jul-15
  • Firstpage
    1499
  • Lastpage
    1512
  • Abstract
    In this paper, the problem of distributed detection in tree networks in the presence of Byzantines is considered. Closed form expressions for optimal attacking strategies that minimize the miss detection error exponent at the fusion center (FC) are obtained. We also look at the problem from the network designer´s (FC´s) perspective. We study the problem of designing optimal distributed detection parameters in a tree network in the presence of Byzantines. Next, we model the strategic interaction between the FC and the attacker as a leader-follower (Stackelberg) game. This formulation provides a methodology for predicting attacker and defender (FC) equilibrium strategies, which can be used to implement the optimal detector. Finally, a reputation-based scheme to identify Byzantines is proposed and its performance is analytically evaluated. We also provide some numerical examples to gain insights into the solution.
  • Keywords
    computer network security; game theory; trees (mathematics); Byzantines attack; FC; Stackelberg game; attacking strategies; equilibrium strategies; fusion center; leader-follower game; miss detection error exponent; mitigation techniques; optimal distributed detection parameters; reputation-based scheme; tree networks distributed detection; Closed-form solutions; Detectors; Electronic mail; Games; Network topology; Probability distribution; Vectors; Byzantines; Distributed detection; data falsification; error exponent; leader-follower game; reputation based mitigation scheme; tree networks;
  • fLanguage
    English
  • Journal_Title
    Information Forensics and Security, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1556-6013
  • Type

    jour

  • DOI
    10.1109/TIFS.2015.2415757
  • Filename
    7065266