{"title":"Detection of Data Injection Attacks on Decentralized Statistical Estimation","authors":"O. Shalom, Amir Leshem, A. Scaglione, A. Nedić","doi":"10.1109/ICSEE.2018.8646074","DOIUrl":null,"url":null,"abstract":"This paper describes a distributed statistical estimation problem, corresponding to a network of agents. The network may be vulnerable to data injection attacks, in which the attackers’ main goal is to steer the network’s final state to a state of their choice. We show that the detection metric of the straightforward attack scheme proposed by Wu et. at in [1], is vulnerable to a more sophisticated attack. To overcome this attack we propose a novel metric that can be computed locally by each agent to detect the presence of an attacker in the network, as well as a metric that localizes the attackers in the network. We conclude the paper with simulations supporting our findings.","PeriodicalId":254455,"journal":{"name":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","volume":"16 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"4","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 IEEE International Conference on the Science of Electrical Engineering in Israel (ICSEE)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICSEE.2018.8646074","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 4
Abstract
This paper describes a distributed statistical estimation problem, corresponding to a network of agents. The network may be vulnerable to data injection attacks, in which the attackers’ main goal is to steer the network’s final state to a state of their choice. We show that the detection metric of the straightforward attack scheme proposed by Wu et. at in [1], is vulnerable to a more sophisticated attack. To overcome this attack we propose a novel metric that can be computed locally by each agent to detect the presence of an attacker in the network, as well as a metric that localizes the attackers in the network. We conclude the paper with simulations supporting our findings.