2017
DOI: 10.1109/tsp.2016.2626258
|View full text |Cite
|
Sign up to set email alerts
|

Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks

Abstract: Estimation of an unknown deterministic vector from quantized sensor data is considered in the presence of spoofing attacks which alter the data presented to several sensors. Contrary to previous work, a generalized attack model is employed which manipulates the data using transformations with arbitrary functional forms determined by some attack parameters whose values are unknown to the attacked system. For the first time, necessary and sufficient conditions are provided under which the transformations provide… Show more

Help me understand this report
View preprint versions

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
32
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 30 publications
(32 citation statements)
references
References 30 publications
(83 reference statements)
0
32
0
Order By: Relevance
“…Signal estimation and detection from quantized data continues to attract attention over the past years [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. In [1], a general result is developed and applied to obtain specific asymptotic expressions for the performance loss under uniform data quantization in several signal detection and estimation problems including minimum mean-squared error (MMSE) estimation, non-random point estimation, and binary signal detection.…”
Section: Introductionmentioning
confidence: 99%
“…Signal estimation and detection from quantized data continues to attract attention over the past years [1][2][3][4][5][6][7][8][9][10][11][12][13][14][15][16]. In [1], a general result is developed and applied to obtain specific asymptotic expressions for the performance loss under uniform data quantization in several signal detection and estimation problems including minimum mean-squared error (MMSE) estimation, non-random point estimation, and binary signal detection.…”
Section: Introductionmentioning
confidence: 99%
“…Update the decision statistic: V t ← max {V t−1 , 0} + v t . 9: end while 10: T G ← t, declare an FDIA.…”
Section: A Generalized Cusum Testmentioning
confidence: 99%
“…Adversarial (Byzantine) devices transmit falsified data to the fusion center to disrupt the inference process. References [14] and [15] address hypothesis testing under Byzantine attack (where the parameter may only take discrete values), and references [16] and [17] address estimation (where the parameter may take continuous values). The work on resilient decentralized inference in [14]- [17] restrict the adversary to follow probabilistic attack strategies and use this restriction to design resilient processing algorithms.…”
Section: Introductionmentioning
confidence: 99%
“…References [14] and [15] address hypothesis testing under Byzantine attack (where the parameter may only take discrete values), and references [16] and [17] address estimation (where the parameter may take continuous values). The work on resilient decentralized inference in [14]- [17] restrict the adversary to follow probabilistic attack strategies and use this restriction to design resilient processing algorithms. In this paper, we consider a stronger class of adversaries who may behave arbitrarily, unlike the restricted adversaries from [14]- [17] who must adhere to probabilistic strategies.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation