Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
Secure Detection: Performance Metric and Sensor Deployment Strategy
KTH, School of Electrical Engineering (EES), Centres, ACCESS Linnaeus Centre. Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore.
Nanyang Technol Univ, Sch Elect & Elect Engn, Singapore 639798, Singapore..
2018 (English)In: IEEE Transactions on Signal Processing, ISSN 1053-587X, E-ISSN 1941-0476, Vol. 66, no 17, p. 4450-4460Article in journal (Refereed) Published
Abstract [en]

This paper studies how to deploy sensors in the context of detection in adversarial environments. A fusion center is performing a binary hypothesis testing based on measurements from remotely deployed heterogeneous sensors. An attacker may compromise some of the deployed sensors, which send arbitrary measurements to the fusion center. The problems of interest are: to characterize the performance of the system under attack and, thus, develop a performance metric; and to deploy sensors within a cost budget, such that the proposed performance metric is maximized. In this paper, we first present a performance metric by formulating the detection in adversarial environments in a game theoretic way. A Nash equilibrium pair of the detection algorithm and attack strategy, with the deployed sensors given, is provided and the corresponding detection performance is adopted as the performance metric. We then show that the optimal sensor deployment can be determined approximately by solving a group of unbounded knapsack problems. We also show that the performance metric gap between the optimal sensor deployment and the optimal one with sensors being identical is within a fixed constant for any cost budget. The main results are illustrated by numerical examples.

Place, publisher, year, edition, pages
Institute of Electrical and Electronics Engineers (IEEE), 2018. Vol. 66, no 17, p. 4450-4460
Keywords [en]
Secure detection, byzantine attacks, sensor deployment, game
National Category
Signal Processing
Identifiers
URN: urn:nbn:se:kth:diva-233269DOI: 10.1109/TSP.2018.2853110ISI: 000440688400001Scopus ID: 2-s2.0-85049444227OAI: oai:DiVA.org:kth-233269DiVA, id: diva2:1240326
Funder
Knut and Alice Wallenberg FoundationSwedish Research Council
Note

QC 20180821

Available from: 2018-08-21 Created: 2018-08-21 Last updated: 2018-08-21Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Search in DiVA

By author/editor
Ren, Xiaoqiang
By organisation
ACCESS Linnaeus Centre
In the same journal
IEEE Transactions on Signal Processing
Signal Processing

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 7 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf