Académique Documents
Professionnel Documents
Culture Documents
Leonard E. Lightfoot*
Tongtong Li
Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI 48824, USA.
*Air Force Research Laboratory, Wright-Patterson Air Force Base, Dayton, OH, 45433 USA.
AbstractIn this paper, Byzantine attacks in wireless sensor
networks with mobile access (SENMA) points is considered,
where a portion of the active sensors are compromised to
send false information. One effective method to combat with
Byzantine attacks is the q-out-of-m scheme, where the sensing
decision is based on q sensing reports out of m polled nodes.
In this paper, first, by exploiting the approximately linear
relationship between the scheme parameters and the network
size, we propose a simplified q-out-of-m scheme which can
greatly reduce the computational complexity, and at the same
time keeping good performance. We show that for a fixed
percentage of malicious sensors, the detection accuracy of the
simplified q-out-of-m scheme increases almost exponentially as
the network size increases. Second, we propose a simple but
effective method to detect the malicious sensors before decision
making. The performance of the proposed approach is evaluated
under both static and dynamic attacking strategies. It is observed
that with the pre-detection procedure, the performance of the qout-of-m scheme can be improved significantly under various
attacking strategies. Simulation results are provided to illustrate
the effectiveness of the proposed approaches.
Index TermsByzantine attacks, data fusion, wireless sensor
networks.
I. I NTRODUCTION
Wireless sensor networks have found use in a variety
of different applications including military, health and environmental monitoring [1], [2]. Many of these applications
require secure and trusted communications, and have attracted
significant attentions from the research community [3]. However, incorporating security into these wireless sensors is
challenging due to the limited memory, processing capability,
and restricted energy supply. These constraints motivated the
creation of a new architecture known as sensor networks with
mobile access (SENMA) that was proposed in [4] [5]. SENMA
provides an energy efficient architecture, where mobile access
points collect data acquired by the sensors and do most of the
processing required [6].
Wireless sensor networks are vulnerable to Byzantine attacks, where the adversary has full control over some of
the authenticated nodes and can perform arbitrary behavior
to disrupt the system [7]. The existence of malicious nodes
in the network can severely disrupt the networks operation.
Furthermore, if the sensing reports represents a hard-decision
(yes or no), it has been shown that using the OR rule
(meaning that: if one of the sensor reports a yes, then the
decision is yes; otherwise, if all sensor reports a no, then
the decision is no.) to obtain the final sensing decision leads
810
s.t. Qm (m, q) ;
s.t. 1 q m n; q, m N.
nmd
(2)
0,
if n k < q;
min(k,mq)
md
md
d,md
Qd =
Pk,nk
Pdi (1 Pd )mdi ,
i=q
d=max(0,
m+kn)
if n k q.
(5)
811
Qf =
d,md
Pk,nk
md
i=qd
d=max(0,
m+kn)
md
Pfi (1 Pf )(mdi) ,
i
if k q
if m + k n > q
1,
min(k,m)
d,md
Pk,nk
d=q
q1
d,md
Pk,nk
md
i=qd
d=max(0,
m+kn)
md
Pfi (1 Pf )mdi ,
i
50
if
(3)
k>q and
m+knq .
30
k/n=13%
k/n=20%
k/n=27%
45
k/n=13%
k/n=20%
k/n=27%
25
40
35
20
qo
mo
30
15
25
20
10
15
5
10
5
10
15
20
25
Fig. 1.
30
n
35
40
45
0
10
50
2
Pf
qk
Qf exp
1 (m k)
.
(7)
Pf (m k)
3
2
(C + Bn1 )
Qf exp
(8)
An1
where A, B and C are constants such that:
3Pf (1 )
(S() Pf (1 )) 1
S() Pf (1 )
25
Fig. 2.
i=qk
20
Optimal m vs. n
15
30
n
35
40
45
50
Optimal q vs. n
qo no S() + Pf .
n1 n1
Pdi (1 Pd )n1 n1 i . (9)
Qm =
i
i=q
n1
812
(10)
The ideal detection approach is complex and require searching over all possible sets of D. Hence, we propose a simpler,
yet effective, method to detect malicious nodes and improve
the overall performance. In the proposed approach, we use
two counters for each node at the mobile access point. These
counters are updated after each sensing period by comparing
the final decision (using q-out-of-m rule) with the individual
sensing reports. The first counter for node i is denoted by Ti,o
and it represents the number of times node i sends 0 when
the final decision is 1. The second counter Ti,1 represents the
number of times node i sends 1 when the final decision is
T
T
0. If N is the observation time, then Ni,o and Ni,1 would be
indications for the benign nodes miss detection and the false
T
alarm rates, respectively. Hence, if Ni,o is greater than Pm +
Ti,1
or N is greater than Pf + , where is a considerably small
value, then the corresponding nodes report is discarded from
the next decision process and m will be updated accordingly.
T
When the observation time is not long enough, Ni,o and
Ti,1
N may not be a good approximation for the actual miss
detection and false alarm rates. In this case benign nodes could
be regarded as malicious or vice versa. To avoid this case, we
assume a maximum percentage for malicious nodes to be 30%.
If the ratio of the discarded nodes exceeds this percentage, the
scheme keeps updating the counters for each node without
discarding any sensing report. Eventually, benign nodes will
T
T
have their counters ( Ni,o and Ni,1 ) updated, and would be
better distinguished from malicious nodes that intentionally
send false reports with higher probabilities. This method of
adapting m by detecting the untrusted nodes is summarized
in table I. It is noted that dynamic attacks take longer time
to be identified compared to static attacks. Simulations will
show that this simple malicious detection approach improves
the performance significantly.
TABLE I
M ALICIOUS NODE DETECTION A LGORTIHM
In the N th sensing period, where N is sensing period index, do:
for i from 1 to n
if decision of node i is not equal to the final q-out-of-m decision
check if node i reports 0 and the final decision is 1
increment Ti,o
otherwise check if node i report 1 and the final decision is 0
increment Ti,1
end if
end if
Ti,o
Ti,1
if N
Pm + or N
Pf +
discard the reports of node i, and hence m is decremented
end if
end for
if the number of discarded nodes 30%
dont discard any reports. i.e. keep m = n, but save Ti,1 and Ti,o i
end
(12)
813
10
10
10
Qf
10
10
10
10
10
20
30
40
50
60
n
70
80
90
100
Fig. 4. False alarm rate vs. network size with and without using malicious
node detection.
10
10
10
10
Qm
10
10
0.9
10
0.8
7
10
CDF
0.7
0.6
20
Fig. 5.
30
40
50
60
n
70
80
90
100
0.5
0.4
0.3
0.2
0.1
0.1
0.2
0.3
0.4
0.5
Pa
0.6
0.7
0.8
0.9
VII. C ONCLUSIONS
In this paper, by exploiting the approximately linear relationship between the scheme parameters and the network
size, we proposed a simplified q-out-of-m fusion approach
for final decision making in the SENMA architecture. The
814
R EFERENCES
[1] A. Bharathidasas and V. Anand, Sensor networks: An overview,
Technical report, Dept. of Computer Science, University of California
at Davis, 2002.
[2] C. Chong and S. Kumar, Sensor networks: evolution, opportunities, and
challenges, Proceedings of the IEEE, vol. 91, no. 8, pp. 1247 2056,
aug. 2003.
[3] C. Karlof, N. Sastry, and D. Wagner, Tinysec: a link layer security
architecture for wireless sensor networks, in Proceedings of the 2nd
international conference on Embedded networked sensor systems, ser.
SenSys 04. New York, NY, USA: ACM, 2004, pp. 162175. [Online].
Available: http://doi.acm.org/10.1145/1031495.1031515
[4] L. Tong, Q. Zhao, and S. Adireddy, Sensor networks with mobile
agents, in Military Communications Conference, MILCOM 2003, IEEE,
vol. 1, oct. 2003, pp. 688 693.
[5] S. Marano, V. Matta, and L. Tong, Distributed detection in the presence
of byzantine attack in large wireless sensor networks, in Military
Communications Conference, MILCOM 2006, IEEE, oct. 2006, pp. 1
4.
[6] G. Mergen, Z. Qing, and L. Tong, Sensor networks with mobile
access: Energy and capacity considerations, IEEE Transactions on
Communications,, vol. 54, no. 11, pp. 2033 2044, nov. 2006.
[7] B. Awerbuch, R. Curtmola, H. D., N.-R. C., and R. H., Mitigating
byzantine attacks in ad hoc wireless networks, Technical report version
1, mar. 2004.
[8] H. Wang, L. Lightfoot, and T. Li, On phy-layer security of cognitive
radio: Collaborative sensing under malicious attacks, 2010 44th Annual
Conference on Information Sciences and Systems (CISS), pp. 1 6, mar.
2010.
[9] M. Abdelhakim, L. Zhang, J. Ren, and T. Li, Cooperative sensing
in cognitive networks under malicious attack, in IEEE International
Conference on Acoustics Speech and Signal Processing (ICASSP), 2011,
pp. 3004 3007.
[10] M. Mitzenmacher and E. Upfal, Probability and computing randomized
algorithms and probabilistic analysis. Cambridge Univ. Press, 2009.
[11] W. Wang, H. Li, Y. Sun, and Z. Han, Catchit: Detect malicious
nodes in collaborative spectrum sensing, in Global Telecommunications
Conference, 2009. GLOBECOM 2009. IEEE, 2009, pp. 1 6.
815