Documente Academic
Documente Profesional
Documente Cultură
I NTRODUCTION
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
Network Model
Base
Station
Aggregator Node/
Cluster Head
Aggregator Node/
Cluster Head
Cluster
Cluster
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
2.3
Adversary Model
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
s1
19.3612
19.3612
19.3612
s2
19.42
19.4102
19.42
s3
19.0084
19.0084
19.0084
sensor readings
s4
s5
18.5674
17.95
18.5478
21.282
17.117
21.3408
s6
22.153
21.347
20.813
s7
18.0088
18.0088
21.625
s8
20.4
20.4098
19.7924
aggregate values
round#
1
2
3
4
5
6
1
1.01E+01
2.38E+02
4.01E+02
3.31E+02
3.22E+02
1
1.34E+01
2.24E+03
2.96E+04
1.59E+06
6.47E+09
1
2.4896
5.7843
6.1705
6.02
5.9971
sensor weights
1
1
0.3282
0.4335
0.4381
0.328
0.446
0.3199
0.4433
0.3206
0.4428
0.3207
1
0.2581
0.2286
0.2267
0.2278
0.2279
1
0.3806
0.3412
0.3404
0.3403
0.3402
1
1.8413
1.4486
1.4116
1.4273
1.4297
t=1
19.3586
19.4008
19.4137
19.4192
19.42
19.42
t=2
19.6719
19.439
19.4052
19.4095
19.4102
19.4102
t=3
19.8097
19.4318
19.4139
19.4192
19.42
19.42
Reliable node
Reputation Value
Compromised node
Actual Value
Scenario 1:
Scenario 2:
Scenario 3:
Framework Overview
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
s1
19.7336
s2
19.6160
s3
19.7728
s4
20.2040
round#
1
2
3
4
5
6
7
8
1
6.68
64.21
156.81
141.35
127.57
121.61
120.91
1
8.17
130.29
549.28
454.18
379.24
349.49
346.06
1
6.27
53.13
117.50
107.37
98.16
94.12
93.64
1
3.48
13.36
19.13
18.44
17.76
17.44
17.40
sensor readings
s5
s6
20.4196
19.4494
sensor weights
1
1
2.74
11.41
8.56
872.81
11.35
8.1E+3
11.03
2.1E+4
10.72
1.7E+5
10.57
1.4E+7
10.55
1.0E+11
s7
20.1354
s8
19.0084
s9
13.2001
s10
13.5609
1
3.78
15.77
23.36
22.42
21.51
21.09
21.04
1
40.21
91.52
44.76
47.42
50.45
52.02
52.22
1
0.35
0.27
0.25
0.25
0.26
0.26
0.26
1
0.41
0.30
0.29
0.29
0.29
0.29
0.29
t=1
18.5097
19.3390
19.4811
19.4676
19.4536
19.4468
19.4460
19.4460
s1
19.7336
s2
19.6160
s3
19.7728
s4
20.2040
sensor readings
s5
s6
20.4196
19.4494
s7
20.1354
s8
13.2001
s9
13.5609
s10
18.4546
round#
1
2
3
1
0.6113
0.6113
1
0.7414
0.7414
1
0.5755
0.5755
1
0.3268
0.3268
sensor weights
1
1
0.2590
1.0106
0.2590
1.0105
1
0.3540
0.3540
1
0.0362
0.0362
1
0.0418
0.0418
1
6.25E+08
1.78E+16
number of sensors
xts
ets
Bias Estimation
Unbiasing Sensor
Readings
Variance
Estimation
t=1
18.4546
18.4546
18.4546
Iterative Filtering
Iterative Filtering
with Initial Values
bs
bias of sensor s
vs
variance of sensor s
xts = rt + ets
(1)
(i, j) =
1 X t
1 X t
1 X t
xi xtj =
ei
e
m t=1
m t=1
m t=1 j
3.2
Estimating Bias
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
subject to
n X
i1
X
bi bj
i=1 j=1
n
X
(i, j)
2
1
x
ts = xts bs
(2)
2
1 X t
x
i x
tj
m 1 t=1
(i, j) =
bi = 0.
(4)
i=1
n X
i1
X
bi bj
i=1 j=1
(i, j)
2
1
n
X
1 X
m 1 t=1
2
xti xtj (bi bj )
By (1) we have xti xtj = (rt + eti ) (rt + etj ) = eti etj ;
thus, we obtain
m
(i, j) =
2
2
1 X t
1 X t
e i bi +
ej bj
m 1 t=1
m 1 t=1
m
2 X t
ei bi etj bj
m 1 t=1
1 X t
e bi etj bj Cov(ei , ej ) = 0
m 1 t=1 i
and similarly
m
bi
(i, j) =
i=1
2 bi
2 bk = 2
d(i,k) ,
d(i,k)
d(i,k)
i=1
i=1
i=1
i6=k
i6=k
i6=k
for
all
k = 1, , n
n
P
bi = 0.
2
2
1 X t
1 X t
e i bi +
ej bj
m 1 t=1
m 1 t=1
i2 + j2
The above formula shows that we can estimate the
variance of sensors noise by computing the matrix .
We also compute the sum of variances of all sensors
using the following Lemma.
Lemma 3.1 (Total Variance). Let x
t be the mean of
readings in time t, then, using (4) and our assumption
n
P
that
bi = 0 , we have
i=1
n
1X t
1X t
x
=
xj =
x
,
n j=1
n j=1 j
t
i=1
XX
2
n
x
ti x
t
m(n 1) i=1 t=1
(3)
Note that the obtained value of bi is actually an
approximation of the sample mean of the error of
sensor i, which, in turn is an unbiased estimator of
the bias of such a sensor.
3.3
Estimating Variance
In this section, we propose a similar method to estimate variance of the sensor noise using the estimated
bias from previous section. Given the bias vector
S(t) =
i=1
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
v +
v + 2 =
(i,k) ,
(i,k)2 i
(i,k)2 k
i=1
i=1
i=1
i6=k
i6=k
for all k = 1, , n
n
n
m
P
P
P
2
n
vi = m(n1)
(
xti x
t ) .
i=1
3.4
i=1 t=1
(6)
In the previous sections, we proposed a novel approach for estimating the bias and variance of noise
for sensors based on their readings. The variance and
the bias of a sensor noise can be interpreted as the
distance measures of the sensor readings to the true
value of the signal. In fact, the distance measures
obtained as our estimates of the bias and variances
of sensors also make sense for non-stochastic errors.
Given matrix {xts } where xts rt + N (bs , s2 ) and
estimated bias and variance vectors b and , we
propose to recover rt using (an approximate form of)
the MLE applied to the values obtained by subtracting
the bias estimates from sensors readings. As it is well
known, in this case the MLE has the smallest possible
variance as it attains the CRLB.
From a heuristic point of view, we removed the
systematic component of the error by subtracting
a quantity which in the case of a stochastic error
corresponds to an estimate of bias; this allows us
to estimate the variability around such a systematic
component of the error, which, in case of stochastic
errors, corresponds to variance. We can now obtain
an estimation which corresponds to MLE formula for
the case of zero mean normally distributed errors, but
with estimated rather than true variances. Therefore,
we assume that the expected value rt of the measurements is the true value of the quantity measured,
and is the only parameter in the likelihood function.
Thus, in the expression for the likelihood function for
normally distributed unbiased case,
n
Y
i=1
i 2
12
2
(xt
i rt )
2
i
n
X
i=1
Pnvi
1
j=1 vj
xti
for all
t = 1, , m.
(7)
n
X
ws xs
(8)
s=1
Ln (rt ) =
According to the proposed attack scenario, the attacker exploits the vulnerability of the IF algorithms
which originates from a wrong assumption about the
initial trustworthiness of sensors. Our contribution to
address this shortcomings is to employ the results of
the proposed robust data aggregation technique as the
initial reputation for these algorithms. Moreover, the
initial weights for all sensor nodes can be computed
based on the distance of sensors readings to such an
initial reputation. Our experimental results illustrate
that this idea not only consolidates the IF algorithms
against the proposed attack scenario, but using this
initial reputation improves the efficiency of the IF algorithms by reducing the number of iterations needed
to approach a stationary point within the prescribed
tolerance; see Section 4.2.
S IMULATION R ESULTS
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
4.1
Experimental Settings
Name
dKVD-Reciprocal
dKVD-Affine
Zhou
Laureti
Discriminant Function
2 1
1
wil+1 =
xi rl+1
2
m
2
1
wil+1 = 1 k
xi rl+1
2
m
t
m t
t
X
xi x
r
r
1
wil+1 =
m i=1
xi
r
0.5
1
2
wil+1 =
xi rl+1
2
m
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
RobustAggregate
MLE with Actual Variances
2.5
4.5
RMS Error
RMS Error
1.5
1
3.5
dKVD-Reciprocal
dKVD-Affine
Zhou
Laureti
RobustAggregate-Reciprocal
RobustAggregate-Affine
3
2.5
2
1.5
0.5
1
1.5
2.5
3.5
4.5
0.5
1
2.5
3.5
4.5
dKVD-Reciprocal
dKVD-Affine
Zhou
Laureti
RobustAggregate-Reciprocal
RobustAggregate-Affine
dKVD-Reciprocal
dKVD-Affine
Zhou
Laureti
RobustAggregate-Reciprocal
RobustAggregate-Affine
12
RMS Error
3.5
1.5
, Es = N (0, s 2)
, Es = N (0, s )
RMS Error
10
2.5
2
10
8
6
1.5
1
0.5
1
1.5
2.5
3.5
4.5
1.5
2
3
3.5
4
4.5
2.5
, s = s, (i, j) = exp( | i j |/N)
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
11
Attack6: KerchoveAffine
50
40
40
RMS Error
50
30
20
10
0
8
num
ber 6
of c
oll
ude 4
rs
4
3
on
eviati
ard d
30
20
10
0
8
num
ber 6
of c
oll
ude 4
rs
2
stand
(a) dKVD-Reciprocal
40
RMS Error
RMS Error
50
40
30
20
10
ber 6
of c
oll
ude 4
rs
4
n
viatio
30
20
10
0
8
num
3
2
e
ard d
stand
ber 6
of c
oll
ude 4
rs
(c) Zhou
40
RMS Error
50
40
30
20
10
ude 4
rs
4
3
on
2
eviati
ard d
d
n
ta
s
4
3
on
2
eviati
ard d
stand
Attack6: RobustAggregateAffine
50
ber 6
of c
oll
(d) Laureti
Attack6: RobustAggregateReciprocal
0
8
num
Attack6: Laureti
50
0
8
num
4
3
on
2
eviati
ard d
d
n
ta
s
(b) dKVD-Affine
Attack6: Zhou
RMS Error
RMS Error
Attack6: KerchoveReciprocal
(e) RobustAggregate-Reciprocal
30
20
10
0
8
num
ber
6
of c
ollu
der 4
s
4
3
on
2
eviati
ard d
stand
(f) RobustAggregate-Affine
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
12
R ELATED W ORK
Attack5: KerchoveAffine
50
40
40
RMS Error
50
30
20
10
0
8
num
ber 6
of c
o
llud 4
ers
4
3
on
2
eviati
ard d
d
n
ta
s
30
20
10
0
8
num
ber 6
of c
oll
ude 4
rs
(a) dKVD-Reciprocal
40
RMS Error
RMS Error
50
40
30
20
10
ber 6
of c
oll
ude 4
rs
4
3
on
2
eviati
ard d
stand
30
20
10
0
8
num
ber 6
of c
o
llud 4
ers
(c) Zhou
40
RMS Error
50
40
30
20
10
llud 4
ers
4
3
on
2
eviati
ard d
stand
Attack5: RobustAggregateAffine
50
ber 6
of c
o
4
3
on
2
eviati
ard d
stand
(d) Laureti
Attack5: RobustAggregateReciprocal
0
8
num
Attack5: Laureti
50
0
8
num
4
3
on
2
eviati
ard d
d
n
ta
s
(b) dKVD-Affine
Attack5: Zhou
RMS Error
RMS Error
Attack5: KerchoveReciprocal
(e) RobustAggregate-Reciprocal
30
20
10
0
8
num
ber 6
of c
oll
ude 4
rs
4
3
on
2
eviati
ard d
stand
(f) RobustAggregate-Affine
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
13
R EFERENCES
[1]
[2]
[3]
[4]
[5]
[6]
[7]
[8]
[9]
[10]
[11]
[12]
[13]
[14]
[15]
[16]
[17]
C ONCLUSIONS
[18]
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.
This article has been accepted for publication in a future issue of this journal, but has not been fully edited. Content may change prior to final publication. Citation
information: DOI 10.1109/TDSC.2014.2316816, IEEE Transactions on Dependable and Secure Computing
IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (TDSC)
14
1545-5971 (c) 2013 IEEE. Personal use is permitted, but republication/redistribution requires IEEE permission. See
http://www.ieee.org/publications_standards/publications/rights/index.html for more information.