Credible fusion of evidence in distributed system subject to cyberattacks

Chaoxiong Ma,Yan Liang
2024-11-29
Abstract:Given that distributed systems face adversarial behaviors such as eavesdropping and cyberattacks, how to ensure the evidence fusion result is credible becomes a must-be-addressed topic. Different from traditional research that assumes nodes are cooperative, we focus on three requirements for evidence fusion, i.e., preserving evidence's privacy, identifying attackers and excluding their evidence, and dissipating high-conflicting among evidence caused by random noise and interference. To this end, this paper proposes an algorithm for credible evidence fusion against cyberattacks. Firstly, the fusion strategy is constructed based on conditionalized credibility to avoid counterintuitive fusion results caused by high-conflicting. Under this strategy, distributed evidence fusion is transformed into the average consensus problem for the weighted average value by conditional credibility of multi-source evidence (WAVCCME), which implies a more concise consensus process and lower computational complexity than existing algorithms. Secondly, a state decomposition and reconstruction strategy with weight encryption is designed, and its effectiveness for privacy-preserving under directed graphs is guaranteed: decomposing states into different random sub-states for different neighbors to defend against internal eavesdroppers, and encrypting the sub-states' weight in the reconstruction to guard against out-of-system eavesdroppers. Finally, the identities and types of attackers are identified by inter-neighbor broadcasting and comparison of nodes' states, and the proposed update rule with state corrections is used to achieve the consensus of the WAVCCME. The states of normal nodes are shown to converge to their WAVCCME, while the attacker's evidence is excluded from the fusion, as verified by the simulation on a distributed unmanned reconnaissance swarm.
Cryptography and Security,Distributed, Parallel, and Cluster Computing
What problem does this paper attempt to address?
This paper aims to solve the problem of how to ensure the credibility of evidence fusion results when distributed systems are under network attacks (such as eavesdropping and spoofing attacks). Specifically, the paper focuses on three key requirements: 1. **Protect evidence privacy**: When performing evidence fusion, it is necessary to ensure that the information exchange between nodes does not disclose the original evidence, thereby preventing internal and external eavesdroppers from obtaining sensitive information. 2. **Identify and eliminate the influence of attackers**: When there are malicious nodes in the system, it is required to accurately identify these attackers and exclude the evidence provided by them from the fusion process to avoid their interference with the fusion results. 3. **Resolve highly conflicting evidence**: Highly conflicting evidence caused by random noise and environmental interference may produce counter - intuitive fusion results. Therefore, a method is needed to handle such high - level conflicts and ensure the rationality of the fusion results. To solve the above problems, the paper proposes an evidence fusion algorithm based on conditional credibility (CEFAC), which mainly includes the following steps: - **Evidence fusion strategy based on conditional credibility**: By introducing conditional credibility \(Cerd_i = p(c_i|\hat{A}_j)\), the multi - source evidence fusion task is transformed into the problem of solving the weighted average value \(WAVCCME\). This not only simplifies the fusion process but also reduces the computational complexity. The formulas are as follows: \[ Cerd_i = p(c_i)=\sum_{j = 1}^{n}p(c_i|\hat{A}_j)p(\hat{A}_j) \] \[ m^{(t)}_{avg}=\sum_{i = 1}^{N}f(N_i)Cerd_i^{(t)}m_i \] - **State decomposition and reconstruction strategy**: In order to protect evidence privacy, a state decomposition and reconstruction strategy with weight encryption is proposed. This strategy decomposes the initial state \(x_i(0)\) of the node into multiple random sub - states and protects the weights of these sub - states through encryption technology, thereby preventing eavesdroppers from obtaining the original evidence. - **Attacker identity/type identification and compensation strategy**: Through the broadcast and state comparison between nodes, the identity and type of the attacker are identified, and the states of normal nodes are corrected to ensure that the final consensus - reached \(WAVCCME\) is not affected by the attacker. In conclusion, the algorithm proposed in this paper can not only effectively respond to the challenges brought by network attacks but also ensure the credibility and accuracy of evidence fusion results.