Target localization in Wireless Sensor Networks using error correcting codes in the presence of Byzantines

Aditya Vempaty, Yunghsiang S. Han, Pramod K. Varshney

Research output: Chapter in Book/Report/Conference proceedingConference contribution

6 Scopus citations

Abstract

We consider the problem of target localization using quantized data in Wireless Sensor Networks in the presence of Byzantines (malicious sensors). Since the effect of Byzantines can be treated as errors in the transmitted data, we propose the use of error correcting codes for the task of target localization. We design coding based iterative schemes for target localization where, at every iteration, the Fusion Center performs an M-ary hypothesis test and decides the Region of Interest for the next iteration. Simulation results show that our proposed schemes provide a better performance as compared to the traditional Maximum Likelihood Estimation and are also computationally much more efficient.

Original languageEnglish (US)
Title of host publication2013 IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Proceedings
Pages5195-5199
Number of pages5
DOIs
StatePublished - Oct 18 2013
Event2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013 - Vancouver, BC, Canada
Duration: May 26 2013May 31 2013

Publication series

NameICASSP, IEEE International Conference on Acoustics, Speech and Signal Processing - Proceedings
ISSN (Print)1520-6149

Other

Other2013 38th IEEE International Conference on Acoustics, Speech, and Signal Processing, ICASSP 2013
CountryCanada
CityVancouver, BC
Period5/26/135/31/13

Keywords

  • Byzantines
  • Error Correcting Codes
  • Target Localization
  • Wireless Sensor Networks

ASJC Scopus subject areas

  • Software
  • Signal Processing
  • Electrical and Electronic Engineering

Fingerprint Dive into the research topics of 'Target localization in Wireless Sensor Networks using error correcting codes in the presence of Byzantines'. Together they form a unique fingerprint.

Cite this