Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks

Keshav Agrawal, Aditya Vempaty, Hao Chen, Pramod K. Varshney

Research output: Chapter in Book/Entry/PoemConference contribution

12 Scopus citations

Abstract

Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send wrong data to the fusion center leading to an increase in the probability of incorrect inference. This paper considers Byzantine attacks for the location estimation task in wireless sensor networks where each sensor uses a binary quantization scheme to send binary data to the fusion center. Posterior Cramer-Rao lower Bound (PCRLB) metric and Fisher Information Matrix (FIM) are used to analyze the performance of the network in the presence of Byzantine attacks. We have considered two kinds of attack strategies, independent attacks (all the malicious sensors attack a WSN independently of each other) and collaborative attacks (all the malicious sensors communicate with each other and attack the WSN in a coordinated manner). We determine the fraction of Byzantine attackers in the network above which the fusion center becomes incapable of finding the location of the target. Optimal attacking strategy for given attacking resources is also proposed.

Original languageEnglish (US)
Title of host publicationConference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
Pages1669-1673
Number of pages5
DOIs
StatePublished - 2011
Event45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011 - Pacific Grove, CA, United States
Duration: Nov 6 2011Nov 9 2011

Publication series

NameConference Record - Asilomar Conference on Signals, Systems and Computers
ISSN (Print)1058-6393

Other

Other45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
Country/TerritoryUnited States
CityPacific Grove, CA
Period11/6/1111/9/11

ASJC Scopus subject areas

  • Signal Processing
  • Computer Networks and Communications

Fingerprint

Dive into the research topics of 'Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks'. Together they form a unique fingerprint.

Cite this