TY - GEN
T1 - Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks
AU - Agrawal, Keshav
AU - Vempaty, Aditya
AU - Chen, Hao
AU - Varshney, Pramod K.
PY - 2011
Y1 - 2011
N2 - Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send wrong data to the fusion center leading to an increase in the probability of incorrect inference. This paper considers Byzantine attacks for the location estimation task in wireless sensor networks where each sensor uses a binary quantization scheme to send binary data to the fusion center. Posterior Cramer-Rao lower Bound (PCRLB) metric and Fisher Information Matrix (FIM) are used to analyze the performance of the network in the presence of Byzantine attacks. We have considered two kinds of attack strategies, independent attacks (all the malicious sensors attack a WSN independently of each other) and collaborative attacks (all the malicious sensors communicate with each other and attack the WSN in a coordinated manner). We determine the fraction of Byzantine attackers in the network above which the fusion center becomes incapable of finding the location of the target. Optimal attacking strategy for given attacking resources is also proposed.
AB - Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send wrong data to the fusion center leading to an increase in the probability of incorrect inference. This paper considers Byzantine attacks for the location estimation task in wireless sensor networks where each sensor uses a binary quantization scheme to send binary data to the fusion center. Posterior Cramer-Rao lower Bound (PCRLB) metric and Fisher Information Matrix (FIM) are used to analyze the performance of the network in the presence of Byzantine attacks. We have considered two kinds of attack strategies, independent attacks (all the malicious sensors attack a WSN independently of each other) and collaborative attacks (all the malicious sensors communicate with each other and attack the WSN in a coordinated manner). We determine the fraction of Byzantine attackers in the network above which the fusion center becomes incapable of finding the location of the target. Optimal attacking strategy for given attacking resources is also proposed.
UR - http://www.scopus.com/inward/record.url?scp=84861319789&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84861319789&partnerID=8YFLogxK
U2 - 10.1109/ACSSC.2011.6190303
DO - 10.1109/ACSSC.2011.6190303
M3 - Conference contribution
AN - SCOPUS:84861319789
SN - 9781467303231
T3 - Conference Record - Asilomar Conference on Signals, Systems and Computers
SP - 1669
EP - 1673
BT - Conference Record of the 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
T2 - 45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
Y2 - 6 November 2011 through 9 November 2011
ER -