Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks

Keshav Agrawal, Aditya Vempaty, Hao Chen, Pramod Kumar Varshney

Research output: Chapter in Book/Report/Conference proceedingConference contribution

11 Scopus citations

Abstract

Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send wrong data to the fusion center leading to an increase in the probability of incorrect inference. This paper considers Byzantine attacks for the location estimation task in wireless sensor networks where each sensor uses a binary quantization scheme to send binary data to the fusion center. Posterior Cramer-Rao lower Bound (PCRLB) metric and Fisher Information Matrix (FIM) are used to analyze the performance of the network in the presence of Byzantine attacks. We have considered two kinds of attack strategies, independent attacks (all the malicious sensors attack a WSN independently of each other) and collaborative attacks (all the malicious sensors communicate with each other and attack the WSN in a coordinated manner). We determine the fraction of Byzantine attackers in the network above which the fusion center becomes incapable of finding the location of the target. Optimal attacking strategy for given attacking resources is also proposed.

Original languageEnglish (US)
Title of host publicationConference Record - Asilomar Conference on Signals, Systems and Computers
Pages1669-1673
Number of pages5
DOIs
StatePublished - 2011
Event45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011 - Pacific Grove, CA, United States
Duration: Nov 6 2011Nov 9 2011

Other

Other45th Asilomar Conference on Signals, Systems and Computers, ASILOMAR 2011
CountryUnited States
CityPacific Grove, CA
Period11/6/1111/9/11

    Fingerprint

ASJC Scopus subject areas

  • Computer Networks and Communications
  • Signal Processing

Cite this

Agrawal, K., Vempaty, A., Chen, H., & Varshney, P. K. (2011). Target localization in Wireless Sensor Networks with quantized data in the presence of Byzantine attacks. In Conference Record - Asilomar Conference on Signals, Systems and Computers (pp. 1669-1673). [6190303] https://doi.org/10.1109/ACSSC.2011.6190303