Abstract

Distributed detection in wireless sensor networks (WSNs) under Byzantine attacks is studied in this paper. A new kind of Byzantine attacks, neighborhood malicious Byzantine attacks (NMBA), is proposed. In this type of Byzantine attacks, part of sensors is conquered and reprogrammed by an intelligent adversary. These sensors then are conducted to send false information to the fusion center (FC) in order to confuse it. We see that the attacking performance of NMBA is very close to that of collaborative malicious Byzantine attacks (CMBA) and outperforms independent malicious Byzantine attacks (IMBA). Decision fusion becomes impossible when attacking power which is the fraction of compromised sensors in WSNs exceeds a specific value. A closed-form expression for the value is derived. For mitigating attacking effect brought by NMBA, a strategy for estimating the attacking power is proposed. Furthermore, a scheme to identify Byzantine attackers is presented. Two kinds of discrepancy distance are constructed in this paper to help in identifying Byzantine attackers. We prove that most of Byzantine attackers are identified and performance of the identifying scheme is proved to be excellent. A data fusion scheme based on both dynamic threshold and the identifying scheme is analyzed in this paper. Numerical results are also provided to support the schemes and approaches.

Highlights

  • Wireless sensor networks (WSNs) consist of a large number of tiny power-limited sensors that are densely and spatially deployed to monitor physical phenomena

  • We propose an effective scheme based on both dynamic threshold and identifying Byzantine attackers for decision fusion at the fusion center (FC)

  • The FC is incapable of utilizing any information to make a decision to determine whether there is a target in the region of interest (ROI)

Read more

Summary

Introduction

Wireless sensor networks (WSNs) consist of a large number of tiny power-limited sensors that are densely and spatially deployed to monitor physical phenomena. In the case of independent malicious Byzantine attacks (IMBA), the local decision of ith compromised sensor completely depends on its own observation. NMBA is such a kind of attacks model where each compromised sensor node in the network determines whether there is a target or not in the ROI depending on its own local decision and a certain amount of decisions coming from Honest sensors which are nearest around the compromised sensor. We propose an effective scheme based on both dynamic threshold and identifying Byzantine attackers for decision fusion at the FC.

System Model
Optimal Strategy for Byzantine Attackers
Fusion Center Decision Strategy
Conclusion
Proof for Proposition 1
Proof for Proposition 2

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call

Disclaimer: All third-party content on this website/platform is and will remain the property of their respective owners and is provided on "as is" basis without any warranties, express or implied. Use of third-party content does not indicate any affiliation, sponsorship with or endorsement by them. Any references to third-party content is to identify the corresponding services and shall be considered fair use under The CopyrightLaw.