DocumentCode :
105730
Title :
Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques
Author :
Vempaty, Aditya ; Ozdemir, Onur ; Agrawal, Kunal ; Hao Chen ; Varshney, Pramod K.
Author_Institution :
Dept. of Electr. Eng. & Comput. Sci., Syracuse Univ., Syracuse, NY, USA
Volume :
61
Issue :
6
fYear :
2013
fDate :
15-Mar-13
Firstpage :
1495
Lastpage :
1508
Abstract :
Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send falsified information to the Fusion Center (FC) with the goal of degrading inference performance. In this paper, we consider Byzantine attacks for the location estimation task in WSNs using binary quantized data. Posterior Cramér-Rao Lower Bound (PCRLB) is used to characterize the performance of the network. Two kinds of attack strategies are considered: Independent and Collaborative attacks. We determine the fraction of Byzantine attackers in the network that make the FC incapable of utilizing sensor information to estimate the target location. Optimal attacking strategies for given attacking resources are also derived. Furthermore, we propose two schemes for the mitigation of Byzantine attacks. The first scheme is based on a Byzantine Identification method under the assumption of identical local quantizers. We show with simulations that the proposed scheme identifies most of the Byzantines. In order to improve the performance, we propose a second scheme in conjunction with our identification scheme where dynamic non-identical threshold quantizers are used at the sensors. We show that it not only reduces the location estimation error but also makes the Byzantines `ineffective´ in their attack strategy.
Keywords :
estimation theory; performance evaluation; sensor fusion; telecommunication security; wireless sensor networks; Byzantine attacks; Byzantine identification method; PCRLB; WSN; attack strategy; attacking resources; binary quantized data; collaborative attacks; dynamic nonidentical threshold quantizers; falsified information; fusion center; identical local quantizers; identification scheme; independent attack; inference performance; location estimation error; location estimation task; malicious sensors; mitigation techniques; netowrk performance; optimal attacking strategy; posterior Cramer-Rao lower bound; sensor information; target location estimation; wireless sensor networks; Collaboration; Educational institutions; Electronic mail; Maximum likelihood estimation; Sensors; Wireless sensor networks; Byzantine attacks; malicious sensors; posterior Cramér-Rao lower bound; target localization; wireless sensor networks;
fLanguage :
English
Journal_Title :
Signal Processing, IEEE Transactions on
Publisher :
ieee
ISSN :
1053-587X
Type :
jour
DOI :
10.1109/TSP.2012.2236325
Filename :
6392991
Link To Document :
بازگشت