Distributed Faulty Node Detection in DTNs in Presence of Byzantine Attack

被引:0
|
作者
Li, Wenjie [1 ]
Bassi, Francesca [1 ,2 ]
Kieffer, Michel [1 ,3 ,4 ]
Calisti, Alex [5 ]
Pasolini, Gianni [5 ]
Dardari, Davide [5 ]
机构
[1] Univ Paris Sud, CNRS,UMR CNRS 8506, L2S, Cent Supelec, 3 Rue Joliot Curie, F-91192 Gif Sur Yvette, France
[2] ESME Sudria, F-94200 Ivry, France
[3] LTCI Telecom ParisTech, F-75013 Paris, France
[4] Inst Univ France, F-75005 Paris, France
[5] Univ Bologna, DEI, CNIT, Bologna, Italy
关键词
TOLERANT; NETWORKS;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
This paper considers a delay tolerant network consisting of nodes equipped with sensors, some of them producing outliers. A distributed faulty node detection (DFD) algorithm, whose aim is to help each node in estimating the status of its sensors, has been proposed recently by the authors. The aim of this paper is to analyze the robustness of the DFD algorithm to the presence of misbehaving nodes performing Byzantine attacks. Two types of attacks are considered and analyzed, each trying to mislead the other nodes in the estimation of the status of their sensors. This provides insights on the way the parameters of the DFD algorithm should be adapted to minimize the impact of misbehaving nodes. Theoretical results are illustrated with simulations considering nodes with random displacements, as well as traces of node inter-contact times from real databases.
引用
收藏
页数:6
相关论文
共 50 条
  • [1] Distributed Faulty Node Detection in DTNs
    Li, Wenjie
    Galluccio, Laura
    Kieffer, Michel
    Bassi, Francesca
    2016 25TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2016,
  • [2] Distributed detection in the presence of Byzantine attack in large wireless sensor networks
    Marano, Stefano
    Matta, Vincenzo
    Tong, Lang
    MILCOM 2006, VOLS 1-7, 2006, : 1840 - +
  • [3] Distributed Detection in the Presence of Byzantine Attacks
    Marano, Stefano
    Matta, Vincenzo
    Tong, Lang
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (01) : 16 - 29
  • [4] A Modified Distributed Target Localization Scheme in the Presence of Byzantine Attack
    Yu, Qiliang
    Chen, Huifang
    Xie, Lei
    2015 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS & SIGNAL PROCESSING (WCSP), 2015,
  • [5] Distributed Bayesian Detection in the Presence of Byzantine Data
    Kailkhura, Bhavya
    Han, Yunghsiang S.
    Brahma, Swastik
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2015, 63 (19) : 5250 - 5263
  • [6] Faulty Node Detection in Distributed Systems Using BCH Code
    Prasetiadi, Agi
    Kim, Dong-Seong
    IEEE COMMUNICATIONS LETTERS, 2013, 17 (03) : 620 - 623
  • [7] RANDOM DISTRIBUTED DETECTION WITH AN APPLICATION TO COGNITIVE RADIO BYZANTINE ATTACK
    Rogers, Uri
    Guo, Jun
    Li, Xia
    Chen, Hao
    2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
  • [8] Consensus in the presence of mortal Byzantine faulty processes
    Josef Widder
    Martin Biely
    Günther Gridling
    Bettina Weiss
    Jean-Paul Blanquart
    Distributed Computing, 2012, 24 : 299 - 321
  • [9] Consensus in the presence of mortal Byzantine faulty processes
    Widder, Josef
    Biely, Martin
    Gridling, Guenther
    Weiss, Bettina
    Blanquart, Jean-Paul
    DISTRIBUTED COMPUTING, 2012, 24 (06) : 299 - 321
  • [10] Distributed Triangulation in the Presence Faulty and Byzantine Beacons in Aircraft Networks with ADS-B Technology
    Uhlig, Daniel
    Kiyavash, Negar
    Neogi, Natasha
    2009 AMERICAN CONTROL CONFERENCE, VOLS 1-9, 2009, : 4956 - +