Distributed Detection in Wireless Sensor Networks under Byzantine Attacks

被引:1
|
作者
Luo, Junhai [1 ]
Cao, Zan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Elect Engn, Chengdu 611731, Peoples R China
基金
美国国家科学基金会;
关键词
LOCALIZATION; PERFORMANCE;
D O I
10.1155/2015/381642
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed detection in wireless sensor networks (WSNs) under Byzantine attacks is studied in this paper. A new kind of Byzantine attacks, neighborhood malicious Byzantine attacks (NMBA), is proposed. In this type of Byzantine attacks, part of sensors is conquered and reprogrammed by an intelligent adversary. These sensors then are conducted to send false information to the fusion center (FC) in order to confuse it. We see that the attacking performance of NMBA is very close to that of collaborative malicious Byzantine attacks (CMBA) and outperforms independent malicious Byzantine attacks (IMBA). Decision fusion becomes impossible when attacking power which is the fraction of compromised sensors in WSNs exceeds a specific value. A closed-form expression for the value is derived. For mitigating attacking effect brought by NMBA, a strategy for estimating the attacking power is proposed. Furthermore, a scheme to identify Byzantine attackers is presented. Two kinds of discrepancy distance are constructed in this paper to help in identifying Byzantine attackers. We prove that most of Byzantine attackers are identified and performance of the identifying scheme is proved to be excellent. A data fusion scheme based on both dynamic threshold and the identifying scheme is analyzed in this paper. Numerical results are also provided to support the schemes and approaches.
引用
收藏
页数:18
相关论文
共 50 条
  • [1] Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks
    Abdelhakim, Mai
    Lightfoot, Leonard E.
    Ren, Jian
    Li, Tongtong
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2014, 25 (04) : 950 - 959
  • [2] Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks
    Zhang, Pengfei
    Koh, Jing Yang
    Lin, Shaowei
    Nevat, Ido
    [J]. 2014 IEEE NINTH INTERNATIONAL CONFERENCE ON INTELLIGENT SENSORS, SENSOR NETWORKS AND INFORMATION PROCESSING (IEEE ISSNIP 2014), 2014,
  • [3] Distributed Detection of Clone Attacks in Wireless Sensor Networks
    Conti, Mauro
    Di Pietro, Roberto
    Mancini, Luigi Vincenzo
    Mei, Alessandro
    [J]. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2011, 8 (05) : 685 - 698
  • [4] Distributed Detection of Wormhole Attacks in Wireless Sensor Networks
    de Graaf, Rennie
    Hegazy, Islam
    Horton, Jeffrey
    Safavi-Naini, Reihaneh
    [J]. AD HOC NETWORKS, 2010, 28 : 208 - +
  • [5] Reliable Data Fusion in Wireless Sensor Networks under Byzantine Attacks
    Abdelhakim, Mai
    Lightfoot, Leonard E.
    Li, Tongtong
    [J]. 2011 - MILCOM 2011 MILITARY COMMUNICATIONS CONFERENCE, 2011, : 810 - 815
  • [6] Minimum Byzantine Effort for Blinding Distributed Detection in Wireless Sensor Networks
    Lin, Hsuan-Yin
    Chen, Po-Ning
    Han, Yunghsiang S.
    Varshney, Pramod K.
    [J]. IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2020, 68 : 647 - 661
  • [7] Distributed detection in the presence of Byzantine attack in large wireless sensor networks
    Marano, Stefano
    Matta, Vincenzo
    Tong, Lang
    [J]. MILCOM 2006, VOLS 1-7, 2006, : 1840 - +
  • [8] PROTECTION AGAINST BYZANTINE ATTACKS ON WIRELESS SENSOR NETWORKS
    Stelte, Bjoern
    [J]. 2011 PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON WIRELESS INFORMATION NETWORKS AND SYSTEMS (WINSYS 2011), 2011, : 53 - 58
  • [9] Distributed Intrusion Detection of Byzantine Attacks in Wireless Networks with Random Linear Network Coding
    Chen, Jen-Yeu
    Tseng, Yi-Ying
    [J]. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2012,
  • [10] Distributed detection of mobile malicious node attacks in wireless sensor networks
    Ho, Jun-Won
    Wright, Matthew
    Das, Sajal K.
    [J]. AD HOC NETWORKS, 2012, 10 (03) : 512 - 523