Distributed Detection in Wireless Sensor Networks under Byzantine Attacks

被引:1
|
作者
Luo, Junhai [1 ]
Cao, Zan [1 ]
机构
[1] Univ Elect Sci & Technol China, Sch Elect Engn, Chengdu 611731, Peoples R China
基金
美国国家科学基金会;
关键词
LOCALIZATION; PERFORMANCE;
D O I
10.1155/2015/381642
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Distributed detection in wireless sensor networks (WSNs) under Byzantine attacks is studied in this paper. A new kind of Byzantine attacks, neighborhood malicious Byzantine attacks (NMBA), is proposed. In this type of Byzantine attacks, part of sensors is conquered and reprogrammed by an intelligent adversary. These sensors then are conducted to send false information to the fusion center (FC) in order to confuse it. We see that the attacking performance of NMBA is very close to that of collaborative malicious Byzantine attacks (CMBA) and outperforms independent malicious Byzantine attacks (IMBA). Decision fusion becomes impossible when attacking power which is the fraction of compromised sensors in WSNs exceeds a specific value. A closed-form expression for the value is derived. For mitigating attacking effect brought by NMBA, a strategy for estimating the attacking power is proposed. Furthermore, a scheme to identify Byzantine attackers is presented. Two kinds of discrepancy distance are constructed in this paper to help in identifying Byzantine attackers. We prove that most of Byzantine attackers are identified and performance of the identifying scheme is proved to be excellent. A data fusion scheme based on both dynamic threshold and the identifying scheme is analyzed in this paper. Numerical results are also provided to support the schemes and approaches.
引用
收藏
页数:18
相关论文
共 50 条
  • [41] Detection and Mitigation of Byzantine Attacks in Distributed Training
    Konstantinidis, Konstantinos
    Vaswani, Namrata
    Ramamoorthy, Aditya
    [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2024, 32 (02) : 1493 - 1508
  • [42] Mitigating Byzantine Attacks in Data Fusion Process for Wireless Sensor Networks using Witnesses
    Koh, Jing Yang
    Teo, Joseph Chee Ming
    Wong, Wai-Choong
    [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SYSTEMS (ICCS), 2014, : 263 - 267
  • [43] Serial distributed detection for wireless sensor networks with sensor failure
    Junhai Luo
    Zuoting Liu
    [J]. EURASIP Journal on Wireless Communications and Networking, 2017
  • [44] Serial distributed detection for wireless sensor networks with sensor failure
    Luo, Junhai
    Liu, Zuoting
    [J]. EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2017, : 1 - 9
  • [45] A Distributed Scheme to Detect Wormhole Attacks in Mobile Wireless Sensor Networks
    Simsek, Oya
    Levi, Albert
    [J]. COMPUTER AND INFORMATION SCIENCES II, 2012, : 157 - 163
  • [46] Comprehensive review on distributed denial of service attacks in wireless sensor networks
    Subramani, Shalini
    Selvi, M.
    [J]. INTERNATIONAL JOURNAL OF INFORMATION AND COMPUTER SECURITY, 2023, 20 (3-4) : 414 - 438
  • [47] Multilevel Modeling of Distributed Denial of Service Attacks in Wireless Sensor Networks
    Mazur, Katarzyna
    Ksiezopolski, Bogdan
    Nielek, Radoslaw
    [J]. JOURNAL OF SENSORS, 2016, 2016
  • [48] A systematic review of routing attacks detection in wireless sensor networks
    Alansari, Zainab
    Anuar, Nor Badrul
    Kamsin, Amirrudin
    Belgaum, Mohammad Riyaz
    [J]. PEERJ COMPUTER SCIENCE, 2022, 8
  • [49] A systematic review of routing attacks detection in wireless sensor networks
    Alansari Z.
    Anuar N.B.
    Kamsin A.
    Belgaum M.R.
    [J]. PeerJ Computer Science, 2022, 8
  • [50] Efficient distributed detection of node replication attacks in sensor networks
    Zhu, Bo
    Setia, Sanjeev
    Addada, Venkata Gopala Krishna
    Jajodia, Sushil
    Roy, Sankardas
    [J]. TWENTY-THIRD ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE, PROCEEDINGS, 2007, : 257 - +