Abstract:Abstract-Wireless sensor networks are prone to node misbehavior arising from tampering by an adversary (Byzantine attack), or due to other factors such as node failure resulting from hardware or software degradation. In this paper we consider the problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary decisions to the fusion center (FC), while the misbehaving … Show more
“…To detect the malicious behaviors of the SUs, we define the trust metrics based on the estimated SU's operating point parameter, i.e., 2 2 , , n…”
Section: B the Trust Metricsmentioning
confidence: 99%
“…Collaborative spectrum sensing (CSS) has been proposed to improve detection accuracy by exploiting SUs' spatial diversity. However, collaborative spectrum sensing also induces security vulnerabilities [2], such as spectrum sensing data falsification (SSDF) attack. In an SSDF attack, a malicious user intentionally send falsified local spectrum sensing reports to a fusion center (FC) in an attempt to confuse the FC.…”
Spectrum sensing data falsification (SSDF) attack are serious threats to collaborative spectrum sensing (CSS) of cognitive radio networks (CRNs). In this paper, inspired by EM (Expectation Maximization) method, we propose a scheme to estimate the presences of primary user (PU) and the SUs' operating point parameters (false alarm and detection probabilities) iteratively. The key features of the proposed scheme is that, by using the estimated SUs' operating point parameters, the fusion center can estimate the presences of the PU, while the PU's state information is feedback to enhance the estimation accuracy of SUs' operating point parameters. Furthermore, our scheme can achieve a powerful capability of eliminating incorrect sensing reports, which can avoid over penalize the honest users who have random errors in reporting channels. The numerical result shows that, the proposed method can achieve higher malicious user detection accuracy than the existing reputation-based schemes, and can thus improve the CSS performance significantly.
“…To detect the malicious behaviors of the SUs, we define the trust metrics based on the estimated SU's operating point parameter, i.e., 2 2 , , n…”
Section: B the Trust Metricsmentioning
confidence: 99%
“…Collaborative spectrum sensing (CSS) has been proposed to improve detection accuracy by exploiting SUs' spatial diversity. However, collaborative spectrum sensing also induces security vulnerabilities [2], such as spectrum sensing data falsification (SSDF) attack. In an SSDF attack, a malicious user intentionally send falsified local spectrum sensing reports to a fusion center (FC) in an attempt to confuse the FC.…”
Spectrum sensing data falsification (SSDF) attack are serious threats to collaborative spectrum sensing (CSS) of cognitive radio networks (CRNs). In this paper, inspired by EM (Expectation Maximization) method, we propose a scheme to estimate the presences of primary user (PU) and the SUs' operating point parameters (false alarm and detection probabilities) iteratively. The key features of the proposed scheme is that, by using the estimated SUs' operating point parameters, the fusion center can estimate the presences of the PU, while the PU's state information is feedback to enhance the estimation accuracy of SUs' operating point parameters. Furthermore, our scheme can achieve a powerful capability of eliminating incorrect sensing reports, which can avoid over penalize the honest users who have random errors in reporting channels. The numerical result shows that, the proposed method can achieve higher malicious user detection accuracy than the existing reputation-based schemes, and can thus improve the CSS performance significantly.
“…Chen et al presented an approach for detecting malicious behavior of a node by combining Monitor Group (MG) and routing table information in [8]. Another work proposed by Soltanmohammadi et al in [9] is capable of detecting malicious nodes using a binary hypothesis testing framework. In this work, the honest node transmits binary decision to the fusion center, whereas a malicious node transmits fictitious messages to the fusion center and finally the fusion center helps in identifying the misbehaving nodes.…”
A sensor node is termed as "dumb" [1], if at a certain time instant it can sense its surroundings, but is unable to communicate with any of its neighbors due to the shrinkage in communication range. Such isolation occurs because of the presence of adverse environmental effects. However, the node starts its normal operation with the resumption of favorable environmental conditions. Thus, the detection of dumb nodes is essential in order to re-establish network connectivity. However, the temporal behavior of a dumb node in a network makes the detection of such a node challenging. In the present work, we address a plausible solution to this problem by taking into account the evidences from neighboring nodes.
“…Soltanmohammadi et al in [23] investigated the problem of distributed detection in the presence of different types of Byzantine nodes. Each Byzantine node type corresponds to a different operating point, and, therefore, the authors considered the problem of identifying different Byzantine nodes, along with their operating points.…”
Abstract-The problem of distributed inference with M-ary quantized data at the sensors is investigated in the presence of Byzantine attacks. We assume that the attacker does not have knowledge about either the true state of the phenomenon of interest, or the quantization thresholds used at the sensors. Therefore, the Byzantine nodes attack the inference network by modifying modifying the symbol corresponding to the quantized data to one of the other M symbols in the quantization alphabetset and transmitting the false symbol to the fusion center (FC). In this paper, we find the optimal Byzantine attack that blinds any distributed inference network. As the quantization alphabet size increases, a tremendous improvement in the security performance of the distributed inference network is observed.We also investigate the problem of distributed inference in the presence of resource-constrained Byzantine attacks. In particular, we focus our attention on two problems: distributed detection and distributed estimation, when the Byzantine attacker employs a highly-symmetric attack. For both the problems, we find the optimal attack strategies employed by the attacker to maximally degrade the performance of the inference network. A reputationbased scheme for identifying malicious nodes is also presented as the network's strategy to mitigate the impact of Byzantine threats on the inference performance of the distributed sensor network.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.