The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2013
DOI: 10.1109/tifs.2012.2229274
|View full text |Cite
|
Sign up to set email alerts
|

Decentralized Hypothesis Testing in Wireless Sensor Networks in the Presence of Misbehaving Nodes

Abstract: Abstract-Wireless sensor networks are prone to node misbehavior arising from tampering by an adversary (Byzantine attack), or due to other factors such as node failure resulting from hardware or software degradation. In this paper we consider the problem of decentralized detection in wireless sensor networks in the presence of one or more classes of misbehaving nodes. Binary hypothesis testing is considered where the honest nodes transmit their binary decisions to the fusion center (FC), while the misbehaving … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
39
0
1

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 60 publications
(40 citation statements)
references
References 27 publications
0
39
0
1
Order By: Relevance
“…To detect the malicious behaviors of the SUs, we define the trust metrics based on the estimated SU's operating point parameter, i.e., 2 2 , , n…”
Section: B the Trust Metricsmentioning
confidence: 99%
See 1 more Smart Citation
“…To detect the malicious behaviors of the SUs, we define the trust metrics based on the estimated SU's operating point parameter, i.e., 2 2 , , n…”
Section: B the Trust Metricsmentioning
confidence: 99%
“…Collaborative spectrum sensing (CSS) has been proposed to improve detection accuracy by exploiting SUs' spatial diversity. However, collaborative spectrum sensing also induces security vulnerabilities [2], such as spectrum sensing data falsification (SSDF) attack. In an SSDF attack, a malicious user intentionally send falsified local spectrum sensing reports to a fusion center (FC) in an attempt to confuse the FC.…”
Section: Introductionmentioning
confidence: 99%
“…Chen et al presented an approach for detecting malicious behavior of a node by combining Monitor Group (MG) and routing table information in [8]. Another work proposed by Soltanmohammadi et al in [9] is capable of detecting malicious nodes using a binary hypothesis testing framework. In this work, the honest node transmits binary decision to the fusion center, whereas a malicious node transmits fictitious messages to the fusion center and finally the fusion center helps in identifying the misbehaving nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Soltanmohammadi et al in [23] investigated the problem of distributed detection in the presence of different types of Byzantine nodes. Each Byzantine node type corresponds to a different operating point, and, therefore, the authors considered the problem of identifying different Byzantine nodes, along with their operating points.…”
Section: Introductionmentioning
confidence: 99%