Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
53rd IEEE Conference on Decision and Control 2014
DOI: 10.1109/cdc.2014.7039431
|View full text |Cite
|
Sign up to set email alerts
|

Decision fusion with corrupted reports in multi-sensor networks: A game-theoretic approach

Abstract: Decision fusion in adversarial setting is receiving increasing attention due to its relevance in several applications including sensor networks, cognitive radio, social networks, distributed network monitoring. In most cases, a fusion center has to make a decision based on the reports provided by local agents, e.g. the nodes of a multi-sensor network. In this paper, we consider a setup in which the fusion center makes its decision on the status of an observed system by relying on the decisions made by a pool o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

2
23
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
4
1

Relationship

0
5

Authors

Journals

citations
Cited by 9 publications
(25 citation statements)
references
References 15 publications
2
23
0
Order By: Relevance
“…We then use numerical simulations to evaluate the performance of the proposed method for long observation windows. As a result, we show that, even in this case, the proposed solution maintains the performance improvement over the simple majority rule, the hard isolation scheme in [14] and the soft isolation scheme in [16].…”
Section: Contributionmentioning
confidence: 88%
See 2 more Smart Citations
“…We then use numerical simulations to evaluate the performance of the proposed method for long observation windows. As a result, we show that, even in this case, the proposed solution maintains the performance improvement over the simple majority rule, the hard isolation scheme in [14] and the soft isolation scheme in [16].…”
Section: Contributionmentioning
confidence: 88%
“…A soft isolation scheme is proposed in [16], where the reports from suspect byzantine nodes are given a lower importance rather being immediately discarded. Even in [16], the lack of knowledge at the FC about the strategy adopted by the attacker (and viceversa) is coped with by adopting a gametheoretic formulation.…”
Section: Prior Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Game theory was exploited to formulate the anti-jamming channel selection problem as an anti-jamming dynamic game in CRN [34]. In [35], a zero-sum game was developed to model the corrupted nodes due to the Byzantine attack, which negatively influences the the CRN routing reputation. The harmful impact is caused by the SSDF attack on the FC decision.…”
Section: Introductionmentioning
confidence: 99%
“…In the literature context, the security in CR can be the essential metric to guarantee the data privacy and to achieve robust communication system, specifically against the intelligent attacks manipulations such as eavesdropper, primary user emulation (PUE), jamming, byzantine, and SSDF attacks [29]. As an eminent adaptive and intelligent tool to address the above security aspects, game theory can be utilized in CRN [30][31][32][33][34][35].The eavesdropper and jamming attacks effect on CRNs, which recognizes the CRN data privacy, were effectively studied using Stackelberg game, zero-sum game, repeated game [30][31][32]. The problem of a full-duplex active eavesdropper, which represents full duplex mode of a jammer and a classical eavesdropper, has been mitigated by a three stage Stackelberg game [30].…”
mentioning
confidence: 99%