2013
DOI: 10.1109/msp.2013.2262116
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
90
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3
2

Relationship

1
8

Authors

Journals

citations
Cited by 139 publications
(91 citation statements)
references
References 25 publications
1
90
0
Order By: Relevance
“…It has been shown in [84], [85] that for a distributed inference network consisting of malicious sensors [86], an appropriate addition of noise makes the system more robust to attacks and increases the minimum number of attacked sensors required to deteriorate the network's performance.…”
Section: ) Optimal Noise Distributionsmentioning
confidence: 99%
“…It has been shown in [84], [85] that for a distributed inference network consisting of malicious sensors [86], an appropriate addition of noise makes the system more robust to attacks and increases the minimum number of attacked sensors required to deteriorate the network's performance.…”
Section: ) Optimal Noise Distributionsmentioning
confidence: 99%
“…In a second situation (decision fusion with corrupted nodes), the fusion center has to tackle with the presence of a number of malevolent nodes, which deliberately alter their reports to induce a decision error. According to a consolidated literature, such nodes are referred to as byzantine nodes or simply Byzantines [7], [8]. Note that a byzantine node can decide to alter its report by relying on its observations of the system, but usually it does not have access to the observations made by the other nodes and their reports 1 .…”
Section: Introductionmentioning
confidence: 99%
“…The last case (decision fusion with corrupted reports) corresponds to a situation in which the adversary corrupts the reports without having access to the observed sequences. This may correspond to a situation in which the adversary does not control the nodes but only the communication link between the nodes and the fusion center, or to the case of byzantine nodes which, for some reasons, can not observe the data at the input of the node, or decide not exploit such a knowledge (as strange as it may seem, this is a rather common assumption in the analysis of decision fusion in the presence of byzantine nodes [8]). …”
Section: Introductionmentioning
confidence: 99%
“…Reference [23], in the context of cognitive radio (CR), proposed a prefiltering scheme of sensing data and a trust factor is assigned to each user to detect the malicious CR ones. The authors of [24], in the context of target localization, also consider binary Byzantine attacks where the SNs transmit to the FC their binary decisions and they propose two techniques to mitigate the compromised SNs negative impact on the FC decision. To mitigate the Byzantine effect on the data fusion problem in cooperative spectrum sensing, a weighted sequential probability ratio test was proposed in [25].…”
Section: Introductionmentioning
confidence: 99%