2013
DOI: 10.1109/tsp.2012.2236325
|View full text |Cite
|
Sign up to set email alerts
|

Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques

Abstract: Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send falsified information to the Fusion Center (FC) with the goal of degrading inference performance. In this paper, we consider Byzantine attacks for the location estimation task in WSNs using binary quantized data. Posterior Cramér-Rao Lower Bound (PCRLB) is used to characterize the performance of the network. Two kinds of attack strategies are considered: Independent and Collaborative attacks. We determine the f… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
68
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 96 publications
(69 citation statements)
references
References 24 publications
0
68
0
Order By: Relevance
“…In practice, where T is finite, it is intractable to determine the conditional distribution of Λ i , which is necessary to come up with the optimal choice of η. Therefore, in this paper, we assume that T → ∞ and present an asymptotic choice of the tagging threshold η used in Equation (24).…”
Section: B Optimal Choice Of the Tagging Threshold As T → ∞mentioning
confidence: 99%
See 2 more Smart Citations
“…In practice, where T is finite, it is intractable to determine the conditional distribution of Λ i , which is necessary to come up with the optimal choice of η. Therefore, in this paper, we assume that T → ∞ and present an asymptotic choice of the tagging threshold η used in Equation (24).…”
Section: B Optimal Choice Of the Tagging Threshold As T → ∞mentioning
confidence: 99%
“…Distributed target localization in the presence of Byzantine attacks was addressed by Vempaty et al in [24], where the sensors quantize their observations into binary decisions, which are transmitted to the FC. Similar to Rawat et al 's approach in [20], the authors in [24] investigated the problem of distributed target localization from both the network's and Byzantine attacker's perspectives, first by identifying the optimal Byzantine attack and second, mitigating the impact of the attack with the use of non-identical quantizers at the sensors.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Here, a reputation-based scheme is proposed for identifying the compromised SNs by accumulating the deviations between each SN and the FC decision over a time window duration. The authors in [27] also consider binary Byzantine attacks, in the context of target localization, where the SNs transmit their binary decisions to the FC. These authors also propose two techniques to mitigate the negative input of the compromised SNs on the FC decision.…”
Section: Introductionmentioning
confidence: 99%
“…Over the course of the past decade, there have been a large number of researches on localization for WSNs [2][3][4][5][6][7][8]. They share the same main idea that nodes with unknown coordinates are utilized by one or more GPS-equipped nodes with known coordinates in order to estimate their positions.…”
Section: Introductionmentioning
confidence: 99%