access icon free Optimal Byzantine attack strategy for distributed localisation with M-ary quantised data

The distributed localisation with M-ary quantised data at sensor nodes is investigated in the presence of Byzantines from the attacker's perspective. The Byzantine nodes attack the network by transmitting falsified data to the fusion centre (FC) to deteriorate the performance of the distributed target localisation, where the independent and probabilistic Byzantine attack model is considered. By making the determinant of Fisher information matrix be zero, the optimal Byzantine attack strategy, which makes the FC incapable of estimating target location using the data at sensor nodes, is found. Numerical results show that the security performance of the distributed localisation improves sharply as the number of quantisation bits increases. Moreover, the security performance also increases tremendously as the attack probability decreases. Hence, the Byzantine attacker faces a trade-off between the performance damage and the hazard to be identified.

Inspec keywords: quantisation (signal); sensor fusion; telecommunication security; matrix algebra; probability

Other keywords: Fisher information matrix; distributed target location estimation; fusion centre; M-ary quantisation; optimal Byzantine attack strategy; probabilistic Byzantine attack model; independent probabilistic Byzantine attack model; distributed localisation

Subjects: Other topics in statistics; Signal processing theory; Linear algebra (numerical analysis); Codes; Data security; Other topics in statistics; Linear algebra (numerical analysis); Signal processing and detection

References

    1. 1)
    2. 2)
    3. 3)
    4. 4)
    5. 5)
    6. 6)
      • 6. Agrwal, K., Vempaty, A., Chen, H., et al: ‘Target localization in sensor network with quantized data in the presence of Byzantine attacks’. Asilomar Conf. Signals, Systems and Computers, Pacific Grove, CA, USA, November 2011, pp. 16691673, doi: 10.1109/ACSSC.2011.6190303.
http://iet.metastore.ingenta.com/content/journals/10.1049/el.2015.2172
Loading

Related content

content/journals/10.1049/el.2015.2172
pub_keyword,iet_inspecKeyword,pub_concept
6
6
Loading