An Information-Theoretic Approach to Distributed Detection for Mobile Wireless Sensor Networks Under Byzantine Attack in Entirely Unknown or Complicated Environment: Design, Analysis, and Evaluation of the Attack Strategy

IF 8.9 1区 计算机科学 Q1 COMPUTER SCIENCE, INFORMATION SYSTEMS IEEE Internet of Things Journal Pub Date : 2024-11-11 DOI:10.1109/JIOT.2024.3494035
Gaoyuan Zhang;Pengfei Wang;Weiguang Wang;Yu Mu;Yiwei Li;Jie Tang;Huanhuan Song;Hong Wen;Shahid Mumtaz
{"title":"An Information-Theoretic Approach to Distributed Detection for Mobile Wireless Sensor Networks Under Byzantine Attack in Entirely Unknown or Complicated Environment: Design, Analysis, and Evaluation of the Attack Strategy","authors":"Gaoyuan Zhang;Pengfei Wang;Weiguang Wang;Yu Mu;Yiwei Li;Jie Tang;Huanhuan Song;Hong Wen;Shahid Mumtaz","doi":"10.1109/JIOT.2024.3494035","DOIUrl":null,"url":null,"abstract":"The parallel distributed detection is studied for mobile wireless sensor networks (MWSNs) in the presence of Byzantine attacks in entirely unknown environment or complicated environment from the perspective of the information theory, where we pay most of our attention toward design, analysis, and evaluation of the attack strategy. In particular, the multihop relay network and the harsh wireless communication condition, e.g., the dynamic and entirely unknown channel, are taken into consideration in our configuration. Second, the conditions that the optimal attacking strategy should satisfy is analyzed and developed under different attacking scenarios. Third, the minimum attacking power is developed for the Byzantines to blind the fusion center (FC). Furthermore, the optimal attacking strategies are developed when no prior information of the system is known for the Byzantines. Finally, the traditional four typical attack strategies are evaluated, and we find that the fraction of Byzantines is the only factor that affects the reliable data fusion when the network size and the attacking strategy are fixed. The extensive simulation is conducted to verify our design, analysis, and evaluation of the attack strategy.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 4","pages":"3689-3706"},"PeriodicalIF":8.9000,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10750300/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0

Abstract

The parallel distributed detection is studied for mobile wireless sensor networks (MWSNs) in the presence of Byzantine attacks in entirely unknown environment or complicated environment from the perspective of the information theory, where we pay most of our attention toward design, analysis, and evaluation of the attack strategy. In particular, the multihop relay network and the harsh wireless communication condition, e.g., the dynamic and entirely unknown channel, are taken into consideration in our configuration. Second, the conditions that the optimal attacking strategy should satisfy is analyzed and developed under different attacking scenarios. Third, the minimum attacking power is developed for the Byzantines to blind the fusion center (FC). Furthermore, the optimal attacking strategies are developed when no prior information of the system is known for the Byzantines. Finally, the traditional four typical attack strategies are evaluated, and we find that the fraction of Byzantines is the only factor that affects the reliable data fusion when the network size and the attacking strategy are fixed. The extensive simulation is conducted to verify our design, analysis, and evaluation of the attack strategy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
完全未知或复杂环境中拜占庭攻击下移动无线传感器网络分布式检测的信息论方法:攻击策略的设计、分析和评估
从信息论的角度出发,研究了在完全未知环境或复杂环境下存在拜占庭攻击的移动无线传感器网络并行分布式检测问题,其中攻击策略的设计、分析和评估是研究的重点。特别地,在我们的配置中考虑了多跳中继网络和恶劣的无线通信条件,例如动态和完全未知的信道。其次,分析并推导了不同攻击场景下最优攻击策略应满足的条件。第三,研究了拜占庭人致盲融合中心(FC)的最小攻击力。此外,当拜占庭人不知道系统的先验信息时,开发了最优攻击策略。最后,对传统的四种典型攻击策略进行了评估,发现在网络规模和攻击策略一定的情况下,Byzantines的分数是影响数据融合可靠性的唯一因素。广泛的仿真是为了验证我们的设计,分析和评估的攻击策略。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
IEEE Internet of Things Journal
IEEE Internet of Things Journal Computer Science-Information Systems
CiteScore
17.60
自引率
13.20%
发文量
1982
期刊介绍: The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.
期刊最新文献
AI for AIoT as a Service: AI to Configure Models, Capacities, and Tasks SPIoT: An Adaptive Federated Sparse Framework for Intrusion Detection in IoT KoopShield: A Koopman based Online Data-Driven Safety Framework for Truck Platoons Resilient to Communication Delays Identifying Critical Nodes in Smart Grid IoT Infrastructure: A Graph Convolutional Network Approach Enabling the 6G and IoT-Verse: Non-Radiative Dielectric (NRD) Waveguides for Millimeter-Wave Communications
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1