An Information-Theoretic Approach to Distributed Detection for Mobile Wireless Sensor Networks Under Byzantine Attack in Entirely Unknown or Complicated Environment: Design, Analysis, and Evaluation of the Attack Strategy
{"title":"An Information-Theoretic Approach to Distributed Detection for Mobile Wireless Sensor Networks Under Byzantine Attack in Entirely Unknown or Complicated Environment: Design, Analysis, and Evaluation of the Attack Strategy","authors":"Gaoyuan Zhang;Pengfei Wang;Weiguang Wang;Yu Mu;Yiwei Li;Jie Tang;Huanhuan Song;Hong Wen;Shahid Mumtaz","doi":"10.1109/JIOT.2024.3494035","DOIUrl":null,"url":null,"abstract":"The parallel distributed detection is studied for mobile wireless sensor networks (MWSNs) in the presence of Byzantine attacks in entirely unknown environment or complicated environment from the perspective of the information theory, where we pay most of our attention toward design, analysis, and evaluation of the attack strategy. In particular, the multihop relay network and the harsh wireless communication condition, e.g., the dynamic and entirely unknown channel, are taken into consideration in our configuration. Second, the conditions that the optimal attacking strategy should satisfy is analyzed and developed under different attacking scenarios. Third, the minimum attacking power is developed for the Byzantines to blind the fusion center (FC). Furthermore, the optimal attacking strategies are developed when no prior information of the system is known for the Byzantines. Finally, the traditional four typical attack strategies are evaluated, and we find that the fraction of Byzantines is the only factor that affects the reliable data fusion when the network size and the attacking strategy are fixed. The extensive simulation is conducted to verify our design, analysis, and evaluation of the attack strategy.","PeriodicalId":54347,"journal":{"name":"IEEE Internet of Things Journal","volume":"12 4","pages":"3689-3706"},"PeriodicalIF":8.9000,"publicationDate":"2024-11-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Internet of Things Journal","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10750300/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"COMPUTER SCIENCE, INFORMATION SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
The parallel distributed detection is studied for mobile wireless sensor networks (MWSNs) in the presence of Byzantine attacks in entirely unknown environment or complicated environment from the perspective of the information theory, where we pay most of our attention toward design, analysis, and evaluation of the attack strategy. In particular, the multihop relay network and the harsh wireless communication condition, e.g., the dynamic and entirely unknown channel, are taken into consideration in our configuration. Second, the conditions that the optimal attacking strategy should satisfy is analyzed and developed under different attacking scenarios. Third, the minimum attacking power is developed for the Byzantines to blind the fusion center (FC). Furthermore, the optimal attacking strategies are developed when no prior information of the system is known for the Byzantines. Finally, the traditional four typical attack strategies are evaluated, and we find that the fraction of Byzantines is the only factor that affects the reliable data fusion when the network size and the attacking strategy are fixed. The extensive simulation is conducted to verify our design, analysis, and evaluation of the attack strategy.
期刊介绍:
The EEE Internet of Things (IoT) Journal publishes articles and review articles covering various aspects of IoT, including IoT system architecture, IoT enabling technologies, IoT communication and networking protocols such as network coding, and IoT services and applications. Topics encompass IoT's impacts on sensor technologies, big data management, and future internet design for applications like smart cities and smart homes. Fields of interest include IoT architecture such as things-centric, data-centric, service-oriented IoT architecture; IoT enabling technologies and systematic integration such as sensor technologies, big sensor data management, and future Internet design for IoT; IoT services, applications, and test-beds such as IoT service middleware, IoT application programming interface (API), IoT application design, and IoT trials/experiments; IoT standardization activities and technology development in different standard development organizations (SDO) such as IEEE, IETF, ITU, 3GPP, ETSI, etc.