{"title":"Barycentric Coordinate-Based Distributed Localization for Wireless Sensor Networks Under False-Data-Injection Attacks","authors":"Lei Shi;Xinming Chen;Yi Zhou","doi":"10.1109/TCYB.2025.3534781","DOIUrl":null,"url":null,"abstract":"Localization security is crucial to the widespread applications of wireless sensor networks (WSNs) in various fields. This article mainly studies the issue of distributed localization in WSNs subject to deception attacks, in which the attacker randomly compromises communication channels and injects false data, resulting in the codification of data received by sensor nodes. A distributed iterative localization algorithm based on detection-holding strategy is proposed with the help of barycentric coordinate representations. This algorithm detects modified data in communication links through residual detection and communication encryption. It is proved theoretically that the proposed localization algorithm can achieve accurate convergence to the sensors’ locations under general random false-data-injection attacks. Finally, the algorithm performance is demonstrated through simulation examples.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1568-1579"},"PeriodicalIF":10.5000,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10880471/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0
Abstract
Localization security is crucial to the widespread applications of wireless sensor networks (WSNs) in various fields. This article mainly studies the issue of distributed localization in WSNs subject to deception attacks, in which the attacker randomly compromises communication channels and injects false data, resulting in the codification of data received by sensor nodes. A distributed iterative localization algorithm based on detection-holding strategy is proposed with the help of barycentric coordinate representations. This algorithm detects modified data in communication links through residual detection and communication encryption. It is proved theoretically that the proposed localization algorithm can achieve accurate convergence to the sensors’ locations under general random false-data-injection attacks. Finally, the algorithm performance is demonstrated through simulation examples.
期刊介绍:
The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.