假数据注入攻击下基于重心坐标的无线传感器网络分布式定位

IF 10.5 1区 计算机科学 Q1 AUTOMATION & CONTROL SYSTEMS IEEE Transactions on Cybernetics Pub Date : 2025-02-11 DOI:10.1109/TCYB.2025.3534781
Lei Shi;Xinming Chen;Yi Zhou
{"title":"假数据注入攻击下基于重心坐标的无线传感器网络分布式定位","authors":"Lei Shi;Xinming Chen;Yi Zhou","doi":"10.1109/TCYB.2025.3534781","DOIUrl":null,"url":null,"abstract":"Localization security is crucial to the widespread applications of wireless sensor networks (WSNs) in various fields. This article mainly studies the issue of distributed localization in WSNs subject to deception attacks, in which the attacker randomly compromises communication channels and injects false data, resulting in the codification of data received by sensor nodes. A distributed iterative localization algorithm based on detection-holding strategy is proposed with the help of barycentric coordinate representations. This algorithm detects modified data in communication links through residual detection and communication encryption. It is proved theoretically that the proposed localization algorithm can achieve accurate convergence to the sensors’ locations under general random false-data-injection attacks. Finally, the algorithm performance is demonstrated through simulation examples.","PeriodicalId":13112,"journal":{"name":"IEEE Transactions on Cybernetics","volume":"55 4","pages":"1568-1579"},"PeriodicalIF":10.5000,"publicationDate":"2025-02-11","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Barycentric Coordinate-Based Distributed Localization for Wireless Sensor Networks Under False-Data-Injection Attacks\",\"authors\":\"Lei Shi;Xinming Chen;Yi Zhou\",\"doi\":\"10.1109/TCYB.2025.3534781\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Localization security is crucial to the widespread applications of wireless sensor networks (WSNs) in various fields. This article mainly studies the issue of distributed localization in WSNs subject to deception attacks, in which the attacker randomly compromises communication channels and injects false data, resulting in the codification of data received by sensor nodes. A distributed iterative localization algorithm based on detection-holding strategy is proposed with the help of barycentric coordinate representations. This algorithm detects modified data in communication links through residual detection and communication encryption. It is proved theoretically that the proposed localization algorithm can achieve accurate convergence to the sensors’ locations under general random false-data-injection attacks. Finally, the algorithm performance is demonstrated through simulation examples.\",\"PeriodicalId\":13112,\"journal\":{\"name\":\"IEEE Transactions on Cybernetics\",\"volume\":\"55 4\",\"pages\":\"1568-1579\"},\"PeriodicalIF\":10.5000,\"publicationDate\":\"2025-02-11\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"IEEE Transactions on Cybernetics\",\"FirstCategoryId\":\"94\",\"ListUrlMain\":\"https://ieeexplore.ieee.org/document/10880471/\",\"RegionNum\":1,\"RegionCategory\":\"计算机科学\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q1\",\"JCRName\":\"AUTOMATION & CONTROL SYSTEMS\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"IEEE Transactions on Cybernetics","FirstCategoryId":"94","ListUrlMain":"https://ieeexplore.ieee.org/document/10880471/","RegionNum":1,"RegionCategory":"计算机科学","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q1","JCRName":"AUTOMATION & CONTROL SYSTEMS","Score":null,"Total":0}
引用次数: 0

摘要

定位安全是无线传感器网络在各个领域广泛应用的关键。本文主要研究了欺骗攻击下WSNs的分布式定位问题,欺骗攻击是指攻击者随机破坏通信信道并注入虚假数据,导致传感器节点接收到的数据被编码。基于质心坐标表示,提出了一种基于检测保持策略的分布式迭代定位算法。该算法通过残留检测和通信加密来检测通信链路中的修改数据。从理论上证明,在一般的随机假数据注入攻击下,所提出的定位算法能够准确收敛到传感器的位置。最后,通过仿真算例验证了算法的性能。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
Barycentric Coordinate-Based Distributed Localization for Wireless Sensor Networks Under False-Data-Injection Attacks
Localization security is crucial to the widespread applications of wireless sensor networks (WSNs) in various fields. This article mainly studies the issue of distributed localization in WSNs subject to deception attacks, in which the attacker randomly compromises communication channels and injects false data, resulting in the codification of data received by sensor nodes. A distributed iterative localization algorithm based on detection-holding strategy is proposed with the help of barycentric coordinate representations. This algorithm detects modified data in communication links through residual detection and communication encryption. It is proved theoretically that the proposed localization algorithm can achieve accurate convergence to the sensors’ locations under general random false-data-injection attacks. Finally, the algorithm performance is demonstrated through simulation examples.
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
IEEE Transactions on Cybernetics
IEEE Transactions on Cybernetics COMPUTER SCIENCE, ARTIFICIAL INTELLIGENCE-COMPUTER SCIENCE, CYBERNETICS
CiteScore
25.40
自引率
11.00%
发文量
1869
期刊介绍: The scope of the IEEE Transactions on Cybernetics includes computational approaches to the field of cybernetics. Specifically, the transactions welcomes papers on communication and control across machines or machine, human, and organizations. The scope includes such areas as computational intelligence, computer vision, neural networks, genetic algorithms, machine learning, fuzzy systems, cognitive systems, decision making, and robotics, to the extent that they contribute to the theme of cybernetics or demonstrate an application of cybernetics principles.
期刊最新文献
Event-Based Estimation Over Hydrogen AAV-Based Relay Network With Silent Packet Loss. LASFNet: A Lightweight Attention-Guided Self-Modulation Feature Fusion Network for Multimodal Object Detection. HEQP: A Hypergraph Neural Network-Based Evolutionary Method for Large-Scale QCQPs. Adaptive Iterative Learning Reliable Control of Nonrepetitive Systems With Multiple Iteration-Varying Parametric Uncertainties. Robotic Assistive Optimization and Control Using Neural Dynamics and Adaptive Neural Network.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:604180095
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1