Enhanced Audit Bit Based Distributed Bayesian Detection in the Presence of Strategic Attacks

09/27/2021
by   Chen Quan, et al.
0

This paper employs an audit bit based mechanism to mitigate the effect of Byzantine attacks. In this framework, the optimal attacking strategy for intelligent attackers is investigated for the traditional audit bit based scheme (TAS) to evaluate the robustness of the system. We show that it is possible for an intelligent attacker to degrade the performance of TAS to the system without audit bits. To enhance the robustness of the system in the presence of intelligent attackers, we propose an enhanced audit bit based scheme (EAS). The optimal fusion rule for the proposed scheme is derived and the detection performance of the system is evaluated via the probability of error for the system. Simulation results show that the proposed EAS improves the robustness and the detection performance of the system. Moreover, based on EAS, another new scheme called the reduced audit bit based scheme (RAS) is proposed which further improves system performance. We derive the new optimal fusion rule and the simulation results show that RAS outperforms EAS and TAS in terms of both robustness and detection performance of the system. Then, we extend the proposed RAS for a wide-area cluster based distributed wireless sensor networks (CWSNs). Simulation results show that the proposed RAS significantly reduces the communication overhead between the sensors and the FC, which prolongs the lifetime of the network.

READ FULL TEXT
research
04/14/2022

Reputation and Audit Bit Based Distributed Detection in the Presence of Byzantine

In this paper, two reputation based algorithms called Reputation and aud...
research
02/03/2019

New Constellation Design and Bit Mapping for Dual Mode OFDM-IM

Dual mode orthogonal frequency division multiplexing with index modulati...
research
05/24/2019

On the Performance Analysis of Binary Hypothesis Testing with Byzantine Sensors

We investigate the impact of Byzantine attacks in distributed detection ...
research
02/06/2022

Bandwidth-Constrained Distributed Quickest Change Detection in Heterogeneous Sensor Networks: Anonymous vs Non-Anonymous Settings

The heterogeneous distribute quickest changed detection (HetDQCD) proble...
research
11/26/2019

Securing Cluster-heads in Wireless Sensor Networks by a Hybrid Intrusion Detection System Based on Data Mining

Cluster-based Wireless Sensor Network (CWSN) is a kind of WSNs that beca...
research
12/19/2021

Jamming Pattern Recognition over Multi-Channel Networks: A Deep Learning Approach

With the advent of intelligent jammers, jamming attacks have become a mo...
research
10/21/2019

New RLL Code with Improved Error Performance for Visible Light Communication

In this letter, a novel run-length limited (RLL) code is reported. In ad...

Please sign up or login with your details

Forgot password? Click here to reset