• DocumentCode
    1762237
  • Title

    Distributed Detection in Mobile Access Wireless Sensor Networks under Byzantine Attacks

  • Author

    Abdelhakim, Mai ; Lightfoot, Leonard E. ; Jian Ren ; Tongtong Li

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Michigan State Univ., East Lansing, MI, USA
  • Volume
    25
  • Issue
    4
  • fYear
    2014
  • fDate
    41730
  • Firstpage
    950
  • Lastpage
    959
  • Abstract
    This paper explores reliable data fusion in mobile access wireless sensor networks under Byzantine attacks. We consider the q-out-of-m rule, which is popular in distributed detection and can achieve a good tradeoff between the miss detection probability and the false alarm rate. However, a major limitation with it is that the optimal scheme parameters can only be obtained through exhaustive search, making it infeasible for large networks. In this paper, first, by exploiting the linear relationship between the scheme parameters and the network size, we propose simple but effective sub-optimal linear approaches. Second, for better flexibility and scalability, we derive a near-optimal closed-form solution based on the central limit theorem. Third, subjecting to a miss detection constraint, we prove that the false alarm rate of q-out-of-m diminishes exponentially as the network size increases, even if the percentage of malicious nodes remains fixed. Finally, we propose an effective malicious node detection scheme for adaptive data fusion under time-varying attacks; the proposed scheme is analyzed using the entropy-based trust model, and shown to be optimal from the information theory point of view. Simulation examples are provided to illustrate the performance of proposed approaches under both static and dynamic attacks.
  • Keywords
    computer network security; mobile radio; radio access networks; sensor fusion; wireless sensor networks; Byzantine attacks; adaptive data fusion; central limit theorem; distributed detection; entropy-based trust model; false alarm rate; malicious node detection scheme; miss detection constraint; miss detection probability; mobile access wireless sensor networks; near-optimal closed-form solution; reliable data fusion; time-varying attacks; Closed-form solutions; Data integration; Mobile communication; Mobile computing; Reliability; Sensors; Wireless sensor networks; Byzantine attacks; Security in wireless sensor networks; distributed detection;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2013.74
  • Filename
    6482130