Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send falsified information to the Fusion Center (FC) with the goal of degrading inference performance. In this paper, we consider Byzantine attacks for the location estimation task in WSNs using binary quantized data. Posterior Cramér-Rao Lower Bound (PCRLB) is used to characterize the performance of the network. Two kinds of attack strategies are considered: Independent and Collaborative attacks. We determine the fraction of Byzantine attackers in the network that make the FC incapable of utilizing sensor information to estimate the target location. Optimal attacking strategies for given attacking resources are also derived. Furthermore, we prop...
Abstract — A wireless sensor network designed for distributed detection undergoes a Byzantine attack...
Accurately positioning nodes in wireless and sensor networks is important because the location of de...
There exists extensive work in wireless sensor networks (WSNs) on security measures that guarantee t...
Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send ...
Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send ...
In this paper, Byzantine attacks in wireless sensor networks with mobile access (SENMA) points is co...
Byzantine attacks on sensor systems estimating the value of an unknown deterministic parameter based...
We consider a sensor network focused on target localization, where sensors measure the signal streng...
Abstract—In this work, we consider the task of target lo-calization using quantized data in Wireless...
Abstract — Many sensor applications are being developed that require the location of wireless device...
Distributed estimation using quantized data in the presence of Byzantine attacks is considered. Seve...
This paper explores reliable data fusion in mobile access wireless sensor networks under Byzantine a...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
In this paper, we study the issue of defending against adversarial localization in wireless sensor n...
The problem of distributed inference with M-ary quantized data at the sensors is investigated in the...
Abstract — A wireless sensor network designed for distributed detection undergoes a Byzantine attack...
Accurately positioning nodes in wireless and sensor networks is important because the location of de...
There exists extensive work in wireless sensor networks (WSNs) on security measures that guarantee t...
Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send ...
Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send ...
In this paper, Byzantine attacks in wireless sensor networks with mobile access (SENMA) points is co...
Byzantine attacks on sensor systems estimating the value of an unknown deterministic parameter based...
We consider a sensor network focused on target localization, where sensors measure the signal streng...
Abstract—In this work, we consider the task of target lo-calization using quantized data in Wireless...
Abstract — Many sensor applications are being developed that require the location of wireless device...
Distributed estimation using quantized data in the presence of Byzantine attacks is considered. Seve...
This paper explores reliable data fusion in mobile access wireless sensor networks under Byzantine a...
Abstract — Many sensor network applications require sensors ’ locations to function correctly. Despi...
In this paper, we study the issue of defending against adversarial localization in wireless sensor n...
The problem of distributed inference with M-ary quantized data at the sensors is investigated in the...
Abstract — A wireless sensor network designed for distributed detection undergoes a Byzantine attack...
Accurately positioning nodes in wireless and sensor networks is important because the location of de...
There exists extensive work in wireless sensor networks (WSNs) on security measures that guarantee t...