Elements of information theory
Elements of information theory
The Byzantine Generals Problem
ACM Transactions on Programming Languages and Systems (TOPLAS)
Denial of Service in Sensor Networks
Computer
Designing secure sensor networks
IEEE Wireless Communications
Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
Trust based fusion over noisy channels through anomaly detection in cognitive radio networks
Proceedings of the 4th international conference on Security of information and networks
Review: Vulnerabilities in cognitive radio networks: A survey
Computer Communications
Hi-index | 0.00 |
Wireless sensor networks are vulnerable to Byzantine attacks in which a fraction of sensors are tampered. The intruder can reprogram the compromised sensors, making them behave as if they are authentic nodes. We consider the problem of distributed detection in wireless sensor networks in the presence of Byzantine attacks where the compromised sensors collaboratively send fictitious observations to the fusion center. We define the power of the attacker as the fraction of the sensors that have been compromised for the attack. We present the optimal attacking strategy for any given attacking power. We show that there is a critical power level above which the fusion center is completely "blinded" in the sense that the optimal detection performs no better than a coin flip independent of collected data. We also present a robust detector to counter the presence of Byzantine attacks.