首页> 外文期刊>IEEE sensors journal >Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation
【24h】

Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation

机译:数据篡改和能量带宽限制下的分布式二进制事件检测

获取原文
获取原文并翻译 | 示例
           

摘要

We address the problem of centralized detection of a binary event in the presence of falsifiable sensor nodes (SNs) (i.e., controlled by an attacker) for a bandwidth constrained under–attack spatially uncorrelated distributed wireless sensor network. The SNs send their quantized test statistics over orthogonal channels to the fusion center (FC), which linearly combines them to reach a final decision. First (considering that the FC and the attacker do not act strategically), we derive: 1) the FC optimal weight combining; 2) the optimal SN to FC transmit power; and 3) the test statistic quantization bits that maximize the probability of detection ( $P_{d}$ ). We also derive an expression for the attacker strategy that causes the maximum possible FC degradation. But in these expressions, both the optimum FC strategy and the attacker strategy require a-priori knowledge that cannot be obtained in practice. The performance analysis of sub-optimum FC strategies is then characterized, and based on the (compromised) SNs willingness to collaborate, we also derive analytically the sub-optimum attacker strategies. Then, considering that the FC and the attacker now act strategically, we recast the problem as a minimax game between the FC and the attacker and prove that the Nash equilibrium (NE) exists. Finally, we find this NE numerically in the simulation results and this gives insight into the detection performance of the proposed strategies.
机译:我们解决了在存在伪造的传感器节点(SN)(即由攻击者控制)的情况下针对带宽受限,攻击不足,空间不相关的分布式无线传感器网络对二进制事件进行集中检测的问题。 SN通过正交信道将其量化的测试统计信息发送到融合中心(FC),融合中心将它们进行线性组合以得出最终决策。首先(考虑到FC和攻击者没有采取战略行动),我们得出:1)FC最优权重组合; 2)最佳SN到FC的发射功率; 3)使检测概率最大化的测试统计量化位($ P_ {d} $)。我们还为导致最大可能FC降级的攻击者策略导出了一个表达式。但是在这些表达式中,最佳FC策略和攻击者策略都需要先验知识,而这是实践中无法获得的。然后,对次优FC策略的性能分析进行了表征,并基于(受损的)SN合作意愿,我们还从分析上推导了次优攻击者策略。然后,考虑到FC和攻击者现在采取策略性行动,我们将问题重现为FC和攻击者之间的极小博弈,并证明存在纳什均衡(NE)。最后,我们在数值模拟结果中找到了该NE,从而深入了解了所提出策略的检测性能。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号