RANDOM DISTRIBUTED DETECTION WITH AN APPLICATION TO COGNITIVE RADIO BYZANTINE ATTACK

被引:0
作者
Rogers, Uri [1 ]
Guo, Jun [1 ]
Li, Xia [1 ]
Chen, Hao [1 ]
机构
[1] Boise State Univ, Dept Elect & Comp Engn, Boise, ID 83725 USA
来源
2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP) | 2014年
关键词
Distributed Detection; Random Sensor Model; Byzantine Attacks; Cognitive Radio; Spectrum Sensing; INFERENCE;
D O I
暂无
中图分类号
O42 [声学];
学科分类号
070206 ; 082403 ;
摘要
In this paper, a distributed detection model is introduced for m-ary hypotheses testing where the local sensors quantize their decisions to messages with alphabet size of D and the number of local sensors is random following a Poisson distribution. This model can be applied to a wide variety of distributed detection problems including homogenous and heterogeneous networks, robust detection under security attacks, and sensor failure mode analysis. As an illustrative example, the proposed model is applied to a Cognitive Radio network where the performance and strategies regarding Byzantine attacks are investigated under a game theoretical setting. Performance tradeoff between the detection efficiency and robustness of the sensor network is evaluated under the independent Byzantine attack model, where the malicious nodes attack based solely on their own observations. It is shown that, when the system is designed for maximum efficiency versus optimal robustness, then the malicious users may completely blind the fusion center, with less than one half of the total number of sensors.
引用
收藏
页数:5
相关论文
共 19 条
  • [1] [Anonymous], 1988, MATH CONTROL SIGNAL
  • [2] [Anonymous], 2001, STAT INFERENCE
  • [3] State-of-the-art and recent advances Spectrum Sensing for Cognitive Radio State-of-the-art and recent advances
    Axell, Erik
    Leus, Geert
    Larsson, Erik G.
    Poor, H. Vincent
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2012, 29 (03) : 101 - 116
  • [4] Cell radius inaccuracy: A new measure of coverage reliability
    Bernardin, P
    Yee, MF
    Ellis, T
    [J]. IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 1998, 47 (04) : 1215 - 1226
  • [5] Boyd S., 2004, CONVEX OPTIMIZATION, VFirst, DOI DOI 10.1017/CBO9780511804441
  • [6] Cover T.M., 2006, ELEMENTS INFORM THEO, V2nd ed
  • [7] Grant M., CVX: Matlab Software for Disciplined Convex Programming
  • [8] Graph implementations for nonsmooth convex programs
    Stanford University, United States
    [J]. Lect. Notes Control Inf. Sci., 2008, (95-110): : 95 - 110
  • [9] Malicious User Detection in a Cognitive Radio Cooperative Sensing System
    Kaligineedi, Praveen
    Khabbazian, Majid
    Bhargava, Vijay K.
    [J]. IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2010, 9 (08) : 2488 - 2497
  • [10] Consensus plus Innovations Distributed Inference over Networks
    Kar, Soummya
    Moura, Jose M. F.
    [J]. IEEE SIGNAL PROCESSING MAGAZINE, 2013, 30 (03) : 99 - 109