2019
DOI: 10.3390/s19153436
|View full text |Cite
|
Sign up to set email alerts
|

Analysis of Byzantine Attacks for Target Tracking in Wireless Sensor Networks

Abstract: Herein, the problem of target tracking in wireless sensor networks (WSNs) is investigated in the presence of Byzantine attacks. More specifically, we analyze the impact of Byzantine attacks on the performance of a tracking system. First, under the condition of jointly estimating the target state and the attack parameters, the posterior Cramer–Rao lower bound (PCRLB) is calculated. Then, from the perspective of attackers, we define the optimal Byzantine attack and theoretically find a way to achieve such an att… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 22 publications
0
2
0
Order By: Relevance
“…All of these actions impair network performance, interfere with network routing services, and consume network component resources. 125 Once attackers have yielded the active group of insider nodes in the network hostile, the entire network will be under their control, and further safe data transfer will be impossible. 126 present a viable approach for identifying information insertion and Byzantine attacks utilising the proposed unpredictable network coding scheme.…”
Section: Network Layer Attacksmentioning
confidence: 99%
“…All of these actions impair network performance, interfere with network routing services, and consume network component resources. 125 Once attackers have yielded the active group of insider nodes in the network hostile, the entire network will be under their control, and further safe data transfer will be impossible. 126 present a viable approach for identifying information insertion and Byzantine attacks utilising the proposed unpredictable network coding scheme.…”
Section: Network Layer Attacksmentioning
confidence: 99%
“…The Byzantine attack involves one or more compromised nodes working in a complicit way to carry-on different type of attacks such as forwarding packets through non-optimal routes, creating routing loops, or selectively drops packets thus degrading the performance of the network, disruption the network routing services, and draining the resources of the network component. The Byzantine attack is not easy to detect because the network does not demonstrate detectable abnormal activities [74] [59] [13] [55].…”
Section: ) Byzantine Attackmentioning
confidence: 99%