2016
DOI: 10.1109/tsipn.2016.2614898
|View full text |Cite
|
Sign up to set email alerts
|

Data injection attacks in randomized gossiping

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
34
0

Year Published

2017
2017
2020
2020

Publication Types

Select...
6
2

Relationship

2
6

Authors

Journals

citations
Cited by 33 publications
(36 citation statements)
references
References 18 publications
2
34
0
Order By: Relevance
“…By Lemma 1, it can be shown thatŨ andṼ are sparse matrices. Then, (19) implies that (24). This completes the proof.…”
Section: B Design Of Resilient Attack Detection Estimatorssupporting
confidence: 51%
See 1 more Smart Citation
“…By Lemma 1, it can be shown thatŨ andṼ are sparse matrices. Then, (19) implies that (24). This completes the proof.…”
Section: B Design Of Resilient Attack Detection Estimatorssupporting
confidence: 51%
“…The statistical distribution of the nodes' data was then exploited to devise techniques for mitigating the influence of data falsifying on the detection system. In [19], the problem of detecting and mitigating data injection attacks was studied in randomized gossip-based sensor networks. By analyzing the statistics of the sensors' states, decentralized consensus strategies were designed to detect and localize insider attackers.…”
Section: B Relevant Work On Detection And/or Identification Against mentioning
confidence: 99%
“…This behavior at the application or at the physical communication layer depart significantly from the norm. In an insider attack, however, nodes can collude to force the system to converge to their target outcome following strategies that are harder to discriminate [22], [26], [27].…”
Section: Introductionmentioning
confidence: 99%
“…For instance, we might end up excluding SNs contributing towards the FC global decision that might have high local signal-tonoise-ratios (SNRs). Recently, the authors in [19], [28] both consider a decentralized network in the presence of compromised SNs while in this paper we consider a centralized scheme. The authors in [19] propose a synchronous distributed weighted average consensus algorithm that is claimed to be robust to Byzantine attacks while reference [28] considers the detection and mitigation of data injection attacks in a randomized average consensus.…”
Section: Introductionmentioning
confidence: 99%