2016
DOI: 10.1109/tsipn.2016.2549743
|View full text |Cite
|
Sign up to set email alerts
|

Distributed Two-Step Quantized Fusion Rules Via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks

Abstract: Abstract-We consider the problem of distributed soft decision fusion in a bandwidth-constrained spatially uncorrelated wireless sensor network (WSN). The WSN is tasked with the detection of an intruder transmitting an unknown signal over a fading channel. Existing distributed consensus-based fusion rules algorithms only ensure equal combining of local data and in the case of bandwidth-constrained WSNs, we show that their performance is poor and does not converge across the sensor nodes (SNs). Motivated by this… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
33
0

Year Published

2016
2016
2024
2024

Publication Types

Select...
5
2

Relationship

2
5

Authors

Journals

citations
Cited by 40 publications
(33 citation statements)
references
References 36 publications
0
33
0
Order By: Relevance
“…Note that in practice we wish to keep P i,f alse d close to zero and P i,true d close to one. Based on this reliability test (i.e., the test in (35)), next we will evaluate the weight combining in (10) such that the probability of detection in (15) is further improved.…”
Section: A Compromised Sns Identificationmentioning
confidence: 99%
See 1 more Smart Citation
“…Note that in practice we wish to keep P i,f alse d close to zero and P i,true d close to one. Based on this reliability test (i.e., the test in (35)), next we will evaluate the weight combining in (10) such that the probability of detection in (15) is further improved.…”
Section: A Compromised Sns Identificationmentioning
confidence: 99%
“…Note that K affects these two metrics through the reliability metric r i (see Fig. 2) in (34) which consequently affects the FC weight combining (37) that finally decides on the FC final test statistic (T f ) (see (10)). …”
Section: A Impact Of the Time Window Length (K) On The Malicious Sn mentioning
confidence: 99%
“…As discussed in the work of Nurellari et al, the performance of the centralised soft CSS can be evaluated for a given P f as normalPdsmallC=Q()Q1false(Pffalse)var()TfSDtrue|H0double-struckE()TfSDtrue|H1+double-struckE()TfSDtrue|H0var()TfsmallSD|scriptH1, where Q (·) is the Gaussian Q ‐function.…”
Section: Cooperative Spectrum Sensingmentioning
confidence: 99%
“…In the work of Soatti et al, a technique named weighted AC accuracy exchange (WAC‐AE) was proposed to solve the localisation problem in networks equipped with several fixed nodes ensuring similar performance to the WAC and optimal ML but with fast convergence. Moreover, in the work of Nurellari et al, a new consensus technique was applied in a quantised way, whereas in the work of Kailkhura et al, a new consensus technique was proposed to deal with security in a cognitive network in a system with Byzantine attacks.…”
Section: Introductionmentioning
confidence: 99%
“…Next, in Section IV-B we distinguish again between two different simulation setups but now from the perspective of the FC mechanisms. A. Sub-optimum attacker's strategies Here, we assume that the attacker knows that the FC uses a linear combining strategy but it is not aware of the combining weights used in (11). We also assume that the FC does not act strategically and uses weight combining, without trying to optimize against the behavior of compromised SNs.…”
Section: B Attacker Performance Optimisationmentioning
confidence: 99%