Language:
English
繁體中文
Help
回圖書館首頁
手機版館藏查詢
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
On Energy-Efficient Wireless Sensor ...
~
Quan, Chen.
Linked to FindBook
Google Book
Amazon
博客來
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
Record Type:
Electronic resources : Monograph/item
Title/Author:
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines./
Author:
Quan, Chen.
Published:
Ann Arbor : ProQuest Dissertations & Theses, : 2023,
Description:
206 p.
Notes:
Source: Dissertations Abstracts International, Volume: 85-07, Section: A.
Contained By:
Dissertations Abstracts International85-07A.
Subject:
Electrical engineering. -
Online resource:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30819342
ISBN:
9798381405200
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
Quan, Chen.
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
- Ann Arbor : ProQuest Dissertations & Theses, 2023 - 206 p.
Source: Dissertations Abstracts International, Volume: 85-07, Section: A.
Thesis (Ph.D.)--Syracuse University, 2023.
This item must not be sold to any third party vendors.
Over the years, wireless communication systems have evolved into the most widely used framework for communication devices and networks. These wireless networks form the backbone of wireless sensor networks (WSNs) that have been employed in many applications such as military surveillance, autonomous driving systems and smart-homes. When designing WSNs, two crucial factors must be considered. The first factor is the security of WSNs, which is a concern due to the deployment of low-cost and potentially insecure sensors. The second critical factor is the energy efficiency of WSNs, as they often rely on battery-limited sensors. In this dissertation, we consider the design of various resilient energy-efficient WSNs for the inference task under Byzantine attacks, which are one of the most significant security threats faced by WSNs. When the system suffers from Byzantine attacks, some sensors in the network might be compromised and fully controlled by adversaries. Our goal is to design WSNs that are both energy-efficient and resilient.The first part of this dissertation (Chapters 2 and 3) focuses on enhancing the resilience of WSNs that achieve energy-efficiency through quantization, particularly in scenarios where Byzantine nodes are prevalent, and the fusion center (FC) lacks knowledge of the attack strategy. Our in-depth exploration, analysis, and enhancements center around a promising energy-efficient mechanism known as the audit bit-based mechanism. For the traditional audit bit-based mechanism, we demonstrate how a simple attack strategy can compromise the entire system. To address this concern, we introduce an enhanced audit bit based mechanism, which effectively relaxes the stringent constraints on the attack strategies that this mechanism can withstand. Building upon the enhanced audit bit framework, we propose an advanced audit bit-based scheme that not only improves system robustness but also significantly reduces redundancy related to audit bits. Furthermore, drawing inspiration from both the audit bit-based mechanism and reputation-based mechanisms, we develop some advanced schemes designed to help systems effectively address challenges in scenarios where prior knowledge of attack strategies is unavailable, and Byzantine nodes are a prevailing threat.In the next section of this dissertation (Chapters 4 and 5), we study the resilience of WSNs operating under constraints of limited power supply. Our research focuses on the security aspects of two promising energy-efficient frameworks: ordered transmission (Chapter 4) and compressed sensing (Chapter 5). In Chapter 4, we investigate the impact of Byzantine attacks on the performance of both the traditional order transmission based (OT-based) system and the communication-efficient OT-based (CEOT-based) system. We investigate the error probability and the number of saved transmissions for those OT-based systems under various Byzantine attack strategies. Furthermore, we derive upper and lower bounds on the number of transmissions saved for OT-based systems under various Byzantine attack strategies. A comparison of the resilience of CEOT-based and conventional OT-based systems is presented, offering guidance on implementing OT-based frameworks in potentially hostile environments.In Chapter 5, we investigate the distributed detection problem of sparse stochastic signals with compressed measurements in the presence of Byzantine attacks. We propose two robust detectors based on the traditional Generalized Likelihood Ratio Test (GLRT) and traditional Quantized Locally Most Powerful Test (LMPT) detectors with adaptive thresholds, given that the sparsity degree and the attack strategy are unknown. The proposed detectors can achieve detection performance close to the benchmark likelihood ratio test (LRT) detector with perfect knowledge of the attack strategy and sparsity degree. Furthermore, we explore situations where the fraction of Byzantines in the networks is assumed to be known. In this context, two enhanced detectors building on the previous proposed robust detectors are proposed to further improve the detection performance of the system by filtering out potential malicious sensors.In addition to our primary focus on traditional WSNs, our research extends to the domain of human-machine collaborative networks. These networks are particularly relevant in high-stake scenarios, such as remote sensing and emergency access systems, where automatic physical sensoronly decision-making may not be sufficient. A combination of human and machine inference networks leverages the cognitive strengths of humans and the sensing capabilities of sensors to enhance situational awareness of the systems. Chapter 6 introduces a belief-updating scheme designed to enhance the resilience of these collaborative networks against potential attacks. The proposed belief-updating scheme, which builds on a human-machine hierarchical network, can also mimic the real-world decision-making process where the sensors' local decisions are collected by humans to make a final decision. Our research reveals that our proposed scheme can improve system performance, even in scenarios where a significant fraction of physical sensors in the system are compromised, and where knowledge about the exact fraction of malicious physical sensors is lacking. Additionally, we conduct an analysis of the impact of side information from individual human sensors, and compare different operations used to incorporate the side information.
ISBN: 9798381405200Subjects--Topical Terms:
649834
Electrical engineering.
Subjects--Index Terms:
Detection
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
LDR
:06734nmm a2200397 4500
001
2395823
005
20240517105027.5
006
m o d
007
cr#unu||||||||
008
251215s2023 ||||||||||||||||| ||eng d
020
$a
9798381405200
035
$a
(MiAaPQ)AAI30819342
035
$a
AAI30819342
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Quan, Chen.
$3
3765326
245
1 0
$a
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2023
300
$a
206 p.
500
$a
Source: Dissertations Abstracts International, Volume: 85-07, Section: A.
500
$a
Advisor: Varshney, Pramod K.
502
$a
Thesis (Ph.D.)--Syracuse University, 2023.
506
$a
This item must not be sold to any third party vendors.
520
$a
Over the years, wireless communication systems have evolved into the most widely used framework for communication devices and networks. These wireless networks form the backbone of wireless sensor networks (WSNs) that have been employed in many applications such as military surveillance, autonomous driving systems and smart-homes. When designing WSNs, two crucial factors must be considered. The first factor is the security of WSNs, which is a concern due to the deployment of low-cost and potentially insecure sensors. The second critical factor is the energy efficiency of WSNs, as they often rely on battery-limited sensors. In this dissertation, we consider the design of various resilient energy-efficient WSNs for the inference task under Byzantine attacks, which are one of the most significant security threats faced by WSNs. When the system suffers from Byzantine attacks, some sensors in the network might be compromised and fully controlled by adversaries. Our goal is to design WSNs that are both energy-efficient and resilient.The first part of this dissertation (Chapters 2 and 3) focuses on enhancing the resilience of WSNs that achieve energy-efficiency through quantization, particularly in scenarios where Byzantine nodes are prevalent, and the fusion center (FC) lacks knowledge of the attack strategy. Our in-depth exploration, analysis, and enhancements center around a promising energy-efficient mechanism known as the audit bit-based mechanism. For the traditional audit bit-based mechanism, we demonstrate how a simple attack strategy can compromise the entire system. To address this concern, we introduce an enhanced audit bit based mechanism, which effectively relaxes the stringent constraints on the attack strategies that this mechanism can withstand. Building upon the enhanced audit bit framework, we propose an advanced audit bit-based scheme that not only improves system robustness but also significantly reduces redundancy related to audit bits. Furthermore, drawing inspiration from both the audit bit-based mechanism and reputation-based mechanisms, we develop some advanced schemes designed to help systems effectively address challenges in scenarios where prior knowledge of attack strategies is unavailable, and Byzantine nodes are a prevailing threat.In the next section of this dissertation (Chapters 4 and 5), we study the resilience of WSNs operating under constraints of limited power supply. Our research focuses on the security aspects of two promising energy-efficient frameworks: ordered transmission (Chapter 4) and compressed sensing (Chapter 5). In Chapter 4, we investigate the impact of Byzantine attacks on the performance of both the traditional order transmission based (OT-based) system and the communication-efficient OT-based (CEOT-based) system. We investigate the error probability and the number of saved transmissions for those OT-based systems under various Byzantine attack strategies. Furthermore, we derive upper and lower bounds on the number of transmissions saved for OT-based systems under various Byzantine attack strategies. A comparison of the resilience of CEOT-based and conventional OT-based systems is presented, offering guidance on implementing OT-based frameworks in potentially hostile environments.In Chapter 5, we investigate the distributed detection problem of sparse stochastic signals with compressed measurements in the presence of Byzantine attacks. We propose two robust detectors based on the traditional Generalized Likelihood Ratio Test (GLRT) and traditional Quantized Locally Most Powerful Test (LMPT) detectors with adaptive thresholds, given that the sparsity degree and the attack strategy are unknown. The proposed detectors can achieve detection performance close to the benchmark likelihood ratio test (LRT) detector with perfect knowledge of the attack strategy and sparsity degree. Furthermore, we explore situations where the fraction of Byzantines in the networks is assumed to be known. In this context, two enhanced detectors building on the previous proposed robust detectors are proposed to further improve the detection performance of the system by filtering out potential malicious sensors.In addition to our primary focus on traditional WSNs, our research extends to the domain of human-machine collaborative networks. These networks are particularly relevant in high-stake scenarios, such as remote sensing and emergency access systems, where automatic physical sensoronly decision-making may not be sufficient. A combination of human and machine inference networks leverages the cognitive strengths of humans and the sensing capabilities of sensors to enhance situational awareness of the systems. Chapter 6 introduces a belief-updating scheme designed to enhance the resilience of these collaborative networks against potential attacks. The proposed belief-updating scheme, which builds on a human-machine hierarchical network, can also mimic the real-world decision-making process where the sensors' local decisions are collected by humans to make a final decision. Our research reveals that our proposed scheme can improve system performance, even in scenarios where a significant fraction of physical sensors in the system are compromised, and where knowledge about the exact fraction of malicious physical sensors is lacking. Additionally, we conduct an analysis of the impact of side information from individual human sensors, and compare different operations used to incorporate the side information.
590
$a
School code: 0659.
650
4
$a
Electrical engineering.
$3
649834
650
4
$a
Energy.
$3
876794
650
4
$a
Technical communication.
$3
3172863
653
$a
Detection
653
$a
Signal processing
653
$a
Estimation
653
$a
Byzantine attacks
653
$a
Fusion center
690
$a
0544
690
$a
0643
690
$a
0791
710
2
$a
Syracuse University.
$b
Electrical Engineering and Computer Science.
$3
3169988
773
0
$t
Dissertations Abstracts International
$g
85-07A.
790
$a
0659
791
$a
Ph.D.
792
$a
2023
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30819342
based on 0 review(s)
Location:
ALL
電子資源
Year:
Volume Number:
Items
1 records • Pages 1 •
1
Inventory Number
Location Name
Item Class
Material type
Call number
Usage Class
Loan Status
No. of reservations
Opac note
Attachments
W9504143
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
On shelf
0
1 records • Pages 1 •
1
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login