語系:
繁體中文
English
說明(常見問題)
回圖書館首頁
手機版館藏查詢
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
On Energy-Efficient Wireless Sensor ...
~
Quan, Chen.
FindBook
Google Book
Amazon
博客來
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
紀錄類型:
書目-電子資源 : Monograph/item
正題名/作者:
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines./
作者:
Quan, Chen.
出版者:
Ann Arbor : ProQuest Dissertations & Theses, : 2023,
面頁冊數:
206 p.
附註:
Source: Dissertations Abstracts International, Volume: 85-07, Section: A.
Contained By:
Dissertations Abstracts International85-07A.
標題:
Electrical engineering. -
電子資源:
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30819342
ISBN:
9798381405200
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
Quan, Chen.
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
- Ann Arbor : ProQuest Dissertations & Theses, 2023 - 206 p.
Source: Dissertations Abstracts International, Volume: 85-07, Section: A.
Thesis (Ph.D.)--Syracuse University, 2023.
This item must not be sold to any third party vendors.
Over the years, wireless communication systems have evolved into the most widely used framework for communication devices and networks. These wireless networks form the backbone of wireless sensor networks (WSNs) that have been employed in many applications such as military surveillance, autonomous driving systems and smart-homes. When designing WSNs, two crucial factors must be considered. The first factor is the security of WSNs, which is a concern due to the deployment of low-cost and potentially insecure sensors. The second critical factor is the energy efficiency of WSNs, as they often rely on battery-limited sensors. In this dissertation, we consider the design of various resilient energy-efficient WSNs for the inference task under Byzantine attacks, which are one of the most significant security threats faced by WSNs. When the system suffers from Byzantine attacks, some sensors in the network might be compromised and fully controlled by adversaries. Our goal is to design WSNs that are both energy-efficient and resilient.The first part of this dissertation (Chapters 2 and 3) focuses on enhancing the resilience of WSNs that achieve energy-efficiency through quantization, particularly in scenarios where Byzantine nodes are prevalent, and the fusion center (FC) lacks knowledge of the attack strategy. Our in-depth exploration, analysis, and enhancements center around a promising energy-efficient mechanism known as the audit bit-based mechanism. For the traditional audit bit-based mechanism, we demonstrate how a simple attack strategy can compromise the entire system. To address this concern, we introduce an enhanced audit bit based mechanism, which effectively relaxes the stringent constraints on the attack strategies that this mechanism can withstand. Building upon the enhanced audit bit framework, we propose an advanced audit bit-based scheme that not only improves system robustness but also significantly reduces redundancy related to audit bits. Furthermore, drawing inspiration from both the audit bit-based mechanism and reputation-based mechanisms, we develop some advanced schemes designed to help systems effectively address challenges in scenarios where prior knowledge of attack strategies is unavailable, and Byzantine nodes are a prevailing threat.In the next section of this dissertation (Chapters 4 and 5), we study the resilience of WSNs operating under constraints of limited power supply. Our research focuses on the security aspects of two promising energy-efficient frameworks: ordered transmission (Chapter 4) and compressed sensing (Chapter 5). In Chapter 4, we investigate the impact of Byzantine attacks on the performance of both the traditional order transmission based (OT-based) system and the communication-efficient OT-based (CEOT-based) system. We investigate the error probability and the number of saved transmissions for those OT-based systems under various Byzantine attack strategies. Furthermore, we derive upper and lower bounds on the number of transmissions saved for OT-based systems under various Byzantine attack strategies. A comparison of the resilience of CEOT-based and conventional OT-based systems is presented, offering guidance on implementing OT-based frameworks in potentially hostile environments.In Chapter 5, we investigate the distributed detection problem of sparse stochastic signals with compressed measurements in the presence of Byzantine attacks. We propose two robust detectors based on the traditional Generalized Likelihood Ratio Test (GLRT) and traditional Quantized Locally Most Powerful Test (LMPT) detectors with adaptive thresholds, given that the sparsity degree and the attack strategy are unknown. The proposed detectors can achieve detection performance close to the benchmark likelihood ratio test (LRT) detector with perfect knowledge of the attack strategy and sparsity degree. Furthermore, we explore situations where the fraction of Byzantines in the networks is assumed to be known. In this context, two enhanced detectors building on the previous proposed robust detectors are proposed to further improve the detection performance of the system by filtering out potential malicious sensors.In addition to our primary focus on traditional WSNs, our research extends to the domain of human-machine collaborative networks. These networks are particularly relevant in high-stake scenarios, such as remote sensing and emergency access systems, where automatic physical sensoronly decision-making may not be sufficient. A combination of human and machine inference networks leverages the cognitive strengths of humans and the sensing capabilities of sensors to enhance situational awareness of the systems. Chapter 6 introduces a belief-updating scheme designed to enhance the resilience of these collaborative networks against potential attacks. The proposed belief-updating scheme, which builds on a human-machine hierarchical network, can also mimic the real-world decision-making process where the sensors' local decisions are collected by humans to make a final decision. Our research reveals that our proposed scheme can improve system performance, even in scenarios where a significant fraction of physical sensors in the system are compromised, and where knowledge about the exact fraction of malicious physical sensors is lacking. Additionally, we conduct an analysis of the impact of side information from individual human sensors, and compare different operations used to incorporate the side information.
ISBN: 9798381405200Subjects--Topical Terms:
649834
Electrical engineering.
Subjects--Index Terms:
Detection
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
LDR
:06734nmm a2200397 4500
001
2395823
005
20240517105027.5
006
m o d
007
cr#unu||||||||
008
251215s2023 ||||||||||||||||| ||eng d
020
$a
9798381405200
035
$a
(MiAaPQ)AAI30819342
035
$a
AAI30819342
040
$a
MiAaPQ
$c
MiAaPQ
100
1
$a
Quan, Chen.
$3
3765326
245
1 0
$a
On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines.
260
1
$a
Ann Arbor :
$b
ProQuest Dissertations & Theses,
$c
2023
300
$a
206 p.
500
$a
Source: Dissertations Abstracts International, Volume: 85-07, Section: A.
500
$a
Advisor: Varshney, Pramod K.
502
$a
Thesis (Ph.D.)--Syracuse University, 2023.
506
$a
This item must not be sold to any third party vendors.
520
$a
Over the years, wireless communication systems have evolved into the most widely used framework for communication devices and networks. These wireless networks form the backbone of wireless sensor networks (WSNs) that have been employed in many applications such as military surveillance, autonomous driving systems and smart-homes. When designing WSNs, two crucial factors must be considered. The first factor is the security of WSNs, which is a concern due to the deployment of low-cost and potentially insecure sensors. The second critical factor is the energy efficiency of WSNs, as they often rely on battery-limited sensors. In this dissertation, we consider the design of various resilient energy-efficient WSNs for the inference task under Byzantine attacks, which are one of the most significant security threats faced by WSNs. When the system suffers from Byzantine attacks, some sensors in the network might be compromised and fully controlled by adversaries. Our goal is to design WSNs that are both energy-efficient and resilient.The first part of this dissertation (Chapters 2 and 3) focuses on enhancing the resilience of WSNs that achieve energy-efficiency through quantization, particularly in scenarios where Byzantine nodes are prevalent, and the fusion center (FC) lacks knowledge of the attack strategy. Our in-depth exploration, analysis, and enhancements center around a promising energy-efficient mechanism known as the audit bit-based mechanism. For the traditional audit bit-based mechanism, we demonstrate how a simple attack strategy can compromise the entire system. To address this concern, we introduce an enhanced audit bit based mechanism, which effectively relaxes the stringent constraints on the attack strategies that this mechanism can withstand. Building upon the enhanced audit bit framework, we propose an advanced audit bit-based scheme that not only improves system robustness but also significantly reduces redundancy related to audit bits. Furthermore, drawing inspiration from both the audit bit-based mechanism and reputation-based mechanisms, we develop some advanced schemes designed to help systems effectively address challenges in scenarios where prior knowledge of attack strategies is unavailable, and Byzantine nodes are a prevailing threat.In the next section of this dissertation (Chapters 4 and 5), we study the resilience of WSNs operating under constraints of limited power supply. Our research focuses on the security aspects of two promising energy-efficient frameworks: ordered transmission (Chapter 4) and compressed sensing (Chapter 5). In Chapter 4, we investigate the impact of Byzantine attacks on the performance of both the traditional order transmission based (OT-based) system and the communication-efficient OT-based (CEOT-based) system. We investigate the error probability and the number of saved transmissions for those OT-based systems under various Byzantine attack strategies. Furthermore, we derive upper and lower bounds on the number of transmissions saved for OT-based systems under various Byzantine attack strategies. A comparison of the resilience of CEOT-based and conventional OT-based systems is presented, offering guidance on implementing OT-based frameworks in potentially hostile environments.In Chapter 5, we investigate the distributed detection problem of sparse stochastic signals with compressed measurements in the presence of Byzantine attacks. We propose two robust detectors based on the traditional Generalized Likelihood Ratio Test (GLRT) and traditional Quantized Locally Most Powerful Test (LMPT) detectors with adaptive thresholds, given that the sparsity degree and the attack strategy are unknown. The proposed detectors can achieve detection performance close to the benchmark likelihood ratio test (LRT) detector with perfect knowledge of the attack strategy and sparsity degree. Furthermore, we explore situations where the fraction of Byzantines in the networks is assumed to be known. In this context, two enhanced detectors building on the previous proposed robust detectors are proposed to further improve the detection performance of the system by filtering out potential malicious sensors.In addition to our primary focus on traditional WSNs, our research extends to the domain of human-machine collaborative networks. These networks are particularly relevant in high-stake scenarios, such as remote sensing and emergency access systems, where automatic physical sensoronly decision-making may not be sufficient. A combination of human and machine inference networks leverages the cognitive strengths of humans and the sensing capabilities of sensors to enhance situational awareness of the systems. Chapter 6 introduces a belief-updating scheme designed to enhance the resilience of these collaborative networks against potential attacks. The proposed belief-updating scheme, which builds on a human-machine hierarchical network, can also mimic the real-world decision-making process where the sensors' local decisions are collected by humans to make a final decision. Our research reveals that our proposed scheme can improve system performance, even in scenarios where a significant fraction of physical sensors in the system are compromised, and where knowledge about the exact fraction of malicious physical sensors is lacking. Additionally, we conduct an analysis of the impact of side information from individual human sensors, and compare different operations used to incorporate the side information.
590
$a
School code: 0659.
650
4
$a
Electrical engineering.
$3
649834
650
4
$a
Energy.
$3
876794
650
4
$a
Technical communication.
$3
3172863
653
$a
Detection
653
$a
Signal processing
653
$a
Estimation
653
$a
Byzantine attacks
653
$a
Fusion center
690
$a
0544
690
$a
0643
690
$a
0791
710
2
$a
Syracuse University.
$b
Electrical Engineering and Computer Science.
$3
3169988
773
0
$t
Dissertations Abstracts International
$g
85-07A.
790
$a
0659
791
$a
Ph.D.
792
$a
2023
793
$a
English
856
4 0
$u
https://pqdd.sinica.edu.tw/twdaoapp/servlet/advanced?query=30819342
筆 0 讀者評論
館藏地:
全部
電子資源
出版年:
卷號:
館藏
1 筆 • 頁數 1 •
1
條碼號
典藏地名稱
館藏流通類別
資料類型
索書號
使用類型
借閱狀態
預約狀態
備註欄
附件
W9504143
電子資源
11.線上閱覽_V
電子書
EB
一般使用(Normal)
在架
0
1 筆 • 頁數 1 •
1
多媒體
評論
新增評論
分享你的心得
Export
取書館
處理中
...
變更密碼
登入