Chen, Chao-Yang ORCID: https://orcid.org/0000-0002-8095-399X, Tan, Dingrong ORCID: https://orcid.org/0009-0000-7957-3992, Li, Pei ORCID: https://orcid.org/0000-0002-2441-3083, Chen, Juan ORCID: https://orcid.org/0000-0002-0621-1971, Gui, Guan ORCID: https://orcid.org/0000-0003-3888-2881, Adebisi, Bamidele ORCID: https://orcid.org/0000-0001-9071-9120, Gacanin, Haris ORCID: https://orcid.org/0000-0003-3168-8883 and Adachi, Fumiyuki ORCID: https://orcid.org/0000-0002-5416-0718 (2024) Robust Distributed Estimation of Wireless Sensor Networks Under Adversarial Attacks. IEEE Transactions on Vehicular Technology, 73 (5). pp. 7102-7113. ISSN 1939-9359
Published Version
File not available for download. Available under License In Copyright. Download (3MB) |
Abstract
This article focuses on the parameter estimation problem in wireless sensor networks (WSNs) under adversarial attacks, considering the complexities of sensing and communication in challenging environments. In order to mitigate the impact of these attacks on the network, we propose a novel AP-DLMS algorithm with adaptive threshold attack detection and malicious punishment mechanism. The adaptive threshold is constructed using the observation matrix and network topology to detect the location of malicious attacks, while the standard reference estimation is designed to obtain the estimated deviation of each node. To mitigate the impact of data tampering on network performance, we introduce the honesty factor and punishment factor to combine the weights of normal nodes and malicious nodes respectively. Additionally, we propose a new probabilistic random attack model. Simulations are conducted to investigate the influence of key parameters in the adaptive threshold on the performance of the proposed AP-DLMS algorithm, and the mean square performance of the algorithm is analyzed under various attack models. The results demonstrate that the proposed algorithm exhibits strong robustness in adversarial networks, and the proposed attack model effectively demonstrates the impact of attacks.
Impact and Reach
Statistics
Additional statistics for this dataset are available via IRStats2.