999精品在线视频,手机成人午夜在线视频,久久不卡国产精品无码,中日无码在线观看,成人av手机在线观看,日韩精品亚洲一区中文字幕,亚洲av无码人妻,四虎国产在线观看 ?

A Trust Assessment-Based Distributed Localization Algorithm for Sensor Networks Under Deception Attacks

2022-10-26 07:48:24YaWangXinmingChenLeiShiYuhuaChengandHoujunWang
IEEE/CAA Journal of Automatica Sinica 2022年10期

Ya Wang, Xinming Chen, Lei Shi, Yuhua Cheng, and Houjun Wang

Dear Editor,

This letter is concerned with the distributed localization issue for wireless sensor networks subject to deception attacks. It is assumed that malicious nodes randomly launch attacks to tamper the ranging information between sensors. In order to accommodate the effects of deception attacks, a trust assessment-based distributed localization algorithm is proposed. Combined with data fusion of barycentric coordinates, our algorithm can achieve accurate localization. Finally,numerical simulations are given to validate the effectiveness of the proposed localization algorithm.

The localization of sensor networks, which aims at obtaining the locations of sensors to achieve the monitoring of networks, is of great significance in various fields of military and industry [1], [2]. In order to achieve exact localization, numerous algorithms have been developed for wireless sensor networks [3]–[6]. For instance, in the presence of uncertainties, a semi-definite programming algorithm was introduced for node localization [3]. A second-order cone programming relaxation of localization was proposed to achieve faster speed than the semi-definite programming algorithm [4]. A gradientbased target localization algorithm was developed for robotic sensor networks by utilizing statistical techniques to estimate the location[5]. A gradient-based fingerprinting system for indoor localization was introduced [6]. However, it should be pointed out that most of existing localization algorithms have certain shortcomings such that they cannot achieve both accurate localization and global convergence. Thus, it is desirable for sensor networks to design an exquisite algorithm with both of the excellent characteristics. To address this issue, a fully distributed iterative localization (DILOC) algorithm on the basis of barycentric coordinates representation was utilized in [7],[8], which can globally converge to the sensors’ accurate locations.

Actually, communication channels in sensor networks are quite vulnerable to cyber attacks due to the nature of wireless communication [9]. Deception attacks, as one of the most typical cyber attacks, may ruin the integrity of data by tampering the information transmitted through communication networks, and eventually lead to undesirable consequences such as malicious manipulation or even system breakdown [10]. To alleviate the negative influence resulted from deception attacks, a number of secure control schemes have been studied [11]–[15]. For example, by designing a pinning strategy-based impulsive controller, the problem of synchronization under deception attacks in multi-agent systems was investigated in[11]. A consensus protocol of multiagent systems under sparse linear injection attacks was designed and the relevant optimization problem was solved efficiently by the means of alternating direction method of multipliers [12]. Moreover, a distributed set-membership filtering algorithm along with two recovery mechanisms for a vehicle platooning system was introduced to identify and resist attacks in [13]. A Lyapunov-based nonlinear control scheme based on a multiagent system was presented in [14] to defend real-time false-data-injection attacks. Based on the notion of network robustness, resilient consensus problem of networked control systems under F-local deception attacks was considered [15]. Although there have been some initial works on secure control under deception attacks, most of them focus on multiagent systems. To the best of the authors’ knowledge, there is a paucity of related results on the localization of wireless sensor networks. Therefore, it is interesting yet challenging to develop a localization algorithm for wireless sensor networks subject to deception attacks.

Motivated by the above observers, this letter aims to solve the localization issue of sensor networks in the presence of deception attacks. Its contributions are twofold: 1) A universal model of deception attacks under which the ranging information based on received signal strength indicator (RSSI) is tampered by injecting false data is considered; 2) A distributed iterative localization algorithm combined with the techniques of trust assessment and data fusion is developed, and it can effectively achieve the accurate localization of sensor networks.

Fig. 1. Illustration of a node lying in the convex hull of its adjacent nodes.

2) Deception attack model: In this letter, it is assumed that malicious nodes are randomly distributed throughout the wireless sensor network which occasionally launch deception attacks on the nearest node, leading to the disintegrity of data transmitted among some of neighbor nodes. As depicted in Fig. 2, the nodes in green refer to sensors in the network, whereas the nodes in red stand for deception attack launchers, and the circles of red dotted line indicate the attack range of malicious nodes. Deception attacks aim to reduce the positioning accuracy or even make the whole sensor network unstable by modifying the data transmitted in the communication channels. In the scenario of this letter, the distances between sensors are measured based on RSSI. Therefore, the packet sent by a node, sayrnot only includes the location informationpr(t) at the current iteration timetbut also contains its transmitted signal power. With the same radio signal transmitting power, the distance between one node and its adjacent node is inversely proportional to the received signal power from the neighbor node, which as follows:and replay attacks. Compared with other attacks, false data injection attacks which can bypass the surveillance of attack detection mechanism silently, are more destructive to the system. Furthermore, in this letter, the tampering of distance measurement can be well modeled through the false data injection model. Therefore, we set up the m daotadel that the distance valuesdir(t) are tampered by injecting false

Fig. 2. Illustration of deception attack model.

Assumption 3: For each non-anchori, there is at least one credible triangulation set in which each node is immune to deception attacks during the entire process of localization.

Remark 2: Due to the randomness of deception attacks launched and limited resources for stealth of malicious nodes, as well as the diversity of the triangulation sets of non-anchors, Assumption 3 is reasonable.

Algorithm design: In this section, a trust assessment based distributed iterative localization algorithm is proposed to eliminate the influence of deception attacks. Here we first introduce an evaluation scheme based on statistical characteristics to assess the trustworthiness of triangulation sets of non-anchors, and then in the process of distributed iterative localization, the weights of the triangulation sets those are evaluated as untrustworthy are reduced.

Consequently, in the following stage of distributed iterative localization, the degree of unreliable triangulation sets to influence the positioning process will be decreased to alleviate the negative impacts of deception attacks on the wireless sensor networks.

2) Distributed iterative localization: In this letter, we adopt a data fusion method of barycentric coordinates combined with trust assessment, on the basis of the DILOC algorithm [7] to resist deception attacks.

According to Assumption 2, the position of non-anchorican be determined by its triangulation sets, thus the location of nodeican be represented in the following iterative form:

Next, we integrate the trust evaluation scheme into the process of distributed iterative localization. The detailed realization is given in Algorithm 1.

Remark 3: Note that when there are not any untrusted nodes and the number of trigulation sets for every non-anchor is only one,Algorithm 1 is reduced to the case of the DILOC algorithm in [7].

As shown in Fig. 3, nodes in black refer to anchors and nodes in red are non-anchors to be localized. The communication interactions among sensors are indicated by directional arrows.

Fig. 3. Interactive topology among sensors.

Algorithm 1 Distributed Localization Based on Trust Assessment 1: Set the Bernoulli distribution parameter φ, gain coefficient γ,noise parameter λ, threshold parameter n, attenuation factor β and the initiate estimations , for ;i ∈Ψ ˇpi(0) i ∈Ψ 2: At each iteration step t, non-anchor estimates its coordinates according to the following rules:Δ(k)i (δi)3: Evaluate the confidence of each triangulation set according to (7);ε(k)i (t)≤0 4: if then~djr(t) akir(t)5: Update using (8) and calculate ;ηki (t)=ηki (t-1)6: .7: else ε(k)i (t-h)≤0 8: if exists then~djr(t) akir(t)9: Update using (9) and calculate ;10: else~djr(t)=~djr(t) akir(t)11: and calculate ;12: end ηki (t)13: Reduce according to (11).14: end 15: Normalize the modified weights using (12);16: Update the coordinates of i based on the parameters obtained above according to (10).

Moreover, Fig. 7 reveals that all the non-anchors cannot converge to the exact locations because the distance measurements obtained by some nodes are tampered, which illustrates the deficiency of DILOC[7] under deception attacks. In contrast, it can be proven from Fig. 8 that our proposed algorithm based on trust assessment is capable of achieving accurate localization while suffering from deception attacks. Therefore, the proposed localization algorithm has been numerically verified.

Fig. 4. Trust weight of the triangulation sets of non-anchor 5.

Fig. 5. Trust weight of the triangulation sets of non-anchor 9.

Fig. 6. Trust weight of the triangulation sets of non-anchor 10.

Fig. 7. Localization using DILOC [7] under deception attacks.

Fig. 8. Localization using our algorithm under deception attacks.

Conclusion: In this letter, the localization issue of wireless sensor networks under deception attacks has been investigated. A distributed iterative localization algorithm based on trust assessment has been presented for ensuring the accurate positioning of sensors subject to malicious tampering. By utilizing data fusion of barycentric coordinates combined with trust assessment model, the coordinates of non-anchors converge to their precise locations. Furthermore, the validity of the algorithm has been verified by numerical examples.

Acknowledgments: This work was supported in part by the National Natural Science Foundation of China (62103080), the Natural Science Foundation of Sichuan Province (2022NSFSC0878), the National Postdoctoral Program for Innovative Talents (BX2021056),the China Postdoctoral Science Foundation (2021M700696), and the Sichuan Science and Technology Program (2021YFH0042).


登錄APP查看全文

主站蜘蛛池模板: 日韩123欧美字幕| 亚洲AV无码乱码在线观看裸奔| 超碰aⅴ人人做人人爽欧美| 伊人久久久大香线蕉综合直播| 999国产精品| 青青青国产在线播放| 麻豆精品在线视频| 狠狠色噜噜狠狠狠狠色综合久| 久久综合婷婷| 久久综合结合久久狠狠狠97色| 欧美精品二区| 在线观看国产精品一区| 免费一级成人毛片| 另类欧美日韩| 丁香婷婷激情综合激情| 蜜桃臀无码内射一区二区三区| 国产jizz| 五月婷婷综合色| 91九色国产porny| 国产91在线免费视频| 高清码无在线看| 5555国产在线观看| 国产成人久久777777| 国产一区二区三区在线无码| 亚洲一级毛片在线播放| 亚洲系列中文字幕一区二区| 伊人中文网| 香蕉eeww99国产精选播放| 四虎影视永久在线精品| 亚洲天堂久久久| 99久久免费精品特色大片| 亚洲色欲色欲www网| 国产成人乱无码视频| 国产精品刺激对白在线| 性视频一区| 日韩精品一区二区三区swag| 久久久久久国产精品mv| 久久永久免费人妻精品| 91麻豆精品国产高清在线| 国产精品漂亮美女在线观看| 亚洲美女一区| 国产精品熟女亚洲AV麻豆| 国产精品9| 国产超薄肉色丝袜网站| 青青国产视频| 亚洲bt欧美bt精品| 午夜视频免费一区二区在线看| 免费国产一级 片内射老| 国产成人亚洲精品色欲AV| 91麻豆国产在线| 最新国产成人剧情在线播放| 成人一级黄色毛片| 波多野结衣第一页| 亚洲国产精品不卡在线| 五月婷婷中文字幕| 日本一区二区不卡视频| 欧美一级黄片一区2区| 亚洲第一区精品日韩在线播放| 操美女免费网站| 欧美成人精品在线| 岛国精品一区免费视频在线观看| 亚洲国产精品无码AV| 色婷婷狠狠干| 亚洲成肉网| 日韩在线观看网站| 亚洲自偷自拍另类小说| 亚洲熟女偷拍| 97国产精品视频自在拍| 网友自拍视频精品区| 久久99精品久久久久纯品| 亚洲男人天堂网址| 国产精品人莉莉成在线播放| 亚洲天堂免费| 欧美丝袜高跟鞋一区二区| 日韩欧美中文在线| 亚洲无码高清免费视频亚洲 | 国产不卡在线看| 国内精品久久九九国产精品| 国产精品福利导航| 中文无码毛片又爽又刺激| 国产乱子伦手机在线| 精品自窥自偷在线看|