Capacity of cooperative fusion in the presence of byzantine sensors

Oliver Kosut, Lang Tong

Research output: Chapter in Book/Report/Conference proceedingConference contribution

5 Scopus citations

Abstract

The problem of cooperative fusion in the presence of both Byzantine sensors and misinformed sensors is considered. An information theoretic formulation is used to characterize the Shannon capacity of sensor fusion. It is shown that when there are fewer Byzantine sensors than honest sensors, the effect of Byzantine attack can be entirely mitigated, and the fusion capacity is identical to that when all sensors are honest. However, when at least as many sensors are Byzantine as are honest, the Byzantine sensors can completely defeat the sensor fusion so that no information can be transmitted reliably. A capacity achieving transmit-then-verify strategy is proposed for the case that fewer sensors are Byzantine than honest, and its error probability and coding rate is analyzed by using a Markov decision process modeling of the transmission protocol.

Original languageEnglish (US)
Title of host publication44th Annual Allerton Conference on Communication, Control, and Computing 2006
PublisherUniversity of Illinois at Urbana-Champaign, Coordinated Science Laboratory and Department of Computer and Electrical Engineering
Pages987-995
Number of pages9
Volume2
ISBN (Electronic)9781604237924
StatePublished - 2006
Externally publishedYes
Event44th Annual Allerton Conference on Communication, Control, and Computing 2006 - Monticello, United States
Duration: Sep 27 2006Sep 29 2006

Other

Other44th Annual Allerton Conference on Communication, Control, and Computing 2006
CountryUnited States
CityMonticello
Period9/27/069/29/06

Keywords

  • Byzantine attack
  • Network security
  • Sensor fusion
  • Shannon capacity

ASJC Scopus subject areas

  • Computer Science Applications
  • Computer Networks and Communications

Fingerprint Dive into the research topics of 'Capacity of cooperative fusion in the presence of byzantine sensors'. Together they form a unique fingerprint.

Cite this