Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks

Size: px
Start display at page:

Download "Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks"

Transcription

1 Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Keshav Agrawal, Aditya Vempaty, Hao Chen and Pramod K. Varshney Electrical Engineering Department, University of California, Los Angeles, CA Department of Electrical Engineering and Computer Science, Syracuse University, Syracuse, NY USA avempaty, Department of Electrical and Computer Engineering, Boise State University, Boise, ID, Abstract Wireless Sensor Networks (WSNs) are vulnerable to Byzantine attacks in which malicious sensors send wrong data to the fusion center leading to an increase in the probability of incorrect inference. This paper considers Byzantine attacks for the location estimation task in wireless sensor networks where each sensor uses a binary quantization scheme to send binary data to the fusion center. Posterior Cramer-Rao lower Bound (PCRLB) metric and Fisher Information Matrix (FIM) are used to analyze the performance of the network in the presence of Byzantine attacks. We have considered two kinds of attack strategies, independent attacks (all the malicious sensors attack a WSN independently of each other) and collaborative attacks (all the malicious sensors communicate with each other and attack the WSN in a coordinated manner). We determine the fraction of Byzantine attackers in the network above which the fusion center becomes incapable of finding the location of the target. Optimal attacking strategy for given attacking resources is also proposed. I. INTRODUCTION Wireless Sensor Networks are increasingly being used both in military and civilian applications. One such application is to monitor, detect or estimate the location of a target or object in the area of interest. Secure localization is very important as malicious sensors continuously attempt to disrupt the network and diminish its capability. Several algorithms have been developed for secure localization in wireless sensor networks (WSNs) [1][2][3]. Based on direction of arrival (DOA) for narrow-band sources or time-delay of arrival (TDOA), many techniques for acoustic pulse localization in sensor networks or sensor arrays are available in the literature[4][5]. But due to the requirement of accurate matching of timings, inexpensive sensors cannot be employed as a lot of processing is required for location estimation. As a result, the techniques related to DOA or TDOA are not very practical. Several energy based methods have also been proposed to localize a single source using least-square methods and maximum-likelihood (ML) source location methods[6][7]. Due to resource constraints like energy and bandwidth, it is often desirable that sensors only send binary or multi-bit quantized data to limit the communication requirements [8][9]. In the previous works [8][9], no malicious sensors or attackers have been considered. One kind of attack in a WSN is by Byzantines where an adversary takes over some sensors which send wrong information to the fusion center. The main goal of Byzantine attackers is to undermine the network such that the fusion center is unable to estimate the correct location of the target. A related work was done for primary user detection for cognitive radio networks [10]. In this paper, we try to analyze the degradation in terms of localization performance in a WSN due to Byzantine attackers. We define the strategy followed by the Byzantine attackers and its effect on the location estimate at the fusion center. The rest of the paper is organized as follows: In Section II, we introduce the problem and the assumptions made in the problem formulation. In Section III, we discuss the first type of attack: Independent Attacks. We define the strategy of both Byzantine attackers and the fusion center and we use a suitable metric to analyze the performance of the network. Similar analysis is carried out in Section IV for the case of Collaborative Attacks. Then in Section V, we carry out simulations for the two types of attacks. We conclude the paper with some remarks in Section VI. II. PROBLEM FORMULATION We use a similar target localization scenario as described by Niu and Varshney [9], where the aim is to estimate the location of the target described by the parameter θ =[x t,y t ]. The main difference, however, is that there are some Byzantine sensors present in the network in our case. We consider random deployment of N sensors in the environment as shown in Figure 1 and also assume that the fusion center knows the locations of all the sensors. We use an isotropic signal intensity attenuation model which is the same as used in [9] a 2 i = G ip 0 ) = P 0 ( di d n 0 d n i (1) /11/$ IEEE 1669 Asilomar 2011

2 where a i is the signal amplitude at the i th sensor, G i is the gain at the i th sensor, P 0 is the power emitted by the target measured at a distance d 0, d i is the distance between the target and the i th sensor and P 0 is defined as the product of the power emitted by the target and gain of the i th sensor. We also assume that all the sensors are at least d 0 meters away from the target at all times. As in [9], at each sampling instant, the signal emitted from the target is measured by the sensors. This data collected by all the sensors is called a frame of data. The time interval between the frames is small enough so that we can assume the target to be static for T frames. Hence, the signal strength at the i th sensor during frame j, a ij, is invariant for T frames, i.e., a ij = a i for j =1, 2,,T. The signal at each sensor is assumed to be corrupted by an additive Gaussian noise: r ij = a i + w ij (2) where r ij is the received signal amplitude at the i th sensor during the j th frame. We assume that for every sensor, noise follows an identical zero mean Gaussian distribution which is independent across the sensors. Then, it is straightforward to show that, for this localization problem (and many other inference problems as well), the sufficient statistic at the i th sensor is the average received signal amplitude: where s i = 1 T T r ij = a i + v i (3) j=1 v i = 1 T T w ij (4) j=1 We know that v i,i = 1, 2,..., N, also follows a Gaussian distribution: v i N(0, 2 ), At each sensor, both honest and Byzantine, the average signal amplitude s i is quantized using a threshold and is transmitted to the fusion center. The Byzantine sensors can use the same threshold as used by the honest sensors or they can use a different threshold to corrupt the data sent to the fusion center. III. INDEPENDENT ATTACK A. Attack Model In this section, we study the strategy which the Byzantine attackers adopt to undermine the network. Here we consider an independent attack where all the Byzantine sensors attack the network independently without communicating with each other. The quantization process which is used at the i th sensor to quantize the received signal is as follows: 0 s i <η D i = (5) 1 s i >η where D i is the quantized value at the i th sensor and η is the threshold used by the sensor for quantization. For the independent attack case, we assume that all the honest sensors use the same threshold η h and all the malicious sensors use the same threshold η b for quantization. This seems intuitively correct because all the sensors (Honest/Byzantine) will want their data to be consistent with the other sensors of its kind (Honest/Byzantine). It is assumed that the channels between the sensors and the fusion center are ideal and thereby the quantized values are received correctly. Let U i be the quantized value sent to the fusion center by the i th sensor. An honest sensor will send D i to the fusion center without changing it, so we can say that U i =D i for all honest sensors. For the case of Byzantine sensors, they will use η b to quantize the received signal and then after quantizing they flip this quantized value with probability 1: D i i th sensor is Honest U i = D i i th (6) sensor is Byzantine We define the probability of U i =1or U i =0at the i th sensor as : ηh a i i =1 θ) =(1 α)q ( ) ηb a i + α 1 Q (7) ( ) ηh a i i =0 θ) =(1 α) 1 Q ηb a i + αq (8) where Q(.) is the complementary distribution function of the standard Gaussian distribution and α is the probability of a sensor to be a Byzantine. After collecting U = [U 1 U 2...U N ], maximum likelihood (ML) estimation is employed at the fusion center to estimate the target location θ =[x t,y t ]: θ) = where δ(.) is defined as N δ(x) = 1 i = l θ) δ(ui l) (9) 0 x 0 1 x =0 The log-likelihood function can be written as [9] ln θ) = N (10) 1 δ(u i l)ln( i = l θ)) (11) and the ML estimate of θ is given as ˆθ = argmax lnp(u θ) θ 1670

3 B. Resources for Blinding the Fusion Center We use Posterior Cramer-Rao lower Bound (PCRLB) and Fisher information matrix (FIM) as the metrics to analyze the performance of this location estimation method. The PCRLB can be found as the inverse of FIM where FIM is given as follows: FIM = E[ θ T a b θ lnp(u θ)] =, c d where the elements a, b, c and d are defined as: ( N 1 [ ] ) 2 a = p(θ) dθ i = l θ) x t (12) ( N 1 [ ] ) 2 d = p(θ) dθ i = l θ) y t (13) N 1 [ ] c = b = p(θ) i = l θ) x t [ ] P(Ui = l θ) dθ (14) y t where p(θ) is the prior distribution of the target location assumed by the fusion center. We assume the prior distribution to be a normal distribution such that the region of interest lies in 99% of the confidence region. Now, the fusion center would like this PCRLB to be as small as possible to get a good estimate of the target location while the Byzantine attackers would want it to be large to have the maximum damage. If Byzantine attackers are able to make this PCRLB approach infinity, then the fusion center will become incapable of estimating the target location. We define α blind as the minimum fraction of Byzantine sensors which will make the fusion center incapable of using the information sent by the sensors in estimating the target location. As PCRLB is multidimensional, we will use the trace of the PCRLB matrix to calculate α blind. Byzantines will try to make the trace of the PCRLB matrix as large as possible or the determinant of Fisher information matrix close to zero. That is, in the latter case, the minimum required α blind can be found by making FIM =0or ad bc =0. C. A Zero-Sum Game between Fusion Center and Byzantine Attackers When α, i.e., the fraction of Byzantine sensors in the network, is greater than or equal to α blind, attackers will be able to blind the fusion center completely. But when α is not large enough to blind the fusion center, the Byzantine sensors will try to maximize the damage by making tr(pcrlb) as large as possible or by making FIM as low as possible. In contrast, the fusion center would want to minimize the tr(pcrlb) or maximize the FIM. This will reduce to a game between the fusion center and the Byzantine attackers where they have opposite goals. The Byzantine sensors will change the threshold η b to maximize the tr(pcrlb) or minimize FIM while the fusion center will change the honest sensors threshold η h to minimize this maximum value tr(pcrlb) or maximize this minimum value FIM. Thus, it is a minimax problem and the best strategy for both the players in the minimax game is the saddle point. We find the saddle point using a method similar to the method adopted in [10]. First, we find all the saddle points of tr(pcrlb) by setting tr(pcrlb) = tr(pcrlb) =0.The η h η h saddle point is the one which gives a negative ( value for ) the expression: 2 tr(pcrlb) 2 tr(pcrlb) 2 η h 2 η b 2 tr(pcrlb) 2. η h η b Note that the above expressions are with respect to tr(pcrlb), similar analysis can be done when we use FIM as the performance metric. IV. COLLABORATIVE ATTACK Next, we consider the case of Byzantine attacks where all the malicious sensors communicate with each other and attack the network in a coordinated fashion. Analysis of the collaborative attack is significantly more complicated than the independent case. Here, we provide a reasonable lower bound for α blind, namely αblind L, for this case. To find the lower bound, we assume that the exact location of target θ can be perfectly learned by Byzantine sensors. Thus, we consider the case where Byzantine attackers know the location of the target and use this information collaboratively to improve their attack on the network. In such a case, the optimal strategy for the Byzantine sensors will be to send Ui B based on the θ value and their location. For a given sensor i and its location θ i, its observation model and its threshold η i, the probability of the sensor sending a quantized value 1 as seen by the Fusion Center is: P i (U i =1 θ) =(1 α)p H i (U i =1 θ) + αpi B (U i =1 θ) (15) The Byzantines would like to design their variables α and Pi B(U i = 1 θ) so that the Fusion Center becomes blind to the information received from this i th sensor, i.e., the information received from the i th sensor does not help the Fusion Center in location estimation. This can be done by making the value P i (U i = 1 θ) a constant value (k) with respect to θ. Let Pi,inf H = inf θ(pi H (U i = 1 θ)) and the Pi,sup H =sup θ(pi H (U i =1 θ)). Then for the i th sensor, if it was honest and Pi H (U i =1 θ) =Pi,inf H, it would mean that the target is as far away from the i th sensor as possible. However, if the same sensor behaved as a Byzantine it would send a 1 to the Fusion Center with as high a probability as possible, i.e., Pi B(U i =1 θ) =1. Similarly, if the i th sensor was honest and Pi H (U i =1 θ) =Pi,sup H, then it would mean that the target is as close to the i th sensor as possible and if the same sensor behaved as a Byzantine, it would send a 1 to the Fusion Center with as low a probability as possible, i.e., Pi B(U i =1 θ) =0. This gives us two equations in two unknowns, αblind,i L and k: (1 αblind,i)p L i,inf H + αblind,i.1 L =k (16) 1671

4 and (1 αblind,i)p L i,sup H + αblind,i.0 L =k (17) On solving, we get αblind,i L = P i,sup H P i,inf H 1+Pi,sup H P i,inf H (18) where αblind,i L is the fraction of malicious sensors required to make sensor i non-informative to the Fusion Center. In this case, we have at the Fusion Center, P i (U i =1 θ) =(1 α L blind,i)p H i (U i =1 θ) P H i,sup + αblind,ip L i B (U i =1 θ) = 1+Pi,sup H P i,inf H (19) which is a constant, independent of θ. Thus, when α αblind,i L for a particular honest sensor i, the attackers can have α αblind,i L fraction of Byzantine sensors act like honest nodes and have the rest αblind,i L Byzantine sensors send 1 with probability as below: Pi B (U i =1 θ) = P i,sup H P i H (U i =1 θ) Pi,sup H P i,inf H This causes the fusion center to become incapable of utilizing the received information from the i th sensor to estimate the target location. In order to guarantee that the fusion center cannot obtain any useful information from any of its sensors, the minimum required αblind L will be: αblind L =maxαblind,i L i This provides us with a lower bound, αblind L, for the collaborative case. V. SIMULATION RESULTS We consider the WSN model as shown in Figure 1 where N = 121 sensors are randomly deployed in a 11 x 11 square region of interest, and represents the location of the target. There are M = α.n Byzantine sensors present in the network as shown in Fig 1 who try to manipulate the data and send wrong information to the fusion center F. In Fig. 2, we plot the value of α blind in the case of an independent attack which varies with η h and η b. When η h = η b, which is the case at the saddle point, α blind is equal to 1/2, i.e., unless the number of Byzantine sensors is greater or equal to 50 percent of the total number of sensors, the fusion center can not be made blind under independent attack. We also saw in Section III that when α is less than α blind, there exists a game between the fusion center and Byzantine sensors, both can vary their threshold according to the scenario. In Figs. 3 and 4, we plot tr(pcrlb) with varying thresholds and we see that there exists a saddle point (ηh,η b ) which provides optimal strategies for both types of sensors. This result is intuitive as both types of sensors will try to achieve their objective which will become a minimax game. The saddle point (ηh,η b )), in our example, is at (9.5, 9.5). Figure 5 shows similar game theoretic analysis result for the case of FIM as the performance metric. The optimal values (ηh,η b ) in this case come out to be the same, namely (9.5, 9.5). Thus, we can say that there exist saddle points (ηh,η b ) which yield the optimal strategy for both the fusion center and Byzantine attackers. In our case, these values come out to be the same, irrespective of the performance metric we use. For the Collaborative Attack case, it can be observed that αblind,i L given by (18) is always 0.5 which implies that αblind L 0.5 which is the α blind obtained in the Independent attack case. This shows that if a strategy exists to obtain this lower bound, then the fraction of sensors required to blind the Fusion Center would decrease in the Collaborative Attack case as compared to the Independent Attack case. VI. CONCLUSION &FUTURE WORK In this paper, we have analyzed the effect of Byzantine attacks on the wireless sensor network tasked with target localization. We proposed an optimal strategy for both Byzantines and the fusion center for the target localization task for the case when each Byzantine sensor attacks independently. We also defined and found the fraction of Byzantine sensors needed to completely blind the fusion center. We also considered the case of a collaborative attack where all the Byzantine sensors communicate with each other to have the maximum damage. We have also found the lower bound on the number of Byzantine sensors required to completely blind the fusion center for the collaborative case. We also analyzed the situation when the Byzantines do not have the adequate resources to blind the Fusion Center. In such a case, we looked at the minimax game between the two players. We have simulated the assumed scenario and showed the existence of saddle points for the minimax game. In the future, we plan to come up with a counter-attack to the Byzantines, where the Byzantines can be identified. Their parameters can then be learnt and their information can be used by the Fusion Center for improving the network s performance similar to our work in [11]. ACKNOWLEDGMENT This work was supported by AFOSR contract FA C-0221, AFOSR contract FA C-0179 and CASE at Syracuse University. REFERENCES [1] Boukerche, A.; Oliveira, H.A.B.; Nakamura, E.F.; Loureiro, A.A.F.; Secure localization algorithms for wireless sensor networks, Communications Magazine, IEEE,Volume 46, Issue: 4,page: , [2] Li, Z.; Trappe, W.; Zhang, Y.; Badri Nath; Robust statistical methods for securing wireless localization in sensor networks, Information Processing in Sensor Networks, Pages:91-98, [3] Yanchao Zhang; Wei Liu; Yuguang Fang; Secure localization in wireless sensor networks, Military Communications Conference, MILCOM IEEE, Page(s): Vol. 5, [4] L. M Kaplan, Q. Le, and P. Molnar, Maximum likelihood methids for bearing-only target localization, in Proc. Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2001), Salt Lake City, UT, May 2001, vol. 5, pp

5 [5] J. C. Chen, R. E. hudson, and K. Yao, A maximum likelihood parametric approach to source localization, in Proc. Int. Conf. Acoustics, Speech, and Signal Processing (ICASSP 2001), Salt Lake City, UT, May 2001, vol. 5, pp [6] D. Li and Y. H. Hu, Energy based collaborative source localization using acoustic microsensor array, EURASIP J. Appl. Signal Process., no. 4, pp , 2003 [7] X. Sheng and Y. H. Hu, Maximum likelihood multiple-source localization using acoustic energy measurements with wireless sensor netwroks, IEEE Trans. Signal Process., vol. 53, no. 1, pp , Jan, 2005 [8] N. Patwari and A. O. Hero, Using proximity and quantized RSS for sensor localization in wireless networks, in Proc. 2nd Int. ACM Workshop on Wireless Sensor Networks and Applications, San Diego, CA, Sep. 2003, pp [9] Ruixin Niu; Varshney, P.K.; Target Location Estimation in Sensor Networks With Quantized Data, Signal Processing, IEEE Transactions, vol. 54, Issue: 12, pp , 2006 [10] A.S. Rawat, P. Anand, H. Chen and P. K. Varshney, Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks, IEEE Transactions on Signal Processing, vol.59, no.2, pp , Feb [11] Vempaty, A.; Agrawal, K.; Chen, H.; Varshney, P.K.; Adaptive Learning of Byzantines Behavior in Cooperative Spectrum Sensing, in Proc. IEEE WCNC 2011,. Fig. 1. System Model Fig. 4. Plot of contour of the surface of tr(pcrlb) shown in Fig. 3. Fig. 2. and η b Plot of α blind versus honest and Byzantine sensor s threshold η h Fig. 5. Plot of contour of the surface of FIM versus honest and Byzantine sensor s threshold, η h and η b, we can see that saddle point exists Fig. 3. Plot of tr(pcrlb) versus honest and Byzantine sensor s threshold, η h and η b, we can see that saddle point exists 1673

WITH the significant advances in networking, wireless

WITH the significant advances in networking, wireless IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 12, DECEMBER 2006 4519 Target Location Estimation in Sensor Networks With Quantized Data Ruixin Niu, Member, IEEE, and Pramod K. Varshney, Fellow, IEEE

More information

On Noise-Enhanced Distributed Inference in the Presence of Byzantines

On Noise-Enhanced Distributed Inference in the Presence of Byzantines Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 211 On Noise-Enhanced Distributed Inference in the Presence of Byzantines Mukul Gagrani

More information

False Discovery Rate Based Distributed Detection in the Presence of Byzantines

False Discovery Rate Based Distributed Detection in the Presence of Byzantines IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS () 1 False Discovery Rate Based Distributed Detection in the Presence of Byzantines Aditya Vempaty*, Student Member, IEEE, Priyadip Ray, Member, IEEE,

More information

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks Priyank Anand, Ankit Singh Rawat Department of Electrical Engineering Indian Institute of Technology Kanpur

More information

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical

More information

Aspect Aware UAV Detection and Tracking

Aspect Aware UAV Detection and Tracking Aspect Aware UAV Detection and Tracking Christian R. Berger, Shengli Zhou, and Peter Willett Department of Electrical and Computer Engineering University of Connecticut Storrs, Connecticut 6269, USA email:

More information

Target Localization in Wireless Sensor Networks using Error Correcting Codes

Target Localization in Wireless Sensor Networks using Error Correcting Codes Target Localization in Wireless Sensor etwors using Error Correcting Codes Aditya Vempaty, Student Member, IEEE, Yunghsiang S. Han, Fellow, IEEE, ramod K. Varshney, Fellow, IEEE arxiv:36.452v2 stat.a 4

More information

A Byzantine Attack Defender: the Conditional Frequency Check

A Byzantine Attack Defender: the Conditional Frequency Check A Byzantine Attack Defender: the Conditional Frequency Check Xiaofan He and Huaiyu Dai Peng Ning Department of ECE Department of CSC North Carolina State University, USA North Carolina State University,

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

APOCS: A RAPIDLY CONVERGENT SOURCE LOCALIZATION ALGORITHM FOR SENSOR NETWORKS. Doron Blatt and Alfred O. Hero, III

APOCS: A RAPIDLY CONVERGENT SOURCE LOCALIZATION ALGORITHM FOR SENSOR NETWORKS. Doron Blatt and Alfred O. Hero, III APOCS: A RAPIDLY CONVERGENT SOURCE LOCALIZATION ALGORITHM FOR SENSOR NETWORKS Doron Blatt and Alfred O. Hero, III Department of Electrical Engineering and Computer Science, University of Michigan, Ann

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

Dynamic Bandwidth Allocation for Target Tracking. Wireless Sensor Networks.

Dynamic Bandwidth Allocation for Target Tracking. Wireless Sensor Networks. 4th International Conference on Information Fusion Chicago, Illinois, USA, July 5-8, Dynamic Bandwidth Allocation for Target Tracking in Wireless Sensor Networks Engin Masazade, Ruixin Niu, and Pramod

More information

STONY BROOK UNIVERSITY. CEAS Technical Report 829

STONY BROOK UNIVERSITY. CEAS Technical Report 829 1 STONY BROOK UNIVERSITY CEAS Technical Report 829 Variable and Multiple Target Tracking by Particle Filtering and Maximum Likelihood Monte Carlo Method Jaechan Lim January 4, 2006 2 Abstract In most applications

More information

Probabilistic model for Intrusion Detection in Wireless Sensor Network

Probabilistic model for Intrusion Detection in Wireless Sensor Network Probabilistic model for Intrusion Detection in Wireless Sensor Network Maduri Chopde, Kimi Ramteke and Satish Kamble Department of Computer Science PICT, Pune Pune University, India madhurichopde@gmail.com,

More information

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions Score-Function Quantization for Distributed Estimation Parvathinathan Venkitasubramaniam and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 4853 Email: {pv45, lt35}@cornell.edu

More information

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Mohammed Karmoose Electrical Engineering Department Alexandria University Alexandria 1544, Egypt Email: mhkarmoose@ieeeorg Karim

More information

Robust Binary Quantizers for Distributed Detection

Robust Binary Quantizers for Distributed Detection 1 Robust Binary Quantizers for Distributed Detection Ying Lin, Biao Chen, and Bruce Suter Abstract We consider robust signal processing techniques for inference-centric distributed sensor networks operating

More information

Reliable Cooperative Sensing in Cognitive Networks

Reliable Cooperative Sensing in Cognitive Networks Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI

More information

Fusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks

Fusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks Fusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks Biao Chen, Ruixiang Jiang, Teerasit Kasetkasem, and Pramod K. Varshney Syracuse University, Department of EECS, Syracuse,

More information

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS Parvathinathan Venkitasubramaniam, Gökhan Mergen, Lang Tong and Ananthram Swami ABSTRACT We study the problem of quantization for

More information

Energy Based Acoustic Source Localization

Energy Based Acoustic Source Localization Energy Based Acoustic Source Localization Xiaohong Sheng and Yu-Hen Hu University of Wisconsin Madison, Department of Electrical and Computer Engineering Madison WI 5376, USA, sheng@ece.wisc.edu, hu@engr.wisc.edu,

More information

Distributed Inference and Learning with Byzantine Data

Distributed Inference and Learning with Byzantine Data Syracuse University SURFACE Dissertations - ALL SURFACE 8-1-2016 Distributed Inference and Learning with Byzantine Data Bhavya Kailkhura Syracuse University Follow this and additional works at: http://surface.syr.edu/etd

More information

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:

More information

Target Location Estimation in Wireless Sensor Networks Using Binary Data

Target Location Estimation in Wireless Sensor Networks Using Binary Data Target Location stimation in Wireess Sensor Networks Using Binary Data Ruixin Niu and Pramod K. Varshney Department of ectrica ngineering and Computer Science Link Ha Syracuse University Syracuse, NY 344

More information

بسم الله الرحمن الرحيم

بسم الله الرحمن الرحيم بسم الله الرحمن الرحيم Reliability Improvement of Distributed Detection in Clustered Wireless Sensor Networks 1 RELIABILITY IMPROVEMENT OF DISTRIBUTED DETECTION IN CLUSTERED WIRELESS SENSOR NETWORKS PH.D.

More information

OPTIMAL SENSOR-TARGET GEOMETRIES FOR DOPPLER-SHIFT TARGET LOCALIZATION. Ngoc Hung Nguyen and Kutluyıl Doğançay

OPTIMAL SENSOR-TARGET GEOMETRIES FOR DOPPLER-SHIFT TARGET LOCALIZATION. Ngoc Hung Nguyen and Kutluyıl Doğançay OPTIMAL SENSOR-TARGET GEOMETRIES FOR DOPPLER-SHIFT TARGET LOCALIZATION Ngoc Hung Nguyen and Kutluyıl Doğançay Institute for Telecommunications Research, School of Engineering University of South Australia,

More information

Diffusion based Projection Method for Distributed Source Localization in Wireless Sensor Networks

Diffusion based Projection Method for Distributed Source Localization in Wireless Sensor Networks The Third International Workshop on Wireless Sensor, Actuator and Robot Networks Diffusion based Projection Method for Distributed Source Localization in Wireless Sensor Networks Wei Meng 1, Wendong Xiao,

More information

Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko

Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko IEEE SIGNAL PROCESSING LETTERS, VOL. 17, NO. 12, DECEMBER 2010 1005 Optimal Mean-Square Noise Benefits in Quantizer-Array Linear Estimation Ashok Patel and Bart Kosko Abstract A new theorem shows that

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks

Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks Distributed Event Detection under Byzantine Attack in Wireless Sensor Networks Pengfei Zhang 1,3, Jing Yang Koh 2,3, Shaowei Lin 3, Ido Nevat 3 1. School of Electrical & Electronic Engineering, Nanyang

More information

Detection Performance Limits for Distributed Sensor Networks in the Presence of Nonideal Channels

Detection Performance Limits for Distributed Sensor Networks in the Presence of Nonideal Channels 1 Detection Performance imits for Distributed Sensor Networks in the Presence of Nonideal Channels Qi Cheng, Biao Chen and Pramod K Varshney Abstract Existing studies on the classical distributed detection

More information

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System

Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Upper Bounds for the Average Error Probability of a Time-Hopping Wideband System Aravind Kailas UMTS Systems Performance Team QUALCOMM Inc San Diego, CA 911 Email: akailas@qualcommcom John A Gubner Department

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Channel-Aware Tracking in Multi-Hop Wireless Sensor Networks with Quantized Measurements

Channel-Aware Tracking in Multi-Hop Wireless Sensor Networks with Quantized Measurements Channel-Aware Tracing in Multi-Hop Wireless Sensor Networs with Quantized Measurements XIAOJUN YANG Chang an University China RUIXIN NIU, Senior Member, IEEE Virginia Commonwealth University ENGIN MASAZADE,

More information

Optimal Time Division Multiplexing Schemes for DOA Estimation of a Moving Target Using a Colocated MIMO Radar

Optimal Time Division Multiplexing Schemes for DOA Estimation of a Moving Target Using a Colocated MIMO Radar Optimal Division Multiplexing Schemes for DOA Estimation of a Moving Target Using a Colocated MIMO Radar Kilian Rambach, Markus Vogel and Bin Yang Institute of Signal Processing and System Theory University

More information

Optimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels

Optimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels Optimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels Qing an Ren Yunmin Zhu Dept. of Mathematics Sichuan University Sichuan, China

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 1, JANUARY

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 59, NO. 1, JANUARY IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 59, NO 1, JANUARY 2011 1 Conditional Posterior Cramér Rao Lower Bounds for Nonlinear Sequential Bayesian Estimation Long Zuo, Ruixin Niu, Member, IEEE, and Pramod

More information

Blind Attacks on Machine Learners

Blind Attacks on Machine Learners Blind Attacks on Machine Learners Alex Beatson 1 Zhaoran Wang 1 Han Liu 1 1 Princeton University NIPS, 2016/ Presenter: Anant Kharkar NIPS, 2016/ Presenter: Anant Kharkar 1 Outline 1 Introduction Motivation

More information

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE 5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER 2009 Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks Jun Fang, Member, IEEE, and Hongbin

More information

Distributed Estimation and Performance Limits in Resource-constrained Wireless Sensor Networks

Distributed Estimation and Performance Limits in Resource-constrained Wireless Sensor Networks Syracuse University SURFACE Dissertations - ALL SURFACE May 2014 Distributed Estimation and Performance Limits in Resource-constrained Wireless Sensor Networks YUJIAO ZHENG Syracuse University Follow this

More information

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels

Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Nash Bargaining in Beamforming Games with Quantized CSI in Two-user Interference Channels Jung Hoon Lee and Huaiyu Dai Department of Electrical and Computer Engineering, North Carolina State University,

More information

Distributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks

Distributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks Distributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks Ying Lin and Biao Chen Dept. of EECS Syracuse University Syracuse, NY 13244, U.S.A. ylin20 {bichen}@ecs.syr.edu Peter

More information

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012

Applications of Robust Optimization in Signal Processing: Beamforming and Power Control Fall 2012 Applications of Robust Optimization in Signal Processing: Beamforg and Power Control Fall 2012 Instructor: Farid Alizadeh Scribe: Shunqiao Sun 12/09/2012 1 Overview In this presentation, we study the applications

More information

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/

More information

Shankar Shivappa University of California, San Diego April 26, CSE 254 Seminar in learning algorithms

Shankar Shivappa University of California, San Diego April 26, CSE 254 Seminar in learning algorithms Recognition of Visual Speech Elements Using Adaptively Boosted Hidden Markov Models. Say Wei Foo, Yong Lian, Liang Dong. IEEE Transactions on Circuits and Systems for Video Technology, May 2004. Shankar

More information

Decentralized Detection In Wireless Sensor Networks

Decentralized Detection In Wireless Sensor Networks Decentralized Detection In Wireless Sensor Networks Milad Kharratzadeh Department of Electrical & Computer Engineering McGill University Montreal, Canada April 2011 Statistical Detection and Estimation

More information

A GLRT FOR RADAR DETECTION IN THE PRESENCE OF COMPOUND-GAUSSIAN CLUTTER AND ADDITIVE WHITE GAUSSIAN NOISE. James H. Michels. Bin Liu, Biao Chen

A GLRT FOR RADAR DETECTION IN THE PRESENCE OF COMPOUND-GAUSSIAN CLUTTER AND ADDITIVE WHITE GAUSSIAN NOISE. James H. Michels. Bin Liu, Biao Chen A GLRT FOR RADAR DETECTION IN THE PRESENCE OF COMPOUND-GAUSSIAN CLUTTER AND ADDITIVE WHITE GAUSSIAN NOISE Bin Liu, Biao Chen Syracuse University Dept of EECS, Syracuse, NY 3244 email : biliu{bichen}@ecs.syr.edu

More information

Selective Hybrid RSS/AOA Approximate Maximum Likelihood Mobile intra cell Localization

Selective Hybrid RSS/AOA Approximate Maximum Likelihood Mobile intra cell Localization Selective Hybrid RSS/AOA Approximate Maximum Likelihood Mobile intra cell Localization Leila Gazzah Leila Najjar and Hichem Besbes Carthage University Lab. COSIM Higher School of Communication of Tunis

More information

GEOLOCATION BOUNDS FOR RECEIVED SIGNAL STRENGTH (RSS) IN CORRELATED SHADOW FADING

GEOLOCATION BOUNDS FOR RECEIVED SIGNAL STRENGTH (RSS) IN CORRELATED SHADOW FADING STRATEGIC WHITE PAPER GEOLOCATION BOUNDS FOR RECEIVED SIGNAL STRENGTH (RSS) IN CORRELATED SHADOW FADING Laurence Mailaender, LGS Innovations LLC, Florham Park, NJ Abstract Cramer-Rao bounds for geolocation

More information

Decentralized Detection in Wireless Sensor Networks with Channel Fading Statistics

Decentralized Detection in Wireless Sensor Networks with Channel Fading Statistics 1 Decentralized Detection in Wireless Sensor Networks with Channel Fading Statistics Bin Liu, Biao Chen Abstract Existing channel aware signal processing design for decentralized detection in wireless

More information

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation

A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation A POMDP Framework for Cognitive MAC Based on Primary Feedback Exploitation Karim G. Seddik and Amr A. El-Sherif 2 Electronics and Communications Engineering Department, American University in Cairo, New

More information

Generalization Propagator Method for DOA Estimation

Generalization Propagator Method for DOA Estimation Progress In Electromagnetics Research M, Vol. 37, 119 125, 2014 Generalization Propagator Method for DOA Estimation Sheng Liu, Li Sheng Yang, Jian ua uang, and Qing Ping Jiang * Abstract A generalization

More information

Should all Machine Learning be Bayesian? Should all Bayesian models be non-parametric?

Should all Machine Learning be Bayesian? Should all Bayesian models be non-parametric? Should all Machine Learning be Bayesian? Should all Bayesian models be non-parametric? Zoubin Ghahramani Department of Engineering University of Cambridge, UK zoubin@eng.cam.ac.uk http://learning.eng.cam.ac.uk/zoubin/

More information

Fully-distributed spectrum sensing: application to cognitive radio

Fully-distributed spectrum sensing: application to cognitive radio Fully-distributed spectrum sensing: application to cognitive radio Philippe Ciblat Dpt Comelec, Télécom ParisTech Joint work with F. Iutzeler (PhD student funded by DGA grant) Cognitive radio principle

More information

A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines

A Game-Theoretic Framework for Optimum Decision Fusion in the Presence of Byzantines 1 A Game-Theoretic Framework for Optimum Decision Fusion in the resence of Byzantines Andrea Abrardo, Mauro Barni, Fellow, IEEE, Kassem Kallas, Student Member, IEEE, Benedetta Tondi, Student Member, IEEE

More information

Optimum Passive Beamforming in Relation to Active-Passive Data Fusion

Optimum Passive Beamforming in Relation to Active-Passive Data Fusion Optimum Passive Beamforming in Relation to Active-Passive Data Fusion Bryan A. Yocom Applied Research Laboratories The University of Texas at Austin Final Project EE381K-14 Multidimensional Digital Signal

More information

Target Tracking with Packet Delays and Losses QoI amid Latencies and Missing Data

Target Tracking with Packet Delays and Losses QoI amid Latencies and Missing Data Target Tracking with Packet Delays and Losses QoI amid Latencies and Missing Data Wei Wei, Ting He, Chatschik Bisdikian, Lance Kaplan 3, Dennis Goeckel 4, Don Towsley Department of Computer Science, University

More information

On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing

On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing 1 On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing Sinan Gezici, Senior Member, IEEE, and Pramod K. Varshney, Life Fellow, IEEE Abstract In this letter, the

More information

Lecture 7 Introduction to Statistical Decision Theory

Lecture 7 Introduction to Statistical Decision Theory Lecture 7 Introduction to Statistical Decision Theory I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 20, 2016 1 / 55 I-Hsiang Wang IT Lecture 7

More information

Sensor Tasking and Control

Sensor Tasking and Control Sensor Tasking and Control Sensing Networking Leonidas Guibas Stanford University Computation CS428 Sensor systems are about sensing, after all... System State Continuous and Discrete Variables The quantities

More information

3596 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 7, JULY 2007

3596 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 7, JULY 2007 3596 IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 7, JULY 2007 Quantization for Maximin ARE in Distributed Estimation Parvathinathan Venkitasubramaniam, Student Member, IEEE, Lang Tong, Fellow,

More information

TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT

TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT TARGET DETECTION WITH FUNCTION OF COVARIANCE MATRICES UNDER CLUTTER ENVIRONMENT Feng Lin, Robert C. Qiu, James P. Browning, Michael C. Wicks Cognitive Radio Institute, Department of Electrical and Computer

More information

Estimation Error Bounds for Frame Denoising

Estimation Error Bounds for Frame Denoising Estimation Error Bounds for Frame Denoising Alyson K. Fletcher and Kannan Ramchandran {alyson,kannanr}@eecs.berkeley.edu Berkeley Audio-Visual Signal Processing and Communication Systems group Department

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks Ji an Luo 2008.6.6 Outline Background Problem Statement Main Results Simulation Study Conclusion Background Wireless

More information

A Linear Estimator for Joint Synchronization and Localization in Wireless Sensor Networks

A Linear Estimator for Joint Synchronization and Localization in Wireless Sensor Networks 2014 IEEE Global Communications Conference A Linear Estimator for Joint Synchronization and Localization in Wireless Sensor Networks Reza Monir Vaghefi and R. Michael Buehrer Wireless @ Virginia Tech,

More information

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis

Detecting Stations Cheating on Backoff Rules in Networks Using Sequential Analysis Detecting Stations Cheating on Backoff Rules in 82.11 Networks Using Sequential Analysis Yanxia Rong Department of Computer Science George Washington University Washington DC Email: yxrong@gwu.edu Sang-Kyu

More information

IN HYPOTHESIS testing problems, a decision-maker aims

IN HYPOTHESIS testing problems, a decision-maker aims IEEE SIGNAL PROCESSING LETTERS, VOL. 25, NO. 12, DECEMBER 2018 1845 On the Optimality of Likelihood Ratio Test for Prospect Theory-Based Binary Hypothesis Testing Sinan Gezici, Senior Member, IEEE, and

More information

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 56, NO. 1, JANUARY X/$ IEEE

IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 56, NO. 1, JANUARY X/$ IEEE IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL 56, NO 1, JANUARY 2008 365 On Energy-Based Acoustic Source Localization for Sensor Networks Chartchai Meesookho, Urbashi Mitra, Fellow, IEEE, and Shrikanth Narayanan,

More information

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science

More information

ACCURATE ASYMPTOTIC ANALYSIS FOR JOHN S TEST IN MULTICHANNEL SIGNAL DETECTION

ACCURATE ASYMPTOTIC ANALYSIS FOR JOHN S TEST IN MULTICHANNEL SIGNAL DETECTION ACCURATE ASYMPTOTIC ANALYSIS FOR JOHN S TEST IN MULTICHANNEL SIGNAL DETECTION Yu-Hang Xiao, Lei Huang, Junhao Xie and H.C. So Department of Electronic and Information Engineering, Harbin Institute of Technology,

More information

Performance Analysis for Strong Interference Remove of Fast Moving Target in Linear Array Antenna

Performance Analysis for Strong Interference Remove of Fast Moving Target in Linear Array Antenna Performance Analysis for Strong Interference Remove of Fast Moving Target in Linear Array Antenna Kwan Hyeong Lee Dept. Electriacal Electronic & Communicaton, Daejin University, 1007 Ho Guk ro, Pochen,Gyeonggi,

More information

New Cramér-Rao Bound Expressions for Coprime and Other Sparse Arrays

New Cramér-Rao Bound Expressions for Coprime and Other Sparse Arrays New Cramér-Rao Bound Expressions for Coprime and Other Sparse Arrays Chun-Lin Liu 1 P. P. Vaidyanathan 2 1,2 Dept. of Electrical Engineering, MC 136-93 California Institute of Technology, Pasadena, CA

More information

RECENTLY, wireless sensor networks have been the object

RECENTLY, wireless sensor networks have been the object IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 4, APRIL 2007 1511 Distributed Sequential Bayesian Estimation of a Diffusive Source in Wireless Sensor Networks Tong Zhao, Student Member, IEEE, and

More information

Sensitivity Considerations in Compressed Sensing

Sensitivity Considerations in Compressed Sensing Sensitivity Considerations in Compressed Sensing Louis L. Scharf, 1 Edwin K. P. Chong, 1,2 Ali Pezeshki, 2 and J. Rockey Luo 2 1 Department of Mathematics, Colorado State University Fort Collins, CO 8523,

More information

computation of the algorithms it is useful to introduce some sort of mapping that reduces the dimension of the data set before applying signal process

computation of the algorithms it is useful to introduce some sort of mapping that reduces the dimension of the data set before applying signal process Optimal Dimension Reduction for Array Processing { Generalized Soren Anderson y and Arye Nehorai Department of Electrical Engineering Yale University New Haven, CT 06520 EDICS Category: 3.6, 3.8. Abstract

More information

Game Theoretic Approach to Power Control in Cellular CDMA

Game Theoretic Approach to Power Control in Cellular CDMA Game Theoretic Approach to Power Control in Cellular CDMA Sarma Gunturi Texas Instruments(India) Bangalore - 56 7, INDIA Email : gssarma@ticom Fernando Paganini Electrical Engineering Department University

More information

Distributed estimation in sensor networks

Distributed estimation in sensor networks in sensor networks A. Benavoli Dpt. di Sistemi e Informatica Università di Firenze, Italy. e-mail: benavoli@dsi.unifi.it Outline 1 An introduction to 2 3 An introduction to An introduction to In recent

More information

A Bound on Mean-Square Estimation Error Accounting for System Model Mismatch

A Bound on Mean-Square Estimation Error Accounting for System Model Mismatch A Bound on Mean-Square Estimation Error Accounting for System Model Mismatch Wen Xu RD Instruments phone: 858-689-8682 email: wxu@rdinstruments.com Christ D. Richmond MIT Lincoln Laboratory email: christ@ll.mit.edu

More information

2-D SENSOR POSITION PERTURBATION ANALYSIS: EQUIVALENCE TO AWGN ON ARRAY OUTPUTS. Volkan Cevher, James H. McClellan

2-D SENSOR POSITION PERTURBATION ANALYSIS: EQUIVALENCE TO AWGN ON ARRAY OUTPUTS. Volkan Cevher, James H. McClellan 2-D SENSOR POSITION PERTURBATION ANALYSIS: EQUIVALENCE TO AWGN ON ARRAY OUTPUTS Volkan Cevher, James H McClellan Georgia Institute of Technology Atlanta, GA 30332-0250 cevher@ieeeorg, jimmcclellan@ecegatechedu

More information

Threshold Considerations in Distributed Detection in a Network of Sensors.

Threshold Considerations in Distributed Detection in a Network of Sensors. Threshold Considerations in Distributed Detection in a Network of Sensors. Gene T. Whipps 1,2, Emre Ertin 2, and Randolph L. Moses 2 1 US Army Research Laboratory, Adelphi, MD 20783 2 Department of Electrical

More information

Target Tracking and Classification using Collaborative Sensor Networks

Target Tracking and Classification using Collaborative Sensor Networks Target Tracking and Classification using Collaborative Sensor Networks Xiaodong Wang Department of Electrical Engineering Columbia University p.1/3 Talk Outline Background on distributed wireless sensor

More information

LOW COMPLEXITY COVARIANCE-BASED DOA ESTIMATION ALGORITHM

LOW COMPLEXITY COVARIANCE-BASED DOA ESTIMATION ALGORITHM LOW COMPLEXITY COVARIANCE-BASED DOA ESTIMATION ALGORITHM Tadeu N. Ferreira, Sergio L. Netto, and Paulo S. R. Diniz Electrical Engineering Program COPPE/DEL-Poli/Federal University of Rio de Janeiro P.O.

More information

COMPLEX CONSTRAINED CRB AND ITS APPLICATION TO SEMI-BLIND MIMO AND OFDM CHANNEL ESTIMATION. Aditya K. Jagannatham and Bhaskar D.

COMPLEX CONSTRAINED CRB AND ITS APPLICATION TO SEMI-BLIND MIMO AND OFDM CHANNEL ESTIMATION. Aditya K. Jagannatham and Bhaskar D. COMPLEX CONSTRAINED CRB AND ITS APPLICATION TO SEMI-BLIND MIMO AND OFDM CHANNEL ESTIMATION Aditya K Jagannatham and Bhaskar D Rao University of California, SanDiego 9500 Gilman Drive, La Jolla, CA 92093-0407

More information

Sparse Sensing in Colocated MIMO Radar: A Matrix Completion Approach

Sparse Sensing in Colocated MIMO Radar: A Matrix Completion Approach Sparse Sensing in Colocated MIMO Radar: A Matrix Completion Approach Athina P. Petropulu Department of Electrical and Computer Engineering Rutgers, the State University of New Jersey Acknowledgments Shunqiao

More information

A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology

A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology Amir Amini, Amir Asif, Arash Mohammadi Electrical and Computer Engineering,, Montreal, Canada.

More information

A New Algorithm for Nonparametric Sequential Detection

A New Algorithm for Nonparametric Sequential Detection A New Algorithm for Nonparametric Sequential Detection Shouvik Ganguly, K. R. Sahasranand and Vinod Sharma Department of Electrical Communication Engineering Indian Institute of Science, Bangalore, India

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

IEEE copyright notice

IEEE copyright notice IEEE copyright notice Personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for

More information

Secure Detection: Performance Metric and Sensor Deployment Strategy

Secure Detection: Performance Metric and Sensor Deployment Strategy Secure Detection: Performance Metric and Sensor Deployment Strategy Xiaoqiang Ren and Yilin Mo Abstract This paper studies how to deploy sensors in the context of detection in adversarial environments.

More information

Space-Time CUSUM for Distributed Quickest Detection Using Randomly Spaced Sensors Along a Path

Space-Time CUSUM for Distributed Quickest Detection Using Randomly Spaced Sensors Along a Path Space-Time CUSUM for Distributed Quickest Detection Using Randomly Spaced Sensors Along a Path Daniel Egea-Roca, Gonzalo Seco-Granados, José A López-Salcedo, Sunwoo Kim Dpt of Telecommunications and Systems

More information

WITH the wide employment of wireless devices in various

WITH the wide employment of wireless devices in various 1 Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel Lichuan a, Student ember, IEEE, Yong Xiang, Senior ember, IEEE, Qingqi Pei, Senior ember, IEEE, Yang Xiang, Senior

More information

Gaussian Estimation under Attack Uncertainty

Gaussian Estimation under Attack Uncertainty Gaussian Estimation under Attack Uncertainty Tara Javidi Yonatan Kaspi Himanshu Tyagi Abstract We consider the estimation of a standard Gaussian random variable under an observation attack where an adversary

More information

OPTIMAL ADAPTIVE TRANSMIT BEAMFORMING FOR COGNITIVE MIMO SONAR IN A SHALLOW WATER WAVEGUIDE

OPTIMAL ADAPTIVE TRANSMIT BEAMFORMING FOR COGNITIVE MIMO SONAR IN A SHALLOW WATER WAVEGUIDE OPTIMAL ADAPTIVE TRANSMIT BEAMFORMING FOR COGNITIVE MIMO SONAR IN A SHALLOW WATER WAVEGUIDE Nathan Sharaga School of EE Tel-Aviv University Tel-Aviv, Israel natyshr@gmail.com Joseph Tabrikian Dept. of

More information

Precoding for Decentralized Detection of Unknown Deterministic Signals

Precoding for Decentralized Detection of Unknown Deterministic Signals Precoding for Decentralized Detection of Unknown Deterministic Signals JUN FANG, Member, IEEE XIAOYING LI University of Electronic Science and Technology of China HONGBIN LI, Senior Member, IEEE Stevens

More information

J. Liang School of Automation & Information Engineering Xi an University of Technology, China

J. Liang School of Automation & Information Engineering Xi an University of Technology, China Progress In Electromagnetics Research C, Vol. 18, 245 255, 211 A NOVEL DIAGONAL LOADING METHOD FOR ROBUST ADAPTIVE BEAMFORMING W. Wang and R. Wu Tianjin Key Lab for Advanced Signal Processing Civil Aviation

More information

Selective Use Of Multiple Entropy Models In Audio Coding

Selective Use Of Multiple Entropy Models In Audio Coding Selective Use Of Multiple Entropy Models In Audio Coding Sanjeev Mehrotra, Wei-ge Chen Microsoft Corporation One Microsoft Way, Redmond, WA 98052 {sanjeevm,wchen}@microsoft.com Abstract The use of multiple

More information