Target Localization in Wireless Sensor Networks using Error Correcting Codes

Size: px
Start display at page:

Download "Target Localization in Wireless Sensor Networks using Error Correcting Codes"

Transcription

1 Target Localization in Wireless Sensor etwors using Error Correcting Codes Aditya Vempaty, Student Member, IEEE, Yunghsiang S. Han, Fellow, IEEE, ramod K. Varshney, Fellow, IEEE arxiv:36.452v2 stat.a 4 ov 23 Abstract In this wor, we consider the tas of target localization using quantized data in Wireless Sensor etwors WSs). We propose a computationally efficient localization scheme by modeling it as an iterative classification problem. We design coding theory based iterative approaches for target localization where at every iteration, the Fusion Center FC) solves an M-ary hypothesis testing problem and decides the Region of Interest ROI) for the next iteration. The coding theory based iterative approach wors well even in the presence of Byzantine malicious) sensors in the networ. We further consider the effect of non-ideal channels. We suggest the use of soft-decision decoding to compensate for the loss due to the presence of fading channels between the local sensors and the FC. We evaluate the performance of the proposed schemes in terms of the Byzantine fault tolerance capability and probability of detection of the target region. We also present performance bounds which help us in designing the system. We provide asymptotic analysis of the proposed schemes and show that the schemes achieve perfect region detection irrespective of the noise variance when the number of sensors tends to infinity. Our numerical results show that the proposed schemes provide a similar performance in terms of Mean Square Error MSE) as compared to the traditional Maximum Lielihood Estimation MLE) but are computationally much more efficient and are resilient to errors due to Byzantines and non-ideal channels. Index Terms Target Localization, Wireless Sensor etwors, Error Correcting Codes, Byzantines I. ITRODUCTIO Wireless sensor networs WSs) have been extensively employed to monitor a region of interest ROI) for reliable detection/estimation/tracing of events 4. In this wor, we focus on target localization in WSs. Localization techniques proposed in the literature for sensor networs include direction of arrival DOA), time of arrival TOA) and time-difference This wor was supported in part by CASE: The Center for Advanced Systems and Engineering, a YSTAR center for advanced technology at Syracuse University; AFOSR under Grant FA ; the ational Science of Council SC) of Taiwan under Grants SC SC E- -6 -MY3 and SC -222-E--69-MY3. arts of this wor were presented at the 38th IEEE International Conference on Acoustics, Speech, and Signal rocessing ICASS 23) and at the 3th International Symposium on Communications and Information Technologies ISCIT 23). art of Y. S. Han s wor was completed during his visit of Syracuse University from 22 to 23. A. Vempaty and. K. Varshney are with the Dept. of Electrical Engineering and Computer Science, Syracuse University, Syracuse, Y USA avempaty, varshney}@syr.edu). Y. S. Han is with the Dept. of Electrical Engineering, ational Taiwan University of Science and Technology, Taipei, Taiwan yshan@mail.ntust.edu.tw). Copyright c) 23 IEEE. ersonal use of this material is permitted. However, permission to use this material for any other purposes must be obtained from the IEEE by sending a request to pubs-permissions@ieee.org. of arrival TDOA) based methods 5 6. Recent research has focused on developing techniques which do not suffer from imperfect time synchronization. Received signal strength based methods, which do not suffer from imperfect synchronization and/or extensive processing, have been proposed which employ least-squares or maximum-lielihood ML) based source localization techniques 7 8. In WSs, due to power and bandwidth constraints, each sensor, instead of sending its raw data, sends quantized data to a central observer or Fusion Center FC). The FC combines these local sensors data to estimate the target location. Secure localization is very important as potential malicious sensors may attempt to disrupt the networ and diminish its capability. Only in the recent past, researchers have investigated the problem of security threats 9 on sensor networs. We focus on one particular class of security attacs, nown as the Byzantine data attac also referred to as the Data Falsification Attac). A Byzantine attac involves malicious sensors within the networ which send false information to the FC to disrupt the global inference process. In our previous wor, we have analyzed target localization in WSs in the presence of Byzantines. By considering the osterior Cramér Rao bound or osterior Fisher Information as the performance metric, we analyzed the degradation in system performance in the presence of Byzantines. We showed that the FC becomes blind to the local sensor s data when the fraction of Byzantines is greater than 5%. When the FC becomes blind, it is not able to use any information received from the local sensors and estimates the target location based only on prior information. In order to mae the networ robust to such attacs, we considered mitigation techniques. We proposed a Byzantine identification scheme which observes the sensors behavior over time and identifies the malicious sensors. We also proposed a dynamic non-identical threshold design for the networ which maes the Byzantines ineffective. An important element of WSs is the presence of nonideal wireless channels between sensors and the FC 2 3. These non-ideal channels corrupt the quantized data sent by the local sensors to the FC. This causes errors which deteriorates the inference performance at the FC. One way to handle the channel errors is to use error correcting codes 4 5. In 6, target localization based on maximum lielihood estimation at the FC was considered and coding techniques were proposed to handle the effect of imperfect channels between sensors and fusion center. In this wor, we propose the use of coding theory techniques to estimate the location of the target in WSs. In our preinary wor 7 8, we have shown the feasibility

2 2 of our approach by providing simulation/numerical results. In this paper, we develop the fundamental theory and derive asymptotic performance results. We first consider the code design problem in the absence of channel errors and Byzantine faults. The proposed scheme models the localization problem as an iterative classification problem. The scheme provides a coarse estimate in a computationally efficient manner as compared to the traditional ML based approach. We present performance analysis of the proposed scheme in terms of detection probability of the correct region. We show analytically that the scheme achieves perfect performance in the asymptotic regime. We address the issues of Byzantines and channel errors subsequently and modify our scheme to handle them. The error correction capability of the coding theory based approach provides Byzantine fault tolerance capability and the use of soft-decoding at the FC provides tolerance to the channel errors. In the remainder of the paper, we refer to this coding theory based localization approach as coding approach. The schemes proposed in this paper show the benefit of adopting coding theory based techniques for signal processing applications. The remainder of the paper is organized as follows: In Section II, we describe the system model used and lay out the assumptions made in the paper. We also present a brief overview of Distributed Classification Fusion using Error Correcting Codes DCFECC) 9 and Distributed Classification Fusion using Soft-decision Decoding DCSD) 2 approaches. We propose our basic coding scheme for target localization in Section III. The performance of the proposed scheme in terms of region detection probability is analyzed in this section. We extend this scheme to the exclusion method based coding scheme in Section IV to mitigate the effect of Byzantines in the networ. We present some numerical results showing the benefit of the proposed schemes compared to the traditional maximum lielihood based scheme. We also present a discussion on system design based on the performance analysis carried out in this section. We consider the presence of non-ideal channels in Section V and modify our decoding rule to mae it robust to fading channels. We conclude our paper in Section VI with some discussion on possible future wor. A. System model II. RELIMIARIES Let sensors be randomly deployed not necessarily in a regular grid) in a WS as shown in Fig. to estimate the unnown location of a target at θ x t, y t, where x t and y t denote the coordinates of the target in a 2-D Cartesian plane. We assume that the location of the sensors is nown to the Fusion Center FC). We also assume that the signal radiated from this target follows an isotropic power attenuation model 2. The signal amplitude a i received at the i th sensor is given by ) n a 2 d i, ) d i where is the power measured at the reference distance d, d i is the distance between the target and the i th sensor whose location is represented by L i x i, y i for i, 2, and n is the path loss exponent. In this wor, without loss of generality, we assume d and n 2. The signal amplitude measured at each sensor is corrupted by independent and identically distributed i.i.d.) zero-mean additive white noise with complementary cumulative distribution function given by F ; σ 2 ): s i a i + n i, 2) where s i is the corrupted signal at the i th sensor and the noise n i F ; σ 2 ) with variance σ 2. Fig Wireless sensor networ layout for target localization Sensors Target Due to energy and bandwidth constraints, the local sensors quantize their observations using threshold quantizers and send binary quantized data to the FC: s i < η i D i, 3) s i > η i where D i is the quantized data at the i th sensor and η i is the threshold used by the i th sensor for quantization. The FC fuses the data received from the local sensors and estimates the target location. Traditional target localization uses MLE 2: ˆθ arg max pu θ), 4) θ where u u, u 2,, u is the vector of quantized observations received at the FC. As pointed out in the later sections, u and D can be different due to the presence of Byzantines and/or imperfect channels between local sensors and FC. B. An Overview of Distributed Classification Approaches ) DCFECC 9: In this subsection, we give a brief overview of Distributed Classification Fusion using Error Correcting Codes DCFECC) approach proposed in 9. In 9, the authors propose an approach for M-ary distributed classification using binary quantized data. After processing the observations locally, possibly in the presence of sensor faults, the local sensors transmit their local decisions to the FC. In the DCFECC approach, a code matrix C is selected to

3 3 perform both local decision and fault-tolerant fusion at the FC. The code matrix is an M matrix with elements c j+)i, }, j,,, M and i,,. Each hypothesis H j is associated with a row in the code matrix C and each column represents a binary decision rule at the local sensor. The optimal code matrix is designed off-line using techniques such as simulated annealing or cyclic column replacement 9. After receiving the binary decisions u from local sensors, the FC performs minimum Hamming distance based fusion and decides on the hypothesis H j for which the Hamming distance between row of C corresponding to H j for j,, M and the received vector u is minimum. It is important to note that the above scheme is under the assumption that > M and the performance of the scheme depends on the minimum Hamming distance d min of the code matrix C. 2) DCSD 2: In this subsection, we present a brief overview of Distributed Classification using Soft-decision Decoding DCSD) approach proposed in 2. This approach uses a soft-decision decoding rule as opposed to the hard-decision decoding rule used in DCFECC approach. The use of softdecision decoding maes the system robust to fading channels between the sensors and the FC. The basic difference between the two approaches DCFECC and DCSD) is the decoding rule. In DCFECC, the minimum Hamming distance rule is used. In the presence of fading channels, the received data at the FC is analog although the local sensors transmit quantized data based on the code matrix C as described before. Then, the FC can use hard-decision decoding to determine the quantized data sent by the local sensors and use minimum Hamming distance rule to mae a decision regarding the class. However, in 2, the authors show that the performance can deteriorate when hard-decision decoding is used. Instead, they propose a soft-decision decoding rule based on the channel statistics to mae a decision regarding the class. We sip the derivation of the soft-decision decoding rule but present the decoding rule here for the case when binary quantizers are used at the local sensors, i.e., the elements of the code matrix are or. Let the analog data received at the FC from the local sensors be v v,, v when the local sensors transmit u u,, u, where u i / is decided by the code matrix C. For fading channels between the local sensors and the FC, v i and u i are related as follows v i h i ) ui Eb + n i, 5) where h i is the channel gain that models the fading channel, E b is the energy per bit and n i is the zero mean additive white Gaussian noise. Define the reliability of the received data v i as ψ i ln vi ui ) ui ) + vi ui ) ui ) v i u i ) u i ) + v i u i ) u i ) for i,, }. Here v i u i ) can be obtained from the statistical model of the fading channel considered and u i d s) for s, d, } is the probability that the decision is d given s is present at the bit i before local decision maing and is given as follows 6) u i d s) M j u i d H j ) i H j s). 7) u i d H j ) depends on the code matrix while i H j s) is the probability that the hypothesis H j is true given s is present at the bit i column i of the code matrix) before local decision maing, and can be expressed as where i H j s) i s H l ) i s H j ) M l i s H l ), if c l+)i s, if c l+)i s 8). 9) Then the decoding rule is to decide the hypothesis H j where j arg min j M d F ψ, c j+ ). Here d F ψ, c j+ ) i ψ i ) c j+)i ) 2 is the distance between ψ ψ,, ψ and j + ) th row of C. III. LOCALIZATIO USIG ITERATIVE CLASSIFICATIO In this section, we propose the localization scheme using iterative classification. Our algorithm is iterative in which at every iteration, the ROI is split into M regions and an M-ary hypothesis test is performed at the FC to determine the ROI for the next iteration. The FC, through feedbac, declares this region as the ROI for the next iteration. The M-ary hypothesis test solves a classification problem where each sensor sends binary quantized data based on a code matrix C. The code matrix is of size M with elements c j+)i, }, j,,, M and i,,, where each row represents a possible region and each column i represents i th sensor s binary decision rule. After receiving the binary decisions u u, u 2,, u from local sensors, the FC performs minimum Hamming distance based fusion. In this way, the search space for target location is reduced at every iteration and we the search based on a pre-determined ping criterion. The optimal splitting of the ROI at every iteration depends on the topology of the networ and the distribution of sensors in the networ. For a given networ topology, the optimal region split can be determined offline using -means clustering 2 which yields Voronoi regions 22 containing equal number of sensors in every region. For instance, when the sensors are deployed in a regular grid, the optimal splitting is uniform as shown in Fig. 2. In the remainder of the paper, we consider a symmetric sensor deployment such as a grid. Such a deployment results in a oneto-one correspondence between sensors across regions which is required in our derivations. Further discussion is provided in the later part of this section. In this section, the sensors are assumed to be benign and the channels between the local sensors and the FC are assumed to be ideal. Therefore, in this section, the binary decisions received at the FC are the same as the binary decisions made by the local sensors, i.e., u i D i, for i,,. We relax these assumptions in the later sections. The FC estimates the target location using the received data u.

4 H H Sensors Target are given by c j+)i if i S j otherwise, 2) Fig H 2 H Equal region splitting of the ROI for the M-hypothesis test for j,,, M and i ROI. The above construction can also be viewed as each sensor i using a threshold ηi for quantization as described in 3)). Let each region Rj correspond to a location θj for j,,, M, which in our case is the center of the region Rj. Each sensor i decides on a if and only if the target lies in the region R r i). Every sensor i, therefore, performs a binary hypothesis test described as follows: H : θ R r i) H : θ / R r i). 3) A. Basic Coding Based Scheme In this subsection, we present the basic coding based scheme for target localization. Since there are sensors which are split into M regions, the number of sensors in the new ROI after every iteration is reduced by a factor of M. After M iterations, the number of sensors in the ROI are and, therefore, the code matrix at the + ) th iteration would be of size M. Since the code matrix should always M have more columns than rows, < log M, where is the number of iterations after which the scheme terminates. M After iterations, there are only sensors present in the ROI and a coarse estimate ˆθ ˆθ x, ˆθ y of the target s location can be obtained by taing an average of locations of the sensors present in the ROI: M and ˆθ x M ˆθy M i ROI i ROI x i ) y i, ) where ROI is the ROI at the last step. Since the scheme is iterative, the code matrix needs to be designed at every iteration. Observing the structure of our problem, we can design the code matrix in a simple and efficient way as described below. As pointed out before, the size of the code matrix C at the +) th iteration is M, M where. Each row of this code matrix C represents a possible hypothesis described by a region in the ROI. Let Rj denote the region represented by the hypothesis H j for j,,, M and let Sj represent the set of sensors that lie in the region Rj. Also, for every sensor i, there is a unique corresponding region in which the sensor lies and the hypothesis of the region is represented as r i). It is easy to see that Sj i ROI r i) j}. The code matrix is designed in such a way that for the j th row, only those sensors that are in Rj have as their elements in the code matrix. In other words, the elements of the code matrix We assume that is divisible by M for,,..., log M. If d i,θ j represents the Euclidean distance between the i th sensor and θj for i, 2,, and j,,, M, then r i) arg min d i,θ l. Therefore, the condition θ l R r i) can be abstracted as a threshold η i on the local sensor signal amplitude given by η i d i,θ. 4) r i) This ensures that if the signal amplitude at the i th sensor is above the threshold η i, then θ lies in region R r i) leading to minimum distance decoding. B. erformance Analysis In this subsection, we present the performance analysis of the proposed scheme. Although the performance metric in this framewor is the Mean Square Error MSE), it is difficult to obtain a closed form representation for MSE. Therefore, typically, one uses the bounds on MSE to characterize the performance of the estimator. In our previous wors 2,, we analytically derived the expressions of MSE bound osterior Cramér Rao Lower Bound) on target localization under both non-adversarial 2 and adversarial scenarios. An analytically tractable metric to analyze the performance of the proposed scheme is the probability of detection of the target region. It is an important metric when the final goal of the target localization tas is to find the approximate region or neighborhood where the target lies rather than the true location itself. Since the final ROI could be one of the M regions, a metric of interest is the probability of zooming into the correct region. In other words, it is the probability that the true location and the estimated location lie in the same region. The final region of the estimated target location is the same as the true target location, if and only if we zoom into the correct region at every iteration of the proposed scheme. If d denotes the detection probability probability of correct classification) at the + ) th iteration, the overall detection probability is given by

5 5 D d. 5) Exact Analysis: Let us consider the + ) th iteration and define the received vector at the FC as u u, u 2,, u, where are the number of local sensors reporting their data to FC at +) th iteration. Let Dj be the decision region of j th hypothesis defined as follows: D j u d H u, c j+) d H u, c l+) for l M }, where d H, ) is the Hamming distance between two vectors, and c j+ is the codeword corresponding to hypothesis j in code matrix C. Then define the reward ru j, associated with the hypothesis j as ru j, q when u D u j, 6) otherwise where qu is the number of decision regions to whom u belongs to. ote that qu can be greater than one when there is a tie at the FC. Under such scenarios when qu >, we brea the tie using random decision. Since the tie-breaing rule is to choose one of them randomly, which is successful with probability q, the reward is given by 6). According u to 6), the detection probability at the + ) th iteration is given by d M j M H j ) M j u Dj u,} u H j )r j, u ) u i Hj ) i qu, 7) where u i H j ) denotes the probability that the sensor i sends the bit u i, }, i, 2,,, when the true target is in the region Rj corresponding to H j at the +)th iteration. From the system model described before, we get u i H j ) E θ H j u i θ, H j ). 8) Since 8) is complicated, it can be approximated using θj which is the center of the region Rj. 8) now simplifies to u i H j ) F η i a ij; σ 2), 9) where ηi is the threshold used by the i th sensor at th iteration, σ 2 is the noise variance, a ij is the signal amplitude received at the i th sensor when the target is at θj and F x; σ 2 ) is the complementary cumulative distribution function of noise at the local sensors. Using 5), the probability of detection of the target region can be found as the product of detection probabilities at every iteration. It is clear from the derived expressions that the exact analysis of the detection probability is complicated and, therefore, we derive some analytical bounds on the performance of the proposed scheme. erformance bounds: In this section, we present the performance bounds on our proposed coding based localization scheme. For our analysis, we will use the lemmas in 23, which are stated here for the sae of completeness. Lemma 3. 23): Let Z j } j be independent antipodal random variables with rz j q j and rz j q j. If λ mez + + Z m /m <, then rz + + Z m } λ 2 m) m/2. 2) Using this lemma, we now present the performance bounds on our proposed scheme. Lemma 3.2: Let θ Rj be the fixed target location. Let e θ) be the misclassification probability of the target region given θ at the + ) th iteration. For the received vector of /M observations at the + ) th iteration, u u,, u, assume that for every j, l M and l j, qi,j < M, 2) M + i S j S l where qi,j z i,j θ}, z i,j 2u i c j+)i ), and C c j+)i} is the code matrix used at the + )th iteration. Then ) 2 e i S 2q j θ) S i,j ) l l M,l j M ) d 2 m, d m, /2 22) λ j,maxθ) ) 2 ) d m, /2, 23) where d m, is the minimum Hamming distance of the code matrix C given by d m, 2 due to the structure of our M + code matrix and λ j,maxθ) max l M,l j d m, i Sj S l 2q i,j ). 24) roof: Let d H, ) be the Hamming distance between two vectors, for fixed θ R j, e θ) detected region Rj θ } } d H u, c j+) min d Hu, c l+) θ l M,l j d H u, c j+) d H u, c l+) θ } l M,l j l M,l j i,, :c l+)i c j+)i } zi,j θ. 25) Using the fact that c l+)i c j+)i for all i S j S l, l j, we can simplify the above equation. Also, observe that z i,j } i are independent across the sensors given θ.

6 6 According to 2) in 23, λ m d m, i c l+)i c j+)i )2q i,j ) d m, i Sj S l d m, i S j S l 2q i,j ) 2q i,j 2 M 26) since c l+)i c j+)i for all i S j S l, l j. Here, we have used the fact that cardinality of Sj /M for all j, and Sj and S l are disjoint sets for all l j. Condition λ m < of Lemma 3. is then equivalent to condition 2). Therefore, using Lemma 3. and 26), we have i,, :c l+)i c j+)i } i S j S l ) 2 2qi,j ) d 2 m, zi,j θ d m, /2. 27) Substituting 27) into 25), we have 22). ote that condition 2) λ m < ) implies λ j,max θ) < by definition. Hence, 23) is a direct consequence from 22). The probabilities qi,j u i c j+)i θ} can be easily computed as below. For j M and i, if i Sj, q i,j u i θ} F η i a i ; σ 2), 28) where ηi is the threshold used by the i th sensor at + ) th iteration, σ 2 is the noise variance, a i is the amplitude received at the i th sensor given by ) when the target is at θ. If i / Sj, qi,j u i θ}. Before we present our main theorem, for ease of analysis, we give an assumption that will be used in the theorem. ote that, our proposed scheme can still be applied to those WSs where the assumption does not hold. Assumption 3.3: For any target location θ Rj and any, there exists a bijection function f from Sj to Sl, where l M and l j, such that and fi j ) i l, η i j η i l, d ij < d il, where i j Sj, i l Sl, and d i j d il ) is the distance between θ and sensor i j i l ). One example of WSs that satisfies this assumption is given in Fig. 3. For every sensor i j Sj, due to symmetric region splitting, there exists a corresponding sensor i l Sl which is symmetrically located as described in the following: Join the centers of the two regions and draw a perpendicular bisector to this line as shown in Fig. 3. The sensor i l Sl is the sensor located symmetrically to sensor i j on the other side of the line L. These are the sensors for which the thresholds are the same. In other words, due to the symmetric placement of the sensors, ηi j ηi l c.f. 4)). Clearly, when θ Rj, d ij < d il. Fig H j Line L H l ROI with an example set of paired sensors Theorem 3.4: Let D be the probability of detection of the target region given by 5), where d is the detection probability at the + ) th iteration. Under Assumption 3.3, where and Sensors Target Centers of Regions aired sensors d M ) λ max) 2) d m, /2, 29) λ max max j M λ j,max λ j,max max θ R j λ j,maxθ). roof: First we prove that condition 2) is satisfied by the proposed scheme for all θ when the noise variance, σ 2 <. Hence, the inequality 23) can be applied to the proposed scheme. The probabilities qi,j given by 28) are qi,j F ηi a i; σ 2), for i Sj F ηi a i; σ 2), for i Sl. 3) By Assumption 3.3, there exists a bijection function f from Sj to S l. The sum i S q j S i,j of 2) can be evaluated by l considering pairwise summations as follows. Let us consider one such pair i j Sj, fi j) i l Sl ). Hence, their thresholds are ηi j ηi l η. Then, from 3), q i j,j + q i l,j F η a ij ; σ 2) + F η a il ; σ 2) 3) F η aij ; σ 2) F η a il ; σ 2). ow observe that, by the assumption, a ij > a il d ij d il 32)

7 7 and, therefore, F η aij ; σ 2) > F η a il ; σ 2) for all finite values of noise variance σ 2. From 32), the sum qi j,j +q i l,j is strictly less than. Therefore, the sum i S q j S i,j < l M d m, M + 2. Therefore, the condition in 2) is satisfied for the code matrix used in this scheme. Hence, e θ) can always be bounded by 23). By using 23), d d can be bounded as follows: M θ Rj } detected region Rj θ Rj } j M M j θ θ θ Rj } detected region Rj θ, θ Rj } dθ M θ θ Rj }e θ) dθ M M j M j θ R j θ R j θ θ R j }M ) λ j,maxθ) ) 2 ) d m, /2 dθ M M λ ) 2 ) dm, /2 j,max M j θ θ Rj } dθ 33) θ R j M M M ) M j λ ) 2 ) dm, /2 max 34) λ max) 2 ) dm, /2. 35) Both 33) and 34) are true since λ j,max < and λ max <. ext we analyze the asymptotic performance of the scheme, i.e., we examine D when approaches infinity. Theorem 3.5: Under Assumption 3.3), roof: We have λ j,max max l M,l j > M + 2 i S j S l d m, i Sj S l D. 2q i,j ) ) 36) for all j M since not all qi,j. Hence, by definition, λ max is also greater than. Since < λ max <, we have < λ max) 2 <. Under the assumption that the number of iterations are finite, for a fixed number of regions M, we can analyze the performance of the proposed scheme under asymptotic regime. Under this assumption, d m, grows linearly with the number of sensors 2 M + for. Then D d M ) λ max) 2 ) d m,/2 M ) ) λ max) 2 ) d m,/2 M ). Hence, the overall detection probability becomes as the number of sensors goes to infinity. This shows that the proposed scheme asymptotically attains perfect region detection probability irrespective of the value of finite noise variance. ote that the above result also holds when M increases with as long as d m, 2 grows with the number of sensors M + for. In other words, our theory can be extended to scenarios when M increases with as long as as for. M + C. umerical Results We now present some numerical results which justify the analytical results presented in the previous subsection and provide some insights. In the previous subsection, we have observed that the performance of the basic coding scheme quantified by the probability of region detection asymptotically approaches irrespective of the finite noise variance. Fig. 4 shows that the region detection probability approaches uniformly as the number of sensors approaches infinity for Gaussian sensor observation noise with variance σ 2. Observe that for a fixed noise variance, the region detection probability increases with increase in the number of sensors. This can also be observed from Table I. Also, for a fixed number of sensors, the region detection probability decreases with σ when the number of sensors is small. But when the number of sensors is large, the reduction in region detection probability with σ is negligible and as, the region detection probability converges to. TABLE I TARGET REGIO DETECTIO ROBABILITY FOR FIXED OISE VARIACE σ 4) WITH VARYIG M 4) Target Region Detection probability

8 8 Region detection probability Standard Deviation of noise σ) Fig. 4. Region detection probability versus the standard deviation of noise with varying number of sensors IV. LOCALIZATIO I THE RESECE OF BYZATIES Let us now consider the case when there are Byzantines in the networ. As discussed before, Byzantines are local sensors which send false information to the FC to deteriorate the networ s performance. We assume the presence of B α number of Byzantines in the networ. In this paper, we assume that the Byzantines attac the networ independently where the Byzantines flip their data with probability before sending it to the FC. ote that the Byzantines can flip with any probability ɛ. However, since it has been shown in that the optimal independent attac strategy for the Byzantines is to flip their data with probability, we focus on the optimal attac case which is ɛ. In other words, the data sent by the i th sensor is given by: D i if i th sensor is honest u i D i if i th sensor is Byzantine. 37) For such a system, it has been shown in that the FC becomes blind to the networ s information for α.5. Therefore, for the remainder of the paper, we analyze the system when α <.5. For the basic coding scheme described in Section III-A, each column in C contains only one and every row of C contains exactly s. Therefore, M + the minimum Hamming distance of C 2 is and, at M + the + ) th iteration, it can tolerate a total of at most faults data falsification attacs) due to the presence M + of Byzantines in the networ. This value is not very high and we would lie to extend the basic scheme to a scheme which can handle more Byzantine faults. A. Exclusion Method with Weighted Average As shown above, the scheme proposed in Section III-A has a Byzantine fault tolerance capability which is not very high. The performance can be improved by using an exclusion method for decoding where the two best regions are ept for next iteration and a weighted average is used to estimate the target location at the final step. This scheme builds on the basic coding scheme proposed in Section III-A with the following improvements: Since after every iteration two regions are ept, the code matrix after the th iteration is of size M 2 and the M number of iterations needed to the localization tas needs to satisfy < log M/2. At the final step, instead of taing an average of the sensor locations of the sensors present in the ROI at the final step, we tae a weighted average of the sensor locations where the weights are the -bit decisions sent by these sensors. Since a decision u i would imply that the target is closer to the sensor i, a weighted average ensures that the average is taen only over the sensors for which the target is reported to be close. Therefore, the target location estimate is given by i ROI ˆθ x u ix i i ROI u i 38) and ˆθy i ROI u iy i i ROI u. i 39) One can extend this scheme to consider other weights such as based on Euclidean distance which can be determined after processing the initial data to derive a coarse estimate of the target location. However, further processing is required for this and, therefore, we have not used such a scheme. The exclusion method results in a better performance compared to the basic coding scheme since it eeps the two best regions after every iteration. This observation is also evident in the numerical results presented in Section IV-C. B. erformance analysis Byzantine Fault Tolerance Capability: When the exclusion based scheme described in Section IV-A is used, since the two best regions are considered after every iteration, the fault tolerance performance improves and we can tolerate a total of at most 2+ faults. This improvement in the fault M + tolerance capability can be observed in the simulation results presented in Section IV-C. roposition 4.: The maximum fraction of Byzantines that can be handled at the + ) th iteration by the proposed exclusion method based coding scheme is ited by αf 2 M M 2. roof: The proof is straight forward and follows from the fact that the error correcting capability of the code matrix C at +) th iteration is at most 2+. Since there are 2 M + M sensors present during this iteration, the fraction of Byzantine sensors that can be handled is given by α f 2 M M 2. The performance bounds on the basic coding scheme presented in Section III-B can be extended to the exclusion based coding scheme presented in Section IV-A. We sip the details for the sae of brevity of the paper. When there are Byzantines in the networ, the probabilities qi,j of 28) become q i,j α) F η i a i ; σ 2) + α F η i a i ; σ 2)).

9 9 We have shown in Section III-B that the detection probability at every iteration approaches as the number of sensors goes to infinity. However, this result only holds when the condition in 2) is satisfied. otice that, in the presence of Byzantines, we have qi,j α) F ηi a i; σ 2)) + α F ηi a i; σ 2), for i Sj α) F ηi a i; σ 2) + α F ηi a i; σ 2)), for i Sl which can be simplified as qi,j α) 2α) F ηi a i; σ 2), for i Sj α + 2α) F ηi a i; σ 2), for i Sl. 4) ow using the pairwise sum approach discussed in Section III-B, we can re-write 32) as follows: q i j,j + q i l,j 2α) F η aij ; σ 2) F η a il ; σ 2),4) which is an increasing function of α since F η a ij ; σ 2) > F η a il ; σ 2) for all finite σ as discussed before. Therefore, when α <.5, the pairwise sum in 4) is strictly less than and the condition 2) is satisfied. However, when α.5, i S j S l qi,j M. Therefore, the condition fails when α.5. It has been shown in that the FC becomes blind to the local sensor s information when α.5. ext we state the theorem when there are Byzantines in the networ. Theorem 4.2: Let α be the fraction of Byzantines in the networs. Under Assumption 3.3), when α <.5, D. ote that the performance bounds derived can be used for system design. Let us consider sensors uniformly deployed in a square region. Let this region be split into M equal regions. From roposition 4., we now that αf is a function of M and. Also, the detection probability equations and bounds derived in Section III-B are functions of M and. Hence, for given fault tolerance capability and region detection probability requirements, we can find the corresponding number of sensors req ) to be used and the number of regions to be considered at each iteration M req ). We now present guidelines for system design of a networ which adopts the proposed approach. Let us suppose that we need to design a system such that we split into M 4 regions after every iteration. How should a system designer decide the number of sensors in order to meet the target region detection probability and Byzantine fault tolerance capability requirements? Table II shows the performance of the system in terms of the target region detection probability and Byzantine fault tolerance capability with varying number of sensors found using the expressions derived in roposition 4. and in Section III-B. From Table II, we can observe that the performance improves with increasing number of sensors. However, as a, TABLE II TARGET REGIO DETECTIO ROBABILITY AD BYZATIE FAULT TOLERACE CAABILITY WITH VARYIG M 4) Target Region Detection probability Byzantine fault tolerance capability system designer, we would lie to minimize the number of sensors that need to be deployed while assuring a minimum performance guarantee. In this example, if we are interested in achieving a region detection probability of approximately.7 and a Byzantine fault tolerance capability close to.5, we get 52 sensors to be sufficient. C. Simulation Results In this section, we present the simulation results to evaluate the performance of the proposed schemes in the presence of Byzantine faults. We analyze the performance using two performance metrics: mean square error MSE) of the estimated location and probability of detection D ) of the target region. We use a networ of 52 sensors deployed in a regular 8 8 grid as shown in Fig. 2. Let α denote the fraction of Byzantines in the networ that are randomly distributed over the networ. The received signal amplitude at the local sensors is corrupted by AWG noise with standard deviation σ 3. The power at the reference distance is 2. At every iteration, the ROI is split into M 4 equal regions as shown in Fig. 2. We the iterations for the basic coding scheme after 2 iterations. The number of sensors in the ROI at the final step are, therefore, 32. In order to have a fair comparison, we the exclusion method after 4 iterations, so that there are again 32 sensors in the ROI at the final step. Fig. 5 shows the performance of the proposed schemes in terms of the MSE of the estimated target location when compared with the traditional maximum lielihood estimation described by 4). The MSE has been found by performing 3 Monte Carlo runs with the true target location randomly chosen in the 8 8 grid. As can be seen from Fig. 5, the performance of the exclusion method based coding scheme is better than the basic coding scheme and outperforms the traditional MLE based scheme when α.375. When α >.375 the traditional MLE based scheme has the best performance. However, it is important to note that the proposed schemes provide a coarse estimate as against the traditional MLE based scheme which optimizes over the entire ROI. Also, the traditional scheme is computationally much more expensive than the proposed coding based schemes. In the simulations performed, the proposed schemes are around 5 times faster than the conventional scheme when the global optimization toolbox in MATLAB was used for the optimization in ML based scheme. The computation time is

10 Basic Coding Approach Coding with Exclusion Localization using MLE scheme improves with increase in the number of sensors and approaches αf.5 asymptotically. Table III shows the reduction of MSE with increasing for a fixed fraction of Byzantines, α. MSE m 2 ) Fraction of Byzantines MSE m 2 ) Fig. 5. MSE comparison of the three localization schemes 2 very important in a scenario when the target is moving and a coarse location estimate is needed in a timely manner. Fig. 6 shows the performance of the proposed schemes in terms of the detection probability of the target region. The detection probability has been found by performing 4 Monte Carlo runs with the true target randomly chosen in the ROI. Fig. 6 shows the reduction in the detection probability with increase in α when more sensors are Byzantines sending false information to the FC. Region detection probability Fig Basic Coding approach Coding with Exclusion Fraction of Byzantines robability of detection of target region as a function of α In order to analyze the effect of the number of sensors on the performance, we perform simulations by changing the number of sensors and eeping the number of iterations the same as before. According to roposition 4., when M 4, the proposed scheme can asymptotically handle up to 5% of the sensors being Byzantines. Figs. 7 and 8 show the effect of number of sensors on MSE and detection probability of the target region respectively when the exclusion method based coding scheme is used. As can be seen from both figures Figs. 7 and 8), the fault-tolerance capability of the proposed Fig. 7. Detection robability of target region Fig Fraction of Byzantines α) MSE of the target location estimate with varying Fraction of Byzantines α) robability of detection of target region with varying TABLE III MSE OF THE TARGET LOCATIO ESTIMATE FOR FIXED UMBER OF BYZATIES α.25) WITH VARYIG MSE m 2 ) V. SOFT-DECISIO DECODIG FOR O-IDEAL CHAELS In this section, we extend our scheme to counter the effect of non-ideal channels on system performance. Besides the faults due to the Byzantines in the networ, the presence of nonideal channels further degrades the localization performance.

11 To combat the channel effects, we propose the use of a soft-decision decoding rule, at every iteration, instead of the minimum Hamming distance decoding rule. ote that the code design is independent of the hard-decoding or soft-decoding since according to the code-design, a sensor sends a when the sensor decides that the target is in the same region as the sensor. A. Decoding rule At each iteration, the local sensors transmit their local decisions u which are possibly corrupted due to the presence of Byzantines. Let the received analog data at the FC be represented as v v, v2,, v, where the received observations are related to the transmitted decisions as follows: v i h i ) u i Eb + n i, i,, }, 42) where h i is the fading channel coefficient, E b is the energy per channel bit and n i is the additive white Gaussian noise with variance σf 2. In this paper, we assume the channel coefficients to be Rayleigh distributed with variance σh 2. We assume that the FC does not have nowledge of the fraction of Byzantines α. Hence, instead of adopting the reliability given in 6), we propose to use a simpler reliability measure ψi in our decoding rule that is not related to local decisions of sensors. It will be shown that this reliability measure performs well when there are Byzantines in the networ. We define the reliability measure for each of the received bits as follows: ψ i ln v i u i ) v i u i ) 43) for i,, }. Here vi u i ) can be obtained from the statistical model of the Rayleigh fading channel considered in this paper. Define F -distance as d F ψ, c j+) ψi ) c j+)i ) 2, i where ψ ψ,, ψ and c j+ is the jth row of the code matrix C. Then, the fusion rule is to decide the region Rj for which the F -distance between ψ and the row of C corresponding to Rj is minimized. B. erformance Analysis In this section, we present some bounds on the performance of the soft-decision decoding scheme in terms of the detection probability. Without loss of generality, we assume E b. As mentioned before in 5), the overall detection probability is the product of the probability of detection at each iteration, d. We first present the following lemma without proof which is used to prove the theorem stated later in this section. Lemma 5. 2): Let ψ i ψ i Eψ i θ, then E ψ i ) 2 θ 8 Eh σ 4 i ) 4 + Eh i ) 2 σf 2 }, 44) where σ 2 is the variance of the noise at the local sensors whose observations follow 2). For the Rayleigh fading channel considered in this paper, both Eh i )4 and Eh i )2 are bounded and, therefore, the LHS of 44) is also bounded. Lemma 5.2: Let θ Rj be the fixed target location. Let e,j θ) be the misclassification probability of the target region given θ Rj at the +)th iteration. For the reliability vector ψ ψ,, ψ of the /M observations and code matrix C used at the + ) th iteration, e,jθ) l M,l j i S j S l i ψ i i S j S l i Eψ i θ θ, 45) where i 2 )c j+)i ) c l+)i ). roof: e,jθ) detected region Rj θ} } d F ψ, c j+) min d F ψ, c l+) θ l M,l j } d F ψ, c j+) d F ψ, c l+) θ l M,l j l M,l j } ψi ) c j+)i ) 2 ψi ) c l+)i ) 2 θ i l M,l j l M,l j i S j S l i S j S l i ψ i θ i where 46) comes from the fact that ψ i i S j S l ψ i ) c j+)i ) 2 ψ i ) c l+)i ) 2 2 ) c j+)i ) c l+)i )ψ i i ψ i Let σ 2 ψθ) i S E j S i ψ i )2 θ l i S E ψ j S i )2 θ, then the above result can be l re-written as e,jθ) σ ψθ) l M,l j i S j S l i ψ i < σ ψθ) i S j S l 46) i Eψ i θ θ, i Eψ i θ θ. 47)

12 2 Under the assumption that as for M +,,, we have the following result for asymptotic performance of the proposed soft-decision rule decoding based scheme. Theorem 5.3: Under Assumption 3.3), when α <.5, D. roof: First we prove that when α <.5, then i Eψ i θ, 48) since the thresholds corresponding to sensors i j and i l are same due to Assumption 3.3. Therefore, u i l θ) u i j θ) 2α) F η ail ) F η a ij )). 57) ote that, since θ R j, F η ail ) < F η a ij ). ext we prove that Eψ i u i Eψ i u i < 58) for all finite noise variance of the fading channel σ 2 f ). i S j S l where i 2 )c j+)i ) c l+)i ). Based on our code matrix design, i for i Sj S l is given as, for i Sj i +, for i Sl. 49) By using the pairwise summation approach discussed in Section III-B, we notice that, for every sensor i j Sj and its corresponding sensor i l Sl, when θ R j, i j Eψ i j θ + i l Eψ i l θ Eψ i l ψ i j ) θ. 5) ow, for a given sensor i, we have the following, Eψ i θ u i θ)eψ i θ, u i + u i θ)eψ i θ, u i 5) u i θ))eψ i u i + u i θ)eψ i u i 52) Eψ i u i + u i θ) Eψ i u i Eψ i u i,53) where we used the facts that u i θ) + u i θ) and that the value of ψi depends only on u i. ote that the channel statistics are the same for both the sensors. Therefore, Eψi u i d for d, } given by Eψ i u i d E ln v i u i ) v i u i u i d is the same for both the sensors. The pairwise sum Eψi l ψi j ) θ now simplifies to the following, Eψ i l ψ i j ) θ Eψ i u i + u i l θ) Eψ i u i Eψ i u i Eψi u i u i j θ) Eψi u i Eψi u i ) u i l θ) u i j θ) Eψ i u i Eψi u i. 54) When θ Rj, we have u i j θ) α + 2α) F ) η a ij 55) u i l θ) α + 2α) F η a il ) 56) Eψi u i Eψi u i E ln v i u i ) vi u i ) u i E ln v i u i ) vi u i ) u i v i u i ) ln v i u i ) v i u i ) dv i v i u i ) ln v i u i ) v i u i ) dv i D v i u i ) v i u i )) D v i u i ) v i u i )), 59) where Dp q) is the Kullbac-Leiber distance between probability distributions p and q. Since vi u i ) v i u i ) for all finite σf 2, we have D v i u i ) vi u i )) > and D vi u i ) vi u i )) >. This concludes that Eψi u i Eψi u i <. Hence, when α < /2, from 54), 57), and 58), Eψi l ψi j ) θ > and the condition i S j S i Eψ i θ is satisfied. l We now show that when the condition 48) is satisfied, the proposed scheme asymptotically attains perfect detection probability. D Define M j θ d θ Rj } detected region R j θ Rj } M M j θ θ Rj } detected region R j θ, θ Rj } dθ. e,j,max max e,jθ) 6) θ R j 6)

13 3 and Then, D M j θ R j e,max max e,j,max. 62) j M M M M e,j,max M j Since E M j θ θ R j } e,j,max dθ θ R j e,max M e,max ψ i )2 θ θ θ θ R j } e,j θ)dθ θ θ Rj } dθ M j. 63) is bounded as shown by Lemma 5.2, Lindeberg condition 24 holds and σ ψθ) i S j S l i tends to a standard Gaussian random variable by Lindeberg central it theorem 24. Therefore, from 47), we have e,jθ) i S j S l l M,l j σ ψθ) i S j S l σ ψθ) } i Eψ i θ θ Q l M,l j σ ψθ) i S j S l i S j S l i ψ i < ψ i 64) i Eψ i Hj. Since, for a fixed θ, σ ψθ) will grow slower than i Eψ i θ when i Sj S l i Eψ i θ, e,j θ) for all θ. Hence, e,max and from 63), D for all finite noise variance. ote that the detection probability of the proposed scheme can approach even for extremely bad channels with very low channel capacity. This is true because, when M increases M + sub-linearly with, i.e., when as for,,, as approaches infinity, the code rate of the code matrix approaches zero. Hence, even for extremely bad channels, the code rate is still less than the channel capacity. C. umerical Results In this section, we present some numerical results which show the improvement in the system performance when softdecision decoding rule is used instead of the hard-decision decoding rule in the presence of Byzantines and non-ideal channels. As defined before, α represents the fraction of Byzantines and we evaluate the performance of the basic coding approach with soft-decision decoding at the FC. We simulate the scenario with following system parameters: 52, M 4, A sq. units, 2, local sensor observations are corrupted with Gaussian noise with σ 3, E b, σ f 3 and Eh i )2 which corresponds to σh 2 π 4. The basic coding approach is ped after 2 iterations. ote that in the presence of non-ideal channels, α blind is less than.5 since the non-ideal channels add to the errors at the FC. The number of Byzantine faults which the networ can handle reduces and is now less than.5. In our simulations, we observe that the performance of the schemes completely deteriorates when α.4 as opposed to.5 observed before) and, therefore, we plot the results for the case when α.4 Fig. 9 shows the reduction in mean square error when the soft-decision decoding rule is used instead of the hard-decision decoding rule. Similarly, Fig. shows the improvement in target region detection probability when the soft-decision decoding rule is used. The plots are for 5 3 Monte-Carlo simulations. MSE Hard decision decoding Soft decision decoding Fraction of Byzantines Fig. 9. MSE comparison of the basic coding scheme using soft- and harddecision decoding As the figures suggest, the performance deteriorates in the presence of non-ideal channels. Also, the performance worsens with an increase in the number of Byzantines. The performance can be improved by using the exclusion method based coding approach as discussed in Section IV in which two regions are stored after every iteration. Figs. and 2 show this improved performance as compared to the basic coding approach. ote that the exclusion method based coding approach also follows the same trend as the basic coding approach with soft-decision decoding performing better than hard-decision decoding.

14 Hard decision decoding Soft decision decoding.55.5 Hard decision decoding Soft decision decoding Detection robability of target region Detection robability of target region Fraction of Byzantines α) Fraction of Byzantines α) Fig.. robability of detection of target region comparison of the basic coding scheme using soft- and hard- decision decoding Fig. 2. robability of detection of target region comparison of the exclusion coding scheme using soft- and hard- decision decoding 4 2 Hard decision decoding Soft decision decoding MSE Region detection probability Fraction of Byzantines α) Fig.. MSE comparison of the exclusion coding scheme using soft- and hard- decision decoding In our theoretical analysis, we have shown that the probability of region detection asymptotically approaches irrespective of the finite noise variance. Fig. 3 presents this result that the region detection probability approaches as the number of sensors approach infinity. Observe that for a fixed noise variance, the region detection probability increases with increase in the number of sensors and approaches as. However, as σ f increases, the convergence rate decreases. For example, when σ f.5, 496 is large enough to have D close to.9. However, for σ f 4, 496 results in D.65 which is not very large. It is expected that D much later for σ f 4 and, therefore, the convergence rate is less compared to when σ f.5. VI. COCLUSIO In this paper, we considered the problem of target localization in wireless sensor networs. Traditionally, research has focused on conventional maximum lielihood approaches for estimating the target location. However, maximum lielihood oise standard deviation of fading channel σ ) f Fig. 3. robability of detection of target region of the exclusive coding scheme using soft- decision decoding with varying number of sensors ) based approaches are computationally very expensive. To reduce the computational complexity, we proposed a novel coding theory based technique for target localization. Modeling the estimation problem as an iterative classification problem, we can determine a coarse estimate of the target location in a computationally efficient manner. This efficiency in terms of computation becomes important in a scenario when the target is not stationary. The proposed scheme estimates the target location iteratively using M-ary classification at each iteration. We provided the theoretical analysis of the proposed scheme in terms of the detection probability of the target region. Considering the presence of Byzantines malicious sensors) in the networ, we modified our approach to increase the faulttolerance capability of the coding scheme used. This approach, called the exclusion method based approach, is more tolerant to the presence of Byzantines than the basic coding scheme. We showed with simulations that the exclusion method based scheme provides an accurate estimate of the target location in a very efficient manner than the traditional MLE based scheme

15 5 and also has a better Byzantine fault tolerance capability. We also considered the effect of non-ideal channels between local sensors and the fusion center. To minimize the effects of these non-ideal channels, we proposed soft-decision decoding at the fusion center. We showed with simulations, the improvement in performance of soft-decision decoding rule based scheme over hard-decision decoding rule based scheme in the presence of non-ideal channels. In the future, we plan to extend our wor by relaxing Assumption 3.3 and to also derive the convergence rates using Berry-Essen inequalities. One can also extend this wor to the case of target tracing when the target s location is changing with time and the sensor networ s aim is to trac the target s motion. The proposed schemes provide an insight on M -ary search trees and show that the idea of coding based schemes can also be used for other signal processing applications. For example, the application involving search such as rumor source localization in social networs. R EFERECES I. F. Ayildiz, W. Su, Y. Sanarasubramaniam, and E. Cayirci, A survey on sensor networs, IEEE Commun. Mag., vol. 4, no. 8, pp. 2 4, Aug R. iu and. K. Varshney, Target location estimation in sensor networs with quantized data, IEEE Trans. Signal rocess., vol. 54, no. 2, pp , Dec X. Wang, M. Fu, and H. Zhang, Target tracing in wireless sensor networs based on the combination of KF and MLE using distance measurements, IEEE Trans. Mobile Comp.,, vol., no. 4, pp , April V. Veeravalli and. K. Varshney, Distributed inference in wireless sensor networs, hilosophical Transactions of the Royal Society A: Mathematical, hysical and Engineering Sciences, vol. 37, no. 958, pp. 7, Jan L. M. Kaplan, L. Qiang, and. Molnar, Maximum lielihood methods for bearings-only target localization, in roc. IEEE Int. Conf. Acoust., Speech, Signal rocess. ICASS 2), Salt Lae City, UT, May 2. 6 J. Chen, R. Hudson, and K. Yao, A maximum lielihood parametric approach to source localization, in roc. IEEE Int. Conf. Acoust., Speech, Signal rocess. ICASS 2), vol. 5, Salt Lae City, UT, May 2, pp D. Li and Y. H. Hu, Energy-based collaborative source localization using acoustic microsensor array,, EURASI Journal on Applied Signal rocessing, vol. 23, no. 4, pp , X. Sheng and Y. H. Hu, Maximum lielihood multiple-source localization using acoustic energy measurements with wireless sensor networs, IEEE Trans. Signal rocess., vol. 53, no., pp , Jan H. K. D. Sarma and A. Kar, Security threats in wireless sensor networs, in roc. 4th Annual IEEE International Carnahan Conferences Security Technology,, Oct. 26, pp A. Vempaty, L. Tong, and. K. Varshney, Distributed inference with Byzantine data: state-of-the-art review on data falsification attacs, IEEE Signal rocess. Mag., vol. 3, no. 5, pp , Sep. 23. A. Vempaty, O. Ozdemir, K. Agrawal, H. Chen, and. K. Varshney, Localization in wireless sensor networs: Byzantines and mitigation techniques, IEEE Trans. Signal rocess., vol. 6, no. 6, pp , Mar B. Chen, L. Tong, and. K. Varshney, Channel-aware distributed detection in wireless sensor networs, IEEE Signal rocess. Mag. Special Issue on Distributed Signal rocessing for Sensor etwors), vol. 23, pp. 6 26, Jul G. ottie and W. Kaiser, Wireless integrated networ sensors, Communications of the ACM, vol. 43, pp , May 2. 4 M. R. Islam, Error correction codes in wireless sensor networ: An energy aware approach, International Journal of Computer & Information Engineering, vol. 4, no., pp , Jan S. Lin and D. J. Costello, Jr., Error Control Coding: Fundamentals and Applications, 2nd ed. Englewood Cliffs, J: rentice-hall, Inc., Z. X. Luo,. S. Min, and S.-J. Liu, Target localization in wireless sensor networs for industrial control with selected sensors, International Journal of Distributed Sensor etwors, vol. 23, A. Vempaty, Y. S. Han, and. K. Varshney., Target localization in wireless sensor networs using error correcting codes in the presence of Byzantines, in roc. IEEE Int. Conf. Acoust., Speech, Signal rocess. ICASS 2), Vancouver, Canada, May 23, pp , Byzantine tolerant target localization in wireless sensor networs over non-ideal channels, in roc. 3th Int. Symp. Commun. Inf. Technologies ISCIT 23), Samui Island, Thailand, Sep T.-Y. Wang, Y. S. Han,. K. Varshney, and.-. Chen, Distributed fault-tolerant classification in wireless sensor networs, IEEE J Sel. Areas Comm., vol. 23, no. 4, pp , April T.-Y. Wang, Y. S. Han, B. Chen, and. K. Varshney, A combined decision fusion and channel coding scheme for distributed fault-tolerant classification in wireless sensor networs, IEEE Trans. Wireless Commun., vol. 5, no. 7, pp , Berhin, Survey of clustering data mining techniques, Tech. Rep., F. Aurenhammer, Voronoi diagram- A survey of a fundamental geometric data structure, ACM Comput. Surv., vol. 23, no. 3, pp , Sep. 99. Online. Available: C. Yao,.-. Chen, T.-Y. Wang, Y. S. Han, and. K. Varshney, erformance analysis and code design for minimum Hamming distance fusion in wireless sensor networs, IEEE Trans. Inf. Theory, vol. 53, no. 5, pp , May W. Feller, An Introduction to robability Theory and Its Applications. ew Yor: Wiley, 966. Aditya Vempaty S 2) was born in Hyderabad, India, on August 3, 989. He received the B. Tech degree in electrical engineering from Indian Institute of Technology IIT), Kanpur, India, in 2 with academic excellence awards for consecutive years. Since 2, he has been woring towards his h.d. degree in electrical engineering at Syracuse University. He is a Graduate Research Assistant at the Sensor Fusion Laboratory where he was also an Undergraduate Research Intern during summer of 2. He was a Graduate Research Intern in the Data Systems Group at Intel Corporation in Santa Clara, CA in summer 23. His research interests include statistical signal processing, human decision maing, security in sensor networs, and data fusion. He has been awarded the Syracuse University Graduate Fellowship award for the academic year He is a member of hi Kappa hi and Golden Key International Honor Society.

16 6 Yunghsiang S. Han S 9 M 93 SM 8 F ) was born in Taipei, Taiwan, 962. He received B.Sc. and M.Sc. degrees in electrical engineering from the ational Tsing Hua University, Hsinchu, Taiwan, in 984 and 986, respectively, and a h.d. degree from the School of Computer and Information Science, Syracuse University, Syracuse, Y, in 993. He was from 986 to 988 a lecturer at Ming-Hsin Engineering College, Hsinchu, Taiwan. He was a teaching assistant from 989 to 992, and a research associate in the School of Computer and Information Science, Syracuse University from 992 to 993. He was, from 993 to 997, an Associate rofessor in the Department of Electronic Engineering at Hua Fan College of Humanities and Technology, Taipei Hsien, Taiwan. He was with the Department of Computer Science and Information Engineering at ational Chi an University, antou, Taiwan from 997 to 24. He was promoted to rofessor in 998. He was a visiting scholar in the Department of Electrical Engineering at University of Hawaii at Manoa, HI from June to October 2, the SURIA visiting research scholar in the Department of Electrical Engineering and Computer Science and CASE center at Syracuse University, Y from September 22 to January 24 and July 22 to June 23, and the visiting scholar in the Department of Electrical and Computer Engineering at University of Texas at Austin, TX from August 28 to June 29. He was with the Graduate Institute of Communication Engineering at ational Taipei University, Taipei, Taiwan from August 24 to July 2. From August 2, he is with the Department of Electrical Engineering at ational Taiwan University of Science and Technology as Chair professor. His research interests are in error-control coding, wireless networs, and security. Dr. Han was a winner of the 994 Syracuse University Doctoral rize and a Fellow of IEEE. ramod K. Varshney S 72-M 77-SM 82-F 97) was born in Allahabad, India, on July, 952. He received the B.S. degree in electrical engineering and computer science with highest honors), and the M.S. and h.d. degrees in electrical engineering from the University of Illinois at Urbana-Champaign in 972, 974, and 976 respectively. From 972 to 976, he held teaching and research assistantships with the University of Illinois. Since 976, he has been with Syracuse University, Syracuse, Y, where he is currently a Distinguished rofessor of Electrical Engineering and Computer Science and the Director of CASE: Center for Advanced Systems and Engineering. He served as the Associate Chair of the department from 993 to 996. He is also an Adjunct rofessor of Radiology at Upstate Medical University, Syracuse. His current research interests are in distributed sensor networs and data fusion, detection and estimation theory, wireless communications, image processing, radar signal processing, and remote sensing. He has published extensively. He is the author of Distributed Detection and Data Fusion ew Yor: Springer- Verlag, 997). He has served as a consultant to several major companies. Dr. Varshney was a James Scholar, a Bronze Tablet Senior, and a Fellow while at the University of Illinois. He is a member of Tau Beta i and is the recipient of the 98 ASEE Dow Outstanding Young Faculty Award. He was elected to the grade of Fellow of the IEEE in 997 for his contributions in the area of distributed detection and data fusion. He was the Guest Editor of the Special Issue on Data Fusion of the IEEE ROCEEDIGS January 997. In 2, he received the Third Millennium Medal from the IEEE and Chancellors Citation for exceptional academic achievement at Syracuse University. He is the recipient of the IEEE 22 Judith A. Resni Award. He is on the Editorial Board of the Journal on Advances in Information Fusion. He was the resident of International Society of Information Fusion during 2.

False Discovery Rate Based Distributed Detection in the Presence of Byzantines

False Discovery Rate Based Distributed Detection in the Presence of Byzantines IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS () 1 False Discovery Rate Based Distributed Detection in the Presence of Byzantines Aditya Vempaty*, Student Member, IEEE, Priyadip Ray, Member, IEEE,

More information

Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks

Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Keshav Agrawal, Aditya Vempaty, Hao Chen and Pramod K. Varshney Electrical Engineering Department,

More information

Maximum Likelihood Diffusive Source Localization Based on Binary Observations

Maximum Likelihood Diffusive Source Localization Based on Binary Observations Maximum Lielihood Diffusive Source Localization Based on Binary Observations Yoav Levinboo and an F. Wong Wireless Information Networing Group, University of Florida Gainesville, Florida 32611-6130, USA

More information

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE

5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER /$ IEEE 5682 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 55, NO. 12, DECEMBER 2009 Hyperplane-Based Vector Quantization for Distributed Estimation in Wireless Sensor Networks Jun Fang, Member, IEEE, and Hongbin

More information

Asymptotically Optimal and Bandwith-efficient Decentralized Detection

Asymptotically Optimal and Bandwith-efficient Decentralized Detection Asymptotically Optimal and Bandwith-efficient Decentralized Detection Yasin Yılmaz and Xiaodong Wang Electrical Engineering Department, Columbia University New Yor, NY 10027 Email: yasin,wangx@ee.columbia.edu

More information

Byzantines and Mitigation Techniques

Byzantines and Mitigation Techniques Distributed Detection in Tree Networs: 1 Byzantines and Mitigation Techniques Bhavya Kailhura, Student Member, IEEE, Swasti Brahma, Member, IEEE, Beran Dule, Member, IEEE, Yunghsiang S Han, Fellow, IEEE,

More information

EUSIPCO

EUSIPCO EUSIPCO 3 569736677 FULLY ISTRIBUTE SIGNAL ETECTION: APPLICATION TO COGNITIVE RAIO Franc Iutzeler Philippe Ciblat Telecom ParisTech, 46 rue Barrault 753 Paris, France email: firstnamelastname@telecom-paristechfr

More information

Wideband Fading Channel Capacity with Training and Partial Feedback

Wideband Fading Channel Capacity with Training and Partial Feedback Wideband Fading Channel Capacity with Training and Partial Feedback Manish Agarwal, Michael L. Honig ECE Department, Northwestern University 145 Sheridan Road, Evanston, IL 6008 USA {m-agarwal,mh}@northwestern.edu

More information

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Mohammed Karmoose Electrical Engineering Department Alexandria University Alexandria 1544, Egypt Email: mhkarmoose@ieeeorg Karim

More information

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical

More information

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage

Minimum Repair Bandwidth for Exact Regeneration in Distributed Storage 1 Minimum Repair andwidth for Exact Regeneration in Distributed Storage Vivec R Cadambe, Syed A Jafar, Hamed Malei Electrical Engineering and Computer Science University of California Irvine, Irvine, California,

More information

Lecture 7 Introduction to Statistical Decision Theory

Lecture 7 Introduction to Statistical Decision Theory Lecture 7 Introduction to Statistical Decision Theory I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 20, 2016 1 / 55 I-Hsiang Wang IT Lecture 7

More information

Reliable Crowdsourcing for Multi-Class Labeling using Coding Theory

Reliable Crowdsourcing for Multi-Class Labeling using Coding Theory Reliable Crowdsourcing for ulti-class Labeling using Coding Theory Aditya Vempaty, Lav R. Varshney, and Pramod K. Varshney 1 Abstract arxiv:1309.3330v [cs.it] Jan 014 Crowdsourcing systems often have crowd

More information

Distributed Inference and Learning with Byzantine Data

Distributed Inference and Learning with Byzantine Data Syracuse University SURFACE Dissertations - ALL SURFACE 8-1-2016 Distributed Inference and Learning with Byzantine Data Bhavya Kailkhura Syracuse University Follow this and additional works at: http://surface.syr.edu/etd

More information

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2

Resource Allocation for Wireless Fading Relay Channels: Max-Min Solution 1 2 Submitted to IEEE Trans. Inform. Theory, Special Issue on Models, Theory and odes for elaying and ooperation in ommunication Networs, Aug. 2006, revised Jan. 2007 esource Allocation for Wireless Fading

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

Decentralized Detection In Wireless Sensor Networks

Decentralized Detection In Wireless Sensor Networks Decentralized Detection In Wireless Sensor Networks Milad Kharratzadeh Department of Electrical & Computer Engineering McGill University Montreal, Canada April 2011 Statistical Detection and Estimation

More information

Spectrum Sensing via Event-triggered Sampling

Spectrum Sensing via Event-triggered Sampling Spectrum Sensing via Event-triggered Sampling Yasin Yilmaz Electrical Engineering Department Columbia University New Yor, NY 0027 Email: yasin@ee.columbia.edu George Moustaides Dept. of Electrical & Computer

More information

arxiv: v2 [cs.it] 17 Jan 2018

arxiv: v2 [cs.it] 17 Jan 2018 K-means Algorithm over Compressed Binary Data arxiv:1701.03403v2 [cs.it] 17 Jan 2018 Elsa Dupraz IMT Atlantique, Lab-STICC, UBL, Brest, France Abstract We consider a networ of binary-valued sensors with

More information

10-701/15-781, Machine Learning: Homework 4

10-701/15-781, Machine Learning: Homework 4 10-701/15-781, Machine Learning: Homewor 4 Aarti Singh Carnegie Mellon University ˆ The assignment is due at 10:30 am beginning of class on Mon, Nov 15, 2010. ˆ Separate you answers into five parts, one

More information

Guess & Check Codes for Deletions, Insertions, and Synchronization

Guess & Check Codes for Deletions, Insertions, and Synchronization Guess & Chec Codes for Deletions, Insertions, and Synchronization Serge Kas Hanna, Salim El Rouayheb ECE Department, IIT, Chicago sashann@hawiitedu, salim@iitedu Abstract We consider the problem of constructing

More information

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing

Lecture 7. Union bound for reducing M-ary to binary hypothesis testing Lecture 7 Agenda for the lecture M-ary hypothesis testing and the MAP rule Union bound for reducing M-ary to binary hypothesis testing Introduction of the channel coding problem 7.1 M-ary hypothesis testing

More information

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions Score-Function Quantization for Distributed Estimation Parvathinathan Venkitasubramaniam and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 4853 Email: {pv45, lt35}@cornell.edu

More information

Cluster Pairwise Error Probability and Construction of Parity-Check-Concatenated Polar Codes

Cluster Pairwise Error Probability and Construction of Parity-Check-Concatenated Polar Codes Cluster Pairwise Error Probability and Construction of Parity-Check-Concatenated Polar Codes Tao Wang, Daiming Qu and Tao Jiang, Senior Member, IEEE arxiv:80.04458v [cs.it] Oct 08 Abstract A successive

More information

On Noise-Enhanced Distributed Inference in the Presence of Byzantines

On Noise-Enhanced Distributed Inference in the Presence of Byzantines Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 211 On Noise-Enhanced Distributed Inference in the Presence of Byzantines Mukul Gagrani

More information

Dynamic Bandwidth Allocation for Target Tracking. Wireless Sensor Networks.

Dynamic Bandwidth Allocation for Target Tracking. Wireless Sensor Networks. 4th International Conference on Information Fusion Chicago, Illinois, USA, July 5-8, Dynamic Bandwidth Allocation for Target Tracking in Wireless Sensor Networks Engin Masazade, Ruixin Niu, and Pramod

More information

Lecture 14 October 22

Lecture 14 October 22 EE 2: Coding for Digital Communication & Beyond Fall 203 Lecture 4 October 22 Lecturer: Prof. Anant Sahai Scribe: Jingyan Wang This lecture covers: LT Code Ideal Soliton Distribution 4. Introduction So

More information

Lecture 12. Block Diagram

Lecture 12. Block Diagram Lecture 12 Goals Be able to encode using a linear block code Be able to decode a linear block code received over a binary symmetric channel or an additive white Gaussian channel XII-1 Block Diagram Data

More information

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas

Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast. Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Network Algorithms and Complexity (NTUA-MPLA) Reliable Broadcast Aris Pagourtzis, Giorgos Panagiotakos, Dimitris Sakavalas Slides are partially based on the joint work of Christos Litsas, Aris Pagourtzis,

More information

Estimating Gaussian Mixture Densities with EM A Tutorial

Estimating Gaussian Mixture Densities with EM A Tutorial Estimating Gaussian Mixture Densities with EM A Tutorial Carlo Tomasi Due University Expectation Maximization (EM) [4, 3, 6] is a numerical algorithm for the maximization of functions of several variables

More information

Channel-Aware Tracking in Multi-Hop Wireless Sensor Networks with Quantized Measurements

Channel-Aware Tracking in Multi-Hop Wireless Sensor Networks with Quantized Measurements Channel-Aware Tracing in Multi-Hop Wireless Sensor Networs with Quantized Measurements XIAOJUN YANG Chang an University China RUIXIN NIU, Senior Member, IEEE Virginia Commonwealth University ENGIN MASAZADE,

More information

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems

A Framework for Optimizing Nonlinear Collusion Attacks on Fingerprinting Systems A Framework for Optimizing onlinear Collusion Attacks on Fingerprinting Systems egar iyavash Department of Electrical and Computer Engineering University of Illinois at Urbana-Champaign Coordinated Science

More information

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains

Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains Solving Zero-Sum Security Games in Discretized Spatio-Temporal Domains APPENDIX LP Formulation for Constant Number of Resources (Fang et al. 3) For the sae of completeness, we describe the LP formulation

More information

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS Parvathinathan Venkitasubramaniam, Gökhan Mergen, Lang Tong and Ananthram Swami ABSTRACT We study the problem of quantization for

More information

A proof of the existence of good nested lattices

A proof of the existence of good nested lattices A proof of the existence of good nested lattices Dinesh Krithivasan and S. Sandeep Pradhan July 24, 2007 1 Introduction We show the existence of a sequence of nested lattices (Λ (n) 1, Λ(n) ) with Λ (n)

More information

Expected Error Based MMSE Detection Ordering for Iterative Detection-Decoding MIMO Systems

Expected Error Based MMSE Detection Ordering for Iterative Detection-Decoding MIMO Systems Expected Error Based MMSE Detection Ordering for Iterative Detection-Decoding MIMO Systems Lei Zhang, Chunhui Zhou, Shidong Zhou, Xibin Xu National Laboratory for Information Science and Technology, Tsinghua

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Quantization for Distributed Estimation

Quantization for Distributed Estimation 0 IEEE International Conference on Internet of Things ithings 0), Green Computing and Communications GreenCom 0), and Cyber-Physical-Social Computing CPSCom 0) Quantization for Distributed Estimation uan-yu

More information

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps

Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps 2012 IEEE International Symposium on Information Theory Proceedings Efficient Decoding of Permutation Codes Obtained from Distance Preserving Maps Yeow Meng Chee and Punarbasu Purkayastha Division of Mathematical

More information

Binary Compressive Sensing via Analog. Fountain Coding

Binary Compressive Sensing via Analog. Fountain Coding Binary Compressive Sensing via Analog 1 Fountain Coding Mahyar Shirvanimoghaddam, Member, IEEE, Yonghui Li, Senior Member, IEEE, Branka Vucetic, Fellow, IEEE, and Jinhong Yuan, Senior Member, IEEE, arxiv:1508.03401v1

More information

On Distributed Linear Estimation With Observation Model Uncertainties

On Distributed Linear Estimation With Observation Model Uncertainties SUBMITTED TO JOURNAL OF TRANSACTIONS ON SIGNAL PROCESSING, On Distributed Linear Estimation With Observation Model Uncertainties Alireza Sani, Student Member, IEEE, Azadeh Vosoughi, Senior Member, IEEE,

More information

WITH the wide employment of wireless devices in various

WITH the wide employment of wireless devices in various 1 Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel Lichuan a, Student ember, IEEE, Yong Xiang, Senior ember, IEEE, Qingqi Pei, Senior ember, IEEE, Yang Xiang, Senior

More information

WITH the significant advances in networking, wireless

WITH the significant advances in networking, wireless IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 54, NO. 12, DECEMBER 2006 4519 Target Location Estimation in Sensor Networks With Quantized Data Ruixin Niu, Member, IEEE, and Pramod K. Varshney, Fellow, IEEE

More information

بسم الله الرحمن الرحيم

بسم الله الرحمن الرحيم بسم الله الرحمن الرحيم Reliability Improvement of Distributed Detection in Clustered Wireless Sensor Networks 1 RELIABILITY IMPROVEMENT OF DISTRIBUTED DETECTION IN CLUSTERED WIRELESS SENSOR NETWORKS PH.D.

More information

THIS paper is aimed at designing efficient decoding algorithms

THIS paper is aimed at designing efficient decoding algorithms IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 45, NO. 7, NOVEMBER 1999 2333 Sort-and-Match Algorithm for Soft-Decision Decoding Ilya Dumer, Member, IEEE Abstract Let a q-ary linear (n; k)-code C be used

More information

Decision Fusion in Cognitive Wireless Sensor Networks

Decision Fusion in Cognitive Wireless Sensor Networks 20 Decision Fusion in Cognitive Wireless Sensor etwors Andrea Abrardo, Marco Martalò, and Gianluigi Ferrari COTETS 20. Introduction...349 20.2 System Model... 350 20.3 Single-ode Perspective... 352 20.4

More information

Diffusion LMS Algorithms for Sensor Networks over Non-ideal Inter-sensor Wireless Channels

Diffusion LMS Algorithms for Sensor Networks over Non-ideal Inter-sensor Wireless Channels Diffusion LMS Algorithms for Sensor Networs over Non-ideal Inter-sensor Wireless Channels Reza Abdolee and Benoit Champagne Electrical and Computer Engineering McGill University 3480 University Street

More information

Optimal Power Control in Decentralized Gaussian Multiple Access Channels

Optimal Power Control in Decentralized Gaussian Multiple Access Channels 1 Optimal Power Control in Decentralized Gaussian Multiple Access Channels Kamal Singh Department of Electrical Engineering Indian Institute of Technology Bombay. arxiv:1711.08272v1 [eess.sp] 21 Nov 2017

More information

LIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO*

LIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO* LIKELIHOOD RECEIVER FOR FH-MFSK MOBILE RADIO* Item Type text; Proceedings Authors Viswanathan, R.; S.C. Gupta Publisher International Foundation for Telemetering Journal International Telemetering Conference

More information

Threshold Considerations in Distributed Detection in a Network of Sensors.

Threshold Considerations in Distributed Detection in a Network of Sensors. Threshold Considerations in Distributed Detection in a Network of Sensors. Gene T. Whipps 1,2, Emre Ertin 2, and Randolph L. Moses 2 1 US Army Research Laboratory, Adelphi, MD 20783 2 Department of Electrical

More information

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN A Thesis Presented to The Academic Faculty by Bryan Larish In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy

More information

arxiv: v1 [cs.it] 21 Feb 2013

arxiv: v1 [cs.it] 21 Feb 2013 q-ary Compressive Sensing arxiv:30.568v [cs.it] Feb 03 Youssef Mroueh,, Lorenzo Rosasco, CBCL, CSAIL, Massachusetts Institute of Technology LCSL, Istituto Italiano di Tecnologia and IIT@MIT lab, Istituto

More information

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel

Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Achieving Shannon Capacity Region as Secrecy Rate Region in a Multiple Access Wiretap Channel Shahid Mehraj Shah and Vinod Sharma Department of Electrical Communication Engineering, Indian Institute of

More information

MIMO Broadcast Channels with Finite Rate Feedback

MIMO Broadcast Channels with Finite Rate Feedback IO Broadcast Channels with Finite Rate Feedbac Nihar Jindal, ember, IEEE Abstract ultiple transmit antennas in a downlin channel can provide tremendous capacity ie multiplexing gains, even when receivers

More information

A Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation

A Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation A Reservoir Sampling Algorithm with Adaptive Estimation of Conditional Expectation Vu Malbasa and Slobodan Vucetic Abstract Resource-constrained data mining introduces many constraints when learning from

More information

Local Strong Convexity of Maximum-Likelihood TDOA-Based Source Localization and Its Algorithmic Implications

Local Strong Convexity of Maximum-Likelihood TDOA-Based Source Localization and Its Algorithmic Implications Local Strong Convexity of Maximum-Likelihood TDOA-Based Source Localization and Its Algorithmic Implications Huikang Liu, Yuen-Man Pun, and Anthony Man-Cho So Dept of Syst Eng & Eng Manag, The Chinese

More information

Transmitting k samples over the Gaussian channel: energy-distortion tradeoff

Transmitting k samples over the Gaussian channel: energy-distortion tradeoff Transmitting samples over the Gaussian channel: energy-distortion tradeoff Victoria Kostina Yury Polyansiy Sergio Verdú California Institute of Technology Massachusetts Institute of Technology Princeton

More information

Module 2. Random Processes. Version 2, ECE IIT, Kharagpur

Module 2. Random Processes. Version 2, ECE IIT, Kharagpur Module Random Processes Version, ECE IIT, Kharagpur Lesson 9 Introduction to Statistical Signal Processing Version, ECE IIT, Kharagpur After reading this lesson, you will learn about Hypotheses testing

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Variable-Rate Universal Slepian-Wolf Coding with Feedback

Variable-Rate Universal Slepian-Wolf Coding with Feedback Variable-Rate Universal Slepian-Wolf Coding with Feedback Shriram Sarvotham, Dror Baron, and Richard G. Baraniuk Dept. of Electrical and Computer Engineering Rice University, Houston, TX 77005 Abstract

More information

An Extended Fano s Inequality for the Finite Blocklength Coding

An Extended Fano s Inequality for the Finite Blocklength Coding An Extended Fano s Inequality for the Finite Bloclength Coding Yunquan Dong, Pingyi Fan {dongyq8@mails,fpy@mail}.tsinghua.edu.cn Department of Electronic Engineering, Tsinghua University, Beijing, P.R.

More information

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks Ji an Luo 2008.6.6 Outline Background Problem Statement Main Results Simulation Study Conclusion Background Wireless

More information

New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding

New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding 1 New Designs for Bit-Interleaved Coded Modulation with Hard-Decision Feedback Iterative Decoding Alireza Kenarsari-Anhari, Student Member, IEEE, and Lutz Lampe, Senior Member, IEEE Abstract Bit-interleaved

More information

Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems

Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems Fast Near-Optimal Energy Allocation for Multimedia Loading on Multicarrier Systems Michael A. Enright and C.-C. Jay Kuo Department of Electrical Engineering and Signal and Image Processing Institute University

More information

APOCS: A RAPIDLY CONVERGENT SOURCE LOCALIZATION ALGORITHM FOR SENSOR NETWORKS. Doron Blatt and Alfred O. Hero, III

APOCS: A RAPIDLY CONVERGENT SOURCE LOCALIZATION ALGORITHM FOR SENSOR NETWORKS. Doron Blatt and Alfred O. Hero, III APOCS: A RAPIDLY CONVERGENT SOURCE LOCALIZATION ALGORITHM FOR SENSOR NETWORKS Doron Blatt and Alfred O. Hero, III Department of Electrical Engineering and Computer Science, University of Michigan, Ann

More information

EECS 750. Hypothesis Testing with Communication Constraints

EECS 750. Hypothesis Testing with Communication Constraints EECS 750 Hypothesis Testing with Communication Constraints Name: Dinesh Krithivasan Abstract In this report, we study a modification of the classical statistical problem of bivariate hypothesis testing.

More information

IT is well known (see, e.g., [2]-[10]) that the simple scheme. On the Optimality of Treating Interference as Noise: Compound Interference Networks

IT is well known (see, e.g., [2]-[10]) that the simple scheme. On the Optimality of Treating Interference as Noise: Compound Interference Networks On the Optimality of Treating Interference as Noise: Compound Interference Networs Chunhua Geng, Student Member, IEEE, and Syed A. Jafar, Fellow, IEEE Abstract In a K-user Gaussian interference channel,

More information

Diffusion based Projection Method for Distributed Source Localization in Wireless Sensor Networks

Diffusion based Projection Method for Distributed Source Localization in Wireless Sensor Networks The Third International Workshop on Wireless Sensor, Actuator and Robot Networks Diffusion based Projection Method for Distributed Source Localization in Wireless Sensor Networks Wei Meng 1, Wendong Xiao,

More information

Detection Performance Limits for Distributed Sensor Networks in the Presence of Nonideal Channels

Detection Performance Limits for Distributed Sensor Networks in the Presence of Nonideal Channels 1 Detection Performance imits for Distributed Sensor Networks in the Presence of Nonideal Channels Qi Cheng, Biao Chen and Pramod K Varshney Abstract Existing studies on the classical distributed detection

More information

Fisher Information Maximization for Distributed Vector Estimation in Wireless Sensor Networks

Fisher Information Maximization for Distributed Vector Estimation in Wireless Sensor Networks Fisher Information Maximization for Distributed Vector Estimation in Wireless Sensor Networs Mojtaba Shirazi, Azadeh Vosoughi, Senior Member, IEEE arxiv:75.8v [cs.it] Jul 8 Abstract In this paper we consider

More information

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results

Information Theory. Lecture 10. Network Information Theory (CT15); a focus on channel capacity results Information Theory Lecture 10 Network Information Theory (CT15); a focus on channel capacity results The (two-user) multiple access channel (15.3) The (two-user) broadcast channel (15.6) The relay channel

More information

PARAMETER ESTIMATION AND ORDER SELECTION FOR LINEAR REGRESSION PROBLEMS. Yngve Selén and Erik G. Larsson

PARAMETER ESTIMATION AND ORDER SELECTION FOR LINEAR REGRESSION PROBLEMS. Yngve Selén and Erik G. Larsson PARAMETER ESTIMATION AND ORDER SELECTION FOR LINEAR REGRESSION PROBLEMS Yngve Selén and Eri G Larsson Dept of Information Technology Uppsala University, PO Box 337 SE-71 Uppsala, Sweden email: yngveselen@ituuse

More information

Reliable Cooperative Sensing in Cognitive Networks

Reliable Cooperative Sensing in Cognitive Networks Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference

Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference 1 Max-Min Relay Selection for Legacy Amplify-and-Forward Systems with Interference Ioannis Kriidis, Member, IEEE, John S. Thompson, Member, IEEE, Steve McLaughlin, Senior Member, IEEE, and Norbert Goertz,

More information

Robust Binary Quantizers for Distributed Detection

Robust Binary Quantizers for Distributed Detection 1 Robust Binary Quantizers for Distributed Detection Ying Lin, Biao Chen, and Bruce Suter Abstract We consider robust signal processing techniques for inference-centric distributed sensor networks operating

More information

Channel Estimation with Low-Precision Analog-to-Digital Conversion

Channel Estimation with Low-Precision Analog-to-Digital Conversion Channel Estimation with Low-Precision Analog-to-Digital Conversion Onkar Dabeer School of Technology and Computer Science Tata Institute of Fundamental Research Mumbai India Email: onkar@tcs.tifr.res.in

More information

Channel Coding and Interleaving

Channel Coding and Interleaving Lecture 6 Channel Coding and Interleaving 1 LORA: Future by Lund www.futurebylund.se The network will be free for those who want to try their products, services and solutions in a precommercial stage.

More information

Distributed Fault-Tolerance for Event Detection Using Heterogeneous Wireless Sensor Networks

Distributed Fault-Tolerance for Event Detection Using Heterogeneous Wireless Sensor Networks Distributed Fault-Tolerance for Event Detection Using Heterogeneous Wireless Sensor Networs ElMoustapha Ould-Ahmed-Vall and George F. Riley and Bonnie S. Hec School of Electrical and Computer Engineering,

More information

Correspondence. MIMO Broadcast Channels With Finite-Rate Feedback

Correspondence. MIMO Broadcast Channels With Finite-Rate Feedback IEEE TRANSACTIONS ON INFORATION THEORY, VO. 5, NO., NOVEBER 6 545 Correspondence IO Broadcast Channels With Finite-Rate Feedbac Nihar Jindal, ember, IEEE Abstract ultiple transmit antennas in a downlin

More information

Distributed Data Replenishment

Distributed Data Replenishment 1 Distributed Data Replenishment Kien guyen, Thinh guyen, Member, IEEE, Yevgeniy Kovchegov, Viet Le Abstract We propose a distributed data replenishment mechanism for some distributed peer-to-peer based

More information

Distributed Stochastic Optimization in Networks with Low Informational Exchange

Distributed Stochastic Optimization in Networks with Low Informational Exchange Distributed Stochastic Optimization in Networs with Low Informational Exchange Wenjie Li and Mohamad Assaad, Senior Member, IEEE arxiv:80790v [csit] 30 Jul 08 Abstract We consider a distributed stochastic

More information

THE information capacity is one of the most important

THE information capacity is one of the most important 256 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 44, NO. 1, JANUARY 1998 Capacity of Two-Layer Feedforward Neural Networks with Binary Weights Chuanyi Ji, Member, IEEE, Demetri Psaltis, Senior Member,

More information

Lecture 4: Proof of Shannon s theorem and an explicit code

Lecture 4: Proof of Shannon s theorem and an explicit code CSE 533: Error-Correcting Codes (Autumn 006 Lecture 4: Proof of Shannon s theorem and an explicit code October 11, 006 Lecturer: Venkatesan Guruswami Scribe: Atri Rudra 1 Overview Last lecture we stated

More information

A Byzantine Attack Defender: the Conditional Frequency Check

A Byzantine Attack Defender: the Conditional Frequency Check A Byzantine Attack Defender: the Conditional Frequency Check Xiaofan He and Huaiyu Dai Peng Ning Department of ECE Department of CSC North Carolina State University, USA North Carolina State University,

More information

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters

An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters IEEE/ACM TRANSACTIONS ON NETWORKING An Improved Bound for Minimizing the Total Weighted Completion Time of Coflows in Datacenters Mehrnoosh Shafiee, Student Member, IEEE, and Javad Ghaderi, Member, IEEE

More information

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes

A Piggybacking Design Framework for Read-and Download-efficient Distributed Storage Codes A Piggybacing Design Framewor for Read-and Download-efficient Distributed Storage Codes K V Rashmi, Nihar B Shah, Kannan Ramchandran, Fellow, IEEE Department of Electrical Engineering and Computer Sciences

More information

Incorporating Track Uncertainty into the OSPA Metric

Incorporating Track Uncertainty into the OSPA Metric 14th International Conference on Information Fusion Chicago, Illinois, USA, July 5-8, 211 Incorporating Trac Uncertainty into the OSPA Metric Sharad Nagappa School of EPS Heriot Watt University Edinburgh,

More information

Root-MUSIC Time Delay Estimation Based on Propagator Method Bin Ba, Yun Long Wang, Na E Zheng & Han Ying Hu

Root-MUSIC Time Delay Estimation Based on Propagator Method Bin Ba, Yun Long Wang, Na E Zheng & Han Ying Hu International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 15) Root-MUSIC ime Delay Estimation Based on ropagator Method Bin Ba, Yun Long Wang, Na E Zheng & an Ying

More information

Clustering by Mixture Models. General background on clustering Example method: k-means Mixture model based clustering Model estimation

Clustering by Mixture Models. General background on clustering Example method: k-means Mixture model based clustering Model estimation Clustering by Mixture Models General bacground on clustering Example method: -means Mixture model based clustering Model estimation 1 Clustering A basic tool in data mining/pattern recognition: Divide

More information

10-704: Information Processing and Learning Fall Lecture 24: Dec 7

10-704: Information Processing and Learning Fall Lecture 24: Dec 7 0-704: Information Processing and Learning Fall 206 Lecturer: Aarti Singh Lecture 24: Dec 7 Note: These notes are based on scribed notes from Spring5 offering of this course. LaTeX template courtesy of

More information

UTILIZING PRIOR KNOWLEDGE IN ROBUST OPTIMAL EXPERIMENT DESIGN. EE & CS, The University of Newcastle, Australia EE, Technion, Israel.

UTILIZING PRIOR KNOWLEDGE IN ROBUST OPTIMAL EXPERIMENT DESIGN. EE & CS, The University of Newcastle, Australia EE, Technion, Israel. UTILIZING PRIOR KNOWLEDGE IN ROBUST OPTIMAL EXPERIMENT DESIGN Graham C. Goodwin James S. Welsh Arie Feuer Milan Depich EE & CS, The University of Newcastle, Australia 38. EE, Technion, Israel. Abstract:

More information

Phase Precoded Compute-and-Forward with Partial Feedback

Phase Precoded Compute-and-Forward with Partial Feedback Phase Precoded Compute-and-Forward with Partial Feedback Amin Sakzad, Emanuele Viterbo Dept. Elec. & Comp. Sys. Monash University, Australia amin.sakzad,emanuele.viterbo@monash.edu Joseph Boutros, Dept.

More information

12.4 Known Channel (Water-Filling Solution)

12.4 Known Channel (Water-Filling Solution) ECEn 665: Antennas and Propagation for Wireless Communications 54 2.4 Known Channel (Water-Filling Solution) The channel scenarios we have looed at above represent special cases for which the capacity

More information

Lecture 8: Information Theory and Statistics

Lecture 8: Information Theory and Statistics Lecture 8: Information Theory and Statistics Part II: Hypothesis Testing and I-Hsiang Wang Department of Electrical Engineering National Taiwan University ihwang@ntu.edu.tw December 23, 2015 1 / 50 I-Hsiang

More information

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels

Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Superposition Encoding and Partial Decoding Is Optimal for a Class of Z-interference Channels Nan Liu and Andrea Goldsmith Department of Electrical Engineering Stanford University, Stanford CA 94305 Email:

More information

International Zurich Seminar on Communications (IZS), March 2 4, 2016

International Zurich Seminar on Communications (IZS), March 2 4, 2016 Resource-Aware Incremental Redundancy in Feedbac and Broadcast Richard D. Wesel, Kasra Vailinia, Sudarsan V. S. Ranganathan, Tong Mu University of California, Los Angeles, CA 90095 Email: {wesel,vailinia,

More information

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding

CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding CS264: Beyond Worst-Case Analysis Lecture #11: LP Decoding Tim Roughgarden October 29, 2014 1 Preamble This lecture covers our final subtopic within the exact and approximate recovery part of the course.

More information

Optimum Soft Decision Decoding of Linear Block Codes

Optimum Soft Decision Decoding of Linear Block Codes Optimum Soft Decision Decoding of Linear Block Codes {m i } Channel encoder C=(C n-1,,c 0 ) BPSK S(t) (n,k,d) linear modulator block code Optimal receiver AWGN Assume that [n,k,d] linear block code C is

More information

SELECTIVE ANGLE MEASUREMENTS FOR A 3D-AOA INSTRUMENTAL VARIABLE TMA ALGORITHM

SELECTIVE ANGLE MEASUREMENTS FOR A 3D-AOA INSTRUMENTAL VARIABLE TMA ALGORITHM SELECTIVE ANGLE MEASUREMENTS FOR A 3D-AOA INSTRUMENTAL VARIABLE TMA ALGORITHM Kutluyıl Doğançay Reza Arablouei School of Engineering, University of South Australia, Mawson Lakes, SA 595, Australia ABSTRACT

More information