{"title":"基于最优能量交换的网络多传感器融合系统反用户检测窃听攻击","authors":"Yue Li , Jiajia Li , Guoliang Wei","doi":"10.1016/j.dsp.2025.105285","DOIUrl":null,"url":null,"abstract":"<div><div>This article discusses the optimal design of eavesdropping schemes in networked multi-sensor fusion systems (NMFSs) with energy constraints. Multiple sensors observe the state of the process and transmit the processed data to the remote user fusion center equipped with a detector via wireless channels, under an intelligent eavesdropper with dual attack capabilities of the passive monitoring and active jamming. To tackle the energy supply issue related to eavesdropping attacks in certain scenarios, the eavesdropper adopts energy switching scheduling. Therefore, this article aims at designing an attack strategy to improve the eavesdropping performance while reducing the user estimation performance under energy constraints. The eavesdropper firstly selects the jamming signal power based on the given threshold. Then, the initial problem is transformed into an unconstrained Markov decision process (MDP) by introducing Lagrange multipliers. Finally, sufficient conditions are provided to evade the user detection. The results indicate that the optimal eavesdropping strategy exhibits threshold-type structures. The above conclusion is supported by numerical examples.</div></div>","PeriodicalId":51011,"journal":{"name":"Digital Signal Processing","volume":"164 ","pages":"Article 105285"},"PeriodicalIF":2.9000,"publicationDate":"2025-04-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"An optimal energy switching-based eavesdropping attacks for anti-user detection in networked multi-sensor fusion systems\",\"authors\":\"Yue Li , Jiajia Li , Guoliang Wei\",\"doi\":\"10.1016/j.dsp.2025.105285\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"<div><div>This article discusses the optimal design of eavesdropping schemes in networked multi-sensor fusion systems (NMFSs) with energy constraints. Multiple sensors observe the state of the process and transmit the processed data to the remote user fusion center equipped with a detector via wireless channels, under an intelligent eavesdropper with dual attack capabilities of the passive monitoring and active jamming. To tackle the energy supply issue related to eavesdropping attacks in certain scenarios, the eavesdropper adopts energy switching scheduling. Therefore, this article aims at designing an attack strategy to improve the eavesdropping performance while reducing the user estimation performance under energy constraints. The eavesdropper firstly selects the jamming signal power based on the given threshold. Then, the initial problem is transformed into an unconstrained Markov decision process (MDP) by introducing Lagrange multipliers. Finally, sufficient conditions are provided to evade the user detection. The results indicate that the optimal eavesdropping strategy exhibits threshold-type structures. The above conclusion is supported by numerical examples.</div></div>\",\"PeriodicalId\":51011,\"journal\":{\"name\":\"Digital Signal Processing\",\"volume\":\"164 \",\"pages\":\"Article 105285\"},\"PeriodicalIF\":2.9000,\"publicationDate\":\"2025-04-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Digital Signal Processing\",\"FirstCategoryId\":\"5\",\"ListUrlMain\":\"https://www.sciencedirect.com/science/article/pii/S1051200425003070\",\"RegionNum\":3,\"RegionCategory\":\"工程技术\",\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"Q2\",\"JCRName\":\"ENGINEERING, ELECTRICAL & ELECTRONIC\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Digital Signal Processing","FirstCategoryId":"5","ListUrlMain":"https://www.sciencedirect.com/science/article/pii/S1051200425003070","RegionNum":3,"RegionCategory":"工程技术","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q2","JCRName":"ENGINEERING, ELECTRICAL & ELECTRONIC","Score":null,"Total":0}
An optimal energy switching-based eavesdropping attacks for anti-user detection in networked multi-sensor fusion systems
This article discusses the optimal design of eavesdropping schemes in networked multi-sensor fusion systems (NMFSs) with energy constraints. Multiple sensors observe the state of the process and transmit the processed data to the remote user fusion center equipped with a detector via wireless channels, under an intelligent eavesdropper with dual attack capabilities of the passive monitoring and active jamming. To tackle the energy supply issue related to eavesdropping attacks in certain scenarios, the eavesdropper adopts energy switching scheduling. Therefore, this article aims at designing an attack strategy to improve the eavesdropping performance while reducing the user estimation performance under energy constraints. The eavesdropper firstly selects the jamming signal power based on the given threshold. Then, the initial problem is transformed into an unconstrained Markov decision process (MDP) by introducing Lagrange multipliers. Finally, sufficient conditions are provided to evade the user detection. The results indicate that the optimal eavesdropping strategy exhibits threshold-type structures. The above conclusion is supported by numerical examples.
期刊介绍:
Digital Signal Processing: A Review Journal is one of the oldest and most established journals in the field of signal processing yet it aims to be the most innovative. The Journal invites top quality research articles at the frontiers of research in all aspects of signal processing. Our objective is to provide a platform for the publication of ground-breaking research in signal processing with both academic and industrial appeal.
The journal has a special emphasis on statistical signal processing methodology such as Bayesian signal processing, and encourages articles on emerging applications of signal processing such as:
• big data• machine learning• internet of things• information security• systems biology and computational biology,• financial time series analysis,• autonomous vehicles,• quantum computing,• neuromorphic engineering,• human-computer interaction and intelligent user interfaces,• environmental signal processing,• geophysical signal processing including seismic signal processing,• chemioinformatics and bioinformatics,• audio, visual and performance arts,• disaster management and prevention,• renewable energy,