Human behavior while decision making is quite complex and uncertain. There are fundamental differences between traditional decision making systems based on sensor data and systems where the agents in the decision maki...
详细信息
ISBN:
(纸本)9781728146010
Human behavior while decision making is quite complex and uncertain. There are fundamental differences between traditional decision making systems based on sensor data and systems where the agents in the decision making process include humans. The modeling and analysis of human-machine collaborative decision making has become an important research area due to the potential applications in a variety of complex autonomous systems. Incorporating human inputs with physical sensors can be advantageous in enhancing situational assessment for certain situations, and at the same time, brings in technical challenges such as how to characterize the human decision making behavior. In this paper, we discuss some aspects of human-machine networks by focusing on three schemes that include collaborative human decision making with random local thresholds, decision fusion in integrated human-machine networks and binary decision making under cognitive biases. In each case, we aim to optimize the system performance based on appropriate modeling of the human behavior. We also provide a summary of current challenges and research directions related to this problem domain.
This paper considers the decision fusion problem for wireless sensor networks (WSNs) where the decisions are transmitted to the fusion center (FC) over Internet-of-Things (IoT) infrastructure. The WSN is configured th...
详细信息
ISBN:
(纸本)9781728155326
This paper considers the decision fusion problem for wireless sensor networks (WSNs) where the decisions are transmitted to the fusion center (FC) over Internet-of-Things (IoT) infrastructure. The WSN is configured that each group of sensors transmit their decisions about a certain phenomenon to a cluster-head, and all cluster heads forward the decisions to the a remote FC that is hosted on the cloud. To improve the system spectral and power efficiency, we use 1-bit quantization at the sensor and cluster-head levels. Moreover, 1-bit censoring based quantizers are proposed where the cluster-head forwards only the reliable sensing data to the FC, while dropping the unreliable data. At the FC, the received data are fused to obtain the final decision. The obtained numerical results evaluated for several operating scenarios show that the 1-bit quantization process can produce reliable global decisions while saving the power and bandwidth.
In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depe...
详细信息
ISBN:
(纸本)9781467355797
In distributed detection systems, nodes make one bit decisions regarding the presence of a phenomenon and collaboratively make a global decision at the fusion center (FC). The performance of such systems strongly depends on the reliability of the nodes in the network. The robustness of distributed detection systems against attacks is of utmost impor- tance for the functioning of distributed detection systems. The distributed nature of such systems makes them quite vulnerable to different types of attacks. In this paper, we introduce the problem of intelligent data falsification attacks on distributed detection systems. First, we propose a scheme to detect data falsification attacks and analytically characterize its performance. Next, we obtain the optimal attacking strategy from the point of view of a smart adversary to disguise itself from the proposed detection scheme while accomplishing its attack.
Power Allocation (PA) strategies are evaluated for distributed detection in a single-hop, multiple-ring cluster. The detection Error Probability (DEP) is affected by the observation Signal-to-Noise Ratios (SNRs), the ...
详细信息
ISBN:
(纸本)9781467301831
Power Allocation (PA) strategies are evaluated for distributed detection in a single-hop, multiple-ring cluster. The detection Error Probability (DEP) is affected by the observation Signal-to-Noise Ratios (SNRs), the channel SNRs, and node distances. We seek the PA maximizing the total expected deflection coefficient of the received signals at the fusion center under different constraints: a total power constraint and a per-ring power constraint. Both optimization problems are convex, so the Karush-Kuhn-Tucker conditions lead to analytical expressions for the optimal PA. The DEPs from a uniform PA and the proposed PA are compared for various observation SNRs, channel SNRs, number of nodes, and number of rings.
In this paper, an iterative distributed approach is studied for the signal amplitude optimization when the distributed detection is carried out with a symmetric signaling constraint in a wireless sensor network (WSN) ...
详细信息
ISBN:
(纸本)9781467309905;9781467309882
In this paper, an iterative distributed approach is studied for the signal amplitude optimization when the distributed detection is carried out with a symmetric signaling constraint in a wireless sensor network (WSN) consisting of a fusion center (FC) and multiple sensors. In the conventional distributed detection, if sensors' characteristics change due to aging problems or varying operating conditions, they have to be available at the FC for a best combining result. On the other hand, in the proposed approach, each sensor can adjust its signal amplitude using a type-based multiple access (TBMA) technique to provide a best performance at the FC through an iterative approach without sending their individual characteristics.
In this paper, we present a unifying framework for distributed detection with dependent or independent observations. This novel framework utilizes an expanded hierarchical model by introducing a hidden variable. Facil...
详细信息
ISBN:
(纸本)9781467310710
In this paper, we present a unifying framework for distributed detection with dependent or independent observations. This novel framework utilizes an expanded hierarchical model by introducing a hidden variable. Facilitated by this new framework, we identify several classes of distributed detection problems with conditionally dependent observations whose optimal sensor signaling structure resembles that of the independent case. These classes of problems exhibit a decoupling effect on the form of the optimal local decision rules, much in the same way as the conditionally independent case using both the Bayesian and the Neyman-Pearson criteria.
A major challenge in designing MAC protocols for wireless sensor networks (WSN) is the uncertainty about the traffic offered by network, which usually forces conservative assumptions leading to a degradation in throug...
详细信息
ISBN:
(纸本)9781467310680
A major challenge in designing MAC protocols for wireless sensor networks (WSN) is the uncertainty about the traffic offered by network, which usually forces conservative assumptions leading to a degradation in throughput and delay performance. Traffic estimation is discussed here in the context of the distributed detection WSNs (DD-WSNs). We approach this issue by first showing that the traffic has a Poisson distribution via stochastic geometry tools. Then the traffic is estimated via two algorithms, the least conditional maximum a priori (lcMAP) estimator and the regularized maximum likelihood estimator (rMLE). To measure the correlation between supplied communication resources and needed resources by the WSN, we propose the supply demand ratio (SDR) as a metric. Simulation results shows that both estimators achieve a performance close to the optimal MAP estimator under low channel SNR, hence transmission energy can be saved. Furthermore, the rMLE achieves the optimal SDR via choosing regularization factor value.
Wireless sensor network is a newly technology t be used in landslide prediction as they provide dense data, and realtime monitoring and prediction of events. A real-time monitoring system of landslide prediction based...
详细信息
ISBN:
(纸本)9781467344975
Wireless sensor network is a newly technology t be used in landslide prediction as they provide dense data, and realtime monitoring and prediction of events. A real-time monitoring system of landslide prediction based on WSN is introduced in this paper. Statistical modeling of the landslide strain data and the distributed detection algorithm are mainly analysed. The stram data are modeled using variable mean of Gaussian process. Miss alarm ratio is a critical performance parameter to landslide prediction. Comparing with centralized detection method, simulation result shows that distributed detection algonthm performs better than centralized detection in criteria of miss alarm ratio and wrong alarm ratio of landslide.
The durability, robustness, and long-term stability of optical-fiber-based sensors applied to practical engineering have always been challenging problems. Refer to the sensors embedded in asphalt pavements, the situat...
详细信息
The durability, robustness, and long-term stability of optical-fiber-based sensors applied to practical engineering have always been challenging problems. Refer to the sensors embedded in asphalt pavements, the situation becomes serious and feasible sensors with enhanced function are in high demand. Therefore, an improved design to configure the quasi-distributed and distributed optical fiber sensors and FBG-based point sensors for monitoring the three-dimensional information of multilayered asphalt pavements is needed. The in-field data declare that the transversal, longitudinal, and vertical deformations of the tested urban asphalt pavement are mainly affected by temperature. The M-shape strain profile induced by heavy vehicles can decrease to the regular state in approximately 30 min after unloading. The tested asphalt pavement presents good structural performance to bear the tensile strain and permanent deformation. The high survival ratio and the good robustness of the proposed sensors against the harsh construction and operation environment validate the feasibility and reliability for the long-term monitoring. Improved design proposals on the construction scheme of asphalt pavement are also addressed to control the strain of the established asphalt concrete course in relatively low level.
Wireless sensor networks are often deployed in unattended environments and, thus, an adversary can physically capture some of the sensors, build clones with the same identity as the captured sensors, and place these c...
详细信息
Wireless sensor networks are often deployed in unattended environments and, thus, an adversary can physically capture some of the sensors, build clones with the same identity as the captured sensors, and place these clones at strategic positions in the network for further malicious activities. Such attacks, called clone attacks, are a very serious threat against the usefulness of wireless networks. Researchers proposed different techniques to detect such attacks. The most promising detection techniques are the distributed ones that scale for large networks and distribute the task of detecting the presence of clones among all sensors, thus, making it hard for a smart attacker to position the clones in such a way as to disrupt the detection process. However, even when the distributed algorithms work normally, their ability to discover an attack may vary greatly with the position of the clones. We believe this aspect has been greatly underestimated in the literature. In this paper, we present a thorough and novel study of the relation between the position of clones and the probability that the clones are detected. To the best of our knowledge, this is the first such study. In particular, we consider four algorithms that are representatives of the distributed approach. We evaluate for them whether their capability of detecting clone attacks is influenced by the positions of the clones. Since wireless sensor networks may be deployed in different situations, our study considers several possible scenarios: a uniform scenario in which the sensors are deployed uniformly, and also not uniform scenarios, in which there are one or more large areas with no sensor (we call such areas "holes") that force communications to flow around these areas. We show that the different scenarios greatly influence the performance of the algorithms. For instance, we show that, when holes are present, there are some clone positions that make the attacks much harder to be detected. We believe that
暂无评论