Channel Aware Encryption and Decision Fusion for Wireless Sensor Networks

被引:40
作者
Jeon, Hyoungsuk [1 ]
Choi, Jinho [2 ]
McLaughlin, Steven W. [1 ]
Ha, Jeongseok [3 ]
机构
[1] Georgia Inst Technol, Sch Elect & Comp Engn, Atlanta, GA 30332 USA
[2] Swansea Univ, Coll Engn, Swansea SA2 8PP, W Glam, Wales
[3] Korea Adv Inst Sci & Technol, Dept Elect Engn, Taejon 305701, South Korea
基金
新加坡国家研究基金会; 英国工程与自然科学研究理事会;
关键词
Decision fusion; distributed detection; eavesdropping; encryption; perfect secrecy; wireless sensor networks; FADING CHANNELS; ARTIFICIAL NOISE; BROADCAST CHANNELS; SECRECY CAPACITY; TAP CHANNEL; COMMUNICATION; SECURITY; TRANSMISSION; EAVESDROPPER;
D O I
10.1109/TIFS.2013.2243145
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In wireless sensor networks (WSNs), security and energy consumption have been considered as long-lasting technical challenges as sensors usually suffer from complexity and energy constraints. In this paper, we study a simple and efficient physical-layer security to provide data confidentiality in a distributed detection scenario. In particular, to prevent passive eavesdropping on transmitting data from sensors to an ally fusion center (AFC), we propose a novel encryption scheme and decision fusion rules for a parallel access channel model. The proposed scheme takes advantage of a free natural resource, i.e., randomness of wireless channels, to encrypt the binary local decision of each sensor in such a way that the binary local decision is flipped according to instantaneous channel gain between the sensor and AFC. The location-specific and reciprocal properties of wireless channels enable the sensor and AFC to share the inherent randomness of wireless channels which are not available to an eavesdropper. Furthermore, it is shown that the scheme is well-suited to a low complexity and energy efficient modulation technique, noncoherent binary frequency shift keying. To evaluate performances of the proposed scheme, log-likelihood-ratio-based decision fusion strategies at the AFC are analyzed, and comparisons of decision performances are carried out. In addition, we prove that the proposed scheme achieves perfect secrecy with a simple structure that is suited for sensors of limited complexity.
引用
收藏
页码:619 / 625
页数:7
相关论文
共 31 条
[1]  
Abouei J., 2010, P IEEE ICASSP 2010 D
[2]  
[Anonymous], 2011, Physical-layer security:from information theory to security engineering, DOI DOI 10.1017/CBO9780511977985
[3]   Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels [J].
Aono, T ;
Higuchi, K ;
Ohira, T ;
Komiyama, B ;
Sasaoka, H .
IEEE TRANSACTIONS ON ANTENNAS AND PROPAGATION, 2005, 53 (11) :3776-3784
[4]   Sensor data cryptography in wireless sensor networks [J].
Aysal, Tuncer Can ;
Barner, Kenneth E. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) :273-289
[5]   Wireless information-theoretic security [J].
Bloch, Matthieu ;
Barros, Joao ;
Rodrigues, Miguel R. D. ;
McLaughlin, Steven W. .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (06) :2515-2534
[6]   Secrecy Rate for MISO Rayleigh Fading Channels with Relative Distance of Eavesdropper [J].
Chang, Namseok ;
Chae, Chan-Byoung ;
Ha, Jeongseok ;
Kang, Joonhyuk .
IEEE COMMUNICATIONS LETTERS, 2012, 16 (09) :1408-1411
[7]   Sensor Network Security: A Survey [J].
Chen, Xiangqian ;
Makki, Kia ;
Yen, Kang ;
Pissinou, Niki .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2009, 11 (02) :52-73
[8]  
CSISZAR I, 1978, IEEE T INFORM THEORY, V24, P339, DOI 10.1109/TIT.1978.1055892
[9]   Improving Wireless Physical Layer Security via Cooperating Relays [J].
Dong, Lun ;
Han, Zhu ;
Petropulu, Athina P. ;
Poor, H. Vincent .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2010, 58 (03) :1875-1888
[10]   Secrecy in Cooperative Relay Broadcast Channels [J].
Ekrem, Ersen ;
Ulukus, Sennur .
IEEE TRANSACTIONS ON INFORMATION THEORY, 2011, 57 (01) :137-155