Secure Type-Based Multiple Access

被引:17
作者
Jeon, Hyoungsuk [1 ]
Hwang, Daesung [1 ]
Choi, Jinho [2 ]
Lee, Hyuckjae [1 ]
Ha, Jeongseok [1 ]
机构
[1] Korea Adv Inst Sci & Technol, Dept Elect Engn, Taejon 305701, South Korea
[2] Swansea Univ, Sch Engn, Swansea SA2 8PP, W Glam, Wales
基金
英国工程与自然科学研究理事会;
关键词
Distributed detection; eavesdropping; error exponents; multiuser diversity; perfect secrecy; type-based multiple access (TBMA); wireless sensor networks; DISTRIBUTED DETECTION; DECENTRALIZED DETECTION; CHANNELS; SENSORS; FUSION;
D O I
10.1109/TIFS.2011.2158312
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
We consider data confidentiality in a distributed detection scenario with a type-based multiple-access (TBMA) protocol where a large set of sensors sends local measurements to an ally fusion center (FC) over an insecure wireless medium called the main channel. Then, the ally FC makes a final decision to the physical environment. Although many wireless sensor networks are mission-specific and need data confidentiality due to the broadcast nature of wireless transmission, it can be easily wiretapped by unauthorized enemy FCs through eavesdropping channels. We propose a novel TBMA protocol called secure TBMA which provides data confidentiality by taking advantage of inherent properties of wireless channels, namely randomness and independence of the main and eavesdropping channels. In particular, the secure TBMA activates sensors having strong and weak main channel gains and makes the sensors follow different reporting rules based on the magnitudes of their channel gains. The reporting rules are carefully designed to confuse the enemy FC. The proposed secure TBMA delivers unconditional/perfect secrecy and does not assume any superiority of the ally FC over the enemy FC in terms of computational capability, secret key, and so on. For Rayleigh fading channels, we analyze the performance of the secure TBMA at both enemy and ally FCs by investigating conditions for perfect secrecy and an error exponent of detection error probability, respectively. On the one hand, the analysis at the enemy FC provides a design criterion of the reporting rules to achieve perfect secrecy. On the other hand, the analysis of the error exponent carried out with a Gaussian approximation shows that perfect secrecy is achievable at a marginal cost in detection error performance. All our claims are also verified with simulation results which have good matches with the analysis.
引用
收藏
页码:763 / 774
页数:12
相关论文
共 27 条
[1]   Wireless sensor networks: a survey [J].
Akyildiz, IF ;
Su, W ;
Sankarasubramaniam, Y ;
Cayirci, E .
COMPUTER NETWORKS, 2002, 38 (04) :393-422
[2]   Type-based random access for distributed detection over multiaccess fading channels [J].
Anandkumar, Animashree ;
Tong, Lang .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2007, 55 (10) :5032-5043
[3]   Energy conservation in wireless sensor networks: A survey [J].
Anastasi, Giuseppe ;
Conti, Marco ;
Di Francesco, Mario ;
Passarella, Andrea .
AD HOC NETWORKS, 2009, 7 (03) :537-568
[4]  
[Anonymous], 2000, Pattern Classification
[5]   Sensor data cryptography in wireless sensor networks [J].
Aysal, Tuncer Can ;
Barner, Kenneth E. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) :273-289
[6]   PAC vs. MAC for Decentralized Detection Using Noncoherent Modulation [J].
Berger, Christian R. ;
Guerriero, Marco ;
Zhou, Shengli ;
Willett, Peter .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (09) :3562-3575
[7]  
Billingsley Patrick, 1995, Probability and Measure
[8]   Distributed detection with multiple sensors .2. Advanced topics [J].
Blum, RS ;
Kassam, SA ;
Poor, HV .
PROCEEDINGS OF THE IEEE, 1997, 85 (01) :64-79
[9]   Decentralized detection in sensor networks [J].
Chamberland, JF ;
Veeravalli, VV .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (02) :407-416
[10]   SIA: Secure information aggregation in sensor networks [J].
Chan, Haowen ;
Perrig, Adrian ;
Przydatek, Bartosz ;
Song, Dawn .
JOURNAL OF COMPUTER SECURITY, 2007, 15 (01) :69-102