Secrecy Constrained Distributed Detection in Sensor Networks

被引:13
|
作者
Guo, Jun [1 ]
Rogers, Uri [2 ]
Li, Xia [1 ]
Chen, Hao [1 ]
机构
[1] Boise State Univ, Dept Elect & Comp Engn, Boise, ID 83725 USA
[2] Eastern Washington Univ, Dept Engn & Design, Cheney, WA 99004 USA
关键词
Eavesdropper; distributed detection; physical-layer security; secrecy constraints; sensor networks; PHYSICAL-LAYER; MULTIPLE SENSORS; COMPUTATION; FUSION;
D O I
10.1109/TSIPN.2017.2705479
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The data collected by sensor networks often contain sensitive information and care must be taken to prevent that information from being leaked to malicious third parties, e.g., eavesdroppers. Under both the Neyman-Pearson and Bayesian frameworks, we investigate the strategy of defending against an informed and greedy eavesdropper who has access to all the sensors' outputs via imperfect communication channels. Meanwhile, the legitimate user, e.g., fusion center, is guaranteed to achieve its desired detection performance. Under the Neyman-Pearson framework, we propose a novel approach for analyzing the performance tradeoff, using the maximum achievable detection performance ratio between the fusion center and eavesdropper. Under the Bayesian framework, we derive the asymptotic error exponent, and show that the detectability of a given eavesdropper (Eve) can be limited to her prior information, in other words, Eve's observations do not improve her decision-making ability. Furthermore, we show that as the number of sensors goes to infinity, both asymptotic perfect secrecy and asymptotic perfect detection can be achieved under both frameworks, given noiseless communication channels to the fusion center.
引用
收藏
页码:378 / 391
页数:14
相关论文
共 50 条
  • [1] Distributed detection in bandwidth constrained wireless sensor networks
    Thejaswi, C
    Patro, RK
    2006 IEEE RADIO AND WIRELESS SYMPOSIUM, PROCEEDINGS, 2006, : 95 - 98
  • [2] Sequential Distributed Detection in Energy-Constrained Wireless Sensor Networks
    Yilmaz, Yasin
    Wang, Xiaodong
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2014, 62 (12) : 3180 - 3193
  • [3] ASYMPTOTIC PERFECT SECRECY IN DISTRIBUTED ESTIMATION FOR LARGE SENSOR NETWORKS
    Guo, Jun
    Chen, Hao
    Rogers, Uri
    2017 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2017, : 3336 - 3340
  • [4] Distributed Faulty Sensor Detection in Sensor Networks
    Luo, Xuanwen
    Doug, Ming
    ARTIFICIAL NEURAL NETWORKS - ICANN 2009, PT II, 2009, 5769 : 964 - +
  • [5] Distributed sensor failure detection in sensor networks
    Tosic, Tamara
    Thomos, Nikolaos
    Frossard, Pascal
    SIGNAL PROCESSING, 2013, 93 (02) : 399 - 410
  • [6] Data synchronization in distributed and constrained mobile sensor networks
    Hao, Shuai
    Lim, Hock Beng
    UBIQUITOUS INTELLIGENCE AND COMPUTING, PROCEEDINGS, 2007, 4611 : 673 - +
  • [7] Radiation detection with distributed sensor networks
    Mielke, AM
    Smith, MC
    Brennan, SM
    Torney, DC
    Jackson, D
    Karlin, JF
    Maccabe, AB
    SENSORS, AND COMMAND, CONTROL, COMMUNICATIONS, AND INTELLIGENCE (C31) TECHNOLOGIES FOR HOMELAND SECURITY AND HOMELAND DEFENSE IV, PTS 1 AND 2, 2005, 5778 : 403 - 411
  • [8] Radiation detection with distributed sensor networks
    Brennan, SM
    Mielke, AM
    Torney, DC
    Maccabe, AB
    COMPUTER, 2004, 37 (08) : 57 - 59
  • [9] Distributed Detection in Noisy Sensor Networks
    Kar, Soummya
    Tandon, Ravi
    Poor, H. Vincent
    Cui, Shuguang
    2011 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2011, : 2856 - 2860
  • [10] Distributed detection and tracking in sensor networks
    McErlean, D
    Narayanan, S
    THIRTY-SIXTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS - CONFERENCE RECORD, VOLS 1 AND 2, CONFERENCE RECORD, 2002, : 1174 - 1178