Secrecy Constrained Distributed Detection in Sensor Networks

被引:14
作者
Guo, Jun [1 ]
Rogers, Uri [2 ]
Li, Xia [1 ]
Chen, Hao [1 ]
机构
[1] Boise State Univ, Dept Elect & Comp Engn, Boise, ID 83725 USA
[2] Eastern Washington Univ, Dept Engn & Design, Cheney, WA 99004 USA
来源
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS | 2018年 / 4卷 / 02期
关键词
Eavesdropper; distributed detection; physical-layer security; secrecy constraints; sensor networks; PHYSICAL-LAYER; MULTIPLE SENSORS; COMPUTATION; FUSION;
D O I
10.1109/TSIPN.2017.2705479
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The data collected by sensor networks often contain sensitive information and care must be taken to prevent that information from being leaked to malicious third parties, e.g., eavesdroppers. Under both the Neyman-Pearson and Bayesian frameworks, we investigate the strategy of defending against an informed and greedy eavesdropper who has access to all the sensors' outputs via imperfect communication channels. Meanwhile, the legitimate user, e.g., fusion center, is guaranteed to achieve its desired detection performance. Under the Neyman-Pearson framework, we propose a novel approach for analyzing the performance tradeoff, using the maximum achievable detection performance ratio between the fusion center and eavesdropper. Under the Bayesian framework, we derive the asymptotic error exponent, and show that the detectability of a given eavesdropper (Eve) can be limited to her prior information, in other words, Eve's observations do not improve her decision-making ability. Furthermore, we show that as the number of sensors goes to infinity, both asymptotic perfect secrecy and asymptotic perfect detection can be achieved under both frameworks, given noiseless communication channels to the fusion center.
引用
收藏
页码:378 / 391
页数:14
相关论文
共 38 条
[1]  
[Anonymous], 2011, INFORM THEORY CODING, DOI DOI 10.1017/CBO9780511921889
[2]  
[Anonymous], P IEEE 81 VEH TECHN
[3]   Sensor data cryptography in wireless sensor networks [J].
Aysal, Tuncer Can ;
Barner, Kenneth E. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2008, 3 (02) :273-289
[4]   A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks [J].
Baldi, Marco ;
Bianchi, Marco ;
Maturo, Nicola ;
Chiaraluce, Franco .
IEEE WIRELESS COMMUNICATIONS LETTERS, 2013, 2 (02) :183-186
[5]   Distributed detection with multiple sensors .2. Advanced topics [J].
Blum, RS ;
Kassam, SA ;
Poor, HV .
PROCEEDINGS OF THE IEEE, 1997, 85 (01) :64-79
[6]   OPTIMAL DATA FUSION IN MULTIPLE SENSOR DETECTION SYSTEMS [J].
CHAIR, Z ;
VARSHNEY, PK .
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS, 1986, 22 (01) :98-101
[7]   Wireless sensors in distributed detection applications [J].
Chamberland, Jean-Francois ;
Veeravalli, Venugopal V. .
IEEE SIGNAL PROCESSING MAGAZINE, 2007, 24 (03) :16-25
[8]   Decentralized detection in sensor networks [J].
Chamberland, JF ;
Veeravalli, VV .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2003, 51 (02) :407-416
[9]   Channel-aware distributed detection in wireless sensor networks [J].
Chen, Biao ;
Tong, Lang ;
Varshney, Pramod K. .
IEEE SIGNAL PROCESSING MAGAZINE, 2006, 23 (04) :16-26
[10]   General formulas for the Neyman-Pearson type-II error exponent subject to fixed and exponential type-I error bounds [J].
Chen, PN .
IEEE TRANSACTIONS ON INFORMATION THEORY, 1996, 42 (01) :316-323