Secrecy Constrained Distributed Detection in Sensor Networks

被引:14
作者
Guo, Jun [1 ]
Rogers, Uri [2 ]
Li, Xia [1 ]
Chen, Hao [1 ]
机构
[1] Boise State Univ, Dept Elect & Comp Engn, Boise, ID 83725 USA
[2] Eastern Washington Univ, Dept Engn & Design, Cheney, WA 99004 USA
来源
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS | 2018年 / 4卷 / 02期
关键词
Eavesdropper; distributed detection; physical-layer security; secrecy constraints; sensor networks; PHYSICAL-LAYER; MULTIPLE SENSORS; COMPUTATION; FUSION;
D O I
10.1109/TSIPN.2017.2705479
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The data collected by sensor networks often contain sensitive information and care must be taken to prevent that information from being leaked to malicious third parties, e.g., eavesdroppers. Under both the Neyman-Pearson and Bayesian frameworks, we investigate the strategy of defending against an informed and greedy eavesdropper who has access to all the sensors' outputs via imperfect communication channels. Meanwhile, the legitimate user, e.g., fusion center, is guaranteed to achieve its desired detection performance. Under the Neyman-Pearson framework, we propose a novel approach for analyzing the performance tradeoff, using the maximum achievable detection performance ratio between the fusion center and eavesdropper. Under the Bayesian framework, we derive the asymptotic error exponent, and show that the detectability of a given eavesdropper (Eve) can be limited to her prior information, in other words, Eve's observations do not improve her decision-making ability. Furthermore, we show that as the number of sensors goes to infinity, both asymptotic perfect secrecy and asymptotic perfect detection can be achieved under both frameworks, given noiseless communication channels to the fusion center.
引用
收藏
页码:378 / 391
页数:14
相关论文
共 38 条
[11]   Detection performance limits for distributed sensor networks in the presence of nonideal channels [J].
Cheng, Qi ;
Chen, Biao ;
Varshney, Pramod K. .
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, 2006, 5 (11) :3034-3038
[12]   On Eavesdropping Attacks in Wireless Sensor Networks with Directional Antennas [J].
Dai, Hong-Ning ;
Wang, Qiu ;
Li, Dong ;
Wong, Raymond Chi-Wing .
INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2013,
[13]  
Guo J, 2016, INT CONF ACOUST SPEE, P3501, DOI 10.1109/ICASSP.2016.7472328
[14]  
He T, 2007, CONFERENCE RECORD OF THE FORTY-FIRST ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS, VOLS 1-5, P1362
[15]   Secure Type-Based Multiple Access [J].
Jeon, Hyoungsuk ;
Hwang, Daesung ;
Choi, Jinho ;
Lee, Hyuckjae ;
Ha, Jeongseok .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (03) :763-774
[16]   Distributed Inference in the Presence of Eavesdroppers: A Survey [J].
Kailkhura, Bhavya ;
Nadendla, V. Sriram Siddhardh ;
Varshney, Pramod K. .
IEEE COMMUNICATIONS MAGAZINE, 2015, 53 (06) :40-46
[17]   ON INFORMATION AND SUFFICIENCY [J].
KULLBACK, S ;
LEIBLER, RA .
ANNALS OF MATHEMATICAL STATISTICS, 1951, 22 (01) :79-86
[18]  
Kumar Kiran Sampath, 2009, 2009 43rd Asilomar Conference on Signals, Systems and Computers, P265, DOI 10.1109/ACSSC.2009.5470106
[19]   Privacy-Aware Distributed Bayesian Detection [J].
Li, Zuxing ;
Oechtering, Tobias J. .
IEEE JOURNAL OF SELECTED TOPICS IN SIGNAL PROCESSING, 2015, 9 (07) :1345-1357
[20]  
Li ZX, 2014, IEEE INT CONF COMM, P765, DOI 10.1109/ICCW.2014.6881292