Secrecy Constrained Distributed Detection in Sensor Networks

被引:14
作者
Guo, Jun [1 ]
Rogers, Uri [2 ]
Li, Xia [1 ]
Chen, Hao [1 ]
机构
[1] Boise State Univ, Dept Elect & Comp Engn, Boise, ID 83725 USA
[2] Eastern Washington Univ, Dept Engn & Design, Cheney, WA 99004 USA
来源
IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS | 2018年 / 4卷 / 02期
关键词
Eavesdropper; distributed detection; physical-layer security; secrecy constraints; sensor networks; PHYSICAL-LAYER; MULTIPLE SENSORS; COMPUTATION; FUSION;
D O I
10.1109/TSIPN.2017.2705479
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
The data collected by sensor networks often contain sensitive information and care must be taken to prevent that information from being leaked to malicious third parties, e.g., eavesdroppers. Under both the Neyman-Pearson and Bayesian frameworks, we investigate the strategy of defending against an informed and greedy eavesdropper who has access to all the sensors' outputs via imperfect communication channels. Meanwhile, the legitimate user, e.g., fusion center, is guaranteed to achieve its desired detection performance. Under the Neyman-Pearson framework, we propose a novel approach for analyzing the performance tradeoff, using the maximum achievable detection performance ratio between the fusion center and eavesdropper. Under the Bayesian framework, we derive the asymptotic error exponent, and show that the detectability of a given eavesdropper (Eve) can be limited to her prior information, in other words, Eve's observations do not improve her decision-making ability. Furthermore, we show that as the number of sensors goes to infinity, both asymptotic perfect secrecy and asymptotic perfect detection can be achieved under both frameworks, given noiseless communication channels to the fusion center.
引用
收藏
页码:378 / 391
页数:14
相关论文
共 38 条
[21]  
Malekian R., 2012, Proceedings of the 2012 32nd International Conference on Distributed Computing Systems Workshops (ICDCS Workshops), P250, DOI 10.1109/ICDCSW.2012.19
[22]   Distributed Detection With Censoring Sensors Under Physical Layer Secrecy [J].
Marano, Stefano ;
Matta, Vincenzo ;
Willett, Peter K. .
IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2009, 57 (05) :1976-1986
[23]   EXPLOITING THE PHYSICAL LAYER FOR ENHANCED SECURITY [J].
Mathur, Suhas ;
Reznik, Alex ;
Ye, Chunxuan ;
Mukherjee, Rajat ;
Rahman, Akbar ;
Shah, Yogendra ;
Trappe, Wade ;
Mandayam, Narayan .
IEEE WIRELESS COMMUNICATIONS, 2010, 17 (05) :63-70
[24]  
Nadendla VSS, 2010, CONF REC ASILOMAR C, P1437, DOI 10.1109/ACSSC.2010.5757773
[25]  
Pequito S, 2014, IEEE DECIS CONTR P, P1370, DOI 10.1109/CDC.2014.7039593
[26]  
Shahid I., 2011, 2011 8th International Symposium on Wireless Communication Systems, P236, DOI 10.1109/ISWCS.2011.6125345
[27]  
Swami A., 2007, WIRELESS SENSOR NETW
[28]  
Tsitsiklis J.N., 1993, ADV STAT SIGNAL PROC, V2, P297
[29]  
Van Trees H. L., 2004, Optimum array processing: Part IV of detection, estimation, and modulation theory
[30]  
Varshney P.K., 1996, Distributed Detection and Data Fusion, V1st ed.