Secrecy Constrained Distributed Detection in Sensor Networks

Jun Guo, Uri Rogers, Xia Li, Hao Chen

Research output: Contribution to journalArticlepeer-review

12 Scopus citations

Abstract

The data collected by sensor networks often contain sensitive information and care must be taken to prevent that information from being leaked to malicious third parties, e.g., eavesdroppers. Under both the Neyman–Pearson and Bayesian frameworks, we investigate the strategy of defending against an informed and greedy eavesdropper who has access to all the sensors’ outputs via imperfect communication channels. Meanwhile, the legitimate user, e.g., fusion center, is guaranteed to achieve its desired detection performance. Under the Neyman–Pearson framework, we propose a novel approach for analyzing the performance tradeoff, using the maximum achievable detection performance ratio between the fusion center and eavesdropper. Under the Bayesian framework, we derive the asymptotic error exponent, and show that the detectability of a given eavesdropper (Eve) can be limited to her prior information, in other words, Eve’s observations do not improve her decision-making ability. Furthermore, we show that as the number of sensors goes to infinity, both asymptotic perfect secrecy and asymptotic perfect detection can be achieved under both frameworks, given noiseless communication channels to the fusion center.

Original languageAmerican English
Pages (from-to)378-391
Number of pages14
JournalIEEE Transactions on Signal and Information Processing Over Networks
Volume4
Issue number2
DOIs
StatePublished - 1 Jun 2018

Keywords

  • distributed detection
  • eavesdropper
  • physical-layer security
  • secrecy constraints
  • sensor networks

EGS Disciplines

  • Electrical and Computer Engineering

Fingerprint

Dive into the research topics of 'Secrecy Constrained Distributed Detection in Sensor Networks'. Together they form a unique fingerprint.

Cite this