Parallel Distributed Bayesian Detection with Privacy Constraints

被引:0
|
作者
Li, Zuxing [1 ]
Oechtering, Tobias J.
Kittichokechai, Kittipong
机构
[1] KTH Royal Inst Technol, Sch Elect Engn, Stockholm, Sweden
关键词
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
In this paper, the privacy problem of a parallel distributed detection system vulnerable to an eavesdropper is proposed and studied in the Bayesian formulation. The privacy risk is evaluated by the detection cost of the eavesdropper which is assumed to be informed and greedy. It is shown that the optimal detection strategy of the sensor whose decision is eavesdropped on is a likelihood-ratio test. This fundamental insight allows for the optimization to reuse known algorithms extended to incorporate the privacy constraint. The trade-off between the detection performance and privacy risk is illustrated in a numerical example. The incorporation of physical layer privacy in the system design will lead to trustworthy sensor networks in future.
引用
收藏
页码:2178 / 2183
页数:6
相关论文
共 50 条
  • [41] Heuristics for a Distributed Parallel Machine Assembly Scheduling Problem with Eligibility Constraints
    Hatami, Sara
    Ruiz, Ruben
    Andres-Romano, Carlos
    2015 INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND SYSTEMS MANAGEMENT (IESM), 2015, : 145 - 153
  • [42] Checking integrity constraints - How it differs in centralized, distributed and parallel databases
    Ibrahim, Hamidah
    SEVENTEENTH INTERNATIONAL CONFERENCE ON DATABASE AND EXPERT SYSTEMS APPLICATIONS, PROCEEDINGS, 2006, : 563 - 568
  • [43] Distributed power allocation with rate constraints in Gaussian parallel interference channels
    Pang, Jong-Shi
    Scutari, Gesualdo
    Facchinei, Francisco
    Wang, Chaoxiong
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2008, 54 (08) : 3471 - 3489
  • [44] PRIVACY AWARE PARALLEL COMPUTATION OF SKYLINE SETS QUERIES FROM DISTRIBUTED DATABASES
    Arefin, Mohammad Shamsul
    Morimoto, Yasuhiko
    COMPUTING AND INFORMATICS, 2014, 33 (04) : 831 - 856
  • [45] Quantization for Distributed Binary Detection under Secrecy Constraints
    Mhairna, Maggie
    Duhamel, Pierre
    Piarnanida, Pablo
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [46] A Distributed and Privacy-Preserving Method for Network Intrusion Detection
    Benali, Fatiha
    Bennani, Nadia
    Gianini, Gabriele
    Cimato, Stelvio
    ON THE MOVE TO MEANINGFUL INTERNET SYSTEMS: OTM 2010, PT II, 2010, 6427 : 861 - +
  • [47] A distributed privacy preserving model for the detection of Alzheimer’s disease
    Mandal, Paul K.
    Neural Computing and Applications, 2024, 36 (36) : 22719 - 22729
  • [48] A Novel Privacy-preserving Distributed Anomaly Detection Method
    Zhang, Chunkai
    Liut, Haodong
    Li, Ye
    Yin, Ao
    Jiang, Zoe L.
    Liao, Qing
    Wang, Xuan
    2017 INTERNATIONAL CONFERENCE ON SECURITY, PATTERN ANALYSIS, AND CYBERNETICS (SPAC), 2017, : 463 - 468
  • [49] Efficient distributed privacy-preserving collaborative outlier detection
    Wei, Zhaohui
    Pei, Qingqi
    Liu, Xuefeng
    Ma, Lichuan
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (06) : 2260 - 2271
  • [50] Distributed Data Privacy Protection via Collaborative Anomaly Detection
    Zeng, Fei
    Wang, Mingshen
    Pan, Yi
    Lv, Shukang
    Miao, Huiyu
    Han, Huachun
    Yuan, Xiaodong
    ELECTRONICS, 2025, 14 (02):