Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints

被引:15
|
作者
Nadendla, V. Sriram Siddhardh [1 ]
Varshney, Pramod K. [1 ]
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
关键词
Distributed detection; wireless sensor networks; eavesdroppers; Kullback-Leibler divergence; secrecy; LIKELIHOOD-RATIO; MULTIPLE SENSORS; QUANTIZATION;
D O I
10.1109/TSP.2016.2529583
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the design of distributed detection networks in the presence of an eavesdropper (Eve). We consider the problem of designing binary sensor quantizers that maximize the Kullback-Leibler (KL) divergence at the fusion center (FC), when subject to a tolerable constraint on the KL divergence at Eve. We assume that the channels between the sensors and the FC (likewise the channels between the sensors and the Eve) are modeled as binary symmetric channels (BSCs). In the case of i.i.d. received symbols at both the FC and Eve, we prove that the structure of the optimal binary quantizers is a likelihood ratio test (LRT). We also present an algorithm to find the threshold of the optimal LRT, and illustrate it for the case of Additive white Gaussian noise (AWGN) observation models at the sensors. In the case of non-i.i.d. received symbols at both FC and Eve, we propose a dynamic-programming based algorithm to find efficient quantizers at the sensors. Numerical results are presented to illustrate the performance of the proposed network.
引用
收藏
页码:2636 / 2648
页数:13
相关论文
共 50 条
  • [31] Antenna Selection With Erroneous Covariance Matrices Under Secrecy Constraints
    Hanif, Muhammad Fainan
    Juntti, Markku
    Tran, Le-Nam
    IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2016, 65 (01) : 414 - 420
  • [32] Filter Design With Secrecy Constraints: The MIMO Gaussian Wiretap Channel
    Reboredo, Hugo
    Xavier, Joao
    Rodrigues, Miguel R. D.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2013, 61 (15) : 3799 - 3814
  • [33] Knowledge Discovery on Blockchains: Challenges and Opportunities for Distributed Event Detection Under Constraints
    Sanders, Cedric
    Liebig, Thomas
    ECML PKDD 2020 WORKSHOPS, 2020, 1323 : 113 - 128
  • [34] Data Secrecy in Distributed Storage Systems under Exact Repair
    Goparaju, Sreechakra
    El Rouayheb, Salim
    Calderbank, Robert
    Poor, H. Vincent
    2013 INTERNATIONAL SYMPOSIUM ON NETWORK CODING (NETCOD), 2013,
  • [35] A New Scheme to Improve the Secrecy Throughput under the Constraints of Secrecy Outage Probability and Average Transmit Power
    Mu, Pengcheng
    Yang, Peizhi
    Wang, Bo
    Wang, Hui-Ming
    Yin, Qinye
    2014 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS WORKSHOPS (ICC), 2014, : 777 - 782
  • [36] ASYMPTOTIC PERFECT SECRECY IN DISTRIBUTED DETECTION AGAINST A GLOBAL EAVESDROPPER
    Guo, Jun
    Li, Xia
    Rogers, Uri
    Chen, Hao
    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 3501 - 3505
  • [37] On the Divergence-Cost Function in Distributed Detection with a Secrecy Constraint
    Marano, Stefano
    Matta, Vincenzo
    Willett, Peter
    2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1357 - +
  • [38] Distributed Computation Under Bit Constraints
    Ayaso, Ola
    Shah, Devavrat
    Dahleh, Munther A.
    47TH IEEE CONFERENCE ON DECISION AND CONTROL, 2008 (CDC 2008), 2008, : 4837 - 4842
  • [39] Optimal Quantization Interval Design of Dynamic Quantizers which Satisfy the Communication Rate Constraints
    Okajima, Hiroshi
    Matsunaga, Nobutomo
    Sawada, Kenji
    49TH IEEE CONFERENCE ON DECISION AND CONTROL (CDC), 2010, : 4733 - 4739
  • [40] On the reconstruction of binary and permutation matrices under (binary) tomographic constraints
    Brunetti, S.
    Del Lungo, A.
    Gritzmann, P.
    de Vries, S.
    THEORETICAL COMPUTER SCIENCE, 2008, 406 (1-2) : 63 - 71