Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints

被引:15
|
作者
Nadendla, V. Sriram Siddhardh [1 ]
Varshney, Pramod K. [1 ]
机构
[1] Syracuse Univ, Syracuse, NY 13244 USA
关键词
Distributed detection; wireless sensor networks; eavesdroppers; Kullback-Leibler divergence; secrecy; LIKELIHOOD-RATIO; MULTIPLE SENSORS; QUANTIZATION;
D O I
10.1109/TSP.2016.2529583
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
In this paper, we investigate the design of distributed detection networks in the presence of an eavesdropper (Eve). We consider the problem of designing binary sensor quantizers that maximize the Kullback-Leibler (KL) divergence at the fusion center (FC), when subject to a tolerable constraint on the KL divergence at Eve. We assume that the channels between the sensors and the FC (likewise the channels between the sensors and the Eve) are modeled as binary symmetric channels (BSCs). In the case of i.i.d. received symbols at both the FC and Eve, we prove that the structure of the optimal binary quantizers is a likelihood ratio test (LRT). We also present an algorithm to find the threshold of the optimal LRT, and illustrate it for the case of Additive white Gaussian noise (AWGN) observation models at the sensors. In the case of non-i.i.d. received symbols at both FC and Eve, we propose a dynamic-programming based algorithm to find efficient quantizers at the sensors. Numerical results are presented to illustrate the performance of the proposed network.
引用
收藏
页码:2636 / 2648
页数:13
相关论文
共 50 条
  • [41] Signal design and detection algorithms for quick detection under false alarm rate constraints
    Kumar, Alamuru Pavan
    Vineeth, B. S.
    2019 25TH NATIONAL CONFERENCE ON COMMUNICATIONS (NCC), 2019,
  • [42] On Secrecy Outage Capacity of Fading Channels Under Relaxed Delay Constraints
    Gungor, Onur
    Koksal, Can Emre
    El Gamal, Hesham
    2013 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY PROCEEDINGS (ISIT), 2013, : 2024 - 2028
  • [43] Finite-State Wiretap Channels: Secrecy Under Memory Constraints
    Sankarasubramaniam, Yogesh
    Thangaraj, Andrew
    Viswanathan, Kapali
    2009 IEEE INFORMATION THEORY WORKSHOP (ITW 2009), 2009, : 115 - 119
  • [44] ECRB-Based Optimal Parameter Encoding Under Secrecy Constraints
    Goken, Cagri
    Gezici, Sinan
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2018, 66 (13) : 3556 - 3570
  • [45] The Secrecy Capacity of Gaussian MIMO Wiretap Channels Under Interference Constraints
    Dong, Limeng
    Loyka, Sergey
    Li, Yong
    IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2018, 36 (04) : 704 - 722
  • [46] Radar Waveform Design for Extended Target Recognition under Detection Constraints
    Meng, Huadong
    Wei, Yimin
    Gong, Xuhua
    Liu, Yimin
    Wang, Xiqin
    MATHEMATICAL PROBLEMS IN ENGINEERING, 2012, 2012
  • [47] Robust fault detection observer design under fault sensitivity constraints
    Lee, Kee-Sang
    Park, Tae-Geon
    JOURNAL OF THE FRANKLIN INSTITUTE-ENGINEERING AND APPLIED MATHEMATICS, 2015, 352 (05): : 1791 - 1810
  • [48] Energy Efficiency in Fading Relay Channels under Secrecy and QoS Constraints
    Ozmen, Mustafa
    Ye, Chuang
    Gursoy, M. Cenk
    Velipasalar, Senem
    2014 IEEE 25TH ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR, AND MOBILE RADIO COMMUNICATION (PIMRC), 2014, : 150 - 154
  • [49] Beamforming for Secrecy Rate Maximization under Outage Constraints and Partial CSI
    Gerbracht, Sabrina
    Scheunert, Christian
    Lorswieck, Eduard A.
    2011 CONFERENCE RECORD OF THE FORTY-FIFTH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS & COMPUTERS (ASILOMAR), 2011, : 193 - 197
  • [50] Throughput Maximization in Multiantenna OFDMA Downlink under Secrecy Rate Constraints
    Karachontzitis, Sotiris
    Timotheou, Stelios
    Krikidis, Ioannis
    2014 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC), 2014, : 410 - 415