Secure Distributed Detection in the Presence of Eavesdroppers

被引:0
|
作者
Nadendla, V. Sriram Siddhardh [1 ]
Chen, Hao [2 ]
Varshney, Pramod K. [1 ]
机构
[1] Syracuse Univ, Dept EECS, Syracuse, NY 13244 USA
[2] Boise State Univ, Dept Elect & Comp Engn, Boise, ID 83725 USA
关键词
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
We investigate the structure of quantizer rules at the local sensors in distributed detection networks, in the presence of eavesdroppers (Eve), under asymptotic regime (number of sensors tending to infinity) for binary hypotheses. These local quantizers are designed in such a way that the confidentiality of sensor data is preserved while achieving optimal detection performance at the fusion center (FC). In the case of Eve with noisier channels, for a general channel model, we show that these optimal quantizer rules at the local sensors are always on the boundaries of the achievable region of sensor's ROC. If there is a constraint on the Eve's performance, based on our numerical results, we conjecture that the structure of an optimal quantizer is LRT-based. The above argument is corroborated with a numerical example using BSC channels for the Eve and ideal channels for the FC. In the case of Eve with better channels, we prove that the quantizer rules that can provide confidentiality along with optimal detection performance, cannot send any useful information to the fusion center (FC). We propose a jamming scheme for the FC against Eve and evaluate the optimal distribution for the Gaussian jamming signal that requires minimum energy to make both FC and Eve's channel similar in distributed detection performance.
引用
收藏
页码:1437 / 1441
页数:5
相关论文
共 50 条
  • [41] On Secure Downlink NOMA Systems with Aerial Eavesdroppers
    Lei, Hongjiang
    Zhu, Chen
    Park, Ki-Hong
    Lei, Weijia
    Ansari, Imran Shafique
    2021 IEEE 32ND ANNUAL INTERNATIONAL SYMPOSIUM ON PERSONAL, INDOOR AND MOBILE RADIO COMMUNICATIONS (PIMRC), 2021,
  • [42] Secure Transmission of Terahertz Signals with Multiple Eavesdroppers
    He, Yuqian
    Zhang, Lu
    Liu, Shanyun
    Zhang, Hongqi
    Yu, Xianbin
    MICROMACHINES, 2022, 13 (08)
  • [43] Secure Transmission in Cooperative Networks with Weak Eavesdroppers
    Sunny, Albert
    Sarma, Siddhartha
    Kuri, Joy
    IEEE SIGNAL PROCESSING LETTERS, 2015, 22 (10) : 1693 - 1697
  • [44] Distributed Secure State Estimation in the Presence of Malicious Agents
    Lu, An-Yang
    Yang, Guang-Hong
    IEEE TRANSACTIONS ON AUTOMATIC CONTROL, 2021, 66 (06) : 2875 - 2882
  • [45] COMMUNICATION COMPLEXITY OF SECURE DISTRIBUTED COMPUTATION IN THE PRESENCE OF NOISE
    MODIANO, EH
    EPHREMIDES, A
    IEEE TRANSACTIONS ON INFORMATION THEORY, 1992, 38 (04) : 1193 - 1202
  • [46] Ghostbuster: Detecting the Presence of Hidden Eavesdroppers
    Chaman, Anadi
    Wang, Jiaming
    Sun, Jiachen
    Hassanieh, Haitham
    Choudhury, Romit Roy
    MOBICOM'18: PROCEEDINGS OF THE 24TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING, 2018, : 337 - 351
  • [47] Secret communication in presence of colluding eavesdroppers
    Goel, Satashu
    Negi, Rohit
    MILCOM 2005 - 2005 IEEE MILITARY COMMUNICATIONS CONFERENCE, VOLS 1-5, 2005, : 1501 - 1506
  • [49] Distributed intrusion detection for secure consensus computations
    Pasqualetti, Fabio
    Bicchi, Antonio
    Bullo, Francesco
    PROCEEDINGS OF THE 46TH IEEE CONFERENCE ON DECISION AND CONTROL, VOLS 1-14, 2007, : 1778 - 1783
  • [50] Capacity and outage performance analysis of secure cooperative RF-FSO relaying system in the presence of multiple eavesdroppers
    Sarker, Noor Ahmad
    Samad, Mst Fateha
    PHYSICAL COMMUNICATION, 2021, 49