On the Divergence-Cost Function in Distributed Detection with a Secrecy Constraint

被引:0
|
作者
Marano, Stefano [1 ]
Matta, Vincenzo [1 ]
Willett, Peter [2 ]
机构
[1] Univ Salerno, DIIIE, Via Ponte don Melillo, I-84084 Fisciano, SA, Italy
[2] Univ Connecticut, ECE Dept, Storrs, CT 06269 USA
关键词
D O I
10.1109/ACSSC.2008.5074640
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
An energy-constrained Wireless Sensor Network (WSN) is engaged in a binary detection task. An eavesdropper intercepts the messages sent by the nodes towards the central unit, thus trying to infer the state of the nature scrutinized by the system. We show that, under appropriate countermeasures against the eavesdropper, and adopting appropriate energy saving strategies, the system performances are characterized by a divergence-cost function D(beta) belonging to the class of the Ali-Silvey distances, where beta is related to the total energy consumption of the network. We also show that the most economic way of conveying information for detection is characterized by the related divergence per unit cost function D = sup(beta) D(beta)/beta. The properties of these performance metrics are investigated and two scenarios of interest are addressed: parallel and multiple access channels.
引用
收藏
页码:1357 / +
页数:2
相关论文
共 50 条
  • [1] Distributed Compressive Detection with Perfect Secrecy
    Kailkhura, Bhavya
    Wimalajeewa, Thakshila
    Shen, Lixin
    Varshney, Pramod K.
    2014 IEEE 11TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS (MASS), 2014, : 674 - 679
  • [2] Reliability and Secrecy Functions of the Wiretap Channel Under Cost Constraint
    Han, Te Sun
    Endo, Hiroyuki
    Sasaki, Masahide
    IEEE TRANSACTIONS ON INFORMATION THEORY, 2014, 60 (11) : 6819 - 6843
  • [3] Secrecy Constrained Distributed Detection in Sensor Networks
    Guo, Jun
    Rogers, Uri
    Li, Xia
    Chen, Hao
    IEEE TRANSACTIONS ON SIGNAL AND INFORMATION PROCESSING OVER NETWORKS, 2018, 4 (02): : 378 - 391
  • [4] Efficient detection of distributed constraint violations
    Agrawal, Shipra
    Deb, Supratim
    Naidu, K. V. M.
    Rastogi, Rajeev
    2007 IEEE 23RD INTERNATIONAL CONFERENCE ON DATA ENGINEERING, VOLS 1-3, 2007, : 1295 - +
  • [5] Quantization for Distributed Binary Detection under Secrecy Constraints
    Mhairna, Maggie
    Duhamel, Pierre
    Piarnanida, Pablo
    2016 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2016,
  • [6] Anomaly Detection Under Cost Constraint
    Barbarioli, Bruno
    Assuncao, Renato M.
    PROCEEDINGS OF 2016 5TH BRAZILIAN CONFERENCE ON INTELLIGENT SYSTEMS (BRACIS 2016), 2016, : 247 - 252
  • [7] Pretrained Cost Model for Distributed Constraint Optimization Problems
    Deng, Yanchen
    Kong, Shufeng
    An, Bo
    THIRTY-SIXTH AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FOURTH CONFERENCE ON INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE / TWELVETH SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCE, 2022, : 9331 - 9340
  • [8] A selection function based distributed algorithm for delay-constraint least-cost unicast routing
    Liu, W
    Lou, WJ
    Fang, YG
    2003 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1-5: NEW FRONTIERS IN TELECOMMUNICATIONS, 2003, : 1738 - 1742
  • [9] ASYMPTOTIC PERFECT SECRECY IN DISTRIBUTED DETECTION AGAINST A GLOBAL EAVESDROPPER
    Guo, Jun
    Li, Xia
    Rogers, Uri
    Chen, Hao
    2016 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING PROCEEDINGS, 2016, : 3501 - 3505
  • [10] Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints
    Nadendla, V. Sriram Siddhardh
    Varshney, Pramod K.
    IEEE TRANSACTIONS ON SIGNAL PROCESSING, 2016, 64 (10) : 2636 - 2648