Title :
Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks
Author :
Soosahabi, Reza ; Naraghi-Pour, Mort
Author_Institution :
Dept. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA
Abstract :
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless sensor network operating over insecure links. Observations of the sensors are quantized and encrypted before transmission. The encryption method we propose maps the output of the quantizer to one of the possible quantizer output levels randomly according to a probability matrix. This operation is similar to that of a discrete memoryless channel. The intended (ally) fusion center (AFC) is aware of the encryption keys (probabilities) while the unauthorized (third party) fusion center (TPFC) is not. A constrained optimization problem is formulated from the point of view of AFC in order to design its decision rule along with the encryption probabilities. The objective function to be minimized is the error probability of AFC and the constraint is a lower bound on the error probability of TPFC. A good suboptimal solution to this problem is found. Numerical results are presented to show that it is possible to degrade the error probability of TPFC significantly and still achieve very low probability of error for AFC. As the number of levels in the quantizer increases the performance loss of the secure system compared to insecure system is reduced. Compared to the existing data encryption methods, the proposed method is highly scalable since it does not increase the packet overhead or transmit power of the sensors and has very low computational complexity. A scheme is described to randomize the keys so as to defeat any key space exploration attack.
Keywords :
authorisation; computational complexity; computer network security; constraint handling; cryptography; error statistics; optimisation; quantisation (signal); wireless sensor networks; AFC; TPFC; ally fusion center; bandwidth-constrained low-power wireless sensor network; binary hypothesis testing; constrained optimization problem; data encryption methods; decision rule; discrete memoryless channel; distributed detection; encryption probabilities; error probability; insecure links; key space exploration attack; probability matrix; quantization; scalable PHY-layer security; secure system; suboptimal solution; third party fusion center; very low computational complexity; wireless sensor networks; Encryption; Error probability; Frequency control; Optimization; Sensors; Wireless sensor networks;
Conference_Titel :
Vehicular Technology Conference (VTC Fall), 2012 IEEE
Conference_Location :
Quebec City, QC
Print_ISBN :
978-1-4673-1880-8
Electronic_ISBN :
1090-3038
DOI :
10.1109/VTCFall.2012.6399340