Sensor Data Cryptography in Wireless Sensor Networks

We consider decentralized estimation of a noise-corrupted deterministic signal in a bandwidth-constrained sensor network communicating through an insecure medium. Each sensor collects a noise-corrupted version, performs a local quantization, and transmits a 1-bit message to an ally fusion center through a wireless medium where the sensor outputs are vulnerable to unauthorized observation from enemy/third-party fusion centers. In this paper, we introduce an encrypted wireless sensor network (eWSN) concept where stochastic enciphers operating on binary sensor outputs are introduced to disguise the sensor outputs, creating an eWSN scheme. Noting that the plaintext (original) and ciphertext (disguised) messages are constrained to a single bit due to bandwidth constraints, we consider a binary channel-like scheme to probabilistically encipher (i.e., flip) the sensor outputs. We first consider a symmetric key encryption case where the "0" and "1" enciphering probabilities are equal. The key is represented by the bit enciphering probability. Specifically, we derive the optimal estimator of the deterministic signal approached from a maximum-likelihood perspective and the Cramer-Rao lower bound for the estimation problem utilizing the key. Furthermore, we analyze the effect of the considered cryptosystem on enemy fusion centers that are unaware of the fact that the WSN is encrypted (i.e., we derive the bias, variance, and mean square error (MSE) of the enemy fusion center). We then extend the cryptosystem to admit unequal enciphering schemes for "0" and "1", and analyze the estimation problem from both the prospectives of ally (that has access to the enciphering keys) and (third-party) enemy fusion centers. The results show that when designed properly, a significant amount of bias and MSE can be introduced to an enemy fusion center with the cost to the ally fusion center being a marginal increase [factor of (1-Omega1-Omega0 )-2, where 1-Omegaj, j=0, 1 is the "j" enciphering probability in the estimation variance (compared to the variance of a fusion center estimate operating in a vulnerable WSN).

[1]  Haralabos C. Papadopoulos,et al.  Sequential signal encoding from noisy measurements using quantizers with dynamic bias control , 2001, IEEE Trans. Inf. Theory.

[2]  B. Ripley,et al.  Robust Statistics , 2018, Encyclopedia of Mathematical Geosciences.

[3]  Andrea J. Goldsmith,et al.  Power scheduling of universal decentralized estimation in sensor networks , 2006, IEEE Transactions on Signal Processing.

[4]  K. Khalil On the Complexity of Decentralized Decision Making and Detection Problems , 2022 .

[5]  A. Willsky,et al.  Combining and updating of local estimates and regional maps along sets of one-dimensional tracks , 1982 .

[6]  Gregory L. Duckworth,et al.  Acoustic counter-sniper system , 1997, Defense + Security Symposium.

[7]  Ananthram Swami,et al.  Asymptotic locally optimal detector for large-scale sensor networks under the Poisson regime , 2005, IEEE Trans. Signal Process..

[8]  Biao Chen,et al.  Fusion of censored decisions in wireless sensor networks , 2005, IEEE Transactions on Wireless Communications.

[9]  W. Greene,et al.  计量经济分析 = Econometric analysis , 2009 .

[10]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, CRYPTO.

[11]  Lang Tong,et al.  Type based estimation over multiaccess channels , 2006, IEEE Transactions on Signal Processing.

[12]  David E. Culler,et al.  SPINS: security protocols for sensor networks , 2001, MobiCom '01.

[13]  John Ioannidis,et al.  Using the Fluhrer, Mantin, and Shamir Attack to Break WEP , 2002, NDSS.

[14]  John A. Gubner,et al.  Distributed estimation and quantization , 1993, IEEE Trans. Inf. Theory.

[15]  Pramod K. Varshney,et al.  Distributed Detection and Data Fusion , 1996 .

[16]  Pramod K. Varshney,et al.  Fusion of decisions transmitted over Rayleigh fading channels in wireless sensor networks , 2006, IEEE Transactions on Signal Processing.

[17]  Adi Shamir,et al.  Weaknesses in the Key Scheduling Algorithm of RC4 , 2001, Selected Areas in Cryptography.

[18]  H. Vincent Poor,et al.  Minimax robust decentralized detection , 1994, IEEE Trans. Inf. Theory.

[19]  D. Teneketzis,et al.  Coordinator , 2020, EuroPLoP.

[20]  David A. Wagner,et al.  TinySec: a link layer security architecture for wireless sensor networks , 2004, SenSys '04.

[21]  Haralabos C. Papadopoulos,et al.  Sequential signal encoding and estimation for distributed sensor networks , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).

[22]  David E. Culler,et al.  Lessons from a Sensor Network Expedition , 2004, EWSN.

[23]  Jason Speyer,et al.  Computation and transmission requirements for a decentralized linear-quadratic-Gaussian control problem , 1978, 1978 IEEE Conference on Decision and Control including the 17th Symposium on Adaptive Processes.

[24]  Alfred O. Hero,et al.  Energy-based sensor network source localization via projection onto convex sets , 2005, IEEE Transactions on Signal Processing.

[25]  Alejandro Ribeiro,et al.  Bandwidth-constrained distributed estimation for wireless sensor networks-part II: unknown probability density function , 2006, IEEE Transactions on Signal Processing.

[26]  Eli Biham,et al.  Instant Ciphertext-Only Cryptanalysis of GSM Encrypted Communication , 2003, Journal of Cryptology.

[27]  Zhi-Quan Luo,et al.  An isotropic universal decentralized estimation scheme for a bandwidth constrained ad hoc sensor network , 2005, IEEE J. Sel. Areas Commun..

[28]  David A. Wagner,et al.  Security considerations for IEEE 802.15.4 networks , 2004, WiSe '04.

[29]  Pramod K. Varshney,et al.  Channel aware decision fusion in wireless sensor networks , 2004, IEEE Transactions on Signal Processing.

[30]  Tan F. Wong,et al.  Maximum Likelihood Localization of a Diffusive Point Source Using Binary Observations , 2007, IEEE Transactions on Signal Processing.

[31]  John N. Tsitsiklis,et al.  On the complexity of decentralized decision making and detection problems , 1985 .

[32]  Lang Tong,et al.  Asymptotic locally optimal detector for large-scale sensor networks under Poisson regime , 2004, ICC.

[33]  Amy R. Reibman,et al.  Design of quantizers for decentralized estimation systems , 1993, IEEE Trans. Commun..

[34]  Alejandro Ribeiro,et al.  Bandwidth-constrained distributed estimation for wireless sensor Networks-part I: Gaussian case , 2006, IEEE Transactions on Signal Processing.

[35]  John Anderson,et al.  Wireless sensor networks for habitat monitoring , 2002, WSNA '02.

[36]  Zhi-Quan Luo,et al.  Universal decentralized estimation in a bandwidth constrained sensor network , 2005, IEEE Transactions on Information Theory.

[37]  Peter J. Huber,et al.  Robust Statistics , 2005, Wiley Series in Probability and Statistics.