Cooperative secure transmission for distributed detection in wireless sensor networks

In this paper, we consider a cooperative transmission scheme to ensure data confidentiality from passive eavesdropping in a distributed detection scenario. A wireless sensor Network (WSN) consisting a set of sensors observes an unknown target and reports sensing data to an ally fusion center (AFC). Meanwhile, an enemy fusion center (EFC) located in a vicinity of the AFC tries to eavesdrop on the reporting data in wireless environment. To prevent such an attack, we propose reporting rules for selected sensors to minimize not only the total error probability at the AFC but also information leakage to the EFC. While a set of sensors transmits sensing data to the AFC, the proposed scheme also activates another set of sensors aiming at inducing interference and making the EFC confused. Our results show that information-theoretic perfect secrecy can be achieved by taking advantage of random behavior of wireless parallel access channels.

[1]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[2]  Sasikanth Avancha,et al.  Security for Sensor Networks , 2004 .

[3]  Venugopal V. Veeravalli,et al.  Decentralized detection in sensor networks , 2003, IEEE Trans. Signal Process..

[4]  Venkata Sriram,et al.  Secure Distributed Detection in Wireless Sensor Networks via Encryption of Sensor Decisions , 2009 .

[5]  Pramod K. Varshney,et al.  Channel aware decision fusion in wireless sensor networks , 2004, IEEE Transactions on Signal Processing.

[6]  Konstantinos N. Plataniotis,et al.  Green modulation in dense Wireless Sensor Networks , 2010, 2010 IEEE International Conference on Acoustics, Speech and Signal Processing.

[7]  Bin Liu Channel aware distributed detection in wireless sensor networks , 2006 .

[8]  Kenneth E. Barner,et al.  Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.

[9]  Hyuckjae Lee,et al.  Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy , 2010, 2010 IEEE Information Theory Workshop.