Estimation in Wireless Sensor Networks With Security Constraints

In this paper, we investigate the performance of distributed estimation schemes in a wireless sensor network in the presence of an eavesdropper. The sensors transmit observations to the fusion center (FC), which at the same time are overheard by the eavesdropper. Both the FC and the eavesdropper reconstruct a minimum mean-squared error estimate of the physical quantity observed. We address the problem of transmit power allocation for system performance optimization subject to a total average power constraint on the sensor(s), and a security/secrecy constraint on the eavesdropper. We mainly focus on two scenarios: 1) a single sensor with multiple transmit antennas and 2) multiple sensors with each sensor having a single transmit antenna. For each scenario, given perfect channel state information (CSI) of the FC and full or partial CSI of the eavesdropper, we derive the transmission policies for short-term and long-term cases. For the long-term power allocation case, when the sensor is equipped with multiple antennas, we can achieve zero information leakage in the full CSI case, and dramatically enhance the system performance by deploying the artificial noise technique for the partial CSI case. Asymptotic expressions are derived for the long-term distortion at the FC as the number of sensors or the number of antennas becomes large. In addition, we also consider multiple-sensor multiple-antenna scenario, and simulations show that given the same total number of transmitting antennas the multiple-antenna sensor network is superior to the performance of the multiple-sensor single-antenna network.

[1]  J.A. Stankovic,et al.  Denial of Service in Sensor Networks , 2002, Computer.

[2]  Amir K. Khandani,et al.  Linear estimation of correlated data in wireless sensor networks with optimum power allocation and analog modulation , 2008, IEEE Transactions on Communications.

[3]  R. Negi,et al.  Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..

[4]  Eric van Damme,et al.  Non-Cooperative Games , 2000 .

[5]  J. Wolfowitz Coding Theorems of Information Theory , 1962, Ergebnisse der Mathematik und Ihrer Grenzgebiete.

[6]  A. Lee Swindlehurst,et al.  Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.

[7]  C.-C. Jay Kuo,et al.  Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.

[8]  Pramod K. Varshney,et al.  Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.

[9]  Mikael Skoglund,et al.  The CEO Problem With Secrecy Constraints , 2014, IEEE Transactions on Information Forensics and Security.

[10]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.

[11]  Tobias J. Oechtering,et al.  Privacy-Aware Distributed Bayesian Detection , 2015, IEEE Journal of Selected Topics in Signal Processing.

[12]  Chih-Hong Wang,et al.  Power Allocation for Distortion Outage Minimization in Clustered Wireless Sensor Networks , 2008, 2008 International Wireless Communications and Mobile Computing Conference.

[13]  Pramod K. Varshney,et al.  Design of transmit-diversity schemes in detection networks under secrecy constraints , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).

[14]  Gregory W. Wornell,et al.  Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.

[15]  Andrea J. Goldsmith,et al.  Estimation Diversity and Energy Efficiency in Distributed Sensing , 2007, IEEE Transactions on Signal Processing.

[16]  Ferenc Móricz,et al.  Strong laws of large numbers for arrays of rowwise independent random variables , 1989 .

[17]  Sennur Ulukus,et al.  Secure Lossy Transmission of Vector Gaussian Sources , 2013, IEEE Trans. Inf. Theory.

[18]  Bruce Bueno de Mesquita,et al.  An Introduction to Game Theory , 2014 .

[19]  Lang Tong,et al.  Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.

[20]  Husheng Li,et al.  A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.

[21]  Konstantinos N. Plataniotis,et al.  Secure hybrid digital-analog Wyner-Ziv coding , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.

[22]  C. Tellambura,et al.  Linear estimation of correlated data in wireless sensor networks with optimum power allocation and analog modulation , 2008 .

[23]  Pramod K. Varshney,et al.  Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints , 2014, IEEE Transactions on Signal Processing.

[24]  Roderick Wong,et al.  Asymptotic approximations of integrals , 1989, Classics in applied mathematics.

[25]  Shlomo Shamai,et al.  An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .

[26]  Michael Gastpar,et al.  To code, or not to code: lossy source-channel communication revisited , 2003, IEEE Trans. Inf. Theory.

[27]  Marilda Sotomayor Game Theory, Introduction to , 2009, Encyclopedia of Complexity and Systems Science.

[28]  Daniel Pérez Palomar,et al.  Gradient of mutual information in linear vector Gaussian channels , 2006, IEEE Transactions on Information Theory.

[29]  Rohit Negi,et al.  Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.

[30]  Shlomo Shamai,et al.  Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.

[31]  Stephen P. Boyd,et al.  Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.

[32]  James L. Massey,et al.  Deep-space communications and coding: A marriage made in heaven , 1992 .

[33]  Giuseppe Caire,et al.  Optimum power control over fading channels , 1999, IEEE Trans. Inf. Theory.

[34]  Hesham El Gamal,et al.  On the Secrecy Capacity of Fading Channels , 2007, ISIT.

[35]  Sennur Ulukus,et al.  Secure Lossy Transmission of Vector Gaussian Sources , 2011, IEEE Transactions on Information Theory.

[36]  Subhrakanti Dey,et al.  Distortion Outage Minimization and Diversity Order Analysis for Coherent Multiaccess , 2011, IEEE Transactions on Signal Processing.

[37]  Neri Merhav,et al.  Zero-Delay and Causal Secure Source Coding , 2015, IEEE Transactions on Information Theory.

[38]  Pramod K. Varshney,et al.  Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.

[39]  Gang Qu,et al.  Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.

[40]  Pablo Piantanida,et al.  Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.

[41]  Hsiao-Chun Wu,et al.  Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.

[42]  Raef Bassily,et al.  Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.

[43]  Frédérique E. Oggier,et al.  The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.

[44]  Mani Srivastava,et al.  Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..

[45]  C. Kelley Iterative Methods for Linear and Nonlinear Equations , 1987 .

[46]  Subhrakanti Dey,et al.  Power allocation for distortion minimization in distributed estimation with security constraints , 2014, 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).

[47]  B. Rustem,et al.  An Interior-Point Algorithm for Nonlinear Minimax Problems , 2010 .

[48]  Peter Willett,et al.  Distributed Detection With Censoring Sensors Under Physical Layer Secrecy , 2009, IEEE Transactions on Signal Processing.

[49]  Roy D. Yates,et al.  Service outage based power and rate allocation for parallel fading channels , 2003, IEEE Transactions on Information Theory.

[50]  Allen B. MacKenzie,et al.  Game Theory for Wireless Engineers , 2006, Game Theory for Wireless Engineers.

[51]  Shlomo Shamai,et al.  Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.

[52]  Chong-Yung Chi,et al.  QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.

[53]  Subhrakanti Dey,et al.  On Scaling Laws of Diversity Schemes in Decentralized Estimation , 2010, IEEE Transactions on Information Theory.

[54]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[55]  Gregory W. Wornell,et al.  Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.

[56]  Shlomo Shamai,et al.  Secrecy Capacity Region of Fading Broadcast Channels , 2007, 2007 IEEE International Symposium on Information Theory.

[57]  M. Gastpar Uncoded transmission is exactly optimal for a simple Gaussian "sensor" network , 2007 .

[58]  Mukesh Singhal,et al.  Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..

[59]  Andrea J. Goldsmith,et al.  Power scheduling of universal decentralized estimation in sensor networks , 2006, IEEE Transactions on Signal Processing.

[60]  Andrea J. Goldsmith,et al.  On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming , 2006, IEEE Journal on Selected Areas in Communications.

[61]  Reza Olfati-Saber,et al.  Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.

[62]  Wei-Yong Yan,et al.  A new computational method for the functional inequality constrained minimax optimization problem , 1995, Proceedings of 1995 34th IEEE Conference on Decision and Control.

[63]  Matthew R. McKay,et al.  Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.

[64]  Sennur Ulukus Correlated Jamming in Multiple Access Channels 1 Shabnam Shafiee , 2005 .

[65]  Lieven De Lathauwer,et al.  Unconstrained Optimization of Real Functions in Complex Variables , 2012, SIAM J. Optim..

[66]  Hesham El Gamal,et al.  The Water-Filling Game in Fading Multiple-Access Channels , 2005, IEEE Transactions on Information Theory.

[67]  Z.-Q. Luo,et al.  Power-efficient analog forwarding transmission in an inhomogeneous Gaussian sensor network , 2005, IEEE 6th Workshop on Signal Processing Advances in Wireless Communications, 2005..

[68]  Steven Kay,et al.  Fundamentals Of Statistical Signal Processing , 2001 .

[69]  Kerstin Vogler,et al.  Table Of Integrals Series And Products , 2016 .

[70]  Feng Shou-ping On Mean Value Theorem of Integrals , 2011 .

[71]  Eduard A. Jorswieck,et al.  Beamforming for fading wiretap channels with partial channel information , 2010, 2010 International ITG Workshop on Smart Antennas (WSA).

[72]  Gregory J. Pottie,et al.  Wireless integrated network sensors , 2000, Commun. ACM.

[73]  A. D. Wyner,et al.  The wire-tap channel , 1975, The Bell System Technical Journal.

[74]  Andrea Goldsmith,et al.  Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).

[75]  Zhi-Quan Luo,et al.  Decentralized estimation in an inhomogeneous sensing environment , 2005, IEEE Transactions on Information Theory.

[76]  Shlomo Shamai,et al.  A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.

[77]  R. Srikant,et al.  Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).

[78]  Zhu Han,et al.  Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.

[79]  Claude E. Shannon,et al.  Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..

[80]  Subhrakanti Dey,et al.  Power Allocation for Outage Minimization in State Estimation Over Fading Channels , 2011, IEEE Transactions on Signal Processing.

[81]  Reza Soosahabi,et al.  Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.

[82]  Nihar Jindal MIMO broadcast channels with finite rate feedback , 2005, GLOBECOM.

[83]  H. Vincent Poor,et al.  Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.

[84]  John M. Cioffi,et al.  Delay-constrained capacity with causal feedback , 2002, IEEE Trans. Inf. Theory.

[85]  Parastoo Sadeghi,et al.  Capacity analysis for finite-state Markov mapping of flat-fading channels , 2005, IEEE Transactions on Communications.

[86]  Michael Gastpar,et al.  Source-Channel Communication in Sensor Networks , 2003, IPSN.

[87]  Jaydip Sen,et al.  A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..

[88]  H. Kuk On equilibrium points in bimatrix games , 1996 .

[89]  Farshad Lahouti,et al.  Link adaptation for physical layer security over wireless fading channels , 2012, IET Commun..