A distributed scheme for detection of information flows

Distributed detection of information flows spanning many nodes in a wireless sensor network is considered. In such a system, eavesdroppers are deployed near several nodes in the network. As data may be encrypted or padded, the eavesdroppers can only measure packet timestamps. Each eavesdropper, given a sequence of timestamps, must compress the information for transmission to a fusion center. Given the compressed data, the fusion center must decide whether the monitored nodes are part of an information flow. Information flows may be embedded with chaff noise, and packets may be perturbed by a random but bounded delay. A specific quantizer and algorithmic detection scheme are proposed. Performance is characterized by the maximum fraction of chaff that may be inserted in an information flow while still achieving vanishing error probabilities. A lower bound on the performance of the optimal system is derived. An upper bound on the performance of a system using the proposed quantizer is also found.

[1]  Douglas S. Reeves,et al.  Sleepy Watermark Tracing: An Active Network-Based Intrusion Response Framework , 2001, SEC.

[2]  Dawn Xiaodong Song,et al.  Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.

[3]  T. He,et al.  A Signal Processing Perspective to Stepping-stone Detection , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[4]  Stuart Staniford-Chen,et al.  Holding intruders accountable on the Internet , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.

[5]  Vern Paxson,et al.  Multiscale Stepping-Stone Detection: Detecting Pairs of Jittered Interactive Streams by Exploiting Maximum Tolerable Delay , 2002, RAID.

[6]  Izhak Rubin,et al.  Information rates and data-compression schemes for Poisson processes , 1974, IEEE Trans. Inf. Theory.

[7]  Yin Zhang,et al.  Detecting Stepping Stones , 2000, USENIX Security Symposium.

[8]  Lang Tong,et al.  Distributed Detection of Information Flows in Chaff , 2007, 2007 IEEE International Symposium on Information Theory.

[9]  Lang Tong,et al.  Distributed Detection of Information Flows , 2008, IEEE Transactions on Information Forensics and Security.

[10]  Lang Tong,et al.  Detection of Information Flows , 2008, IEEE Transactions on Information Theory.

[11]  Lang Tong,et al.  Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.

[12]  Bruce Schneier,et al.  Practical cryptography , 2003 .