Skip to main content
Sensors (Basel, Switzerland) logoLink to Sensors (Basel, Switzerland)
. 2016 Dec 16;16(12):2152. doi: 10.3390/s16122152

Secure Distributed Detection under Energy Constraint in IoT-Oriented Sensor Networks

Guomei Zhang 1,2,*, Hao Sun 1,2
Editor: Leonhard M Reindl
PMCID: PMC5191132  PMID: 27999282

Abstract

We study the secure distributed detection problems under energy constraint for IoT-oriented sensor networks. The conventional channel-aware encryption (CAE) is an efficient physical-layer secure distributed detection scheme in light of its energy efficiency, good scalability and robustness over diverse eavesdropping scenarios. However, in the CAE scheme, it remains an open problem of how to optimize the key thresholds for the estimated channel gain, which are used to determine the sensor’s reporting action. Moreover, the CAE scheme does not jointly consider the accuracy of local detection results in determining whether to stay dormant for a sensor. To solve these problems, we first analyze the error probability and derive the optimal thresholds in the CAE scheme under a specified energy constraint. These results build a convenient mathematic framework for our further innovative design. Under this framework, we propose a hybrid secure distributed detection scheme. Our proposal can satisfy the energy constraint by keeping some sensors inactive according to the local detection confidence level, which is characterized by likelihood ratio. In the meanwhile, the security is guaranteed through randomly flipping the local decisions forwarded to the fusion center based on the channel amplitude. We further optimize the key parameters of our hybrid scheme, including two local decision thresholds and one channel comparison threshold. Performance evaluation results demonstrate that our hybrid scheme outperforms the CAE under stringent energy constraints, especially in the high signal-to-noise ratio scenario, while the security is still assured.

Keywords: Internet of Things, wireless sensor network, distributed detection, eavesdropping, physical layer security, energy constraint, decision fusion

1. Introduction

With the rapid advances in low-cost wireless sensors, radio frequency identification (RFID), Web technologies and wireless communications recently, connecting various smart objects to Internet and realizing the communications of machine-to-human and machine-to-machine with the physical world have been expected widely [1]. That is the concept of Internet of Things (IoT), which can provide ubiquitous connectivity, information gathering and data transmitting capabilities in different fields, such as health monitoring, emergencies, environment control, military and industries. The pervasive sensing and control capabilities brought by IoT will change our daily life significantly [2,3,4].

In an era of IoT, there are billions of devices linked to the Internet. Cisco predicts that 50 billion devices are going to be in use in 2020 [3]. Such a large number of devices deployed in the IoT lead to many technical challenges including spectrum scarcity, energy consumption and security [4,5,6]. Aiming to the spectrum scarcity problem, some enhanced technologies with high spectrum efficiency are advocated, for example, the cognitive Internet of Things (CIoT) who introduces the cognitive radio technology to the IoT network [5]. A decentralized inference network where the nodes transmit the compressed observations to reduce the required bandwidth is another solution [7], and the distributed detection technique utilized in sensor networks is a typical instance [8,9,10,11]. Since a huge number of devices are included in IoT, the energy to be spent for communication and computation is extremely large and improving energy efficiency becomes more important. Although the energy harvesting techniques can use the external energy source and relieve devices from the constraints induced by battery usage, energy as a scarce resource should always be utilized carefully. Thus, an energy efficiency solution has a significant role in IoT [4,12]. With the developing of IoT network, devices will become smarter and start to handle more tasks of human. Thus, the devices have to be more reliable and trustable [1]. However, there are a variety of attacks over different protocol layers which attempt to disrupt the network or intercept the information in the IoT, including denial of service (DoS) attacks, spoofed routing information attacks at network layer, flooding attacks at transport layer, resource exhaustion attacks at link layer, jamming and tampering attacks at physical layer and many others [13]. Now security has turned into an important aspect for IoT deployments [14,15]. Among various attacks, eavesdropping attack is the most common form of attack on data privacy [2,13]. In order to realize secure transmission, traditional key-based enciphering techniques at network layer have been entrusted. However, in IoT networks with low-complex devices, the key distribution for symmetric cryptosystems and the highly complex computation of asymmetric cryptosystems can be very challenging [16]. Therefore, the robust physical-layer security methods with little or no aid of encryption key and with low computational complexity can be adopted in IoT [2,5,17], further, they could be combined with other lightweight cryptographic protocols to fulfill different security targets of IoT.

An IoT system would integrate various technologies and communications solutions, such as identification and tracking techniques, wired and wireless sensor and actuator networks and enhanced communication protocols [1,18,19,20]. Sensor networks, especially the wireless sensor networks (WSN), will play a crucial role in the IoT. Ubiquitous sensing provided by WSN can offer the ability to measure, infer and understand environmental indicators. Cooperating with RFID system, WSN can track the status of things better and build a bridge between the physical and digital world [18,21]. With the size and complication of WSN growing, the spectrum scarcity and energy consumption problems become more serious [22]. Furthermore, the broadcasting nature of wireless communications from sensors to the controllers or fusion centers makes WSN vulnerable to eavesdropping. The physical layer security solutions with low complexity and low overhead are obviously more suitable for WSN, since the sensors have some practical constraints including limited computing capabilities, limited storage memories and severe energy constraints [2,10].

Due to the low bandwidth and power requirement at sensors and the robustness to the environments’ rapid changes, distributed detection in WSN has been utilized in a wide range of fields such as emergency response, environment monitoring, medical monitoring and military surveillance [10,23]. For distributed detection, sensors are deployed over a certain area to sense the physical phenomena with binary state in a decentralized fashion. Each sensor makes a binary decision based on its local observation and then transmits the local decision to a fusion center (FC) over wireless channels [23]. For the practical resource constraints and the serious security issues in front of WSN, secure distributed detection schemes under energy constraints are necessary for the development of an efficient IoT. Various secure strategies for distributed detection have been proposed under different assumptions on the eavesdroppers and transmission channels [8,9,10,23,24,25,26,27,28,29]. However, these studies focused on either the local detection at sensors or the information transmission from sensors to the FC. Moreover, the vast majority of them did not involve an energy constraint. Therefore, an efficient hybrid solution combining the local decision with the transmission under an energy constraint, along with a mathematic framework of analyzing error performance and optimizing parameters for the developed schemes are selected as the research contents of this paper. The contributions of this paper can be summarized as follows.

(1) In order to enhance the operability of the channel aware flipping method [10] in an energy constrained WSN, a specific energy limit indicator represented by the sensors’ activity probability is taken as the additional design constraint over the perfect secrecy. We call this modified scheme the transmission channel based only (TCBO) secure detection under energy constraint. Then, the simplified log-likelihood ratios (LLR) computed approximately under the low and high signal-to-noise ratio (SNR) conditions are derived. Following that, we obtain asymptotic error probabilities of the ally fusion center (AFC) at the worst and best noise situations with help of the central limit theorem (CLT). Next, the optimization problems with the perfect secrecy and energy constraint are established to find three comparison thresholds used in the randomly flipping operation. After simplifying the optimization target functions, the optimal thresholds are discussed and achieved. The above framework for error probability analysis and parameters optimization will also be taken as the mathematic approach in our newly designed scheme to solve for the main parameters.

(2) Considering local detection performance also affects the decision fusion evidently, we combine the local observation quality with the transmission channel information to design a more efficient hybrid scheme. Here, the energy constraint is satisfied by censoring the sensor with a less informative local LLR and transmission security is guaranteed through randomly flipping the local decisions based on the estimated channel gains. This innovative scheme is called the joint local decision and wireless transmission (JLDWT) scheme. Then, following the mathematic framework given by the first work, two local detection thresholds and one flipping comparison threshold are optimized to minimize the AFC’s error rates, besides, satisfy the perfect secrecy condition and the energy limitation.

(3) At last, through an overall simulation from diffident perspectives, the above two schemes are evaluated in a practical wireless transmission environment. The simulation results demonstrate that the new proposed hybrid scheme can improve the error performance of the AFC under a relatively high SNR transmission environment with a more severe energy constraint, as well as, maintain the perfect secrecy.

The rest of the paper is organized as follows: an overview of related work is discussed in Section 2. Section 3 describes the system model. The TCBO and JLDWT schemes are presented in Section 4 and Section 5, respectively. The simulation results are discussed in Section 6. Section 7 concludes the paper.

2. Related Work

In this section, we summarize the related work about physical layer security suitable for the IoT. The communication network consisting of controllers and actuators and the sensor network composed of sensors and controllers are two main subsystems of an abstracted IoT network [2]. The physical layer security solutions possibly available for both subsystems will be presented in the following text.

In the communication network of the IoT, the controllers are the signal transmitters, which could be equipped with multiple antennas and an adequate energy supply. Then, some of the classical secure schemes at physical layer proposed for the downlink in LTE-Advanced network may be usable [30,31,32,33,34,35,36,37,38,39]. When the main channel (the transmitter to legitimate receiver channel) and the eavesdropper channel are perfectly known, the beamforming (precoding) techniques can be adopted to maximize the signal quality difference between the destination and the eavesdropper by strengthening or weakening signals in certain dimensions. For the scenario of multiple-input, single-output and multi-antenna eavesdropper (MISOME) with a single legitimate receiver, the optimal beamforming vector is the generalized eigenvector corresponding to the largest generalized eigenvalue of the receiver and the eavesdropper channel covariance matrice [30]. While, under the multiple-input, multiple-output and multi-antenna eavesdropper (MIMOME) scenario, the search for the optimal precoder with a total power constraint has a non-convex form and the solution can be found numerically. If the power covariance constraint is considered, a closed form solution based on the generalized eigenvalue decomposition (GEVD) can be obtained [31]. As for the case of multiple receivers and eavesdroppers, the achievable secrecy rates can be used to build optimization problems to find a secrecy beamformer or precoder [32], further, a simpler but less effective design can be achieved using the channel inversion technique [33]. In addition, when the eavesdropper’s CSI is unknown, emitting artificial noise (AN) is helpful to prevent the eavesdropper from getting a good channel. The AN is often added in the null space of the main channel with single destination and eavesdropper [34]. While, for the case with multiple receivers and eavesdroppers, the AN would be placed in the null space of the effective channels of all receivers [35]. Since AN may reduce the transmission power of the useful data, power allocation between data and AN should be examined to ensure good performance under secrecy constraint [36]. Another novel strategy to degrade the eavesdropper’s channel quality is based on noise aggregation [40,41], where two adjacent timeslots are bounded to transmit two packets and the transmitter performs bitwise exclusive-or (XOR) operation on the even packet with previous odd one. Because the legitimate receiver can detect the packets in odd slots correctly by an ARQ protocol while eavesdropper may only have a noisy observation, the channel noise in odd slots is aggregated to even slots [41]. Obviously, many of the above security schemes are difficult to be directly employed in an IoT setting, because the accurate legitimate channel state information at the transmitter (CSIT) is difficult to acquire for the channel training opportunities are limited and the high rate feedback channels are lack in the IoT. Moreover, the eavesdropper CSIT is more difficult to yield since eavesdroppers remain completely passive. As for the AN based methods are also not desirable due to their higher energy expenditure [2].

In addition, a variety of physical layer security solutions have been proposed in literature for the distributed detection in sensor networks. With the assumption that the eavesdropping fusion center (EFC) can only distinguish busy-idle state of sensor’s transmission, an optimal sensor censoring scheme with a perfect secrecy and energy constraint was given in [8]. But the processing capability of the EFC was too limited. Another category of effective scheme is the probabilistic ciphering based one, where the sensor’s observation is randomly mapped to a set of quantization levels according to an optimal mapping probabilities matrix [9,24,25]. However, the security is assured by assuming the EFC being completely ignorant about the mapping probabilities. Moreover, the crucial energy efficient issue was not discussed. In [26,27], the optimal local quantizer was examined through minimizing the detection cost at the AFC meanwhile satisfying the constraints to the EFC detection cost or error performance, but the energy consumption problem was not concerned, either. In addition, all of the above solutions were not evaluated over a practical wireless channel and the effect of the transmission channel on their security was not discussed. Afterwards, a category of channel aware encryption method was proposed to realize the perfect secrecy from the EFC, including the type-based multiple access scheme proposed in [23] and the channel-based bit flipping scheme designed in [10], where not the accurate channel coefficients were needed, but only the channel gains had to be estimated using the pilot signal from the AFC. In channel aware encryption, the good energy efficiency could be realized through introducing the dormant sensors. The inherent significant difference of the wireless channels for the EFC and the AFC was explored to achieve the perfect secrecy of the sensor’s information transmission, due to the channels from sensors to the EFC and the AFC are independent of each other. Especially, the channel-based randomly flipping method is very suitable for the distributed detection due to its low complexity, good scalability and less limitation on the EFC. However, the work in [10] did not give an efficient solution to optimize three comparison thresholds. In addition, when the sleeping sensor was chosen, the channel gain was taken as the only metric while the local decision quality was not concerned although it may induce more important influence on the fusion performance. In addition, AN based mechanisms that let a part of sensors or the AFC transmit the jamming signal to degrade the SINR of the EFC were also introduced to the sensor network [28,29]. However, the performance of the AFC would also be reduced when the jamming signal worsens the EFC channel [29] or the external energy would be spent by the AFC to interfere the EFC [28]. Based on the above drawbacks of the previous works, we propose the secure and energy efficient JLDWT scheme, which is a hybrid method combing the local detection and the wireless transmission, after designing an analysis framework to complete the performance analysis and thresholds optimization of TCBO scheme.

3. System Model

In this section, the concerned IoT sensor network scenario is given. The local detection and the transmission scheme of local decisions from the sensors to the fusion center are introduced.

3.1. IoT Sensor Network

Consider a sensor network in IoT system illustrated by Figure 1, which performs distributed detection for a binary hypothesis test of θ0 against θ1. A number of sensors are distributed near the physical system to detect a binary target state and transmit their local decision results to an AFC through a wireless parallel access channel (PAC). Meanwhile, a passive EFC overhears the communications between the sensors and AFC and also attempts to detect the state of θ. The channels from sensors to the AFC and the EFC are called the main and eavesdropping channels, respectively. Moreover, the concerned sensor network is energy-constrained for the power supplies of the sensors are usually severely constrained. Obviously, the security and energy saving are the main challenges faced by our senor network. Therefore, in each local decision reporting slot, some sensors will keep dormant to meet the energy constraint and some sensors among the active ones will transmit the bit-flipping version of local detection results to make the EFC confused.

Figure 1.

Figure 1

IoT sensor network with the ally fusion center and eavesdropping fusion center.

In Figure 1, the sensors with the indices in the sets of {i1,i2,,iKN}, {j1,j2,,jKF} and {k1,k2,,kKD} are included in the non-flipping group, flipping group and the dormant group, respectively. Thus, the total number of sensors in the network is K=KF+KD+KN. In addition, the observation to the physical system of the k-th sensor is denoted by xk. The communication channels from sensors to the AFC and the EFC are represented by hkA and hkE, respectively. And they are assumed to be independent and identically distributed (i.i.d.) Rayleigh block fading channels. Moreover, a transmission probability or an activation probability β, which is proportional to the per-sensor energy consumption, is introduced to represent the energy constraint.

3.2. Local Detection of Sensors

For the k-th sensor, the acquired observation corrupted by additive noise is modeled as:

θ0:xk=wkθ1:xk=θ+wk (1)

where wk is an i.i.d zero-mean Gaussian random variable with variance σ2, i.e., wkN(0,σ2). Thus the SNR of local detection can be computed and denoted by snrL=θ2/σ2. Based on the observation, the sensor makes a one-bit local decision bk{0,1} to indicate the absence or presence of θ by using the Bayesian detection criteria:

f(θ1xk)f(θ0xk)>bk=1λU<bk=0λL (2)

where f(θixk) is the posterior probability distribution function (PDF) of θi based on xk for i=0,1. The main difference of Equation (2) from the traditional Bayesian detection is that two rather than one local decision thresholds are set here. λU and λL, which meet 0<λLλU<, are the upper and lower thresholds and assumed to be identical at all the sensors. If the ratio of the posterior probability distribution lies inside the region of [λL,λU], it means that the observation appears less informative for discriminating between θ0 and θ1, so the corresponding decision result is more likely to be false. As for such kind of sensors, it is better to keep them silent for energy efficiency. Of course, this is the basic idea of the sensor censoring technique [8,42]. However, in this paper, we adopt it to realize the energy saving for the secure transmission of sensors and the details are described in Section 5.

The prior probabilities of θ0 and θ1 are assumed to be q0 and q1, respectively. Then the Equation (2) can be transformed into:

λk=f(xkθ1)f(xkθ0)>bk=1λU(q0/q1)<bk=0λL(q0/q1) (3)

where f(xkθi) is the conditional PDF of xk under the hypothesis θi, and λk is the likelihood ratio (LR). From Equation (1), it can be obtained that

f(xkθ1)=exp[(xkθ)2/2σ2]2πσf(xkθ0)=exp[(xk)2/2σ2]2πσ (4)

Furthermore, the log-likelihood ratio (LLR) can be written as

ΛkL=log(λk)=θσ2xkθ22σ2 (5)

Combining Equations (4) and (5), it can be easily derived that the conditional PDFs of ΛkL are

f(ΛkLθ1)=12π·snrLexp(ΛkLsnrL/2)22·snrLf(ΛkLθ0)=12π·snrLexp(ΛkL+snrL/2)22·snrL (6)

Furthermore, we can obtain that the equation f(ΛkLθ1)/f(ΛkLθ0)=exp(ΛkL) is satisfied and this is the nesting property of the LR.

There are four possible cases for local detection, namely correct decisions under two states, missed detection and false alarm. Based on Equations (3) and (6), we can calculate the probabilities of four cases and obtain

Pd=log(λU·q0/q1)fΛkL|θ1dΛkL=Qlog(λU·q0/q1)snrL/2snrLPm=log(λL·q0/q1)fΛkL|θ1dΛkL=1Qlog(λL·q0/q1)snrL/2snrLPf=log(λU·q0/q1)+fΛkL|θ0dΛkL=Qlog(λU·q0/q1)+snrL/2snrLP0d=log(λL·q0/q1)fΛkL|θ0dΛkL=1Qlog(λL·q0/q1)+snrL/2snrL (7)

where P0d is the probability of correct detection under θ being non-existent and Q(x)=1/2πxexp(t2/2)dt. In addition, the error probability of local detection for each sensor can be defined as PEL=q0Pf+q1Pm. If we set λU=λL=λ, this error probability can be given by

PEL=q0Qlog(λ·q0/q1)+snrL/2snrL+q11Qlog(λ·q0/q1)snrL/2snrL (8)

Furthermore, the first-order derivation of PEL with respect to λ is

dPELdλ=lλ·2snrLexp[log(λ·q0/q1)]2+(snrL)2/42snrL·q1πexp[log(λ·q0/q1)2]q0πexp[log(λ·q0/q1)2] (9)

Through letting dPELdλ=0, it can be obtained that the optimized λ* meeting 0<λ< to minimize PEL is λ*=1.

3.3. Transmission of Local Decisions from Sensors to FC

After the local decisions are achieved, the sensors would deliver them to the AFC. In this paper, a wireless PAC between the sensors and the AFC is considered and the transmission channels from different sensors to the fusion center are orthogonal. However, the sensors’ transmissions are overheard by the EFC, who also wishes to detect the target state. From the literature [2,7,9], we have seen that the stochastic ciphering could be employed to protect the information of the sensors from the EFC efficiently, since each sensor would flip its decision randomly and the EFC would be confused when it was ignorant about the flipping probability (i.e., the encryption key). However, the key exchange between the AFC and the sensor itself may be not secure from the EFC. In this case, the channel-aware stochastic cipher [10], whose seeds are based on the randomness of the transmission channels, are preferable. Because the channels to the AFC and the EFC from a sensor are independent, it is impossible for the EFC to deterministically know the flipping action of a sensor based on the main channel gain. Thus, the formation leaked to the EFC reduces, although the flipping probability is completely known by the EFC. Therefore, the channel-based stochastic ciphering is still adopted by us to realize the secure transmission of local decisions from sensors to the AFC.

In order to sense the channel information, the sensors would firstly receive the known pilot signal from the AFC, as well as three thresholds for comparison. Then the estimated channel gain would be compared with the thresholds to determine which action should be selected by a sensor. The sensor may report an unaltered local decision, a “flipped” decision, or stay dormant to satisfy the energy constraint.

Assume the main channel and the eavesdropping channel both follow the Rayleigh distribution with unit power, i.e., f(h)=2hexp(h2) and h[0,), which is usually considered in existing studies [10,23,42]. Assume the pilot signal is so strong that the sensors can obtain the exact channel gains. Basing on the channel reciprocity, the sensors’ estimated channel gains can be used to indicate the sensor-to-AFC channels. Moreover, they are unknown by the EFC due to the statistical independence of the main channel and the eavesdropping channel. The thresholds broadcasted by the AFC are {t1,t2,t3} with 0t3t2t1<. Thus, the secure transmission strategy with energy limitation is that, sensor k reports its original local decision if hkA>t1, reports a bit-flipping decision if t3hkAt2 and stays silent for energy efficiency otherwise. From the security analysis given in [10], we can see that the condition for perfect secrecy is λ1=deft1f(hkA)dhkA=t3t2f(hkA)dhkA=defλ2. Obviously, to meet the energy constraint of network, the inequality of λ1+λ2β should also be held. Moreover, the case with a single “no-send” region is concerned in this paper. That is to say either t3=0 or t1=t2, which is illustrated in Figure 2.

Figure 2.

Figure 2

Single “No-send” region: (a) Case of t3=0; (b) Case of t1=t2.

4. Transmission Channel Based Only Secure Detection under Energy Constraint

In [10], the authors designed a confidential and energy efficient distributed detection method, called channel aware encryption, only from the view of the wireless transmission between sensors and the fusion center. And the condition for perfect secrecy was derived. Moreover, the LLR based decision fusion was studied, further, a simplified decision fusion rule in high SNR region was given. However, the more detailed analysis about the error probability of decision fusion and the optimization of thresholds were absent. In this section, we will analyze the error performance of the AFC based on the approximated LLRs derived under low and high SNR conditions, respectively. Afterwards, three thresholds will be optimized to minimize the probability of error at the AFC while ensuring the perfect secrecy from the EFC and satisfying the energy constraint. It should be noted that a specified energy constraint of β1 is introduced by us. And the adjusted scheme is called the TCBO secure detection under energy constraint in our paper.

4.1. Approximation of LLR and Error Probabilities of FC

For the secure scheme only basing on transmission channels, the confidentiality from the eavesdropper and the energy saving are both provided by the reporting strategy of local decisions. Thus, the thresholds used in the local detection are set as λL=λU=λ* to optimize the sensor’s local performance. Then, we have Pm=1Pd and P0d=1Pf. In addition, the common binary phase shift keying (BPSK) modulation is utilized by each sensor to deliver its one-bit decision. At the fusion center, the LLR based fusion rule is used and the transmission channel information is unknown. In addition, it is assumed that the fusion rules and the Prior information at the EFC are identical with those at the AFC and this is a worst case from the view of security.

The received signals at the AFC and EFC from sensor k are denoted as ykA and ykE, respectively. They can be described as

ykA=hkAxk+nkAykE=hkExk+nkE (10)

where nkAN(0,δA2) and nkEN(0,δE2). Thus, the transmission channel SNR for the AFC and EFC can be written as SNRA=hkAxk2/δA2 and SNRE=hkExk2/δE2, respectively. Following the channel-aware flipping rule, we have xk=2bk1 for hkA>t1, xk=2b¯k1 for t3hkAt2 and xk=0 for other hkA. The LLR at the AFC can be expressed in terms of yA=[y1A,y2A,...,yKA] as

ΛA=1KlogfyA|θ1fyA|θ0=(a)1Kk=1KlogfykA|θ1fykA|θ0 (11)

where (a) is due to the independence of different ykA and fykA|θi denotes the likelihood function of sensor k for the hypothesis θi. For the Bayesian setup, the optimal decision rule can be given by ΛA<θ1>θ0 log(q0/q1).

By using the similar derivation method in Section IV of [10], it can be achieved

fykA|θi=Pbk=1|θiΦt1,,1,ykA,δA2+Φt3,t2,1,ykA,δA2+Pbk=0|θiΦt1,,1,ykA,δA2+Φt3,t2,1,ykA,δA2+Φ0,t3,0,ykA,δA2+Φt2,t1,0,ykA,δA2 (12)

where

Φta,tb,xk,ykA,δA2=tatbf(ykA|hkA,xk)f(hkA)dhkA=tatb12πδAexpykAhkAxk22δA22hkAexp(hkA2)dhkA (13)

Note that the LLR based on Equation (12) requires numerical integrations. It is greatly unfavorable to the performance analysis of decision fusion and the optimization of comparison thresholds. Therefore, the approximations of LLR under low SNR and high SNR scenarios would be examined. Moreover, the error probabilities based on these approximations would be analyzed in follows.

4.1.1. Approximation of LLR and Error Performance under Low SNR

As the channel noise variance δA2, we can get

Φta,tb,xk,ykA,δA2N(ykA,δA2){exp(ta2)exp(tb2)+ykAxkδA2[taexp(ta2)tbexp(tb2)+tatbexp(h2)dh]} (14)

where N(ykA,δA2)=1/(2πδA)exp[ykA2/(2δA2)]. The detailed derivation of Equation (14) is given in the Appendix A. Applying Equation (14) to Equation (12), it can be obtained that

fykA|θ1=N(ykA,δA2)·{[Φt1,,1,ykA,δA2+Φt3,t2,1,ykA,δA2+Φ0,t3,0,ykA,δA2+Φt2,t1,0,ykA,δA2]+Pd[Φt1,,1,ykA,δA2Φt1,,1,ykA,δA2+Φt3,t2,1,ykA,δA2Φt3,t2,1,ykA,δA2]}N(ykA,δA2){1+ykAδA2mt1nt3,t2(2Pd1)} (15)
fykA|θ0=N(ykA,δA2){1+ykAδA2mt1nt3,t2(2Pf1)} (16)

where

mt1=t1exp(t12)+t1exp(h2)dhnt3,t2=t3exp(t32)t2exp(t22)+t3t2exp(h2)dh (17)

From Equations (15) and (16), we achieve

ΛkA=logfykA|θ1fykA|θ0=log[1+fykA|θ1fykA|θ0fykA|θ0]log{1+2(PdPf)ykAδA2[mt1nt3,t2]1+(2Pf1)ykAδA2[mt1nt3,t2]} (18)

Following the assumption of δA2 and the fact that log(1+x)x with x closing to zero, we can further reduce Equation (18) to

ΛkA2(PdPf)[mt1nt3,t2]δA2ykA=Γ(λ*,t3,t2,t1)·ykA (19)

From Equation (19), we can see that the calculation of LLR can be simplified significantly for large noise variance. Note that the formulas from Equation (11) to Equation (19) are also available for the EFC provided it has the same prior information as the AFC. The only variation is the different received signal ykE from ykA.

Since ykA is independent from each other, ΛA=1Kk=1KΛkA can be taken as the average of K i.i.d. random variables. Then, invoking the central limit theorem [9,23], we can deem that the statistic of ΛA converges to a normal distribution for a large K. That is ΛA|θiN(μAk|θi,γAk2|θiK), where μAk|θi and γAk2|θi are the mean and variance of ΛkA conditioned on θi, respectively. And they are directly related with the mean and the variance of ykA, which can be seen from Equation (19). Next, our target is to calculate EykA|θi and VarykA|θi.

Utilizing Equation (15), we can write

EykA|θ1=+ykAfykA|θ1dykA+ykAN(ykA,δA2)dykA+[mt1nt3,t2](2Pd1)δA2+ykA2N(ykA,δA2)dykA=(a)[mt1nt3,t2](2Pd1) (20)
EykA|θ0=[mt1nt3,t2](2Pf1) (21)

where (a) is due to +ykAN(ykA,δA2)dykA=0 and +ykA2N(ykA,δA2)dykA=δA2, whose derivations are described in Appendix B.

In order to obtain VarykA|θi, we firstly calculate

E(ykA)2|θ1=+ykA2fykA|θ1dykA+ykA2N(ykA,δA2)dykA+2Pd1δA2mt1nt3,t2+ykA3N(ykA,δA2)dykA=(a)δA2 (22)

where (a) follows the fact of +ykA3N(ykA,δA2)dykA=0 verified also in Appendix B. Obviously, E(ykA)2|θ0=δA2. Then VarykA|θi can be achieved through VarykA|θi=E(ykA)2|θiE2ykA|θi.

Combing Equations (19)∼(22), along with the Bayesian decision rule, we can yield the error probability for the AFC as follows:

PeA=q0PΛAlog(q0/q1)θ0+q1PΛA<log(q0/q1)θ1=q0Qlog(q0/q1)Γ(λ*,t3,t2,t1)EykA|θ0Γ2(λ*,t3,t2,t1)δA2E2ykA|θ0/K+q11Qlog(q0/q1)Γ(λ*,t3,t2,t1)EykA|θ1Γ2(λ*,t3,t2,t1)δA2E2ykA|θ1/K (23)

Clearly, the error probability for large δA2 has been expressed as a function of some specific parameters, namely λ*,t3,t2,t1 and δA2. In Section 4.2, this asymptotic error probability would be taken as the optimization objection for finding the optimal comparison thresholds.

4.1.2. Approximation of LLR and Error Performance under High SNR

Considering the high SNR scenario, i.e., δA20, we derive a simplified LLR referring to the idea of [10]. Assume the FC can estimate the instantaneous sensor-to-FC channel gain as h^kA=ykA since ykAhkAxk and xk=1 except under the dormant case. Then, a simple hard decision rule determining which one a received signal ykA comes from among three groups can be realized. A hard decision threshold th is selected to satisfy τ3thfhkAdhkA=thfhkAdhkA. Thus, the following conditional probability can reduce to

pxk|bk=δxk,(2bk1)h^kAthδxk,(2bk1)h^kA<th (24)

where δx,b is the Kronecker delta function. Thus, the likelihood function fykA|θi can be calculated as

fykA|θi=bkpbk|θixkfykA|xk,h^kApxk|bk=pbk=1|θifykA|xk=1,h^kA+pbk=0|θifykA|xk=1,h^kA,h^kAthpbk=1|θifykA|xk=1,h^kA+pbk=0|θifykA|xk=1,h^kA,h^kA<th (25)

Further derivation whose detail is provided in Appendix C gives that

ΛkA=0,ykA=0logPdPf,h^kAthykA>0log1Pd1Pf,h^kAthykA<0log1Pd1Pf,h^kA<thykA>0logPdPf,h^kA<thykA<0 (26)

Replacing ykA and h^kA with ykE and h^kE in Equation (26), the simplified LLR under high SNR for the EFC is got.

In order to yield the error probability, the mean and variance of ΛkA are needed when the CLT is still used. Because hkA0, we have ykA>0 is equivalent to xk=1 and ykA<0 corresponds to xk=1. Further, with the assumption of hkAh^kA, it can be derived

EΛkA|θ1=λ1+λ2[PdlogPdPf+1Pdlog1Pd1Pf]EΛkA|θ0=λ1+λ2[PflogPdPf+1Pflog1Pd1Pf] (27)
E[ΛkA2|θ1]=λ1+λ2[Pd(logPdPf)2+1Pd(log1Pd1Pf)2]E[ΛkA2|θ0]=λ1+λ2[Pf(logPdPf)2+(1Pf)(log1Pd1Pf)2] (28)

The derivations of Equations (27) and (28) are referred to Appendix D. Moreover, applying Equations (27) and (28) to calculate the error probability obtains

PeA=q0Qlog(q0/q1)E(ΛkA|θ0)E[(ΛkA)2|θ0]E2(ΛkA|θ0)/K+q1[1Qlog(q0/q1)E(ΛkA|θ1)E[(ΛkA)2|θ1]E2(ΛkA|θ1)/K] (29)

4.2. Optimization of Comparison Thresholds

In Section 4.1, the asymptotic error probabilities at the AFC for extremely low and high SNR scenarios are obtained. They would be taken as the utility function for optimizing t3,t2 and t1 in this section. Our design target is to minimize the error probability of the AFC while satisfying the constraints of perfect secrecy and energy limitation. This problem can be stated as follows:

P0:mint3,t2,t1PeAsubjectto:λ1=λ2λ1+λ2β (30)

where the first constraint is the perfect secrecy condition to make the EFC totally be confused [10]. The second inequality constraint is to guarantee the specified energy efficiency.

Observing the Equations (23) and (29), we find that the numerical integration is included in PeA and the variables to be optimized exist in the integral limits in a complicated form. These raise the difficulty to solve the problem. The utility function should be simplified.

Fortunately, it can be seen that PeA decreases with E(ΛkA|θ1) and increases with E(ΛkA|θ0) since the impact of the variance of ΛkA can be ignored compared with its mean for a large K. Therefore, E(ΛkA|θ1)E(ΛkA|θ0) can be used to replace the cost function in P0. The same idea was used in [9] to find the optimal encryption matrix. Thus, the optimization problem under the case of low SNR is given by

P1:maxt3,t2,t1Γ(λ*,t3,t2,t1)EykA|θ1EykA|θ0subjectto:λ1=λ2λ1+λ2β (31)

From Equations (19)∼(21), we achieve

Γ(λ*,t3,t2,t1)EykA|θ1EykA|θ0=4(PdPf)2δA2[mt1nt3,t2]2 (32)

Because the first item of the right side in Equation (32) is independent on the variables to be optimized, the final object is to maximize D(t3,t2,t1)=mt1nt3,t2 while keep λ1=λ2 and λ1+λ2β. Moreover, according to the Rayleigh distribution function, we have

λ1=expt12andλ2=expt32expt22 (33)

Now, in order to determine three appropriate thresholds, we should discuss the relationship of the target function D(t3,t2,t1) and the actual energy consumption indicator, i.e., α=λ1+λ2. Taking the D(t3,t2,t1) as a function of α, we can derive that

δD(α)=dD(α)dα=t1t22,t3=0t1t3,t1=t2 (34)

The detail of the calculation process for Equation (34) is shown in Appendix E.

From Equation (34), it can be easily seen that δD(α)0 for both cases of t3=0 and t1=t2 due to the fact 0t3t2t1<. This results in that D(t3,t2,t1) is strictly increasing with α. In particular, we can get D(t3,t2,t1)=0 for α=0. Thus, there is D(t3,t2,t1)0 at the whole range of α[0,1] and then the absolute calculation in the target function can be omitted. The above analysis contributes to that the equality (i.e., λ1+λ2=β) should be selected in the second constraint to maximize the cost function in Problem P1.

Moreover, we also find from Equation (34) that, with α1, there is δD(α)0 for t3=0, while δD(α)t1 for t1=t2. This finding further tells us D(t3,t2,t1) will decrease faster for t1=t2 than for t3=0 when α reduces from 1. Then, from the view of network robustness, choosing t3=0 is preferred and this result will also be confirmed by the simulations given in Section 6.

Summarizing the above analysis can directly obtain the optimized thresholds given by

t1=log(2/β),t2=log[2/(2β)],t3=0 (35)

Now, let’s come to the case of high SNR. Referring to the analyzing methods for the low SNR, the following optimization problem is established

P2:maxt3,t2,t1EΛkA|θ1EΛkA|θ0subjectto:λ1=λ2λ1+λ2β (36)

Applying Equation (27) yields

EΛkA|θ1EΛkA|θ0=λ1+λ2PdPflogPd1PfPf1Pd (37)

Obviously, the cost function is strictly increasing with λ1+λ2, since the local detection probability is always larger than the false alarm probability in practice so the item PdPflogPd1PfPf1Pd is larger than zero. Thus, we should also choose λ1+λ2=β. However, which is better between t1=t2 and t3=0 could not be determined from Equation (37). Actually, they have the identical detection performances for the extreme case of δA2=0. This phenomenon will be demonstrated in our simulations. Consequently, the thresholds given in Equation (35) should also be used under the high SNR situation.

5. Joint Local Decision and Wireless Transmission Based Secure Detection under Energy Constraint

In TCBO secure detection scheme, in order to meet the energy constraint of network, the sensors whose channel gains fall in the region between t1 and t2 (Consider the case of t3=0.) will keep inactive. Of course, this gap between t1 and t2 can facilitate the AFC to tells the signals from flipping group and non-flipping group to some extent. However, the decision quality of the sensor’s local detection is not considered. That is to say the sensor with an error decision may be permitted to report its detection result to the FC, while the one with a correct decision perhaps is forbidden. We think this phenomenon maybe worsen the performance of decision fusion .

Therefore, we propose to select the dormant sensor basing on its local decision quality that can be quantified by the local Log-Likelihood Ratio ΛkL. Sensors with very small or very large LLR will send data to the fusion center, while the others stay silent to save energy. Obviously, this is the core idea of censoring sensor technique [8,11]. In particular, a perfectly secure distributed detection scheme with censoring sensors was given in [8]. But a comparatively ideal assumption was set that the EFC had no access to the data from sensors and only monitored the transmission activity of sensors. Moreover, the strategy in [8] did not consider the effect of the wireless transmission between the sensors and the fusion center on the reliability and security, so its applicability was limited. Basing on the above considerations, a joint local decision and wireless transmission based scheme for secure distributed detection with energy constraint is proposed in this section.

The JLDWT method is performed as follows: each sensor first calculates the local ΛkL and compares it with two local decision thresholds. If ΛkL locates between log(λL·q0/q1) and log(λU·q0/q1), it will stay inactive in current report timeslot for it appears less informative to make a correct decision about the target state. Otherwise, the sensor will make a 1bit-decision regarding the state of the hypothesis and then deliver it to the FC over a wireless PAC. While, in order to keep secret from the eavesdropping FC, the active sensor still should encrypt its local decision by randomly flipping it before transmitting. A single comparison threshold t0 is used here instead of tree thresholds in TCBO scheme. If the sensor has the channel gain satisfying >hkAt0, it is involved in the non-flipping group. Otherwise, it is chosen to be in the flipping group. At the fusion center, the LLR based fusion rule is still used. Three thresholds, namely log(λL·q0/q1), log(λU·q0/q1) and t0, along with the encryption scheme at the sensors are assumed to be known by both the AFC and EFC.

5.1. Security Analysis

Now the condition of perfect secrecy in JLDWT scheme will be derived. Our analysis begins with the conditional likelihood function of the k-th sensor calculated by the EFC, which is given by

fykE|θi=bkxk0fykE,hkA,xk,bk|θidhkA=bkxk0fykE,hkA,xk|bk,θipbk|θidhkA=bkpbk|θixk0fykE|hkA,xk,bk,θifhkA,xk|bk,θidhkA=(a)bkpbk|θixkfykE|xk0fhkApxk|bkdhkA=(b)pbk=1|θifykE|xk=1t0+fhkAdhkA+fykE|xk=10t0fhkAdhkA+pbk=0|θifykE|xk=1t0+fhkAdhkA+fykE|xk=10t0fhkAdhkA+pbk=null|θifykE|xk=00+fhkAdhkA (38)

where (a) is valid as θibkxkykE forms a Markov chain and hkA is uncorrelated with ykE, xk and θi. And (b) follows the fact that pxk=1|bk=1=1 and pxk=1|bk=0=1 for hkAt0, while pxk=1|bk=1=1 and pxk=1|bk=0=1 for hkA<t0. In addition, bk=null corresponds to the sensor’s dormant state and xk=0 accordingly. Furthermore, define λ=deft0f(hkA)dhkA and we can easily yield

fykE|θ1=PdfykE|xk=1λ+fykE|xk=11λ+PmfykE|xk=1λ+fykE|xk=11λ+1PdPmfykE|xk=0fykE|θ0=PffykE|xk=1λ+fykE|xk=11λ+P0dfykE|xk=1λ+fykE|xk=11λ+1PfP0dfykE|xk=0 (39)

To achieve perfect secrecy, two likelihood function fykE|θ1 and fykE|θ0 should be identical [10]. Then we can establish the following group of equations based on Equation (39).

1PdPm=1PfP0dPdλ+Pm1λ=Pfλ+P0d1λPmλ+Pd1λ=P0dλ+Pf1λ (40)

Through simply computing, we obtain the perfect secrecy condition given by

λ=1/2andPd+Pm=Pf+P0d (41)

The first condition in Equation (41) directly results in t0=log(2). And the second condition means that the activation probability under the hypothesis θ1, indicated by β1=Pd+Pm, equates to the activation probability under θ0, denoted by β2=Pf+P0d. Comparing this condition with the perfect secrecy setting given in section II of [8], we find they are identical. Next, our task is to find two suitable thresholds λU and λL used in local Bayesian detection Equation (2) to minimize the error probability at the AFC, meanwhile, meet the perfect security and energy constraint of β1=β2β.

5.2. Optimization of Local Detection Thresholds

Referring to the derivation methods of Equations (12) and (38), we can obtain the conditional likelihood functions at the AFC, which are expressed as

fykA|θ1=PdΦt0,,1,ykA,δA2+Φ0,t0,1,ykA,δA2+PmΦt0,,1,ykA,δA2+Φ0,t0,1,ykA,δA2+1PdPmΦ0,,0,ykA,δA2fykA|θ0=PfΦt0,,1,ykA,δA2+Φ0,t0,1,ykA,δA2+P0dΦt0,,1,ykA,δA2+Φ0,t0,1,ykA,δA2+1PfP0dΦ0,,0,ykA,δA2 (42)

where Φta,tb,xk,ykA,δA2 has the expression of Equation (13).

5.2.1. Optimization of Local Detection Thresholds under Low SNR

Following the deducing process in Section 4.1.1, we can obtain the calculation formula of the error probability under low SNR for AFC, which can be written as

PeA=q0Qlog(q0/q1)Γ(λU,λL,t0)EykA|θ0Γ2(λU,λL,t0)δA2E2ykA|θ0/K+q11Qlog(q0/q1)Γ(λU,λL,t0)EykA|θ1Γ2(λU,λL,t0)δA2E2ykA|θ1/K (43)

where

Γ(λU,λL,t0)=(PdPf)+(P0dPm)δA2[m(t0)n(0,t0)] (44)

In Equation (44), Pd, Pm, P0d and Pd have the expressions given in Equation (7). Further, referring to the optimization problem P1, we build

P3:maxλU,λLΓ(λU,λL,t0)EykA|θ1EykA|θ0subjectto:β1=β2β (45)

where

EykA|θ1=(PdPm)[m(t0)n(0,t0)]EykA|θ0=(PfP0d)[m(t0)n(0,t0)] (46)

Applying Equation (46) to Equation (45), it can be achieved the rewritten object function is [(PdPf)+(P0dPm)]2· [m(t0)n(0,t0)]2/δA2. Due to [m(t0)n(0,t0)]2/δA2 being independent on the variables to be optimized, the final target function can reduce to

O(β1)=(PdPf)+(P0dPm) (47)

In addition, because the probability of correct detection is always larger than the incorrect one in practice, we have O(β1)0. Moreover, the condition β1=β2 contributes to (PdPf)=(P0dPm), and then O(β1)=2(PdPf).

First of all, we should find a good β1 that meets the constraint in Equation (45) to maximize O(β1). Combining Equations (7) and (47), we have

O(β1)=2log[λU(β1)·q0/q1][fΛkL|θ1fΛkL|θ0]dΛkL (48)

Let’s first focus on the following function:

D(λ)=Deflog(λq0/q1)[fΛkL|θ1fΛkL|θ0]dΛkL (49)

Applying the condition (PdPf)=(P0dPm), we can get the result of D(λU)=D(λL), which is derived in detail in Appendix F. Substituting Equation (6) into Equation (49), it can be obtained

Dλ=12πsnrL{log(λq0/q1)+exp[ΛkLsnrL/22/(2snrL)]dΛkLlog(λq0/q1)+exp[ΛkL+snrL/22/(2snrL)]dΛkL}=12{erf([log(λq0q1)+snrL/2]/2snrL)erf([log(λq0q1)snrL/2]/2snrL)} (50)

where the error function erf(x)=2π0xexp(η2)dη. Due to erf(x)=2πexp(x2), we further get

dDλdλ=1λ2πsnrL(exp{[log(λq0/q1)+snrL/2]2/2snrL}exp{[log(λq0/q1)snrL/2]2/2snrL}) (51)

Through setting dDλdλ=0, we can find three extreme points

λ=0,λ=andλ=q1/q0 (52)

Substituting them into Equation (50), we have

Dλ=0=0,Dλ==0andDλ=q1/q0=erf(snrL8) (53)

Based on Equation (53), we can draw a notional curve of Dλ as in Figure 3.

Figure 3.

Figure 3

Diagram of the function Dλ.

From Figure 3, we can see that there are two thresholds corresponding to one value of Dλ, further, this Dλ actually maps to a single β1. When β1=1, two thresholds overlap at a point of λ=q1/q0 and Dλ has the maximum value. While β1 decreases, we know that λU moves towards and λL approaches zero further. Thus, from Figure 3, we can see that the corresponding Dλ reduces. That is to say a larger β1 is preferred in order to get a higher Dλ.

Moreover, the reduced target function for P3 can be written as O(β1)=2DλU(β1). Therefore, β1=β should be chosen to achieve the maximum O(β1), along with the optimal performance of AFC, and the corresponding pair of thresholds are the optimal thresholds to be found. However, the expressions in Equations (7) and (49) are so complex that a closed-form expression of λL(β) and λU(β) couldn’t be obtained. In this situation, a pre-calculated table corresponding to each snrL could be used to get the required λL(β) and λU(β), just as the processing method in our simulations.

5.2.2. Optimization of Local Detection Thresholds under High SNR

For the very high SNR scenario, the analysis methods in Section 4.1.2 are consulted. Firstly, the simplified LLR similar as Equation (26) are obtained, which is given by

ΛkA=0,ykA=0logPdPf,h^kAthykA>0logPmP0d,h^kAthykA<0logPmP0d,h^kA<thykA>0logPdPf,h^kA<thykA<0 (54)

where th is set as t0. Referring to the derivation of Equation (27), it is achieved that

EΛkA|θ1=PdlogPdPf+PmlogPmP0dEΛkA|θ0=PflogPdPf+P0dlogPmP0d (55)

Then the design problem is built as

P4:maxλu,λlEΛkA|θ1EΛkA|θ0subjectto:β1=β2β (56)

Here, the object function can be written as OλL,λU=PdPflogPdPf·logP0dPm. Because PdPf=P0dPm, maximizing PdPf could also make logPdPf and logP0dPm largest. Therefore, the object function in Equation (56) can be transformed into PdPf, so Problem P4 is equivalent to Problem P3 and they have the identical optimization results.

6. Simulation Results and Discussions

In this section, simulation results are presented to evaluate the TCBO and the proposed JLDWT schemes in a sensor network of IoT. Their error probabilities are compared from various perfectives, including with the changing of transmission channel SNR, energy constraint and local detection SNR. The performance of a degraded form of the JLDWT scheme, where the random flipping is not included, is also given to represent the performance of secure detection designed in [8] over a practical rather than an idea wireless PAC.

6.1. Simulation Settings

A wireless sensor network with K sensors is modeled. The local detection SNR and the transmission channel SNR to fusion center for different sensors are assumed to be identical, as well as, the transmission channel SNR to the AFC and the EFC is also supposed to be equal. In addition, the LLR computation at the EFC is same as the AFC except the received signals from the sensors. Detail simulation parameters are listed in Table 1. Moreover, Table 2 and Table 3 give the specific local decision thresholds corresponding to different energy constraints under snrL=0dB and snrL=5dB, respectively.

Table 1.

Simulation Parameters in Wireless Sensor Network.

Parameters Assumption
Number of sensors 20
Prior probabilities of target states q0=q1=0.5
Transmission channel model Rayleigh distribution with E[h2]=1
Energy constraint β=0.4:0.1:1
Local detection SNR snrL=0,5dB
Transmission channel SNR SNRA=SNRE=12:2:16 dB

Table 2.

Two local decision thresholds λU and λL for snrL=0 dB.

β 0.4 0.5 0.6 0.7 0.8 0.9 1
λU 2.585 2.145 1.810 1.545 1.330 1.155 1.000
λL 0.387 0.466 0.553 0.647 0.752 0.866 1.000

Table 3.

Two local decision thresholds λU and λL for snrL=5 dB.

β 0.4 0.5 0.6 0.7 0.8 0.9 1
λU 8.320 5.595 3.875 2.730 1.945 1.395 1.000
λL 0.120 0.179 0.258 0.366 0.514 0.717 1.000

6.2. Simulation Results for TCBO Scheme

Let’s begin with the performance evaluation for the low SNR scenarios, where the SNR is not larger than 0 dB. From Figure 4, we first notice that the error probabilities for various settings at the EFC all locate around 0.5, which is our expected situation of perfect secrecy. Moreover, it is obvious that the AFC performance for the case of t3=0 expresses better than the case of t1=t2 and there is a gain of about 4 dB obtained by the former one. This may be contributed by two aspects. On one side, the dormant region (or a gap) locates between the flipping and non-flipping group for the case of t3=0 and it is beneficial for the AFC to discriminate between the flipping and non-flipping case, especially with serious noise. On the other side, the flipped decisions also disturb the fusion process at the AFC. For t3=0, the power of received interference is lower since the flipping sensor has the lower channel gain. Thus the interference would have less effect on the fusion decision of the AFC. In addition, the error performances of using the approximated LLR (given in Equation (19)) are almost identical with the ones of using the statistic channel (SC) based LLR (Here, numerical integrations are needed.), particularly during the very low SNR region. This demonstrates the availability of the approximated LLR under low SNR. The theoretic performance calculated by using Equation (23) for t3=0 is also drawn in Figure 4. It can be seen that the simulation result fits the theoretic one well for the SNR lower than −10 dB, and the gap between them becomes larger with the growing of SNR due to the noise variance being farther from the assumption of δA2= included in Equation (23).

Figure 4.

Figure 4

Error probabilities at the AFC and EFC as functions of various SNR for β=0.8 and snrL=5 dB over low SNR region.

Figure 5 shows the performance of TCBO scheme with the SC based LLR varying with β. It can be seen that the error probabilities for t3=0 and t1=t2 are identical with β=1 and they would increase with β reducing from 1. But the increasing of the former one is slower than the latter one, which is correspondent to the analysis about Equation (34) in Section 4.2. Moreover, carefully observing the curves corresponding to t3=0, we find that the error probabilities even rise slowly when we continue improving β and this phenomenon is more obvious for the moderate SNR, for example SNR=0 dB. It is because the reduced gap between the flipping and non-flipping group with a larger β leads to the confusion of the AFC to judge between two groups. It is noted that the confusion is created by the noise of channels. When the noise is very strong (or there is no such gap and the case t1=t2 follows this situation), the confusion always exits, so the more energy consumes and the better performance gets, just as the analytical result under low SNR in Section 4.2. However, with the noise reducing, the confusion disappears when the gap is large (Corresponding to a small β), while it appears when the gap becomes small. Therefore, although the energy consumption increases with β becoming large, the appeared confusion would worsen the performance. Of course, when the noise reduces to zero, the confusion never appears and the error probability will strictly decrease with β. This is the asymptotical analysis result under high SNR in Section 4.2 and also will be seen in the following simulations.

Figure 5.

Figure 5

Error probabilities at the AFC and EFC as functions of various β for snrL=5 dB over low SNR region.

The performance curves of TCBO scheme for the high SNR scenarios, where the SNR is larger than 0 dB, are shown in Figure 6. Obviously, the error probabilities for various simulation conditions at the EFC are all about 0.5 and perfect secrecy is maintained. Moreover, the AFC performance for the case of t3=0 is still better than the one for the case of t1=t2, and the performance gap is about 2 dB. However, we find that the performance loss induced by the approximation of LLR with δA20 (seen in Equation (26)) is obvious. And this loss for t3=0 will decrease with improving SNR, since the noise variance is closer to zero. In fact, the performance loss for t1=t2 will also reduce with the growing of SNR. In particular, this loss will reduce to zero for the extreme case of δA2=0 with two kinds of threshold setting, which can be seen in Figure 7. Therefore, the approximated LLR given in Equation (26) is still usable in terms of the reducing computation complexity, especially under high SNR scenarios.

Figure 6.

Figure 6

Error probabilities at the AFC and EFC as functions of various SNR for β=0.8 and snrL=5 dB over high SNR region.

Figure 7.

Figure 7

Error probabilities at the AFC and EFC as functions of various β for snrL=5 dB over high SNR region.

From the other perspective, Figure 7 draws the error performance varying with β under the high SNR case. It can be seen that the threshold setting of t3=0 demonstrates higher robustness than t1=t2 when the energy constraint is more severe. In addition, for the extreme case that the noise disappears, the error probabilities for various settings converge to an identical value and they decrease strictly as β increases. Because the confusion of the AFC for discriminating between the flipping and non-flipping group does not exist when the noise is absent, the case of t3=0 would be equivalent to the case of t1=t2. Furthermore, the approximated LLR could obtain the similar performance as the SC based LLR.

6.3. Simulation Results for JLDWT Scheme

In this section, the performances of the TCBO and the proposed JLDWT schemes are compared from various perspectives. Figure 8 gives the error probabilities of two schemes for low SNR case. We can see that the JLDWT using the SC based LLR, the JLDWT using the approximated LLR and the TCBO using the SC based LLR have almost identical performance. Because the strong channel noise dominates in low SNR, the JLDWT’s advantage is not shown up. The simplified LLR for low SNR is very effective for maintaining the performance as well as reducing complexity of FC. Furthermore, all these schemes could achieve the perfect secrecy.

Figure 8.

Figure 8

Error probabilities of TCBO and JLDWT schemes as functions of various SNR for β=0.8 and snrL=0 dB over low SNR region.

For comparison, the degraded JLDWT method without random flipping is also evaluated. Concretely, in the degraded JLDWT scheme, each sensor still executes the local detection based on the Bayesian criteria with two local decision thresholds λU and λL keeping β1=β2, while the active sensor will deliver the local 1bit-decision in its original form to the FC no matter what the estimated channel gain is. That is to say the difference of the degraded JLDWT from the JLDWT is that the flipping process is not involved. As comparing it with the secure strategy given in [8], we can easily see that λU and λL used by the degraded JLDWT are identical with the ones used by the scheme in [8], because their optimization targets to find the optimal λU and λL are equivalent and the perfect secrecy constraint conditions are same. Thus, the degraded JLDWT can be seen equivalent to the scheme of [8] except that it is applied under a more realistic scenario considering the wireless transmission and a looser constraint on the EFC ability relative to the case in [8]. From Figure 8, it can be seen that the secrecy from the EFC is totally lost and the EFC has the same performance as the AFC when the secure strategy in [8] is used. That is to say the strategy given in [8] is ineffective if the EFC has the same process capability and the prior information as the AFC. Thus, random flipping is necessary to assure the information confidentiality with the enhanced EFC. Certainly, this information security is exchanged by certain performance loss of the AFC.

As for the case of high SNR, it can be seen from Figure 9 that the JLDWT scheme with the SC based LLR outperforms the TCBO using the SC based LLR and the performance gain for the AFC would increase with the transmission channel SNR going higher. That is to say preventing the worse local decision from contributing to the data fusion would facilitate to improve the performance at the FC when the disadvantage effect of transmission channel reduces. Moreover, similar as the result seen in Figure 8, the AFC and the EFC have the identical error probabilities with the degraded JLDWT and the information confidentiality is not guaranteed. In addition, the approximated LLR contributes to the performance loss for both the JLDWT and the TCBO schemes, but the JLDWT scheme still outperforms the TCBO one slightly.

Figure 9.

Figure 9

Error probabilities of TCBO and JLDWT schemes as functions of various SNR for β=0.8 over high SNR region.

Figure 10 and Figure 11 compare the error performance of TCBO and JLDWT schemes with the SC based LLR under snrL=0dB and snrL=5dB, respectively. It can be seen that the gain of the JLDWT scheme against the TCBO method increases with the growing of transmission channel SNR. That is correspondent to the result seen in Figure 9. Furthermore, this gain at the high SNR, for example SNR = 15 dB, becomes larger for a smaller β. That is the advantage induced by cancelling the worse local detection results from the fusion data and it would dominant the final decision fusion when the transmission channel becomes good. Furthermore, we also find the performance inflection phenomenon over the curves of the JLDWT, which is similar as seen in Figure 5. While, it is induced by the confusion of the sensor to judge between two hypothesis of θ0 and θ1, rather than the confusion of the AFC for discriminating between the flipping and non-flipping group.

Figure 10.

Figure 10

Error probabilities of TCBO and JLDWT schemes with SC based LLR as functions of various β for snrL=0dB.

Figure 11.

Figure 11

Error probabilities of TCBO and JLDWT schemes with SC based LLR as functions of various β for snrL=5dB.

Based on the above simulation results and discussions, we suggest that the TCBO scheme with the approximated LLR is a good selection over the low transmission channel SNR region. While, under a good wireless transmission scenario with a severe energy constraint, the JLDWT scheme with the SC based LLR is preferred in order to obtain the higher detection accuracy at the AFC. Moreover, a moderate β around 0.7∼0.8 is more appropriate for a practical sensor network in terms of both the energy consumption and the detection performance. In addition, it is to be noted that the TCBO and JLDWT schemes both can be easily extended to a larger sensor network, although only the case of K = 20 is studied in our simulations.

7. Conclusions and Future Work

Distributed detection scheme with good security and energy efficiency plays an important role in the implement of sensor network in IoT. In this paper, two secure decentralized detection schemes under energy constraint are studied comprehensively. Firstly, a specific energy constraint is introduced to the existing channel aware encryption scheme and we call it TCBO scheme. Next, the simplified LLRs under the low and high SNR are derived, respectively. Based on the new LLRs, the asymptotic error probabilities for the worst and best noise situations at the AFC are calculated. Then, three comparison thresholds are optimized through minimizing the error probability while satisfying the perfect secrecy and energy constraints. Secondly, combing the local detection and the wireless transmission of local decision at the sensor, a hybrid scheme named JLDWT is proposed, where the energy efficiency is provided by censoring the sensor with less informative local LLR and the confidentiality from the EFC is guaranteed by the channel based random flipping. Then, the asymptotic error probabilities under low and high SNR environment are also given. Furthermore, two local detection thresholds and one flipping comparison threshold are optimized to minimize the error rates, as well as, assure the perfect secrecy and the required energy efficiency. At last, we evaluate the detection performance of the TCBO and the proposed JLDWT schemes through computer simulations. The simulation results demonstrate that the perfect secrecy is assured by both schemes. The JLDWT scheme outperforms the TCBO one under the better wireless transmission environment with a severe energy constraint.

The perfect secrecy is guaranteed at the cost of reducing the detection accuracy at the AFC in the TCBO and JLDWT schemes. However, in some scenarios, a limited information leakage to the EFC maybe is permitted, while the high detection performance at the AFC is more important. In future work, the modified forms of the above two schemes will be designed to support the more flexible constraint on the EFC’s performance. Moreover, except the eavesdropping attack, there are many other attack modes faced by IoT networks in practice, such as the denial of services (DOS) attack, node outage attack, signal jamming attack and intentional attack. Among them, the intentional attack could incur fatal threat on network by paralyzing a small fraction of nodes with highest degrees. As to IoT networks, if some important nodes, such as the fusion center and the controller, suffer the intentional attack, the whole IoT system may be disrupted. Therefore, the robust defense mechanism against the intentional attack for IoT will be studied in our future work.

Acknowledgments

The authors would like to thank the support from the National Natural Science Foundation of China (NSFC) under Grant No. 61461136001, No. 61431011 and No. 61401350, the National 863 Program of China under Grant No. 2014AA01A707 and the Fundamental Research Funds for the Central Universities.

Appendix A. Approximation of Φ (ta, tb, xk, ykA, δA2) under the Low Channel SNR

The derivation of the approximated formulation for Φta,tb,xk,ykA,δA2 is given by

Φta,tb,xk,ykA,δA2=tatb12πδAexpykAhkAxk22δA22hkAexp[(hkA)2]dhkA=N(ykA,δA2)tatbexpykAhkAxkδA22hkAexp[(1+xk22δA2)(hkA)2]dhkA(a)N(ykA,δA2)tatb(1+ykAhkAxkδA2)2hkAexp[(1+xk22δA2)(hkA)2]dhkA=N(ykA,δA2){(1+xk22δA2)1exp[(1+xk22δA2)(hkA)2]|tatb+ykAxkδA2tatb2(hkA)2exp[(1+xk22δA2)(hkA)2]dhkA}(b)N(ykA,δA2){exp(ta2)exp(tb2)ykAxkδA2tatbhkAdexp[(hkA)2]}=N(ykA,δA2){exp(ta2)exp(tb2)+ykAxkδA2[taexp(ta2)tbexp(tb2)+tatbexp(h2)dh]} (A1)

where (a) is based on the fact that exp(x)1+x for small x and (b) is due to the assumption of δA2.

Appendix B. Calculation of Three Integrations Used in Equations (20) and (22)

+ykAN(ykA,δA2)dykA=12πδA+ykAexpykA22δA2dykA=δA2π+dexpykA22δA2=0 (B1)
+ykA2N(ykA,δA2)dykA=12πδA+ykA2expykA22δA2dykA=δA2π+ykAdexpykA22δA2=δA2πykAexp[ykA22δA2]++δA2π+expykA22δA2dykA=0+δA22πδA+expykA22δA2dykA=δA2 (B2)
+ykA3N(ykA,δA2)dykA=12πδA+ykA2ykAexpykA22δA2dykA=δA2π+ykA2dexpykA22δA2=δA2πykA2expykA22δA2++2δA2π+ykAexpykA22δA2dykA=0 (B3)

Appendix C. Derivation of ΛkA under High SNR

In Equation (25), substituting fykA|xk,h^kA with 12πδAexp[(ykAh^kAxk)22δA2] gives

ΛkA=logfykA|θ1fykA|θ0=log[Pdexp2ykAh^kA/δA2+(1Pd)Pfexp2ykAh^kA/δA2+(1Pf)],h^kAthlog[(1Pd)exp2ykAh^kA/δA2+Pd(1Pf)exp2ykAh^kA/δA2+Pf],h^kA<th (C1)

Furthermore, with δA20, we have exp2ykAh^kAσA2 for ykA>0, exp2ykAh^kAσA20 for ykA<0 and ΛkA=0 for ykA=0. Substituting them into Equation (C1), we can rewrite it as the Equation (26).

Appendix D. Derivation of Equations (27) and (28)

From Equation (26), we see that ΛkA is a discrete random variable, so its mean can be given by EΛkA|θi=ΛkAΛkAfΛkA|θi. Moreover, the non-negative channel coefficient makes that ykA>0 is equivalent to xk=1, ykA<0 corresponds to xk=1 and ykA=0 means xk=0. In addition, hkAh^kA holds for the large SNR scenario. Combining the above facts, we have

EΛkA|θi=ΛkAΛkAfΛkA|θi=0·p(xk=0|θi)+logPdPf[th+fhkA,xk=1|θidhkA+0thfhkA,xk=1|θidhkA]+log1Pd1Pf[th+fhkA,xk=1|θidhkA+0thfhkA,xk=1|θidhkA]=logPdPf[th+fhkA|xk=1,θipxk=1|θidhkA+0thfhkA|xk=1,θipxk=1|θidhkA]+log1Pd1Pf[th+fxkA|uk=1,θipxk=1|θidhkA+0thfhkA|xk=1,θipxk=1|θidhkA]=(a)logPdPf[th+fhkAbkpxk=1|bkpbk|θidhkA+0thfhkAbkpxk=1|bkpbk|θidhkA]+log1Pd1Pf[th+fhkAbkpxk=1|bkpbk|θidhkA+0thfhkAbkpxk=1|bkpbk|θidhkA]=(b)logPdPf[t1+fhkApbk=1|θidhkA+t3t2fhkApbk=1|θidhkA]+log1Pd1Pf[t1+fhkApbk=0|θidhkA+t3t2fhkApbk=0|θidhkA]=[logPdPfpbk=1|θi+log1Pd1Pfpbk=0|θi]λ1+λ2 (D1)

where (a) follows the condition that hkA is uncorrelated with xk and θi, and (b) is due to Equation (24). Similarly, it can be obtained that

E(ΛkA)2|θi=ΛkA(ΛkA)2fΛkA|θi=02·p(xk=0|θi)+(logPdPf)2[th+fhkA,xk=1|θidhkA+0thfhkA,xk=1|θidhkA]+(log1Pd1Pf)2[th+fhkA,xk=1|θidhkA+0thfhkA,xk=1|θidhkA]=[(logPdPf)2pbk=1|θi+(log1Pd1Pf)2pbk=0|θi]λ1+λ2 (D2)

Appendix E. Calculation of the Derivative of D(t3,t2,t1) to α

Rewrite D(t3,t2,t1) as a function of α

D(α)=mt1(α)nt3(α),t2(α) (E1)

whose derivative is given by

δD(α)=dD(α)dα=dD(α)/dt1dα/dt1 (E2)

Moreover, we can calculate

dD(α)/dt1=d[t1expt12+t1exph2dht3expt32+t2expt22t3t2exph2dh]/dt1=2t12expt12+2t32expt32dt3dt12t22expt22dt2dt1 (E3)
dα/dt1=d[expt12+expt32expt22]/dt1=2t1expt122t3expt32dt3dt1+2t2expt22dt2dt1 (E4)

Specially, for the case t3=0, we obtain

dD(α)/dt1=2t12expt122t22expt22dt2dt1dα/dt1=2t1expt12+2t2expt22dt2dt1 (E5)

And because λ1=λ2 has to be satisfied, the following equation is achieved

dexpt12/dt1=d1expt22/dt12t1expt12=2t2expt22dt2dt1dt2dt1=t1expt12t2expt22 (E6)

Substituting Equation (E6) into Equation (E5) yields

δD(α)=t1t22 (E7)

Otherwise, for the case t1=t2(i.e.,t30), we have

dD(α)/dt1=4t12expt12+2t32expt32dt3dt1dα/dt1=2t3expt32dt3dt1 (E8)

Also due to λ1=λ2, it can be achieved

dexpt12/dt1=dexp(t32)expt12/dt14t1expt12=2t3expt32dt3dt1dt3dt1=2t1expt12t3expt32 (E9)

Further, δD(α)=t1t3 is given.

Appendix F. Proof of D (λU) = D (λL )

Beginning with (PdPf)=(P0dPm), we get

D(λU)=log(λUq0/q1)+fΛkL|θ1fΛkL|θ0dΛk=log(λLq0/q1)fΛkL|θ1fΛkL|θ0dΛk (F1)

From the total probability theory, we have

+fΛkL|θ1fΛkL|θ0dΛk=0 (F2)

Then D(λU) can be rewritten as

D(λU)=log(λLq0/q1)fΛkL|θ1fΛkL|θ0dΛk=(log(λLq0/q1)+fΛkL|θ1fΛkL|θ0dΛk)=D(λL) (F3)

Author Contributions

Guomei Zhang has done the research on the related topic of this paper, designed the analyzing methods and developed the schemes, simulated them in MATLAB, extracted results and wrote the paper. Hao Sun participated in the literature research and the simulation programming, edited formulas and drew the simulation figures.

Conflicts of Interest

The authors declare no conflict of interest.

References

  • 1.Gil D., Ferrandez A., Mora-Mora H., Peral J. Internet of Things: A Review of Surveys Based on Context Aware Intelligent Services. Sensors. 2016;16:1069. doi: 10.3390/s16071069. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 2.Mukherjee A. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. Proc. IEEE. 2015;103:1747–1761. doi: 10.1109/JPROC.2015.2466548. [DOI] [Google Scholar]
  • 3.Ghayvat H., Mukhopadhyay S., Gui X., Suryadevara N. WSN- and IOT-Based Smart Homes and Their Extension to Smart Buildings. Sensors. 2015;15:10350–10379. doi: 10.3390/s150510350. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 4.Rani S., Talwar R., Malhotra J., Ahmed S.H., Sarkar M., Song H. A Novel Scheme for an Energy Efficient Internet of Things Based on Wireless Sensor Networks. Sensors. 2015;15:28603–28626. doi: 10.3390/s151128603. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 5.Li Z., Tao J., Ma L., Qian J. Worst-Case Cooperative Jamming for Secure Communications in CIoT Networks. Sensors. 2016;16:339. doi: 10.3390/s16030339. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 6.Ndibanje B., Lee H.J., Lee S.G. Security analysis and improvements of authentication and access control in the Internet of Things. Sensors. 2014;14:14786–14805. doi: 10.3390/s140814786. [DOI] [PMC free article] [PubMed] [Google Scholar]
  • 7.Kailkhura B., Nadendla V.S.S., Varshney P.K. Distributed inference in the presence of eavesdroppers: A survey. IEEE Commun. Mag. 2015;53:40–46. doi: 10.1109/MCOM.2015.7120015. [DOI] [Google Scholar]
  • 8.Marano S., Matta V., Willett P.K. Distributed detection with censoring sensors under physical layer secrecy. IEEE Trans. Signal Proc. 2009;57:1976–1986. doi: 10.1109/TSP.2009.2014816. [DOI] [Google Scholar]
  • 9.Soosahabi R., Naraghi-Pour M. Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2012;7:1118–1126. doi: 10.1109/TIFS.2012.2194704. [DOI] [Google Scholar]
  • 10.Jeon H., Choi J., Mclaughlin S.W., Ha J. Channel aware encryption and decision fusion for wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2013;8:619–625. doi: 10.1109/TIFS.2013.2243145. [DOI] [Google Scholar]
  • 11.Appadwedula S., Veeravalli V.V., Jones D.L. Decentralized Detection With Censoring Sensors. IEEE Trans. Signal Proc. 2008;56:1362–1373. doi: 10.1109/TSP.2007.909355. [DOI] [Google Scholar]
  • 12.Miorandi D., Sicari S., Pellegrini F.D., Chlamtac I. Internet of things: Vision, applications and research challenges. Ad Hoc Netw. 2012;10:1497–1516. doi: 10.1016/j.adhoc.2012.02.016. [DOI] [Google Scholar]
  • 13.Sen J. A Survey on Wireless Sensor Network Security. Comput. Sci. 2010;43:90–95. [Google Scholar]
  • 14.Weber R.H. Internet of Things—New security and privacy challenges. Comput. Law Secur. Rep. 2010;26:23–30. doi: 10.1016/j.clsr.2009.11.008. [DOI] [Google Scholar]
  • 15.Keoh S.L., Kumar S.S., Tschofenig H. Securing the Internet of Things: A Standardization Perspective. IEEE Internet Things J. 2014;1:265–275. doi: 10.1109/JIOT.2014.2323395. [DOI] [Google Scholar]
  • 16.Mukherjee A., Fakoorian S.A.A., Huang J., Swindlehurst A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014;16:1550–1573. doi: 10.1109/SURV.2014.012314.00178. [DOI] [Google Scholar]
  • 17.Xu Q., Ren P., Song H., Du Q. Security enhancement for IoT communications exposed to eavesdroppers with uncertain locations. IEEE Access. 2016;4:2840–2853. doi: 10.1109/ACCESS.2016.2575863. [DOI] [Google Scholar]
  • 18.Atzori L., Iera A., Morabito G. The Internet of Things: A survey. Comput. Netw. 2010;54:2787–2805. doi: 10.1016/j.comnet.2010.05.010. [DOI] [Google Scholar]
  • 19.Su Z., Xu Q., Zhu H., Wang Y. A novel design for content delivery over software defined mobile social networks. IEEE Netw. 2015;29:62–67. doi: 10.1109/MNET.2015.7166192. [DOI] [Google Scholar]
  • 20.Du Q., Zhao W., Li W., Zhang X., Sun B., Song H., Ren P., Sun L., Wang Y. Massive access control aided by knowledge-extraction for co-existing periodic and random services over wireless clinical networks. J. Med. Syst. 2016;40:1–8. doi: 10.1007/s10916-016-0506-5. [DOI] [PubMed] [Google Scholar]
  • 21.Gubbi J., Buyya R., Marusic S., Palaniswami M. Internet of Things (IoT): A vision, architectural elements, and future directions. Future Gener. Comput. Syst. 2012;29:1645–1660. doi: 10.1016/j.future.2013.01.010. [DOI] [Google Scholar]
  • 22.Yick J., Mukherjee B., Ghosal D. Wireless sensor network survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 2008;52:2292–2330. doi: 10.1016/j.comnet.2008.04.002. [DOI] [Google Scholar]
  • 23.Jeon H., Hwang D., Choi J., Lee H., Ha J. Secure Type-Based Multiple Access. IEEE Trans. Inf. Forensics Secur. 2011;6:763–774. doi: 10.1109/TIFS.2011.2158312. [DOI] [Google Scholar]
  • 24.Soosahabi R., Naraghi-Pour M., Perkins D., Bayoumi M.A. Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 2014;9:375–385. doi: 10.1109/TIFS.2014.2298813. [DOI] [Google Scholar]
  • 25.Bhavya K., Thakshila W., Lixin S., Pramod K. Distributed Compressive Detection with Perfect Secrecy; Proceedings of the IEEE 11th International Conference on Mobile Ad Hoc and Sensor Systems; Philadelphia, PA, USA. 28–30 October 2014; pp. 674–679. [Google Scholar]
  • 26.Li Z., Oechtering T.J., Kittichokechai K. Parallel distributed Bayesian detection with privacy constraints; Proceedings of the IEEE International Conference on Communications; Sydney, Australia. 10–14 June 2014; pp. 2178–2183. [Google Scholar]
  • 27.Li Z., Oechtering T.J., Jalde N.J. Parallel distributed Neyman-Pearson detection with privacy constraints; Proceedings of the IEEE International Conference on Communications Workshops; Sydney, Australia. 10–14 June 2014. [Google Scholar]
  • 28.Nadendla V.S.S., Chen H., Varshney P.K. Secure distributed detection in the presence of eavesdroppers; Proceedings of the 11th Asilomar Conference on Circuits, Systems and Computers; Pacific Grove, CA, USA. 7–10 November 2010; pp. 1437–1441. [Google Scholar]
  • 29.Araujo A., Blesa J., Romero E., Nieto-Taladriz O. Artificial noise scheme to ensure secure communications in CWSN; Proceedings of the Wireless Communications and Mobile Computing Conference; Limassol, Cyprus. 27–31 August 2012; pp. 1023–1027. [Google Scholar]
  • 30.Khisti A., Wornell G. Secure transmission with multiple antennas-I: The MISOME wiretap channel. IEEE Trans. Inform. Theory. 2010;56:3088–3104. doi: 10.1109/TIT.2010.2048445. [DOI] [Google Scholar]
  • 31.Khisti A., Wornell G. Secure transmission with multiple antennas-II: The MIMOME wiretap channel. IEEE Trans. Inform. Theory. 2010;56:5515–5532. doi: 10.1109/TIT.2010.2068852. [DOI] [Google Scholar]
  • 32.Li Q., Ma W.-K. Multicast secrecy rate maximization for MISO channels with multiple multiantenna eavesdroppers; Proceedings of the 2011 IEEE International Conference on Communications (ICC); Victoria, BC, Canada. 5–9 June 2011; pp. 1–5. [Google Scholar]
  • 33.Geraci G., Egan M., Yuan J., Razi A., Collings I.B. Secrecy sum-rates for multi-user MIMO regularized channel inversion precoding. IEEE Trans. Commun. 2012;60:3472–3482. doi: 10.1109/TCOMM.2012.072612.110686. [DOI] [Google Scholar]
  • 34.Goel S., Negi R. Guaranteeing secrecy using artificial noise. IEEE Trans. Wireless Commun. 2008;7:2180–2189. doi: 10.1109/TWC.2008.060848. [DOI] [Google Scholar]
  • 35.Mukherjee A., Swindlehurst A.L. Utility of beamforming strategies for secrecy in multiuser MIMO wiretap channels; Proceedings of the 47th Allerton Conference on Communication, Control, and Computing; Monticello, IL, USA. 30 September–2 October 2009; pp. 1134–1141. [Google Scholar]
  • 36.Gerbracht S., Scheunert C., Jorswieck E.A. Secrecy outage in MISO systems with partial channel information. IEEE Trans. Inform. Forensics Sec. 2012;7:704–716. doi: 10.1109/TIFS.2011.2181946. [DOI] [Google Scholar]
  • 37.Zhou L., Wu D., Zheng B., Guizani M. Joint physical-application layer security for wireless multimedia delivery. IEEE Commun. Mag. 2014;52:66–72. doi: 10.1109/MCOM.2014.6766087. [DOI] [Google Scholar]
  • 38.Sun L., Du Q., Ren P., Wang Y. Two birds with one stone: Towards secure and interference-free D2D transmissions via constellation rotation. IEEE Trans. Veh. Technol. 2016;65:8767–8774. doi: 10.1109/TVT.2015.2505715. [DOI] [Google Scholar]
  • 39.Xu H., Sun L., Ren P., Du Q., Wang Y. Cooperative privacy preserving scheme for downlink transmission in multiuser relay networks. IEEE Trans. Inf. Forensics Secur. 2016 doi: 10.1109/TIFS.2016.2636091. published online. [DOI] [Google Scholar]
  • 40.Hussain M., Du Q., Sun L., Ren P. Security enhancement for video transmission via noise aggregation in immersive systems. Multimed. Tools Appl. 2016;75:5345–5357. doi: 10.1007/s11042-015-2936-3. [DOI] [Google Scholar]
  • 41.Xu Q., Ren P., Du Q., Sun L., Wang Y. On achievable secrecy rate by noise aggregation over wireless fading channels; Proceedings of the IEEE International Conference on Communications; Kuala Lumpur, Malaysia. 22–27 May 2016. [Google Scholar]
  • 42.Jiang R., Chen B. Fusion of censored decisions in wireless sensor networks. IEEE Trans. Wireless Commun. 2005;4:2668–2673. doi: 10.1109/TWC.2005.858363. [DOI] [Google Scholar]

Articles from Sensors (Basel, Switzerland) are provided here courtesy of Multidisciplinary Digital Publishing Institute (MDPI)

RESOURCES