Distributed compressive detection with perfect secrecy

Bhavya Kailkhura, Thakshila Wimalajeewa, Lixin Shen, Pramod Kumar Varshney

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

This paper considers the problem of distributed compressive detection under a perfect secrecy constraint. More specifically, we consider the problem where the distributed inference network operates in the presence of an eavesdropper who wants to discover the state of the nature being monitored by the system. It is shown that perfect secrecy can be achieved by using cooperating trustworthy nodes that assist the Fusion Center (FC) by providing falsified data to the eavesdroppers. We also consider the problem of determining optimal system parameters which maximize the detection performance at the FC, while ensuring perfect secrecy at the eavesdropper.

Original languageEnglish (US)
Title of host publicationProceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014
PublisherInstitute of Electrical and Electronics Engineers Inc.
Pages674-679
Number of pages6
ISBN (Print)9781479960354
DOIs
StatePublished - Feb 6 2015
Event11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014 - Philadelphia, United States
Duration: Oct 28 2014Oct 30 2014

Other

Other11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014
CountryUnited States
CityPhiladelphia
Period10/28/1410/30/14

Fingerprint

Fusion reactions
Optimal systems

Keywords

  • Compressive detection
  • data falsification
  • eavesdropping attack
  • friendly Byzantines
  • random projections

ASJC Scopus subject areas

  • Control and Systems Engineering
  • Computer Networks and Communications

Cite this

Kailkhura, B., Wimalajeewa, T., Shen, L., & Varshney, P. K. (2015). Distributed compressive detection with perfect secrecy. In Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014 (pp. 674-679). [7035763] Institute of Electrical and Electronics Engineers Inc.. https://doi.org/10.1109/MASS.2014.40

Distributed compressive detection with perfect secrecy. / Kailkhura, Bhavya; Wimalajeewa, Thakshila; Shen, Lixin; Varshney, Pramod Kumar.

Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc., 2015. p. 674-679 7035763.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Kailkhura, B, Wimalajeewa, T, Shen, L & Varshney, PK 2015, Distributed compressive detection with perfect secrecy. in Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014., 7035763, Institute of Electrical and Electronics Engineers Inc., pp. 674-679, 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014, Philadelphia, United States, 10/28/14. https://doi.org/10.1109/MASS.2014.40
Kailkhura B, Wimalajeewa T, Shen L, Varshney PK. Distributed compressive detection with perfect secrecy. In Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc. 2015. p. 674-679. 7035763 https://doi.org/10.1109/MASS.2014.40
Kailkhura, Bhavya ; Wimalajeewa, Thakshila ; Shen, Lixin ; Varshney, Pramod Kumar. / Distributed compressive detection with perfect secrecy. Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014. Institute of Electrical and Electronics Engineers Inc., 2015. pp. 674-679
@inproceedings{69b579c957e44c4abae9af4fff2787c9,
title = "Distributed compressive detection with perfect secrecy",
abstract = "This paper considers the problem of distributed compressive detection under a perfect secrecy constraint. More specifically, we consider the problem where the distributed inference network operates in the presence of an eavesdropper who wants to discover the state of the nature being monitored by the system. It is shown that perfect secrecy can be achieved by using cooperating trustworthy nodes that assist the Fusion Center (FC) by providing falsified data to the eavesdroppers. We also consider the problem of determining optimal system parameters which maximize the detection performance at the FC, while ensuring perfect secrecy at the eavesdropper.",
keywords = "Compressive detection, data falsification, eavesdropping attack, friendly Byzantines, random projections",
author = "Bhavya Kailkhura and Thakshila Wimalajeewa and Lixin Shen and Varshney, {Pramod Kumar}",
year = "2015",
month = "2",
day = "6",
doi = "10.1109/MASS.2014.40",
language = "English (US)",
isbn = "9781479960354",
pages = "674--679",
booktitle = "Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014",
publisher = "Institute of Electrical and Electronics Engineers Inc.",

}

TY - GEN

T1 - Distributed compressive detection with perfect secrecy

AU - Kailkhura, Bhavya

AU - Wimalajeewa, Thakshila

AU - Shen, Lixin

AU - Varshney, Pramod Kumar

PY - 2015/2/6

Y1 - 2015/2/6

N2 - This paper considers the problem of distributed compressive detection under a perfect secrecy constraint. More specifically, we consider the problem where the distributed inference network operates in the presence of an eavesdropper who wants to discover the state of the nature being monitored by the system. It is shown that perfect secrecy can be achieved by using cooperating trustworthy nodes that assist the Fusion Center (FC) by providing falsified data to the eavesdroppers. We also consider the problem of determining optimal system parameters which maximize the detection performance at the FC, while ensuring perfect secrecy at the eavesdropper.

AB - This paper considers the problem of distributed compressive detection under a perfect secrecy constraint. More specifically, we consider the problem where the distributed inference network operates in the presence of an eavesdropper who wants to discover the state of the nature being monitored by the system. It is shown that perfect secrecy can be achieved by using cooperating trustworthy nodes that assist the Fusion Center (FC) by providing falsified data to the eavesdroppers. We also consider the problem of determining optimal system parameters which maximize the detection performance at the FC, while ensuring perfect secrecy at the eavesdropper.

KW - Compressive detection

KW - data falsification

KW - eavesdropping attack

KW - friendly Byzantines

KW - random projections

UR - http://www.scopus.com/inward/record.url?scp=84925353267&partnerID=8YFLogxK

UR - http://www.scopus.com/inward/citedby.url?scp=84925353267&partnerID=8YFLogxK

U2 - 10.1109/MASS.2014.40

DO - 10.1109/MASS.2014.40

M3 - Conference contribution

SN - 9781479960354

SP - 674

EP - 679

BT - Proceedings - 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, MASS 2014

PB - Institute of Electrical and Electronics Engineers Inc.

ER -