Secure Type-Based Multiple Access
- 31 May 2011
- journal article
- Published by Institute of Electrical and Electronics Engineers (IEEE) in IEEE Transactions on Information Forensics and Security
- Vol. 6 (3), 763-774
- https://doi.org/10.1109/tifs.2011.2158312
Abstract
We consider data confidentiality in a distributed detection scenario with a type-based multiple-access (TBMA) protocol where a large set of sensors sends local measurements to an ally fusion center (FC) over an insecure wireless medium called the main channel. Then, the ally FC makes a final decision to the physical environment. Although many wireless sensor networks are mission-specific and need data confidentiality due to the broadcast nature of wireless transmission, it can be easily wiretapped by unauthorized enemy FCs through eavesdropping channels. We propose a novel TBMA protocol called secure TBMA which provides data confidentiality by taking advantage of inherent properties of wireless channels, namely randomness and independence of the main and eavesdropping channels. In particular, the secure TBMA activates sensors having strong and weak main channel gains and makes the sensors follow different reporting rules based on the magnitudes of their channel gains. The reporting rules are carefully designed to confuse the enemy FC. The proposed secure TBMA delivers unconditional/perfect secrecy and does not assume any superiority of the ally FC over the enemy FC in terms of computational capability, secret key, and so on. For Rayleigh fading channels, we analyze the performance of the secure TBMA at both enemy and ally FCs by investigating conditions for perfect secrecy and an error exponent of detection error probability, respectively. On the one hand, the analysis at the enemy FC provides a design criterion of the reporting rules to achieve perfect secrecy. On the other hand, the analysis of the error exponent carried out with a Gaussian approximation shows that perfect secrecy is achievable at a marginal cost in detection error performance. All our claims are also verified with simulation results which have good matches with the analysis.Keywords
This publication has 23 references indexed in Scilit:
- Energy conservation in wireless sensor networks: A surveyAd Hoc Networks, 2009
- SIA: Secure information aggregation in sensor networksJournal of Computer Security, 2007
- How public key cryptography influences wireless sensor node lifetimePublished by Association for Computing Machinery (ACM) ,2006
- Opportunistic Carrier Sensing for Energy-Efficient Information Retrieval in Sensor NetworksEURASIP Journal on Wireless Communications and Networking, 2005
- Security in wireless sensor networksCommunications of the ACM, 2004
- Decentralized detection in sensor networksIEEE Transactions on Signal Processing, 2003
- Wireless sensor networks: a surveyComputer Networks, 2002
- Distributed detection with multiple sensors I. Advanced topicsProceedings of the IEEE, 1997
- Distributed detection with multiple sensors I. FundamentalsProceedings of the IEEE, 1997
- Communication Theory of Secrecy Systems*Bell System Technical Journal, 1949