Abstract
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless sensor network operating over insecure links. To prevent passive eavesdropping from enemy fusion center (EFC), the sensor observations are randomly flipped according to pre-deployed flipping rates before transmission. Accordingly, a constrained optimization problem is formulated to minimize the fusion error of ally fusion center (AFC) while maintain EFC’s error at high level. We demonstrated that the fusion error is a non-convex function of the flipping rates, thus an immune based differential evolution algorithm is designed to search the optimal flipping rates, such that the EFC always gets high error probability at the cost of a small degeneration of the AFC’s fusion performance. Furthermore, the optimal thresholds of the fusion rules are calculated based on the statistics of the sensor data, which further degenerates the detection performance of the EFC, since it is not aware of the statistics of the sensor observations after data flipping, resulting in its threshold does not match the observations. Simulation results demonstrated that the AFC can appropriately acquire the original nature state, while the EFC is prevent to detect the target regardless of the signal-to-noise and sensor numbers.
Similar content being viewed by others
References
Amrita, G., & Sipra, D. (2015). A lightweight security scheme for query processing in clustered wireless sensor networks. Computers and Electrical Engineering, 41, 240–255.
Anita, S., & Daniel, S. (2014). A solution algorithm for non-convex mixed integer optimization problems with only few continuous variables. European Journal of Operational Research, 232(2), 266–275.
Chen, B., Jiang, R., Kasetkasem, T., & Varshney, P. K. (2006). Channel aware decision fusion in wireless sensor networks. IEEE Transactions on Signal Process, 52(12), 3454–3458.
Chen, X., Makki, K., Yen, K., & issinou, N. P. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.
Dimitri, P. B. (2009). Convex optimization theory. Belmont: Athena Scientific.
Erfan, S., Mahdi, O., & Mort, N. P. (2013). Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes. IEEE Transactions on Information Forensics and Security, 8(1), 205–215.
Gopikrishnan, S., & Priakanth, P. (2015). HSDA: Hybrid communication for secure data aggregation in wireless sensor network. Wireless Networks, 21(9), 1–18.
Hosein, M., & Mengdu, L. (2013). An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Computer Science, 19, 1159–1166.
Hyoungsuk, J., Daesung, H., Hyuckjae, L., Ha, J., & Choi, J. (2010). Secure type-based multiple access, transmission strategy and analysis for perfect secrecy. In IEEE information theory workshop (Vol. 6, No. 3, pp. 1–5).
Hyoungsuk, J., Jinho, C., Steven, W. M., & Jeongseok, H. (2013). Channel aware encryption and decision fusion for wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(4), 619–625.
Lin, H. Y. (2015). Location-based data encryption for wireless sensor network using dynamic keys. Wireless Networks, 21(8), 2649–2656.
Muhammad, M. R. Khan, Khan, M. I., Ernest, M., Kh&akar, I., Sushil, B., Lan, W., et al. (2013). Autonomous wireless radar sensor mote for target material classification. Digital Signal Processing, 23(3), 722–735.
Murat, D., Yunus, o, & Cevat, B. (2015). Fire detection systems in wireless sensor networks. World Conference on Technology, Innovation and Entrepreneurship, 195, 1846–1850.
Omar, R. M. B., Sidi, M. S., & Mohammed, F. (2015). A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Networks, 32, 98–113.
Papoulis, A., & Pillai, S. (2009). Probabilty, random variables and stochastic processes (4th ed.). New York: McGraw-Hill.
Perrig, A., Stankovic, J. A., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53–57.
Qin, A. K., Huang, V. L., & Suganthan, P. N. (2009). Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Transaction on Evolutionary Computation, 13(2), 398–417.
Reza, S., & Mort, N. P. (2012). Scalable PHY-layer security for distributed detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(4), 1118–1126.
Reza, S., Mort, N. P., Dmitri, P., & Magdy, A. B. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.
Sabrina, S., Alessandra, R., Luigi, A. G., & Alberto, C. P. (2015). IEEE 5th international conference on consumer electronics-Berlin (ICCE-Berlin) (pp. 358–362).
Sabrina, S., Alberto, C. P., & Roberto, R. (2013). DARE: Evaluating Data Accuracy using node REputation. Computer Networks, 57, 3098C3111.
Sabrina, S., Luigi, A. G., Gennaro, B., & Alberto, C. P. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85, 152–166.
Shigen, S., Hongjie, L., Risheng, H., Athanasios, V. V., Yihan, W., & Qiying, C. (2014). Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(11), 1962–1973.
Timmis, J., & Neal, M. (2001). A resource limited artificial immune system for datga analyssi. Konwledge Based System, 14(3–4), 121–130.
Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. Communications Surveys and Tutorials, 8(2), 2–23.
Acknowledgements
This work is sponsored by the National Key Research and Development Program of China under Grant Nos. 2016YFB08006004, 2016YFB08006005, and the National Science Foundation of China under Grant No. 61402308. And we would like to thanks the precious advises from Pro. Lee Hongbin, Stevens Institute of Technology, USA.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chen, W., Zhao, H., Li, T. et al. Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm. Wireless Netw 24, 2497–2507 (2018). https://doi.org/10.1007/s11276-017-1484-3
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11276-017-1484-3