Skip to main content
Erschienen in: Wireless Networks 7/2018

11.03.2017

Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm

verfasst von: Wen Chen, Hui Zhao, Tao Li, Yuling Liu

Erschienen in: Wireless Networks | Ausgabe 7/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless sensor network operating over insecure links. To prevent passive eavesdropping from enemy fusion center (EFC), the sensor observations are randomly flipped according to pre-deployed flipping rates before transmission. Accordingly, a constrained optimization problem is formulated to minimize the fusion error of ally fusion center (AFC) while maintain EFC’s error at high level. We demonstrated that the fusion error is a non-convex function of the flipping rates, thus an immune based differential evolution algorithm is designed to search the optimal flipping rates, such that the EFC always gets high error probability at the cost of a small degeneration of the AFC’s fusion performance. Furthermore, the optimal thresholds of the fusion rules are calculated based on the statistics of the sensor data, which further degenerates the detection performance of the EFC, since it is not aware of the statistics of the sensor observations after data flipping, resulting in its threshold does not match the observations. Simulation results demonstrated that the AFC can appropriately acquire the original nature state, while the EFC is prevent to detect the target regardless of the signal-to-noise and sensor numbers.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Amrita, G., & Sipra, D. (2015). A lightweight security scheme for query processing in clustered wireless sensor networks. Computers and Electrical Engineering, 41, 240–255.CrossRef Amrita, G., & Sipra, D. (2015). A lightweight security scheme for query processing in clustered wireless sensor networks. Computers and Electrical Engineering, 41, 240–255.CrossRef
2.
Zurück zum Zitat Anita, S., & Daniel, S. (2014). A solution algorithm for non-convex mixed integer optimization problems with only few continuous variables. European Journal of Operational Research, 232(2), 266–275.MathSciNetCrossRefMATH Anita, S., & Daniel, S. (2014). A solution algorithm for non-convex mixed integer optimization problems with only few continuous variables. European Journal of Operational Research, 232(2), 266–275.MathSciNetCrossRefMATH
3.
Zurück zum Zitat Chen, B., Jiang, R., Kasetkasem, T., & Varshney, P. K. (2006). Channel aware decision fusion in wireless sensor networks. IEEE Transactions on Signal Process, 52(12), 3454–3458.MathSciNetCrossRefMATH Chen, B., Jiang, R., Kasetkasem, T., & Varshney, P. K. (2006). Channel aware decision fusion in wireless sensor networks. IEEE Transactions on Signal Process, 52(12), 3454–3458.MathSciNetCrossRefMATH
4.
Zurück zum Zitat Chen, X., Makki, K., Yen, K., & issinou, N. P. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef Chen, X., Makki, K., Yen, K., & issinou, N. P. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.CrossRef
5.
Zurück zum Zitat Dimitri, P. B. (2009). Convex optimization theory. Belmont: Athena Scientific.MATH Dimitri, P. B. (2009). Convex optimization theory. Belmont: Athena Scientific.MATH
6.
Zurück zum Zitat Erfan, S., Mahdi, O., & Mort, N. P. (2013). Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes. IEEE Transactions on Information Forensics and Security, 8(1), 205–215.CrossRef Erfan, S., Mahdi, O., & Mort, N. P. (2013). Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes. IEEE Transactions on Information Forensics and Security, 8(1), 205–215.CrossRef
7.
Zurück zum Zitat Gopikrishnan, S., & Priakanth, P. (2015). HSDA: Hybrid communication for secure data aggregation in wireless sensor network. Wireless Networks, 21(9), 1–18. Gopikrishnan, S., & Priakanth, P. (2015). HSDA: Hybrid communication for secure data aggregation in wireless sensor network. Wireless Networks, 21(9), 1–18.
8.
Zurück zum Zitat Hosein, M., & Mengdu, L. (2013). An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Computer Science, 19, 1159–1166.CrossRef Hosein, M., & Mengdu, L. (2013). An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Computer Science, 19, 1159–1166.CrossRef
9.
Zurück zum Zitat Hyoungsuk, J., Daesung, H., Hyuckjae, L., Ha, J., & Choi, J. (2010). Secure type-based multiple access, transmission strategy and analysis for perfect secrecy. In IEEE information theory workshop (Vol. 6, No. 3, pp. 1–5). Hyoungsuk, J., Daesung, H., Hyuckjae, L., Ha, J., & Choi, J. (2010). Secure type-based multiple access, transmission strategy and analysis for perfect secrecy. In IEEE information theory workshop (Vol. 6, No. 3, pp. 1–5).
10.
Zurück zum Zitat Hyoungsuk, J., Jinho, C., Steven, W. M., & Jeongseok, H. (2013). Channel aware encryption and decision fusion for wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(4), 619–625.CrossRef Hyoungsuk, J., Jinho, C., Steven, W. M., & Jeongseok, H. (2013). Channel aware encryption and decision fusion for wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(4), 619–625.CrossRef
11.
Zurück zum Zitat Lin, H. Y. (2015). Location-based data encryption for wireless sensor network using dynamic keys. Wireless Networks, 21(8), 2649–2656.CrossRef Lin, H. Y. (2015). Location-based data encryption for wireless sensor network using dynamic keys. Wireless Networks, 21(8), 2649–2656.CrossRef
12.
Zurück zum Zitat Muhammad, M. R. Khan, Khan, M. I., Ernest, M., Kh&akar, I., Sushil, B., Lan, W., et al. (2013). Autonomous wireless radar sensor mote for target material classification. Digital Signal Processing, 23(3), 722–735.MathSciNetCrossRef Muhammad, M. R. Khan, Khan, M. I., Ernest, M., Kh&akar, I., Sushil, B., Lan, W., et al. (2013). Autonomous wireless radar sensor mote for target material classification. Digital Signal Processing, 23(3), 722–735.MathSciNetCrossRef
13.
Zurück zum Zitat Murat, D., Yunus, o, & Cevat, B. (2015). Fire detection systems in wireless sensor networks. World Conference on Technology, Innovation and Entrepreneurship, 195, 1846–1850. Murat, D., Yunus, o, & Cevat, B. (2015). Fire detection systems in wireless sensor networks. World Conference on Technology, Innovation and Entrepreneurship, 195, 1846–1850.
14.
Zurück zum Zitat Omar, R. M. B., Sidi, M. S., & Mohammed, F. (2015). A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Networks, 32, 98–113.CrossRef Omar, R. M. B., Sidi, M. S., & Mohammed, F. (2015). A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Networks, 32, 98–113.CrossRef
15.
Zurück zum Zitat Papoulis, A., & Pillai, S. (2009). Probabilty, random variables and stochastic processes (4th ed.). New York: McGraw-Hill. Papoulis, A., & Pillai, S. (2009). Probabilty, random variables and stochastic processes (4th ed.). New York: McGraw-Hill.
16.
Zurück zum Zitat Perrig, A., Stankovic, J. A., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53–57.CrossRef Perrig, A., Stankovic, J. A., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53–57.CrossRef
17.
Zurück zum Zitat Qin, A. K., Huang, V. L., & Suganthan, P. N. (2009). Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Transaction on Evolutionary Computation, 13(2), 398–417.CrossRef Qin, A. K., Huang, V. L., & Suganthan, P. N. (2009). Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Transaction on Evolutionary Computation, 13(2), 398–417.CrossRef
18.
Zurück zum Zitat Reza, S., & Mort, N. P. (2012). Scalable PHY-layer security for distributed detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(4), 1118–1126.CrossRef Reza, S., & Mort, N. P. (2012). Scalable PHY-layer security for distributed detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(4), 1118–1126.CrossRef
19.
Zurück zum Zitat Reza, S., Mort, N. P., Dmitri, P., & Magdy, A. B. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.CrossRef Reza, S., Mort, N. P., Dmitri, P., & Magdy, A. B. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.CrossRef
20.
Zurück zum Zitat Sabrina, S., Alessandra, R., Luigi, A. G., & Alberto, C. P. (2015). IEEE 5th international conference on consumer electronics-Berlin (ICCE-Berlin) (pp. 358–362). Sabrina, S., Alessandra, R., Luigi, A. G., & Alberto, C. P. (2015). IEEE 5th international conference on consumer electronics-Berlin (ICCE-Berlin) (pp. 358–362).
21.
Zurück zum Zitat Sabrina, S., Alberto, C. P., & Roberto, R. (2013). DARE: Evaluating Data Accuracy using node REputation. Computer Networks, 57, 3098C3111. Sabrina, S., Alberto, C. P., & Roberto, R. (2013). DARE: Evaluating Data Accuracy using node REputation. Computer Networks, 57, 3098C3111.
22.
Zurück zum Zitat Sabrina, S., Luigi, A. G., Gennaro, B., & Alberto, C. P. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85, 152–166.CrossRef Sabrina, S., Luigi, A. G., Gennaro, B., & Alberto, C. P. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85, 152–166.CrossRef
23.
Zurück zum Zitat Shigen, S., Hongjie, L., Risheng, H., Athanasios, V. V., Yihan, W., & Qiying, C. (2014). Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(11), 1962–1973.CrossRef Shigen, S., Hongjie, L., Risheng, H., Athanasios, V. V., Yihan, W., & Qiying, C. (2014). Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(11), 1962–1973.CrossRef
24.
Zurück zum Zitat Timmis, J., & Neal, M. (2001). A resource limited artificial immune system for datga analyssi. Konwledge Based System, 14(3–4), 121–130.CrossRef Timmis, J., & Neal, M. (2001). A resource limited artificial immune system for datga analyssi. Konwledge Based System, 14(3–4), 121–130.CrossRef
25.
Zurück zum Zitat Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. Communications Surveys and Tutorials, 8(2), 2–23.CrossRef Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. Communications Surveys and Tutorials, 8(2), 2–23.CrossRef
Metadaten
Titel
Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm
verfasst von
Wen Chen
Hui Zhao
Tao Li
Yuling Liu
Publikationsdatum
11.03.2017
Verlag
Springer US
Erschienen in
Wireless Networks / Ausgabe 7/2018
Print ISSN: 1022-0038
Elektronische ISSN: 1572-8196
DOI
https://doi.org/10.1007/s11276-017-1484-3

Weitere Artikel der Ausgabe 7/2018

Wireless Networks 7/2018 Zur Ausgabe

Neuer Inhalt