Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security

Size: px
Start display at page:

Download "Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security"

Transcription

1 Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical Engineering In accordance with the requirements for the degree of Doctor of Philosophy June 6, 2017 Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

2 Overview 1 Introduction Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

3 Overview 1 Introduction 2 Optimal Quantization and Power Allocation Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

4 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

5 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

6 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

7 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

8 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

9 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

10 1. Introduction Motivation WSNs spatially deployed over a field can be designed to collect information and monitor many phenomena of interest. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

11 1. Introduction Motivation WSNs spatially deployed over a field can be designed to collect information and monitor many phenomena of interest. Important role in several daily application scenarios such as health-care monitoring, home applications, smart farming, environment monitoring, and military Design Challenges in WSNs Nature... Attacker 1 FUSION CENTER T2 SN2 SN5 T5 SN9 T1 SN1 T4 SN4 SN7 SN8 SN3 SN6 T6 T3 SN10 Figure 1: (left) A WSN architecture. (right) Smart city infrastructure. SN1 active sensor node, manipulated by the attacker Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

12 1. Introduction Motivation WSNs spatially deployed over a field can be designed to collect information and monitor many phenomena of interest. Important role in several daily application scenarios such as health-care monitoring, home applications, smart farming, environment monitoring, and military Design Challenges in WSNs Nature... Attacker 1 FUSION CENTER T2 SN2 SN5 T5 SN9 T1 SN1 T4 SN4 SN7 SN8 SN3 SN6 T6 T3 SN10 Figure 1: (left) A WSN architecture. (right) Smart city infrastructure. SN1 active sensor node, manipulated by the attacker Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

13 1. Introduction Design Challenges in WSNs Low Power Hardware: Clearly, the biggest design constraint in WSNs still remains the power consumption. Even-though the SNs are being designed using low-power micro controllers, their power dissipation is still orders of magnitude too high. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

14 1. Introduction Design Challenges in WSNs Low Power Hardware: Clearly, the biggest design constraint in WSNs still remains the power consumption. Even-though the SNs are being designed using low-power micro controllers, their power dissipation is still orders of magnitude too high. Resource Constraints: Battery operated devices with limited on-board energy, both the system lifetime and communication bandwidth (BW) are restricted. Both the signal processing and communication should be carefully designed to consume minimal energy in order to extend the lifetime and improve the overall reliability of the WSN. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

15 1. Introduction Design Challenges in WSNs Low Power Hardware: Clearly, the biggest design constraint in WSNs still remains the power consumption. Even-though the SNs are being designed using low-power micro controllers, their power dissipation is still orders of magnitude too high. Resource Constraints: Battery operated devices with limited on-board energy, both the system lifetime and communication bandwidth (BW) are restricted. Both the signal processing and communication should be carefully designed to consume minimal energy in order to extend the lifetime and improve the overall reliability of the WSN. Network Security:Usually unattended (geographically dispersed) and this makes them vulnerable to attacks. The overall detection and estimation strongly depends on the reliability of these SNs. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

16 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

17 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

18 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

19 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

20 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

21 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec E. Nurellari, D. McLernon, M. Ghogho and S. A. R. Zaidi, Distributed Optimal Quantization and Power Allocation for Sensor Detection Via Consensus, Proc. IEEE VTC Spring, Glasgow, U.K., May Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

22 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec E. Nurellari, D. McLernon, M. Ghogho and S. A. R. Zaidi, Distributed Optimal Quantization and Power Allocation for Sensor Detection Via Consensus, Proc. IEEE VTC Spring, Glasgow, U.K., May E. Nurellari, S. Aldalahmeh, M. Ghogho, and D. McLernon, Quantized Fusion Rules for Energy-Based Distributed Detection in Wireless Sensor Networks, Proc. IEEE SSPD, Edinburgh, Scotland, 8-9 Sep Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

23 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec E. Nurellari, D. McLernon, M. Ghogho and S. A. R. Zaidi, Distributed Optimal Quantization and Power Allocation for Sensor Detection Via Consensus, Proc. IEEE VTC Spring, Glasgow, U.K., May E. Nurellari, S. Aldalahmeh, M. Ghogho, and D. McLernon, Quantized Fusion Rules for Energy-Based Distributed Detection in Wireless Sensor Networks, Proc. IEEE SSPD, Edinburgh, Scotland, 8-9 Sep E. Nurellari, D. McLernon, M. Ghogho and S. Aldalahmeh, Optimal quantization and power allocation for energy-based distributed sensor detection, Proc. IEEE EUSIPCO, Lisbon, Portugal, 1-5 Sept Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

24 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

25 2. Optimal Quantization and Power Allocation System Architecture Target SN1 T1 [T1]Q T2 SN2 [T2]Q [T3]Q Fusion Center [T4]Q [T5]Q T3 SN3 T4 SN4 T q f = M α i [T i ] Q i=1 SN5 T5 Figure 2: Communication architecture between peripheral SNs and the FC. Each SN generates a test statistic by observing the target and can communicate with the FC only over an energy-constrained/bandwidth-constrained link. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

26 2. Simulation Results 1/2 h 2 i Equal weighting in (3.3.4) Optimum weighting in (3.3.4) sensor i p i sensor i L i sensor i Figure 3: Equal weight (α i = 1 M, i) and optimal weight combining (α = α opt ) transmit power and channel quantization bits allocation for P fa = 0.1, P t = 10, U = 0.1, and M = 10. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

27 Figure 4: Receiver operating characteristic with P t = 10, U = 0.1 and M = 10 for two different weighting schemes. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 2/2 1 Probability of detection, P d Optimal weight, N=100 samples 0.2 Optimal weight, N=300 samples Equal weight, N=100 samples Equal weight, N=300 samples Probability of false alarm, P fa 1

28 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

29 Figure 5: Probability of detection (P d ) versus the signal to noise ratio (ξ a ) for M = 20, N = 10, P t = 10, P fa = 0.1 and B = 0.5. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 1/3 Probability of detection. P d Opt LRT-based LRT-based in (4.4.8) Opt lin comb in (4.4.9) Eq LRT-based Linear combi in (4.3.9) Eq lin combining a (db)

30 Figure 6: Probability of detection (P d ) versus the number of samples (N) for M = 10 sensors, P fa = 0.1, ξ a = 8.5 db and B = 1. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 2/3 1 Probability of detection, P d Opt fusion rule, P t =10 2 Opt linear combining, P t =10 2 Opt fusion rule, P t =10-1 Opt linear combining, P t = number of samples, N

31 Figure 7: Probability of detection (P d ) versus number of sensors (M) for N = 10, P t = 10, P fa = 0.1, ξ a = 8.5 db and B = 0.5. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 3/3 1 Probability of detection, P d Optimum fusion rule LRT-based LRT-based with weights in (4.4.8) Optimum linear combining in (4.4.9) Equal weight LRT-based Linear combining with weights in (4.3.9) Equal weight linear combining number of sensors, M

32 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

33 Figure 8: A distributed communication architecture among peripheral SNs. The SNs have partial connectivity (thin lines) among themselves (i.e., not a complete graph). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Distributed Two-Step Quantized Fusion Rules Communication Architecture Target SN5 T5 T2 SN2 T1 SN1 T4 SN4 SN3 SN6 T6 T3

34 4. Quantized Distributed Soft Decision Fusion Rule Proposition Here we propose a scheme, where SN i encodes the data (using a simple uniform quantizer with q i bits) prior to information exchange. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

35 4. Quantized Distributed Soft Decision Fusion Rule Proposition Here we propose a scheme, where SN i encodes the data (using a simple uniform quantizer with q i bits) prior to information exchange. 1 We also propose to establish a link between any two SNs i and j based on the (known) SNR at node j, i.e. } if SNR ij < Υ, e ij = e ji = 0 if SNR ij Υ, e ij = e ji = 1. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

36 4. Quantized Distributed Soft Decision Fusion Rule Proposition Here we propose a scheme, where SN i encodes the data (using a simple uniform quantizer with q i bits) prior to information exchange. 1 We also propose to establish a link between any two SNs i and j based on the (known) SNR at node j, i.e. } if SNR ij < Υ, e ij = e ji = 0 if SNR ij Υ, e ij = e ji = 1. 2 Υ is a SNR threshold parameter and SNR ij defined as: SNR ij = pt ij h2 ij ζ 0 d γ. ij Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

37 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

38 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

39 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. 2 An increase in the number of bits that each SN can transmit to its neighbors. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

40 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. 2 An increase in the number of bits that each SN can transmit to its neighbors. A small Υ means: 1 Establishes a more connected graph and dictates a faster information diffusion across the network. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

41 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. 2 An increase in the number of bits that each SN can transmit to its neighbors. A small Υ means: 1 Establishes a more connected graph and dictates a faster information diffusion across the network. 2 Allows less transmission bits resulting in an increase in the quantization noise variance. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

42 4. Simulation Results 1/6 $ Norm. E # PT P $ d Proposed two-step Conventional cons ( ( ; ( Figure 9: Normalized average power consumption (E [ ] P T ), achievable 8 probability of detection (Pd ) and the average communication link density (ρ) versus Υ, with σe 2 h = 0, decision fusion in (5.4.16), P g fa = 0.1, U = 3, N = 20, M = 17 and with α i (scaled by M). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

43 4. Simulation Results 2/6 Global prob. of detection, P g d Upper bound K 1 = 800 K 1 = 500 K 1 = 350 K 1 = 200 K 1 = Centralized optimum linear rule (5.3.12) 0.3 Proposed weighted two-step, K 1 = 100 Proposed weighted two-step, K 1 = Proposed weighted two-step, K 1 = 350 Proposed weighted two-step, K 1 = Proposed weighted two-step, K 1 = 800 Centralized LRT-based [36] Global prob. of false alarm, P g fa Figure 10: Averaged (over 500 h 2 ij realizations) ROC for the proposed two-step weighted algorithm with decision fusion in (40), U = 3, N = 20, M = 17, K 2 = 3, Υ = 30, σ 2 e h = 0 and with α i (scaled by M) in (5.3.9). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

44 4. Simulation Results 3/6 Global prob. of detection, P g d Upper bound K 1 = 50 K 1 = 150 K 1 = Proposed weighted two-step, K 1 = Proposed weighted two-step, K 1 = 150 Proposed weighted two-step, K 1 = Centralized LRT-based [36] Centralized optimum linear rule (5.3.12) Global prob. of false alarm, P g fa Figure 11: Averaged (over 500 h 2 ij realizations) ROC against first step iterations number (K 1 ), with decision fusion in (41), K 2 = 2, U = 3, N = 20, M = 17, Υ = 10, σ 2 e h = 0 and with α i (scaled by M) in (5.3.9). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

45 4. Simulation Results 4/6 Global prob. of detection, P g d Proposed with (5.4.16) Centr opt linear rule Proposed with (5.4.15) LRT-based Centr. LRT-based in [36] Centr. opt linear rule (5.3.12) Proposed two-step with (5.4.16) Proposed two-step with (5.4.15) (db) a Global prob. of detection, P g d < 2 e h = 4 < 2 e h = 0 < 2 e h = 1 Centr. LRT-based in [36] Proposed two-step with (5.4.16) Proposed two-step with (5.4.16) Proposed two-step with (5.4.16) (db) a Figure 12: Averaged (over 500 hij 2 realizations) probability of detection (P g d ) against the signal to noise ratio (ξ a) with P g fa = 0.1, U = 3, N = 20, M = 17, K1 = 320, Υ = 20, ξ i = ξ, i in (4) and with α i (scaled by M) in (5.3.9): (left) ideal, σe 2 h = 0; (right) non-ideal, σe 2 h 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

46 Figure 13: Averaged (over 500 h 2 ij realizations) ROC for the proposed (quantized) two-step weighted fusion rule with U = 3, N = 20, Υ = 20, M = 17 and with α i (scaled by M) in (5.3.9). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 5/6 Global prob. of detection, P g d Centr. opt. K 1 = 320 Centr. eq. comb. K 1 = 320 K 1 = 400 Proposed weighted two-step with (5.4.15) Unquantized eq. comb. (, i = 1) in (5.3.14) Proposed eq. comb. (, i = 1) two-step with (5.4.16) 0.2 Proposed eq. comb. (, i = 1) two-step with (5.4.15) 0.1 Proposed weighted two-step with (5.4.16) Centr. opt. linear rule (5.3.12) Global prob. of false alarm, P g fa

47 4. Simulation Results 6/6 Global prob of detection, P g d Centralized detector K 1 = 10 K 1 = 20 K 1 = Unquantized eq comb in (5.3.14) Proposed eq comb two-step, K 1 = 10 Proposed eq omb two-step, K 1 = SN 3 eq comb -rst step, K 1 = a (db) -2 Figure 14: Probability of detection (P g d ) versus the signal to noise ratio (ξa) for M = 13, Υ = 72, U = 2, N = 20, P g fa = 0.1 and ξ i = ξ. i in (3.2.4) and α i = 1, i in (5.4.4). The topology used is given in right of Fig Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

48 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

49 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. Contributions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

50 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. Contributions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

51 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

52 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions 1 The problem of centralized detection in the presence of compromised SNs is investigated. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

53 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions 1 The problem of centralized detection in the presence of compromised SNs is investigated. 2 Attacker-based and FC-based parameter optimization are considered and some expressions have been derived. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

54 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions 1 The problem of centralized detection in the presence of compromised SNs is investigated. 2 Attacker-based and FC-based parameter optimization are considered and some expressions have been derived. 3 A reputation based scheme to identify the compromised SNs in the network and control their influence to the global FC decision is also proposed. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

55 5. Sensor Detection in the Presence of Falsified Observations Communication Architecture Target SN1 T1 Tf = M αit q i i=1 SN2 T2 T q 3 T q 2 T q 1 Fusion Center T3 fal SN3 T4 SN4 T q 4 T q 5 T q 6 Attacker SN5 SN6 T6 T5 fal Figure 15: Under attack communication architecture between peripheral SNs and the FC. While the honest SNs test statistics remain unchanged, the compromised SNs falsify their test statistics before transmitting to the FC. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

56 5. Simulation Results 1/4 2 h i SNs p o i 10 L i SNs SNs C=5 C=0.5 C=0 Figure 16: SN optimal transmit power (p o i ) and channel bit allocation (L i) with P t = 60, U = 3, ξ a = 10.5 db, N = 20, β = 0.1 and σ 2 e h = 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

57 5. Simulation Results 2/4 Probability of detection, Pd =0.5 =0.1 AF in [35] opt. in (6.2.22),-= 0:1 OAFBB,-= 0:1 WAFBB,-= 0:1 opt. in (6.2.22),-= 0:5 OAFBB,-= 0:5 WAFBB,-= 0:5 OAFBB,-= 1 WAFBB,-= 1 = Probability of false alarm, P fa Figure 17: Probability of detection (P d ) versus probability of false alarm (P fa ) with U = 3, P t = 60, M = 12, N = 20, C i = 0.9, i and σ 2 e h = 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

58 5. Simulation Results 3/4 Probability of detection, Pd C=1.4 C=1.1 C=0.9 C=0.2 C= C=0 C=0.6 C=0 C=0.2 C=0.4 C=0.45 C=0.6 C=0.9 C=1.1 C=1.4 Nash Equilibrium, C= Probability of false alarm, P fa Figure 18: Probability of detection (P d ) versus probability of false alarm (P fa ), with U = 3, ξ a = 10.5 db, P t = 60, M = 12, N = 20, β = 0.2, σ 2 e h = 0 and with optimum weights in (6.2.22). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

59 5. Simulation Results 4/4 Modi-ed de.ection coe/cient, ~ d Optimum, in (6.2.22) Non-optimum, First derivative Attacker strength, C Figure 19: Modified deflection coefficient ( d 2 ) versus the attacker strength (C) with U = 3, ξ a = 10 db, s i = 0.1, i, P t = 60, M = 12, N = 20, β = 0.1 and σ 2 e h = 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

60 Figure 20: Under attack schematic communication architecture between peripheral SNs and the fusion center (FC). While the i th (i = {1, 2, 4, 6}) honest SN indicator (test statistic) remains unchanged (i.e., Ĩi = I i ), the j th (j = {3, 5}) compromised SN falsify its indicator (test statistic) as in (6.3.7) before transmitting to the FC. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / A Secure Sub-optimum Detection Scheme in Under-Attack WSNs Target SN1 I 1 T f = M α i Ĩ i i=1 SN2 I 2 Ĩ 2 Ĩ 3 Ĩ 1 Fusion Center I C 3 SN3 I 4 SN4 Ĩ 4 Ĩ 5 Ĩ 6 Attacker SN5 SN6 I 6 I C 5

61 5. A Secure Sub-optimum Detection Scheme in Under-Attack WSNs FC Optimum Weighting ( )( 1 β p αopt i i = d pfa) i ( + β p i,c fa p i,c )( d 2P fal C ( )( ( )) 1) 1 β p i d 1 p i d +β (P flip C + ( pi,c d 1 2P flip) )( C 1 P flip C + pi,c d ( (1) 2P flip C 1)). Depends upon the local pfa i and the pi d as well as on the β (fraction of compromised SNs) and the probability of flipping the local decisions by the attacker. The FC cannot implement the optimum weight combining fusion rule Attacker Flipping Probability Optimisation Lemma 6.3.2: The optimum flipping probability ( PC,opt) flip which minimizes the modified deflection coefficient is: ( M ( P flip C,opt = β 1 α i p i d p i ) fa i=1 2β M i=1 α i ( p i,c fa p i,c ) d Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42 ) (2)

62 5. Simulation Results 1/6 Reputation metric, r i SN9 SN10 SN11 SN12 SN13 SN15 Reputation metric, r i SN21 SN22 SN23 SN24 SN29 SN30 SN32 SN35 SN FC threshold, Λ f FC threshold, Λ f Figure 21: The reliability metric (r i ) versus the FC detection threshold (Λ f ) against the SNs with M = 40, N = 20, β = 0.5, P flip C = 1 and K = 150. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

63 5. Simulation Results 2/6 37, true d Prob. of det. the compromised SN 37, P K=5 K=10 K=15 K=20 K=30 K=100 K= FC detection threshold, f Figure 22: Probability that the (compromised) SN 37 has been truly detected (P 37,true d ) versus the FC detection threshold (Λ f ) with M = 40, N = 20, β = 0.5, P flip = 1 and δ = C Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

64 5. Simulation Results 3/6 Aver. prob. of det. (mis-det.), Ptrue d ( P false d ) β=0.5 β=0.25 β=0.10 P true d, Λ f = 5 P false d, Λ f = 5 P true d, Λ f = 13 P false d, Λ f = 13 P true d, Λ f = 13 P false d, Λ f = Time window length, K Figure 23: Average compromised SNs detection probability and honest SNs mis-detection probability versus the time window length (K) and against β with M = 40, N = 20, P flip = 1 and δ = C Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

65 5. Simulation Results 4/6 Prob. of det. minus prob. of false alarm, Pd! Pfa f =7 f =9 0.3 Scheme in [73], $ f = 7 Scheme in [73], $ f = Proposed, $ f = 7 Proposed, $ f = Time window length, K Figure 24: The P d P fa metric versus the time window length (K) against the FC detection threshold (Λ f ) with M = 40, N = 20, β = 0.25, P flip = 0.2, δ = 0.95 and µ = 10. C Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

66 5. Simulation Results 5/ Proposed Prob. of detection, Pd Upper Bound Equal combining in [35] Perfect SNs iden. and tot. removal Opt. weights (6.3.24), perfect SNs iden. Proposed,7 = 15,/=0:09 Proposed,7 = 15,/=0:12 Proposed,7 = 55,/=0: , i =, i AF in (6.3.10), no iden. scheme 0 0 Proposed,7 = 35,/=0:009 No ident. scheme Prob. of false alarm, P fa 1 Figure 25: Probability of detection (P d ) versus probability of false alarm (P fa ) with M = 40, N = 20, β = 0.5, P flip C = 1 and K = 5. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

67 Figure 26: Probability of detection (P d ) versus probability of false alarm (P fa ) against δ and µ with M = 40, N = 20, β = 0.25, and P flip C = 1. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 6/6 Prob. of detection, Pd Eq. comb. No iden. scheme Proposed Upper Bound Opt. weights (6.3.24), perf. SNs iden. Equal combining in [35],-= 0 Proposed,/=0:009, K=80,7 = 6 Proposed,/=0:009, K=40,7 = 6 Proposed,/=0:009, K=5,7 = 10 Proposed,/=0:009, K=5,7 = 14 Proposed,/=0:009, K=5,7 = With, i =, i AF in (6.3.10), no iden. Scheme in [73] Scheme in [73],/= 1, K = Equal combining,- = 0: Prob. of false alarm, P fa

68 Summary We derive the optimum fusion rule and then analyze sub-optimum fusion rules that are realizable and easily implemented in practical WSN deployment scenarios. The effect of fading channels on detection performance is minimized by solving the resource allocation problem. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

69 Summary We derive the optimum fusion rule and then analyze sub-optimum fusion rules that are realizable and easily implemented in practical WSN deployment scenarios. The effect of fading channels on detection performance is minimized by solving the resource allocation problem. A two-step consensus-based approach with weight combining quantized test statistics exchange is proposed. We relate the communication topology with the number of bits to be shared among SNs. It turns out that there is an optimum topology that maximizes the detection performance. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

70 Summary We derive the optimum fusion rule and then analyze sub-optimum fusion rules that are realizable and easily implemented in practical WSN deployment scenarios. The effect of fading channels on detection performance is minimized by solving the resource allocation problem. A two-step consensus-based approach with weight combining quantized test statistics exchange is proposed. We relate the communication topology with the number of bits to be shared among SNs. It turns out that there is an optimum topology that maximizes the detection performance. Centralized detection in the presence of compromised SNs is also investigated. Attacker and FC based parameter optimization are considered and some expressions have been derived. A reputation based scheme to identify the compromised SNs in the network and control their influence to the global FC decision is also proposed. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

71 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

72 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

73 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

74 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

75 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

76 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision = Offers an improved detection performance but requires observing the SN s local reports for a period of time. A larger observation time period (K) may lead to a large detection delay that is critical for most of the event detection applications. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

77 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision = Offers an improved detection performance but requires observing the SN s local reports for a period of time. A larger observation time period (K) may lead to a large detection delay that is critical for most of the event detection applications. We have addressed the fully distributed detection problem and proposed signal processing algorithms for such an approach Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

78 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision = Offers an improved detection performance but requires observing the SN s local reports for a period of time. A larger observation time period (K) may lead to a large detection delay that is critical for most of the event detection applications. We have addressed the fully distributed detection problem and proposed signal processing algorithms for such an approach = Very attractive from both the signal processing perspective and the communication point of view. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

79 Questions/Comments Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42

بسم الله الرحمن الرحيم

بسم الله الرحمن الرحيم بسم الله الرحمن الرحيم Reliability Improvement of Distributed Detection in Clustered Wireless Sensor Networks 1 RELIABILITY IMPROVEMENT OF DISTRIBUTED DETECTION IN CLUSTERED WIRELESS SENSOR NETWORKS PH.D.

More information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services wassim.znaidi@insa-lyon.fr

More information

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN

AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN A Thesis Presented to The Academic Faculty by Bryan Larish In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy

More information

False Discovery Rate Based Distributed Detection in the Presence of Byzantines

False Discovery Rate Based Distributed Detection in the Presence of Byzantines IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS () 1 False Discovery Rate Based Distributed Detection in the Presence of Byzantines Aditya Vempaty*, Student Member, IEEE, Priyadip Ray, Member, IEEE,

More information

EUSIPCO

EUSIPCO EUSIPCO 3 569736677 FULLY ISTRIBUTE SIGNAL ETECTION: APPLICATION TO COGNITIVE RAIO Franc Iutzeler Philippe Ciblat Telecom ParisTech, 46 rue Barrault 753 Paris, France email: firstnamelastname@telecom-paristechfr

More information

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks

Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Mohammed Karmoose Electrical Engineering Department Alexandria University Alexandria 1544, Egypt Email: mhkarmoose@ieeeorg Karim

More information

Diffusion LMS Algorithms for Sensor Networks over Non-ideal Inter-sensor Wireless Channels

Diffusion LMS Algorithms for Sensor Networks over Non-ideal Inter-sensor Wireless Channels Diffusion LMS Algorithms for Sensor Networs over Non-ideal Inter-sensor Wireless Channels Reza Abdolee and Benoit Champagne Electrical and Computer Engineering McGill University 3480 University Street

More information

Censoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks

Censoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks Censoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks Mohamed Seif 1 Mohammed Karmoose 2 Moustafa Youssef 3 1 Wireless Intelligent Networks Center (WINC),, Egypt 2

More information

Fully-distributed spectrum sensing: application to cognitive radio

Fully-distributed spectrum sensing: application to cognitive radio Fully-distributed spectrum sensing: application to cognitive radio Philippe Ciblat Dpt Comelec, Télécom ParisTech Joint work with F. Iutzeler (PhD student funded by DGA grant) Cognitive radio principle

More information

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations

Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National

More information

Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks

Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Keshav Agrawal, Aditya Vempaty, Hao Chen and Pramod K. Varshney Electrical Engineering Department,

More information

Fusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks

Fusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks Fusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks Biao Chen, Ruixiang Jiang, Teerasit Kasetkasem, and Pramod K. Varshney Syracuse University, Department of EECS, Syracuse,

More information

On Noise-Enhanced Distributed Inference in the Presence of Byzantines

On Noise-Enhanced Distributed Inference in the Presence of Byzantines Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 211 On Noise-Enhanced Distributed Inference in the Presence of Byzantines Mukul Gagrani

More information

Threshold Considerations in Distributed Detection in a Network of Sensors.

Threshold Considerations in Distributed Detection in a Network of Sensors. Threshold Considerations in Distributed Detection in a Network of Sensors. Gene T. Whipps 1,2, Emre Ertin 2, and Randolph L. Moses 2 1 US Army Research Laboratory, Adelphi, MD 20783 2 Department of Electrical

More information

Optimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels

Optimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels Optimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels Qing an Ren Yunmin Zhu Dept. of Mathematics Sichuan University Sichuan, China

More information

Decentralized Detection In Wireless Sensor Networks

Decentralized Detection In Wireless Sensor Networks Decentralized Detection In Wireless Sensor Networks Milad Kharratzadeh Department of Electrical & Computer Engineering McGill University Montreal, Canada April 2011 Statistical Detection and Estimation

More information

DIT - University of Trento

DIT - University of Trento PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento TOWARDS ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO NETWORKS

More information

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo

Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks Ji an Luo 2008.6.6 Outline Background Problem Statement Main Results Simulation Study Conclusion Background Wireless

More information

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints

Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong

More information

INFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS. Michael A. Lexa and Don H. Johnson

INFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS. Michael A. Lexa and Don H. Johnson INFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS Michael A. Lexa and Don H. Johnson Rice University Department of Electrical and Computer Engineering Houston, TX 775-892 amlexa@rice.edu,

More information

Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility

Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility 1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong

More information

Distributed Inference and Learning with Byzantine Data

Distributed Inference and Learning with Byzantine Data Syracuse University SURFACE Dissertations - ALL SURFACE 8-1-2016 Distributed Inference and Learning with Byzantine Data Bhavya Kailkhura Syracuse University Follow this and additional works at: http://surface.syr.edu/etd

More information

Multisensor Data Fusion for Water Quality Monitoring using Wireless Sensor Networks

Multisensor Data Fusion for Water Quality Monitoring using Wireless Sensor Networks Multisensor Data usion for Water Quality Monitoring using Wireless Sensor Networks Ebrahim Karami, rancis M. Bui, and Ha H. Nguyen Department of Electrical and Computer Engineering, University of Saskatchewan,

More information

Research on Consistency Problem of Network Multi-agent Car System with State Predictor

Research on Consistency Problem of Network Multi-agent Car System with State Predictor International Core Journal of Engineering Vol. No.9 06 ISSN: 44-895 Research on Consistency Problem of Network Multi-agent Car System with State Predictor Yue Duan a, Linli Zhou b and Yue Wu c Institute

More information

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions

certain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions Score-Function Quantization for Distributed Estimation Parvathinathan Venkitasubramaniam and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 4853 Email: {pv45, lt35}@cornell.edu

More information

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria

ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/

More information

Distributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks

Distributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks Distributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks Ying Lin and Biao Chen Dept. of EECS Syracuse University Syracuse, NY 13244, U.S.A. ylin20 {bichen}@ecs.syr.edu Peter

More information

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback

Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of

More information

Optimal matching in wireless sensor networks

Optimal matching in wireless sensor networks Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network

More information

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS

QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS Parvathinathan Venkitasubramaniam, Gökhan Mergen, Lang Tong and Ananthram Swami ABSTRACT We study the problem of quantization for

More information

WITH the wide employment of wireless devices in various

WITH the wide employment of wireless devices in various 1 Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel Lichuan a, Student ember, IEEE, Yong Xiang, Senior ember, IEEE, Qingqi Pei, Senior ember, IEEE, Yang Xiang, Senior

More information

Binary Compressive Sensing via Analog. Fountain Coding

Binary Compressive Sensing via Analog. Fountain Coding Binary Compressive Sensing via Analog 1 Fountain Coding Mahyar Shirvanimoghaddam, Member, IEEE, Yonghui Li, Senior Member, IEEE, Branka Vucetic, Fellow, IEEE, and Jinhong Yuan, Senior Member, IEEE, arxiv:1508.03401v1

More information

Novel spectrum sensing schemes for Cognitive Radio Networks

Novel spectrum sensing schemes for Cognitive Radio Networks Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced

More information

Binary Consensus for Cooperative Spectrum Sensing in Cognitive Radio Networks

Binary Consensus for Cooperative Spectrum Sensing in Cognitive Radio Networks Binary Consensus for Cooperative Spectrum Sensing in Cognitive Radio Networks Shwan Ashrafi, ehrzad almirchegini, and Yasamin ostofi Department of Electrical and Computer Engineering University of New

More information

VoI for Learning and Inference! in Sensor Networks!

VoI for Learning and Inference! in Sensor Networks! ARO MURI on Value-centered Information Theory for Adaptive Learning, Inference, Tracking, and Exploitation VoI for Learning and Inference in Sensor Networks Gene Whipps 1,2, Emre Ertin 2, Randy Moses 2

More information

Probabilistic model for Intrusion Detection in Wireless Sensor Network

Probabilistic model for Intrusion Detection in Wireless Sensor Network Probabilistic model for Intrusion Detection in Wireless Sensor Network Maduri Chopde, Kimi Ramteke and Satish Kamble Department of Computer Science PICT, Pune Pune University, India madhurichopde@gmail.com,

More information

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:

More information

Introduction to Statistical Inference

Introduction to Statistical Inference Structural Health Monitoring Using Statistical Pattern Recognition Introduction to Statistical Inference Presented by Charles R. Farrar, Ph.D., P.E. Outline Introduce statistical decision making for Structural

More information

Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration

Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration Mohammad Fanaei, Matthew C. Valenti Abbas Jamalipour, and Natalia A. Schmid Dept. of Computer Science and Electrical

More information

A Byzantine Attack Defender: the Conditional Frequency Check

A Byzantine Attack Defender: the Conditional Frequency Check A Byzantine Attack Defender: the Conditional Frequency Check Xiaofan He and Huaiyu Dai Peng Ning Department of ECE Department of CSC North Carolina State University, USA North Carolina State University,

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Co-Prime Arrays and Difference Set Analysis

Co-Prime Arrays and Difference Set Analysis 7 5th European Signal Processing Conference (EUSIPCO Co-Prime Arrays and Difference Set Analysis Usham V. Dias and Seshan Srirangarajan Department of Electrical Engineering Bharti School of Telecommunication

More information

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.

SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O. SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of

More information

Hard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor

Hard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor Hard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor Hossam M. Farag Dept. of Electrical Engineering, Aswan University, Egypt. hossam.farag@aswu.edu.eg Ehab Mahmoud

More information

Improved Spectrum Utilization in Cognitive Radio Systems

Improved Spectrum Utilization in Cognitive Radio Systems Improved Spectrum Utilization in Cognitive Radio Systems Lei Cao and Ramanarayanan Viswanathan Department of Electrical Engineering The University of Mississippi Jan. 15, 2014 Lei Cao and Ramanarayanan

More information

STATISTICAL STRATEGIES FOR EFFICIENT SIGNAL DETECTION AND PARAMETER ESTIMATION IN WIRELESS SENSOR NETWORKS. Eric Ayeh

STATISTICAL STRATEGIES FOR EFFICIENT SIGNAL DETECTION AND PARAMETER ESTIMATION IN WIRELESS SENSOR NETWORKS. Eric Ayeh STATISTICAL STRATEGIES FOR EFFICIENT SIGNAL DETECTION AND PARAMETER ESTIMATION IN WIRELESS SENSOR NETWORKS Eric Ayeh Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY UNIVERSITY OF NORTH TEXAS

More information

SPATIAL DIVERSITY AWARE DATA FUSION FOR COOPERATIVE SPECTRUM SENSING

SPATIAL DIVERSITY AWARE DATA FUSION FOR COOPERATIVE SPECTRUM SENSING 2th European Signal Processing Conference (EUSIPCO 22) Bucharest, Romania, August 27-3, 22 SPATIAL DIVERSITY AWARE DATA FUSIO FOR COOPERATIVE SPECTRUM SESIG uno Pratas (,2) eeli R. Prasad () António Rodrigues

More information

Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks

Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks by Nagwa Shaghluf B.S., Tripoli University, Tripoli, Libya, 2009 A Thesis Submitted in Partial Fulfillment of the Requirements

More information

Optimal Distributed Detection Strategies for Wireless Sensor Networks

Optimal Distributed Detection Strategies for Wireless Sensor Networks Optimal Distributed Detection Strategies for Wireless Sensor Networks Ke Liu and Akbar M. Sayeed University of Wisconsin-Madison kliu@cae.wisc.edu, akbar@engr.wisc.edu Abstract We study optimal distributed

More information

Performance Evaluation of Censoring-Enabled Systems for Sequential Detection in Large Wireless Sensor Networks

Performance Evaluation of Censoring-Enabled Systems for Sequential Detection in Large Wireless Sensor Networks Performance Evaluation of Censoring-Enabled Systems for Sequential Detection in Large Wireless Sensor Networks Mohammed Karmoose Karim Seddik 2 Ahmed Sultan Electrical Engineering Dept, Alexandria University

More information

RECENTLY, wireless sensor networks have been the object

RECENTLY, wireless sensor networks have been the object IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 4, APRIL 2007 1511 Distributed Sequential Bayesian Estimation of a Diffusive Source in Wireless Sensor Networks Tong Zhao, Student Member, IEEE, and

More information

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users

Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,

More information

MODULATION AND CODING FOR QUANTIZED CHANNELS. Xiaoying Shao and Harm S. Cronie

MODULATION AND CODING FOR QUANTIZED CHANNELS. Xiaoying Shao and Harm S. Cronie MODULATION AND CODING FOR QUANTIZED CHANNELS Xiaoying Shao and Harm S. Cronie x.shao@ewi.utwente.nl, h.s.cronie@ewi.utwente.nl University of Twente, Faculty of EEMCS, Signals and Systems Group P.O. box

More information

Quantifying Cyber Security for Networked Control Systems

Quantifying Cyber Security for Networked Control Systems Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin

More information

Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul

Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul 1 Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul Seongah Jeong, Osvaldo Simeone, Alexander Haimovich, Joonhyuk Kang Department of Electrical Engineering, KAIST, Daejeon,

More information

Sensing for Cognitive Radio Networks

Sensing for Cognitive Radio Networks Censored Truncated Sequential Spectrum 1 Sensing for Cognitive Radio Networks Sina Maleki Geert Leus arxiv:1106.2025v2 [cs.sy] 14 Mar 2013 Abstract Reliable spectrum sensing is a key functionality of a

More information

Lloyd-Max Quantization of Correlated Processes: How to Obtain Gains by Receiver-Sided Time-Variant Codebooks

Lloyd-Max Quantization of Correlated Processes: How to Obtain Gains by Receiver-Sided Time-Variant Codebooks Lloyd-Max Quantization of Correlated Processes: How to Obtain Gains by Receiver-Sided Time-Variant Codebooks Sai Han and Tim Fingscheidt Institute for Communications Technology, Technische Universität

More information

g(.) 1/ N 1/ N Decision Decision Device u u u u CP

g(.) 1/ N 1/ N Decision Decision Device u u u u CP Distributed Weak Signal Detection and Asymptotic Relative Eciency in Dependent Noise Hakan Delic Signal and Image Processing Laboratory (BUSI) Department of Electrical and Electronics Engineering Bogazici

More information

Asymptotically Optimal and Bandwith-efficient Decentralized Detection

Asymptotically Optimal and Bandwith-efficient Decentralized Detection Asymptotically Optimal and Bandwith-efficient Decentralized Detection Yasin Yılmaz and Xiaodong Wang Electrical Engineering Department, Columbia University New Yor, NY 10027 Email: yasin,wangx@ee.columbia.edu

More information

ADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION. A Dissertation by.

ADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION. A Dissertation by. ADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION A Dissertation by Tze Chien Wong Master of Science, Wichita State University, 2008 Bachelor

More information

Hyung So0 Kim and Alfred 0. Hero

Hyung So0 Kim and Alfred 0. Hero WHEN IS A MAXIMAL INVARIANT HYPOTHESIS TEST BETTER THAN THE GLRT? Hyung So0 Kim and Alfred 0. Hero Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, MI 48109-2122

More information

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading

Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider

More information

Improved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection

Improved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection Improved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection Manish Mandloi, Mohammed Azahar Hussain and Vimal Bhatia Discipline of Electrical Engineering,

More information

Minimum Mean Squared Error Interference Alignment

Minimum Mean Squared Error Interference Alignment Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität

More information

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids

False Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids 1 False Data Injection Attacks Against Nonlinear State Estimation in Smart Power rids Md. Ashfaqur Rahman and Hamed Mohsenian-Rad Department of Electrical and Computer Engineering, Texas Tech University,

More information

Cyber Attacks, Detection and Protection in Smart Grid State Estimation

Cyber Attacks, Detection and Protection in Smart Grid State Estimation 1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation

More information

A Systematic Description of Source Significance Information

A Systematic Description of Source Significance Information A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh

More information

THE potential for large-scale sensor networks is attracting

THE potential for large-scale sensor networks is attracting IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 327 Detection in Sensor Networks: The Saddlepoint Approximation Saeed A. Aldosari, Member, IEEE, and José M. F. Moura, Fellow, IEEE

More information

Data and error rate bounds for binar gathering wireless sensor networks. He, Xin; Zhou, Xiaobo; Juntti, Markk Author(s) Tad

Data and error rate bounds for binar gathering wireless sensor networks. He, Xin; Zhou, Xiaobo; Juntti, Markk Author(s) Tad JAIST Reposi https://dspace.j Title Data and error rate bounds for binar gathering wireless sensor networks He, Xin; Zhou, Xiaobo; Juntti, Markk Author(s) Tad Citation 205 IEEE 6th International Worksho

More information

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information

One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information ZOU Sheng and Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan University of

More information

Remote Estimation Games over Shared Networks

Remote Estimation Games over Shared Networks October st, 04 Remote Estimation Games over Shared Networks Marcos Vasconcelos & Nuno Martins marcos@umd.edu Dept. of Electrical and Computer Engineering Institute of Systems Research University of Maryland,

More information

Distributed estimation in sensor networks

Distributed estimation in sensor networks in sensor networks A. Benavoli Dpt. di Sistemi e Informatica Università di Firenze, Italy. e-mail: benavoli@dsi.unifi.it Outline 1 An introduction to 2 3 An introduction to An introduction to In recent

More information

Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios

Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios 1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong,

More information

Lecture 4. Capacity of Fading Channels

Lecture 4. Capacity of Fading Channels 1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February

More information

Binary Consensus Over Fading Channels: A Best Affine Estimation Approach

Binary Consensus Over Fading Channels: A Best Affine Estimation Approach Binary Consensus Over Fading Channels: A Best Affine Estimation Approach ehrzad almirchegini, Yongxiang Ruan and Yasamin ostofi Department of Electrical and Computer Engineering University of New exico,

More information

Robust Binary Quantizers for Distributed Detection

Robust Binary Quantizers for Distributed Detection 1 Robust Binary Quantizers for Distributed Detection Ying Lin, Biao Chen, and Bruce Suter Abstract We consider robust signal processing techniques for inference-centric distributed sensor networks operating

More information

Quantum Wireless Sensor Networks

Quantum Wireless Sensor Networks Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.

More information

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy

Spectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012

More information

A SPARSENESS CONTROLLED PROPORTIONATE ALGORITHM FOR ACOUSTIC ECHO CANCELLATION

A SPARSENESS CONTROLLED PROPORTIONATE ALGORITHM FOR ACOUSTIC ECHO CANCELLATION 6th European Signal Processing Conference (EUSIPCO 28), Lausanne, Switzerland, August 25-29, 28, copyright by EURASIP A SPARSENESS CONTROLLED PROPORTIONATE ALGORITHM FOR ACOUSTIC ECHO CANCELLATION Pradeep

More information

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks

Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer

More information

Decentralized Detection in Wireless Sensor Networks with Channel Fading Statistics

Decentralized Detection in Wireless Sensor Networks with Channel Fading Statistics 1 Decentralized Detection in Wireless Sensor Networks with Channel Fading Statistics Bin Liu, Biao Chen Abstract Existing channel aware signal processing design for decentralized detection in wireless

More information

ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat

ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS Michael G. Rabbat Dept. of Electrical and Computer Engineering McGill University, Montréal, Québec Email: michael.rabbat@mcgill.ca ABSTRACT This paper

More information

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks

Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks Priyank Anand, Ankit Singh Rawat Department of Electrical Engineering Indian Institute of Technology Kanpur

More information

On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing

On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing 1 On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing Sinan Gezici, Senior Member, IEEE, and Pramod K. Varshney, Life Fellow, IEEE Abstract In this letter, the

More information

Research Article Optimal Power Constrained Distributed Detection over a Noisy Multiaccess Channel

Research Article Optimal Power Constrained Distributed Detection over a Noisy Multiaccess Channel Mathematical Problems in Engineering Volume 015, Article ID 58089, 7 pages http://dx.doi.org/10.1155/015/58089 Research Article Optimal Power Constrained Distributed Detection over a oisy Multiaccess Channel

More information

Reliable Cooperative Sensing in Cognitive Networks

Reliable Cooperative Sensing in Cognitive Networks Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI

More information

Cooperative Communication with Feedback via Stochastic Approximation

Cooperative Communication with Feedback via Stochastic Approximation Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu

More information

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver

Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,

More information

Modifying Voice Activity Detection in Low SNR by correction factors

Modifying Voice Activity Detection in Low SNR by correction factors Modifying Voice Activity Detection in Low SNR by correction factors H. Farsi, M. A. Mozaffarian, H.Rahmani Department of Electrical Engineering University of Birjand P.O. Box: +98-9775-376 IRAN hfarsi@birjand.ac.ir

More information

Capacity of the Discrete-Time AWGN Channel Under Output Quantization

Capacity of the Discrete-Time AWGN Channel Under Output Quantization Capacity of the Discrete-Time AWGN Channel Under Output Quantization Jaspreet Singh, Onkar Dabeer and Upamanyu Madhow Abstract We investigate the limits of communication over the discrete-time Additive

More information

Adaptive sparse algorithms for estimating sparse channels in broadband wireless communications systems

Adaptive sparse algorithms for estimating sparse channels in broadband wireless communications systems Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Sendai, Japan, 28 Oct. 2013. Adaptive sparse algorithms for estimating sparse channels in broadband wireless communications

More information

A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology

A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology Amir Amini, Amir Asif, Arash Mohammadi Electrical and Computer Engineering,, Montreal, Canada.

More information

Evidence Theory based Cooperative Energy Detection under Noise Uncertainty

Evidence Theory based Cooperative Energy Detection under Noise Uncertainty Evidence Theory based Cooperative Energy Detection under Noise Uncertainty by Sachin Chaudhari, Prakash Gohain in IEEE GLOBECOM 7 Report No: IIIT/TR/7/- Centre for Communications International Institute

More information

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach

Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Ning Li, Student Member, IEEE, Jose-Fernan Martinez-Ortega, Gregorio Rubio Abstract-

More information

Enhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee

Enhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee Enhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee Faheem Zafari 1, Jian Li 2, Kin K. Leung 1, Don Towsley 2, Ananthram Swami 3 1 Imperial College London 2 University

More information

On Distributed Estimation for Resource Constrained Wireless Sensor Networks

On Distributed Estimation for Resource Constrained Wireless Sensor Networks University of Central Florida Electronic Theses and Dissertations Doctoral Dissertation (Open Access) On Distributed Estimation for Resource Constrained Wireless Sensor Networks 017 Alireza Sani University

More information

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions

392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions 392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6 Problem Set 2 Solutions Problem 2.1 (Cartesian-product constellations) (a) Show that if A is a K-fold Cartesian

More information

COOPERATIVE relay networks have recently attracted much

COOPERATIVE relay networks have recently attracted much On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment Mohammed W Baidas, Ahmed S Ibrahim, Karim G Seddik,KJRayLiu Department of Electrical Computer Engineering,

More information

Detection theory 101 ELEC-E5410 Signal Processing for Communications

Detection theory 101 ELEC-E5410 Signal Processing for Communications Detection theory 101 ELEC-E5410 Signal Processing for Communications Binary hypothesis testing Null hypothesis H 0 : e.g. noise only Alternative hypothesis H 1 : signal + noise p(x;h 0 ) γ p(x;h 1 ) Trade-off

More information

IN HYPOTHESIS testing problems, a decision-maker aims

IN HYPOTHESIS testing problems, a decision-maker aims IEEE SIGNAL PROCESSING LETTERS, VOL. 25, NO. 12, DECEMBER 2018 1845 On the Optimality of Likelihood Ratio Test for Prospect Theory-Based Binary Hypothesis Testing Sinan Gezici, Senior Member, IEEE, and

More information