Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security
|
|
- Dorcas Lloyd
- 5 years ago
- Views:
Transcription
1 Distributed Detection and Estimation in Wireless Sensor Networks: Resource Allocation, Fusion Rules, and Network Security Edmond Nurellari The University of Leeds, UK School of Electronic and Electrical Engineering In accordance with the requirements for the degree of Doctor of Philosophy June 6, 2017 Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
2 Overview 1 Introduction Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
3 Overview 1 Introduction 2 Optimal Quantization and Power Allocation Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
4 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
5 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
6 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
7 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
8 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
9 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
10 1. Introduction Motivation WSNs spatially deployed over a field can be designed to collect information and monitor many phenomena of interest. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
11 1. Introduction Motivation WSNs spatially deployed over a field can be designed to collect information and monitor many phenomena of interest. Important role in several daily application scenarios such as health-care monitoring, home applications, smart farming, environment monitoring, and military Design Challenges in WSNs Nature... Attacker 1 FUSION CENTER T2 SN2 SN5 T5 SN9 T1 SN1 T4 SN4 SN7 SN8 SN3 SN6 T6 T3 SN10 Figure 1: (left) A WSN architecture. (right) Smart city infrastructure. SN1 active sensor node, manipulated by the attacker Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
12 1. Introduction Motivation WSNs spatially deployed over a field can be designed to collect information and monitor many phenomena of interest. Important role in several daily application scenarios such as health-care monitoring, home applications, smart farming, environment monitoring, and military Design Challenges in WSNs Nature... Attacker 1 FUSION CENTER T2 SN2 SN5 T5 SN9 T1 SN1 T4 SN4 SN7 SN8 SN3 SN6 T6 T3 SN10 Figure 1: (left) A WSN architecture. (right) Smart city infrastructure. SN1 active sensor node, manipulated by the attacker Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
13 1. Introduction Design Challenges in WSNs Low Power Hardware: Clearly, the biggest design constraint in WSNs still remains the power consumption. Even-though the SNs are being designed using low-power micro controllers, their power dissipation is still orders of magnitude too high. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
14 1. Introduction Design Challenges in WSNs Low Power Hardware: Clearly, the biggest design constraint in WSNs still remains the power consumption. Even-though the SNs are being designed using low-power micro controllers, their power dissipation is still orders of magnitude too high. Resource Constraints: Battery operated devices with limited on-board energy, both the system lifetime and communication bandwidth (BW) are restricted. Both the signal processing and communication should be carefully designed to consume minimal energy in order to extend the lifetime and improve the overall reliability of the WSN. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
15 1. Introduction Design Challenges in WSNs Low Power Hardware: Clearly, the biggest design constraint in WSNs still remains the power consumption. Even-though the SNs are being designed using low-power micro controllers, their power dissipation is still orders of magnitude too high. Resource Constraints: Battery operated devices with limited on-board energy, both the system lifetime and communication bandwidth (BW) are restricted. Both the signal processing and communication should be carefully designed to consume minimal energy in order to extend the lifetime and improve the overall reliability of the WSN. Network Security:Usually unattended (geographically dispersed) and this makes them vulnerable to attacks. The overall detection and estimation strongly depends on the reliability of these SNs. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
16 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
17 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
18 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
19 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
20 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
21 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec E. Nurellari, D. McLernon, M. Ghogho and S. A. R. Zaidi, Distributed Optimal Quantization and Power Allocation for Sensor Detection Via Consensus, Proc. IEEE VTC Spring, Glasgow, U.K., May Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
22 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec E. Nurellari, D. McLernon, M. Ghogho and S. A. R. Zaidi, Distributed Optimal Quantization and Power Allocation for Sensor Detection Via Consensus, Proc. IEEE VTC Spring, Glasgow, U.K., May E. Nurellari, S. Aldalahmeh, M. Ghogho, and D. McLernon, Quantized Fusion Rules for Energy-Based Distributed Detection in Wireless Sensor Networks, Proc. IEEE SSPD, Edinburgh, Scotland, 8-9 Sep Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
23 Contribution-Publications List 1 E. Nurellari, D. McLernon, and M. Ghogho A Secure Optimum Distributed Detection Scheme in Under-Attack Wireless Sensor Networks, in IEEE Trans. on Signal and Information Processing over Networks (TSIPN), April E. Nurellari, D. McLernon, and M. Ghogho, Distributed Binary Event Detection Under Data-Falsification and Energy-Bandwidth Limitation, in IEEE Sensors Journal, vol. 16, no. 16, pp , Aug. 15, E. Nurellari, D. McLernon, and M. Ghogho, Distributed Two-Step Quantized Fusion Rules via Consensus Algorithm for Distributed Detection in Wireless Sensor Networks, in IEEE Transactions on Signal and Information Processing over Networks (TSIPN), vol. 2, no. 3, pp , Sept S. Aldalahmeh, M. Ghogho, D. McLernon, and E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks, EURASIP Journal on Advances in Signal Process., 2016:5, Jan E. Nurellari, D. McLernon, and M. Ghogho, Distributed detection in practical wireless sensor networks via a two step consensus algorithm, in Proc. IET Int. conf. on Intelligent Signal Process. (ISP), London, United Kingdom, 1-2 Dec E. Nurellari, D. McLernon, M. Ghogho and S. A. R. Zaidi, Distributed Optimal Quantization and Power Allocation for Sensor Detection Via Consensus, Proc. IEEE VTC Spring, Glasgow, U.K., May E. Nurellari, S. Aldalahmeh, M. Ghogho, and D. McLernon, Quantized Fusion Rules for Energy-Based Distributed Detection in Wireless Sensor Networks, Proc. IEEE SSPD, Edinburgh, Scotland, 8-9 Sep E. Nurellari, D. McLernon, M. Ghogho and S. Aldalahmeh, Optimal quantization and power allocation for energy-based distributed sensor detection, Proc. IEEE EUSIPCO, Lisbon, Portugal, 1-5 Sept Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
24 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
25 2. Optimal Quantization and Power Allocation System Architecture Target SN1 T1 [T1]Q T2 SN2 [T2]Q [T3]Q Fusion Center [T4]Q [T5]Q T3 SN3 T4 SN4 T q f = M α i [T i ] Q i=1 SN5 T5 Figure 2: Communication architecture between peripheral SNs and the FC. Each SN generates a test statistic by observing the target and can communicate with the FC only over an energy-constrained/bandwidth-constrained link. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
26 2. Simulation Results 1/2 h 2 i Equal weighting in (3.3.4) Optimum weighting in (3.3.4) sensor i p i sensor i L i sensor i Figure 3: Equal weight (α i = 1 M, i) and optimal weight combining (α = α opt ) transmit power and channel quantization bits allocation for P fa = 0.1, P t = 10, U = 0.1, and M = 10. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
27 Figure 4: Receiver operating characteristic with P t = 10, U = 0.1 and M = 10 for two different weighting schemes. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 2/2 1 Probability of detection, P d Optimal weight, N=100 samples 0.2 Optimal weight, N=300 samples Equal weight, N=100 samples Equal weight, N=300 samples Probability of false alarm, P fa 1
28 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
29 Figure 5: Probability of detection (P d ) versus the signal to noise ratio (ξ a ) for M = 20, N = 10, P t = 10, P fa = 0.1 and B = 0.5. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 1/3 Probability of detection. P d Opt LRT-based LRT-based in (4.4.8) Opt lin comb in (4.4.9) Eq LRT-based Linear combi in (4.3.9) Eq lin combining a (db)
30 Figure 6: Probability of detection (P d ) versus the number of samples (N) for M = 10 sensors, P fa = 0.1, ξ a = 8.5 db and B = 1. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 2/3 1 Probability of detection, P d Opt fusion rule, P t =10 2 Opt linear combining, P t =10 2 Opt fusion rule, P t =10-1 Opt linear combining, P t = number of samples, N
31 Figure 7: Probability of detection (P d ) versus number of sensors (M) for N = 10, P t = 10, P fa = 0.1, ξ a = 8.5 db and B = 0.5. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 3/3 1 Probability of detection, P d Optimum fusion rule LRT-based LRT-based with weights in (4.4.8) Optimum linear combining in (4.4.9) Equal weight LRT-based Linear combining with weights in (4.3.9) Equal weight linear combining number of sensors, M
32 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
33 Figure 8: A distributed communication architecture among peripheral SNs. The SNs have partial connectivity (thin lines) among themselves (i.e., not a complete graph). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Distributed Two-Step Quantized Fusion Rules Communication Architecture Target SN5 T5 T2 SN2 T1 SN1 T4 SN4 SN3 SN6 T6 T3
34 4. Quantized Distributed Soft Decision Fusion Rule Proposition Here we propose a scheme, where SN i encodes the data (using a simple uniform quantizer with q i bits) prior to information exchange. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
35 4. Quantized Distributed Soft Decision Fusion Rule Proposition Here we propose a scheme, where SN i encodes the data (using a simple uniform quantizer with q i bits) prior to information exchange. 1 We also propose to establish a link between any two SNs i and j based on the (known) SNR at node j, i.e. } if SNR ij < Υ, e ij = e ji = 0 if SNR ij Υ, e ij = e ji = 1. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
36 4. Quantized Distributed Soft Decision Fusion Rule Proposition Here we propose a scheme, where SN i encodes the data (using a simple uniform quantizer with q i bits) prior to information exchange. 1 We also propose to establish a link between any two SNs i and j based on the (known) SNR at node j, i.e. } if SNR ij < Υ, e ij = e ji = 0 if SNR ij Υ, e ij = e ji = 1. 2 Υ is a SNR threshold parameter and SNR ij defined as: SNR ij = pt ij h2 ij ζ 0 d γ. ij Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
37 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
38 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
39 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. 2 An increase in the number of bits that each SN can transmit to its neighbors. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
40 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. 2 An increase in the number of bits that each SN can transmit to its neighbors. A small Υ means: 1 Establishes a more connected graph and dictates a faster information diffusion across the network. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
41 4. Quantized Distributed Soft Decision Fusion Rule Proposition We propose to quantize with q i bits at SN i before transmitting to SN j : q i 1 2 log 2 (1 + Υ) bits/sample A large Υ means: 1 Fewer communication links and so slower information diffusion across the network. 2 An increase in the number of bits that each SN can transmit to its neighbors. A small Υ means: 1 Establishes a more connected graph and dictates a faster information diffusion across the network. 2 Allows less transmission bits resulting in an increase in the quantization noise variance. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
42 4. Simulation Results 1/6 $ Norm. E # PT P $ d Proposed two-step Conventional cons ( ( ; ( Figure 9: Normalized average power consumption (E [ ] P T ), achievable 8 probability of detection (Pd ) and the average communication link density (ρ) versus Υ, with σe 2 h = 0, decision fusion in (5.4.16), P g fa = 0.1, U = 3, N = 20, M = 17 and with α i (scaled by M). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
43 4. Simulation Results 2/6 Global prob. of detection, P g d Upper bound K 1 = 800 K 1 = 500 K 1 = 350 K 1 = 200 K 1 = Centralized optimum linear rule (5.3.12) 0.3 Proposed weighted two-step, K 1 = 100 Proposed weighted two-step, K 1 = Proposed weighted two-step, K 1 = 350 Proposed weighted two-step, K 1 = Proposed weighted two-step, K 1 = 800 Centralized LRT-based [36] Global prob. of false alarm, P g fa Figure 10: Averaged (over 500 h 2 ij realizations) ROC for the proposed two-step weighted algorithm with decision fusion in (40), U = 3, N = 20, M = 17, K 2 = 3, Υ = 30, σ 2 e h = 0 and with α i (scaled by M) in (5.3.9). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
44 4. Simulation Results 3/6 Global prob. of detection, P g d Upper bound K 1 = 50 K 1 = 150 K 1 = Proposed weighted two-step, K 1 = Proposed weighted two-step, K 1 = 150 Proposed weighted two-step, K 1 = Centralized LRT-based [36] Centralized optimum linear rule (5.3.12) Global prob. of false alarm, P g fa Figure 11: Averaged (over 500 h 2 ij realizations) ROC against first step iterations number (K 1 ), with decision fusion in (41), K 2 = 2, U = 3, N = 20, M = 17, Υ = 10, σ 2 e h = 0 and with α i (scaled by M) in (5.3.9). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
45 4. Simulation Results 4/6 Global prob. of detection, P g d Proposed with (5.4.16) Centr opt linear rule Proposed with (5.4.15) LRT-based Centr. LRT-based in [36] Centr. opt linear rule (5.3.12) Proposed two-step with (5.4.16) Proposed two-step with (5.4.15) (db) a Global prob. of detection, P g d < 2 e h = 4 < 2 e h = 0 < 2 e h = 1 Centr. LRT-based in [36] Proposed two-step with (5.4.16) Proposed two-step with (5.4.16) Proposed two-step with (5.4.16) (db) a Figure 12: Averaged (over 500 hij 2 realizations) probability of detection (P g d ) against the signal to noise ratio (ξ a) with P g fa = 0.1, U = 3, N = 20, M = 17, K1 = 320, Υ = 20, ξ i = ξ, i in (4) and with α i (scaled by M) in (5.3.9): (left) ideal, σe 2 h = 0; (right) non-ideal, σe 2 h 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
46 Figure 13: Averaged (over 500 h 2 ij realizations) ROC for the proposed (quantized) two-step weighted fusion rule with U = 3, N = 20, Υ = 20, M = 17 and with α i (scaled by M) in (5.3.9). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 5/6 Global prob. of detection, P g d Centr. opt. K 1 = 320 Centr. eq. comb. K 1 = 320 K 1 = 400 Proposed weighted two-step with (5.4.15) Unquantized eq. comb. (, i = 1) in (5.3.14) Proposed eq. comb. (, i = 1) two-step with (5.4.16) 0.2 Proposed eq. comb. (, i = 1) two-step with (5.4.15) 0.1 Proposed weighted two-step with (5.4.16) Centr. opt. linear rule (5.3.12) Global prob. of false alarm, P g fa
47 4. Simulation Results 6/6 Global prob of detection, P g d Centralized detector K 1 = 10 K 1 = 20 K 1 = Unquantized eq comb in (5.3.14) Proposed eq comb two-step, K 1 = 10 Proposed eq omb two-step, K 1 = SN 3 eq comb -rst step, K 1 = a (db) -2 Figure 14: Probability of detection (P g d ) versus the signal to noise ratio (ξa) for M = 13, Υ = 72, U = 2, N = 20, P g fa = 0.1 and ξ i = ξ. i in (3.2.4) and α i = 1, i in (5.4.4). The topology used is given in right of Fig Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
48 Overview 1 Introduction 2 Optimal Quantization and Power Allocation 3 Centralized Quantized Fusion Rules 4 Distributed Two-Step Quantized Fusion Rules 5 Sensor Detection in the Presence of Falsified Observations 6 Summary 7 Key Conclusions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
49 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. Contributions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
50 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. Contributions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
51 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
52 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions 1 The problem of centralized detection in the presence of compromised SNs is investigated. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
53 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions 1 The problem of centralized detection in the presence of compromised SNs is investigated. 2 Attacker-based and FC-based parameter optimization are considered and some expressions have been derived. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
54 5. Sensor Detection in the Presence of Falsified Observations Motivation 1 Geographically dispersed to cover large areas, the SNs are constrained in both bandwidth and power. Usually unattended and this makes them vulnerable to different attacks. 2 The overall detection performance strongly depends on the reliability of these SNs in the network. 3 While fusing the data received by the spatially deployed SNs allows the FC to make a reliable decision, it is possible that one or more SNs (compromised by an attacker) deliberately falsify their local observations. Contributions 1 The problem of centralized detection in the presence of compromised SNs is investigated. 2 Attacker-based and FC-based parameter optimization are considered and some expressions have been derived. 3 A reputation based scheme to identify the compromised SNs in the network and control their influence to the global FC decision is also proposed. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
55 5. Sensor Detection in the Presence of Falsified Observations Communication Architecture Target SN1 T1 Tf = M αit q i i=1 SN2 T2 T q 3 T q 2 T q 1 Fusion Center T3 fal SN3 T4 SN4 T q 4 T q 5 T q 6 Attacker SN5 SN6 T6 T5 fal Figure 15: Under attack communication architecture between peripheral SNs and the FC. While the honest SNs test statistics remain unchanged, the compromised SNs falsify their test statistics before transmitting to the FC. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
56 5. Simulation Results 1/4 2 h i SNs p o i 10 L i SNs SNs C=5 C=0.5 C=0 Figure 16: SN optimal transmit power (p o i ) and channel bit allocation (L i) with P t = 60, U = 3, ξ a = 10.5 db, N = 20, β = 0.1 and σ 2 e h = 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
57 5. Simulation Results 2/4 Probability of detection, Pd =0.5 =0.1 AF in [35] opt. in (6.2.22),-= 0:1 OAFBB,-= 0:1 WAFBB,-= 0:1 opt. in (6.2.22),-= 0:5 OAFBB,-= 0:5 WAFBB,-= 0:5 OAFBB,-= 1 WAFBB,-= 1 = Probability of false alarm, P fa Figure 17: Probability of detection (P d ) versus probability of false alarm (P fa ) with U = 3, P t = 60, M = 12, N = 20, C i = 0.9, i and σ 2 e h = 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
58 5. Simulation Results 3/4 Probability of detection, Pd C=1.4 C=1.1 C=0.9 C=0.2 C= C=0 C=0.6 C=0 C=0.2 C=0.4 C=0.45 C=0.6 C=0.9 C=1.1 C=1.4 Nash Equilibrium, C= Probability of false alarm, P fa Figure 18: Probability of detection (P d ) versus probability of false alarm (P fa ), with U = 3, ξ a = 10.5 db, P t = 60, M = 12, N = 20, β = 0.2, σ 2 e h = 0 and with optimum weights in (6.2.22). Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
59 5. Simulation Results 4/4 Modi-ed de.ection coe/cient, ~ d Optimum, in (6.2.22) Non-optimum, First derivative Attacker strength, C Figure 19: Modified deflection coefficient ( d 2 ) versus the attacker strength (C) with U = 3, ξ a = 10 db, s i = 0.1, i, P t = 60, M = 12, N = 20, β = 0.1 and σ 2 e h = 0. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
60 Figure 20: Under attack schematic communication architecture between peripheral SNs and the fusion center (FC). While the i th (i = {1, 2, 4, 6}) honest SN indicator (test statistic) remains unchanged (i.e., Ĩi = I i ), the j th (j = {3, 5}) compromised SN falsify its indicator (test statistic) as in (6.3.7) before transmitting to the FC. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / A Secure Sub-optimum Detection Scheme in Under-Attack WSNs Target SN1 I 1 T f = M α i Ĩ i i=1 SN2 I 2 Ĩ 2 Ĩ 3 Ĩ 1 Fusion Center I C 3 SN3 I 4 SN4 Ĩ 4 Ĩ 5 Ĩ 6 Attacker SN5 SN6 I 6 I C 5
61 5. A Secure Sub-optimum Detection Scheme in Under-Attack WSNs FC Optimum Weighting ( )( 1 β p αopt i i = d pfa) i ( + β p i,c fa p i,c )( d 2P fal C ( )( ( )) 1) 1 β p i d 1 p i d +β (P flip C + ( pi,c d 1 2P flip) )( C 1 P flip C + pi,c d ( (1) 2P flip C 1)). Depends upon the local pfa i and the pi d as well as on the β (fraction of compromised SNs) and the probability of flipping the local decisions by the attacker. The FC cannot implement the optimum weight combining fusion rule Attacker Flipping Probability Optimisation Lemma 6.3.2: The optimum flipping probability ( PC,opt) flip which minimizes the modified deflection coefficient is: ( M ( P flip C,opt = β 1 α i p i d p i ) fa i=1 2β M i=1 α i ( p i,c fa p i,c ) d Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42 ) (2)
62 5. Simulation Results 1/6 Reputation metric, r i SN9 SN10 SN11 SN12 SN13 SN15 Reputation metric, r i SN21 SN22 SN23 SN24 SN29 SN30 SN32 SN35 SN FC threshold, Λ f FC threshold, Λ f Figure 21: The reliability metric (r i ) versus the FC detection threshold (Λ f ) against the SNs with M = 40, N = 20, β = 0.5, P flip C = 1 and K = 150. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
63 5. Simulation Results 2/6 37, true d Prob. of det. the compromised SN 37, P K=5 K=10 K=15 K=20 K=30 K=100 K= FC detection threshold, f Figure 22: Probability that the (compromised) SN 37 has been truly detected (P 37,true d ) versus the FC detection threshold (Λ f ) with M = 40, N = 20, β = 0.5, P flip = 1 and δ = C Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
64 5. Simulation Results 3/6 Aver. prob. of det. (mis-det.), Ptrue d ( P false d ) β=0.5 β=0.25 β=0.10 P true d, Λ f = 5 P false d, Λ f = 5 P true d, Λ f = 13 P false d, Λ f = 13 P true d, Λ f = 13 P false d, Λ f = Time window length, K Figure 23: Average compromised SNs detection probability and honest SNs mis-detection probability versus the time window length (K) and against β with M = 40, N = 20, P flip = 1 and δ = C Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
65 5. Simulation Results 4/6 Prob. of det. minus prob. of false alarm, Pd! Pfa f =7 f =9 0.3 Scheme in [73], $ f = 7 Scheme in [73], $ f = Proposed, $ f = 7 Proposed, $ f = Time window length, K Figure 24: The P d P fa metric versus the time window length (K) against the FC detection threshold (Λ f ) with M = 40, N = 20, β = 0.25, P flip = 0.2, δ = 0.95 and µ = 10. C Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
66 5. Simulation Results 5/ Proposed Prob. of detection, Pd Upper Bound Equal combining in [35] Perfect SNs iden. and tot. removal Opt. weights (6.3.24), perfect SNs iden. Proposed,7 = 15,/=0:09 Proposed,7 = 15,/=0:12 Proposed,7 = 55,/=0: , i =, i AF in (6.3.10), no iden. scheme 0 0 Proposed,7 = 35,/=0:009 No ident. scheme Prob. of false alarm, P fa 1 Figure 25: Probability of detection (P d ) versus probability of false alarm (P fa ) with M = 40, N = 20, β = 0.5, P flip C = 1 and K = 5. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
67 Figure 26: Probability of detection (P d ) versus probability of false alarm (P fa ) against δ and µ with M = 40, N = 20, β = 0.25, and P flip C = 1. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / Simulation Results 6/6 Prob. of detection, Pd Eq. comb. No iden. scheme Proposed Upper Bound Opt. weights (6.3.24), perf. SNs iden. Equal combining in [35],-= 0 Proposed,/=0:009, K=80,7 = 6 Proposed,/=0:009, K=40,7 = 6 Proposed,/=0:009, K=5,7 = 10 Proposed,/=0:009, K=5,7 = 14 Proposed,/=0:009, K=5,7 = With, i =, i AF in (6.3.10), no iden. Scheme in [73] Scheme in [73],/= 1, K = Equal combining,- = 0: Prob. of false alarm, P fa
68 Summary We derive the optimum fusion rule and then analyze sub-optimum fusion rules that are realizable and easily implemented in practical WSN deployment scenarios. The effect of fading channels on detection performance is minimized by solving the resource allocation problem. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
69 Summary We derive the optimum fusion rule and then analyze sub-optimum fusion rules that are realizable and easily implemented in practical WSN deployment scenarios. The effect of fading channels on detection performance is minimized by solving the resource allocation problem. A two-step consensus-based approach with weight combining quantized test statistics exchange is proposed. We relate the communication topology with the number of bits to be shared among SNs. It turns out that there is an optimum topology that maximizes the detection performance. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
70 Summary We derive the optimum fusion rule and then analyze sub-optimum fusion rules that are realizable and easily implemented in practical WSN deployment scenarios. The effect of fading channels on detection performance is minimized by solving the resource allocation problem. A two-step consensus-based approach with weight combining quantized test statistics exchange is proposed. We relate the communication topology with the number of bits to be shared among SNs. It turns out that there is an optimum topology that maximizes the detection performance. Centralized detection in the presence of compromised SNs is also investigated. Attacker and FC based parameter optimization are considered and some expressions have been derived. A reputation based scheme to identify the compromised SNs in the network and control their influence to the global FC decision is also proposed. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
71 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
72 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
73 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
74 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
75 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
76 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision = Offers an improved detection performance but requires observing the SN s local reports for a period of time. A larger observation time period (K) may lead to a large detection delay that is critical for most of the event detection applications. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
77 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision = Offers an improved detection performance but requires observing the SN s local reports for a period of time. A larger observation time period (K) may lead to a large detection delay that is critical for most of the event detection applications. We have addressed the fully distributed detection problem and proposed signal processing algorithms for such an approach Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
78 Key Conclusions Shown that spatially distributed SNs across the field can offer a reliable operation for event detection applications. The system detection performance and the WSN s operating lifetime can be further improved by means of resource allocations, optimisation and signal processing algorithms = complexity to be kept as simple as possible. The data fusion problem: we derive the optimal fusion rules (i.e., for attack-free and under-attack WSN scenarios) and have shown that these fusion rules are not implementable in practice and require complex local signal processing = Derive sub-optimum but simple fusion rules (requiring simple hardware) that offer reliable and good detection performance. A better but more complex approach is to possibly identify these compromised SNs and control their influence on the FC decision = Offers an improved detection performance but requires observing the SN s local reports for a period of time. A larger observation time period (K) may lead to a large detection delay that is critical for most of the event detection applications. We have addressed the fully distributed detection problem and proposed signal processing algorithms for such an approach = Very attractive from both the signal processing perspective and the communication point of view. Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
79 Questions/Comments Edmond Nurellari (University of Leeds) Distributed Detection and Estimation in WSNs June 6, / 42
بسم الله الرحمن الرحيم
بسم الله الرحمن الرحيم Reliability Improvement of Distributed Detection in Clustered Wireless Sensor Networks 1 RELIABILITY IMPROVEMENT OF DISTRIBUTED DETECTION IN CLUSTERED WIRELESS SENSOR NETWORKS PH.D.
More informationDetecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information
Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information W. Znaidi M. Minier and JP. Babau Centre d'innovations en Télécommunication & Intégration de services wassim.znaidi@insa-lyon.fr
More informationAN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN
AN INFORMATION THEORY APPROACH TO WIRELESS SENSOR NETWORK DESIGN A Thesis Presented to The Academic Faculty by Bryan Larish In Partial Fulfillment of the Requirements for the Degree Doctor of Philosophy
More informationFalse Discovery Rate Based Distributed Detection in the Presence of Byzantines
IEEE TRANSACTIONS ON AEROSPACE AND ELECTRONIC SYSTEMS () 1 False Discovery Rate Based Distributed Detection in the Presence of Byzantines Aditya Vempaty*, Student Member, IEEE, Priyadip Ray, Member, IEEE,
More informationEUSIPCO
EUSIPCO 3 569736677 FULLY ISTRIBUTE SIGNAL ETECTION: APPLICATION TO COGNITIVE RAIO Franc Iutzeler Philippe Ciblat Telecom ParisTech, 46 rue Barrault 753 Paris, France email: firstnamelastname@telecom-paristechfr
More informationCensoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks
Censoring for Type-Based Multiple Access Scheme in Wireless Sensor Networks Mohammed Karmoose Electrical Engineering Department Alexandria University Alexandria 1544, Egypt Email: mhkarmoose@ieeeorg Karim
More informationDiffusion LMS Algorithms for Sensor Networks over Non-ideal Inter-sensor Wireless Channels
Diffusion LMS Algorithms for Sensor Networs over Non-ideal Inter-sensor Wireless Channels Reza Abdolee and Benoit Champagne Electrical and Computer Engineering McGill University 3480 University Street
More informationCensoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks
Censoring for Improved Sensing Performance in Infrastructure-less Cognitive Radio Networks Mohamed Seif 1 Mohammed Karmoose 2 Moustafa Youssef 3 1 Wireless Intelligent Networks Center (WINC),, Egypt 2
More informationFully-distributed spectrum sensing: application to cognitive radio
Fully-distributed spectrum sensing: application to cognitive radio Philippe Ciblat Dpt Comelec, Télécom ParisTech Joint work with F. Iutzeler (PhD student funded by DGA grant) Cognitive radio principle
More informationTransmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations
Transmission Schemes for Lifetime Maximization in Wireless Sensor Networks: Uncorrelated Source Observations Xiaolu Zhang, Meixia Tao and Chun Sum Ng Department of Electrical and Computer Engineering National
More informationTarget Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks
Target Localization in Wireless Sensor Networks with Quantized Data in the Presence of Byzantine Attacks Keshav Agrawal, Aditya Vempaty, Hao Chen and Pramod K. Varshney Electrical Engineering Department,
More informationFusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks
Fusion of Decisions Transmitted Over Fading Channels in Wireless Sensor Networks Biao Chen, Ruixiang Jiang, Teerasit Kasetkasem, and Pramod K. Varshney Syracuse University, Department of EECS, Syracuse,
More informationOn Noise-Enhanced Distributed Inference in the Presence of Byzantines
Syracuse University SURFACE Electrical Engineering and Computer Science College of Engineering and Computer Science 211 On Noise-Enhanced Distributed Inference in the Presence of Byzantines Mukul Gagrani
More informationThreshold Considerations in Distributed Detection in a Network of Sensors.
Threshold Considerations in Distributed Detection in a Network of Sensors. Gene T. Whipps 1,2, Emre Ertin 2, and Randolph L. Moses 2 1 US Army Research Laboratory, Adelphi, MD 20783 2 Department of Electrical
More informationOptimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels
Optimal Sensor Rules and Unified Fusion Rules for Multisensor Multi-hypothesis Network Decision Systems with Fading Channels Qing an Ren Yunmin Zhu Dept. of Mathematics Sichuan University Sichuan, China
More informationDecentralized Detection In Wireless Sensor Networks
Decentralized Detection In Wireless Sensor Networks Milad Kharratzadeh Department of Electrical & Computer Engineering McGill University Montreal, Canada April 2011 Statistical Detection and Estimation
More informationDIT - University of Trento
PhD Dissertation International Doctorate School in Information and Communication Technologies DIT - University of Trento TOWARDS ENERGY EFFICIENT COOPERATIVE SPECTRUM SENSING IN COGNITIVE RADIO NETWORKS
More informationMultiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks. Ji an Luo
Multiple Bits Distributed Moving Horizon State Estimation for Wireless Sensor Networks Ji an Luo 2008.6.6 Outline Background Problem Statement Main Results Simulation Study Conclusion Background Wireless
More informationCooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints
Cooperative Spectrum Sensing for Cognitive Radios under Bandwidth Constraints Chunhua Sun, Wei Zhang, and haled Ben Letaief, Fellow, IEEE Department of Electronic and Computer Engineering The Hong ong
More informationINFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS. Michael A. Lexa and Don H. Johnson
INFORMATION PROCESSING ABILITY OF BINARY DETECTORS AND BLOCK DECODERS Michael A. Lexa and Don H. Johnson Rice University Department of Electrical and Computer Engineering Houston, TX 775-892 amlexa@rice.edu,
More informationCollaborative Target Detection in Wireless Sensor Networks with Reactive Mobility
1 / 24 Collaborative Target Detection in Wireless Sensor Networks with Reactive Mobility Rui Tan 1 Guoliang Xing 1 Jianping Wang 1 Hing Cheung So 2 1 Department of Computer Science City University of Hong
More informationDistributed Inference and Learning with Byzantine Data
Syracuse University SURFACE Dissertations - ALL SURFACE 8-1-2016 Distributed Inference and Learning with Byzantine Data Bhavya Kailkhura Syracuse University Follow this and additional works at: http://surface.syr.edu/etd
More informationMultisensor Data Fusion for Water Quality Monitoring using Wireless Sensor Networks
Multisensor Data usion for Water Quality Monitoring using Wireless Sensor Networks Ebrahim Karami, rancis M. Bui, and Ha H. Nguyen Department of Electrical and Computer Engineering, University of Saskatchewan,
More informationResearch on Consistency Problem of Network Multi-agent Car System with State Predictor
International Core Journal of Engineering Vol. No.9 06 ISSN: 44-895 Research on Consistency Problem of Network Multi-agent Car System with State Predictor Yue Duan a, Linli Zhou b and Yue Wu c Institute
More informationcertain class of distributions, any SFQ can be expressed as a set of thresholds on the sufficient statistic. For distributions
Score-Function Quantization for Distributed Estimation Parvathinathan Venkitasubramaniam and Lang Tong School of Electrical and Computer Engineering Cornell University Ithaca, NY 4853 Email: {pv45, lt35}@cornell.edu
More informationADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS. Jesus Perez and Ignacio Santamaria
ADAPTIVE CLUSTERING ALGORITHM FOR COOPERATIVE SPECTRUM SENSING IN MOBILE ENVIRONMENTS Jesus Perez and Ignacio Santamaria Advanced Signal Processing Group, University of Cantabria, Spain, https://gtas.unican.es/
More informationDistributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks
Distributed Binary Quantizers for Communication Constrained Large-scale Sensor Networks Ying Lin and Biao Chen Dept. of EECS Syracuse University Syracuse, NY 13244, U.S.A. ylin20 {bichen}@ecs.syr.edu Peter
More informationTransmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback
IEEE INFOCOM Workshop On Cognitive & Cooperative Networks Transmitter-Receiver Cooperative Sensing in MIMO Cognitive Network with Limited Feedback Chao Wang, Zhaoyang Zhang, Xiaoming Chen, Yuen Chau. Dept.of
More informationOptimal matching in wireless sensor networks
Optimal matching in wireless sensor networks A. Roumy, D. Gesbert INRIA-IRISA, Rennes, France. Institute Eurecom, Sophia Antipolis, France. Abstract We investigate the design of a wireless sensor network
More informationQUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS
QUANTIZATION FOR DISTRIBUTED ESTIMATION IN LARGE SCALE SENSOR NETWORKS Parvathinathan Venkitasubramaniam, Gökhan Mergen, Lang Tong and Ananthram Swami ABSTRACT We study the problem of quantization for
More informationWITH the wide employment of wireless devices in various
1 Robust Reputation-Based Cooperative Spectrum Sensing via Imperfect Common Control Channel Lichuan a, Student ember, IEEE, Yong Xiang, Senior ember, IEEE, Qingqi Pei, Senior ember, IEEE, Yang Xiang, Senior
More informationBinary Compressive Sensing via Analog. Fountain Coding
Binary Compressive Sensing via Analog 1 Fountain Coding Mahyar Shirvanimoghaddam, Member, IEEE, Yonghui Li, Senior Member, IEEE, Branka Vucetic, Fellow, IEEE, and Jinhong Yuan, Senior Member, IEEE, arxiv:1508.03401v1
More informationNovel spectrum sensing schemes for Cognitive Radio Networks
Novel spectrum sensing schemes for Cognitive Radio Networks Cantabria University Santander, May, 2015 Supélec, SCEE Rennes, France 1 The Advanced Signal Processing Group http://gtas.unican.es The Advanced
More informationBinary Consensus for Cooperative Spectrum Sensing in Cognitive Radio Networks
Binary Consensus for Cooperative Spectrum Sensing in Cognitive Radio Networks Shwan Ashrafi, ehrzad almirchegini, and Yasamin ostofi Department of Electrical and Computer Engineering University of New
More informationVoI for Learning and Inference! in Sensor Networks!
ARO MURI on Value-centered Information Theory for Adaptive Learning, Inference, Tracking, and Exploitation VoI for Learning and Inference in Sensor Networks Gene Whipps 1,2, Emre Ertin 2, Randy Moses 2
More informationProbabilistic model for Intrusion Detection in Wireless Sensor Network
Probabilistic model for Intrusion Detection in Wireless Sensor Network Maduri Chopde, Kimi Ramteke and Satish Kamble Department of Computer Science PICT, Pune Pune University, India madhurichopde@gmail.com,
More informationUsing Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing
Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing Mihir Laghate and Danijela Cabric Department of Electrical Engineering, University of California, Los Angeles Emails:
More informationIntroduction to Statistical Inference
Structural Health Monitoring Using Statistical Pattern Recognition Introduction to Statistical Inference Presented by Charles R. Farrar, Ph.D., P.E. Outline Introduce statistical decision making for Structural
More informationOptimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration
Optimal Power Allocation for Distributed BLUE Estimation with Linear Spatial Collaboration Mohammad Fanaei, Matthew C. Valenti Abbas Jamalipour, and Natalia A. Schmid Dept. of Computer Science and Electrical
More informationA Byzantine Attack Defender: the Conditional Frequency Check
A Byzantine Attack Defender: the Conditional Frequency Check Xiaofan He and Huaiyu Dai Peng Ning Department of ECE Department of CSC North Carolina State University, USA North Carolina State University,
More informationSIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.
SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of
More informationCo-Prime Arrays and Difference Set Analysis
7 5th European Signal Processing Conference (EUSIPCO Co-Prime Arrays and Difference Set Analysis Usham V. Dias and Seshan Srirangarajan Department of Electrical Engineering Bharti School of Telecommunication
More informationSIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM. Neal Patwari and Alfred O.
SIGNAL STRENGTH LOCALIZATION BOUNDS IN AD HOC & SENSOR NETWORKS WHEN TRANSMIT POWERS ARE RANDOM Neal Patwari and Alfred O. Hero III Department of Electrical Engineering & Computer Science University of
More informationHard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor
Hard Decision Cooperative Spectrum Sensing Based on Estimating the Noise Uncertainty Factor Hossam M. Farag Dept. of Electrical Engineering, Aswan University, Egypt. hossam.farag@aswu.edu.eg Ehab Mahmoud
More informationImproved Spectrum Utilization in Cognitive Radio Systems
Improved Spectrum Utilization in Cognitive Radio Systems Lei Cao and Ramanarayanan Viswanathan Department of Electrical Engineering The University of Mississippi Jan. 15, 2014 Lei Cao and Ramanarayanan
More informationSTATISTICAL STRATEGIES FOR EFFICIENT SIGNAL DETECTION AND PARAMETER ESTIMATION IN WIRELESS SENSOR NETWORKS. Eric Ayeh
STATISTICAL STRATEGIES FOR EFFICIENT SIGNAL DETECTION AND PARAMETER ESTIMATION IN WIRELESS SENSOR NETWORKS Eric Ayeh Dissertation Prepared for the Degree of DOCTOR OF PHILOSOPHY UNIVERSITY OF NORTH TEXAS
More informationSPATIAL DIVERSITY AWARE DATA FUSION FOR COOPERATIVE SPECTRUM SENSING
2th European Signal Processing Conference (EUSIPCO 22) Bucharest, Romania, August 27-3, 22 SPATIAL DIVERSITY AWARE DATA FUSIO FOR COOPERATIVE SPECTRUM SESIG uno Pratas (,2) eeli R. Prasad () António Rodrigues
More informationCooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks
Cooperative Spectrum Prediction for Improved Efficiency of Cognitive Radio Networks by Nagwa Shaghluf B.S., Tripoli University, Tripoli, Libya, 2009 A Thesis Submitted in Partial Fulfillment of the Requirements
More informationOptimal Distributed Detection Strategies for Wireless Sensor Networks
Optimal Distributed Detection Strategies for Wireless Sensor Networks Ke Liu and Akbar M. Sayeed University of Wisconsin-Madison kliu@cae.wisc.edu, akbar@engr.wisc.edu Abstract We study optimal distributed
More informationPerformance Evaluation of Censoring-Enabled Systems for Sequential Detection in Large Wireless Sensor Networks
Performance Evaluation of Censoring-Enabled Systems for Sequential Detection in Large Wireless Sensor Networks Mohammed Karmoose Karim Seddik 2 Ahmed Sultan Electrical Engineering Dept, Alexandria University
More informationRECENTLY, wireless sensor networks have been the object
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 4, APRIL 2007 1511 Distributed Sequential Bayesian Estimation of a Diffusive Source in Wireless Sensor Networks Tong Zhao, Student Member, IEEE, and
More informationPower Allocation and Coverage for a Relay-Assisted Downlink with Voice Users
Power Allocation and Coverage for a Relay-Assisted Downlink with Voice Users Junjik Bae, Randall Berry, and Michael L. Honig Department of Electrical Engineering and Computer Science Northwestern University,
More informationMODULATION AND CODING FOR QUANTIZED CHANNELS. Xiaoying Shao and Harm S. Cronie
MODULATION AND CODING FOR QUANTIZED CHANNELS Xiaoying Shao and Harm S. Cronie x.shao@ewi.utwente.nl, h.s.cronie@ewi.utwente.nl University of Twente, Faculty of EEMCS, Signals and Systems Group P.O. box
More informationQuantifying Cyber Security for Networked Control Systems
Quantifying Cyber Security for Networked Control Systems Henrik Sandberg ACCESS Linnaeus Centre, KTH Royal Institute of Technology Joint work with: André Teixeira, György Dán, Karl H. Johansson (KTH) Kin
More informationOptimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul
1 Optimization of Multistatic Cloud Radar with Multiple-Access Wireless Backhaul Seongah Jeong, Osvaldo Simeone, Alexander Haimovich, Joonhyuk Kang Department of Electrical Engineering, KAIST, Daejeon,
More informationSensing for Cognitive Radio Networks
Censored Truncated Sequential Spectrum 1 Sensing for Cognitive Radio Networks Sina Maleki Geert Leus arxiv:1106.2025v2 [cs.sy] 14 Mar 2013 Abstract Reliable spectrum sensing is a key functionality of a
More informationLloyd-Max Quantization of Correlated Processes: How to Obtain Gains by Receiver-Sided Time-Variant Codebooks
Lloyd-Max Quantization of Correlated Processes: How to Obtain Gains by Receiver-Sided Time-Variant Codebooks Sai Han and Tim Fingscheidt Institute for Communications Technology, Technische Universität
More informationg(.) 1/ N 1/ N Decision Decision Device u u u u CP
Distributed Weak Signal Detection and Asymptotic Relative Eciency in Dependent Noise Hakan Delic Signal and Image Processing Laboratory (BUSI) Department of Electrical and Electronics Engineering Bogazici
More informationAsymptotically Optimal and Bandwith-efficient Decentralized Detection
Asymptotically Optimal and Bandwith-efficient Decentralized Detection Yasin Yılmaz and Xiaodong Wang Electrical Engineering Department, Columbia University New Yor, NY 10027 Email: yasin,wangx@ee.columbia.edu
More informationADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION. A Dissertation by.
ADVERSARY ANALYSIS OF COCKROACH NETWORK UNDER RAYLEIGH FADING CHANNEL: PROBABILITY OF ERROR AND ADVERSARY DETECTION A Dissertation by Tze Chien Wong Master of Science, Wichita State University, 2008 Bachelor
More informationHyung So0 Kim and Alfred 0. Hero
WHEN IS A MAXIMAL INVARIANT HYPOTHESIS TEST BETTER THAN THE GLRT? Hyung So0 Kim and Alfred 0. Hero Department of Electrical Engineering and Computer Science University of Michigan, Ann Arbor, MI 48109-2122
More informationMinimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading
Minimum Feedback Rates for Multi-Carrier Transmission With Correlated Frequency Selective Fading Yakun Sun and Michael L. Honig Department of ECE orthwestern University Evanston, IL 60208 Abstract We consider
More informationImproved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection
Improved Multiple Feedback Successive Interference Cancellation Algorithm for Near-Optimal MIMO Detection Manish Mandloi, Mohammed Azahar Hussain and Vimal Bhatia Discipline of Electrical Engineering,
More informationMinimum Mean Squared Error Interference Alignment
Minimum Mean Squared Error Interference Alignment David A. Schmidt, Changxin Shi, Randall A. Berry, Michael L. Honig and Wolfgang Utschick Associate Institute for Signal Processing Technische Universität
More informationFalse Data Injection Attacks Against Nonlinear State Estimation in Smart Power Grids
1 False Data Injection Attacks Against Nonlinear State Estimation in Smart Power rids Md. Ashfaqur Rahman and Hamed Mohsenian-Rad Department of Electrical and Computer Engineering, Texas Tech University,
More informationCyber Attacks, Detection and Protection in Smart Grid State Estimation
1 Cyber Attacks, Detection and Protection in Smart Grid State Estimation Yi Zhou, Student Member, IEEE Zhixin Miao, Senior Member, IEEE Abstract This paper reviews the types of cyber attacks in state estimation
More informationA Systematic Description of Source Significance Information
A Systematic Description of Source Significance Information Norbert Goertz Institute for Digital Communications School of Engineering and Electronics The University of Edinburgh Mayfield Rd., Edinburgh
More informationTHE potential for large-scale sensor networks is attracting
IEEE TRANSACTIONS ON SIGNAL PROCESSING, VOL. 55, NO. 1, JANUARY 2007 327 Detection in Sensor Networks: The Saddlepoint Approximation Saeed A. Aldosari, Member, IEEE, and José M. F. Moura, Fellow, IEEE
More informationData and error rate bounds for binar gathering wireless sensor networks. He, Xin; Zhou, Xiaobo; Juntti, Markk Author(s) Tad
JAIST Reposi https://dspace.j Title Data and error rate bounds for binar gathering wireless sensor networks He, Xin; Zhou, Xiaobo; Juntti, Markk Author(s) Tad Citation 205 IEEE 6th International Worksho
More informationOne-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information
One-Bit LDPC Message Passing Decoding Based on Maximization of Mutual Information ZOU Sheng and Brian M. Kurkoski kurkoski@ice.uec.ac.jp University of Electro-Communications Tokyo, Japan University of
More informationRemote Estimation Games over Shared Networks
October st, 04 Remote Estimation Games over Shared Networks Marcos Vasconcelos & Nuno Martins marcos@umd.edu Dept. of Electrical and Computer Engineering Institute of Systems Research University of Maryland,
More informationDistributed estimation in sensor networks
in sensor networks A. Benavoli Dpt. di Sistemi e Informatica Università di Firenze, Italy. e-mail: benavoli@dsi.unifi.it Outline 1 An introduction to 2 3 An introduction to An introduction to In recent
More informationOpportunistic Spectrum Access for Energy-Constrained Cognitive Radios
1206 IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, VOL. 8, NO. 3, MARCH 2009 Opportunistic Spectrum Access for Energy-Constrained Cognitive Radios Anh Tuan Hoang, Ying-Chang Liang, David Tung Chong Wong,
More informationLecture 4. Capacity of Fading Channels
1 Lecture 4. Capacity of Fading Channels Capacity of AWGN Channels Capacity of Fading Channels Ergodic Capacity Outage Capacity Shannon and Information Theory Claude Elwood Shannon (April 3, 1916 February
More informationBinary Consensus Over Fading Channels: A Best Affine Estimation Approach
Binary Consensus Over Fading Channels: A Best Affine Estimation Approach ehrzad almirchegini, Yongxiang Ruan and Yasamin ostofi Department of Electrical and Computer Engineering University of New exico,
More informationRobust Binary Quantizers for Distributed Detection
1 Robust Binary Quantizers for Distributed Detection Ying Lin, Biao Chen, and Bruce Suter Abstract We consider robust signal processing techniques for inference-centric distributed sensor networks operating
More informationQuantum Wireless Sensor Networks
Quantum Wireless Sensor Networks School of Computing Queen s University Canada ntional Computation Vienna, August 2008 Main Result Quantum cryptography can solve the problem of security in sensor networks.
More informationSpectrum Leasing via Cooperation for Enhanced. Physical-Layer Secrecy
Spectrum Leasing via Cooperation for Enhanced 1 Physical-Layer Secrecy Keonkook Lee, Member, IEEE, Chan-Byoung Chae, Senior Member, IEEE, Joonhyuk Kang, Member, IEEE arxiv:1205.0085v1 [cs.it] 1 May 2012
More informationA SPARSENESS CONTROLLED PROPORTIONATE ALGORITHM FOR ACOUSTIC ECHO CANCELLATION
6th European Signal Processing Conference (EUSIPCO 28), Lausanne, Switzerland, August 25-29, 28, copyright by EURASIP A SPARSENESS CONTROLLED PROPORTIONATE ALGORITHM FOR ACOUSTIC ECHO CANCELLATION Pradeep
More informationContinuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks
Continuous-Model Communication Complexity with Application in Distributed Resource Allocation in Wireless Ad hoc Networks Husheng Li 1 and Huaiyu Dai 2 1 Department of Electrical Engineering and Computer
More informationDecentralized Detection in Wireless Sensor Networks with Channel Fading Statistics
1 Decentralized Detection in Wireless Sensor Networks with Channel Fading Statistics Bin Liu, Biao Chen Abstract Existing channel aware signal processing design for decentralized detection in wireless
More informationON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS. Michael G. Rabbat
ON SPATIAL GOSSIP ALGORITHMS FOR AVERAGE CONSENSUS Michael G. Rabbat Dept. of Electrical and Computer Engineering McGill University, Montréal, Québec Email: michael.rabbat@mcgill.ca ABSTRACT This paper
More informationCollaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks
Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks Priyank Anand, Ankit Singh Rawat Department of Electrical Engineering Indian Institute of Technology Kanpur
More informationOn the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing
1 On the Optimality of Likelihood Ratio Test for Prospect Theory Based Binary Hypothesis Testing Sinan Gezici, Senior Member, IEEE, and Pramod K. Varshney, Life Fellow, IEEE Abstract In this letter, the
More informationResearch Article Optimal Power Constrained Distributed Detection over a Noisy Multiaccess Channel
Mathematical Problems in Engineering Volume 015, Article ID 58089, 7 pages http://dx.doi.org/10.1155/015/58089 Research Article Optimal Power Constrained Distributed Detection over a oisy Multiaccess Channel
More informationReliable Cooperative Sensing in Cognitive Networks
Reliable Cooperative Sensing in Cognitive Networks (Invited Paper) Mai Abdelhakim, Jian Ren, and Tongtong Li Department of Electrical & Computer Engineering, Michigan State University, East Lansing, MI
More informationCooperative Communication with Feedback via Stochastic Approximation
Cooperative Communication with Feedback via Stochastic Approximation Utsaw Kumar J Nicholas Laneman and Vijay Gupta Department of Electrical Engineering University of Notre Dame Email: {ukumar jnl vgupta}@ndedu
More informationDiversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver
Diversity Performance of a Practical Non-Coherent Detect-and-Forward Receiver Michael R. Souryal and Huiqing You National Institute of Standards and Technology Advanced Network Technologies Division Gaithersburg,
More informationModifying Voice Activity Detection in Low SNR by correction factors
Modifying Voice Activity Detection in Low SNR by correction factors H. Farsi, M. A. Mozaffarian, H.Rahmani Department of Electrical Engineering University of Birjand P.O. Box: +98-9775-376 IRAN hfarsi@birjand.ac.ir
More informationCapacity of the Discrete-Time AWGN Channel Under Output Quantization
Capacity of the Discrete-Time AWGN Channel Under Output Quantization Jaspreet Singh, Onkar Dabeer and Upamanyu Madhow Abstract We investigate the limits of communication over the discrete-time Additive
More informationAdaptive sparse algorithms for estimating sparse channels in broadband wireless communications systems
Wireless Signal Processing & Networking Workshop: Emerging Wireless Technologies, Sendai, Japan, 28 Oct. 2013. Adaptive sparse algorithms for estimating sparse channels in broadband wireless communications
More informationA Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology
A Robust Event-Triggered Consensus Strategy for Linear Multi-Agent Systems with Uncertain Network Topology Amir Amini, Amir Asif, Arash Mohammadi Electrical and Computer Engineering,, Montreal, Canada.
More informationEvidence Theory based Cooperative Energy Detection under Noise Uncertainty
Evidence Theory based Cooperative Energy Detection under Noise Uncertainty by Sachin Chaudhari, Prakash Gohain in IEEE GLOBECOM 7 Report No: IIIT/TR/7/- Centre for Communications International Institute
More informationDistributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach
Distributed Joint Offloading Decision and Resource Allocation for Multi-User Mobile Edge Computing: A Game Theory Approach Ning Li, Student Member, IEEE, Jose-Fernan Martinez-Ortega, Gregorio Rubio Abstract-
More informationEnhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee
Enhancing Energy Efficiency among Communication, Computation and Caching with QoI-Guarantee Faheem Zafari 1, Jian Li 2, Kin K. Leung 1, Don Towsley 2, Ananthram Swami 3 1 Imperial College London 2 University
More informationOn Distributed Estimation for Resource Constrained Wireless Sensor Networks
University of Central Florida Electronic Theses and Dissertations Doctoral Dissertation (Open Access) On Distributed Estimation for Resource Constrained Wireless Sensor Networks 017 Alireza Sani University
More information392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6. Problem Set 2 Solutions
392D: Coding for the AWGN Channel Wednesday, January 24, 2007 Stanford, Winter 2007 Handout #6 Problem Set 2 Solutions Problem 2.1 (Cartesian-product constellations) (a) Show that if A is a K-fold Cartesian
More informationCOOPERATIVE relay networks have recently attracted much
On the Impact of Correlation on Distributed Detection in Wireless Sensor Networks with Relays Deployment Mohammed W Baidas, Ahmed S Ibrahim, Karim G Seddik,KJRayLiu Department of Electrical Computer Engineering,
More informationDetection theory 101 ELEC-E5410 Signal Processing for Communications
Detection theory 101 ELEC-E5410 Signal Processing for Communications Binary hypothesis testing Null hypothesis H 0 : e.g. noise only Alternative hypothesis H 1 : signal + noise p(x;h 0 ) γ p(x;h 1 ) Trade-off
More informationIN HYPOTHESIS testing problems, a decision-maker aims
IEEE SIGNAL PROCESSING LETTERS, VOL. 25, NO. 12, DECEMBER 2018 1845 On the Optimality of Likelihood Ratio Test for Prospect Theory-Based Binary Hypothesis Testing Sinan Gezici, Senior Member, IEEE, and
More information