Skip to main content
Log in

Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm

  • Published:
Wireless Networks Aims and scope Submit manuscript

Abstract

The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless sensor network operating over insecure links. To prevent passive eavesdropping from enemy fusion center (EFC), the sensor observations are randomly flipped according to pre-deployed flipping rates before transmission. Accordingly, a constrained optimization problem is formulated to minimize the fusion error of ally fusion center (AFC) while maintain EFC’s error at high level. We demonstrated that the fusion error is a non-convex function of the flipping rates, thus an immune based differential evolution algorithm is designed to search the optimal flipping rates, such that the EFC always gets high error probability at the cost of a small degeneration of the AFC’s fusion performance. Furthermore, the optimal thresholds of the fusion rules are calculated based on the statistics of the sensor data, which further degenerates the detection performance of the EFC, since it is not aware of the statistics of the sensor observations after data flipping, resulting in its threshold does not match the observations. Simulation results demonstrated that the AFC can appropriately acquire the original nature state, while the EFC is prevent to detect the target regardless of the signal-to-noise and sensor numbers.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9
Fig. 10
Fig. 11

Similar content being viewed by others

References

  1. Amrita, G., & Sipra, D. (2015). A lightweight security scheme for query processing in clustered wireless sensor networks. Computers and Electrical Engineering, 41, 240–255.

    Article  Google Scholar 

  2. Anita, S., & Daniel, S. (2014). A solution algorithm for non-convex mixed integer optimization problems with only few continuous variables. European Journal of Operational Research, 232(2), 266–275.

    Article  MathSciNet  MATH  Google Scholar 

  3. Chen, B., Jiang, R., Kasetkasem, T., & Varshney, P. K. (2006). Channel aware decision fusion in wireless sensor networks. IEEE Transactions on Signal Process, 52(12), 3454–3458.

    Article  MathSciNet  MATH  Google Scholar 

  4. Chen, X., Makki, K., Yen, K., & issinou, N. P. (2009). Sensor network security: A survey. IEEE Communications Surveys and Tutorials, 11(2), 52–73.

    Article  Google Scholar 

  5. Dimitri, P. B. (2009). Convex optimization theory. Belmont: Athena Scientific.

    MATH  Google Scholar 

  6. Erfan, S., Mahdi, O., & Mort, N. P. (2013). Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes. IEEE Transactions on Information Forensics and Security, 8(1), 205–215.

    Article  Google Scholar 

  7. Gopikrishnan, S., & Priakanth, P. (2015). HSDA: Hybrid communication for secure data aggregation in wireless sensor network. Wireless Networks, 21(9), 1–18.

    Google Scholar 

  8. Hosein, M., & Mengdu, L. (2013). An enhanced bio-inspired trust and reputation model for wireless sensor network. Procedia Computer Science, 19, 1159–1166.

    Article  Google Scholar 

  9. Hyoungsuk, J., Daesung, H., Hyuckjae, L., Ha, J., & Choi, J. (2010). Secure type-based multiple access, transmission strategy and analysis for perfect secrecy. In IEEE information theory workshop (Vol. 6, No. 3, pp. 1–5).

  10. Hyoungsuk, J., Jinho, C., Steven, W. M., & Jeongseok, H. (2013). Channel aware encryption and decision fusion for wireless sensor networks. IEEE Transactions on Information Forensics and Security, 8(4), 619–625.

    Article  Google Scholar 

  11. Lin, H. Y. (2015). Location-based data encryption for wireless sensor network using dynamic keys. Wireless Networks, 21(8), 2649–2656.

    Article  Google Scholar 

  12. Muhammad, M. R. Khan, Khan, M. I., Ernest, M., Kh&akar, I., Sushil, B., Lan, W., et al. (2013). Autonomous wireless radar sensor mote for target material classification. Digital Signal Processing, 23(3), 722–735.

    Article  MathSciNet  Google Scholar 

  13. Murat, D., Yunus, o, & Cevat, B. (2015). Fire detection systems in wireless sensor networks. World Conference on Technology, Innovation and Entrepreneurship, 195, 1846–1850.

    Google Scholar 

  14. Omar, R. M. B., Sidi, M. S., & Mohammed, F. (2015). A novel secure aggregation scheme for wireless sensor networks using stateful public key cryptography. Ad Hoc Networks, 32, 98–113.

    Article  Google Scholar 

  15. Papoulis, A., & Pillai, S. (2009). Probabilty, random variables and stochastic processes (4th ed.). New York: McGraw-Hill.

    Google Scholar 

  16. Perrig, A., Stankovic, J. A., & Wagner, D. (2004). Security in wireless sensor networks. Communications of the ACM, 47(6), 53–57.

    Article  Google Scholar 

  17. Qin, A. K., Huang, V. L., & Suganthan, P. N. (2009). Differential evolution algorithm with strategy adaptation for global numerical optimization. IEEE Transaction on Evolutionary Computation, 13(2), 398–417.

    Article  Google Scholar 

  18. Reza, S., & Mort, N. P. (2012). Scalable PHY-layer security for distributed detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 7(4), 1118–1126.

    Article  Google Scholar 

  19. Reza, S., Mort, N. P., Dmitri, P., & Magdy, A. B. (2014). Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(3), 375–385.

    Article  Google Scholar 

  20. Sabrina, S., Alessandra, R., Luigi, A. G., & Alberto, C. P. (2015). IEEE 5th international conference on consumer electronics-Berlin (ICCE-Berlin) (pp. 358–362).

  21. Sabrina, S., Alberto, C. P., & Roberto, R. (2013). DARE: Evaluating Data Accuracy using node REputation. Computer Networks, 57, 3098C3111.

    Google Scholar 

  22. Sabrina, S., Luigi, A. G., Gennaro, B., & Alberto, C. P. (2012). DyDAP: A dynamic data aggregation scheme for privacy aware wireless sensor networks. Journal of Systems and Software, 85, 152–166.

    Article  Google Scholar 

  23. Shigen, S., Hongjie, L., Risheng, H., Athanasios, V. V., Yihan, W., & Qiying, C. (2014). Differential game-based strategies for preventing malware propagation in wireless sensor networks. IEEE Transactions on Information Forensics and Security, 9(11), 1962–1973.

    Article  Google Scholar 

  24. Timmis, J., & Neal, M. (2001). A resource limited artificial immune system for datga analyssi. Konwledge Based System, 14(3–4), 121–130.

    Article  Google Scholar 

  25. Wang, Y., Attebury, G., & Ramamurthy, B. (2006). A survey of security issues in wireless sensor networks. Communications Surveys and Tutorials, 8(2), 2–23.

    Article  Google Scholar 

Download references

Acknowledgements

This work is sponsored by the National Key Research and Development Program of China under Grant Nos. 2016YFB08006004, 2016YFB08006005, and the National Science Foundation of China under Grant No. 61402308. And we would like to thanks the precious advises from Pro. Lee Hongbin, Stevens Institute of Technology, USA.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wen Chen.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chen, W., Zhao, H., Li, T. et al. Optimal probabilistic encryption for distributed detection in wireless sensor networks based on immune differential evolution algorithm. Wireless Netw 24, 2497–2507 (2018). https://doi.org/10.1007/s11276-017-1484-3

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11276-017-1484-3

Keywords

Navigation