2014 IEEE International Conference on Communications (ICC) 2014
DOI: 10.1109/icc.2014.6883646
|View full text |Cite
|
Sign up to set email alerts
|

Parallel distributed Bayesian detection with privacy constraints

Abstract: In this paper, the privacy problem of a parallel distributed detection system vulnerable to an eavesdropper is proposed and studied in the Bayesian formulation. The privacy risk is evaluated by the detection cost of the eavesdropper which is assumed to be informed and greedy. It is shown that the optimal detection strategy of the sensor whose decision is eavesdropped on is a likelihood-ratio test. This fundamental insight allows for the optimization to reuse known algorithms extended to incorporate the privacy… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
8
0

Year Published

2014
2014
2016
2016

Publication Types

Select...
4
3

Relationship

4
3

Authors

Journals

citations
Cited by 8 publications
(8 citation statements)
references
References 13 publications
0
8
0
Order By: Relevance
“…As an example, Li et al [44] investigated the problem of Bayesian distributed detection for the special case of n k ¼ 2 sensors in the network, where the EFC has access to only one of the sensor's transmissions. The authors proved that LRT-based tests (declaring an output of 1 or 0 depending upon whether the received LLR is above or below some threshold) were optimal at the sensors if the network is designed to minimize the expected detection cost at the LFC such that the minimum average cost at the EFC is no greater than a prescribed nonnegative value .…”
Section: ) Optimal Quantizationmentioning
confidence: 99%
“…As an example, Li et al [44] investigated the problem of Bayesian distributed detection for the special case of n k ¼ 2 sensors in the network, where the EFC has access to only one of the sensor's transmissions. The authors proved that LRT-based tests (declaring an output of 1 or 0 depending upon whether the received LLR is above or below some threshold) were optimal at the sensors if the network is designed to minimize the expected detection cost at the LFC such that the minimum average cost at the EFC is no greater than a prescribed nonnegative value .…”
Section: ) Optimal Quantizationmentioning
confidence: 99%
“…Moreover, the crucial energy efficient issue was not discussed. In [26,27], the optimal local quantizer was examined through minimizing the detection cost at the AFC meanwhile satisfying the constraints to the EFC detection cost or error performance, but the energy consumption problem was not concerned, either. In addition, all of the above solutions were not evaluated over a practical wireless channel and the effect of the transmission channel on their security was not discussed.…”
Section: Related Workmentioning
confidence: 99%
“…For the practical resource constraints and the serious security issues in front of WSN, secure distributed detection schemes under energy constraints are necessary for the development of an efficient IoT. Various secure strategies for distributed detection have been proposed under different assumptions on the eavesdroppers and transmission channels [8,9,10,23,24,25,26,27,28,29]. However, these studies focused on either the local detection at sensors or the information transmission from sensors to the FC.…”
Section: Introductionmentioning
confidence: 99%
“…In this work, we propose a detection-operational privacy metric and study the tandem distributed Bayesian detection problem subject to a physical-layer privacy constraint in the privacy-utility framework. Related problems in a parallel distributed detection system and with the Neyman-Pearson criterion are studied in [10,11]. From a broader perspective, privacy-utility problems have been discussed in many other fields.…”
Section: Introductionmentioning
confidence: 99%