A distributed scheme for detection of information flows

Ameya Agaskar, Lang Tong, Ting He

Research output: Chapter in Book/Report/Conference proceedingConference contribution

1 Scopus citations

Abstract

Distributed detection of information flows spanning many nodes in a wireless sensor network is considered. In such a system, eavesdroppers are deployed near several nodes in the network. As data may be encrypted or padded, the eavesdroppers can only measure packet timestamps. Each eavesdropper, given a sequence of timestamps, must compress the information for transmission to a fusion center. Given the compressed data, the fusion center must decide whether the monitored nodes are part of an information flow. Information flows may be embedded with chaff noise, and packets may be perturbed by a random but bounded delay. A specific quantizer and algorithmic detection scheme are proposed. Performance is characterized by the maximum fraction of chaff that may be inserted in an information flow while still achieving vanishing error probabilities. A lower bound on the performance of the optimal system is derived. An upper bound on the performance of a system using the proposed quantizer is also found.

Original languageEnglish (US)
Title of host publicationCISS 2008, The 42nd Annual Conference on Information Sciences and Systems
Pages612-617
Number of pages6
DOIs
StatePublished - Sep 22 2008
EventCISS 2008, 42nd Annual Conference on Information Sciences and Systems - Princeton, NJ, United States
Duration: Mar 19 2008Mar 21 2008

Publication series

NameCISS 2008, The 42nd Annual Conference on Information Sciences and Systems

Other

OtherCISS 2008, 42nd Annual Conference on Information Sciences and Systems
CountryUnited States
CityPrinceton, NJ
Period3/19/083/21/08

All Science Journal Classification (ASJC) codes

  • Computer Science Applications
  • Information Systems
  • Control and Systems Engineering

Fingerprint Dive into the research topics of 'A distributed scheme for detection of information flows'. Together they form a unique fingerprint.

Cite this