...
首页> 外文期刊>Ad hoc networks >Distributed intrusion detection in the presence of correlated sensor readings: Signal-space and communication-complexity view-point
【24h】

Distributed intrusion detection in the presence of correlated sensor readings: Signal-space and communication-complexity view-point

机译:存在相关传感器读数时的分布式入侵检测:信号空间和通信复杂性观点

获取原文
获取原文并翻译 | 示例
           

摘要

The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space view-point is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces φ_() and φ_() and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating φ_() and φ_() is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication-complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. Extensions to the multi-party case is straightforward and is briefly discussed. The average case CC of the relevant greater-than (GT) function is characterized within two bits. Under the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm.
机译:考虑了在杂波存在下基于传感器网络的分布式入侵检测问题。有人认为,最好将传感看作是一种局部现象,因为只有入侵者附近的传感器才被触发。在这种情况下,对入侵者位置的了解不足会导致相关的传感器读数。引入了信号空间视点,其中与入侵者和杂波相关的无噪声传感器读数显示为表面φ_()和φ_(),并且问题减少到以分布式方式确定当前是否有噪声的传感器读数之一最好分类为入侵者或混乱者。追求两种分布式检测方法。首先,使用Neyman-Pearson准则识别分隔φ_()和φ_()的决策面。此后,各个传感器节点交互交换位,以确定传感器读数是在决策面的一侧还是另一侧。基于通信复杂度(CC)理论,得出需要交换的位数的界限。将针对一般函数的两方平均情况CC得出的下限与贪婪算法的性能进行比较。多方案例的扩展很简单,并进行了简要讨论。相关的大于(GT)函数的平均情况CC的特征为两位。在第二种方法下,每个传感器节点广播源自其自身传感器读数的适当两级量化而产生的单个位,同时牢记随后将在本地融合中心应用的融合规则。在简化的假设下证明了阈值测试作为量化规则的最优性。最后,给出了算法的QualNet仿真结果,其中包括使用朴素多项式回归算法的入侵者跟踪。

著录项

相似文献

  • 外文文献
  • 中文文献
  • 专利
获取原文

客服邮箱:kefu@zhangqiaokeyan.com

京公网安备:11010802029741号 ICP备案号:京ICP备15016152号-6 六维联合信息科技 (北京) 有限公司©版权所有
  • 客服微信

  • 服务号