Secure Over-the-Air Computation for Wireless Sensor Network

被引:0
|
作者
He, Boxiang [1 ]
Wang, Fanggang [1 ]
Chen, Zihan [2 ]
Zhang, Guangyang [1 ]
Quek, Tony Q. S. [2 ]
机构
[1] Beijing Jiaotong Univ, Frontiers Sci Ctr Smart Highspeed Railway Syst, Sch Elect & Informat Engn, State Key Lab Adv Rail Autonomous Operat, Beijing 100044, Peoples R China
[2] Singapore Univ Technol & Design, Informat Syst Technol & Design, Singapore 487372, Singapore
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
over-the-air computation; physical layer security; Active eavesdropping; wireless sensor network;
D O I
10.1109/LCOMM.2024.3461793
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
Over-the-air computation (AirComp) has been shown to provide a significantly higher efficiency than the traditional separating communication and computation tasks in the large-scale wireless sensor network. However, the presence of the malicious active eavesdropper in the network poses a severe security threat, as the eavesdropper can not only intercept aggregated information but also interfere with legitimate transmissions. To address the issue, we first derive the closed-form expressions that characterize both the approximation level and the security level of AirComp in the presence of active eavesdropping. Then, we jointly design the power allocation, the sensor selection, the artificial noise, and the receiver filter to minimize the approximation level subject to the required security level and the power budget constraint. Finally, the penalty dual decomposition scheme is proposed to solve the approximation level minimization problem, which is NP-hard due to the integer-programming nature and coupling properties of the optimization variables. Numerical results show that our scheme significantly outperforms the existing method.
引用
收藏
页码:2503 / 2507
页数:5
相关论文
共 50 条
  • [1] Towards Secure Over-The-Air Computation
    Frey, Matthias
    Bjelakovic, Igor
    Stanczak, Slawomir
    2021 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2021, : 700 - 705
  • [2] Selective and Secure Over-The-Air Programming for Wireless Sensor Networks
    Aschenbruck, Nils
    Bauer, Jan
    Bieling, Jakob
    Bothe, Alexander
    Schwamborn, Matthias
    2012 21ST INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS (ICCCN), 2012,
  • [3] Optimized Over-the-Air Computation for Wireless Control Systems
    Park, Pangun
    Di Marco, Piergiuseppe
    Fischione, Carlo
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (02) : 424 - 428
  • [4] Seluge plus plus : A Secure Over-the-Air Programming Scheme in Wireless Sensor Networks
    Doroodgar, Farzan
    Razzaque, Mohammad Abdur
    Isnin, Ismail Fauzi
    SENSORS, 2014, 14 (03) : 5004 - 5040
  • [5] Secure over-The-Air Firmware Updates for Sensor Networks
    Kerliu, Kevin
    Ross, Alexandra
    Tao, Gong
    Yun, Zelin
    Shi, Zhijie
    Han, Song
    Zhou, Shengli
    2019 IEEE 16TH INTERNATIONAL CONFERENCE ON MOBILE AD HOC AND SENSOR SYSTEMS WORKSHOPS (MASSW 2019), 2019, : 97 - 100
  • [6] PRIVATE WIRELESS FEDERATED LEARNING WITH ANONYMOUS OVER-THE-AIR COMPUTATION
    Hasircioglu, Burak
    Gunduz, Deniz
    2021 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP 2021), 2021, : 5195 - 5199
  • [7] Optimized Joint Beamforming for Wireless Powered Over-the-Air Computation
    Zhang, Siyao
    Li, Xinmin
    Long, Yin
    Xu, Jie
    Cui, Shuguang
    2024 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE, WCNC 2024, 2024,
  • [8] Joint transceiver optimization for secure OFDMA over-the-air computation systems
    Li, Quanzhong
    Yang, Liang
    ELECTRONICS LETTERS, 2023, 59 (24)
  • [9] Secure Transceiver Design and Power Control for Over-the-Air Computation Networks
    Hu, Changjie
    Li, Quanzhong
    Zhang, Qi
    Qin, Jiayin
    IEEE COMMUNICATIONS LETTERS, 2022, 26 (07) : 1509 - 1513
  • [10] Over-The-Air Programming of PSoC Sensor Interface in Wireless Sensor Networks
    Adly, I.
    Ragai, H. F.
    El-Hennawy, A.
    Shehata, K. A.
    MELECON 2010: THE 15TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, 2010, : 997 - 1002