ePrints@IIScePrints@IISc Home | About | Browse | Latest Additions | Advanced Search | Contact | Help

On the Average Case Communication Complexity for Detection in Sensor Networks

Venkatesan, NE and Agarwal, Tarun and Kumar, P Vijay (2008) On the Average Case Communication Complexity for Detection in Sensor Networks. In: 4th IEEE International Conference on Distributed Computing in Sensor Systems, JUN 11-14, 2008, Santorini Isl.

[img] PDF
fulltext.pdf - Published Version
Restricted to Registered users only

Download (1MB) | Request a copy
Official URL: http://www.springerlink.com/content/v30552t21v7554...


The problem of sensor-network-based distributed intrusion detection in the presence of clutter is considered. It is argued that sensing is best regarded as a local phenomenon in that only sensors in the immediate vicinity of an intruder are triggered. In such a setting, lack of knowledge of intruder location gives rise to correlated sensor readings. A signal-space viewpoint is introduced in which the noise-free sensor readings associated to intruder and clutter appear as surfaces $\mathcal{S_I}$ and $\mathcal{S_C}$ and the problem reduces to one of determining in distributed fashion, whether the current noisy sensor reading is best classified as intruder or clutter. Two approaches to distributed detection are pursued. In the first, a decision surface separating $\mathcal{S_I}$ and $\mathcal{S_C}$ is identified using Neyman-Pearson criteria. Thereafter, the individual sensor nodes interactively exchange bits to determine whether the sensor readings are on one side or the other of the decision surface. Bounds on the number of bits needed to be exchanged are derived, based on communication complexity (CC) theory. A lower bound derived for the two-party average case CC of general functions is compared against the performance of a greedy algorithm. The average case CC of the relevant greater-than (GT) function is characterized within two bits. In the second approach, each sensor node broadcasts a single bit arising from appropriate two-level quantization of its own sensor reading, keeping in mind the fusion rule to be subsequently applied at a local fusion center. The optimality of a threshold test as a quantization rule is proved under simplifying assumptions. Finally, results from a QualNet simulation of the algorithms are presented that include intruder tracking using a naive polynomial-regression algorithm.

Item Type: Conference Proceedings
Series.: Lecture Notes in Computer Science
Publisher: Springer
Additional Information: Copyright of this article belongs to Springer.
Department/Centre: Division of Electrical Sciences > Electrical Communication Engineering
Date Deposited: 26 Mar 2010 06:52
Last Modified: 19 Sep 2010 05:58
URI: http://eprints.iisc.ac.in/id/eprint/26547

Actions (login required)

View Item View Item