Next Article in Journal
KNN-Based Consensus Algorithm for Better Service Level Agreement in Blockchain as a Service (BaaS) Systems
Next Article in Special Issue
Quantification and Analysis of Carrier-to-Interference Ratio in High-Throughput Satellite Systems
Previous Article in Journal
RSETP: A Reliable Security Education and Training Platform Based on the Alliance Blockchain
Previous Article in Special Issue
A Survey on Resource Management for 6G Heterogeneous Networks: Current Research, Future Trends, and Challenges
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
Article

Secure Decision Fusion in ISAC-Oriented Distributed Wireless Sensing Networks with Local Multilevel Quantization

1
State Key Laboratory of Geo-Information Engineering, Xi’an 710054, China
2
School of Information and Communications Engineering, Xi’an Jiaotong University, Xi’an 710049, China
*
Author to whom correspondence should be addressed.
Submission received: 6 January 2023 / Revised: 7 March 2023 / Accepted: 12 March 2023 / Published: 16 March 2023

Abstract

:
Distributed deployment for integrated sensing and communication (ISAC) can improve the sensing accuracy by exploring spatial diversity for covering the target state. However, secure fusion and limited energy consumption are still challenges for wireless-transmission-based distributed ISAC. In this paper, a secure decision-fusion scheme under energy constraint is proposed. First, the local likelihood ratios (LRs) of the local observations at sensing nodes are quantified at multiple levels corresponding to a multiple phase-shift keying (MPSK) constellation, in order to retain more sensing information. Second, an antieavesdropping scheme, which randomly rotates the constellation based on the main channel information between the nodes and ally fusion center (AFC), is proposed to confuse the data fusion of the eavesdropping fusion center (EFC). In addition, the local quantization thresholds and the rotating threshold are optimized to realize the perfect security under energy constraint and maximum rotation angle of π . In addition, the optimized rotation angle is discussed under a relaxed security requirement of the EFC in exchange for reducing the AFC error. Performance evaluation results show that the AFC error probability of the proposed scheme with a two-bit quantization and soft fusion outperforms the single-bit case and three-bit case by above 3 dB and about 0.5 dB at the error probability of 10 2 , respectively. The former gain is just contributed by the more local information kept with two-bit against single-bit quantization. However, for the three-bit case, the advantage of more levels of quantization is eliminated by the worse transmission of denser constellation over a noisy channel. Moreover, the proposed scheme outperforms the conventional channel-aware encryption method under a stricter energy constraint and higher signal noise ratio (SNR).

1. Introduction

In order to meet the requirement of human-centric applications, such as smart home, intelligent cities and remote healthcare, ultralow-latency- and ultrafast-data-speed-based wireless connectivity and precision sensing capability are both required in beyond-fifth-generation (B5G) and sixth-generation (6G) wireless networks [1,2]. In order to realize service-aware access and context-aware environment monitoring, sensing service will play a more significant role than ever before [1,3,4]. Integrated sensing and communications (ISAC) can combine sensing and communication functionalities in one hardware platform and is expected to utilize the congested frequency and hardware resources more efficiently [5]. Actually, wireless sensing and wireless communication have a similar evolving direction, such as higher-frequency bands, larger antenna arrays and higher energy efficiency; therefore, wireless infrastructures can be directly used to naturally implement sensing in future networks [1,6]. Then, ubiquitous sensing services to measure surrounding environments based on wireless sensing can be provided through ISAC. Wireless sensing networks (WSNs) [7,8,9,10] will be an important technology for various ISAC application scenarios, including remote sensing, environmental monitoring, smart manufacturing and the smart Internet of things (IoT) [8,11,12,13].
Distributed deployment including more transmitting and receiving devices is an important type of ISAC system. It can collect information about the target from various spatial locations and obtain a better sensing performance by exploring spatial diversity [5]. In an ISAC system with distributed deployment, there are a large number of distributed sensing nodes that communicate with relays or directly with data fusion centers (FC) through wireless channels [8,12,14]. Whether to the traditional wireless sensing nodes or to the ISAC nodes, energy and frequency resources are always constrained and this is still a large challenge faced by a WSN. Therefore, distributed detection with low bandwidth and power requirement at sensing nodes is a significant issue in WSNs [15,16]. However, due to the broadcasting nature of the wireless transmission from sensing nodes to FC, there exist many security challenges [17]. Improved security is still an important network requirement of 6G [6]. Passive eavesdropping is a representative security threat faced by wireless sensing. An EFC passively overhears the signals transmitted by the sensing nodes to an AFC and also attempts to detect the target state correctly [17,18,19].
There are many secure solutions at various layers that can handle the eavesdropping problems. However, the physical-layer security methods with little or no aid from an encryption key and with low computational complexity is more preferable for WSNs [20,21,22,23]. A kind of key-based probabilistic ciphering schemes were proposed in [20,21], where the sensing nodes’ observation was randomly mapped to a set of quantization levels according to an optimal mapping probabilities matrix. There, the mapping probabilities matrix was just the secret key. However, these works did not discuss the energy efficient issue and the effect of the transmission channel on security. Moreover, these schemes worked well under the assumption that the key was unknown by the eavesdropper. However, how to ensure this condition is satisfied was not discussed and the practicability was limited. In [22], an optimal sensing node’s censoring scheme with a perfect secrecy and energy constraint was presented. However, an EFC with limited processing capability compared with an AFC was assumed and the application was still constrained. In [23], a falsified censoring strategy was proposed for the distributed detection of sparse signals. However, some extra trustworthy nodes were needed to send falsified data cooperatively in order to confuse the eavesdropper, and the hardware cost increased. Furthermore, the methods based on sending artificial noise by partial nodes were also reviewed to improve the security of distributed detection [24]. However, the extra energy would be spent to interfere with the edges and this is challenging for a WSN with limited power.
Another category of schemes consists of channel-aware encryption methods [25]. The sensing nodes decide whether to flip the bits to be transmitted according to the amplitude of the main channel between the sensing nodes and the AFC. There, the channel gains can be estimated by the sensing nodes based on the assumption that the channel is reciprocal and a pilot signal is sent by the AFC. These kinds of methods are key-free and the energy can be saved by setting some silent sensing nodes at the transmission stage. However, an efficient optimization method for some key thresholds is not given. When choosing silent sensing nodes to satisfy the energy constraint, the quality of the local decision is not taken into account. Considering the above solutions’ drawbacks, we proposed a hybrid, secure, distributed detection scheme jointly considering the local decision accuracy and the wireless transmission channel in [26], which was named the joint local decision and wireless transmission (JLDWT) method. However, this work only assumed that the binary hard decision was adopted in a sensing node’s local quantization. Then, a randomly bit-flipping scheme similar to that in [25] was introduced to guarantee the transmission security. The more general case of multibit quantization, which can retain more information of local observations and may get better fusion detection performance was not discussed in [26], just as in most of the related existing works [27,28]. In particular, for the sensing-node-merging communication functionality, the high-order modulation was more general to realize efficient transmission. Therefore, from these two perspectives, namely getting accurate fusion results and matching the general communication setup, the multibit quantization of the sensing results needs to be studied. Then, to design a secure transmission scheme suitable to multibit quantization is further necessary. What is more, a perfect secrecy was assumed in [25,26]. However, in some scenarios, the better performance of the AFC is preferred and the performance constraints over the EFC can be relaxed appropriately [29]. How to realize such a flexible secure scheme is also worth studying.
The work in this paper was motivated by the above-related works and discussion. First, an antieavesdropping scheme for an energy-constrained distributed WSN is studied under the scenario that multilevel quantization is implemented over the LRs of local observations. Second, a security transmission based on a randomly rotating constellation, which is suitable for multilevel quantization, is presented under the assumption that the EFC can execute the same fusion procedure as the AFC. The abilities of the EFC are not weakened. Third, the key system parameters used in quantization and transmission, including the local quantization thresholds and the rotating threshold, are optimized to satisfy the energy constraint and the given security constraint. The rotation angle is also discussed to realize a more flexible security objective. The main contributions of this paper are summarized as follows:
(1) We propose a secure distributed decision-fusion scheme combining a multibit-quantization-based local decision and constellation-rotation-based transmission under an energy constraint for the ISAC-oriented distributed WSN. For the local decision, the multibit quantification of local LRs based on an M-PSK constellation is designed. Moreover, the detection probabilities for various decision results are derived. In particular, we let the nodes with the LRs close to one keep silent in the transmission time slot for meeting the energy constraint. For the wireless transmission, the constellation is randomly rotated according to the main channel state. The statistical independence of the main channel to the eavesdropping channel is explored to realize the security. For the data fusion, a soft fusion scheme based on the statistical information of the channel amplitude and a hard fusion scheme based on the instantaneous channel amplitude are designed, respectively.
(2) We derive the local decision thresholds of multibit quantization and the rotating threshold to realize perfect secrecy under a given power constraint and the maximized rotation angle π for the soft fusion scheme. Next, the optimization of the rotation angle with a flexible constraint on the EFC’s error performance is also discussed in relation to the soft fusion case. Through relaxing the security condition, the AFC’s performance could be improved to satisfy the higher requirement from the AFC’s detection performance in some scenarios.
(3) We evaluate the proposed schemes under various system conditions through a simulation. The simulation results demonstrate that the proposed schemes with two-bit quantization can obtain the best error performance of the AFC among all the schemes, especially under a relatively severe energy constraint and high SNR environment.
The rest of the paper is organized as follows: Section 2 describes the system model. Section 3 presents the proposed secure decision-fusion schemes. Section 4 discusses the optimization of the local quantification thresholds and constellation rotation angle. We give and analyze the simulation results in Section 5. Section 6 concludes the paper.

2. System Model

An energy constrained ISAC system with a distributed deployment shown in Figure 1 was considered, where the sensing nodes also acted as communication devices and we focused on the secure decision-fusion problem for distributed sensing in this paper. A number of sensing nodes were distributed near the physical system to detect a binary target state θ 0 or θ 1 . Then, they quantified the local sensing results into the symbols from an M-PSK constellation. On one hand, such processing could match the general requirement of variable-order modulation for communication. On the other hand, it could obtain softer decision results about the local observations and more information can be retained. Further, similar to [25,26], these symbols were transmitted to an AFC through a wireless parallel access channel (PAC). At the same time, an EFC passively listened to the signals between the sensing nodes and the AFC, in an effort to estimate the binary target state as well. The wireless channel between each sensing node and the AFC was called the main channel. The wireless channel from each sensing node to the EFC was denoted as the eavesdropping channel. Moreover, the same assumption as in [25] was included, where the EFC was located more than one-half wavelength apart from both the sensing devices and the AFC. Then, the main channel and the eavesdropping channel could be considered to be statistically independent of each other.
In order to realize a high energy efficiency, the same idea as in the work [26] was also adopted. We let the sensing nodes be more informative to send the local decisions and otherwise dormant during the transmission phase. Moreover, among the nodes being active to send the local decisions, some sent the constellation-rotated symbols to confuse the eavesdropper in order to satisfy the security requirement. Through the above description, we can see that the sending nodes can be divided into three groups, namely the nonrotation-active group denoted as i 1 i K N , the rotation-active group indicated by j 1 j K R and the dormant group marked with k 1 k K D . Obviously, the total number of sensing nodes in the network was K = K N + K R + K D . The main channel coefficient and the eavesdropping channel coefficient were denoted by h k A and h k E , respectively. They were independent quasi-static Rayleigh block-fading channel. We assumed h k A C N ( 0 , 1 ) and h k E C N ( 0 , 1 ) . Moreover, the system energy constraint was equivalent to a dynamic transmission probability of total sensing nodes, denoted by β , which was proportional to the energy consumption of total sending nodes and varies from 0 to 1.

3. Constellation-Rotating-Based Secure Decision Fusion under Energy Constraint

3.1. Local Decision with Multibit Quantification

For the kth sensing node, the observation about the target state affected by noise was modeled as:
θ 0 : x k = w k θ 1 : x k = θ + w k
where θ is the value of a physical event, and w k is an i.i.d. zero-mean Gaussian random variable with variance σ 2 , i.e., w k N 0 , σ 2 . The local signal to noise ratio can be expressed as s n r L = θ 2 θ 2 σ 2 σ 2 . Here, it was assumed that if two prior probabilities were identical, then the Bayesian detection could be transformed into the likelihood ratio (LR) criteria. The conditional probability distribution function of the log likelihood ratio (LLR) can be derived as [26]:
f Λ k L | θ 1 = 1 2 π · s n r L exp Λ k L s n r L / 2 2 2 · s n r L f Λ k L | θ 0 = 1 2 π · s n r L exp Λ k L + s n r L / 2 2 2 · s n r L
where Λ k L = log f x k | θ 1 f x k | θ 0 = θ σ 2 x k θ 2 2 σ 2 . In order to implement the log 2 M -bit quantization of local LRs, M local detection thresholds λ L M / 2 , . . . , λ L 1 , λ U 1 , . . . , λ U M / 2 were set, which satisfied 0 < λ L M / 2 < . . . < λ L 1 1 λ U 1 < . . . < λ U M / 2 < . Each node could quantify its local observation LR to one log 2 M bits and then they were mapped to one symbol from the M-PSK constellation. This process followed the rule shown in Figure 2. In particular, the node with the likelihood ratio located between λ L 1 and λ U 1 would keep silent in the transmission time slot to save the transmitting energy.
Except for the dormant case, there were 2 M possible cases for the local detection. They were the cases where the decision results were M log 2 M -bit symbols in the set of { s 1 , s 2 , . . . , s M } under two prior states, respectively. Then, we defined four kinds of detection probabilities, namely, the local-detection probabilities { P d i = P ( s i + M / 2 θ 1 ) } ( i [ 1 , M / 2 ] ) , the missing-detection probabilities { P m i = P ( s M / 2 i + 1 θ 1 ) } ( i [ 1 , M / 2 ] ) , the false-detection probabilities { P f i = P ( s i + M / 2 θ 0 ) } ( i [ 1 , M / 2 ] ) and the detection probabilities under a zero prior state { P 0 d i = P ( s M / 2 i + 1 θ 0 ) } ( i [ 1 , M / 2 ] ) . Then, based on Equation (2) and Figure 2, we can derive the expressions of the above probabilities as follows:
P d M / 2 = log λ U M / 2 f Λ k L | θ 1 d Λ k L = Q log λ U M / 2 s n r L / 2 s n r L . . . P d i = log λ U i log λ U i + 1 f Λ k L | θ 1 d Λ k L = Q log λ U i s n r L / 2 s n r L Q log λ U i + 1 s n r L / 2 s n r L . . . P m M / 2 = log λ L M / 2 f Λ k L | θ 1 d Λ k L = 1 Q log λ L M / 2 s n r L / 2 s n r L . . . P m i = log λ L i + 1 log λ L i f Λ k L | θ 1 d Λ k L = Q log λ L i + 1 s n r L / 2 s n r L Q log λ L i s n r L / 2 s n r L . . . P f M / 2 = log λ U M / 2 f Λ k L | θ 0 d Λ k L = Q log λ U M / 2 + s n r L / 2 s n r L . . . P f i = log λ U i log λ U i + 1 f Λ k L | θ 0 d Λ k L = Q log λ U i + s n r L / 2 s n r L Q log λ U i + 1 + s n r L / 2 s n r L . . . P 0 d M / 2 = log λ L M / 2 f Λ k L | θ 0 d Λ k L = 1 Q log λ L M / 2 + s n r L / 2 s n r L . . . P 0 d i = log λ L i + 1 log λ L i f Λ k L | θ 0 d Λ k L = Q log λ L i + 1 + s n r L / 2 s n r L Q log λ L i + s n r L / 2 s n r L
where Q x = 1 / 2 π x exp t 2 / 2 d t .

3.2. Random-Constellation-Rotation-Based Transmission of Local Decisions

After the local detection, the sensing nodes sent the quantified results to the AFC through a wireless PAC. Here, it was assumed that the EFC had the same prior information and processing capability as the AFC. Since the main channel and the eavesdropping channel were statistically independent, we could utilize such channel difference to realize the information transmission security in the physical layer. Referring to the same ideal of bit randomly flipping as in [25,26], the encryption based on a random constellation rotation was adopted to suit a multiple-level quantization, which randomly rotated the transmitted symbol according to the main channel state. Actually, a rotating constellation based on the main channel state was similar as the mapping diversity security scheme in [30] for the MPSK mapping. However, the latter one was proposed only for the secure wireless transmission, and it was not combined with sensing and data fusion.
Preceding the transmission, the active sensing nodes and the fusion center needed to estimate the main channel state by using the pilot symbols from the AFC and the sending nodes, respectively [25,26]. We assumed that the channel between the sensing nodes and the fusion center was reciprocal. Hence, the estimated channel information at each sensing node could be directly used to encrypt the transmitted signal, and the channel estimation results at the fusion center could be directly adopted to execute the symbols receiving and data fusing. However, since the EFC was not able to estimate the main channel state by the pilots from the AFC or the sensing nodes, it could only cancel the symbol rotation effect based on its own channel state, which was totally uncorrelated with the main channel. Then, the fusion errors had to occur randomly, and the security could be realized, even if the EFC was fully aware of the rotating thresholds and the rotating angle.
Each node determined to send the original symbol or the rotated symbol according to the main channel. There were only two transmission actions. Therefore, one threshold t 0 was set up and then the main channel amplitude h k A was compared with t 0 to determine the transmission action. If the main channel gain h k A t 0 , the original constellation symbol corresponding to the local quantization value was sent. Otherwise, the rotated constellation symbol mapped to the local decision result was sent. Taking a two-bit quantization as an example, the corresponding relationship between the quantization value and the constellation symbol is given in Table 1, where ϕ is the rotation angle. In particular, for a rotation angle ϕ = π , s 4 is rotated to s 1 and s 1 is rotated to s 4 . The same condition is valid for s 2 and s 3 . Extending this processing to the arbitrary M-PSK quantification case, we have that s i and s M i + 1 are paired to be rotationally symmetric with each other for i [ 1 , M ] . Referring to [25,26], we selected the threshold t 0 to meet the conditions of λ 1 = t 0 f h k A d h k A = 0 t 0 f h k A d h k A = λ 2 , which meant the rotating probability was 1/2. In Section 5.1 of [26], it was proved that such a comparison threshold was one condition of perfect secrecy in the JLDWT scheme with a one-bit local quantization. In the following text, we show the same result under the multiple-bit quantization case.

3.3. LLR-Based Soft Data Fusion (Sdf) at Fusion Center

Through the wireless PAC, the received signal of the AFC and EFC from the kth sensing node can be written as
z k A = h k A · x k + n k A z k E = h k E · x k + n k E
where x k is the transmitted symbol from the M-PSK constellation or the rotated M-PSK constellation. n k A C N 0 , σ A 2 and n k E C N 0 , σ E 2 . Since the security scheme was based on the main channel amplitude, the influence of the channels’ phase needed to be offset before data fusion. By using the pilot symbols from the sensing node, the AFC and the EFC could estimate the channel’s phase. Here, we assumed the channel’s phase was perfectly known by the FC. After the channel phase cancellation, the signals received could be written as
y k A = e j ϕ h k A · h k A · x k + n k A y k E = e j ϕ h k E · h k E · x k + n k E
where ϕ h k A and ϕ h k E are the phases of the main channel and the eavesdropping channel, respectively. In addition, the transmission SNRs of the main channel and the eavesdropping channel are denoted as S N R A = h k A 2 h k A x k 2 σ A 2 σ A 2 and S N R E = h k E 2 h k E x k 2 σ E 2 σ E 2 .
The received signal vector at the AFC was y A = y 1 A , y 2 A , , y K A and then the fused LLR could be expressed as
Λ A = 1 K log f y k A | θ 1 f y k A | θ 0 = 1 K k = 1 K log f y k A | θ 1 f y k A | θ 0
where f y k A | θ i is the likelihood function of the received signal from the kth node. According to a similar derivation as in [25,26], it can be obtained that:
f y k A | θ i = α k x k 0 f y k A , h k A , x k , α k | θ i d h k A = α k x k 0 f y k A , h k A , x k | α k , θ i p α k | θ i d h k A = α k p α k | θ i x k 0 f y k A | h k A , x k , α k , θ i f h k A , x k | α k , θ i d h k A = ( a ) α k p α k | θ i x k 0 f y k A | h k A , x k f h k A p x k | α k d h k A = ( b ) m = 1 M p α k = s m | θ i [ t 0 + f y k A | h k A , x k = s m f h k A d h k A + 0 t 0 f y k A | h k A , x k = s m e j ϕ f h k A d h k A ] + p α k = n u l l | θ i 0 + f y k A | h k A , x k = 0 f h k A d h k A = m = 1 M p α k = s m | θ i [ Φ t 0 , , s m , y k A , σ A 2 + Φ 0 , t 0 , s m e j ϕ , y k A , σ A 2 ] + p α k = n u l l | θ i Φ 0 , , 0 , y k A , σ A 2
where
Φ t a , t b , x k , y k A , σ A 2 = t a t b f y k A | h k A , x k f h k A d h k A = t a t b 1 π σ A 2 exp y k A h k A x k 2 σ A 2 · 2 h k A exp h k A 2 d h k A
In Equation (7), (a) is valid because θ i α k x k y k A forms a Markov chain and h k A is uncorrelated with x k and θ i . Moreover, (b) is because p x k = s m | α k = s m = 1 for h k A t 0 and p x k = s m e j ϕ | α k = s m = 1 for h k A < t 0 . Obviously, the above fusion strategy is a soft one based on the statistic distribution of the channel amplitude. Here, the Rayleigh distribution f h = 2 h exp h 2 was assumed both for h k A and h k E . At last, the AFC used the Bayesian detection rule Λ A θ 1 > < θ 0 0 to get the final data fusion result. At the EFC, the same fusion processing as in Equations (6) and (7) was adopted except that ( y k A , h k A , σ A 2 ) were replaced by ( y k E , h k E , σ E 2 ) .
In order to analyze the error probability at the AFC, the statistic distribution of Λ A is first discussed. Obviously, the received signals from different sensing nodes are independent of each other. Then, Λ k A = log f y k A | θ 1 f y k A | θ 0 can be taken as the i.i.d. random variables. Further, based on the central limit theorem, we can approximately take the statistic distribution of Λ A , which is the average of K i.i.d. random variables, as a normal distribution for a large K, that is, Λ A | θ i N ( μ A | θ i , γ A 2 | θ i K ) , where μ A | θ i and γ A 2 | θ i are the mean and variance of Λ k A conditioned on θ i , respectively. Thus, according to the Bayesian detection rule, the final error probability of AFC can be expressed as
P e A = q 0 P Λ A 0 | θ 0 + q 1 P Λ A < 0 | θ 1 = q 0 · [ 1 Q μ A | θ 0 γ A 2 | θ 0 / K ] + q 1 · Q μ A | θ 1 γ A 2 | θ 1 / K
where μ A | θ i = Λ A f Λ A | θ i d Λ A and γ A 2 | θ i = ( Λ A ) 2 f Λ A | θ i d Λ A ( μ A | θ i ) 2 .

3.4. Hard-Decision-Based Hard Data Fusion (Hdf) at Fusion Center

If the instantaneous channel amplitude from the sensing node to the FC could be estimated and used, the hard decision could be executed at the AFC and the EFC. We rewrote Equation (5) as:
y k A = h k A x k + e j ϕ h k A n k A y k E = h k E x k + e j ϕ h k E n k E
For the sensing nodes keeping dormant at the transmission stage, the corresponding received signals of these nodes were invalid and needed to be excluded at the fusion stage. Since the received signal only included the noise for the dormant nodes, a small threshold ε was set up and combined with the noise variance to realize the valid signal selection. If y k A 2 > σ A 2 + ε , y k A was retained in the hard decision and data fusion. We assumed the channel amplitude information was perfectly known by the AFC, and the decision processing was expressed as
s k * = arg min s k { s 1 , . . . , s M } y k A h k A s k 2 h k A t 0 arg min s k { s 1 , . . . , s M } y k A h k A e j ϕ s k 2 h k A < t 0
Further, if s k * { s 1 , . . . , s M / 2 } , the decision result was θ 0 . Otherwise, it was θ 1 . Denoting the number of the valid received signals as K v and the number of decision results being θ 1 as N θ 1 , the hard data fusion result was given by
θ F = θ 1 , N θ 1 > K v / 2 θ 0 , o t h e r w i s e

4. Optimization of Local Quantification and Constellation Rotation

4.1. Perfect Security Analysis

In this subsection, the condition of perfect secrecy for the proposed secure decision fusion scheme with multiple-level quantization is analyzed. Perfect secrecy means that the EFC’s fusion results have the same probability for both cases of θ 0 and θ 1 . That also implies the error probability at the EFC almost stays at 0.5. Considering the maximum rotation angle π of the M-PSK constellation, which moves each constellation point to its rotationally symmetric point and may deduce the most serious error of the EFC, we took such a rotation angle as one condition of perfect secrecy in our scheme. Let us begin with the conditional likelihood function of the kth sensing node obtained by the EFC to derive the optimal local quantization thresholds under the perfect secrecy constraint. Referring to Equation (7), it can be obtained that
f y k E | θ i = α k p α k | θ i x k 0 f y k E | h k E , x k f h k E p x k | α k d h k E = ( a ) m = 1 M p α k = s m | θ i [ 0 + f y k E | h k E , x k = s m f h k E d h k E · t 0 + f h k A d h k A + 0 + f y k E | h k E , x k = s m e j ϕ f h k E d h k E · 0 t 0 f h k A d h k A ] + p α k = n u l l | θ i 0 + f y k E | h k E , x k = 0 f h k E d h k E = ( b ) m = 1 M p α k = s m | θ i [ Φ 0 , + , s m , y k E , σ E 2 · η + Φ 0 , + , s m e j ϕ , y k E , σ E 2 · ( 1 η ) ] + p α k = n u l l | θ i Φ 0 , + , 0 , y k E , σ E 2
where (a) is still due to the conditions that p x k = s m | α k = s m = 1 for h k A t 0 and p x k = s m e j ϕ | α k = s m = 1 for h k A < t 0 , and h k A is independent from y k E | h k E , x k . The definition η = Δ t 0 + f h k A d h k A makes (b) hold. In the case where the rotation angle ϕ = π , we have s m = s M m + 1 e j π . Therefore, Equation (13) can be rewritten as
f y k E | θ i = m = 1 M [ p α k = s m | θ i η + p α k = s M m + 1 | θ i ( 1 η ) ] · Φ 0 , + , s m , y k E , σ E 2 + [ 1 m = 1 M [ p α k = s m | θ i ] Φ 0 , + , 0 , y k E , σ E 2
To realize perfect security, it is required that f y k E | θ 1 = f y k E | θ 0 . Combined this condition with (14), we obtain
p α k = s m | θ 1 η + p α k = s M m + 1 | θ 1 ( 1 η ) = p α k = s m | θ 0 η + p α k = s M m + 1 | θ 0 ( 1 η ) m [ 1 , M ] m = 1 M p α k = s m | θ 1 = m = 1 M p α k = s m | θ 0
Further, solving Equation (15), we get
η = 1 / 2 p s m | θ 1 + p s M m + 1 | θ 1 = p s m | θ 0 + p s M m + 1 | θ 0 m [ 1 , M ]
The first condition in Equation (16) just means t 0 + f h k A d h k A = 0 t 0 f h k A d h k A = 1 / 2 and further results in t 0 = log ( 2 ) . The rest of the conditions are combined with Equation (3) to obtain
P d i + P m i = P f i + P 0 d i i [ 1 , M / 2 ]
Then, we need to find the local detection thresholds λ L M / 2 , . . . , λ L 1 , λ U 1 , . . . , λ U M / 2 to meet the conditions in (17). Similar to Equation (19) in [26], we define the following functions
D U ( λ ) = Δ log ( λ ) [ f Λ k L | θ 1 f Λ k L | θ 0 ] d Λ k L D L ( λ ) = Δ log ( λ ) [ f Λ k L | θ 0 f Λ k L | θ 1 ] d Λ k L
Further, we can derive that
D L ( λ ) = log ( λ ) [ f Λ k L | θ 0 f Λ k L | θ 1 ] d Λ k L = log ( λ ) [ f Λ k L | θ 1 f Λ k L | θ 0 ] d Λ k L = ( a ) 0 log ( λ ) [ f Λ k L | θ 1 f Λ k L | θ 0 ] d Λ k L = D U ( λ )
where (a) is due to the fact that + f Λ k L | θ 1 f Λ k L | θ 0 d Λ k = 0 based on the total probability theory.
Then, using Equations (3) and (17)–(19), we have
D U ( λ U M / 2 ) = P d M / 2 P f M / 2 = P 0 d M / 2 P m M / 2 = D L ( λ L M / 2 ) = D U ( λ L M / 2 ) D U ( λ U i ) D U ( λ U i + 1 ) = P d i P f i = P 0 d i P m i = D L ( λ L i ) D L ( λ L i + 1 ) = D U ( λ L i ) D U ( λ L i + 1 ) i [ 1 , M 2 1 ]
Substituting the first formula into the second formula with i = M 2 1 in Equation (20), we obtain D U ( λ U M 2 1 ) = D U ( λ L M 2 1 ) . By the same manner, it can be deduced that Equation (20) is equivalent to
D U ( λ U i ) = D U ( λ L i ) i [ 1 , M / 2 ]
Finally, the perfect security conditions in the second row of Equation (16) are transferred to Equation (21). For the convenience of analysis, we redraw the curve of D U ( λ ) shown by Figure 3 in [26] here.
In Figure 3, the X axis represents the independent variable λ of function D U ( λ ) given in Equation (18) and the Y axis corresponds to the value of function D U ( λ ) . Actually, λ represents the likelihood ratio of the local detection. From Figure 3, it can be seen that there is a pair of thresholds λ U i and λ L i corresponding to one value of D U ( λ ) . Moreover, this D U ( λ ) maps to a certain β 1 i or a certain β 0 i , which are defined as
β 1 i = log ( λ U i ) f Λ k L | θ 1 d Λ k L + log ( λ L i ) f Λ k L | θ 1 d Λ k L = j = i M / 2 ( P d j + P m j ) β 0 i = log ( λ U i ) f Λ k L | θ 0 d Λ k L + log ( λ L i ) f Λ k L | θ 0 d Λ k L = j = i M / 2 ( P f j + P 0 d j )
From Equation (21), it can be easily obtained that β 1 i = β 0 i . Therefore, we only focus on the discussion of β 1 i . Obviously, Figure 3 shows that when λ U i and λ L i overlap at 1, the maximum D U ( λ ) and the maximum β 1 i = 1 are obtained simultaneously. With λ U i and λ L i keeping away from 1, D U ( λ ) and β 1 i both decrease monotonically. If β 1 i , i [ 1 , M / s ] are given, the corresponded threshold pairs { λ U i , λ L i } , i [ 1 , M / s ] can be directly determined based on the function D U ( λ ) and the condition of Equation (21) through a numerical calculation combined with searching.
Next, we discuss the determination of β 1 i . First, β 1 1 determined by λ U 1 and λ L 1 actually represents the practical transmission probability of sensing nodes, which should satisfy the constraint β 1 1 β . According to the analysis of Section 5 in [26], we know that the minimized error probability at the AFC can be obtained when β 1 1 equals β under a low or high-SNR range. This condition is also involved in the case of multiple-bit quantification. As for the other β 1 i , no limitation is found in terms of concrete value from the perspective of perfect security. Then, we use a very simple criterion to select β 1 i , i [ 2 , M / 2 ] , that is β 1 i = β 1 1 · [ 1 ( i 1 ) / ( M / 2 ) ] , i [ 2 , M / 2 ] . This criterion also means the probability of the quantification result falling in each interval is the same, i.e., P d i + P m i = P d j + P m j , i , j [ 1 , M / 2 ] and i j .

4.2. Optimization of Constellation Rotation under a Given Error Constraint of EFC

In Section 4.1, we derived the local quantification thresholds and the rotating threshold under the perfect security constraint with the rotation angle being π . However, the error performance at the AFC was also reduced as perfect security is realized, to keep the worst performance at the EFC, while for the case where no such serious requirement on the security performance at the EFC was needed, it could be relaxed to some degree in exchange for a better performance at the AFC.
From the proposed scheme, we found that the rotation angle ϕ was an important factor for controlling the security performance. Moreover, when only the statistic channel information or the imperfect instantaneous channel state was useful at the AFC, the rotated constellation could not be recovered perfectly and then, it would inevitably have a negative response to the AFC’s error performance. For a smaller ϕ , the quantification constellation points had less distortion after rotating. The imperfect rotation offset would also cause less influence on the data fusion at the AFC. Surely, a smaller ϕ also meant less degree of confusion at the EFC. Hence, an optimization problem was designed to find an appropriate ϕ to satisfy the specified constraint of the EFC’s error probability.
In order to simplify the sensing nodes’ local detection and integrate various levels of security limitations, including perfect security, into a unified system, the optimization methods of local decision thresholds in Section 4.1 were kept under a certain energy constraint β . Therefore, the optimization of local quantification was decoupled from the optimization of constellation rotation. The latter one could be established as
min ϕ P t h E P e E ϕ s u b j e c t t o : 0 ϕ < π
where P t h E is the given error constraint of the EFC. P e E ϕ is the actual error performance of the EFC, which is a function of ϕ and can also be computed by Equation (9) for the soft data fusion. From Equations (7) and (8), we can see that the relationship between ϕ and f y k E | θ i was a complex weighted integral form. It was more difficult to get the analysis formulas of μ E | θ i and γ E 2 | θ i with respect to ϕ . Therefore, a Monte Carlo simulation was used to obtain the sample statistics of μ E | θ i and γ E 2 | θ i in our simulation experiment.
Combing the two parts of the optimization from Section 4.1 and Section 4.2, we conclude the optimization algorithm (Algorithm 1) of key parameters in our scheme, which is given as follows:
Algorithm 1: Optimization Algorithm of Key Parameters for Constellation-Rotating-Based Secure Decision Fusion under a Given Error Constraint of EFC
1 Initialization :
2 M , β , Δ ϕ , Δ λ , P t h E , t 0 = log ( 2 )
3 ϕ * = ϕ 0 = 0 ; λ L 0 * = 1 ; ε 1 = 1 ; ε 2 = 0.5 ; K = λ L 0 Δ λ ; N = π Δ ϕ
4 Optimization of { λ U i , λ L i } , i [ 1 , M / 2 ] :
5 β 1 1 = β ; β 1 i = β 1 1 · [ 1 ( i 1 ) / ( M / 2 ) ] , i [ 2 , M / 2 ]
6 For i = 1 to M / 2
7 For k = 1 to K
8 ( λ L i ) k = λ L ( i 1 ) * k Δ λ
9 Find ( λ U i ) k to meet D U ( ( λ U i ) k ) = D U ( ( λ L i ) k )
10 Calculate ( β 1 i ) k based on Equation ( 22 )
11 If ( β 1 i ) k β 1 i < ε 1
12 ε 1 = ( β 1 i ) k β 1 i
13 λ L i * = ( λ L i ) k ; λ U i * = ( λ U i ) k
14 End If
15 End For
16 End For
17 Optimization of ϕ :
18 For n = 1 to N
19 ϕ n = ϕ 0 + n Δ ϕ ;
20 Calculate ( P e E ) n based on Equation ( 9 ) ;
21 If ( P e E ) n P t h E < ε 2
22 ε 2 = ( P e E ) n P t h E
23 ϕ * = ϕ n
24 End If
25 End For
26 ϕ * , { λ L i * , λ U i * } are obtained .

5. Simulation Results and Discussions

In this section, the performance of the proposed random-constellation-rotation-based secure decision fusion scheme towards the local multiple-bit quantization were evaluated through a computer simulation in a distributed ISAC system with one AFC and one EFC. The simulation tool was MATLAB R2016a. Some primary simulation parameters are listed in Table 2. It is noted that all the assumptions about the EFC were the same as those for the AFC, such as the SNR of the transmission channel and the prior information of the local decision thresholds and the rotation angle. We selected two baseline schemes to be compared with the proposed one, which were the modified scheme applicable for a multiple-bit local decision based on the channel aware encryption presented in [25] and the JLDWT scheme with a one-bit local decision given in [26]. In both baseline schemes, the condition of perfect security to the EFC was assumed. For simplification, we denoted the two baseline schemes as scheme 1 and scheme 2 in the simulation result figures, respectively.

5.1. Error Performance of Soft Data Fusion

Figure 4 shows the error probabilities of the AFC and the EFC versus the transmission SNR for three schemes when the system energy constraint was 0.8 and the perfect security condition was satisfied. Here, the soft data fusion method based on the statistical channel amplitude information was adopted. It can be seen that the error probabilities of the EFC for all three schemes were 0.5 and the perfect security condition was met.
Focusing on the performance of the AFC, we can see that the proposed scheme with two-bit quantization obviously outperformed the two baseline schemes with one-bit quantization. At the error probability of 10 2 , the SNR gain against scheme 1 with one-bit quantization was about 4 dB and the SNR gain against scheme 2 was slightly higher than 3 dB. Actually, the error performance of the AFC mainly depended on two factors, including the local decision accuracy and the wireless transmission reliability. The local observations of all the schemes in Figure 4 were obtained by the same likelihood ratio (LR) criteria over Equation (1), but more information about the same local observation LR was kept by the two-bit quantization than in the one-bit case. It could contribute to the accuracy improvement of the final data fusion under a fixed transmission reliability. As for the effect of the transmission, from the perspective of only one node, the target state was estimated incorrectly only when both bits were wrongly received. Although, as we all know, the bit error rate of 4PSK (corresponding to two-bit quantization) is higher than 2PSK (corresponding to 1-bit quantization) under an identical symbol SNR, so the probability of two bits being wrong simultaneously was still lower than the case for one bit. This advantage was just obtained by the diversity gain of transmission over I and Q dual orthogonal channels. That is to say, for two-bit local quantization, the advantage of more local information overcame the reduction of the transmission performance.
Moreover, in the high-SNR range (above 12 dB), the proposed method with two-bit quantization also had a slight performance gain over the scheme 1 expanded to two-bit quantization. This was due to the contribution of selecting the dormant sensing nodes based on the local decision quality. It prevented the low-quality local decisions worsening the final fusion performance. However, in the expanded version of scheme 1, only a black space was kept to prevent the confusion of rotating and nonrotating cases and its contribution to the final fusion was relatively lower. Such a gap became more obvious when the effect of the transmission errors was reduced in a higher-SNR range.
In addition, when the number of quantization bits increased from two to three, the error performance of the proposed scheme could not be improved further, while it degraded slightly, especially in the low-SNR range (below 10 dB). The same result also happened to scheme 1. This was because the effect of the transmission errors on the final fusion became dominant. For the three-bit case, the number of independent transmission channels was still two and there was no extra diversity gain. However, the antinoise ability of a higher-order modulation declined because its constellation was denser. Then, the significant degradation of transmission performance eliminated the advantage of more local levels of quantization in the final fusion, especially in the low-SNR range; this elimination phenomenon was more obvious due to a worse transmission at a low SNR. This result indicated that the two-bit quantization of the local decision was more preferable in the considered distributed detection system.
The error probabilities of the AFC and the EFC versus the system energy constraint β are given in Figure 5, where transmission SNRs of 5 dB and 15 dB were considered and the perfect security condition was requested. The energy constraint β indicated the probability of the active sensing nodes among the total nodes. It can be seen from Figure 5 that the error probabilities of the EFC for all three schemes were at 0.5, for all β ’s. As for the performance of the AFC, we can see that the two-bit scheme significantly outperformed scheme 2 with one-bit quantization at all β ’s. This was mainly contributed to by the additional information about the local observations at the final data fusion. Compared with scheme 1 with a two-bit local decision, our scheme still had a significant gain at a low β and high SNR. To be specific, for β = 0.4 and an SNR of 15 dB, the error probability of AFC decreased from about 3 × 10 2 to 7 × 10 3 . This showed that canceling the low-quality local detection results from the fusion data was advantageous and it became more obvious for a good transmission channel. Furthermore, we can see that the AFC performance improved with β increasing when β was less than 0.8. However, when β > 0.8 , the performance of the AFC showed a floor effect and even reduced a little with an increasing β for the three schemes. As for scheme 2 and the proposed two-bit scheme, that was because more poor local decisions participated in the final data fusion and the fusion performance was worsened when nearly all sensing nodes (when β was close to one) sent their local decision results to the FC, while for scheme 1, this phenomenon was induced by the confusion of the AFC about distinguishing between the rotating and nonrotating states.
Figure 6 shows the effect of constellation rotation angle ϕ on the error performance under transmission SNRs of 5 dB and 10 dB, where the recommended two-bit quantification scenario with soft data fusion was considered. We can see that the error probabilities of the AFC and EFC both increased with ϕ varying from 0 to π for a relative low transmission SNR. In particular, the error performance of the EFC and AFC was the same and the best at ϕ = 0 . The worst performance was obtained at ϕ = π for both FCs. For ϕ = π , perfect security, i.e., the error probability at the EFC holding at 0.5, was realized. This result agreed with the analysis in Section 4.1 and Section 4.2. Moreover, for the relative high transmission SNR of 10 dB, the above phenomena still existed on the whole. However, the error performance no longer varied with ϕ monotonously in the whole range of [ 0 , π ] , while for ϕ falling in the range [ 0 , π / 2 ] and [ 3 π / 4 , π ] , the case of a monotonous increase was still kept. The results shown in Figure 6 just give us the idea that we can satisfy a flexible EFC error constraint and get a better error performance of the AFC by optimizing ϕ .

5.2. Error Performance of Hard Data Fusion

Figure 7, Figure 8 and Figure 9 show the error probabilities of the hard data fusion method as functions of the transmission SNR, β and ϕ , respectively. Here, the perfect channel amplitude information from the sensing nodes to the fusion center was assumed to be known at the AFC and the EFC. From Figure 7, it can be seen that perfect security was still guaranteed by the proposed scheme when a hard data fusion was utilized. Moreover, we can see that our secure scheme with two-bit local quantization was first a little worse and then a little better than the case of a one-bit local decision, with the SNR improving from the perspective of the AFC performance. This was because the degradation of the antinoise ability of the higher-order modulation became smaller for the higher SNR and the advantage of multiple-bit quantization became dominant. However, the final fusion performance decreased more obviously for three-bit quantification compared with the soft data fusion. That is to say the hard fusion was more sensitive to the transmission quality from the sensing nodes to the FCs. The higher bit error rate of 8PSK with a hard decision worsened the final fusion performance significantly compared with 2PSK and 4PSK. Therefore, either one-bit or two-bit local quantification should be selected based on the transmission SNR condition for the hard data fusion in our scheme. Furthermore, comparing Figure 7 with Figure 4, it can be found that the AFC’s performance of the hard fusion outperformed the soft one in the whole SNR interval considered. This was contributed to by the ideal channel information used and the constellation rotation being compensated perfectly. However, the decreasing speed of the error probability at a high SNR was lower than for the soft fusion. Under the influence of noise, some dormant sensing nodes’ signals were mistakenly included in final data fusion. Their unreliability confused the data fusion and this problem became more prominent for a high SNR.
In addition, Figure 8 demonstrates clearly that one-bit and two-bit quantization schemes had the same AFC error performance at an SNR of 5 dB in the whole β range from 0.4 to 1, while two-bit quantization outperformed the other two cases when the SNR was large, especially for a relative low β . Moreover, the inflection phenomenon of the AFC error versus β became more obvious for the hard data fusion than for the soft data fusion. This told us that preventing the sensing nodes with low-reliability local decisions to send data was more necessary for the hard fusion.
Figure 9 also gives the rotation angle’s effect on the performances of the AFC and EFC with the hard fusion. As for the EFC, its error performance still reduced with ϕ raising, while the AFC’s error almost did not change with ϕ . This was because the constellation rotation was compensated perfectly by the hard decision at the AFC with the ideal channel amplitude, no matter what the rotation angle was.

5.3. Optimization of Rotation Angle under Error Constraint of EFC

Figure 10 shows the optimal constellation rotation angle ϕ , which varied with the given constraint of the EFC’s error probability under the case of a soft data fusion. For each error constraint within 0.1 , 0.5 , the optimal ϕ was searched. It can be seen that perfect security was realized when the constellation rotation angle was set as π for three cases. Moreover, for the same P t h E , a larger ϕ was needed for a higher SNR. Compared with the three-bit quantization case, a larger ϕ was needed under the two-bit quantization case.

5.4. Comprehensive Comparisons of Various Algorithms

Table 3 compares the proposed scheme with the baseline methods comprehensively and lists some key results about the computational complexity, channel state information (CSI) requirements and the error performance of the two fusion centers. The computational complexity of the kind of schemes with SDF mainly depends on the high computation cost of the numerical integration included in Equations (7) and (8). Moreover, the higher the order of the quantization, the higher the number of numerical integrations. From Table 3 and Figure 4, it can be seen that the proposed scheme with two-bit quantization and SDF obtained a relative better AFC error performance at the cost of a moderate complexity and a moderate CSI requirement, under the perfect security constraint. Although the proposed scheme with HDF could achieve the best AFC error performance with the lowest complexity, it needed the instantaneous information about both the amplitude and phase of the channel. The CSI requirement was the highest. In addition, with the quantization order increasing to three, the computation overhead of the schemes with SDF improved significantly; however, the corresponding AFC error performance reduced conversely, just as shown in Figure 4. Hence, two-bit quantization is preferred for applying the proposed scheme.

6. Conclusions

In this paper, a random-constellation-rotation-based secure distributed detection under a specific energy constraint was proposed so that the case that a multiple-bit quantization would be covered in local sensing. Moreover, the optimization of local decision thresholds and the rotating threshold were analyzed from the perspective of perfect security. Then, the optimization of the constellation rotation angle was discussed under a flexible constraint on the EFC’s error probability. The proposed scheme extended the JLDWT method to a more general case with any multiple-bit local decision. The simulation results demonstrated that a better AFC performance could be obtained by adopting two-bit quantization under the perfect security condition for both soft and hard data fusions. Specifically, at the AFC error probability of 10 2 , the SNR gain of the two-bit local decision against the one-bit case was greater than 3 dB under the conditions of perfect security, β = 8 and soft data fusion. Compared with the three-bit case, there was also a performance gain of about 0.5 dB. Moreover, through optimizing the constellation rotation angle under a relaxed security constraint, a better error performance for the AFC could be obtained under the soft fusion case. The proposed scheme is recommended to be utilized in the wireless distributed ISAC scenario for 6G networks. It can be helpful for enhancing the secure data fusion under a strict system energy constraint.
Due to the extremely complex expression of the EFC’s error probability relative to the rotation angle ϕ , an exhaustive search was used to find the optimized rotation angle. In future work, the analytic expression of the EFC error probability will be studied to simplify the optimization of various parameters. In addition, the proposed scheme was evaluated by computer simulation in this paper. In order to demonstrate its practicability and verify the performance gain shown in simulation, we plan to design and exploit an experiment system based on software radio platforms combined with hardware sensing nodes in future work.

Author Contributions

Conceptualization, G.Z.; methodology, G.Z. and H.S.; software, H.S., J.Y. and G.Z.; writing—original draft preparation, G.Z. and H.S.; writing—review and editing, G.Z. and J.Y. All authors have read and agreed to the published version of the manuscript.

Funding

This research was funded by State Key Laboratory of Geo-information Engineering of China under Grant Number (no. SKLGIE2020-Z-2-l).

Data Availability Statement

Data will be available based on reasonable request to the corresponding authors.

Conflicts of Interest

The authors declare no conflict of interest.

References

  1. Liu, F.; Cui, Y.; Masouros, C.; Xu, J.; Han, T.X.; Eldar, Y.C.; Buzzi, S. Integrated Sensing and Communications: Toward Dual-Functional Wireless Networks for 6G and Beyond. IEEE J. Sel. Areas Commun. 2022, 40, 1728–1767. [Google Scholar] [CrossRef]
  2. Zhao, Z.; Du, Q.; Karagiannidis., G.K. Improved grant-free access for URLLC via multi-tier-driven computing: Network-load learning, prediction, and resource allocation. IEEE J. Sel. Areas Commun. 2023, 41, 607–622. [Google Scholar] [CrossRef]
  3. Zuo, J.; Liu, Y. Reconfigurable Intelligent Surface Assisted NOMA Empowered Integrated Sensing and Communication. arXiv 2022, arXiv:2208.04786. [Google Scholar]
  4. Zhao, Z.; Du, Q.; Wang, D.; Tang, X.; Song, H. Overview of prospects for service-aware radio access towards 6G networks. Electronics 2022, 11, 1262. [Google Scholar] [CrossRef]
  5. Li, X.; Cui, Y.; Zhang, J.A.; Liu, F.; Zhang, D.; Hanzo, L. Integrated Human Activity Sensing and Communications. IEEE Commun. Mag. 2022, 1–8. [Google Scholar] [CrossRef]
  6. Imoize, A.L.; Adedeji, O.; Tandiya, N.; Shetty, S. 6G Enabled Smart Infrastructure for Sustainable Society: Opportunities, Challenges, and Research Roadmap. Sensors 2021, 21, 1709. [Google Scholar] [CrossRef]
  7. Xu, T.; Liu, F.; Masouros, C.; Darwazeh, I. An Experimental Proof of Concept for Integrated Sensing and Communications Waveform Design. IEEE Open J. Commun. Soc. 2022, 3, 1643–1655. [Google Scholar] [CrossRef]
  8. Al-Jarrah, M.A.; Yaseen, M.A.; Al-Dweik, A.; Dobre, O.A.; Alsusa, E. Decision Fusion for IoT-Based Wireless sensing node Networks. IEEE Internet Things J. 2020, 7, 1313–1326. [Google Scholar] [CrossRef]
  9. Yick, J.; Mukherjee, B.; Ghosal, D. Wireless sensing node network survey. Comput. Netw. Int. J. Comput. Telecommun. Netw. 2008, 52, 2292–2330. [Google Scholar]
  10. Sen, J. A Survey on Wireless sensing node Network Security. Comput. Sci. 2010, 43, 90–95. [Google Scholar]
  11. Dwivedi, U.; Agarwal, A.; Roy, A.; Chakraborty, A.; Mukherjee, A. A Survey on Wireless sensing node Network Protocols for Transport Layer. In Proceedings of the Second International Conference on Electronics, Communication and Aerospace Technology, Coimbatore, India, 29–31 March 2018; pp. 390–394. [Google Scholar]
  12. Al-Jarrah, M.A.; Yaseen, M.A.; Al-Dweik, A.; Dobre, O.A.; Alsusa, E. Decision Fusion in Distributed Cooperative Wireless sensing node Networks. IEEE Trans. Veh. Technol. 2019, 68, 797–811. [Google Scholar] [CrossRef]
  13. Du, Q.; Song, H.; Zhu, X. Social-feature enabled communications among devices toward the smart IoT community. IEEE Commun. Mag. 2019, 57, 130–137. [Google Scholar] [CrossRef]
  14. Mukherjee, A. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints. Proc. IEEE 2015, 103, 1747–1761. [Google Scholar] [CrossRef]
  15. Mukherjee, A.; Fakoorian, S.A.A.; Huang, J.; Swindlehurst, A.L. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey. IEEE Commun. Surv. Tutor. 2014, 16, 1550–1573. [Google Scholar] [CrossRef] [Green Version]
  16. Shirazi, M.; Vosoughi, A. On Bayesian Fisher information maximization for distributed vector estimation. IEEE Trans. Signal Inf. Process. Netw. 2019, 5, 628–645. [Google Scholar] [CrossRef] [Green Version]
  17. Xie, H.; Yan, Z.; Yao, Z.; Atiquzzaman, M. Data collection for security measurement in wireless sensing node networks: A survey. IEEE Internet Things J. 2019, 6, 2205–2224. [Google Scholar] [CrossRef] [Green Version]
  18. Kailkhura, B.; Nadendla, V.S.S.; Varshney, P.K. Distributed inference in the presence of eavesdroppers: A survey. IEEE Commun. Mag. 2015, 53, 40–46. [Google Scholar] [CrossRef] [Green Version]
  19. Jiang, R.; Chen, B. Fusion of censored decisions in wireless sensing node networks. IEEE Trans. Wirel. Commun. 2005, 4, 2668–2673. [Google Scholar] [CrossRef] [Green Version]
  20. Soosahabi, R.; Naraghi-Pour, M. Scalable PHY-layer security for distributed detection in wireless sensing node networks. IEEE Trans. Inf. Forensics Secur. 2012, 7, 1118–1126. [Google Scholar] [CrossRef] [Green Version]
  21. Soosahabi, R.; Naraghi-Pour, M.; Perkins, D.; Bayoumi, M.A. Optimal probabilistic encryption for secure detection in wireless sensor networks. IEEE Trans. Inf. Forensics Secur. 2014, 9, 375–385. [Google Scholar] [CrossRef]
  22. Marano, S.; Matta, V.; Willett, P.K. Distributed detection with censoring sensing nodes under physical layer secrecy. IEEE Trans. Signal Process. 2009, 57, 1976–1986. [Google Scholar] [CrossRef]
  23. Li, C.; Li, G.; Varshney Pramod, K. Distributed detection of sparse signals with physical layer secrecy constraints: A falsified censoring strategy. IEEE Trans. Signal Process. 2020, 68, 6040–6054. [Google Scholar] [CrossRef]
  24. Li, Y.; Ji, X.; Peng, M.; Huang, C.; Li, Y. An enhanced beamforming algorithm for three dimensional MIMO in LTE-advanced networks. In Proceedings of the 2013 International Conference on Wireless Communications Signal Processing, Hangzhou, China, 24–26 October 2013; pp. 24–26. [Google Scholar]
  25. Jeon, H.; Choi, J.; McLaughlin, S.; Ha, J. Channel aware encryption and decision fusion for wireless sensing node networks. IEEE Trans. Inf. Forensics Secur. 2013, 8, 619–625. [Google Scholar] [CrossRef]
  26. Zhang, G.; Sun, H. Secure Distributed Detection under Energy Constraint in IoT-Oriented sensing node Networks. Sensors 2016, 16, 2152. [Google Scholar] [CrossRef] [PubMed] [Green Version]
  27. Nadendla, V.S.S.; Arshney, P.K. Design of binary quantizers for distributed detection under secrecy constraints. IEEE Trans. Signal Process. 2016, 64, 2636–2648. [Google Scholar] [CrossRef] [Green Version]
  28. Li, Z.; Oechtering, T.J. Privacy-constrained parallel distributed neyman-pearson test. IEEE Trans. Signal Inf. Process. Netw. 2017, 3, 77–90. [Google Scholar] [CrossRef]
  29. Miridakis, N.I.; Vergados, D.D. Complexity analysis of a hybrid threshold-based ZF-MMSE equalizer for sic-based MIMO-OFDM receivers. In Proceedings of the International Conference on Wireless Information Networks and Systems, Seville, Spain, 18–21 July 2011; pp. 109–112. [Google Scholar]
  30. Pechetti, S.V.; Jindal, A.; Bose, R. Exploiting mapping diversity for enhancing security at physical layer in the Internet of Things. IEEE Internet Things J. 2019, 6, 532–544. [Google Scholar] [CrossRef]
Figure 1. Distributed sensing system model.
Figure 1. Distributed sensing system model.
Electronics 12 01428 g001
Figure 2. Local multiple-bit quantification.
Figure 2. Local multiple-bit quantification.
Electronics 12 01428 g002
Figure 3. Diagram of function D U ( λ ) .
Figure 3. Diagram of function D U ( λ ) .
Electronics 12 01428 g003
Figure 4. Error probabilities of the soft data fusion varying with the SNR of transmission channel for β = 0.8 and s n r L = 5 dB.
Figure 4. Error probabilities of the soft data fusion varying with the SNR of transmission channel for β = 0.8 and s n r L = 5 dB.
Electronics 12 01428 g004
Figure 5. Error probabilities of the soft data fusion varying with β for SNR = 5, 15 dB and s n r L = 5 dB.
Figure 5. Error probabilities of the soft data fusion varying with β for SNR = 5, 15 dB and s n r L = 5 dB.
Electronics 12 01428 g005
Figure 6. Error probabilities of the soft data fusion varying with ϕ for SNR = 5, 10 dB and s n r L = 5 dB.
Figure 6. Error probabilities of the soft data fusion varying with ϕ for SNR = 5, 10 dB and s n r L = 5 dB.
Electronics 12 01428 g006
Figure 7. Error probabilities of the hard data fusion varying with the SNR of transmission channel for β = 0.8 and s n r L = 5 dB.
Figure 7. Error probabilities of the hard data fusion varying with the SNR of transmission channel for β = 0.8 and s n r L = 5 dB.
Electronics 12 01428 g007
Figure 8. Error probabilities of the hard data fusion varying with β for SNR = 5, 15 dB and s n r L = 5 dB.
Figure 8. Error probabilities of the hard data fusion varying with β for SNR = 5, 15 dB and s n r L = 5 dB.
Electronics 12 01428 g008
Figure 9. Error probabilities of the hard data fusion varying with ϕ for SNR = 5, 10 dB and s n r L = 5 dB.
Figure 9. Error probabilities of the hard data fusion varying with ϕ for SNR = 5, 10 dB and s n r L = 5 dB.
Electronics 12 01428 g009
Figure 10. The optimal rotation angle vs. error constraint of EFC P t h E for s n r L = 5 dB.
Figure 10. The optimal rotation angle vs. error constraint of EFC P t h E for s n r L = 5 dB.
Electronics 12 01428 g010
Table 1. The relationship between the quantization value and the transmitted signal for the 2-bit case.
Table 1. The relationship between the quantization value and the transmitted signal for the 2-bit case.
QuantizationNormal SendingRotated Sending
11 / s 4 e j π 4 e j π 4 + ϕ
01 / s 3 e j 3 π 4 e j 3 π 4 + ϕ
00 / s 1 e j 5 π 4 e j 5 π 4 + ϕ
10 / s 2 e j 7 π 4 e j 7 π 4 + ϕ
Table 2. Simulation parameter settings.
Table 2. Simulation parameter settings.
Simulation ParametersParameter Settings
Channel modelRayleigh block-fading channel
Number of sensing nodes20, 50
Number of quantization bits2, 3
Local detection SNR s n r L = 5 dB
Transmission channel SNR S N R A = S N R E = 2 : 2 : 16 dB
Energy constraint β = 0.4 : 0.1 : 1
Table 3. Performance comparison of different schemes in the case of perfect security.
Table 3. Performance comparison of different schemes in the case of perfect security.
SchemeComputational ComplexityCSI RequirementError Probabilities of EFCError Probabilities of AFC
Low β High β
Low SNRHigh SNRLow SNRHigh SNR
scheme 1 with 1-bit quantization and Sdf [25]LowStatistical amplitude0.5HighModerate
Expanded version of scheme 1 with 2-bit quantization and SdfModerateStatistical amplitude and instantaneous phase0.5HighModerateModerateLow
Expanded version of scheme 1 with 3-bit quantization and SdfHighStatistical amplitude and instantaneous phase0.5ModerateLow
scheme 2 with 1-bit quantization and Sdf [26]LowStatistical amplitude0.5HighModerateHighModerate
Proposed scheme with 2-bit quantization and SdfModerateStatistical amplitude and instantaneous phase0.5HighModerateModerateLow
Proposed scheme with 3-bit quantization and SdfHighStatistical amplitude and instantaneous phase0.5ModerateLow
Proposed scheme with 1-bit quantization and HdfLowInstantaneous amplitude and phase0.5ModerateLowModerateLow
Proposed scheme with 2-bit quantization and HdfLowInstantaneous amplitude and phase0.5ModerateLowModerateLow
Proposed scheme with 3-bit quantization and HdfLowInstantaneous amplitude and phase0.5ModerateLowModerateLow
Disclaimer/Publisher’s Note: The statements, opinions and data contained in all publications are solely those of the individual author(s) and contributor(s) and not of MDPI and/or the editor(s). MDPI and/or the editor(s) disclaim responsibility for any injury to people or property resulting from any ideas, methods, instructions or products referred to in the content.

Share and Cite

MDPI and ACS Style

Zhang, G.; Sun, H.; Yu, J. Secure Decision Fusion in ISAC-Oriented Distributed Wireless Sensing Networks with Local Multilevel Quantization. Electronics 2023, 12, 1428. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics12061428

AMA Style

Zhang G, Sun H, Yu J. Secure Decision Fusion in ISAC-Oriented Distributed Wireless Sensing Networks with Local Multilevel Quantization. Electronics. 2023; 12(6):1428. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics12061428

Chicago/Turabian Style

Zhang, Guomei, Hao Sun, and Jiayue Yu. 2023. "Secure Decision Fusion in ISAC-Oriented Distributed Wireless Sensing Networks with Local Multilevel Quantization" Electronics 12, no. 6: 1428. https://0-doi-org.brum.beds.ac.uk/10.3390/electronics12061428

Note that from the first issue of 2016, this journal uses article numbers instead of page numbers. See further details here.

Article Metrics

Back to TopTop