Testing Against Independence with an Eavesdropper

11/07/2022
by   Sara Faour, et al.
0

We study a distributed binary hypothesis testing (HT) problem with communication and security constraints, involving three parties: a remote sensor called Alice, a legitimate decision centre called Bob, and an eavesdropper called Eve, all having their own source observations. In this system, Alice conveys a rate R description of her observation to Bob, and Bob performs a binary hypothesis test on the joint distribution underlying his and Alice's observations. The goal of Alice and Bob is to maximise the exponential decay of Bob's miss-detection (type II-error) probability under two constraints: Bob's false alarm-probability (type-I error) probability has to stay below a given threshold and Eve's uncertainty (equivocation) about Alice's observations should stay above a given security threshold even when Eve learns Alice's message. For the special case of testing against independence, we characterise the largest possible type-II error exponent under the described type-I error probability and security constraints.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
07/08/2018

Distributed Hypothesis Testing Under Privacy Constraints

A distributed binary hypothesis testing problem involving two parties, a...
research
04/18/2020

Hidden independence in unstructured probabilistic models

We describe a novel way to represent the probability distribution of a r...
research
07/18/2019

Distributed Hypothesis Testing: Cooperation and Concurrent Detection

A single-sensor two-detectors system is considered where the sensor comm...
research
08/21/2019

Distributed Hypothesis Testing over a Noisy Channel: Error-exponents Trade-off

A distributed hypothesis testing problem with two parties, one referred ...
research
02/04/2022

Benefits of Rate-Sharing for Distributed Hypothesis Testing

We study distributed binary hypothesis testing with a single sensor and ...
research
06/14/2018

Distributed Hypothesis Testing based on Unequal-Error Protection Codes

Coding and testing schemes for binary hypothesis testing over noisy netw...
research
07/05/2018

Smart Meter Privacy: Adversarial Hypothesis Testing Models

Smart meter privacy and privacy-preserving energy management are studied...

Please sign up or login with your details

Forgot password? Click here to reset