 Research
 Open Access
 Published:
Collisionaware distributed detection with populationsplitting algorithms
EURASIP Journal on Wireless Communications and Networking volume 2021, Article number: 67 (2021)
Abstract
We consider the design of distributed detection algorithms for singlehop, singlechannel wireless sensor networks in which sensor nodes send their local decisions to a fusion center (FC) by using a random access protocol. There is also limited time to collect local decisions before a final decision must be made. We thus propose and analyze a modified random access protocol in which the FC combines slotted ALOHA with a populationsplitting algorithm called populationsplittingbased random access (PSRA) and collisionaware distributed detection according to an estimatethenfuse approach. Under the PSRA, only sensor nodes whose observations fall in a particular range of reliability will send their decisions in a specific frame by using slotted ALOHA. At the end of the collection time, the FC applies the collisionaware distributed detection to make a final decision. Here, the FC will first observe the state of each time slot—idle, successful, collision—in each frame, use this information to estimate the number of sensor nodes participating in each frame, and, then, compute a final decision using a populationbased fusion rule. An approximation of the optimal transmission probability of the slotted ALOHA is determined to minimize the probability of error. Numerical results show that, unlike slottedALOHAbased data networks, the transmission probability maximizing the number of successful time slots does not optimize the performance of the proposed distributed detection. Instead, the proposed distributed detection performs best with a transmission probability that induces many collisions.
1 Introduction
Distributed detection is an application of wireless sensor networks (WSNs) to decide whether an event of interest is happening in a monitored area [1, 2]. Basically, it consists of a set of sensor nodes and a fusion center (FC). Sensor nodes are deployed over this area to observe the event and make local decisions. The sensor nodes send these decisions to the FC over wireless channels. The FC collects the local decisions and applies a fusion rule to compute a final decision about the existence of the event. As a result, designing a distributed detection system will concern about the operations at sensor nodes and the operations at the FC. A basic structure of distributed detection is shown in Fig. 1. Unlike classical detection [3], distributed detection does not involve only detection methods but also communication techniques [4,5,6], communication protocols [7,8,9], transceiverreceiver structures [10,11,12,13], transmission channels [14,15,16], network structures [17,18,19] etc. An ultimate goal of distributed detection is to derive an optimal fusion rule that is aware of this information. The design of fusion rules is known as a crosslayer design problem [20, 21].
Designing distributed detection also encounters a resourceconstrained problem. In a large sensor network, the FC might not be able to collect local decisions from all sensor nodes because of limited bandwidth or/and limited time (delay). Therefore, transmission strategies between the FC and sensor nodes play an important role to achieve a desired performance under this resource constraint. When the time/banwidth does not allow the FC to collect local decisions from all sensor nodes, the FC might collect only reliable local decisions. This strategy is known as sensor censoring [15, 22, 23]. To minimize the collection time or to optimize the performance (given a limited time), distributed detection can be designed such that local decisions are sent to the FC in descending order of their reliability known as ordered transmissions [8, 24,25,26] and reliabilitybased splitting algorithms [9].
A suitable medium access control (MAC) protocol is a key to make the transmission strategies above possible in limited bandwidth and time constraints. A problem of applying these transmission strategies is that the transmission scheduling cannot be performed in advance since decision reliability is not known yet. A random access protocol is a method applicable in this scenario. Distributed detection using slotted ALOHA has been studied in many papers [7,8,9, 20], where sensor nodes randomly choose time slots to send their decisions. However, if two or more decisions are sent at the same time slot, a collision time slot happens. The distributed detection schemes in these papers neglect the collision time slots since the local decisions on these time slots cannot be recovered. Therefore, their performance drops as the number of collisions increases.
1.1 Contributions
In this paper, we study a distributed detection system with a large number of sensor nodes N. A time duration T time slots (assume \(T \ll N\)) over a single channel is provided to collect local decisions. If two or more sensor nodes send their local decisions at the same time slot, a packet collision happens and the FC cannot decode the transmitted local decisions inside this time slot. Since T is less than N, the FC can collect only some local decisions but not all of them. For example, in a distributed detection system using the time division multiple access (TDMA) as its MAC protocol, the FC will be able to collect only up to T local decisions. Therefore, the collection time T will limit the performance of this distributed detection.
We are interested in jointly designing a transmission strategy, a MAC protocol, and fusion rules at the FC to improve the performance of the distributed detection with a limited collection time over a single channel. A key design is that, with properly revising a transmission strategy and a random access protocol such that the packet collisions will be from the same local decisions, a packet collision indicates two or more sensor nodes have the same decision. As a result, the packet collisions are informative [27,28,29,30]. The main contributions and results of this paper can be summarized as follows.
We propose a transmission protocol (i.e., a transmission strategy and a MAC protocol) based on a populationsplitting algorithm called populationsplittingbased random access (PSRA), which is a modification of slotted ALOHA. We use the term “population splitting” because the sensor nodes (i.e., population) are split into groups based on their observation values. By using this algorithm, the observation range is divided into censored regions (unreliable observations) and M uncensored regions (reliable observations). Only groups of sensor nodes whose observations are in the uncensored regions will send their data to the FC. We also divide the collection time T into M frames, where each frame contains K time slots. The sensor nodes whose observations are in the mth uncensored region will send their data in the mth frame. Since the frame itself indicates the observation region (i.e., the local data found in the mth frame corresponds to the observation in the mth uncensored region), we assume that the sensor nodes send a data bit 1 (i.e., no need to make a local decision). However, because we do not know which sensor nodes will send their data bits in the mth frame, a fixed transmission scheduling such as TDMA cannot be applied. A slotted ALOHA protocol is exploited. A sensor node whose observation is in the mth region will send the data bit at a time slot in the mth frame with a probability \(\frac{\rho _m}{K}\), where \(\rho _m\) is called transmission probability at the mth frame. The parameter \(\rho _m\) indicates the probability that a sensor node whose observation is in the mth region will send its data in the mth frame. The scaling \(\frac{1}{K}\) is a normalized factor (per frame). By using a slotted ALOHA protocol, collision time slots, when two or more sensor nodes send their data bits at the same time slot, will happen. However, unlike [7,8,9, 20], we design and propose collisionaware distributed detection whose FC is aware of collisions and utilizes them in making a final decision.
The performance of the collisionaware distributed detection is affected by the transmission probabilities \(\varvec{\rho } = ( \rho _1, \rho _2, \ldots , \rho _M )\), where \(\rho _m\) controls the number of sensor nodes sending the data bits in the mth frame (i.e., network traffic). A higher value of \(\rho _m\) induces a larger number of collision time slots in that frame. We, then, propose a method to approximate the optimal transmission probabilities, which minimize the probability of error. We can show that, for the collisionaware distributed detection scheme, unlike data networks [31], the transmission probabilities maximizing the throughput are not optimal. On the other hand, the numerical results show that the transmission probabilities inducing a lot of collision time slots are optimal. This is because, in the collisionaware distributed detection, the collision time slots are informative.
1.2 Related work
Transmission strategies have been broadly exploited to improve the performance of distributed detection in a resourceconstrained scenario. In addition to sensor censoring [15, 22, 23, 32], ordered transmissions [8, 24,25,26], and reliabilitybased splitting algorithms [9], a transmission strategy called typebased multiple access (TBMA) has been proposed [33, 34] over a multiple access channel. In the TBMA scheme, the observation is quantized into M levels and M orthogonal waveforms \(\{ \phi _m(t) \}\), for \(m = 1, 2, \ldots , M\), are provided. Sensor nodes whose observations are in the mth level will send a waveform \(\phi _m(t)\) to the FC. The received waveforms are then combined to each other. The amplitude of the waveform \(\phi _m(t)\) detected at the FC indicates the number of sensor nodes in the mth level, which will be used further in making a final decision. As an extension of the TBMA, a transmission strategy called typebased random access (TBRA) over a multiple access channel has been proposed in [35]. The term “random” here emphasizes that the number of sensor nodes involving in transmissions is random. Our proposed PSRA is different from the TBMA and TBRA in the following aspects. First, we study a problem of distributed detection when only a single collision channel is provided. Second, in the PSRA, the sensor nodes whose observations are in the mth level will send their data bits in the mth frame using slotted ALOHA. As a result, the FC observes the states of time slots (i.e., idle, successful, collision time slots) in making a final decision.
Randomaccess protocols have been applied in many distributed detection schemes especially when a proper transmission scheduling is not allowed [7,8,9, 20]. However, packet collisions, as an intrinsic property of random access, deteriorate the performance of the schemes in these papers since the packet collisions are neglected. With properly revising a transmission strategy such that the packet collisions will be from the same data, a packet collision indicates two or more sensor nodes have the same data. As a result, the packet collisions can be used in making a final decision [27,28,29,30]. Similarly, in the proposed PSRA, since the data bits sent in the same frame will be from the observations in the same level, the collision time slots in each frame are meaningful and will be used in making a final decision.
Transmission protocols based on populationsplitting algorithms for distributed detection/estimation have been studied in [29, 36, 37], where the sensor nodes will share a collision channel to send their decisions. By using these protocols, the observation range is divided into M levels and the collect time is divided into M frames. The sensor nodes whose observations are in the mth level will send their decisions in the mth frame. The FC observes the timeslot states to make a final decision or compute an estimate. The transmission protocol proposed in this paper is different from those in [29, 36, 37] as follows. Here, we apply the sensorcensoring strategy to a populationsplitting algorithm, where the observation range is divided into censored regions (unreliable observations) and uncensored regions (reliable observations). The uncensored regions are further divided into M levels. Only the sensor nodes whose observations are in the uncensored regions will send their data bits in the corresponding frames.
1.3 Organization
The remainder of this paper is organized as follows. The system model is introduced in Sect. 2. Collisionaware distributed detection with a populationsplitting algorithm is proposed in Sect. 3. Approximations of the optimal transmission probabilities are determined in Sect. 4. The numerical results are evaluated and discussed in Sect. 5. Finally, conclusions are provided in Sect. 6.
2 System model
2.1 Centralized fusion system
We consider a distributed detection system with N sensor nodes deployed in an area to monitor an event of interest. To start the localdecision collection process, the FC will broadcast an inquiry about the existence of this event. Each sensor node will draw an observation, compute a data bit, and send it to the FC via a singlehop and shared collision channel by using the transmission protocol proposed in Sect. 3.2.
2.2 Transmission channel
The sensor nodes will share a collision channel to send their data bits to the FC. This collision channel is divided into time slots, with the FC and sensor nodes knowing when a time slot begins and ends (i.e., synchronous time slot). In a collisionchannel model, a time slot is classified into the following timeslot states [31]:

a time slot is called as an idle time slot if no data packets are sent at this time slot,

a time slot is called as a successful time slot if only one data packet is sent at this time slot,

a time slot is called as a collision time slot if two or more data packets are sent at this time slot.
We assume that the collisions are solely from the transmissions of the sensor nodes in the considered network. The length of each time slot is equal to the packet containing a data bit.
2.3 Binary hypothesis testing model
The noisy observation x at a sensor node is governed by the following binary hypothesis model:
where \(f_X(xH_i)\) is the conditional probability density function (PDF) of x. The observations are assumed to be independent and identically distributed (IID) given \(H_i\), for \(i = 0, 1\), and among the sensor nodes and time slots. The prior probability that \(H_0\) happens, \(\text {Pr}(H_0)\), is equal to \(P_0\), and, the prior probability that \(H_1\) happens, \(\text {Pr}(H_1)\), is equal to \(P_1 = 1P_0\).
3 Methods
3.1 Overview of the proposed method
We consider a distributed detection system with a shared collision channel and a limited collection time. There are N sensor nodes deployed in the area to monitor whether the event \(H_0\) or the event \(H_1\) happens. These sensor nodes will send their decisions over a shared collision channel to the FC. The FC is allowed to collect local decisions within a time duration equal to T time slots, which is less than the number of nodes N. As a result, the FC cannot collect all local decisions from N sensor nodes. To handle this issue and improve the performance of this distributed detection system, we propose collisionaware distributed detection with a populationsplitting algorithm.
The proposed method consists of two parts: a transmission protocol called populationsplittingbased random access (PSRA) and a detection strategy called collisionaware distributed detection. As shown in Fig. 2, each sensor node will apply the PSRA to send its decision over a shared channel to the FC. By using the PSRA, the collection time (whose length is equal to T time slots) is organized into M frames (each frame consists of K time slots) and the observation range is divided into censored regions and M uncensored regions. The sensor nodes whose observations are within a censored region will decide not to send their decisions to the FC. On the other hand, the sensor nodes whose observations are within the mth uncensored region will send their binary bits \(b=1\) at a time slot in the mth frame by using a slotted Aloha protocol. At the end of the collection time T, the FC will observe the timeslot states (idle, successful, and collision) in each frame and use them to estimate the number of sensor nodes (\({\hat{n}}_m\), for \(1 \le m \le M\)) who send their binary bits in that frame by using the population estimator. Finally, the FC applies these estimated node numbers \({\hat{n}}_1\), \({\hat{n}}_2\), ..., \({\hat{n}}_M\) into the populationbased fusion rule to make a final decision whether the event \(H_0\) or the event \(H_1\) happens. The details of the transmission protocol PSRA and the collisionaware distributed detection are explained in Sects. 3.2 and 3.3, respectively.
3.2 Populationsplittingbased random access
The PSRA is shown in Algorithm 1. The censored regions and uncensored regions are chosen according to the observation reliability [9]. The censored regions cover the ranges of those unreliable observations, which are unlikely to help in detection. On the other hand, the uncensored regions consist of the ranges of reliable observation, which would be useful in detection. Only the sensor nodes whose observations are in the uncensored regions might send their data bits \(b=1\) to the FC.
The algorithm’s specific details are explained and modeled as follows. Let \(n_m\), for \(1 \le m \le M\), be the number of sensor nodes whose observation \(x \in {\mathcal {U}}_m\). Since the sensor nodes draw an observation at the beginning of the collection time, the variables \(n_1, n_2, \ldots , n_M\) can be modeled as multinomial random variables. The probability mass function (PMF) of \({\mathbf {n}} = (n_1, n_2, \ldots , n_M)\) given \(H_i\) is expressed as
where \(0 \le n_m \le N\), \(q_{mi} = \int _{\tau _{m}^{L}}^{\tau _{m}^{U}} f_X(xH_i)\,dx\), \(n_{M+1} = N  \sum _{m=1}^M n_m\), and \(q_{M+1i} = 1  \sum _{m=1}^M q_{mi}\). The set \({\mathbf {n}} = (n_1, n_2, \ldots , n_M)\) can be used to differentiate whether the event \(H_0\) or \(H_1\) is happening. Note that \(q_{mi}\) is the probability that an observation value will be in the mth uncensored region and \(q_{M+1i}\) is the probability that an observation value will be in the censored regions.
Each frame is used to indicate an uncensored region \({\mathcal {U}}_m\). The sensor nodes who have their observation \(x \in {\mathcal {U}}_m\) will send their data bits \(b=1\) in the mth frame with a probability \(\rho _m\) (the rest will keep silent). However, these sensor nodes are unknown. Transmission scheduling cannot be arranged in advance. We, then, apply slotted ALOHA to handle the multiple access problem. In each time slot, these sensor nodes will decide to send their data bit with the probability \(\frac{1}{K}\). Similar to [27,28,29], a collision time slot is meaningful and recognized since a collision time slot indicates that there are two or more sensor nodes whose observation \(x \in {\mathcal {U}}_m\) (Fig. 3).
At the end of each time slot, the FC observes the state of that time slot. Let \(d_{k,m}\) be the timeslot state of the kth time slot in the mth frame. We have \(d_{k,m} \in \{ 0,\, \text {S},\, \text {C} \}\), where \(d_{k,m} = 0\), \(d_{k,m} = \text {S}\), and \(d_{k,m} = \text {C}\) indicate the idle time slot, the successful time slot, and the collision time slot, respectively. Therefore, a time slot will be an idle, successful, or collision time slot with the following conditional probabilities:
The probabilities \(p_{0,m}\), \(p_{\text {S},m}\), and \(p_{\text {C},m}\) are called as the probability of no transmission, the probability of successful transmission, and the probability of collisions, respectively. As a result, the conditional PMF of \(d_{k,m}\) given \(n_m\) can be expressed as
where \({\mathbb{1}}_{\{\cdot \}}\) is the indicator function.
At the end of the mth frame, the FC observes the following timeslot states \(d_{1,m}, d_{2,m}, \ldots , d_{K,m}\), whose joint conditional PMF is
where \({\mathbf {d}}_m = ( d_{1,m}, d_{2,m}, \ldots , d_{K,m} )\). In addition, the FC observes that there are \(z_{0,m}\) idle time slots (i.e., \(d_{k,m} = 0\)), \(z_{\text {S},m}\) successful time slots (i.e., \(d_{k,m} = \text {S}\)), and \(z_{\text {C},m}\) collision time slots (\(d_{k,m} = \text {C}\)) in the mth frame. Therefore, the joint PMF (6) is equivalent to, when the FC observes \(z_{0,m}\), \(z_{\text {S},m}\), and \(z_{\text {C},m}\):
where \({\mathbf {z}}_m = ( z_{0,m}, z_{\text {S},m}, z_{\text {C},m} )\). Note that \(z_{0,m}+z_{\text {S},m}+z_{\text {C},m} = K\). In addition, we can write the joint conditional PMF of \(z_{0,m}\), \(z_{\text {S},m}\), and \(z_{\text {C},m}\) given \(H_i\) as
At the end of the collection time, the FC has observed the timeslot states \({\mathbf {z}}_1, {\mathbf {z}}_2, \ldots ,.. {\mathbf {z}}_M\). The joint conditional PMF of \({\mathbf {z}} = ( {\mathbf {z}}_1, {\mathbf {z}}_2, \ldots ,.. {\mathbf {z}}_M )\) given \(H_i\) can be expressed as
Therefore, we devise distributed detection that is aware of these collision time slots in addition to successful time slots and idle time slots as shown in Sect. 3.3, where the FC will exploit the timeslot states \({\mathbf {z}}\) to decide whether \(H_0\) or \(H_1\) is happening.
The transmission probability \(\rho _m\) is a key parameter since it controls the network traffic (the number of transmitting nodes) in the mth frame. As a result, numbers of idle, successful, and collision time slots depend on \(\rho _m\). A large value of \(\rho _m\) induces a large number of transmitting nodes and a large number of collision time slots in the mth frame. There will be a set of transmission probabilities \(\varvec{\rho ^*} = ( \rho _1^*, \rho _2^*, \ldots , \rho _M^* )\) maximizing the performance of the proposed distributed detection, which will be studied in Sects. 4 and 5. We would like to note that finding the optimal thresholds \(\varvec{\nu ^*} = ( \nu _{1}^{L*}, \nu _{2}^{U*}, \ldots , \nu _{I}^{L*}, \nu _{I}^{U*} )\) and \(\varvec{\tau ^*} = ( \tau _{1}^{L*}, \tau _{1}^{U*}, \ldots , \tau _{M}^{L*}, \tau _{M}^{U*} )\), which is also known as quantizer design,^{Footnote 1} is beyond the scope of this paper.
An example showing the main idea of the PSRA is provided in Fig. 4. The range of the observation is divided into a censored region (\({\mathcal {C}}_1\)) and four uncensored regions (\({\mathcal {U}}_1\), \({\mathcal {U}}_2\), \({\mathcal {U}}_3\), and \({\mathcal {U}}_4\)). Assume that the event \(H_i\) is happening. The distribution of observations is \(f_X(xH_i)\). There is \(n_m\) sensor nodes whose observations \(x \in {\mathcal {U}}_m\). According to the PSRA protocol, these sensor nodes will decide to send their data bits at each time slot in the mth frame with the probability \(\frac{\rho _m}{K}\). As a result, the FC observes the timeslot state \({\mathbf {z}}_m = ( z_{0,m}, z_{\text {S},m}, z_{\text {C},m} )\) in the mth frame, where \(z_{0,m}\), \(z_{\text {S},m}\), and \(z_{\text {C},m}\) are the numbers of the idle, successful, and collision time slots, respectively. The FC will exploit these timeslot states \({\mathbf {z}}_m\), for \(m = 1, 2, \ldots , M\), in making a final decision. Note that if the parallel access channels (PACs)^{Footnote 2} are assumed, the FC would clearly see the number of sensor nodes \(n_m\), for \(m = 1, 2, \ldots , M\), and would directly use them in making a final decision instead.
3.3 Collisionaware distributed detection: estimatethenfuse approach
The optimal fusion rule of the proposed distributed detection can be directly derived from \(\frac{\text {Pr} ({\mathbf {z}}  H_1)}{\text {Pr} ({\mathbf {z}}  H_0)}\), where \(\text {Pr} ({\mathbf {z}}  H_i)\) is from (9). However, this optimal fusion rule is complicated and untraceable in analysis, which no insightful meaning can be discovered or proved. Similar to [1, 4,5,6, 10,11,12,13,14,15,16], we aim to devise suboptimal fusion that allows us to derive some meaningful properties.
In this section, we consider that the FC compute a final decision based on the estimatethenfuse approach [29, 36, 37] as shown in Fig. 5a, which consists of two stages: a population estimator of the node numbers and a populationbased fusion rule. First, the FC will use the estimator to compute the estimates of \(n_1\), \(n_2\), \(\ldots\), and \(n_M\), which are denoted as \({\hat{n}}_1\), \({\hat{n}}_2\), \(\ldots\), and \({\hat{n}}_M\), respectively, from the observed timeslot states \({\mathbf {z}} = ( {\mathbf {z}}_1, {\mathbf {z}}_2, \ldots , {\mathbf {z}}_M )\). Thereafter, the FC exploits these estimates \({\hat{\mathbf {n}}} = ( {\hat{n}}_1, {\hat{n}}_2, \ldots , {\hat{n}}_M )\) in the proposed populationbased fusion rule. The population estimator and the populationbased fusion rule are described next.
In the first stage, the FC will estimate the number of sensor nodes \(n_m\) in each frame by exploiting the population estimator. The details are shown in the proposition below. Note that, from now on, we omit the fact that \(n_m\) is an integer and, then, consider \(n_m\) as a real number instead. Therefore, we can derive and prove some meaningful properties. We would like to note that Proposition 1 and Corollary 1 have been shown in [36, 37].
Proposition 1
(Population estimate) The maximumlikelihood (ML) estimate of the number of sensor nodes whose \(x \in {\mathcal {U}}_m\) based on the observed timeslot states \({\mathbf {z}}_m\) is
For a large K, the PDF of \({\hat{n}}_m\) can be asymptotically expressed as a Gaussian PDF: \({\hat{n}}_m \overset{a}{\sim } {\mathcal {N}} \big (n_m,\, \upsilon _m^2 \big )\), where \(\overset{a}{\sim }\) denotes “asymptotically distributed according to” and, for a large \(n_m\) and \(n_m \gg K\),
Proof
An outline of the proof has been shown in [36, 37]. The full derivation is shown in Appendix A. □
Note that the variance \(\upsilon _m^2\) will affect the quality of the proposed distributed detection, which will be discussed in the next section. In addition, we can show that \(\log \text {Pr} ({\mathbf {z}}_m  n_m)\) is a concave function of \(n_m\), and, then, we have an alternative form of the population estimate \({\hat{n}}_m\) as shown in Corollary 1 below.
Corollary 1
(Equivalent population estimate of \(n_m\)) For a large \(n_m\), the ML estimate \({\hat{n}}_m\) obtained from (10) is equal to the value \(n_m\) satisfying
Note that \(n_m\) is inside \(p_{\text {C},m}\).
Proof
An outline of the proof has been shown in [36, 37]. The full derivation is shown in Appendix B. □
From Corollary 1, we see that only the number of collision time slots \(z_{\text {C},m}\) is needed to estimate \(n_m\). As a result, the input to the diagram of the proposed distributed detection can be revised as shown in Fig. 5b.
In the second stage, the FC will apply the estimates \({\hat{\mathbf {n}}} = ( {\hat{n}}_1, {\hat{n}}_2, \ldots , {\hat{n}}_M )\) into the populationbased fusion rule to compute a final decision. The populationbased fusion rule is described in the proposition below.
Proposition 2
(Populationbased fusion rule given \({\hat{\mathbf {n}}}\)) Given a set of estimated numbers of sensor nodes, \({\hat{\mathbf {n}}} = ( {\hat{n}}_1, {\hat{n}}_2, \ldots , {\hat{n}}_M )\). The populationbased fusion rule is expressed as
where the decision threshold \(\gamma\) is adjusted to achieve the desired performance.
Proof
The test statistic \(\Lambda\) is directly obtained from the following loglikelihood ratio \(\Lambda = \frac{\text {Pr}( {\mathbf {n}}  H_1)}{\text {Pr}( {\mathbf {n}}  H_0)} \bigg {}_{{\mathbf {n}} = {\hat{\mathbf {n}}}}\), where \({\mathbf {n}} = ( n_1, n_2, \ldots , n_M )\) will be substituted by the estimates \({\hat{\mathbf {n}}} = ( {\hat{n}}_1, {\hat{n}}_2, \ldots , {\hat{n}}_M )\). From (3), we can show that
Since the first term on the righthand side of the equation above is a constant, we can write the test statistic \(\Lambda\) as shown in (13) after replacing \({\mathbf {n}}\) with \({\hat{\mathbf {n}}}\). □
Recall that the collisionaware distributed detection here is parameterized by the number of sensor nodes N, the number of frames M, and the number of time slots in a frame K. It is worth to mention the computational complexity of the proposed distributed detection according to these parameters. In the first stage, the FC will estimate the number of sensor nodes \({\hat{n}}_m\) in each frame according to (10). To do this, the FC will observe and count the numbers of time slot states in each frame (i.e., \(z_{0,m}\), \(z_{\text {S},m}\), and \(z_{\text {C},m}\)), compute the probabilities in (4), and, then, check all \(n_m \in [0, N]\) by using (10). As a result, for M frames, the first stage incurs the complexity \({\mathcal {O}}(MK+MN)\). In the second stage, to make a final decision, given the estimate \({\hat{n}}_m\) from the first stage, the FC applies the fusion rule (13) which requires the complexity \({\mathcal {O}}(M)\). Finally, the overall computational complexity of the proposed distributed detection is of order \({\mathcal {O}}(MK+MN+M)\).
4 Approximations of optimal transmission probabilities
The performance of the proposed distributed detection can be shown via the probability of detection (\(P_\text {D}\)) and the probability of false alarm (\(P_\text {F}\)). These probabilities are affected by a set of transmission probabilities \(\varvec{\rho } = ( \rho _1, \rho _2, \ldots , \rho _M )\). A small transmission probability \(\rho _m\) will allow only a few sensor nodes to send their data bits in the mth frame, and, then, induce a large number of idle time slots in the mth frame. On the other hand, a large transmission probability \(\rho _m\) will allow many sensor nodes to send their data bits in the mth frame, and, then, induce a large number of collision time slots in the mth frame. The transmission probabilities \(\varvec{\rho } = ( \rho _1, \rho _2, \ldots , \rho _M )\) will impact on the estimation’s quality of the ML estimator (shown in Proposition 1), and, then, the final decision’s quality of the populationbased fusion rule (shown in Proposition 3). Therefore, there will be a set of transmission probabilities \(\varvec{\rho ^*} = ( \rho _1^*, \rho _2^*, \ldots , \rho _M^* )\) optimizing the performance of the proposed distributed detection. However, finding the optimal transmission probabilities \(\varvec{\rho ^*}\) numerically will be cumbersome. An analytical way is needed. In what follows, we will derive approximations of the transmission probabilities minimizing the proposed distributed detection’s error probability.
We need to derive the conditional PDF of \(\Lambda\) given \(H_i\), denoted by \(\text {Pr}(\Lambda H_i)\). However, the exact form of \(\text {Pr}(\Lambda H_i)\) is not yet found. Instead, we will derive an asymptotic approximation of \(\text {Pr}(\Lambda H_i)\), denoted by \(\tilde{\text {Pr}} (\Lambda  H_i)\), as shown in the proposition below.
Proposition 3
(Asymptotic PDF approximation) An approximation of the conditional PDF of \(\Lambda\) given \(H_i\), denoted by \(\tilde{\text {Pr}} (\Lambda  H_i)\), can be expressed as a Gaussian PDF \({\mathcal {N}} \big (\mu _i, \sigma ^2_i \big )\), for \(i = 0, 1\), whose
where \({\bar{n}}_{mi} = N q_{mi}\), \({\bar{p}}_{\text {C},mi} = 1  {\bar{p}}_{0,mi}  {\bar{p}}_{\text {S},mi}\), \({\bar{p}}_{0,mi} = (1\frac{\rho _m}{K} )^{{\bar{n}}_{mi}}\), and \({\bar{p}}_{\text {S},mi} = {\bar{n}}_{mi} ( \frac{\rho _m}{K} ) ( 1\frac{\rho _m}{K} )^{{\bar{n}}_{mi}1}\).
Proof
Please see Appendix C. □
The value \({\bar{n}}_{mi}\) is the average number of sensor nodes whose \(x \in {\mathcal {U}}_m\) (i.e., in the mth frame) given \(H_i\). Correspondingly, the probabilities \({\bar{p}}_{0,mi}\), \({\bar{p}}_{\text {S},mi}\), and \({\bar{p}}_{\text {C},mi}\) are computed at \({\bar{n}}_{mi}\). We see that the variance \(\sigma _i^2\) from (16) is a weighted sum of the variance \(\upsilon _m^2\) from (11). Therefore, the quality of the estimates \(\varvec{{\hat{n}}}\) from the population estimator will directly affect the quality of the decision making obtained from the populationbased fusion rule.
Subsequently, we will approximate a set of transmission probabilities \(\varvec{\rho ^{\star }} = ( \rho _1^{\star }, \rho _2^{\star }, \ldots , \rho _M^{\star } )\) minimizing the probability of error \(P_{\text {E}} = P_0 P_{\text {F}} + P_1 P_{\text {M}}\), where \(P_{\text {M}}\) is the probability of miss and equal to \(1  P_{\text {D}}\). From Proposition 3, we have the following approximations of the probability of detection \(P_{\text {D}}\) and the probability of false alarm \(P_{\text {F}}\):
where the conditional probability \(\tilde{\text {Pr}} (\Lambda  H_i)\), for \(i=0, 1\), is defined in Proposition 3, and \(Q(\cdot )\) is the Qfunction. In order to find \(\varvec{\rho ^{\star }}\), we have the following optimization problem:
The necessary conditions of \(\varvec{\rho ^{\star }}\) in (19) are derived in the proposition below.
Proposition 4
(Necessary conditions of \(\varvec{\rho ^{\star }}\)) The transmission probabilities \(\varvec{\rho ^{\star }} = ( \rho _1^{\star },\, \rho _2^{\star }, \ldots ,\, \rho _M^{\star } )\) in (19) must satisfy the following conditions:

(i)
Let \(g_m(\rho _m)\) be a function of \(\rho _m\) defined as
$$\begin{aligned} \frac{ \frac{ (1{\bar{p}}_{\text {C},m0})^2 }{ 2 {\bar{p}}_{\text {C},m0} (1{\bar{p}}_{\text {C},m0})  (1{\bar{n}}_{m0}) {\bar{p}}_{\text {S},m0} \big [ \log \big ( 1  \frac{\rho _m}{K} \big ) \big ] } }{ \frac{ (1{\bar{p}}_{\text {C},m1})^2 }{ 2 {\bar{p}}_{\text {C},m1} (1{\bar{p}}_{\text {C},m1})  (1{\bar{n}}_{m1}) {\bar{p}}_{\text {S},m1} \big [ \log \big ( 1  \frac{\rho _m}{K} \big ) \big ] } }, \end{aligned}$$(20)for all m, where \({\bar{n}}_{mi}\), \({\bar{p}}_{\text {S},mi}\), and \({\bar{p}}_{\text {C},mi}\) are defined in Proposition 3. We have
$$\begin{aligned} g_1(\rho _1^{\star }) = g_2(\rho _2^{\star }) = \ldots = g_M(\rho _M^{\star }). \end{aligned}$$(21) 
(ii)
The function \(g_m(\rho _m^{\star })\), for all m, must be equal to
$$\begin{aligned} \Big ( \frac{\sigma _1^{\star }}{\sigma _0^{\star }} \Big )^3 \Bigg [ \frac{ P_0 \varphi \big ( \frac{\gamma \mu _0}{\sigma _0^{\star }} \big ) (\gamma \mu _0) }{ P_1 \varphi \big ( \frac{\gamma \mu _1}{\sigma _1^{\star }} \big ) (\gamma \mu _1) } \Bigg ], \end{aligned}$$(22)where \(\varphi (\cdot )\) is the standard Gaussian PDF and \(\sigma _i^{\star }\) is the standard deviation \(\sigma _i\) in (16) with substituting \(\varvec{\rho ^{\star }} = ( \rho _1^{\star }, \rho _2^{\star }, \ldots , \rho _M^{\star } )\).

(iii)
With properly choosing \(\gamma\) such that \(\mu _0 \le \gamma \le \mu _1\), the value \(g_m(\rho _m^{\star })\) is less than or equal to zero for all m.
Proof
Please see Appendix D. □
The necessary conditions in Proposition 4 help us in searching for the transmission probabilities \(\varvec{\rho ^{\star }}\). First, we can find a range of feasible values of \(\rho _m^{\star }\) by using the necessary conditions (i) and (iii). Thereafter, we limit to specific candidates of \(\rho _m^*\) by using the necessary condition (ii). An example of finding the transmission probabilities \(\varvec{\rho ^{\star }} = ( \rho _1^{\star }, \rho _2^{\star }, \ldots , \rho _M^{\star } )\) is explained below.
Example 1
Consider the observation x governed by the following binary hypothesis testing model
where \({\mathcal {N}}(a,b)\) is the Gaussian PDF whose mean and variance are equal to a and b, respectively. Assume further that \(P_0 = P_1 = \frac{1}{2}\) and \(N=400\). We consider the proposed distributed detection when \(T=80\), \(M=4\), \(K=20\), and \(\gamma = \frac{1}{2}\). The observation range is divided into one censored region:
and four uncensored regions:
Note that the thresholds in the uncensored regions are selected such that the probability \(q_{m0} P_0 + q_{m1} P_1\), for \(m=1, 2, 3, 4\), are identical (specifically, \(q_{m0} P_0 + q_{m1} P_1 = \frac{1(P_0 q_{M+10}+P_1 q_{M+11})}{M}\)). The function \(g_m(\rho _m)\) defined in (20), for \(m=1, 2, 3, 4\), are shown in Fig. 6a. Only the negative values are displayed because of the necessary condition (iii). From (21) and the fact that \(g_m(\rho _m^*) \le 0\), for all m, Fig. 6b shows that the feasible values of \(\rho _1^{\star }\), \(\rho _2^{\star }\), \(\rho _3^{\star }\), and \(\rho _4^{\star }\) are
To find the transmission probabilities \(\rho _1^{\star }\), \(\rho _2^{\star }\), \(\rho _3^{\star }\), and \(\rho _4^{\star }\), we vary \(\rho _1\), \(\rho _2\), \(\rho _3\), and \(\rho _4\) within the feasible ranges identified above such that the necessary condition (ii) is true. The corresponding transmission probabilities \(\varvec{\rho ^{\star }} = ( \rho _1^{\star }, \rho _2^{\star }, \rho _3^{\star }, \rho _4^{\star } )\) minimize the probability of error in (19). As a result, we obtain \(\rho _1^{\star } = 0.282\), \(\rho _2^{\star } = 0.324\), \(\rho _3^{\star } = 0.324\), and \(\rho _4^{\star } = 0.282\). □
A feasible region of \(\rho _m^{\star }\) as shown in the example above can be determined in the following way.
Proposition 5
(A feasible region of \(\rho _m^{\star }\)) The optimal transmission probabilities \(\rho _m^{\star }\) is between \(\rho _{m0}^{\star }\) and \(\rho _{m1}^{\star }\), where \(\rho _{mi}^{\star }\) is obtained from
\({\bar{p}}_{\text {C},mi}^{\star } = 1  {\bar{p}}_{0,mi}^{\star }  {\bar{p}}_{\text {S},mi}^{\star }\), \({\bar{p}}_{0,mi}^{\star } = \big ( 1\frac{\rho _{mi}^{\star }}{K} \big )^{{\bar{n}}_{mi}}\), and \({\bar{p}}_{\text {S},mi}^{\star } = {\bar{n}}_{mi} \big ( \frac{\rho _{mi}^{\star }}{K} \big ) \big ( 1\frac{\rho _{mi}^{\star }}{K} \big )^{{\bar{n}}_{mi}1}\). The transmission probabilities \(\rho _{10}^{\star }\), \(\rho _{20}^{\star }\), \(\ldots\), \(\rho _{M0}^{\star }\) minimize the probability of false alarm \(P_{\text {F}}\). The transmission probabilities \(\rho _{11}^{\star }\), \(\rho _{21}^{\star }\), \(\ldots\), \(\rho _{M1}^{\star }\) minimize the probability of miss \(P_{\text {M}}\).
Proof
Please see Appendix E. □
Consider Example 1. We find the transmission probabilities \(\rho _{10}^{\star }\) and \(\rho _{11}^{\star }\) by using (26). As a result, we have \(\rho _{10}^{\star } = 0.261\) and \(\rho _{11}^{\star } = 0.486\). From Proposition 5, the feasible region of \(\rho _1^{\star }\) is \(0.261 \le \rho _1^{\star } \le 0.486\), which is similar to that specified in Example 1.
The transmission probabilities \(\varvec{\rho ^{\star }} = ( \rho _1^{\star }, \rho _2^{\star }, \ldots , \rho _M^{\star } )\) are easily found when the following conditions are true.
Corollary 2
(Special case) Assume M is even, the threshold \(\gamma = \frac{1}{2} (\mu _0 + \mu _1)\), and \(q_{m0} = q_{M+1m1}\) for all m. The transmission probabilities \(\varvec{\rho ^{\star }} = ( \rho _1^{\star },\, \rho _2^{\star }, \ldots ,\, \rho _M^{\star } )\) in (19) must satisfy the following conditions:

(i)
The optimal transmission probabilities satisfy
$$\begin{aligned} \rho _m^{\star } = \rho _{M+1m}^{\star }, \quad \forall m. \end{aligned}$$(27) 
(ii)
The function \(g_m(\rho _m^{\star })\) defined in (20) must be equal to \(\frac{P_0}{P_1}\), for all m.
Proof
First, we can prove the condition (i) as follows. From the given assumption that \(q_{m0} = q_{M+1m1}\), we have \({\bar{n}}_{m0} = {\bar{n}}_{M+1m1}\), where \({\bar{n}}_{mi} = N q_{mi}\). Recall that the function \(g_{m} (\rho _m)\) defined in (20) is a function of \({\bar{n}}_{m0}\), \({\bar{n}}_{m1}\), and \(\rho _m\). Since \({\bar{n}}_{m0} = {\bar{n}}_{M+1m1}\) and \(g_{m} (\rho _m^{\star }) = g_{M+1m} (\rho _{M+1m}^{\star })\) from (21), we have \(\rho _m^{\star } = \rho _{M+1m}^{\star }\) for all m.
Second, we can prove the condition (ii) as follows. Since M is even, \(q_{m0} = q_{M+1m1}\), \({\bar{n}}_{mi} = N q_{mi}\), and \(\rho _m^{\star } = \rho _{M+1m}^{\star }\), we have \(\mu _0 = \mu _1\) and \(\sigma _0^{\star } = \sigma _1^{\star }\), where \(\mu _i\) and \(\sigma _i^2\) are defined in (15) and (16), respectively. Recall that \(\sigma _i^{\star }\) is the standard deviation \(\sigma _i\) in (16) with substituting \(\varvec{\rho ^{\star }} = ( \rho _1^{\star }, \rho _2^{\star }, \ldots , \rho _M^{\star } )\). In addition, from the given assumption that \(\gamma = \frac{1}{2} (\mu _0 + \mu _1)\), we have \(\gamma = 0\). As considering (22), we have \((\gamma \mu _0) = (\gamma \mu _1)\) and \(\varphi \big ( \frac{\gamma \mu _0}{\sigma _0^{\star }} \big ) = \varphi \big ( \frac{\gamma \mu _1}{\sigma _1^{\star }} \big )\). As a result, (22) is reduced to \(\frac{P_0}{P_1}\), which is the value of \(g_m(\rho _m^{\star })\). □
The example below shows how easy to find the optimal transmission probabilities \(\varvec{\rho ^{\star }}\) when the assumptions in Corollary 2 are true.
Example 2
Reconsider Example 1. We can see that the parameter setup in Example 1 follows the assumptions in Corollary 2. From Corollary 2, we will have \(\rho _1^{\star } = \rho _4^{\star }\), \(\rho _2^{\star } = \rho _3^{\star }\), and \(g_m(\rho _m^{\star }) = 1\), for all m. Considering Fig. 6b, we obtain \(\rho _1^{\star } = 0.282\), \(\rho _2^{\star } = 0.324\), \(\rho _3^{\star } = 0.324\), and \(\rho _4^{\star } = 0.282\). □
5 Results and discussion
In this section, we will evaluate and show the performance of the collisionaware distributed detection with the PSRA. Throughout this section, we assume that the observation x is governed by the model shown in (23) in Example 1 whose observation signaltonoise ratio (SNR) is equal to \(7\) dB. As a result, according to [9], the reliability of the observation will be equal to \(x  0.5\). The value of x that is further away from 0.5 is more reliable. Therefore, as seen later, our censored regions (cover unreliable observations) will be around \(x=0.5\). Note that the probabilities of error \(P_{\text {E}}\) shown in this section are obtained from simulation and the probabilities \(P_0\) and \(P_1\) are equal to \(\frac{1}{2}\).
5.1 Network traffic and optimal transmission probabilities
In a data network using slotted ALOHA, the optimal transmission probability will be the probability that maximizing the network throughput (i.e., the probability of successful transmission) [31]. However, in this paper, our optimal transmission probabilities \(\varvec{\rho ^*} = (\rho _1^*, \rho _2^*, \ldots , \rho _M^*)\) are to minimize the proposed distributed detection’s error probability \(P_{\text {E}}\). We study the role of the transmission probabilities on the probability of error \(P_{\text {E}}\) in the following scenario. We consider a distributed detection system with 500 sensor nodes. The collection time T is equal to 30 time slots, which is divided into two frames. Each frame consists of 15 time slots. The observation range is divided into one censored region \({\mathcal {C}}_1 = \{x: 1 < x \le 2\}\) and two uncensored regions \({\mathcal {U}}_1 = \{x: \infty < x \le 1\}\) and \({\mathcal {U}}_2 = \{x: 2< x < \infty \}\). We have \(q_{10} = q_{21}\) and \(q_{11} = q_{20}\). The probability that the event \(H_i\) (i.e., \(P_i\)) happens is equal to \(\frac{1}{2}\). As a result, we have \(P_0 q_{10} + P_1 q_{11} = P_0 q_{20} + P_1 q_{21}\).
According to the parameter setup above, the transmission probability \(\rho _1^*\) will be equal to the transmission probability \(\rho _2^*\). Therefore, we vary the transmission probability \(\rho _m\) such that \(\rho _1 = \rho _2 = \rho\). From simulations, the probability of error \(P_{\text {E}}\) versus \(\rho\) is shown in Fig. 7. In addition, we show the network traffic (which is measured by \(p_{0,mi}\), \(p_{\text {S}, mi}\), and \(p_{\text {C}, mi}\)) versus \(\rho\) for \(m=1, 2\) and \(i = 0, 1\) in Fig. 7a–d. We can see that the transmission probabilities minimizing \(P_{\text {E}}\) are \(\rho _1^* = \rho _2^* \approx 0.33\). We further notice that the optimal transmission probabilities \(\varvec{\rho ^*} = (\rho _1^*, \rho _2^*, \ldots , \rho _M^*)\) do not maximize the network throughput (i.e., \(p_{\text {S},mi}\)). However, by using the optimal transmission probabilities \(\varvec{\rho ^*} = (\rho _1^*, \rho _2^*, \ldots , \rho _M^*)\), a lot of collisions occur (i.e., high \(p_{\text {C},mi}\)) in each frame. A reason is that, unlike the sensor networks whose collisions are noninformative and, then, neglected [7,8,9, 20, 31], in the proposed distributed detection, the collision time slots can be exploited in making a final decision.
Next, we show the optimal transmission probabilities \(\varvec{\rho ^*} = (\rho _1^*, \rho _2^*, \ldots , \rho _M^*)\) (minimizing the probability \(P_{\text {E}}\)) when increasing N in Fig. 8. The same scenario described above is assumed except the value of N. Since \(\rho _1^*\) is equal to \(\rho _2^*\), only \(\rho _1^*\) is shown. Increasing N means that there are more sensor nodes in each uncensored region \({\mathcal {R}}_m\). Recall that these sensor nodes will send their data bits in the mth frame with the transmission probability \(\rho _m\). The number N and the probability \(\rho _m\) will affect to the numbers of timeslot states \((z_{0,m}, z_{\text {S},m}, z_{\text {C},m})\). For a fixed \(\rho _m\), increasing N will result in higher collision time slots \(z_{\text {C},m}\) and lower idle time slots \(z_{0,m}\). The proposed scheme exploits the numbers of timeslot states \((z_{0,m}, z_{\text {S},m}, z_{\text {C},m})\) to differentiate between the event \(H_0\) and the event \(H_1\). As a result, increasing N lowers the optimal transmission probability \(\rho _1^*\) such that the corresponding timeslot states \((z_{0,m}, z_{\text {S},m}, z_{\text {C},m})\) are best used in detection.
In addition, we also show the transmission probability \(\rho _1^{\star }\), which is an approximation of the optimal transmission probability \(\rho _1^*\), versus N in Fig. 8. The probability \(\rho _1^{\star }\) is easily obtained from Proposition 4. We see that there is an acceptable gap between \(\rho _1^*\) and \(\rho _1^{\star }\), which is smaller when increasing N.
5.2 Performance comparison
In this section, we demonstrate

the estimated number of sensor nodes \({\hat{n}}_m\) obtained from the population estimator (10),

the effect of N on the probability of error \(P_{\text {E}}\) of the proposed distributed detection scheme,

the effect of censored regions on the probability of error \(P_{\text {E}}\) of the proposed distributed detection scheme.
However, finding the optimal transmission probabilities \(\varvec{\rho ^*} = (\rho _1^*, \rho _2^*, \ldots , \rho _M^*)\) is cumbersome. Therefore, we will find the transmission probabilities \(\varvec{\rho ^{\star }} = ( \rho _1^{\star }, \rho _2^{\star }, \ldots , \rho _M^{\star } )\), which can be obtained from Proposition 4, and use them instead.
Figure 9 compares the estimated number of sensor nodes \({\hat{n}}_m\) obtained from (10) with the actual number of sensor nodes \(n_m\) in the mth frame for 50 trials when \(M=2\), \(T=60\), \(K=30\), and \(N=500\). We assume that the event \(H_1\) is happening. The other parameters are specified in the figure’s caption. We see that the estimate \({\hat{n}}_m\) has fluctuated around the actual number \(n_m\).
Figure 10 shows the effect of N on the proposed distributed detection (specified as PSRA) when \(M=2\) and \(M=6\). The parameter setup is specified in the figure’s caption. Recall that for a given K (the number of time slots in each frame), there will be a set of \(z_{0,m}\), \(z_{\text {S},m}\), and \(z_{\text {C},m}\) that are best used in differentiating between the event \(H_0\) and the event \(H_1\). Increasing N will introduce higher number of sensor nodes in each observation interval. The transmission probabilities \(\varvec{\rho } = (\rho _1, \rho _2, \ldots , \rho _M)\) are used to adjust the number \(z_{0,m}\), \(z_{\text {S},m}\), and \(z_{\text {C},m}\), which will be further exploited by the FC to make a final decision. By using the transmission probabilities \(\varvec{\rho ^{\star }} = (\rho _1^{\star }, \rho _2^{\star }, \ldots , \rho _M^{\star })\), a set of suitable \(z_{0,m}\), \(z_{\text {S},m}\), and \(z_{\text {C},m}\) will be seen by the fusion center. This is roughly independent on N. Therefore, increasing N slightly affects the probability \(P_{\text {E}}\).
In Fig. 10, we also show the probability of error \(P_{\text {E}}\) of the distributed detection using a time division multiple access (TDMA) protocol. In the TDMA protocol, each sensor node is assigned a specific time slot to send its data in advance to avoid packet collisions. In our scenario, since \(T < N\), a group of 60 sensor nodes are randomly selected and assigned exclusive time slots to send their local decisions. The local decision is computed as follows: if the observation x is larger than 0.5 (i.e., the local threshold obtained from our scenario assumption), the local decision is one; otherwise, the local decision is zero. The FC receives 60 local decisions without collisions and sums them together to compute its test statistic. If the test statistic is larger than zero, the FC announces the event \(H_1\); otherwise, the FC announces the event \(H_0\). As shown in the figure, the corresponding probability \(P_{\text {E}}\) of the TDMAbased distributed detection is about 0.0647, which is higher than that of the proposed distributed detection.
Figure 11 shows the effect of the censored area on the proposed distributed detection (specified as PSRA) when \(M=2\) and \(M=6\). Increasing the censored area indicates that only data bits obtained from higher reliable observations will be sent to the FC (and, as a result, lowers the number of sensor nodes who will send their data bits to the FC). The censored area is computed from \(P_0 q_{M+10} + P_1 q_{M+11}\). In this figure, we consider that the range of the observation is divided into a censored region \({\mathcal {C}}_1 = \{x: \nu _1^L < x \le \nu _1^U \}\) and M uncensored regions. The value of \(q_{M+1i}\) is obtained from \(\int _{\nu _1^L}^{\nu _1^U} f_X(xH_i)\,dx\). We set the thresholds \(\nu _1^L = 0.5  a\) and \(\nu _1^U = 0.5 + a\), for \(a > 0\), and vary a to get the desired censored area. The other parameters are set up as shown in the figure’s caption. We see that increasing the censored area such that only data bits obtained from reliable observations are sent to the FC significantly helps improving the probability of error \(P_{\text {E}}\). We also show the probability \(P_{\text {E}}\) of the TDMAbased distributed detection for a comparison. The proposed distributed detection outperforms the TDMAbased distributed detection when the censored area is larger than 0.42 and 0.32 for \(M=2\) and \(M=6\), respectively.
6 Conclusions
We have proposed a collisionaware distributed detection scheme with the PSRA for a singlehop WSN whose collection time is limited and only a collision channel between sensor nodes and the FC is provided. We have shown that, unlike many other randomaccess distributed detection schemes, the proposed distributed detection favors a large number of collision time slots since the collisions are useful and applicable in making a final decisions. The following are possible extensions of the proposed distributed detection such that its performance is improved and/or it is applied in other scenarios.

i.
Composite Hypothesis Testing: In this paper, we assume that the distributions of the observation given \(H_0\) and \(H_1\) are known and we, then, formulate the problem as simple binary hypothesis testing. However, in many scenarios, for example, the distribution of the observation given \(H_1\) generally is unknown since its distribution would depend on the location and the strength of the event. Study, analysis, and evaluation of the proposed distributed detection in the composite hypothesis testing is an interesting extension.

ii.
Energy Detection: In this paper, we design and analyze the proposed distributed detection by assuming that the FC is able to detect the time slot states: idle, successful, and collision time slots. A method to identify these time slot states are open. Specifically, what we study here is from the MAC layer’s point of view. We can extend the proposed distributed detection towards the physical layer’s point of view by including an energy detection into the proposed distributed detection to detect the time slot states. Furthermore, we, then, are able to investigate the effect of the fading channels on the proposed distributed detection.
Availability of data and materials
Not applicable.
Notes
Abbreviations
 FC:

Fusion center
 FDMA:

Frequency division multiple access
 IID:

Independent and identically distributed
 MAC:

Medium access control
 ML:

Maximum likelihood
 PAC:

Parallel access channel
 PDF:

Probability density function
 PMF:

Probability mass function
 PSRA:

Populationsplittingbased random access
 SNR:

Signaltonoise ratio
 TBMA:

Typebased multiple access
 TBRA:

Typebased random access
 TDMA:

Time division multiple access
 WSN:

Wireless sensor network
References
Z. Chair, P.K. Varshney, Optimal data fusion in multiple sensor detection systems. IEEE Trans. Aerosp. Electron. Syst. AES–22, 98–101 (1986)
R. Viswanathan, P.K. Varshney, Distributed detection with multiple sensors: part Ifundamentals. Proc. IEEE. 85(1), 54–63 (1997)
S.M. Kay, Fundamentals of Statistical Signal Processing: Detection Theory (Prentice Hall, Upper Saddle River, NJ)
S. Yiu, R. Schober, Nonorthogonal transmission and noncoherent fusion of censored decisions. IEEE Trans. Veh. Technol. 58(1), 263–273 (2009)
A. Lei, R. Schober, Multiplesymbol differential decision fusion for mobile wireless sensor networks. IEEE Trans. Wirel. Commun. 9(2), 778–790 (2010)
F. Li, J.S. Evans, S. Dey, Decision fusion over noncoherent fading multiaccess channels. IEEE Trans. Signal Process. 59(9), 4367–4380 (2011)
T.Y. Chang, T.C. Hsu, Y.W.P. Hong, Exploiting datadependent transmission control and MAC timing information for distributed detection in sensor networks. IEEE Trans. Signal Process. 58(3), 1369–1382 (2010)
D. Xu, Y. Yao, Contentionbased transmission for decentralized detection. IEEE Trans. Wirel. Commun. 11(4), 1334–1342 (2012)
S. Laitrakun, E.J. Coyle, Reliabilitybased splitting algorithms for timeconstrained distributed detection in randomaccess channels. IEEE Trans. Signal Process. 62(21), 5536–5551 (2014)
D. Ciuonzo, G. Romano, P.S. Rossi, Channelaware decision fusion in distributed MIMO wireless sensor networks: decodeandfuse vs. decodethenfuse. IEEE Trans. Wirel. Commun. 11(8), 2976–2985 (2012)
I. Nevat, G.W. Peters, I.B. Collings, Distributed detection in sensor networks over fading channels with multiple antennas at the fusion centre. IEEE Trans. Signal Process. 62(3), 671–683 (2014)
D. Ciuonzo, P. Salvo Rossi, S. Dey, Massive MIMO channelaware decision fusion. IEEE Trans. Signal Process. 63(3), 604–619 (2015)
P. Salvo Rossi, D. Ciuonzo, K. Kansanen, T. Ekman, Performance analysis of energy detection for MIMO decision fusion in wireless sensor networks over arbitrary fading channels. IEEE Trans. Wirel. Commun. 15(11), 7794–7806 (2016)
B. Chen, R. Jiang, T. Kasetkasem, P.K. Varshney, Channel aware decision fusion in wireless sensor networks. IEEE Trans. Signal Process. 52(12), 3454–3458 (2004)
R. Jiang, B. Chen, Fusion of censored decisions in wireless sensor networks. IEEE Trans. Wirel. Commun. 4(6), 2668–2673 (2005)
R. Niu, B. Chen, P.K. Varshney, Fusion of decisions transmitted over Rayleigh fading channels in wireless sensor networks. IEEE Trans. Signal Process. 54(3), 1018–1027 (2006)
K. Eritmen, M. Keskinoz, Distributed decision fusion over fading channels in hierarchical wireless sensor networks. Wirel. Netw. 20(5), 987–1002 (2014)
S.A. Aldalahmeh, M. Ghogho, D. McLernon, E. Nurellari, Optimal fusion rule for distributed detection in clustered wireless sensor networks. EURASIP J. Adv. Signal Process. 2016(1), 5 (2016)
J. Luo, Z. Liu, Serial distributed detection for wireless sensor networks with sensor failure. EURASIP J. Wirel. Commun. Netw. 2017(1), 123 (2017)
S. Marano, V. Matta, P. Willett, L. Tong, Crosslayer design of sequential detectors in sensor networks. IEEE Trans. Signal Process. 54(11), 4105–4117 (2006)
A. Tantawy, X. Koutsoukos, G. Biswas, Crosslayer design for decentralized detection in WSNs. EURASIP J. Adv. Signal Process. 2014(1), 43 (2014)
C. Rago, P. Willett, Y. BarShalom, Censoring sensors: a lowcommunicationrate scheme for distributed detection. IEEE Trans. Aerosp. Electron. Syst. 32(2), 554–568 (1996)
V.W. Cheng, T.Y. Wang, Performance analysis of distributed decision fusion using a multilevel censoring scheme in wireless sensor networks. IEEE Trans. Veh. Technol. 61(4), 1610–1619 (2012)
R.S. Blum, B.M. Sadler, Energy efficient signal detection in sensor networks using ordered transmissions. IEEE Trans. Signal Process. 56(7), 3229–3235 (2008)
L. Hesham, A. Sultan, M. Nafie, F. Digham, Distributed spectrum sensing with sequential ordered transmissions to a cognitive fusion center. IEEE Trans. Signal Process. 60(5), 2524–2538 (2012)
Y. Yao, Groupordered SPRT for decentralized detection. IEEE Trans. Inf. Theory 58(6), 3564–3574 (2012)
G.T. Whipps, E. Ertin, R.L. Moses, Distributed detection of binary with collisions in a large, random network. IEEE Trans. Signal Process. 63(6), 1477–1489 (2015)
S. Laitrakun, E.J. Coyle, Collisionaware sequential distributed detection with sensor censoring in randomaccess WSNs, in Proceedings of the 12th International Conference on Electrical Engineering/Electronics, Computer, Telecommunications and Information Technology (ECTICON). (Thailand, 2015), pp. 1–6
S. Laitrakun, E.J. Coyle, Collisionaware composite hypothesis testing in randomaccess WSNs with sensor censoring, in Proceedings of the International Computer Science and Engineering Conference (ICSEC). (Thailand, 2015), pp. 1–6
S. Laitrakun, Raotest fusion rules of uncensored decisions transmitted over a collision channel, in Proceedings of the 21st International Symposium on Wireless Personal Multimedia Communications (WPMC). (Thailand, 2018), pp. 495–500
D. Bertsekas, R. Gallager, Data Networks, 2nd edn. (Prentice Hall, Upper Saddle River, 1992)
L. Yang, H. Zhu, H. Wang, K. Kang, H. Qian, Data censoring with network lifetime constraint in wireless sensor networks. Digit Signal Process. 92, 73–81 (2019)
G. Mergen, V. Naware, L. Tong, Asymptotic detection performance of typebased multiple access over multiaccess fading channels. IEEE Trans. Signal Process. 55(3), 1081–1092 (2007)
K. Liu, A.M. Sayeed, Typebased decentralized detection in wireless sensor networks. IEEE Trans. Signal Process. 55(5), 1899–1910 (2007)
A. Anandkumar, L. Tong, Typebased random access for distributed detection over multiaccess fading channels. IEEE Trans. Signal Process. 55(10), 5032–5043 (2007)
S. Laitrakun, E.J. Coyle, Collisionaware distributed estimation in WSNs using sensorcensoring random access, in Proceedings of the Military Communications Conference (MILCOM). (USA, 2015), pp. 1039–1045
S. Laitrakun, D. Phanish, E.J. Coyle, Energyefficient clustering and collisionaware distributed detection/estimation in randomaccessbased WSNs, in Data Fusion in Wireless Sensor Networks: A Statistical Signal Processing Perspective, ed. by D. Ciuonzo, P.S. Rossi (The Institution of Engineering and Technology, London, 2019), pp. 81–110
S.A. Kassam, Optimum quantization for signal detection. IEEE Trans. Commun. COM–25(5), 479–484 (1997)
R. Niu, P.K. Varshney, Target location estimation in sensor networks with quantized data. IEEE Trans. Signal Process. 54(12), 4519–4528 (2006)
J. Fang, H. Li, Distributed adaptive quantization for wireless sensor networks: from delta modulation to maximum likelihood. IEEE Trans. Signal Process. 56(10), 5246–5257 (2008)
V. Kapnadak, M. Senel, E.J. Coyle, Distributed iterative quantization for interference characterization in wireless networks. Digit. Signal Process. 22(1), 96–105 (2012)
F. Gao, F.G. Lili, H. Li, J. Liu, J. Fang, Quantizer design for distributed GLRT detection of weak signals in wireless sensor networks. IEEE Trans. Wirel. Commun. 14(4), 2032–2042 (2015)
S. Laitrakun, E.J. Coyle, Optimizing the collection of local decisions for timeconstrained distributed detection in WSNs, in Proceedings of the IEEE International Conference on Computer Communications (INFOCOM). (Italy, 2013), pp. 1923–1931
Acknowledgements
The author would like to thank the associate editor and the anonymous reviewers for comments and suggestions that contributed to improve the quality of this paper.
Funding
No funding was received for this research work.
Author information
Authors and Affiliations
Corresponding author
Ethics declarations
Competing interests
The author declares that he has no competing interests.
Additional information
Publisher's Note
Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.
Appendices
Appendix A: Proof of Proposition 1
The ML estimate of the variable \(n_m\), \({\hat{n}}_m\) as shown in (10), is directly obtained from (7). For a large K, the distribution of the estimate \({\hat{n}}_m\) asymptotically converges to a Gaussian distribution \({\mathcal {N}} \big ( n_m, \upsilon _m^2 \big )\), where \(\upsilon _m^2\) is equal to the CramerRao lower bound of \({\hat{n}}_m\) [3].
To derive the variance \(\upsilon _m^2\), we omit the fact that \(n_m\) is an integer and, then, consider \(n_m\) as a real number. The variance \(\upsilon _m^2\) is obtained from
The first derivative \(\frac{\partial }{\partial n_m} \log \text {Pr} ({\mathbf {z}}_m  n_m)\) and the second derivative \(\frac{\partial ^2}{\partial n_m^2} \log \text {Pr} ({\mathbf {z}}_m  n_m)\) are shown as follows:
Because of \({\mathbb {E}} \{z_{\text {S},m}\} = K p_{\text {S},m}\) and \({\mathbb {E}} \{z_{\text {C},m}\} = K p_{\text {C},m}\), we have
By assuming that \(n_m\) is large and \(n_m \gg K\), the term \({\mathbb {E}} \big \{ \frac{\partial ^2}{\partial n_m^2} \log \text {Pr} ({\mathbf {z}}_m  n_m) \big \}\) can be approximated as
Since \(p_{\text {C},m}\) is less than or equal to one, the term \((p_{\text {C},m}  1)\) is a negative value. By substituting (32) into (28), we obtain (11).
Appendix B: Proof of Corollary 1
Note that we assume \(n_m\) is realvalued. Consider the derivatives \(\frac{\partial }{\partial n_m} \log \text {Pr} ({\mathbf {z}}_m  n_m)\) and \(\frac{\partial ^2}{\partial n_m^2} \log \text {Pr} ({\mathbf {z}}_m  n_m)\) shown in (29) and (30), respectively. For a large \(n_m\), these derivatives can be approximated as
Since \(\Big ( \frac{p_{\text {C},m}1}{p_{\text {C},m}^2} \Big ) \le 0\), we have \(\frac{\partial ^2}{\partial n_m^2} \log \text {Pr} ({\mathbf {z}}_m  n_m) \le 0\), which means the term \(\log \text {Pr} ({\mathbf {z}}_m  n_m)\) is a concave function of \(n_m\). Therefore, the ML estimate \({\hat{n}}_m\) is the value \(n_m\) satisfying \(\frac{\partial }{\partial n_m} \log \text {Pr} ({\mathbf {z}}_m  n_m) = 0\), which is equivalent to
Recall the \(z_{0,m} + z_{\text {S},m} = Kz_{\text {C},m}\). Therefore, we have (12).
Appendix C: Proof of Proposition 3
The test statistic \(\Lambda\) can be rewritten as \(\Lambda = \sum _{m=1}^M \Lambda _m\), where
From Proposition 1, where \({\hat{n}}_m \overset{a}{\sim } {\mathcal {N}} \big ( n_m,\, \upsilon _m^2 \big )\), the conditional PDF of \(\Lambda _m\) given \(n_m\) (i.e., \(\text {Pr} (\Lambda _m  n_m)\)) is asymptotically equal to \({\mathcal {N}} \big (\eta _m,\, \vartheta _m^2 \big )\), where
Given \({\mathbf {n}} = (n_1, n_2, \ldots , n_M)\), the test statistics \(\Lambda _1\), \(\Lambda _2\), \(\ldots\), \(\Lambda _M\) are independent. The conditional PDF of \(\Lambda\) given \({\mathbf {n}}\) can be expressed as \(\text {Pr} (\Lambda  {\mathbf {n}}) = \prod _{m=1}^M \text {Pr} (\Lambda _m  n_m)\). We have \(\text {Pr} (\Lambda  H_i) = {\mathbb {E}}_{{\mathbf {n}}} \Big \{ \prod _{m=1}^M \text {Pr} (\Lambda _m  n_m) \Big  H_i \Big \}\).
Since we would like to find \(\text {Pr} (\Lambda  H_i)\) in a closed form, an approximation will be conducted. By using the DemoivreLaplace theorem, the conditional PDF \(\text {Pr}({\mathbf {n}}H_i)\) is approximated as \(\tilde{\text {Pr}}({\mathbf {n}}H_i)\) which is expressed as \(\prod _{m=1}^M \frac{1}{\sqrt{2 \pi \varsigma _{mi}^2}} e^{\frac{(n_m  {\bar{n}}_{mi})^2}{2 \varsigma _{mi}^2}}\), where \({\bar{n}}_{mi} = N q_{mi}\) and \(\varsigma _{mi}^2 = N q_{mi} (1q_{mi})\). As a result, we can approximate \(\text {Pr}(\Lambda  H_i)\) as \(\tilde{\text {Pr}} (\Lambda  H_i) = \prod _{m=1}^M \tilde{\text {Pr}} (\Lambda _m  H_i)\), where
Similar to the proof shown in Appendix A of [43], by applying GaussHermite quadrature integration, we can show that
where J is the number of sample points, \(r_j\) is the jth root of Hermite polynomial, and \(C_j\) is the associated weight of the jth root. By using \(J=1\), where \(r_1 = 0\) and \(C_1 = \sqrt{\pi }\), we have \(\tilde{\text {Pr}} (\Lambda _m  H_i) \approx \text {Pr} ( \Lambda _m  n_m ) \big _{n_m={\bar{n}}_{mi}}\). As a result, we obtain an approximation of the conditional PDF of \(\Lambda\) given \(H_i\) as shown in Proposition 3.
Appendix D: Proof of Proposition 4
The necessary condition for the optimal transmission probabilities \(\varvec{\rho ^{\star }}\) in (19) is that the function \(\frac{\partial }{\partial \rho _m} \big ( P_0 P_{\text {F}} + P_1 P_{\text {M}} \big )\) is equal to zero at \(\rho _m = \rho _{m}^{\star }\) for all m. The derivative \(\frac{\partial }{\partial \rho _m} \big ( P_0 P_{\text {F}} + P_1 P_{\text {M}} \big )\) is equal to
where \(\varphi (x) = \frac{1}{\sqrt{2\pi }} e^{\frac{x^2}{2}}\) and
By substituting (42) into (41) and after some mathematical arrangement, we can show that
By setting (43) equal to zero, the term inside the curly brackets must be equal to zero and, after some mathematical arrangement, we have the following equality:
We define the term on the lefthand side of (44) as \(g_m(\rho _m)\). Since the term on the righthand side of (44) is a constant (given \(\rho _1^{\star },\, \rho _2^{\star }, \ldots ,\, \rho _M^{\star }\)), we obtain (21). In addition, with properly choosing \(\gamma\), where \(\mu _0 \le \gamma \le \mu _1\), we will have \(\gamma \mu _0 \ge 0\) and \(\gamma \mu _1 \le 0\). As a result, (22) is less than or equal to zero. In addition, we will have \(g_m (\rho _m^{\star }) \le 0\) for all m.
Appendix E: Proof of Proposition 5
First, we will prove (26). Clearly, when \(\mu _0 \le \gamma \le \mu _1\), from (17) and (18), the transmission probabilities maximizing \(P_{\text {D}}\) (or minimizing \(P_{\text {F}}\), respectively) are the transmission probabilities minimizing \(\sigma _1^2\) (or minimizing \(\sigma _0^2\), respectively). Let \(\varvec{\rho _1^{\star }}\) and \(\varvec{\rho _0^{\star }}\) be the transmission probabilities maximizing \(P_{\text {D}}\) and minimizing \(P_{\text {F}}\), respectively, where \(\varvec{\rho _i^{\star }} = ( \rho _{1i}^{\star }, \rho _{2i}^{\star }, \ldots , \rho _{Mi}^{\star } )\) and \(\rho _{mi}^{\star }\) is the transmission probability at the mth frame. Therefore, finding the transmission probabilities \(\varvec{\rho _i^{\star }}\) can be written as the following optimization problem:
Considering the variance \(\sigma _i^2\) defined in (16) shows that the variance \(\sigma _i^2\) is a summation of M terms, where each term is individually a function of \(\rho _m\). Therefore, the optimization problem above is separable (to M individual optimization problems). As a result, we can find the transmission probability \(\rho _{mi}^{\star }\) from the following optimization problem:
Note that the objective function in (46) is inversely proportional to the variance \(\upsilon _m^2\) in (11). Therefore, the optimization problem (46) indicates that the transmission probability \(\rho _{mi}^{\star }\) is the transmission probability minimizing the population estimate’s variance \(\upsilon _m^2\).
The necessary condition for the optimal transmission probabilities \(\rho _{mi}^{\star }\) in (46) is that the function \(\frac{\partial }{\partial \rho _m} \big ( \frac{1{\bar{p}}_{\text {C},mi}}{{\bar{p}}_{\text {C},mi}} \big ) \big [ \log ( 1 \frac{\rho _m}{K} ) \big ]^2\) is equal to zero at \(\rho _m = \rho _{m}^{\star }\) for all m. The derivative \(\frac{\partial }{\partial \rho _m} \big ( \frac{1{\bar{p}}_{\text {C},mi}}{{\bar{p}}_{\text {C},mi}} \big ) \big [ \log ( 1 \frac{\rho _m}{K} ) \big ]^2\) is equal to
Equivalently, \(\rho _{mi}^{\star }\) is equal to \(\rho _m\) that will make the term in the curly brackets equal to zero. Therefore, we have the necessary condition for \(\rho _{mi}^{\star }\) as shown in (26).
Now, we can show that \(\rho _m^{\star }\) is between \(\rho _{m0}^{\star }\) and \(\rho _{m1}^{\star }\) as follows. Consider the function \(g_m(\rho _m)\) in (20). The function \(g_m(\rho _m)\) will approach to \(\infty\) at the \(\rho _m\) making the term \(2 {\bar{p}}_{\text {C},m0} (1{\bar{p}}_{\text {C},m0})  (1{\bar{n}}_{m0}) {\bar{p}}_{\text {S},m0} \big [ \log \big ( 1  \frac{\rho _m}{K} \big ) \big ]\) equal to zero. We further notice that this \(\rho _m\) is the transmission probability \(\rho _{m0}^{\star }\) minimizing the probability of false alarm from (26). On the other hand, the function \(g_m(\rho _m)\) will be zero at the \(\rho _m\) making the term \(2 {\bar{p}}_{\text {C},m1} (1{\bar{p}}_{\text {C},m1})  (1{\bar{n}}_{m1}) {\bar{p}}_{\text {S},m1} \big [ \log \big ( 1  \frac{\rho _m}{K} \big ) \big ]\) equal to zero. This \(\rho _m\) is the transmission probability \(\rho _{m1}^{\star }\) maximizing the probability of detection. From the necessary condition (iii) in Proposition 4 that \(g_m(\rho _m^{\star }) \le 0\), then, \(\rho _m^{\star }\) is between \(\rho _{m0}^{\star }\) and \(\rho _{m1}^{\star }\).
Rights and permissions
Open Access This article is licensed under a Creative Commons Attribution 4.0 International License, which permits use, sharing, adaptation, distribution and reproduction in any medium or format, as long as you give appropriate credit to the original author(s) and the source, provide a link to the Creative Commons licence, and indicate if changes were made. The images or other third party material in this article are included in the article's Creative Commons licence, unless indicated otherwise in a credit line to the material. If material is not included in the article's Creative Commons licence and your intended use is not permitted by statutory regulation or exceeds the permitted use, you will need to obtain permission directly from the copyright holder. To view a copy of this licence, visit http://creativecommons.org/licenses/by/4.0/.
About this article
Cite this article
Laitrakun, S. Collisionaware distributed detection with populationsplitting algorithms. J Wireless Com Network 2021, 67 (2021). https://doi.org/10.1186/s13638020018903
Received:
Accepted:
Published:
DOI: https://doi.org/10.1186/s13638020018903
Keywords
 Distributed detection
 Decision fusion
 Populationsplitting algorithms
 Slotted ALOHA
 Binary sensor networks