메뉴 건너뛰기




Volumn 8, Issue 4, 2013, Pages 619-625

Channel aware encryption and decision fusion for wireless sensor networks

Author keywords

Decision fusion; distributed detection; eavesdropping; encryption; perfect secrecy; wireless sensor networks

Indexed keywords

BINARY FREQUENCY SHIFT KEYING; DECISION FUSION; DECISION FUSION RULES; DISTRIBUTED DETECTION; EAVESDROPPING; PERFECT SECRECY; PHYSICAL-LAYER SECURITIES; WIRELESS SENSOR NETWORK (WSNS);

EID: 84875140327     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2013.2243145     Document Type: Article
Times cited : (37)

References (31)
  • 1
    • 67650844989 scopus 로고    scopus 로고
    • Sensor network security: A survey
    • Second Quarter
    • X. Chen,K.Makki,K.Yen, andN. Pissinou, "Sensor network security: A survey," Commun. Surveys Tuts., vol. 11, no. 2, pp. 52-73, Second Quarter, 2009.
    • (2009) Commun. Surveys Tuts , vol.11 , Issue.2 , pp. 52-73
    • Chen, X.1    Makki, K.2    Yen, K.3    Pissinou, N.4
  • 3
    • 44049101044 scopus 로고    scopus 로고
    • Sensor data cryptography in wireless sensor networks
    • Jun
    • T. C. Aysal and K. E. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 273-289, Jun. 2008.
    • (2008) IEEE Trans. Inf. Forensics Security , vol.3 , Issue.2 , pp. 273-289
    • Aysal, T.C.1    Barner, K.E.2
  • 5
    • 65649139984 scopus 로고    scopus 로고
    • Distributed detection with censoring sensors under physical layer secrecy
    • May
    • S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
    • (2009) IEEE Trans. Signal Process , vol.57 , Issue.5 , pp. 1976-1986
    • Marano, S.1    Matta, V.2    Willett, P.K.3
  • 6
    • 84890522850 scopus 로고
    • Communication theory of secrecy systems
    • C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
    • (1949) Bell Syst. Tech. J , vol.28 , Issue.4 , pp. 656-715
    • Shannon, C.1
  • 8
    • 78049384451 scopus 로고    scopus 로고
    • Green modulation in dense wireless sensor networks
    • Dallas, TX, USA, Mar
    • J. Abouei, K. N. Plataniotis, and S. Pasupathy, "Green modulation in dense wireless sensor networks," in Proc. IEEE ICASSP 2010, Dallas, TX, USA, Mar. 2010.
    • (2010) Proc IEEE ICASSP 2010
    • Abouei, J.1    Plataniotis, K.N.2    Pasupathy, S.3
  • 9
    • 0016562514 scopus 로고
    • The wire-tap channel
    • Oct
    • A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
    • (1975) Bell Syst. Tech. J , vol.54 , Issue.8 , pp. 1355-1387
    • Wyner, A.D.1
  • 10
    • 0017973511 scopus 로고
    • Broadcast channels with confidential messages
    • May
    • I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
    • (1978) IEEE Trans. Inf. Theory , vol.24 , Issue.3 , pp. 339-348
    • Csiszár, I.1    Körner, J.2
  • 12
    • 54749106691 scopus 로고    scopus 로고
    • On the secrecy capacity of fading channels
    • Oct
    • P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.10 , pp. 4687-4698
    • Gopala, P.K.1    Lai, L.2    Gamal, H.E.3
  • 13
    • 45249119255 scopus 로고    scopus 로고
    • Secure communication over fading channels
    • Jun
    • Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.6 , pp. 2470-2492
    • Liang, Y.1    Poor, H.V.2    Shamai, S.3
  • 15
    • 79952822109 scopus 로고    scopus 로고
    • Bounds on secrecy capacity over correlated ergodic fading channels at high SNR
    • Mar
    • H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, "Bounds on secrecy capacity over correlated ergodic fading channels at high SNR," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1975-1983, Mar. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.59 , Issue.3 , pp. 1975-1983
    • Jeon, H.1    Kim, N.2    Choi, J.3    Lee, H.4    Ha, J.5
  • 17
    • 84866269425 scopus 로고    scopus 로고
    • Exploiting channel diversity in secret key generation from multipath fading randomness
    • Oct
    • Y. Liu, S. C. Draper, and A. M. Sayeed, "Exploiting channel diversity in secret key generation from multipath fading randomness," IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1484-1497, Oct. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.5 , pp. 1484-1497
    • Liu, Y.1    Draper, S.C.2    Sayeed, A.M.3
  • 18
    • 77955667690 scopus 로고    scopus 로고
    • Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis
    • Sep.
    • J. Wallace and R. Sharma, "Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 381-392, Sep. 2010.
    • (2010) IEEE Trans. Inf. Forensics Security , vol.5 , Issue.3 , pp. 381-392
    • Wallace, J.1    Sharma, R.2
  • 20
    • 34548060655 scopus 로고    scopus 로고
    • Channel identification: Secret sharing using reciprocity in ultrawideband channels
    • Sep
    • R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364-375, Sep. 2007.
    • (2007) IEEE Trans. Inf. Forensics Security , vol.2 , Issue.3 , pp. 364-375
    • Wilson, R.1    Tse, D.2    Scholtz, R.A.3
  • 21
    • 28644438588 scopus 로고    scopus 로고
    • Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
    • Nov
    • T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
    • (2005) IEEE Trans. Antennas Propag , vol.53 , Issue.11 , pp. 3776-3784
    • Aono, T.1    Higuchi, K.2    Ohira, T.3    Komiyama, B.4    Sasaoka, H.5
  • 22
    • 0033881606 scopus 로고    scopus 로고
    • Secure information transmission for mobile radio
    • Feb
    • H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Lett., vol. 4, no. 2, pp. 52-55, Feb. 2000.
    • (2000) IEEE Commun. Lett , vol.4 , Issue.2 , pp. 52-55
    • Koorapaty, H.1    Hassan, A.2    Chennakeshu, S.3
  • 23
    • 51349109773 scopus 로고    scopus 로고
    • The relay-eavesdropper channel: Cooperation for secrecy
    • Sep
    • L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
    • (2008) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • Lai, L.1    Gamal, H.E.2
  • 24
    • 79551623225 scopus 로고    scopus 로고
    • Improving wireless physical layer security via cooperating relays
    • Mar
    • L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
    • (2010) IEEE Trans. Signal Process , vol.58 , Issue.3 , pp. 1875-1888
    • Dong, L.1    Han, Z.2    Petropulu, A.P.3    Poor, H.V.4
  • 25
    • 77954584734 scopus 로고    scopus 로고
    • Cooperation with an untrusted relay: A secrecy perspective
    • Aug
    • X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Aug. 2010.
    • (2010) IEEE Trans. Inf. Theory , vol.54 , Issue.9 , pp. 4005-4019
    • He, X.1    Yener, A.2
  • 26
    • 78650894311 scopus 로고    scopus 로고
    • Secrecy in cooperative relay broadcast channels
    • Jun
    • E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jun. 2011.
    • (2011) IEEE Trans. Inf. Theory , vol.57 , Issue.1 , pp. 137-155
    • Ekrem, E.1    Ulukus, S.2
  • 27
    • 84866632988 scopus 로고    scopus 로고
    • Secrecy rate for MISO Rayleigh fading channels with relative distance of eavesdropper
    • Sep
    • N. Chang, C. Chae, J. Ha, and J. Kang, "Secrecy rate for MISO Rayleigh fading channels with relative distance of eavesdropper," IEEE Commun. Lett., vol. 16, no. 9, pp. 1408-1411, Sep. 2012.
    • (2012) IEEE Commun. Lett , vol.16 , Issue.9 , pp. 1408-1411
    • Chang, N.1    Chae, C.2    Ha, J.3    Kang, J.4
  • 28
    • 77957761407 scopus 로고    scopus 로고
    • Cooperative secret communication with artificial noise in symmetric interference channel
    • Oct
    • J. Zhu, J. Mo, and M. Tao, "Cooperative secret communication with artificial noise in symmetric interference channel," IEEE Commun. Lett., vol. 14, no. 10, pp. 885-887, Oct. 2010.
    • (2010) IEEE Commun. Lett , vol.14 , Issue.10 , pp. 885-887
    • Zhu, J.1    Mo, J.2    Tao, M.3
  • 29
    • 77958083375 scopus 로고    scopus 로고
    • Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
    • Oct
    • X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
    • (2010) IEEE Trans. Veh. Technol , vol.59 , Issue.8 , pp. 3831-3842
    • Zhou, X.1    McKay, M.R.2
  • 30
    • 45849133457 scopus 로고    scopus 로고
    • Guaranteeing secrecy using artificial noise
    • Jun
    • S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
    • (2008) IEEE Trans. Wireless Commun , vol.7 , Issue.6 , pp. 2180-2189
    • Goel, S.1    Negi, R.2
  • 31
    • 67649499991 scopus 로고    scopus 로고
    • Wireless secrecy in cellular system with infrastructure aided cooperation
    • Jun
    • P. Popovski and O. Simeone, "Wireless secrecy in cellular system with infrastructure aided cooperation," IEEE Trans. Inf. Forensics Security, vol. 4, no. 2, pp. 242-256, Jun. 2009.
    • (2009) IEEE Trans. Inf. Forensics Security , vol.4 , Issue.2 , pp. 242-256
    • Popovski, P.1    Simeone, O.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.