-
1
-
-
67650844989
-
Sensor network security: A survey
-
Second Quarter
-
X. Chen,K.Makki,K.Yen, andN. Pissinou, "Sensor network security: A survey," Commun. Surveys Tuts., vol. 11, no. 2, pp. 52-73, Second Quarter, 2009.
-
(2009)
Commun. Surveys Tuts
, vol.11
, Issue.2
, pp. 52-73
-
-
Chen, X.1
Makki, K.2
Yen, K.3
Pissinou, N.4
-
2
-
-
80051774471
-
Secure type-based multiple access
-
Sep.
-
H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, "Secure type-based multiple access," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 763-774, Sep. 2011.
-
(2011)
IEEE Trans. Inf. Forensics Security
, vol.6
, Issue.3
, pp. 763-774
-
-
Jeon, H.1
Hwang, D.2
Choi, J.3
Lee, H.4
Ha, J.5
-
3
-
-
44049101044
-
Sensor data cryptography in wireless sensor networks
-
Jun
-
T. C. Aysal and K. E. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 273-289, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Forensics Security
, vol.3
, Issue.2
, pp. 273-289
-
-
Aysal, T.C.1
Barner, K.E.2
-
4
-
-
80051737911
-
-
M.S. thesis Louisiana State University and Agricultural and Mechanical College, Baton Rouge, LA, USA
-
V. Nadendla, "Secure Distributed Detection in Wireless Sensor Networks via Encryption of Sensor Decision,"M.S. thesis, Louisiana State University and Agricultural and Mechanical College, Baton Rouge, LA, USA, 2009.
-
(2009)
Secure Distributed Detection in Wireless Sensor Networks Via Encryption of Sensor Decision
-
-
Nadendla, V.1
-
5
-
-
65649139984
-
Distributed detection with censoring sensors under physical layer secrecy
-
May
-
S. Marano, V. Matta, and P. K. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
-
(2009)
IEEE Trans. Signal Process
, vol.57
, Issue.5
, pp. 1976-1986
-
-
Marano, S.1
Matta, V.2
Willett, P.K.3
-
6
-
-
84890522850
-
Communication theory of secrecy systems
-
C. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, no. 4, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, Issue.4
, pp. 656-715
-
-
Shannon, C.1
-
8
-
-
78049384451
-
Green modulation in dense wireless sensor networks
-
Dallas, TX, USA, Mar
-
J. Abouei, K. N. Plataniotis, and S. Pasupathy, "Green modulation in dense wireless sensor networks," in Proc. IEEE ICASSP 2010, Dallas, TX, USA, Mar. 2010.
-
(2010)
Proc IEEE ICASSP 2010
-
-
Abouei, J.1
Plataniotis, K.N.2
Pasupathy, S.3
-
9
-
-
0016562514
-
The wire-tap channel
-
Oct
-
A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, Issue.8
, pp. 1355-1387
-
-
Wyner, A.D.1
-
10
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
11
-
-
0017996501
-
The Gaussian wire-tap channel
-
Jul
-
S. K. Leung-Yan-Cheong and M. E. Hellman, "The Gaussian wire-tap channel," IEEE Trans. Inf. Theory, vol. IT-24, no. 4, pp. 451-456, Jul. 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.24
, Issue.4
, pp. 451-456
-
-
Leung-Yan-Cheong, S.K.1
Hellman, M.E.2
-
12
-
-
54749106691
-
On the secrecy capacity of fading channels
-
Oct
-
P. K. Gopala, L. Lai, and H. E. Gamal, "On the secrecy capacity of fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 10, pp. 4687-4698, Oct. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.10
, pp. 4687-4698
-
-
Gopala, P.K.1
Lai, L.2
Gamal, H.E.3
-
13
-
-
45249119255
-
Secure communication over fading channels
-
Jun
-
Y. Liang, H. V. Poor, and S. Shamai, "Secure communication over fading channels," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2470-2492, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2470-2492
-
-
Liang, Y.1
Poor, H.V.2
Shamai, S.3
-
14
-
-
45249104850
-
Wireless information-theoretic security
-
Jun
-
M. Bloch, J. Barros, M. R. D. Rodrigues, and S. W. McLaughlin, "Wireless information-theoretic security," IEEE Trans. Inf. Theory, vol. 54, no. 6, pp. 2515-2534, Jun. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.6
, pp. 2515-2534
-
-
Bloch, M.1
Barros, J.2
Rodrigues, M.R.D.3
McLaughlin, S.W.4
-
15
-
-
79952822109
-
Bounds on secrecy capacity over correlated ergodic fading channels at high SNR
-
Mar
-
H. Jeon, N. Kim, J. Choi, H. Lee, and J. Ha, "Bounds on secrecy capacity over correlated ergodic fading channels at high SNR," IEEE Trans. Inf. Theory, vol. 59, no. 3, pp. 1975-1983, Mar. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.59
, Issue.3
, pp. 1975-1983
-
-
Jeon, H.1
Kim, N.2
Choi, J.3
Lee, H.4
Ha, J.5
-
17
-
-
84866269425
-
Exploiting channel diversity in secret key generation from multipath fading randomness
-
Oct
-
Y. Liu, S. C. Draper, and A. M. Sayeed, "Exploiting channel diversity in secret key generation from multipath fading randomness," IEEE Trans. Inf. Forensics Security, vol. 7, no. 5, pp. 1484-1497, Oct. 2012.
-
(2012)
IEEE Trans. Inf. Forensics Security
, vol.7
, Issue.5
, pp. 1484-1497
-
-
Liu, Y.1
Draper, S.C.2
Sayeed, A.M.3
-
18
-
-
77955667690
-
Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis
-
Sep.
-
J. Wallace and R. Sharma, "Automatic secret keys from reciprocal MIMO wireless channels: Measurement and analysis," IEEE Trans. Inf. Forensics Security, vol. 5, no. 3, pp. 381-392, Sep. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.3
, pp. 381-392
-
-
Wallace, J.1
Sharma, R.2
-
19
-
-
77952604175
-
Information-theoretically secret key generation for fading wireless channels
-
Jun
-
C. Ye, S. Mathur, A. Reznik, Y. Shah, W. Trappe, and N. Mandayam, "Information-theoretically secret key generation for fading wireless channels," IEEE Trans. Inf. Forensics Security, vol. 5, no. 2, pp. 240-254, Jun. 2010.
-
(2010)
IEEE Trans. Inf. Forensics Security
, vol.5
, Issue.2
, pp. 240-254
-
-
Ye, C.1
Mathur, S.2
Reznik, A.3
Shah, Y.4
Trappe, W.5
Mandayam, N.6
-
20
-
-
34548060655
-
Channel identification: Secret sharing using reciprocity in ultrawideband channels
-
Sep
-
R. Wilson, D. Tse, and R. A. Scholtz, "Channel identification: Secret sharing using reciprocity in ultrawideband channels," IEEE Trans. Inf. Forensics Security, vol. 2, no. 3, pp. 364-375, Sep. 2007.
-
(2007)
IEEE Trans. Inf. Forensics Security
, vol.2
, Issue.3
, pp. 364-375
-
-
Wilson, R.1
Tse, D.2
Scholtz, R.A.3
-
21
-
-
28644438588
-
Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels
-
Nov
-
T. Aono, K. Higuchi, T. Ohira, B. Komiyama, and H. Sasaoka, "Wireless secret key generation exploiting reactance-domain scalar response of multipath fading channels," IEEE Trans. Antennas Propag., vol. 53, no. 11, pp. 3776-3784, Nov. 2005.
-
(2005)
IEEE Trans. Antennas Propag
, vol.53
, Issue.11
, pp. 3776-3784
-
-
Aono, T.1
Higuchi, K.2
Ohira, T.3
Komiyama, B.4
Sasaoka, H.5
-
22
-
-
0033881606
-
Secure information transmission for mobile radio
-
Feb
-
H. Koorapaty, A. Hassan, and S. Chennakeshu, "Secure information transmission for mobile radio," IEEE Commun. Lett., vol. 4, no. 2, pp. 52-55, Feb. 2000.
-
(2000)
IEEE Commun. Lett
, vol.4
, Issue.2
, pp. 52-55
-
-
Koorapaty, H.1
Hassan, A.2
Chennakeshu, S.3
-
23
-
-
51349109773
-
The relay-eavesdropper channel: Cooperation for secrecy
-
Sep
-
L. Lai and H. E. Gamal, "The relay-eavesdropper channel: Cooperation for secrecy," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Sep. 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
Lai, L.1
Gamal, H.E.2
-
24
-
-
79551623225
-
Improving wireless physical layer security via cooperating relays
-
Mar
-
L. Dong, Z. Han, A. P. Petropulu, and H. V. Poor, "Improving wireless physical layer security via cooperating relays," IEEE Trans. Signal Process., vol. 58, no. 3, pp. 1875-1888, Mar. 2010.
-
(2010)
IEEE Trans. Signal Process
, vol.58
, Issue.3
, pp. 1875-1888
-
-
Dong, L.1
Han, Z.2
Petropulu, A.P.3
Poor, H.V.4
-
25
-
-
77954584734
-
Cooperation with an untrusted relay: A secrecy perspective
-
Aug
-
X. He and A. Yener, "Cooperation with an untrusted relay: A secrecy perspective," IEEE Trans. Inf. Theory, vol. 54, no. 9, pp. 4005-4019, Aug. 2010.
-
(2010)
IEEE Trans. Inf. Theory
, vol.54
, Issue.9
, pp. 4005-4019
-
-
He, X.1
Yener, A.2
-
26
-
-
78650894311
-
Secrecy in cooperative relay broadcast channels
-
Jun
-
E. Ekrem and S. Ulukus, "Secrecy in cooperative relay broadcast channels," IEEE Trans. Inf. Theory, vol. 57, no. 1, pp. 137-155, Jun. 2011.
-
(2011)
IEEE Trans. Inf. Theory
, vol.57
, Issue.1
, pp. 137-155
-
-
Ekrem, E.1
Ulukus, S.2
-
27
-
-
84866632988
-
Secrecy rate for MISO Rayleigh fading channels with relative distance of eavesdropper
-
Sep
-
N. Chang, C. Chae, J. Ha, and J. Kang, "Secrecy rate for MISO Rayleigh fading channels with relative distance of eavesdropper," IEEE Commun. Lett., vol. 16, no. 9, pp. 1408-1411, Sep. 2012.
-
(2012)
IEEE Commun. Lett
, vol.16
, Issue.9
, pp. 1408-1411
-
-
Chang, N.1
Chae, C.2
Ha, J.3
Kang, J.4
-
28
-
-
77957761407
-
Cooperative secret communication with artificial noise in symmetric interference channel
-
Oct
-
J. Zhu, J. Mo, and M. Tao, "Cooperative secret communication with artificial noise in symmetric interference channel," IEEE Commun. Lett., vol. 14, no. 10, pp. 885-887, Oct. 2010.
-
(2010)
IEEE Commun. Lett
, vol.14
, Issue.10
, pp. 885-887
-
-
Zhu, J.1
Mo, J.2
Tao, M.3
-
29
-
-
77958083375
-
Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation
-
Oct
-
X. Zhou and M. R. McKay, "Secure transmission with artificial noise over fading channels: Achievable rate and optimal power allocation," IEEE Trans. Veh. Technol., vol. 59, no. 8, pp. 3831-3842, Oct. 2010.
-
(2010)
IEEE Trans. Veh. Technol
, vol.59
, Issue.8
, pp. 3831-3842
-
-
Zhou, X.1
McKay, M.R.2
-
30
-
-
45849133457
-
Guaranteeing secrecy using artificial noise
-
Jun
-
S. Goel and R. Negi, "Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun., vol. 7, no. 6, pp. 2180-2189, Jun. 2008.
-
(2008)
IEEE Trans. Wireless Commun
, vol.7
, Issue.6
, pp. 2180-2189
-
-
Goel, S.1
Negi, R.2
-
31
-
-
67649499991
-
Wireless secrecy in cellular system with infrastructure aided cooperation
-
Jun
-
P. Popovski and O. Simeone, "Wireless secrecy in cellular system with infrastructure aided cooperation," IEEE Trans. Inf. Forensics Security, vol. 4, no. 2, pp. 242-256, Jun. 2009.
-
(2009)
IEEE Trans. Inf. Forensics Security
, vol.4
, Issue.2
, pp. 242-256
-
-
Popovski, P.1
Simeone, O.2
|