메뉴 건너뛰기




Volumn 9, Issue 3, 2014, Pages 375-385

Optimal probabilistic encryption for secure detection in wireless sensor networks

Author keywords

Decentralized detection; Information fusion; Information security; Passive eavesdropping; Wireless sensor networks

Indexed keywords


EID: 84894207328     PISSN: 15566013     EISSN: None     Source Type: Journal    
DOI: 10.1109/TIFS.2014.2298813     Document Type: Article
Times cited : (31)

References (41)
  • 1
    • 0035094468 scopus 로고    scopus 로고
    • Quasi-convexity and optimal binary fusion for distributed detection with identical sensors in generalized Gaussian noise
    • DOI 10.1109/18.904560, PII S001894480100582X
    • W. Shi, T. Sun, and R. Wesel, "Quasi-convexity and optimal binary fusion for distributed detection with identical sensors in generalized gaussian noise," IEEE Trans. Inf. Theory, vol. 47, no. 1, pp. 446-450, Jan. 2001. (Pubitemid 32248230)
    • (2001) IEEE Transactions on Information Theory , vol.47 , Issue.1 , pp. 446-450
    • Shi, W.1    Sun, T.W.2    Wesel, R.D.3
  • 2
    • 84872103134 scopus 로고    scopus 로고
    • Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes
    • Jan
    • E. Soltanmohammadi, M. Orooji, and M. Naraghi-Pour, "Decentralized hypothesis testing in wireless sensor networks in the presence of misbehaving nodes," IEEE Trans. Inf. Forensics Security, vol. 8, no. 1, pp. 205-215, Jan. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.1 , pp. 205-215
    • Soltanmohammadi, E.1    Orooji, M.2    Naraghi-Pour, M.3
  • 3
    • 58649109373 scopus 로고    scopus 로고
    • Distributed detection in the presence of Byzantine attacks
    • Jan
    • S. Marano, V. Matta, and L. Tong, "Distributed detection in the presence of Byzantine attacks," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 16-29, Jan. 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.1 , pp. 16-29
    • Marano, S.1    Matta, V.2    Tong, L.3
  • 4
    • 56949088196 scopus 로고    scopus 로고
    • A survey of security issues in wireless sensor networks
    • Apr./Jun
    • Y. Wang, G. Attebury, and B. Ramamurthy, "A survey of security issues in wireless sensor networks," Commun. Surveys Tuts., vol. 8, no. 2, pp. 2-23, Apr./Jun. 2006.
    • (2006) Commun. Surveys Tuts. , vol.8 , Issue.2 , pp. 2-23
    • Wang, Y.1    Attebury, G.2    Ramamurthy, B.3
  • 5
    • 0037086890 scopus 로고    scopus 로고
    • Wireless sensor networks: A survey
    • DOI 10.1016/S1389-1286(01)00302-4, PII S1389128601003024
    • I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, "Wireless sensor networks: A survey," Comput. Netw., vol. 38, no. 4, pp. 393-422, Mar. 2002. (Pubitemid 34181630)
    • (2002) Computer Networks , vol.38 , Issue.4 , pp. 393-422
    • Akyildiz, I.F.1    Su, W.2    Sankarasubramaniam, Y.3    Cayirci, E.4
  • 8
    • 6344287014 scopus 로고    scopus 로고
    • Channel aware decision fusion in wireless sensor networks
    • Dec
    • B. Chen, R. Jiang, T. Kasetkasem, and P. Varshney, "Channel aware decision fusion in wireless sensor networks," IEEE Trans. Signal Process., vol. 52, no. 12, pp. 3454-3458, Dec. 2004.
    • (2004) IEEE Trans. Signal Process. , vol.52 , Issue.12 , pp. 3454-3458
    • Chen, B.1    Jiang, R.2    Kasetkasem, T.3    Varshney, P.4
  • 9
    • 33244488501 scopus 로고    scopus 로고
    • Fusion of decisions transmitted over Rayleigh fading channels in wireless sensor networks
    • DOI 10.1109/TSP.2005.863033
    • R. Niu, B. Chen, and P. Varshney, "Fusion of decisions transmitted over rayleigh fading channels in wireless sensor networks," IEEE Trans. Signal Process., vol. 54, no. 3, pp. 1018-1027, Mar. 2006. (Pubitemid 43280577)
    • (2006) IEEE Transactions on Signal Processing , vol.54 , Issue.3 , pp. 1018-1027
    • Niu, R.1    Chen, B.2    Varshney, P.K.3
  • 10
    • 79959307127 scopus 로고    scopus 로고
    • Secure detection in wireless sensor networks using a simple encryption method
    • Cancun, Mexico, Mar
    • M. Naraghi-Pour and V. Nadendla, "Secure detection in wireless sensor networks using a simple encryption method," in Proc. IEEE WCNC, Cancun, Mexico, Mar. 2011, pp. 114-119.
    • (2011) Proc. IEEE WCNC , pp. 114-119
    • Naraghi-Pour, M.1    Nadendla, V.2
  • 11
    • 44049101044 scopus 로고    scopus 로고
    • Sensor data cryptography in wireless sensor networks
    • DOI 10.1109/TIFS.2008.919119, 4470151
    • T. Aysal and K. Barner, "Sensor data cryptography in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 3, no. 2, pp. 273-289, Jun. 2008. (Pubitemid 351709460)
    • (2008) IEEE Transactions on Information Forensics and Security , vol.3 , Issue.2 , pp. 273-289
    • Aysal, T.C.1    Barner, K.E.2
  • 12
    • 33744912851 scopus 로고    scopus 로고
    • Optimal distributed detection strategies for wireless sensor networks
    • Monticello, IL, USA
    • K. Liu and A. M. Sayeed, "Optimal distributed detection strategies for wireless sensor networks," in Proc. 42nd Annu. Allerton Conf. Commun., Control Comp., Monticello, IL, USA, 2004, pp. 1-11.
    • (2004) Proc. 42nd Annu. Allerton Conf. Commun., Control Comp. , pp. 1-11
    • Liu, K.1    Sayeed, A.M.2
  • 13
    • 84894160135 scopus 로고    scopus 로고
    • Cooperative secure transmission for distributed detection in wireless sensor networks
    • Seoul, Korea, Aug
    • H. Jeon, S. McLaughlin, and J. Ha, "Cooperative secure transmission for distributed detection in wireless sensor networks," in Proc. IEEE 54th Int. MWSCAS, Seoul, Korea, Aug. 2011, pp. 1-4.
    • (2011) Proc. IEEE 54th Int. MWSCAS , pp. 1-4
    • Jeon, H.1    McLaughlin, S.2    Ha, J.3
  • 14
    • 84875140327 scopus 로고    scopus 로고
    • Channel aware encryption and decision fusion for wireless sensor networks
    • Apr
    • H. Jeon, J. Choi, S. McLaughlin, and J. Ha, "Channel aware encryption and decision fusion for wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 8, no. 4, pp. 619-625, Apr. 2013.
    • (2013) IEEE Trans. Inf. Forensics Security , vol.8 , Issue.4 , pp. 619-625
    • Jeon, H.1    Choi, J.2    McLaughlin, S.3    Ha, J.4
  • 16
    • 84863928823 scopus 로고    scopus 로고
    • Scalable PHY-layer security for distributed detection in wireless sensor networks
    • Aug
    • R. Soosahabi and M. Naraghi-Pour, "Scalable PHY-layer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. 7, no. 4, pp. 1118-1126, Aug. 2012.
    • (2012) IEEE Trans. Inf. Forensics Security , vol.7 , Issue.4 , pp. 1118-1126
    • Soosahabi, R.1    Naraghi-Pour, M.2
  • 17
    • 65649139984 scopus 로고    scopus 로고
    • Distributed detection with censoring sensors under physical layer secrecy
    • May
    • S. Marano, V. Matta, and P. Willett, "Distributed detection with censoring sensors under physical layer secrecy," IEEE Trans. Signal Process., vol. 57, no. 5, pp. 1976-1986, May 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.5 , pp. 1976-1986
    • Marano, S.1    Matta, V.2    Willett, P.3
  • 18
    • 0030128940 scopus 로고    scopus 로고
    • Censoring sensors: A low-communication-rate scheme for distributed detection
    • C. Rago, P. Willett, and Y. Bar-Shalom, "Censoring sensors: A lowcommunication-rate scheme for distributed detection," IEEE Trans. Aerosp. Electron. Syst., vol. 32, no. 2, pp. 554-568, Apr. 1996. (Pubitemid 126775563)
    • (1996) IEEE Transactions on Aerospace and Electronic Systems , vol.32 , Issue.2 , pp. 554-568
    • Rago, C.1
  • 19
    • 44049083063 scopus 로고    scopus 로고
    • Distributed inference in the presence of Byzantine sensors
    • Pacific Grove, CA, Nov
    • S. Marano, V. Matta, and L. Tong, "Distributed inference in the presence of Byzantine sensors," in Proc. 14th ACSSC, Pacific Grove, CA, Nov. 2006, pp. 281-284.
    • (2006) Proc. 14th ACSSC , pp. 281-284
    • Marano, S.1    Matta, V.2    Tong, L.3
  • 20
    • 58649109373 scopus 로고    scopus 로고
    • Distributed detection in the presence of Byzantine attacks
    • Jan
    • S. Marano, V. Matta, and L. Tong, "Distributed detection in the presence of Byzantine attacks," IEEE Trans. Signal Process., vol. 57, no. 1, pp. 16-29, Jan. 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.1 , pp. 16-29
    • Marano, S.1    Matta, V.2    Tong, L.3
  • 21
    • 84863057306 scopus 로고    scopus 로고
    • Reliable data fusion in wireless sensor networks under Byzantine attacks
    • Baltimore, MD, USA, Nov
    • M. Abdelhakim, L. E. Lightfoot, and T. Li, "Reliable data fusion in wireless sensor networks under Byzantine attacks," in Proc. Mil. Commun. Conf., Baltimore, MD, USA, Nov. 2011, pp. 810-815.
    • (2011) Proc. Mil. Commun. Conf. , pp. 810-815
    • Abdelhakim, M.1    Lightfoot, L.E.2    Li, T.3
  • 23
    • 78049376006 scopus 로고    scopus 로고
    • Countering Byzantine attacks in cognitive radio networks
    • Dallas, TX, USA, Mar
    • A. Rawat, P. Anand, H. Chen, and P. Varshney, "Countering Byzantine attacks in cognitive radio networks," in Proc. IEEE ICASSP, Dallas, TX, USA, Mar. 2010, pp. 3098-3101.
    • (2010) Proc. IEEE ICASSP , pp. 3098-3101
    • Rawat, A.1    Anand, P.2    Chen, H.3    Varshney, P.4
  • 24
    • 77952180713 scopus 로고    scopus 로고
    • Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
    • Bangalore, India, Jan
    • P. Anand, A. Rawat, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks," in Proc. 2nd Int. Conf. Commun. Syst. Netw., Bangalore, India, Jan. 2010, pp. 1-9.
    • (2010) Proc. 2nd Int. Conf. Commun. Syst. Netw. , pp. 1-9
    • Anand, P.1    Rawat, A.2    Chen, H.3    Varshney, P.4
  • 25
    • 80051614077 scopus 로고    scopus 로고
    • Cooperative sensing in cognitive networks under malicious attack
    • Prague, Czech Republic, May
    • M. Abdelhakim, L. Zhang, J. Ren, and T. Li, "Cooperative sensing in cognitive networks under malicious attack," in Proc. IEEE ICASSP, Prague, Czech Republic, May 2011, pp. 3004-3007.
    • (2011) Proc. IEEE ICASSP , pp. 3004-3007
    • Abdelhakim, M.1    Zhang, L.2    Ren, J.3    Li, T.4
  • 26
    • 77953712316 scopus 로고    scopus 로고
    • On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks
    • Princeton, NJ, USA, Mar
    • H. Wang, L. Lightfoot, and T. Li, "On PHY-layer security of cognitive radio: Collaborative sensing under malicious attacks," in Proc. 44th Annu. CISS, Princeton, NJ, USA, Mar. 2010, pp. 1-6.
    • (2010) Proc. 44th Annu. CISS , pp. 1-6
    • Wang, H.1    Lightfoot, L.2    Li, T.3
  • 27
    • 78651372721 scopus 로고    scopus 로고
    • Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks
    • Feb
    • A. Rawat, P. Anand, H. Chen, and P. Varshney, "Collaborative spectrum sensing in the presence of Byzantine attacks in cognitive radio networks," IEEE Trans. Signal Process., vol. 59, no. 2, pp. 774-786, Feb. 2011.
    • (2011) IEEE Trans. Signal Process. , vol.59 , Issue.2 , pp. 774-786
    • Rawat, A.1    Anand, P.2    Chen, H.3    Varshney, P.4
  • 28
    • 84863341424 scopus 로고    scopus 로고
    • Detecting and counteracting statistical attacks in cooperative spectrum sensing
    • Apr
    • F. Penna, Y. Sun, L. Dolecek, and D. Cabric, "Detecting and counteracting statistical attacks in cooperative spectrum sensing," IEEE Trans. Signal Process., vol. 60, no. 4, pp. 1806-1822, Apr. 2012.
    • (2012) IEEE Trans. Signal Process. , vol.60 , Issue.4 , pp. 1806-1822
    • Penna, F.1    Sun, Y.2    Dolecek, L.3    Cabric, D.4
  • 29
    • 0024701609 scopus 로고
    • Optimum local decision space partitioning for distributed detection
    • Jul
    • C.-C. Lee and J.-J. Chao, "Optimum local decision space partitioning for distributed detection," IEEE Trans. Aerosp. Electron. Syst., vol. 25, no. 4, pp. 536-544, Jul. 1989.
    • (1989) IEEE Trans. Aerosp. Electron. Syst. , vol.25 , Issue.4 , pp. 536-544
    • Lee, C.-C.1    Chao, J.-J.2
  • 34
    • 65249157560 scopus 로고
    • The divergence and Bhattacharyya distance measures in signal selection
    • Feb
    • T. Kailath, "The divergence and Bhattacharyya distance measures in signal selection," IEEE Trans. Commun. Technol., vol. 15, no. 1, pp. 52-60, Feb. 1967.
    • (1967) IEEE Trans. Commun. Technol. , vol.15 , Issue.1 , pp. 52-60
    • Kailath, T.1
  • 35
    • 67650149744 scopus 로고    scopus 로고
    • Detection outage and detection diversity in a homogeneous distributed sensor network
    • Jul
    • H.-S. Kim, J. Wang, P. Cai, and S. Cui, "Detection outage and detection diversity in a homogeneous distributed sensor network," IEEE Trans. Signal Process., vol. 57, no. 7, pp. 2875-2881, Jul. 2009.
    • (2009) IEEE Trans. Signal Process. , vol.57 , Issue.7 , pp. 2875-2881
    • Kim, H.-S.1    Wang, J.2    Cai, P.3    Cui, S.4
  • 39
    • 0001033554 scopus 로고
    • An algorithm for finding all vertices of convex polyhedral sets
    • Mar
    • M. L. Balinski, "An algorithm for finding all vertices of convex polyhedral sets," SIAM J. Appl. Math., vol. 9, no. 1, pp. 72-88, Mar. 1961.
    • (1961) SIAM J. Appl. Math. , vol.9 , Issue.1 , pp. 72-88
    • Balinski, M.L.1
  • 40
    • 65449138003 scopus 로고    scopus 로고
    • Optimal power allocation for distributed detection over MIMO channels in wireless sensor networks
    • Sep
    • X. Zhang, P. Vincent, and M. Chiang, "Optimal power allocation for distributed detection over MIMO channels in wireless sensor networks," IEEE Trans. Signal Process., vol. 56, no. 9, pp. 4124-4140, Sep. 2008.
    • (2008) IEEE Trans. Signal Process. , vol.56 , Issue.9 , pp. 4124-4140
    • Zhang, X.1    Vincent, P.2    Chiang, M.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.