2016
DOI: 10.1109/tii.2015.2399691
|View full text |Cite
|
Sign up to set email alerts
|

Intercept Behavior Analysis of Industrial Wireless Sensor Networks in the Presence of Eavesdropping Attack

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
80
0

Year Published

2017
2017
2023
2023

Publication Types

Select...
8

Relationship

0
8

Authors

Journals

citations
Cited by 97 publications
(80 citation statements)
references
References 27 publications
0
80
0
Order By: Relevance
“…In this Passive System Identification attack, i(k) and o(k) are firstly captured by an eavesdropping [23,24] attack, during a monitoring period T. To deal with the eventual loss of samples, that may not be received by the attacker during T, the algorithm holds the value of the last received sample, according with (2), wherein…”
Section: Modeling the Passive System Identification Attack As An Optimentioning
confidence: 99%
“…In this Passive System Identification attack, i(k) and o(k) are firstly captured by an eavesdropping [23,24] attack, during a monitoring period T. To deal with the eventual loss of samples, that may not be received by the attacker during T, the algorithm holds the value of the last received sample, according with (2), wherein…”
Section: Modeling the Passive System Identification Attack As An Optimentioning
confidence: 99%
“…However, the impact of the P-Tx!PRx link on the secure performance has not been considered. In [37], the authors have analyzed the intercept behavior of industrial wireless sensor networks with different scheduling schemes. However, this study is only for conventional wireless sensor networks, and thus the security and reliable criteria have not been considered.…”
Section: Related Workmentioning
confidence: 99%
“…However, this study is only for conventional wireless sensor networks, and thus the security and reliable criteria have not been considered. Up to now, the performance analysis for the physical layer security of CRN s , in terms of non-zero secrecy capacity, probability of outage secrecy capacity, and ergodic secrecy capacity, have obtained great achievements [22,27,33,[37][38][39]. However, not many publications investigate the performance analysis in terms of reliable and security communication, which is considered as one of the most important criteria in the industry and internet of things (IoT) era.…”
Section: Related Workmentioning
confidence: 99%
“…[10][11][12][13][14] The intercept probability is defined as the probability that the instantaneous secrecy capacity is negative. [10][11][12][13][14] The intercept probability is defined as the probability that the instantaneous secrecy capacity is negative.…”
Section: Introductionmentioning
confidence: 99%