2015
DOI: 10.1007/978-3-319-08991-1_8
|View full text |Cite
|
Sign up to set email alerts
|

On the Security of Wireless Sensor Networks via Compressive Sensing

Abstract: Due to energy limitation of sensor nodes, the conventional security algorithms with high computation complexity are not suitable for wireless sensor networks (WSNs). We propose a compressive sensing-based encryption for WSNs, which provides both signal compression and encryption guarantees, without introducing additional computational cost of a separate encryption protocol. In this paper, we also discuss the information-theoretical and computational secrecy of compressive sensing algorithm. For proposed WSN, i… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 16 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…The basic idea is to decompose the graph into biconnected subgraphs and formulate the problem on each subgraph as an integer linear programming problem, which is solved by an integer linear programming solver. Besides routing, energy efficiency is also considered in other contexts such as compressive sensing-based encryption [9] and rechargeable sensor networks [10].…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…The basic idea is to decompose the graph into biconnected subgraphs and formulate the problem on each subgraph as an integer linear programming problem, which is solved by an integer linear programming solver. Besides routing, energy efficiency is also considered in other contexts such as compressive sensing-based encryption [9] and rechargeable sensor networks [10].…”
Section: Related Workmentioning
confidence: 99%
“…reverse the directions of edges in and perform a breadth-first search from the sink (8) if all vertices are visited then (9) construct subproblem with as the network; (10) include to ; (11) return ; Algorithm 4: decomp fixing parent.…”
Section: Decomposition By Fixing the Parent Nodementioning
confidence: 99%