2014
DOI: 10.1109/tifs.2014.2298813
|View full text |Cite
|
Sign up to set email alerts
|

Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
24
0

Year Published

2014
2014
2023
2023

Publication Types

Select...
7
1

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(26 citation statements)
references
References 32 publications
0
24
0
Order By: Relevance
“…The suboptimal mapping probabilities and LFC decision rule that jointly minimize its error probability subject to a constraint on the EFC error probability are then derived. This approach is made more rigorous in [42], where the optimal cipher matrices are obtained based on a divergence metric, again assuming that they remain unknown to the EFC. Aysal and Barner [43] investigated the problem of secure distributed estimation by incorporating a stochastic cipher as an additional block to the existing sensor networks to improve secrecy.…”
Section: ) Censoringmentioning
confidence: 99%
“…The suboptimal mapping probabilities and LFC decision rule that jointly minimize its error probability subject to a constraint on the EFC error probability are then derived. This approach is made more rigorous in [42], where the optimal cipher matrices are obtained based on a divergence metric, again assuming that they remain unknown to the EFC. Aysal and Barner [43] investigated the problem of secure distributed estimation by incorporating a stochastic cipher as an additional block to the existing sensor networks to improve secrecy.…”
Section: ) Censoringmentioning
confidence: 99%
“…But the processing capability of the EFC was too limited. Another category of effective scheme is the probabilistic ciphering based one, where the sensor’s observation is randomly mapped to a set of quantization levels according to an optimal mapping probabilities matrix [9,24,25]. However, the security is assured by assuming the EFC being completely ignorant about the mapping probabilities.…”
Section: Related Workmentioning
confidence: 99%
“…For the practical resource constraints and the serious security issues in front of WSN, secure distributed detection schemes under energy constraints are necessary for the development of an efficient IoT. Various secure strategies for distributed detection have been proposed under different assumptions on the eavesdroppers and transmission channels [8,9,10,23,24,25,26,27,28,29]. However, these studies focused on either the local detection at sensors or the information transmission from sensors to the FC.…”
Section: Introductionmentioning
confidence: 99%
“…Munivel and Ajit [27] have used public key infrastructure to perform encryption and key management. Soosahabi et al [28] have introduced a probabilistic cryptographic approach to understanding the state of transmission (to be a harmless or harmful state). Al-Haija et al [29] have presented a cryptographic technique that uses RSA for the smaller scale of the sensor network.…”
Section: B Cryptographic-based Techniquesmentioning
confidence: 99%