2012
DOI: 10.1109/tifs.2012.2194704
|View full text |Cite
|
Sign up to set email alerts
|

Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks

Abstract: Abstract-The problem of binary hypothesis testing is considered in a bandwidth-constrained densely populated low-power wireless sensor network operating over insecure links. Observations of the sensors are quantized and encrypted before transmission. The encryption method maps the output of the quantizer to one of the possible quantizer output levels randomly according to a probability matrix. The intended (ally) fusion center (AFC) is aware of the encryption keys (probabilities) while the unauthorized (third … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2019
2019

Publication Types

Select...
4
1
1

Relationship

0
6

Authors

Journals

citations
Cited by 32 publications
(23 citation statements)
references
References 23 publications
(39 reference statements)
0
22
0
Order By: Relevance
“…But the processing capability of the EFC was too limited. Another category of effective scheme is the probabilistic ciphering based one, where the sensor’s observation is randomly mapped to a set of quantization levels according to an optimal mapping probabilities matrix [9,24,25]. However, the security is assured by assuming the EFC being completely ignorant about the mapping probabilities.…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…But the processing capability of the EFC was too limited. Another category of effective scheme is the probabilistic ciphering based one, where the sensor’s observation is randomly mapped to a set of quantization levels according to an optimal mapping probabilities matrix [9,24,25]. However, the security is assured by assuming the EFC being completely ignorant about the mapping probabilities.…”
Section: Related Workmentioning
confidence: 99%
“…However, the sensors’ transmissions are overheard by the EFC, who also wishes to detect the target state. From the literature [2,7,9], we have seen that the stochastic ciphering could be employed to protect the information of the sensors from the EFC efficiently, since each sensor would flip its decision randomly and the EFC would be confused when it was ignorant about the flipping probability (i.e., the encryption key). However, the key exchange between the AFC and the sensor itself may be not secure from the EFC.…”
Section: System Modelmentioning
confidence: 99%
See 3 more Smart Citations