2012 IEEE Vehicular Technology Conference (VTC Fall) 2012
DOI: 10.1109/vtcfall.2012.6399340
|View full text |Cite
|
Sign up to set email alerts
|

Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks

Abstract: The problem of binary hypothesis testing is considered in a bandwidth-constrained densely populated low-power wireless sensor network operating over insecure links. Observations of the sensors are quantized and encrypted before transmission. The encryption method maps the output of the quantizer to one of the possible quantizer output levels randomly according to a probability matrix. The intended (ally) fusion center (AFC) is aware of the encryption keys (probabilities) while the unauthorized (third party) fu… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
19
0

Year Published

2013
2013
2018
2018

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 11 publications
(19 citation statements)
references
References 22 publications
0
19
0
Order By: Relevance
“…The study of Soosahabi et al; [13] presented a cryptographic probabilistic approach to the deliberately present state of transmission whether it could be a harmless or harmful state.…”
Section: Techniques On Cryptography Based Securitymentioning
confidence: 99%
“…The study of Soosahabi et al; [13] presented a cryptographic probabilistic approach to the deliberately present state of transmission whether it could be a harmless or harmful state.…”
Section: Techniques On Cryptography Based Securitymentioning
confidence: 99%
“…Here, f γs,e is the derivative of F γs,e given in (6), and f γap,e is the derivative of F γap,e given in (8).…”
Section: Overall Average Secrecy Ratementioning
confidence: 99%
“…The core idea behind it is to exploit the characteristics of wireless channels such as fading or noise to transmit a message from a source to an intended destination while keeping the message confidential from eavesdroppers [4,5]. Physical layer security schemes have been recently proposed for WSNs to combat eavesdropping [6][7][8][9]. In [6], the downlink secure transmission from the mobile agent to the authorized user was considered and perfect secrecy can be achieved by intentionally creating channel variation.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Voting rules or q-out-of-L rules [2] are commonly employed in the FC to detect the occurrence of an event in decentralized sensing [10], [11], [26], [29], [30]. Based on this rule, the detected hypothesis is H 1 if at least q out of L nodes vote in favor of this event.…”
Section: B Reputation-based Node Classifiermentioning
confidence: 99%