We consider the problem of secure detection in wireless sensor networks operating over insecure links. It is assumed that an eavesdropping fusion center (EFC) attempts to intercept the transmissions of the sensors and to detect the state of nature. The sensor nodes quantize their observations using a multilevel quantizer. Before transmission to the ally fusion center (AFC), the senor nodes encrypt their data using a probabilistic encryption scheme, which randomly maps the sensor\u27s data to another quantizer output level using a stochastic cipher matrix (key). The communication between the sensors and each fusion center is assumed to be over a parallel access channel with identical and independent branches, and with each branch being a dis...
Over the past decade, the application domain of wireless sensor networks has expanded steadily, rang...
In this paper, we investigate the performance of distributed estimation schemes in a wireless sensor...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
The problem of binary hypothesis testing in a wireless sensor network is considered where observatio...
The problem of binary hypothesis testing in a wireless sensor network is considered where observatio...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Id...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
In wireless device networks (WSNs), security and energy consumption are thought-about as durable tec...
Utilizing wireless sensor network (WSN) is a novel idea in a variety of applications. However, the l...
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor n...
We investigate the structure of quantizer rules at the local sensors in distributed detection netwo...
In this paper, we investigate the design of distributed detection networks in the presence of an eav...
This paper investigates physical layer security for a large-scale WSN with random multiple access, w...
Eavesdroppers can easily intercept the data transmitted in a wireless sensor network (WSN) because o...
Over the past decade, the application domain of wireless sensor networks has expanded steadily, rang...
In this paper, we investigate the performance of distributed estimation schemes in a wireless sensor...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
The problem of binary hypothesis testing in a wireless sensor network is considered where observatio...
The problem of binary hypothesis testing in a wireless sensor network is considered where observatio...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Id...
The data collected by sensor networks often contain sensitive information and care must be taken to ...
In wireless device networks (WSNs), security and energy consumption are thought-about as durable tec...
Utilizing wireless sensor network (WSN) is a novel idea in a variety of applications. However, the l...
We study the secure distributed detection problems under energy constraint for IoT-oriented sensor n...
We investigate the structure of quantizer rules at the local sensors in distributed detection netwo...
In this paper, we investigate the design of distributed detection networks in the presence of an eav...
This paper investigates physical layer security for a large-scale WSN with random multiple access, w...
Eavesdroppers can easily intercept the data transmitted in a wireless sensor network (WSN) because o...
Over the past decade, the application domain of wireless sensor networks has expanded steadily, rang...
In this paper, we investigate the performance of distributed estimation schemes in a wireless sensor...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...