The problem of binary hypothesis testing in a wireless sensor network is considered where observation of the sensors are quantized using identical binary quantizers and encrypted before transmission using a simple probabilistic cipher. The authorized or ally fusion center (AFC) is aware of the encryption process and the encryption parameters, whereas the unauthorized or third party fusion centers (TPFC) are unaware of the encryption parameters. The optimal threshold is evaluated for fixed values of the encryption parameters and numerical results are presented on the error probabilities of the two fusion centers. It is shown that by appropriate selection of the encryption parameters it is possible to degrade the performance of the TPFC signi...
We address the problem of centralized detection of a binary event in the presence of falsifiable sen...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
ABSTRACT: In certain applications, the locations of events reported by a sensor network need to rema...
The problem of binary hypothesis testing in a wireless sensor network is considered where observatio...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
We consider the problem of secure detection in wireless sensor networks operating over insecure link...
We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Id...
Utilizing wireless sensor network (WSN) is a novel idea in a variety of applications. However, the l...
In wireless device networks (WSNs), security and energy consumption are thought-about as durable tec...
Wireless sensor networks are prone to node misbehavior arising from tampering by an adversary (Byzan...
Eavesdroppers can easily intercept the data transmitted in a wireless sensor network (WSN) because o...
Wireless Sensor Network consists of a substantial number of sensors with low computational powers, r...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Abstract—In this paper, we consider a sequential binary hypothesis testing framework in wireless sen...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
We address the problem of centralized detection of a binary event in the presence of falsifiable sen...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
ABSTRACT: In certain applications, the locations of events reported by a sensor network need to rema...
The problem of binary hypothesis testing in a wireless sensor network is considered where observatio...
The problem of binary hypothesis testing is considered in a bandwidth-constrained low-power wireless...
We consider the problem of secure detection in wireless sensor networks operating over insecure link...
We consider the problem of binary hypothesis testing using a distributed wireless sensor network. Id...
Utilizing wireless sensor network (WSN) is a novel idea in a variety of applications. However, the l...
In wireless device networks (WSNs), security and energy consumption are thought-about as durable tec...
Wireless sensor networks are prone to node misbehavior arising from tampering by an adversary (Byzan...
Eavesdroppers can easily intercept the data transmitted in a wireless sensor network (WSN) because o...
Wireless Sensor Network consists of a substantial number of sensors with low computational powers, r...
Quantifying Eavesdropping Vulnerability in Sensor Networks With respect to security, sensor networks...
Abstract—In this paper, we consider a sequential binary hypothesis testing framework in wireless sen...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
We address the problem of centralized detection of a binary event in the presence of falsifiable sen...
Due to their limited capabilities, wireless sensor nodes are subject to physical attacks that are ha...
ABSTRACT: In certain applications, the locations of events reported by a sensor network need to rema...