DC Field | Value | Language |
---|---|---|
dc.contributor.author | Jeon, Hyoungsuk | ko |
dc.contributor.author | Hwang, Daesung | ko |
dc.contributor.author | Lee, Hyuck-Jae | ko |
dc.contributor.author | Ha, Jeongseok | ko |
dc.contributor.author | Choi, Jinho | ko |
dc.date.accessioned | 2013-03-29T18:46:15Z | - |
dc.date.available | 2013-03-29T18:46:15Z | - |
dc.date.created | 2012-12-03 | - |
dc.date.created | 2012-12-03 | - |
dc.date.created | 2012-12-03 | - |
dc.date.created | 2012-12-03 | - |
dc.date.issued | 2010-08-30 | - |
dc.identifier.citation | Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5 | - |
dc.identifier.uri | http://hdl.handle.net/10203/172934 | - |
dc.description.abstract | Since wireless sensor networks (WSNs) are vulnerable to threats and attacks due to the nature of wireless communications between sensors and fusion center (FC), it is often necessary to secure transmissions from any possible eavesdropping. In this paper, we study the eavesdropping issue when sensors are over-deployed and the channels between sensors and the ally FC are modeled as time-varying Rayleigh fading channels. We propose a transmission scheme in which only the sensors of strong and weak channel gains report their decisions in a predetermined way based on type-based multiple access protocol. By taking advantage of random behaviors of wireless channels in the form of the multiuser diversity and carefully design different roles of sensors of strong and weak channel gains to the ally FC, the proposed scheme can confuse the enemy FC in making a decision. Eventually, it guarantees the perfect secrecy promised by an information theoretic measure. We also analyze detection error probability and equivocation at the ally and enemy FCs, respectively. | - |
dc.language | English | - |
dc.publisher | IEEE | - |
dc.title | Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy | - |
dc.type | Conference | - |
dc.identifier.wosid | 000305892500016 | - |
dc.identifier.scopusid | 2-s2.0-80051937675 | - |
dc.type.rims | CONF | - |
dc.citation.beginningpage | 1 | - |
dc.citation.endingpage | 5 | - |
dc.citation.publicationname | Information Theory Workshop (ITW), 2010 IEEE | - |
dc.identifier.conferencecountry | IE | - |
dc.identifier.conferencelocation | Dublin | - |
dc.identifier.doi | 10.1109/CIG.2010.5592683 | - |
dc.embargo.liftdate | 9999-12-31 | - |
dc.embargo.terms | 9999-12-31 | - |
dc.contributor.localauthor | Lee, Hyuck-Jae | - |
dc.contributor.localauthor | Ha, Jeongseok | - |
dc.contributor.nonIdAuthor | Jeon, Hyoungsuk | - |
dc.contributor.nonIdAuthor | Hwang, Daesung | - |
dc.contributor.nonIdAuthor | Choi, Jinho | - |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.