Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 437
  • Download : 263
DC FieldValueLanguage
dc.contributor.authorJeon, Hyoungsukko
dc.contributor.authorHwang, Daesungko
dc.contributor.authorLee, Hyuck-Jaeko
dc.contributor.authorHa, Jeongseokko
dc.contributor.authorChoi, Jinhoko
dc.date.accessioned2013-03-29T18:46:15Z-
dc.date.available2013-03-29T18:46:15Z-
dc.date.created2012-12-03-
dc.date.created2012-12-03-
dc.date.created2012-12-03-
dc.date.created2012-12-03-
dc.date.issued2010-08-30-
dc.identifier.citationInformation Theory Workshop (ITW), 2010 IEEE, pp.1 - 5-
dc.identifier.urihttp://hdl.handle.net/10203/172934-
dc.description.abstractSince wireless sensor networks (WSNs) are vulnerable to threats and attacks due to the nature of wireless communications between sensors and fusion center (FC), it is often necessary to secure transmissions from any possible eavesdropping. In this paper, we study the eavesdropping issue when sensors are over-deployed and the channels between sensors and the ally FC are modeled as time-varying Rayleigh fading channels. We propose a transmission scheme in which only the sensors of strong and weak channel gains report their decisions in a predetermined way based on type-based multiple access protocol. By taking advantage of random behaviors of wireless channels in the form of the multiuser diversity and carefully design different roles of sensors of strong and weak channel gains to the ally FC, the proposed scheme can confuse the enemy FC in making a decision. Eventually, it guarantees the perfect secrecy promised by an information theoretic measure. We also analyze detection error probability and equivocation at the ally and enemy FCs, respectively.-
dc.languageEnglish-
dc.publisherIEEE-
dc.titleSecure type-based multiple access: Transmission strategy and analysis for perfect secrecy-
dc.typeConference-
dc.identifier.wosid000305892500016-
dc.identifier.scopusid2-s2.0-80051937675-
dc.type.rimsCONF-
dc.citation.beginningpage1-
dc.citation.endingpage5-
dc.citation.publicationnameInformation Theory Workshop (ITW), 2010 IEEE-
dc.identifier.conferencecountryIE-
dc.identifier.conferencelocationDublin-
dc.identifier.doi10.1109/CIG.2010.5592683-
dc.embargo.liftdate9999-12-31-
dc.embargo.terms9999-12-31-
dc.contributor.localauthorLee, Hyuck-Jae-
dc.contributor.localauthorHa, Jeongseok-
dc.contributor.nonIdAuthorJeon, Hyoungsuk-
dc.contributor.nonIdAuthorHwang, Daesung-
dc.contributor.nonIdAuthorChoi, Jinho-
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0