Browse > Article

무선 센서 네트워크를 위한 물리계층 보안 기술연구  

Im, Sang-Hun (한국과학기술원)
Jeon, Hyeong-Seok (한국과학기술원)
Choe, Jin-Ho (광주과학기술원)
Ha, Jeong-Seok (한국과학기술원)
Publication Information
Keywords
Citations & Related Records
연도 인용수 순위
  • Reference
1 C. R. Berger, M. Guerriero, S. Zhou, and P. Willett, "PAC vs. MAC for decentralized detection using noncoherent modulation," IEEE Trans. Signal Process., vol. 57, no. 9, pp. 3562-3575, Sept. 2009.   DOI   ScienceOn
2 J. Choi, H. Jeon, and J, Ha, "Physical Layer Security for Wireless Sensor Networks," IEEE PIMRC 2013, London, Sept. 2013.
3 C. Shannon, "Communication Theory of Secrecy Systems," Bell Syst. Tech. J. vol. 28, pp. 656-715 Oct. 1949.   DOI
4 R. Ahlswede and I. Csisz'ar, "Common randomness in information theory and cryptography-Part I: Secret sharing," IEEE Trans. Inf. Theory, vol. 39, no. 4, pp. 1121-1132, July 1993.   DOI   ScienceOn
5 D. Klinc, J. Ha, S. W. McLaughlin, J. Barros, and B.-J. Kwak, "LDPC codes for the Gaussian wiretap channel," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 532-540, Sept. 2011.   DOI   ScienceOn
6 S. Goel and R. Negi,"Guaranteeing secrecy using artificial noise," IEEE Trans. Wireless Commun, vol. 7. no. 6, pp. 2180-2189, June 2008.
7 V. Nadendla, Secure Distributed Detection in Wireless Sensor Networks via Encryption of Sensor Decision, MS Thesis, Louisiana State University and Agricultural and Mechanical College, 2009.
8 R. Soosahabi and M. Naraghi-Pour, "Scalable phylayer security for distributed detection in wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol. PP, no. 99, p. 1, 2012.
9 T. C. Aysal , K. E. Barner, " Sensor Data Cryptography in Wireless Sensor Networks," IEEE Trans. Inf. Forensics Security, vol.3, no.2, pp.273-289, June 2008.   DOI   ScienceOn
10 H. Jeon, J. Choi, S. W. McLaughlin, and J. Ha, "Channel aware encryption and decision fusion for wireless sensor networks," IEEE Trans. Inf. Forensics Security, vol.8, no.4, pp. 619-625, Apr. 2013.   DOI   ScienceOn
11 H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, "Secure type-based multiple access," IEEE Trans. Inf. Forensics Security, vol. 6, no. 3, pp. 763-774, Sept. 2011.   DOI
12 B. Chen, L. Tong, and P. K. Varshney, "Channelaware distributed detection in wireless sensor networks," IEEE Signal Process. Mag., vol. 23, no. 4, pp. 16-26, July 2006.
13 R. Niu, B. Chen, and P. K. Varshney, "Fusion of decisions transmitted over Rayleigh fading channels in wireless sensor networks," IEEE Trans. Signal Process., vol. 54, no. 3, pp. 1018-1027, Mar. 2006.   DOI   ScienceOn
14 D. Tse and P. Viswanath, Fundamentals of Wireless Communication. Cambridge: Cambridge University Press, 2005.
15 P. K. Varshney, Distributed Detection and Data Fusion, New York:Springer-Verlag, 1997.
16 A. D. Wyner, "The wire-tap channel," Bell Syst. Tech. J., vol. 54, no. 8, pp. 1355-1387, Oct. 1975.   DOI   ScienceOn