|
[1] I. F. Akyildiz, W. Su, Y. Sankarasubramaniam, and E. Cayirci, “A survey on sensor networks,” IEEE Communication Magazine, August 2002.
[2] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, 2008.
[3] A. Al-Fuqaha, M. Guizani, M. Mohammadi, M. Aledhari, and M. ayyash, “Internet of things: A survey on enabling technologies, protocols, and applications,” IEEE Communication Surveys and Tutorials, vol. 17, no. 4, 2015.
[4] R. R. Tenny and N. R. Sandell, “Detection with distributed sensors,” IEEE Transactions on Aerospace and Electronic Systems, 1981.
[5] J. N. Tsitsiklis, “Decentralized detection by a large number of sensors,” Mathematics of Control, Signals and Systems, vol. 1, 1988.
[6] G. Polychronopoulos and J. N. Tsitsiklis, “Explicit solutions for some simple decentralized detection problems,” IEEE Transactions on Aerospace and Electronic Systems, vol. 26, no. 2, 1990.
[7] T.-Y. Wang, Y. S. Han, P. K. Varshney, and P.-N. Chen, “Distributed fault-tolerant classification in wireless sensor networks,” IEEE Journal on Selected Areas in Communications, vol. 23, no. 4, pp. 724–734, 2005.
[8] L. Lamport, R. Shostak, and M. Pease, “The byzantine generals problem,” AMC Transactions on Programming Languages and Systems, vol. 4, July 1982.
[9] S. Marano, V. Matta, and L. Tong, “Distributed detection in the presense of byzantine attacks,” IEEE Transactions on Signal Processing, vol. 57, January 2009.
[10] B. Kailkhura, Y. S. Han, S. Brahma, and P. K. Varshney, “Asymptotic analysis of distributed bayesian detection with byzantine data,” IEEE Signal Processing Letters, vol. 22, May 2015.
[11] B. Kailkhura, Y. S. Han, S. Brahma, and P. K. Varshney, “Distributed bayesian detection in the presence of byzantine data,” IEEE Transactions on Signal Processing, vol. 63, October 2015.
[12] M. Barni and B. Tondi, “The source identification game: An information-theoretic perspective,” IEEE Transactions on Information Forensics and Security, 2013.
[13] B. Tondi, M. Barni, and N. Merhav, “Detection games with a fully active attacker,” IEEE International Workshop on Information Forensics and Security, 2015.
[14] T. M. Cover and J. A. Thomas, Elements of Information Theory. Wiley-Interscience, 2nd ed., 2006.
[15] P. Billingsley, Probability and Measure. John Wiley and Sons, third ed., 1995.
[16] I. H. Wang, Lecture Notes on Information Theory. 2016.
[17] Y. Polyanskiy and Y. Wu, Lecture Notes on Information Theory. 2016.
[18] W. Hoeffding, “Asymptotically optimal tests for multinomial distributions,” The Annals of Mathematical Statistics, vol. 36, no. 2, 1965.
[19] B. Kailkhura, Y. S. Han, S. Brahma, and P. K. Varshney, “On convert data falsification attacks on distributed detection system,” International Symposium on Communications and Information Technologies, 2013.
[20] L. Zhang, G. Ding, Q. Wu, Y. Zou, Z. Han, and J. Wang, “Byzantine attack and defense in cognitive radio networks: A survey,” IEEE Communication Surveys and Tutorials, vol. 17, no. 3, 2015.
|