|
[1] J. Yick, B. Mukherjee, and D. Ghosal, “Wireless sensor network survey,” Computer Networks, vol. 52, no. 12, pp. 2292-2330, 2008. [2] H.-N. Dai, Q. Wang, D. Li, and R. C.-W. Wong, “On eavesdropping attacks in wireless sensor networks with directional antennas,” International Journal of Distributed Sensor Networks, vol. 2013, 2013. [3] I. Csisz´ar and J. K¨orner, Information Theory: Coding Theorems for Discrete Memoryless Systems. Cambridge University Press, 2011. [4] Y. Wang, G. Attebury, and B. Ramamurthy, “A survey of security issues in wireless sensor networks,” IEEE Communications Surveys & Tutorials, vol. 8, no. 2, pp. 2-23, Second Quarter 2006. [5] Y. Zhang, Y. Shen, H. Wang, J. Yong, and X. Jiang, “On secure wireless communications for IOT under eavesdropper collusion,” IEEE Transactions on Automation Science and Engineering, vol. 13, no. 3, pp, 1281-1293, July 2016. [6] M. Baldi, M. Bianchi, N. Maturo, and F. Chiaraluce, “A Physical Layer Secured Key Distribution Technique for IEEE 802.11g Wireless Networks,” IEEE Wireless Communications Letters, vol. 2, no. 2, pp. 183-186, April 2013. [7] S. Mathur, A. Reznik, C. Ye, R. Mukherjee, A. Rahman, Y. Shah, W. Trappe, and N. Mandayam, “Exploiting The Physical Layer for Enhanced Security [Security and Privacy in Emerging Wireless Networks],” IEEE Wireless Communications, vol. 17, no. 5, pp. 63-70, October 2010. [8] H. Taha and E. Alsusa, “A MIMO Precoding Based Physical Layer Security Technique for Key Exchange Encryption,” 2015 IEEE 81st Vehicular Technology Conference (VTC Spring), pp. 1-5, May 2015. [9] H. Jeon, D. Hwang, J. Choi, H. Lee, and J. Ha, “Secure type-based multiple access,” IEEE Transactions on Information Forensics and Security, vol. 6, no. 3, pp.763-774, September 2011. [10] T. C. Aysal and K. E. Barner, “Sensor data cryptography in wireless sensor networks,” IEEE Transactions on Information Forensics and Security, vol. 3, no. 2, pp. 273-289, June 2008. [11] V. Nadendla, “Secure Distributed Detection inWireless Sensor Networks via Encryption of Sensor Decision,” M.S. thesis, Louisiana State University and Agricultural and Mechanical College, Baton Rouge, LA, USA, 2009. [12] S. Marano, V. Matta, and P. K. Willett, “Distributed detection with censoring sensors under physical layer secrecy,” IEEE Transactions on Signal Processing, vol. 57, no. 5, pp. 1976-1986, May 2009. [13] B. Kailkhura, V. S. Siddhardh Nadendla, and P. K. Varshney, “Distributed Inference in The Presence of Eavesdroppers: A Survey,” IEEE Communications Magazine, vol. 53, no. 6, pp. 40-46, June 2015. [14] V. Nadendla, H. Chen, and P. K. Varshney, “Secure Distributed Detection in The Presence of Eavesdroppers,” in Signals, Systems and Computers (ASILOMAR), 2010 Conference Record of the Forty Fourth Asilomar Conference on, pp. 1437-1441, November 2010. [15] J. Guo, X. Li, U. Roger, H. Chen, “Secrecy Design in Distributed Detection for Large Sensor Networks,” 2016 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP), March 20-25, 2016. [16] Po-Ning Chen, Hong-BinWu, The Maximum-Likelihood Soft-Decision Sequential Decoding Algorithms for Convolutional Codes, For the Degree of Master of Science, National Chiao Tung University, Hsinchu, Taiwan 300, R.O.C., June 1999.
|