Physical-layer security in Internet of Things based on compressed sensing and frequency selection
暂无分享,去创建一个
Ting Jiang | Weiwei Li | Ning Wang | Shichao Lv | Shichao Lv | Ting Jiang | Ning Wang | Weiwei Li
[1] Syed Taha Ali,et al. Decorrelating secret bit extraction via channel hopping in body area networks , 2012, 2012 IEEE 23rd International Symposium on Personal, Indoor and Mobile Radio Communications - (PIMRC).
[2] Arnon D. Cohen,et al. The weighted diagnostic distortion (WDD) measure for ECG signal compression , 2000, IEEE Transactions on Biomedical Engineering.
[3] Ting Jiang,et al. Compressed Sensing Based on the Characteristic Correlation of ECG in Hybrid Wireless Sensor Network , 2015, Int. J. Distributed Sens. Networks.
[4] Gill R. Tsouri,et al. Establishing secure measurement matrix for compressed sensing using wireless physical layer security , 2013, 2013 International Conference on Computing, Networking and Communications (ICNC).
[5] Lida Xu,et al. The internet of things: a survey , 2014, Information Systems Frontiers.
[6] Lida Xu,et al. Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things , 2013, IEEE Transactions on Industrial Informatics.
[7] Babak Seyfe,et al. Perfect secrecy via compressed sensing , 2010, 2013 Iran Workshop on Communication and Information Theory.
[8] Y. Rachlin,et al. The secrecy of compressed sensing measurements , 2008, 2008 46th Annual Allerton Conference on Communication, Control, and Computing.
[9] Sriram Vishwanath,et al. Secrecy using compressive sensing , 2011, 2011 IEEE Information Theory Workshop.
[10] Gill R. Tsouri,et al. Securing While Sampling in Wireless Body Area Networks With Application to Electrocardiography , 2016, IEEE Journal of Biomedical and Health Informatics.
[11] A. Robert Calderbank,et al. Performance bounds for expander-based compressed sensing in the presence of Poisson noise , 2009, 2009 Conference Record of the Forty-Third Asilomar Conference on Signals, Systems and Computers.
[12] Gilles Brassard,et al. Secret-Key Reconciliation by Public Discussion , 1994, EUROCRYPT.
[13] Ivan Martinovic,et al. Key Generation in Wireless Sensor Networks Based on Frequency-selective Channels - Design, Implementation, and Analysis , 2010, ArXiv.
[14] Korbinian Strimmer,et al. Entropy Inference and the James-Stein Estimator, with Application to Nonlinear Gene Association Networks , 2008, J. Mach. Learn. Res..
[15] K. Gopalakrishnan. A study of correlation-immune, resilient and related cryptographic functions , 1994 .
[16] K. P. Soman,et al. Ensuring Security to the Compressed Sensing Data Using a Steganographic Approach , 2013 .
[17] Thomas Strohmer,et al. General Deviants: An Analysis of Perturbations in Compressed Sensing , 2009, IEEE Journal of Selected Topics in Signal Processing.