Approaches to Secure Inference in the Internet of Things: Performance Bounds, Algorithms, and Effective Attacks on IoT Sensor Networks
暂无分享,去创建一个
[1] Yunghsiang Sam Han,et al. Distributed Detection in Tree Topologies With Byzantines , 2013, IEEE Transactions on Signal Processing.
[2] Matthieu R. Bloch,et al. Wireless Information-Theoretic Security , 2008, IEEE Transactions on Information Theory.
[3] Peng Ning,et al. A Byzantine Attack Defender in Cognitive Radio Networks: The Conditional Frequency Check , 2013, IEEE Transactions on Wireless Communications.
[4] Merril I. Skolnik,et al. Introduction to radar systems /2nd edition/ , 1980 .
[5] Matthieu R. Bloch,et al. Physical-Layer Security: From Information Theory to Security Engineering , 2011 .
[6] Rick S. Blum,et al. Asymptotically Optimum Distributed Estimation in the Presence of Attacks , 2015, IEEE Transactions on Signal Processing.
[7] Rick S. Blum,et al. Functional Forms of Optimum Spoofing Attacks for Vector Parameter Estimation in Quantized Sensor Networks , 2016, IEEE Transactions on Signal Processing.
[8] Rick S. Blum,et al. Asymptotic analysis of a new low complexity encryption approach for the Internet of Things, smart cities and smart grid , 2017, 2017 IEEE International Conference on Smart Grid and Smart Cities (ICSGSC).
[9] Mohsen Guizani,et al. Cyber Security Analysis and Protection of Wireless Sensor Networks for Smart Grid Monitoring , 2017, IEEE Wireless Communications.
[10] Wade Trappe,et al. Robust statistical methods for securing wireless localization in sensor networks , 2005, IPSN 2005. Fourth International Symposium on Information Processing in Sensor Networks, 2005..
[11] Rick S. Blum,et al. GPS spoofing attack characterization and detection in smart grids , 2016, 2016 IEEE Conference on Communications and Network Security (CNS).
[12] H. Vincent Poor,et al. Authenticating Users Through Fine-Grained Channel Information , 2018, IEEE Transactions on Mobile Computing.
[13] Rick S. Blum,et al. On the estimation and secrecy capabilities of stochastic encryption for parameter estimation in IoT , 2018, 2018 52nd Annual Conference on Information Sciences and Systems (CISS).
[14] S. J. Roome,et al. Digital radio frequency memory , 1990 .
[15] Rick S. Blum,et al. A Fundamental Limitation on Maximum Parameter Dimension for Accurate Estimation With Quantized Data , 2016, IEEE Transactions on Information Theory.
[16] Rick S. Blum,et al. Attack Detection in Sensor Network Target Localization Systems With Quantized Data , 2017, IEEE Transactions on Signal Processing.
[17] Venugopal V. Veeravalli,et al. MMSE estimation in a sensor network in the presence of an adversary , 2016, 2016 IEEE International Symposium on Information Theory (ISIT).
[18] Amitav Mukherjee,et al. Physical-Layer Security in the Internet of Things: Sensing and Communication Confidentiality Under Resource Constraints , 2015, Proceedings of the IEEE.
[19] Xiaodong Wang,et al. Asymptotically Optimal Stochastic Encryption for Quantized Sequential Detection in the Presence of Eavesdroppers , 2017, IEEE Transactions on Information Theory.
[20] Imre Csiszár,et al. Broadcast channels with confidential messages , 1978, IEEE Trans. Inf. Theory.
[21] R. Michael Buehrer,et al. Characterization and detection of location spoofing attacks , 2012, Journal of Communications and Networks.
[22] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[23] Pramod K. Varshney,et al. Localization in Wireless Sensor Networks: Byzantines and Mitigation Techniques , 2013, IEEE Transactions on Signal Processing.
[24] Yue Zhao,et al. Minimum Sparsity of Unobservable Power Network Attacks , 2016, IEEE Transactions on Automatic Control.
[25] Pramod K. Varshney,et al. Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.
[26] H. Vincent Poor,et al. Strategic Protection Against Data Injection Attacks on Power Grids , 2011, IEEE Transactions on Smart Grid.
[27] Dong-Yang Liu. Attack-resistant location estimation in wireless sensor networks , 2013 .
[28] Lang Tong,et al. Malicious Data Attacks on the Smart Grid , 2011, IEEE Transactions on Smart Grid.
[29] Rick S. Blum,et al. Attacks on Sensor Network Parameter Estimation With Quantization: Performance and Asymptotically Optimum Processing , 2015, IEEE Transactions on Signal Processing.
[30] Prasant Mohapatra,et al. Non-cryptographic authentication and identification in wireless networks [Security and Privacy in Emerging Wireless Networks] , 2010, IEEE Wireless Communications.
[31] Zhu Han,et al. Coordinated data-injection attack and detection in the smart grid: A detailed look at enriching detection solutions , 2012, IEEE Signal Processing Magazine.
[32] Gustavus J. Simmons,et al. Authentication Theory/Coding Theory , 1985, CRYPTO.
[33] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[34] Pramod K. Varshney,et al. Adaptive learning of Byzantines' behavior in cooperative spectrum sensing , 2011, 2011 IEEE Wireless Communications and Networking Conference.
[35] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[36] Pramod K. Varshney,et al. Distributed Inference with Byzantine Data: State-of-the-Art Review on Data Falsification Attacks , 2013, IEEE Signal Processing Magazine.
[37] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.
[38] Yunghsiang Sam Han,et al. Distributed Inference With M-Ary Quantized Data in the Presence of Byzantine Attacks , 2014, IEEE Transactions on Signal Processing.
[39] Rick S. Blum,et al. Cybersecurity and Power Electronics: Addressing the Security Vulnerabilities of the Internet of Things , 2017, IEEE Power Electronics Magazine.
[40] H. Vincent Poor,et al. Authentication Over Noisy Channels , 2008, IEEE Transactions on Information Theory.
[41] Rick S. Blum,et al. Cryptographic Side-Channel Signaling and Authentication via Fingerprint Embedding , 2018, IEEE Transactions on Information Forensics and Security.
[42] Alexander M. Haimovich,et al. Noncoherent MIMO Radar for Location and Velocity Estimation: More Antennas Means Better Performance , 2010, IEEE Transactions on Signal Processing.
[43] H Vincent Poor,et al. Wireless physical layer security , 2016, Proceedings of the National Academy of Sciences.
[44] Kenneth E. Barner,et al. Sensor Data Cryptography in Wireless Sensor Networks , 2008, IEEE Transactions on Information Forensics and Security.