Estimation in Wireless Sensor Networks With Security Constraints
暂无分享,去创建一个
[1] J.A. Stankovic,et al. Denial of Service in Sensor Networks , 2002, Computer.
[2] Amir K. Khandani,et al. Linear estimation of correlated data in wireless sensor networks with optimum power allocation and analog modulation , 2008, IEEE Transactions on Communications.
[3] R. Negi,et al. Secret communication using artificial noise , 2005, VTC-2005-Fall. 2005 IEEE 62nd Vehicular Technology Conference, 2005..
[4] Eric van Damme,et al. Non-Cooperative Games , 2000 .
[5] J. Wolfowitz. Coding Theorems of Information Theory , 1962, Ergebnisse der Mathematik und Ihrer Grenzgebiete.
[6] A. Lee Swindlehurst,et al. Principles of Physical Layer Security in Multiuser Wireless Networks: A Survey , 2010, IEEE Communications Surveys & Tutorials.
[7] C.-C. Jay Kuo,et al. Enhancing Physical-Layer Secrecy in Multiantenna Wireless Systems: An Overview of Signal Processing Approaches , 2013, IEEE Signal Processing Magazine.
[8] Pramod K. Varshney,et al. Distributed inference in the presence of eavesdroppers: a survey , 2015, IEEE Communications Magazine.
[9] Mikael Skoglund,et al. The CEO Problem With Secrecy Constraints , 2014, IEEE Transactions on Information Forensics and Security.
[10] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2006, 2007 IEEE International Symposium on Information Theory.
[11] Tobias J. Oechtering,et al. Privacy-Aware Distributed Bayesian Detection , 2015, IEEE Journal of Selected Topics in Signal Processing.
[12] Chih-Hong Wang,et al. Power Allocation for Distortion Outage Minimization in Clustered Wireless Sensor Networks , 2008, 2008 International Wireless Communications and Mobile Computing Conference.
[13] Pramod K. Varshney,et al. Design of transmit-diversity schemes in detection networks under secrecy constraints , 2015, 2015 53rd Annual Allerton Conference on Communication, Control, and Computing (Allerton).
[14] Gregory W. Wornell,et al. Secure Broadcasting Over Fading Channels , 2008, IEEE Transactions on Information Theory.
[15] Andrea J. Goldsmith,et al. Estimation Diversity and Energy Efficiency in Distributed Sensing , 2007, IEEE Transactions on Signal Processing.
[16] Ferenc Móricz,et al. Strong laws of large numbers for arrays of rowwise independent random variables , 1989 .
[17] Sennur Ulukus,et al. Secure Lossy Transmission of Vector Gaussian Sources , 2013, IEEE Trans. Inf. Theory.
[18] Bruce Bueno de Mesquita,et al. An Introduction to Game Theory , 2014 .
[19] Lang Tong,et al. Distributed Detection in the Presence of Byzantine Attacks , 2009, IEEE Transactions on Signal Processing.
[20] Husheng Li,et al. A denial-of-service jamming game for remote state monitoring in smart grid , 2011, 2011 45th Annual Conference on Information Sciences and Systems.
[21] Konstantinos N. Plataniotis,et al. Secure hybrid digital-analog Wyner-Ziv coding , 2011, 2011 IEEE 22nd International Symposium on Personal, Indoor and Mobile Radio Communications.
[22] C. Tellambura,et al. Linear estimation of correlated data in wireless sensor networks with optimum power allocation and analog modulation , 2008 .
[23] Pramod K. Varshney,et al. Design of Binary Quantizers for Distributed Detection Under Secrecy Constraints , 2014, IEEE Transactions on Signal Processing.
[24] Roderick Wong,et al. Asymptotic approximations of integrals , 1989, Classics in applied mathematics.
[25] Shlomo Shamai,et al. An MMSE Approach to the Secrecy Capacity of the MIMO Gaussian Wiretap Channel , 2009 .
[26] Michael Gastpar,et al. To code, or not to code: lossy source-channel communication revisited , 2003, IEEE Trans. Inf. Theory.
[27] Marilda Sotomayor. Game Theory, Introduction to , 2009, Encyclopedia of Complexity and Systems Science.
[28] Daniel Pérez Palomar,et al. Gradient of mutual information in linear vector Gaussian channels , 2006, IEEE Transactions on Information Theory.
[29] Rohit Negi,et al. Guaranteeing Secrecy using Artificial Noise , 2008, IEEE Transactions on Wireless Communications.
[30] Shlomo Shamai,et al. Mutual information and minimum mean-square error in Gaussian channels , 2004, IEEE Transactions on Information Theory.
[31] Stephen P. Boyd,et al. Convex Optimization , 2004, Algorithms and Theory of Computation Handbook.
[32] James L. Massey,et al. Deep-space communications and coding: A marriage made in heaven , 1992 .
[33] Giuseppe Caire,et al. Optimum power control over fading channels , 1999, IEEE Trans. Inf. Theory.
[34] Hesham El Gamal,et al. On the Secrecy Capacity of Fading Channels , 2007, ISIT.
[35] Sennur Ulukus,et al. Secure Lossy Transmission of Vector Gaussian Sources , 2011, IEEE Transactions on Information Theory.
[36] Subhrakanti Dey,et al. Distortion Outage Minimization and Diversity Order Analysis for Coherent Multiaccess , 2011, IEEE Transactions on Signal Processing.
[37] Neri Merhav,et al. Zero-Delay and Causal Secure Source Coding , 2015, IEEE Transactions on Information Theory.
[38] Pramod K. Varshney,et al. Collaborative Spectrum Sensing in the Presence of Byzantine Attacks in Cognitive Radio Networks , 2010, IEEE Transactions on Signal Processing.
[39] Gang Qu,et al. Design space exploration for energy-efficient secure sensor network , 2002, Proceedings IEEE International Conference on Application- Specific Systems, Architectures, and Processors.
[40] Pablo Piantanida,et al. Secure Multiterminal Source Coding With Side Information at the Eavesdropper , 2011, IEEE Transactions on Information Theory.
[41] Hsiao-Chun Wu,et al. Physical layer security in wireless networks: a tutorial , 2011, IEEE Wireless Communications.
[42] Raef Bassily,et al. Cooperative Security at the Physical Layer: A Summary of Recent Advances , 2013, IEEE Signal Processing Magazine.
[43] Frédérique E. Oggier,et al. The secrecy capacity of the MIMO wiretap channel , 2007, 2008 IEEE International Symposium on Information Theory.
[44] Mani Srivastava,et al. Energy-aware wireless microsensor networks , 2002, IEEE Signal Process. Mag..
[45] C. Kelley. Iterative Methods for Linear and Nonlinear Equations , 1987 .
[46] Subhrakanti Dey,et al. Power allocation for distortion minimization in distributed estimation with security constraints , 2014, 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC).
[47] B. Rustem,et al. An Interior-Point Algorithm for Nonlinear Minimax Problems , 2010 .
[48] Peter Willett,et al. Distributed Detection With Censoring Sensors Under Physical Layer Secrecy , 2009, IEEE Transactions on Signal Processing.
[49] Roy D. Yates,et al. Service outage based power and rate allocation for parallel fading channels , 2003, IEEE Transactions on Information Theory.
[50] Allen B. MacKenzie,et al. Game Theory for Wireless Engineers , 2006, Game Theory for Wireless Engineers.
[51] Shlomo Shamai,et al. Secure Communication Over Fading Channels , 2007, IEEE Transactions on Information Theory.
[52] Chong-Yung Chi,et al. QoS-Based Transmit Beamforming in the Presence of Eavesdroppers: An Optimized Artificial-Noise-Aided Approach , 2011, IEEE Transactions on Signal Processing.
[53] Subhrakanti Dey,et al. On Scaling Laws of Diversity Schemes in Decentralized Estimation , 2010, IEEE Transactions on Information Theory.
[54] Ian F. Akyildiz,et al. Wireless sensor networks: a survey , 2002, Comput. Networks.
[55] Gregory W. Wornell,et al. Secure Transmission With Multiple Antennas—Part II: The MIMOME Wiretap Channel , 2010, IEEE Transactions on Information Theory.
[56] Shlomo Shamai,et al. Secrecy Capacity Region of Fading Broadcast Channels , 2007, 2007 IEEE International Symposium on Information Theory.
[57] M. Gastpar. Uncoded transmission is exactly optimal for a simple Gaussian "sensor" network , 2007 .
[58] Mukesh Singhal,et al. Security in wireless sensor networks , 2008, Wirel. Commun. Mob. Comput..
[59] Andrea J. Goldsmith,et al. Power scheduling of universal decentralized estimation in sensor networks , 2006, IEEE Transactions on Signal Processing.
[60] Andrea J. Goldsmith,et al. On the optimality of multiantenna broadcast scheduling using zero-forcing beamforming , 2006, IEEE Journal on Selected Areas in Communications.
[61] Reza Olfati-Saber,et al. Consensus and Cooperation in Networked Multi-Agent Systems , 2007, Proceedings of the IEEE.
[62] Wei-Yong Yan,et al. A new computational method for the functional inequality constrained minimax optimization problem , 1995, Proceedings of 1995 34th IEEE Conference on Decision and Control.
[63] Matthew R. McKay,et al. Secure Transmission With Artificial Noise Over Fading Channels: Achievable Rate and Optimal Power Allocation , 2010, IEEE Transactions on Vehicular Technology.
[64] Sennur Ulukus. Correlated Jamming in Multiple Access Channels 1 Shabnam Shafiee , 2005 .
[65] Lieven De Lathauwer,et al. Unconstrained Optimization of Real Functions in Complex Variables , 2012, SIAM J. Optim..
[66] Hesham El Gamal,et al. The Water-Filling Game in Fading Multiple-Access Channels , 2005, IEEE Transactions on Information Theory.
[67] Z.-Q. Luo,et al. Power-efficient analog forwarding transmission in an inhomogeneous Gaussian sensor network , 2005, IEEE 6th Workshop on Signal Processing Advances in Wireless Communications, 2005..
[68] Steven Kay,et al. Fundamentals Of Statistical Signal Processing , 2001 .
[69] Kerstin Vogler,et al. Table Of Integrals Series And Products , 2016 .
[70] Feng Shou-ping. On Mean Value Theorem of Integrals , 2011 .
[71] Eduard A. Jorswieck,et al. Beamforming for fading wiretap channels with partial channel information , 2010, 2010 International ITG Workshop on Smart Antennas (WSA).
[72] Gregory J. Pottie,et al. Wireless integrated network sensors , 2000, Commun. ACM.
[73] A. D. Wyner,et al. The wire-tap channel , 1975, The Bell System Technical Journal.
[74] Andrea Goldsmith,et al. Wireless Communications , 2005, 2021 15th International Conference on Advanced Technologies, Systems and Services in Telecommunications (TELSIKS).
[75] Zhi-Quan Luo,et al. Decentralized estimation in an inhomogeneous sensing environment , 2005, IEEE Transactions on Information Theory.
[76] Shlomo Shamai,et al. A Note on the Secrecy Capacity of the Multiple-Antenna Wiretap Channel , 2007, IEEE Transactions on Information Theory.
[77] R. Srikant,et al. Correlated jamming on MIMO Gaussian fading channels , 2004, 2004 IEEE International Conference on Communications (IEEE Cat. No.04CH37577).
[78] Zhu Han,et al. Improving Wireless Physical Layer Security via Cooperating Relays , 2010, IEEE Transactions on Signal Processing.
[79] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[80] Subhrakanti Dey,et al. Power Allocation for Outage Minimization in State Estimation Over Fading Channels , 2011, IEEE Transactions on Signal Processing.
[81] Reza Soosahabi,et al. Scalable PHY-Layer Security for Distributed Detection in Wireless Sensor Networks , 2012, IEEE Transactions on Information Forensics and Security.
[82] Nihar Jindal. MIMO broadcast channels with finite rate feedback , 2005, GLOBECOM.
[83] H. Vincent Poor,et al. Secrecy Capacity Region of a Multiple-Antenna Gaussian Broadcast Channel With Confidential Messages , 2007, IEEE Transactions on Information Theory.
[84] John M. Cioffi,et al. Delay-constrained capacity with causal feedback , 2002, IEEE Trans. Inf. Theory.
[85] Parastoo Sadeghi,et al. Capacity analysis for finite-state Markov mapping of flat-fading channels , 2005, IEEE Transactions on Communications.
[86] Michael Gastpar,et al. Source-Channel Communication in Sensor Networks , 2003, IPSN.
[87] Jaydip Sen,et al. A Survey on Wireless Sensor Network Security , 2009, Int. J. Commun. Networks Inf. Secur..
[88] H. Kuk. On equilibrium points in bimatrix games , 1996 .
[89] Farshad Lahouti,et al. Link adaptation for physical layer security over wireless fading channels , 2012, IET Commun..