Data networks (2nd ed.)
Elements of information theory
Elements of information theory
An introduction to signal detection and estimation (2nd ed.)
An introduction to signal detection and estimation (2nd ed.)
Distributed Detection and Data Fusion
Distributed Detection and Data Fusion
Detection, Estimation, and Modulation Theory: Radar-Sonar Signal Processing and Gaussian Signals in Noise
Theory of Information and Coding
Theory of Information and Coding
Securing wireless systems via lower layer enforcements
WiSe '06 Proceedings of the 5th ACM workshop on Wireless security
Information theory and statistics: a tutorial
Communications and Information Theory
Sensor networks with mobile agents
MILCOM'03 Proceedings of the 2003 IEEE conference on Military communications - Volume I
Cross-Layer Design of Sequential Detectors in Sensor Networks
IEEE Transactions on Signal Processing
Decentralized detection in sensor networks
IEEE Transactions on Signal Processing
Decentralized Detection With Censoring Sensors
IEEE Transactions on Signal Processing
Asymptotic Performance of a Censoring Sensor Network
IEEE Transactions on Information Theory
Multiple-Access Channels With Confidential Messages
IEEE Transactions on Information Theory
Wireless Information-Theoretic Security
IEEE Transactions on Information Theory
Secure Communication Over Fading Channels
IEEE Transactions on Information Theory
Energy-efficient detection in sensor networks
IEEE Journal on Selected Areas in Communications
Hi-index | 35.68 |
We consider distributed binary detection problems in which the remote sensors of a network implement a censoring strategy to fulfill energy constraints, and the network works under the attack of an eavesdropper. The attacker wants to discover the state of the nature scrutinized by the system, but the network implements appropriate countermeasures to make this task hopeless. The goal is to achieve perfect secrecy at the physical layer. making the data available at the eavesdropper useless for its detection task. Adopting as performance metric certain Ali-Silvey distances we characterize the detection performance of the system under physcal layer secrecy. Two communication scenarios are addressed: parallel access channels and a multiple access channel. In both cases the optimal operative points from the network perspective are found. The most economic operative solution is shown to lie in the asymptote of low energy regime. How the perfect secrecy requirement impacts on the achievable performances, with respect to the absence of countermeasures, is also investigated.