Secure type-based multiple access: Transmission strategy and analysis for perfect secrecy

Cited 0 time in webofscience Cited 0 time in scopus
  • Hit : 452
  • Download : 263
Since wireless sensor networks (WSNs) are vulnerable to threats and attacks due to the nature of wireless communications between sensors and fusion center (FC), it is often necessary to secure transmissions from any possible eavesdropping. In this paper, we study the eavesdropping issue when sensors are over-deployed and the channels between sensors and the ally FC are modeled as time-varying Rayleigh fading channels. We propose a transmission scheme in which only the sensors of strong and weak channel gains report their decisions in a predetermined way based on type-based multiple access protocol. By taking advantage of random behaviors of wireless channels in the form of the multiuser diversity and carefully design different roles of sensors of strong and weak channel gains to the ally FC, the proposed scheme can confuse the enemy FC in making a decision. Eventually, it guarantees the perfect secrecy promised by an information theoretic measure. We also analyze detection error probability and equivocation at the ally and enemy FCs, respectively.
Publisher
IEEE
Issue Date
2010-08-30
Language
English
Citation

Information Theory Workshop (ITW), 2010 IEEE, pp.1 - 5

DOI
10.1109/CIG.2010.5592683
URI
http://hdl.handle.net/10203/172934
Appears in Collection
EE-Conference Papers(학술회의논문)
Files in This Item

qr_code

  • mendeley

    citeulike


rss_1.0 rss_2.0 atom_1.0