On ordered transmission based distributed Gaussian shift-in-mean detection under Byzantine attacks

C Quan, S Bulusu, B Geng, YS Han… - IEEE Transactions …, 2023 - ieeexplore.ieee.org
The ordered transmission based (OT-based) schemes reduce the number of transmissions
needed in a distributed detection network without any loss in the probability of error …

[PDF][PDF] WSN Protocols, Research challenges in WSN, Integrated areas of sensor networks, security attacks in WSN

V Saini, J Gupta, KD Garg - Eur. J. Mol. Clin. Med, 2020 - academia.edu
Wireless Sensor Networks (WSNs) are widely used nowadays for seamless data transfer
from one sensor node to others using the wireless channel. The term routing means sending …

Distributed Quantized Detection of Sparse Signals Under Byzantine Attacks

C Quan, YS Han, B Geng… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
This paper investigates distributed detection of sparse stochastic signals with quantized
measurements under Byzantine attacks, where sensors may send falsified data to the …

Asymptotic optimality in Byzantine distributed quickest change detection

YC Huang, YJ Huang, SC Lin - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
The Byzantine distributed quickest change detection (BDQCD) is studied, where a fusion
center monitors the occurrence of an abrupt event through a bunch of distributed sensors …

Cost-effective modeling for incorporating flexibility by securing wireless mobile sensors network

S Parande, JD Mallapur - Wireless Personal Communications, 2022 - Springer
Existing security approaches for safeguarding data exchange among the sensor nodes are
investigated in presence of apriori information of an adversary in wire-less sensor network …

Applications in AIoT: IoT security and secrecy

SC Lin, TH Chang, E Jorswieck, PH Lin - … , Mathematical Optimization, and …, 2022 - Springer
Besides distributed learning discussed in Chap. 8, applications and platforms including
cloud computing, content delivery network, distributed ledger (Blockchain) are increasingly …

Distributed Detection with Multiple Sensors in the Presence of Sybil Attacks

W Hashlamoun, S Brahma… - GLOBECOM 2022-2022 …, 2022 - ieeexplore.ieee.org
This paper considers the problem of distributed detection in the presence of a Sybil attack
where a malicious sensor node can send multiple falsified decisions using multiple fake …

[PDF][PDF] Real-time signal detection system and reliability analysis of wireless networks under 5G communication architecture

W Zhang, Y Zhu, M Liang, G Zhang - Applied Mathematics and …, 2023 - sciendo.com
This paper first analyzes the network for 5G communication architecture and builds a
framework for signal detection systems for wireless networks based on this architecture …

JKSCI

JS Park, BA Rhee… - Journal of The Korea …, 2023 - koreascience.kr
The purpose of this study is to shed light on the relationship between perceived value (PV),
attitude toward the exhibition (ATYCSE), and behavioral intention toward the exhibition …

On Energy-Efficient Wireless Sensor Networks in the Presence of Byzantines

C Quan - 2023 - search.proquest.com
Over the years, wireless communication systems have evolved into the most widely used
framework for communication devices and networks. These wireless networks form the …