2010 IEEE International Conference on Wireless Information Technology and Systems 2010
DOI: 10.1109/icwits.2010.5611952
|View full text |Cite
|
Sign up to set email alerts
|

Cross-layered design of security scheme for cooperative MIMO sensor networks

Abstract: IntroductionMultiple Input Multiple Output (MIMO) systems employ multiple antennas to provide extremely high spectral efficiencies through space multiplexing and link reliability through space diversity for wireless communication. Since it is unrealistic to equip multiple antennas to small and inexpensive nodes, virtual/cooperative MIMO technology that enables distributed single-antenna systems cooperating on data transmission and reception as a multiple antenna array is a promising technique and has attracted… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
2
0

Year Published

2011
2011
2017
2017

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 6 publications
(2 citation statements)
references
References 8 publications
0
2
0
Order By: Relevance
“…Detecting the compromised nodes at random times has two advantages. First, in the fixed-time detection scheme [19], the compromised nodes can pretend to be trustworthy nodes by sending the correct data only at the detection time. However, in this proposed scheme, they are not able to do it since they do not know when the detection process will be performed.…”
Section: If L > Slmentioning
confidence: 99%
See 1 more Smart Citation
“…Detecting the compromised nodes at random times has two advantages. First, in the fixed-time detection scheme [19], the compromised nodes can pretend to be trustworthy nodes by sending the correct data only at the detection time. However, in this proposed scheme, they are not able to do it since they do not know when the detection process will be performed.…”
Section: If L > Slmentioning
confidence: 99%
“…In [19,20,21], we investigated a secured communication scheme in cross layered manner for cooperative MIMO networks. The scheme combines a cryptographic technique implemented in higher layers and data assurance analysis at the physical layer.…”
mentioning
confidence: 99%