{"id":"https://openalex.org/W2005259871","doi":"https://doi.org/10.1109/tifs.2014.2298813","title":"Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks","display_name":"Optimal Probabilistic Encryption for Secure Detection in Wireless Sensor Networks","publication_year":2014,"publication_date":"2014-01-31","ids":{"openalex":"https://openalex.org/W2005259871","doi":"https://doi.org/10.1109/tifs.2014.2298813","mag":"2005259871"},"language":"en","primary_location":{"id":"doi:10.1109/tifs.2014.2298813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2298813","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5063601404","display_name":"Reza Soosahabi","orcid":"https://orcid.org/0000-0002-3991-7647"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Reza Soosahabi","raw_affiliation_strings":["Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA","Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA#TAB#","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5009698500","display_name":"Mort Naraghi\u2010Pour","orcid":"https://orcid.org/0000-0003-1300-8733"},"institutions":[{"id":"https://openalex.org/I121820613","display_name":"Louisiana State University","ror":"https://ror.org/05ect4e57","country_code":"US","type":"education","lineage":["https://openalex.org/I121820613"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Mort Naraghi-Pour","raw_affiliation_strings":["Division of Electrical and Computer Engineering, School of Electrical Engineering and Computer Science, Baton Rouge, LA, USA","Div. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA"],"affiliations":[{"raw_affiliation_string":"Division of Electrical and Computer Engineering, School of Electrical Engineering and Computer Science, Baton Rouge, LA, USA","institution_ids":[]},{"raw_affiliation_string":"Div. of Electr. & Comput. Eng., Louisiana State Univ., Baton Rouge, LA, USA","institution_ids":["https://openalex.org/I121820613"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5105929455","display_name":"Dmitri Perkins","orcid":"https://orcid.org/0000-0003-0329-7914"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Dmitri Perkins","raw_affiliation_strings":["Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA","Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA#TAB#","institution_ids":["https://openalex.org/I79516672"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010023744","display_name":"Magdy Bayoumi","orcid":"https://orcid.org/0000-0002-0630-5273"},"institutions":[{"id":"https://openalex.org/I79516672","display_name":"University of Louisiana at Lafayette","ror":"https://ror.org/01x8rc503","country_code":"US","type":"education","lineage":["https://openalex.org/I2799628689","https://openalex.org/I79516672"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Magdy A. Bayoumi","raw_affiliation_strings":["Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA","Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA#TAB#"],"affiliations":[{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA","institution_ids":["https://openalex.org/I79516672"]},{"raw_affiliation_string":"Center for Advanced Computer Studies, University of Louisiana, Lafayette, LA, USA#TAB#","institution_ids":["https://openalex.org/I79516672"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5063601404"],"corresponding_institution_ids":["https://openalex.org/I79516672"],"apc_list":null,"apc_paid":null,"fwci":5.036,"has_fulltext":false,"cited_by_count":33,"citation_normalized_percentile":{"value":0.95480281,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":98},"biblio":{"volume":"9","issue":"3","first_page":"375","last_page":"385"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12879","display_name":"Distributed Sensor Networks and Detection Algorithms","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10964","display_name":"Wireless Communication Security Techniques","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/2208","display_name":"Electrical and Electronic Engineering"},"field":{"id":"https://openalex.org/fields/22","display_name":"Engineering"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10711","display_name":"Target Tracking and Data Fusion in Sensor Networks","score":0.9894999861717224,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8060808181762695},{"id":"https://openalex.org/keywords/fusion-center","display_name":"Fusion center","score":0.7261004447937012},{"id":"https://openalex.org/keywords/wireless-sensor-network","display_name":"Wireless sensor network","score":0.6588053703308105},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.6122478246688843},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6042529344558716},{"id":"https://openalex.org/keywords/cipher","display_name":"Cipher","score":0.603698194026947},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.5832585096359253},{"id":"https://openalex.org/keywords/sensor-fusion","display_name":"Sensor fusion","score":0.46500998735427856},{"id":"https://openalex.org/keywords/channel","display_name":"Channel (broadcasting)","score":0.45437049865722656},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.41052502393722534},{"id":"https://openalex.org/keywords/real-time-computing","display_name":"Real-time computing","score":0.39478984475135803},{"id":"https://openalex.org/keywords/wireless","display_name":"Wireless","score":0.3867238759994507},{"id":"https://openalex.org/keywords/telecommunications","display_name":"Telecommunications","score":0.1258682906627655}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8060808181762695},{"id":"https://openalex.org/C2781234732","wikidata":"https://www.wikidata.org/wiki/Q943505","display_name":"Fusion center","level":4,"score":0.7261004447937012},{"id":"https://openalex.org/C24590314","wikidata":"https://www.wikidata.org/wiki/Q336038","display_name":"Wireless sensor network","level":2,"score":0.6588053703308105},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.6122478246688843},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6042529344558716},{"id":"https://openalex.org/C2780221543","wikidata":"https://www.wikidata.org/wiki/Q4681865","display_name":"Cipher","level":3,"score":0.603698194026947},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.5832585096359253},{"id":"https://openalex.org/C33954974","wikidata":"https://www.wikidata.org/wiki/Q486494","display_name":"Sensor fusion","level":2,"score":0.46500998735427856},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.45437049865722656},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.41052502393722534},{"id":"https://openalex.org/C79403827","wikidata":"https://www.wikidata.org/wiki/Q3988","display_name":"Real-time computing","level":1,"score":0.39478984475135803},{"id":"https://openalex.org/C555944384","wikidata":"https://www.wikidata.org/wiki/Q249","display_name":"Wireless","level":2,"score":0.3867238759994507},{"id":"https://openalex.org/C76155785","wikidata":"https://www.wikidata.org/wiki/Q418","display_name":"Telecommunications","level":1,"score":0.1258682906627655},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0},{"id":"https://openalex.org/C149946192","wikidata":"https://www.wikidata.org/wiki/Q3235733","display_name":"Cognitive radio","level":3,"score":0.0}],"mesh":[],"locations_count":3,"locations":[{"id":"doi:10.1109/tifs.2014.2298813","is_oa":false,"landing_page_url":"https://doi.org/10.1109/tifs.2014.2298813","pdf_url":null,"source":{"id":"https://openalex.org/S61310614","display_name":"IEEE Transactions on Information Forensics and Security","issn_l":"1556-6013","issn":["1556-6013","1556-6021"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319808","host_organization_name":"Institute of Electrical and Electronics Engineers","host_organization_lineage":["https://openalex.org/P4310319808"],"host_organization_lineage_names":["Institute of Electrical and Electronics Engineers"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE Transactions on Information Forensics and Security","raw_type":"journal-article"},{"id":"pmh:oai:digitalcommons.lsu.edu:eecs_pubs-2022","is_oa":false,"landing_page_url":"https://digitalcommons.lsu.edu/eecs_pubs/1023","pdf_url":null,"source":{"id":"https://openalex.org/S4210169993","display_name":"Civil War Book Review","issn_l":"1528-6592","issn":["1528-6592"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310315936","host_organization_name":"Louisiana State University","host_organization_lineage":["https://openalex.org/P4310315936"],"host_organization_lineage_names":["Louisiana State University"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty Publications","raw_type":"text"},{"id":"pmh:oai:repository.lsu.edu:eecs_pubs-2022","is_oa":false,"landing_page_url":"https://repository.lsu.edu/eecs_pubs/1023","pdf_url":null,"source":{"id":"https://openalex.org/S4210169993","display_name":"Civil War Book Review","issn_l":"1528-6592","issn":["1528-6592"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310315936","host_organization_name":"Louisiana State University","host_organization_lineage":["https://openalex.org/P4310315936"],"host_organization_lineage_names":["Louisiana State University"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"Faculty Publications","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":41,"referenced_works":["https://openalex.org/W104921091","https://openalex.org/W391578156","https://openalex.org/W1488441684","https://openalex.org/W1525038591","https://openalex.org/W1964842920","https://openalex.org/W1986345014","https://openalex.org/W1995010230","https://openalex.org/W2004215803","https://openalex.org/W2015513948","https://openalex.org/W2020872955","https://openalex.org/W2031666018","https://openalex.org/W2046135376","https://openalex.org/W2059003499","https://openalex.org/W2066079057","https://openalex.org/W2071094669","https://openalex.org/W2088731468","https://openalex.org/W2111601157","https://openalex.org/W2116091606","https://openalex.org/W2116478700","https://openalex.org/W2116890432","https://openalex.org/W2118633040","https://openalex.org/W2125969840","https://openalex.org/W2134931138","https://openalex.org/W2135988418","https://openalex.org/W2136277139","https://openalex.org/W2148306323","https://openalex.org/W2149197198","https://openalex.org/W2155789339","https://openalex.org/W2165085455","https://openalex.org/W2168452204","https://openalex.org/W2168746033","https://openalex.org/W2171196787","https://openalex.org/W2478708596","https://openalex.org/W2546046186","https://openalex.org/W2798333393","https://openalex.org/W3133603318","https://openalex.org/W3215393340","https://openalex.org/W4250534217","https://openalex.org/W4285719527","https://openalex.org/W6604315751","https://openalex.org/W6664794510"],"related_works":["https://openalex.org/W2108319163","https://openalex.org/W2963973190","https://openalex.org/W2000147971","https://openalex.org/W1558339915","https://openalex.org/W2066353259","https://openalex.org/W297662488","https://openalex.org/W2734417830","https://openalex.org/W2349308680","https://openalex.org/W2060761112","https://openalex.org/W413436171"],"abstract_inverted_index":{"We":[0,117],"consider":[1],"the":[2,27,30,35,52,57,71,88,121,126,134,153,156,162,168,193,197,221,225,230,233],"problem":[3],"of":[4,29,37,167,185,196,224,232],"secure":[5],"detection":[6,177,194,222],"in":[7,139,192],"wireless":[8],"sensor":[9,40],"networks":[10],"operating":[11],"over":[12,98],"insecure":[13],"links.":[14],"It":[15],"is":[16,94,137,150,164,188],"assumed":[17,95],"that":[18,148],"an":[19],"eavesdropping":[20],"fusion":[21,54,92],"center":[22,55,93],"(EFC)":[23],"attempts":[24],"to":[25,33,51,74,96,141],"intercept":[26],"transmissions":[28],"sensors":[31,89,214],"and":[32,90,105,108,128,206,227],"detect":[34],"state":[36],"nature.":[38],"The":[39,85,130,183,199],"nodes":[41,59],"quantize":[42],"their":[43,61],"observations":[44],"using":[45,63,79],"a":[46,64,80,99,113,189],"multilevel":[47],"quantizer.":[48],"Before":[49],"transmission":[50],"ally":[53],"(AFC),":[56],"senor":[58],"encrypt":[60],"data":[62,73],"probabilistic":[65],"encryption":[66],"scheme,":[67],"which":[68],"randomly":[69],"maps":[70],"sensor's":[72],"another":[75],"quantizer":[76],"output":[77],"level":[78],"stochastic":[81],"cipher":[82,135,170],"matrix":[83,171],"(key).":[84],"communication":[86,204],"between":[87],"each":[91,110,174],"be":[97,180],"parallel":[100],"access":[101],"channel":[102],"with":[103,109,215],"identical":[104],"independent":[106],"branches,":[107],"branch":[111],"being":[112],"discrete":[114],"memoryless":[115],"channel.":[116],"employ":[118],"J-divergence":[119,143],"as":[120,159,161],"performance":[122,178,195,223],"criterion":[123],"for":[124,133,144,152,213],"both":[125],"AFC":[127,226],"EFC.":[129,154],"optimal":[131],"solution":[132],"matrices":[136],"obtained":[138],"order":[140],"maximize":[142],"AFC,":[145],"whereas":[146],"ensuring":[147],"it":[149,211],"zero":[151],"With":[155],"proposed":[157,200,234],"method,":[158],"long":[160],"EFC":[163,228],"not":[165],"aware":[166],"specific":[169],"employed":[172],"by":[173],"sensor,":[175],"its":[176],"will":[179],"very":[181],"poor.":[182],"cost":[184],"this":[186],"method":[187],"small":[190],"degradation":[191],"AFC.":[198],"scheme":[201],"has":[202],"no":[203],"overhead":[205],"minimal":[207],"processing":[208],"requirements":[209],"making":[210],"suitable":[212],"limited":[216],"resources.":[217],"Numerical":[218],"results":[219],"showing":[220],"verify":[229],"efficacy":[231],"method.":[235]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":4},{"year":2022,"cited_by_count":1},{"year":2021,"cited_by_count":3},{"year":2020,"cited_by_count":3},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":3},{"year":2016,"cited_by_count":5},{"year":2015,"cited_by_count":5},{"year":2014,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
