Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
×
Sep 9, 2021 · In this section, we conduct experiments to assess the performance of the proposed data security mechanism in terms of privacy protection and authentication. Compressed sensing uses a Gaussian random matrix as the random sensing matrix, Discrete Cosine ...
The security mechanisms have always been a research concern in Wireless Sensor Networks (WSNs). In the last decade, compressed sensing (CS) has been ...
Jan 10, 2024 · This paper aims to propose a security mechanism which can jointly achieve confidentiality, authentication and integrity without introducing additional communication overhead. Specifically, we introduce perturbations for encryption and authentication to perturb the original data. Extensive experiments ...
In order to achieve authentication and integrity without any extra communication overhead, this paper proposes a secure data transmission mechanism based on ...
The compressed sensing problem for redundant dictionaries aims to use a small number of linear measurements to represent signals that are sparse with respect to a general dictionary. Under an appropriate restricted isometry property for a dictionary, reconstruc-tion methods based on q minimization are known to ...
It gives confidentiality to the compressed sensing data with almost no increase in hardware cost, invisibly embeds the data confusion mechanism, which provides a layer of security protection for the sensing data [27]. Therefore, CS theory is also used to provide certain security guarantees for data [28], [29].
Jun 5, 2018 · (1) The secure mechanism in Wang et al.'s system requires transmitting extra information from the user to the cloud once the cloud wants to reconstruct encrypted data. On the contrary, in our system, when the cloud receives the data from the sensor, the cloud can immedi- ately start to reconstruct ...
(1) The secure mechanism in Wang et al.'s system requires transmitting extra information from the user to the cloud once the cloud wants to reconstruct encrypted data. On the contrary, in our system, when the cloud receives the data from the sensor, the cloud can im- mediately start to reconstruct and store the data.
AbstractAs a data-centric network, the Mobile Crowd Sensing (MCS) collects and uploads sensing data through intelligent terminal devices carried by workers.
We present an efficient algorithms to enhance the security and efficiency of CS based data collection in IoT-based WSNs. The proposed scheme operates in five main phases, namely Key Generation, CS-Key Exchange, Data Compression with CS Encryption, Data Aggregation and Encryption with ECC ...
Missing: Perturbed | Show results with:Perturbed