Eavesdropper selection strategies in wireless source localization networks
buir.contributor.author | Öztürk, Cüneyd | |
buir.contributor.author | Gezici, Sinan | |
dc.contributor.author | Öztürk, Cüneyd | |
dc.contributor.author | Gezici, Sinan | |
dc.coverage.spatial | Dublin, Ireland | en_US |
dc.date.accessioned | 2021-01-28T13:06:53Z | |
dc.date.available | 2021-01-28T13:06:53Z | |
dc.date.issued | 2020 | |
dc.department | Department of Electrical and Electronics Engineering | en_US |
dc.description | Date of Conference: 7-11 June 2020 | en_US |
dc.description | Conference name: 2020 IEEE International Conference on Communications, ICC 2020 | en_US |
dc.description.abstract | We consider a wireless source localization network in which eavesdropper nodes aim to estimate the position of a target node. We formulate the problem of selecting a set of N E positions out of N possible positions for placing eavesdropper nodes in order to estimate the target node position as accurately as possible. The Cramér-Rao lower bound related to the estimation of the target node position by eavesdropper nodes is derived, and its monotonicity and convexity properties are investigated. Via relaxation of the integer constraints, the eavesdropper selection problem is approximated by a convex optimization problem, which is used to propose two algorithms for eavesdropper selection. Moreover, in the presence of parameter uncertainty, a robust version of the eavesdropper selection problem is investigated. Simulation results are presented to examine performance of the proposed algorithms. | en_US |
dc.description.provenance | Submitted by Onur Emek (onur.emek@bilkent.edu.tr) on 2021-01-28T13:06:53Z No. of bitstreams: 1 Eavesdropper Selection Strategies in Wireless Source Localization Networks.pdf: 147503 bytes, checksum: c90dafbb7a7d8e6ee7f04a7f23e45fc4 (MD5) | en |
dc.description.provenance | Made available in DSpace on 2021-01-28T13:06:53Z (GMT). No. of bitstreams: 1 Eavesdropper Selection Strategies in Wireless Source Localization Networks.pdf: 147503 bytes, checksum: c90dafbb7a7d8e6ee7f04a7f23e45fc4 (MD5) Previous issue date: 2020 | en |
dc.identifier.doi | 10.1109/ICC40277.2020.9148683 | en_US |
dc.identifier.isbn | 9781728150895 | |
dc.identifier.uri | http://hdl.handle.net/11693/54955 | |
dc.language.iso | English | en_US |
dc.publisher | IEEE | en_US |
dc.relation.isversionof | https://dx.doi.org/10.1109/ICC40277.2020.9148683 | en_US |
dc.source.title | IEEE International Conference on Communications | en_US |
dc.subject | Localization | en_US |
dc.subject | Eavesdropping | en_US |
dc.subject | Estimation | en_US |
dc.title | Eavesdropper selection strategies in wireless source localization networks | en_US |
dc.type | Conference Paper | en_US |
Files
Original bundle
1 - 1 of 1
Loading...
- Name:
- Eavesdropper Selection Strategies in Wireless Source Localization Networks.pdf
- Size:
- 144.05 KB
- Format:
- Adobe Portable Document Format
- Description:
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: