Authenticated Data Transmission Using Analog Function Computation
dc.authorid | Ozdemir, Enver/0000-0001-8130-8178 | |
dc.authorid | Başaran, Semiha Tedik/0000-0003-2636-143X | |
dc.authorid | Kurt, Gunes Karabulut/0000-0001-7188-2619 | |
dc.authorid | Altun, Ufuk/0000-0001-6430-0342 | |
dc.authorwosid | Ozdemir, Enver/ABG-9898-2020 | |
dc.authorwosid | Başaran, Semiha Tedik/ABI-6386-2020 | |
dc.authorwosid | Kurt, Gunes Karabulut/D-7561-2014 | |
dc.contributor.author | Altun, Ufuk | |
dc.contributor.author | Basaran, Semiha T. | |
dc.contributor.author | Kurt, Gunes | |
dc.contributor.author | Ozdemir, Enver | |
dc.date.accessioned | 2024-06-12T10:59:09Z | |
dc.date.available | 2024-06-12T10:59:09Z | |
dc.date.issued | 2020 | |
dc.department | Trakya Üniversitesi | en_US |
dc.description.abstract | Conventional analog function computation (AFC) is an effective data aggregation technique that combines communication and computation to improve time efficiency and scalability. In this letter, different from the conventional AFC, we study distinguishing individual observations from the aggregated data by including unique prime identifiers to pre-processing functions. Prime identifiers can be used to equip the network with a simple authentication mechanism while removing the dependency on public key algorithms or trusted third parties. The resilience of the proposed scheme to spoofing attacks and non-ideal conditions including the channel estimation errors and the thermal noise is investigated with computer simulations. | en_US |
dc.identifier.doi | 10.1109/LCOMM.2020.3007636 | |
dc.identifier.endpage | 2425 | en_US |
dc.identifier.issn | 1089-7798 | |
dc.identifier.issn | 1558-2558 | |
dc.identifier.issue | 11 | en_US |
dc.identifier.startpage | 2421 | en_US |
dc.identifier.uri | https://doi.org/10.1109/LCOMM.2020.3007636 | |
dc.identifier.uri | https://hdl.handle.net/20.500.14551/20336 | |
dc.identifier.volume | 24 | en_US |
dc.identifier.wos | WOS:000589200500011 | en_US |
dc.identifier.wosquality | Q2 | en_US |
dc.indekslendigikaynak | Web of Science | en_US |
dc.language.iso | en | en_US |
dc.publisher | IEEE-Inst Electrical Electronics Engineers Inc | en_US |
dc.relation.ispartof | Ieee Communications Letters | en_US |
dc.relation.publicationcategory | Makale - Uluslararası Hakemli Dergi - Kurum Öğretim Elemanı | en_US |
dc.rights | info:eu-repo/semantics/closedAccess | en_US |
dc.subject | Data Communication | en_US |
dc.subject | Receivers | en_US |
dc.subject | Authentication | en_US |
dc.subject | Wireless Communication | en_US |
dc.subject | Impedance Matching | en_US |
dc.subject | Channel Estimation | en_US |
dc.subject | Transmitters | en_US |
dc.subject | Analog Function Computation | en_US |
dc.subject | Authentication | en_US |
dc.subject | Prime Identifier | en_US |
dc.subject | Pre-Processing Function | en_US |
dc.subject | Spoofing Attack | en_US |
dc.subject | The-Air Computation | en_US |
dc.subject | Multiple-Access | en_US |
dc.subject | Iot | en_US |
dc.title | Authenticated Data Transmission Using Analog Function Computation | en_US |
dc.type | Article | en_US |