Sciweavers

291 search results - page 18 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
SECON
2010
IEEE
15 years 1 months ago
RDAS: Reputation-Based Resilient Data Aggregation in Sensor Network
Data aggregation in wireless sensor networks is vulnerable to security attacks and natural failures. A few nodes can drastically alter the result of the aggregation by reporting er...
Carlos R. Perez-Toro, Rajesh Krishna Panta, Saurab...
TMC
2011
164views more  TMC 2011»
14 years 10 months ago
Security Games for Vehicular Networks
—Vehicular networks (VANETs) can be used to improve transportation security, reliability, and management. This paper investigates security aspects of VANETs within a game-theoret...
Tansu Alpcan, Sonja Buchegger
GLOBECOM
2008
IEEE
15 years 10 months ago
A Distributed Multi-User MIMO MAC Protocol for Wireless Local Area Networks
— Multi-user multiple-input multiple-output (MIMO) systems have been emerging and attracting considerable attention recently for its potential to substantially improve system cap...
Lin X. Cai, Hangguan Shan, Weihua Zhuang, Xuemin S...
140
Voted
IPSN
2005
Springer
15 years 9 months ago
Ecolocation: a sequence based technique for RF localization in wireless sensor networks
Abstract— In this paper we present a novel sequence-based RF localization algorithm called Ecolocation. Our algorithm determines the location of unknown nodes by examining the or...
Kiran Yedavalli, Bhaskar Krishnamachari, Sharmila ...
TMC
2010
224views more  TMC 2010»
15 years 2 months ago
Multihop Range-Free Localization in Anisotropic Wireless Sensor Networks: A Pattern-Driven Scheme
—This paper focuses on multihop range-free localization in anisotropic wireless sensor networks. In anisotropic networks, geometric distance between a pair of sensor nodes is not...
Qingjun Xiao, Bin Xiao, Jiannong Cao, Jianping Wan...