Sciweavers

291 search results - page 28 / 59
» Localizing Multiple Jamming Attackers in Wireless Networks
Sort
View
127
Voted
IEEEMSP
2002
IEEE
137views Multimedia» more  IEEEMSP 2002»
15 years 9 months ago
On the capacity of the reachback channel in wireless sensor networks
Abstract— We consider the problem of reachback communication in wireless sensor networks: multiple sensors are deployed on a field, and they collect local measurements of some r...
João Barros, Sergio D. Servetto
CISS
2008
IEEE
15 years 10 months ago
MIMO-assisted channel-based authentication in wireless networks
— Multiple-input multiple-output (MIMO) techniques allow for multiplexing and/or diversity gain, and will be widely deployed in future wireless systems. In this paper, we propose...
Liang Xiao, Larry J. Greenstein, Narayan B. Manday...
ICDCS
2008
IEEE
15 years 10 months ago
On Security Vulnerabilities of Null Data Frames in IEEE 802.11 Based WLANs
Null data frames are a special but important type of frames in IEEE 802.11 based Wireless Local Area Networks (e.g., 802.11 WLANs). They are widely used for power management, chan...
Wenjun Gu, Zhimin Yang, Can Que, Dong Xuan, Weijia...
139
Voted
ICDCS
2010
IEEE
15 years 4 months ago
3DLoc: Three Dimensional Wireless Localization Toolkit
In this paper, we present 3DLoc: an integrated system of hardware and software toolkits for locating an 802.11compliant mobile device in a three dimensional (3D) space. 3DLoc feat...
Jizhi Wang, Yinjie Chen, Xinwen Fu, Jie Wang, Wei ...
ESAS
2007
Springer
15 years 10 months ago
Distance Bounding in Noisy Environments
Location information can be used to enhance mutual entity authentication protocols in wireless ad-hoc networks. More specifically, distance bounding protocols have been introduced...
Dave Singelée, Bart Preneel