Sciweavers

405 search results - page 61 / 81
» Securing cognitive radio networks
Sort
View
ICDCS
2011
IEEE
12 years 8 months ago
JR-SND: Jamming-Resilient Secure Neighbor Discovery in Mobile Ad Hoc Networks
Abstract—Secure neighbor discovery is fundamental to mobile ad hoc networks (MANETs) deployed in hostile environments and refers to the process in which two neighboring nodes exc...
Rui Zhang 0007, Yanchao Zhang, Xiaoxia Huang
TMC
2012
11 years 11 months ago
Secure Initialization of Multiple Constrained Wireless Devices for an Unaided User
—A number of protocols and mechanisms have been proposed to address the problem of initial secure key deployment in wireless networks. Most existing approaches work either with a...
Toni Perkovic, Mario Cagalj, Toni Mastelic, Nitesh...
GLOBECOM
2009
IEEE
14 years 3 months ago
On the Connectivity of Key-Distribution Strategies in Wireless Sensor Networks
Abstract—Wireless sensor networks (WSNs) are usually missioned to gather critical information in hostile and adversarial environments, which make them susceptible to compromise a...
Hosein Shafiei, Ahmad Khonsari, Mohammad Sadegh Ta...
VTC
2007
IEEE
131views Communications» more  VTC 2007»
14 years 3 months ago
FSMA - A Topology-Transparent Scheme for Opportunistic Spectrum Access
— With the advent of cognitive radio technology, new paradigms for spectrum access can achieve near-optimal spectrum utilization by letting users sense and utilize available spec...
Hwee Pink Tan, Colman O'Sullivan, Linda Doyle
CORR
2011
Springer
198views Education» more  CORR 2011»
13 years 14 days ago
Decentralized Online Learning Algorithms for Opportunistic Spectrum Access
—The fundamental problem of multiple secondary users contending for opportunistic spectrum access over multiple channels in cognitive radio networks has been formulated recently ...
Yi Gai, Bhaskar Krishnamachari