Sciweavers

405 search results - page 71 / 81
» Securing cognitive radio networks
Sort
View
CN
2010
120views more  CN 2010»
13 years 9 months ago
A survey on bio-inspired networking
The developments in the communication and networking technologies have yielded many existing and envisioned information network architectures such as cognitive radio networks, sen...
Falko Dressler, Özgür B. Akan
WCNC
2008
IEEE
14 years 3 months ago
An Analytical Performance Model of Opportunistic Spectrum Access in a Military Environment
— In an opportunistic spectrum sharing system, secondary users equipped with cognitive radios opportunistically access spectrum that is not being used by the primary users, i.e.,...
Shensheng Tang, Brian L. Mark
MOBIQUITOUS
2008
IEEE
14 years 3 months ago
Modeling of the channel-hopping anti-jamming defense in multi-radio wireless networks
Multi-radio (multi-interface, multi-channel) 802.11 and sensor networks have been proposed to increase network capacity and to reduce energy consumption, to name only a few of the...
Sherif M. Khattab, Daniel Mossé, Rami G. Me...
PERCOM
2006
ACM
14 years 8 months ago
Multi-channel Protocols for Group Key Agreement in Arbitrary Topologies
We consider group key agreement (GKA) protocols, used by a group of peers to establish a shared secret key for multicast communications. There has been much previous work to impro...
Ford-Long Wong, Frank Stajano
ADHOCNOW
2006
Springer
14 years 2 months ago
Improved Pairing Protocol for Bluetooth
Abstract. The Bluetooth wireless technology realizes a low-cost shortrange wireless voice- and data-connection through radio propagation. Bluetooth also has a security architecture...
Dave Singelée, Bart Preneel