Sciweavers

38 search results - page 4 / 8
» jam 2010
Sort
View
EJC
2010
13 years 7 months ago
Geometric properties of Assur graphs
In our previous paper, we presented the combinatorial theory for minimal isostatic pinned frameworks - Assur graphs - which arise in the analysis of mechanical linkages. In this p...
Brigitte Servatius, Offer Shai, Walter Whiteley
GLOBECOM
2010
IEEE
13 years 5 months ago
Identifying Insider-Based Jammers in Multi-Channel Wireless Networks
Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
Hoang Nguyen, Thadpong Pongthawornkamol, Klara Nah...
PODC
2010
ACM
13 years 11 months ago
Brief announcement: towards robust medium access in multi-hop networks
This paper introduces the distributed MAC protocol Jade. We consider a multi-hop wireless network with a single communication channel in which a powerful adversary is able to jam ...
Andréa W. Richa, Jin Zhang, Christian Schei...
CORR
2010
Springer
133views Education» more  CORR 2010»
13 years 6 months ago
Robust Beamforming for Security in MIMO Wiretap Channels with Imperfect CSI
—In this paper, we investigate methods for reducing the likelihood that a message transmitted between two multiantenna nodes is intercepted by an undetected eavesdropper. In part...
Amitav Mukherjee, A. Lee Swindlehurst
TSP
2010
13 years 2 months ago
Improving wireless physical layer security via cooperating relays
Physical (PHY) layer security approaches for wireless communications can prevent eavesdropping without upper layer data encryption. However, they are hampered by wireless channel c...
Lun Dong, Zhu Han, Athina P. Petropulu, H. Vincent...