Sciweavers

38 search results - page 6 / 8
» jam 2010
Sort
View
JSAC
2010
170views more  JSAC 2010»
13 years 2 months ago
Anti-jamming broadcast communication using uncoordinated spread spectrum techniques
Jamming-resistant communication is crucial for safety-critical applications such as emergency alert broadcasts or the dissemination of navigation signals in adversarial settings. I...
Christina Pöpper, Mario Strasser, Srdjan Capk...
WISEC
2010
ACM
14 years 1 months ago
Zeroing-in on network metric minima for sink location determination
The locations of base stations are critically important to the viability of wireless sensor networks. In this paper, we examine the location privacy problem from both the attack a...
Zhenhua Liu, Wenyuan Xu
WWIC
2010
Springer
278views Communications» more  WWIC 2010»
13 years 11 months ago
Anomaly-Based Intrusion Detection Algorithms for Wireless Networks
Abstract. In this paper we present and evaluate anomaly-based intrusion detection algorithms for detecting physical layer jamming attacks in wireless networks, by seeking changes i...
Alexandros G. Fragkiadakis, Vasilios A. Siris, Nik...
ICASSP
2010
IEEE
13 years 7 months ago
Multiple frequency-hopping signal estimation via sparse regression
Frequency hopping (FH) signals have well-documented merits for commercial and military applications due to their near-far resistance and robustness to jamming. Estimating FH signa...
Daniele Angelosante, Georgios B. Giannakis, Nichol...
CORR
2010
Springer
119views Education» more  CORR 2010»
13 years 7 months ago
Ergodic Secret Alignment
In this paper, we provide a new achievable ergodic secrecy rate region for the multiple access wiretap channel in fading. Our achievable scheme is based on repeating each symbol at...
Raef Bassily, Sennur Ulukus