Sciweavers

COMSUR
2011
251views Hardware» more  COMSUR 2011»
12 years 7 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...
TIT
2008
92views more  TIT 2008»
13 years 7 months ago
Capacity of Ultra-Wideband Power-Constrained Ad Hoc Networks
In this correspondence, we show that the uniform throughput capacity of an ultra-wideband (UWB) power-constrained ad hoc network is given by 2(P ( n=logn) ), where P is the per-nod...
Xiaojun Tang, Yingbo Hua
OPODIS
2004
13 years 8 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
IROS
2009
IEEE
127views Robotics» more  IROS 2009»
14 years 2 months ago
Experimental characterization of radio signal propagation in indoor environments with application to estimation and control
— We study radio signal propagation in indoor environments using low-power devices leveraging the Zigbee and Bluetooth specifications. We present results from experiments where ...
Jonathan Fink, Nathan Michael, Aleksandr Kushleyev...