Abstract-- We consider the problem of identifying insiderbased attacks in the form of jammers in multi-channel wireless networks, where jammers have the inside knowledge of frequen...
We propose the cross-layer based opportunistic multi-channel medium access control (MAC) protocols, which integrate the spectrum sensing at physical (PHY) layer with the packet sch...
Smart phones can collect and share Bluetooth co-location traces to identify ad hoc or semi-permanent social groups. This information, known to group members but otherwise unavailab...
Steve Mardenfeld, Daniel Boston, Susan Juan Pan, Q...