Sciweavers

808 search results - page 71 / 162
» Attack-Resistant Location Estimation in Wireless Sensor Netw...
Sort
View
ADHOCNOW
2007
Springer
15 years 4 months ago
Information Brokerage Via Location-Free Double Rulings
The in-network aggregation and processing of information is what sets a sensor network apart from a pure data acquisition device. One way to model the exchange of information betwe...
Stefan Funke, Imran Rauf
INFOCOM
2011
IEEE
14 years 1 months ago
Distinguishing locations across perimeters using wireless link measurements
—Perimeter distinction in a wireless network is the ability to distinguish locations belonging to different perimeters. It is complementary to existing localization techniques. A...
Junxing Zhang, Sneha Kumar Kasera, Neal Patwari, P...
NETWORKING
2011
14 years 20 days ago
The Problem of Sensing Unused Cellular Spectrum
Abstract. Sensing mechanisms that estimate the occupancy of wireless spectrum are crucial to the success of approaches based on Dynamic Spectrum Access. In this paper, we present k...
Daniel Willkomm, Sridhar Machiraju, Jean Bolot, Ad...
TMC
2008
83views more  TMC 2008»
14 years 9 months ago
Secure Location Verification with Hidden and Mobile Base Stations
In this work, we propose and analyse a new approach for securing localization and location verification in wireless networks based on hidden and mobile base stations. Our approach ...
Srdjan Capkun, Kasper Bonne Rasmussen, Mario Cagal...
AUTOMATICA
2006
140views more  AUTOMATICA 2006»
14 years 10 months ago
On a stochastic sensor selection algorithm with applications in sensor scheduling and sensor coverage
In this note we consider the following problem. Suppose a set of sensors is jointly trying to estimate a process. One sensor takes a measurement at every time step and the measure...
Vijay Gupta, Timothy H. Chung, Babak Hassibi, Rich...