Wireless multi-hop networks are particularly susceptible to attacks based on flooding and the interception, tampering with, and forging of packets. Thus, reliable communication in...
We present a system in which a cell phone decides whether to ring by accepting votes from the others in a conversation with the called party. When a call comes in, the phone first...
—The plethora of applications for Wireless Sensor Networks (WSN) has experienced significant growth in recent years. Every application has a different set of requirements and it ...
Berta Carballido Villaverde, Susan Rea, Dirk Pesch
Cooperation among wireless nodes has been recently proposed for improving the physical layer (PHY) security of wireless transmission in the presence of multiple eavesdroppers. Whil...
—In this paper the autocorrelation properties of shadow fading and angle spread at both the base station (BS) and at the mobile station (MS) are analyzed using urban macro cellul...