Sciweavers

738 search results - page 122 / 148
» Security considerations in ad hoc sensor networks
Sort
View
GLOBECOM
2007
IEEE
14 years 11 months ago
Hardware-Constrained Multi-Channel Cognitive MAC
—Open spectrum systems allow unlicensed secondary users equipped with cognitive radio to opportunistically access the spectrum underutilized by primary users. Cognitive radio has...
Juncheng Jia, Qian Zhang
CORR
2008
Springer
116views Education» more  CORR 2008»
14 years 9 months ago
Polynomial Filtering for Fast Convergence in Distributed Consensus
Abstract--In the past few years, the problem of distributed consensus has received a lot of attention, particularly in the framework of ad hoc sensor networks. Most methods propose...
Effrosini Kokiopoulou, Pascal Frossard
ICPPW
2006
IEEE
15 years 3 months ago
m-LPN: An Approach Towards a Dependable Trust Model for Pervasive Computing Applications
Trust, the fundamental basis of ‘cooperation’ – one of the most important characteristics for the performance of pervasive ad hoc network-- is under serious threat with the ...
Munirul M. Haque, Sheikh Iqbal Ahamed
ICASSP
2008
IEEE
15 years 4 months ago
Stability analysis of the consensus-based distributed LMS algorithm
We deal with consensus-based online estimation and tracking of (non-) stationary signals using ad hoc wireless sensor networks (WSNs). A distributed (D-) least-mean square (LMS) l...
Ioannis D. Schizas, Gonzalo Mateos, Georgios B. Gi...
93
Voted
ESAS
2007
Springer
15 years 3 months ago
ALGSICS - Combining Physics and Cryptography to Enhance Security and Privacy in RFID Systems
RFID-tags can be seen as a new generation of bar codes with added functionality. They are becoming very popular tools for identification of products in various applications such a...
Neil Bird, Claudine Conrado, Jorge Guajardo, Stefa...