Sciweavers

2362 search results - page 14 / 473
» The wireless network jamming problem
Sort
View
INFOCOM
2009
IEEE
15 years 8 months ago
Capabilities of Low-Power Wireless Jammers
— In this paper, motivated by the goal of modeling the fine-grain capabilities of jammers for the context of security in low-power wireless networks, we experimentally character...
Lifeng Sang, Anish Arora
HYBRID
2009
Springer
15 years 8 months ago
Safe and Secure Networked Control Systems under Denial-of-Service Attacks
Abstract. We consider the problem of security constrained optimal control for discrete-time, linear dynamical systems in which control and measurement packets are transmitted over ...
Saurabh Amin, Alvaro A. Cárdenas, Shankar S...
WIMOB
2008
IEEE
15 years 8 months ago
An Enhanced Scheme to Defend against False-Endorsement-Based DoS Attacks in WSNs
— Node compromise is a serious threat in wireless sensor networks, as it enables an adversary to perform various attacks. Many security schemes exploit the redundancy of many wir...
Christoph Krauß, Markus Schneider, Claudia E...
103
Voted
ALGOSENSORS
2007
Springer
15 years 8 months ago
Local Approximation Algorithms for Scheduling Problems in Sensor Networks
Patrik Floréen, Petteri Kaski, Topi Musto, ...
ICRA
2009
IEEE
116views Robotics» more  ICRA 2009»
14 years 11 months ago
Multi-vehicle path coordination in support of communication
Abstract-- This paper presents a framework for generating time-optimal velocity profiles for a group of pathconstrained vehicle robots that have fixed and known initial and goal lo...
Pramod Abichandani, Hande Y. Benson, Moshe Kam