Sciweavers

COMSUR
2011
251views Hardware» more  COMSUR 2011»
12 years 11 months ago
Denial of Service Attacks in Wireless Networks: The Case of Jammers
—The shared nature of the medium in wireless networks makes it easy for an adversary to launch a Wireless Denial of Service (WDoS) attack. Recent studies, demonstrate that such a...
Konstantinos Pelechrinis, M. Iliofotou, Srikanth V...
TIT
2008
92views more  TIT 2008»
13 years 12 months ago
Capacity of Ultra-Wideband Power-Constrained Ad Hoc Networks
In this correspondence, we show that the uniform throughput capacity of an ultra-wideband (UWB) power-constrained ad hoc network is given by 2(P ( n=logn) ), where P is the per-nod...
Xiaojun Tang, Yingbo Hua
OPODIS
2004
14 years 1 months ago
Secure Location Verification Using Radio Broadcast
Secure location verification is a recently stated problem that has a number of practical applications. The problem requires a wireless sensor network to confirm that a potentially...
Adnan Vora, Mikhail Nesterenko
IROS
2009
IEEE
127views Robotics» more  IROS 2009»
14 years 6 months ago
Experimental characterization of radio signal propagation in indoor environments with application to estimation and control
— We study radio signal propagation in indoor environments using low-power devices leveraging the Zigbee and Bluetooth specifications. We present results from experiments where ...
Jonathan Fink, Nathan Michael, Aleksandr Kushleyev...