A survey on over-the-air computation
Communication and computation are often viewed as separate tasks. This approach is very
effective from the perspective of engineering as isolated optimizations can be performed …
effective from the perspective of engineering as isolated optimizations can be performed …
Modern WLAN fingerprinting indoor positioning methods and deployment challenges
Wireless local area networks (WLANs) have become a promising choice for indoor
positioning as the only existing and established infrastructure, to localize the mobile and …
positioning as the only existing and established infrastructure, to localize the mobile and …
Sensor network security: a survey
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …
collect, and disseminate information in many types of applications. As sensor networks …
Location, localization, and localizability
Location-aware technology spawns numerous unforeseen pervasive applications in a wide
range of living, production, commence, and public services. This article provides an …
range of living, production, commence, and public services. This article provides an …
[PDF][PDF] Challenges in securing vehicular networks
In the near future, most new vehicles will be equipped with shortrange radios capable of
communicating with other vehicles or with highway infrastructure at distances of at least one …
communicating with other vehicles or with highway infrastructure at distances of at least one …
Security in wireless sensor networks
Recent advances in electronics and wireless communication technologies have enabled the
development of large-scale wireless sensor networks that consist of many low-power, low …
development of large-scale wireless sensor networks that consist of many low-power, low …
Pycra: Physical challenge-response authentication for active sensors under spoofing attacks
Embedded sensing systems are pervasively used in life-and security-critical systems such
as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms …
as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms …
Secure positioning in wireless networks
So far, the problem of positioning in wireless networks has been studied mainly in a
nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to …
nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to …
Location-based compromise-tolerant security mechanisms for wireless sensor networks
Node compromise is a serious threat to wireless sensor networks deployed in unattended
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …
Intrusion detection techniques in mobile ad hoc and wireless sensor networks
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of
applications. However, they are often deployed in potentially adverse or even hostile …
applications. However, they are often deployed in potentially adverse or even hostile …