A survey on over-the-air computation

A Şahin, R Yang - IEEE Communications Surveys & Tutorials, 2023‏ - ieeexplore.ieee.org
Communication and computation are often viewed as separate tasks. This approach is very
effective from the perspective of engineering as isolated optimizations can be performed …

Modern WLAN fingerprinting indoor positioning methods and deployment challenges

A Khalajmehrabadi, N Gatsis… - … Surveys & Tutorials, 2017‏ - ieeexplore.ieee.org
Wireless local area networks (WLANs) have become a promising choice for indoor
positioning as the only existing and established infrastructure, to localize the mobile and …

Sensor network security: a survey

X Chen, K Makki, K Yen… - … surveys & tutorials, 2009‏ - ieeexplore.ieee.org
Wireless sensor networks (WSNs) use small nodes with constrained capabilities to sense,
collect, and disseminate information in many types of applications. As sensor networks …

Location, localization, and localizability

Y Liu, Z Yang, X Wang, L Jian - Journal of computer science and …, 2010‏ - Springer
Location-aware technology spawns numerous unforeseen pervasive applications in a wide
range of living, production, commence, and public services. This article provides an …

[PDF][PDF] Challenges in securing vehicular networks

B Parno, A Perrig - Workshop on hot topics in networks …, 2005‏ - conferences.sigcomm.org
In the near future, most new vehicles will be equipped with shortrange radios capable of
communicating with other vehicles or with highway infrastructure at distances of at least one …

Security in wireless sensor networks

X Du, HH Chen - IEEE Wireless Communications, 2008‏ - ieeexplore.ieee.org
Recent advances in electronics and wireless communication technologies have enabled the
development of large-scale wireless sensor networks that consist of many low-power, low …

Pycra: Physical challenge-response authentication for active sensors under spoofing attacks

Y Shoukry, P Martin, Y Yona, S Diggavi… - Proceedings of the 22nd …, 2015‏ - dl.acm.org
Embedded sensing systems are pervasively used in life-and security-critical systems such
as those found in airplanes, automobiles, and healthcare. Traditional security mechanisms …

Secure positioning in wireless networks

S Capkun, JP Hubaux - IEEE Journal on Selected Areas in …, 2006‏ - ieeexplore.ieee.org
So far, the problem of positioning in wireless networks has been studied mainly in a
nonadversarial setting. In this paper, we analyze the resistance of positioning techniques to …

Location-based compromise-tolerant security mechanisms for wireless sensor networks

Y Zhang, W Liu, W Lou, Y Fang - IEEE Journal on selected …, 2006‏ - ieeexplore.ieee.org
Node compromise is a serious threat to wireless sensor networks deployed in unattended
and hostile environments. To mitigate the impact of compromised nodes, we propose a suite …

Intrusion detection techniques in mobile ad hoc and wireless sensor networks

B Sun, L Osborne, Y **ao… - IEEE Wireless …, 2007‏ - ieeexplore.ieee.org
Mobile ad hoc networks and wireless sensor networks have promised a wide variety of
applications. However, they are often deployed in potentially adverse or even hostile …