The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper explores reliable data fusion in mobile access wireless sensor networks under Byzantine attacks. We consider the q-out-of-m rule, which is popular in distributed detection and can achieve a good tradeoff between the miss detection probability and the false alarm rate. However, a major limitation with it is that the optimal scheme parameters can only be obtained through exhaustive search,...
This paper considers architecture design of mobile access coordinated wireless sensor networks (MC-WSN) for reliable and efficient information exchange. In sensor networks with mobile access points (SENMA), the mobile access points collect information directly from individual sensors as they traverse the network, such that no routing is needed in data transmission. While being energy efficient, a...
With the growing number of wireless network standards operating in the unlicensed frequency band and the military moving toward commercial off the shelf technology, the next generation of wireless sensor networks must be robust against unintentional and hostile interference. One method that has gained interest to cope with the increased spectrum use and to combat the interference vulnerability in...
In this paper, Byzantine attacks in wireless sensor networks with mobile access (SENMA) points is considered, where a portion of the active sensors are compromised to send false information. One effective method to combat with Byzantine attacks is the q-out-of-m scheme, where the sensing decision is based on q sensing reports out of m polled nodes. In this paper, first, by exploiting the approximately...
Quasi-orthogonal space-time block codes with orthogonal frequency division multiplexing (QO-STBC-OFDM) can exploit multipath diversity and achieve spectrally efficient communications. However, future wireless communication systems must be robust against both unintentional and intentional interference. As a result, there is a need for proper analytical tools to assess the performance of QO-STBC-OFDM...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.