The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Spectrum Sensing is a crucial issue in Cognitive radio so that the secondary users are able to access the un-allocated, or temporarily available spectrum holes without interfering with the Primary user. Energy detection (ED) is one of common spectrum sensing techniques in Cognitive Radio. In this paper, an analytical forms are derived for both the detection and false alarm probabilities, using the...
In wireless communications, cooperative relaying is well-known to enhance the overall system performance, but implementation and cost constraints stand against its wide deployment. This paper investigates the performance of cooperative relays with and without multiple antennas under independent and identically distributed (i.i.d.) Weibull faded channels in a two-hop wireless network. We consider the...
Wireless sensor networks is a voracious field for research, especially after the great advances in MEMS based sensors. In this paper, environmental monitoring applications are considered where data may be continuously reported with the possibility of urgent alarming if necessary. Hierarchical architecture of the network is assumed in order to overcome the problem of energy constrained sensors. Two...
Ad hoc networks can be rapidly deployed and reconfigured. Hence, they are very appealing as they can be tailored to lots of applications. Due to their features they are vulnerable to attacks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack a malicious node captures packets from one location in the network,...
Ubiquitous computing is increasingly introduced in our daily life. An emerging application is environmental monitoring in urban areas. Data gathering in such wireless sensor networks can be performed by using uncontrolled mobile sinks besides the fixed sinks in order to reduce the transmission energy. This method can be highly inefficient as the notification of presence by the mobile sink is not guaranteed...
Mobile Ad hoc Networks (MANETs) have lots of applications. Due to the features of open medium, absence of infrastructure, dynamic changing network topology, cooperative algorithms, lack of centralized monitoring and management point, resource constraints and lack of a clear line of defense, these networks are vulnerable to attacks. A vital problem that must be solved in order to realize these applications...
The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing these networks. There is a natural incentive for nodes to only consume, but not contribute to the services of the system. Intentional misbehavior can aim at an advantage for the misbehaving node or just constitute vandalism, such as enabling a malicious node to mount an attack or a selfish node to save...
The dynamic and cooperative nature of ad hoc networks presents substantial challenges in securing and detecting attacks in these networks. A particularly severe security attack, called the wormhole attack, has been introduced in the context of ad-hoc networks. During the attack, a malicious node captures packets from one location in the network, and tunnels them to another malicious node at a distant...
The dynamic and cooperative nature of ad hoc networks present challenges in securing these networks. There are recent research efforts in securing ad hoc networks. Amongst security approaches, there are threshold cryptography and authentication. In this paper we survey the threshold cryptography based schemes and the authentication schemes that have been proposed to secure ad hoc networks. We conclude...
Ad hoc networks have many features that make them attractive for the use in many applications. However, there are many unsolved problems in ad hoc networks; securing the network being one of the major concerns. The dynamic and cooperative nature of ad hoc networks present substantial challenges in securing these networks. In this paper, we focus on the role of Certification Authorities (CAs) in securing...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.