The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Jamming may be a serious issue in Internet of Things networks with battery-powered nodes, as an attacker can not only disrupt packet delivery, but also reduce the lifetime of energy-constrained nodes. In this work, we consider a malicious attacker with the dual objective of preventing communication and depleting the battery of a targeted node. We model this scenario as a multistage game, derive optimal...
A prime source of collisions in underwater acoustic communication networks (UWANs) is the so called near-far effect, where a node located farther from the receiver is jammed by a closer node. While common practice considers such situation as a challenge, in this paper we consider it as a resource, and use it to increase network throughput of spatial reuse time-division multiple access. We propose...
We propose an analytical framework to study broadcasting performance in multi channel wireless networks in the presence of adversary attacks. In order to reduce the effect of such attacks on the dissemination performance we use network coding and show that it can bring significant benefits to the broadcasting process. We investigate the impact that different medium access, transmission schemes and...
In this paper we address the problem of neighbor discovery in cognitive radio networks. Cognitive radios operate in a particularly challenging wireless environment. In such an environment, besides the strict requirements imposed by the opportunistic co-existence with licensed users, cognitive radios may have to deal with other concurrent (either malicious or selfish) cognitive radios which aim at...
Cognitive radios operate in a particularly challenging wireless environment. Besides the strict requirements imposed by opportunistic coexistence with licensed users, cognitive radios may have to deal with other concurrent (either malicious or selfish) cognitive radios that aim at gaining access to the available spectrum resources with no regard to fairness or other behavioral etiquettes. By taking...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.