It has been proved that Asymmetric cryptography can be used in Wireless Sensor networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery ...
详细信息
Efficient utilization of spectral bands in a dynamic environment with a continuously changing occupation rate is challenging. Static spectral allocations preclude the use of unoccupied spectrum, unless the spectrum ma...
详细信息
ISBN:
(纸本)9781467300810
Efficient utilization of spectral bands in a dynamic environment with a continuously changing occupation rate is challenging. Static spectral allocations preclude the use of unoccupied spectrum, unless the spectrum manager has released the allocation to another mission. Standard spectral sensing techniques employ swept narrowband receivers. While effective in creating a composite, these techniques are ineffective at identifying short duration signals. Real-time spectral analysis techniques are effective at capturing short duration transmissions, but usually have narrow band capabilities, limited dynamic range and are relatively expensive. Timely accurate sensing of wide spectral band using traditional spectral estimations at the Nyquist rate (or higher) is another challenge due to the high data rate. Compressed sensing (CS) techniques utilize signal-to-information rate processing when signals are sparse in a specific domain. Dynamic spectrum access (often considered a critical component of a cognitive radio (CR)) can reutilize temporally unoccupied spectrum. An accurate estimate of the current state of spectral occupancy is critical to the autonomous decision processes involved in dynamic spectrum access. From this perspective, CS is being studied as an enhancement to dynamic spectrum access strategies. This study addresses feasibility issues for the development of autonomous CS-CR systems that are capable of performing spectrum sensing and recovery without a priori information about the spectral occupancy. Since recovery requires computationally intense non-linear optimization, we perform a single platform trade study on CS methodologies (BP-PD, BP-SPG, ROMP, Edge Detection, and Sequential Recovery) for efficient wideband recovery relative to execution time and reconstruction error. We propose adaptive coarse detection, and exact recovery based on adaptive edge detection. We present the results using continuous waves and pulses (MATlab or GRC generated, or USRP mea
Content sharing is one of the most significant issues of Digital Rights Management (abbr. DRM). Various schemes for content sharing have been presented in the past years. However, the main goals of these schemes are t...
详细信息
作者:
Luo, BinGuo, HongCREAM Group
State Key Lab. of Advanced Optical Communication Systems and Networks Inst. of Quantum Electronics School of Electronics Engineering and Computer Science Peking University Beijing 100871 China
A-type atom coupled by additional driving light and radio frequency (RF) field can generate controllable simultaneous slow and fast light at two frequencies. Distortions by radiative dampings are discussed and compens...
详细信息
We investigate link-state advertising in multi-domain networks with dynamic traffic. A novel triggering scheme is proposed to monitor a subset of domain links, and thereby achieve a balance between salability and accu...
详细信息
The thesis also puts forward a fast handoff method based on RSSI and LQI, which makes improvements on preset parameters, subnet selection, decision standards and reparation of switching failure. The new method which c...
详细信息
In wireless networks, the cross-layer design of joint medium access control and network coding can avoid destructive interferences among concurrent transmissions. Wireless network codes in conjunction with conflict-fr...
详细信息
Code injection attack is a major way of spreading malware on network. The key section of code injection attack is a small piece of code, called shellcode, which performs unauthorized operations when it is injected int...
详细信息
Among several techniques proposed for indoor positioning using IEEE 802.11 Wireless Fidelity (Wi-Fi) based networks, those that rely on fingerprinting have been demonstrated to outperform those based on lateration, an...
详细信息
Among several techniques proposed for indoor positioning using IEEE 802.11 Wireless Fidelity (Wi-Fi) based networks, those that rely on fingerprinting have been demonstrated to outperform those based on lateration, angulation, and cell of origin in terms of accuracy. We compare and evaluate three Wi-Fi fingerprinting techniques that use the K-Nearest Neighbor (k-NN), Naive Bayes Classifier (NBC) and Support Vector Machine (SVM) algorithms. Our experiments show that SVM-based fingerprinting outperformed both k-NN and NBC-based fingerprinting, achieving accuracies of 2 meters or better within our testbed.
Multi-level marketing is a marketing approach that motivates its participants to promote a certain product among their friends. The popularity of this approach increases due to the accessibility of modern social netwo...
详细信息
暂无评论