bbabanner.jpg

Filter by

HyberLoc: Providing physical layer location privacy in hybrid sensor networks

In many hybrid wireless sensor networks' applications, sensor nodes are deployed in hostile environments where trusted and un-trusted nodes co-exist. In anchor-based hybrid networks, it becomes important to allow trusted nodes to gain full access to the location information transmitted in beacon frames while, at the same time, prevent un-trusted nodes from using this information. The main

Software and Communications

Adaptive linearly constrained minimum variance beamforming for multiuser cooperative relaying using the kalman filter

In this paper, we consider a wireless communication scenario with multiple source-destination pairs communicating through several cooperative amplify-and-forward relay terminals. The relays are equipped with multiple antennas that receive the source signals and transmit them to the destination nodes. We develop two iterative relay beamforming algorithms that can be applied in real-time. In both

Software and Communications

CellSense: A probabilistic RSSI-based GSM positioning system

Context-aware applications have been gaining huge interest in the last few years. With cell phones becoming ubiquitous computing devices, cell phone localization has become an important research problem. In this paper, we present CellSense, a probabilistic RSSI-based fingerprinting location determination system for GSM phones.We discuss the challenges of implementing a probabilistic fingerprinting

Software and Communications

Hidden anchor: A lightweight approach for physical layer location privacy

In hybrid wireless sensor networks, where trusted and un-trusted nodes coexist, it becomes important to allow trusted nodes to share information, especially, location information and prevent un-trusted nodes from gaining access to this information. We focus on anchor-based localization algorithms in WSNs, where a small set of specialized nodes, that is, anchor nodes, broadcast their location to

Software and Communications

Throughput maximization over temporally correlated fading channels in cognitive radio networks

We consider a primary link and a secondary link, each composed of a transmitter and a receiver. The primary channel and the channel between the secondary transmitter and the primary receiver follow a first-order Markov model for channel variation over time. Under this assumption of temporal correlation and via exploiting the channel state information (CSI) feedback, we pose the cognitive power

Software and Communications

An achievable rate region for a primary network shared by a secondary link

We consider a multiple access primary network with N transmitters. A secondary link of one transmitter and a corresponding receiver causes interference to the primary network. An achievable rate region for the primary network and the secondary link is obtained given the following mode of operation. The secondary transmitter employs rate-splitting so that the primary receiver can decode part of the

Circuit Theory and Applications
Software and Communications

On the deterministic multicast capacity of bidirectional relay networks

In this paper, we completely characterize the deterministic multicast capacity region of the symmetric two-pair bidirectional half duplex relay network with private messages. Towards this end, we first develop a new upper bound on the deterministic capacity region, based on the notion of a one-sided genie. We then proceed to construct novel detour schemes that achieve the upper bound by routing

Software and Communications

Proactive resource allocation: Turning predictable behavior into spectral gain

This paper introduces the novel concept of proactive resource allocation in which the predictability of user behavior is exploited to balance the wireless traffic over time, and hence, significantly reduce the bandwidth required to achieve a given blocking/outage probability. We start with a simple model in which the smart wireless devices are assumed to predict the arrival of new requests and

Software and Communications

Propagation modeling for accurate indoor WLAN RSS-based localization

WLAN RSS-based localization has been a hot research topic for the last years. To obtain high accuracy in the noisy wireless channel, WLAN location determination systems usually use a calibration phase, where a radio map, capturing the signal strength signatures at different locations in the area of interest, is built. The radio map construction process takes a lot of time and effort, reducing the

Software and Communications

Time-based demand-constrained cross-layer resource allocation for wireless networks

Efficient resource allocation is a critical component in multi-user QoS communications and high speed networks. In this paper, we devise a new mathematical model for the resource allocation problem that takes into account the users' demands in a PHY-MAC cross-layer approach. Incorporating the time axis in our model, the target is to maximize the number of bits transmitted in a given frame rather

Software and Communications