Learn More
Public Key Cryptography (PKC) has been the enabling technology underlying many security services and protocols in traditional networks such as the Internet. In the context of wireless sensor networks, elliptic curve cryptography (ECC), one of the most efficient types of PKC, is being investigated to provide PKC supportin sensor network applications so that(More)
Wireless sensor networks are considered ideal candidates for a widerange of applications, such as industry monitoring, data acquisitionin hazardous environments, and military operations. It is desirableand sometimes necessary to reprogram sensor nodes through wirelesslinks after deployment, due to, for example, the need of removingbugs and adding new(More)
I. INTRODUCTION Wireless communications is vulnerable to jamming attacks due to the shared use of wireless medium. A jammer can simply take advantage of a radio frequency (RF) device (e.g., a waveform generator) to transmit signals in the wireless channel. As a result, signals of the jammer and the sender collide at the receiver and the signal reception(More)
Many sensor network applications require sensors' locations to function correctly. Despite the recent advances, location discovery for sensor networks in <i>hostile environments</i> has been mostly overlooked. Most of the existing localization protocols for sensor networks are vulnerable in hostile environments. The security of location discovery can(More)
We propose a novel MIMO cooperation framework called the cache-induced opportunistic cooperative MIMO (Coop-MIMO) for video streaming in backhaul limited multicell MIMO networks. By caching a portion of the video files, the base stations (BSs) opportunistically employ Coop-MIMO transmission to achieve MIMO cooperation gain without expensive payload(More)
Broadcast authentication is a critical security service in wireless sensor networks. There are two general approaches for broadcast authentication in wireless sensor networks: digital signatures and &mu;TESLA-based techniques. However, both signature-based and &mu;TESLA-based broadcast authentication are vulnerable to Denial of Services (DoS) attacks: An(More)
UV-B-induced oxidative damage and the protective effect of exopolysaccharides (EPS) in Microcoleus vaginatus, a cyanobacterium isolated from desert crust, were investigated. After being irradiated with UV-B radiation, photosynthetic activity (Fv/Fm), cellular total carbohydrates, EPS and sucrose production of irradiated cells decreased, while reducing(More)
Along with the standardization of Web services composition language and the widespread acceptance of composition technologies, Web services composition is becoming an efficient and cost-effective way to develop modern business applications. As Web services are inherently unreliable, how to deliver reliable Web services composition over unreliable Web(More)
The general MIMO interference network is considered and is named the B-MAC Network, for it is a combination of multiple interfering broadcast channels and multiaccess channels. Included as special cases are interference channels, X channels, X networks, and most practical wireless networks. The optimization of this important class of networks has been(More)
We propose a hierarchical interference mitigation scheme for massive MIMO cellular networks. The MIMO precoder at each base station (BS) is partitioned into an inner precoder and an outer precoder. The inner precoder controls the intra-cell interference and is adaptive to local channel state information (CSI) at each BS (CSIT). The outer precoder controls(More)