David J. Thuente

Learn More
The development of software for minimization problems is often based on a line search method. We consider line search methods that satisfy sufficient decrease and curvature conditions, and formulate the problem of determining a point that satisfies these two conditions in terms of finding a point in a set <italic>T(&#956;)</italic>. We describe a search(More)
It has long been recognized that complete jamming of wireless networks can be realized by generating continuous noise with sufficient power in the vicinity of the wireless network. There are many disadvantages of this approach including high energy requirements and a high probability of detection. The purpose of this paper is to show that similar jamming(More)
It has been shown that reservation based MAC protocols such as 802.11b DCF are susceptible to Intelligent Jamming wherein a protocol aware jammer can bring down the network throughput essentially to zero by using very limited energy, see [1]. We propose and analyze intelligent jamming techniques based on “misbehaving” MAC level access timings. An additional(More)
Total physical jamming in wireless networks can be realized by generating continuous high power noise in the vicinity of wireless receiver nodes. The purpose of this paper is to show, using OPNET simulations, that similar jamming effectiveness can be achieved with much lower total energy. In the first half of the paper, we study the effects of periodic(More)
Recently many channel hopping algorithms have been studied to guarantee rendezvous for Cognitive Radio Networks (CRNs). These algorithms propose rendezvous methods without using common control channels (CCCs) to avoid the limitations such as single point of failure, low scalability, and jamming attacks. In particular, the Jump-Stay based channel hopping(More)
It has long been recognized that complete jamming of wireless networks can be realized by generating continuous noise with sufficient power in the vicinity of the wireless network. Recent work has shown that for IEEE 802.11b similar jamming effectiveness can be achieved using “intelligent” or protocol specific techniques. These techniques support jamming(More)
The accuracy of location information is critical for many applications of wireless sensor networks (WSN), especially those used in hostile environments where malicious adversaries can be present. Since it is impractical to have a GPS device on each sensor in WSN, most of the existing location discovery schemes can only be used in the trusted environment.(More)
This paper presents two solution techniques for constructing a minimal weighted tree connecting a fixed set of n terminal vertices while alluwing extra vertices to be added to the tree to reduce the cost or length of the connection. The problem discussed is a variation of the Steiner tree problem that reduces to the classical Steiner tree problem for many(More)