Silvija Kokalj-Filipovic

Learn More
This paper studies source location anonymity in a large monitoring wireless sensor network with a single data collector, and under a global attack. The qualifier ”global” indicates the capability of the eavesdropper (attacker) to capture all network transmissions, and to discern their time and location. We propose a scheme for generating fake(More)
The number of doped packets can be surprisingly small when employed with an Ideal Soliton code degree distribution and, hence, the doping strategy may have the least collection delay when the density of source nodes is sufficiently large. Furthermore , we demonstrate that network coding makes dissemination more efficient at the expense of a larger(More)
We analyze the benefits of an automatic repeat- request (ARQ) scheme employed in doped belief-propagation decoding for increasing the throughput of fountain encoded data transmissions. The proposed doping mechanism selects doping symbols randomly from the set of input symbols contributing to degree-two output symbols. Here an output symbol is the encoded(More)
This paper studies decentralized strategies for facilitating data collection in circular wireless sensor networks, which rely on the stochastic diversity of data storage. The goal is to allow for a reduced delay collection by a mobile data collector (MDC) who accesses the network at a random position and random time. We consider a two-phase data collection:(More)
We propose a compression/transmission scheme that allows the quality of the reconstructed signal to gracefully degrade as the channel quality drops, as well as steadily improve with the channel improvement. The main idea is to partition the channel and/or network resources into m units (e.g., sub-bands, packets) and compress the source independently m times(More)
— We describe three in-field data collection efforts yielding a large database of RSSI values vs. time or distance from vehicles communicating with each other via DSRC. We show several data processing schemes we have devised to develop Vehicle-to-Vehicle (V2V) propagation models from such data. The database is limited in several important ways, not least,(More)
We propose a method for estimating channel parameters from RSSI measurements and the lost packet count, which can work in the presence of losses due to both interference and signal attenuation below the noise floor. This is especially important in the wireless networks, such as vehicular, where propagation model changes with the density of nodes. The method(More)
For wireless sensor networks with many location- unaware nodes, we investigate a protocol, dubbed BeSpoken, that steers data transmissions along a straight path called a spoke. The protocol directs data transmissions by randomly selecting relays to retransmit data packets from crescent-shaped areas along the spoke axis. The resulting random walk of the(More)
For wireless sensor networks with many location-unaware nodes, we investigate a protocol, dubbed BeSpoken, that steers data transmissions along a straight path called a spoke. The protocol directs data transmissions by randomly selecting relays to retransmit data packets from crescent-shaped areas along the spoke axis. The packet retransmission by the(More)