Learn More
Security-sensitive applications, such as patient health monitoring and credit card transactions, are increasingly utilizing wireless communication systems, RFIDs, wireless sensor networks, and other wireless communication systems. The use of interference-emitting jammers to protect these sensitive communications has been recently explored in the literature,(More)
A key component for safety applications in Vehicular ad-hoc network (VANET) is the use of periodic beacon messages which provide vehicles with a real-time vehicle proximity map of their surroundings. Based on this map, safety applications can be used for accident prevention by informing drivers about evolving hazardous situations. In order to allow(More)
In this paper we present the Distributed Construct Underlying Topology (D-CUT) algorithm, a self-organized algorithm aim to provide efficient, and reliable hierarchical topology by minimizing the interference between network participants. The D-CUT algorithm produces a geographically optimized clustering of the network, by grouping dense and consecutive(More)
  • 1