Learn More
Many sensor applications are being developed that require the location of wireless devices, and localization schemes have been developed to meet this need. However, as location-based services become more prevalent, the localization infrastructure will become the target of malicious attacks. These attacks will not be conventional security threats, but rather(More)
Although conventional cryptographic security mechanisms are essential to the overall problem of securing wireless networks, these techniques do not directly leverage the unique properties of the wireless domain to address security threats. The properties of the wireless medium are a powerful source of domain-specific information that can complement and(More)
We derive an outer bound for the secrecy capacity region of a class of one-sided interference channel. The transmitters are assumed to be trustworthy while the message is secure against the non-intended receiver. The outer bound is applied to a deterministic channel in which the outer bound is showed to be tight, and to a Gaussian one-sided interference(More)
For a multiple antenna Gaussian broadcast channel, we look for inputs that facilitate secret transmission between authorized communication parties in the presence of passive eavesdroppers. In this work, we assume all channel information is known at the transmitter. For the general multiple antenna system, we find that the problem of optimizing over Gaussian(More)
Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment, supplies and people in real time, but also provides efficient and accurate access to medical data for health professionals. However, the reality of RFID adoption in healthcare is far behind earlier expectation. This study reviews literature on the use(More)
Radio Frequency Identification (RFID) technology not only offers tracking capability to locate equipment and people in real time, but also provides efficient and accurate access to medical data for doctors and other health professionals. However, the reality of RFID adoption is far behind earlier expectation. This study reviews the literature on RFID(More)
Keywords: Complex event processing RFID Smart hospital Healthcare Surgery a b s t r a c t RFID technology has been examined in healthcare to support a variety of applications such as patient identification and monitoring, asset tracking, and patient–drug compliance. However, managing the large volume of RFID data and understanding them in the medical(More)
We investigate the achievable secrecy rate with Gaussian random codes when the main channel is an AWGN channel, while the eavesdropper's channel is Rayleigh fading with additive Gaussian noise. Several transmission strategies according to the main channel's relative channel gain are proposed and evaluated. We show that even if the main channel channel gain(More)