Frequency Rendezvous and Physical Layer Network Coding for Distributed Wireless Networks

[1]  Honggang Zhang,et al.  Achievements and the Road Ahead: The First Decade of Cognitive Radio , 2010, IEEE Trans. Veh. Technol..

[2]  Kin K. Leung,et al.  Achievable Rates for Network Coding on the Exchange Channel , 2007, MILCOM 2007 - IEEE Military Communications Conference.

[3]  Jing Wang,et al.  Distributed wireless communication system: a new architecture for future public wireless access , 2003, IEEE Commun. Mag..

[4]  Alexander M. Wyglinski,et al.  A frequency rendezvous approach for decentralized dynamic spectrum access networks , 2009, 2009 4th International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[5]  Linda Doyle,et al.  Cognitive radio: value creation and value migration , 2006 .

[6]  Sencun Zhu,et al.  Attack-resilient time synchronization for wireless sensor networks , 2007, Ad Hoc Networks.

[7]  Samuel Cheng,et al.  Wireless full-duplex communications based on network coding , 2007 .

[8]  R. Ercole Innovation, spectrum regulation, and DySPAN technologies access to markets , 2005, First IEEE International Symposium on New Frontiers in Dynamic Spectrum Access Networks, 2005. DySPAN 2005..

[9]  Levente Buttyán,et al.  Statistical Wormhole Detection in Sensor Networks , 2005, ESAS.

[10]  Joseph Mitola,et al.  Cognitive radio: making software radios more personal , 1999, IEEE Wirel. Commun..

[11]  Bruno O. Shubert,et al.  Random variables and stochastic processes , 1979 .

[12]  Yih-Chun Hu,et al.  Wormhole attacks in wireless networks , 2006, IEEE Journal on Selected Areas in Communications.

[13]  L.A. DaSilva,et al.  Sequence-Based Rendezvous for Dynamic Spectrum Access , 2008, 2008 3rd IEEE Symposium on New Frontiers in Dynamic Spectrum Access Networks.

[14]  Damla Turgut,et al.  Performance Analysis of Link Rendezvous Protocol for Cognitive Radio Networks , 2007, 2007 2nd International Conference on Cognitive Radio Oriented Wireless Networks and Communications.

[15]  Feniosky Peña-Mora,et al.  Robust Mobile Ad Hoc Space for Collaboration to Support Disaster Relief Efforts Involving Critical Physical Infrastructure , 2006 .

[16]  Lijun Qian,et al.  Detection of wormhole attacks in multi-path routed wireless ad hoc networks: A statistical analysis approach , 2007, J. Netw. Comput. Appl..

[17]  Tao Cui,et al.  Some results on relay strategies for memoryless two-way relay channels , 2008, 2008 Information Theory and Applications Workshop.

[18]  Chee-Yee Chong,et al.  Sensor networks: evolution, opportunities, and challenges , 2003, Proc. IEEE.

[19]  Xia Wang,et al.  An End-to-end Detection of Wormhole Attack in Wireless Ad-hoc Networks , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[20]  Ian F. Akyildiz,et al.  Sensor Networks , 2002, Encyclopedia of GIS.

[21]  Steven A. Borbash,et al.  Birthday protocols for low energy deployment and flexible neighbor discovery in ad hoc wireless networks , 2001, MobiHoc '01.

[22]  Radha Poovendran,et al.  A graph theoretic framework for preventing the wormhole attack in wireless ad hoc networks , 2007, Wirel. Networks.

[23]  Michalis Faloutsos,et al.  TrueLink: A Practical Countermeasure to the Wormhole Attack in Wireless Networks , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.

[24]  Lili Qiu,et al.  Impact of Interference on Multi-Hop Wireless Network Performance , 2003, MobiCom '03.

[25]  Kay Römer Time synchronization in ad hoc networks , 2001, MobiHoc '01.

[26]  Issa M. Khalil,et al.  LiteWorp: Detection and isolation of the wormhole attack in static multihop wireless networks , 2007, Comput. Networks.

[27]  Chong Luo,et al.  Natural Network Coding in Multi-Hop Wireless Networks , 2008, 2008 IEEE International Conference on Communications.

[28]  Bharat K. Bhargava,et al.  Visualization of wormholes in sensor networks , 2004, WiSe '04.

[29]  Milind M. Buddhikot,et al.  DIMSUMnet: new directions in wireless networking using coordinated dynamic spectrum , 2005, Sixth IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks.

[30]  Ian F. Akyildiz,et al.  NeXt generation/dynamic spectrum access/cognitive radio wireless networks: A survey , 2006, Comput. Networks.

[31]  N. Otsu A threshold selection method from gray level histograms , 1979 .

[32]  Soung Chang Liew,et al.  Hot topic: physical-layer network coding , 2006, MobiCom '06.

[33]  Rabia Latif,et al.  Hardware-Based Random Number Generation in Wireless Sensor Networks(WSNs) , 2009, ISA.

[34]  Srdjan Capkun,et al.  SECTOR: secure tracking of node encounters in multi-hop wireless networks , 2003, SASN '03.

[35]  Danijela Cabric,et al.  White paper: Corvus: A cognitive radio approach for usage of virtual unlicensed spectrum , 2004 .

[36]  Kamal Jain,et al.  Signatures for Network Coding , 2006 .

[37]  Jie Gao,et al.  Detecting Wormhole Attacks in Wireless Networks Using Connectivity Information , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.

[38]  Kwang-Cheng Chen,et al.  Distribution of the Node Degree for Wireless Ad Hoc Networks in Shadow Fading Environments , 2007, IEICE Trans. Commun..

[39]  Yi Wang,et al.  Conceptual platform of distributed wireless communication system , 2002, Vehicular Technology Conference. IEEE 55th Vehicular Technology Conference. VTC Spring 2002 (Cat. No.02CH37367).

[40]  Saurabh Bagchi,et al.  MobiWorp: Mitigation of the wormhole attack in mobile multihop wireless networks , 2008, Ad Hoc Networks.

[41]  Brian M. Sadler,et al.  A Survey of Dynamic Spectrum Access , 2007, IEEE Signal Processing Magazine.

[42]  Sachin Katti,et al.  Embracing wireless interference: analog network coding , 2007, SIGCOMM.

[43]  Yoichi Shinoda,et al.  A Node's Number of Neighbors in Wireless Mobile Ad Hoc Networks: A Statistical View , 2009, 2009 Eighth International Conference on Networks.

[44]  Aura Ganz,et al.  IEEE 802.16 based last mile broadband wireless military networks with quality of service support , 2003, IEEE Military Communications Conference, 2003. MILCOM 2003..

[45]  Shilpa Achaliya,et al.  Cognitive radio , 2010 .

[46]  Ian F. Akyildiz,et al.  Wireless sensor networks: a survey , 2002, Comput. Networks.

[47]  Theodore S. Rappaport,et al.  Wireless communications - principles and practice , 1996 .

[48]  Simon Haykin,et al.  Cognitive radio: brain-empowered wireless communications , 2005, IEEE Journal on Selected Areas in Communications.

[49]  David Evans,et al.  Using Directional Antennas to Prevent Wormhole Attacks , 2004, NDSS.

[50]  Athanasios Papoulis,et al.  Probability, Random Variables and Stochastic Processes , 1965 .

[51]  Bharat K. Bhargava,et al.  Visualisation of wormholes in underwater sensor networks : a distributed approach , 1993 .

[52]  Matthew J. Zieniewicz,et al.  The Evolution of Army Wearable Computers , 2002, IEEE Pervasive Comput..

[53]  Alexander M. Wyglinski,et al.  An Analysis of Frequency Rendezvous for Decentralized Dynamic Spectrum Access , 2010, IEEE Transactions on Vehicular Technology.

[54]  Reza Curtmola,et al.  Practical defenses against pollution attacks in intra-flow network coding for wireless mesh networks , 2009, WiSec '09.