![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Reference Work Entry In depth
Long-Term Quality of Protection
-
Reference Work Entry In depth
Pilot Spoofing Attack
-
Book
-
Chapter
Location Privacy Preservation in Database-Driven Cognitive Radio Networks
Besides spectrum sensing, geo-location database query approach is another typical approach to obtain spectrum availabilities at SU’s location. The database query approach is enforced by the latest FCC’s rule 2...
-
Chapter
Location Privacy Preservation in Collaborative Spectrum Sensing
With the proliferation of mobile devices and the rapid growing of wireless services, cognitive radio networks (CRNs) have been recognized as a promising technology to alleviate the spectrum scarcity problem. T...
-
Chapter
Future Research Directions
Information sharing and transmission is an essential part of SUs in CRNs. Collaborative spectrum sensing requires the sharing of sensing reports between SUs and the FC. In database-driven CRNs, the location in...
-
Chapter
Privacy Preservation Techniques
In this chapter, we will introduce some basic concepts and fundamental knowledge of privacy preservation techniques. Privacy preservation has become a major issue across different applications, from data publi...
-
Chapter
Introduction
The rapid proliferation of wireless technology offers the promise of many societal and individual benefits by enabling pervasive networking and communication via personal devices such as smartphones, PDAs, com...
-
Article
On the Accuracy of Packet Delay Estimation in Distributed Service Networks
Packet delay (either one-way time or round-trip time) is a very important metric for measuring the performance of networks in a highly dynamic environment such as the Internet. Many network applications are al...
-
Chapter and Conference Paper
Stochastically Consistent Caching and Dynamic Duty Cycling for Erratic Sensor Sources
We present a novel dynamic duty cycling scheme to maintain stochastic consistency for caches in sensor networks. To reduce transmissions, base stations often maintain caches for erratically changing sensor sou...
-
Chapter and Conference Paper
Localized Recursive Estimation in Wireless Sensor Networks
This paper proposes a localized recursive estimation scheme for parameter estimation in wireless sensor networks. Given any parameter occurred at some location and time, a number of sensors recursively estimat...
-
Chapter and Conference Paper
Worst and Best Information Exposure Paths in Wireless Sensor Networks
This paper proposes the concept of information exposure for a point and for a path based on estimation theory. The information exposure of a point is defined as the probability that the absolute value of estim...
-
Chapter and Conference Paper
Efficient Group Key Management for Dynamic Peer Networks
In dynamic peer networks, how to promote the performance of group key management without sacrificing the desired security is a critical and difficult problem. In this paper, a secure, efficient and distributed...