Optimal Information-Theoretic Wireless Location Verification
نویسندگان
چکیده
منابع مشابه
An Information-Theoretic Framework for Optimal Location Tracking in Multi-System Wireless Networks
An information-theoretic framework is developed for optimal location management in multi-system, fourth generation ( ) wireless networks. The framework envisions that each individual sub-system operates fairly independently, and does not require public knowledge of individual sub-network topologies. To capture the variation in paging and location update costs in this heterogeneous environment, ...
متن کاملLocation Verification Systems in Emerging Wireless Networks
As location-based techniques and applications become ubiquitous in emerging wireless networks, the verification of location information will become of growing importance. This has led in recent years to an explosion of activity related to location verification techniques in wireless networks, with a specific focus on Intelligent Transport Systems (ITS) being evident. Such focus is largely due t...
متن کاملOn information-theoretic secrecy for wireless networks
In this paper we summarize our recent work on information-theoretically secure wireless relay network communication. In such communication, the goal is to send information between two special nodes (“source” and “destination”) in a (memoryless) network with authenticated relays, where the secrecy is with respect to a class of eavesdroppers. We develop achievable secrecy rates when authenticated...
متن کاملInformation Theoretic View on Hybrid Wireless Networks
The capacity of large hybrid wireless networks is considered in this project. The hybrid network is based on an ad-hoc network with an embedded wired infrastructure. Both types of wireless transmissions are allowed in hybrid networks: peer-to-peer and through infrastructure. The report focuses on the case when the number of base stations in the hybrid network grows sub-linearly with the network...
متن کاملInformation-Theoretic Secrecy for Wireless Networks
The aim of information-theoretic secrecy is to ensure that an eavesdropper who listens to the wireless transmission of a message can only collect an arbitrarily small number of information bits about this message. In contrast to cryptography, there are no assumptions on the computational power of the eavesdropper. Information-theoretically secret communication has been studied for many particul...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Vehicular Technology
سال: 2014
ISSN: 0018-9545,1939-9359
DOI: 10.1109/tvt.2014.2302022