Secure Location Verification with Hidden and Mobile Base Stations
نویسندگان
چکیده
منابع مشابه
Secure location verification and determination
This document considers two different approaches dealing with secure location claims. The first protocol is called ECHO [1] and handles with the secure verification of a location via ultra-sound. The second procedure increases the robustness of location determination protocols like RADAR [2]. Those are using standard IEEE 802.11 equipment. The document gives an introduction, overview, analysis ...
متن کاملHealth risks from mobile phone base stations.
Health 2004;30:399–409. 8 Lassen CF, Mikkelsen S, Kryger AI, et al. Elbow and wrist/hand symptoms among 6,943 computer operators: a 1-year follow-up study (the NUDATA study). Am J Ind Med 2004;46:521–33. 9 Tornqvist EW, Kilbom Å, Vingård E, et al. The influence on seeking care because of neck and shoulder disorders from work-related exposures. Epidemiology 2001;12:537–45. 10 Rempel DM, Krause N...
متن کاملLocating Base Stations for Mobile Servers
In this paper we review location models, specifically covering location models, which are applicable to modeling the location of base stations for cellular phone users. The definition of cover is revisited, suggesting three new definitions of cover: two gradual cover models, and one sum cover model. A new objective for covering models, the variable radius model, is proposed. The probability tha...
متن کاملBase Stations in Mobile Ad-Hoc Networks
Multi-hop ad-hoc networks consist of nodes which cooperate by forwarding packets for each other to allow communication beyond the power range of each node. In pure ad-hoc networks, no additional infrastructure is required to allow the nodes to communicate. Multi-hop hybrid networks are a combination of ad-hoc and cellular networks. As in ad-hoc networks, the nodes forward packets on behalf of o...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Mobile Computing
سال: 2008
ISSN: 1536-1233,1558-0660,2161-9875
DOI: 10.1109/tmc.2007.70782