Secure Location Verification with Hidden and Mobile Base Stations

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Secure location verification and determination

This document considers two different approaches dealing with secure location claims. The first protocol is called ECHO [1] and handles with the secure verification of a location via ultra-sound. The second procedure increases the robustness of location determination protocols like RADAR [2]. Those are using standard IEEE 802.11 equipment. The document gives an introduction, overview, analysis ...

متن کامل

Health risks from mobile phone base stations.

Health 2004;30:399–409. 8 Lassen CF, Mikkelsen S, Kryger AI, et al. Elbow and wrist/hand symptoms among 6,943 computer operators: a 1-year follow-up study (the NUDATA study). Am J Ind Med 2004;46:521–33. 9 Tornqvist EW, Kilbom Å, Vingård E, et al. The influence on seeking care because of neck and shoulder disorders from work-related exposures. Epidemiology 2001;12:537–45. 10 Rempel DM, Krause N...

متن کامل

Locating Base Stations for Mobile Servers

In this paper we review location models, specifically covering location models, which are applicable to modeling the location of base stations for cellular phone users. The definition of cover is revisited, suggesting three new definitions of cover: two gradual cover models, and one sum cover model. A new objective for covering models, the variable radius model, is proposed. The probability tha...

متن کامل

Base Stations in Mobile Ad-Hoc Networks

Multi-hop ad-hoc networks consist of nodes which cooperate by forwarding packets for each other to allow communication beyond the power range of each node. In pure ad-hoc networks, no additional infrastructure is required to allow the nodes to communicate. Multi-hop hybrid networks are a combination of ad-hoc and cellular networks. As in ad-hoc networks, the nodes forward packets on behalf of o...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2008

ISSN: 1536-1233,1558-0660,2161-9875

DOI: 10.1109/tmc.2007.70782