scispace - formally typeset
Search or ask a question
Topic

Wireless

About: Wireless is a research topic. Over the lifetime, 133440 publications have been published within this topic receiving 1953062 citations. The topic is also known as: wireless communications & wireless.


Papers
More filters
Proceedings ArticleDOI
18 May 1998
TL;DR: This paper proposes a novel broadband access network using a number of stratospheric platforms and consists of wireless access links between the platform and terminals in the Ka-band and a mesh-like network using optical inter-platform links.
Abstract: This paper proposes a novel broadband access network using a number of stratospheric platforms. This is a new wireless infrastructure, and consists of wireless access links between the platform and terminals in the Ka-band and a mesh-like network using optical inter-platform links. One platform covers a 40 km/spl times/40 km area with 64 beams of an onboard multi-beam antenna. Thus, the cell size is almost as same as that of current cellular systems. This network can provide 25 Mbps to more than 156 Mbps access links and a flexible wireless ATM network to subscribers.

39 citations

Patent
Nighat Rahim1
06 Jul 2006
TL;DR: In this paper, techniques for scanning for access points with a wireless communication device including a baseband processor and a WLAN processor are described. But they do not specify a data download command which defines a preferred network list.
Abstract: Techniques are provided for scanning for access points with a wireless communication device including a baseband processor and a WLAN processor. A data download command which defines a preferred network list can be sent (42) from the baseband processor to the WLAN processor. In addition, a first scan command can be sent from the baseband processor which triggers the WLAN processor to independently begin periodically scanning a number channels.

39 citations

Proceedings ArticleDOI
01 Jul 2007
TL;DR: This paper proposes a novel channel assignment strategy called UCAS based on unidirectional link model, and gives an efficient greedy vertex coloring algorithm called BFVC, which demonstrates the efficiency of the algorithms presented in this paper.
Abstract: With the development of Internet, many new applications with obvious multicast character come forth and become popular, which increase the importance of multicast in Internet especially in wireless access networks where the bandwidths of networks are very limited. In this paper, we consider the problem of channel assignment for multicast in multi-radio wireless mesh networks (WMNs), which have not been studied up to now. We propose a novel channel assignment strategy called UCAS based on unidirectional link model, and give an efficient greedy vertex coloring algorithm called BFVC. Finally, the results of simulations demonstrate the efficiency of the algorithms presented in this paper.

39 citations

Proceedings ArticleDOI
16 Mar 2018
TL;DR: In this article, the authors proposed an anomaly detection methodology for wireless systems that is based on monitoring and analyzing radio frequency (RF) spectrum activities, which leverages an existing solution for the video prediction problem, and uses it on image sequences generated from monitoring the wireless spectrum.
Abstract: Intrusion detection has become one of the most critical tasks in a wireless network to prevent service outages that can take long to fix. The sheer variety of anomalous events necessitates adopting cognitive anomaly detection methods instead of the traditional signature- based detection techniques. This paper proposes an anomaly detection methodology for wireless systems that is based on monitoring and analyzing radio frequency (RF) spectrum activities. Our detection technique leverages an existing solution for the video prediction problem, and uses it on image sequences generated from monitoring the wireless spectrum. The deep predictive coding network is trained with images corresponding to the normal behavior of the system, and whenever there is an anomaly, its detection is triggered by the deviation between the actual and predicted behavior. For our analysis, we use the images generated from the time-frequency spectrograms and spectral correlation functions of the received RF signals. We test our technique on a dataset which contains anomalies such as jamming, chirping of transmitters, spectrum hijacking, and node failure, and evaluate its performance using standard classifier metrics: detection rate, false alarm, and accuracy. Simulation results demonstrate that the proposed methodology effectively detects many unforeseen anomalous events in real time. We discuss the applications, which encompass industrial IoT, autonomous vehicle control and mission-critical communications services.

39 citations

Journal ArticleDOI
TL;DR: This paper formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and they categorize network nodes into three states based on the level of disturbance caused by the jammer.
Abstract: Wireless communication is susceptible to radio interference and jamming attacks, which prevent the reception of communications. Most existing anti-jamming work does not consider the location information of radio interferers and jammers. However, this information can provide important insights for networks to manage its resource in different layers and to defend against radio interference. In this paper, we investigate issues associated with localizing jammers in wireless networks. In particular, we formulate the jamming effects using two jamming models: region-based and signal-to-noise-ratio(SNR)-based; and we categorize network nodes into three states based on the level of disturbance caused by the jammer. By exploiting the states of nodes, we propose to localize jammers in wireless networks using a virtual-force iterative approach. The virtual-force iterative localization scheme is a range-free position estimation method that estimates the position of a jammer iteratively by utilizing the network topology. We have conducted experiments to validate our SNR-based jamming model and performed extensive simulation to evaluate our approach. Our simulation results have showed that the virtual-force iterative approach is highly effective in localizing a jammer in various network conditions when comparing to existing centroid-based localization approaches.

39 citations


Network Information
Related Topics (5)
Wireless network
122.5K papers, 2.1M citations
97% related
Wireless sensor network
142K papers, 2.4M citations
96% related
Network packet
159.7K papers, 2.2M citations
95% related
Wireless ad hoc network
49K papers, 1.1M citations
94% related
Key distribution in wireless sensor networks
59.2K papers, 1.2M citations
93% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20244
20233,833
20229,009
20214,231
20206,736
20197,380