Secure positioning of wireless devices with application to sensor networks
Graph Chatbot
Chat with Graph Search
Ask any question about EPFL courses, lectures, exercises, research, news, etc. or try the example questions below.
DISCLAIMER: The Graph Chatbot is not programmed to provide explicit or categorical answers to your questions. Rather, it transforms your questions into API requests that are distributed across the various IT services officially administered by EPFL. Its purpose is solely to collect and recommend relevant references to content that you can explore to help you answer your questions.
This paper explores the possibility of detecting the hidden presence of wireless eavesdroppers. Such eavesdroppers employ passive receivers that only listen and never transmit any signals making them very hard to detect. In this paper, we show that even pa ...
In this thesis, I investigate wireless communication from an architectural perspective. I am using design prototypes to explore possibilities for interaction and designing with wirelessness in mind. The public primarily regards wireless networking technolo ...
This paper presents three different techniques for efficiently powering an energy-autonomous wireless sensor (EAWS) through both energy harvesting (EH) and RF wireless power transfer (WPT). The aim of the paper is to provide effective strategies and techni ...
This paper documents a series of experiments that explore the effects of wireless communication technology on the experience of space. Wireless connectivity and its infrastructure, un-sense-able to human body, are increasingly important in our interactions ...
We design and evaluate a traffic anonymization protocol for wireless networks, aiming to protect against computationally powerful adversaries. Our protocol builds on recent key-generation techniques, that leverage intrinsic properties of the wireless toget ...
Autonomous implantable bioelectronics requires efficient radiating structures for data transfer and wireless powering. The radiation of body-implanted capsules is investigated to obtain the explicit radiation optima for E- and B-coupled sources of arbitrar ...
As our sensitive data is increasingly carried over the Internet and stored remotely, security in communications becomes a fundamental requirement. Yet, today's security practices are designed around assumptions the validity of which is being challenged. In ...
While wired infrastructure constitutes the backbone of most wireless networks, wireless systems appeal the most to the dynamic and rapidly evolving requirements of today's communication systems because of their ease of deployment and mobility, not to menti ...
In neurostimulation, wireless power transfer is an efficient technology to overcome several limitations affecting medical devices currently used in clinical practice. Several methods were developed over the years for wireless power transfer. In this review ...
Google Glass is a recently designed wearable device capable of displaying information in a smartphone-like hands-free format by wireless communication. The Glass also provides convenient control over remote devices, primarily enabled by voice recognition c ...