Yih-Chun Hu

20002019
If you made any changes in Pure, your changes will be visible here soon.

Research Output 2000 2019

2019

BGP with BGPsec: Attacks and Countermeasures

Li, Q., Liu, J., Hu, Y. C., Xu, M. & Wu, J., Jul 1 2019, In : IEEE Network. 33, 4, p. 194-200 7 p., 8594708.

Research output: Contribution to journalArticle

Network protocols
Internet

Convolution Attack on Frequency Hopping by Full-Duplex Radios

Jagadeesh, H. & Hu, Y. C., Jun 2019, In : IEEE Transactions on Vehicular Technology. 68, 6, p. 5642-5656 15 p., 8676089.

Research output: Contribution to journalArticle

Frequency Hopping
Frequency hopping
Radio receivers
Convolution
Frequency shift keying

Enabling Efficient Source and Path Verification via Probabilistic Packet Marking

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y-C., Reed, M. J., Shen, M. & Yang, F., Jan 22 2019, 2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018. Institute of Electrical and Electronics Engineers Inc., 8624169. (2018 IEEE/ACM 26th International Symposium on Quality of Service, IWQoS 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Testbeds
Servers
Throughput
Internet

Power-positive networking: Wireless-charging-based networking to protect energy against battery DoS attacks

Chang, S. Y., Kumar, S. L. S., Hu, Y-C. & Park, Y., Jan 1 2019, In : ACM Transactions on Sensor Networks. 15, 3, 27.

Research output: Contribution to journalArticle

Embedded systems
Data transfer
Authentication
Availability
Hardware

SmartCrowd: Decentralized and automated incentives for distributed IoT system detection

Wu, B., Xu, K., Li, Q., Liu, Z., Hu, Y. C., Zhang, Z., Du, X., Liu, B. & Ren, S., Jul 2019, Proceedings - 2019 39th IEEE International Conference on Distributed Computing Systems, ICDCS 2019. Institute of Electrical and Electronics Engineers Inc., p. 1106-1116 11 p. 8884853. (Proceedings - International Conference on Distributed Computing Systems; vol. 2019-July).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet of things
Detectors
Intelligent buildings
Firmware
Ecosystems
2018

CLEF: Limiting the damage caused by large flows in the internet core

Wu, H., Hsiao, H. C., Asoni, D. E., Scherrer, S., Perrig, A. & Hu, Y-C., Jan 1 2018, Cryptology and Network Security - 17th International Conference, CANS 2018, Proceedings. Papadimitratos, P. & Camenisch, J. (eds.). Springer-Verlag, p. 89-108 20 p. (Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics); vol. 11124 LNCS).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Damage
Limiting
Internet
Router
Routers

Cognitive radio from hell: Flipping attack on direct-sequence spread spectrum

Harshan, J. & Hu, Y-C., Jun 8 2018, 2018 IEEE Wireless Communications and Networking Conference, WCNC 2018. Institute of Electrical and Electronics Engineers Inc., Vol. 2018-April. p. 1-6 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Channel capacity
Jamming
Cognitive radio
Transceivers
Transmitters

Detection of anomaly in train speed for intelligent railway systems

Kang, S., Sristi, S., Karachiwala, J. & Hu, Y-C., Mar 2018, 2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018. Institute of Electrical and Electronics Engineers Inc., 8751374. (2018 International Conference on Control, Automation and Diagnosis, ICCAD 2018).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Intelligent systems
Railway
Anomaly
Anomaly Detection
Bayesian Learning

Enabling Work-Conserving Bandwidth Guarantees for Multi-Tenant Datacenters via Dynamic Tenant-Queue Binding

Liu, Z., Chen, K., Wu, H., Hu, S., Hu, Y-C., Wang, Y. & Zhang, G., Oct 8 2018, INFOCOM 2018 - IEEE Conference on Computer Communications. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. 8486219. (Proceedings - IEEE INFOCOM; vol. 2018-April).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Conservation
Testbeds
Switches
Experiments

Practical Proactive DDoS-Attack Mitigation via Endpoint-Driven In-Network Traffic Control

Liu, Z., Jin, H., Hu, Y-C. & Bailey, M. D., Aug 2018, In : IEEE/ACM Transactions on Networking. 26, 4, p. 1948-1961 14 p., 8418343.

Research output: Contribution to journalArticle

Traffic control
Internet
Testbeds
Computer hardware
Industry

Signal jamming attacks against communication-based train control: Attack impact and countermeasure

Lakshminarayana, S., Revadigar, G., Karachiwala, J. S., Sravana Kumar, S. L., Hu, Y-C., Chang, S. Y. & Yau, D. K. Y., Jun 18 2018, WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 160-171 12 p. (WiSec 2018 - Proceedings of the 11th ACM Conference on Security and Privacy in Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Communication
Control systems
Telecommunication repeaters
Coaxial cables
2017

A Clean Slate Approach to Secure Ad Hoc Wireless Networking-Open Unsynchronized Networks

Ponniah, J., Hu, Y-C. & Kumar, P. R., Mar 2017, In : IEEE Transactions on Control of Network Systems. 4, 1, p. 37-48 12 p., 7478115.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Wireless Ad Hoc Networks
Wireless ad hoc networks

Cognitive Wireless Charger: Sensing-Based Real-Time Frequency Control for Near-Field Wireless Charging

Chang, S. Y., Kumar, S. L. S. & Hu, Y-C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2302-2307 6 p. 7980186. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Feedback
Internet of things

Deadline-Aware Multipath Communication: An Optimization Problem

Chuat, L., Perrig, A. & Hu, Y-C., Aug 30 2017, Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017. Institute of Electrical and Electronics Engineers Inc., p. 487-498 12 p. 8023147. (Proceedings - 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Throughput
Communication
Packet loss
Network performance

Deployment and Operation

Hu, Y. C., Klausmann, T., Perrig, A., Reischuk, R. M., Shirley, S., Szalachowski, P. & Ucan, E., Jan 1 2017, Information Security and Cryptography. 9783319670799 ed. Springer International Publishing, p. 191-239 49 p. (Information Security and Cryptography; no. 9783319670799).

Research output: Chapter in Book/Report/Conference proceedingChapter

Insider-attacks on physical-layer group secret-key generation in wireless networks

Harshan, J., Chang, S. Y. & Hu, Y-C., May 10 2017, 2017 IEEE Wireless Communications and Networking Conference, WCNC 2017 - Proceedings. Institute of Electrical and Electronics Engineers Inc., 7925526. (IEEE Wireless Communications and Networking Conference, WCNC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Wireless networks
Communication
Broadcasting
Topology
Network protocols

Key update at train stations: Two-layer dynamic key update scheme for secure train communications

Chang, S. Y., Cai, S., Seo, H. & Hu, Y. C., Jan 1 2017, Security and Privacy in Communication Networks -12th International Conference, SecureComm 2016, Proceedings. Deng, R., Yegneswaran, V., Weng, J. & Ren, K. (eds.). Springer-Verlag, p. 125-143 19 p. (Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST; vol. 198 LNICST).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Seed
Communication
Information technology

Name Resolution

Asoni, D., Hu, Y. C., Reischuk, R. M. & Trammell, B., Jan 1 2017, Information Security and Cryptography. 9783319670799 ed. Springer International Publishing, p. 101-118 18 p. (Information Security and Cryptography; no. 9783319670799).

Research output: Chapter in Book/Report/Conference proceedingChapter

Internet
Communication
World Wide Web
Destination
Time scales

Performance of Cognitive Wireless Charger for Near-Field Wireless Charging

Chang, S. Y., Kumar, S. L. S. & Hu, Y-C., Jul 13 2017, Proceedings - IEEE 37th International Conference on Distributed Computing Systems, ICDCS 2017. Lee, K. & Liu, L. (eds.). Institute of Electrical and Electronics Engineers Inc., p. 2555-2556 2 p. 7980230. (Proceedings - International Conference on Distributed Computing Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Transmitters
Feedback
Internet of things

Power-positive networking using wireless charging: Protecting energy against battery exhaustion attacks

Chang, S. Y., Kumar, S. L. S., Tran, B. A. N., Viswanathan, S., Park, Y. & Hu, Y-C., Jul 18 2017, Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017. Association for Computing Machinery, Inc, p. 52-57 6 p. (Proceedings of the 10th ACM Conference on Security and Privacy in Wireless and Mobile Networks, WiSec 2017).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Authentication
Availability
Hardware
Communication

Protecting vehicular networks privacy in the presence of a single adversarial authority

Chen, C. W., Chang, S. Y., Hu, Y-C. & Chen, Y. W., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., p. 1-9 9 p. (2017 IEEE Conference on Communications and Network Security, CNS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Leakage (fluid)
Simulators
Systems analysis
Experiments

SecureMAC: Securing Wireless Medium Access Control Against Insider Denial-of-Service Attacks

Chang, S. Y. & Hu, Y-C., Dec 1 2017, In : IEEE Transactions on Mobile Computing. 16, 12, p. 3527-3540 14 p., 7898430.

Research output: Contribution to journalArticle

Medium access control
Jamming
Atmospheric spectra
Wireless networks
Bandwidth

Securing balise-based train control systems using cryptographic random fountains

Harshan, J., Chang, S. Y., Kang, S. & Hu, Y-C., Dec 19 2017, 2017 IEEE Conference on Communications and Network Security, CNS 2017. Institute of Electrical and Electronics Engineers Inc., p. 405-410 6 p. (2017 IEEE Conference on Communications and Network Security, CNS 2017; vol. 2017-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Fountains
Control systems
Communication
Transponders
Antennas

The case for in-network replay suppression

Lee, T., Pappas, C., Perrig, A., Gligor, V. & Hu, Y-C., Apr 2 2017, ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 862-873 12 p. (ASIA CCS 2017 - Proceedings of the 2017 ACM Asia Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Routers
Network layers
Authentication
Program processors
Synchronization

TorPolice: Towards enforcing service-defined access policies for anonymous communication in the Tor network

Liu, Z., Liu, Y., Winter, P., Mittal, P. & Hu, Y-C., Nov 21 2017, 2017 IEEE 25th International Conference on Network Protocols, ICNP 2017. IEEE Computer Society, 8117564. (Proceedings - International Conference on Network Protocols, ICNP; vol. 2017-October).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Access control
Communication
Law enforcement
Botnet
2016

A System-Theoretic Clean Slate Approach to Provably Secure Ad-Hoc Wireless Networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jun 2016, In : IEEE Transactions on Control of Network Systems. 3, 2, p. 206-217 12 p., 7100909.

Research output: Contribution to journalArticle

Slate
Networking
Network protocols
Vertex of a graph
Jamming

Demo: Free data communication using wireless charging

Kumar, S. L. S., Chang, S. Y., Viswanathan, S. & Hu, Y-C., Jun 25 2016, MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services. Association for Computing Machinery, Inc, 1 p. (MobiSys 2016 Companion - Companion Publication of the 14th Annual International Conference on Mobile Systems, Applications, and Services).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Embedded systems
Communication

Jamming with power boost: Leaky waveguide vulnerability in train systems

Chang, S. Y., Tran, B. A. N., Hu, Y-C. & Jones, D. L., Jan 15 2016, Proceedings - 2015 IEEE 21st International Conference on Parallel and Distributed Systems, ICPADS 2015. IEEE Computer Society, p. 37-43 7 p. 7384276. (Proceedings of the International Conference on Parallel and Distributed Systems - ICPADS; vol. 2016-January).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Waveguides
Communication
Telecommunication repeaters
Security systems

Middlepolice: Toward enforcing destination-defined policies in the middle of the internet

Liu, Z., Jiny, H., Hu, Y-C. & Bailey, M. D., Oct 24 2016, CCS 2016 - Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, p. 1268-1279 12 p. (Proceedings of the ACM Conference on Computer and Communications Security; vol. 24-28-October-2016).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Internet
Scheduling
Feedback
Bandwidth

SimpleMAC: A simple wireless MAC-layer countermeasure to intelligent and insider jammers

Chang, S. Y., Hu, Y-C. & Laurenti, N., Apr 2016, In : IEEE/ACM Transactions on Networking. 24, 2, p. 1095-1108 14 p., 7091035.

Research output: Contribution to journalArticle

Medium access control
Jamming
Network protocols
Channel capacity
Transmitters
2015

A clean slate approach to secure wireless networking

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jan 1 2015, In : Foundations and Trends in Networking. 9, 1, p. 1-105 105 p.

Research output: Contribution to journalArticle

Slate
Network protocols
Wireless ad hoc networks
Communication systems

A clean slate design for secure wireless ad-hoc networks - Part 1: Closed synchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 175-182 8 p. 7151070. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Closed

A clean slate design for secure wireless ad-hoc networks - Part 2: Open unsynchronized networks

Ponniah, J., Hu, Y. C. & Kumar, P. R., Jul 6 2015, 2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015. Institute of Electrical and Electronics Engineers Inc., p. 183-190 8 p. 7151071. (2015 13th International Symposium on Modeling and Optimization in Mobile, Ad Hoc, and Wireless Networks, WiOpt 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Slate
Wireless Ad Hoc Networks
Wireless ad hoc networks
Network protocols
Vertex of a graph

Lightweight source authentication and path validation

Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y-C. & Perrig, A., Feb 25 2015, In : Computer Communication Review. 44, 4, p. 271-282 12 p.

Research output: Contribution to journalConference article

Authentication
Routers
Scalability
Compliance

Noah: Keyed noise flooding for wireless confidentiality

Chang, S. Y., Lee, J. & Hu, Y-C., Nov 2 2015, Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks. Association for Computing Machinery, Inc, p. 141-148 8 p. (Q2SWinet 2015 - Proceedings of the 11th ACM Symposium on QoS and Security for Wireless and Mobile Networks).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Telecommunication links
Transmitters
Antennas
Communication

Securing wireless medium access control against insider denial-of-service attackers

Chang, S. Y., Hu, Y. C. & Liu, Z., Dec 3 2015, 2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015. Institute of Electrical and Electronics Engineers Inc., p. 370-378 9 p. 7346848. (2015 IEEE Conference on Communications and NetworkSecurity, CNS 2015).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Medium access control
Jamming
Bandwidth
Atmospheric spectra
Network protocols
2014

A study on false channel condition reporting attacks in wireless networks

Kim, D. & Hu, Y-C., May 2014, In : IEEE Transactions on Mobile Computing. 13, 5, p. 935-947 13 p., 6579605.

Research output: Contribution to journalArticle

Wireless networks
Network protocols
Feedback
Network performance
Managers

Efficient large flow detection over arbitrary windows: An algorithm exact outside an ambiguity region

Wu, H., Hsiao, H. C. & Hu, Y-C., Nov 5 2014, IMC 2014 - Proceedings of the 2014 ACM. Association for Computing Machinery, p. 209-222 14 p. (Proceedings of the ACM SIGCOMM Internet Measurement Conference, IMC).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Bandwidth
Static random access storage
Throughput
Detectors
Data storage equipment

Lightweight source authentication and path validation

Kim, T. H. J., Basescu, C., Jia, L., Lee, S. B., Hu, Y-C. & Perrig, A., Jan 1 2014, SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication. Association for Computing Machinery, p. 271-282 12 p. (SIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Authentication
Routers
Scalability
Compliance

Mechanized network origin and path authenticity proofs

Zhang, F., Jia, L., Basescu, C., Kim, T. H. J., Hu, Y-C. & Perrig, A., Nov 3 2014, Proceedings of the ACM Conference on Computer and Communications Security. Association for Computing Machinery, p. 346-357 12 p. (Proceedings of the ACM Conference on Computer and Communications Security).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Network protocols
Internet
Routing protocols
Authentication
Data structures
2013

Did you also hear that? Spectrum sensing using Hermitian inner product

Chiang, J. T. & Hu, Y-C., Sep 2 2013, 2013 Proceedings IEEE INFOCOM 2013. p. 2229-2237 9 p. 6567026. (Proceedings - IEEE INFOCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Detectors
Matched filters
Cognitive radio
Clocks
Uncertainty

Diffie's wireless phone: Heterodyning-based physical-layer encryption

Chiang, J. T. & Hu, Y. C., Dec 1 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 470-475 6 p. 6735667. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Heterodyning
Cryptography
Telephone systems
Networks (circuits)
Costs

JIM-beam: Jamming-resilient wireless flooding based on spatial randomness

Chiang, J. T. & Hu, Y-C., Dec 1 2013, Proceedings - 2013 IEEE Military Communications Conference, MILCOM 2013. p. 464-469 6 p. 6735666. (Proceedings - IEEE Military Communications Conference MILCOM).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Availability
Antennas
Monte Carlo simulation

Redundancy offset narrow spectrum: Countermeasure for signal-cancellation based jamming

Chang, S. Y., Hu, Y-C., Chiang, J. & Chang, S. Y., Jan 1 2013, MobiWac 2013 - Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, Co-located with ACM MSWiM 2013. Association for Computing Machinery, p. 51-58 8 p. (MobiWac 2013 - Proceedings of the 11th ACM International Symposium on Mobility Management and Wireless Access, Co-located with ACM MSWiM 2013).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Radar countermeasures
Atmospheric spectra
Jamming
Redundancy
Information theory

Secure cooperative spectrum sensing based on Sybil-resilient clustering

Chiang, J. T., Hu, Y-C. & Yadav, P., Jan 1 2013, 2013 IEEE Global Communications Conference, GLOBECOM 2013. Institute of Electrical and Electronics Engineers Inc., p. 1075-1081 7 p. 6831217. (GLOBECOM - IEEE Global Telecommunications Conference).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Statistics
2012

Bankrupting the jammer in WSN

Ashraf, F., Hu, Y-C. & Kravets, R. H., Dec 1 2012, MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems. p. 317-325 9 p. 6502531. (MASS 2012 - 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Jamming
Game theory
Sensors
Testbeds
Sensor nodes

JIM-beam: Using spatial randomness to build jamming-resilient wireless flooding networks

Chiang, J. T., Kim, D. & Hu, Y-C., Jul 11 2012, MobiHoc'12 - Proceedings of the 13th ACM International Symposium on Mobile Ad Hoc Networking and Computing. p. 255-256 2 p. (Proceedings of the International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc)).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Frequency hopping
Jamming
Transmitters
Antennas

Load disaggregation using harmonic analysis and regularized optimization

Chiang, J. T., Zhang, T., Chen, B. & Hu, Y-C., Dec 1 2012, 2012 Conference Handbook - Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2012. 6411916. (2012 Conference Handbook - Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA ASC 2012).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harmonic analysis
Integer programming
Experiments

Power control for fair dynamic channel reservation in VANETs

Haghani, P. & Hu, Y-C., Nov 1 2012, 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks, SECON 2012. p. 659-667 9 p. 6275841. (Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks workshops; vol. 1).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Vehicular ad hoc networks
Power control
Communication
Medium access control
Broadcasting