In this chapter, we brie y review the security for wireless and ad hoc networks, as well as the use of identity-based cryptography to simplify security imple- mentations.
We also discuss security and reliability issues in sensor networks, including underwater sensors with di erent characteristics.
on Networking, IEEE Journal on Selected Areas in Communications, IEEE Trans.
on Industrial Informatics, IEEE Communications Magazine, IEEE Communication Letters, IEEE Network Magazine, IEEE Intelligent Systems, ACM Trans.
What makes this scheme attractive is that the SNs share with their neighbors just their individual transmit power at the current states.
Finally, the optimal soft fusion rule at the FC is derived.
The resource allocation is performed at the fusion center (FC) and it is referred as a centralized approach.
We also propose a novel fully $distributed$ algorithm to address this resource allocation problem.
Wiley Online Library requires cookies for authentication and use of other site features; therefore, cookies must be enabled to browse the site.