بحث بسيط
السجلات المعروضة 201 -- 210 من 323
Securing cognitive radio networks against primary user emulation attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...
An Efficient Distributed Trust Model for Wireless Sensor Networks
(
IEEE Computer Society
, 2015 , Article)
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes ...
Small data dissemination for wireless sensor networks: The security aspect
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For security reasons every disseminated data ...
Software-defined networking for rsu clouds in support of the internet of vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
We propose a novel roadside unit (RSU) cloud, a vehicular cloud, as the operational backbone of the vehicle grid in the Internet of Vehicles (IoV). The architecture of the proposed RSU cloud consists of traditional and ...
Maximizing secondary-user satisfaction in large-scale DSA systems through distributed team cooperation
(2012 , Article)
We develop resource and service management techniques to support secondary users (\su s) with QoS requirements in large-scale distributed dynamic spectrum access (\osa) systems. The proposed techniques empower \su s to ...
Joint physical-application layer security for wireless multimedia delivery
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
In recent years, there have been increasing demands for the security of wireless multimedia applications. Essentially, wireless networks, compared to traditional wired networks, are more likely to suffer from malicious ...
Mobility prediction in telecom cloud using mobile calls
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
The proliferation of the telecom cloud has fostered increasing attention on location-based applications and services. Due to the randomness and fuzziness of human mobility, it still remains open to predict user mobility. ...
Software-defined networking security: Pros and cons
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase ...
User privacy and data trustworthiness in mobile crowd sensing
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples' daily lives. Mobile crowd sensing is an emerging technology based on the sensing ...
Cooperative spectrum sharing in cognitive radio networks: A distributed matching approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
We study the relay-based communication schemes for cooperative spectrum sharing among multiple primary users (PUs) and multiple secondary users (SUs) with incomplete information. Inspired by the matching theory, we model ...