Search
Now showing items 1-10 of 45
Handover authentication for mobile networks: Security and efficiency aspects
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
(
IEEE Computer Society
, 2015 , Article)
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ...
Mobile application security: Malware threats and defenses
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
Handoff-aware cross-layer assisted multi-path TCP for proactive congestion control in mobile heterogeneous wireless networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
Multi-Path TCP (MPTCP) is a new evolution of TCP that enables a single MPTCP connection to use multiple TCP subflows transparently to applications. Each subflow runs independently allowing the connection to be maintained ...
Energy-aware rate and description allocation optimized video streaming for mobile D2D communications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Conference Paper)
The proliferation problem of video streaming applications and mobile devices has prompted wireless network operators to put more efforts into improving quality of experience (QoE) while saving resources that are needed for ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
A distributed gateway selection algorithm for UAV networks
(
IEEE Computer Society
, 2015 , Article)
In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although ...
Efficient rule engine for smart building systems
(
IEEE Computer Society
, 2015 , Article)
In smart building systems, the automatic control of devices relies on matching the sensed environment information to customized rules. With the development of wireless sensor and actuator networks (WSANs), low-cost and ...
Software-defined networking security: Pros and cons
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase ...
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication ...