Search
Now showing items 11-20 of 205
A survey of Internet of Things communication using ICN: A use case perspective
(
Elsevier B.V.
, 2019 , Article Review)
Internet of Things (IoT) has gained extensive attention from industry and academia alike in past decade. The connectivity of each and every piece of technology in the environment with Internet, has opened many avenues of ...
Handover authentication for mobile networks: Security and efficiency aspects
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...
New plain-text authentication secure scheme for implantable medical devices with remote control
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Implantable medical devices are being increasingly used to treat or monitor different medical conditions. For such purposes, wireless is the most desired communication scheme to be implemented in these devices. On the other ...
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
(
IEEE Computer Society
, 2015 , Article)
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ...
Mobile application security: Malware threats and defenses
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
Overcoming user selfishness in DSA systems through credit-based resource allocation
(
IEEE
, 2014 , Conference Paper)
We propose a credit-based resource allocation technique for wireless systems with dynamic spectrum access (DSA) capability, such as multichannel wireless sensor networks. The proposed technique is robust against selfish ...
Joint data and power transfer optimization for energy harvesting wireless networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
Energy harvesting techniques emerge as a potential solution for prolonging the lifetime of the energy-constrained mobile wireless devices. In this paper, we focus on radio frequency (RF) energy harvesting for multiuser ...
An adaptive route optimization scheme for nested mobile IPv6 NEMO environment
(
IEEE Computer Society
, 2014 , Conference Paper)
We address the route optimization problem for a nested mobile IPv6 NEtwork MObility (NEMO) environment. We propose an adaptive scheme which can optimize the routing process of the data communication, and minimize the ...
Release-time aware VM placement
(
IEEE
, 2014 , Conference Paper)
Consolidating virtual machines (VMs) on as few physical machines (PMs) as possible so as to turn into sleep as many PMs as possible can make significant energy savings in cloud centers. Although traditional online bin ...
A Communication Framework with Unified Efficiency and Secrecy
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Future wireless networks are confronted with the pressure to meet the requirements of network efficiency and communication secrecy, which require a new communication framework to unify and jointly optimize efficiency and ...