Search
Now showing items 1-10 of 182
Prediction-based delay optimization data collection algorithm for underwater acoustic sensor networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The past years have seen a rapid development of autonomous underwater vehicle-aided (AUV-aided) data-gathering schemes in underwater acoustic sensor networks (UASNs). The use of AUVs efficiently reduces energy consumption ...
Dynamic users assignment and bandwidth allocation for energy efficient hybrid powered communication systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2016 , Conference Paper)
In this paper, we aim to encourage the use of renewable power in communication systems through hybrid powering. The problem consists of optimizing the resource allocation problem using the hybrid powering from renewable ...
Market-Based Model in CR-IoT: A QProbabilistic Multi-agent Reinforcement Learning Approach
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
The ever-increasing urban population and the corresponding material demands have brought unprecedented burdens to cities. To guarantee better QoS for citizens, smart cities leverage emerging technologies such as the Cognitive ...
A novel chaos-based physical layer security transmission scheme for internet of things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Conference Paper)
The Internet of Things (IoT) has attracted much attention in many fields, such as healthcare, transportation, finance and other critical infrastructures. But how to ensure the security of whole IoT system and the privacy ...
A survey of Internet of Things communication using ICN: A use case perspective
(
Elsevier B.V.
, 2019 , Article Review)
Internet of Things (IoT) has gained extensive attention from industry and academia alike in past decade. The connectivity of each and every piece of technology in the environment with Internet, has opened many avenues of ...
Handover authentication for mobile networks: Security and efficiency aspects
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...
New plain-text authentication secure scheme for implantable medical devices with remote control
(
Institute of Electrical and Electronics Engineers Inc.
, 2017 , Conference Paper)
Implantable medical devices are being increasingly used to treat or monitor different medical conditions. For such purposes, wireless is the most desired communication scheme to be implemented in these devices. On the other ...
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
(
IEEE Computer Society
, 2015 , Article)
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ...
Mobile application security: Malware threats and defenses
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
Overcoming user selfishness in DSA systems through credit-based resource allocation
(
IEEE
, 2014 , Conference Paper)
We propose a credit-based resource allocation technique for wireless systems with dynamic spectrum access (DSA) capability, such as multichannel wireless sensor networks. The proposed technique is robust against selfish ...