بحث بسيط
السجلات المعروضة 1 -- 10 من 27
Handover authentication for mobile networks: Security and efficiency aspects
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
A handover authentication module in mobile networks enables mobile nodes to securely and seamlessly roam over multiple access points. However, designing an appropriate handover authentication protocol is a difficult task ...
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
(
IEEE Computer Society
, 2015 , Article)
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ...
Mobile application security: Malware threats and defenses
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Due to the quantum leap in functionality, the rate of upgrading traditional mobile phones to smartphones is tremendous. One of the most attractive features of smartphones is the availability of a large number of apps for ...
Implementation and Analysis of Reward Functions under Different Traffic Models for Distributed DSA Systems
(
IEEE
, 2015 , Article)
In this paper, we implement and analyze a resource allocation protocol for distributed dynamic spectrum allocation (DSA) systems. The DSA protocol is a learning-based protocol that allows secondary users (SU) to exploit ...
A distributed gateway selection algorithm for UAV networks
(
IEEE Computer Society
, 2015 , Article)
In recent years, unmanned aerial vehicle (UAV) has been widely adopted in military and civilian applications. For small UAVs, cooperation based on communication networks can effectively expand their working area. Although ...
Efficient rule engine for smart building systems
(
IEEE Computer Society
, 2015 , Article)
In smart building systems, the automatic control of devices relies on matching the sensed environment information to customized rules. With the development of wireless sensor and actuator networks (WSANs), low-cost and ...
Software-defined networking security: Pros and cons
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase ...
Internet of Things: A Survey on Enabling Technologies, Protocols, and Applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols, and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication ...
Performance Evaluation of IEEE 802.15.4 Nonbeacon-Enabled Mode for Internet of Vehicles
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
The Internet of Vehicle (IoV) network refers to networking technologies that could support highly economical and effective communication channels for interactions between vehicles. The success of IoV relies on efficient ...
Automatic Modulation Classification for Low SNR Digital Signal in Frequency-Selective Fading Environments
(
Kluwer Academic Publishers
, 2015 , Article)
In this research, a classifier is proposed for automatic modulation classification of some common modulation schemes, i.e., BPSK, QPSK, 8-PSK and 16-QAM. Our proposed classifier considers multipath fading effects on the ...