Search
Now showing items 301-310 of 491
A measurement study on the topologies of BitTorrent networks
(
Institute of Electrical and Electronics Engineers Inc.
, 2013 , Article)
BitTorrent (BT) is a widely-used peer-to-peer (P2P) application. Most of BT's characteristics (except the topology) have been studied extensively by measurement approaches. In this paper, we deploy a measurement system to ...
Copy limited flooding over opportunistic networks
(2013 , Conference Paper)
Mobile devices with local wireless interfaces can be organized into opportunistic networks which exploit communication opportunities arising from the movement of their users. With the proliferation and increasing capabilities ...
DVF-fog: Distributed virtual firewall in fog computing based on risk analysis
(
Inderscience Publishers
, 2019 , Article)
To eliminate network saturation during data exchanges, fog computing is deployed as the technology that benefits from both cloud computing and internet of things (IoT) paradigms. Therefore, we focus on network access control ...
Bringing Deep Learning at the Edge of Information-Centric Internet of Things
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Various Internet solutions take their power processing and analysis from cloud computing services. Internet of Things (IoT) applications started discovering the benefits of computing, processing, and analysis on the device ...
ACPN: A novel authentication framework with conditional privacy-preservation and non-repudiation for VANETs
(
IEEE Computer Society
, 2015 , Article)
In Vehicular Ad hoc NETworks (VANETs), authentication is a crucial security service for both inter-vehicle and vehicle-roadside communications. On the other hand, vehicles have to be protected from the misuse of their ...
Millimeter-wave multimedia communications: Challenges, methodology, and applications
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
The worldwide opening of a massive amount of unlicensed millimeter-wave spectrum has triggered great interest in developing high-bit-rate multimedia services and applications. Specific challenges for mmWave communication ...
Securing cognitive radio networks against primary user emulation attacks
(
Institute of Electrical and Electronics Engineers Inc.
, 2015 , Article)
CR is a promising technology for next-generation wireless networks in order to efficiently utilize the limited spectrum resources and satisfy the rapidly increasing demand for wireless applications and services. Security ...
An Efficient Distributed Trust Model for Wireless Sensor Networks
(
IEEE Computer Society
, 2015 , Article)
Trust models have been recently suggested as an effective security mechanism for Wireless Sensor Networks (WSNs). Considerable research has been done on modeling trust. However, most current research work only takes ...
A survey on communication infrastructure for micro-grids
(2013 , Conference Paper)
A micro-grid is a small scale power supply network that is designed to provide electricity to a small community with its own renewable energy sources. Due to distributed generation variability, security and load sharing ...
Small data dissemination for wireless sensor networks: The security aspect
(
Institute of Electrical and Electronics Engineers Inc.
, 2014 , Article)
In wireless sensor networks small data dissemination protocols are used to adjust configuration parameters of sensors, or distribute management commands and queries to sensors. For security reasons every disseminated data ...