Search
Now showing items 1-10 of 497
Unleashing the secure potential of the wireless physical layer: Secret key generation methods
(
Elsevier B.V.
, 2016 , Report)
Within the paradigm of physical layer security, a physical layer characteristic is used as a common source of randomness to generate the secret key. This key is then used to encrypt the data to hide information from ...
Dual-polarized spatial-temporal propagation measurement and modeling in uma o2i scenario at 3.5 GHz
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Outdoor-to-indoor (O2I) coverage in urban areas by using the sub-6 GHz (sub-6G) band is important in the fifth generation (5G) mobile communication system. The spatial-temporal propagation characteristics in different ...
An incentive mechanism for data sharing based on blockchain with smart contracts
(
Elsevier
, 2020 , Article)
© 2020 Data sharing techniques have progressively drawn increasing attention as a means of significantly reducing repetitive work. However, in the process of data sharing, the challenges regarding formation of mutual-trust ...
A graph convolutional network-based deep reinforcement learning approach for resource allocation in a cognitive radio network
(
MDPI
, 2020 , Article)
Cognitive radio (CR) is a critical technique to solve the conflict between the explosive growth of traffic and severe spectrum scarcity. Reasonable radio resource allocation with CR can effectively achieve spectrum sharing ...
Guest Editorial: Special issue on green internet of things: Challenges and future opportunities - Part II
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Other)
[No abstract available]
Machine-Learning-Based Efficient and Secure RSU Placement Mechanism for Software-Defined-IoV
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The massive increase in computing and network capabilities has resulted in a paradigm shift from vehicular networks to the Internet of Vehicles (IoV). Owing to the dynamic and heterogeneous nature of IoV, it requires ...
CorrAUC: A Malicious Bot-IoT Traffic Detection Method in IoT Network Using Machine-Learning Techniques
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
Identification of anomaly and malicious traffic in the Internet-of-Things (IoT) network is essential for the IoT security to keep eyes and block unwanted traffic flows in the IoT network. For this purpose, numerous ...
Edge Intelligence for Empowering IoT-Based Healthcare Systems
(
Institute of Electrical and Electronics Engineers Inc.
, 2021 , Article)
The demand for real-time, affordable, and efficient smart healthcare services is increasing exponentially due to the technological revolution and burst of population. To meet the increasing demands on this critical ...
An optimizing and differentially private clustering algorithm for mixed data in SDN-based smart grid
(
Institute of Electrical and Electronics Engineers Inc.
, 2019 , Article)
Software-defined network (SDN) is widely used in smart grid for monitoring and managing the communication network. Big data analytics for SDN-based smart grid has got increasing attention. It is a promising approach to use ...
A blockchain and deep neural networks-based secure framework for enhanced crop protection
(
Elsevier B.V.
, 2021 , Article)
The problem faced by one farmer can also be the problem of some other farmer in other regions. Providing information to farmers and connecting them has always been a challenge. Crowdsourcing and community building are ...