[PDF][PDF] Implementing Physical Layer Security in Wireless Ad-hoc Networks and Wireless Sensor Networks with Reduced Outage and Bit Errors

S Joshi, D Mishra - International Journal of Computer Applications - academia.edu
Wireless ad-hoc networks (WANESTs) and Wireless Sensor Networks (WSNs) are typically
de-centralized in nature with minimal pre-reliance on the network architecture. They are …

Routing protocol for battery management system of electric vehicles based on ad‐hoc network

J Song, J Zhang, X Fan - IET Networks, 2018 - Wiley Online Library
The comprehensive performance of electric vehicles (EVs) and distribution of charging
locations are two key factors restricting the development of EVs. An effective way to improve …

[PDF][PDF] Multicriteria QoS-aware Solution in Wireless Multi-hop Networks

JNR Araujo, C de Castro Monteiro… - Proc. of the Thirteenth …, 2017 - researchgate.net
Ad-hoc Wireless Networks provide a major base for ubiquitous computing development. In
such networks, the communication occurs by multiple hops in a shared medium. In order to …

End-to-end Congestion Relief and Physical Layer Security-Aware Routing Design for Ad Hoc Networks in IoT Applications.

Y Xu, J Liu, R Ando, N Shiratori - Journal of Information …, 2018 - search.ebscohost.com
Ad hoc networks are important pillars for IoT (Internet of Things) development. In order to
support IoT traffic transmission in ad hoc networks, it is of great importance to design …

Optimizing resource allocation in infrastructure networks based on network function virtualization

TM Nguyen - 2017 - theses.hal.science
Network service providers have to cope with the growing on-demand need from end-users
as well as the diversity of usage. The" softwerization" and" loudification" of the network …

[PDF][PDF] Secure communication protocol design for buffer-aided relaying systems

何吉 - 2020 - fun.repo.nii.ac.jp
Secure Communication Protocol Design for Buffer-Aided Relaying Systems Page 1 Secure
Communication Protocol Design for Buffer-Aided Relaying Systems by Ji He A dissertation …

On Jamming Power Optimization for Secure and QoS-Aware Routing in Ad Hoc Networks

Y Xu, K Yang, Y Wang, Z Li, T Zhang… - … on Networking and …, 2020 - ieeexplore.ieee.org
This paper considers a typical ad hoc network composed of peer legitimate nodes, one
eavesdropping node and one cooperative jamming node, and investigates the jamming …

[PDF][PDF] Secure Communication Protocol Design for Buffer-Aided Relaying Systems

J He - (No Title), 2020 - core.ac.uk
Secure Communication Protocol Design for Buffer-Aided Relaying Systems Page 1 Secure
Communication Protocol Design for Buffer-Aided Relaying Systems by Ji He A dissertation …

Social Tie Based Cooperative Jamming for D2D Communications in the Internet of Things.

Y Gao, Y Zeng, ZH Liu, JF Ma… - Journal of Information …, 2019 - search.ebscohost.com
With the proliferation of short-range networks and the prevalence of devices connected to
these networks, the Internet of Things (IoT) has held the promise of improving our lives …

Investigating multicriteria approaches for the routing problem in ad-hoc wireless networks using QoS-aware metrics

JNR Araújo - 2018 - repositorio.ufmg.br
Ad-hoc Wireless Networks have aroused much interest of the scientific and business
community in the last two decades. Sensor, vehicular, and mobile networks have evolved …