Quantum key distribution: a networking perspective

M Mehic, M Niemiec, S Rass, J Ma, M Peev… - ACM Computing …, 2020 - dl.acm.org
The convergence of quantum cryptography with applications used in everyday life is a topic
drawing attention from the industrial and academic worlds. The development of quantum …

Finding your way in the fog: Towards a comprehensive definition of fog computing

LM Vaquero, L Rodero-Merino - ACM SIGCOMM computer …, 2014 - dl.acm.org
The cloud is migrating to the edge of the network, where routers themselves may become
the virtualisation infrastructure, in an evolution labelled as" the fog". However, many other …

Quantum key distribution networks: challenges and future research issues in security

CW Tsai, CW Yang, J Lin, YC Chang, RS Chang - Applied Sciences, 2021 - mdpi.com
A quantum key distribution (QKD) network is proposed to allow QKD protocols to be the
infrastructure of the Internet for distributing unconditional security keys instead of existing …

A hybrid secure routing and monitoring mechanism in IoT-based wireless sensor networks

BD Deebak, F Al-Turjman - Ad Hoc Networks, 2020 - Elsevier
Abstract Internet of Things (IoT) has advanced its pervasiveness across the globe for the
development of smart networks. It is aimed to deploy network edge that enables smart …

Secure routing for internet of things: A survey

D Airehrour, J Gutierrez, SK Ray - Journal of Network and Computer …, 2016 - Elsevier
Abstract The Internet of Things (IoT) could be described as the pervasive and global network
which aids and provides a system for the monitoring and control of the physical world …

ATPC: Adaptive transmission power control for wireless sensor networks

S Lin, F Miao, J Zhang, G Zhou, L Gu, T He… - ACM Transactions on …, 2016 - dl.acm.org
Extensive empirical studies presented in this article confirm that the quality of radio
communication between low-power sensor devices varies significantly with time and …

Performance analysis of AODV, DSR, OLSR and DSDV routing protocols using NS2 Simulator

S Mohapatra, P Kanungo - Procedia Engineering, 2012 - Elsevier
Path routing and protocol selection are the primary strategies to design any wireless
network. In Mobile Adhoc Network (MANET) the selected protocol should have best in terms …

Fog data analytics: A taxonomy and process model

A Kumari, S Tanwar, S Tyagi, N Kumar… - Journal of Network and …, 2019 - Elsevier
Through the exponential growth of sensors and smart gadgets (collectively referred to as
smart devices or Internet of Things (IoT) devices), significant amount of heterogeneous and …

Distributed scheduling using graph neural networks

Z Zhao, G Verma, C Rao, A Swami… - ICASSP 2021-2021 …, 2021 - ieeexplore.ieee.org
A fundamental problem in the design of wireless networks is to efficiently schedule
transmission in a distributed manner. The main challenge stems from the fact that optimal …

The 3D-3D registration problem revisited

H Li, R Hartley - 2007 IEEE 11th international conference on …, 2007 - ieeexplore.ieee.org
We describe a new framework for globally solving the 3D-3D registration problem with
unknown point correspondences. This problem is significant as it is frequently encountered …