D He, S Chan, M Guizani - IEEE wireless communications, 2015 - ieeexplore.ieee.org
Smartphones and other trendy mobile wearable devices are rapidly becoming the dominant sensing, computing and communication devices in peoples' daily lives. Mobile crowd …
GM Borkar, AR Mahajan - International Journal of …, 2020 - inderscienceonline.com
Wireless communication formly mobile ad-hoc network (MANET) plays a significant role in modern technology for transmitting the packets from source node to destination node. The …
MK Denko, T Sun, I Woungang - Computer Communications, 2011 - Elsevier
Designing a trust management scheme that can effectively evaluate the relationships among devices in pervasive computing environments is a challenging task. This paper continues …
The trust is always present implicitly in the protocols based on cooperation, in particular, between the entities involved in routing operations in Ad hoc networks. Indeed, as the …
Friend based Ad hoc routing using Challenges to Establish Security (FACES) is an algorithm to provide secure routing in ad hoc mobile networks. We propose this scheme that has been …
ZigBee Network Protocols and Applications Page 1 ZigBee ® N etw ork Protocols and A pplications Edited by Chonggang Wang • Tao Jiang • Qian Zhang ZigBee® Network Protocols …
G Mali, S Misra - IEEE Transactions on Computers, 2015 - ieeexplore.ieee.org
A distributed topology management scheme in wireless multimedia sensor networks (WMSNs) ensures coverage of an event, prolongs network lifetime, and maintains …
We introduce TeaVisor that provides bandwidth isolation guarantee for network virtualization (NV) based on software-defined networking (SDN). SDN-based NV (SDN-NV) offers many …
In wireless sensor networks (WSNs), sensor devices have limited supply of energy. The sensor death due to dissipating battery energy is one of the fundamental design issues in …