Software-defined networking: Challenges and research opportunities for future internet

A Hakiri, A Gokhale, P Berthou, DC Schmidt… - Computer Networks, 2014 - Elsevier
Currently many aspects of the classical architecture of the Internet are etched in stone–a so
called ossification of the Internet–which has led to major obstacles in IPv6 deployment and …

: Routing Scheme to Maximize Lifetime and Throughput of Wireless Sensor Networks

A Ahmad, N Javaid, ZA Khan, U Qasim… - IEEE Sensors …, 2014 - ieeexplore.ieee.org
Regarding energy efficiency in wireless sensor networks (WSNs), routing protocols are
engaged in a playful manner suggesting a consciousness of high value. In this paper, we …

A jamming game with rival-type uncertainty

A Garnaev, AP Petropulu, W Trappe… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
We consider the communication between a source (user) and a destination in the presence
of a jammer, and study resource assignment in a non-cooperative game theory framework. A …

Managing wireless fog networks using software-defined networking

A Hakiri, B Sellami, P Patil, P Berthou… - 2017 ieee/acs 14th …, 2017 - ieeexplore.ieee.org
Fog computing has recently emerged as a new cyber foraging technique to offload resource-
intensive tasks from mobile devices to mobile cloudlets in close proximity to endusers. Since …

A power control game with uncertainty on the type of the jammer

A Garnaev, A Petropulu, W Trappe… - 2019 IEEE Global …, 2019 - ieeexplore.ieee.org
We consider a single carrier communication system subjected to jamming, and study optimal
power control in the framework of game theory. The user's transmission utility is the signal-to …

Will MCCA revive wireless multihop networks?

E Khorov, A Krasilov, A Krotov, A Lyakhov - Computer Communications, 2017 - Elsevier
Wireless multihop networks (WMNs) are very favorable for many emerging applications,
including those connected with public safety, Internet of Things or future Next Generation 60 …

A sophisticated anti-eavesdropping strategy

A Garnaev, W Trappe - IEEE Wireless Communications Letters, 2022 - ieeexplore.ieee.org
Wireless networks are susceptible to malicious attacks, especially those involving
eavesdropping. In this letter, we consider a new type of anti-eavesdropping strategy which …

Fair congestion control in vehicular networks with beaconing rate adaptation at multiple transmit powers

E Egea-Lopez, P Pavon-Mariño - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Cooperative intervehicular applications rely on the exchange of broadcast single-hop status
messages among vehicles, which are called beacons. The aggregated load on the wireless …

On channel assignment for multicast in multi-radio multi-channel wireless mesh networks: A survey

J Wang, W Shi, F Jin - China Communications, 2015 - ieeexplore.ieee.org
The major challenge faced by wireless mesh networks is the capacity reduction caused by
interference, and interference can be reduced or even eliminated through appropriate …

Fair scheduling of bag-of-tasks applications on large-scale platforms

J Celaya, U Arronategui - Future Generation Computer Systems, 2015 - Elsevier
Users of distributed computing platforms want to obtain a fair share of the resources they
use. With respect to the amount of computation, the most suitable measure of fairness is the …