Learn More
Seamless roaming over wireless network is highly desirable to mobile users, and security such as authentication of mobile users is challenging. Recently, due to tamper-resistance and convenience in managing a password file, some smart card based secure authentication schemes have been proposed. This paper shows some security weaknesses in those schemes. As(More)
High demands for broadband mobile wireless communications and the emergence of new wireless multimedia applications constitute the motivation to the development of broadband wireless access technologies in recent years. The Long Term Evolution/System Architecture Evolution (LTE/SAE) system has been specified by the Third Generation Partnership Project(More)
Network lifetime (NL) is a critical metric in the design of energy-constrained wireless sensor networks (WSNs). In this paper, we investigate a joint optimal design of the physical, medium access control (MAC) and routing layers to maximize NL of a multiple-sources and single-sink (MSSS) WSN with energy constraints. The problem of NL maximization (NLM) can(More)
In this paper, we investigate the issue of vertical handoffs in heterogeneous wireless networks. A QoS-based vertical handoff scheme for WLAN and WiMAX interworking networks is proposed with aim to provide always best service to users. We also present a simple, yet efficient method to estimate the available bandwidth in WLAN and WiMAX networks to evaluate(More)
Load balancing is of paramount importance in grid computing. Generally, load balancing can be categorised into two classes of activity based on the type of information on which the corresponding decisions are made, namely averages-based and instantaneous measures-based classes. Either class has certain flaws which confine themselves to limited performance(More)
“Vehicle-to-grid” (V2G) power will be a new green energy scheme in which electric or plug-in hybrid vehicles communicate with the smart grid to sell demand response services by either delivering electricity into the grid or by throttling their charging rate. Due to high vehicular speed, sporadic connection, limited communication range, and(More)
Three-party authenticated key exchange protocol (3PAKE) is an important cryptographic technique for secure communication which allows two parties to agree a new secure session key with the help of a trusted server. In this paper, we propose a new three-party authenticated key exchange protocol which aims to achieve more efficiency with the same security(More)