Learn More
Cognitive Radio (CR) is a novel technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary users without causing interference to their communication. Although the operational aspects of CR are being explored vigorously, its security aspects have gained little attention. In this paper, a brief overview(More)
Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor(More)
he current centrally controlled electrical grid is a large interconnected network that delivers electricity from suppliers to consumers. New challenges are emerging in the traditional power grid, such as rising energy demand, aging infrastructure, renewable energy sources, reliability , and security [1–4]. These challenges have become a global concern that(More)
5G networks are expected to achieve Gigabit level throughput in future cellular networks. However, it is a great challenge to treat the 5G wireless backhaul traffic in an effective way. In this paper, we analyze the wireless backhaul traffic in two typical network architectures adopting small cell and millimeter wave communication technologies. Furthermore,(More)
—Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two secure and efficient data(More)