Learn More
Cognitive Radio (CR) is a novel technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary users without causing interference to their communication. Although the operational aspects of CR are being explored vigorously, its security aspects have gained little attention. In this paper, a brief overview(More)
ecent developments in wireless communication technology have resulted in tremendous innovations to make wireless access networks able to replace wired access networks with much more bandwidth. The IEEE 802.16d standard, which was ratified in June 2004, specified all the techniques needed at the physical layer and the services that should be provided at the(More)
sensor networks are deployed in a hostile environment, security becomes extremely important. Abstract-sensor networks are deployed in a hostile environment, security becomes extremely important. An efficient Key Management Scheme to provide security in HSN. In HSN, Clusters are formed as shown in below figure. Routing is done in two phases: 1) Intra-cluster(More)
The current centrally controlled power grid is undergoing a drastic change in order to deal with increasingly diversified challenges, including environment and infrastructure. The next-generation power grid, known as the smart grid, will be realized with proactive usage of state-of-the-art technologies in the areas of sensing, communications, control,(More)
5G networks are expected to achieve gigabit-level throughput in future cellular networks. However, it is a great challenge to treat 5G wireless backhaul traffic in an effective way. In this article, we analyze the wireless backhaul traffic in two typical network architectures adopting small cell and millimeter wave communication technologies. Furthermore,(More)
Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor(More)