Learn More
 Abstract—This paper provides an overview of the Internet of Things (IoT) with emphasis on enabling technologies, protocols and application issues. The IoT is enabled by the latest developments in RFID, smart sensors, communication technologies and Internet protocols. The basic premise is to have smart sensors collaborate directly without human involvement(More)
Cognitive Radio (CR) is a novel technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary users without causing interference to their communication. Although the operational aspects of CR are being explored vigorously, its security aspects have gained little attention. In this paper, a brief overview(More)
sensor networks are deployed in a hostile environment, security becomes extremely important. Abstract-sensor networks are deployed in a hostile environment, security becomes extremely important. An efficient Key Management Scheme to provide security in HSN. In HSN, Clusters are formed as shown in below figure. Routing is done in two phases: 1) Intra-cluster(More)
Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor(More)
The current centrally controlled power grid is undergoing a drastic change in order to deal with increasingly diversified challenges, including environment and infrastructure. The next-generation power grid, known as the smart grid, will be realized with proactive usage of state-of-the-art technologies in the areas of sensing, communications, control,(More)
5G networks are expected to achieve gigabit-level throughput in future cellular networks. However, it is a great challenge to treat 5G wireless backhaul traffic in an effective way. In this article, we analyze the wireless backhaul traffic in two typical network architectures adopting small cell and millimeter wave communication technologies. Furthermore,(More)