Learn More
Security is critical for sensor networks used in military, homeland security and other hostile environments. Previous research on sensor network security mainly considers homogeneous sensor networks. Research has shown that homogeneous ad hoc networks have poor performance and scalability. Furthermore, many security schemes designed for homogeneous sensor(More)
Cognitive Radio (CR) is a novel technology that promises to solve the spectrum shortage problem by allowing secondary users to coexist with primary users without causing interference to their communication. Although the operational aspects of CR are being explored vigorously, its security aspects have gained little attention. In this paper, a brief overview(More)
—Secure data transmission is a critical issue for wireless sensor networks (WSNs). Clustering is an effective and practical way to enhance the system performance of WSNs. In this paper, we study a secure data transmission for cluster-based WSNs (CWSNs), where the clusters are formed dynamically and periodically. We propose two secure and efficient data(More)
he current centrally controlled electrical grid is a large interconnected network that delivers electricity from suppliers to consumers. New challenges are emerging in the traditional power grid, such as rising energy demand, aging infrastructure, renewable energy sources, reliability , and security [1–4]. These challenges have become a global concern that(More)
5G networks are expected to achieve Gigabit level throughput in future cellular networks. However, it is a great challenge to treat the 5G wireless backhaul traffic in an effective way. In this paper, we analyze the wireless backhaul traffic in two typical network architectures adopting small cell and millimeter wave communication technologies. Furthermore,(More)
ecent developments in wireless communication technology have resulted in tremendous innovations to make wireless access networks able to replace wired access networks with much more bandwidth. The IEEE 802.16d standard, which was ratified in June 2004, specified all the techniques needed at the physical layer and the services that should be provided at the(More)