期刊文献+
共找到3,194篇文章
< 1 2 160 >
每页显示 20 50 100
Research on Multiple Access Algorithms for Wireless Network
1
作者 Kaifeng Yao 《Journal of Electronic Research and Application》 2024年第4期55-63,共9页
Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“ce... Nodes in the communication network mainly depend on the Media Access Control(MAC)layer protocol design.To ensure the MAC protocol achieves high throughput,low latency,and high service quality,this paper designed a“centralized-distribution”system MAC protocol combined with a slot allocation algorithm.This allows it to quickly adapt to the topology changes in the network and the overall network frame structure.For the centralized time slot allocation,since the system’s frame structure changes across the entire network,the root node must gather information from other nodes.This ensures that the root node can collect the latest topology information when the network topology changes and subsequently adjust the frame structure of the whole network for the distributed time slot allocation.The simulation results show that the adaptive time-division multiple access mechanism can quickly adapt to changes in topology and the network’s frame structure.It enables adaptive changes in node transmission times,ensures the rapid transmission and circulation of large-capacity data between nodes,and improves transmission efficiency. 展开更多
关键词 TDMA wireless network MAC protocol Time gap allocation
下载PDF
Intelligent Reflecting Surface Assisted Transmission Optimization Strategies in Wireless Networks
2
作者 He Xinxin Qi Xuan +2 位作者 Meng Wei Liu Wei Yin Changchuan 《China Communications》 SCIE CSCD 2024年第4期120-135,共16页
Wireless Power Transfer(WPT)technology can provide real-time power for many terminal devices in Internet of Things(IoT)through millimeterWave(mmWave)to support applications with large capacity and low latency.Although... Wireless Power Transfer(WPT)technology can provide real-time power for many terminal devices in Internet of Things(IoT)through millimeterWave(mmWave)to support applications with large capacity and low latency.Although the intelligent reflecting surface(IRS)can be adopted to create effective virtual links to address the mmWave blockage problem,the conventional solutions only adopt IRS in the downlink from the Base Station(BS)to the users to enhance the received signal strength.In practice,the reflection of IRS is also applicable to the uplink to improve the spectral efficiency.It is a challenging to jointly optimize IRS beamforming and system resource allocation for wireless energy acquisition and information transmission.In this paper,we first design a Low-Energy Adaptive Clustering Hierarchy(LEACH)clustering protocol for clustering and data collection.Then,the problem of maximizing the minimum system spectral efficiency is constructed by jointly optimizing the transmit power of sensor devices,the uplink and downlink transmission times,the active beamforming at the BS,and the IRS dynamic beamforming.To solve this non-convex optimization problem,we propose an alternating optimization(AO)-based joint solution algorithm.Simulation results show that the use of IRS dynamic beamforming can significantly improve the spectral efficiency of the system,and ensure the reliability of equipment communication and the sustainability of energy supply under NLOS link. 展开更多
关键词 intelligent reflecting surface(IRS) joint optimization millimeter wave wireless information transmission(WIT) wireless power transfer(WPT)
下载PDF
Machine Learning Based Classifiers for QoE Prediction Framework in Video Streaming over 5G Wireless Networks 被引量:1
3
作者 K.B.Ajeyprasaath P.Vetrivelan 《Computers, Materials & Continua》 SCIE EI 2023年第4期1919-1939,共21页
Recently,the combination of video services and 5G networks have been gaining attention in the wireless communication realm.With the brisk advancement in 5G network usage and the massive popularity of threedimensional ... Recently,the combination of video services and 5G networks have been gaining attention in the wireless communication realm.With the brisk advancement in 5G network usage and the massive popularity of threedimensional video streaming,the quality of experience(QoE)of video in 5G systems has been receiving overwhelming significance from both customers and service provider ends.Therefore,effectively categorizing QoE-aware video streaming is imperative for achieving greater client satisfaction.This work makes the following contribution:First,a simulation platform based on NS-3 is introduced to analyze and improve the performance of video services.The simulation is formulated to offer real-time measurements,saving the expensive expenses associated with real-world equipment.Second,A valuable framework for QoE-aware video streaming categorization is introduced in 5G networks based on machine learning(ML)by incorporating the hyperparameter tuning(HPT)principle.It implements an enhanced hyperparameter tuning(EHPT)ensemble and decision tree(DT)classifier for video streaming categorization.The performance of the ML approach is assessed by considering precision,accuracy,recall,and computation time metrics for manifesting the superiority of these classifiers regarding video streaming categorization.This paper demonstrates that our ML classifiers achieve QoE prediction accuracy of 92.59%for(EHPT)ensemble and 87.037%for decision tree(DT)classifiers. 展开更多
关键词 QoE-aware video streaming 5G networks wireless networks ensemble method
下载PDF
Blockchain Enabled Metaheuristic Cluster Based Routing Model for Wireless Networks
4
作者 R.M.Bhavadharini S.Karthik 《Computer Systems Science & Engineering》 SCIE EI 2023年第2期1233-1250,共18页
With recent advancements made in wireless communication techniques,wireless sensors have become an essential component in both data collection as well as tracking applications.Wireless Sensor Network(WSN)is an integra... With recent advancements made in wireless communication techniques,wireless sensors have become an essential component in both data collection as well as tracking applications.Wireless Sensor Network(WSN)is an integral part of Internet of Things(IoT)and it encounters different kinds of security issues.Blockchain is designed as a game changer for highly secure and effective digital society.So,the current research paper focuses on the design of Metaheuristic-based Clustering with Routing Protocol for Blockchain-enabled WSN abbreviated as MCRP-BWSN.The proposed MCRP-BWSN technique aims at deriving a shared memory scheme using blockchain technology and determine the optimal paths to reach the destination in clustered WSN.In MCRP-BWSN technique,Chimp Optimization Algorithm(COA)-based clustering technique is designed to elect a proper set of Cluster Heads(CHs)and organize the selected clusters.In addition,Horse Optimization Algorithm(HOA)-based routing technique is also presented to optimally select the routes based onfitness function.Besides,HOA-based routing technique utilizes blockchain technology to avail the shared mem-ory among nodes in the network.Sensor nodes are treated as coins whereas the ownership handles the sensor nodes and Base Station(BS).In order to validate the enhanced performance of the proposed MCRP-BWSN technique,a wide range of simulations was conducted and the results were examined under different measures.Based on the performance exhibited in simulation outcomes,the pro-posed MCRP-BWSN technique has been established as a promising candidate over other existing techniques. 展开更多
关键词 wireless networks blockchain routing protocol CLUSTERING SECURITY metaheuristics
下载PDF
Optimal Resource Allocation for NOMA Wireless Networks
5
作者 Fahad R.Albogamy M.A.Aiyashi +2 位作者 Fazirul Hisyam Hashim Imran Khan Bong Jun Choi 《Computers, Materials & Continua》 SCIE EI 2023年第2期3249-3261,共13页
The non-orthogonal multiple access(NOMA)method is a novel multiple access technique that aims to increase spectral efficiency(SE)and accommodate enormous user accesses.Multi-user signals are superimposed and transmitt... The non-orthogonal multiple access(NOMA)method is a novel multiple access technique that aims to increase spectral efficiency(SE)and accommodate enormous user accesses.Multi-user signals are superimposed and transmitted in the power domain at the transmitting end by actively implementing controllable interference information,and multi-user detection algorithms,such as successive interference cancellation(SIC),are performed at the receiving end to demodulate the necessary user signals.Although its basic signal waveform,like LTE baseline,could be based on orthogonal frequency division multiple access(OFDMA)or discrete Fourier transform(DFT)-spread OFDM,NOMA superimposes numerous users in the power domain.In contrast to the orthogonal transmission method,the nonorthogonal method can achieve higher spectrum utilization.However,it will increase the complexity of its receiver.Different power allocation techniques will have a direct impact on the system’s throughput.As a result,in order to boost the system capacity,an efficient power allocation mechanism must be investigated.This research developed an efficient technique based on conjugate gradient to solve the problem of downlink power distribution.The major goal is to maximize the users’maximum weighted sum rate.The suggested algorithm’s most notable feature is that it converges to the global optimal solution.When compared to existing methods,simulation results reveal that the suggested technique has a better power allocation capability. 展开更多
关键词 Non-orthogonalmultiple access wireless networks power domain 5G networks
下载PDF
Metaheuristics Based Node Localization Approach for Real-Time Clustered Wireless Networks
6
作者 R.Bhaskaran P.S.Sujith Kumar +3 位作者 G.Shanthi L.Raja Gyanendra Prasad Joshi Woong Cho 《Computer Systems Science & Engineering》 SCIE EI 2023年第1期1-17,共17页
In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,etc.At the same time,proper localization... In recent times,real time wireless networks have found their applicability in several practical applications such as smart city,healthcare,surveillance,environmental monitoring,etc.At the same time,proper localization of nodes in real time wireless networks helps to improve the overall functioning of networks.This study presents an Improved Metaheuristics based Energy Efficient Clustering with Node Localization(IM-EECNL)approach for real-time wireless networks.The proposed IM-EECNL technique involves two major processes namely node localization and clustering.Firstly,Chaotic Water Strider Algorithm based Node Localization(CWSANL)technique to determine the unknown position of the nodes.Secondly,an Oppositional Archimedes Optimization Algorithm based Clustering(OAOAC)technique is applied to accomplish energy efficiency in the network.Besides,the OAOAC technique derives afitness function comprising residual energy,distance to cluster heads(CHs),distance to base station(BS),and load.The performance validation of the IM-EECNL technique is carried out under several aspects such as localization and energy efficiency.A wide ranging comparative outcomes analysis highlighted the improved performance of the IM-EECNL approach on the recent approaches with the maximum packet delivery ratio(PDR)of 0.985. 展开更多
关键词 wireless networks real time applications CLUSTERING node localization energy efficiency metaheuristics
下载PDF
Intelligent 6G Wireless Network with Multi-Dimensional Information Perception
7
作者 YANG Bei LIANG Xin +3 位作者 LIU Shengnan JIANG Zheng ZHU Jianchi SHE Xiaoming 《ZTE Communications》 2023年第2期3-10,共8页
Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in... Intelligence and perception are two operative technologies in 6G scenarios.The intelligent wireless network and information perception require a deep fusion of artificial intelligence(AI)and wireless communications in 6G systems.Therefore,fusion is becoming a typical feature and key challenge of 6G wireless communication systems.In this paper,we focus on the critical issues and propose three application scenarios in 6G wireless systems.Specifically,we first discuss the fusion of AI and 6G networks for the enhancement of 5G-advanced technology and future wireless communication systems.Then,we introduce the wireless AI technology architecture with 6G multidimensional information perception,which includes the physical layer technology of multi-dimensional feature information perception,full spectrum fusion technology,and intelligent wireless resource management.The discussion of key technologies for intelligent 6G wireless network networks is expected to provide a guideline for future research. 展开更多
关键词 6G wireless network artificial intelligence multi-dimensional information perception full spectrum fusion
下载PDF
Wireless Network Security Using Load Balanced Mobile Sink Technique
8
作者 Reem Alkanhel Mohamed Abouhawwash +2 位作者 S.N.Sangeethaa K.Venkatachalam Doaa Sami Khafaga 《Intelligent Automation & Soft Computing》 SCIE 2023年第2期2135-2149,共15页
Real-time applications based on Wireless Sensor Network(WSN)tech-nologies are quickly increasing due to intelligent surroundings.Among the most significant resources in the WSN are battery power and security.Clustering... Real-time applications based on Wireless Sensor Network(WSN)tech-nologies are quickly increasing due to intelligent surroundings.Among the most significant resources in the WSN are battery power and security.Clustering stra-tegies improve the power factor and secure the WSN environment.It takes more electricity to forward data in a WSN.Though numerous clustering methods have been developed to provide energy consumption,there is indeed a risk of unequal load balancing,resulting in a decrease in the network’s lifetime due to network inequalities and less security.These possibilities arise due to the cluster head’s limited life span.These cluster heads(CH)are in charge of all activities and con-trol intra-cluster and inter-cluster interactions.The proposed method uses Lifetime centric load balancing mechanisms(LCLBM)and Cluster-based energy optimiza-tion using a mobile sink algorithm(CEOMS).LCLBM emphasizes the selection of CH,system architectures,and optimal distribution of CH.In addition,the LCLBM was added with an assistant cluster head(ACH)for load balancing.Power consumption,communications latency,the frequency of failing nodes,high security,and one-way delay are essential variables to consider while evaluating LCLBM.CEOMS will choose a cluster leader based on the influence of the fol-lowing parameters on the energy balance of WSNs.According to simulatedfind-ings,the suggested LCLBM-CEOMS method increases cluster head selection self-adaptability,improves the network’s lifetime,decreases data latency,and bal-ances network capacity. 展开更多
关键词 wireless sensor network load balancing mechanism optimization power consumption network’s lifetime
下载PDF
Energy-Efficient Routing Protocol with Multi-Hop Fuzzy Logic for Wireless Networks
9
作者 J.Gobinath S.Hemajothi J.S.Leena Jasmine 《Intelligent Automation & Soft Computing》 SCIE 2023年第5期2457-2471,共15页
A Wireless Sensor Network(WSN)becomes a newer type of real-time embedded device that can be utilized for a wide range of applications that make regular networking which appears impracticable.Concerning the energy prod... A Wireless Sensor Network(WSN)becomes a newer type of real-time embedded device that can be utilized for a wide range of applications that make regular networking which appears impracticable.Concerning the energy produc-tion of the nodes,WSN has major issues that may influence the stability of the system.As a result,constructing WSN requires devising protocols and standards that make the most use of constrained capacity,especially the energy resources.WSN faces some issues with increased power utilization and an on going devel-opment due to the uneven energy usage between the nodes.Clustering has proven to be a more effective strategy in this series.In the proposed work,a hybrid meth-od is used for reducing the energy consumption among CHs.A Fuzzy Logic-based clustering protocol FLUC(unequally clustered)and Fuzzy Clustering with Energy-Efficient Routing Protocol(FCERP)are used.A Fuzzy Clustering with Energy Efficient Routing Protocol(FCERP)reduces the WSN power usage and increases the lifespan of the network.FCERP has created a novel cluster-based fuzzy routing mechanism that uses a limit value to combine the clustering and multi-hop routing capabilities.The technique creates uneven groups by using fuz-zy logic with a competitive range to choose the Cluster Head(CH).The input variables include the distance of the nodes from the ground station,concentra-tions,and remaining energy.The proposed FLUC-FCERP reduces the power usage and improves the lifetime of the network compared with the existing algorithms. 展开更多
关键词 Energy consumption LIFETIME wireless sensor network cluster head fuzzy logic unequally clustered fuzzy clustering energy-efficient protocol
下载PDF
An Efficient ECDSA-Based Signature Scheme for Wireless Networks 被引量:4
10
作者 XU Zhong DAI Guanzhong YANG Deming 《Wuhan University Journal of Natural Sciences》 CAS 2006年第6期1707-1710,共4页
Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied ... Wired equivalent security is difficult to provide in wireless networks due to high dynamics, wireless link vulnerability, and decentralization. The Elliptic Curve Digital Signature Algorithm(ECDSA) has been applied to wireless networks because of its low computational cost and short key size, which reduces the overheads in a wireless environment. This study improves the ECDSA scheme by reducing its time complexity. The significant advantage of the algorithm is that our new scheme needs not to calculate modular inverse operation in the phases of signature generation and signature verification. Such an improvement makes the proposed scheme more efficient and secure. 展开更多
关键词 SIGNATURE ECDSA wireless networks
下载PDF
MULTIPLE ATTRIBUTE NETWORK SELECTION ALGORITHM BASED ON AHP AND SYNERGETIC THEORY FOR HETEROGENEOUS WIRELESS NETWORKS 被引量:8
11
作者 Zhang Lina Zhu Qi 《Journal of Electronics(China)》 2014年第1期29-40,共12页
It is a hot issue in communication research field to select the best network for Heterogeneous Wireless Networks(HWNs),and it is also a difficult problem to reduce the handoff number of vertical handoff.In order to so... It is a hot issue in communication research field to select the best network for Heterogeneous Wireless Networks(HWNs),and it is also a difficult problem to reduce the handoff number of vertical handoff.In order to solve this problem,the paper proposes a multiple attribute network selection algorithm based on Analytic Hierarchy Process(AHP)and synergetic theory.The algorithm applies synergetics to network selection,considering the candidate network as a compound system composed of multiple attribute subsystems,and combines the subsystem order degree with AHP weight to obtain entropy of the compound system,which is opposite the synergy degree of a network system.The greater the synergy degree,the better the network performance.The algorithm takes not only the coordination of objective attributes but also Quality of Service(QoS)requirements into consideration,ensuring that users select the network with overall good performance.The simulation results show that the proposed algorithm can effectively reduce the handoff number and provide uses with satisfactory QoS according to different services. 展开更多
关键词 Heterogeneous wireless networks(HWNs) network selection Synergetic theory Order degree Analytic Hierarchy Process(AHP)
下载PDF
Modeling and Control for Wireless Networked Control System 被引量:3
12
作者 Chang-Chun Hua Ying Zheng Xin-Ping Guan 《International Journal of Automation and computing》 EI 2011年第3期357-363,共7页
In this paper, the stabilization problem is considered for the class of wireless networked control systems (WNCS). An indicator is introduced in the WNCS model. The packet drop sequences in the indicator are represe... In this paper, the stabilization problem is considered for the class of wireless networked control systems (WNCS). An indicator is introduced in the WNCS model. The packet drop sequences in the indicator are represented as states of a Markov chain. A new discrete Markov switching system model integrating 802.11 protocol and new scheduling approach for wireless networks with control systems are constructed. The variable controller can be obtained easily by solving the linear matrix inequality (LMI) with the use of the Matlab toolbox. Both the known and unknown dropout probabilities are considered. Finally, a simulation is given to show the feasibility of the proposed method. 展开更多
关键词 wireless networked control systems (WNCS) packet dropout sequences CONTROLLER network scheduling stability.
下载PDF
Location Verification Systems in Emerging Wireless Networks 被引量:5
13
作者 Shihao Yan Robert Malaney 《ZTE Communications》 2013年第3期3-10,共8页
As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of a... As location-based techniques and applications have become ubiquitous in emerging wireless networks, the verification of location information has become more important. In recent years, there has been an explosion of activity related to lo- cation-verification techniques in wireless networks. In particular, there has been a specific focus on intelligent transport systems because of the mission-critical nature of vehicle location verification. In this paper, we review recent research on wireless location verification related to vehicular networks. We focus on location verification systems that rely on for- mal mathematical classification frameworks and show how many systems are either partially or fully encompassed by such frameworks. 展开更多
关键词 location verification wireless networks likelihood ratio test decision rule
下载PDF
Complex field network-coded cooperation based on multi-user detection in wireless networks 被引量:2
14
作者 Jing Wang Xiangyang Liu +1 位作者 Kaikai Chi Xiangmo Zhao 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2013年第2期215-221,共7页
Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC... Cooperative communication can achieve spatial diversity gains,and consequently combats signal fading due to multipath propagation in wireless networks powerfully.A novel complex field network-coded cooperation(CFNCC) scheme based on multi-user detection for the multiple unicast transmission is proposed.Theoretic analysis and simulation results demonstrate that,compared with the conventional cooperation(CC) scheme and network-coded cooperation(NCC) scheme,CFNCC would obtain higher network throughput and consumes less time slots.Moreover,a further investigation is made for the symbol error probability(SEP) performance of CFNCC scheme,and SEPs of CFNCC scheme are compared with those of NCC scheme in various scenarios for different signal to noise ratio(SNR) values. 展开更多
关键词 network coding complex field wireless network cooperative communication multi-user detection
下载PDF
Feedback Stabilization over Wireless Network Using Adaptive Coded Modulation 被引量:5
15
作者 Li Yang Xin-Ping Guan +1 位作者 Cheng-Nian Long Xiao-Yuan Luo 《International Journal of Automation and computing》 EI 2008年第4期381-388,共8页
In this paper,we apply adaptive coded modulation (ACM) schemes to a wireless networked control system (WNCS) to improve the energy efficiency and increase the data rate over a fading channel.To capture the characteris... In this paper,we apply adaptive coded modulation (ACM) schemes to a wireless networked control system (WNCS) to improve the energy efficiency and increase the data rate over a fading channel.To capture the characteristics of varying rate, interference,and routing in wireless transmission channels,the concepts of equivalent delay (ED) and networked condition index (NCI) are introduced.Also,the analytic lower and upper bounds of EDs are obtained.Furthermore,we model the WNCS as a multicontroller switched system (MSS) under consideration of EDs and loss index in the wireless transmission.Sufficient stability condition of the closed-loop WNCS and corresponding dynamic state feedback controllers are derived in terms of linear matrix inequality (LMI). Numerical results show the validity and advantage of our proposed control strategies. 展开更多
关键词 wireless networked control system (WNCS) adaptive coded modulation (ACM) equivalent delay (ED) networked condition index (NCI) multicontroller switched system (MSS) stability.
下载PDF
Time Delay Characteristic of Industrial Wireless Networks Based on IEEE 802.15.4a 被引量:2
16
作者 Tong-Tao Li Ting-Gang Jia +1 位作者 Min-Rui Fei Huo-Sheng Hu 《International Journal of Automation and computing》 EI 2011年第2期170-176,共7页
The IEEE 802.15.4a standard provides a framework for low-data-rate communication systems,typically sensor networks.In this paper,we established a realistic environment for the time delay characteristic of industrial n... The IEEE 802.15.4a standard provides a framework for low-data-rate communication systems,typically sensor networks.In this paper,we established a realistic environment for the time delay characteristic of industrial network based on IEEE 802.15.4a.Several sets of practical experiments are conducted to study its various features,including the effects of 1) numeral wireless nodes,2) numeral data packets,3) data transmissions with different upper-layer protocols,4) physical distance between nodes,and 5) adding and reducing the number of the wireless nodes.The results show that IEEE 802.15.4a is suitable for some industrial applications that have more relaxed throughput requirements and time-delay.Some issues that could degrade the network performance are also discussed. 展开更多
关键词 Time delay characteristic IEEE 802.15.4a industrial wireless network performance test sensor networks.
下载PDF
Shortest Link Scheduling in Wireless Networks with Oblivious Power Control 被引量:1
17
作者 Chunmei Ma Jiguo Yu +1 位作者 Baogui Huang Yu Meng 《China Communications》 SCIE CSCD 2021年第4期137-152,共16页
Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is ma... Link scheduling has always been a fundamental problem in wireless networks for its direct impacts on the performance of wireless networks such as throughput capacity,transmission delay,lifetime,etc.Existing work is mainly established under graphbased models,which are not only impractical but also incorrect due to the essentially fading characteristics of signals.In this paper,we study the shortest link scheduling problem under two more realistic models,namely the signal to interference plus noise ratio(SINR)model and the Rayleigh fading model.We propose a centralized square-based scheduling algorithm(CSSA)with oblivious power control under the SINR model and prove its correctness under both the SINR model and the Rayleigh fading model.Furthermore,we extend CSSA and propose a distributed square-based scheduling algorithm(DSSA).Note that DSSA adopts CSMA/CA so that a wireless node can compete for the wireless channel before starting its communication.We also show theoretical analysis and conduct extensive simulations to exhibit the correctness and efficiency of our algorithms. 展开更多
关键词 link scheduling SINR Rayleigh fading wireless networks wireless communications
下载PDF
Game theory-based attack and defense analysis in virtual wireless networks with jammers and eavesdroppers 被引量:2
18
作者 Bassma S.Alsulami Chandra Bajracharya Danda B.Rawat 《Digital Communications and Networks》 SCIE CSCD 2021年第3期327-334,共8页
Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertain... Dynamic spectrum sharing and cognitive radio networks were proposed to enhance the Radio Frequency(RF)spectrum utilization.However,there are several challenges to realize them in real systems,such as sensing uncertainty causing issues to licensed users,business models for licensed service providers.Wireless virtualization is regarded as a technology that leverages service level agreements to sublease unused or underutilized RF spectrum that addresses aforementioned issues and helps to significantly enhance the utilization of the RF spectrum,offer improved coverage and capacity of networks,enhance network security and reduce energy consumption.With wireless virtualization,wireless networks'physical substrate is shared and reconfigured dynamically between virtual wireless networks through Mobile Virtual Network Operations(MVNOs).Wireless virtualization with dynamic configurable features of Wireless Infrastructure Providers(WIPs),virtualized wireless networks are vulnerable to a multitude of attacks,including jamming attacks and eavesdropping attacks.This paper investigates a means of defense through the employment of coalition game theory when jammers try to degrade the signal quality of legitimate users,and eavesdroppers aim to reduce secrecy rates.Specifically,we consider a virtual wireless network where MVNO users'job is to improve their Signal to Interference plus Noise Ratio(SINR)while the jammers target to collectively enhance their Jammer Received Signal Strength(JRSS),and an eavesdropper's goal is to reduce the overall secrecy rate.Numerical results have demonstrated that the proposed game strategies are effective(in terms of data rate,secrecy rate and latency)against such attackers compared to the traditional approaches. 展开更多
关键词 Game theory based security Virtual wireless networks Jamming and eavesdropping
下载PDF
Confidentiality-aware message scheduling for security-critical wireless networks 被引量:1
19
作者 Wei Jiang Guangze Xiong Xuyang Ding Zhengwei Chang Nan Sang 《Journal of Systems Engineering and Electronics》 SCIE EI CSCD 2010年第1期154-160,共7页
Without considering security, existing message scheduling mechanisms may expose critical messages to malicious threats like confidentiality attacks. Incorporating confidentiality improvement into message scheduling, t... Without considering security, existing message scheduling mechanisms may expose critical messages to malicious threats like confidentiality attacks. Incorporating confidentiality improvement into message scheduling, this paper investigates the problem of scheduling aperiodc messages with time-critical and security-critical requirements. A risk-based security profit model is built to quantify the security quality of messages; and a dynamic programming based approximation algorithm is proposed to schedule aperiodic messages with guaranteed security performance. Experimental results illustrate the efficiency and effectiveness of the proposed algorithm. 展开更多
关键词 security-critical wireless networks confidentialityaware REAL-TIME message scheduling.
下载PDF
An Improved Handoff Algorithm for Heterogeneous Wireless Networks 被引量:1
20
作者 Deepak Dahiya Payal Mahajan +1 位作者 Zaheeruddin Mamta Dahiya 《Computers, Materials & Continua》 SCIE EI 2022年第11期3433-3453,共21页
Heterogeneous Wireless Network is currently a major area of focus in communication engineering.But the important issue in recent communication is the approachability to the wireless networks while maintaining the qual... Heterogeneous Wireless Network is currently a major area of focus in communication engineering.But the important issue in recent communication is the approachability to the wireless networks while maintaining the quality of service.Today,all the wireless access networks are working in tandem to keep the users always connected to the internet cloud that matches the price affordability and performance goals.In order to achieve seamless connectivity,due consideration has to be given to handoff precision and a smaller number of handoffs.Several researchers have used heuristic approaches to solve this issue.In the present work,a hybrid intelligent algorithm has been suggested for vertical handoff decisions.This hybrid intelligent algorithm is based on dual optimization approach which uses“Particle Swarm Optimization(PSO)”and“Mobile Robustness Optimization(MRO)”techniques for improving the quality of services.This approach performs well even in the failure network conditions and gives the best results in terms of connectivity.The results at the last has been compared with the conventional techniques and it has been observed that the proposed methodology outperforms the existing one. 展开更多
关键词 PSO MRO heterogeneous wireless networks HANDOFF seamless connectivity
下载PDF
上一页 1 2 160 下一页 到第
使用帮助 返回顶部