Different applications have different security requirements for data privacy, data integrity, and authentication. Encryption is one technique that addresses these requirements. En...
Lyndon G. Pierson, Edward L. Witzke, Mark O. Bean,...
Abstract— In this paper, we propose an incentive system to stimulate the nodes’ cooperation in multi-hop wireless networks. Reducing the number and the size of the payment rece...
Abstract--Cognitive radio networks require fast and reliable spectrum sensing to achieve high network utilization by secondary users. Current optimization approaches to spectrum se...
Abstract. This paper is motivated by exploring the impact of the number of channels on the achievable communication latency for a specific communication task. We focus on how to u...
Peng-Jun Wan, Zhu Wang, Zhiyuan Wan, Scott C.-H. H...
Sensor nodes are often organized into clusters to facilitate many network operations such as data aggregation. Clustering has to be protected in hostile environments. Otherwise, a...