Advanced Communication Systems and Information Security
Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20–22, 2019, Revised Selected Papers
Chapter and Conference Paper
Ad hoc networks are particularly vulnerable as compare to traditional networks mainly due to their lack of infrastructure. A malicious node can easily disrupt both the routing discovery phase and the data forw...
Article
Optimization of energy usage in wireless sensor networks (WSN) has been an active research field for the last decades and various approaches have been explored. In fact, A well designed energy consumption mode...
Article
In large scale networks like the IEEE 802.16 (WiMAX), it is very important not only to monitor, but also to control the amount of traffic injected into the network. This process helps in decreasing congestion ...
Article
In WiMAX networks, contention based bandwidth requests are allowed in the uplink channel on the time division duplexing frame. The standard allows some types of traffic classes to use this period while prevent...
Article
Wearable computing is becoming a more and more attracting field in the last years thanks to the miniaturisation of electronic devices. Wearable healthcare monitoring systems (WHMS) as an important client of we...
Article
This paper presents a game theoretic framework to analyze a cellular-WLAN heterogeneous network from a virtual multiple-input multiple-output (VMIMO) perspective. Namely, we restrict to the uplink case and con...
Chapter and Conference Paper
In recent years, mobile ad hoc networks are invading more and more our daily lives. Indeed, several persons are linked daily to ad hoc networks, which aim to exchange data via smartphones, computers, or tablet...
Chapter and Conference Paper
In this paper we study the resources access problem in cognitive radio networks, especially we are interested in the large number of secondary users (SUs) present in the system. We propose a model based on cha...
Article
In this paper we study the resources access problem in cognitive radio networks, especially we are interested in the large number of secondary users (SUs). We establish a model based on channel access process ...
Book and Conference Proceedings
Second International Conference, ACOSIS 2019, Marrakesh, Morocco, November 20–22, 2019, Revised Selected Papers
Article
Book and Conference Proceedings
17th International Conference on E-Business and Telecommunications, ICETE 2020, Online Event, July 8–10, 2020, Revised Selected Papers
Book and Conference Proceedings
7th International Symposium, UNet 2021, Virtual Event, May 19–22, 2021, Revised Selected Papers
Chapter
In the ever-changing world of information security, networks had expanded in scale and complexity that integrates wide range of business functions, intrusion threats have increased in occurrence and intelligen...
Article
In this study, a secure and coordinated blockchain based energy trading system for Electric Vehicles (EVs) is presented. The major goals of this study are to provide secure and efficient energy trading between...
Article
Traffic congestion is one of the biggest challenges around the world, resulting in multiple harmful consequences such as air pollution, road fatalities, and traffic jams. Thus, it is a vital need to develop pr...