![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Article
A message transmission scheduling algorithm based on time-domain interference alignment in UWANs
High propagation delays cause message collisions at intended nodes, which seriously affects network performance. In this paper, we consider the transmission scheduling problem of messages with specified transm...
-
Chapter and Conference Paper
Memory Confidentiality and Integrity Protection Technology
In most existing computer systems, data transmission and preservation in the form of plaintext are vulnerable to various attacks. In this paper, we use Parralelized memory Confidentiality and Integrity Protect...
-
Article
A RSU-aided distributed trust framework for pseudonym-enabled privacy preservation in VANETs
Vehicular ad hoc networks (VANETs) have the potential to change the way of people drive, travel and so on, in which vehicle can broadcast and forward the message of road condition or emergency. When the receiv...
-
Article
Efficient key generation leveraging channel reciprocity and balanced gray code
Key generation leveraging wireless channel reciprocity can establish secret keys from unauthenticated broadcast channels and thus protect the communication of wireless networks. However, in real environments, ...
-
Article
A trigger-based pseudonym exchange scheme for location privacy preserving in VANETs
Location privacy plays an important role in Vehicular Ad Hoc Networks (VANETs). Pseudonym is normally used to preserve location privacy, which can meet the requirements of both privacy and security. When the s...
-
Article
A Novel Problem Model and Solution Scheme for Roadside Unit Deployment Problem in VANETs
Being the building block of network infrastructure for Vehicular Ad-hoc Networks (VANETs), Roadside Units (RSUs) can facilitate vehicle-to-vehicle communications and bridge communications between vehicles and ...
-
Article
Outage Probability of Cognitive Selective DF Relay Networks with Multiple Primary Nodes and Heterogenous Non-Identical Constraints
Outage probability analysis of cognitive selective DF relay networks with selection combining technique taking into account all the following issues is important: multiple SU relays, multiple PUs, non-identica...
-
Article
Outage Probability Equivalency of Three Typical Relay Selection Schemes for Selective DF Relay Networks with Selection Combining
Outage probability of selective decode-and-forward (DF) relay networks with different relay selection schemes are usually analyzed separately in the literature. In this paper, for selective DF relay networks w...
-
Article
Open AccessA reliable data transfer protocol based on twin paths and network coding for underwater acoustic sensor network
MPNC (multiple path and network coding) is proposed as a reliable transport protocol for UWASN (underwater acoustic sensor network). In MPNC, after three disjoint paths being established, two groups of packets (A
-
Article
Outage Analysis of Cognitive AF Relay Networks with Multiple Primary Users and Heterogeneous Non-identical Parameters
In this paper, we investigate outage performance of dual-hop cognitive AF relay networks with multiple primary users (PUs) and heterogeneous non-identical parameters, including non-identical Rayleigh fading ch...
-
Article
Open AccessResearch of localization algorithm based on weighted Voronoi diagrams for wireless sensor network
Wireless sensor network (WSN) is formed by a large number of cheap sensors, which are communicated by an ad hoc wireless network to collect information of sensed objects of a certain area. The acquired informatio...
-
Article
Open AccessAnalyzing the performance of Aloha in string multi-hop underwater acoustic sensor networks
In this article, we intend to investigate the performance of channel access protocols in multi-hop underwater acoustic sensor networks, which are characterized by long propagation delays and limited channel ba...