-
1
Framework for Secure Wireless Communication in Wireless Sensor Networks
Published 2013-12-01“…With large-scale and rapid development in wireless sensor networks (WSNs), there is great demand to adopt security mechanisms for secure wireless communication. …”
Get full text
Article -
2
Wireless quantum power distribution system based on wireless
Published 2020-02-01Subjects: Get full text
Article -
3
Research on the enhancement technology based on the 5G wireless access and wireless backhaul integration
Published 2022-05-01“…With the increasing requirements for communication services, it is necessary to focus on the factors such as the network coverage, the spectrum efficiency and the deployment and operation cost of operators when building 5G networks.The relay node introduced into the network can solve these problems.However, the relay node has self-interference.Although time-division multiplexing can avoid self-interference, it will increase the end-to-end service delay.In order to better solve these problems, the integrated enhancement technology researches were focused on the aspects of the resource multiplexing mode, the node timing, the guard band and the performance simulation verification between the wireless access and the wireless backhaul.The proposed integrated enhancement technology schemes not only avoid the self-interference of relay node, but also ensure the requirement for the service delay and user perceived throughput.…”
Get full text
Article -
4
Hybrid wireless mesh protocol
Published 2009-01-01Subjects: “…wireless mesh network…”
Get full text
Article -
5
-
6
Wireless May Benefit Blockchain
Published 2024-12-01“…Wireless technologies now take every part of one’s everyday life. …”
Get full text
Article -
7
Robust secure design for relay wireless sensor networks with simultaneous wireless information and power transfer
Published 2017-06-01“…In this article, we investigate the physical layer security problem in relay wireless sensor networks with simultaneous wireless information and power transfer. …”
Get full text
Article -
8
Downlink wireless resource allocation method of V2X based on wireless sensing assistance
Published 2022-09-01“…In vehicle-to-everything, the high-speed distribution and sharing of perception and safety data is crucial to road safety.However, the instability of communication links caused by high-speed vehicle movement will make the existing communication resource allocation methods based on vehicle location information reporting no longer efficient.Therefore, a downlink wireless resource allocation method based on wireless sensing assistance of communication nodes was proposed.Firstly, a joint optimization problem of communication mode selection and wireless resource allocation under the orthogonality of communication and sensing resources was constructed.Then, a communication mode selection based on clustering by Delaunay triangulation and a resource allocation strategy based on improved graph coloring to improve the downlink throughput was proposed to solve the problem of construction.Finally, the impact of wireless sensing estimation error and the number of vehicles on the performance of the algorithm was simulated and analyzed.Simulation results show that compared with traditional methods, the proposed algorithm can obtain better downlink communication performance gain under the same proportion of sensing bandwidth resources, and can withstand the impact of larger sensing errors on performance.At the same time, the computational complexity of the proposed algorithm is lower and the network computing resources can be saved.…”
Get full text
Article -
9
-
10
Optical wireless communication and internet of things
Published 2022-09-01Subjects: “…optical wireless communication…”
Get full text
Article -
11
-
12
PHYSICAL LAYER SECRECY ON WIRELESS NETWORK
Published 2016-06-01“…Our results have presented the utility of using physical layer secrecy to enhance the secrecy performance of wireless networks.…”
Get full text
Article -
13
-
14
On Key Evolution over Wireless Channels
Published 2015-07-01“…Noise is a powerful resource for the implementation of cryptographic primitives, especially in wireless networks. In general, a key agreement protocol is tailored to the channels and relies on the assumption that knowledge on the eavesdropper's channel is available. …”
Get full text
Article -
15
Wireless secure enhancement with cooperative jamming
Published 2017-02-01Subjects: Get full text
Article -
16
Survey: Discovery in Wireless Sensor Networks
Published 2012-01-01“…Neighbor discovery is a component of communication and access protocols for ad hoc networks. Wireless sensor networks often must operate under a more severe low-power regimen than do traditional ad hoc networks, notably by turning off radio for extended periods. …”
Get full text
Article -
17
Survey of mobility prediction in wireless network
Published 2019-08-01Subjects: Get full text
Article -
18
Aggregate Queries in Wireless Sensor Networks
Published 2012-09-01“…In order to solve these problems and to enhance the efficiency of aggregate query processing in wireless sensor networks, this paper proposes Bucket-based Parallel Aggregation (BPA). …”
Get full text
Article -
19
Security Analysis in Wireless Sensor Networks
Published 2014-10-01“…In recent years, wireless sensor network (WSN) is employed in many application areas such as monitoring, tracking, and controlling. …”
Get full text
Article -
20
Research of connectivity for wireless sensor networks
Published 2009-01-01Subjects: “…wireless sensor networks…”
Get full text
Article