The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
The formation of a Cognitive Personal Area Network (CPAN) involves a group of nodes connecting to a dedicated coordinator. In this paper, we propose a protocol for the formation of a CPAN in which nodes arrive randomly and their times to rendezvous (TTRs) with the CPAN coordinator may overlap, partially or fully, with one another. We develop an analytical model for the group joining time, i.e., the...
We propose lightweight protocol for securing communication and preserving users' anonymity and location privacy in hybrid ad hoc networks. Symmetric-key-cryptography operations and payment system are used to secure route discovery and data transmission. To reduce the overhead, the payment can be secured without submitting or processing payment proofs (receipts). To preserve users' anonymity with low...
We derive probability distribution for the duration of total blackouts — periods in which no channel is idle — in the set of channels used by a cognitive network under random activity of independent primary users. We show that the mean value of blackout duration is very dependent on the number of channels in the network, and somewhat dependent on the activity factor (i.e., duty cycle) of primary user...
In this paper, we investigate the IEEE 802.11p based Vehicular Ad-hoc Network transition between non-saturation and saturation regimes with mobile nodes. We combine vehicular traffic theory, queuing model and Markov chain to evaluate the performance of the network under spatial or networking saturation for mutiple data classes over control and service channels with different transmission rates depending...
We present a safety message authentication scheme for vehicular ad hoc networks using an ID-based signature and verification mechanism. An ID-based technique offers a certificate-less public key verification, while a proxy signature provides flexibilities in message authentication and trust management. In this scheme, we incorporate an ID-based proxy signature framework with the standard ECDSA for...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.