The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
With the development of Internet of Things (IoT), bridging wireless sensor networks (WSNs) and other networks has become important. We divide bridging solutions into two categories: hardware solutions and middleware solutions. Hardware solutions have both low power short distance wireless interfaces and other types of transmission interfaces, e.g. GPRS, 3G/4G, via hardware implementations. This kind...
In this paper, we design software of real-time data acquisition to meet the characteristics and demands of working flow of Software Defined Radio (SDR) receiver. the software is designed in multi-thread model, which can guarantee real-time performance and efficiency compared to single thread and it can be used in Windows XP to analysis intermediate frequency signal. Besides, efficient memory allocation...
Wireless sensor networks are designed for outdoor environment surveillance and require benign coverage, steady working status and long lifetime, moreover, they require efficient security services for rigorous applications. Most security schemes are designed to work efficiently only when bidirectional links exist. So do most key establishment protocols for WSNs. Traditional key establishment schemes...
The establishment of pair-wise key between two nodes in wireless sensor network is a big challenge. We propose a protocol PWKEP including three contributions: 1) Achieve secure key exchange protocol with mutual authentication. 2) Propose a modular approach for design of secure authenticated key exchange protocols. 3) Adopt elliptic curve Diffie-Hellman key exchange and argue reasonable energy consumption...
Cooperative communications can exploit the distributed spatial diversity to improve the multiple-link performance. In this paper, the average symbol error probability (SEP) is carefully investigated for the three-node relaying structure, in which the relaying protocol is amplify-and-forward, and the modulation scheme can be N-PSK or N-QAM. We first exploit the optimistic condition to derive the lower...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.