The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
In opportunistic networks, forwarding based protocols lead to a large amount of data flow to the highly connected nodes and unfairness of the nodes' traffic load, finally, it makes the highly connected nodes suffer congestion and results in the messages were discarded. To solve this problem, a congestion control algorithm based on Social Awareness is proposed in this paper. When choosing the next...
Based on fresh random challenge response authentication and key agreement, access control, priority control mechanisms, this paper puts forward a security protection communication protocol to guarantee the data transmission security of electricity acquisition terminal and the acquisition host. From the angle of attack detection, this proposed protocol was proved that can resists replay attack, counterfeit...
This paper presents the modified least squares iteration (MLSI). It is calculated by the least squares and trilateration to reduce positioning errors. In this study, environment model curves build to estimate the distance by ZigBee received dB value. Then, use trilateration to measure distance of reference and destination nodes. When the position errors appear, it will affect the obtained trilateration...
Vehicular Ad-hoc Networks (VANETs) are formed by a huge number of vehicles which act as the network nodes and communicate with one another. This emerging paradigm has opened up new business opportunities and enables numerous applications ranging from road safety enhancement to mobile entertainment. A fundamental issue that impacts the successful deployment of VANET applications is the security and...
In this paper, a cooperative spectrum sharing protocol with quality-of-service (QoS) support for both of the primary and secondary systems is proposed. Specifically, the secondary system gains primary spectrum access by allocating a fraction of its power to forward the primary signal helping the primary system achieve the target rate, and meanwhile exploits the remaining power to transmit its own...
E-voting techniques and systems have not been widely accepted and deployed by society due to various concerns and problems. One particular issue associated with many existing e-voting techniques is the lack of transparency, leading to the failure to deliver voter assurance. In this work, we propose an assurable, transparent, and mutual restraining e-voting protocol that exploits the existing two-party...
In this paper, we propose an anti-interference cooperative spectrum sharing strategy in cognitive two-phase full-duplex relaying networks, in which the secondary system acts as a decode-and-forward relay to assist the primary system achieve the target transmission rate. As a reward, the secondary system can gain access to the licensed primary spectrum to transmit its own signal in both two phases...
The recent penetration of smart mobile devices into the consumer market sets a stage for novel network applications. In particular, we envision a paradigm shift in the commercial advertising model facilitated by the widespread uses of these devices: advertisements circulate in a word-of-mouth fashion among device users and reach potential customers based on the users' knowledge about their contacts...
Most password-authenticated key agreement protocols have focused on authenticated key agreement using shared password between a client and a server. With the emergence of a variety of communication environments such as EPC global network, it is necessary to construct a secure channel between clients. Cross-realm client-to-client password-authenticated key agreement (C2C-PAKA) protocol can provide...
SMTP protocol lacks of many necessary authentication regulations and the behavioral restrictions to the senders, which is the reasons that cause the spread of spam. At present, spam has making billions of money loss. For these reasons, combined with our current anti-spam gateway and network transport protocols, in this paper we propose a damping approach, in order to inhibit the efficiency of the...
Among all the restraints of the development of e-commerce, the security problem of transaction has become the key element. Meanwhile all kinds of e-commerce security technologies have attracted more and more attention and study. In order to find better solutions of e-commerce security problems, such as anti-wiretapping, anti-juggling of the information, transaction denying, and the false order form...
This paper presents a hybrid routing protocol based on Mobile Agent (HRPMA) for Ad Hoc Networks (MANET). In the proposed approach, a few mobile agents move in the network and communicate with each node. They collect the network information to build the global information matrix of nodes. The data packets are transferred according to the matrix by a routing search algorithm. We have done the experiments...
An efficient shared signature based on elliptic curve cryptography is presented in this paper. The mainly steps of this scheme is given firstly, and then the detailed protocol in the environment of electronic transaction based on smart card is researched. Analysis shows the scheme has better security and efficiency. Lastly, the application of our scheme on electronic cash protocol with smart card...
Due to the unique operational environment of WSNs combined with their communication medium that is open to eavesdroppers, the traditional wireless network threats manifest in new forms. Consequently, key management protocols have become paramount in mitigating the damage caused. Numerous group-key protocols have been proposed in an effort to restrict access to only legitimate users. However, the group-key...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.