The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Data centers are recognized as promising resources for emergency demand response (EDR) that requires a certain amount of power reduction when system reliability is in danger. In this paper, we study EDR in a colocation data center where multiple tenants deploy their own servers in a shared space managed by a data center operator. While the data center operator desires to reduce the usage of expensive...
As a constraint for smart devices, energy consumption has attract people's attention for a long time period. How to get higher resource utilization with less energy consumption is a challenge for cognitive radio networks. Secondary users have to participate in spectrum sensing at the cost of energy and access idle spectrum without interfering primary users. However, not all participating secondary...
Location inference attack may cause location privacy leakage of secondary users SUs in database-driven cognitive radio networks. Malicious entities could infer SUs' location with channel usage information. For the unpredictable return of primary users, there is no solution that is effective to location inference attack. To prevent location inference attack, we propose an Agent-based Channel Selection(ACS)...
Cognitive Radio (CR) technique is proved to be an efficient approach for mitigating the spectrum scarcity problem in wireless communications and spectrum allocation methods construct the foundation of such a technique. However, it will degrade the performance of CR when paying no attention to the behavior of second users (SUs) and their demands for spectrum attribute. In this paper, the spectrum allocation...
Recent years witness the rapid development of cloud computing and more and more data owners outsource their data to the cloud. To eliminate the disclosure of authorized data users' privacy in cloud services (e.g., cloud storage or cloud-assisted computing)-since the cloud providers cannot be fully trustworthy-several previous works have proposed considerable privacy-preserving schemes by exploiting...
In centralized cognitive radio networks (CRNs), the secondary user base station (SUBS), as a fusion center for sensing data, makes spectrum allocation decisions based on the sensing information from secondary users (SUs) around. However, secondary users’ changeable environment and easy compromise make the SUBS vulnerable to sensing data falsification and primary user emulation attack, which will mislead...
Cognitive radio (CR) is a novel technology that promises to improve spectrum efficiency by allowing secondary users (SUs) to dynamically access spectrum without using by primary users. With offering great flexibility and software reconfigurability, unsecured CR can be easily manipulated to attack legacy users on both control and data channels. In this paper, we explore anti-jamming schemes based on...
In recent years, Cognitive Radio (CR) has been regarded as the most promising technique for solving the problem of spectrum utilization. CR can scan the spectrum band and identify free channels which will be used by cognitive users with no harm to primary users. Due to the various dynamic characteristics of Cognitive Radio Networks (CRN), adaptation and secure communication are of greater significance...
We persent a new method for performing bands secelction exptements with 16 narrow-bands multispectal images data of cucumber. This method allows for the visual inspection base on the brightness value of the images which achieve standard assessment during visual wavelength region. It follows a standard feature selection approach in which correlative coefficient measure is used as a figure of merit...
It has been proved that Asymmetric cryptography can be used in Wireless Sensor Networks (WSNs). In this paper, we propose a secure Identity-based routing protocol, which can ensure that the nodes in routing discovery process are trusted nodes. Digital signatures based on ECC is used in our protocol, therefore, our protocol has many virtues, such as less energy cost, more rapid calculation, shorter...
Cognitive radio network is composed of many cognitive users with sensing and learning modules, and its spectrum allocation changes from the primary user exclusive the resource to both users sharing the licensed spectrum. Trustworthy data of the perception and learning is the most important precondition whether the decision-making is fair and accurate. In this paper, a trust management model for centralized...
With the existing Cognitive Radio Networks development, we present a sub-spectrum sensing scheme based on reputation, which takes advantage in energy consumption, security and fairness from spectrum sensing, data fusion and spectrum allocation by classifying users and spectrum bands reasonably. The analysis shows that the sub-spectrum sensing scheme can save energy and defense SSDF attacks effectively.
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.