The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Environmental pollution problem has been a great threat to the development of social economic and human's daily life. The development of the Internet of Things technology provides an effective method for solving the environmental pollution problem. Hence, it is very important to construct a real-time monitoring system in order to solve the problem. In this paper, the hardware system is built to collect...
In delay tolerant networks (DTNs), the lack of continuous connectivity, network partitioning, and long delays make design of network protocols very challenging. Previous DTN research mainly focuses on routing and information propagation. However, with large number of wireless devices' participation, how to maintain efficient and dynamic topology of the DTN becomes crucial. In this paper, we study...
Rational secret sharing is an emerging research direction. After analyzing the character of rational participants, a rational secret sharing protocol is designed in this paper. The proposed protocol is based on the common knowledge from Game Theory and the proof of its fairness is provided.
The Internet of Things has been widespread concerned in recent years. This paper introduces the concept and current status of Internet of Things technology, analyzes the key technologies in research, including RFID, sensor technologies, embedded intelligence and nanotechnology, and discusses the existing architecture. Finally, we proposed a new address mapping mechanism.
In order to ensure authentication and confidentiality of E-Commerce and other applications in the P2P network, a new secure certificateless authentication and key agreement protocol is proposed. In this paper, it shows the new protocol is so suitable in one domain and across domain that it is fit for the hybrid P2P network. Security analysis shows that it achieves almost known security attributes,...
Mobility modeling is the mathematical modeling of mobile users' (cars, cell phone users) movement patterns. The resulting model not only provides us with an understanding of past mobile user movements, but also enables us to predict how a mobile user might move in the future. It has been found useful in both infrastructure-based wireless network and ad hoc network for protocol evaluation, resource...
Ad hoc network is usually built up by battery-powered nodes, so the energy is limited, and the networkpsilas lifetime often depends on several hot nodes. This paper puts forward a routing protocol AODV-TEB (ad hoc on-demand distance vector - traffic-energy balanced) to solve this problem. In AODV-TEB, each node calculated its traffic load per second, and got its left battery, then formed a nonlinear...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.