A Collaborative Approach for Monitoring Nodes Behavior during Spectrum Sensing to Mitigate Multiple Attacks in Cognitive Radio Networks Abstract– In the first place, spectrum sensing is the first step to overcome the spectrum scarcity problem in Cognitive Radio Networks (CRNs) wherein all unutilized subbands in the radio environment are explored for better spectrum utilization. Adversary…
A Cross Layer Token Generation (Cltg) Technique To Detect Worm Hole Attacks In Manet Abstract-A Mobile Adhoc Network (MANET) consists of random moving nodes which are free to move throughout the network. A Mobile Adhoc network (MANET) is a kind of wireless mobile nodes that can communicate with each other through radio waves. It dynamically…
A Distributed Multi-Channel MAC Protocol for Ad Hoc Wireless Networks Abstract?A novel distributed multi-channel medium access control < Final Year Projects 2016 > MAC protocol using fast and slow hopping sequences with dual radio interfaces. Speci?cally, one interface follows fast hopping and is primarily for transmission, and the other interface follows slow hopping and is…
A Distributed Three-hop Routing Protocol to Increase the Capacity of Hybrid Wireless Networks Abstract? Hybrid wireless networks combining the advantages of both mobile ad-hoc networks and infrastructure wireless networks have been receiving increased attention due to their ultra-high performance. An ef?cient data routing protocol is important in such networks for high network capacity and scalability….
A Historical-Beacon-Aided Localization Algorithm for Mobile Sensor Networks Abstract? Range-free localization approaches are cost-effective for mobile sensor networks (because no additional hardware support is required). However, existing range-free localization approaches for mobile sensor networks suffer from either sparse anchor node problem or high communication cost. Due to economic considerations, mobile sensor networks typically have sparse…
A MAC Sensing Protocol Designfor Data Transmission with More Protection to Primary Users. Abstract?MAC protocols to sense channels for data transmission have been widely investigated for the secondary users to efficiently utilize and share the spectrum licensed by the primary user. One important issue associated with MAC protocols design is how the secondary users determine…
A Predictive Cross-Layered Interference Management in a Multichannel MAC with Reactive Routing in VANET Abstract? Vehicular ad hoc networks (VANETs) represent a particular mobile technology that permits communication between vehicles, offering security and comfort. Nowadays, distributed mobile wireless computing is becoming a very important communication paradigm, due to its flexibility to adapt to different mobile…
A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services Abstract? A Privacy-Aware Authentication Scheme for Distributed Mobile Cloud Computing Services. The number of mobile users has dramatically risen in recent years. In this paper, an ef?cient authentication scheme for distributed mobile cloud computing services is proposed. The proposed scheme provides security and convenience for…
A Proxy-Based Approach to Continuous Location-Based Spatial Queries in Mobile Environments Abstract? Caching valid regions of spatial queries at mobile clients is effective in reducing the number of queries submitted by mobile clients and query load on the server. However, mobile clients suffer from longer waiting time for the server to compute valid regions. We…
A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks Abstract? A QoS-Oriented Distributed Routing Protocol for Hybrid Wireless Networks.As wireless communication gains popularity, significant research has been devoted to supporting real-time transmission with stringent Quality of Service (QoS) requirements for wireless applications. At the same time, a wireless hybrid network that integrates a mobile wireless…
A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation Abstract? A Secure Protocol for Spontaneous Wireless Ad Hoc Networks Creation.a secure protocol for spontaneous wireless ad hoc networks which uses an hybrid symmetric/asymmetric scheme and the trust between users in order to exchange the initial data and to exchange the secret keys that will…
A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks Abstract– A Spectrum Switching Delay-Aware Scheduling Algorithm for Centralized Cognitive Radio Networks. We formulate a scheduling problem that takes into account different hardware delays experienced by the secondary users (SUs) in a centralized cognitive radio network (CRN) while switching to different frequency bands. We…