6 research outputs found

    Energy Aware Multipath Routing Protocol for Cognitive Radio Ad Hoc Networks

    Get PDF
    Cognitive radio networks (CRNs) emerged as a paradigm to solve the problem of limited spectrum availability and the spectrum underutilization in wireless networks by opportunistically exploiting portions of the spectrum temporarily vacated by licensed primary users (PUs). Routing in CRNs is a challenging problem due to the PU activities and mobility. On the other hand, energy aware routing is very important in energy-constraint CRNs. In addition, it is crucial that CR users efficiently exchange data with each other before the appearance of PUs. To design a robust routing scheme for mobile CR ad hoc networks (CRANs), the constraints on residual energy of each CR user, reliability, and the protection of PUs must additionally be taken into account. Moreover, multipath routing has great potential for improving the end-to-end performance of ad hoc networks. Considering all these evidences, in this paper, we propose an energy aware on-demand multipath routing (EOMR) protocol for mobile CRANs to ensure the robustness and to improve the throughput. The proposed routing scheme involves energy efficient multipath route selection and spectrum allocation jointly. The simulation results show that our approach improves the overall performance of the network

    Non-intrusive user identity provisioning in the internet of things

    No full text
    The Internet of Things (IoT) represents an evolutionary vision and a new era of such smart environments that encompass all identifiable things in a dynamic and interacting network of networks. Each user has wide interactions with a huge number of entities. It would be impractical to require users to confirm themselves every time they cross various network boundaries, as the frequent verification process would disrupt the users’ normal activities and degrades the overall performance. This paper presents a service provisioning framework for IoT that relies on verifying user identity using a non-intrusive method of monitoring and inferring certain types of user activities. The framework helps in supporting the purpose of the IoT for being smart, boundless, easier and safer to improve people’s lives. The proposed framework reduces the risk of identity theft that results from losing user devices, where the user identity is usually stored. It copes with the loss of the user’s ID or people impersonating other people, and raises an alarm to block an intruder from being verified as a legitimate user
    corecore