[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
Volume 172, Issue CApr 2021
Reflects downloads up to 05 Jan 2025Bibliometrics
Skip Table Of Content Section
editorial
Regular Articles
research-article
An intelligent parking sharing system for green and smart cities based IoT
Abstract

Today car drivers struggle to find a free parking space for their cars. It is considered a big challenge specially in large cities and in rush hours. Many studies considered this problem and how it influences our life. This increases ...

research-article
Target vehicle lane-change intention detection: An approach based on online transfer learning
Abstract

The lack of visual information from the driver of the target vehicle makes it difficult to detect the intention of the target vehicle early before the start of the lane-change maneuver. Moreover, in current studies, the prerequisite ...

research-article
Data tampering attacks diagnosis in dynamic wireless sensor networks
Abstract

Real-world wireless sensor networks (WSNs) usually have dynamic topologies and are vulnerable to data tampering attacks, which may possibly lead to serious consequences. This paper addresses the issue of defending against data ...

research-article
Service Differentiation in IEEE 802.11ah WLAN under Restricted Access Window based MAC protocol
Abstract

The restricted access window (RAW) based channel access scheme proposed for IEEE 802.11ah wireless LAN (WLAN) divides the stations (STAs) in the network into groups and allocates RAW slots for each group of STAs. In this way, the STAs ...

research-article
Providing a CoAP-based technique to get wireless sensor data via IoT gateway
Abstract

The advancement of wireless sensor networks and the possibility of using Internet protocols in devices with limited resources (such as sensors) have changed the future of the Internet. How to interact and exchange information is one of ...

Highlights

  • This paper provides a technique to reduce the burden imposed on small and medium size packets on 6LoWPAN/CoAP multi-hop networks.

research-article
Real-time optimizations in energy profiles and end-to-end delay in WSN using two-hop information
Abstract

This paper proposes a routing protocol established upon the IEEE 802.15.4a that enhances the delay and energy efficiency in Wireless sensor networks (WSN) using two-hop information. Owing to the miniaturized form and non-rechargeable ...

Graphical abstract

Display Omitted

Highlights

  • A novel potential relay information (PRI) metric which measures the routing abilities of nodes in WSN is introduced. The PRI reflects real timeliness and ...

research-article
Generation of realistic cloud access times for mobile application testing using transfer learning
Abstract

The network Quality of Service (QoS) metrics such as the access time, the bandwidth, and the packet loss play an important role in determining the Quality of Experience (QoE) of mobile applications. Various factors like the Radio ...

Special Issue on Secure Artificial Intelligence in Mobile Edge Computing
research-article
MECGuard: GRU enhanced attack detection in Mobile Edge Computing environment
Abstract

With the commercialization of 5G technology, various Mobile Edge Computing (MEC) services are being deployed widely. Generally, MEC services rely on MEC devices and servers deployed at the edge of the network. Whether it is a MEC ...

research-article
EdgeSOM: Distributed Hierarchical Edge-driven IoT Data Analytics Framework
Abstract

With the rapid growth in the number of interacting IoT devices producing a huge amount of data, existing traditional systems are unable to handle the resulting data flow in such a way as to meet timeliness and performance requirements ...

Special Issue on Survivability of Mobile and Wireless Communication Networks
research-article
AdS: An adaptive spectrum sensing technique for survivability under jamming attack in Cognitive Radio Networks
Abstract

IEEE 802.22 Cognitive Radio Network (CRN) allows sharing of geographically unused spectrum allocated to the television broadcast service, on a non-interfering basis. CRNs make use of Dynamic Spectrum Access (DSA) which is a two-stage ...

research-article
Enhanced network sensitive access control scheme for LTE–LAA/WiFi coexistence: Modeling and performance analysis
Abstract

Implementation of 5G and beyond networks is looking to expand the operation of licensed systems into unlicensed frequency bands through technologies such as license assisted access (LAA) and New Radio Unlicensed (NR-U). LAA aggregates ...

research-article
Planning Fog networks for time-critical IoT requests
Abstract

The massive growth of the Internet of Things (IoT) applications and the challenges of Cloud computing have increased the importance of Fog networks for timely processing the requests from delay-sensitive applications. A Fog network ...

Graphical abstract

Display Omitted

Highlights

  • Applying a priority queuing analytical model to calculate the response time of time-critical requests in Fog networks.

research-article
Amalgamation of blockchain and IoT for smart cities underlying 6G communication: A comprehensive review
Abstract

Nowadays, increasing urbanization has necessitated the social, environmental, and economic development of cities to enhance the Quality of Life (QoL) significantly and introduces the “Smart City” concept. It integrates Information and ...

Highlights

  • To enable readers to familiar with smart city environment and blockchain technology.

research-article
Security policies definition and enforcement utilizing policy control function framework in 5G
Abstract

This research analyses new approaches to security enforcement in fifth generation (5G) architecture from end to end perspective. With the aim of finding a suitable and effective unified schema across the different network domains, it ...

Special Issue on AI-Empowered Internet of Things for Next Generation Industrial CPSs
research-article
Multi-windowed vertex-frequency analysis for signals on undirected graphs
Abstract

The recent emerging graph signal processing technologies have been widely applied to analyze signals defined on irregular domains, e.g., data collected from social networks, sensor networks, or transportation systems. Vertex frequency ...

Special Issue on Data Driven Discovery of Cyber Physical Systems
research-article
An intelligent work order classification model for government service based on multi-label neural network
Abstract

The classification of work orders for livelihood service play an important role in the e-government system, which goal is to push these work orders to the corresponding processing department. Although many studies have realized the ...

research-article
A security framework for Ethereum smart contracts
Abstract

The use of blockchain and smart contracts have not stopped growing in recent years. Like all software that begins to expand its use, it is also beginning to be targeted by hackers who will try to exploit vulnerabilities in both the ...

Special Issue on Security and Privacy in Space-Ground Integrated Network
research-article
Exploring active attacks for three incorrect implementations of the ISO/IEC 9798 in satellite networks
Abstract

A variety of satellite authentication protocols have been proposed to meet the requirements of the security and efficiency in satellite communication networks nowadays. Most of them are variants from entity authentication technical ...

research-article
A blockchain-based access control and intrusion detection framework for satellite communication systems
Abstract

Recent works have shown great potentials for enhancing satellite communications (SATCOM) in terms of security and privacy from blockchains and smart contracts. However, smart contracts deployed on the blockchain also suffer from ...

Special Issue on Industrial Communication Networks in Smart Factory 4.0
research-article
Network coding assisted reliable multi-source multicasting over a multi-hop wireless mesh network
Abstract

This paper introduces a Network Coding (NC) Assisted Reliable Multi-Source Multicasting (NCRMM) technique for multi-hop wireless mesh networks. The NCRMM scheme decreases the average number of packet transmissions in a network, which ...

research-article
Time-predictable routing algorithm for Time-Sensitive Networking: Schedulable guarantee of Time-Triggered streams
Abstract

To make manufacturers more intelligent in the production of cyber-physical systems (CPS), the IEEE 802.1 working group proposes a Time-Sensitive Network (TSN) standard based on traditional Ethernet. TSN can help the industrial ...

Comments

Please enable JavaScript to view thecomments powered by Disqus.