Browse Conferences
Copyright Page
Title Page iii
Title Page i
Allocation and access mechanisms for spectrum sharing in CRNs - a brief review
Radio spectrum perceives the need for a new paradigm considering its ineffectual use. With such an incentive, Cognitive Radio (CR) paved its way to exploit unused frequency bands in an opportunistic fashion. CR extends different functionali...
A brief review of cooperative spectrum sensing: Issues and challenges
Spectrum sensing is a key function in cognitive radio network (CRN) to avoid harmful interference with licensed users and identify the free spectrum to improve spectrum utilization. However, major challenge arises when detection of license ...
Binary countdown anti-collision protocol for RFID tag collision problem
The rapid proliferation of the Internet of Things (IoT) entails the ubiquitous tagging of millions of objects. Radio frequency identification (RFID) are used to uniquely tag and automatically identify objects without human interference. RFI...
QoS enhancement using blind and data aided approaches in cooperative wireless channels
The increasing demands by even expanding networks of wireless and mobile devices have put huge strains on the allotted spectrum where challenges are related to providing better quality of service (QoS) and higher channel capacity. Though in...
Differential cryptanalysis of Substitution Permutation network
Differential cryptanalysis observes the effect of differences of input pairs of a cipher on the differences of its resultant output pairs. The difference of two cipher text is expressed as function of their corresponding plain text differen...
A group-based authentication scheme for vehicular Moving Networks
Uninterrupted mobile connectivity in fast moving public transportation systems like bus and train is difficult to achieve. Frequent handovers and security procedures for a large number of mobile users travelling together in these mass trans...
DoS attacks prevention using IDS and data mining
Denial of Service (DoS) attacks pose a serious threat to business companies. DoS attacks is hard to defend because of many different ways that hacker may strike. DoS attacks focus on certain applications. DoS attack targets to make the serv...