A survey on wireless security: Technical challenges, recent advances, and future trends

Y Zou, J Zhu, X Wang, L Hanzo - Proceedings of the IEEE, 2016 - ieeexplore.ieee.org
Due to the broadcast nature of radio propagation, the wireless air interface is open and
accessible to both authorized and illegitimate users. This completely differs from a wired …

Energy harvesting sensor nodes: Survey and implications

S Sudevalayam, P Kulkarni - IEEE communications surveys & …, 2010 - ieeexplore.ieee.org
Sensor networks with battery-powered nodes can seldom simultaneously meet the design
goals of lifetime, cost, sensing reliability and sensing and transmission coverage. Energy …

[KÖNYV][B] Protocols and architectures for wireless sensor networks

H Karl, A Willig - 2007 - books.google.com
Learn all you need to know about wireless sensor networks! Protocols and Architectures for
Wireless Sensor Networks provides a thorough description of the nuts and bolts of wireless …

Resource allocation for underlay cognitive radio networks: A survey

M El Tanab, W Hamouda - IEEE Communications Surveys & …, 2016 - ieeexplore.ieee.org
For conventional wireless networks, the main target of resource allocation (RA) is to
efficiently utilize the available resources. Generally, there are no changes in the available …

Challenges for efficient communication in underwater acoustic sensor networks

IF Akyildiz, D Pompili, T Melodia - ACM Sigbed Review, 2004 - dl.acm.org
Ocean bottom sensor nodes can be used for oceanographic data collection, pollution
monitoring, offshore exploration and tactical surveillance applications. Moreover, Unmanned …

MAC essentials for wireless sensor networks

A Bachir, M Dohler, T Watteyne… - … surveys & tutorials, 2010 - ieeexplore.ieee.org
The wireless medium being inherently broadcast in nature and hence prone to interferences
requires highly optimized medium access control (MAC) protocols. This holds particularly …

Security issues of mobile ad hoc and sensor networks

D Djenouri, L Khelladi, N Badache - 2005 - dl.cerist.dz
Security in mobile ad hoc networks is difficult to achieve, notably because of the vulnerability
of wireless links, the limited physical protection of nodes, the dynamically changing …

Infotainment and road safety service support in vehicular networking: From a communication perspective

HT Cheng, H Shan, W Zhuang - Mechanical systems and signal processing, 2011 - Elsevier
Vehicular ad hoc networking is an emerging technology for future on-the-road
communications. Due to the virtue of vehicle-to-vehicle and vehicle-to-infrastructure …

Modeling interference in wireless ad hoc networks

P Cardieri - IEEE Communications Surveys & Tutorials, 2010 - ieeexplore.ieee.org
The recent increasing interest in ad hoc networks has motivated the study and development
of interference models capable of capturing the intrinsic characteristics of this kind of …

[KÖNYV][B] The electronics handbook

JC Whitaker, MH Kryder, JF Shackelford, VK Tripathi… - 2018 - taylorfrancis.com
During the ten years since the appearance of the groundbreaking, bestselling first edition of
The Electronics Handbook, the field has grown and changed tremendously. With a focus on …