Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleJanuary 2025
AHA-BV: Access and handover authentication protocol with batch verification for satellite–terrestrial integrated networks
Computer Standards & Interfaces (CSAI), Volume 91, Issue Chttps://doi.org/10.1016/j.csi.2024.103870AbstractAt present, the rapid development of satellite capabilities has prompted the proposal of satellite–terrestrial integrated networks (STIN), which solves the problem of limited signal coverage of terrestrial cellular networks, further promotes the ...
Highlights- An access authentication protocol supporting batch verification for STIN is proposed.
- The batch verification mechanism reduces the verification overhead of satellites.
- The handover authentication mechanism is lightweight and ...
- research-articleJanuary 2023
A BIPMU-based network security situation assessment method for wireless network
Computer Standards & Interfaces (CSAI), Volume 83, Issue Chttps://doi.org/10.1016/j.csi.2022.103661AbstractWith the rapid development of information technology, wireless network has been accepted by the public and widely used in the daily life and work. Especially with the comprehensive deployment of 5G network technology, the application ...
Highlights- We improve Parsimonious memory unit (PMU) and design a new RNN method called BIPMU.
- research-articleApril 2022
Toward pre-standardization of reputation-based trust models beyond 5G
- José María Jorquera Valero,
- Pedro Miguel Sánchez Sánchez,
- Manuel Gil Pérez,
- Alberto Huertas Celdrán,
- Gregorio Martínez Pérez
Computer Standards & Interfaces (CSAI), Volume 81, Issue Chttps://doi.org/10.1016/j.csi.2021.103596Highlights- Former trust model standardizations cannot be applied beyond 5G networks.
- ...
In the last years, the number of connections in mobile telecommunication networks has increased rampantly, and in consequence, the number and type of relationships among entities. Should such interactions are to be profitable, entities ...
- research-articleJanuary 2022
DOA tracking for seamless connectivity in beamformed IoT-based drones
Computer Standards & Interfaces (CSAI), Volume 79, Issue Chttps://doi.org/10.1016/j.csi.2021.103564Highlights- The Direction of Arrival (DOA) and uniform circular array beam are formed to scan and find the surrounding sources using various applications (IoT and ...
In recent times, there has been a surge of interest around the usage of adaptive antenna arrays of Internet of Things (IoT) based Drones in the communication systems. Adaptive antenna arrays have the ability to form customized ...
- research-articleJanuary 2022
Optimized routing technique for IoT enabled software-defined heterogeneous WSNs using genetic mutation based PSO
Computer Standards & Interfaces (CSAI), Volume 79, Issue Chttps://doi.org/10.1016/j.csi.2021.103548Highlights- A Genetic mutation-based particle swarm optimization is proposed for selecting the control nodes.
Now a days, emerging trends in the field of wireless sensor networks (WSNs) tend to work on more complex scenarios and flexible network models as the conventional WSN systems that are based on a classical arrangement of sensors. ...
-
- research-articleJune 2020
Self-Adaptive Neighbor Discovery in Wireless Sensor Networks with Sectored-Antennas
Computer Standards & Interfaces (CSAI), Volume 70, Issue Chttps://doi.org/10.1016/j.csi.2020.103427Highlights- Present s a brief taxonomy of neighbor discovery techniques for wireless ad hoc and sensor networks with the directional or sectored antenna
Integration of sectored antenna in wireless networks improves network performance through increased network capacity and extended transmission range. However, incorporating sectored antenna makes the trivial process of discovering ...
- research-articleJune 2020
The impact of error control schemes on lifetime of energy harvesting wireless sensor networks in industrial environments
Computer Standards & Interfaces (CSAI), Volume 70, Issue Chttps://doi.org/10.1016/j.csi.2020.103417Highlights- The impact of error control schemes on wireless sensor networks is analyzed.
- ...
Due to the harsh channel conditions of the industrial environments, the data transmission over the wireless channel suffers from erroneous packets. The energy consumption of error control schemes is of great importance for battery-...
- research-articleJune 2020
Efficient dynamic-power AODV routing protocol based on node density
Computer Standards & Interfaces (CSAI), Volume 70, Issue Chttps://doi.org/10.1016/j.csi.2019.103406AbstractMobile Ad Hoc Networks (MANET) allows versatile communication between host devices moving around in a state of flux. These networks have no fixed infrastructure thus making the routing of packets a continuous challenge to be optimally ...
- research-articleOctober 2019
Performance analysis of IEEE 802.15.6 for underground disaster cases
Computer Standards & Interfaces (CSAI), Volume 66, Issue Chttps://doi.org/10.1016/j.csi.2019.103364Highlights- IEEE 802.15.6 based UWC architecture is used firstly in the literature and it is simulated with Riverbed Modeler simulation software.
Nowadays, there are many underground working areas, such as mines and tunnels, which are considered with the scope of the hazardous working area. The use of wireless sensor network (WSN) technologies to ensure the safety of the workers ...
- research-articleOctober 2019
Distance based thresholds for 2-tier relay nodes selection in WSN
Computer Standards & Interfaces (CSAI), Volume 66, Issue Chttps://doi.org/10.1016/j.csi.2019.103359AbstractRelay selection technique approaches are increasingly used to improve the reliability of Wireless Sensor Networks (WSNs) communication, thus providing energy efficiency and reducing energy consumption. Due to the adoption of direct ...
- research-articleOctober 2019
Energy efficient and reliable data gathering using internet of software-defined mobile sinks for WSNs-based smart grid applications
Computer Standards & Interfaces (CSAI), Volume 66, Issue Chttps://doi.org/10.1016/j.csi.2019.03.009Highlights- We propose a software-defined scheme for energy efficient and QoS-aware data gathering for WSNs-based SG applications.
The smart grid is an emerging concept that introduces innovative ways to handle the power quality and reliability issues for both service provider and consumers. The key aims of the smart grid (SG) in smart cities (SCs) is to preserve ...
- research-articleJuly 2019
HMCAWSN: A hybrid multi-channel allocation method for erratic delay constraint WSN applications
Computer Standards & Interfaces (CSAI), Volume 65, Issue CPages 92–102https://doi.org/10.1016/j.csi.2019.02.004Highlights- The demand to meet emerging delay constraint WSN applications has highlighted the need to introduce this new channel allocation method.
Increasing throughput and meeting high packet delivery ratio demands in delay constraint Wireless Sensor Network (WSN) applications have triggered the use of hybrid multi radio and multichannel communication techniques. There are many ...
- research-articleMay 2019
Experimental framework and evaluation of the 5G-Crosshaul control infrastructure
- Josep Mangues-Bafalluy,
- Jorge Baranda,
- Giada Landi,
- José Núñez-Martínez,
- Ramon Casellas,
- Shahzoob Bilal Chundrigar,
- Antonio de la Oliva,
- Alain Mourad,
- Samer T. Talat,
- Carla F. Chiasserini,
- Josep X. Salvat
Computer Standards & Interfaces (CSAI), Volume 64, Issue CPages 96–105https://doi.org/10.1016/j.csi.2019.01.002Highlights- The XCI flexibility enables achieving diverse management goals.
- Multi-...
The goal of 5G-Crosshaul is to integrate fronthaul and backhaul operation under the same data and control planes. This paper focuses on the latter, by experimentally showing the flexibility of the 5G-Crosshaul Control Infrastructure (...
- research-articleAugust 2018
On the performance of LTE downlink scheduling algorithms: A case study on edge throughput
Computer Standards & Interfaces (CSAI), Volume 59, Issue CPages 96–108https://doi.org/10.1016/j.csi.2018.03.001Highlights- The main objective of the proposed scheduling algorithm is to increase the edge throughput without sacrificing cell throughput in LTE networks.
Radio resource allocation is a crucial task in the LTE networks. To increase the overall user experience, an efficient radio resource allocation algorithm should be utilized. In this work, a new scheduling algorithm has been proposed ...
- articleMarch 2009
An interface designed for networked monitoring and control in wireless sensor networks
Computer Standards & Interfaces (CSAI), Volume 31, Issue 3Pages 579–585https://doi.org/10.1016/j.csi.2008.03.026In this paper, a new interface is developed in detail that provides terminal users with ways for direct and convenient interactions with the wireless sensor networks (WSNs). It also embraces an Internet based subsystem for remote monitoring and ...
- articleMarch 2009
Distributed fault detection in industrial system based on sensor wireless network
Computer Standards & Interfaces (CSAI), Volume 31, Issue 3Pages 573–578https://doi.org/10.1016/j.csi.2008.03.024In metal cutting processes, an effective monitoring system, based on a suitably developed scheme or set of algorithms can maintain machine tools in good condition and delay the occurrence of tool wear. In this paper, an approach is developed for fault ...
- articleFebruary 2009
A personal Web page tailoring toolkit for mobile devices
Computer Standards & Interfaces (CSAI), Volume 31, Issue 2Pages 437–453https://doi.org/10.1016/j.csi.2008.05.016It is common to browse web pages via mobile devices. However, most of the web pages were designed for desktop computers equipped with big screens. When browsing on mobile devices, a user has to scroll up and down to find the information they want ...
- articleFebruary 2009
A novel access control protocol for secure sensor networks
Computer Standards & Interfaces (CSAI), Volume 31, Issue 2Pages 272–276https://doi.org/10.1016/j.csi.2008.05.014Nodes in a sensor network may be lost because of power exhaustion or malicious attacks. Therefore, new node deployment is necessary. Based on elliptic curve cryptography (ECC), this paper presents a new access control protocol for secure wireless sensor ...
- articleFebruary 2009
Roaming across wireless local area networks using SIM-based authentication protocol
Computer Standards & Interfaces (CSAI), Volume 31, Issue 2Pages 381–389https://doi.org/10.1016/j.csi.2008.05.002Wireless local area networks provide high speed data transferring rate to a mobile device. And it is crucial to integrate together two critical issues, the authentication and roaming in heterogeneous networks. For this, Tsai and Chang proposed a SIM-...
- articleJuly 2008
A unified framework for cluster manager election and clustering mechanism in mobile ad hoc networks
Computer Standards & Interfaces (CSAI), Volume 30, Issue 5Pages 329–338https://doi.org/10.1016/j.csi.2007.09.003In Mobile Ad-hoc NETwork (MANET), every node could become active dynamically. Therefore, those nodes will affect the stability of network topology because of clustering and de-clustering, and continuously make reconfiguration for the groups of network, ...