A survey of link flooding attacks in software defined network ecosystems
Abstract Link Flooding Attacks (LFA) are a devastating type of stealthy denial of service
attack that congests critical network links and can completely isolate the victim's network. In …
attack that congests critical network links and can completely isolate the victim's network. In …
Software-defined wireless mesh networks: architecture and traffic orchestration
SDN has been envisioned as the next generation network paradigm by decoupling control
plane and data plane, such that network management and optimization can be conducted in …
plane and data plane, such that network management and optimization can be conducted in …
A Survey of Data Aggregation Protocols for Energy Conservation in WSN and IoT
BA Begum, SV Nandury - Wireless Communications and …, 2022 - Wiley Online Library
Conservation of energy has been a major concern for Wireless Sensor Networks (WSNs)
and IoT applications. Several strategies were devised, aimed at optimizing energy …
and IoT applications. Several strategies were devised, aimed at optimizing energy …
Energy efficiency optimization for mobile ad hoc networks
WK Kuo, SH Chu - IEEE Access, 2016 - ieeexplore.ieee.org
Tremendous traffic demands for ubiquitous access and emerging multimedia applications
significantly increase the energy consumption of battery-powered mobile devices. This trend …
significantly increase the energy consumption of battery-powered mobile devices. This trend …
Joint application admission control and network slicing in virtual sensor networks
We focus on the problem of managing a shared physical wireless sensor network (WSN)
where a single network infrastructure provider leases the physical resources of the networks …
where a single network infrastructure provider leases the physical resources of the networks …
Simplified agent-based resource sharing approach for WSN-WSN interaction in IoT/CPS projects
G Yıldırım, Y Tatar - IEEE Access, 2018 - ieeexplore.ieee.org
This paper focuses on the problem of interoperability and resource sharing in wireless
sensor networks (WSNs) running under the Internet of Things (IoT) and cyber-physical …
sensor networks (WSNs) running under the Internet of Things (IoT) and cyber-physical …
Achieving fair-effective communications and robustness in underwater acoustic sensor networks: A semi-cooperative approach
This paper investigates the fair-effective communication and robustness in imperfect and
energy-constrained underwater acoustic sensor networks (IC-UASNs). Specifically, we …
energy-constrained underwater acoustic sensor networks (IC-UASNs). Specifically, we …
Joint channel allocation and power control based on PSO for cellular networks with D2D communications
J Xu, C Guo, H Zhang - Computer networks, 2018 - Elsevier
Introducing D2D communications into wireless cellular networks is viewed as a potential
method to relieve the increasing traffic in the base stations. However, the cellular users will …
method to relieve the increasing traffic in the base stations. However, the cellular users will …
Optimal scheduling for multi-radio multi-channel multi-hop cognitive cellular networks
Due to the emerging various data services, current cellular networks have been
experiencing a surge of data traffic and are already overloaded; thus, they are not able to …
experiencing a surge of data traffic and are already overloaded; thus, they are not able to …
On optimal resource allocation in virtual sensor networks
Sensor network virtualization is a promising paradigm to move away from highly-
customized, application-specific wireless sensor network deployment by opening up to the …
customized, application-specific wireless sensor network deployment by opening up to the …