This SpringerBrief presents adaptive resource allocation schemes for secondary users for dynamic spectrum access (DSA) in cognitive radio networks (CRNs) by considering Quality-of-Service requirements, admission control, power/rate control, interference constraints, and the impact of spectrum sensing or primary user interruptions. It presents the challenges, motivations, and applications of the different schemes. The authors discuss cloud-assisted geolocation-aware adaptive resource allocation in CRNs by outsourcing computationally intensive processing to the cloud. Game theoretic approaches are presented to solve resource allocation problems in CRNs. Numerical results are presented to evaluate the performance of the proposed methods. Adaptive Resource Allocation in Cognitive Radio Networks is designed for professionals and researchers working in the area of wireless networks. Advanced-level students in electrical engineering and computer science, especially those focused on wireless networks, will find this information helpful.
This book provides probabilistic, deterministic and geolocation-aware approaches for adaptive connectivity, robust security and privacy-aware communications for vehicular cyber physical systems (CPS). It presents mathematical models and numerical results obtained from experiments and simulations, and a trade-off between connectivity, security and privacy for vehicular communications. Connectivity between vehicles is crucial for vehicular CPS. Intelligent vehicular CPS provides not only road safety and traffic efficiency by exchanging information among vehicles, but also offers infotainment services to passengers using a variety of wireless technologies to forward the traffic/trajectory information with Vehicle-to-Vehicle (V2V), vehicular ad hoc network (VANET), and Vehicle-to-Roadside-to-Vehicle (V2R2V) communications. The book covers how to ensure that the message received from other vehicles is secure and trustworthy, rather than malicious. Further, it reveals how to make sure that the privacy of participants is not revealed while validating the received message. Researchers and professionals working with vehicular networks, smart systems, cyber physical systems, and mobile privacy will find this book valuable.
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.