Home / Advanced Search

  • Title/Keywords

  • Author/Affliations

  • Journal

  • Article Type

  • Start Year

  • End Year

Update SearchingClear
  • Articles
  • Online
Search Results (297)
  • Open Access

    ARTICLE

    Joint Spectrum Partition and Performance Analysis of Full-Duplex D2D Communications in Multi-Tier Wireless Networks

    Yueping Wang1,*, Xuan Zhang2, Yixuan Zhang3

    CMC-Computers, Materials & Continua, Vol.61, No.1, pp. 171-184, 2019, DOI:10.32604/cmc.2019.06204

    Abstract Full-duplex (FD) has been recognized as a promising technology for future 5G networks to improve the spectrum efficiency. However, the biggest practical impediments of realizing full-duplex communications are the presence of self-interference, especially in complex cellular networks. With the current development of self-interference cancellation techniques, full-duplex has been considered to be more suitable for device-to-device (D2D) and small cell communications which have small transmission range and low transmit power. In this paper, we consider the full-duplex D2D communications in multi-tier wireless networks and present an analytical model which jointly considers mode selection, resource allocation, and power control. Specifically, we consider… More >

  • Open Access

    ARTICLE

    Controlled Secure Direct Communication Protocol via the Three-Qubit Partially Entangled Set of States

    Gang Xu1,2,*, Ke Xiao1,*, Zongpeng Li3, Xin-Xin Niu2,4, Michael Ryan5

    CMC-Computers, Materials & Continua, Vol.58, No.3, pp. 809-827, 2019, DOI:10.32604/cmc.2019.04400

    Abstract In this paper, we first re-examine the previous protocol of controlled quantum secure direct communication of Zhang et al.’s scheme, which was found insecure under two kinds of attacks, fake entangled particles attack and disentanglement attack. Then, by changing the party of the preparation of cluster states and using unitary operations, we present an improved protocol which can avoid these two kinds of attacks. Moreover, the protocol is proposed using the three-qubit partially entangled set of states. It is more efficient by only using three particles rather than four or even more to transmit one bit secret information. Given our… More >

  • Open Access

    ARTICLE

    Social-Aware Based Secure Relay Selection in Relay-Assisted D2D Communications

    Shanshan Yu1, Ju Liu1,*, Xiaoqing Zhang1, Shangbin Wu2

    CMC-Computers, Materials & Continua, Vol.58, No.2, pp. 505-516, 2019, DOI:10.32604/cmc.2019.04282

    Abstract Relay-assisted transmission could effectively enhance the performance of Device-to-Device (D2D) communications when D2D user equipments (UEs) are too far away from each other or the quality of D2D channel is not good enough for direct communications. Meanwhile, security is one of the major concerns for proximity services. The secure relay selection problem for D2D communications underlaying cellular network is studied in this paper. Firstly, we define a relay selection area and derive the closed-form of outage probability in D2D links using a Poisson Point Process (PPP) method. Next, in the defined relay selection area, we propose a secure relay selection… More >

  • Open Access

    ARTICLE

    Analysis and Improvement of an Efficient Controlled Quantum Secure Direct Communication and Authentication Protocol

    Jifeng Zhong1,*, Zhihao Liu2,3,*, Juan Xu4

    CMC-Computers, Materials & Continua, Vol.57, No.3, pp. 621-633, 2018, DOI:10.32604/cmc.2018.03706

    Abstract The controlled quantum secure direct communication (CQSDC) with authentication protocol based on four particle cluster states via quantum one-time pad and local unitary operations is cryptanalyzed. It is found that there are some serious security issues in this protocol. An eavesdropper (Eve) can eavesdrop on some information of the identity strings of the receiver and the controller without being detected by the selective-CNOT-operation (SCNO) attack. By the same attack, Eve can also steal some information of the secret message that the sender transmits. In addition, the receiver can take the same kind of attack to eavesdrop on some information of… More >

  • Open Access

    ARTICLE

    Communication Mechanism and Algorithm of Composite Location Analysis of Emergency Communication based on Rail

    Yong Jiang1, Xiaolin Zhong1,*, Yong Guo1, Meixia Duan2

    CMC-Computers, Materials & Continua, Vol.57, No.2, pp. 321-340, 2018, DOI:10.32604/cmc.2018.03796

    Abstract The emergency communication system based on rail is an unconventional emergency communication mode, it is a complement equipment for that conventional communication system can’t work while tunnel mine accident occurs. Medium of transmission channel is the widely existing rail in the tunnel. In this paper we analyzed the characteristics of the rail transmission channel, verified the feasibility that information is transmitted by vibration signal in rail, we proposed the realization plan of the system. Communication protocol and processing mechanism suitable for rail transmission are designed according to the characteristics of channel bandwidth and low data transmission. Information communication with low… More >

  • Open Access

    ARTICLE

    Event-Based Anomaly Detection for Non-Public Industrial Communication Protocols in SDN-Based Control Systems

    Ming Wan1, Jiangyuan Yao2,*, Yuan Jing1, Xi Jin3,4

    CMC-Computers, Materials & Continua, Vol.55, No.3, pp. 447-463, 2018, DOI: 10.3970/cmc.2018.02195

    Abstract As the main communication mediums in industrial control networks, industrial communication protocols are always vulnerable to extreme exploitations, and it is very difficult to take protective measures due to their serious privacy. Based on the SDN (Software Defined Network) technology, this paper proposes a novel event-based anomaly detection approach to identify misbehaviors using non-public industrial communication protocols, and this approach can be installed in SDN switches as a security software appliance in SDN-based control systems. Furthermore, aiming at the unknown protocol specification and message format, this approach first restructures the industrial communication sessions and merges the payloads from industrial communication… More >

  • Open Access

    ARTICLE

    Controlled Cyclic Remote State Preparation of Arbitrary Qubit States

    Mingming Wang1,2,*, Chen Yang1, Reza Mousoli3

    CMC-Computers, Materials & Continua, Vol.55, No.2, pp. 321-329, 2018, DOI:10.3970/cmc.2018.02064

    Abstract Quantum secure communications could securely transmit quantum information by using quantum resource. Recently, novel applications such as bidirectional and asymmetric quantum protocols have been developed. In this paper, we propose a new method for generating entanglement which is highly useful for multiparty quantum communications such as teleportation and Remote State Preparation (RSP). As one of its applications, we propose a new type of quantum secure communications, i.e. cyclic RSP protocols. Starting from a four-party controlled cyclic RSP protocol of one-qubit states, we show that this cyclic protocol can be generalized to a multiparty controlled cyclic RSP protocol for preparation of… More >

Displaying 291-300 on page 30 of 297. Per Page