2020
DOI: 10.1109/tnse.2018.2877646
|View full text |Cite
|
Sign up to set email alerts
|

Quality of Service Provisioning for Heterogeneous Services in Cognitive Radio-Enabled Internet of Things

Abstract: The Internet of Things (IoT) is a network of interconnected objects, in which every object in the world seeks to communicate and exchange information actively. This exponential growth of interconnected objects increases the demand for wireless spectrum. However, providing wireless channel access to every communicating object while ensuring its guaranteed quality of service (QoS) requirements is challenging and has not yet been explored, especially for IoT-enabled mission-critical applications and services. Mea… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
25
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
8
1
1

Relationship

6
4

Authors

Journals

citations
Cited by 53 publications
(25 citation statements)
references
References 41 publications
0
25
0
Order By: Relevance
“…Similarly, Shi et al [28] applied the FCM on the convolution layer of CNN to achieve high expression recognition accuracy with low execution time. The authors in [45][46][47][48] proposed multimedia transmission schemes for cognitive radio networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Similarly, Shi et al [28] applied the FCM on the convolution layer of CNN to achieve high expression recognition accuracy with low execution time. The authors in [45][46][47][48] proposed multimedia transmission schemes for cognitive radio networks.…”
Section: Literature Reviewmentioning
confidence: 99%
“…The proposed scheme, quantifies the licensed channels based on their available QoS parameters and make them available for SUs to select the licensed channel as per their desired QoS requirements. In [36], the authors proposed a priority-based channel allocation scheme for IoT-based CRNs for transmitting time-critical applications. In the proposed scheme, more channels are reserved for higher-priority SUs to reduce its call-blocking probability and similarity lower number of channels for the low-priority SUs.…”
Section: Related Workmentioning
confidence: 99%
“…However, most of the proposed schemes do not overcome this attack, if shoulder surfing is done using camera recording. For example, proposed techniques like spying resistant keyboards [31,32] and PIN-entry methods [29] are based on the issues of short-term memory difficulties. The camera-based technique can easily be used to crack the passwords of these schemes in a shoulder surfing attack.…”
Section: Security Analysismentioning
confidence: 99%