There are fundamentally two different communication media in wireless underground sensor networks. The first of these is a solid medium where the sensor nodes a
For the influence caused by multipath fading and non-line-of-sight(NLOS)transmission,it is challenging to accurately localize a moving signal source in complex
In order to provide privacy provisioning for the secondary information,we propose an energy harvesting based secure transmission scheme for the cognitive multi-
Software-Defined Networking(SDN)adapts logically-centralized control by decoupling control plane from data plane and provides the efficient use of network resou
Hardware Trojan(HT) refers to a special module intentionally implanted into a chip or an electronic system. The module can be exploited by the attacker to achie