E
Enver Ever
Researcher at Middle East Technical University Northern Cyprus Campus
Publications - 100
Citations - 1121
Enver Ever is an academic researcher from Middle East Technical University Northern Cyprus Campus. The author has contributed to research in topics: Wireless sensor network & Quality of service. The author has an hindex of 16, co-authored 94 publications receiving 902 citations. Previous affiliations of Enver Ever include Middle East Technical University & Eastern Mediterranean University.
Papers
More filters
Journal ArticleDOI
Small Cells in the Forthcoming 5G/IoT: Traffic Modelling and Deployment Overview
TL;DR: An overview of the use of small cells (e.g., femtocells) in the Internet of Things (IoT) environments is provided and open research issues associated with IoT-femtocell based applications are presented.
Proceedings Article
UHEED - An Unequal Clustering Algorithm for Wireless Sensor Networks
TL;DR: UHEED is proposed, an unequal clustering algorithm which mitigates the hot spot problem and which leads to a more uniform residual energy in the network and improves the network lifetime.
Journal ArticleDOI
Seamless Key Agreement Framework for Mobile-Sink in IoT Based Cloud-Centric Secured Public Safety Sensor Networks
TL;DR: It is shown that the proposed S-SAKA approach satisfies the security properties, and as well as being resilient to node-capture attacks, it resists significant numbers of other well-known potential attacks related with data confidentiality, mutual authentication, session-key agreement, user anonymity, password guessing, and key impersonation.
A model-driven engineering framework for architecting and analysing wireless sensor networks
Krishna Doddapaneni,Enver Ever,Orhan Gemikonakli,Ivano Malavolta,Leonardo Mostarda,Henry Muccini +5 more
TL;DR: This paper proposes a modeling framework that allows developers to model separately the software architecture of the WSN, the low-level hardware specification of theWSN nodes and the physical environment where nodes are deployed in and can use these models to generate executable code for analysis purposes.
Journal ArticleDOI
Secure Wireless Powered and Cooperative Jamming D2D Communications
TL;DR: This paper investigates a secure wireless-powered device-to-device (D2D) communication network in the presence of multiple eavesdroppers, where a hybrid base station in a cellular network not only provides power wirelessly for the D2D transmitter to guarantee power efficiency for the d2D network, but also serves as a cooperative jammer to interfere with the eavesdropper.