-
A robust indoor localization method with calibration strategy based on joint distribution adaptation Wireless Netw. (IF 2.659) Pub Date : 2021-01-19 Yujie Wang, Yi Lei, Yong Zhang, Lu Yao
Device-free localization (DFL) systems have aroused extensive attention because it is more convenient than device-enabled localization systems, and fingerprint-based localization method is usually used in DFL systems. Although fine-grained information can be provided by the channel state information (CSI), but changes in the environment over time can cause the CSI become different. Therefore, the real-time
-
Wireless communication networks and swarm intelligence Wireless Netw. (IF 2.659) Pub Date : 2021-01-19 Ali Jameel Al-Mousawi
This paper is a comprehensive survey on the role of swarm intelligence in wireless communication networks. The main aim of preparing this paper is to lead the way for the researchers in the field of wireless networks to recognize the role of swarm intelligence in optimizing the network features. The research paths are divided into four main tracks which are: network routing, network quality of service
-
End-to-end uplink delay jitter in LTE systems Wireless Netw. (IF 2.659) Pub Date : 2021-01-19 Megha Sahu, Snigdha Damle, Arzad Alam Kherani
For a single LTE interface on a mobile bonding router, we study end-to-end delay jitter seen by a constant bit rate (CBR) traffic under the uplink (synchronous non-adaptive) hybrid-automatic repeat request (HARQ)-controlled transport block (TB)-based scheduling. The qualitative behavior of the delay jitter is studied experimentally and it is observed that the delay jitter is not a function of the aggregate
-
Security of internet of things based on cryptographic algorithms: a survey Wireless Netw. (IF 2.659) Pub Date : 2021-01-15 Seyyed Keyvan Mousavi, Ali Ghaffari, Sina Besharat, Hamed Afshari
Internet of Things (IoT) is a new concept in Information and Communications Technology and its structure is based on smart objects communications. It contributes to controlling, managing, and administrating devices through the Internet. IoT is emerging as a key component of the Internet and a vital infrastructure for millions of interconnected objects. Thus, the security of IoT is highly important
-
Intelligent energy-aware and secured QoS routing protocol with dynamic mobility estimation for wireless sensor networks Wireless Netw. (IF 2.659) Pub Date : 2021-01-13 B. Dhanalakshmi, L. SaiRamesh, K. Selvakumar
In this work, a new protocol is proposed for sender-based responsive techniques on energy, mobility, and effective routing for Wireless Sensor Networks (WSNs). It addresses diverse challenges in packet routing especially, node mobility, energy optimization, and energy balancing in WSNs communication. The proposed protocol improves the basic Quality of Service (QoS) metrics such as Delay, Hop-Count
-
Application of TSVR algorithm in 5G mmWave indoor networks Wireless Netw. (IF 2.659) Pub Date : 2021-01-12 Anis Charrada, Abdelaziz Samet
A robust algorithm based on Twin Support Vector Regression and discrete wavelet transform applied to millimetric wave (mmWave) channel prediction is proposed in this work. The 60 GHz band is appropriate for small-scale high-speed data transmission applications in future 5G indoor network solutions. The experimentation takes place in an enclosed complex conference room setting with furniture and computer
-
Online rating system development using blockchain-based distributed ledger technology Wireless Netw. (IF 2.659) Pub Date : 2021-01-08 Monir Shaker, Fereidoon Shams Aliee, Reza Fotohi
In most websites, the online rating system provides the ratings of products and services to users. Lack of trust in data integrity and its manipulation has hindered fulfilling user satisfaction. Since existing online rating systems deal with a central server, all rating data is stored on the central server. Therefore, all rating data can be removed, modified, and manipulated by the system manager to
-
High fidelity single image blind deblur via GAN Wireless Netw. (IF 2.659) Pub Date : 2021-01-08 Xiaoli Li, Gen Li, Zhenlong Du
To reconstruct the high resolution image makes sense from single image with low resolution. Most conventional methods assume that the blur kernel is known, however the blur kernel within single blurring image is always unknown, then it is necessary to generate the kernel dynamically during deblurring. The paper proposes single image high-fidelity blind deblurring method based on GAN. The degradation
-
Anonymising group data sharing in opportunistic mobile social networks Wireless Netw. (IF 2.659) Pub Date : 2021-01-05 Daniel Adu-Gyamfi, Fengli Zhang, Augustine Takyi
The security and privacy risks of group users are major concerns in opportunistic mobile social network (OMSN) platforms, especially when the users share data publicly in a proximity area. However, existing schemes on group data sharing usually do not enforce the anonymity and/or privacy preservation properties and making them relatively unsuitable for large scale implementation. In this paper, we
-
A MECS redistribution algorithm for SDN-enable MEC using response time and transmission overhead Wireless Netw. (IF 2.659) Pub Date : 2021-01-04 Runze Wu, Xiang Ao, Bing Fan, Hailin Hu
The software-defined networks-enable mobile edge computing (SDN-enable MEC) architecture, which integrates SDN and MEC technologies, realizes the flexibility and dynamic management of the underlying network resources by the MEC, reduces the distance between the access terminal and computing resources and network resources, and increases the terminal's access to resources. However, the static distribution
-
Deployment optimization of wireless mesh networks in wind turbine condition monitoring system Wireless Netw. (IF 2.659) Pub Date : 2021-01-04 Yanjun Yang, Aimin Liu, Hongwei Xin, Jianguo Wang, Xin Yu, Wen Zhang
This study aims to propose a deployment optimization method based on IEEE 802.11 heterogeneous wireless mesh networks (WMNs) for the condition monitoring system (CMS) of wind turbines. This method can provide a flexible, low-cost, and easy-to-implement network framework for wind farms in harsh environments, thereby avoiding interference of the newly installed CMS on the communication network of the
-
Analysis of wireless sensor networks with sleep mode and threshold activation Wireless Netw. (IF 2.659) Pub Date : 2021-01-03 Zhanyou Ma, Xiangran Yu, Shanshan Guo, Yang Zhang
In order to reduce the energy consumption of wireless sensor networks and control the workload of necessary topology maintenance, the sleep mode and the threshold activation process in the energy saving strategy are considered. Combining with practice, factors such as environmental interferences and physical damages are considered. A repairable M/M/2 vacation queueing model with negative customers
-
Multistage fuzzy logic congestion-aware routing using dual-stage notification and the relative barring distance in wireless sensor networks Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Phet Aimtongkham, Paramate Horkaew, Chakchai So-In
Congestion management in a wireless sensor network (WSN) is a key determinant of the quality of service. Congestion in a network causes data loss, a reduced transmission rate, increased delays, and excess energy consumption. The latter has a direct impact on tiny sensor devices with limited resources and processing, buffering, and transmitting capabilities. In addition, a WSN relies on multiple packet
-
Cooperative link scheduling for RSU-assisted dissemination of basic safety messages Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Guangbing Xiao, Haibo Zhang, Ning Sun, Yong Zhang
The reliable and real-time dissemination of Basic Safety Message (BSM) among smart vehicles has attracted much attention in both academia and industry, where a group of adjacent vehicles form a Vehicular Ad-hoc NETwork (VANET) to exchange their local-observed traffic information for driving awareness and road safety. However, buildings and trucks may degrade the quality of wireless links between vehicles
-
Spectral efficiency (SE) enhancement of NOMA system through iterative power assignment Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Ziad Qais Al-Abbasi, Mustafa Ahmed Khamis
This paper studies enhancing non-orthogonal multiple access (NOMA) spectral efficiency (SE) through optimizing the assigned power to each NOMA user depending on their channel states. This would improves the overall NOMA system performance in an adaptive manner in accordance with the channel state variations. An optimization problem for SE maximization is presented to optimize the performance of NOMA
-
BER and channel capacity analysis of wireless system over $${\kappa -\mu /}$$ κ - μ / inverse gamma and $${\eta -\mu /}$$ η - μ / inverse gamma composite fading model Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Diwaker Pant, Puspraj Singh Chauhan, Sanjay Kumar Soni, Sanjeev Naithani
The \({\kappa -\mu /}\)Inverse Gamma (KMIG) and \({\eta -\mu /}\)Inverse Gamma (EMIG) are recently introduced composite fading distributions for the precise design of the wireless systems, where multipath fading and shadowing occur concomitantly. Further, these composite fading models are competent to be employed in the performance investigation of the digital communication system as their mathematical
-
Advanced SLM scheme based on discrete forest optimization algorithm for PAPR minimization in UFMC waveform Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Necmi Taşpınar, Şakir Şimşir
Inherent multicarrier transmission mechanism of the universal filtered multicarrier (UFMC) waveform engenders the problem of high peak-to-average power ratio (PAPR). Since it is impossible for a nonlinear high power amplifier (HPA) to execute a distortionless amplification unless the PAPR of transmission signal is below an acceptable level, eliminating the aforementioned PAPR drawback in UFMC waveform
-
Uplink NOMA-based long-term throughput maximization scheme for cognitive radio networks: an actor–critic reinforcement learning approach Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Hoang Thi Huong Giang, Tran Nhut Khai Hoan, Insoo Koo
Non-orthogonal multiple access (NOMA) is one of the promising techniques for spectrum efficiency in wireless networks. In this paper, we consider an uplink NOMA cognitive system, where the secondary users (SUs) can jointly transmit data to the cognitive base station (CBS) over the same spectrum resources. Thereafter, successive interference cancellation is applied at the CBS to retrieve signals transmitted
-
LAPTAS: lightweight anonymous privacy-preserving three-factor authentication scheme for WSN-based IIoT Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Hossein Abdi Nasib Far, Majid Bayat, Ashok Kumar Das, Mahdi Fotouhi, S. Morteza Pournaghi, M. A. Doostari
Nowadays, wireless sensor networks (WSNs) are essential for monitoring and data collection in many industrial environments. Industrial environments are usually huge. The distances between the devices located in them can be vast; in this case, the Industrial Internet of Things (IIoT) leads to greater productivity and efficiency of industries. Furthermore, the sensor devices in IIoT have limited memory
-
An SDN-based true end-to-end TCP for wireless LAN Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Krishna Vijay Kumar Singh, Mayank Pandey
Segment losses due to intermittent connectivity and mobility lead to sub optimal performance of the Transmission Control Protocol (TCP). This is due to the fact that segment loss is considered as a binary signal for triggering congestion control and retransmission mechanisms at the TCP sender. In wired networks, segments are dropped due to congestion at the routers and the strategy of taking missed
-
Intrusion detection techniques in network environment: a systematic review Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Maruthi Rohit Ayyagari, Nishtha Kesswani, Munish Kumar, Krishan Kumar
The entire world relates to some network capabilities in some way or the other. The data transmission on the network is getting more straightforward and quicker. An intrusion detection system helps distinguish unauthorized activities or intrusions that may settle the confidentiality, integrity, or availability of a resource. Nowadays, almost all institutions are using network-related facilities like
-
Road network layout based multi-hop broadcast protocols for Urban Vehicular Ad-hoc Networks Wireless Netw. (IF 2.659) Pub Date : 2021-01-02 Lazhar Khamer, Nabila Labraoui, Abdelhak Mourad Gueroui, Sofiane Zaidi, Ado Adamou Abba Ari
In recent years, the decentralized wireless Vehicular Ad hoc Networks (VANETs) have emerged as a key technology for Intelligent Transportation Systems (ITS). The need for an efficient and reliable broadcast protocol, mainly in urban VANETs, is of great importance to support different services such as road safety, traffic efficiency, entertainment and advertisement. This paper proposes two new routing
-
Research on new edge computing network architecture and task offloading strategy for Internet of Things Wireless Netw. (IF 2.659) Pub Date : 2021-01-01 Congshi Jiang, Yihong Li, Junlong Su, Quan Chen
How to effectively utilize edge nodes with limited computing resources to ensure quality of service is a key issue for many end users in Internet of Things. To address this problem, we propose a new cloud-edge computing network architecture, which enables the system to meet the requirements of computing resource and response time. The architecture consists of a powerful cloud computing center, multiple
-
User cooperation to mitigate the jamming in OFDMA networks Wireless Netw. (IF 2.659) Pub Date : 2021-01-01 Hossein Noori, Mohammad Hossein Gholizadeh
In this paper, jamming and anti-jamming in a time slotted orthogonal frequency division multiple access (OFDMA) are investigated. The users of the network cooperate to mitigate the jamming effect. Interactions among the network users and the jammer are modeled by a mixed integer non-cooperative generalized game which is a NP-hard problem. To relax the problem, a new algorithm is proposed based on channel
-
Secure multiple target tracking based on clustering intersection points of measurement circles in wireless sensor networks Wireless Netw. (IF 2.659) Pub Date : 2021-01-01 Mohammad Hossein Adhami, Reza Ghazizadeh
The problem of tracking multiple targets simultaneously using a wireless sensor network is studied in this paper. We introduce a new algorithm, based only on the received signal power measurements, to estimate the location of multiple indistinguishable targets. For each node, a circle centered at the location of the node with a radius equal to the estimated distance between the node and the nearest
-
Enhancing multicast security of cognitive radio networks with antenna correlations over Nakagami- m fading channels Wireless Netw. (IF 2.659) Pub Date : 2020-11-28 Rezwana Sultana, Md. Zahurul Islam Sarkar, Md. Selim Hossain, Dilip Kumar Sarker
In this paper, we investigate the impact of diversity and antenna correlations on the secrecy capacity and outage performance of a cognitive radio multicast network over Nakagami-m fading channels analytically. The proposed network consists of single primary and secondary user, multiple primary and secondary receivers, and multiple eavesdroppers. It is assumed that each user is equipped with single
-
Compact microstrip lowpass filter with very sharp roll-off using meandered line resonators Wireless Netw. (IF 2.659) Pub Date : 2020-11-28 Mohsen Hayati, Sepehr Zarghami, Farzin Shama
In this paper, a new compact size microstrip lowpass filter (LPF) with a very sharp roll-off is presented to apply in the modern wireless networks. The proposed LPF is designed using the series main resonators with meandered lines based on inductor-capacitor (LC) equivalent circuit analysis. The main goal is to achieve maximum-sharp roll-off by maintaining a wide stopband bandwidth and high return
-
A clustering detector with graph theory for blind detection of spatial modulation systems Wireless Netw. (IF 2.659) Pub Date : 2020-11-28 Lijuan Zhang, Minglu Jin, Sang-Jo Yoo
This paper considers the blind detection of spatial modulation systems multiple-input multiple-output systems. In this system, we propose a clustering detection framework with graph theory that conducts signal detection without the training of channel state information. In detail, firstly, by dynamically controlling the size of each cluster, we transform the original optimization problem of the traditional
-
Multi-attribute profile-cast in mobile opportunistic networks Wireless Netw. (IF 2.659) Pub Date : 2020-11-26 Di Zhang, Dong Zhao, Huadong Ma
Profile-cast provides a novel data dissemination paradigm in mobile opportunistic networks, allowing messages to be disseminated to nodes based on their profiles rather than network identities. Profile-cast has attracted increasing attention, but most of existing algorithms cannot account for some scenarios where multiple attributes need to be considered simultaneously in a profile. We focus on the
-
A comprehensive review of cooperative MIMO WSN: its challenges and the emerging technologies Wireless Netw. (IF 2.659) Pub Date : 2020-11-26 Sarah Asheer, Sanjeet Kumar
The distributed nodes of a Wireless Sensor Network (WSN) cooperate among themselves to emulate a virtual multi-antenna system to get similar benefits as the conventional MIMO systems. In WSN, such a system is known as the Cooperative Multiple Input Multiple Output (CMIMO) system. A CMIMO system has an enormous capacity to improve the performance of a WSN. But the increasing demand in the data rate
-
A novel multi functional multi parameter concealed cluster based data aggregation scheme for wireless sensor networks (NMFMP-CDA) Wireless Netw. (IF 2.659) Pub Date : 2020-11-25 D. Vinodha, E. A. Mary Anita, D. Mohana Geetha
Data aggregation is a promising solution for minimizing the communication overhead by merging redundant data thereby prolonging the lifetime of energy starving Wireless Sensor Network (WSN). Deployment of heterogeneous sensors for measuring different kinds of physical parameter requires the aggregator to combine diverse data in a smooth and secure manner. Supporting multi functional data aggregation
-
An improved cluster formation process in wireless sensor network to decrease energy consumption Wireless Netw. (IF 2.659) Pub Date : 2020-11-24 Hamid Reza Farahzadi, Mostafa Langarizadeh, Mohammad Mirhosseini, Seyed Ali Fatemi Aghda
Wireless sensor network has special features and many applications, which have attracted attention of many scientists. High energy consumption of these networks, as a drawback, can be reduced by a hierarchical routing algorithm. The proposed algorithm is based on the Low Energy Adaptive Clustering Hierarchy (LEACH) and Quadrant Cluster based LEACH (Q-LEACH) protocols. To reduce energy consumption and
-
Joint resource allocation over licensed and unlicensed spectrum in U-LTE networks Wireless Netw. (IF 2.659) Pub Date : 2020-11-24 Xiaojian Zhen, Hangguan Shan, Guanding Yu, Yu Cheng, Lin X. Cai
By sharing unlicensed spectrum with Wi-Fi networks, unlicensed LTE (U-LTE) is one of the promising approaches to further improve LTE network throughput. However, the problem of coexistence with Wi-Fi networks is one of the main challenges of U-LTE technology. In this work, we study joint resource allocation for LTE over the legacy licensed spectrum and the unlicensed spectrum to maximize the benefit
-
Adjacent channel compatibility between IMT and ubiquitous FSS Earth Stations in the 3.4–3.8 GHz frequency band Wireless Netw. (IF 2.659) Pub Date : 2020-11-24 John R. Parker, Ian D. Flood, Glyn D. Carter
This study has investigated the mitigations necessary for successful compatibility between International Mobile Telecommunications (IMT) services and Fixed Satellite Service (FSS) Earth Stations operating in adjacent frequency bands. We consider a problem where IMT services operate in the 3.4–3.6 GHz frequency band and FSS Earth Stations operate in the adjacent 3.6–3.8 GHz band (both bands are within
-
An adaboost-modified classifier using particle swarm optimization and stochastic diffusion search in wireless IoT networks Wireless Netw. (IF 2.659) Pub Date : 2020-11-23 E. Suganya, C. Rajan
The main objective of Internet of Things (IoT) is connecting with different objects via Internet without human intervention. Wireless Sensor Networks (WSNs) which involves ubiquitous computing through which small sensors are connected to the Internet and are used for collecting data. Significant amount of information flowing in the internet is made up of sensory data. To resolve the storage issues
-
Equality test with an anonymous authorization in cloud computing Wireless Netw. (IF 2.659) Pub Date : 2020-11-20 Hisham Abdalla, Hu Xiong, Abubaker Wahaballa, Mohammed Ramadan, Zhiguang Qin
With the rapid popularity and wide adoption of cloud storage, providing privacy-preserving by protecting sensitive information becomes a matter of grave concern. The most effective and sensible way to address this issue is to encrypt the data before uploading it to the cloud. However, to search over encrypted data with different keys is still an open problem when it comes to the deployment of emerging
-
Analysis and modelling the effects of mobility, Churn rate, node’s life span, intermittent bandwidth and stabilization cost of finger table in structured mobile P2P networks Wireless Netw. (IF 2.659) Pub Date : 2020-11-19 Sanjeev Kumar Singh, Chiranjeev Kumar, Prem Nath
Today P2P (Peer-to-Peer) networks are gaining popularity for sharing the contents. Due to massive spreading of Internet, these networks are also growing fast. MP2P (Mobile P2P) networks are attracting many users due to increase in the Internet-based mobile applications. These networks suffer from many challenges which are not considered for analysis and modelling adequately. We focus on few challenges
-
Variable length deep cross-modal hashing based on Cauchy probability function Wireless Netw. (IF 2.659) Pub Date : 2020-11-16 Chen Li, Zhuotong Liu, Sijie Li, Ziniu Lin, Lihua Tian
With the rapid development of multimedia technology, considerable achievement has been achieved in image retrieval technology. On the one hand, users’ demand for cross-modal retrieval is increasing rapidly. On the other hand, deep hashing algorithms as one of the most prominent high-dimensional reduction methods have received extensive attention. Under such background, the cross-modal retrieval method
-
Providing interoperability in Bluetooth mesh with an improved provisioning protocol Wireless Netw. (IF 2.659) Pub Date : 2020-11-13 Diego Hortelano, Teresa Olivares, M. Carmen Ruiz
Different versions of Bluetooth Low Energy (BLE) have been standardized with point-to-point and broadcast topologies. Recently Bluetooth mesh specification provides BLE with mesh topology, highly demanded by Internet of Things (IoT) and numerous applications such as smart cities or Industry 4.0. Bluetooth mesh emerges as one of the most promising low-power IoT standards, enabling many-to-many device
-
Efficient user pairing algorithm for enhancement of spectral efficiency and interference cancelation in downlink NOMA system Wireless Netw. (IF 2.659) Pub Date : 2020-11-13 Mohammed Abd-Elnaby, Germien G. Sedhom, Nagy W. Messiha, Mohamed Elwekeil
A new subcarrier-user allocation algorithm for the downlink non-orthogonal multiple access system is presented in this paper. The proposed algorithm aims to enhance the spectral efficiency of the system and the successive interference cancelation performance by guaranteeing a high difference in channel-gain between the paired users per subcarrier. To enhance the spectral efficiency, the proposed algorithm
-
Uniform thresholding based transmission policy for energy harvesting wireless sensor nodes in fading channel Wireless Netw. (IF 2.659) Pub Date : 2020-11-11 Arpita Jaitawat, Arun Kumar Singh
The work presents a novel computationally efficient transmission policy for throughput maximization over point-to-point sensor links employing harvest-use-store protocol with finite storage capacity battery. In these settings, under finite averaging duration constraint, the stochastic dynamic programming (SDP) technique provides the optimal solution for throughput maximization, but the implementation
-
Lightweight Feistel structure based hybrid-crypto model for multimedia data security over uncertain cloud environment Wireless Netw. (IF 2.659) Pub Date : 2020-11-11 Denis Rayappan, Madhubala Pandiyan
The exponential rise in software computing and internet technologies have broadened the horizon of cloud computing applications serving numerous purposes like business processes, healthcare, finance, socialization, etc. In the last few years the increase is security breaches and unauthorized data access has forced industry to achieve computationally efficient and robust security system. The increase
-
Threshold selection analysis of spectrum sensing for cognitive radio network with censoring based imperfect reporting channels Wireless Netw. (IF 2.659) Pub Date : 2020-11-10 Alok Kumar, S. Pandit, G. Singh
An appropriate threshold selection scheme is one of the main components to adjudicate the performance of energy detection spectrum sensing (EDSS) technique for cognitive radio network. In this paper, we have employed two different threshold selection approaches namely, the constant false-alarm rate (CFAR) and minimized error probability (MEP) and analyzed the threshold selection effects on the performance
-
Energy-efficient and fault-tolerant drone-BS placement in heterogeneous wireless sensor networks Wireless Netw. (IF 2.659) Pub Date : 2020-11-09 Fatih Deniz, Hakki Bagci, Ibrahim Korpeoglu, Adnan Yazıcı
This paper introduces a distributed and energy-aware algorithm, called Minimum Drone Placement (MDP) algorithm, to determine the minimum number of base stations mounted on resource-rich Unmanned Aerial Vehicles (UAV-BS), commonly referred to as drone-BS, and their possible locations to provide fault tolerance with high network connectivity in heterogeneous wireless sensor networks. This heterogeneous
-
Lightweight PUF based authentication scheme for fog architecture Wireless Netw. (IF 2.659) Pub Date : 2020-11-09 Ruben De Smet, Thibaut Vandervelden, Kris Steenhaut, An Braeken
Fog computing improves efficiency and reduces the amount of bandwidth to the cloud. In many use cases, the internet of things (IoT) devices do not know the fog nodes in advance. Moreover, as the fog nodes are often placed in open publicly available places, they can be easily captured. Therefore, it should be ensured that even if the key material is leaked from the fog devices, the previously generated
-
Utility optimization of grouping-based uplink OFDMA random access for the next generation WLANs Wireless Netw. (IF 2.659) Pub Date : 2020-11-07 Annan Yang, Bo Li, Mao Yang, Zhongjiang Yan, Yi Xie
In this paper, a grouping-based uplink orthogonal frequency division multiple access (OFDMA) random access method is studied which can improve users’ satisfaction in the next generation wireless local area networks (WLANs). The next generation WLANs standard, IEEE 802.11ax introduces a random access mechanism, uplink OFDMA random access (UORA), to allow users to access channel randomly. Although UORA
-
Can a multi-hop link relying on untrusted amplify-and-forward relays render security? Wireless Netw. (IF 2.659) Pub Date : 2020-11-06 Milad Tatar Mamaghani, Ali Kuhestani, Hamid Behroozi
Cooperative relaying is utilized as an efficient method for data communication in wireless sensor networks and the Internet of Things. However, sometimes due to the necessity of multi-hop relaying in such communication networks, it is challenging to guarantee the secrecy of cooperative transmissions when the relays may themselves be eavesdroppers, i.e., we may face with the untrusted relaying scenario
-
POID: a passive all-optical inter-rack interconnect for data-centers Wireless Netw. (IF 2.659) Pub Date : 2020-11-04 Priyankar Roychowdhury, Jaafar M. Alghazo, Ghazanfar Latif
With the increase in demand for bandwidth-thirsty cloud-based services, bandwidth demands for rack-to-rack interconnect in data centers are increasing exponentially. In this paper, an optical interconnect architecture dubbed “POID” is proposed. The novel architecture is proposed using passive optical technology, wavelength division multiplexing, and innovative architectural concepts. The proposed architecture
-
Self-adaptive query-broadcast in wireless ad-hoc networks using fuzzy best worst method Wireless Netw. (IF 2.659) Pub Date : 2020-11-03 Naeem Ahmad, Md. Gulzarul Hasan
Various broadcasting schemes have been proposed for a unified routing approach in Wireless Adhoc Networks. In their efforts, the researchers mostly aim to minimize the routing-overheads including overfilling of query, routing delay and energy-drain. The routing overheads are minimized using either repeated broadcast or canceling the query-broadcast. On one hand broadcast cancellation methods work based
-
Internet of things for healthcare monitoring applications based on RFID clustering scheme Wireless Netw. (IF 2.659) Pub Date : 2020-11-03 Abdulrahman Abuelkhail, Uthman Baroudi, Muhammad Raad, Tarek Sheltami
COVID-19 surprised the whole world by its quick and sudden spread. Coronavirus pushes all community sectors: government, industry, academia, and nonprofit organizations to take forward steps to stop and control this pandemic. It is evident that IT-based solutions are urgent. This study is a small step in this direction, where health information is monitored and collected continuously. In this work
-
A CPW-fed wearable antenna at ISM band for biomedical and WBAN applications Wireless Netw. (IF 2.659) Pub Date : 2020-11-02 Sina Kiani, Pejman Rezaei, Mina Fakhr
In this paper, a Mercedes-Benz logo antenna with a metal plate located at an optimized distance from the proposed antenna is introduced as a wearable antenna to operate in the industrial, scientific, and medical band with center frequency of 2.45 GHz. The metal plate is integrated with the antenna as an isolator and a reflector to improve the radiation performance of the proposed design, reduce the
-
Radio resource management: approaches and implementations from 4G to 5G and beyond Wireless Netw. (IF 2.659) Pub Date : 2020-11-02 Tafseer Akhtar, Christos Tselios, Ilias Politis
Radio resource and its management is one of the key areas of research where technologies, infrastructure and challenges are rapidly changing as 5G system architecture demands a paradigm shift. The previous generation communication technologies require customizations and upgrades as 5G will remain inclusive for significantly long duration. Radio resource management (RRM) schemes that are evolved during
-
Design and analysis of adaptive full-duplex cognitive relay cooperative strategy based on primary system behavior Wireless Netw. (IF 2.659) Pub Date : 2020-07-24 Suoping Li, Wei Li, Jaafar Gaber, Kejun Jia, Fan Wang
The core problem of cognitive radio networks is the accurate sensing and the efficient use of spectrum holes without interfering the communication of the primary system. This paper proposes a cooperative strategy with two full-duplex cognitive base stations (FDCBS) where in-band full-duplex technology and cognitive radio are integrated. If the primary channel is in the “busy” state, the FDCBS assist
-
Terahertz band channel properties according to transmit power estimation Wireless Netw. (IF 2.659) Pub Date : 2020-07-28 Mustafa Alper Akkaş
Over the last decade, short-range communications in the THz (Terahertz) band have been extensively studied as a technology-enabler for dense and ultra-dense wireless networks. The increasing demand for high data rates for wireless communication systems will inevitably lead to the extension of operation frequencies with larger bandwidths. THz range enables bandwidths on the order or hundreds of GHz
-
Hybrid wireless aided volunteer computing paradigm Wireless Netw. (IF 2.659) Pub Date : 2020-06-24 Ayodele A. Periola, Olabisi E. Falowo
Big-data acquisition and processing is important in developing value driven machine learning applications. This is challenging in compute resource-constrained scenarios. Compute resource-constrained scenarios arise due to low capacity of installed cloud infrastructure and low availability of high speed internet links. These factors limit the ability to process crowd-sourced data to develop machine
-
HackMan: hacking commodity millimeter-wave hardware for a measurement study Wireless Netw. (IF 2.659) Pub Date : 2020-06-27 Chao Cai, Zhen Chen, Jun Luo, Linwei Zhu, Menglan Hu
The extremely high frequency of Millimeter-Wave technology warrants Gbps throughput for the next-generation wireless communication systems, but mmWave signals also suffer from severe path loss due to high attenuation. To compensate for this loss, mmWave radios establish communication links via directional beams so as to increase channel gains and communication range. Until recently, the measurement
-
Service discovery in the Internet of Things: review of current trends and research challenges Wireless Netw. (IF 2.659) Pub Date : 2020-06-24 Behrouz Pourghebleh, Vahideh Hayyolalam, Amir Aghaei Anvigh
Recent technologies have made the life of people more comfortable and more straightforward than it was before. With the development of information technology, the Internet of Things (IoT) as an emerging technology has been entered into a lane of development. With the advent of IoT, data sharing, and connections among systems, devices, and people have been facilitated, and daily devices have been equipped
-
Model-aided distributed shallow learning for OFDM receiver in IEEE 802.11 channel model Wireless Netw. (IF 2.659) Pub Date : 2020-06-29 Messaoud Ahmed Ouameur, Anh Duong Tuấn Lê, Daniel Massicotte
Deep learning (DL) has been recognized as an instrumental tool for the design of future communication systems. Since it is still not clear whether a fully data-driven end-to-end communication learning approach would eventually outperform the traditional ones in terms of performance and complexity, it is argued that the optimal design needs to be tackled by taking the benefits of both model-based and
-
Radio-over-free space optical space division multiplexing system using 3-core photonic crystal fiber mode group multiplexers Wireless Netw. (IF 2.659) Pub Date : 2020-08-20 Angela Amphawan, Sushank Chaudhary, Tse-Kian Neo, Mohsen Kakavand, Mohammad Dabbagh
Radio over free space optics (Ro-FSO) systems have previously relied on the signal intensity, wavelength and polarization for multiplexing data streams in order to increase to the signal quality and achievable link range. This work leverages on optical space division multiplexing by using novel three-core photonic crystal fiber (PCF) mode group multiplexers and hexagonal mid-gapped tiered PCF mode
-
Reducing web latency with coding-based fast multi-path loss recovery Wireless Netw. (IF 2.659) Pub Date : 2020-08-20 Yi Liu, Guihua Zhou, Guo Chen
TCP latency is critical to the performance of Web services. However, packet loss greatly impairs the TCP performance due to its poor loss recovery mechanisms. Recent work FUSO addressed this problem by leveraging multi-path diversity for proactive loss recovery, i.e., using “good” paths to proactively retransmit the potentially lost packet on “bad” paths before they are retransmitted after duplicate
Contents have been reproduced by permission of the publishers.