EURASIP Journal on Wireless Communications and Networking

http://link.springer.com/journal/13638

List of Papers (Total 3,021)

Privacy-preserving combinatorial auction without an auctioneer

Combinatorial auctions are employed into many applications such as spectrum auctions held by the Federal Communications Commission (FCC). A crucial problem in such auctions is the lack of secure and efficiency mechanism to protect the privacy of the bidding prices and to ensure data security. To solve the problem, we propose an approach to represent the price as a polynomial’s...

Improvement of the LPWAN AMI backhaul’s latency thanks to reinforcement learning algorithms

Low power wide area networks (LPWANs) have been recently deployed for long-range machine-to-machine (M2M) communications. These networks have been proposed for many applications and in particular for the communications of the advanced metering infrastructure (AMI) backhaul of the smart grid. However, they rely on simple access schemes that may suffer from important latency, which...

Target guiding self-avoiding random walk with intersection algorithm for minimum exposure path problem in wireless sensor networks

To solve minimum exposure path (MEP) problem in wireless sensor networks more efficiently, this work proposes an algorithm called target guiding self-avoiding random walk with intersection (TGSARWI), which mimics the behavior of a group of random walkers that seek path to their destinations in a strange area. Target guiding leads random walkers move toward their end points, while...

UAV positioning for throughput maximization

The throughput of a communication system depends on the offered traffic load and the available capacity to support that load. When an unmanned aerial verhicle (UAV) is responsible for providing the communication service to users within its transmission range, the position of the UAV determines how much capacity each user gets. The closer the UAV to a user, the greater the...

Receiver design combining iteration detection and ICI compensation for SEFDM

With the rapid development of wireless communication, the spectrum resource becomes rare, and research on utilization of limited spectrum resource becomes more popular, especially in fifth generation (5G) mobile communication system. Some efficient frequency division multiplexing systems, such as spectrally efficient frequency division multiplexing (SEFDM) system, can improve...

A Monte Carlo localization method based on differential evolution optimization applied into economic forecasting in mobile wireless sensor networks

The localization of sensor node is an essential problem for many economic forecasting applications in wireless sensor networks. Considering that the mobile sensors change their locations frequently over time, Monte Carlo localization algorithm utilizes the moving characteristics of nodes and employs the probability distribution function (PDF) in the previous time slot to estimate...

Mining shopping data with passive tags via velocity analysis

Unlikeonline shopping, it is difficult for the physical store to collect customer shopping data during the process of shopping and conduct in-depth data mining. The existing methods to solve this problem only considered how to collect and analyze the data, but they have not paid attention to the large computation amount, bulk data amount, and long time delay, in which they can...

Aircraft detection in remote sensing images based on saliency and convolution neural network

New algorithms and architectures for the current industrial wireless sensor networks shall be explored to ensure the efficiency, robustness, and consistence in variable application environments which concern different issues, such as the smart grid, water supply, and gas monitoring. Object detection automatic in remote sensing images has always been a hot topic. Using the...

Efficient trust management with Bayesian-Evidence theorem to secure public key infrastructure-based mobile ad hoc networks

In mobile ad hoc networks (MANETs), the reliability of nodes, quality of data and access control cannot be achieved successfully for various network functionalities through traditional cryptographic security, which makes MANET vulnerable to illegitimate node behaviour changes. These node misbehaviours, referred as soft security threats, need to be detected and prevented in order...

Optimization on TEEN routing protocol in cognitive wireless sensor network

In order to improve the energy efficiency of cognitive wireless sensor network, this paper introduces threshold-sensitive energy efficient sensor network (TEEN) routing protocol into cognitive wireless sensor network. To make routing and spectrum more stable, this paper presents advanced threshold-sensitive energy efficient sensor network (A-TEEN), which is the optimization of...

Novel polar-coded space-time transmit diversity scheme over Rician fading MIMO channels

In this paper, a polar-coded space-time transmit diversity (STTD) scheme is proposed in order to improve the performance of multiple-input multiple-output (MIMO) system. In Rician fading MIMO channels, the corresponding polar-coded STTD system can be equivalent to a single transmission channel for each polar code bit. Density evolutions for the polar-coded STTD systems are...

Biorthogonal Fourier transform for multichirp-rate signal detection over dispersive wireless channel

Biorthogonal Fourier transform (BFT), consistent with the matched signal transform (MST), has been introduced to demodulate the M-ray chirp-rate signal which possesses good orthogonality in the BFT domain. Here, we analyze the characteristics of BFT detection in a further step, including the resolution capability of the multichirp-rate signal, the property of pulse compression...

Pilot contamination reduction in massive MIMO systems based on pilot scheduling

The pilot contamination caused by sharing the non-orthogonal pilots among users is considered to be a bottleneck of the massive multi-input multi-output (MIMO) systems. This paper proposes a pilot scheduling scheme based on the degradation to address this problem. Through computing the degradation of the users, the proposed scheduling assigns the optimal pilot sequence to the...

Uplink performance enhancement for LTE licensed-assisted access to unlicensed spectrum

Licensed-assisted access (LAA) is a new operation mode of carrier aggregation for the Long Term Evolution Advanced systems to transmit data on both licensed and unlicensed spectrum. To deal with the issue of co-existence with WiFi systems, LAA is required to perform listen-before-talk, which can significantly impact its resource utilization. In this paper, the concept called...

Performance evaluation of the V2I fair access with a finite retry limit

This paper evaluates the performance of the vehicle-to-infrastructure (V2I) fair access with a finite retry limit through constructing an analytical model. Firstly, the process of the distributed coordination function (DCF) mechanism with a finite retry limit is described through developing a 2-D Markov chain; based on the Markov chain, the transmission probability with the...

Capacity of multi-channel cognitive radio systems: bits through channel selections

The channel capacity of multi-channel cognitive radio systems is studied with the assumption of limited sensing capability. The randomness of sub-channel selection is utilized to convey information. Two types of sub-channels, memoryless and finite state, are considered. For both cases, the separation of sub-channel input distribution optimization and sub-channel selection policy...

Delay-tolerant distributed space-time coding with feedback for cooperative MIMO relaying systems

An adaptive delay-tolerant distributed space-time coding (DSTC) scheme equipped with a feedback channel is proposed for two-hop cooperative multiple-input multiple-output (MIMO) networks. A maximum likelihood receiver and adjustable code matrices subject to a power constraint with a decode-and-forward cooperation strategy are considered with different DSTC antenna configurations...

Smart container monitoring using custom-made WSN technology: from business case to prototype

This paper reports on the development of a prototype solution for tracking and monitoring shipping containers. Deploying wireless sensor networks (WSNs) in an operational environment remains a challenging task. We strongly believe that standardized methodologies and tools could enhance future WSN deployments and enable rapid prototype development. Therefore, we choose to use a...

Channel estimation for massive MIMO TDD systems assuming pilot contamination and flat fading

Channel estimation is crucial for massive massive multiple-input multiple-output (MIMO) systems to scale up multi-user (MU) MIMO, providing great improvement in spectral and energy efficiency. This paper presents a simple and practical channel estimator for multi-cell MU massive MIMO time division duplex (TDD) systems with pilot contamination in flat Rayleigh fading channels, i.e...

ENCP: a new Energy-efficient Nonlinear Coverage Control Protocol in mobile sensor networks

The node deployment in mobile sensor networks (MSNs) is mostly performed in a random method. However, a large number of redundant nodes may exist due to the randomness. As a result, severe data congestion may be caused and the quality of coverage (QoC) is undermined. In order to solve this QoC problem, we propose an Energy-efficient Nonlinear Coverage Control Protocol (ENCP...

Energy-efficiency opportunistic spectrum allocation in cognitive wireless sensor network

The developments in wireless sensor network (WSN) that enriches with the unique capabilities of cognitive radio technique are giving impetus to the evolution of Cognitive Wireless Sensor Network (CWSN). In a CWSN, wireless sensor nodes can opportunistically transmit on vacant licensed frequencies and operate under a strict interference avoidance policy with the other licensed...

Optimum low complexity filter bank for generalized orthogonal frequency division multiplexing

Generalized frequency division multiplexing (GFDM) is one of the multicarrier modulation candidates proposed for the 5th generation of wireless networks. Among GFDM linear receivers, GFDM MMSE receiver achieves the best error performance for multipath fading channels at the cost of high numerical complexity. Hence, the combination of GFDM match filter (MF) receiver and double...

Outage probability of power splitting SWIPT two-way relay networks in Nakagami-m fading

This paper investigates the outage probability of an energy harvesting (EH) relay-aided cooperative network, where a source node transmits information to its destination node with the help of an energy harvesting cooperative node. For such a system, we derive an explicit closed-form expression of outage probability over Nakagami-m fading channels for both amplify-and-forward (AF...

A hybrid MAC protocol for optimal channel allocation in large-scale wireless powered communication networks

This paper proposes a large-scale wireless powered communication network (WPCN), which consists of a hybrid access point (H-AP) and numerous nodes. The H-AP broadcasts energy to all nodes, and the nodes harvest the energy and then use the harvested energy to transmit information. For the large-scale WPCN, we also propose a novel hybrid multiple access protocol, termed hybrid...

Learning-based synchronous approach from forwarding nodes to reduce the delay for Industrial Internet of Things

The Industrial Internet of Things (IIoTs) is creating a new world which incorporates machine learning, sensor data, and machine-to-machine (M2M) communications. In IIoTs, the length of the transmission delay is one of the pivotal performance because dilatory communication will cause heavy losses to industrial applications. In this paper, a learning-based synchronous (LS) approach...