EURASIP Journal on Wireless Communications and Networking

http://link.springer.com/journal/13638

List of Papers (Total 2,849)

An efficient privacy protection in mobility social network services with novel clustering-based anonymization

A popular means of social communication for online users has become a trend with rapid growth of social networks in the last few years. Facebook, Myspace, Twitter, LinkedIn, etc. have created huge amounts of data about interactions of social networks. Meanwhile, the trend is also true for offline scenarios with rapid growth of mobile devices such as smart phones, tablets, and ...

On the use of ordered statistics decoders for low-density parity-check codes in space telecommand links

The performance of short low-density parity-check (LDPC) codes that will be included in the standard for next-generation space telecommanding is analyzed. The paper is focused on the use of a famous ordered statistics decoder known as most reliable basis (MRB) algorithm. Despite its complexity may appear prohibitive in space applications, this algorithm is shown to actually ...

Detection of wormhole attacks on IPv6 mobility-based wireless sensor network

New communication networks are composed of multiple heterogeneous types of networks including Internet, mobile networks, and sensor networks. Wireless sensor networks have been applied to various businesses and industries since the last decade. Most sensors have the ability of communication and the requirement of low power consumption. 6LoWPAN (IPv6 over Low Power Wireless Personal ...

Optimal virtual network embedding based on artificial bee colony

As one of the key challenges in network virtualization, the problem of virtual network embedding has attracted significant attention from researchers. In this problem, it needs to embed virtual networks with both node and link demands into a shared physical network. The main goal of this problem is to embed more virtual networks to gain more revenue. However, the prior approaches ...

Integrating energy efficiency analysis of massive MIMO-based C-RAN

Besides the prior study of energy efficiency (EE) that focuses on single component (antenna, radio frequency (RF) chain, circuit, etc.), or limited to one base station (BS) area, in this paper, EE is integrated, investigated with various components (antenna, RF chain, circuit, coverage area) considering in, based on an optimized system model. That is, one optimized multi-BS system ...

How network monitoring and reinforcement learning can improve tcp fairness in wireless multi-hop networks

Wireless mesh network (WMN) is an emerging technology for the last-mile Internet access. Despite extensive research and the commercial implementations of WMNs, there are still serious fairness issues in the transport layer, where the transmission control protocol (TCP) favors flows with a smaller number of hops to flows with a larger number of hops. TCP unfair behavior is a known ...

Adaptive couple-resolution blocking protocol for repeated tag identification in RFID systems

RFID applications such as monitoring an object for a long time need to identify tags repeatedly within the scope of the reader. Re-identification process can be improved using the information obtained from the previous tag identification process. Couple-resolution blocking (CRB) protocol utilizes the blocking technique that prevents staying tags from being collided by newly ...

Prioritized channel allocation-based dynamic spectrum access in cognitive radio sensor networks without spectrum handoff

In this article, a dynamic spectrum access (DSA) method is proposed to perform dynamic prioritized channel allocation in cognitive radio sensor networks (CRSNs) that do not support spectrum handoff. The proposed CRSN supports primary users (PUs) and two types of secondary users (SUs), where one type of SU data traffic has a higher priority. The proposed prioritized channel ...

On the Gaussian multiway relay channel with intra-cluster links

This paper studies the extension of the multiway relay channel (introduced by Gündüz et al.) by adding intra-cluster links. In this model, multiple clusters of users communicate with the help of one relay and the users within a cluster wish to exchange messages among themselves. Restricted encoders are considered; thus, the encoded messages of each user depend only on its own ...

Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the ...

Towards next generation software-defined radio access network–architecture, deployment, and use case

As one of the key enabling technologies of the fifth generation wireless network (5G), software defined network (SDN) offers a logically centralized control model, flexible programmability, and a flow-based paradigm that is ideally suited for highly scalable wireless networks, from access to core part. Following this paradigm, a novel software-defined radio access network (SDRAN) ...

Modeling link quality for high-speed railway wireless networks based on hidden Markov chain

In high-speed railway (HSR) wireless networks, the link quality is greatly time-dependent and location-varying. Due to the high randomness, it is challenging to predict the link quality in HSR wireless networks. In this paper, we firstly conducted a certain amount of field measurement campaigns of HSR wireless network link quality. A great number of practical datasets are collected ...

A low-complexity cell clustering algorithm in dense small cell networks

Clustering plays an important role in constructing practical network systems. In this paper, we propose a novel clustering algorithm with low complexity for dense small cell networks, which is a promising deployment in next-generation wireless networking. Our algorithm is a matrix-based algorithm where metrics for the clustering process are represented as a matrix on which the ...

Virtual-MIMO feedback and transmission for wireless ad hoc networks

Ina wireless ad hoc network, single-antenna nodes can cooperate in their transmissions to create a virtual multiple-input multiple-output (MIMO) channel for maximizing the spatial multiplexing gain. However, implementing virtual-MIMO transmission can result in overwhelming overhead, such as channel state information (CSI) feedback and local data exchange, as the number of ...

A new scenario of triple-hop mixed RF/FSO/RF relay network with generalized order user scheduling and power allocation

This paper proposes and evaluates the performance of multiuser (MU) triple-hop mixed radio frequency (RF)/free-space optical (FSO) relay network with generalized order user scheduling. An important example on the applicability of this scenario is in cellular networks where two sets of various users are communicating with their own base stations (BSs) over RF links and these BSs are ...

Successive optimization Tomlinson-Harashima precoding strategies for physical-layer security in wireless networks

In this paper, we propose novel non-linear precoders for the downlink of a multi-user MIMO system in the existence of multiple eavesdroppers. The proposed non-linear precoders are designed to improve the physical-layer secrecy rate. Specifically, we combine the non-linear successive optimization Tomlinson-Harashima precoding (SO-THP) with the generalized matrix inversion (GMI) ...

An unequal redundancy level-based mechanism for reliable data collection in wireless sensor networks

Most applications require high reliability with low delay in wireless sensor networks (WSNs). Unfortunately, it is a challenge issue to achieve reliable communication because of the lossy nature of wireless channels. In this paper, a novel unequal redundancy level (URL) data collection scheme is proposed to achieve high reliability for wireless sensor networks while long lifetime ...

Cascading polar coding and LT coding for radar and sonar networks

In radar and sonar networks, heavy clutter and noise have generated strong impairments to information transmission and processing. Coding techniques have been widely used to cope with various channel noises and thereby to improve transmission performance. In the study, we investigate a novel cascaded coding scheme for systems operating in adverse electromagnetic environments, e.g., ...

Adaptive coding and modulation using imperfect CSI in cognitive BIC-OFDM systems

This work investigates adaptive coding and modulation (ACM) algorithms under the realistic assumption that the available channel state information (CSI) at the transmitter is imperfect due to estimation errors and/or feedback delays. First, we introduce an optimal performance metric for the secondary user (SU) bit-interleaved coded orthogonal frequency division multiplexing ...

Buffer-aided distributed space-time coding schemes and algorithms for cooperative DS-CDMA systems

In this work, we propose buffer-aided distributed space-time coding (DSTC) schemes and relay selection algorithms for cooperative direct-sequence code-division multiple access (DS-CDMA) systems. We first devise a relay pair selection algorithm that can exploit all possible relay pairs and then select the optimum set of relays among both the source-relay phase and the ...

On the efficiency of PAPR reduction schemes deployed for DRM systems

Digital Radio Mondiale (DRM) is the universally, openly standardized digital broadcasting system for all frequencies including LW, MW, and SW as well as VHF bands. Alongside providing high audio quality to listeners, DRM satisfies technological requirements posed by broadcasters, manufacturers and regulatory authorities and thus bears a great potential for the future of global ...

A hybrid model of sentimental entity recognition on mobile social media

With new forms of media such as Twitter becoming increasingly popular, the Internet is now the main conduit of individual and interpersonal messages. A considerable amount of people express their personal opinions about news-related subject through Twitter, a popular SNS platform based on human relationships. It provides us a data source that we can use to extract peoples’ opinions ...

A survey on modeling interference and blockage in urban heterogeneous cellular networks

In this paper, we provide a survey on abstraction models for evaluating aggregate interference statistics in urban heterogeneous cellular networks. The two principal interference shaping factors are the path loss attenuation and the interference geometry. For both factors, our survey systematically summarizes state-of-the-art models and outlines their strengths and weaknesses. In ...

A fast and low-complexity matrix inversion scheme based on CSM method for massive MIMO systems

Massive multiple-input-multiple-output (MIMO), also known as very-large MIMO systems, is an attracting technique in 5G and can provide higher rates and power efficiency than 4G. Linear-precoding schemes are able to achieve the near optimal performance, and thus are more attractive than non-linear precoding schemes. However, conventional linear precoding schemes in massive MIMO ...

Secure dissemination of software updates for intelligent mobility in future wireless networks

Wireless mobile networks frequently need remote software updates to add or adjust the tasks of mobile nodes. Software update traffic, particularly in the Internet of Things (IoT), should be carefully handled since attackers can easily compromise a number of unattended devices by modifying a piece of code in the software update routine. These attacks are quite realistic and harmful ...