for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Institute of Electrical and Electronics Engineers (IEEE)   (Total: 176 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last

Aerospace and Electronic Systems, IEEE Transactions on     Hybrid Journal   (Followers: 71, SJR: 1.337, h-index: 85)
Affective Computing, IEEE Transactions on     Hybrid Journal   (Followers: 9, SJR: 1.824, h-index: 16)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 5)
Bell Labs Technical J.     Hybrid Journal   (Followers: 9, SJR: 0.411, h-index: 26)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 16, SJR: 1.462, h-index: 14)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 14, SJR: 1.184, h-index: 118)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 6, SJR: 1.314, h-index: 53)
Canadian J. of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 7, SJR: 0.119, h-index: 14)
China Communications     Full-text available via subscription   (Followers: 4, SJR: 0.189, h-index: 6)
Communications and Networks, J. of     Hybrid Journal   (Followers: 4, SJR: 0.364, h-index: 23)
Components, Packaging and Manufacturing Technology, IEEE Transactions on     Hybrid Journal   (Followers: 13, SJR: 0.638, h-index: 14)
Computational Intelligence and AI in Games, IEEE Transactions on     Hybrid Journal   (Followers: 9)
Computer     Full-text available via subscription   (Followers: 38, SJR: 0.717, h-index: 112)
Computing in Science & Engineering     Full-text available via subscription   (Followers: 13, SJR: 0.579, h-index: 40)
Control Systems     Hybrid Journal   (Followers: 24, SJR: 0.83, h-index: 75)
Embedded Systems Letters, IEEE     Hybrid Journal   (Followers: 22)
Emerging and Selected Topics in Circuits and Systems     Hybrid Journal   (Followers: 4, SJR: 0.63, h-index: 8)
Geoscience and Remote Sensing, IEEE Transactions on     Hybrid Journal   (Followers: 21, SJR: 2.458, h-index: 139)
Haptics, IEEE Transactions on     Hybrid Journal   (Followers: 4, SJR: 0.808, h-index: 19)
IEEE Access     Open Access   (Followers: 5)
IEEE Aerospace and Electronic Systems Magazine     Full-text available via subscription   (Followers: 43, SJR: 0.402, h-index: 35)
IEEE Annals of the History of Computing     Full-text available via subscription   (Followers: 11, SJR: 0.134, h-index: 13)
IEEE Antennas and Propagation Magazine     Hybrid Journal   (Followers: 15, SJR: 0.757, h-index: 57)
IEEE Antennas and Wireless Propagation Letters     Hybrid Journal   (Followers: 14, SJR: 1.499, h-index: 54)
IEEE Circuits and Systems Magazine     Full-text available via subscription   (Followers: 27, SJR: 0.737, h-index: 32)
IEEE Communications Letters     Hybrid Journal   (Followers: 18, SJR: 1.19, h-index: 96)
IEEE Communications Magazine     Full-text available via subscription   (Followers: 26, SJR: 3.196, h-index: 144)
IEEE Communications Surveys & Tutorials     Hybrid Journal   (Followers: 10, SJR: 3.561, h-index: 52)
IEEE Computational Intelligence Magazine     Full-text available via subscription   (Followers: 12, SJR: 2.066, h-index: 26)
IEEE Computer Architecture Letters     Hybrid Journal   (Followers: 17, SJR: 0.871, h-index: 14)
IEEE Computer Graphics and Applications     Full-text available via subscription   (Followers: 10, SJR: 0.501, h-index: 62)
IEEE Consumer Electronics Magazine     Full-text available via subscription   (Followers: 17)
IEEE Control Systems Magazine     Full-text available via subscription   (Followers: 30)
IEEE Design & Test     Full-text available via subscription   (Followers: 16)
IEEE Distributed Systems Online     Full-text available via subscription   (Followers: 5)
IEEE Electrical Insulation Magazine     Full-text available via subscription   (Followers: 8, SJR: 0.577, h-index: 41)
IEEE Electromagnetic Compatibility Magazine     Full-text available via subscription   (Followers: 5)
IEEE Electron Device Letters     Full-text available via subscription   (Followers: 5, SJR: 2.191, h-index: 105)
IEEE Engineering in Medicine and Biology Magazine     Full-text available via subscription   (Followers: 5)
IEEE Engineering Management Review     Full-text available via subscription   (Followers: 9, SJR: 0.11, h-index: 9)
IEEE Geoscience and Remote Sensing Letters     Hybrid Journal   (Followers: 16, SJR: 1.481, h-index: 46)
IEEE Industrial Electronics Magazine     Full-text available via subscription   (Followers: 18, SJR: 2.105, h-index: 27)
IEEE Industry Applications Magazine     Full-text available via subscription   (Followers: 5, SJR: 0.67, h-index: 36)
IEEE Instrumentation & Measurement Magazine     Full-text available via subscription   (Followers: 18, SJR: 0.245, h-index: 26)
IEEE Intelligent Systems     Full-text available via subscription   (Followers: 22, SJR: 0.941, h-index: 79)
IEEE Internet Computing     Full-text available via subscription   (Followers: 13, SJR: 1.044, h-index: 79)
IEEE J. of Biomedical and Health Informatics     Hybrid Journal   (Followers: 8, SJR: 1.157, h-index: 61)
IEEE J. of Emerging and Selected Topics in Power Electronics     Hybrid Journal   (Followers: 12)
IEEE J. of Oceanic Engineering     Hybrid Journal   (Followers: 6, SJR: 0.687, h-index: 63)
IEEE J. of Quantum Electronics     Hybrid Journal   (Followers: 16, SJR: 1.594, h-index: 98)
IEEE J. of Selected Topics in Quantum Electronics     Hybrid Journal   (Followers: 6, SJR: 2.588, h-index: 114)
IEEE J. of Selected Topics in Signal Processing     Hybrid Journal   (Followers: 16, SJR: 2.705, h-index: 45)
IEEE J. of Solid-State Circuits     Full-text available via subscription   (Followers: 16, SJR: 3.574, h-index: 144)
IEEE J. of the Electron Devices Society     Open Access   (Followers: 2)
IEEE J. of Translational Engineering in Health and Medicine     Open Access   (Followers: 2)
IEEE J. on Selected Areas in Communications     Hybrid Journal   (Followers: 6, SJR: 3.335, h-index: 165)
IEEE Latin America Transactions     Full-text available via subscription   (Followers: 2, SJR: 0.162, h-index: 7)
IEEE Micro     Full-text available via subscription   (Followers: 5, SJR: 1.506, h-index: 67)
IEEE Microwave and Wireless Components Letters     Hybrid Journal   (Followers: 7, SJR: 1.915, h-index: 87)
IEEE Microwave Magazine     Full-text available via subscription   (Followers: 12, SJR: 0.59, h-index: 41)
IEEE Multimedia     Full-text available via subscription   (Followers: 8, SJR: 0.639, h-index: 47)
IEEE Network     Full-text available via subscription   (Followers: 16, SJR: 1.796, h-index: 80)
IEEE Pervasive Computing     Full-text available via subscription   (Followers: 11, SJR: 0.923, h-index: 69)
IEEE Photonics Technology Letters     Hybrid Journal   (Followers: 4, SJR: 1.805, h-index: 111)
IEEE Potentials     Full-text available via subscription   (Followers: 2, SJR: 0.153, h-index: 18)
IEEE Power and Energy     Full-text available via subscription   (Followers: 12, SJR: 1.671, h-index: 45)
IEEE Power Electronics Magazine     Full-text available via subscription   (Followers: 6)
IEEE Revista Iberoamericana de Tecnologias del Aprendizaje     Hybrid Journal   (Followers: 1, SJR: 0.1, h-index: 3)
IEEE Robotics & Automation Magazine     Full-text available via subscription   (Followers: 21, SJR: 1.09, h-index: 51)
IEEE Security & Privacy Magazine     Full-text available via subscription   (Followers: 16, SJR: 0.588, h-index: 44)
IEEE Sensors J.     Hybrid Journal   (Followers: 50, SJR: 0.733, h-index: 56)
IEEE Signal Processing Letters     Hybrid Journal   (Followers: 16, SJR: 1.016, h-index: 82)
IEEE Signal Processing Magazine     Full-text available via subscription   (Followers: 36, SJR: 1.831, h-index: 106)
IEEE Software     Full-text available via subscription   (Followers: 38, SJR: 0.842, h-index: 72)
IEEE Spectrum     Full-text available via subscription   (Followers: 43, SJR: 0.191, h-index: 48)
IEEE Systems J.     Hybrid Journal   (Followers: 8, SJR: 1.034, h-index: 17)
IEEE Technology and Society Magazine     Full-text available via subscription   (Followers: 4, SJR: 0.348, h-index: 17)
IEEE Transactions on Advanced Packaging     Full-text available via subscription   (Followers: 5, SJR: 0.598, h-index: 52)
IEEE Transactions on Antennas and Propagation     Full-text available via subscription   (Followers: 10, SJR: 1.837, h-index: 118)
IEEE Transactions on Applied Superconductivity     Hybrid Journal   (Followers: 1, SJR: 0.46, h-index: 54)
IEEE Transactions on Audio, Speech, and Language Processing     Hybrid Journal   (Followers: 12)
IEEE Transactions on Automatic Control     Hybrid Journal   (Followers: 26, SJR: 2.992, h-index: 175)
IEEE Transactions on Automation Science and Engineering     Full-text available via subscription   (Followers: 10, SJR: 1.287, h-index: 35)
IEEE Transactions on Biomedical Circuits and Systems     Hybrid Journal   (Followers: 5, SJR: 1.876, h-index: 29)
IEEE Transactions on Circuits and Systems for Video Technology     Hybrid Journal   (Followers: 4, SJR: 1.47, h-index: 124)
IEEE Transactions on Circuits and Systems I: Regular Papers     Hybrid Journal   (Followers: 11, SJR: 1.406, h-index: 68)
IEEE Transactions on Circuits and Systems II: Express Briefs     Hybrid Journal   (Followers: 10, SJR: 0.932, h-index: 53)
IEEE Transactions on Cloud Computing     Hybrid Journal   (Followers: 7)
IEEE Transactions on Communications     Hybrid Journal   (Followers: 10, SJR: 2.035, h-index: 150)
IEEE Transactions on Components and Packaging Technologies     Full-text available via subscription   (Followers: 9, SJR: 0.71, h-index: 50)
IEEE Transactions on Computational Social Systems     Full-text available via subscription  
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems     Hybrid Journal   (Followers: 6, SJR: 0.77, h-index: 83)
IEEE Transactions on Computers     Hybrid Journal   (Followers: 19, SJR: 0.768, h-index: 81)
IEEE Transactions on Consumer Electronics     Hybrid Journal   (Followers: 17, SJR: 0.731, h-index: 69)
IEEE Transactions on Control of Network Systems     Hybrid Journal  
IEEE Transactions on Control Systems Technology     Hybrid Journal   (Followers: 23, SJR: 1.543, h-index: 87)
IEEE Transactions on Cybernetics     Hybrid Journal   (Followers: 7)
IEEE Transactions on Dependable and Secure Computing     Hybrid Journal   (Followers: 11, SJR: 0.866, h-index: 36)
IEEE Transactions on Device and Materials Reliability     Hybrid Journal   (Followers: 14, SJR: 0.785, h-index: 45)
IEEE Transactions on Dielectrics and Electrical Insulation     Hybrid Journal   (Followers: 5, SJR: 0.635, h-index: 71)

        1 2 | Last

Journal Cover   IEEE Communications Magazine
  [SJR: 3.196]   [H-I: 144]   [28 followers]  Follow
    
   Full-text available via subscription Subscription journal
   ISSN (Print) 0163-6804
   Published by Institute of Electrical and Electronics Engineers (IEEE) Homepage  [176 journals]
  • IEEE Communications Magazine - Front cover
    • Abstract: Presents the front cover for this issue of the publication.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Global Communications Newsletter
    • Authors: Bregni; S.;
      Pages: 1 - 4
      Abstract: The following information is included in this newletter: WICE: Promoting the Role of Women in Communications Engineering Interview with Octavia Dobre, Chair of WICE Standing Committee; Second IEEE ICCC International Workshop on Internet of Things (IOT 2014), Shanghai, China; LTE-Assisted WiFi Direct Trial; Nets4Cars: 2014 Fall Workshop in Saint Petersburg, Russia.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Table of contents
    • Pages: 2 - 4
      Abstract: Presents the table of contents for this issue of the publication.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • IEEE Fellowship for ComSoc members [The President's Page]
    • Authors: Benedetto; S.;Leung, K.K.;
      Pages: 6 - 9
      Abstract: This month's President's Page is devoted to the illustration of the IEEE and ComSoc process dealing with the evaluation of nominees to receive the IEEE Fellow grade. Within ComSoc, the assessment is performed by the Fellow Evaluation Committee, which is charged with the heavy, yet crucial task of analyzing from 70 to 100 nominations a year in order to rank and score them before passing them to the IEEE Fellow Committee.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Book reviews [Two books reviewed]
    • Authors: Chodorek; A.;Correia, L.M.;
      Pages: 10 - 11
      Abstract: Reviews the following books: Mobility Protocols and Handover Optimization: Design, Evaluation and Application (Dutta, A. and Schulzrinne, H.; 2014); Millimeter Wave Wireless Communications (Rappaport, T.S., Heath Jr, R.W., Daniels, R.C. and Murdock, J.N.; 2015)
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Conference calendar
    • Pages: 12 - 12
      Abstract: Presents information on future communications conferences.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • IEEE ICC 2015 Explores "Smart City & Smart World" Innovations from June
           8???12 in London's Tech City [Conference Preview]
    • Pages: 17 - 17
      Abstract: The 2015 IEEE International Conference on Communications, the premier international venue dedicated to the worldwide advancement of wireless and wireline communications, will host its next annual event from 8-12 June 2015 at the ExCel London convention centre in London, UK. In addition to experiencing the numerous local iconic attractions like Canary Wharf, The Olympic Park, Westfield Stratford City, The O2 Arena and Museum of London, attendees will also have the ability to explore London's Tech City, the fastest growing technology cluster in Europe and the heart of the nation's rapidly accelerating digital economy.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Security and privacy in emerging networks: Part 1 [Guest Editorial]
    • Authors: Guizani; M.;He, D.;Ren, K.;Rodrigues, J.;Chan, S.;Zhang, Y.;
      Pages: 18 - 19
      Abstract: With the recent advancements in networking technologies, some new emerging networks are being implemented that have the potential to be deployed broadly and on a large scale in the near future. In the wired domain, these emerging networks include, for example, networks based on software-defined networking (SDN) and named data networking (NDN). In the wireless domain, they include mobile and wireless networks involving handheld computing devices, sensors and RFID devices, body area sensor networks, and participatory sensing networks, to name a few.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Safeguarding 5G wireless communication networks using physical layer
           security
    • Authors: Yang; N.;Wang, L.;Geraci, G.;Elkashlan, M.;Yuan, J.;Renzo, M.D.;
      Pages: 20 - 27
      Abstract: The fifth generation (5G) network will serve as a key enabler in meeting the continuously increasing demands for future wireless applications, including an ultra-high data rate, an ultrawide radio coverage, an ultra-large number of devices, and an ultra-low latency. This article examines security, a pivotal issue in the 5G network where wireless transmissions are inherently vulnerable to security breaches. Specifically, we focus on physical layer security, which safeguards data confidentiality by exploiting the intrinsic randomness of the communications medium and reaping the benefits offered by the disruptive technologies to 5G. Among various technologies, the three most promising ones are discussed: heterogenous networks, massive multiple-input multiple-output, and millimeter wave. On the basis of the key principles of each technology, we identify the rich opportunities and the outstanding challenges that security designers must tackle. Such an identification is expected to decisively advance the understanding of future physical layer security.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Authentication handover and privacy protection in 5G hetnets using
           software-defined networking
    • Authors: Duan; X.;Wang, X.;
      Pages: 28 - 35
      Abstract: Recently, densified small cell deployment with overlay coverage through coexisting heterogeneous networks has emerged as a viable solution for 5G mobile networks. However, this multi-tier architecture along with stringent latency requirements in 5G brings new challenges in security provisioning due to the potential frequent handovers and authentications in 5G small cells and HetNets. In this article, we review related studies and introduce SDN into 5G as a platform to enable efficient authentication hand-over and privacy protection. Our objective is to simplify authentication handover by global management of 5G HetNets through sharing of userdependent security context information among related access points. We demonstrate that SDN-enabled security solutions are highly efficient through its centralized control capability, which is essential for delay-constrained 5G communications.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Securing software defined networks: taxonomy, requirements, and open
           issues
    • Authors: Akhunzada; A.;Ahmed, E.;Gani, A.;Khan, M.K.;Imran, M.;Guizani, S.;
      Pages: 36 - 44
      Abstract: The emergence of SDNs promises to dramatically simplify network management and enable innovation through network programmability. Despite all the hype surrounding SDNs, exploiting its full potential is demanding. Security is still the key concern and is an equally striking challenge that reduces the growth of SDNs. Moreover, the deployment of novel entities and the introduction of several architectural components of SDNs pose new security threats and vulnerabilities. Besides, the landscape of digital threats and cyber-attacks is evolving tremendously, considering SDNs as a potential target to have even more devastating effects than using simple networks. Security is not considered as part of the initial SDN design; therefore, it must be raised on the agenda. This article discusses the state-of-the-art security solutions proposed to secure SDNs. We classify the security solutions in the literature by presenting a thematic taxonomy based on SDN layers/interfaces, security measures, simulation environments, and security objectives. Moreover, the article points out the possible attacks and threat vectors targeting different layers/interfaces of SDNs. The potential requirements and their key enablers for securing SDNs are also identified and presented. Also, the article gives great guidance for secure and dependable SDNs. Finally, we discuss open issues and challenges of SDN security that may be deemed appropriate to be tackled by researchers and professionals in the future.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Evolving defense mechanism for future network security
    • Authors: Zhou; H.;Wu, C.;Jiang, M.;Zhou, B.;Gao, W.;Pan, T.;Huang, M.;
      Pages: 45 - 51
      Abstract: The past few years have witnessed revolutionary advances in network technology. Along with new techniques such as SDN come lots of new network security challenges. Conventional network security mechanisms are incompetent to overcome these challenges, since they are built on a static network configuration that facilitates attackers in finding the weaknesses of a network. In this article, we conceive a novel conceptual network security mechanism, the evolving defense mechanism (EDM), to resolve current and future security problems. EDM is based on a bio-inspired idea of network configuration variations. According to the security requirements of the system, the user, and the network security state, EDM selects an efficient network configuration variation strategy to prevent corresponding security threats. Combined with SDN implementation, EDM resolves security problems from a new angle and is capable of evolving with new network security technology. We sketch a way to implement EDM and present its reference framework, which serves as an ecosystem and coexisting environment for various kinds of network configuration variations. The proposed mechanism avoids the deficiency of conventional mechanisms and has potential to cope with emerging security threats.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Distributed denial of service attacks in software-defined networking with
           cloud computing
    • Authors: Yan; Q.;Yu, F.R.;
      Pages: 52 - 59
      Abstract: Although software-defined networking (SDN) brings numerous benefits by decoupling the control plane from the data plane, there is a contradictory relationship between SDN and distributed denial-of-service (DDoS) attacks. On one hand, the capabilities of SDN make it easy to detect and to react to DDoS attacks. On the other hand, the separation of the control plane from the data plane of SDN introduces new attacks. Consequently, SDN itself may be a target of DDoS attacks. In this paper, we first discuss the new trends and characteristics of DDoS attacks in cloud computing environments. We show that SDN brings us a new chance to defeat DDoS attacks in cloud computing environments, and we summarize good features of SDN in defeating DDoS attacks. Then we review the studies about launching DDoS attacks on SDN and the methods against DDoS attacks in SDN. In addition, we discuss a number of challenges that need to be addressed to mitigate DDoS attached in SDN with cloud computing. This work can help understand how to make full use of SDN's advantages to defeat DDoS attacks in cloud computing environments and how to prevent SDN itself from becoming a victim of DDoS attacks.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • De-anonymizing and countermeasures in anonymous communication networks
    • Authors: Yang; M.;Luo, J.;Ling, Z.;Fu, X.;Yu, W.;
      Pages: 60 - 66
      Abstract: To fulfill global requirements for network security and privacy, anonymous communication systems have been extensively investigated and deployed over the world to provide anonymous communication services for users. Nonetheless, diverse de-anonymizing techniques have been proposed to compromise anonymity and impose a severe threat to anonymous communication systems. In this article, we classify the existing de-anonymizing techniques and provide an overview of these techniques. In addition, corresponding countermeasures are studied to mitigate the risks posed by these de-anonymizing techniques.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Energy harvesting communications: Part 1 [Guest Editorial]
    • Authors: Yuen; C.;Elkashlan, M.;Qian, Y.;Duong, T.Q.;Shu, L.;Schmidt, F.;
      Pages: 68 - 69
      Abstract: Over the last decade, energy harvesting has emerged as a promising approach to enable self-sufficient and self-sustaining operation for low-cost devices in energy-constrained networks by scavenging energy from the ambient environment to power up devices. In wireless sensor networks, small, wireless, autonomous sensors usually operate at ultra-low power. If these wireless sensors, which spread throughout homes or factories, in buildings or even outdoors to monitor all kinds of environmental conditions, are powered by energy harvesting, there are no batteries to replace and no laborious cost associated with replacing them. As such, wireless sensor networks can be deployed in hard-to-reach areas to provide ubiquitous coverage.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Smart RF energy harvesting communications: challenges and opportunities
    • Authors: Mishra; D.;De, S.;Jana, S.;Basagni, S.;Chowdhury, K.;Heinzelman, W.;
      Pages: 70 - 78
      Abstract: RF energy harvesting (RFH) is emerging as a potential method for the proactive energy replenishment of next generation wireless networks. Unlike other harvesting techniques that depend on the environment, RFH can be predictable or on demand, and as such it is better suited for supporting quality-of-service-based applications. However, RFH efficiency is scarce due to low RF-to-DC conversion efficiency and receiver sensitivity. In this article, we identify the novel communication techniques that enable and enhance the usefulness of RFH. Backed by some experimental observations on RFH and the current state of the art, we discuss the challenges in the actual feasibility of RFH communications, new research directions, and the obstacles to their practical implementation.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • A general utility optimization framework for energy-harvesting-based
           wireless communications
    • Authors: Li; H.;Xu, J.;Zhang, R.;Cui, S.;
      Pages: 79 - 85
      Abstract: In the near future, wireless communication systems are expected to achieve more cost-efficient and sustainable operations by replacing conventional fixed power supplies such as batteries with energy harvesting devices, which could provide electric energy from renewable energy sources (e.g., solar and wind). Such EH power supplies, however, are random and unstable in nature, and as a result impose new challenges on reliable communication design and have triggered substantial research interest in EH-based wireless communications. Building on existing works, in this article, we develop a general optimization framework to maximize the utility of EH wireless communication systems. Our framework encapsulates a variety of design problems, such as throughput maximization and outage probability minimization in single-user and multiuser setups, and provides useful guidelines to the practical design of general EH-based communication systems with different assumptions regarding the knowledge of time-varying wireless channels and EH rates at the transmitters.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Application of smart antenna technologies in simultaneous wireless
           information and power transfer
    • Authors: Zhiguo Ding;Caijun Zhong;Wing Kwan Ng; D.;Mugen Peng;Suraweera, H.A.;Schober, R.;Poor, H.V.;
      Pages: 86 - 93
      Abstract: Simultaneous wireless information and power transfer (SWIPT) is a promising solution to increase the lifetime of wireless nodes and hence alleviate the energy bottleneck of energy constrained wireless networks. As an alternative to conventional energy harvesting techniques, SWIPT relies on the use of radio frequency signals, and is expected to bring some fundamental changes to the design of wireless communication networks. This article focuses on the application of advanced smart antenna technologies to SWIPT, including multiple-input multiple-output and relaying techniques. These smart antenna technologies have the potential to significantly improve the energy efficiency and also the spectral efficiency of SWIPT. Different network topologies with single and multiple users are investigated, along with some promising solutions to achieve a favorable trade-off between system performance and complexity. A detailed discussion of future research challenges for the design of SWIPT systems is also provided.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • RF-powered cognitive radio networks: technical challenges and limitations
    • Authors: Mohjazi; L.;Dianati, M.;Karagiannidis, G.K.;Muhaidat, S.;Al-Qutayri, M.;
      Pages: 94 - 100
      Abstract: The increasing demand for spectral- and energy-efficient communication networks has spurred great interest in energy harvesting cognitive radio networks. Such a revolutionary technology represents a paradigm shift in the development of wireless networks, as it can simultaneously enable the efficient use of the available spectrum and the exploitation of RF energy in order to reduce reliance on traditional energy sources. This is mainly triggered by the recent advancements in microelectronics that puts forward RF energy harvesting as a plausible technique in the near future. On the other hand, it has been suggested that the operation of a network relying on harvested energy needs to be redesigned to allow the network to reliably function in the long term. To this end, the aim of this survey article is to provide a comprehensive overview of recent development and the challenges regarding the operation of CRNs powered by RF energy. In addition, the potential open issues that might be considered for future research are also discussed in this article.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Provisioning quality-of-service to energy harvesting wireless
           communications
    • Authors: Chen; X.;Ni, W.;Wang, X.;Sun, Y.;
      Pages: 102 - 109
      Abstract: Energy harvesting (EH) is an innovative way to build long-term and self-sustainable wireless networks. However, an inconstant EH rate may have an adverse effect on the quality-of-service (QoS) of wireless traffic, such as packet delay and error. In this article we discuss techniques that provide QoS to EH powered wireless communications. A new "dynamic string tautening" method is presented to produce the most energy efficient schedule with substantially lower complexity, compared to convex optimization techniques. The method adapts to the bursty arrivals of wireless traffic and harvested energy, and ensures that delay-sensitive data will be delivered by deadline. Comprehensive designs of EH powered transmitters are also discussed, where the EH rate, battery capacity, and deadline requirement can be jointly adjusted to leverage QoS and the cost.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Increasing sustainability and resiliency of cellular network
           infrastructure by harvesting renewable energy
    • Authors: Kwasinski; A.;Kwasinski, A.;
      Pages: 110 - 116
      Abstract: The carbon footprint of cellular base stations is a source of concern not only because of their power consumption, which accounts for more than half of all of the cellular infrastructure, but also because of the large rate of growth in their deployment. This article discusses how the use of harvested renewable energy can contribute to solving this problem. The article also addresses the challenges associated with harvesting wind and solar energy, namely the variability in available energy and the large physical footprint of energy harvesters. This article explains that these challenges can be better addressed by jointly considering the harvested energy availability and the dynamic characteristics of base station power consumption. A realization of this approach is the recently introduced idea of a "sustainable wireless area" that integrates energy harvesters and a group of base stations in a microgrid architecture. This architecture enables an integrated harvested energy-cellular traffic management technique that shapes the traffic serviced by a base station based on the predicted availability of renewable energy. As a result, longer periods of operation powered from renewable energy are achieved while degradation of the users??? qualityof- experience (QoE) is minimal and occasional. This article also explains how harvested renewable energy also increases the resiliency of cellular networks because they do not depend on lifelines for operation.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Wireless powered communication: opportunities and challenges
    • Authors: Bi; S.;Ho, C.K.;Zhang, R.;
      Pages: 117 - 125
      Abstract: The performance of wireless communication is fundamentally constrained by the limited battery life of wireless devices, the operations of which are frequently disrupted due to the need of manual battery replacement/recharging. The recent advance in RF-enabled wireless energy transfer (WET) technology provides an attractive solution named wireless powered communication (WPC), where the wireless devices are powered by dedicated wireless power transmitters to provide continuous and stable microwave energy over the air. As a key enabling technology for truly perpetual communications, WPC opens up the potential to build a network with larger throughput, higher robustness, and increased flexibility compared to its battery-powered counterpart. However, the combination of wireless energy and information transmissions also raises many new research problems and implementation issues that need to be addressed. In this article, we provide an overview of stateof- the-art RF-enabled WET technologies and their applications to wireless communications, highlighting the key design challenges, solutions, and opportunities ahead.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Fundamental limits of energy harvesting communications
    • Authors: Ozel; O.;Tutuncuoglu, K.;Ulukus, S.;Yener, A.;
      Pages: 126 - 132
      Abstract: Wireless networks composed of energy harvesting devices will introduce several transformative changes in wireless networking as we know it: energy self-sufficient, energy self-sustaining, perpetual operation; reduced use of conventional energy and accompanying carbon footprint; untethered mobility; and an ability to deploy wireless networks in hard-to-reach places such as remote rural areas, within structures, and within the human body. Energy harvesting brings new dimensions to the wireless communication problem in the form of intermittency and randomness of available energy, which necessitates a fresh look at wireless communication protocols at the physical, medium access, and networking layers. Scheduling and optimization aspects of energy harvesting communications in the medium access and networking layers have been relatively wellunderstood and surveyed in the recent paper [1]. This branch of literature takes a physical layer rate-power relationship that is valid in energy harvesting conditions under large-enough batteries and long-enough durations between energy harvests so that information-theoretic asymptotes are achieved, and optimizes the transmit power over time in order to maximize the throughput. Another branch of recent literature aims to understand the fundamental capacity limits, i.e. information-theoretic capacities, of energy harvesting links under smaller scale dynamics, considering energy harvests at the channel use level. This branch necessitates a deeper look at the coding and transmission schemes in the physical layer, and ultimately aims to develop an information theory of energy harvesting communications, akin to Shannon's development of an information theory for average power constrained communications. In this introductory article, we survey recent results in this branch and point to open problems that could be of interest to a broad set of researchers in the fields of communication theory, information theory, signal processing, and netw- rking. In particular, we review capacities of energy harvesting links with infinite-sized, finitesized, and no batteries at the transmitter.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Enhancing wireless information and power transfer by exploiting
           multi-antenna techniques
    • Authors: Xiaoming Chen;Zhaoyang Zhang;Hsiao-Hwa Chen;Huazi Zhang;
      Pages: 133 - 141
      Abstract: This article reviews an emerging wireless information and power transfer (WIPT) technique with an emphasis on its performance enhancement employing multi-antenna techniques. Compared to traditional wireless information transmission, WIPT faces numerous challenges. First, it is more susceptible to channel fading and path loss, resulting in a much shorter power transfer distance. Second, it gives rise to the issue of how to balance spectral efficiency for information transmission and energy efficiency for power transfer in order to obtain an optimal tradeoff. Third, there exists a security issue for information transmission in order to improve power transfer efficiency. In this context, multi-antenna techniques, e.g. energy beamforming, are introduced to solve these problems by exploiting spatial degree of freedom. This article provides a tutorial on various aspects of multi-antenna based WIPT techniques, with a focus on tackling the challenges by parameter optimization and protocol design. In particular, we investigate the WIPT tradeoffs based on two typical multi-antenna techniques: the limited feedback multi-antenna technique for short-distance transfer; and the large-scale multiple-input multiple-output (LS-MIMO, also known as massive MIMO) technique for long-distance transfer. Finally, simulation results validate the effectiveness of the proposed schemes.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • GreenDelivery: proactive content caching and push with
           energy-harvesting-based small cells
    • Authors: Zhou; S.;Gong, J.;Zhou, Z.;Chen, W.;Niu, Z.;
      Pages: 142 - 149
      Abstract: The explosive growth of mobile multimedia traffic calls for scalable wireless access with high quality of service and low energy cost. Motivated by the emerging energy harvesting communications, and the trend of caching multimedia contents at the access edge and user terminals, we propose a paradigm shifting framework, GreenDelivery, enabling efficient content delivery with energy harvesting based small cells. To resolve the two-dimensional randomness of energy harvesting and content request arrivals, proactive caching and push are jointly optimized, with respect to the content popularity distribution and battery states. We thus develop a novel way of understanding the interplay between content and energy over time and space. Case studies are provided to show the substantial reduction of macro BS activities, and thus the related energy consumption from the power grid is reduced. Research issues of the proposed GreenDelivery framework are also discussed.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Network and service virtualization: Part 2 [Guest Editorial]
    • Authors: Pentikousis; K.;Meirosu, C.;Lopez, D.R.;Denazis, S.;Shiomoto, K.;Westphal, F.-J.;
      Pages: 150 - 151
      Abstract: The second installment of the Feature Topic on network and service virtualization takes off from where Part I concluded: network function virtualization (NFV) deployment and operation. We are currently observing a transition from software-defined networking (SDN) focusing solely on programming packet-switching network elements based on lower-layer flow-oriented primitives toward the wider concept of infrastructure programmability. Such programmability extends vertically within the network stack to encompass optical layer capabilities as well as features located at upper layers of the traditional network stack. In addition, infrastructure programmability extends horizontally well beyond SDN to other resource stacks to encompass virtualized compute and storage resources.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Optical service chaining for network function virtualization
    • Authors: Xia; M.;Shirazipour, M.;Zhang, Y.;Green, H.;Takacs, A.;
      Pages: 152 - 158
      Abstract: This article presents an efficient optical service chaining architecture for network function virtualization in data centers. Service chaining (i.e., steering traffic through a sequence of network functions) is one emerging application of software-defined networking. However, existing schemes steer traffic solely in the packet domain, which is well suited for fine-grained (e.g., peruser level) flows carrying a relatively small volume of traffic. This article discusses how packet-based schemes do not yield sufficient efficiency for large/aggregated flows steered through high-capacity core network functions. It introduces an optical steering domain into the operator's data centers for NFV service chaining at a coarse-grained traffic level using wavelength switching. Performance evaluation shows that the optical steering domain can achieve significant power savings compared to using packet technologies as flow rates and the number of vNFs per service chain grow.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • A service-oriented hybrid access network and clouds architecture
    • Authors: Velasco; L.;Contreras, L.M.;Ferraris, G.;Stavdas, A.;Cugini, F.;Wiegand, M.;Fernandez-Palacios, J.P.;
      Pages: 159 - 165
      Abstract: Many telecom operators are deploying their own cloud infrastructure with the two-fold objective of providing cloud services to their customers and enabling network function virtualization. In this article we present an architecture we call SHINE, which focuses on orchestrating cloud with heterogeneous access and core networks. In this architecture intra and inter DC connectivity is dynamically controlled, maximizing the overall performance in terms of throughput and latency while minimizing total costs. The main building blocks are: a future-proof network architecture that can scale to offer potentially unlimited bandwidth based on an active remote node (ARN) to interface end-users and the core network; an innovative distributed DC architecture consisting of micro-DCs placed in selected core locations to accelerate content delivery, reducing core network traffic, and ensuring very low latency; and dynamic orchestration of the distributed DC and access and core network segments. SHINE will provide unprecedented quality of experience, greatly reducing costs by coordinating network and cloud and facilitating service chaining by virtualizing network functions.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • A service-aware virtualized software-defined infrastructure
    • Authors: Mamatas; L.;Clayman, S.;Galis, A.;
      Pages: 166 - 174
      Abstract: The Internet infrastructure is gradually improving its flexibility and adaptability due to the incorporation of new promising technologies, such as the software-defined networks and the network function virtualization. The main goal is to meet the diverse communication needs of the users, while the global system operation satisfies the business and societal goals of the infrastructure and service providers. This calls for solutions that consider both local and global network viewpoints and provide sophisticated system control in a stable and predictable way, while being service-aware. We propose a fully integrated solution along these lines: the VLSP, a service-aware softwaredefined infrastructure for networks and clouds. The VLSP consists of three main distributed systems: a facility performing uniformly logicallycentralized management and control of the infrastructure, called the virtual infrastructure management; an information management infrastructure able to maintain an accurate view of the infrastructure environment at both the local and system levels, called the virtual infrastructure information service; and a lightweight virtualization hypervisor able to perform configuration changes in the infrastructure resources, called the lightweight network hypervisor. We discuss representative use-case scenarios, while we demonstrate how VLSP tunes performance trade-offs for particular service demands.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Virtualized security at the network edge: a user-centric approach
    • Authors: Montero; D.;Yannuzzi, M.;Shaw, A.;Jacquin, L.;Pastor, A.;Serral-Gracia, R.;Lioy, A.;Risso, F.;Basile, C.;Sassu, R.;Nemirovsky, M.;Ciaccia, F.;Georgiades, M.;Charalambides, S.;Kuusijarvi, J.;Bosco, F.;
      Pages: 176 - 186
      Abstract: The current device-centric protection model against security threats has serious limitations. On one hand, the proliferation of user terminals such as smartphones, tablets, notebooks, smart TVs, game consoles, and desktop computers makes it extremely difficult to achieve the same level of protection regardless of the device used. On the other hand, when various users share devices (e.g., parents and kids using the same devices at home), the setup of distinct security profiles, policies, and protection rules for the different users of a terminal is far from trivial. In light of this, this article advocates for a paradigm shift in user protection. In our model, protection is decoupled from users' terminals, and it is provided by the access network through a trusted virtual domain. Each trusted virtual domain provides unified and homogeneous security for a single user irrespective of the terminal employed. We describe a user-centric model where nontechnically savvy users can define their own profiles and protection rules in an intuitive way. We show that our model can harness the virtualization power offered by next-generation access networks, especially from network functions virtualization in the points of presence at the edge of telecom operators. We also analyze the distinctive features of our model, and the challenges faced based on the experience gained in the development of a proof of concept.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Toward an SDN-enabled NFV architecture
    • Authors: Matias; J.;Garay, J.;Toledo, N.;Unzilla, J.;Jacob, E.;
      Pages: 187 - 193
      Abstract: This article presents the progressive evolution of NFV from the initial SDN-agnostic initiative to a fully SDN-enabled NFV solution, where SDN is not only used as infrastructure support but also influences how virtual network functions (VNFs) are designed. In the latest approach, when possible, stateless processing in the VNF shifts from the computing element to the networking element. To support these claims, the article presents the implementation of a flowbased network access control solution, with an SDN-enabled VNF built on IEEE 802.1x, which establishes services as sets of flow definitions that are authorized as the result of an end user authentication process. Enforcing the access to the network is done at the network element, while the authentication and authorization state is maintained at the compute element. The application of this proposal allows the performance to be enhanced, while traffic in the control channel is reduced to a minimum. The SDN-enabled NFV approach sets the foundation to increase the areas of application of NFV, in particular in those areas where massive stateless processing of packets is expected.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Integrated circuits for communications [Series Editorial]
    • Authors: Chien; C.;Xu, Z.;
      Pages: 194 - 195
      Abstract: In this issue of Topics in Integrated Circuits for Communications, we have selected three papers that mark recent progress in the communications semiconductor industry which is enabling emerging short-range millimeter-wave (mmWave) communications and power-efficient transmissions.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • W-band scalable phased arrays for imaging and communications
    • Authors: Gu; X.;Valdes-Garcia, A.;Natarajan, A.;Sadhu, B.;Liu, D.;Reynolds, S.K.;
      Pages: 196 - 204
      Abstract: This article discusses the benefits and challenges associated with the design of multi-function scalable phased arrays at millimeter wave frequencies. First, applications for phased arrays with tens to hundreds of elements are discussed. Existing solutions for scaling silicon-based phased arrays from microwave to terahertz frequencies are reviewed. The challenges and tradeoffs associated with multiple integration options for W-band phased arrays are analyzed, with special consideration given to packaging and antenna performance. Finally, a solution based on SiGe ICs and organic packages for a 64-element dual-polarized 94 GHz phased array is described, along with associated measurement results.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • THz interconnect: the last centimeter communication
    • Authors: Gu; Q.J.;
      Pages: 206 - 215
      Abstract: Terahertz, sandwiched between conventional microwave and optical frequencies, has inspired increasing interest due to its uniqueness and high potential applications, such as imaging, sensing, and communications. This article, on the other hand, focuses on one emerging application of the terahertz spectrum: THz interconnect. Intra-/inter-chip communication has doubled every two years over recent decades, and the trend is projected to continue in the future. However, the bandwidth supportable by chip I/O pins cannot keep up with the requirement, which forms the increasing gap between the bandwidth requirement and support capability, or the interconnect gap. To ultimately solve the problem and close the gap, both bandwidth density and energy efficiency should be boosted. THz interconnect holds high potential to boost key performance by leveraging the advantages of both high-speed electronics devices and low-loss quasi-optical channels. This article discusses THz interconnect from different aspects: system architecture, circuit specifications, design challenges, and non-ideality effects. Particularly, this article exemplifies both active and passive circuit design techniques for THz interconnect, a 140 GHz transceiver and a terahertz generator in 65 nm CMOS technology, and a low-loss and process- compatible silicon waveguide channel. THz interconnect opens high potential new revenue to solve the long-standing interconnect issue.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Outphasing transmitters, enabling digital-like amplifier operation with
           high efficiency and spectral purity
    • Authors: de Vreede; L.C.N.;Acar, M.;Calvillo-Cortes, D.A.;van der Heijden, M.P.;Wesson, R.;de Langen, M.;Qureshi, J.;
      Pages: 216 - 225
      Abstract: An overview of outphasing transmitters is given. Starting from its basic principles, we discuss its advantages and drawbacks compared to other high-efficiency amplifier configurations. Next, innovations in outphasing architecture, design, and implementation are given that overcome the difficulties related to the traditional outphasing configuration. Using the latest insights in drive schemes for input signals and quasi load-insensitive class-E output matching, very compact high-power high-performance digital- like transmitters are enabled that offer high efficiency and high spectral purity while being reconfigurable in their operating frequency.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Design and Implementation [Series Editorial]
    • Authors: Gurbani; V.K.;Loreto, S.;Subrahmanyan, R.;
      Pages: 226 - 226
      Abstract: This issue presents two papers related to different aspects of application servers in communication networks. Traditional communication system hardware and software architectures were based on resource intensive implementations that separated the control and data planes, and were built using special-purpose ASICs and hardware platforms, and proprietary operating systems. The ongoing miniaturization of communication systems, driven particularly by the demands placed by the explosion of wireless mobile data, requires new paradigms to reduce cost, size, and power while increasing capacity and scalability.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Design strategies for the application server architecture/configuration
           (and its functions) in next-generation communication systems
    • Authors: Khawer; M.R.;
      Pages: 227 - 233
      Abstract: The market trend for next-generation communication systems has been toward miniaturization to meet the stunning ever increasing demand for wireless mobile data, leading to the need for distributed and parallel processing system configurations that are 10 times or more cost effective, flexible, high capacity, energy efficient, and scalable. Reducing cost and size while increasing capacity and scalability requires several design paradigm shifts. This article presents design strategies to meet these goals.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • UMPIRE: a universal moderator for the participation in IETF remote events
    • Authors: Romano; S.P.;
      Pages: 234 - 239
      Abstract: UMPIRE provides seamless meeting interaction among remote and local participants. It uses the BFCP, an IETF standard for moderation. BFCP introduces automated floor control functions to a centralized conferencing environment. This article discusses the design and implementation of the UMPIRE system and highlights the most notable solutions we devised to handle variegated requirements and constraints. We also discuss the lessons learned while experiencing in the first person how the application of research results that have eventually led to new standards still must confront a number of minor yet concrete issues that might completely undermine the overall process of wide adoption by the community.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
  • Advertisers' index
    • Pages: 240 - 240
      Abstract: Presents the index of advertisers in this issue of the publication.
      PubDate: April 2015
      Issue No: Vol. 53, No. 4 (2015)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2015