for Journals by Title or ISSN
for Articles by Keywords
help

Publisher: Institute of Electrical and Electronics Engineers (IEEE)   (Total: 176 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 | Last

Aerospace and Electronic Systems, IEEE Transactions on     Hybrid Journal   (Followers: 79, SJR: 1.337, h-index: 85)
Affective Computing, IEEE Transactions on     Hybrid Journal   (Followers: 9, SJR: 1.824, h-index: 16)
Autonomous Mental Development, IEEE Transactions on     Hybrid Journal   (Followers: 5)
Bell Labs Technical J.     Hybrid Journal   (Followers: 9, SJR: 0.411, h-index: 26)
Biomedical Engineering, IEEE Reviews in     Full-text available via subscription   (Followers: 16, SJR: 1.462, h-index: 14)
Biomedical Engineering, IEEE Transactions on     Hybrid Journal   (Followers: 14, SJR: 1.184, h-index: 118)
Broadcasting, IEEE Transactions on     Hybrid Journal   (Followers: 5, SJR: 1.314, h-index: 53)
Canadian J. of Electrical and Computer Engineering     Full-text available via subscription   (Followers: 7, SJR: 0.119, h-index: 14)
China Communications     Full-text available via subscription   (Followers: 4, SJR: 0.189, h-index: 6)
Communications and Networks, J. of     Hybrid Journal   (Followers: 4, SJR: 0.364, h-index: 23)
Components, Packaging and Manufacturing Technology, IEEE Transactions on     Hybrid Journal   (Followers: 13, SJR: 0.638, h-index: 14)
Computational Intelligence and AI in Games, IEEE Transactions on     Hybrid Journal   (Followers: 9)
Computer     Full-text available via subscription   (Followers: 38, SJR: 0.717, h-index: 112)
Computing in Science & Engineering     Full-text available via subscription   (Followers: 13, SJR: 0.579, h-index: 40)
Control Systems     Hybrid Journal   (Followers: 24, SJR: 0.83, h-index: 75)
Embedded Systems Letters, IEEE     Hybrid Journal   (Followers: 23)
Emerging and Selected Topics in Circuits and Systems     Hybrid Journal   (Followers: 4, SJR: 0.63, h-index: 8)
Geoscience and Remote Sensing, IEEE Transactions on     Hybrid Journal   (Followers: 21, SJR: 2.458, h-index: 139)
Haptics, IEEE Transactions on     Hybrid Journal   (Followers: 3, SJR: 0.808, h-index: 19)
IEEE Access     Open Access   (Followers: 6)
IEEE Aerospace and Electronic Systems Magazine     Full-text available via subscription   (Followers: 45, SJR: 0.402, h-index: 35)
IEEE Annals of the History of Computing     Full-text available via subscription   (Followers: 12, SJR: 0.134, h-index: 13)
IEEE Antennas and Propagation Magazine     Hybrid Journal   (Followers: 15, SJR: 0.757, h-index: 57)
IEEE Antennas and Wireless Propagation Letters     Hybrid Journal   (Followers: 13, SJR: 1.499, h-index: 54)
IEEE Circuits and Systems Magazine     Full-text available via subscription   (Followers: 28, SJR: 0.737, h-index: 32)
IEEE Communications Letters     Hybrid Journal   (Followers: 17, SJR: 1.19, h-index: 96)
IEEE Communications Magazine     Full-text available via subscription   (Followers: 26, SJR: 3.196, h-index: 144)
IEEE Communications Surveys & Tutorials     Hybrid Journal   (Followers: 10, SJR: 3.561, h-index: 52)
IEEE Computational Intelligence Magazine     Full-text available via subscription   (Followers: 12, SJR: 2.066, h-index: 26)
IEEE Computer Architecture Letters     Hybrid Journal   (Followers: 18, SJR: 0.871, h-index: 14)
IEEE Computer Graphics and Applications     Full-text available via subscription   (Followers: 12, SJR: 0.501, h-index: 62)
IEEE Consumer Electronics Magazine     Full-text available via subscription   (Followers: 17)
IEEE Control Systems Magazine     Full-text available via subscription   (Followers: 31)
IEEE Design & Test     Full-text available via subscription   (Followers: 15)
IEEE Distributed Systems Online     Full-text available via subscription   (Followers: 5)
IEEE Electrical Insulation Magazine     Full-text available via subscription   (Followers: 9, SJR: 0.577, h-index: 41)
IEEE Electromagnetic Compatibility Magazine     Full-text available via subscription   (Followers: 5)
IEEE Electron Device Letters     Full-text available via subscription   (Followers: 5, SJR: 2.191, h-index: 105)
IEEE Engineering in Medicine and Biology Magazine     Full-text available via subscription   (Followers: 5)
IEEE Engineering Management Review     Full-text available via subscription   (Followers: 11, SJR: 0.11, h-index: 9)
IEEE Geoscience and Remote Sensing Letters     Hybrid Journal   (Followers: 17, SJR: 1.481, h-index: 46)
IEEE Industrial Electronics Magazine     Full-text available via subscription   (Followers: 18, SJR: 2.105, h-index: 27)
IEEE Industry Applications Magazine     Full-text available via subscription   (Followers: 5, SJR: 0.67, h-index: 36)
IEEE Instrumentation & Measurement Magazine     Full-text available via subscription   (Followers: 19, SJR: 0.245, h-index: 26)
IEEE Intelligent Systems     Full-text available via subscription   (Followers: 24, SJR: 0.941, h-index: 79)
IEEE Internet Computing     Full-text available via subscription   (Followers: 12, SJR: 1.044, h-index: 79)
IEEE J. of Biomedical and Health Informatics     Hybrid Journal   (Followers: 8, SJR: 1.157, h-index: 61)
IEEE J. of Emerging and Selected Topics in Power Electronics     Hybrid Journal   (Followers: 12)
IEEE J. of Oceanic Engineering     Hybrid Journal   (Followers: 6, SJR: 0.687, h-index: 63)
IEEE J. of Quantum Electronics     Hybrid Journal   (Followers: 16, SJR: 1.594, h-index: 98)
IEEE J. of Selected Topics in Quantum Electronics     Hybrid Journal   (Followers: 6, SJR: 2.588, h-index: 114)
IEEE J. of Selected Topics in Signal Processing     Hybrid Journal   (Followers: 16, SJR: 2.705, h-index: 45)
IEEE J. of Solid-State Circuits     Full-text available via subscription   (Followers: 16, SJR: 3.574, h-index: 144)
IEEE J. of the Electron Devices Society     Open Access   (Followers: 3)
IEEE J. of Translational Engineering in Health and Medicine     Open Access   (Followers: 2)
IEEE J. on Selected Areas in Communications     Hybrid Journal   (Followers: 6, SJR: 3.335, h-index: 165)
IEEE Latin America Transactions     Full-text available via subscription   (Followers: 2, SJR: 0.162, h-index: 7)
IEEE Micro     Full-text available via subscription   (Followers: 5, SJR: 1.506, h-index: 67)
IEEE Microwave and Wireless Components Letters     Hybrid Journal   (Followers: 7, SJR: 1.915, h-index: 87)
IEEE Microwave Magazine     Full-text available via subscription   (Followers: 12, SJR: 0.59, h-index: 41)
IEEE Multimedia     Full-text available via subscription   (Followers: 8, SJR: 0.639, h-index: 47)
IEEE Network     Full-text available via subscription   (Followers: 16, SJR: 1.796, h-index: 80)
IEEE Pervasive Computing     Full-text available via subscription   (Followers: 11, SJR: 0.923, h-index: 69)
IEEE Photonics Technology Letters     Hybrid Journal   (Followers: 4, SJR: 1.805, h-index: 111)
IEEE Potentials     Full-text available via subscription   (Followers: 2, SJR: 0.153, h-index: 18)
IEEE Power and Energy     Full-text available via subscription   (Followers: 12, SJR: 1.671, h-index: 45)
IEEE Power Electronics Magazine     Full-text available via subscription   (Followers: 6)
IEEE Revista Iberoamericana de Tecnologias del Aprendizaje     Hybrid Journal   (Followers: 1, SJR: 0.1, h-index: 3)
IEEE Robotics & Automation Magazine     Full-text available via subscription   (Followers: 21, SJR: 1.09, h-index: 51)
IEEE Security & Privacy Magazine     Full-text available via subscription   (Followers: 17, SJR: 0.588, h-index: 44)
IEEE Sensors J.     Hybrid Journal   (Followers: 52, SJR: 0.733, h-index: 56)
IEEE Signal Processing Letters     Hybrid Journal   (Followers: 16, SJR: 1.016, h-index: 82)
IEEE Signal Processing Magazine     Full-text available via subscription   (Followers: 36, SJR: 1.831, h-index: 106)
IEEE Software     Full-text available via subscription   (Followers: 39, SJR: 0.842, h-index: 72)
IEEE Spectrum     Full-text available via subscription   (Followers: 44, SJR: 0.191, h-index: 48)
IEEE Systems J.     Hybrid Journal   (Followers: 8, SJR: 1.034, h-index: 17)
IEEE Technology and Society Magazine     Full-text available via subscription   (Followers: 4, SJR: 0.348, h-index: 17)
IEEE Transactions on Advanced Packaging     Full-text available via subscription   (Followers: 5, SJR: 0.598, h-index: 52)
IEEE Transactions on Antennas and Propagation     Full-text available via subscription   (Followers: 10, SJR: 1.837, h-index: 118)
IEEE Transactions on Applied Superconductivity     Hybrid Journal   (Followers: 1, SJR: 0.46, h-index: 54)
IEEE Transactions on Audio, Speech, and Language Processing     Hybrid Journal   (Followers: 12)
IEEE Transactions on Automatic Control     Hybrid Journal   (Followers: 26, SJR: 2.992, h-index: 175)
IEEE Transactions on Automation Science and Engineering     Full-text available via subscription   (Followers: 10, SJR: 1.287, h-index: 35)
IEEE Transactions on Biomedical Circuits and Systems     Hybrid Journal   (Followers: 5, SJR: 1.876, h-index: 29)
IEEE Transactions on Circuits and Systems for Video Technology     Hybrid Journal   (Followers: 6, SJR: 1.47, h-index: 124)
IEEE Transactions on Circuits and Systems I: Regular Papers     Hybrid Journal   (Followers: 11, SJR: 1.406, h-index: 68)
IEEE Transactions on Circuits and Systems II: Express Briefs     Hybrid Journal   (Followers: 10, SJR: 0.932, h-index: 53)
IEEE Transactions on Cloud Computing     Hybrid Journal   (Followers: 7)
IEEE Transactions on Communications     Hybrid Journal   (Followers: 10, SJR: 2.035, h-index: 150)
IEEE Transactions on Components and Packaging Technologies     Full-text available via subscription   (Followers: 9, SJR: 0.71, h-index: 50)
IEEE Transactions on Computational Social Systems     Full-text available via subscription  
IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems     Hybrid Journal   (Followers: 6, SJR: 0.77, h-index: 83)
IEEE Transactions on Computers     Hybrid Journal   (Followers: 19, SJR: 0.768, h-index: 81)
IEEE Transactions on Consumer Electronics     Hybrid Journal   (Followers: 17, SJR: 0.731, h-index: 69)
IEEE Transactions on Control of Network Systems     Hybrid Journal  
IEEE Transactions on Control Systems Technology     Hybrid Journal   (Followers: 23, SJR: 1.543, h-index: 87)
IEEE Transactions on Cybernetics     Hybrid Journal   (Followers: 7)
IEEE Transactions on Dependable and Secure Computing     Hybrid Journal   (Followers: 11, SJR: 0.866, h-index: 36)
IEEE Transactions on Device and Materials Reliability     Hybrid Journal   (Followers: 14, SJR: 0.785, h-index: 45)
IEEE Transactions on Dielectrics and Electrical Insulation     Hybrid Journal   (Followers: 5, SJR: 0.635, h-index: 71)

        1 2 | Last

Journal Cover   IEEE Communications Magazine
  [SJR: 3.196]   [H-I: 144]   [26 followers]  Follow
    
   Full-text available via subscription Subscription journal
   ISSN (Print) 0163-6804
   Published by Institute of Electrical and Electronics Engineers (IEEE) Homepage  [176 journals]
  • Communications Standards: A Supplement to IEEE Communications Magazine -
           cover
    • Abstract: Presents the front cover to the supplemental issue of this publication.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • IEEE Communications Magazine - cover
    • Abstract: Presents the front cover for this issue of the publication.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Supplement table of contents
    • Pages: 1 - 1
      Abstract: Presents the table of contents to the supplemental issue of this publication.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Global Communications Newsletter
    • Authors: Bregni; S.;
      Pages: 1 - 4
      Abstract: Including: (1) IEEE ComSoc Iraq Chapter Activities Continue Despite the Severity of the Situation Inside Iraq (2) Effectiveness of ComSoc DLT Program and Workshops in New Zealand (3) Tutorial Sessions on Quantum and Optical Wireless Communications and Exhibition at IEEE TENCON 2014, Bangkok, Thailand
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Research and standards [Editor's Note]
    • Authors: Parsons; G.;
      Pages: 2 - 2
      Abstract: The importance of standards to the work and careers of communications practitioners is the basis of this publication. It is a platform for presenting and discussing standards-related topics in the areas of communications, networking, research, and related disciplines.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Table of contents
    • Pages: 2 - 4
      Abstract: Presents the table of contents for this issue of the publication.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Commentary
    • Authors: Kraemer; B.;Kolkman, O.;Weiler, D.;
      Pages: 4 - 5
      Abstract: Includes: (1) Brief notes on the evolution of the practice of standards (2) Collaborative security: internet security, the internet way (3) ETSI???s vision of a connected world
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Standards news
    • Pages: 6 - 8
      Abstract: Presents summaries of new communications standards.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • The Green ICT initiative: An IEEE-wide focus building upon ComSoc's
           leadership [The President's Page]
    • Authors: Benedetto; S.;Lee, B.G.;
      Pages: 6 - 8
      Abstract: This month's President's Page is devoted to the IEEE Green Information and Communications Technology (ICT) initiative. By its very nature, Green ICT is a theme, not only of interest but also offering numerous opportunities, for virtually every IEEE Society and Council. Through this initiative, ComSoc seeks an IEEE-wide outreach to achieve even greater recognition for IEEE's mission of advancing technology for humanity.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Conference calendar
    • Pages: 9 - 10
      Abstract: Presents upcoming conference events pertaining to the Communications Society.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • International Telecommunication Union — 150 years of history:
           adaptation to change and the opportunity for reform
    • Authors: Schuster; D.B.;
      Pages: 10 - 15
      Abstract: Through its history the International Telecommunication Union (ITU) has witnessed great inventions and has played an active role in the technology development that has been shaping the world of telecommunications. The ITU milestones are numerous. One of them is of particular importance because it symbolizes better than any other the need for harmonious worldwide development and desire for universal cooperation. It was established at the Atlantic City conference in 1947 when the entry of ITU into the United Nations (UN) family as a Specialized Agency for Telecommunications was decided. By the end of the 1980s the technology evolution and fresh regulatory dynamism announced global changes in the national and international telecommunication environment and consequently in the role of the ITU Constituencies. For different reasons, the Union has not adapted itself with sufficient speed to these processes and over the years the technical spirit of the Atlantic City conference has been weakening and political debates have been installed instead. Performance of the ITU mission has been suffering due to its increasingly weaker leadership and inefficient governing bodies. The most recent ITU Plenipotentiary Conference, held in Busan in 2014, was facing the challenge to address the need for reforms in order to ensure the sustainability of the Union into the future and reinforce its status as an advocate of global technical excellence. Unfortunately, the need for reform was not specifically recognized and reflected in the Objectives enunciated in the Strategic Plan for the Union for the period 2016-2019, and any reorganization of the structure and functioning of the Union, currently recognized as being archaic and conservative, was left in abeyance. The analysis made and the conclusions reached in this paper may assist future high-level discussions on the subject matter and may facilitate an early promotion of the ITU Reform Policies. The reform guidelines offered herein may a- so further reinforce the views of those Member States that are sincerely concerned and interested in creating a new paradigm for a better future of their Union.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Wireless physical layer security: Part 1 [Guest Editorial]
    • Authors: Saad; W.;Zhou, X.;Debbah, M.;Poor, H.V.;
      Pages: 15 - 15
      Abstract: The ongoing paradigm shift from classical centralized wireless technologies toward distributed large-scale networks such as the Internet of Things has introduced new security challenges that cannot be fully handled via traditional cryptgraphic means. In such emerging wireless environments, devices have limited capabilities and are not controlled by a central control center; thus, the implementation of computationally expensive cryptographic techniques can be challenging. Motivated by these considerations, substantial recent research has been investigating the use of the physical layer as a means to develop low-complexity and effective wireless security mechanisms. Such techniques are grouped under the umbrella of physical layer security. These techniques range from information-theoretic security, which exploits channel advantages to thwart eavesdropping, to physical layer fingerprinting techniques that exploit physical layer features for device identification. In this context, providing state-of-the-art tutorials on the various approaches to physical layer security is of considerable interest. This Feature Topic gathers together such tutorial-style and overview articles that provide an in-depth overview of the broad spectrum of security opportunities brought forward by physical layer security.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Research & standards: advanced cloud & virtualization techniques for 5G
           networks [Guest Editorial]
    • Authors: Zheng; K.;Taleb, T.;Ksentini, A.;I, C.-L.;Magedanz, T.;Ulema, M.;
      Pages: 16 - 17
      Abstract: The evolution of mobile network architecture is an essential part in the development process of the fifth generation (5G) of cellular mobile systems, and that is through the incorporation of advanced cloud technologies and network function virtualization techniques. The new network architecture needs to support a wide range of high data rate applications and services, offering capacities of up to multiple gigabits per second, yet meeting extremely stringent latency and reliability requirements under a diverse variety of scenarios. Thus the automation of network control and overall system management to achieve such an ambitious set of performance targets became crucial. Significant global effort for the necessary new technologies has been initiated.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • The challenges facing physical layer security
    • Authors: Trappe; W.;
      Pages: 16 - 20
      Abstract: There has recently been significant interest in applying the principles of information-theoretical security and signal processing to secure physical layer systems. Although the community has made progress in understanding how the physical layer can support confidentiality and authentication, it is important to realize that there are many important issues that must be addressed if physical layer security is ever to be adopted by real and practical security systems. In this article, I briefly review several different flavors of physical layer security (at least for wireless systems), and then identify aspects (a.k.a. weaknesses) where the foundation for physical layer security needs to be strengthened. I then highlight that the opportunities for applying physical layer security to real systems will be quite rich if the community can overcome these challenges. In the course of the article, I note new directions for the community to investigate, with the objective of keeping physical layer security research targeted at having a practical impact on real systems.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • On the computation offloading at ad hoc cloudlet: architecture and service
           modes
    • Authors: Min Chen;Yixue Hao;Yong Li;Chin-Feng Lai;Di Wu;
      Pages: 18 - 24
      Abstract: As mobile devices are equipped with more memory and computational capability, a novel peer-to-peer communication model for mobile cloud computing is proposed to interconnect nearby mobile devices through various short range radio communication technologies to form mobile cloudlets, where every mobile device works as either a computational service provider or a client of a service requester. Though this kind of computation offloading benefits compute-intensive applications, the corresponding service models and analytics tools are remaining open issues. In this paper we categorize computation offloading into three modes: remote cloud service mode, connected ad hoc cloudlet service mode, and opportunistic ad hoc cloudlet service mode. We also conduct a detailed analytic study for the proposed three modes of computation offloading at ad hoc cloudlet.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Physical layer security for massive MIMO: An overview on passive
           eavesdropping and active attacks
    • Authors: Kapetanovic; D.;Gan Zheng;Rusek, F.;
      Pages: 21 - 27
      Abstract: This article discusses opportunities and challenges of physical layer security integration in MaMIMO systems. Specifically, we first show that MaMIMO itself is robust against passive eavesdropping attacks. We then review a pilot contamination scheme that actively attacks the channel estimation process. This pilot contamination attack not only dramatically reduces the achievable secrecy capacity but is also difficult to detect. We proceed by reviewing some methods from literature that detect active attacks on MaMIMO. The last part of the article surveys the open research problems that we believe are the most important to address in the future and give a few promising directions of research to solve them.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Software defined and virtualized wireless access in future wireless
           networks: scenarios and standards
    • Authors: Granelli; F.;Gebremariam, A.A.;Usman, M.;Cugini, F.;Stamati, V.;Alitska, M.;Chatzimisios, P.;
      Pages: 26 - 34
      Abstract: Future wireless networks are expected to provide augmented and data-intensive services in a multi-vendor multi-proprietor scenario. This scenario introduces relevant challenges to the networking infrastructure, especially in terms of flexibility and interoperability, that could be addressed by extending the concept of Virtualization and Software Defined Networking (SDN) to the wireless or wired-cum-wireless world. This paper provides a review of the perspectives to the extension of the SDN paradigm in the wireless domain by identifying current trends and proposed solutions, and providing the existing major standardization efforts and future trends in the field.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Multi-tier network secrecy in the ether
    • Authors: Win; M.Z.;Liangzhong Ruan;Rabbachin, A.;Yuan Shen;Conti, A.;
      Pages: 28 - 32
      Abstract: Communications in the ether are highly susceptible to eavesdropping due to the broadcast nature of the wireless medium. To improve communication confidentiality in wireless environments, research efforts have been made to complement cryptography with physical layer security. A recent view of the role of interference, especially in multi-tier wireless networks, suggested that interference engineering can increase the level of communication confidentiality. The design of interference engineering strategies (IESs) requires a thorough characterization of concurrent effects of wireless emissions on legitimate and eavesdropping receivers. This article advocates IESs for achieving a new level of communication confidentiality in multi-tier wireless networks (namely multi-tier network secrecy) with different degrees of coordination among the tiers. Insights on how IES benefits wireless network secrecy are provided, guiding the design of such strategies for a new level of communication confidentiality.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Physical layer key generation in wireless networks: challenges and
           opportunities
    • Authors: Kai Zeng;
      Pages: 33 - 39
      Abstract: Physical layer key generation that exploits reciprocity and randomness of wireless fading channels has attracted considerable research attention in recent years. Although theoretical study has shown its potential to generate information- theoretic secure keys, great challenges remain when transforming the theory into practice. This article provides an overview of the physical layer key generation process and discusses its practical challenges. Different passive and active attacks are analyzed and evaluated through numerical study. A new key generation scheme using random probing signals, and combining user generated randomness and channel randomness, is introduced as a countermeasure against active attacks. The numerical results show that the proposed scheme achieves higher security strength than existing schemes using constant probing signals under active attacks. Future research topics on physical layer key generation are discussed.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Cellular software defined networking: a framework
    • Authors: Bradai; A.;Singh, K.;Ahmed, T.;Rasheed, T.;
      Pages: 36 - 43
      Abstract: Today's mobile customers desire to remain connected anywhere, at any time, and using any device. This phenomenon has encouraged mobile network operators to build complex network architectures by incorporating new features and extensions, which are harder to manage and operate. In this article we propose a novel and simplified architecture for mobile networks. The proposed architecture, which we call CSDN (Cellular SDN), leverages software defined networking (SDN) and network functions virtualization (NFV). SDN abstracts the network and separates the control plane from the data plane; NFV decouples logical network functions from the underlying hardware, for dynamic resource orchestration. Furthermore, we argue that dynamic resource orchestration and optimal control need real-time context data analyses to make intelligent decisions. Thus, in the proposed architecture we exploit the capability of the mobile edge networks to gather information related to the network as well as the users. This information can be used to optimize network utilization and application performance, and to enhance the user experience. In addition, the gathered data can be shared with third party service providers, enabling the realization of innovative services.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Distributed inference in the presence of eavesdroppers: a survey
    • Authors: Kailkhura; B.;Nadendla, V.S.S.;Varshney, P.K.;
      Pages: 40 - 46
      Abstract: The distributed inference framework comprises a group of spatially distributed nodes that acquire observations about a POI and transmit computed summary statistics to the fusion center. Based on the messages received from the nodes, the FC makes a global inference about the POI. The distributed and broadcast nature of such systems makes them quite vulnerable to different types of attacks. This article focuses on efficient mitigation schemes to mitigate the impact of eavesdropping on distributed inference and surveys the currently available approaches along with avenues for future research.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • i-Net: new network architecture for 5G networks
    • Authors: Jianquan Wang;Zhaobiao Lv;Zhangchao Ma;Lei Sun;Yu Sheng;
      Pages: 44 - 51
      Abstract: In order to deal with the challenges and opportunities presented by the mobile Internet, this paper proposes a new Internet-oriented mobile network architecture, dubbed i-Net, for fifth generation (5G) mobile communication systems. Based on direct communications established between the base stations (BSs), i-Net can implement local data routing for mobile data traffic, which adapts to increased service localization for the mobile Internet. We first present the network architecture and main technical features, i.e., inter-connection, integration, and intelligence. Then the key techniques are discussed to show their potential in improving the network efficiency of i-Net. Field trials for inter-BS direct communications to implement cooperative multipoint oPeration (CoMP) in i-Net are carried out to demonstrate the feasibility of i-Net. It is expected that i-Net can provide a good quality of experience for end users through the efficient integration of the multi-BS, multi-band, and multi-radio-access-technology (RAT) radio resources in 5G.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Wireless physical layer authentication via fingerprint embedding
    • Authors: Yu; P.L.;Verma, G.;Sadler, B.M.;
      Pages: 48 - 53
      Abstract: Authentication is a fundamental requirement for secure communications. In this article, we describe a general framework for fingerprint embedding at the physical layer in order to provide message authentication that is secure and bandwidth-efficient. Rather than depending on channel or device characteristics that are outside of our control, deliberate fingerprint embedding for message authentication enables control over performance trade-offs by design. Furthermore, low-power fingerprint designs enhance security by making the authentication tags less accessible to adversaries. We define metrics for communications and authentication performance, and discuss the trade-offs in system design. Results from our wireless software-defined radio experiments validate the theory and demonstrate the low complexity, practicality, and enhanced security of the approach.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Virtual RATs and a flexible and tailored radio access network evolving to
           5G
    • Authors: Shanzhi Chen;Jian Zhao;Ming Ai;Liu; D.;Ying Peng;
      Pages: 52 - 58
      Abstract: This article first analyzes the requirements and challenges in the future 5G mobile wireless network. Then the authors describe a new method for radio access technologies called virtual RATs. The proposed scheme can provide a flexible and tailored access network that can meet the requirements and overcome the challenges in mobile broadband networks. The authors also present a high level design of the overall architecture and protocol stack for virtual RATs. Two concepts, virtual RAT Types and interface sets, are introduced. Two essential features, flexible control/user (C/U) plane separation and coordination between virtual RATs, are also discussed. Examples are provided to show how to achieve a flexible and tailored access network for services by using virtual RATs. Finally, the capability of hardware to support implementation of virtual RATs is analyzed.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Energy harvesting communications: Part 2 [Guest Editorial]
    • Authors: Yuen; C.;Elkashlan, M.;Qian, Y.;Duong, T.Q.;Shu, L.;Schmidt, F.;
      Pages: 54 - 55
      Abstract: Over the last decade, energy harvesting has emerged as a promising approach to enable self-sufficient and self-sustaining operation for devices in energy-constrained networks by scavenging energy from the ambient environment to power up devices.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Toward self-sustainable cooperative relays: state of the art and the
           future
    • Authors: Kuang-hao Liu;Phone Lin;
      Pages: 56 - 62
      Abstract: Cooperative relaying has been recognized as a promising technique to exploit spatial diversity gain using simple hardware, but it may barely fall in the class of green communications because extra power is consumed for information relaying. Recent advances in energy harvesting devices have paved the way for self-sustainable relays that power themselves by replenishing ambient energy without wires. This article examines the current progress of EH relays with special emphasis on wireless power transfer through RF signals that carry both information and energy at the same time. In this context, information relaying and EH are two tightly coupled processes, and practical constraints of EH devices pose new challenges to self-sustainable relays. This article addresses these issues and points out future research directions.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Cloud assisted HetNets toward 5G wireless networks
    • Authors: Ning Zhang;Nan Cheng;Gamage; A.T.;Kuan Zhang;Mark, J.W.;Xuemin Shen;
      Pages: 59 - 65
      Abstract: With the proliferation of connected devices and emerging data-hungry applications, the volume of mobile data traffic is predicted to have a 1000-fold growth by the year 2020. To address the challenge of this data explosion, industry and academia have initiated research and development of 5G wireless networks, which are envisaged to cater to the massive data traffic volume, while providing ubiquitous connectivity and supporting diverse applications with different quality of service (QoS) requirements. To support the expected massive growth of mobile data, a large number of small cells are expected to be deployed indoors and outdoors, giving rise to heterogeneous networks (HetNets), which are considered to be the key path toward 5G. With such large-scale HetNets, network operators face many serious challenges in terms of operation and management, cost-effective small cell deployment, and intercell interference mitigation. To deal with those issues, a cloud based platform is introduced, aiming to simplify the deployment, operation and management, and facilitate round-the-clock optimization of the network, to pave the way for the development of 5G. Two case studies are provided to illustrate the benefits of the cloud based architecture. Finally, the related standardization activities are provided and some research topics essential for a successful development of 5G are discussed.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Wireless-powered cellular networks: key challenges and solution techniques
    • Authors: Tabassum; H.;Hossain, E.;Ogundipe, A.;Dong In Kim;
      Pages: 63 - 71
      Abstract: Energy harvesting from ambient sources is emerging as a sustainable and environmentfriendly technique to prolong the lifetime of wireless devices. However, harvesting energy from these sources may not be feasible for quality- of-service (QoS)-constrained wireless applications. As such, dedicated wireless-powered cellular networks (WPCNs) are currently being investigated to ensure the reliability as well as improved battery lifetime of the wireless devices. With emerging WPCNs, a true wireless network can be envisioned, which is free of connectors, cables, and battery access panels, and guarantees freedom of mobility. To illustrate and understand the design requirements of WPCNs, this article first points out the key challenges of designing energy-harvesting cellular networks. These include the doubly near-far problem, the signal-to-noise ratio (SNR) outage experienced by the energy-harvesting devices located toward the cell-edge, the spatial characterization of the SNR outage zone, the additional resource consumption at energy transmitting sources, and the problems related to designing fairness-constrained user scheduling schemes. A brief overview of the related research advancements in WPCNs and a summary of their limitations are then provided. Finally, we list a few suggestions and design considerations that can potentially tackle the major challenges in emerging WPCNs and open up new research directions.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Content distribution over content centric mobile social networks in 5G
    • Authors: Zhou Su;Qichao Xu;
      Pages: 66 - 72
      Abstract: Due to the rapid growth of network traffic and new demands from mobile users, the current mobile social networks face challenges in dealing with a huge amount of content requests, high operating costs, and mobility control. How to design mobile social networks efficiently for the upcoming 5G era has become an important issue. In this article we propose and outline a framework of content centric mobile social networks for 5G. First, we present a content centric based network architecture consisting of mobile users, communities, content centric nodes, small cells, and macro cells. Next, we discuss the detailed process to deliver mobile content based on the interests of content and mobile users. In addition, a novel caching scheme is presented to store replicas of mobile content, and the related experiment results are also given.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Wireless energy harvesting in interference alignment networks
    • Authors: Nan Zhao;Yu; F.R.;Leung, V.C.M.;
      Pages: 72 - 78
      Abstract: Wireless energy harvesting (WEH) is becoming one of the key techniques in energy harvesting in wireless networks. On the other hand, interference alignment (IA) is a promising solution for interference management in wireless networks. Although plenty of effort has been conducted on WEH and IA, these two important areas have been addressed separately in most of the existing literature. In this article we provide an overview of WEH in IA networks, and present a unified framework to jointly study WEH and IA. To simultaneously optimize both information transmission (IT) and WEH performance in IA networks, we propose a power splitting optimization (PSO) algorithm. In addition, we study the power allocation problem in the proposed PSO algorithm. Simulation results are presented to compare the performance of the proposed schemes for WEH in IA networks. Some interesting research challenges are also presented for the WEH in IA networks.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Software-defined networking security: pros and cons
    • Authors: Dabbagh; M.;Hamdaoui, B.;Guizani, M.;Rayes, A.;
      Pages: 73 - 79
      Abstract: Software-defined networking (SDN) is a new networking paradigm that decouples the forwarding and control planes, traditionally coupled with one another, while adopting a logically centralized architecture aiming to increase network agility and programability. While many efforts are currently being made to standardize this emerging paradigm, careful attention needs to be paid to security at this early design stage too, rather than waiting until the technology becomes mature, thereby potentially avoiding previous pitfalls made when designing the Internet in the 1980s. This article focuses on the security aspects of SDN networks. We begin by discussing the new security advantages that SDN brings and by showing how some of the long-lasting issues in network security can be addressed by exploiting SDN capabilities. Then we describe the new security threats that SDN is faced with and discuss possible techniques that can be used to prevent and mitigate such threats.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • A survey of energy harvesting communications: models and offline optimal
           policies
    • Authors: Yejun He;Xudong Cheng;Wei Peng;Stuber; G.L.;
      Pages: 79 - 85
      Abstract: As people pay more attention to environmental protection and energy conservation issues, energy consumption in communications have become a hot research field. In wireless communications networks such as wireless sensor networks, traditional battery-operated devices or nodes have a short lifetime and die after the batteries are depleted, and replacing the batteries may be very costly and sometimes will be impossible. Therefore, energy harvesting (EH) communications have become a good means to solve this problem. EH communications mean the nodes can continue working by harvesting ambient energy. EH communications are different from the traditional battery-operated communications, so we need new models and optimal transmission policies to maximize the throughput. In this article we review different methods of harvesting the ambient energy in EH communications and the models of EH communications. We focus on offline optimal policies, then compare different policies and classify them into certain types. Finally, we propose several open research challenges and directions for future work.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Cutting the last wires for mobile communications by microwave power
           transfer
    • Authors: Kaibin Huang;Xiangyun Zhou;
      Pages: 86 - 93
      Abstract: The advancements in microwave power transfer (MPT) over recent decades have enabled wireless power transfer over long distances. The latest breakthroughs in wireless communication - massive MIMO, small cells, and millimeterwave communication - make wireless networks suitable platforms for implementing MPT. This can lead to the elimination of the “last wires” connecting mobile devices to the grid for recharging, thereby tackling a huge long-standing ICT challenge. Furthermore, the seamless integration between MPT and wireless communication opens up a new area called wirelessly powered communications (WPC) where many new research directions arise, such as simultaneous information and power transfer, WPC network architectures, and techniques for safe and efficient WPC. This article provides an introduction to WPC by describing the key features of WPC, shedding light on a set of frequently asked questions, and identifying the key design issues and discussing possible solutions.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Energy harvesting small cell networks: feasibility, deployment, and
           operation
    • Authors: Yuyi Mao;Yaming Luo;Jun Zhang;Letaief; K.B.;
      Pages: 94 - 101
      Abstract: Small cell networks have attracted a great deal of attention in recent years due to their potential to meet the exponential growth of mobile data traffic, and the increasing demand for better quality of service and user experience in mobile applications. Nevertheless, wide deployment of small cell networks has not happened yet because of the complexity in the network planning and optimization, as well as the high expenditure involved in deployment and operation. In particular, it is difficult to provide grid power supply to all the small cell base stations in a cost-effective way. Moreover, a dense deployment of small cell base stations, which is needed to meet the capacity and coverage of next generation wireless networks, will increase operators' electricity bills and lead to significant carbon emission. Thus, it is crucial to exploit off-grid and green energy sources to power small cell networks, for which energy harvesting technology is a viable solution. In this article, we conduct a comprehensive study of energy harvesting small cell networks, and investigate important aspects, including a feasibility analysis, network deployment, and network operation issues. The advantages as well as unique challenges of energy harvesting small cell networks are highlighted, together with potential solutions and effective design methodologies.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Wireless energy harvesting for the Internet of Things
    • Authors: Kamalinejad; P.;Mahapatra, C.;Zhengguo Sheng;Mirabbasi, S.;Leung, V.C.M.;Yong Liang Guan;
      Pages: 102 - 108
      Abstract: The Internet of Things (IoT) is an emerging computing concept that describes a structure in which everyday physical objects, each provided with unique identifiers, are connected to the Internet without requiring human interaction. Long-term and self-sustainable operation are key components for realization of such a complex network, and entail energy-aware devices that are potentially capable of harvesting their required energy from ambient sources. Among different energy harvesting methods, such as vibration, light, and thermal energy extraction, wireless energy harvesting (WEH) has proven to be one of the most promising solutions by virtue of its simplicity, ease of implementation, and availability. In this article, we present an overview of enabling technologies for efficient WEH, analyze the lifetime of WEH-enabled IoT devices, and briefly study the future trends in the design of efficient WEH systems and research challenges that lie ahead.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Joint wireless information and energy transfer in massive distributed
           antenna systems
    • Authors: Fangchao Yuan;Shi Jin;Yongming Huang;Kai-kit Wong;Zhang; Q.T.;Hongbo Zhu;
      Pages: 109 - 116
      Abstract: In mobile communications, two potentially ground-breaking ideas have emerged in recent years: massive MIMO antenna technology, which delivers enormous information rates, and wireless energy transfer (WET), which makes remote charging of mobile users possible. This article realizes the huge potential of combining the two for high wireless information transfer (WIT) and WET. In particular, to maximize the synergy, the distributed version of massive MIMO (known as massive distributed antenna system, MDAS) is advocated to go with the joint wireless information and energy transfer (JWIET) system capable of both WIT and WET. We present the opportunities in MDAS-JWIET, and discuss research trends in MDAS with several architectures involving WET and WIT.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • When telecommunications networks meet energy grids: cellular networks with
           energy harvesting and trading capabilities
    • Authors: Zordan; D.;Miozzo, M.;Dini, P.;Rossi, M.;
      Pages: 117 - 123
      Abstract: In this article, we cover eco-friendly cellular networks, discussing the benefits that ambient energy harvesting offers in terms of energy consumption and profit. We advocate for future networks where energy harvesting will be massively employed to power network elements; even further, communication networks will seamlessly blend with future power grids. This vision entails the fact that future base stations may trade some of the excess energy they harvest so as to make a profit and provide ancillary services to the electricity grid. We start by discussing recent developments in the energy harvesting field, and then deliberate on the way future energy markets are expected to evolve and the new fundamental trade-offs that arise when energy can be traded. Performance estimates are given throughout to support our arguments, and open research issues in this emerging field are discussed.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Automotive networking and applications [Series Editorial]
    • Authors: Chen; W.;Delgrossi, L.;Kosch, T.;Saito, T.;
      Pages: 124 - 125
      Abstract: In this 15th issue of the Automotive Networking and Applications Series, we are pleased to present two papers that address security vulnerabilities of connected vehicle streams in cooperative driving and web access for passengers of public transit systems in the presence of intermittently connected networks.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Security vulnerabilities of connected vehicle streams and their impact on
           cooperative driving
    • Authors: Amoozadeh; M.;Raghuramu, A.;Chen-nee Chuah;Ghosal, D.;Zhang, H.M.;Rowe, J.;Levitt, K.;
      Pages: 126 - 132
      Abstract: Autonomous vehicles capable of navigating unpredictable real-world environments with little human feedback are a reality today. Such systems rely heavily on onboard sensors such as cameras, radar/LIDAR, and GPS as well as capabilities such as 3G/4G connectivity and V2V/V2I communication to make real-time maneuvering decisions. Autonomous vehicle control imposes very strict requirements on the security of the communication channels used by the vehicle to exchange information as well as the control logic that performs complex driving tasks such as adapting vehicle velocity or changing lanes. This study presents a first look at the effects of security attacks on the communication channel as well as sensor tampering of a connected vehicle stream equipped to achieve CACC. Our simulation results show that an insider attack can cause significant instability in the CACC vehicle stream. We also illustrate how different countermeasures, such as downgrading to ACC mode, could potentially be used to improve the security and safety of the connected vehicle streams.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • ICOW: internet access in public transit systems
    • Authors: Se Gi Hong;SungHoon Seo;Schulzrinne; H.;Chitrapu, P.;
      Pages: 134 - 141
      Abstract: When public transportation stations have access points to provide Internet access to passengers, public transportation becomes a more attractive travel and commute option. However, the Internet connectivity is intermittent because passengers can access the Internet only when a transit vehicle is within the networking coverage of an access point at a stop. We propose ICOW, a system that provides a low-cost way for public transit operators to enhance quality of experience for passengers who access the Internet. Each public transit vehicle is equipped with a smart cache that serves popular content to passengers. The cache updates its content based on passenger requests when it is within range of Internet access points placed at stops, stations, or depots. We have developed a system architecture and built a prototype of the ICOW system. Our evaluation shows that ICOW is significantly more efficient than having passengers contact Internet access points individually and ensures continuous availability of content throughout the journey.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Radio communications: components, systems, and networks [Series Editorial]
    • Authors: Mishra; A.;Alexander, T.;
      Pages: 142 - 143
      Abstract: Coding has long been fundamental to communication systems, even as far back as the advent of telegraphy in the 1840s: Samuel F. B. Morse created the Morse code as a means of efficiently encoding and transmitting messages in the English language. Channel coding has advanced considerably since the inauguration of information theory by Claude Shannon in 1948, followed by the seminal work by Richard Hamming on practical error correcting codes in 1949. Many crucial algorithms utilized in radio communications today, including convolutional and block codes, the Viterbi algorithm, BCH and Reed- Solomon codes, soft decoding, and so on, date back to the 1960s. Much of the interest in channel coding was driven by space research, to solve the formidable problem of communicating with space probes millions or even billions of kilometers from Earth.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Coded random access: applying codes on graphs to design random access
           protocols
    • Authors: Paolini; E.;Stefanovic, C.;Liva, G.;Popovski, P.;
      Pages: 144 - 150
      Abstract: The rise of machine-to-machine communications has rekindled interest in random access protocols as a support for a massive number of uncoordinatedly transmitting devices. The legacy ALOHA approach is developed under a collision model, where slots containing collided packets are considered as waste. However, if the common receiver (e.g. base station) is able to store the collision slots and use them in a transmission recovery process based on successive interference cancellation, the design space for access protocols is radically expanded. We present the paradigm of coded random access, in which the structure of the access protocol can be mapped to a structure of an erasure-correcting code defined on a graph. This opens the possibility to use coding theory and tools for designing efficient random access protocols, offering markedly better performance than ALOHA. Several instances of coded random access protocols are described, as well as a case study on how to upgrade a legacy ALOHA system using the ideas of coded random access.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Out-of-band emission reduction and a unified framework for precoded OFDM
    • Authors: Xiaojing Huang;Zhang; J.A.;Guo, Y.J.;
      Pages: 151 - 159
      Abstract: OFDM has been regarded as a promising candidate for use in cognitive radio systems with dynamic spectrum reuse capability. However, conventional OFDM has significant OOBE, which can cause severe interference to systems operating in adjacent frequency bands. In addition to conventional techniques such as spectral shaping filtering, guard band insertion, and time domain windowing, new OOBE reduction techniques, including cancellation carrier and spectral precoding, have been proposed in recent years. This article reviews various OOBE reduction techniques and proposes a generalized low-complexity OOBE reduction framework for discrete Fourier transform precoded OFDM. With the allocation of explicit frequency domain cancellation subcarriers and data domain cancellation symbols, the proposed framework enables various configurations to achieve significant OOBE reduction with low implementation complexity, and provides flexibility in balancing OOBE reduction and other performance metrics such as peak-to-average power ratio.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
  • Advertisers' index
    • Pages: 160 - 160
      Abstract: Listing of the advertisers represented in this issue.
      PubDate: June 2015
      Issue No: Vol. 53, No. 6 (2015)
       
 
 
JournalTOCs
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Email: journaltocs@hw.ac.uk
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
 
About JournalTOCs
API
Help
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-2015