English English | 中文 中文


Recent Digital Communications and Networks Articles

Recently published articles from Digital Communications and Networks.

A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group

Available online 19 November 2020
Xu Yang | Hongyan Xing

Data loss or distortion causes adverse effects on the accuracy and stability of the thunderstorm point charge localization. To solve this problem, we propose a data complementary method based on the...

Performance analysis of diffusion-based decode-and-forward relay with depleted molecule shift keying

Available online 13 November 2020
Jiaxing Wang | Mugen Peng | Yaqiong Liu

The distance-decay effect of molecular signals makes communication range a major challenge for diffusion-based Molecular Communication (MC). To solve this problem, the intermediate nano-machine is deployed...

Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array

Available online 12 November 2020
Dandan Liu | Liangqi Gui | Ke Chen | Liang Lang | Zixiao Zhang | Han Chen | Lixing Liu | Tao Jiang

Antenna array is one of the methods which can generate Orbital Angular Momentum (OAM) waves. However, OAM waves generated by different antenna arrays have different characteristics of Electric-field...

Capability-based IoT access control using blockchain

Available online 24 October 2020
Yue Liu | Qinghua Lu | Shiping Chen | Qiang Qu | Hugo O’Connor | Kim-Kwang Raymond Choo | He Zhang

Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range of settings, such as smart offices, homes and cities. However, the existing IoT access control solutions are...

Jointly Optimizing User Clustering, Power Management, and Wireless Channel Allocation for NOMA based Internet of Things

Available online 22 October 2020
Xiang Sun | Liangkun Yu | Yin Yang

In order to accommodate the massive amount of Internet of Things (IoT) connections in mobile networks, non-orthogonal multiple access (NOMA) has been applied as the resource sharing mechanism in mobile...

UTM: A trajectory privacy evaluating model for online health monitoring

Available online 15 October 2020
Zhigang Yang | Ruyan Wang | Dapeng Wu | Daizhong Luo

A huge amount of sensitive personal data is being collected by various online health monitoring applications. Although the data is anonymous, the personal trajectories (e.g., the chronological access...

A blockchain-empowered AAA scheme in the large-scale HetNet

Available online 13 October 2020
Na Shi | Liang Tan | Wenjuan Li | Xin Qi | Keping Yu

A Large-Scale Heterogeneous Network (LS-HetNet) integrates different networks into one uniform network system to provide seamless one-world network coverage. In LS-HetNet, various devices use different...

Secure K-Nearest neighbor queries in two-tiered Mobile Wireless Sensor Networks

Available online 4 October 2020
Lihong Fan | Liang Liu | Hang Gao | Zuchao Ma | Yuting Wu

TMWSN (Tiered Mobile Wireless Sensor Network) is a new paradigm introduced by mobile edge computing. Now it has received wide attention because of their high scalability, robustness, deployment flexibility,...

Directional Neighbor Discovery in mmWave Wireless Networks

Available online 28 September 2020
Yu Wang | Ticao Zhang | Shiwen Mao | Theodore (Ted) S. Rappaport

The directional neighbor discovery problem, i.e., spatial rendezvous, is a fundamental problem in millimeter wave (mmWave) wireless networks, where directional transmissions are used to overcome the...

A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks

Available online 28 September 2020
Alak Roy | Nityananda Sarma

To design an energy-efficient Medium Access Control (MAC) protocol for the Underwater Wireless Sensor Networks (UWSNs) is an urgent research issue since depleted batteries cannot be recharged or replaced...

Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator

Available online 26 September 2020
Kamayani Shrivastav | R.P. Yadav | K.C. Jain

This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori (MAP) algorithm for channel estimation and data detection in presence of Phase Noise (PHN) in iterative...

Challenge-based collaborative intrusion detection in software-defined networking: An evaluation

Available online 19 September 2020
Wenjuan Li | Yu Wang | Zhiping Jin | Keping Yu | Jin Li | Yang Xiang

Software-Defined Networking (SDN) is an emerging architecture that enables a computer network to be intelligently and centrally controlled via software applications. It can help manage the whole network...

Green indoor optical wireless communication systems: Pathway towards pervasive deployment

Available online 18 September 2020
C. Jenila | R.K. Jeyachitra

The Optical Wireless Communication (OWC) offers the high capacity of optical fiber communication with the flexibility of wireless communication. Since it works in the optical region of the ElectroMagnetic...

Security and privacy issues of physical objects in the IoT: Challenges and opportunities

Available online 14 September 2020
Xuanxia Yao | Fadi Farha | Rongyang Li | Ismini Psychoula | Liming Chen | Huansheng Ning

In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle...

Generative adversarial network-based atmospheric scattering model for image dehazing

Available online 1 September 2020
Jin-xiu Zhu | Lei-lei Meng | Wen-xia Wu | Dongmin Choi | Jian-jun Ni

This paper presents a trainable Generative Adversarial Network (GAN)-based end-to-end system for image dehazing, which is named the DehazeGAN. DehazeGAN can be used for edge computing-based applications,...

Analysis of identifiers in IoT platforms

August 2020
Haris Aftab | Komal Gilani | JiEun Lee | Lewis Nkenyereye | SeungMyeong Jeong | JaeSeung Song

The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind...

Private membership test protocol with low communication complexity

August 2020
Sara Ramezanian | Tommi Meskanen | Masoud Naderpour | Ville Junnila | Valtteri Niemi

We introduce a practical method to perform private membership tests. In this method, clients are able to test whether an item is in a set controlled by the server without revealing their query item...

Self-healing and SDN: bridging the gap

August 2020
Leonardo Ochoa-Aday | Cristina Cervelló-Pastor | Adriana Fernández-Fernández

Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic. Software-Defined Network (SDN) is an emerging architecture aimed to address...

Electromagnetic spectrum chipless radio frequency identification: A review

August 2020
Qingjuan Li | Rana Sadaf Anwar | Huansheng Ning | Jun Wang | Lingfeng Mao

Over the past few years, Radio Frequency IDentification (RFID) has stridden significantly due to its adoption in many business and daily life activities. RFID empowers end-to-end and item-by-item visibility,...

Design of a USIM and ECC based handover authentication scheme for 5G-WLAN heterogeneous networks

August 2020
Amit Kumar | Hari Om

A variety of wireless communication technologies have been developed to provide services to a large number of users. The future integrated 5G-WLAN wireless networks will support seamless and secure...

Towards Yo-Yo attack mitigation in cloud auto-scaling mechanism

August 2020
Xiaoqiong Xu | Jin Li | Hongfang Yu | Long Luo | Xuetao Wei | Gang Sun

Cloud platforms could automatically scale underlying network resources up and down in response to changes in the traffic load. Such an auto-scaling mechanism can largely enhance the elasticity and scalability...

Sparse array of sub-surface aided blockage-free multi-user mmWave communication systems

August 2020
Weicong Chen | Xi Yang | Shi Jin | Pingping Xu

Recently, Reconfigurable Intelligent Surfaces (RISs) have drawn intensive attention in the realization of the smart radio environment. However, existing works mainly consider the RIS as a whole uniform...

A time-aware query-focused summarization of an evolving microblogging stream via sentence extraction

August 2020
Fei Geng | Qilie Liu | Ping Zhang

With the number of social media users ramping up, microblogs are generated and shared at record levels. The high momentum and large volumes of short texts bring redundancies and noises, in which the...

Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching

August 2020
Yiqing Zhou | Ling Liu | Lu Wang | Ning Hui | Xinyu Cui | Jie Wu | Yan Peng | Yanli Qi | Chengwen Xing

With the proliferation of the Internet of Things (IoT), various services are emerging with totally different features and requirements, which cannot be supported by the current fifth generation of mobile...

On recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm

August 2020
Yaru Fu | Khai Nguyen Doan | Tony Q.S. Quek

Recommendation-aware Content Caching (RCC) at the edge enables a significant reduction of the network latency and the backhaul load, thereby invigorating ubiquitous latency-sensitive innovative services....

Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks

August 2020
Haodong Li | Fang Fang | Zhiguo Ding

Multi-access Edge Computing (MEC) is an essential technology for expanding computing power of mobile devices, which can combine the Non-Orthogonal Multiple Access (NOMA) in the power domain to multiplex...

Blockchain-enabled resource management and sharing for 6G communications

August 2020
Hao Xu | Paulo Valente Klaine | Oluwakayode Onireti | Bin Cao | Muhammad Imran | Lei Zhang

The sixth-generation (6G) network must provide better performance than previous generations to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, higher...

Security and privacy in 6G networks: New areas and new challenges

August 2020
Minghao Wang | Tianqing Zhu | Tao Zhang | Jun Zhang | Shui Yu | Wanlei Zhou

With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions....

Intent-based networks for 6G: Insights and challenges

August 2020
Yiming Wei | Mugen Peng | Yaqiong Liu

Intent-Based Networks (IBNs), which are originally proposed to introduce Artificial Intelligence (AI) into the sixth-generation (6G) wireless networks, can effectively solve the challenges of traditional...

Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies

August 2020
Yun Chen | Wenfeng Liu | Zhiang Niu | Zhongxiu Feng | Qiwei Hu | Tao Jiang

The worldwide large-scale commercial deployment of 5G has commenced in 2020 for supporting enhanced Mobile BroadBand (eMBB), ultra-Reliable and Low-Latency Communications (uRLLC), and massive Machine-Type...

Guest editorial

August 2020
Tao Jiang | Tony Q.S. Quek | Zhiguo Ding | Mugen Peng | Yun Li

Combined spatial-temporal energy harvesting and relay selection for cognitive wireless powered networks

Available online 19 August 2020
Yuan Gao | Haixia He | Rongjun Tan | Junho Choi

In order to improve the Energy Efficiency (EE) and spectrum utilization of Cognitive Wireless Powered Networks (CWPNs), a combined spatial-temporal Energy Harvesting (EH) and relay selection scheme...

Extended Kalman Filter-based localization algorithm by edge computing in Wireless Sensor Networks

Available online 16 August 2020
Inam Ullah | Siyu Qian | Zhixiang Deng | Jong-Hyouk Lee

The Extended Kalman Filter (EKF) has received abundant attention with the growing demands for robotic localization. The EKF algorithm is more realistic in non-linear systems, which has an autonomous...

User location privacy protection mechanism for location-based services

Available online 12 August 2020
Yan He | Jiageng Chen

With the rapid development of the Internet of Things (IoT), Location-Based Services (LBS) are becoming more and more popular. However, for the users being served, how to protect their location privacy...

A mobility compensation method for drones in SG-eIoT

Available online 7 August 2020
Liguo Weng | Yanghui Zhang | Yong Yang | Min Fang | Zelong Yu

In order to achieve the typical goal of smart grid, the concept of electricity Internet of Things (eIoT) has been proposed to assist the monitoring and inspection of power transmission line state, and...

iPAS: A deep Monte Carlo Tree Search-based intelligent pilot-power allocation scheme for massive MIMO system

Available online 4 August 2020
Jienan Chen | Siyu Luo | Lin Zhang | Cong Zhang | Bin Cao

Massive Multiple-Input-Multiple-Output (MIMO) is a promising technology to meet the demand for the connection of massive devices and high data capacity for mobile networks in the next generation communication...

Substring-searchable attribute-based encryption and its application for IoT devices

Available online 31 July 2020
Xi Sun | Hao Wang | Xiu Fu | Hong Qin | Mei Jiang | Likun Xue | Xiaochao Wei

With the development of big data and the cloud computing technology, more and more users choose to store data on cloud servers, which brings much convenience to their management and use of data, and...

3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization

Available online 28 July 2020
Chengming Zou | Xiaoxiao Li | Xing Liu | Mengya Zhang

This paper investigates a wireless system with multi-Unmanned Aerial Vehicle (UAV) for improving the overall throughput. In contrast to previous studies that optimize the locations of UAVs and channel...

A physical layer security scheme for full-duplex communication systems with residual self-interference and non-eavesdropping CSI

Available online 23 July 2020
Weijia Lei | Yang Zhou | Xiuzhen Lin

We discuss the physical layer security scheme in the Full-Duplex (FD) MIMO point-to-point two-way communication system with residual self-interference, in which legitimate nodes send confidential information...

A novel Nest-based scheduling method for mobile wireless body area networks

Available online 12 July 2020
Zhijun Xie | Guangyan Huang | Roozbeh Zarei | Zhenyan Ji | Hongwu Ye | Jing He

Wireless body area networks (WBANs) comprise various sensors to monitor and collect various vital signals, such as blood pressure, pulse, heartbeat, body temperature, and blood sugar. A dense and mobile...

Lightweight authentication protocol for e-health clouds in IoT based applications through 5G technology

Available online 11 July 2020
Minahil | Muhammad Faizan Ayub | Khalid Mahmood | Saru Kumari | Arun Kumar Sangaiah

Modern information technology has been utilized progressively for the storage and distribution of a large amount of healthcare data to reduce costs and improve the medical facilities. In this context,...

A secure spectrum auction scheme without the trusted party based on the smart contract

Available online 10 July 2020
Jiaqi Wang | Ning Lu | Qingfeng Cheng | Lu Zhou | Wenbo Shi

With the development of communication 5G networks and technologies, spectrum resources are increasingly scarce. The scarcity of the spectrum resource makes market-driven spectrum auction become an important...

Design and optimization of an integrated MEMS gas chamber with high transmissivity

Available online 7 July 2020
Yang Jing | Cheng Yuhua | Yuan Yupeng | Li Xiaofei | Zhang Zuwei | Xu Ming | Wang Dengpan | Mu Jiangdong | Mei Yong | Zhang Yuzhe

Non-Dispersive InfraRed (NDIR) gas sensor is widely used for gas detection in collieries and the gas chemical industry, etc. The performance of the NDIR gas sensor depends on the volume, optical length...

Performance analysis of a hybrid optical CDMA/DWDM system against inter-symbol interference and four wave mixing

Available online 7 July 2020
Naif Alsowaidi | Tawfig Eltaif | Mohd Ridzuan Mokhtar

This paper reports the implementation and theoretical model for analyzing an optical CDMA/DWDM hybrid system to reduce two major problems, the Inter-Symbol Interference (ISI) and the Four Wave Mixing...

Blockchain-based data transmission control for Tactical Data Link

Available online 27 June 2020
Wei Feng | Yafeng Li | Xuetao Yang | Zheng Yan | Liang Chen

Tactical Data Link (TDL) is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant, automatic, and secure way. So far, TDL...

Privacy preservation in permissionless blockchain: A survey

Available online 25 June 2020
Li Peng | Wei Feng | Zheng Yan | Yafeng Li | Xiaokang Zhou | Shohei Shimizu

Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain...

Clustering-based label estimation for network anomaly detection

Available online 20 June 2020
Sunhee Baek | Donghwoon Kwon | Sang C. Suh | Hyunjoo Kim | Ikkyun Kim | Jinoh Kim

A substantial body of work has been done to identify network anomalies using supervised and unsupervised learning techniques with their unique strengths and weaknesses. In this work, we propose a new...

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

Available online 11 June 2020
Inam ul haq | Jian Wang | Youwen Zhu | Saad Maqbool

During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple...

Share this page: