English English | 中文 中文

Recent Digital Communications and Networks Articles

Recently published articles from Digital Communications and Networks.

Performance of mobile networks under composite ℱ fading channels

Available online 12 January 2021
Mustafa K. Shawaqfeh | Osamah S. Badarneh

In this paper, the performance of a mobile wireless communication network operating over the Fisher-Snedecor ℱ composite fading channel is analyzed. Specifically, a multi-antenna base station transmits...

Study on the transaction linkage technique combined with the designated terminal for 5G-enabled IoT

Available online 1 January 2021
Kyungroul Lee | Kangbin Yim

With the growth of the scale of the market for Internet banking and e-commerce, the number of Internet-based financial markets has been increasing. Meanwhile, hacking incidents continuously affect the...

Video transcoding for adaptive bitrate streaming over edge-cloud continuum

Available online 24 December 2020
Guanyu Gao | Yonggang Wen

Video transcoding is to create multiple representations of a video for content adaptation. It is deemed as a core technique in Adaptive BitRate (ABR) streaming. How to manage video transcoding affects...

Unintentional Forking Analysis in Wireless Blockchain Networks

Available online 19 December 2020
Qilie Liu | Yinyi Xu | Bin Cao | Lei Zhang | Mugen Peng

Forking problem plays a key role in the security issue, which is a major concern in the blockchain system. Although many works studied on the attack strategy, consensus mechanism, privacy-protecting...

SM algorithms based encryption scheme for large genomic data files

Available online 16 December 2020
Yatong Jiang | Tao Shang | Jianwei Liu

With the rapid development of the genomic sequencing technology, the cost of obtaining personal genomic data and analyzing it effectively has been gradually reduced, and the analysis and utilization...

Robot and its living space A roadmap for robot development based on the view of living space

Available online 10 December 2020
Xiaofeng Cai | Huansheng Ning | Sahraoui Dhelim | Rongjuan Zhou | Tao Zhang | Yang Xu | Yueliang Wan

Robots, as the creation of human, became an irreplaceable component in human society. With the improvement of technologies, robots are becoming more intelligent and being widely applied to many fields,...

Deep learning for the internet of things: Potential benefits and use-cases

Available online 8 December 2020
Tausifa Jan Saleem | Mohammad Ahsan Chishti

The massive number of sensors deployed in the Internet of Things (IoT) produce gigantic amounts of data for facilitating a wide range of applications. Deep Learning (DL) would undoubtedly play a role...

DVCast: denoising and variable dct for analog visual communications

November 2020
Min Wang | Bin Tan | Dongmei Zhu | Qin Zou

Recently, analog visual transmission has attracted considerable attention owing to its graceful performance degradation for various wireless channels. In this study, we propose a novel analog visual...

The analysis of coverage probability, ASE and EE in heterogeneous ultra-dense networks with power control

November 2020
Qiaoshou Liu | Zhongpei Zhang

The ultra-dense network is a promising technology to increase the network capacity in the forthcoming fifth-generation (5G) mobile communication networks by deploying lots of low power Small Base Stations...

Generating routes for autonomous driving in vehicle-to-infrastructure communications

November 2020
Jianjun Yang | Tinggui Chen | Bryson Payne | Ping Guo | Yanping Zhang | Juan Guo

The study of vehicular networks has attracted considerable interest in academia and the industry. In the broad area, connected vehicles and autonomous driving are technologies based on wireless data...

The detection method of low-rate DoS attack based on multi-feature fusion

November 2020
Liang Liu | Huaiyuan Wang | Zhijun Wu | Meng Yue

As a new type of Denial of Service (DoS) attacks, the Low-rate Denial of Service (LDoS) attacks make the traditional method of detecting Distributed Denial of Service Attack (DDoS) attacks useless due...

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks

November 2020
Miraj Asghar | Lei Pan | Robin Doss

Vehicular Ad-hoc NETworks (VANETs) enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems (ITSs). The security of VANETs is...

An intelligent task offloading algorithm (iTOA) for UAV edge computing network

November 2020
Jienan Chen | Siyu Chen | Siyu Luo | Qi Wang | Bin Cao | Xiaoqian Li

Unmanned Aerial Vehicle (UAV) has emerged as a promising technology for the support of human activities, such as target tracking, disaster rescue, and surveillance. However, these tasks require a large...

Attacks and defences on intelligent connected vehicles: a survey

November 2020
Mahdi Dibaei | Xi Zheng | Kun Jiang | Robert Abbas | Shigang Liu | Yuexin Zhang | Yang Xiang | Shui Yu

Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g.,...

Quanta - A platform for rapid control and monitoring of heterogeneous rbots

November 2020
CH. S. Sankhar Reddy | Anita Agrawal | K.R. Anupama

Rapid prototyping, real-time control and monitoring of various events in robots are crucial requirements for research in the fields of modular and swarm robotics. A large quantities of resources (time,...

Performance analysis and comparison of PoW, PoS and DAG based blockchains

November 2020
Bin Cao | Zhenghui Zhang | Daquan Feng | Shengli Zhang | Lei Zhang | Mugen Peng | Yun Li

In the blockchain, the consensus mechanism plays a key role in maintaining the security and legitimation of contents recorded in the blocks. Various blockchain consensus mechanisms have been proposed....

Enhanced spectrum sensing using a combination of energy detector, matched filter and cyclic prefix

November 2020
Ghassan Alnwaimi | Hatem Boujemaa

In this paper, we propose a sensing scheme based on energy detection, matched filter and cyclic prefix. Both Equal Gain Combining (EGC) and optimal combination of the aforementioned detectors are investigated...

New bounds on the mutual information for discrete constellations and application to wireless channel estimation

November 2020
A. Taufiq Asyhari

The lack of closed-form expressions of the mutual information for discrete constellations has limited its uses for analyzing reliable communication over wireless fading channels. In order to address...

Securing color image transmission using compression-encryption model with dynamic key generator and efficient symmetric key distribution

November 2020
Emy Setyaningsih | Retantyo Wardoyo | Anny Kartika Sari

There are a few issues related to the existing symmetric encryption models for color image data, such as the key generation and distribution problems. In this paper, we propose a compression-encryption...

A novel nest-based scheduling method for mobile wireless body area networks

November 2020
Zhijun Xie | Guangyan Huang | Roozbeh Zarei | Zhenyan Ji | Hongwu Ye | Jing He

Wireless Body Area Networks (WBANs) comprise various sensors to monitor and collect various vital signals, such as blood pressure, pulse, heartbeat, body temperature, and blood sugar. A dense and mobile...

Research on data load balancing technology of massive storage system for wearable devices

Available online 30 November 2020
Shu-jun Liang | Jing Cheng | Jian-wei Zhang

Because of the limited memory of the increasing amount of information in current wearable devices, the processing capacity of the servers in the storage system can not keep up with the speed of information...

Fooling intrusion detection systems using adversarially autoencoder

Available online 25 November 2020
Junjun Chen | Di Wu | Ying Zhao | Nabin Sharma | Michael Blumenstein | Shui Yu

Due to the increasing cyber-attacks, various Intrusion Detection Systems (IDSs) have been proposed to identify network anomalies. Most existing machine learning-based IDSs learn patterns from the features...

A data complementary method for thunderstorm point charge localization based on atmospheric electric field apparatus array group

Available online 19 November 2020
Xu Yang | Hongyan Xing

Data loss or distortion causes adverse effects on the accuracy and stability of the thunderstorm point charge localization. To solve this problem, we propose a data complementary method based on the...

Performance analysis of diffusion-based decode-and-forward relay with depleted molecule shift keying

Available online 13 November 2020
Jiaxing Wang | Mugen Peng | Yaqiong Liu

The distance-decay effect of molecular signals makes communication range a major challenge for diffusion-based Molecular Communication (MC). To solve this problem, the intermediate nano-machine is deployed...

Theoretical analysis and comparison of OAM waves generated by three kinds of antenna array

Available online 12 November 2020
Dandan Liu | Liangqi Gui | Ke Chen | Liang Lang | Zixiao Zhang | Han Chen | Lixing Liu | Tao Jiang

Antenna array is one of the methods which can generate Orbital Angular Momentum (OAM) waves. However, OAM waves generated by different antenna arrays have different characteristics of Electric-field...

Capability-based IoT access control using blockchain

Available online 24 October 2020
Yue Liu | Qinghua Lu | Shiping Chen | Qiang Qu | Hugo O’Connor | Kim-Kwang Raymond Choo | He Zhang

Internet of Things (IoT) devices facilitate intelligent service delivery in a broad range of settings, such as smart offices, homes and cities. However, the existing IoT access control solutions are...

Jointly optimizing user clustering, power management, and wireless channel allocation for NOMA-based Internet of Things

Available online 22 October 2020
Xiang Sun | Liangkun Yu | Yin Yang

In order to accommodate the large number of Internet of Things (IoT) connections in mobile networks, Non-Orthogonal Multiple Access (NOMA) has been applied as the resource sharing mechanism in mobile...

UTM: A trajectory privacy evaluating model for online health monitoring

Available online 15 October 2020
Zhigang Yang | Ruyan Wang | Dapeng Wu | Daizhong Luo

A huge amount of sensitive personal data is being collected by various online health monitoring applications. Although the data is anonymous, the personal trajectories (e.g., the chronological access...

A blockchain-empowered AAA scheme in the large-scale HetNet

Available online 13 October 2020
Na Shi | Liang Tan | Wenjuan Li | Xin Qi | Keping Yu

A Large-Scale Heterogeneous Network (LS-HetNet) integrates different networks into one uniform network system to provide seamless one-world network coverage. In LS-HetNet, various devices use different...

Secure K-Nearest neighbor queries in two-tiered Mobile Wireless Sensor Networks

Available online 4 October 2020
Lihong Fan | Liang Liu | Hang Gao | Zuchao Ma | Yuting Wu

TMWSN (Tiered Mobile Wireless Sensor Network) is a new paradigm introduced by mobile edge computing. Now it has received wide attention because of their high scalability, robustness, deployment flexibility,...

Directional neighbor discovery in mmWave wireless networks

Available online 28 September 2020
Yu Wang | Ticao Zhang | Shiwen Mao | Theodore (Ted) S. Rappaport

The directional neighbor discovery problem, i.e., spatial rendezvous, is a fundamental problem in millimeter wave (mmWave) wireless networks, where directional transmissions are used to overcome the...

A synchronous duty-cycled reservation based MAC protocol for underwater wireless sensor networks

Available online 28 September 2020
Alak Roy | Nityananda Sarma

To design an energy-efficient Medium Access Control (MAC) protocol for the Underwater Wireless Sensor Networks (UWSNs) is an urgent research issue since depleted batteries cannot be recharged or replaced...

Joint MAP channel estimation and data detection for OFDM in presence of phase noise from free running and phase locked loop oscillator

Available online 26 September 2020
Kamayani Shrivastav | R.P. Yadav | K.C. Jain

This paper addresses a computationally compact and statistically optimal joint Maximum a Posteriori (MAP) algorithm for channel estimation and data detection in presence of Phase Noise (PHN) in iterative...

Challenge-based collaborative intrusion detection in software-defined networking: An evaluation

Available online 19 September 2020
Wenjuan Li | Yu Wang | Zhiping Jin | Keping Yu | Jin Li | Yang Xiang

Software-Defined Networking (SDN) is an emerging architecture that enables a computer network to be intelligently and centrally controlled via software applications. It can help manage the whole network...

Green indoor optical wireless communication systems: Pathway towards pervasive deployment

Available online 18 September 2020
C. Jenila | R.K. Jeyachitra

The Optical Wireless Communication (OWC) offers the high capacity of optical fiber communication with the flexibility of wireless communication. Since it works in the optical region of the ElectroMagnetic...

Security and privacy issues of physical objects in the IoT: Challenges and opportunities

Available online 14 September 2020
Xuanxia Yao | Fadi Farha | Rongyang Li | Ismini Psychoula | Liming Chen | Huansheng Ning

In the Internet of Things (IoT), security and privacy issues of physical objects are crucial to the related applications. In order to clarify the complicated security and privacy issues, the life cycle...

Generative adversarial network-based atmospheric scattering model for image dehazing

Available online 1 September 2020
Jin-xiu Zhu | Lei-lei Meng | Wen-xia Wu | Dongmin Choi | Jian-jun Ni

This paper presents a trainable Generative Adversarial Network (GAN)-based end-to-end system for image dehazing, which is named the DehazeGAN. DehazeGAN can be used for edge computing-based applications,...

Service-aware 6G: An intelligent and open network based on the convergence of communication, computing and caching

August 2020
Yiqing Zhou | Ling Liu | Lu Wang | Ning Hui | Xinyu Cui | Jie Wu | Yan Peng | Yanli Qi | Chengwen Xing

With the proliferation of the Internet of Things (IoT), various services are emerging with totally different features and requirements, which cannot be supported by the current fifth generation of mobile...

On recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm

August 2020
Yaru Fu | Khai Nguyen Doan | Tony Q.S. Quek

Recommendation-aware Content Caching (RCC) at the edge enables a significant reduction of the network latency and the backhaul load, thereby invigorating ubiquitous latency-sensitive innovative services....

Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks

August 2020
Haodong Li | Fang Fang | Zhiguo Ding

Multi-access Edge Computing (MEC) is an essential technology for expanding computing power of mobile devices, which can combine the Non-Orthogonal Multiple Access (NOMA) in the power domain to multiplex...

Blockchain-enabled resource management and sharing for 6G communications

August 2020
Hao Xu | Paulo Valente Klaine | Oluwakayode Onireti | Bin Cao | Muhammad Imran | Lei Zhang

The sixth-generation (6G) network must provide better performance than previous generations to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, higher...

Security and privacy in 6G networks: New areas and new challenges

August 2020
Minghao Wang | Tianqing Zhu | Tao Zhang | Jun Zhang | Shui Yu | Wanlei Zhou

With the deployment of more and more 5g networks, the limitations of 5g networks have been found, which undoubtedly promotes the exploratory research of 6G networks as the next generation solutions....

Intent-based networks for 6G: Insights and challenges

August 2020
Yiming Wei | Mugen Peng | Yaqiong Liu

Intent-Based Networks (IBNs), which are originally proposed to introduce Artificial Intelligence (AI) into the sixth-generation (6G) wireless networks, can effectively solve the challenges of traditional...

Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies

August 2020
Yun Chen | Wenfeng Liu | Zhiang Niu | Zhongxiu Feng | Qiwei Hu | Tao Jiang

The worldwide large-scale commercial deployment of 5G has commenced in 2020 for supporting enhanced Mobile BroadBand (eMBB), ultra-Reliable and Low-Latency Communications (uRLLC), and massive Machine-Type...

Analysis of identifiers in IoT platforms

August 2020
Haris Aftab | Komal Gilani | JiEun Lee | Lewis Nkenyereye | SeungMyeong Jeong | JaeSeung Song

The Internet of Things (IoT) provides new opportunities for different IoT platforms connecting various devices together. The need to identify those devices is the foremost important to perform any kind...

Private membership test protocol with low communication complexity

August 2020
Sara Ramezanian | Tommi Meskanen | Masoud Naderpour | Ville Junnila | Valtteri Niemi

We introduce a practical method to perform private membership tests. In this method, clients are able to test whether an item is in a set controlled by the server without revealing their query item...

Self-healing and SDN: bridging the gap

August 2020
Leonardo Ochoa-Aday | Cristina Cervelló-Pastor | Adriana Fernández-Fernández

Achieving high programmability has become an essential aim of network research due to the ever-increasing internet traffic. Software-Defined Network (SDN) is an emerging architecture aimed to address...

Share this page: