English English | 中文 中文

Recent Digital Communications and Networks Articles

Recently published articles from Digital Communications and Networks.

A mobility compensation method for drones in SG-eIoT

Available online 7 August 2020
Liguo Weng | Yanghui Zhang | Yong Yang | Min Fang | Zelong Yu

To fulfill the typical aims of smart grid, the concept of electricity Internet of Things (eIoT) has been proposed to assist the monitoring and inspection of power transmission line state, and optimize...

Sparse array of sub-surface aided blockage-free multi-user mmWave communication systems

Available online 4 August 2020
Weicong Chen | Xi Yang | Shi Jin | Pingping Xu

Recently, Reconfigurable Intelligent Surfaces (RISs) have drawn intensive attention in the realization of the smart radio environment. However, existing works mainly consider the RIS as a whole uniform...

iPAS: A Deep Monte Carlo Tree Search based Intelligent Pilot-Power Allocation Scheme for Massive MIMO System

Available online 4 August 2020
Jienan Chen | Siyu Luo | Lin Zhang | Cong Zhang | Bin Cao

Massive Multiple-Input-Multiple-Output (MIMO) is a promising technology to meet the demand for connection of massive devices and high data capacity for mobile networks in the next generation communication...

Substring-searchable attribute-based encryption and its application for IoT devices

Available online 31 July 2020
Xi Sun | Hao Wang | Xiu Fu | Hong Qin | Mei Jiang | Likun Xue | Xiaochao Wei

With the development of big data and the cloud computing technology, more and more users choose to store data on cloud servers, which brings a lot of convenience to their management and use of data,...

3D placement of unmanned aerial vehicles and partially overlapped channel assignment for throughput maximization

Available online 28 July 2020
Chengming Zou | Xiaoxiao Li | Xing Liu | Mengya Zhang

This paper investigates a wireless system with multi-Unmanned Aerial Vehicle (UAV) for improving the overall throughput. In contrast to prior studies that optimize the locations of UAVs and channel...

A physical layer security scheme for full-duplex communication systems with residual self-interference and no eavesdropping CSI

Available online 23 July 2020
Weijia Lei | Yang Zhou | Xiuzhen Lin

We discuss the physical layer security scheme in the Full-Duplex (FD) MIMO point-to-point two-way communication system with residual self-interference, in which legitimate nodes send confidential information...

6G perspectives: Techniques and challenges

Available online 21 July 2020
Tao Jiang | Tony Q.S. Quek | Zhiguo Ding | Mugen Peng

Pervasive intelligent endogenous 6G wireless systems: Prospects, theories and key technologies

Available online 18 July 2020
Yun Chen | Wenfeng Liu | Zhiang Niu | Zhongxiu Feng | Qiwei Hu | Tao Jiang

The worldwide large-scale commercial deployment of 5G has commenced in 2020 for supporting enhanced Mobile BroadBand (eMBB), ultra-Reliable and Low-Latency Communications (uRLLC), and massive Machine-Type...

Blockchain-enabled resource management and sharing for 6G communications

Available online 15 July 2020
Hao Xu | Paulo Valente Klaine | Oluwakayode Onireti | Bin Cao | Muhammad Imran | Lei Zhang

The sixth-generation (6G) network must provide better performance than previous generations to meet the requirements of emerging services and applications, such as multi-gigabit transmission rate, higher...

Security and privacy in 6G networks: New areas and new challenges

Available online 15 July 2020
Minghao Wang | Tianqing Zhu | Tao Zhang | Jun Zhang | Shui Yu | Wanlei Zhou

As more and more 5G networks are deployed, the limitations of 5G networks are not only discovered, but also promoting exploratory research on 6G networks as a next-generation solution. These investigations...

Intent-based networks for 6G: Insights and challenges

Available online 15 July 2020
Yiming Wei | Mugen Peng | Yaqiong Liu

Intent-Based Networks (IBNs), which are originally proposed to introduce Artificial Intelligence (AI) into the sixth-generation (6G) wireless networks, can effectively solve the challenges of traditional...

Joint resource allocation for hybrid NOMA-assisted MEC in 6G networks

Available online 12 July 2020
Haodong Li | Fang Fang | Zhiguo Ding

Multi-access Edge Computing (MEC) is an essential technology for expanding computing power of mobile devices, which can combine the Non-Orthogonal Multiple Access (NOMA) in the power domain to multiplex...

A Novel Nest-Based Scheduling Method for Mobile Wireless Body Area Networks

Available online 12 July 2020
Zhijun Xie | Guangyan Huang | Roozbeh Zarei | Zhenyan Ji | Hongwu Ye | Jing He

Wireless-body-area-networks (WBANs) comprise various types of sensors to monitor and collect various vital signals, such as blood pressure, pulse, heartbeat, body temperature, and blood sugar. A dense...

Lightweight authentication protocol for e-health clouds in IoT based applications through 5G technology

Available online 11 July 2020
Minahil | Muhammad Faizan Ayub | Khalid Mahmood | Saru Kumari | Arun Kumar Sangaiah

Modern information technology has been utilized progressively for the storage and distribution of the large amount of healthcare data to reduce cost and improve the medical facilities. In this context,...

A secure spectrum auction scheme without the trusted party based on the smart contract

Available online 10 July 2020
Jiaqi Wang | Ning Lu | Qingfeng Cheng | Lu Zhou | Wenbo Shi

With the development of communication 5g networks and technologies, there is an increasing shortage of spectrum resources. The scarcity of the spectrum resource makes market-driven spectrum auction...

On recommendation-aware content caching for 6G: An artificial intelligence and optimization empowered paradigm

Available online 10 July 2020
Yaru Fu | Khai Nguyen Doan | Tony Q.S. Quek

Recommendation-aware Content Caching (RCC) at the edge enables a significant reduction of the network latency and the backhaul load, thereby invigorating ubiquitous latency-sensitive innovative services....

Design and optimization of an integrated MEMS gas chamber with high transmissivity

Available online 7 July 2020
Yang Jing | Cheng Yuhua | Yuan Yupeng | Li Xiaofei | Zhang Zuwei | Xu Ming | Wang Dengpan | Mu Jiangdong | Mei Yong | Zhang Yuzhe

Non-Dispersive InfraRed (NDIR) gas sensor is widely used for gas detection in collieries and the gas chemical industry, etc. The performance of NDIR gas sensor depends on the volume, optical length...

Performance analysis of a hybrid optical CDMA/DWDM system against inter-symbol interference and four wave mixing

Available online 7 July 2020
Naif Alsowaidi | Tawfig Eltaif | Mohd Ridzuan Mokhtar

This paper reports the implementation and theoretical model for analyzing an optical CDMA/DWDM hybrid system to reduce two major problems, the Inter-Symbol Interference (ISI) and the Four Wave Mixing...

Blockchain-based data transmission control for Tactical Data Link

Available online 27 June 2020
Wei Feng | Yafeng Li | Xuetao Yang | Zheng Yan | Liang Chen

Tactical Data Link (TDL) is a communication system that utilizes a particular message format and a protocol to transmit data via wireless channels in an instant, automatic, and secure way. So far, TDL...

Privacy preservation in permissionless blockchain: A survey

Available online 25 June 2020
Li Peng | Wei Feng | Zheng Yan | Yafeng Li | Xiaokang Zhou | Shohei Shimizu

Permissionless blockchain, as a kind of distributed ledger, has gained considerable attention because of its openness, transparency, decentralization, and immutability. Currently, permissionless blockchain...

Service aware 6G: An intelligent and open network based on convergence of communication, computing and caching

Available online 20 June 2020
Yiqing Zhou | Ling Liu | Lu Wang | Ning Hui | Xinyu Cui | Jie Wu | Yan Peng | Yanli Qi | Chengwen Xing

With the proliferation of the Internet of Things (IoT), various services are emerging with totally different features and requirements, which cannot be supported by the current fifth generation of mobile...

Clustering-based label estimation for network anomaly detection

Available online 20 June 2020
Sunhee Baek | Donghwoon Kwon | Sang C. Suh | Hyunjoo Kim | Ikkyun Kim | Jinoh Kim

A substantial body of work has been done to identify network anomalies using supervised and unsupervised learning techniques with their unique strengths and weaknesses. In this work, we propose a new...

A time-aware query-focused summarization of an evolving microblogging stream via sentence extraction

Available online 12 June 2020
Fei Geng | Qilie Liu | Ping Zhang

With the number of social media users ramping up, microblogs are generated and shared at record levels. The high momentum and large volumes of short texts bring redundancies and noises, in which the...

An efficient hash-based authenticated key agreement scheme for multi-server architecture resilient to key compromise impersonation

Available online 11 June 2020
Inam ul haq | Jian Wang | Youwen Zhu | Saad Maqbool

During the past decade, rapid advances in wireless communication technologies have made it possible for users to access desired services using hand-held devices. Service providers have hosted multiple...

SMDP-based sleep policy for base stations in heterogeneous cellular networks

Available online 10 June 2020
Jing Wu | Yun Li | Hongcheng Zhuang | Zhiwen Pan | Guoyin Wang | Yongju Xian

A dense heterogeneous cellular network can effectively increase the system capacity and enhance the network coverage. It is a key technology for the new generation of the mobile communication system....

A light-weight on-line action detection with hand trajectories for industrial surveillance

Available online 4 June 2020
Peiyuan Ni | Shilei Lv | Xiaoxiao Zhu | Qixin Cao | Wenguang Zhang

Most of the intelligent surveillances in the industry only care about the safety of the workers. It is meaningful if the camera can know what, where and how the worker has performed the action in real...

Performance evaluation of two-way with energy harvesting and hardware noises

Available online 1 June 2020
Nguyen Tien Tung | Pham Minh Nam | Phu Tran Tin

In this paper, we propose a Two-Way Cognitive Relay Network (TWCRN) where the secondary users operate on an underlay mode to access the licensed bands. In the proposed protocols, two secondary sources...

Recent advances in mobile edge computing and content caching

May 2020
Sunitha Safavat | Naveen Naik Sapavath | Danda B. Rawat

The demand for digital media services is increasing as the number of wireless subscriptions is growing exponentially. In order to meet this growing need, mobile wireless networks have been advanced...

A new type of blockchain for secure message exchange in VANET

May 2020
Rakesh Shrestha | Rojeena Bajracharya | Anish P. Shrestha | Seung Yeob Nam

In the Vehicular Ad-hoc NETworks (VANET), the collection and dissemination of life-threatening traffic event information by vehicles are of utmost importance. However, traditional VANETs face several...

Anonymous data collection scheme for cloud-aided mobile edge networks

May 2020
Anxi Wang | Jian Shen | Chen Wang | Huijie Yang | Dengzhi Liu

With the rapid spread of smart sensors, data collection is becoming more and more important in Mobile Edge Networks (MENs). The collected data can be used in many applications based on the analysis...

Distributed privacy protection strategy for MEC enhanced wireless body area networks

May 2020
Yan Zhen | Hanyong Liu

With the rapid development and widespread application of Wireless Body Area Networks (WBANs), the traditional centralized system architecture cannot handle the massive data generated by the edge devices....

The effect of propagation delay on the dynamic evolution of the Bitcoin blockchain

May 2020
Moustapha BA

This paper analyzes the selfish-mine strategy in the Bitcoin blockchain introduced in 2013 by I. Eyal and E. G. Sirer. This strategy could be used by a colluding pool of miners to earn more than their...

Tracing manufacturing processes using blockchain-based token compositions

May 2020
Martin Westerkamp | Friedhelm Victor | Axel Küpper

Supply chain traceability is one of the most promising use cases to benefit from characteristics of blockchain, such as decentralization, immutability and transparency, not required to build prior trust...

A survey of edge computing-based designs for IoT security

May 2020
Kewei Sha | T. Andrew Yang | Wei Wei | Sadegh Davari

Pervasive IoT applications enable us to perceive, analyze, control, and optimize the traditional physical systems. Recently, security breaches in many IoT applications have indicated that IoT applications...

Similar physical entity matching strategy for mobile edge search

May 2020
Puning Zhang | Xuyuan Kang

In recent years, a large number of intelligent sensing devices have been deployed in the physical world, which brings great difficulties to the existing entity search. With the increase of the number...

An architecture for digital hate content reduction with mobile edge computing

May 2020
Naganna Chetty | Sreejith Alathur

Mobile devices with social media applications are the prevalent user equipment to generate and consume digital hate content. The objective of this paper is to propose a mobile edge computing architecture...

Mobility-driven user-centric AP clustering in mobile edge computing-based ultra-dense networks

May 2020
Shuxin He | Tianyu Wang | Shaowei Wang

ultra-Dense Network (UDN) has been envisioned as a promising technology to provide high-quality wireless connectivity in dense urban areas, in which the density of Access Points (APs) is increased up...

A systematic literature review of blockchain cyber security

May 2020
Paul J. Taylor | Tooska Dargahi | Ali Dehghantanha | Reza M. Parizi | Kim-Kwang Raymond Choo

Since the publication of Satoshi Nakamoto's white paper on Bitcoin in 2008, blockchain has (slowly) become one of the most frequently discussed methods for securing data storage and transfer through...

Attacks and defences on intelligent connected vehicles: a survey

Available online 24 May 2020
Mahdi Dibaei | Xi Zheng | Kun Jiang | Robert Abbas | Shigang Liu | Yuexin Zhang | Yang Xiang | Shui Yu

Intelligent vehicles are advancing at a fast speed with the improvement of automation and connectivity, which opens up new possibilities for different cyber-attacks, including in-vehicle attacks (e.g.,...

Generating routes for autonomous driving in vehicle-to-infrastructure communications

Available online 11 May 2020
Jianjun Yang | Tinggui Chen | Bryson Payne | Ping Guo | Yanping Zhang | Juan Guo

The study of vehicular networks has attracted considerable interest in academia and the industry. In the broad area, connected vehicles and autonomous driving are technologies based on wireless data...

Identifying influential nodes in social networks via community structure and influence distribution difference

Available online 4 May 2020
Zufan Zhang | Xieliang Li | Chenquan Gan

This paper aims to effectively solve the problem of the influence maximization in social networks. For this purpose, an influence maximization method that can identify influential nodes via the community...

An intelligent task offloading algorithm (iTOA) for UAV edge computing network

Available online 4 May 2020
Jienan Chen | Siyu Chen | Siyu Luo | Qi Wang | Bin Cao | Xiaoqian Li

Unmanned Aerial Vehicle (UAV) has emerged as a promising technology for the support of human activities, such as target tracking, disaster rescue, and surveillance. However, these tasks require a large...

Energy efficient fuzzy-based DASH adaptation algorithm

Available online 29 April 2020
Moad Mowafi | Eyad Taqieddin | Hiba Al-Dahoud

With the expansive demand for video streaming over mobile networks, it is necessary to adopt schemes that balance the need for high video quality with the available network resources when streaming...

An efficient voting based decentralized revocation protocol for vehicular ad hoc networks

Available online 22 April 2020
Miraj Asghar | Lei Pan | Robin Doss

Vehicular Ad-hoc NETworks (VANETs) enable cooperative behaviors in vehicular environments and are seen as an integral component of Intelligent Transportation Systems (ITSs). The security of VANETs is...

Massive MIMO system lower bound spectral efficiency analysis with precoding and perfect CSI

Available online 14 April 2020
Tasher Ali Sheikh | Joyatri Bora | Md Anwar Hussain

The analytical lower bound of Spectral Efficiency (SE) of downlink transmission of the Massive Multiple Input Multiple Output (Ma-MIMO) system is analyzed. In this paper, we derive some novel and approximate...

New bounds on the mutual information for discrete constellations and application to wireless channel estimation

Available online 11 April 2020
A. Taufiq Asyhari

The lack of closed-form expressions of the mutual information for discrete constellations has limited its uses for analyzing reliable communication over wireless fading channels. To address this issue,...

Share this page: