首页期刊导航|Wireless communications & mobile computing
期刊信息/Journal information
Wireless communications & mobile computing
John Wiley & Sons
Wireless communications & mobile computing

John Wiley & Sons

1530-8669

Wireless communications & mobile computing/Journal Wireless communications & mobile computingISTPSCI
正式出版
收录年代

    Planar Lens Antenna for High Data Rate Applications

    Daniel Santillan-HaroDaniel Sanchez-EscuderosEva Antonino-DaviuMiguel Ferrando-Bataller...
    7页
    查看更多>>摘要:A low-profile lens antenna formed by 2 metallic rings with strips short-circuiting both rings is presented. The theory of characteristic modes is used to facilitate the design, optimization, and analysis of the structure. Simulations and measurements are presented for the optimized single-layer metallic lens antenna. Measured results show a large operating bandwidth (14.7% relative -14 dB impedance bandwidth) with a maximum directivity above 13.70 dBi and a return loss better than 14 dB.

    A Hybrid Predictive Strategy Carried through Simultaneously from Decision Space and Objective Space for Evolutionary Dynamic Multiobjective Optimization

    Peng XuXiaoming WuMan GuoShuai Wang...
    17页
    查看更多>>摘要:There are many issues to consider when integrating 5G networks and the Internet of things to build a future smart city, such as how to schedule resources and how to reduce costs. This has a lot to do with dynamic multiobjective optimization. In order to deal with this kind of problem, it is necessary to design a good processing strategy. Evolutionary algorithm can handle this problem well. The prediction in the dynamic environment has been the very challenging work. In the previous literature, the location and distribution of PF or PS are mostly predicted by the center point. The center point generally refers to the center point of the population in the decision space. However, the center point of the decision space cannot meet the needs of various problems. In fact, there are many points with special meanings in objective space, such as ideal point and CTI. In this paper, a hybrid prediction strategy carried through from both decision space and objective space (DOPS) is proposed to handle all kinds of optimization problems. The prediction in decision space is based on the center point. And the prediction in objective space is based on CTI. In addition, for handling the problems with periodic changes, a kind of memory method is added. Finally, to compensate for the inaccuracy of the prediction in particularly complex problems, a self-adaptive diversity maintenance method is adopted. The proposed strategy was compared with other four state-of-the-art strategies on 13 classic dynamic multiobjective optimization problems (DMOPs). The experimental results show that DOPS is effective in dynamic multiobjective optimization.

    A Flexible Network Architecture for 5G Systems

    Mehrdad ShariatOmer BulakciAntonio De DomenicoChristian Mannweiler...
    19页
    查看更多>>摘要:In this paper, we define a flexible, adaptable, and programmable architecture for 5G mobile networks, taking into consideration the requirements, KPIs, and the current gaps in the literature, based on three design fundamentals: (i) split of user and control plane, (ii) service-based architecture within the core network (in line with recent industry and standard consensus), and (iii) fully flexible support of E2E slicing via per-domain and cross-domain optimisation, devising inter-slice control and management functions, and refining the behavioural models via experiment-driven optimisation. The proposed architecture model further facilitates the realisation of slices providing specific functionality, such as network resilience, security functions, and network elasticity. The proposed architecture consists of four different layers identified as network layer, controller layer, management and orchestration layer, and service layer. A key contribution of this paper is the definition of the role of each layer, the relationship between layers, and the identification of the required internal modules within each of the layers. In particular, the proposed architecture extends the reference architectures proposed in the Standards Developing Organisations like 3GPP and ETSI, by building on these while addressing several gaps identified within the corresponding baseline models. We additionally present findings, the design guidelines, and evaluation studies on a selected set of key concepts identified to enable flexible cloudification of the protocol stack, adaptive network slicing, and inter-slice control and management.

    A Clustering Approach for Multiband Neighbor Discovery on 60 GHz WLAN

    Davi da S. BrilhanteJose F. de Rezende
    13页
    查看更多>>摘要:The 60 GHz mmWave unlicensed band has a very large spectrum available, divided into four orthogonal channels, which allows up to 7 Gbps data rate. On the other side, the propagation in the 60 GHz band is subject to severe path loss attenuation, which can be mitigated using highly directional antennas. This high directionality brings a new challenge to neighbor discovery; the devices now need to know the exact neighbors' physical location to successfully communicate with them. In order to expedite the neighbor discovery process, multiband protocols have been proposed in the literature in which a separate band is used for the exchange of control messages in an omnidirectional mode. Nonetheless, these proposals suffer from the control channel bottleneck problem due to the numerous messages that need to be exchanged in this channel. In this work, we propose a scheme that divides the network nodes in clusters and for each cluster we allocate one separate control channel and also a separate mmWave channel for beamforming only. The former separation allows decreasing the number of control messages exchanged in each control channel, and the latter allows the simultaneously execution of multiple beamforming. In conjunction to this clustering scheme, we propose a multiband protocol in which only the cluster leader performs beamforming and uses the control channel to propagate the information obtained during this process. We compare the existing protocols with our proposed clustering protocol in terms of average transmission time, overhead, and accuracy of neighbor discovery information.

    A Compact Ku-Band Active Electronically Steerable Antenna with Low-Cost 3D T/R Module

    Zheng XuChengxiang HaoKuiwen XuShichang Chen...
    8页
    查看更多>>摘要:This paper presents a novel compact Ku-band active electronically steerable antenna array design with a low-cost and integrated T/R 3D module employed for airborne synthetic aperture radar (SAR) systems. The entire system adopts 3D multilayer technology with vertical interconnection to construct the hermetically packaging RF modules. By assembling different multifunctional modules into a whole multilayer board, the 3D T/R technique greatly improves the system integration and reduces implementation cost and size. Besides, a wideband circular polarized antenna array was designed in LTCC and connected to the proposed T/R modules to form a complete AESA. The whole proposed antenna system has been fabricated and experimentally investigated. Measurement results showed very good phased array performances in terms of gain, axial ratio, and radiating patterns. The low-cost, lightweight, and low-power features exhibited by the proposed design validate its applicability for weight and power constrained platforms with great electronic steering ability.

    Priority-Based Pipelined-Forwarding MAC Protocol for EH-WSNs

    Hyung-Kun ParkKyuwook Shim
    7页
    查看更多>>摘要:To reduce the end-to-end delay in EH-WSNs (energy-harvesting wireless sensor networks), medium access control protocols using pipelined-forwarding have been introduced and studied. In real-life applications, there are several situations where it is difficult to harvest more energy than the energy consumed. Therefore, it is crucial to design a MAC protocol that allows nodes to efficiently relay data without exhausting the power in pipelined-forwarding multihop transmission. In this paper, we propose a PP-MAC (priority-based pipelined-forwarding MAC) protocol that determines the priority of relay nodes based on the residual power and energy-harvesting rate. The proposed protocol determines the probability of a node becoming a relay node based on the priority of the node and attempts to access the channel in a distributed manner. Furthermore, the PP-MAC protocol controls the sleep interval based on the power conditions of the nodes. It also minimizes the power exhaustion problem by controlling the sleep interval based on the priority of the nodes. The performance of the proposed PP-MAC was evaluated via computer simulation, and the results indicated that PP-MAC could improve the network lifetime by mitigating the power imbalance of nodes.

    A Survey on Deep Learning Techniques in Wireless Signal Recognition

    Xiaofan LiFangwei DongSha ZhangWeibin Guo...
    12页
    查看更多>>摘要:Wireless signal recognition plays an important role in cognitive radio, which promises a broad prospect in spectrum monitoring and management with the coming applications for the 5G and Internet of Things networks. Therefore, a great deal of research and exploration on signal recognition has been done and a series of effective schemes has been developed. In this paper, a brief overview of signal recognition approaches is presented. More specifically, classical methods, emerging machine learning, and deep leaning schemes are extended from modulation recognition to wireless technology recognition with the continuous evolution of wireless communication system. In addition, the opening problems and new challenges in practice are discussed. Finally, a conclusion of existing methods and future trends on signal recognition is given.

    Enhanced Android App-Repackaging Attack on In-Vehicle Network

    Yousik LeeSamuel WooJungho LeeYunkeun Song...
    13页
    查看更多>>摘要:The convergence of automobiles and ICT (information and communication technology) has become a new paradigm for the development of next-generation vehicles. In particular, connected cars represent the most in-demand automobile-ICT convergence technology. With the development of 5G technology, communication between vehicle and external device using autonomous driving and Internet of things (IoT) technology has been remarkably developed. Control of vehicles using smart phones has become a routine feature, and over 200 Android apps are in use. However, Android apps are easy to tamper by repackaging and allowing hackers to attack vehicles with using this vulnerability, which can lead to life-critical accidents. In this study, we analyze the vulnerabilities of connected car environments when connecting with IoT technologies and demonstrate the possibility of cyberattack by performing attack experiments using real cars and repackaging for commercial apps. Furthermore, we propose a realistic security technology as a countermeasure to attain safety against cyberattacks. To evaluate the safety of the proposed method, a security module is developed and a performance evaluation is conducted on an actual vehicle.

    An Empirical Study of Cross-Platform Mobile Development in Industry

    Andreas Biorn-HansenTor-Morten GronliGheorghita GhineaSahel Alouneh...
    12页
    查看更多>>摘要:The purpose of this study is to report on the industry's perspectives and opinions on cross-platform mobile development, with an emphasis on the popularity, adoption, and arising issues related to the use of technical development frameworks and tools. We designed and conducted an online survey questionnaire, for which 101 participants were recruited from various developer-oriented online forums and websites. A total of five questions are reported in this study, of which two employed a Likert scale instrument, while three were based on multiple choice. In terms of technical frameworks, we find that PhoneGap, the Ionic Framework, and React Native were the most popular in use, both in hobby projects and in professional settings. The participants report an awareness of trade-offs when embracing cross-platform technologies and consider penalties in performance and user experience to be expected. This is also in line with what is reported in academic research. We find patterns in the reported perceived issues which match both older and newer research, thus rendering the findings a point of departure for further endevours.

    Reliable Energy-Aware Routing Protocol in Delay-Tolerant Mobile Sensor Networks

    Xuebin MaXiaojuan ZhangRen Yang
    11页
    查看更多>>摘要:In the data transmission process of delay-tolerant mobile sensor networks, data is easily lost, and the network lifetime decreases due to energy depletion by the nodes. We propose a reliable energy-aware routing protocol, called RER. To ensure the reliability of message transmission, a hop-by-hop retransmission acknowledgement mechanism is introduced in the RER. Second, we design a metric called Reliable Energy Cost Based on Distance (RECBD) to aid RER, which is determined by analysing the distance between the current node and the relay node, the distance between the relay node and the sink node, the current residual energy of the current node, and the link quality. Finally, the message is routed based on the RECBD to improve reliability and reduce energy consumption. The simulation results show that the routing protocol can improve the energy utilization of the sensor nodes and prolong the network lifetime while guaranteeing the delivery ratio and reliability.