首页期刊导航|Wireless communications & mobile computing
期刊信息/Journal information
Wireless communications & mobile computing
John Wiley & Sons
Wireless communications & mobile computing

John Wiley & Sons

1530-8669

Wireless communications & mobile computing/Journal Wireless communications & mobile computingISTPSCI
正式出版
收录年代

    A LoRaWAN Testbed Design for Supporting Critical Situations: Prototype and Evaluation

    Jorge Navarro-OrtizJuan J. Ramos-MunozJuan M. Lopez-SolerCristina Cervello-Pastor...
    12页
    查看更多>>摘要:The Internet of Things is one of the hottest topics in communications today, with current revenues of $151B, around 7 billion connected devices, and an unprecedented growth expected for next years. A massive number of sensors and actuators are expected to emerge, requiring new wireless technologies that can extend their battery life and can cover large areas. LoRaWAN is one of the most outstanding technologies which fulfill these demands, attracting the attention of both academia and industry. In this paper, the design of a LoRaWAN testbed to support critical situations, such as emergency scenarios or natural disasters, is proposed. This self-healing LoRaWAN network architecture will provide resilience when part of the equipment in the core network may become faulty. This resilience is achieved by virtualizing and properly orchestrating the different network entities. Different options have been designed and implemented as real prototypes. Based on our performance evaluation, we claim that the usage of microservice orchestration with several replicas of the LoRaWAN network entities and a load balancer produces an almost seamless recovery which makes it a proper solution to recover after a system crash caused by any catastrophic event.

    Energy Efficient Wireless Networks

    Yujin LimGianluigi FerrariHideyuki TakahashiRossana M. C. Andrade...
    1页
    查看更多>>摘要:As IoT services become vitalized, this leads to an explosion of sensor nodes more and more. As the energy consumption of a wireless network increases with the number of nodes, it becomes critical to reduce the energy consumption of a wireless network. The sensor nodes are required to function for from a few months to a few years without recharging once they are installed. In order to enlarge the lifetime of the nodes, an energy efficient scheme is needed to save the energy of the nodes. Now, the energy efficiency has become one of the key criteria for designing wireless networks, not only because of the environmental concerns, but also practical reasons of the nodes in wireless networks. Even though a significant number of studies taking evolutionary approaches are in progress to give advancements of the energy efficient wireless networks, much effort is still required to crystallize the energy efficient wireless networks.

    A Unified Framework for Behaviour Monitoring and Abnormality Detection for Smart Home

    Anupam GrewalManinder KaurJong Hyuk Park
    16页
    查看更多>>摘要:With the revolution in smart infrastructure in the recent past, the smart healthcare system has been paid more considerable attention. The continuous upgradation of electricity meters to smart electricity devices has probed into a new market of intelligent data analysis services, providing aid to the health care systems. This paper presents a unified framework for extracting user behaviour patterns from home-based smart electricity meter data. The structure allows exploration and integration of frequent pattern growth algorithm for pattern mining and application of a variety of machine learning algorithms for categorizing the activities into manually labelled classes along with the implementation of Local Outlier Factor method for detection of an abnormal pattern of the inhabitant of smart homes. To evaluate the proposed framework, the work is implemented on the smart electricity dataset from the United Kingdom by separating the data into four distinct data files meant for the morning, afternoon, evening, and night energy utilization records. The results show a remarkable performance of Support Vector Machine (SVM) and Multilayer Perceptron (MLP) classifiers with kappa statics greater than 0.95 for all time slots data. The resultant frequent device utilization patterns with anomaly score more than the threshold value, reflecting abnormal activity patterns, are found more in evening time data in comparison to other time slots, requiring the immediate attention of concerned healthcare authorities.

    ADAS: Adaptive Switching between Full-Duplex and MU-MIMO for Wi-Fi Networks

    Kyu-haeng Lee
    10页
    查看更多>>摘要:Full-duplex (FD) and multiuser multi-input multioutput (MU-MIMO) approaches have been attracting much attention as core technologies of next-generation Wi-Fi systems, since they have vast potential to improve communication performance. In particular, the system throughput can be significantly increased if both technologies are used in harmony, based on a solid understanding of the characteristics of each technology. To realise this, it is essential and important for a node using both technologies to acquire a priori channel and queue information about the receiving nodes. Unfortunately, it is very challenging to obtain this information in Wi-Fi networks in which there are no separate channels or proper protocols. In this paper, a new MAC protocol for Wi-Fi networks is proposed, called ADAS, which selects the transmission strategy that best matches the given network environment. By fully utilising the conventional CSI acquisition protocol, an ADAS access point (AP) effectively obtains the necessary information and exploits it appropriately, in order to yield higher throughput gains. Through extensive Matlab simulations, the author proves that ADAS maintains high system throughputs for dynamic network changes.

    Joint Relay Selection and Power Allocation for the Physical Layer Security of Two-Way Cooperative Relaying Networks

    Lei PanZan LiZhengyuan WangFenggan Zhang...
    7页
    查看更多>>摘要:In this paper, we investigate the physical layer security of cooperative two-way relay transmission systems using the amplify-and-forward (AF) protocol in the presence of an eavesdropper. A joint relay selection (RS) and power allocation (PA) scheme is proposed to protect the source-destination transmission against the eavesdropper. However, due to the high computational complexity, it is difficult to obtain the optimal solution for the system secrecy rate. Fortunately, an approximate optimal solution by using the particle swarm optimization (PSO) algorithm is derived. In the simulations, we use random relay selection with optimal power allocation (RRS-OPA) and equal power allocation with optimal relay selection (EPA-ORS) as benchmark schemes to verify the effectiveness of the proposed method. The simulation results show that the proposed method outperforms both RRS-OPA and EPA-ORS and significantly improves the system performance with low complexity.

    An Evolutionary Scheme for Secondary Virtual Networks Mapping onto Cognitive Radio Substrate

    Andson BalieiroMarcos FalcaoKelvin Dias
    19页
    查看更多>>摘要:The Fifth Generation (5G) of wireless communication is envisioned to comprise heterogeneous applications, different radio access technologies (RATs), and a large demand for mobile traffic. In this respect, Wireless Virtualization (WV) and Cognitive Radio (CR) are put forward as 5G enablers for providing additional spectrum resources through dynamic spectrum access (DSA) techniques, besides dealing with heterogeneity with no hardware modification. By empowering the synergy between CR and WV, we visualize an environment denoted as Cognitive Radio Virtual Networks Environment (CRVNE) that encompasses VWNs with different access priorities, called Primary Virtual Networks (PVNs) and Secondary Virtual Networks (SVNs) that may be deployed in an overlay manner. In this scenario, the SVNs users (SUs) access the resources opportunistically, which naturally raises challenges towards the SVN mapping. In this paper, we revisit our previous letter that models the interactions between PUs and SUs in a CRVNE and analyzes a proposed formulation for collision probability during the SVN mapping process. The current work is pioneer as it presents a comprehensive approach to the SVNs mapping problem; models, validates, and analyzes additional performance metrics such as SU blocking and SU dropping probabilities and joint utilization; formulates the SVNs mapping as a multiobjective problem; and proposes an evolutionary scheme based on Genetic Algorithms (GAs) to solve it. The results show that the proposed scheme outperforms the alternative method in terms of collision, SU dropping, SU blocking probabilities, and joint utilization under different primary and secondary loads.

    An Interference-Aware Rate and Channel Adaptation Scheme for Dense IEEE 802.11n Networks

    Tingpei HuangShibao LiXiaoxuan LuShaoshu Gao...
    14页
    查看更多>>摘要:Rate adaptation, which dynamically chooses transmission rate provided at the physical layer according to the current channel conditions, is a fundamental resource management issue in IEEE 802.11 networks with the goal of maximizing the network throughput. Traditional rate adaptation algorithms for IEEE 802.11n networks do not consider the interference problem, which becomes much more serious due to the rapid deployment of IEEE 802.11n devices and large number of mobile terminals. In this paper, an interference-aware rate and channel adaptation scheme RaCA for intensive IEEE 802.11n networks was proposed. Firstly, RaCA leverages RSSI and CSI information together to measure the current channel conditions at the receiver side. RSSI is a coarsegrained indicator and CSI is a fine-grained indicator. Secondly, a two-stage rate adaptation scheme TSRA was designed, which can quickly adapt to optimal bit rate based on RSSI and CSI information. Finally, a quorum-based channel adaptation algorithm QCA was proposed, which does not need control channel. If channel suffers severe interferences, RaCA calls QCA to choose another channel to work on. Simulation and testbed implementation results demonstrate that RaCA achieves significant throughput gain over SampleLite and Minstrel-HT.

    Performance Analysis for Downlink MIMO-NOMA in Millimeter Wave Cellular Network with D2D Communications

    Jianguo LiXiangming LiAihua WangNeng Ye...
    11页
    查看更多>>摘要:Enabling nonorthogonal multiple access (NOMA) in device-to-device (D2D) communications under the millimeter wave (mmWave) multiple-input multiple-output (MIMO) cellular network is of critical importance for 5G wireless systems to support low latency, high reliability, and high throughput radio access. In this paper, the closed-form expressions for the outage probability and the ergodic capacity in downlink MIMO-NOMA mmWave cellular network with D2D communications are considered, which indicates that NOMA outperforms TDMA. The influencing factors of performance, such as transmission power and antenna number, are also analyzed. It is found that higher transmission power and more antennas in the base station can decrease the outage probability and enhance the ergodic capacity of NOMA.

    A Fog Computing-Based Architecture for Medical Records Management

    Cicero A. SilvaGibeon S. AquinoSavio R. M. MeloDannylo J. B. Egidio...
    16页
    查看更多>>摘要:The aging of the world's population and the growth in the number of people with chronic diseases have increased expenses with medical care. Thus, the use of technological solutions has been widely adopted in the medical field to improve the patients' health. In this context, approaches based on Cloud Computing have been used to store and process the information generated in these solutions. However, using Cloud can create delays that are intolerable for medical applications. Thus, the Fog Computing paradigm emerged as an alternative to overcome this problem, bringing computation and storage closer to the data sources. However, managing medical data stored in Fog is still a challenge. Moreover, characteristics of availability, performance, interoperability, and privacy need to be considered in approaches that aim to explore this problem. So, this article shows a software architecture based on Fog Computing and designed to facilitate the management of medical records. This architecture uses Blockchain concepts to provide the necessary privacy features and to allow Fog Nodes to carry out the authorization process in a distributed way. Finally, this paper describes a case study that evaluates the performance, privacy, and interoperability requirements of the proposed architecture in a home-centered healthcare scenario.

    Enhancing Offloading Systems with Smart Decisions, Adaptive Monitoring, and Mobility Support

    Paulo A. L. RegoFernando A. M. TrintaMasum Z. HasanJose N. de Souza...
    18页
    查看更多>>摘要:Mobile cloud computing is an approach for mobile devices with processing and storage limitations to take advantage of remote resources that assist in performing computationally intensive or data-intensive tasks. The migration of tasks or data is commonly referred to as offloading, and its proper use can bring benefits such as performance improvement or reduced power consumption on mobile devices. In this paper, we face three challenges for any offloading solution: the decision of when and where to perform offloading, the decision of which metrics must be monitored by the offloading system, and the support for user's mobility in a hybrid environment composed of cloudlets and public cloud instances. We introduce novel approaches based on machine learning and software-defined networking techniques for handling these challenges. In addition, we present details of our offloading system and the experiments conducted to assess the proposed approaches.