首页期刊导航|Eurasip Journal on Wireless Communications and Networking
期刊信息/Journal information
Eurasip Journal on Wireless Communications and Networking
Springer
Eurasip Journal on Wireless Communications and Networking

Springer

1687-1472

Eurasip Journal on Wireless Communications and Networking/Journal Eurasip Journal on Wireless Communications and NetworkingEIISTPSCI
正式出版
收录年代

    Inductive coupling for wireless power transfer and near-field communication

    Degen Christoph
    20页
    查看更多>>摘要:Abstract This paper gives an overview of optimizing wireless power transfer systems using magnetic coupling. Optimization aims to maximize either the power transfer efficiency or the transferred power. The resulting load calculation and matching strategies are revisited. Moreover, the coupling system is described, starting with its equivalent circuit and scattering parameters. In addition to wireless power transfer, communication in RFID and NFC systems and its frequency characteristics and bandwidth issues are highlighted. The focus in this paper is on load modulation for data transfer between a tag and reader. For this purpose, subcarrier voltages are derived using time-domain as well as frequency-domain signal analysis.

    Design of remote control device using wireless sensor network and its use in intelligent monitoring of farmland information

    Zhang JianWang Ying
    13页
    查看更多>>摘要:Abstract The purpose is to control the growth state of crops remotely, design intelligent detection application of farmland information and improve the efficiency of agricultural information management. Wireless sensor technology is applied to remote control device. First, through the integration of the system functions that need to be completed in the farmland remote monitoring, the module requirements of the device are further determined. Finally, the overall design is determined. From the aspects of hardware, such as the selection of sensors, RF transceivers and software (such as data processing center module), remote control device is designed, and the detection and collection of farmland real-time information is completed. The results show that the communication distance of wireless sensor nodes can reach 215?m under the test condition of 0.5?m in open space. The research content can help people improve the understanding of crop growth environment and growth situation, and then help people improve work efficiency, and finally contribute to the process of agricultural informatization.

    Improving the performance of a radio-frequency localization system in adverse outdoor applications

    de Sousa Marcelo N.Sant’Ana RicardoFernandes Rigel P.Duarte Julio Cesar...
    26页
    查看更多>>摘要:Abstract In outdoor RF localization systems, particularly where line of sight can not be guaranteed or where multipath effects are severe, information about the terrain may improve the position estimate’s performance. Given the difficulties in obtaining real data, a ray-tracing fingerprint is a viable option. Nevertheless, although presenting good simulation results, the performance of systems trained with simulated features only suffer degradation when employed to process real-life data. This work intends to improve the localization accuracy when using ray-tracing fingerprints and a few field data obtained from an adverse environment where a large number of measurements is not an option. We employ a machine learning (ML) algorithm to explore the multipath information. We selected algorithms random forest and gradient boosting; both considered efficient tools in the literature. In a strict simulation scenario (simulated data for training, validating, and testing), we obtained the same good results found in the literature (error around 2 m). In a real-world system (simulated data for training, real data for validating and testing), both ML algorithms resulted in a mean positioning error around 100 ,m. We have also obtained experimental results for noisy (artificially added Gaussian noise) and mismatched (with a null subset of) features. From the simulations carried out in this work, our study revealed that enhancing the ML model with a few real-world data improves localization’s overall performance. From the machine ML algorithms employed herein, we also observed that, under noisy conditions, the random forest algorithm achieved a slightly better result than the gradient boosting algorithm. However, they achieved similar results in a mismatch experiment. This work’s practical implication is that multipath information, once rejected in old localization techniques, now represents a significant source of information whenever we have prior knowledge to train the ML algorithm.

    User selection and dynamic power allocation in the SWIPT-NOMA relay system

    Xie XianzhongLi MinShi ZhaoyuanTang Hong...
    19页
    查看更多>>摘要:Abstract Non-orthogonal multiple access (NOMA) technology provides an effective solution to massive access with a high data rate demand in new-generation mobile networks. The paper combinations with NOMA and simultaneous wireless information and power transfer (SWIPT) relay to maximize the sum rate in the downlink system. To that end, it is critical how to select effectively users access system and power allocation for the access user. This paper proposes a user selection and dynamic power allocation (USDPA) scheme in the NOMA-SWIPT relay system based on neural network because traditional optimization methods have difficulty solving nonlinear and non-convex problems. We establish a user selection network utilizing a deep neural network (DNN) and propose a power allocation network using deep reinforcement learning. The simulation results show that the proposed scheme achieves better performance than other related schemes, especially for high quality of service requirements.

    Blockchain-based IoT device identification and management in 5G smart grid

    Wang DongWang HuanjuanFu Yuchen
    19页
    查看更多>>摘要:Abstract This work investigates the unified coding and identification of smart grid IoT devices, as more and more IoT devices in smart grid need to be managed and controlled. We combine blockchain technology with 5G MEC to realize the connection of massive power IoT devices at the edge of 5G network. Due to blockchain’s distributed storage and credibility, it is used to identify and register IoT devices in smart grid, ensuring the reliability and accuracy of smart grid IoT devices management. In this paper, we propose a hybrid blockchain mechanism based on 5G MEC smart grid, where both public blockchain and private blockchain are deployed on the MEC gateway/server. To facilitate the data searching and extracting, we endeavor to build a blockchain explorer indexed by IoT device identifier. After that, we study the typical consensus algorithms in the blockchain such as PoW, PoS, DPoS, PDFT, and discuss their feasibility in the hybrid blockchain. Finally, we analyzed and compared the performance of different consensus algorithms from the perspective of average computing time and average time to agreement.

    Correction to: Next-generation UWB antennas gadgets for human health care using SAR

    Ali Aysha MaryamAl Ghamdi Mohammed A.Iqbal Muhammad MunwarKhalid Shehzad...
    1页
    查看更多>>摘要:An amendment to this paper has been published and can be accessed via the original article.

    Location-sharing protocol for privacy protection in mobile online social networks

    Ruan OuZhang LixiaoZhang Yuanyuan
    14页
    查看更多>>摘要:Abstract Location-based services are becoming more and more popular in mobile online social networks (mOSNs) for smart cities, but users’ privacy also has aroused widespread concern, such as locations, friend sets and other private information. At present, many protocols have been proposed, but these protocols are inefficient and ignore some security risks. In the paper, we present a new location-sharing protocol, which solves two issues by using symmetric/asymmetric encryption properly. We adopt the following methods to reduce the communication and computation costs: only setting up one location server; connecting social network server and location server directly instead of through cellular towers; avoiding broadcast encryption. We introduce dummy identities to protect users’ identity privacy, and prevent location server from inferring users’ activity tracks by updating dummy identities in time. The details of security and performance analysis with related protocols show that our protocol enjoys two advantages: (1) it’s more efficient than related protocols, which greatly reduces the computation and communication costs; (2) it satisfies all security goals; however, most previous protocols only meet some security goals.

    EURASIP Journal on Wireless Communications and Networking: Special Issue on EuCNC 2019: “Enabling Technologies for Networks beyond 5G”

    Correia Luis M.
    2页

    Authentication strategies in vehicular communications: a taxonomy and framework

    Simpson LeonieBoyen XavierFoo ErnestPieprzyk Josef...
    50页
    查看更多>>摘要:Abstract In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems known as Vehicular Communication (VC) systems. Vehicles communicate with other vehicles and with nearby fixed equipment to support different applications, including those which increase driver awareness of the surroundings. This should result in improved safety and may optimize traffic. However, VC systems are vulnerable to cyber attacks involving message manipulation. Research aimed at tackling this problem has resulted in the proposal of multiple authentication protocols. Several existing survey papers have attempted to classify some of these protocols based on a limited set of characteristics. However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation. Most existing classifications either use computation complexity of cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication. This paper provides such a framework, proposing a new taxonomy to enable a consistent means of classifying authentication schemes based upon seven main criteria. The main contribution of this study is a framework to enable protocol designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. Our framework can be applied in design, making choices appropriate for the intended context in both intra-vehicle and inter-vehicle communications. We demonstrate the application of our framework using two different types of case study: individual analysis and hypothetical design. Additionally, this work makes several related contributions. We present the network model, outline the applications, list the communication patterns and the underlying standards, and discuss the necessity of using cryptography and key management in VC systems. We also review the threats, authentication, and privacy requirements in vehicular networks.

    Secure big data ecosystem architecture: challenges and solutions

    Anwar Memoona J.Gill Asif Q.Hussain Farookh K.Imran Muhammad...
    30页
    查看更多>>摘要:Abstract Big data ecosystems are complex data-intensive, digital–physical systems. Data-intensive ecosystems offer a number of benefits; however, they present challenges as well. One major challenge is related to the privacy and security. A number of privacy and security models, techniques and algorithms have been proposed over a period of time. The limitation is that these solutions are primarily focused on an individual or on an isolated organizational context. There is a need to study and provide complete end-to-end solutions that ensure security and privacy throughout the data lifecycle across the ecosystem beyond the boundary of an individual system or organizational context. The results of current study provide a review of the existing privacy and security challenges and solutions using the systematic literature review (SLR) approach. Based on the SLR approach, 79 applicable articles were selected and analyzed. The information from these articles was extracted to compile a catalogue of security and privacy challenges in big data ecosystems and to highlight their interdependencies. The results were categorized from theoretical viewpoint using adaptive enterprise architecture and practical viewpoint using DAMA framework as guiding lens. The findings of this research will help to identify the research gaps and draw novel research directions in the context of privacy and security in big data-intensive ecosystems.