By Topic

Wireless Communications, IEEE

Issue 6 • Date December 2009

Filter Results

Displaying Results 1 - 16 of 16
  • IEEE Wireless Communications - Front cover

    Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (1384 KB)  
    Freely Available from IEEE
  • Table of contents

    Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (45 KB)  
    Freely Available from IEEE
  • Vehicular Ad Hoc networks: Communications on the road [Message from the Editor-in-Chief]

    Page(s): 2 - 3
    Save to Project icon | Request Permissions | PDF file iconPDF (1301 KB)  
    Freely Available from IEEE
  • Wireless innovation and spectrum policy: FCC opens a new inquiry [Spectrum Policy and Regulatory Issues]

    Page(s): 4
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (50 KB)  

    In the previous column [1] we introduced the Federal Communications Commission's August 2009 Notice of Inquiry on "Fostering Innovation and Investment in the Wireless Communications Market" [2]. We boldly predicted that the column would be printed after the comment period closed ¿ we were wrong. Due to timely publishing at the IEEE and time extensions at FCC, the issue with the column was delivered a few days before reply comments closed. While we normally do not want to deal with the same issue in consecutive columns, wireless innovation is so key to so much of the readership that we are using this column as an update. While this literally deals with a U.S. domestic regulatory issue, it should be of interest to much of the readership of this publication since the United States is a large market for wireless products, and many wireless policy trends that start in the U.S. forum are often considered by other countries for new approaches to domestic spectrum policy. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile broadband - where the next generation leads us [Industry Perspectives]

    Page(s): 6 - 9
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (158 KB) |  | HTML iconHTML  

    One hundred fifty million users worldwide today benefit from mobile broadband services enabled by Third Generation Partnership Project (3GPP) wideband code-division multiple access high-speed packet access (WCDMA-HSPA) systems to browse the Internet, send and receive emails using wireless HSPA-enabled notebooks or using USB dongles, download video and music to phones, and more. The number of HSPA subscriptions tripled in 2008, and new services and applications are proliferating. Mobile value added services and applications supporting the banking, gaming, and health categories are emerging segments of huge importance where growth is anticipated. Data traffic in mobile networks is rising exponentially in many cases and has overtaken voice in terms of total bits carried over radio networks. Revenues are falling thanks to competition, and the opening of new market segments and opportunities. Even in difficult economic times, demand for high-speed mobile Internet access is soaring. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Guest editorial: On-the-road communications

    Page(s): 10 - 11
    Save to Project icon | Request Permissions | PDF file iconPDF (191 KB)  
    Freely Available from IEEE
  • A survey on vehicle-to-vehicle propagation channels

    Page(s): 12 - 22
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1969 KB) |  | HTML iconHTML  

    Traffic telematics applications are currently under intense research and development for making transportation safer, more efficient, and more environmentally friendly. Reliable traffic telematics applications and services require vehicle-to-vehicle wireless communications that can provide robust connectivity, typically at data rates between 1 and 10 Mb/s. The development of such VTV communications systems and standards require, in turn, accurate models for the VTV propagation channel. A key characteristic of VTV channels is their temporal variability and inherent non-stationarity, which has major impact on data packet transmission reliability and latency. This article provides an overview of existing VTV channel measurement campaigns in a variety of important environments, and the channel characteristics (such as delay spreads and Doppler spreads) therein. We also describe the most commonly used channel modeling approaches for VTV channels: statistical as well as geometry-based channel models have been developed based on measurements and intuitive insights. Extensive references are provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Development of a CDMA intervehicle communications system for driving safety support

    Page(s): 24 - 31
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (779 KB) |  | HTML iconHTML  

    Driving safety support is one of the most attractive applications of an intervehicle communications system. Real-time and reliable packet exchange among vehicles is key to offering timely warnings to drivers in order to avoid fatal accidents. In this article we introduce multicarrier multicode spread Aloha (MM-SA) system, an intervehicle communications system developed to satisfy challenging requirements for supporting driving safety. MM-SA is based on code-division multiple access technology, and has inherent robustness to the increase of node density as well as the hidden terminal problem. We present an overview of MM-SA system including protocol design and prototyping as well as the GUI tool, which are all developed for avoiding intersection collisions. We also present performance comparison between the MM-SA system and a CSMA-based system under a realistic accident scenario. Our evaluation results show that the MM-SA system has superior performance to the CSMA-based system, and achieves the communication performance required for driving safety support. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Control-based scheduling with QoS support for vehicle to infrastructure communications

    Page(s): 32 - 39
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (230 KB) |  | HTML iconHTML  

    This article is focused on data transmission scheduling in V2I communications, where a central station, the roadside beacon, decides how to allocate system resources among the vehicles under coverage. We consider non-safety applications whose commercial appeal is expected to accelerate the deployment of VANETs. In this case the main objective is to deliver as much information as possible during the connection lifetime of the vehicles, which is limited by their speed and the length of the road sections under coverage. In this environment the contention free poll-based access mechanism of the 802.11e standard included in current VANET specifications is especially suitable. The design of a scheduling mechanism is addressed in this article from a control theory point of view with the additional novelty of using an optimal control formulation comprising resource constraints. This design strategy allows QoS differentiation, assuring a fixed amount of bandwidth for each QoS class. The resulting algorithm not only maximizes the amount of data delivered, but also reduces performance differences between users traveling along different roads. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Traffic pattern detection in a partially deployed vehicular Ad Hoc network of vehicles

    Page(s): 40 - 46
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (753 KB) |  | HTML iconHTML  

    Knowledge about traffic conditions on the road play an important role in route planning and avoiding traffic jams. With recent developments in technology, it is possible for vehicles to be equipped with communication and GPS systems. Equipped vehicles on the road can act as nodes to form a vehicular ad hoc network. These nodes can collect information regarding traffic conditions such as position, speed, and direction from other participating nodes. Depending on the number of participating nodes in the ad hoc network, this collected information can provide useful information on driving conditions to the node collecting this information. With proper analysis this information can be used in detecting and/or predicting traffic jam conditions on freeways. In this article the traffic information gathered by a node in an ad hoc network is viewed as a snapshot in time of the current traffic conditions on the road segment. This snapshot is considered as a pattern in time of the current traffic conditions. The pattern is analyzed using pattern recognition techniques. A weight-of-evidence-based classification algorithm is presented to identify different road traffic conditions. The algorithm is tested using data generated by microscopic modeling of traffic flow for simulation of vehicle or node mobility in ad hoc networks. Test results are presented depicting different percentage levels of vehicles equipped with communication capability. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Providing location security in vehicular Ad Hoc networks

    Page(s): 48 - 55
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (549 KB) |  | HTML iconHTML  

    It is fair to say that most, if not all, VANET applications rely on accurate location information. It is therefore imperative to provide mechanisms that ensure the integrity, availability, and confidentiality of location information. In this article we present a number of location security mechanisms specifically designed for VANETs. Proposed mechanisms for location integrity range from the use of onboard radar devices and GPS to simpler methods that rely on information fusion. We also address ways to enhance the availability of location information by selecting and maintaining stable routing paths. Finally, we discuss a mechanism that promotes location confidentiality through encryption/decryption and access control using geographical information. Our location information security mechanisms meet the requirements of the Confidentiality, Integrity, and Availability (CIA) information security model. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless traffic service platform for combined vehicle-to-vehicle and vehicle-to-infrastructure communications

    Page(s): 54 - 61
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (203 KB) |  | HTML iconHTML  

    Vehicular wireless communications and vehicular ad hoc networks are nowadays widely identified enablers for improving traffic safety and efficiency, and a large number of suggestions for vehicle-to-vehicle and vehicle-to-infrastructure communication have been presented. The focus is typically on bilateral communication between two vehicles or on broadcasting information from one vehicle or infrastructure to vehicles in the surrounding area. In the Carlink project [1, 2] of the European Celtic program call 3 we have developed an intelligent hybrid wireless traffic service platform between cars supported by roadside wireless base stations. Communication between cars will be arranged in an ad hoc manner, supported by wireless base station connection to the backbone network whenever possible. The platform consists of a specific set of services (e.g., local road weather service and incident warning service), but a variety of services can be integrated to this kind of a system. The ultimate goal was to enhance traffic safety and smoothness, but also to generate a completely new communication entity, allowing new types of applications, services, and business opportunities. In this article we present the concept and example services of the Carlink platform. The platform simulations, field tests, and analysis show that the platform operability and efficiency are suitable for a large-scale traffic system, to be verified in the pilot system deployment. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Scalable inter-area handovers for hierarchical wireless networks

    Page(s): 62 - 68
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (262 KB) |  | HTML iconHTML  

    The aim of future IP-based wireless communications is to provide mobile users access to the desired service with the appropriate quality at any place. Besides mobility support and QoS provision, the increase of wireless heterogeneous access is equally significant for fulfilling such a vision. This increase of wireless access is associated with expanding the core IP network infrastructure, raising scalability concerns, especially when a large amount of routers are managed as a single domain. Configuring hierarchy is an essential element to scale large wireless IP networks where the impact of mobility is not yet fully explored. This article first identifies the key elements for the provision of an efficient hierarchical wireless architecture and second proposes an inter-area handover policy that improves network scalability. A simulation-based study demonstrates the contribution of the proposed approach to the reduction of mobility and routing signaling as well as MH blocking and dropping rates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Efficient data acquisition in underwater wireless sensor Ad Hoc networks

    Page(s): 70 - 78
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (515 KB) |  | HTML iconHTML  

    Data acquisition schemes that exist for terrestrial sensor networks cannot be used for underwater sensor networks (UWSNs) because of features characteristic of acoustic communication. In this article we propose an architecture for UWSNs that aims to deliver the information from under water to the surface and then to the control center from there. We formulate the mechanism using a grid pattern of local sinks on the sea surface and randomly moving sensors, forming a wireless underwater ad hoc network of sensor nodes under the sea surface. This design focuses on the important concern of information reception. We focus on the reliability of data achievable through data redundancy. The mechanism has been made self-adjusting to achieve robustness. A solution for the important problem of power management has also been proposed. As part of this work we have also designed UWSim, a simulator for use in UWSN problems. The main aim of the system we designed is to make the oil discovery process under water easier. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Clustering-driven wireless data broadcasting

    Page(s): 80 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1756 KB) |  | HTML iconHTML  

    The performance of a push-based system relies heavily on the proper scheduling of the broadcast data. To this end, the Broadcast Disks method is most commonly employed. It defines a procedure consisting of four separate algorithms: one to provide and handle the clients' feedback, another to group the data objects into disks, a third one to define their spinning velocities, and finally a Broadcast Sequence constructor algorithm. In this article we introduce and evaluate Clustering-Driven Wireless Data Broadcasting (CWDB), a complete instantiation of the Broadcast Disks method. The proposed CWDB procedure addresses the major omissions of preceding schemes, including the total lack of feedback mechanisms, extremely limited variety of spinning velocity definition algorithms, and no thorough and realistic testing of complete combinations of algorithms under various client configurations. A new efficient clustering-driven data grouping algorithm is also introduced. Extensive simulation results are presented, which indicate that the proposed CWDB is absolutely dominant over other classical methods in the vast majority of the test cases and led to very important conclusions that were previously overlooked. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Fraud in roaming scenarios: an overview

    Page(s): 88 - 94
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (224 KB) |  | HTML iconHTML  

    In the mobile telecommunications sector in general, and in the roaming scenario in particular, fraud can lead to large financial losses. This article first presents the major concerns regarding such security threats, and then proposes a classification for this type of attack, highlighting the necessity for the different players involved to take joint action. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Wireless Communications Magazine deals with all technical and policy issues related to personalization, location-independent communications in all media.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Hsiao-Hwa Chen
Cheng Kung University, Taiwan