By Topic

Communications and Networks, Journal of

Issue 4 • Date Aug. 2012

Filter Results

Displaying Results 1 - 21 of 21
  • Secure communication in multiple relay networks through decode-and-forward strategies

    Publication Year: 2012 , Page(s): 352 - 363
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1042 KB) |  | HTML iconHTML  

    In this paper, we study the role of cooperative relays to provide and improve secure communication rates through decode-and-forward (DF) strategies in a full-duplex multiple relay network with an eavesdropper. We consider the DF scheme as a basis for cooperation and propose several strategies that implement different versions of this scheme suited for cooperation with multiple relays. Our goal is ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Combined relay selection and cooperative beamforming for physical layer security

    Publication Year: 2012 , Page(s): 364 - 373
    Cited by:  Papers (8)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (995 KB) |  | HTML iconHTML  

    In this paper, we propose combined relay selection and cooperative beamforming schemes for physical layer security. Generally, high operational complexity is required for cooperative beamforming with multiple relays because of the required information exchange and synchronization among the relays. On the other hand, while it is desirable to reduce the number of relays participating in cooperative ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Transmitter beamforming and artificial noise with delayed feedback: Secrecy rate and power allocation

    Publication Year: 2012 , Page(s): 374 - 384
    Cited by:  Papers (5)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1442 KB) |  | HTML iconHTML  

    Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-input multi-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Towards robust key extraction from multipath wireless channels

    Publication Year: 2012 , Page(s): 385 - 395
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (916 KB) |  | HTML iconHTML  

    This paper tackles the problem of generating shared secret keys based on the physical characteristics of the wireless channel. We propose intelligent quantization mechanisms for key generation, achieving high secret bits generation rate. Moreover, some practical issues affecting the performance of the key generation mechanism are deeply investigated. Mainly, we investigate the effects of delay and... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Characterization and detection of location spoofing attacks

    Publication Year: 2012 , Page(s): 396 - 409
    Cited by:  Papers (1)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1947 KB) |  | HTML iconHTML  

    With the proliferation of diverse wireless devices, there is an increasing concern about the security of location information which can be spoofed or disrupted by adversaries. This paper investigates the characterization and detection of location spoofing attacks, specifically those which are attempting to falsify (degrade) the position estimate through signal strength based attacks. Since the phy... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Blind source separation for OFDM with filtering colored noise and jamming signal

    Publication Year: 2012 , Page(s): 410 - 417
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1042 KB) |  | HTML iconHTML  

    One of the premier mechanisms used in extracting unobserved signals from observed mixtures in signal processing is employing a blind source separation (BSS) algorithm. Orthogonal frequency division multiplexing (OFDM) techniques are playing a prominent role in the sphere of multicarrier communication. A set of remedial solutions taken to mitigate deteriorative effects caused within the air interfa... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Reducing rekeying time using an integrated group key agreement scheme

    Publication Year: 2012 , Page(s): 418 - 428
    Cited by:  Papers (3)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1363 KB) |  | HTML iconHTML  

    With the requirement for providing multiple levels of access control for group members, many group key management schemes designed for hierarchical access control have been put forward. However, most of these schemes focus on the efficiency of group key establishment and rekeying in centralized environments. This paper proposes an integrated group key agreement (IGK) scheme for contributory enviro... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Nonbinary multiple rate QC-LDPC codes with fixed information or block bit length

    Publication Year: 2012 , Page(s): 429 - 433
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (842 KB) |  | HTML iconHTML  

    In this paper, we consider nonbinary quasi-cyclic low-density parity-check (QC-LDPC) codes and propose a method to design multiple rate codes with either fixed information bit length or block bit length, tailored to different scenarios in wireless applications. We show that the proposed codes achieve good performance over a broad range of code rates. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Gateway discovery algorithm based on multiple QoS path parameters between mobile node and gateway node

    Publication Year: 2012 , Page(s): 434 - 442
    Cited by:  Papers (2)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1858 KB) |  | HTML iconHTML  

    Several gateway selection schemes have been proposed that select gateway nodes based on a single Quality of Service (QoS) path parameter, for instance path availability period, link capacity or end-to-end delay, etc. or on multiple non-QoS parameters, for instance the combination of gateway node speed, residual energy, and number of hops, for Mobile Ad hoc NETworks (MANETs). Each scheme just focus... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A study on cluster lifetime in multi-hop wireless sensor networks with cooperative MISO scheme

    Publication Year: 2012 , Page(s): 443 - 450
    Cited by:  Papers (4)
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (968 KB) |  | HTML iconHTML  

    As for cluster-based wireless sensor networks (WSNs), cluster lifetime is one of the most important subjects in recent researches. Besides reducing the energy consumptions of the clusters, it is necessary to make the clusters achieve equal lifetimes so that the whole network can survive longer. In this paper, we focus on the cluster lifetimes in multi-hop WSNs with cooperative multi-input single-o... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Assessing the vulnerability of network topologies under large-scale regional failures

    Publication Year: 2012 , Page(s): 451 - 460
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (1395 KB) |  | HTML iconHTML  

    Natural disasters often lead to regional failures that can cause network nodes and links co-located in a large geographical area to fail. Novel approaches are required to assess the network vulnerability under such regional failures. In this paper, we investigate the vulnerability of networks by considering the geometric properties of regional failures and network nodes. To evaluate the criticalit... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Adaptive call admission control scheme for heterogeneous overlay networks

    Publication Year: 2012 , Page(s): 461 - 466
    Save to Project icon | Request Permissions | Click to expandAbstract | PDF file iconPDF (620 KB) |  | HTML iconHTML  

    Any future heterogeneous overlay network system must be able to support ubiquitous access across multiple wireless networks. To coordinate these diverse network environments, one challenging task is a call admission decision among different types of network. In this paper, we propose a new call admission control scheme to provide quality of service (QoS) while ensuring system efficiency. Based on ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • [Advertisement]

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (132 KB)  
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (517 KB)  
    Freely Available from IEEE
  • Call for papers

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (284 KB)  
    Freely Available from IEEE
  • IEEE copyright transfer form

    Publication Year: 2012 , Page(s): 1
    Save to Project icon | Request Permissions | PDF file iconPDF (72 KB)  
    Freely Available from IEEE
  • Table of Contents [Front cover]

    Publication Year: 2012 , Page(s): c1
    Save to Project icon | Request Permissions | PDF file iconPDF (539 KB)  
    Freely Available from IEEE
  • Table of Contents [Back cover]

    Publication Year: 2012 , Page(s): c4
    Save to Project icon | Request Permissions | PDF file iconPDF (539 KB)  
    Freely Available from IEEE
  • Special issue on physical-layer security

    Publication Year: 2012 , Page(s): 349 - 351
    Save to Project icon | Request Permissions | PDF file iconPDF (449 KB) |  | HTML iconHTML  
    Freely Available from IEEE
  • [Inside front cover]

    Publication Year: 2012 , Page(s): c2
    Save to Project icon | Request Permissions | PDF file iconPDF (257 KB)  
    Freely Available from IEEE
  • [Back inside cover]

    Publication Year: 2012 , Page(s): c3
    Save to Project icon | Request Permissions | PDF file iconPDF (115 KB)  
    Freely Available from IEEE

Aims & Scope

The Journal of Communications and Networks is published six times per year, and is committed to publishing high-quality papers that advance the state-of-the-art and practical applications of communications and information networks.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
H. Vincent Poor
Princeton University