By Topic

Communications Surveys & Tutorials, IEEE

Issue 1 • Date First Quarter 2013

Filter Results

Displaying Results 1 - 25 of 27
  • First Quarter 2013, IEEE Communications Surveys & Tutorials

    Page(s): 1 - 4
    Save to Project icon | Request Permissions | PDF file iconPDF (533 KB)  
    Freely Available from IEEE
  • A Survey on Smart Grid Communication Infrastructures: Motivations, Requirements and Challenges

    Page(s): 5 - 20
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2394 KB) |  | HTML iconHTML  

    A communication infrastructure is an essential part to the success of the emerging smart grid. A scalable and pervasive communication infrastructure is crucial in both construction and operation of a smart grid. In this paper, we present the background and motivation of communication infrastructures in smart grid systems. We also summarize major requirements that smart grid communications must meet. From the experience of several industrial trials on smart grid with communication infrastructures, we expect that the traditional carbon fuel based power plants can cooperate with emerging distributed renewable energy such as wind, solar, etc, to reduce the carbon fuel consumption and consequent green house gas such as carbon dioxide emission. The consumers can minimize their expense on energy by adjusting their intelligent home appliance operations to avoid the peak hours and utilize the renewable energy instead. We further explore the challenges for a communication infrastructure as the part of a complex smart grid system. Since a smart grid system might have over millions of consumers and devices, the demand of its reliability and security is extremely critical. Through a communication infrastructure, a smart grid can improve power reliability and quality to eliminate electricity blackout. Security is a challenging issue since the on-going smart grid systems facing increasing vulnerabilities as more and more automation, remote monitoring/controlling and supervision entities are interconnected. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Smart Grid Communications: Overview of Research Challenges, Solutions, and Standardization Activities

    Page(s): 21 - 38
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1204 KB) |  | HTML iconHTML  

    Optimization of energy consumption in future intelligent energy networks (or Smart Grids) will be based on grid-integrated near-real-time communications between various grid elements in generation, transmission, distribution and loads. This paper discusses some of the challenges and opportunities of communications research in the areas of smart grid and smart metering. In particular, we focus on some of the key communications challenges for realizing interoperable and future-proof smart grid/metering networks, smart grid security and privacy, and how some of the existing networking technologies can be applied to energy management. Finally, we also discuss the coordinated standardization efforts in Europe to harmonize communications standards and protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • On Architecture Design, Congestion Notification, TCP Incast and Power Consumption in Data Centers

    Page(s): 39 - 64
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1675 KB) |  | HTML iconHTML  

    With rapid deployment of modern data center networks (DCNs), many problems with respect to DCN architecture, congestion notification, TCP Incast, and power consumption have been observed. In this paper, we provide a comprehensive survey of the most recent research activities in DCNs, with emphasis on the network architecture design, congestion notification algorithms, TCP Incast, and power consumption. We describe in detail the architecture of a typical modern DCN. Furthermore, we investigate the challenges of the typical tree-based hierarchical DCN architecture encountered today and the requirements for the optimal DCN architecture, and we classify the proposed DCN architectures into switch-centric topology and server-centric topology. A section is also devoted to describe some newly proposed DCN architectures. We present a brief overview of the TCP Incast problem along with previously proposed solutions. We also review the recent energy-efficient solutions to minimize the power consumption in DCNs. Finally, we outline possible future research topics in DCNs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on OFDM-Based Elastic Core Optical Networking

    Page(s): 65 - 87
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1465 KB) |  | HTML iconHTML  

    Orthogonal frequency-division multiplexing (OFDM) is a modulation technology that has been widely adopted in many new and emerging broadband wireless and wireline communication systems. Due to its capability to transmit a high-speed data stream using multiple spectral-overlapped lower-speed subcarriers, OFDM technology offers superior advantages of high spectrum efficiency, robustness against inter-carrier and inter-symbol interference, adaptability to server channel conditions, etc. In recent years, there have been intensive studies on optical OFDM (O-OFDM) transmission technologies, and it is considered a promising technology for future ultra-high-speed optical transmission. Based on O-OFDM technology, a novel elastic optical network architecture with immense flexibility and scalability in spectrum allocation and data rate accommodation could be built to support diverse services and the rapid growth of Internet traffic in the future. In this paper, we present a comprehensive survey on OFDM-based elastic optical network technologies, including basic principles of OFDM, O-OFDM technologies, the architectures of OFDM-based elastic core optical networks, and related key enabling technologies. The main advantages and issues of OFDM-based elastic core optical networks that are under research are also discussed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Mobility and Mobility-Aware MAC Protocols in Wireless Sensor Networks

    Page(s): 88 - 100
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (830 KB) |  | HTML iconHTML  

    In wireless sensor networks nodes can be static or mobile, depending on the application requirements. Dealing with mobility can pose some formidable challenges in protocol design, particularly, at the link layer. These difficulties require mobility adaptation algorithms to localize mobile nodes and predict the quality of link that can be established with them. This paper surveys the current state-of-art in handling mobility. It first describes existing mobility models and patterns; and analyzes the challenges caused by mobility at the link layer. It then provides a comparative study of several mobility-aware MAC protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • The Evolution of MAC Protocols in Wireless Sensor Networks: A Survey

    Page(s): 101 - 120
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (553 KB) |  | HTML iconHTML  

    Wireless Sensor Networks (WSNs) have become a leading solution in many important applications such as intrusion detection, target tracking, industrial automation, smart building and so on. Typically, a WSN consists of a large number of small, low-cost sensor nodes that are distributed in the target area for collecting data of interest. For a WSN to provide high throughput in an energy-efficient way, designing an efficient Medium Access Control (MAC) protocol is of paramount importance because the MAC layer coordinates nodes' access to the shared wireless medium. To show the evolution of WSN MAC protocols, this article surveys the latest progresses in WSN MAC protocol designs over the period 2002-2011. In the early development stages, designers were mostly concerned with energy efficiency because sensor nodes are usually limited in power supply. Recently, new protocols are being developed to provide multi-task support and efficient delivery of bursty traffic. Therefore, research attention has turned back to throughput and delay. This article details the evolution of WSN MAC protocols in four categories: asynchronous, synchronous, frame-slotted, and multichannel. These designs are evaluated in terms of energy efficiency, data delivery performance, and overhead needed to maintain a protocol's mechanisms. With extensive analysis of the protocols many future directions are stated at the end of this survey. The performance of different classes of protocols could be substantially improved in future designs by taking into consideration the recent advances in technologies and application demands. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Distributed Topology Control Techniques for Extending the Lifetime of Battery Powered Wireless Sensor Networks

    Page(s): 121 - 144
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (686 KB) |  | HTML iconHTML  

    Large-scale, self-organizing wireless sensor and mesh network deployments are being driven by recent technological developments such as The Internet of Things (IoT), Smart Grids and Smart Environment applications. Efficient use of the limited energy resources of wireless sensor network (WSN) nodes is critically important to support these advances, and application of topology control methods will have a profound impact on energy efficiency and hence battery lifetime. In this survey, we focus on the energy efficiency issue and present a comprehensive study of topology control techniques for extending the lifetime of battery powered WSNs. First, we review the significant topology control algorithms to provide insights into how energy efficiency is achieved by design. Further, these algorithms are classified according to the energy conservation approach they adopt, and evaluated by the trade-offs they offer to aid designers in selecting a technique that best suits their applications. Since the concept of "network lifetime" is widely used for assessing the algorithms' performance, we highlight various definitions of the term and discuss their merits and drawbacks. Recently, there has been growing interest in algorithms for non-planar topologies such as deployments in underwater environments or multi-level buildings. For this reason, we also include a detailed discussion of topology control algorithms that work efficiently in three dimensions. Based on the outcomes of our review, we identify a number of open research issues for achieving energy efficiency through topology control. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Connectivity Weakness Impacts on Coordination in Wireless Sensor and Actor Networks

    Page(s): 145 - 166
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1838 KB) |  | HTML iconHTML  

    The combination of sensor and actor nodes in wireless sensor actor networks (WSANs) has created new challenges notably in coordination. In this paper, we survey, categorize, and bring into perspective existing researches on weak connectivity and its impacts on coordination ranging from a node failure to disability of actor nodes to communicate with other actors permanently. We present challenges in each category alongside existing provisions and approaches in the context of the proposed coordination-oriented connectivity categorization. Alongside explanation of general concepts for a communication generalist, we compare the proposed protocols using parameters related to weak connectivity and coordination. Powerful actors can help weaker sensors in many aspects such as routing and data forwarding and many sensors can help few actors in the regions that actors are sparsely deployed. Actors can carry, move and charge sensors while sensors can detect partitions of inter-actor network. Considering lessons learned from surveyed works, we show that actor and sensor nodes in a WSAN must cooperate to provide an integrated network when network connectivity is weak. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A survey of energy-efficient wireless communications

    Page(s): 167 - 178
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (841 KB) |  | HTML iconHTML  

    Reducing energy consumption in wireless communications has attracted increasing attention recently. Advanced physical layer techniques such as multiple-input multiple-output (MIMO) and orthogonal frequency division multiplexing (OFDM), cognitive radio, network coding, cooperative communication, etc.; new network architectures such as heterogeneous networks, distributed antennas, multi-hop cellulars, etc.; as well as radio and network resource management schemes such as various cross-layer optimization algorithms, dynamic power saving, multiple radio access technologies coordination, etc. have been proposed to address this issue. In this article, we overview these technologies and present the state-of-the-art on each aspect. Some challenges that need to be solved in the area are also described. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy Management Techniques in Modern Mobile Handsets

    Page(s): 179 - 198
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (355 KB) |  | HTML iconHTML  

    Managing energy efficiently is paramount in modern smartphones. The diverse range of wireless interfaces and sensors, and the increasing popularity of power-hungry applications that take advantage of these resources can reduce the battery life of mobile handhelds to few hours of operation. The research community, and operating system and hardware vendors found interesting optimisations and techniques to extend the battery life of mobile phones. However, the state of the art of lithium-ion batteries clearly indicates that energy efficiency must be achieved both at the hardware and software level. In this survey, we will cover the software solutions that can be found in the research literature between 1999 and May 2011 at six different levels: energy-aware operating systems, efficient resource management, the impact of users' interaction patterns with mobile devices and applications, wireless interfaces and sensors management, and finally the benefits of integrating mobile devices with cloud computing services. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Classification Framework for Scheduling Algorithms in Wireless Mesh Networks

    Page(s): 199 - 222
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1057 KB) |  | HTML iconHTML  

    Scheduling MAC-layer transmissions in multi-hop wireless networks is an active and stimulating area of research. There are several interesting algorithms proposed in the literature in the problem space of scheduling for multi-hop wireless networks, specifically for (a) WiMAX mesh networks, (b) long distance multi-hop WiFi networks, and (c) Vehicular Ad-hoc Networks (VANETs). In general, these algorithms have several dimensions in terms of the assumptions made, the input space considered and the solution space generated. In this context, the goal of this survey is three-fold. Firstly, we classify the scheduling algorithms proposed in the literature based on following parameters: problem setting, problem goal, type of inputs and solution technique. Secondly, we describe different scheduling algorithms based on this classification framework. We specifically cover the state-of-the-art scheduling mechanisms proposed for generic multi-channel, multi-radio wireless mesh networks and in particular scheduling algorithms for WiMAX mesh networks, long distance mesh networks and vehicular ad-hoc networks. We describe scheduling algorithms which consider scheduling data, voice as well as video traffic. Finally, we compare these algorithms based on our classification parameters. We also critique individual mechanisms and point out the practicality and the limitations, wherever applicable. We observe that, the literature in the domain of scheduling for wireless mesh network is quite extensive, in terms of depth as well as breadth. Our classification framework helps in understanding the pros and cons of various aspects of scheduling for wireless multi-hop (popularly known as wireless mesh) networks. We also list desirable properties of any scheduling mechanism and use our classification framework to point out the open research issues in the space of scheduling for wireless mesh networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Survey of Experimental Evaluation Studies for Wireless Mesh Network Deployments in Urban Areas Towards Ubiquitous Internet

    Page(s): 223 - 239
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (1385 KB) |  | HTML iconHTML  

    Establishing wireless networks in urban areas that can provide ubiquitous Internet access to end-users is a central part of the efforts towards defining the Internet of the future. In recent years, Wireless Mesh Network (WMN) backbone infrastructures are proposed as a cost effective technology to provide city-wide Internet access. Studies that evaluate the performance of city-wide mesh network deployments via experiments provide essential information on various challenges of building them. In this survey, we particularly focus on such studies and provide brief conclusions on the problems, benefits, and future research directions of city-wide WMNs. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Multicast Scheduling and Resource Allocation Algorithms for OFDMA-Based Systems: A Survey

    Page(s): 240 - 254
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (735 KB) |  | HTML iconHTML  

    Multicasting is emerging as an enabling technology for multimedia transmissions over wireless networks to support several groups of users with flexible quality of service (QoS) requirements. Although multicast has huge potential to push the limits of next generation communication systems; it is however one of the most challenging issues currently being addressed. In this survey, we explain multicast group formation and various forms of group rate determination approaches. We also provide a systematic review of recent channel-aware multicast scheduling and resource allocation (MSRA) techniques proposed for downlink multicast services in OFDMA based systems. We study these enabling algorithms, evaluate their core characteristics, limitations and classify them using multidimensional matrix. We cohesively review the algorithms in terms of their throughput maximization, fairness considerations, performance complexities, multi-antenna support, optimality and simplifying assumptions. We discuss existing standards employing multicasting and further highlight some potential research opportunities in multicast systems. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Wireless Path Loss Prediction and Coverage Mapping Methods

    Page(s): 255 - 270
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (972 KB) |  | HTML iconHTML  

    In this paper we provide a thorough and up to date survey of path loss prediction methods, spanning more than 60 years of fairly continuous research. These methods take a variety of approaches to modeling the signal attenuation between wireless transceivers: purely theoretical models, empirically fitted (often statistical) models, deterministic ray-optical models, and measurement-directed methods. Our work here extends and updates excellent, but now dated prior surveys of this important field. We provide a new taxonomy for reasoning about the similarities and differences of the many approaches and provide a brief but complete overview of the various methods as well as describing insights into future directions for research in this area. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mathematical Modeling for Network Selection in Heterogeneous Wireless Networks — A Tutorial

    Page(s): 271 - 292
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (842 KB)  

    In heterogeneous wireless networks, an important task for mobile terminals is to select the best network for various communications at any time anywhere, usually called network selection. In recent years, this topic has been widely studied by using various mathematical theories. The employed theory decides the objective of optimization, complexity and performance, so it is a must to understand the potential mathematical theories and choose the appropriate one for obtaining the best result. Therefore, this paper systematically studies the most important mathematical theories used for modeling the network selection problem in the literature. With a carefully designed unified scenario, we compare the schemes of various mathematical theories and discuss the ways to benefit from combining multiple of them together. Furthermore, an integrated scheme using multiple attribute decision making as the core of the selection procedure is proposed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Interference Management in Femtocells

    Page(s): 293 - 311
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (935 KB) |  | HTML iconHTML  

    Increase in system capacity and data rates can be achieved efficiently in a wireless system by getting the transmitter and receiver closer to each other. Femtocells deployed in the macrocell significantly improve the indoor coverage and provide better user experience. The femtocell base station called as Femtocell Access Point (FAP) is fully user deployed and hence reduces the infrastructure, maintenance and operational cost of the operator while at the same time providing good Quality of Service (QoS) to the end user and high network capacity gains. However, the mass deployment of femtocell faces a number of challenges, among which interference management is of much importance, as the fundamental limits of capacity and achievable data rates mainly depends on the interference faced by the femtocell network. To cope with the technical challenges including interference management faced by the femtocells, researchers have suggested a variety of solutions. These solutions vary depending on the physical layer technology and the specific scenarios considered. Furthermore, the cognitive capabilities, as a functionality of femtocell have also been discussed in this survey. This article summarises the main concepts of femtocells that are covered in literature and the major challenges faced in its large scale deployment. The main challenge of interference management is discussed in detail with its types in femtocells and the solutions proposed over the years to manage interference have been summarised. In addition an overview of the current femtocell standardisation and the future research direction of femtocells have also been provided. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on the Successive Interference Cancellation Performance for Single-Antenna and Multiple-Antenna OFDM Systems

    Page(s): 312 - 335
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (661 KB) |  | HTML iconHTML  

    Interference plays a crucial role for performance degradation in communication networks nowadays. An appealing approach to interference avoidance is the Interference Cancellation (IC) methodology. Particularly, the Successive IC (SIC) method represents the most effective IC-based reception technique in terms of Bit-Error-Rate (BER) performance and, thus, yielding to the overall system robustness. Moreover, SIC in conjunction with Orthogonal Frequency Division Multiplexing (OFDM), in the context of SIC-OFDM, is shown to approach the Shannon capacity when single-antenna infrastructures are applied while this capacity limit can be further extended with the aid of multiple antennas. Recently, SIC-based reception has studied for Orthogonal Frequency and Code Division Multiplexing or (spread-OFDM systems), namely OFCDM. Such systems provide extremely high error resilience and robustness, especially in multi-user environments. In this paper, we present a comprehensive survey on the performance of SIC for single- and multiple-antenna OFDM and spread OFDM (OFCDM) systems. Thereby, we focus on all the possible OFDM formats that have been developed so far. We study the performance of SIC by examining closely two major aspects, namely the BER performance and the computational complexity of the reception process, thus striving for the provision and optimization of SIC. Our main objective is to point out the state-of-the-art on research activity for SIC-OF(C)DM systems, applied on a variety of well-known network implementations, such as cellular, ad hoc and infrastructure-based platforms. Furthermore, we introduce a Performance-Complexity Tradeoff (PCT) in order to indicate the contribution of the approaches studied in this paper. Finally, we provide analytical performance comparison tables regarding to the surveyed techniques with respect to the PCT level. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Self Organisation in Future Cellular Networks

    Page(s): 336 - 361
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (2088 KB) |  | HTML iconHTML  

    This article surveys the literature over the period of the last decade on the emerging field of self organisation as applied to wireless cellular communication networks. Self organisation has been extensively studied and applied in adhoc networks, wireless sensor networks and autonomic computer networks; however in the context of wireless cellular networks, this is the first attempt to put in perspective the various efforts in form of a tutorial/survey. We provide a comprehensive survey of the existing literature, projects and standards in self organising cellular networks. Additionally, we also aim to present a clear understanding of this active research area, identifying a clear taxonomy and guidelines for design of self organising mechanisms. We compare strength and weakness of existing solutions and highlight the key research areas for further development. This paper serves as a guide and a starting point for anyone willing to delve into research on self organisation in wireless cellular communication networks. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Context-Aware Mobile and Wireless Networking: On Networking and Computing Environments' Integration

    Page(s): 362 - 386
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (940 KB) |  | HTML iconHTML  

    During the last years, a continuous convergence and fusion of computing and networking systems is stressed in the ICT research community. Context awareness appears to be a major research "glue-point" of such kind of heterogeneous environments' integration. In this survey paper, we aim to assemble all the "puzzle-pieces" of the emerging research area of Context Aware Mobile and Wireless Networking (CAMoWiN) in order to provide the reader a holistic representation of the work having been done in the past emphasizing in recent research efforts. A precise definition of abstract Context Aware (CA) functionalities together with a clear classification of related state-of-the-art proposals are provided in the form of a proposed taxonomy scheme per CA functionality. Each taxonomy scheme can also serve as a sufficiently general framework permitting the easy classification of novel CAMoWiN solutions emerging in the near future. Therefore, our study not only defines all the possible components of a CAMoWiN architecture and clearly points out the similarities and differences of all research efforts in the field but also evaluates future research trends and paves the way for the researchers to work beyond the concepts investigated in this work. Finally, apart from identifying the open challenges, which arise when applying traditional concepts of pervasive computing to mobile and wireless networks, we further map them to the Mobile Cloud Computing paradigm, whose concepts appear to be very promising regarding next generation networking and computing environments' integration. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey of Social-Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects

    Page(s): 387 - 401
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (474 KB) |  | HTML iconHTML  

    Delay tolerant networks (DTNs) may lack continuous network connectivity. Routing in DTNs is thus challenging since it must handle network partitioning, long delays, and dynamic topology in such networks. In recent years, social-based approaches, which attempt to exploit social behaviors of DTN nodes to make better routing decision, have drawn tremendous interests in DTN routing design. In this article, we summarize the social properties in DTNs, and provide a survey of recent social-based DTN routing approaches. To improve routing performance, these methods either take advantages of positive social characteristics such as community and friendship to assist packet forwarding or consider negative social characteristics such as selfishness. We conclude by discussing some open issues and challenges in social-based approaches regarding the design of DTN routing protocols. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Mobile Phone Sensing Systems: A Survey

    Page(s): 402 - 427
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (458 KB) |  | HTML iconHTML  

    Mobile phone sensing is an emerging area of interest for researchers as smart phones are becoming the core communication device in people's everyday lives. Sensor enabled mobile phones or smart phones are hovering to be at the center of a next revolution in social networks, green applications, global environmental monitoring, personal and community healthcare, sensor augmented gaming, virtual reality and smart transportation systems. More and more organizations and people are discovering how mobile phones can be used for social impact, including how to use mobile technology for environmental protection, sensing, and to leverage just-in-time information to make our movements and actions more environmentally friendly. In this paper we have described comprehensively all those systems which are using smart phones and mobile phone sensors for humans good will and better human phone interaction. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Security Threats and Detection Techniques in Cognitive Radio Networks

    Page(s): 428 - 445
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (588 KB) |  | HTML iconHTML  

    With the rapid proliferation of new technologies and services in the wireless domain, spectrum scarcity has become a major concern. The allocation of the Industrial, Medical and Scientific (ISM) band has enabled the explosion of new technologies (e.g. Wi-Fi) due to its licence-exempt characteristic. The widespread adoption of Wi-Fi technology, combined with the rapid penetration of smart phones running popular user services (e.g. social online networks) has overcrowded substantially the ISM band. On the other hand, according to a number of recent reports, several parts of the static allocated licensed bands are under-utilized. This has brought up the idea of the opportunistic use of these bands through the, so-called, cognitive radios and cognitive radio networks. Cognitive radios have enabled the opportunity to transmit in several licensed bands without causing harmful interference to licensed users. Along with the realization of cognitive radios, new security threats have been raised. Adversaries can exploit several vulnerabilities of this new technology and cause severe performance degradation. Security threats are mainly related to two fundamental characteristics of cognitive radios: cognitive capability, and reconfigurability. Threats related to the cognitive capability include attacks launched by adversaries that mimic primary transmitters, and transmission of false observations related to spectrum sensing. Reconfiguration can be exploited by attackers through the use of malicious code installed in cognitive radios. Furthermore, as cognitive radio networks are wireless in nature, they face all classic threats present in the conventional wireless networks. The scope of this work is to give an overview of the security threats and challenges that cognitive radios and cognitive radio networks face, along with the current state-of-the-art to detect the corresponding attacks. In addition, future challenges are addressed. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • A Survey on Security for Mobile Devices

    Page(s): 446 - 471
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (394 KB) |  | HTML iconHTML  

    Nowadays, mobile devices are an important part of our everyday lives since they enable us to access a large variety of ubiquitous services. In recent years, the availability of these ubiquitous and mobile services has significantly increased due to the different form of connectivity provided by mobile devices, such as GSM, GPRS, Bluetooth and Wi-Fi. In the same trend, the number and typologies of vulnerabilities exploiting these services and communication channels have increased as well. Therefore, smartphones may now represent an ideal target for malware writers. As the number of vulnerabilities and, hence, of attacks increase, there has been a corresponding rise of security solutions proposed by researchers. Due to the fact that this research field is immature and still unexplored in depth, with this paper we aim to provide a structured and comprehensive overview of the research on security solutions for mobile devices. This paper surveys the state of the art on threats, vulnerabilities and security solutions over the period 2004-2011, by focusing on high-level attacks, such those to user applications. We group existing approaches aimed at protecting mobile devices against these classes of attacks into different categories, based upon the detection principles, architectures, collected data and operating systems, especially focusing on IDS-based models and tools. With this categorization we aim to provide an easy and concise view of the underlying model adopted by each approach. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Game Theory for Network Security

    Page(s): 472 - 486
    Save to Project icon | Request Permissions | Click to expandQuick Abstract | PDF file iconPDF (406 KB) |  | HTML iconHTML  

    As networks become ubiquitous in people's lives, users depend on networks a lot for sufficient communication and convenient information access. However, networks suffer from security issues. Network security becomes a challenging topic since numerous new network attacks have appeared increasingly sophisticated and caused vast loss to network resources. Game theoretic approaches have been introduced as a useful tool to handle those tricky network attacks. In this paper, we review the existing game-theory based solutions for network security problems, classifying their application scenarios under two categories, attack-defense analysis and security measurement. Moreover, we present a brief view of the game models in those solutions and summarize them into two categories, cooperative game models and non-cooperative game models with the latter category consisting of subcategories. In addition to the introduction to the state of the art, we discuss the limitations of those game theoretic approaches and propose future research directions. View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Surveys & Tutorials is an online journal published by the IEEE Communications Society for tutorials and surveys covering all aspects of the communications field. Telecommunications technology is progressing at a rapid pace, and the IEEE Communications Society is committed to providing researchers and other professionals the information and tools to stay abreast.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Ekram Hossain, Ph.D., P.Eng.
Professor
University of Manitoba