IEEE Communications Magazine

Issue 8 • August 2015

Filter Results

Displaying Results 1 - 25 of 34
  • IEEE Communications Magazine - Cover

    Publication Year: 2015, Page(s): c1
    Request permission for commercial reuse | |PDF file iconPDF (1756 KB)
    Freely Available from IEEE
  • Table of contents

    Publication Year: 2015, Page(s):2 - 4
    Request permission for commercial reuse | |PDF file iconPDF (213 KB)
    Freely Available from IEEE
  • Our journey toward ComSoc 2020 [The President's Page]

    Publication Year: 2015, Page(s):6 - 12
    Request permission for commercial reuse | |PDF file iconPDF (773 KB) | HTML iconHTML
    Freely Available from IEEE
  • Newly approved amendments to the IEEE ComSoc Constitution. [Society News]

    Publication Year: 2015, Page(s):13 - 15
    Request permission for commercial reuse | |PDF file iconPDF (39 KB)
    Freely Available from IEEE
  • Newly approved amendments to the IEEE ComSoc Bylaws [Society News]

    Publication Year: 2015, Page(s):16 - 27
    Request permission for commercial reuse | |PDF file iconPDF (82 KB)
    Freely Available from IEEE
  • The first IEEE Communications Society Summer School [Society News]

    Publication Year: 2015, Page(s):28 - 29
    Request permission for commercial reuse | |PDF file iconPDF (1023 KB)
    Freely Available from IEEE
  • IEEE ICC 2015 sets attendance record in London, United Kingdom [Conference Report]

    Publication Year: 2015, Page(s):30 - 33
    Request permission for commercial reuse | |PDF file iconPDF (2180 KB)
    Freely Available from IEEE
  • Conference calendar

    Publication Year: 2015, Page(s): 34
    Request permission for commercial reuse | |PDF file iconPDF (37 KB)
    Freely Available from IEEE
  • Global Communications Newsletter

    Publication Year: 2015, Page(s):1 - 4
    Request permission for commercial reuse | |PDF file iconPDF (3218 KB) | HTML iconHTML
    Freely Available from IEEE
  • Security and privacy in emerging networks: Part II [Guest Editorial]

    Publication Year: 2015, Page(s):40 - 41
    Request permission for commercial reuse | |PDF file iconPDF (493 KB) | HTML iconHTML
    Freely Available from IEEE
  • Toward trustworthy vehicular social networks

    Publication Year: 2015, Page(s):42 - 47
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (147 KB) | HTML iconHTML

    Wireless vehicular networks offer the promise of connectivity to vehicles that could provide a myriad of safety and driving-enhancing services to drivers and passengers. With wireless technology available in each car, it is expected that huge amounts of information will be exchanged between vehicles or between vehicles and roadside infrastructure. Due to defective sensors, software viruses, or eve... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Verifiable, privacy-assured, and accurate signal collection for cloud-assisted wireless sensor networks

    Publication Year: 2015, Page(s):48 - 53
    Cited by:  Papers (1)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (164 KB) | HTML iconHTML

    As cloud-assisted WBSNs have become increasingly popular in healthcare applications, security and privacy threats deserve much more attention. In this article, focusing on data privacy and data completeness issues, we propose a VPAA scheme for cloud-assisted WBSNs. Through both simulation and prototype implementation, we confirm that VPAA is energy-efficient and effective in protecting data privac... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Secure communication for underwater acoustic sensor networks

    Publication Year: 2015, Page(s):54 - 60
    Cited by:  Papers (19)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (112 KB) | HTML iconHTML

    UASNs are widely used in many applications, and many studies have been conducted. However, most current research projects have not taken network security into consideration, despite the fact that a UASN is typically vulnerable to malicious attacks due to the unique characteristics of an underwater acoustic communication channel (e.g., low communication bandwidth, long propagation delays, and high ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • From botnets to MobiBots: a novel malicious communication paradigm for mobile botnets

    Publication Year: 2015, Page(s):61 - 67
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (214 KB) | HTML iconHTML

    Cyber security is moving from traditional infrastructure to sophisticated mobile infrastructureless threats. A major concern is that such imminent transition is happening at a rate far exceeding the evolution of security solutions. In fact, the transformation of mobile devices into highly capable computing platforms makes the possibility of security attacks originating from within the mobile netwo... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Privacy-preserving participatory sensing

    Publication Year: 2015, Page(s):68 - 74
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (146 KB) | HTML iconHTML

    The proliferation of mobile devices such as smart phones has enabled participatory sensing systems that collect data from users through their mobile devices and infer useful information from the data. However, users have concerns regarding possible privacy leakage from their data and lack incentives to contribute their data. To effectively motivate users to participate, both privacy and incentive ... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security and privacy in mobile crowdsourcing networks: challenges and opportunities

    Publication Year: 2015, Page(s):75 - 81
    Cited by:  Papers (29)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (247 KB) | HTML iconHTML

    The mobile crowdsourcing network (MCN) is a promising network architecture that applies the principles of crowdsourcing to perform tasks with human involvement and powerful mobile devices. However, it also raises some critical security and privacy issues that impede the application of MCNs. In this article, in order to better understand these critical security and privacy challenges, we first prop... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Security in space information networks

    Publication Year: 2015, Page(s):82 - 88
    Cited by:  Papers (11)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (6070 KB) | HTML iconHTML

    Space information networks were proposed to broaden the observation area and realize continuous information acquisition using satellites and high altitude platform stations. Space information networks are able to enhance detection and transmission capabilities compared to the current single Earth observation satellite. Although lots of technical work has been done concerning the space network arch... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy harvesting communications: Part III [Guest Editorial]

    Publication Year: 2015, Page(s):90 - 91
    Cited by:  Papers (3)
    Request permission for commercial reuse | |PDF file iconPDF (554 KB) | HTML iconHTML
    Freely Available from IEEE
  • A hierarchical packet forwarding mechanism for energy harvesting wireless sensor networks

    Publication Year: 2015, Page(s):92 - 98
    Cited by:  Papers (23)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (198 KB) | HTML iconHTML

    Energy harvesting technologies have gained widespread attention for their perpetual energy supply for sensor nodes. However, the energy resources are still insufficient while the harvesting module is added on the node. To prolong the network lifetime and meet the demand of a green wireless network, a dynamic gradient-aware hierarchical packet forwarding mechanism is designed. According to the rela... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Wireless information and power transfer: from scientific hypothesis to engineering practice

    Publication Year: 2015, Page(s):99 - 105
    Cited by:  Papers (7)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (186 KB) | HTML iconHTML

    Recently, there has been substantial research interest in the subject of simultaneous wireless information and power transfer (SWIPT) due to its cross-disciplinary appeal and its wide-ranging application potential, which motivates this overview. More explicitly, we provide a brief survey of the state of the art and introduce several practical transceiver architectures that may facilitate its imple... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Delay-sensitive dynamic resource control for energy harvesting wireless systems with finite energy storage

    Publication Year: 2015, Page(s):106 - 113
    Cited by:  Papers (3)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (360 KB) | HTML iconHTML

    Energy harvesting technology has become a promising solution to enhance the energy efficiency and reduce carbon emissions in future wireless systems. In future wireless systems, most of the data throughput will come from delay-sensitive applications. To ensure a good experience for an end user, we target the optimization of the delay performance of an EH wireless system with finite energy storage.... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Toward secure energy harvesting cooperative networks

    Publication Year: 2015, Page(s):114 - 121
    Cited by:  Papers (15)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (190 KB) | HTML iconHTML

    The concept of energy harvesting cooperative networks is an emerging technology that has very high potential for a large variety of applications. However, energy transfer capability may lead to unprecedented security challenges. In this article, we study energy security issues and the solutions in energy harvesting networks. We first identify typical energy related attacks and then propose defense... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • Energy-efficient optical networks [Series Editorial]

    Publication Year: 2015, Page(s):122 - 123
    Request permission for commercial reuse | |PDF file iconPDF (170 KB) | HTML iconHTML
    Freely Available from IEEE
  • High data rate coherent optical slot switched networks: a practical and technological perspective

    Publication Year: 2015, Page(s):124 - 129
    Cited by:  Papers (4)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (218 KB) | HTML iconHTML

    We review several node architectures for optical slot switching ring networks, which can be used in metropolitan or datacenter applications, and compare them for their networking aspects. The dimensioning, quality of service, latency, and protection issues are discussed for the different approaches. The main devices, i.e. fast wavelength-tunable laser, burst-mode coherent receiver (which is requir... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.
  • CSO: cross stratum optimization for optical as a service

    Publication Year: 2015, Page(s):130 - 139
    Cited by:  Papers (27)
    Request permission for commercial reuse | Click to expandAbstract |PDF file iconPDF (576 KB) | HTML iconHTML

    Data center interconnection with elastic optical networks is a promising scenario to meet the high burstiness and high-bandwidth requirements of services. Many data center services require lower delay and higher availability with end-to-end guaranteed QoS, which involves both application and transport network resources. However, in the current mode of operation, the control of elastic optical netw... View full abstract»

    Full text access may be available. Click article title to sign in or learn about subscription options.

Aims & Scope

IEEE Communications Magazine, considered by most to be their most important member benefit, provides timely information on all aspects of communications: monthly feature articles describe technology, systems, services, market trends, development methods, regulatory and policy issues, and significant global events.

Full Aims & Scope

Meet Our Editors

Editor-in-Chief
Tarek S. El-Bawab
Jackson State University