International Journal of Communication Systems

Cover image for Vol. 25 Issue 12

December 2012

Volume 25, Issue 12

Pages 1513–1644

  1. Research Articles

    1. Top of page
    2. Research Articles
    3. Short Communication
    1. Hierarchical and low-power IPv6 address configuration for wireless sensor networks (pages 1513–1529)

      Xiaonan Wang and Huanyan Qian

      Article first published online: 24 AUG 2011 | DOI: 10.1002/dac.1318

      Thumbnail image of graphical abstract

      A wireless sensor network is divided into multiple clusters and the generation algorithm of a cluster is proposed. The stateless address configuration strategy and the stateful address configuration strategy are effectively combined to develop the IPv6 address configuration scheme. The duplicate address detection of the IPv6 address assigned for a cluster member is performed in the cluster where the cluster member locates, and the IPv6 address configuration for the cluster members in the different clusters can be carried out at the same time.

    2. An auction-based MAC protocol for cognitive radio networks (pages 1530–1549)

      Hua Song and Xiao-La Lin

      Article first published online: 4 OCT 2011 | DOI: 10.1002/dac.1321

      Thumbnail image of graphical abstract

      The proposed protocol aims to maximize the utilization ratio of spectrum resources while achieving revenue maximization for primary users, and take the bandwidth requirement of secondary users into consideration. From the above simulation results, we can see that our proposed protocol is more efficient and fairer than other typical cognitive MAC protocols.

    3. Congestion control for sudden bandwidth changes in TCP (pages 1550–1567)

      Euiyul Ko, Donghyeok An, Ikjun Yeom and Hyunsoo Yoon

      Article first published online: 16 AUG 2011 | DOI: 10.1002/dac.1322

      Thumbnail image of graphical abstract

      In the current Internet, sudden bandwidth changes may occur due to vertical handovers between heterogeneous access networks, routing path changes, cognitive ratio, or multi-rate WLAN. The current implementation of TCP is designed and optimized for stable networks, and does not adapt well upon sudden bandwidth changes. So we propose a novel technique to deal with sudden bandwidth changes in TCP adding the new phase called Fast Adaptation (FA).

    4. Link stability-aware reliable packet transmitting mechanism in mobile ad hoc network (pages 1568–1584)

      Dapeng Wu, Ruyan Wang and Yan Zhen

      Article first published online: 7 AUG 2011 | DOI: 10.1002/dac.1323

      Thumbnail image of graphical abstract

      According to the current network topology and corresponding estimated link lifetime, the end-to-end connection is established adaptively in the best effort manner. Consequently, utilizing the network coding method the relay node combines and forwards the packets on the working path. Furthermore, to keep the balance between the gain in reliability and the amount of redundant packets, the time for sending the redundant packets on the backup path is determined for the link stability intelligently.

    5. Modulation and coding scheme selection in multimedia broadcast over a single frequency network-enabled long-term evolution networks (pages 1603–1619)

      Antonios Alexiou, Christos Bouras, Vasileios Kokkinos, Andreas Papazois and George Tsichritzis

      Article first published online: 23 AUG 2011 | DOI: 10.1002/dac.1326

      Thumbnail image of graphical abstract

      This study proposes and evaluates four approaches for the selection of the modulation and coding scheme during multimedia broadcasting in long term evolution systems. Each approach corresponds to different users' distribution and multimedia traffic conditions. The spectral efficiency measurements performed through simulation experiments determines the approach that either maximizes or achieves a target spectral efficiency for the corresponding users' distribution and traffic conditions.

    6. A ZCZ-CDMA system with BFSK modulation (pages 1620–1638)

      Jincheng Huang, Shinya Matsufuji, Takahiro Matsumoto and Noriyoshi Kuroyanagi

      Article first published online: 22 FEB 2012 | DOI: 10.1002/dac.2313

      Thumbnail image of graphical abstract

      This paper proposes a ZCZ-CDMA system with binary frequency-shift keying modulation called BFSK-ZCZ-CDMA. This system is characterized by using a pair of balanced zero-correlation zone codes for spreading and transmitting the two spread components over the respective keying carrier frequencies. It is proved that BFSK-ZCZ-CDMA is much more robust in anti-fading performance and low transmit power in such an environment that fading distributions on the keying frequencies are independent mutually.

  2. Short Communication

    1. Top of page
    2. Research Articles
    3. Short Communication
    1. Cryptanalysis of a dynamic ID-based remote user authentication with key agreement scheme (pages 1639–1644)

      Hong-bin Tang and Xin-song Liu

      Article first published online: 3 SEP 2012 | DOI: 10.1002/dac.2428

      Thumbnail image of graphical abstract

      A dynamic user authentication scheme allows a user and a remote server to authenticate each other without leaking user's identity. In 2011, Wen and Li proposed an improved dynamic ID-based remote user authentication with key agreement scheme for mobile and home networks. However, we demonstrate that their scheme is vulnerable to the privileged insider, off-line password guessing, impersonation, and server spoofing attacks. At the same time, it does not provide any user anonymity and forward secrecy property.