Wireless Communications and Mobile Computing

Cover image for Vol. 16 Issue 11

Edited By: Mohsen Guizani

Impact Factor: 0.922

ISI Journal Citation Reports © Ranking: 2015: 49/82 (Telecommunications); 93/143 (Computer Science Information Systems); 162/255 (Engineering Electrical & Electronic)

Online ISSN: 1530-8677

Recently Published Issues

See all

Announcement

Wireless Communications and Mobile Computing is part of an exciting new pilot partnership between Wiley and Hindawi. From 1st January 2017, the journal will become fully open access. Wireless Communications and Mobile Computing will remain a Wiley title but will be published and hosted by Hindawi, and will benefit from Hindawi’s experience and expertise in publishing open access titles. Wireless Communications and Mobile Computing will continue to undergo a rigorous peer review process ensuring that quality remains high. Manuscripts submitted on or after 16 June 2016 and accepted for publication will be published as open access articles, immediately free to read, download and share. Authors or their funder will be required to pay an Article Publication Charge upon acceptance. For further information, please click here.

Recently Published Articles

  1. Mobile ad hoc cloud: A survey

    Ibrar Yaqoob, Ejaz Ahmed, Abdullah Gani, Salimah Mokhtar, Muhammad Imran and Sghaier Guizani

    Version of Record online: 25 JUL 2016 | DOI: 10.1002/wcm.2709

    Thumbnail image of graphical abstract

    We survey the state-of-the-art research efforts carried out in the mobile ad hoc cloud (MAC) domain. We analyze several problems inhibiting the adoption of MAC and review corresponding solutions by devising a taxonomy. We compare the existing proposed solutions by highlighting the advantages and disadvantages. We devise another taxonomy based on conducted survey of MAC. We identify and discuss the key principles for successful deployment of MAC. Finally, we present open challenges as future research directions.

  2. Estimation-based cell search method for a mobile relay deployed on a moving network

    Kwang-Chun Go, Hyun-Jin Lee and Jae-Hyun Kim

    Version of Record online: 22 JUL 2016 | DOI: 10.1002/wcm.2703

    Thumbnail image of graphical abstract

    The estimation-based cell search method reduces the service interruption time and the wasted resources because of the cell search of the mobile relay (MR). The estimation-based cell search method estimates the signal quality between the neighbor base stations and the MR by using the measurement reports transmitted by the mobile stations connected to the MR. The MR can obtain information about the signal quality of the neighbor BSs without having to initiate a cell search procedure.

  3. Relay attacks concerns in wireless ad hoc, sensors, and RFID networks (pages 1431–1435)

    Sghaier Guizani

    Version of Record online: 22 JUL 2016 | DOI: 10.1002/wcm.2707

    Thumbnail image of graphical abstract

    Figure 4 shows the Relay Channel data Rate versus Probability of Successful countermeasure attack versus Timeout.

  4. DiscoverFriends: secure social network communication in mobile ad hoc networks (pages 1401–1413)

    Joshua Joy, Eric Chung, Zengwen Yuan, Jiayao Li, Leqi Zou and Mario Gerla

    Version of Record online: 22 JUL 2016 | DOI: 10.1002/wcm.2708

    Thumbnail image of graphical abstract

    Online social networks (OSNs) with location-based services have seen a notable increase in usage on mobile devices. However, location-based services have privacy concerns - the ability for an OSN to track individuals' activities. We present DiscoverFriends, the first Wi-Fi multi-hop solution that bypasses OSN servers, enabling users to communicate with their OSN friends without having to go through OSN servers.

  5. On the performance of interference cancelation in D2D-enabled cellular networks

    Chuan Ma, Weijie Wu, Ying Cui and Xinbing Wang

    Version of Record online: 20 JUL 2016 | DOI: 10.1002/wcm.2712

    Thumbnail image of graphical abstract

    In this paper, we present an analytical framework for studying the performance of interference cancellation methods in large-scale D2D-enabled cellular networks using the tools from stochastic geometry. We derive the general expressions for the successful transmission probabilities of both cellular uplinks and D2D links in the networks where unconditional interference cancellation (UIC) and successive interference cancellation (SIC), UIC are respectively applied.

SEARCH

SEARCH BY CITATION