Wireless Communications and Mobile Computing

Cover image for Vol. 16 Issue 15

Edited By: Mohsen Guizani

Impact Factor: 0.922

ISI Journal Citation Reports © Ranking: 2015: 49/82 (Telecommunications); 93/143 (Computer Science Information Systems); 162/255 (Engineering Electrical & Electronic)

Online ISSN: 1530-8677

Recently Published Issues

See all


Wireless Communications and Mobile Computing is part of an exciting new pilot partnership between Wiley and Hindawi. From 1st January 2017, the journal will become fully open access. Wireless Communications and Mobile Computing will remain a Wiley title but will be published and hosted by Hindawi, and will benefit from Hindawi’s experience and expertise in publishing open access titles. Wireless Communications and Mobile Computing will continue to undergo a rigorous peer review process ensuring that quality remains high. Manuscripts submitted on or after 16 June 2016 and accepted for publication will be published as open access articles, immediately free to read, download and share. Authors or their funder will be required to pay an Article Publication Charge upon acceptance. For further information, please click here.

Recently Published Articles

  1. VDNet: an infrastructure-less UAV-assisted sparse VANET system with vehicle location prediction

    Xiong Wang, Luoyi Fu, Yang Zhang, Xiaoying Gan and Xinbing Wang

    Version of Record online: 27 SEP 2016 | DOI: 10.1002/wcm.2727

    Thumbnail image of graphical abstract

    We investigate an infrastructure-less unmanned aerial vehicle assisted system in vehicular ad hoc network to boost vehicle-to-vehicle data message transmission. The unmanned aerial vehicles can help reduce disconnections when vehicular ad hoc network is sparse and adapt transmission to dynamic mobility pattern. Performance evaluation shows that we can achieve efficient data transmission and low end-to-end delay.

  2. Block-wise Alamouti schemes for OQAM-OFDM systems with complex orthogonality

    Jun Li, Da Chen, Daiming Qu and Tao Jiang

    Version of Record online: 26 SEP 2016 | DOI: 10.1002/wcm.2747

    Thumbnail image of graphical abstract

    We propose a block-wise SFBC scheme and a block-wise STBC scheme for OQAM-OFDM systems, which satisfy the orthogonality condition of the Alamouti code in the complex field with guard band/intervals. To improve the spectral efficiency of the block-wise SFBC scheme, a simple equalization scheme is also proposed.

  3. Mitigating jamming attacks in mobile cognitive networks through time hopping

    Nadia Adem, Bechir Hamdaoui and Attila Yavuz

    Version of Record online: 23 SEP 2016 | DOI: 10.1002/wcm.2745

    Thumbnail image of graphical abstract

    Cognitive networks emerge as a promising technology to get the best out of the limited spectrum resources. Cognitive users opportunistically access spectrum assigned to spectrum-license holders. The dynamical spectrum availability makes cognitive network vulnerable to jamming attacks. In this paper, we propose time-based anti-jamming techniques that, unlike other existing frequency-based techniques, do not assume accessibility to multiple channels. We achieve analytical solutions of jamming, switching, and error probabilities. Our findings show that our proposed techniques outperform other existing techniques.

  4. Truthful double auction of spectrum trading for femtocell service provision

    Ru Zong, Xinbo Gao and Xiaofeng Feng

    Version of Record online: 23 SEP 2016 | DOI: 10.1002/wcm.2738

    Thumbnail image of graphical abstract

    A spectrum trading framework is presented based on double auction between multiple femtocell service providers (FSPs) and macrocell service providers (MSPs), aiming at helping FSPs leasing spectrum from the existing licensed spectrum holder MSPs. An analysis is made on how to determine the acceptable spectrum trading prices and volumes for both MSPs and FSPs. The truthfulness and other properties of the spectrum double auction have been proved, which guarantee the fairness of the transaction.

  5. Towards an efficient failure detection in MANETs

    Haroun Benkaouha, Abdelkrim Abdelli, Jalel Ben-Othman and Lynda Mokdad

    Version of Record online: 23 SEP 2016 | DOI: 10.1002/wcm.2739

    Thumbnail image of graphical abstract

    We deal in this paper with failure detection underMANETs constraints. To this end, we introduce the protocol EFDAN that aims at providing a compromise solution in terms of accuracy, completeness, and resource consumption. The simulations performed on NS2 platform show the efficiency of EFDAN compared with other protocols.