Wireless Communications and Mobile Computing
© John Wiley & Sons Ltd
Edited By: Mohsen Guizani
Impact Factor: 0.922
ISI Journal Citation Reports © Ranking: 2015: 49/82 (Telecommunications); 93/143 (Computer Science Information Systems); 162/255 (Engineering Electrical & Electronic)
Online ISSN: 1530-8677
Wireless Communications and Mobile Computing is part of an exciting new pilot partnership between Wiley and Hindawi. From 1st January 2017, the journal will become fully open access. Wireless Communications and Mobile Computing will remain a Wiley title but will be published and hosted by Hindawi, and will benefit from Hindawi’s experience and expertise in publishing open access titles. Wireless Communications and Mobile Computing will continue to undergo a rigorous peer review process ensuring that quality remains high. Manuscripts submitted on or after 16 June 2016 and accepted for publication will be published as open access articles, immediately free to read, download and share. Authors or their funder will be required to pay an Article Publication Charge upon acceptance. For further information, please click here.
Recently Published Articles
- VDNet: an infrastructure-less UAV-assisted sparse VANET system with vehicle location prediction
Xiong Wang, Luoyi Fu, Yang Zhang, Xiaoying Gan and Xinbing Wang
Version of Record online: 27 SEP 2016 | DOI: 10.1002/wcm.2727
We investigate an infrastructure-less unmanned aerial vehicle assisted system in vehicular ad hoc network to boost vehicle-to-vehicle data message transmission. The unmanned aerial vehicles can help reduce disconnections when vehicular ad hoc network is sparse and adapt transmission to dynamic mobility pattern. Performance evaluation shows that we can achieve efficient data transmission and low end-to-end delay.
- Block-wise Alamouti schemes for OQAM-OFDM systems with complex orthogonality
Jun Li, Da Chen, Daiming Qu and Tao Jiang
Version of Record online: 26 SEP 2016 | DOI: 10.1002/wcm.2747
We propose a block-wise SFBC scheme and a block-wise STBC scheme for OQAM-OFDM systems, which satisfy the orthogonality condition of the Alamouti code in the complex field with guard band/intervals. To improve the spectral efficiency of the block-wise SFBC scheme, a simple equalization scheme is also proposed.
- Mitigating jamming attacks in mobile cognitive networks through time hopping
Nadia Adem, Bechir Hamdaoui and Attila Yavuz
Version of Record online: 23 SEP 2016 | DOI: 10.1002/wcm.2745
Cognitive networks emerge as a promising technology to get the best out of the limited spectrum resources. Cognitive users opportunistically access spectrum assigned to spectrum-license holders. The dynamical spectrum availability makes cognitive network vulnerable to jamming attacks. In this paper, we propose time-based anti-jamming techniques that, unlike other existing frequency-based techniques, do not assume accessibility to multiple channels. We achieve analytical solutions of jamming, switching, and error probabilities. Our findings show that our proposed techniques outperform other existing techniques.
- Truthful double auction of spectrum trading for femtocell service provision
Ru Zong, Xinbo Gao and Xiaofeng Feng
Version of Record online: 23 SEP 2016 | DOI: 10.1002/wcm.2738
A spectrum trading framework is presented based on double auction between multiple femtocell service providers (FSPs) and macrocell service providers (MSPs), aiming at helping FSPs leasing spectrum from the existing licensed spectrum holder MSPs. An analysis is made on how to determine the acceptable spectrum trading prices and volumes for both MSPs and FSPs. The truthfulness and other properties of the spectrum double auction have been proved, which guarantee the fairness of the transaction.
- Towards an efficient failure detection in MANETs
Haroun Benkaouha, Abdelkrim Abdelli, Jalel Ben-Othman and Lynda Mokdad
Version of Record online: 23 SEP 2016 | DOI: 10.1002/wcm.2739
We deal in this paper with failure detection underMANETs constraints. To this end, we introduce the protocol EFDAN that aims at providing a compromise solution in terms of accuracy, completeness, and resource consumption. The simulations performed on NS2 platform show the efficiency of EFDAN compared with other protocols.