Wireless Communications and Mobile Computing
© John Wiley & Sons Ltd
Edited By: Mohsen Guizani
Impact Factor: 0.922
ISI Journal Citation Reports © Ranking: 2015: 49/82 (Telecommunications); 93/143 (Computer Science Information Systems); 162/255 (Engineering Electrical & Electronic)
Online ISSN: 1530-8677
Wireless Communications and Mobile Computing is part of an exciting new pilot partnership between Wiley and Hindawi. From 1st January 2017, the journal will become fully open access. Wireless Communications and Mobile Computing will remain a Wiley title but will be published and hosted by Hindawi, and will benefit from Hindawi’s experience and expertise in publishing open access titles. Wireless Communications and Mobile Computing will continue to undergo a rigorous peer review process ensuring that quality remains high. Manuscripts submitted on or after 16 June 2016 and accepted for publication will be published as open access articles, immediately free to read, download and share. Authors or their funder will be required to pay an Article Publication Charge upon acceptance. For further information, please click here.
Recently Published Articles
- Estimation-based cell search method for a mobile relay deployed on a moving network
Kwang-Chun Go, Hyun-Jin Lee and Jae-Hyun Kim
Version of Record online: 22 JUL 2016 | DOI: 10.1002/wcm.2703
The estimation-based cell search method reduces the service interruption time and the wasted resources because of the cell search of the mobile relay (MR). The estimation-based cell search method estimates the signal quality between the neighbor base stations and the MR by using the measurement reports transmitted by the mobile stations connected to the MR. The MR can obtain information about the signal quality of the neighbor BSs without having to initiate a cell search procedure.
- Relay attacks concerns in wireless ad hoc, sensors, and RFID networks (pages 1431–1435)
Version of Record online: 22 JUL 2016 | DOI: 10.1002/wcm.2707
Figure 4 shows the Relay Channel data Rate versus Probability of Successful countermeasure attack versus Timeout.
- DiscoverFriends: secure social network communication in mobile ad hoc networks (pages 1401–1413)
Joshua Joy, Eric Chung, Zengwen Yuan, Jiayao Li, Leqi Zou and Mario Gerla
Version of Record online: 22 JUL 2016 | DOI: 10.1002/wcm.2708
Online social networks (OSNs) with location-based services have seen a notable increase in usage on mobile devices. However, location-based services have privacy concerns - the ability for an OSN to track individuals' activities. We present DiscoverFriends, the first Wi-Fi multi-hop solution that bypasses OSN servers, enabling users to communicate with their OSN friends without having to go through OSN servers.
- On the performance of interference cancelation in D2D-enabled cellular networks
Chuan Ma, Weijie Wu, Ying Cui and Xinbing Wang
Version of Record online: 20 JUL 2016 | DOI: 10.1002/wcm.2712
In this paper, we present an analytical framework for studying the performance of interference cancellation methods in large-scale D2D-enabled cellular networks using the tools from stochastic geometry. We derive the general expressions for the successful transmission probabilities of both cellular uplinks and D2D links in the networks where unconditional interference cancellation (UIC) and successive interference cancellation (SIC), UIC are respectively applied.
- Cooperative amplify-and-forward partial relay selection with outdated channel information in spectrum-sharing systems
Jules Merlin Moualeu, Walaa Hamouda and Fambirai Takawira
Version of Record online: 20 JUL 2016 | DOI: 10.1002/wcm.2711
In this paper, we investigate the impact of outdated channel state information for relay selection on the performance of partial relay selection with amplify and forward in underlay spectrum-sharing systems. We begin by deriving closed-form expressions for the outage probability and average bit-error rate of the secondary network. Moreover, we present asymptotic expressions for the aforementioned performance metrics. Finally, we confirm our results through comparisons with computer simulations.