EURASIP Journal on Wireless Communications and Networking

Journal Information
ISSN / EISSN : 1687-1472 / 1687-1499
Current Publisher: Springer Science and Business Media LLC (10.1186)
Former Publisher: Hindawi Limited (10.1155)
Total articles ≅ 3,937
Current Coverage
Archived in

Latest articles in this journal

, Liang Ran, Jun Zhang, Hongbo Zhu
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-23; doi:10.1186/s13638-021-02008-z

Edge offloading, including offloading to edge base stations (BS) via cellular links and to idle mobile users (MUs) via device-to-device (D2D) links, has played a vital role in achieving ultra-low latency characteristics in 5G wireless networks. This paper studies an offloading method of parallel communication and computation to minimize the delay in multi-user systems. Three different scenarios are explored, i.e., full offloading, partial offloading, and D2D-enabled partial offloading. In the full offloading scenario, we find a serving order for the MUs. Then, we jointly optimize the serving order and task segment in the partial offloading scenario. For the D2D-enabled partial offloading scenario, we decompose the problem into two subproblems and then find the sub-optimal solution based on the results of the two subproblems. Finally, the simulation results demonstrate that the offloading method of parallel communication and computing can significantly reduce the system delay, and the D2D-enabled partial offloading can further reduce the latency.
Xiaokun Sun, Zhaohua Li, Tao Hong
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-14; doi:10.1186/s13638-021-02003-4

Reliable supporting effect is of utmost important for the deep mining roadway to prevent the hazards during deep mining activities. Traditional supporting equipment are not satisfying in the absence of the energy-absorbing capacity, whereas the Constant-Resistance-Large-Deformation (CRLD) cable, which can endure a large deformation of 2 m and provide a constant resistance in the meantime, would be a reasonable choice. To verify the CRLD performance of the new cable and highlight its energy-absorbing capacity under impact loading, this paper designed an in situ blasting test in a discarded deep roadway, which is divided into four sections and reinforced by the traditional and CRLD cables, respectively. Firstly, a numerical study of the blasting testis is carried out, the CRLD cable element is proposed, based on the existing one of the FLAC3D software, and a static pullout test is simulated to verify the new element, the adapted impact loading is estimated and the dynamic calculation is performed. Furthermore, under the blasting, which releases the energy of the 1st seismic magnitude, the monitored axial forces of the cables are transmitted in real time using 5G-IoT, and the supporting effects of the two types of cables are compared. According to the numerical and experimental results, the CRLD cable is proven reliable to support the deep roadway, at least shocked by the released energy corresponding to the 1st seismic magnitude.
, Itsik Bergel
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-26; doi:10.1186/s13638-021-02002-5

In this paper we consider opportunistic routing in multiple-input–multiple-output (MIMO) random wireless ad-hoc networks (WANETs). Our analysis uses a proper model of the physical layer together with an abstraction of the higher communication layers. We assume that the nodes are distributed according to a Poisson point process and consider a routing scheme that opportunistically selects the next relay and the number of spatially multiplexed data streams. The routing decisions are based on geographic locations, the channel gains of the neighbor nodes, and the statistical characterization of all other nodes. Unlike the single antenna case, the optimal routing scheme cannot be explicitly expressed. Hence, we propose a smart-routing scheme for MIMO that adapts the number of data streams per user to the channel conditions. The numerical results demonstrate that this scheme outperforms all previously published schemes for this scenario. The findings highlight the importance of channel state information for efficient routing, and the need for an adaptive selection of the number of data streams at each transmitter.
Memoona J. Anwar, Asif Q. Gill, Farookh K. Hussain,
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-30; doi:10.1186/s13638-021-01996-2

Big data ecosystems are complex data-intensive, digital–physical systems. Data-intensive ecosystems offer a number of benefits; however, they present challenges as well. One major challenge is related to the privacy and security. A number of privacy and security models, techniques and algorithms have been proposed over a period of time. The limitation is that these solutions are primarily focused on an individual or on an isolated organizational context. There is a need to study and provide complete end-to-end solutions that ensure security and privacy throughout the data lifecycle across the ecosystem beyond the boundary of an individual system or organizational context. The results of current study provide a review of the existing privacy and security challenges and solutions using the systematic literature review (SLR) approach. Based on the SLR approach, 79 applicable articles were selected and analyzed. The information from these articles was extracted to compile a catalogue of security and privacy challenges in big data ecosystems and to highlight their interdependencies. The results were categorized from theoretical viewpoint using adaptive enterprise architecture and practical viewpoint using DAMA framework as guiding lens. The findings of this research will help to identify the research gaps and draw novel research directions in the context of privacy and security in big data-intensive ecosystems.
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-50; doi:10.1186/s13638-021-01968-6

In intelligent vehicular networks, vehicles have enhanced sensing capabilities and carry computing and communication platforms to enable new versatile systems known as Vehicular Communication (VC) systems. Vehicles communicate with other vehicles and with nearby fixed equipment to support different applications, including those which increase driver awareness of the surroundings. This should result in improved safety and may optimize traffic. However, VC systems are vulnerable to cyber attacks involving message manipulation. Research aimed at tackling this problem has resulted in the proposal of multiple authentication protocols. Several existing survey papers have attempted to classify some of these protocols based on a limited set of characteristics. However, to date there is no generic framework to support the comparison of these protocols and provide guidance for design and evaluation. Most existing classifications either use computation complexity of cryptographic techniques as a criterion, or they fail to make connections between different important aspects of authentication. This paper provides such a framework, proposing a new taxonomy to enable a consistent means of classifying authentication schemes based upon seven main criteria. The main contribution of this study is a framework to enable protocol designers and investigators to adequately compare and select authentication schemes when deciding on particular protocols to implement in an application. Our framework can be applied in design, making choices appropriate for the intended context in both intra-vehicle and inter-vehicle communications. We demonstrate the application of our framework using two different types of case study: individual analysis and hypothetical design. Additionally, this work makes several related contributions. We present the network model, outline the applications, list the communication patterns and the underlying standards, and discuss the necessity of using cryptography and key management in VC systems. We also review the threats, authentication, and privacy requirements in vehicular networks.
Ou Ruan, Lixiao Zhang, Yuanyuan Zhang
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-14; doi:10.1186/s13638-021-01999-z

Location-based services are becoming more and more popular in mobile online social networks (mOSNs) for smart cities, but users’ privacy also has aroused widespread concern, such as locations, friend sets and other private information. At present, many protocols have been proposed, but these protocols are inefficient and ignore some security risks. In the paper, we present a new location-sharing protocol, which solves two issues by using symmetric/asymmetric encryption properly. We adopt the following methods to reduce the communication and computation costs: only setting up one location server; connecting social network server and location server directly instead of through cellular towers; avoiding broadcast encryption. We introduce dummy identities to protect users’ identity privacy, and prevent location server from inferring users’ activity tracks by updating dummy identities in time. The details of security and performance analysis with related protocols show that our protocol enjoys two advantages: (1) it’s more efficient than related protocols, which greatly reduces the computation and communication costs; (2) it satisfies all security goals; however, most previous protocols only meet some security goals.
Dong Wang, Huanjuan Wang, Yuchen Fu
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-19; doi:10.1186/s13638-021-01966-8

This work investigates the unified coding and identification of smart grid IoT devices, as more and more IoT devices in smart grid need to be managed and controlled. We combine blockchain technology with 5G MEC to realize the connection of massive power IoT devices at the edge of 5G network. Due to blockchain’s distributed storage and credibility, it is used to identify and register IoT devices in smart grid, ensuring the reliability and accuracy of smart grid IoT devices management. In this paper, we propose a hybrid blockchain mechanism based on 5G MEC smart grid, where both public blockchain and private blockchain are deployed on the MEC gateway/server. To facilitate the data searching and extracting, we endeavor to build a blockchain explorer indexed by IoT device identifier. After that, we study the typical consensus algorithms in the blockchain such as PoW, PoS, DPoS, PDFT, and discuss their feasibility in the hybrid blockchain. Finally, we analyzed and compared the performance of different consensus algorithms from the perspective of average computing time and average time to agreement.
Aysha Maryam Ali, Mohammed A. Al Ghamdi, Muhammad Munwar Iqbal, Shehzad Khalid, Hamza Aldabbas, Saqib Saeed
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-1; doi:10.1186/s13638-021-01969-5

An amendment to this paper has been published and can be accessed via the original article.
Xianzhong Xie, Min Li, Zhaoyuan Shi, Hong Tang, Qian Huang
EURASIP Journal on Wireless Communications and Networking, Volume 2021, pp 1-19; doi:10.1186/s13638-021-01998-0

Non-orthogonal multiple access (NOMA) technology provides an effective solution to massive access with a high data rate demand in new-generation mobile networks. The paper combinations with NOMA and simultaneous wireless information and power transfer (SWIPT) relay to maximize the sum rate in the downlink system. To that end, it is critical how to select effectively users access system and power allocation for the access user. This paper proposes a user selection and dynamic power allocation (USDPA) scheme in the NOMA-SWIPT relay system based on neural network because traditional optimization methods have difficulty solving nonlinear and non-convex problems. We establish a user selection network utilizing a deep neural network (DNN) and propose a power allocation network using deep reinforcement learning. The simulation results show that the proposed scheme achieves better performance than other related schemes, especially for high quality of service requirements.
Back to Top Top