for Journals by Title or ISSN
for Articles by Keywords

Publisher: Elsevier   (Total: 3159 journals)

 A  B  C  D  E  F  G  H  I  J  K  L  M  N  O  P  Q  R  S  T  U  V  W  X  Y  Z  

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Showing 1 - 200 of 3159 Journals sorted alphabetically
A Practical Logic of Cognitive Systems     Full-text available via subscription   (Followers: 9)
AASRI Procedia     Open Access   (Followers: 15)
Academic Pediatrics     Hybrid Journal   (Followers: 32, SJR: 1.655, CiteScore: 2)
Academic Radiology     Hybrid Journal   (Followers: 22, SJR: 1.015, CiteScore: 2)
Accident Analysis & Prevention     Partially Free   (Followers: 90, SJR: 1.462, CiteScore: 3)
Accounting Forum     Hybrid Journal   (Followers: 25, SJR: 0.932, CiteScore: 2)
Accounting, Organizations and Society     Hybrid Journal   (Followers: 34, SJR: 1.771, CiteScore: 3)
Achievements in the Life Sciences     Open Access   (Followers: 5)
Acta Anaesthesiologica Taiwanica     Open Access   (Followers: 7)
Acta Astronautica     Hybrid Journal   (Followers: 408, SJR: 0.758, CiteScore: 2)
Acta Automatica Sinica     Full-text available via subscription   (Followers: 2)
Acta Biomaterialia     Hybrid Journal   (Followers: 27, SJR: 1.967, CiteScore: 7)
Acta Colombiana de Cuidado Intensivo     Full-text available via subscription   (Followers: 2)
Acta de Investigación Psicológica     Open Access   (Followers: 3)
Acta Ecologica Sinica     Open Access   (Followers: 8, SJR: 0.18, CiteScore: 1)
Acta Haematologica Polonica     Free   (Followers: 1, SJR: 0.128, CiteScore: 0)
Acta Histochemica     Hybrid Journal   (Followers: 3, SJR: 0.661, CiteScore: 2)
Acta Materialia     Hybrid Journal   (Followers: 246, SJR: 3.263, CiteScore: 6)
Acta Mathematica Scientia     Full-text available via subscription   (Followers: 5, SJR: 0.504, CiteScore: 1)
Acta Mechanica Solida Sinica     Full-text available via subscription   (Followers: 9, SJR: 0.542, CiteScore: 1)
Acta Oecologica     Hybrid Journal   (Followers: 10, SJR: 0.834, CiteScore: 2)
Acta Otorrinolaringologica (English Edition)     Full-text available via subscription  
Acta Otorrinolaringológica Española     Full-text available via subscription   (Followers: 2, SJR: 0.307, CiteScore: 0)
Acta Pharmaceutica Sinica B     Open Access   (Followers: 1, SJR: 1.793, CiteScore: 6)
Acta Poética     Open Access   (Followers: 4, SJR: 0.101, CiteScore: 0)
Acta Psychologica     Hybrid Journal   (Followers: 28, SJR: 1.331, CiteScore: 2)
Acta Sociológica     Open Access   (Followers: 1)
Acta Tropica     Hybrid Journal   (Followers: 6, SJR: 1.052, CiteScore: 2)
Acta Urológica Portuguesa     Open Access  
Actas Dermo-Sifiliograficas     Full-text available via subscription   (Followers: 3, SJR: 0.374, CiteScore: 1)
Actas Dermo-Sifiliográficas (English Edition)     Full-text available via subscription   (Followers: 2)
Actas Urológicas Españolas     Full-text available via subscription   (Followers: 3, SJR: 0.344, CiteScore: 1)
Actas Urológicas Españolas (English Edition)     Full-text available via subscription   (Followers: 1)
Actualites Pharmaceutiques     Full-text available via subscription   (Followers: 6, SJR: 0.19, CiteScore: 0)
Actualites Pharmaceutiques Hospitalieres     Full-text available via subscription   (Followers: 3)
Acupuncture and Related Therapies     Hybrid Journal   (Followers: 6)
Acute Pain     Full-text available via subscription   (Followers: 15, SJR: 2.671, CiteScore: 5)
Ad Hoc Networks     Hybrid Journal   (Followers: 11, SJR: 0.53, CiteScore: 4)
Addictive Behaviors     Hybrid Journal   (Followers: 16, SJR: 1.29, CiteScore: 3)
Addictive Behaviors Reports     Open Access   (Followers: 8, SJR: 0.755, CiteScore: 2)
Additive Manufacturing     Hybrid Journal   (Followers: 9, SJR: 2.611, CiteScore: 8)
Additives for Polymers     Full-text available via subscription   (Followers: 22)
Advanced Drug Delivery Reviews     Hybrid Journal   (Followers: 143, SJR: 4.09, CiteScore: 13)
Advanced Engineering Informatics     Hybrid Journal   (Followers: 11, SJR: 1.167, CiteScore: 4)
Advanced Powder Technology     Hybrid Journal   (Followers: 16, SJR: 0.694, CiteScore: 3)
Advances in Accounting     Hybrid Journal   (Followers: 8, SJR: 0.277, CiteScore: 1)
Advances in Agronomy     Full-text available via subscription   (Followers: 12, SJR: 2.384, CiteScore: 5)
Advances in Anesthesia     Full-text available via subscription   (Followers: 28, SJR: 0.126, CiteScore: 0)
Advances in Antiviral Drug Design     Full-text available via subscription   (Followers: 2)
Advances in Applied Mathematics     Full-text available via subscription   (Followers: 10, SJR: 0.992, CiteScore: 1)
Advances in Applied Mechanics     Full-text available via subscription   (Followers: 11, SJR: 1.551, CiteScore: 4)
Advances in Applied Microbiology     Full-text available via subscription   (Followers: 22, SJR: 2.089, CiteScore: 5)
Advances In Atomic, Molecular, and Optical Physics     Full-text available via subscription   (Followers: 14, SJR: 0.572, CiteScore: 2)
Advances in Biological Regulation     Hybrid Journal   (Followers: 4, SJR: 2.61, CiteScore: 7)
Advances in Botanical Research     Full-text available via subscription   (Followers: 2, SJR: 0.686, CiteScore: 2)
Advances in Cancer Research     Full-text available via subscription   (Followers: 30, SJR: 3.043, CiteScore: 6)
Advances in Carbohydrate Chemistry and Biochemistry     Full-text available via subscription   (Followers: 7, SJR: 1.453, CiteScore: 2)
Advances in Catalysis     Full-text available via subscription   (Followers: 5, SJR: 1.992, CiteScore: 5)
Advances in Cell Aging and Gerontology     Full-text available via subscription   (Followers: 3)
Advances in Cellular and Molecular Biology of Membranes and Organelles     Full-text available via subscription   (Followers: 12)
Advances in Chemical Engineering     Full-text available via subscription   (Followers: 27, SJR: 0.156, CiteScore: 1)
Advances in Child Development and Behavior     Full-text available via subscription   (Followers: 10, SJR: 0.713, CiteScore: 1)
Advances in Chronic Kidney Disease     Full-text available via subscription   (Followers: 10, SJR: 1.316, CiteScore: 2)
Advances in Clinical Chemistry     Full-text available via subscription   (Followers: 28, SJR: 1.562, CiteScore: 3)
Advances in Colloid and Interface Science     Full-text available via subscription   (Followers: 19, SJR: 1.977, CiteScore: 8)
Advances in Computers     Full-text available via subscription   (Followers: 14, SJR: 0.205, CiteScore: 1)
Advances in Dermatology     Full-text available via subscription   (Followers: 15)
Advances in Developmental Biology     Full-text available via subscription   (Followers: 11)
Advances in Digestive Medicine     Open Access   (Followers: 9)
Advances in DNA Sequence-Specific Agents     Full-text available via subscription   (Followers: 5)
Advances in Drug Research     Full-text available via subscription   (Followers: 24)
Advances in Ecological Research     Full-text available via subscription   (Followers: 43, SJR: 2.524, CiteScore: 4)
Advances in Engineering Software     Hybrid Journal   (Followers: 27, SJR: 1.159, CiteScore: 4)
Advances in Experimental Biology     Full-text available via subscription   (Followers: 7)
Advances in Experimental Social Psychology     Full-text available via subscription   (Followers: 44, SJR: 5.39, CiteScore: 8)
Advances in Exploration Geophysics     Full-text available via subscription   (Followers: 1)
Advances in Fluorine Science     Full-text available via subscription   (Followers: 9)
Advances in Food and Nutrition Research     Full-text available via subscription   (Followers: 54, SJR: 0.591, CiteScore: 2)
Advances in Fuel Cells     Full-text available via subscription   (Followers: 16)
Advances in Genetics     Full-text available via subscription   (Followers: 16, SJR: 1.354, CiteScore: 4)
Advances in Genome Biology     Full-text available via subscription   (Followers: 8, SJR: 12.74, CiteScore: 13)
Advances in Geophysics     Full-text available via subscription   (Followers: 6, SJR: 1.193, CiteScore: 3)
Advances in Heat Transfer     Full-text available via subscription   (Followers: 21, SJR: 0.368, CiteScore: 1)
Advances in Heterocyclic Chemistry     Full-text available via subscription   (Followers: 11, SJR: 0.749, CiteScore: 3)
Advances in Human Factors/Ergonomics     Full-text available via subscription   (Followers: 22)
Advances in Imaging and Electron Physics     Full-text available via subscription   (Followers: 2, SJR: 0.193, CiteScore: 0)
Advances in Immunology     Full-text available via subscription   (Followers: 36, SJR: 4.433, CiteScore: 6)
Advances in Inorganic Chemistry     Full-text available via subscription   (Followers: 8, SJR: 1.163, CiteScore: 2)
Advances in Insect Physiology     Full-text available via subscription   (Followers: 2, SJR: 1.938, CiteScore: 3)
Advances in Integrative Medicine     Hybrid Journal   (Followers: 6, SJR: 0.176, CiteScore: 0)
Advances in Intl. Accounting     Full-text available via subscription   (Followers: 3)
Advances in Life Course Research     Hybrid Journal   (Followers: 8, SJR: 0.682, CiteScore: 2)
Advances in Lipobiology     Full-text available via subscription   (Followers: 1)
Advances in Magnetic and Optical Resonance     Full-text available via subscription   (Followers: 9)
Advances in Marine Biology     Full-text available via subscription   (Followers: 14, SJR: 0.88, CiteScore: 2)
Advances in Mathematics     Full-text available via subscription   (Followers: 11, SJR: 3.027, CiteScore: 2)
Advances in Medical Sciences     Hybrid Journal   (Followers: 6, SJR: 0.694, CiteScore: 2)
Advances in Medicinal Chemistry     Full-text available via subscription   (Followers: 5)
Advances in Microbial Physiology     Full-text available via subscription   (Followers: 4, SJR: 1.158, CiteScore: 3)
Advances in Molecular and Cell Biology     Full-text available via subscription   (Followers: 21)
Advances in Molecular and Cellular Endocrinology     Full-text available via subscription   (Followers: 8)
Advances in Molecular Toxicology     Full-text available via subscription   (Followers: 7, SJR: 0.182, CiteScore: 0)
Advances in Nanoporous Materials     Full-text available via subscription   (Followers: 3)
Advances in Oncobiology     Full-text available via subscription   (Followers: 1)
Advances in Organ Biology     Full-text available via subscription   (Followers: 1)
Advances in Organometallic Chemistry     Full-text available via subscription   (Followers: 16, SJR: 1.875, CiteScore: 4)
Advances in Parallel Computing     Full-text available via subscription   (Followers: 7, SJR: 0.174, CiteScore: 0)
Advances in Parasitology     Full-text available via subscription   (Followers: 5, SJR: 1.579, CiteScore: 4)
Advances in Pediatrics     Full-text available via subscription   (Followers: 24, SJR: 0.461, CiteScore: 1)
Advances in Pharmaceutical Sciences     Full-text available via subscription   (Followers: 10)
Advances in Pharmacology     Full-text available via subscription   (Followers: 16, SJR: 1.536, CiteScore: 3)
Advances in Physical Organic Chemistry     Full-text available via subscription   (Followers: 8, SJR: 0.574, CiteScore: 1)
Advances in Phytomedicine     Full-text available via subscription  
Advances in Planar Lipid Bilayers and Liposomes     Full-text available via subscription   (Followers: 3, SJR: 0.109, CiteScore: 1)
Advances in Plant Biochemistry and Molecular Biology     Full-text available via subscription   (Followers: 8)
Advances in Plant Pathology     Full-text available via subscription   (Followers: 5)
Advances in Porous Media     Full-text available via subscription   (Followers: 5)
Advances in Protein Chemistry     Full-text available via subscription   (Followers: 18)
Advances in Protein Chemistry and Structural Biology     Full-text available via subscription   (Followers: 20, SJR: 0.791, CiteScore: 2)
Advances in Psychology     Full-text available via subscription   (Followers: 63)
Advances in Quantum Chemistry     Full-text available via subscription   (Followers: 6, SJR: 0.371, CiteScore: 1)
Advances in Radiation Oncology     Open Access   (SJR: 0.263, CiteScore: 1)
Advances in Small Animal Medicine and Surgery     Hybrid Journal   (Followers: 3, SJR: 0.101, CiteScore: 0)
Advances in Space Biology and Medicine     Full-text available via subscription   (Followers: 5)
Advances in Space Research     Full-text available via subscription   (Followers: 396, SJR: 0.569, CiteScore: 2)
Advances in Structural Biology     Full-text available via subscription   (Followers: 5)
Advances in Surgery     Full-text available via subscription   (Followers: 10, SJR: 0.555, CiteScore: 2)
Advances in the Study of Behavior     Full-text available via subscription   (Followers: 31, SJR: 2.208, CiteScore: 4)
Advances in Veterinary Medicine     Full-text available via subscription   (Followers: 18)
Advances in Veterinary Science and Comparative Medicine     Full-text available via subscription   (Followers: 13)
Advances in Virus Research     Full-text available via subscription   (Followers: 5, SJR: 2.262, CiteScore: 5)
Advances in Water Resources     Hybrid Journal   (Followers: 46, SJR: 1.551, CiteScore: 3)
Aeolian Research     Hybrid Journal   (Followers: 6, SJR: 1.117, CiteScore: 3)
Aerospace Science and Technology     Hybrid Journal   (Followers: 336, SJR: 0.796, CiteScore: 3)
AEU - Intl. J. of Electronics and Communications     Hybrid Journal   (Followers: 8, SJR: 0.42, CiteScore: 2)
African J. of Emergency Medicine     Open Access   (Followers: 6, SJR: 0.296, CiteScore: 0)
Ageing Research Reviews     Hybrid Journal   (Followers: 11, SJR: 3.671, CiteScore: 9)
Aggression and Violent Behavior     Hybrid Journal   (Followers: 445, SJR: 1.238, CiteScore: 3)
Agri Gene     Hybrid Journal   (SJR: 0.13, CiteScore: 0)
Agricultural and Forest Meteorology     Hybrid Journal   (Followers: 16, SJR: 1.818, CiteScore: 5)
Agricultural Systems     Hybrid Journal   (Followers: 32, SJR: 1.156, CiteScore: 4)
Agricultural Water Management     Hybrid Journal   (Followers: 43, SJR: 1.272, CiteScore: 3)
Agriculture and Agricultural Science Procedia     Open Access   (Followers: 1)
Agriculture and Natural Resources     Open Access   (Followers: 2)
Agriculture, Ecosystems & Environment     Hybrid Journal   (Followers: 57, SJR: 1.747, CiteScore: 4)
Ain Shams Engineering J.     Open Access   (Followers: 5, SJR: 0.589, CiteScore: 3)
Air Medical J.     Hybrid Journal   (Followers: 6, SJR: 0.26, CiteScore: 0)
AKCE Intl. J. of Graphs and Combinatorics     Open Access   (SJR: 0.19, CiteScore: 0)
Alcohol     Hybrid Journal   (Followers: 11, SJR: 1.153, CiteScore: 3)
Alcoholism and Drug Addiction     Open Access   (Followers: 9)
Alergologia Polska : Polish J. of Allergology     Full-text available via subscription   (Followers: 1)
Alexandria Engineering J.     Open Access   (Followers: 1, SJR: 0.604, CiteScore: 3)
Alexandria J. of Medicine     Open Access   (Followers: 1, SJR: 0.191, CiteScore: 1)
Algal Research     Partially Free   (Followers: 10, SJR: 1.142, CiteScore: 4)
Alkaloids: Chemical and Biological Perspectives     Full-text available via subscription   (Followers: 2)
Allergologia et Immunopathologia     Full-text available via subscription   (Followers: 1, SJR: 0.504, CiteScore: 1)
Allergology Intl.     Open Access   (Followers: 5, SJR: 1.148, CiteScore: 2)
Alpha Omegan     Full-text available via subscription   (SJR: 3.521, CiteScore: 6)
ALTER - European J. of Disability Research / Revue Européenne de Recherche sur le Handicap     Full-text available via subscription   (Followers: 9, SJR: 0.201, CiteScore: 1)
Alzheimer's & Dementia     Hybrid Journal   (Followers: 50, SJR: 4.66, CiteScore: 10)
Alzheimer's & Dementia: Diagnosis, Assessment & Disease Monitoring     Open Access   (Followers: 4, SJR: 1.796, CiteScore: 4)
Alzheimer's & Dementia: Translational Research & Clinical Interventions     Open Access   (Followers: 4, SJR: 1.108, CiteScore: 3)
Ambulatory Pediatrics     Hybrid Journal   (Followers: 6)
American Heart J.     Hybrid Journal   (Followers: 50, SJR: 3.267, CiteScore: 4)
American J. of Cardiology     Hybrid Journal   (Followers: 54, SJR: 1.93, CiteScore: 3)
American J. of Emergency Medicine     Hybrid Journal   (Followers: 44, SJR: 0.604, CiteScore: 1)
American J. of Geriatric Pharmacotherapy     Full-text available via subscription   (Followers: 10)
American J. of Geriatric Psychiatry     Hybrid Journal   (Followers: 14, SJR: 1.524, CiteScore: 3)
American J. of Human Genetics     Hybrid Journal   (Followers: 34, SJR: 7.45, CiteScore: 8)
American J. of Infection Control     Hybrid Journal   (Followers: 28, SJR: 1.062, CiteScore: 2)
American J. of Kidney Diseases     Hybrid Journal   (Followers: 34, SJR: 2.973, CiteScore: 4)
American J. of Medicine     Hybrid Journal   (Followers: 45)
American J. of Medicine Supplements     Full-text available via subscription   (Followers: 3, SJR: 1.967, CiteScore: 2)
American J. of Obstetrics and Gynecology     Hybrid Journal   (Followers: 202, SJR: 2.7, CiteScore: 4)
American J. of Ophthalmology     Hybrid Journal   (Followers: 63, SJR: 3.184, CiteScore: 4)
American J. of Ophthalmology Case Reports     Open Access   (Followers: 5, SJR: 0.265, CiteScore: 0)
American J. of Orthodontics and Dentofacial Orthopedics     Full-text available via subscription   (Followers: 6, SJR: 1.289, CiteScore: 1)
American J. of Otolaryngology     Hybrid Journal   (Followers: 25, SJR: 0.59, CiteScore: 1)
American J. of Pathology     Hybrid Journal   (Followers: 27, SJR: 2.139, CiteScore: 4)
American J. of Preventive Medicine     Hybrid Journal   (Followers: 28, SJR: 2.164, CiteScore: 4)
American J. of Surgery     Hybrid Journal   (Followers: 37, SJR: 1.141, CiteScore: 2)
American J. of the Medical Sciences     Hybrid Journal   (Followers: 12, SJR: 0.767, CiteScore: 1)
Ampersand : An Intl. J. of General and Applied Linguistics     Open Access   (Followers: 6)
Anaerobe     Hybrid Journal   (Followers: 4, SJR: 1.144, CiteScore: 3)
Anaesthesia & Intensive Care Medicine     Full-text available via subscription   (Followers: 62, SJR: 0.138, CiteScore: 0)
Anaesthesia Critical Care & Pain Medicine     Full-text available via subscription   (Followers: 16, SJR: 0.411, CiteScore: 1)
Anales de Cirugia Vascular     Full-text available via subscription  
Anales de Pediatría     Full-text available via subscription   (Followers: 3, SJR: 0.277, CiteScore: 0)
Anales de Pediatría (English Edition)     Full-text available via subscription  
Anales de Pediatría Continuada     Full-text available via subscription  
Analytic Methods in Accident Research     Hybrid Journal   (Followers: 5, SJR: 4.849, CiteScore: 10)
Analytica Chimica Acta     Hybrid Journal   (Followers: 40, SJR: 1.512, CiteScore: 5)
Analytical Biochemistry     Hybrid Journal   (Followers: 173, SJR: 0.633, CiteScore: 2)
Analytical Chemistry Research     Open Access   (Followers: 10, SJR: 0.411, CiteScore: 2)
Analytical Spectroscopy Library     Full-text available via subscription   (Followers: 11)
Anesthésie & Réanimation     Full-text available via subscription   (Followers: 2)
Anesthesiology Clinics     Full-text available via subscription   (Followers: 23, SJR: 0.683, CiteScore: 2)
Angiología     Full-text available via subscription   (SJR: 0.121, CiteScore: 0)
Angiologia e Cirurgia Vascular     Open Access   (Followers: 1, SJR: 0.111, CiteScore: 0)
Animal Behaviour     Hybrid Journal   (Followers: 190, SJR: 1.58, CiteScore: 3)

        1 2 3 4 5 6 7 8 | Last   [Sort by number of followers]   [Restore default list]

Journal Cover
Ad Hoc Networks
Journal Prestige (SJR): 0.53
Citation Impact (citeScore): 4
Number of Followers: 11  
  Hybrid Journal Hybrid journal (It can contain Open Access articles)
ISSN (Print) 1570-8705
Published by Elsevier Homepage  [3159 journals]
  • An Efficient Privacy-Preserving Protocol for Database-driven Cognitive
           Radio Networks
    • Abstract: Publication date: Available online 17 August 2018Source: Ad Hoc NetworksAuthor(s): Yali Zeng, Li Xu, Xu Yang, Xun Yi Cognitive radio is regarded as a promising technology for remedying spectrum shortage and improving spectrum utilization. However, database-driven cognitive radio networks (CRNs) are vulnerable to a series of security attacks and privacy threats, especially the privacy breach of secondary users (SUs). In this paper, we propose an efficient privacy-preserving protocol to protect the identity and trajectory privacy of each SU and to prevent the database (DB) from tracing any SU. Besides, this paper also aims at improving the efficiency of authentication and channel allocation to offer the best connectivity to SUs wherever they are and at any time. Taking advantage of the elliptic curve cryptography technique, our protocol achieves the mutual authentication between SUs and base stations (BSs), which enhances the security of CRNs communication. Based on channel pre-allocation to BSs, our protocol reduces the latency of obtaining available channels for SUs. Moreover, our protocol exploits reputation to motivate SUs to be honest and thus increases the utilization of the limited spectrum resources. The results of security analysis show that our protocol provides strong privacy preservation for SUs that the DB cannot get the entire trajectory of any SU, even the DB colludes with all BSs. Furthermore, the results also show that the proposed protocol can resist various types of attacks. The results of performance evaluation indicate the efficiency of the proposed privacy-preserving protocol.
  • On Trust Models for Communication Security in Vehicular Ad-hoc Networks
    • Abstract: Publication date: Available online 17 August 2018Source: Ad Hoc NetworksAuthor(s): Na Fan, Chase Q. Wu Vehicular ad-hoc networks (VANETs) are prone to various network attacks due to its open, dynamic, and distributed nature. It is of increasing importance to assess the trustworthiness of vehicle nodes and messages for communication security in such networks. In this paper, we propose an integrated security scheme to help nodes in VANETs identify the legitimacy of messages for proper decision making. Within the proposed scheme, we first construct trust models to quantify the direct and indirect reputation of a participating node. Particularly, we use the certain-factor model to measure the node’s direct reputation by observing its communication behavior, and synthesize the information from the node’s neighbors and road side unit (RSU) reports to determine its indirect reputation. Both types of reputation are then combined using the uncertain deductive method. Based on these trust models, we further design an attribute-weighted K-means method to identify legitimate messages and a routing method for message delivery in VANETs. We also design and incorporate a dynamic game model-based incentive mechanism to encourage nodes to take cooperative actions and restrain them from selfish behaviors. Extensive simulations show that the proposed security scheme exhibits superior performances over existing methods in alleviating negative effects caused by selfish or malicious nodes.
  • Secure and Privacy-Preserving Orchestration and Delivery of Fog-Enabled
           IoT Services
    • Abstract: Publication date: Available online 15 August 2018Source: Ad Hoc NetworksAuthor(s): Alexandre Viejo, David Sánchez Fog-enabled IoT applications are the next step in the deployment of cloud computing backed services through the Internet. The use of fog nodes at the edge of the network reduces traffic to cloud servers, decreases latency of services and improves ubiquity. Security is, however, a fundamental challenge of fog computing because both fog and IoT nodes may be deployed in disperse non-secure locations. Solutions to this challenge rely on expensive cryptography, such as attribute-based encryption of homomorphic encryption, which significantly degrades the response time of the service delivery due to the limited resources of IoT nodes. In this paper, we tackle this issue by relying on the novel concept of fog orchestration. Through orchestration, the network is self-tailored to the service to be delivered, and we use this possibility to enable a secure and efficient service delivery. Specifically, we propose several secure and privacy-by-design protocols for the orchestration and delivery fog-enabled IoT services. We also assume the most challenging scenario in which nodes exchange data in open and potential unsecured networks and they can be subjected to a wide range of active attacks. The feasibility of our proposal and the improvements it brings over related works are discussed through a set of theoretical and empirical evaluations of its performance.
  • MobiVNDN: A Distributed Framework to Support Mobility in Vehicular
           Named-Data Networking
    • Abstract: Publication date: Available online 15 August 2018Source: Ad Hoc NetworksAuthor(s): Joao M. Duarte, Torsten Braun, Leandro A. Villas In this work, we propose MobiVNDN, a distributed framework for Vehicular Named-Data networking (VNDN) communications. MobiVNDN focuses on mitigating the degradation of communication performance caused by mobility and wireless communications in VNDN. MobiVNDN simultaneously addresses the effects of several problems including broadcast storms, message redundancy, network partitions, reverse path partitioning and content source mobility. Simulation results show that MobiVNDN is robust and efficient and that it outperforms other solutions from the literature. MobiVNDN also performs well when sharing the wireless communication medium with multiple applications.
  • Data Transmission Plan Adaptation Complementing Strategic Time-Network
           Selection for Connected Vehicles
    • Abstract: Publication date: Available online 12 August 2018Source: Ad Hoc NetworksAuthor(s): Tobias Rueckelt, Ioannis Stavrakakis, Tobias Meuser, Imane Horiya Brahmi, Doreen Böhnstedt, Ralf Steinmetz Connected vehicles can nowadays be equipped with multiple network interfaces to access the Internet via a number of networks. To achieve an efficient transmission within this environment, a strategic time-network selection for connected vehicles has been developed, which plans ahead delay-tolerant transmissions. Under perfect prediction (knowledge) of the environment, the proposed strategic time-network selection approach is shown to outperform significantly leading state-of-the-art approaches which are based either on time selection or network selection only. Under realistic environments, however, the efficiency of planning-based approaches may be severely compromised since network presence and available capacities change rapidly and in an unforeseen manner (because of changing conditions due to the uncertainty in car movement, data transmission needs and network characteristics). To address this problem, a mechanism is proposed in this paper that determines the deviation from the anticipated conditions and modifies the transmission plan accordingly. Simulation results show that the proposed adaptation mechanisms help maintain the benefits of a strategic time-network selection planning under changing conditions.
  • Routing Protocols and Architecture for Disaster Area Network: A Survey
    • Abstract: Publication date: Available online 10 August 2018Source: Ad Hoc NetworksAuthor(s): Yasmin Jahir, Mohammed Atiquzzaman, Hazem Refai, Anirudh Paranjothi, Peter G. LoPresti Disaster Area Network (DAN) is very crucial in case of natural or man-made disasters. During state of emergency, a rapidly deployable network is the highest priority to conduct search and rescue operations. This survey aims at investigating network architecture and routing models for disaster area networks. The main objective and goal of DAN is to ensure reliable, energy efficient communication which is susceptible to mobility and topology changes in the disaster area. The purpose is to improve delay, reduce overhead, minimize energy used, sustain movement and increase bandwidth for multimedia applications. Mobile Ad hoc network (MANET) addresses issues related to rapid and temporary setup and terminal probability and mobility in a disaster area until conventional infrastructure communication is established. We study the different routing protocols using MANETS or a combination of MANETS and other networks that are available in the literature to build up an efficient DAN.
  • Vehicular Software-Defined Networking and Fog Computing: Integration and
           Design Principles
    • Abstract: Publication date: Available online 9 August 2018Source: Ad Hoc NetworksAuthor(s): Jéferson Nobre, Allan M. de Souza, Denis Rosário, Cristiano Both, Leandro A. Villas, Eduardo Cerqueira, Torsten Braun, Mario Gerla Vehicular Networks (VN) enable the collaboration among vehicles and infrastructure to deliver network services, where usually value-added services are provided by cloud computing. In this context, fog computing can be deployed closer to the users to meet their needs with minimum help from the Internet infrastructure. Software Defined Networking (SDN) might support the use of large-scale fog-enabled VN services. However, the current management of each wireless network that composes the VN has restricted the exploration of fog-enabled VN services. Therefore, the design principles for a VN architecture is still an open issue, mainly because it is necessary to address the diversity of VN fog applications. In this article, we investigate the design principles for fog-enabled Vehicular Software Defined Networking (VSDN) focusing on the perspectives of the systems, networking, and services. We evaluated these design principles in a use case of a traffic management system for a fast traffic accident rescue, using real traffic accident data. Finally, potential research challenges and opportunities for integrated use fog-enabled VSDN are discussed.
  • Context-Aware Energy-Efficient Applications for Cyber-Physical Systems
    • Abstract: Publication date: Available online 9 August 2018Source: Ad Hoc NetworksAuthor(s): Jose-Miguel Horcas, Mónica Pinto, Lidia Fuentes Software systems have a strong impact on the energy consumption of the hardware they use. This is especially important for cyber-physical systems where power consumption strongly influences the battery life. For this reason, software developers should be more aware of the energy consumed by their systems. Moreover, software systems should be developed to adapt their behavior to minimize the energy consumed during their execution. This can be done by monitoring the usage context of the system and having runtime support to react to those changes that impact the energy footprint negatively. Although both the hardware and the software parts of cyber-physical systems can be adapted to reduce its energy consumption, this paper focuses on software adaptation. Concretely, the paper illustrates how to address the problem of developing context-aware energy-efficient applications using a Green Eco-Assistant that makes use of advanced software engineering methods, such as Dynamic Software Product Lines and Separation of Concerns. The main steps of our approach are illustrated by applying them to a cyber-physical system case study.
  • Power Allocation and Routing for Full-duplex Multi Hop Wireless Networks
           under Full Interference
    • Abstract: Publication date: Available online 7 August 2018Source: Ad Hoc NetworksAuthor(s): Kudret Akçapınar, Özgür Gürbüz, Tonguç Ünlüyurt When traditional half-duplex (HD) radios are employed in indoor wireless mesh networks, such as home networks, interference among mesh nodes is a major impairment, as the end-to-end throughput is to be shared between all transmitting nodes. Full-duplex (FD) relaying can improve the end-to-end throughput, as simultaneous transmissions and receptions, hence simultaneous links are enabled, but FD nodes are subject to self-interference(SI) in addition to inter-node interference, resulting in a more complicated, full interference scenario. In this work, a power allocation solution is proposed along with routing for enabling FD in such multi hop wireless networks subject to full interference. First, an optimization problem is formulated for maximizing the end-to-end throughput of FD relaying on a given, known path, considering the full interference model. A linear programming based solution is devised to obtain the optimal transmit power levels for FD relaying nodes on the path. Then, for joint power allocation and routing in an FD mesh network, Dijkstra’s algorithm is modified by applying the proposed power allocation in the calculation of the path metrics. Via detailed numerical experiments considering different system parameters, such as network size, SI cancellation capability, maximum power level per node, it is shown that the proposed FD relaying with power control based on full interference model outperforms not only HD relaying, but also an existing FD relaying solution based on a single hop interference model. The amount of improvement by FD relaying depends on the system settings. For instance, for low power budget systems, HD throughput can be tripled, while for systems with high power budget, FD relaying achieves 80 percent higher throughput over HD relaying. When power control is combined with routing, the end-to-end throughput performance of the proposed FD routing solution again outperforms the existing solutions. Depending on the power budget, up to two times higher throughput is achieved over FD routing based on single hop interference, and HD routing can be improved by up to five times even for moderate SI cancellation levels. Our results suggest that employing proposed joint power allocation and routing scheme, migration to FD can be beneficial for home wireless mesh networks under full interference, especially for bandwidth-hungry applications, such as video streaming, gaming.
  • MARLIN-Q: Multi-Modal Communications for Reliable and Low-latency
           Underwater Data Delivery
    • Abstract: Publication date: Available online 7 August 2018Source: Ad Hoc NetworksAuthor(s): Stefano Basagni, Valerio Di Valerio, Petrika Gjanci, Chiara Petrioli This paper explores the smart exploitation of multi-modal communication capabilities of underwater nodes to enable reliable and swift underwater networking. Following a model-based reinforcement learning approach, we define a framework allowing senders to select the best forwarding relay for its data jointly with the best communication device to reach that relay. The choice is also driven by the quality of the communication to neighboring nodes over time, thus allowing nodes to adapt to the highly adverse and swiftly varying conditions of the underwater channel. The resulting forwarding method allows applications to choose among different classes of soft Quality of Service (QoS), favoring, for instance, reliable routes to the destination, or seeking faster packet delivery. We name our forwarding method MARLIN-Q, for Multi-modAl Reinforcement Learning-based RoutINg with soft QoS. We evaluate the performance of MARLIN-Q in varying networking scenarios where nodes communicate through two acoustic modems with widely different characteristics. MARLIN-Q is compared to state-of-the-art forwarding protocols, including a channel-aware solution, and a machine learning-based solution. Our results show that a smartly learned selection of relay and modem is key to obtain a packet delivery ratio that is twice as much that of other protocols, while maintaining low latency and energy consumption.
  • Optimizing Floor Reservation and Contention Resolution in Wireless Random
    • Abstract: Publication date: Available online 3 August 2018Source: Ad Hoc NetworksAuthor(s): Mohammad Hossein Bateni, S. Jamaloddin Golestani, Ali Mohamad Doost Hoseini In this paper, we propose a novel wireless random access scheme, combining the CSMA/CA mechanism with two control signals for initiating new transmissions and announcing receiver busy status, respectively. We also develop a time-space framework of performance analysis, enabling separate study of the temporal and spatial efficiency of the random access, i.e. the scheme’s ability for contention resolution and efficient performance in time, and its ability to provide for concurrent transmissions in space. Based on this framework and using both analysis and simulation, we show that the proposed scheme outperforms the IEEE 802.11 DCF, in terms of the overall afforded throughput, and also in terms of the temporal or spatial aspects of performance, when considered alone. The proposed scheme introduces a new approach to wireless random access problem, which can help fulfill the targeted requirements of future networks.
  • On the impact of the physical layer model on the performance of
           D2D-offloading in vehicular environments
    • Abstract: Publication date: Available online 31 July 2018Source: Ad Hoc NetworksAuthor(s): Loreto Pescosolido, Marco Conti, Andrea Passarella Offloading data traffic from Infrastructure-to-Device (I2D) to Device-to-Device (D2D) communications is a powerful tool for reducing congestion, energy consumption, and spectrum usage of mobile cellular networks. Prior network-level studies on D2D data offloading focus on high level performance metrics as the offloading efficiency, and take into account the radio propagation aspects by using simplistic wireless channel models. In this work, we consider a D2D data offloading protocol tailored to highly dynamic scenarios as vehicular environments, and evaluate its performance focusing on physical layer aspects, like energy consumption and spectral efficiency. In doing this, we take into account more realistic models of the wireless channel, with respect to the simplistic ones generally used in the previous studies. Our objective is twofold: first, to quantify the performance gain of the considered D2D offloading protocol with respect to a classic cellular network, based on I2D communications, in terms of energy consumption and spectral efficiency. Second, to show that using simplistic channel models may prevent to accurately evaluate the performance gain. Additionally, the use of more elaborated models allows to obtain insightful information on relevant system-level parameters settings, which would not be possible to obtain by using simple models. The considered channel models range from widely used models based on deterministic path loss formulas, to more accurate ones, which include effects like multipath fading and the associated frequency selectivity of wideband channels. These models have been proposed and validated, in the recent years, through large-scale measurements campaigns.Our results show that the considered protocol is able to achieve a reduction in the energy consumption of up to 35%, and an increase in the system spectral efficiency of 50%, with respect to the benchmark cellular system. The use of different channel models in evaluating these metrics may result, in the worst case, in a sixfold underestimation of the achieved improvement.
  • Efficient and Privacy Preserving Supplier Matching for Electric Vehicle
    • Abstract: Publication date: Available online 29 July 2018Source: Ad Hoc NetworksAuthor(s): Fatih Yucel, Kemal Akkaya, Eyuphan Bulut Electric Vehicle (EV) charging takes longer time and happens more frequently compared to refueling of fossil-based vehicles. This requires in-advance scheduling on charging stations depending on the route of the demander EVs for efficient resource allocation. However, such scheduling and frequent charging may leak sensitive information about the users which may expose their driving patterns, whereabouts, schedules, etc. The situation is compounded with the proliferation of EV chargers such as V2V charging where any two EVs can charge each other through a charging cable. In such cases, the matching of these EVs is typically done in a centralized manner which exposes private information to third parties which do the matching. To address this issue, in this paper, we propose an efficient and privacy-preserving distributed matching of demander EVs with charge suppliers (i.e., public/private stations, V2V chargers) using bichromatic mutual nearest neighbor (BMNN) assignments. To this end, we use partially homomorphic encryption-based BMNN computation through local communication (e.g., DSRC or LTE-direct) between users while hiding their locations. The proposed matching algorithm provides not only a satisfactory assignment for all parties but also achieves an efficient matching in dynamic environments where new demanders and suppliers show up and some leave. The simulation results indicate that the proposed matching of suppliers and demanders can be achieved in a distributed fashion within reasonable computation and convergence times while preserving privacy of users. Moreover, due to the nature of its design, it provides a more efficient matching process for dynamic environments compared to standard stable matching algorithm, reducing the average waiting time for users until matching.
  • Lifetime-Aware Information Aggregation under Uncertainty for Advanced
           Driver Assistance Systems
    • Abstract: Publication date: Available online 29 July 2018Source: Ad Hoc NetworksAuthor(s): Tobias Meuser, Patrick Lieser, The An Binh Nguyen, Doreen Böhnstedt, Ralf Steinmetz Advanced Driver Assistance Systems require a huge amount of sensor information. Information sensed by the vehicle’s on-board sensors is often not sufficient due to physical limitations, thus vehicles exchange information with each other to enhance their knowledge. However, both local and remote measurements are only a noisy view on the environment. If a vehicle receives faulty information about its environment, its decision-making may perform wrong actions. In this paper, we focus on the accuracy of information w. r. t. the correctness of the provided information. To increase the accuracy, we use a data representation that depicts every measurement as a probability vector.This representation contains all available information and tracks accuracy while aggregating and fusing information.To incorporate measurements sensed at different times and locations, we model the environmental changes. As information expires after a certain time, we combine a Markov model with an aging model to keep the aggregated information stable even after message expiration. We achieve this by reducing the impact of information with increasing age. Our extensive evaluation shows that our novel approach outperforms state-of-the-art approaches significantly.
  • ACPC: Efficient revocation of pseudonym certificates using activation
    • Abstract: Publication date: Available online 27 July 2018Source: Ad Hoc NetworksAuthor(s): Marcos Vinicius M. Silva, Marcos A. Simplicio, Jefferson E. Ricardini, Eduardo Lopes Cominetti, Harsh Kupwade Patil Vehicular communication (V2X) technologies allow vehicles to exchange information about the road conditions and their own status, and thereby enhance transportation safety and efficiency. For broader deployment, however, such technologies are expected to address security and privacy concerns, preventing abuse by users and by the system’s entities. In particular, the system is expected to enable the revocation of malicious vehicles, e.g., in case they send invalid information to their peers or to the roadside infrastructure; it should also prevent the system from being misused for tracking honest vehicles. Both features are enabled by Vehicular Public Key Infrastructure (VPKI) solutions such as Security Credential Management Systems (SCMS), one of the leading candidates for protecting V2X communication in the United States. Unfortunately, though, SCMS’s original revocation mechanism can lead to large Certification Revocation Lists (CRLs), which in turn impacts the bandwidth usage and processing overhead of the system. In this article, we propose a novel design called Activation Codes for Pseudonym Certificates (ACPC), which can be integrated into SCMS to address this issue. Our proposal is based on activation codes, short bit-strings without which certificates previously issued to a vehicle cannot be used by the latter, which are periodically distributed to non-revoked vehicles using an efficient broadcast mechanism. As a result, the identifiers of the corresponding certificates do no need to remain on the CRL for a long time, reducing the CRLs’ size and streamlining their distribution and verification of any vehicle’s revocation status. Besides describing ACPC in detail, we also compare it to similar-purpose solutions such as Issue First Activate Later (IFAL) and Binary Hash Tree based Certificate Access Management (BCAM). This analysis shows that our proposal not only improves privacy (e.g., in terms of resilience against colluding system authorities), but also leads to processing and bandwidth overheads that are orders of magnitude smaller than those observed in the state of the art.
  • Toward Trust Based Protocols in a Pervasive and Mobile Computing: A Survey
    • Abstract: Publication date: Available online 27 July 2018Source: Ad Hoc NetworksAuthor(s): Aminu Bello Usman, Jairo Gutierrez In the blooming era of Pervasive and Mobile Computing, trust has been accepted as a vital factor for provisioning secure, reliable and seamless communications between pervasive computing elements. However, advancing research in the area of trust-based protocol for distributed Pervasive and Mobile Computing might be challenging due to the ambiguity of the concept of trust as well as the variety of divergent trust models, protocols and algorithms in different contexts. In this research, we augment the trust concept and definition from various field of studies and proposed models in the literature and provide general conceptual phases and methods of trust management toward-trust-based protocols, in the context of Pervasive and Mobile Computing. The paper addresses a broad range of techniques, methods, models, applications and desired futures of trust-based protocols. A number of the currently used trust-based protocols are critically reviewed, and this further leads our discussion to the security attacks and mitigation strategies used with trust-based protocols for pervasive and mobile computing. Finally, the paper discusses open research issues.
  • FALCON: A New Approach for the Evaluation of Opportunistic Networks
    • Abstract: Publication date: Available online 27 July 2018Source: Ad Hoc NetworksAuthor(s): Enrique Hernández-Orallo, Juan Carlos Cano, Carlos T. Calafate, Pietro Manzoni Evaluating the performance of opportunistic networks with a high number of nodes is a challenging problem. Analytical models cannot provide a realistic evaluation of these networks, and simulations can be very time-consuming, sometimes requiring even weeks only to provide the results of a single scenario.In this paper, we present a fast evaluation model called FALCON (Fast Analysis, using a Lattice Cell model, of Opportunistic Networks) that is computationally very efficient and precise. The model is based on discretising space and time in order to reduce the computation complexity, and we formalised it as a discrete dynamic system that can be quickly solved.We describe some validation experiments showing that the precision of the obtained results is equivalent to the ones obtained with standard simulation approaches. The experiments also show that computation time is reduced by two orders of magnitude (from hours to seconds), allowing for a faster evaluation of opportunistic networks. Finally, we show that the FALCON model is easy to adapt and expand to consider different scenarios and protocols.
  • A Collaborative Task-oriented Scheduling Driven Routing Approach for
           Industrial IoT based on Mobile Devices
    • Abstract: Publication date: Available online 27 July 2018Source: Ad Hoc NetworksAuthor(s): Ying Duan, Yun Luo, Wenfeng Li, Pasquale Pace, Gianluca Aloi, Giancarlo Fortino Wireless sensor networks have been widely used in industrial IoT contexts due to their useful support during the production monitoring and risk pre-warning. However, complicated and extremely variable industrial environments call for higher communication stability and reliability to guarantee timely transmission of monitored data. Considering mobile intelligences such as Automated Guided Vehicles (AGVs), within industrial scenarios, we propose a solution based on hybrid (fixed and mobile) industrial wireless sensor networks featured with a task-oriented model. The proposal includes a heuristic modeling method adopted to assign tasks from definite orders which will be sent to the controller, and a collaborative routing algorithm exploiting the AGVs mobility on specific trajectories. Experiments have shown that, using mobility features of the AGVs, the integrated solution can promptly repair the network when a node and the relative link fail or the detected quality is low, significantly reducing the energy consumption of wireless nodes and data communication delay, thus improving the overall throughput and reliability of industrial IoT systems.
  • Security Analysis for Interference Management in Heterogeneous Networks
    • Abstract: Publication date: Available online 27 July 2018Source: Ad Hoc NetworksAuthor(s): Dongfeng Fang, Yi Qian, Rose Qingyang Hu Heterogeneous network (HetNet) is recognized as a promising technique to provide blanket wireless coverage and high throughput in 5G wireless networks. With the heterogeneous characteristics, HetNet achieves higher capacity, wider coverage and better performance in energy efficiency and spectrum efficiency. However, HetNet also brings complex interference management in the network. In this paper, we present a security analysis for a proposed interference management mechanism in a two-tier heterogeneous network (HetNet) system. The proposed interference management mechanism aims to maximize the secrecy rate of a cellular user under eavesdropping attack. The HetNet system model includes a macro base station, several small base stations, several users, and one eavesdropper. To further improve the performance of the network, massive multiple-input multiple-output technology is applied to base stations. A single antenna is applied to users and the eavesdropper. Device-to-device (D2D) communications are considered in the HetNet system model for introducing interference in the macro cell to the eavesdropper. The proposed interference management mechanism takes consideration of three factors as transmit beamforming, spectrum reuse and D2D communications. Not only the secrecy rate of the user under eavesdropping attack but also the communication quality of services of SBSs users are considered in the security analysis. An optimization problem is formulated for the secrecy rate maximization of the user under eavesdropping attack with the constraints of quality of services of users associated with base stations and power limitation of base stations. The security analysis and numerical results show that our proposed interference management mechanism for physical layer security can utilize the interference in the network to improve the secrecy rate of the cellular user under eavesdropping attack.
  • Internet of Underground Things in Precision Agriculture: Architecture and
           Technology Aspects
    • Abstract: Publication date: Available online 27 July 2018Source: Ad Hoc NetworksAuthor(s): Mehmet C. Vuran, Abdul Salam, Rigoberto Wong, Suat Irmak The projected increases in World population and need for food have recently motivated adoption of information technology solutions in crop fields within precision agriculture approaches. Internet Of Underground Things (IOUT), which consists of sensors and communication devices, partly or completely buried underground for real-time soil sensing and monitoring, emerge from this need. This new paradigm facilitates seamless integration of underground sensors, machinery, and irrigation systems with the complex social network of growers, agronomists, crop consultants, and advisors. In this paper, state-of-the-art communication architectures are reviewed, and underlying sensing technology and communication mechanisms for IOUT are presented. Moreover, recent advances in the theory and applications of wireless underground communication are also reported. Finally, major challenges in IOUT design and implementation are identified.
  • Performance Evaluation and Comparative Study of Main VDTN Routing
           Protocols under Small- and Large-Scale Scenarios
    • Abstract: Publication date: Available online 27 July 2018Source: Ad Hoc NetworksAuthor(s): Arslane HAMZA-CHERIF, Khaled BOUSSETTA, Gladys DIAZ, Fedoua LAHFA This paper presents a performance evaluation through simulations and a comparative study of main routing protocols dedicated to Vehicular Delay-Tolerant Networks. The assessment is conducted under small- and large-scale scenarios with realistic vehicle mobility patterns as defined in the TAPAS Cologne simulation scenario. Through the literature, several evaluations have been conducted on routing for Vehicular Networks, but with an abstraction or a simplification regarding the delay tolerant aspect. Furthermore, considered scenarios were relatively small and too idealistic compared to the real-world environment and its multiples challenges. Moreover, to the best of our knowledge, this is the first extensive study that compares, in the same realistic simulation environment, the main flag-carriers of various categories of VDTN routing protocols, namely Epidemic, Direct Delivery, Prophet and GeoSpray protocols. Simulation results reveal better performance for the geographical approach advocated by GeoSpray compared to the predictive one of Prophet, under all considered scenarios. Moreover, they highlight the possibility for a minimalist and naive protocol such as Direct Delivery to perform well, under specific network conditions, as when considering an anycast communication scheme. Finally, deeper analysis was undertaken on both GeoSpray and Prophet. The studies reveal the potentialities to increase the performances of GeoSpray to some extent and highlight the difficulties of adapting Prophet settings for optimal performance in realistic scenarios.
  • Bandwidth Efficient Designated Verifier Proxy Signature Scheme for
           Healthcare Wireless Sensor Networks
    • Abstract: Publication date: Available online 26 July 2018Source: Ad Hoc NetworksAuthor(s): Girraj Kumar Verma, B.B. Singh, Harendra Singh Recently, big data collection of e-healthcare monitoring using wireless sensor networks (WSN) have become common in practice. These WSN collect the data such as blood pressure, pH-value, pulse rate, etc. from a remote location based patient and then send to hospital/medical server. Since, the e-healthcare data is associated to a patient and thus, the confidentiality and authentication of data are critical issues. This article introduces a provably secure message recovery designated verifier proxy signature (MRDVPS) scheme to eliminate the issues. The proposed MRDVPS scheme is proven existential unforgeable (EUF) in the random oracle model (ROM), under the intractability of computational Diffie-Hellman (CDH) problem. Efficiency comparison shows that the scheme is the most appealing towards healthcare wireless sensor networks (HWSN).
  • Joint Uplink/Downlink Fair Power Allocation for Wireless Backhaul of
           Vehicular Small Cells
    • Abstract: Publication date: Available online 25 July 2018Source: Ad Hoc NetworksAuthor(s): Sajjad Alizadeh, Reza Saadat This paper proposes a two-part joint uplink/downlink power allocation for the backhaul of the vehicular small cell, one part for the uplink and another part for the downlink. In the first part of the proposed algorithm, after macro base station assignment for each small base station, we allocate the transmission power using the pilot assisted approach in the uplink direction. Simultaneously, using a normalizing factor obtained from the first part of the algorithm, which is representing the SINR balancing level of the small cell layer in the uplink direction, the second part is implemented using the Foschini concept to achieve the SINR balancing in the downlink direction just equal to that in the uplink direction. Therefore, the same levels for the SINR balancing are fairly obtained jointly for the macrocell and small cell layers in the downlink and uplink directions, respectively. Then, we provide some analysis on the convergence of the proposed algorithm in both parts of the uplink and downlink. In contrast to previous works, it is not required to be solved a non-convex optimization problem for the implementation of our proposed algorithm. Simulation results illustrate that the proposed scheme converges to the SINR balancing level after a few iterations in both uplink and downlink directions of the backhaul link.
  • Fast Multi-hop Broadcast of Alert Messages in VANETs: An Analytical Model
    • Abstract: Publication date: Available online 24 July 2018Source: Ad Hoc NetworksAuthor(s): Armir Bujari, Mauro Conti, Carla De Francesco, Claudio E. Palazzi Recent market trends in self-driving technology have revived the attention on vehicular networks, posing a demand for intelligent solutions supporting the proliferation of many useful applications. Inter-vehicular communication presents an opportunity, capable of providing the basis for localized, timely, collective intelligence. In this context, critical safety applications are particularly challenging, urging for quick multi-hop message propagation schemes within an area of interest. The anycast communication model embodied by safety applications and the shared broadcast medium demand for intelligent message propagation schemes minimizing latency. To this end, the state of the art approach is based on having different contention windows among vehicles so as to probabilistically select specific ones as forwarders in order to reduce the number of hops and transmissions needed to propagate the message. However, this solution has been mainly studied empirically. In this article, we present and discuss an analytical model, shedding light on the expected behavior and performance of such approach, along with a validation analysis conducted through the well known simulator NS-2.
  • Joint Spatial Multiplexing and Transmit Diversity in MIMO Ad Hoc Networks
    • Abstract: Publication date: Available online 23 July 2018Source: Ad Hoc NetworksAuthor(s): Marcelo M. Carvalho, Fadhil Firyaguna, Ana C.O. Christófaro, Éverton A.L. Andrade, Tiago S. Bonfim This paper investigates the performance of MIMO ad hoc networks that employ transmit diversity, as delivered by the Alamouti scheme, and/or spatial multiplexing, according to the Vertical Bell Labs Layered Space-Time system (V-BLAST). Both techniques are implemented in the ns-3 network simulator by focusing on their overall effect on the resulting signal-to-interference-plus-noise ratio (SINR) at the intended receiver. Unlike previous works that have studied fully-connected scenarios or have assumed simple abstractions to represent MIMO behavior, this paper evaluates MIMO ad hoc networks that are not fully connected by taking into account the impact of multiple antennas on the carrier sense activity in CSMA-like medium access control (MAC) protocols. In addition to presenting a performance evaluation of ad hoc networks operating according to each individual MIMO scheme, this paper proposes simple modifications to the IEEE 802.11 DCF MAC to allow the joint operation of both MIMO techniques. Hence, each pair of nodes is allowed to select the best MIMO configuration for the impending data transfer. The joint operation is based on three operation modes that are selected based on the estimated SINR at the intended receiver and its comparision with a set of threshold values. The performance of ad hoc networks operating with the joint MIMO scheme is compared with the performance when using each individual MIMO scheme and the standard single-input single output (SISO) IEEE 802.11. Performance results are presented based on MAC-level throughput per node, delay, and throughput fairness under saturated traffic conditions.
  • Secure Beamforming for Cognitive Cyber-Physical Systems based on Cognitive
           Radio with Wireless Energy Harvesting
    • Abstract: Publication date: Available online 19 July 2018Source: Ad Hoc NetworksAuthor(s): Kun Tang, Ronghua Shi, Heyuan Shi, Md Zakirul Alam Bhuiyan, Entao Luo Cognitive cyber-physical systems (CPS) have been extensively applied in many fields from intellectual traffic control system to autonomous robot for face-detection and face-recognition. In wireless-powered cognitive radio networks (WP-CRN), it is necessary to provide secure and effective real-time feedback for CPS users. In this paper, we consider secure transmission issues in WP-CRN for CPS users, where a primary system works in conjunction with a wireless-powered secondary system in the presence of multiple potential eavesdroppers. Furthermore, a novel spectrum sharing scheme is proposed, which multiplexes the secondary transmissions during both the primary and cognitive transmissions. We aim to maximize the secondary data rate while guaranteeing the secure rate requirement of the primary system by jointly optimizing the energy harvesting duration and the beamforming vectors of the primary and secondary systems. In order to solve the non-convex optimization problem, the semi-definite relaxation (SDR) with Charnes-Cooper transformation is adopted to transfer the non-convex problem into convex optimization problem, which can be easily solved by CVX tools. Moreover, we can prove that the SDR is tight since there always exists a rank-one optimal solution. Simulation results illustrate that the proposed scheme can significantly improve the secondary transmission rate while can achieve higher security rates of the primary system compared with zero-forcing (ZF) beamforming scheme.
  • On Outage Minimization in Relay Assisted Cognitive Radio Networks with
           Energy Harvesting
    • Abstract: Publication date: Available online 19 July 2018Source: Ad Hoc NetworksAuthor(s): Avik Banerjee, Santi P. Maity This paper considers a fully energy harvested two hop relay assisted cognitive radio (CR) system operated in an underlay mode. The frame structure of the CR network consists of three non-overlapping time slots. The first time slot is meant for energy harvesting (EH) at the relay node (from both the primary interference signal and the secondary transmitter signal), while during the second slot, the secondary user transmits its data to the relay (information transmission). During the third time slot, forwarding of data by the relay and EH at secondary transmitter (from the primary interference signal) are done simultaneously. An optimization problem is formulated that minimizes the outage probability under the constraints of maintaining the energy causality and interference threshold to the primary receiver due to both the secondary transmitter and the relay node. Closed form expressions for the optimal transmit power of the source and the relay node as well as the time slot for EH are derived. The convexity of the constrained objective function is proved mathematically and the analytical solutions are verified through a large set of simulation results. Simulation results also show that a gain  ∼  11.71% and  ∼  12.7% in outage probability minimization is achieved for the proposed scheme over the existing works.
  • Energy Efficient Tracking in Uncertain Sensor Networks
    • Abstract: Publication date: Available online 18 July 2018Source: Ad Hoc NetworksAuthor(s): Qianqian Ren, Jinbao Li, Hongyang Liu Uncertainty existed in sensor networks presents new challenges for target tracking. Besides energy conservation of the network, target tracking has to deal with different kinds of uncertainty, such as the impreciseness of positioning systems, environment noise and limited sensitivity of sensors. In this paper, we solve the problem of energy efficient tracking in uncertain sensor networks. We first investigate the uncertainty existed in sensor networks and propose a series of uncertain models. Then, we construct a grid based network model and incorporate it into tracking procedure, which makes nodes near the vertexes of involved grid units work and others sleep to save energy with tracking quality guarantee. To optimize the tracking algorithm with uncertainty consideration, we further introduce the problem of probabilistic k-nearest neighbors (PkNN) and provide an efficient tracking algorithm based on PkNN retrieval. Finally, a comprehensive set of simulations is presented. From the experimental results, we conclude that the proposed target tracking algorithm can yield excellent performance in terms of tracking accuracy and energy saving in wireless sensor networks.
  • Information Sharing and Bullwhip Effect in Smart Destination Network
    • Abstract: Publication date: Available online 17 July 2018Source: Ad Hoc NetworksAuthor(s): Qijie Jiang, Ge Ke Information communication technologies (ICTs) have been extensively applied in smart destinations in recent years so as to improve the information transfer and information sharing amongst individual actors involving in the destination network ecosystem. This paper attempts to explore the influence of information sharing on the bullwhip effect throughout the tourism supply chain (SC) network, which has been considered as a major problem faces the destination management and all individual actors. Specifically, two mathematic models have been built to analyse the following different situations respectively; first, ICTs have not been well applied in destinations and there is no information sharing amongst individual actors, second, ICTs have been well applied in destinations and there exists information sharing amongst individual actors. Further, this paper makes a comparison of the bullwhip effects under these two situations. What's more, the data collected from JIUZHAI valley has been used to verify the correction of the mathematic analysis. Overall, this paper proves that the application of ICTs will contribute to the reduction of bullwhip effect throughout the tourism SC network by promoting the information sharing amongst individual actors, and some parameters (e.g., autocorrelation coefficient, the number of demand forecasting, and the lead time) will play a crucial role on the acting process. The results have both theoretical significance to the development of tourism SC management theory and managerial implication to tourism practices of individual actors and management departments.
  • Energy-Aware Backbone Formation in Military Multilayer Ad Hoc Networks
    • Abstract: Publication date: Available online 9 July 2018Source: Ad Hoc NetworksAuthor(s): D. Papakostas, S. Eshghi, D. Katsaros, L. Tassiulas Ad hoc networks designed for deployment in modern battlefields need to take care of traditional requirements related to their backbone’s size, their energy efficiency, their scalability in terms of network size, but also of their nature which allows for combining networks of different units that act altogether towards a common operational goal. This article develops a distributed algorithm for developing an energy-aware backbone for military ad hoc network composed of multiple layers, namely E2CLB. The algorithm is based on the concepts of connected dominating sets and also on node centrality concepts, and results as a heuristic solution to the problem of calculating a maximum energy, minimum connected dominating set for a multilayer network by including into the dominating set those nodes which are highly connected to their and other layers (i.e., they have large centrality value) and moreover they are energy-rich. The computation and communication complexities of the algorithm are analyzed, and a thorough simulation-based evaluation of it against six competitors is presented. The results show that E2CLB is either the best performing algorithm across the examined performance measures or it is able to trade a very small increase in the size of the backbone’s network in order to reap improved performance in the energy realm.
  • Structure Health Monitoring Using Wireless Sensor Networks on Structural
    • Abstract: Publication date: Available online 8 July 2018Source: Ad Hoc NetworksAuthor(s): Cem Ayyildiz, H. Emre Erdem, Tamer Dirikgil, Oguz Dugenci, Taskin Kocak, Fatih Altun, V. Cagri Gungor This paper presents a system that monitors the health of structural elements in Reinforced Concrete (RC), concrete elements and/or masonry buildings and warn the authorities in case of physical damage formation. Such rapid and reliable detection of impairments enables the development of better risk management strategies to prevent casualties in case of earthquake and floods. Piezoelectric (PZT) sensors with lead zirconate titanate material are the preferred sensor type for fracture detection. The developed sensor mote hardware triggers the PZT sensors and collects the responses they gather from the structural elements. It also sends the collected data to a data center for further processing and analysis in an energy-efficient manner utilizing low-power wireless communication technologies. The access and the analysis of the collected data can be remotely performed via a web interface. Performance results show that the fractures serious enough to cause structural problems can be successfully detected with the developed system.
  • QoS Guaranteed Surveillance Algorithms for Directional Wireless Sensor
    • Abstract: Publication date: Available online 6 July 2018Source: Ad Hoc NetworksAuthor(s): Chih-Yung Chang, Chih-Yao Hsiao, Chao-Tsun Chang A directional wireless sensor network (DWSN) consists of a number of directional sensors. Many types of directional sensors have been widely used in constructing a wireless sensor network for IoT applications. These types of sensors include infrared sensors, microwave sensors, ultrasonic sensors, cameras, and radar. Compared with an omni-directional sensor, a directional sensor can achieve better performance because it can additionally report the direction of an intruder. Unfortunately, most existing barrier-coverage mechanisms adopt omni-directional sensor networks. They cannot be efficiently applied to DWSNs because the sensing area of each directional sensor is fan-shaped. This paper investigates the surveillance service problem which supports the surveillance quality of k-barrier coverage in DWSNs. Three algorithms, called BA, BTA and BRA, are proposed which aim at finding a maximal number of different defense barriers, each of which supports k-coverage. Using these algorithms, at least k directional sensors can detect intruders intending to cross the monitoring area. Performance analyses of the proposed algorithms are conducted in Section 5 to verify the performance improvement from a theoretical point of view. In the performance study, the proposed algorithms are compared with other existing algorithms. The experimental study shows that the proposed k-barrier coverage algorithm achieves similar performance with the optimal solution but has fewer control packets. Furthermore, the proposed BRA achieves better performance in terms of the numbers of control packets and constructed defense barriers, as compared with existing algorithms.
  • MUPF: Multiple Unicast Path Forwarding in Content-Centric VANETs
    • Abstract: Publication date: Available online 4 July 2018Source: Ad Hoc NetworksAuthor(s): Lanlan Rui, Hui Guo, Haoqiu Huang, RuiChang Shi, Xuesong Qiu Vehicular ad-hoc networks (VANETs) with traditional TCP/ IP architecture cannot manage mobile nodes effectively. Inspired by information-centric networking (ICN), content-centric VANETs have emerged as a promising architecture to address the challenges of traditional IP-based communications in VANETs. However, several issues need to be solved with regard to this architecture. Among them, inflexible routing schemata based on IP addresses, inefficient traffic caused by network broadcast, and volatility in the network environment cause low network performance in VANETs. By focusing on the content routing of the VANETs, we propose a multiple unicast path-forwarding scheme, MUPF, in which we aim to build multiple stable unicast forwarding paths in content-centric VANETs. The main design concepts of MUPF are as follows: 1) By introducing the idea of ICN, we avoid using the fixed-communication “host-to-host” method employed in IP; MUPF applies a content-centric routing process to request for and reply to packets. 2) We have evaluated the often-occurring broadcast in VANETs, which is thought to have a bad impact on network performance; hence, MUPF uses multiple unicast forwarding paths to deliver the packets instead of a simple broadcast. 3) Considering the highly volatile feature of VANETs, wherein the links are easily broken when the nodes leave, combined with the nodes’ motion parameters and link quality metrics, MUPF can choose some more reliable nodes as next hops to improve the time tolerance of each routing path. In terms of average response time, the performance improvement achieved by MUPF is ∼10%, 15%-20%, and 60% compared to CCVN, V-NDN, and TCP/IP, respectively. In terms of the cache-hit ratio, MUPF achieves an improvement of ∼8% and 13.8% over CCVN and V-NDN, respectively; it also decreases network traffic significantly.
  • A Prediction-Based Approach for Features Aggregation in Visual Sensor
    • Abstract: Publication date: Available online 30 June 2018Source: Ad Hoc NetworksAuthor(s): Alessandro Enrico Redondi, Matteo Cesana, Luigi Fratta, Antonio Capone, Flaminio Borgonovo Visual Sensor Networks (VSNs) constitute a key technology for the implementation of several visual analysis tasks. Recent studies have demonstrated that such tasks can be efficiently performed following an operative paradigm where cameras transmit to a central controller local image features, rather than pixel-domain images. Furthermore, features from multiple camera views may be efficiently aggregated exploiting the spatial redundancy between overlapping views. In this paper we propose a routing protocol designed for supporting aggregation of image features in a VSN. First, we identify a predictor able to estimate the efficiency of local features aggregation between different cameras in a VSN. The proposed predictor is chosen so as to minimize the prediction error while keeping the network overhead cost low. Then, we harmonically integrate the proposed predictor in the Routing Protocol for Low-Power and Lossy Networks (RPL) in order to support the task of in-network feature aggregation. We propose a RPL objective function that takes into account the predicted aggregation efficiency and build the routes from the camera nodes to a central controller so that either energy consumption or used network bandwidth is minimized. Extensive experimental results confirm that the proposed approach can be used to increase the efficiency of VSNs.
  • LANET: Visible-Light Ad Hoc Networks
    • Abstract: Publication date: Available online 19 April 2018Source: Ad Hoc NetworksAuthor(s): Nan Cen, Jithin Jagannath, Simone Moretti, Zhangyu Guan, Tommaso Melodia Visible light communication (VLC) is a wireless technology complementary to well-understood radio frequency (RF) communication that is promising to help alleviate the spectrum crunch problem in overcrowded RF spectrum bands. While there has been significant advancement in recent years in understanding physical layer techniques for visible light point-to-point links, the core problem of developing efficient networking technology specialized for visible-light networks is substantially unaddressed.This article discusses the current existing techniques as well as the main challenges for the design of visible-light ad hoc networks - referred to as LANETs. The paper discusses typical architectures and application scenarios for LANETs and highlights the major differences between LANETs and traditional mobile ad hoc networks (MANETs). Enabling technologies and design principles of LANETs are analyzed and existing work is surveyed following a layered approach. Open research issues in LANET design are also discussed, including long-range visible light communication, full-duplex LANET MAC, blockage-resistant routing, VLC-friendly TCP and software-defined prototyping, among others.
  • 6LowPSec: An End-to-End Security Protocol for 6LoWPAN
    • Abstract: Publication date: Available online 2 February 2018Source: Ad Hoc NetworksAuthor(s): Ghada Glissa, Aref Meddeb 6LoWPAN has radically changed the IoT (Internet of Things) landscape by seeking to extend the use of IPv6 to smart and tiny objects. Enabling efficient IPv6 communication over IEEE 802.15.4 LoWPAN radio links requires high end-to-end security rules. The IEEE 802.15.4 MAC layer implements several security features offering hardware hop-by-hop protection for exchanged frames. In order to provide end-to-end security, researchers focus on lightweighting variants of existing security solutions such as IPSec that operates on the network layer. In this paper, we introduce a new security protocol referred to as ”6LowPSec”, providing a propitious end-to-end security solution but functioning at the adaptation layer. 6LowPSec employs existing hardware security features specified by the MAC security sublayer. A detailed campaign is presented that evaluates the performances of 6LowPSec compared with the lightweight IPSec. Results prove the feasibility of an end-to-end hardware security solution for IoT, that operates at the adaptation layer, without incurring much overhead.
School of Mathematical and Computer Sciences
Heriot-Watt University
Edinburgh, EH14 4AS, UK
Tel: +00 44 (0)131 4513762
Fax: +00 44 (0)131 4513327
Home (Search)
Subjects A-Z
Publishers A-Z
Your IP address:
About JournalTOCs
News (blog, publications)
JournalTOCs on Twitter   JournalTOCs on Facebook

JournalTOCs © 2009-