Home |  About the Journal |  Instruction |  Editorial Board |  Contact Us |  Subscription |  Advertisement |  FAQ |  Download
    Office Online
 Submission and Review
 Legacy site
 
    Journal Search
Quick Search
Keyword Search
    Links
17th IEEE International Conference on Communication Technology
Journal on Communications
Telecommunications Science
Chinese Journal of Network and Information Security
CNKI
POSTS & TELECOM PRESS
Big Data
More>>  
 
  News More>>  
Call for Paper: Advanced Antenna Technologies for Future Wir... 2017-11-17
Call for Paper: Special Issue on Future Internet 2016-11-15
Call for paper: Optical Wireless Communication 2016-10-26
Call for paper: Special Issue on “IoV: Internet of Vehicle” 2016-10-13
Call for Papers: Special Issue on “Wireless Big Data” 2016-09-18
Summary of the 2nd Session of the 1st JCIN Editorial Board M... 2016-07-21
第一届“空间信息网络”主题学术论坛征文通知 2016-06-21
Call for Papers (“Millimeter-Wave System and Technologies fo... 2016-03-15
Call for Papers (Special Issue on “Space Information Network... 2016-03-11
“Journal of Communications and Information Networks” will be... 2015-12-28
 
Current Issue Online First Most Download Most Read SCI Top Cited Archive
  25 September 2018, Volume 3 Issue 3 Previous Issue   
For Selected: View Abstracts Toggle Thumbnails
Special Focus:AI-Powered Network Design and Optimization
Blockchain-Based Data Sharing System for AI-Powered Network Operations COLLECTION
Zhang Guozhen,Li Tong,Li Yong,Hui Pan,Jin Depeng
Journal of Communications and Information Networks. 2018, 3 (3): 1-8.   DOI: 10.1007/s41650-018-0024-3

The explosive development of mobile communications and networking has led to the creation of an extremely complex system,which is difficult to manage.Hence,we propose an AI-powered network framework that uses AI technologies to operate the network automatically.However,due to the separation between different mobile network operators,data barriers between diverse operators become bottlenecks to exploit the full power of AI.In this paper,we establish a mutual trust data sharing framework to break these data barriers.The framework is based on the distributed and temper-proof attributes of blockchain.We implement a prototype based on Hyperledger Fabric.The proposed system combines supervision and fine-grained data access control based on smart contracts,which provides a secure and trustless environment for data sharing.We further compare our system with existing data sharing schemes,and we find that our system provides a better functionality.

Figures and Tables | References | Related Articles | Metrics
Data-Driven User Complaint Prediction for Mobile Access Networks COLLECTION
Pan Huimin,Zhou Sheng,Jia Yunjian,Niu Zhisheng,Zheng Meng,Geng Lu
Journal of Communications and Information Networks. 2018, 3 (3): 9-19.   DOI: 10.1007/s41650-018-0025-2

In this paper,we present a user-complaint prediction system for mobile access networks based on network monitoring data.By applying machine-learning models,the proposed system can relate user complaints to network performance indicators,alarm reports in a data-driven fashion,and predict the complaint events in a fine-grained spatial area within a specific time window.The proposed system harnesses several special designs to deal with the specialty in complaint prediction;complaint bursts are extracted using linear filtering and threshold detection to reduce the noisy fluctuation in raw complaint events.A fuzzy gridding method is also proposed to resolve the inaccuracy in verbally described complaint locations.Furthermore,we combine up-sampling with down-sampling to combat the severe skewness towards negative samples.The proposed system is evaluated using a real dataset collected from a major Chinese mobile operator,in which,events due to complaint bursts account approximately for only 0.3% of all recorded events.Results show that our system can detect 30% of complaint bursts 3 h ahead with more than 80% precision.This will achieve a corresponding proportion of quality of experience improvement if all predicted complaint events can be handled in advance through proper network maintenance.

Figures and Tables | References | Related Articles | Metrics
Fast Maximum Entropy Machine for Big Imbalanced Datasets COLLECTION
Yin Feng,Lin Shuqing,Piao Chuxin,Cui Shuguang(Robert)
Journal of Communications and Information Networks. 2018, 3 (3): 20-30.   DOI: 10.1007/s41650-018-0026-1

Driven by the need of a plethora of machine learning applications,several attempts have been made at improving the performance of classifiers applied to imbalanced datasets.In this paper,we present a fast maximum entropy machine(MEM)combined with a synthetic minority over-sampling technique for handling binary classification problems with high imbalance ratios,large numbers of data samples,and medium/large numbers of features.A random Fourier feature representation of kernel functions and primal estimated sub-gradient solver for support vector machine(PEGASOS)are applied to speed up the classic MEM.Experiments have been conducted using various real datasets (including two China Mobile datasets and several other standard test datasets) with various configurations.The obtained results demonstrate that the proposed algorithm has extremely low complexity but an excellent overall classification performance (in terms of several widely used evaluation metrics)as compared to the classic MEM and some other state-of-the-art methods.The proposed algorithm is particularly valuable in big data applications owing to its significantly low computational complexity.

Figures and Tables | References | Related Articles | Metrics
Location Privacy in Mobile Big Data:User Identifiability via Habitat Region Representation COLLECTION
Fang Luoyang,Cheng Xiang,Yang Liuqing,Wang Haonan
Journal of Communications and Information Networks. 2018, 3 (3): 31-38.   DOI: 10.1007/s41650-018-0028-z

Mobile big data collected by mobile network operators is of interest to many research communities and industries for its remarkable values.However,such spatiotemporal information may lead to a harsh threat to subscribers’privacy.This work focuses on subscriber privacy vulnerability assessment in terms of user identifiability across two datasets with significant detail reduced mobility representation.In this paper,we propose an innovative semantic spatiotemporal representation for each subscriber based on the geographic information,termed as daily habitat region,to approximate the subscriber’s daily mobility coverage with far lesser information compared with original mobility traces.The daily habitat region is realized via convex hull extraction on the user’s daily spatiotemporal traces.As a result,user identification can be formulated to match two records with the maximum similarity score between two convex hull sets,obtained by our proposed similarity measures based on cosine distance and permutation hypothesis test.Experiments are conducted to evaluate our proposed innovative mobility representation and user identification algorithms,which also demonstrate that the subscriber’s mobile privacy is under a severe threat even with significantly reduced spatiotemporal information.

Figures and Tables | References | Related Articles | Metrics
Reinforcement Learning-Based Control for Unmanned Aerial Vehicles COLLECTION
Sheng Geyi,Min Minghui,Xiao Liang,Liu Sicong
Journal of Communications and Information Networks. 2018, 3 (3): 39-48.   DOI: 10.1007/s41650-018-0029-y

Estates,especially those of public securityrelated companies and institutes,have to protect their privacy from adversary unmanned aerial vehicles(UAVs).In this paper,we propose a reinforcement learning-based control framework to prevent unauthorized UAVs from entering a target area in a dynamic game without being aware of the UAV attack model.This UAV control scheme enables a target estate to choose the optimal control policy,such as jamming the global positioning system signals,hacking,and laser shooting,to expel nearby UAVs.A deep reinforcement learning technique,called neural episodic control,is used to accelerate the learning speed to achieve the optimal UAV control policy,especially for estates with a large area,against complicated UAV attack policies.We analyze the computational complexity for the proposed UAV control scheme and provide its performance bound,including the risk level of the estate and its utility.Our simulation results show that the proposed scheme can reduce the risk level of the target estate and improve its utility against malicious UAVs compared with the selected benchmark scheme.

Figures and Tables | References | Related Articles | Metrics
Channel List Selection Based on Quality Prediction in WirelessHART Networks COLLECTION
Chen Gongpu,Ma Rui,Lei Mengdan,Cao Xianghui
Journal of Communications and Information Networks. 2018, 3 (3): 49-56.   DOI: 10.1007/s41650-018-0030-5

WirelessHART is one of the most widely used technologies in industrial wireless networks.However,its performance is highly influenced by the quality of wireless channels.To improve the reliability of wireless communications,WirelessHART employs channel blacklisting and channel hopping mechanisms,which highlights the importance of channel assessment.Traditional methods generally resort to packet reception ratio (PRR) of the previous time slot to assess and allocate channels,but this is not accurate.In this paper,we propose a learning-based framework for predicting the PRR,and on the basis of the predicted PRR,we develop a heuristic channel selection algorithm to confirm the channel list,which takes into account the balance of channel diversity and route diversity.Simulation results demonstrate that our algorithm outperforms existing ones in terms of achieved reliability.

Figures and Tables | References | Related Articles | Metrics
Review paper
Critical Analysis of DDoS—An Emerging Security Threat over IoT Networks COLLECTION
Lohachab Ankur,Karambir Bidhan
Journal of Communications and Information Networks. 2018, 3 (3): 57-78.   DOI: 10.1007/s41650-018-0022-5

Ubiquitous computing facilitated by Internet of things (IoT) devices has made modern day life easier across many areas.It offers capabilities to measure parameters associated with the devices,to infer from their results,and to understand and control millions of such devices in various application domains.The enormous potential of IoT systems enables each and every device to communicate with each other,thereby providing more productivity.In this scenario,heterogeneity of technologies in use is expected to intensify the security threats.Policy enforcement for the assurance of privacy and security plays a key role in these systems.Fulfillment of privacy and security related requirements include confidentiality of data,user and device authentication,access control,and trust assurance among the things.However,recent reported events related to security attacks show colossal vulnerabilities among IoT devices capable of bringing security risks to the whole environment.One of the common uses of these devices by the attackers is to generate powerful distributed denial of service(DDoS)attacks.It is one of the most prominent attacking behaviors over a network by a group of geographically distributed zombie computers that interrupt and block legitimate users to use the network resources and hence,requires great attention.In this regard,the current work being novel in the field puts concentration on variants of DDoS attacks and their impact on IoT networks along with some of the existing countermeasures to defend against these attacks.The paper also discusses the detailed working mechanism of these attacks and highlights some of the commonly used tools that are deployed in such attack scenarios.

Figures and Tables | References | Related Articles | Metrics
Research papers
Full-Duplex Energy-Harvesting Relay Networks:Capacity-Maximizing Relay Selection COLLECTION
Wang >Dexin,Zhang Rongqing,Cheng Xiang,Yang Liuqing
Journal of Communications and Information Networks. 2018, 3 (3): 79-85.   DOI: 10.1007/s41650-018-0027-0

In this study,we investigate the relay selection (RS) problem in full-duplex energy-harvesting (FDEH) relay networks,where the relays are wirelessly powered by harvesting a portion of the received signal power from the source.We extend the investigation of the relay selection problem in FDEH relay networks to enable multiple relays to be selected simultaneously for improved performance.This is in contrast with existing studies on RS in similar setups,where only one relay can be selected in a transmission cycle.Our simulations show that selecting only a single relay is not always optimal,especially at low signal-to-noise ratios (SNRs).Furthermore,in this paper,we present the design of a greedy RS method with quadratic complexity for FDEH relay networks.Compared with the exhaustive-search-based RS,the proposed greedy RS achieves near-optimum performance in terms of the end-to-end capacity with significantly reduced complexity.

Figures and Tables | References | Related Articles | Metrics
Tri-Stepped Rectangular Antenna for Efficient RF Energy Harvesting COLLECTION
Kurvey Mamta,Kunte Ashwini
Journal of Communications and Information Networks. 2018, 3 (3): 86-90.   DOI: 10.1007/s41650-018-0018-1

Although the worldwide demand for energy is increasing rapidly,the availability of current traditional resources (such as atomic and thermal power) is insufficient.Hence,artificial(man-made)energy sources are required.Advancements in wireless technology have raised the radio frequency (RF) levels in the environment.These RF waves are available at all times,unlike natural resources such as solar,hydro,and wind energy.The energy requirement and consumption of electronic devices have also been reduced over last decade.Hence,harvesting energy from RF waves and driving low-power devices are the simplest solutions.In the current work,a simplified monopole antenna,called a tri-stepped rectangular antenna for RF harvesting,is proposed.Here,the regular rectangular structure is modified to a step-like structure to achieve impedance matching and maximize the omni-directional gain at all mobile frequencies.This antenna functions with the LTE B5(850),GSM 900,GSM 1800,3G,4G,and ISM(2.4 GHz)systems.We have also demonstrated a proof-of-concept of energy harvesting using RF waves generated by mobile towers and Wi-Fi devices.The system can generate up to 12 mV(14.4 mW) and could charge a battery of rating 3.7 V,500 mAh.We anticipate this harvested energy to be used in driving the WSN node,Bluetooth devices,and mobile charging.

Figures and Tables | References | Related Articles | Metrics
On the Performance of MLR Optical WDM Network Based on ITU-T Conforming Fibers in the Presence of Dominant Physical Layer Impairments COLLECTION
Iyer Sridhar,Sengar Sujata,Bajpai Rochak,Singh Shree.Prakash
Journal of Communications and Information Networks. 2018, 3 (3): 91-108.   DOI: 10.1007/s41650-018-0019-0

The tremendous and consistent increase in the volume and heterogeneity of traffic has resulted in major innovations in the telecommunication networks.In regard to the optical networks,existing studies have shown that by adopting a mixed line rate(MLR)strategy,the wavelength division multiplexed optical networks can cost-effectively respond to the diverse variety of traffic requirements which have heterogeneous service demands.Unlike existing studies which focus on various MLR network issues by considering deployment of the standard single mode fiber only within the network,in the current work,we investigate the signal quality deterioration due to the combined effects of dominant physical layer impairments for an MLR optical network conforming to the various ITU-T compliant fibers and also considering the optical frequency grid based on ITU-T Recommendation G.692.The main aim of our current study is to identify,for a given fiber,the modulation format configuration which provides the highest performance.We conduct extensive simulations on the considered MLR system using the obtained optimum channel spacing values between the single and mixed line rates.Our results show that the existence of 10 Gbit/s line rate has a detrimental effect on the 40 Gbit/s and/or 100 Gbit/s line rate; however,the 40 Gbit/s and/or 100 Gbit/s line rate’s effect on a 10 Gbit/s line rate is not so detrimental,as well as between the similar line rates.Overall,our results clearly show that choice of the line rate of both,the central channel and its adjacent channels,has a major effect on the MLR network performance.

Figures and Tables | References | Related Articles | Metrics
 
 
» Survey of wireless big data COLLECTION
  Qian Lijun,Zhu Jinkang,Zhang Sihai
  Journal of Communications and Information Networks. 2017 Vol. 2 (1): 1-18 (1741)
» Overview of 5G modulation and waveforms candidates COLLECTION
  Maziar NEKOVEE,Yue WANG,Milos TESANOVIC,Shangbin WU,Yinan QI,Mohammed AL-IMARI
  Journal of Communications and Information Networks. 2016 Vol. 1 (1): 44-60 (1300)
» On the architecture and development life cycle of secure cyber-physical systems COLLECTION
  Cong SUN,Jianfeng MA,Qingsong YAO
  Journal of Communications and Information Networks. 2016 Vol. 1 (4): 1-21 (926)
» Architecture and key technologies for Internet of Vehicles:a survey COLLECTION
  Yang Fangchun,Li Jinglin,Lei Tao,Wang Shangguang
  Journal of Communications and Information Networks. 2017 Vol. 2 (2): 1-17 (884)
通信与信息网络学报
· The path to 5G:mmWave aspects COLLECTION [2016, No.2:1-18] (500)
· Survey of wireless big data COLLECTION [2017, No.1:1-18] (475)
· mmWave mobile communication under hypercellular architecture COLLECTION [2016, No.2:62-76] (447)
· Software defined Internet of vehicles:architecture, challenges and solutions COLLECTION [2016, No.1:14-26] (416)
· Overview of 5G modulation and waveforms candidates COLLECTION [2016, No.1:44-60] (385)
· On the architecture and development life cycle of secure cyber-physical systems COLLECTION [2016, No.4:1-21] (364)
· Wireless big data:transforming heterogeneous networks to smart networks COLLECTION [2017, No.1:19-32] (332)
· Study of propagation characteristics of outdoor-to-indoor channel in the 60-GHz band COLLECTION [2016, No.2:93-101] (319)
· Architecture and critical technologies of space information networks COLLECTION [2016, No.3:1-9] (299)
· A survey of routing techniques for satellite networks COLLECTION [2016, No.4:66-85] (285)
· A cost-effective SCTP extension for hybrid vehicular networks COLLECTION [2017, No.2:18-29] (275)
· An adaptive channel estimation algorithm for millimeter wave cellular systems COLLECTION [2016, No.2:37-44] (264)
· QoS-aware interference management for vehicular D2D relay networks COLLECTION [2017, No.2:75-90] (255)
· Link level performance comparison between LTE V2X and DSRC COLLECTION [2017, No.2:101-112] (246)
· Architecture and key technologies for Internet of Vehicles:a survey COLLECTION [2017, No.2:1-17] (245)
· Analysis and prediction of 100 km-scale atmospheric duct interference in TD-LTE networks COLLECTION [2017, No.1:66-80] (244)
· Securing acoustics-based short-range communication systems: an overview COLLECTION [2016, No.4:44-51] (236)
· Technical challenges for high-frequency wireless communication COLLECTION [2016, No.2:19-28] (234)
· Low-complexity factor-graph-based MAP detector for f ilter bank multicarrier systems COLLECTION [2016, No.3:10-22] (234)
· MMSE-based random sampling for iterative detection for large-scale MIMO systems COLLECTION [2016, No.2:29-36] (230)
· A survey of privacy protection techniques for mobile devices COLLECTION [2016, No.4:86-92] (228)
· Adaptive beaconing for collision avoidance and tracking accuracy in vehicular networks COLLECTION [2017, No.2:30-45] (227)
· Secure searchable encryption: a survey COLLECTION [2016, No.4:52-65] (224)
· Privacy-friendly spatial crowdsourcing in vehicular networks COLLECTION [2017, No.2:59-74] (220)
· Wireless channel feature extraction via GMM and CNN in the tomographic channel model COLLECTION [2017, No.1:41-51] (219)
· Millimeter wave receive beamforming with one-bit quantization COLLECTION [2016, No.2:84-92] (217)
· Cluster-based architecture and network model for InterPlaNetary Internet COLLECTION [2016, No.3:51-66] (217)
· Smart data deduplication for telehealth systems in heterogeneous cloud computing COLLECTION [2016, No.4:93-104] (213)
· Position based key exchange: definitions and implementations COLLECTION [2016, No.4:33-43] (205)
· A fully integrated CMOS 60-GHz transceiver for IEEE802.11ad applications COLLECTION [2016, No.2:45-61] (205)
2018
Vol.3
No.2 
2018-06-25
pp.1-92
No.1
2018-01-25
pp.1-90
2017
Vol.2
No.4 
2017-12-25
pp.1-150
No.3
2017-09-25
pp.1-130
No.2
2017-06-25
pp.1-146
No.1
2017-03-25
pp.1-110
2016
Vol.1
No.4 
2016-12-25
pp.1-155
No.3
2016-09-25
pp.1-114
No.2
2016-06-25
pp.1-124
No.1
2016-03-25
pp.1-142

 
    Download
JCIN Instructions for Authors
  2018-04-03
JCIN Copyright and Consent Form
  2017-11-17
LaTeX Template
  2018-10-24
 
Copyright © Journal of Communications and Information Networks, All Rights Reserved.
Powered by Beijing Magtech Co. Ltd