Journal of Communications and Networks Impact Factor & Information

Publisher: Hanʼguk Tʻongsin Hakhoe; IEEE Communications Society, Institute of Electrical and Electronics Engineers

Journal description

Current impact factor: 0.75

Impact Factor Rankings

2015 Impact Factor Available summer 2015
2013 / 2014 Impact Factor 0.747
2012 Impact Factor 0.309
2011 Impact Factor 0.291
2010 Impact Factor 0.351
2009 Impact Factor 0.224
2008 Impact Factor 0.273
2007 Impact Factor 0.223
2006 Impact Factor 0.233
2005 Impact Factor 0.457
2004 Impact Factor 0.403
2003 Impact Factor 0.571
2002 Impact Factor 0.463

Impact factor over time

Impact factor
Year

Additional details

5-year impact 0.30
Cited half-life 5.00
Immediacy index 0.08
Eigenfactor 0.00
Article influence 0.14
Website Journal of Communications and Networks website
Other titles JCN
ISSN 1229-2370
OCLC 41177577
Material type Periodical
Document type Journal / Magazine / Newspaper

Publisher details

Institute of Electrical and Electronics Engineers

  • Pre-print
    • Author can archive a pre-print version
  • Post-print
    • Author can archive a post-print version
  • Conditions
    • Author's pre-print on Author's personal website, employers website or publicly accessible server
    • Author's post-print on Author's server or Institutional server
    • Author's pre-print must be removed upon publication of final version and replaced with either full citation to IEEE work with a Digital Object Identifier or link to article abstract in IEEE Xplore or replaced with Authors post-print
    • Author's pre-print must be accompanied with set-phrase, once submitted to IEEE for publication ("This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible")
    • Author's pre-print must be accompanied with set-phrase, when accepted by IEEE for publication ("(c) 20xx IEEE. Personal use of this material is permitted. Permission from IEEE must be obtained for all other users, including reprinting/ republishing this material for advertising or promotional purposes, creating new collective works for resale or redistribution to servers or lists, or reuse of any copyrighted components of this work in other works.")
    • IEEE must be informed as to the electronic address of the pre-print
    • If funding rules apply authors may post Author's post-print version in funder's designated repository
    • Author's Post-print - Publisher copyright and source must be acknowledged with citation (see above set statement)
    • Author's Post-print - Must link to publisher version with DOI
    • Publisher's version/PDF cannot be used
    • Publisher copyright and source must be acknowledged
  • Classification
    ​ green

Publications in this journal

  • [Show abstract] [Hide abstract]
    ABSTRACT: In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study,we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.
    Journal of Communications and Networks 02/2015; 17(1):75-83.
  • [Show abstract] [Hide abstract]
    ABSTRACT: In a mobile ad hoc network (MANET), communication between mobile nodes occurs without centralized control. In this environment the mobility of a node is unpredictable; this is considered as a characteristic of wireless networks. Because of faulty or malicious nodes, the network is vulnerable to routing misbehavior. The resource constrained characteristics of MANETs leads to increased query delay at the time of data access. In this paper, AntHocNet+Security (ANTSEC) framework is proposed that includes an enhanced cooperative caching scheme embedded with artificial immune system. This framework improves security by injecting immunity into the data packets, improves the packet delivery ratio and reduces end-to-end delay using cross layer design. The issues of node failure and node malfunction are addressed in the cache management.
    Journal of Communications and Networks 01/2015; 17(1):40-46. DOI:10.1109/JCN.2015.000008
  • [Show abstract] [Hide abstract]
    ABSTRACT: In mobile ad-hoc networks (MANETs), nodes are mobile in nature. Collaboration between mobile nodes is more significant in MANETs, which have as their greatest challenges vulnerabilities to various security attacks and an inability to operate securely while preserving its resources and performing secure routing among nodes. Therefore, it is essential to develop an effective secure routing protocol to protect the nodes from anonymous behaviors. Currently, game theory is a tool that analyzes, formulates and solves selfishness issues. It is seldom applied to detect malicious behavior in networks. It deals, instead, with the strategic and rational behavior of each node. In our study, we used the dynamic Bayesian signaling game to analyze the strategy profile for regular and malicious nodes. This game also revealed the best actions of individual strategies for each node. Perfect Bayesian equilibrium (PBE) provides a prominent solution for signaling games to solve incomplete information by combining strategies and payoff of players that constitute equilibrium. Using PBE strategies of nodes are private information of regular and malicious nodes. Regular nodes should be cooperative during routing and update their payoff, while malicious nodes take sophisticated risks by evaluating their risk of being identified to decide when to decline. This approach minimizes the utility of malicious nodes and it motivates better cooperation between nodes by using the reputation system. Regular nodes monitor continuously to evaluate their neighbors using belief updating systems of the Bayes rule.
    Journal of Communications and Networks 01/2015; 17(1):75-83. DOI:10.1109/JCN.2015.000012
  • [Show abstract] [Hide abstract]
    ABSTRACT: In opportunistic networks, it is difficult to predict when a node encounters others and how long it keeps in contact with another. Nodes continually attempt to explore neighbor nodes in the vicinity to transmit data. In battery-operated devices, this persistent exploration consumes a great deal of energy. In this paper, we propose an optimal energy-efficient neighbor discovery scheme (OPEED) that guarantees neighbor discovery within a delay bound. Through performance evaluation, we show that the OPEED scheme consumes 33%???83% less energy than other schemes.
    Journal of Communications and Networks 01/2015; 17(1):34-39. DOI:10.1109/JCN.2015.000007
  • [Show abstract] [Hide abstract]
    ABSTRACT: Multi-hop relay networks have been widely considered as a promising solution to extend the coverage area and to reduce the deployment cost by deploying the relay stations (RSs) in mobile communication systems. Suitable deployment for the RSs is one of the most important features of the demand nodes (DNs) to obtain a high data transmission rate in such systems. Considering a tradeoff among the network throughput, the deployment budget, and the overall coverage of the systems, efficient RS deployment schemes and corresponding algorithms must be developed and designed. A novel cluster-based RS deployment scheme is proposed in this paper to select the appropriate deployment locations for the relay stations from the candidate positions. To make an ideal cluster distribution, the distances between the DNs are calculated when deploying the RSs. We take into account the traffic demands and adopt a uniform cluster concept to reduce the data transmission distances of the DNs. On the basis of the different candidate positions, the proposed scheme makes an adaptive decision for selecting the deployment sites of the RSs. A better network throughput and coverage ratio can be obtained by balancing the network load among the clusters. Simulation results show that the proposed scheme outperforms the previously known schemes in terms of the network throughput and the coverage ratio. Additionally, a suitable deployment budget can be implemented in multi-hop relay networks.
    Journal of Communications and Networks 01/2015; 17(1):84-92. DOI:10.1109/JCN.2015.000013
  • [Show abstract] [Hide abstract]
    ABSTRACT: Convolutional codes which are terminated by direct truncation (DT) and zero tail termination provide unequal error protection. When DT terminated convolutional codes are used to encode short messages, they have interesting error protection properties. Such codes match the significance of the output bits of common quantizers and therefore lead to a low mean square error (MSE) when they are used to encode quantizer outputs which are transmitted via a noisy digital communication system. A code construction method that allows adapting the code to the channel is introduced, which is based on time-varying convolutional codes. We can show by simulations that DT terminated convolutional codes lead to a lower MSE than standard block codes for all channel conditions. Furthermore, we develop an MSE approximation which is based on an upper bound on the error probability per information bit. By means of this MSE approximation, we compare the convolutional codes to linear unequal error protection code construction methods from the literature for code dimensions which are relevant in analog to digital conversion systems. In numerous situations, the DT terminated convolutional codes have the lowest MSE among all codes.
    Journal of Communications and Networks 01/2015; 17(1):12-20. DOI:10.1109/JCN.2015.000004
  • [Show abstract] [Hide abstract]
    ABSTRACT: Aeronautical communication networks (ACN) is an emerging concept in which aeronautical stations (AS) are considered as a part of multi-tier network for the future wireless communication system. An AS could be a commercial plane, helicopter, or any other low orbit station, i.e., Unmanned air vehicle, high altitude platform. The goal of ACN is to provide high throughput and cost effective communication network for aeronautical applications (i.e., Air traffic control (ATC), air traffic management (ATM) communications, and commercial in-flight Internet activities), and terrestrial networks by using aeronautical platforms as a backbone. In this paper, we investigate the issues about connectivity, throughput, and delay in ACN. First, topology of ACN is presented as a simple mobile ad hoc network and connectivity analysis is provided. Then, by using information obtained from connectivity analysis, we investigate two communication models, i.e., single-hop and two-hop, in which each source AS is communicating with its destination AS with or without the help of intermediate relay AS, respectively. In our throughput analysis, we use the method of finding the maximum number of concurrent successful transmissions to derive ACN throughput upper bounds for the two communication models. We conclude that the two-hop model achieves greater throughput scaling than the single-hop model for ACN and multi-hop models cannot achieve better throughput scaling than two-hop model. Furthermore, since delay issue is more salient in two-hop communication, we characterize the delay performance and derive the closed-form average end-to-end delay for the two-hop model. Finally, computer simulations are performed and it is shown that ACN is robust in terms of throughput and delay performances.
    Journal of Communications and Networks 01/2015; 17(1):58-66. DOI:10.1109/JCN.2015.000010
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a web-based content syndication system in which users can easily choose Internet protocol television (IPTV) contents. This system generates personalized content guide to provide a list of IPTV contents with respect to users' interests and statistics information of their online social community. For this, IPTV contents and relevant metadata are collected from various sources and transformed. Then, the service and content metadata are processed by user metadata including audience measurement and community metadata. The metadata flows are separated from content flows of transport network. The implementation of IPTV content syndication system demonstrates how to arrange IPTV contents efficiently from content providers to the end user's screen. We also show that the user metadata including online community information are important for the system's performance and the user's satisfaction.
    Journal of Communications and Networks 01/2015; 17(1):67-74. DOI:10.1109/JCN.2015.000011
  • [Show abstract] [Hide abstract]
    ABSTRACT: With the ever growing demand of data applications, the joint macro-relay networks are emerging as a promising heterogeneous deployment to provide coverage extension and throughput enhancement. However, the current cellular networks are usually designed to be performance-oriented without enough considerations on the traffic variation, causing substantial energy waste. In this paper, we consider a joint macro-relay network with densely deployed relay stations (RSs), where the traffic load varies in both time and spatial domains. An energy-efficient scheme is proposed to dynamically adjust the RS working modes (active or sleeping) according to the traffic variations, which is called traffic-aware relay sleep control (TRSC). To evaluate the performance of TRSC, we establish an analytical model using stochastic geometry theory and derive explicit expressions of coverage probability, mean achievable rate and network energy efficiency (NEE). Simulation results demonstrate that the derived analytic results are reasonable and the proposed TRSC can significantly improve the NEE when the network traffic varies dynamically.
    Journal of Communications and Networks 01/2015; 17(1):47-57. DOI:10.1109/JCN.2015.000009
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we propose a parallel collaborative sphere decoder with a scalable architecture promising quasi-maximum likelyhood performance with a relatively small amount of computational resources. This design offers a hardware-friendly algorithm using a modified node operation through fixing the variable complexity of the critical path caused by the sequential nature of the conventional sphere decoder (SD). It also reduces the computational complexity compared to the fixed-complexity sphere decoder (FSD) algorithm by tree pruning using collaboratively operated node operators. A Monte Carlo simulation shows that our proposed design can be implemented using only half the parallel operators compared to the approach using an ideal fully parallel scheme such as FSD, with only about a 7% increase of the normalized decoding time for MIMO dimensions of 16×16 with 16-QAM modulation.
    Journal of Communications and Networks 12/2014; 16(6):620-626. DOI:10.1109/JCN.2014.000108
  • [Show abstract] [Hide abstract]
    ABSTRACT: In wireless communications, knowledge of the signal-to-noise ratio is required in diverse communication applications. In this paper, we derive the variance of the maximum likelihood estimator in the data-aided and non-data-aided schemes for determining the optimal shrinkage factor. The shrinkage factor is usually the constant that is multiplied by the unbiased estimate and it increases the bias slightly while considerably decreasing the variance so that the overall mean squared error decreases. The closed-form biased estimators for binary-phase-shift-keying and quadrature-phase-shift-keying systems are then obtained. Simulation results show that the mean squared error of the proposed method is lower than that of the maximum likelihood method for low and moderate signal-to-noise ratio conditions.
    Journal of Communications and Networks 12/2014; 16(6):583-591. DOI:10.1109/JCN.2014.000104
  • [Show abstract] [Hide abstract]
    ABSTRACT: Multicast routing algorithms designed for wireline networks are not suitable for wireless environments since they cannot efficiently exploit the inherent characteristics of wireless networks such as the broadcast advantage. There are many routing protocols trying to use these advantages to decrease the number of required transmissions or increase the reception probability of data (e.g., opportunisticrouting). Reducing the number of transmissions in a multicast tree directly decreases the bandwidth consumption and interference and increases the overall throughput of the network. In this paper, we introduce a distributed multicast routing protocol for wireless mesh networks called NCast which take into account the data delivery delay and path length when constructing the tree. Furthermore, it effectively uses wireless broadcast advantage to decrease the number of forwarding nodes dynamically when a new receiver joins the tree. Our simulation results show that NCast improves network throughput, data delivery ratio and data delivery delay in comparison with on demand multicast routing protocol. It is also comparable with multichannel multicast even though it does not use channeling technique which eliminates the interference inherently.
    Journal of Communications and Networks 12/2014; 16(6):613-619. DOI:10.1109/JCN.2014.000107
  • [Show abstract] [Hide abstract]
    ABSTRACT: Cloud computing enables users to easily store their data and simply share data with others. Due to the security threats in an untrusted cloud, users are recommended to compute verification metadata, such as signatures, on their data to protect the integrity. Many mechanisms have been proposed to allow a public verifier to efficiently audit cloud data integrity without receiving the entire data from the cloud. However, to the best of our knowledge, none of them has considered about the efficiency of public verification on multi-owner data, where each block in data is signed by multiple owners. In this paper, we propose a novel public verification mechanism to audit the integrity of multi-owner data in an untrusted cloud by taking the advantage of multisig-nature s. With our mechanism, the verification time and storage overhead of signatures on multi-owner data in the cloud are independent with the number of owners. In addition, we demonstrate the security of our scheme with rigorous proofs. Compared to the straightforward extension of previous mechanisms, our mechanism shows a better performance in experiments.
    Journal of Communications and Networks 12/2014; 16(6):592-599. DOI:10.1109/JCN.2014.000105
  • [Show abstract] [Hide abstract]
    ABSTRACT: Latency, an identified element of Internet protocol (IP) mobility protocol execution, can reduce handover performance in mobile networks. Although the performance can be improved by applying an effective network-based IP mobility scheme in place of the traditional host-based alternatives, the existing inter-domain extensions of network-based IP mobility continue to suffer from an extended handover latency. This paper proposes a new interdomain network-based IP mobility scheme based on node movement prediction. The proposed scheme accelerates the handover by preparing the future domain of the mobile node in a proactive manner. Analytical and simulation-based evaluations confirm improved performance of the proposed scheme in terms of handover latency and packet loss compared with existing schemes.
    Journal of Communications and Networks 12/2014; 16(6):645-655. DOI:10.1109/JCN.2014.000111
  • [Show abstract] [Hide abstract]
    ABSTRACT: Connectivity is a crucial quality of service measure in wireless sensor networks. However, the network is always at risk of being split into several disconnected components owing to the sensor failures caused by various factors. To handle the connectivity problem, this paper introduces an in-advance mechanism to prevent network partitioning in the initial deployment phase. The approach is implemented in a distributed manner, and every node only needs to know local information of its 1-hop neighbors, which makes the approach scalable to large networks. The goal of the proposed mechanism is twofold. First, critical nodes are locally detected by the critical node detection (CND) algorithm based on the concept of maximal simplicial complex, and backups are arranged to tolerate their failures. Second, under a greedy rule, topological holes within the maximal simplicial complex as another potential risk to the network connectivity are patched step by step. Finally, we demonstrate the effectiveness of the proposed algorithm through simulation experiments.
    Journal of Communications and Networks 12/2014; 16(6):667-676. DOI:10.1109/JCN.2014.000113
  • [Show abstract] [Hide abstract]
    ABSTRACT: In this paper, we study the joint price and power allocation in spectrum sharing macro-femtocell networks. The proposed game theoretic framework is based on bi-level Stackelberg game where macro base station (MBS) works as a leader and underlaid femto base stations (FBSs) work as followers. MBS has fixed data rate and imposes interference price on FBSs for maintaining its data rate and earns revenue while FBSs jointly adjust their power for maximizing their data rates and utility functions. Since the interference from FBSs to macro user equipment is kept under a given threshold and FBSs compete against each other for power allocation, there is a need to determine a power allocation strategy which converges to Stackelberg equilibrium. We consider two cases for MBS power allocation, i.e., fixed and dynamic power. MBS can adjust its power in case of dynamic power allocation according to its minimum data rate requirement and number of FBSs willing to share the spectrum. For both cases we consider uniform and nonuniform pricing where MBS charges same price to all FBSs for uniform pricing and different price to each FBS for non-uniform pricing according to its induced interference. We obtain unique closed form solution for each case if the co-interference at FBSs is assumed fixed. And an iterative algorithm which converges rapidly is also proposed to take into account the effect of co-tier interference on interference price and power allocation strategy. The results are explained with numerical simulation examples which validate the effectiveness of our proposed solutions.
    Journal of Communications and Networks 12/2014; 16(6):627-638. DOI:10.1109/JCN.2014.000109
  • [Show abstract] [Hide abstract]
    ABSTRACT: In low-density parity-check (LDPC) coded multiple-input multiple-output (MIMO) communication systems, probabilistic information are exchanged between an LDPC decoder and a MIMO detector. The MIMO detector has to calculate probabilistic values for each bit which can be very complex. In [1], the authors presented a class of linear block codes named low-density MIMO codes (LDMC) which can reduce the complexity of MIMO detector. However, this code only supports the outer-iterations between the MIMO detector and decoder, but does not support the inner-iterations inside the LDPC decoder. In this paper, a new approach to construct LDMC codes is introduced. The new LDMC codes can be encoded efficiently at the transmitter side and support both of the inner-iterations and outer-iterations at the receiver side. Furthermore they can achieve the design rates and perform very well over MIMO channels.
    Journal of Communications and Networks 12/2014; 16(6):639-644. DOI:10.1109/JCN.2014.000110