IEEE Communications Magazine
Papers 8037
1 page of 804 pages (8,037 results)
#1Ali Fatih Demir (USF: University of South Florida)H-Index: 3
#2Berker Pekoz (USF: University of South Florida)H-Index: 3
Last.Huseyin Arslan (USF: University of South Florida)H-Index: 37
view all 4 authors...
The ever-changing telecommunication industry is in severe need of a highly-skilled workforce to shape and deploy future generation communication systems. This article presents an innovative telecommunication training that is designed to satisfy this need. The training focuses on hardware layers of the open systems interconnection model. It integrates theory, numerical modeling, and hardware implementation to ensure a complete and long-lasting understanding. The key telecommunication concepts tha...
By its name, immersive computing creates a sense of immersion by blurring the boundary between the digital and the physical worlds. Typical immersive computing technologies include VR, 360-degree videos, AR, MR, and so on. This article discusses and highlights several research challenges when consumers experience immersive media content on mobile devices. It focuses on the recent developments for improving network efficiency and quality of user experience for mobile immersive applications. It th...
IoT has evolved from an experimental to a backbone technology able to connect myriads of people, things, and services for a large range of businesses. At the same time, the emergence of SDN can ideally handle IoT challenges for elasticity, heterogeneity, and mobility, offering an architecture that abstracts decision making away from the data plane and providing a programmable network facility. Along these lines, we propose MINOS, a multi-protocol SDN platform for IoT that implements service awar...
#1Haoran LiangH-Index: 1
#2Jun WuH-Index: 14
Last.Miaowen WenH-Index: 23
view all 6 authors...
Vehicle-to-everything (V2X) aims to make transportation system more intelligent through linking everything with the moving vehicles, but it brings geographical dynamic intrusions. However, existing intrusion detection systems (IDSs) of vehicles just deploy the preset statics strategies. As a novel security technology, blockchain can realize decentralized tamper- resistance. However, it has not been used for IDSs because of its rigid structure. In this article, we propose Micro-Blockchain based g...
The four articles in this special section focus on secure wireless networks for vehicle-to-everything communications. Intelligent transportation systems (ITS) will support more efficient vehicular traffic flow, increased vehicular and pedestrian safety, and, eventually, autonomous driving. Wireless communications is fundamental for enabling ITS, and recent advances in communications technology and systems support establishing reliable wireless links and networks among cars, cars and pedestrians,...
#1Piotr LechowiczH-Index: 6
#2Roza GoscienH-Index: 10
Last.Krzysztof WalkowiakH-Index: 18
view all 6 authors...
This article identifies the unavoidably required upgrade of short-term realizable elastic optical networks (EONs) operating over single-mode fibers toward spectrally-spatially flexible optical networks (SS-FONs), exploiting spatial division multiplexing (SDM) technology in order to cope with the expected mid- and long-term future traffic forecasts. Since a complete EON to SS-FON network migration overnight is unrealistic, this article proposes a gradual greenfield migration strategy employing no...
Wireless optical communications (WOC) has carriers up to several hundred terahertz, which offers several advantages, such as ultrawide bandwidth and no electromagnetic interference. Conventional WOC technologies that use light transmitters such as light emitting diodes (LEDs), directed LEDs, and lasers are facing major challenges in attenuation or tracking. Resonant beam communications (RBCom) meets the requirements of low attenuation, non-mechanical mobility, and multiple access. However, RBCom...
Current SDN controllers have been designed based on a monolithic approach that integrates all services and applications into one single, huge program. The monolithic design of SDN controllers restricts programmers who build management applications to the specific programming interfaces and services that a given SDN controller provides, making application development dependent on the controller, and thereby restricting portability of management applications across controllers. Furthermore, the mo...
Wireless network virtualization is regarded as a technology to enable sharing of physical wireless infrastructure and RF slices for improving not only wireless network capacity and coverage but also wireless security. This article provides a perspective of fusion of three emerging technologies: SDN, EC, and blockchain technology for wireless network virtualization. SDN, with the help of controllers, allows dynamic configuration of network resources for their efficient management. EC not only hel...
Enabling vehicles to communicate with other vehicles, infrastructure, pedestrians, and everything for use cases such as road safety, automatic driving, and infotainment is important for the future cellular networks. However, some vehicle-to-everything (V2X) services need secure transmissions and should be prevented from eavesdropping. Physical layer security, an information- theoretical framework, utilizes the randomness of underlying channels to ensure secrecy in the physical layer. Different f...
Top fields of study
Distributed computing
Computer network
Computer science