scispace - formally typeset
Search or ask a question
JournalISSN: 1074-5351

International Journal of Communication Systems 

Wiley-Blackwell
About: International Journal of Communication Systems is an academic journal published by Wiley-Blackwell. The journal publishes majorly in the area(s): Computer science & Wireless sensor network. It has an ISSN identifier of 1074-5351. Over the lifetime, 4177 publications have been published receiving 40554 citations. The journal is also known as: Communication systems.


Papers
More filters
Journal ArticleDOI
TL;DR: A scheduling algorithm and admission control policy for IEEE 802.16 broadband wireless access standard which provides QoS support to different traffic classes and the relationship between traffic characteristics and its QoS requirements and the network performance is shown.
Abstract: In this paper we introduce a scheduling algorithm and admission control policy for IEEE 80216 broadband wireless access standard The proposed solution which is practical and compatible to the IEEE 80216 standard, provides QoS support to different traffic classes To the best of our knowledge this is the first such algorithm The simulation studies show that the proposed solution includes QoS support for all types of traffic classes as defined by the standard We have shown the relationship between traffic characteristics and its QoS requirements and the network performance Copyright © 2003 John Wiley & Sons, Ltd

448 citations

Journal ArticleDOI
TL;DR: This paper considers power line channel frequency response and noise models in the 1–30 MHz band and proposes a number of power line test channels in which to measure the performance of powerline modems.
Abstract: SUMMARY In-building power lines have often been considered as attractive media for high-speed data transmission, particularly for applications like home networking. In this paper, we develop models for power line channels based both on theoretical considerations and practical measurements. We consider power line channel frequency response and noise models in the 1–30 MHz band and propose a number of power line test channels in which to measure the performance of power line modems. Copyright # 2003 John Wiley & Sons, Ltd.

219 citations

Journal ArticleDOI
TL;DR: Powerline communications and the HomePlug 1.0 protocol, based on orthogonal frequency division multiplexing (OFDM) and carrier sense multiple access with collision avoidance (CSMA/CA), along with its changes to allow prioritized channel access are described.
Abstract: Products implementing the HomePlug 1.0 standard allowing high-speed communication on low-voltage powerlines have recently started arriving on the U.S. market for home and office networking without the requirement for installing new wires. Effective use of the powerline bandwidth requires robust physical (PHY) and medium access control (MAC) protocols to mitigate the harsh conditions of the powerline channel as well as the capability to support prioritized multimedia traffic. This paper describes powerline communications and the HomePlug 1.0 protocol, based on orthogonal frequency division multiplexing (OFDM) and carrier sense multiple access with collision avoidance (CSMA/CA), along with its changes to allow prioritized channel access. It then presents performance results for the HomePlug 1.0 protocol using a simulation model, ideal laboratory measurements with actual HomePlug 1.0 devices and field tests in a residential building. Simulation and laboratory data rates were around 6 Mbps, and field tests gave rates from 1.6 to 5.3 Mbps at the application level. Copyright © 2003 John Wiley & Sons, Ltd.

200 citations

Journal ArticleDOI
TL;DR: This paper proposes a distributed, scalable and localized multipath search protocol to discover multiple node-disjoint paths between the sink and source nodes and proposes a load balancing algorithm to distribute the traffic over the multiple paths discovered.
Abstract: The energy consumption is a key design criterion for the routing protocols in wireless sensor networks. Some of the conventional single path routing schemes may not be optimal to maximize the network lifetime and connectivity. In this paper, we propose a distributed, scalable and localized multipath search protocol to discover multiple node-disjoint paths between the sink and source nodes. We also propose a load balancing algorithm to distribute the traffic over the multiple paths discovered. We compare our proposed scheme with the directed diffusion, directed transmission, N-to-1 multipath routing, and the energy-aware routing protocols. Simulation results show that our proposed scheme has a higher node energy efficiency, lower average delay and control overhead than those protocols. Copyright © 2006 John Wiley & Sons, Ltd.

195 citations

Journal ArticleDOI
TL;DR: An improved and efficient smart‐card‐based password authentication and key agreement scheme that not only maintains the original secret requirement but also achieves mutual authentication and withstands the stolen‐smart‐card attack.
Abstract: Smart-card-based remote user password authentication schemes are commonly used for providing authorized users a secure method for remotely accessing resources over insecure networks. In 2009, Xu etal. proposed a smart-card-based password authentication scheme. They claimed their scheme can withstand attacks when the information stored on the smart card is disclosed. Recently, Sood etal. and Song discovered that the smart-card-based password authentication scheme of Xu etal. is vulnerable to impersonation and internal attacks. They then proposed their respective improved schemes. However, we found that there are still flaws in their schemes: the scheme of Sood etal. does not achieve mutual authentication and the secret key in the login phase of Song's scheme is permanent and thus vulnerable to stolen-smart-card and off-line guessing attacks. In this paper, we will propose an improved and efficient smart-card-based password authentication and key agreement scheme. According to our analysis, the proposed scheme not only maintains the original secret requirement but also achieves mutual authentication and withstands the stolen-smart-card attack. Copyright © 2012 John Wiley & Sons, Ltd.

167 citations

Performance
Metrics
No. of papers from the Journal in previous years
YearPapers
2023148
2022362
2021392
2020450
2019303
2018314