Forthcoming and Online First Articles

International Journal of Mobile Network Design and Innovation

International Journal of Mobile Network Design and Innovation (IJMNDI)

Forthcoming articles have been peer-reviewed and accepted for publication but are pending final changes, are not yet published and may not appear here in their final order of publication until they are assigned to issues. Therefore, the content conforms to our standards but the presentation (e.g. typesetting and proof-reading) is not necessarily up to the Inderscience standard. Additionally, titles, authors, abstracts and keywords may change before publication. Articles will not be published until the final proofs are validated by their authors.

Forthcoming articles must be purchased for the purposes of research, teaching and private study only. These articles can be cited using the expression "in press". For example: Smith, J. (in press). Article Title. Journal Title.

Articles marked with this shopping trolley icon are available for purchase - click on the icon to send an email request to purchase.

Online First articles are published online here, before they appear in a journal issue. Online First articles are fully citeable, complete with a DOI. They can be cited, read, and downloaded. Online First articles are published as Open Access (OA) articles to make the latest research available as early as possible.

Open AccessArticles marked with this Open Access icon are Online First articles. They are freely available and openly accessible to all without any restriction except the ones stated in their respective CC licenses.

Register for our alerting service, which notifies you by email when new issues are published online.

We also offer which provide timely updates of tables of contents, newly published articles and calls for papers.

International Journal of Mobile Network Design and Innovation (9 papers in press)

Regular Issues

  • Algorithm for decision of vertical handover in femto environment   Order a copy of this article
    by Siddharth Goutam, Srija Unnikrishnan 
    Abstract: Next Generation Networks are heterogeneous in nature due to presence of various Radio Access Technologies (RATs). Hence seamless mobility of users can be achieved by Vertical Handover. The main aim of this research paper is to design and implement an algorithm for making decision for handover in femto environment. The algorithm is designed using fuzzy logic, considering Received Signal Strength, Channel Capacity, Velocity of User, Number of users latched, Latency and Jitter. The decision to perform handover between femto cell and macro cell is presented. We have considered two scenarios i.e. handover from femto cell to femto cell and handover from macro cell to femto cell.
    Keywords: Vertical Handover (VHO); Vertical Handover Decision Algorithm (VHDA); Heterogeneous Wireless Networks; Received Signal Strength (RSS); Channel Capacity; Fuzzy Logic; Universe of Discourse.

  • Designing and Assessment of a Full Duplex MAC Protocol for HEW Networks with Asymmetric Traffic   Order a copy of this article
    by Mohand MOKTEFI, Mohand YAZID, Louiza Bouallouche-Medjkoune, Chafik Akmouche 
    Abstract: Wireless Local Area Networks (WLANs) based on IEEE 802.11rnstandard have been very popular in recent years due to their ability to offer mobility, flexibility and ease of use, with very low installation and maintenance costs. This has resulted in massive deployment of WLANs in geographically limited environments that encompass multiple overlapping BSS (Basic Service Set). In this paper, we are interesting to IEEE 802.11ax, a new standard developed by the IEEE 802.11 working group, which will enable very high data rates and efficient use of the spectrum. We particularly focus on one of the key solutions of this new amendment allowing to take full advantage of the space resources, namely, the Full Duplex (FD) radio communications. The main goal of this paper is proposing a new Full Duplex MAC protocol aiming at efficiently managing the Opportunity Window (OW) resulting from the asymmetry of the Down-Link (DL) and Up-Link (UL) traffics, since the DL traffic is usually much bigger than the UL traffic. The proposed Full Duplex protocol is designed for next-generation OFDMA-based (Orthogonal Frequency-Division Multiple Access) WLANs, which extends simultaneous transmission capabilities as much as possible and resolves conflicts with the minimum over-cost. The simulation results obtained show that the proposed protocol offers superior performance over existing protocols in a dense IEEE 802.11ax network environment.
    Keywords: High Efficiency WLANs; IEEE 802.11ax Standard; Full Duplex Radio Communications; Asymmetric DL and UL Traffic; Simulation and Assessment.

  • Frequency Domain Preamble-Based Channel Estimation and Equalization in LoRa   Order a copy of this article
    by Vincent Savaux, Patrick Savelli 
    Abstract: This paper deals with multipath channel estimation and equalization in LoRa. It is suggested to take advantage of the cyclic property of the symbols in the LoRa frame preamble to obtain an interference-free version of the symbols in the frequency domain. Then, estimation methods used in multicarrier systems can be applied, such as the least square (LS), and the minimum mean square error (MMSE) estimators. It is shown that the cyclic property in LoRa is inherently independent of the length of the channel, making these estimation techniques robust to any frequency-selective channel. In addition the frequency domain zero-forcing (ZF) equalizer is used, and an original phase equalizer is introduced, taking advantage of the constant modulus property of LoRa symbols in the frequency domain. The performance of the investigated estimators and equalizers is shown through simulations, and applications to the presented results are further discussed.
    Keywords: LoRa; Channel Estimation; Equalization; Least Square; Minimum mean square error; Zero forcing.

  • Improving Wireless and Networking Cybersecurity Curriculum   Order a copy of this article
    by Edward Glantz, Mahdi Nasereddin, Joanne Peca, David Fusco, Devin Kachmar 
    Abstract: This investigation expands previous work responding to the growing need to educate and train cyber professionals of wireless and networking devices by guiding cyber education curricular development in undergraduate and masters degree programs. In the haste to expand cyber curriculum, important considerations to improve student learning may be overlooked, resulting in less effective and satisfying experiences. Enhancing effectiveness of the learner experience may leverage not just what, but also how, content is delivered. The result integrates minds-on with hands-on learning. This paper is authored by cyber faculty at a university that recently expanded undergraduate and masters cybersecurity programs to cover wired and wireless cyber curriculum. This initiative supplemented theoretical education with development of hands-on experiential learner experiences across the curriculum
    Keywords: cybersecurity; wireless networking education; student learning; reflection; Kolb’s experiential learning cycle.

  • Single Frozen Bit Polar Code Synchronization   Order a copy of this article
    by Janak Sodha 
    Abstract: A low complexity code synchronization algorithm is proposed which accurately establishes the code synchronization state for a polar code decoder using the belief value on a single frozen bit. The algorithm complexity is independent of the size of the polar code. To illustrate the performance of this algorithm, the theoretical and simulation results are presented for a (8, 4) and (16, 10) polar codes using BPSK over an AWGN channel. The theoretical analysis overlays the simulation results accurately. For the (16, 10) polar code, the probability of a false-alarm can be controlled to range from $10^{-11}$ at 0dB to $10^{-48}$ at 6dB with the time to announce a loss of synchronization that is independent of the channel SNR. This time can be limited to a near pre-selected number of frames if there is an early loss of synchronization.
    Keywords: Polar codes; Code Synchronization; Frame Synchronization; BPSK; AWGN.

  • Lifetime Enhancement of Wireless Sensor Using Multiple Mobile Data Collectors and Optimized Trajectory   Order a copy of this article
    by Jisha .K, Pradeepa K 
    Abstract: Utilizing mobile entities in wireless sensor network is the recent research attraction because of its numerous benefits. The paper suggests on quadrant division of network and deployment of mobile data collectors in each quadrant. Each quadrant is assigned with multiple Data Collection Points (DCPs) with an energy rich node designated as sink node. We propose a clustering algorithm for the sink node to form clustering trees for data collection from sensor nodes. We also optimize the trajectory path of the mobile data collector by using a linear programming formulation. The data collector travels along the optimized trajectory route to visit sink nodes at each DCP to aggregate the data. Simulations are done to measure the performance of the proposed algorithm in terms of network lifetime, average energy consumption, number of live and dead nodes. The proposed algorithm showcase a good performance in comparison with the existing schemes.
    Keywords: Wireless sensor network; Mobile data collector; Sink; clustering; Data collection points; Predetermined trajectory.

  • A distributed monitoring scheme for a fleet of UAV flying drones   Order a copy of this article
    by Amine Nouasri, Mohamed Amine Riahla 
    Abstract: In this paper, we present a solution that would allow members of a UAV drone fleet to cooperate with each other in order to monitor the network regarding incidents that could compromise security or impact service continuity during their mission. The proposed work implements a scheme to allow each drone to monitor the activity of immediate neighbours without a central control authority, and share that information. This is in order to decide of an action in case of a security incident or a degradation of their service has occurred. The purpose is to allow the network to be resilient and adopt itself to insure service continuity. The method we used allow the detection of incidents without the use of complex security and routing solutions, or the need to communicate back and forth with a central control authority. Our method uses four parameters to insure service continuity in the network: Link Quality, Forwarding Rate, Checksum Rate and Mobility Coordinates. This is to allow the detection of multiple incidents using the same scheme.
    Keywords: Drones; fleet; Security; Cooperation; Service Continuity; Link Quality; Forwarding Rate; Checksum Rate; Mobility Coordinates.

  • A Greedy Heuristic Protocol for Data Collection Using Mobile Base Station in Wireless Sensor Network   Order a copy of this article
    by Santhana Krishna N, Pradeepa K 
    Abstract: Abstract: Deploying mobile entities in wireless sensor network increases their lifespan manifolds as it is very efficient in handling the energy hole problem. Many methodologies and techniques have been adopted by various past research works to minimize the hotspot formation around the base station. Reducing the formation of hotspot has a direct impact on the longevity of sensor network, so more efforts and focus is laid on this particular research area. In this paper we propose a Greedy Algorithm for Data Collection which greedily selects the energy rich spots for the mobile base station to sojourn. Apart from this the paper has also proposed a Linear Programming formulation which optimizes the base station stopping time which will have a direct impact on increasing the network lifetime. The linear programming formulation considers the residual energy of the sensor nodes to decide on the quantity of time for the base station to sojourn.
    Keywords: Keywords: Wireless sensor network; Network Lifetime; Greedy Algorithm; Mobile base station; optimized time; mobile sink; mobile cluster head.

  • Triangle Based Partitioning with Multiple Mobile Sinks on Predetermined Trajectory for Enhancing the Sensor Network Lifetime   Order a copy of this article
    by Jayanthi Vagini, PRADEEPA .K 
    Abstract: Utilizing mobile entities in wireless sensor network is the recent research attraction because of its numerous benefits. The paper suggests on quadrant division of network and deployment of mobile data collectors in each quadrant. Each quadrant is assigned with multiple Data Collection Points (DCPs) with an energy rich node designated as sink node. We propose a clustering algorithm for the sink node to form clustering trees for data collection from sensor nodes. We also optimize the trajectory path of the mobile data collector by using a linear programming formulation. The data collector travels along the optimized trajectory route to visit sink nodes at each DCP to aggregate the data. Simulations are done to measure the performance of the proposed algorithm in terms of network lifetime, average energy consumption, number of live and dead nodes. The proposed algorithm showcase a good performance in comparison with the existing schemes
    Keywords: Wireless sensor network; Mobile data collector; Sink; clustering; Data collection points; predetermined trajectory; Triangle partition.