2019 Index Journal of Communications and Networks, Volume 21

Abstract

Abstract: This index covers all papers that appeared in JCN during 2019. The Author Index contains the primary entry for each item, listed under the first author’s name, and cross-references from all coauthors. The Title Index contains paper titles for each Division in the alphabetical order from No. 1 to No. 6. Please refer to the primary entry in the Author Index for the exact title, coauthors, and comments / corrections.

AUTHOR INDEX

A

Akhlaghpasand, H., see Baianifar, M., Apr. 19, pp. 113 124.

Aldini, A., see Klopfenstein, L. C., Oct. 19, pp. 509 520.

Ali, R., see Shahin, N., Apr. 19, pp. 158 167.

Angelakis, V., see Kosta, A., June 19, pp. 244 255.

Arakawa, S., see Hanay, Y. S., Aug. 19, pp. 395 404.

B

Bacinoglu, , B. T., Sun, Y., Uysal, E., and Mutlu, V., Optimal Status Updating with a Finite Battery Energy Harvesting Source; June 19, pp. 280 294.

Bahk, S., see Kang, B., Aug. 19, pp. 416 428.

Baianifar, M., Razavizadeh, S. M., Akhlaghpasa nd, H., and Lee, I., Apr. 19, pp. 113 124.

Bastopcu, M., and Ulukus, S., Minimizing Age of Information with Soft Updates; June 19, pp. 233 243.

Bogliolo, A., see Klopfenstein, L. C., Oct. 19, pp. 509 520.

Brown III, D. R., see Farazi, S., June 19, pp. 268 279.

Buyukates, B., Soysal, A., and Ulukus, S., Age of Information in Multihop Multicast Networks; June 19, pp. 256 267.

Byun, H., Decentralized Gene Regulatory Networks: An Approach to Energy Efficient Node Coordination with Delay Constraints for Wireless Sensor Systems; Dec. 19, pp. 548 557.

C

Cai, L., see Ou, C. H., Feb. 19, pp. 12 24.

Cai, Y., see Chen, D., Aug. 19, pp. 365 375.

Cao, H., see Zhang, Y., Dec. 19, pp. 529 538.

Chen, D., Cheng, Y., Wang, X., Yang, W., Hu, J., and Cai, Y., Energy Efficie nt Secure Multiuser Scheduling in Energy Harvesting Untrusted Relay Networks; Aug. 19, pp. 365 375.

Cheng, Y., see Chen, D., Aug. 19, pp. 365 375.

Choi, H.-A., see Li, H., Apr. 19, pp. 177 191.

Choi, J., Jung, S. Y., Kim, S. L., Kim, D. M., and Popovski, P ., User Centric Resource Allocation with Two Dimensional Reverse Pricing in Mobile Communication Services; Apr. 19, pp. 148 157.

Choi, J., Shin, J., and Yi, Y., Information Source Localization with Protector Diffusion in Networks; Apr. 19, pp. 136 147.

Choi, K. J., and Kim, K. S., Large Scale Cloud Radio Access Networks: Fundamental Asymptotic Analysis; Apr. 19, pp. 85 99.

Choi, S., see Jang, Y., Aug. 19, pp. 376 384.

Choi, S., see Kang, B., Aug. 19, pp. 416 428.

Costa, R., Lau, J., Portugal, P., Vasques, F ., and Moraes, R., Handling Real Time Communication in Infrastructured IEEE 802.11 Wireless Networks: The RT WiFi Approach; June 19, pp. 319 334.

Cyr, B., see Sun, Y., June 19, pp. 204 219.

D

Dai, H.-N., see Wang, Q., Oct. 19, pp. 481 490.

Darsena, D., Gelli, G., and Verde, F., Design and performance analysis of multiple relay cooperative MIMO networks; Feb. 19, pp. 25 32.

Delicato, Flavia C., see Macedo, Evandro L. C., Oct. 19, pp. 444 457.

Delpriori, S., see Klopfenstein, L. C., Oct. 19, pp. 509 520.

Dong, Y., see see Hu, C., June 19, pp. 295 306.

E

Egberto A. R. de, see Macedo, Evandro L. C., Oct. 19, pp. 444-457.

Elhabyan, R., Shi, W., and St-Hilaire, M., Coverage Protocols for Wireless Sensor Networks: Review and Future Directions; Feb. 19, pp. 45-60.

Ephremides, A., see Huang, S., Aug. 19, pp. 353-364.

Ephremides, A., see Kosta, A., June 19, pp. 244-255.

F

Falowo, O., see Paul, U., Dec . 19, pp. 569 582.

Fang, L., see Liu, Z., Oct . 19, pp. 469 480.

Farazi, S., Klein, A. G., and Brown III, D. R., F undamental Bounds on the Age of Information in Multi Hop Global Status Update Networks; June 19, pp. 268 279.

França, Felipe M. G., see Macedo, Evandro L. C., Oct . 19, pp. 444 457.

G

Gao, Y., see Sun, K., Aug . 19, pp. 339 352.

Gelli, G., see Darsena, D., Feb . 19, pp. 25 32.

H

Halabian, H., Lambadaris, I., and Viniotis, I., Optimal Server Assignment in Multi Server Queueing Systems with Random Connectivities; Aug . 19, pp. 405 415.

Hanay, Y. S., Arakawa, S., and Murata, M., Evaluation of Topology Opt imization Objectives in IP Networks; Aug . 19, pp. 395 404.

Hu, C., and Dong, Y., Age of Information of Two way Data Exchanging System with Power Splitting; June 19, pp. 295 306.

Hu, J., see Chen, D., Aug . 19, pp. 365 375.

Huang, S., Yuan, D., and Ephremide s, A., Bandwidth Partition and Allocation for Efficient Spectrum Utilization in Cognitive Communications; Aug . 19, pp. 353 364.

I

Islam, A., and Shin, S. Y., BUAV: A Blockchain Based Secure UAV Assisted Data Acquisition Scheme in Internet of Thing; Oct . 19, pp. 491 502.

J

Jang, Y., Kim, Y., Park, S., and Choi, S., Link Adaptation Strategies for IEEE 802.15.4 WPANs: Protocol Design and Performance Evaluation; Aug . 19, pp. 376 384.

Jung, S. Y., see Choi, J., Apr . 19, pp. 148 157.

Jung, S., see Kang, B ., Aug . 19, pp. 416 428.

K

Kang, B., Choi, S., Jung, S., and Bahk, S., D2D Communications Underlaying Cellular Networks on Licensed and Unlicensed Bands with QoS constraints; Aug . 19, pp. 416 428.

Khan, F., and Li, H., Ensuring Trust and Confidentialit y for Adaptive Video Streaming in ICN; Dec . 19, pp. 539 547.

Kim, D. M., see Choi, J., Apr . 19, pp. 148 157.

Kim, D.-S., see Tran Dang, H., Feb . 19, pp. 33 44.

Kim, K. S., see Choi, K. J., Apr . 19, pp. 85 99.

Kim, S. W., see Shahin, N., Apr . 19, pp. 158 16 7.

Kim, S.-L., Kim, see Choi, J., Apr . 19, pp. 148 157.

Kim, T.-K., User Scheduling and Grouping in Massive MIMO Broadcast Channels with Heterogeneous Users; Aug . 19, pp. 385 394.

Kim, Y. H., see Yoon, J., Feb . 19, pp. 1 11.

Kim, Y., see Jang, Y., Aug . pp. 376 384.

Kim, Y.-T., see Shahin, N., Apr . 19, pp. 158 167.

Klein, A. G., see Farazi, S., June 19, pp. 268 279.

Klopfenstein, L. C., Delpriori, S., Aldini, A., and Bogliolo, A., “Worth One Minute”: an anonymous rewarding platform for crowd sensing syst ems; Oct . 19, pp. 509 520.

Ko, H., and Pack, S., OB DETA: Observation Based Directional Energy Transmission Algorithm in Energy Harvesting Networks; Apr . 19, pp. 168 176.

Kosta, A., Pappas, N., Ephremides, A., and Angelakis, V., Age of Information Performa nce of Multiaccess Strategies with Packet Management; June 19, pp. 244 255.

Kwon, B., and Lee, S., Error Detection Algorithm for Lempel Ziv 77 Compressed Data; Apr . 19, pp. 100 112.

Kwon, K., see Park, M., Dec . 19, pp. 558 568.

Kwon, T. T., see Park, M., D ec . 19, pp. 558 568.

L

Lambadaris, I., see Halabian, H., Aug . 19, pp. 405 415.

Lau, J., see Costa, R., June 19, pp. 319 334.

Lee, C., see Yoon, J., Feb. 19, pp. 1 11.

Lee, D., and So, J., Adaptive Feedback Bits and Power Allocation for Dynamic TDD Syst ems; Apr . 19, pp. 113 124.

Lee, I., see Baianifar, M., Apr . 19, pp. 113 124.

Lee, M., and Oh, S. K., A Closed Form Ergodic Capacity Expression for a Generic Cooperative Diversity Network in Rayleigh Fading Channels; June 19, pp. 307 318.

Lee, S., see Kwon, B., Apr . 19, pp. 100 112.

Li, H., see Khan, F., Dec . 19, pp. 539 547.

Li, H., Shen, C., Zhao, Y., Sahin, G., Choi, H. A., and Shah, Y., High Entropy Secrecy Generation from Wireless CIR; Apr . 19, pp. 177 191.

Lim, T. J., see Tandon, A., Oct . 19, pp. 458 4 68.

Liu, G., see Liu, Z., Oct . 19, pp. 469 480.

Liu, J., see Paul, U., Dec . 19, pp. 569 582.

Liu, W., see Liu, Z., Oct . 19, pp. 469 480.

Liu, Z., Liu, W., Ma, Q., Liu, G., Zhang, L., Fang, L., and Sheng, V. S., Security Cooperation Model Based on Topology Control and Time Synchronization for Wireless Sensor Networks; Oct . 19, pp. 469 480.

Luan, G., Estimating TCP Flow Completion Time Distributions; Feb . 19, pp. 61 68.

Luís F. M. de, see Macedo, Evandro L. C., Oct . 19, pp. 444 457.

M

Ma, Q., see Liu, Z., Oct . 19, pp. 469 480.

Macedo, Evandro L. C., Oliveira, Egberto A. R. de, Silva, Fabio H., Mello Jr, Rui R., França, Felipe M. G., Delicato, Flavia C., Rezende, José F. de, and Moraes, Luís F. M. de, On the Security Aspects of Internet of Things: A Systema tic Literature Review; Oct . 19, pp. 444 457.

Maier, G., see Paul, U., Dec . 19, pp. 569 582.

Mebarkia, K., and Zsóka, Z., Service Traffic Engineering: avoiding Link Overloads in Service Chains; Feb . 19, pp. 69 80.

Mello Jr, Rui R., see Macedo, Evandro L.C., Oct . 19, pp. 444 457.

Moon, Y.-S., and No, J. S., Degrees of Freedom of M N SISO X Channel with Synergistic Alternating CSIT; Dec . 19, pp. 521 528.

Moraes, R., see Costa, R., June 19, pp. 319 334.

Murata, M., see Hanay, Y. S., Aug . 19, pp. 395 404.

Mutlu, V., see Bacinoglu, B. T., June 19, pp. 280 294.

N

No, J.-S., see Moon, Y. S., Dec . 19, pp. 521 528.

O

Oh, S.-K., see Lee, M., June 19, pp. 307 318.

Oliveira, Egberto A. R. de, see Macedo, Evandro L. C., Oct . 19, pp. 444 457.

Ou, C.-H., Wu, B. Y.Y., and Cai, L., GPS free Vehicular Localization System Using Roadside Units with Directional Antennas; Feb . 19, pp. 12 24.

P

Pack, S., see Ko, H., Apr . 19, pp. 168 176.

Pappas, N., see Kosta, A., June 19, pp. 244 255.

Park, J., see Park, M., Apr . 19, 192 199.

Park, M., and Park, J., TAiM: TCP Assistant in the Middle for Multihop Low power and Lossy Networks in IoT; Apr . 19, pp. 192 199.

Park, M., Sohn, S., Kwon, K., and Kwon, T. T., MaxPass: Credit Based Multipath Transmission for Load Balancing in Da ta Centers; Dec . 19, pp. 558 568.

Park, S., see Jang, Y., Aug . 19, pp. 376 384.

Paul, U., Liu, J., Troia, S., Falowo, O., and Maier, G., Traffic Profile and Machine Learning Based Regional Data Center Design and Operation for 5G Network; Dec . 19, pp. 569 5 8 3

Popovski, P., see Choi, J., Apr . 19, pp. 148 157.

Portugal, P., see Costa, R., June 19, pp. 319 334.

R

Razavizadeh, S. M., see Baianifar, M., Apr . 19, pp. 113 124.

Rezende, José F. de, see Macedo, Evandro L. C., Oct . 19, pp. 444 457.

S

Sahin, G see Li, H., Apr . 19, pp. 177 191.

Sangaiah, G., see Wang, Q., Oct . 19, pp. 481 490.

Shah, Y., see Li, H., Apr . 19, pp. 177 191.

Shahin, N., Ali, R., Kim, S. W., and Kim, Y. T., Cognitive Backoff Mechanism for IEEE802.11ax High Efficiency WLANs; Apr . 19, pp. 158 167.

Shen, C., see Li, H., Apr . 19, pp. 177 191.

Sheng, V. S., see Liu, Z., Oct . 19, pp. 469 480.

Shi, W., see Elhabyan, R., Feb . 19, pp. 45 60.

Shin, J., see Choi, J., Apr . 19, pp. 136 147.

Shin, S. Y., see Islam, A., Oct . 19, pp. 491 502.

Silva, Fabio H., see Macedo, Evandro L. C., Oct . 19, pp. 444 457.

So, J., see Lee, D., Apr . 19, pp. 113 124.

Sohn, S., see Park, M., Dec . 19, pp. 558 568.

Soysal, A., see Buyukates, B., June 19, pp. 256 267.

St-Hilaire, M., see Elhabyan, R., Feb . 19, pp. 45 60.

Sun, K., Zhang, H., Gao, Y., and Wu, D., Delay Aware Fountain Codes for Video Streaming with Optimal Sampling Strategy; Aug . 19, pp. 339 352.

Sun, Y., and Cyr, B., Sampling for Data Freshness Optimization: Non linear Age Functions; June 19, pp. 204 219.

Sun, Y., see Bacinoglu, B. T., June 19, pp. 280 294.

T

Tandon, A., Lim, T. J., and Tef e k , U., Sentinel Based Malicious Relay Detection in Wireless IoT Networks; Oct . 19, pp. 458 468.

Tefek , see Tandon, A., Oct . 19, pp. 458 468.

Tran-Dang, H., and Kim , S., Channel Aware Cooperative Routing in Underwater Acoustic Sensor Networks; Feb . 19, pp. 33 44.

Troia, S., see Paul, U., Dec . 19, pp. 569 582.

Tsai, C.-W., see Wu, H. T., Oct . 19, pp. 503 508.

U

Ulukus, S., see Bastopcu, M., June 19, pp. 233 243.

Ulukus, S., see Buyukates, B., June 19, pp. 256 267.

Uysal, E., see Bacinoglu, B. T., June 19, pp. 280 294.

V

Vasques, F., see Costa, R., June 19, pp. 319 334.

Verde, F., see Darsena, D ., Feb . 19, pp. 25 32.

Viniotis, I., see Halabian, H., Aug . 19, pp. 405 415.

W

Wang, B., Feng, S., and Yang, J., When to Preempt? Age of Information Minimization under Link Capacity Constraint; June 19, pp. 220 232.

Wang, H., see Wang, Q., Oct . 19, 481 490.

Wang, Q., Dai, H. N., Wang, H., Xu, G., and Sangaiah, G., UAV enabled Friendly Jamming Scheme to Secure Industrial Internet of Things; Oct . 19, pp. 481 490.

Wang, X., see Chen, D., Aug . 19, pp. 365 375.

Wu, B.-Y., see Ou, C. H., Feb . 19, pp. 12 2 4.

Wu, D., see Sun, K., Aug . 19, pp. 339 352.

Wu, H.-T., and Tsai, C. W., An Intelligent Agriculture Network Security System Based on Private Blockchains; Oct . 19, pp. 503 508.

X

Xu, G., see Wang, Q., Oct . 19, pp. 481 490.

Y

Yang, L., see Zhang, Y. Y., Dec . 19, pp. 529 538.

Yang, W., see Chen, D., Aug . 19, pp. 365 375.

Yi, Y., see Choi, J., Apr . 19, pp. 136 147.

Yoon, J., Lee, C., and Kim, Y. H., Recovery of Carrier Frequency Offset and Set Information for LTE Device to Device Communications; Feb . 19, pp. 1 11.

Yuan, D., see Huang, S., Aug . 19, pp. 353 364.

Z

Zhang, H., see Sun, K., Aug . 19, pp. 339 352.

Zhang, L., see Liu, Z., Oct . 19, pp. 469 480.

Zhang, Y., Cao, H., Zhou, M., and Yang, L., Cell Free Massive MIMO: Zero Forcing and Conjugate Beamfo rming Receivers; Dec . 19, pp. 529 538.

Zhao, Y., see Li, H., Apr . 19, pp. 177 191.

Zhou, M., see Zhang, Y., Dec. 19, pp. 529 538.

Zsóka, Z., see Mebarkia, K., Feb . 19, pp. 69 80.

TITLE INDEX

Communication Theory and Systems (Division I)

Recovery of Carrier Frequency Offset and Set Information for LTE Device to Device Communications ; Feb. 1 9 , pp. 1 11

Large Scale Cloud Radio Access Networks: Fundamental Asymptotic Analysis ; Apr . 1 9 , pp. 85 99

Error Detection Algorithm for Lempel Ziv 77 Compressed Da ta; Apr. 1 9 , pp. 1 00 1 12

Delay Aware Fountain Codes for Video Streaming with Optimal Sampling Strategy; Aug . 1 9 , pp. 339 352

Wireless Communications (Division II)

GPS free Vehicular Localization System Using Roadside Units with Directional Antennas; F eb. 1 9 , pp. 12 24

Design and performance analysis of multiple relay cooperative MIMO networks; Feb. 1 9 , pp. 25 32

Adaptive Feedback Bits and Power Allocation for Dynamic TDD Systems; Apr . 1 9 , pp. 113 124

Energy Efficiency Maximization in mmWave Wireless Networks with 3D Beamforming; Apr. 1 9 , pp. 12 5 13 5

A Closed Form Ergodic Capacity Expression for a Generic Cooperative Diversity Network in Rayleigh Fading Channels; June 1 9 , pp. 307 318

Bandwidth Partition and Allocation for Efficient Spectrum Utilizat ion in Cognitive Communications; Aug . pp. 353 364.

Energy Efficient Secure Multiuser Scheduling in Energy Harvesting Untrusted Relay Networks; Aug . pp. 365 375.

Link Adaptation Strategies for IEEE 802.15.4 WPANs: Protocol Design and Performance Eva luation; Aug . pp. 376 384.

User Scheduling and Grouping in Massive MIMO Broadcast Channels with Heterogeneous Users; Aug . pp. 385 394.

Degrees of Freedom of M N SISO X Channel with Synergistic Alternating CSIT; Dec . pp. 521 528

Cell Free Mas sive MIMO: Zero Forcing and Conjugate Beamforming Receivers; Dec . pp. 529 538

Networks and Services (Division III)

Channel Aware Cooperative Routing in Underwater Acoustic Sensor Networks; Feb . pp. 33 44.

Coverage Protocols for Wireless Sensor Networks: Review and Future Directions; Feb . pp. 45 60.

Estimating TCP Flow Completion Time Distributions; Feb . pp. 61 68.

Service Traffic Engineering: avoiding Link Overloads in Service Chains; Feb . pp. 69 80.

Information Source Localization w ith Protector Diffusion in Networks; Apr . pp. 136 147.

User Centric Resource Allocation with Two Dimensional Reverse Pricing in Mobile Communication Services; Apr . pp. 148 157.

Cognitive Backoff Mechanism for IEEE802.11ax High Efficiency WLANs; Apr . pp. 158 167.

OB DETA: Observation Based Directional Energy Transmission Algorithm in Energy Harvesting Networks; Apr . pp. 168 176.

High Entropy Secrecy Generation from Wireless CIR; Apr . pp. 177 191.

TAiM: TCP Assistant in the Middle for Mult ihop Low power and Lossy Networks in IoT; Apr . pp. 192 199.

Handling Real Time Communication in Infrastructured IEEE 802.11 Wireless Networks: The RT WiFi Approach ; June 19, pp. 319 334.

Evaluation of Topology Optimization Objectives in IP Networks; Au g . pp. 395 404.

Optimal Server Assignment in Multi Server Queueing Systems with Random Connectivities; Aug . pp. 405 415.

D2D Communications Underlaying Cellular Networks on Licensed and Unlicensed Bands with QoS constraints; Aug . pp. 416 428.

Ensuring Trust and Confidentiality for Adaptive Video Streaming in ICN; Dec . pp. 539 547.

Optimal Server Assignment in Multi Server Queueing Systems with Random Connectivities; Aug . pp. 405 415.

D2D Communications Underlaying Cellular Networks on Licensed and Unlicensed Bands with QoS constraints; Aug . pp. 416 428.

Ensuring Trust and Confidentiality for Adaptive Video Streaming in ICN; Dec . pp. 539 547.

Decentralized Gene Regulatory Networks: An Approach to Energy Efficient Node Coordination with Delay Constraints for Wireless Sensor Systems; Dec . pp. 548 557.

MaxPass: Credit Based Multipath Transmission for Load Balancing in Data Centers; Dec . pp. 558 568.

Traffic Profile and Machine Learning Based Regional Data Center Design and Operation for 5G Network; Dec . pp. 569 58 3

SPECIAL ISSUE ON AGE OF INF ORMATION (Special

Sampling for Data Freshness Optimization: Non linear Age Functions; June 19, pp. 204 219.

When to Preempt? Age of Information Minimization under Link Capacity Constraint; June 19, pp. 220 232.

Minimizing Age of Information with S oft Updates; June 19, pp. 233 243.

Age of Information Performance of Multiaccess Strategies with Packet Management; June 19, pp. 244 255.

Age of Information in Multihop Multicast Networks; June 19, pp. 256 267.

Fundamental Bounds on the Age of Information in Multi Hop Global Status Update Networks; June 19, pp. 268 279.

Optimal Status Updating with a Finite Battery Energy Harvesting Source; June 19, pp. 280 294.

Age of Information of Two way Data Exchanging System w ith Power Splitting; June 19, pp. 295 306.

SPECIAL ISSUE ON IOT (INTERNET OF THINGS) SECURITY AND PRIVACY (Special Issue)

On the Security Aspects of Internet of Things: A Systematic Literature Review; Oct . pp. 444 457.

Sentinel Based Malicious Relay Detection in Wireless IoT Networks; Oct 19, pp. 458 468.

Security Cooperation Model Based on Topology Control and Time Synchronization for Wireless Sensor Networks; Oct . pp. 469 480.

UAV-enabled Friendly Jamming Scheme to Secure Industrial Internet of Things; Oct . pp. 481 490.

BUAV: A B lockchain Based Secure UAV Assisted Data Acquisition Scheme in Internet of Thing; Oct . pp. 491 502.

An Intelligent Agriculture Network Security System Based on Private Blockchains; Oct . pp. 503 508.

“Worth One Minute”: an anonymous rewarding platfo rm for crowd sensing systems; Oct . pp. 509 520.