The Value Strength Aided Information Diffusion in Socially-Aware Mobile Networks

 

Socially-aware mobile networks have become ubiquitous in our daily life, which create the phenomenon of the socially aware mobile big data. Due to the movement of mobile entities, traditional transmission mechanisms are not conducive to the spreading of information. Thus, how to improve the information diffusion performances in socially aware mobile networks has become a hot research topic. However, most of the existing works focus their attention on the information-spreading dynamics rather than on the network structure and nodes’ social attributes. In this paper, we proposed the concept of the value strength, social strength as well as a time-varying graph (TVG)-based mobility model from the perspective of the network science, based on which a forwarding nodes’ selection scheme was presented. It is beneficial in terms of improving the propagation efficiency and information coverage ratio of mobile networks. Furthermore, sufficient experiments were conducted to verify the diffusion performances both over a range of complex network topologies, such as the Watts–Strogatz small-world network, the Barabási–Albert scale-free network, the real-world Flickr network, and over a TVG-based mobile network. Indeed, the definition of the value/social strength plays a critical role in selecting forwarding links and nodes both for static-topology networks as well as for socially aware mobile networks.

View this article on IEEE Xplore

How Many Wi-Fi APs Does it Take to Light a Lightbulb?

 

The global move toward wireless access point (AP) densification has alluded toward the possibility of harvesting the unused ambient RF energy, especially in the 2.4-GHz unlicensed band, in order to power useful electronic devices, which collectively make up the so-called low energy Internet of Things (LE-IoT). Despite the huge market demand for free ambient energy and the research community’s efforts in prototyping efficient rectifiers, there is, however, little knowledge about the available power densities in dense indoor and outdoor AP deployments. Obtaining this information is, therefore, vital for engineering the power requirements of LE-IoT devices and managing expectations for their subsequent commercialization. In this paper, we present power density measurements in a controlled indoor ultra-dense deployment corresponding to approximately one AP per square meter. We detail our methodology and hardware and offer a variety of ambient RF measurement results suggesting that Wi-Fi AP densification cannot solely power personal devices such as wearables, but at best can trickle charge them in the hopes of extending battery life, the main hurdle being the small form factor of such mobile devices. In contrast, our measurements suggest that household devices, such as smoke detectors, can be powered by ambient RF harvesting. To this end, AP densification aids in increasing the total available power density, but also in distributing a smooth blanket of available RF energy thus minimizing harvesting-holes.

View this article on IEEE Xplore

Emerging Trends, Issues, and Challenges in Energy-Efficient Cloud Computing

Submission Deadline: 31 May 2017

IEEE Access invites manuscript submissions in the area of Emerging Trends, Issues, and Challenges in Energy-Efficient Cloud Computing.

Cloud computing is an economical computing paradigm, and has gained much popularity in the industry for its ability to scale computing resources on demand and provide a simple pay-as-you-go business model for customers. Leveraging the cloud to maintain or scale up business will be the norm for customers and enterprises while cutting down on the budget. However, the energy consumption is one of the biggest problems on current cloud computing for further evolution.

Due to the explosive increase of energy consumption, it is essential for governmental and industrial institutions to address this problem. Therefore, the development of energy-efficient cloud computing has recently become a hot issue in cloud computing area. The advancement of energy-efficient cloud computing relies on development of several key technologies. At the platform level, we expect some more energy-efficient mediums can be used in cloud computing. At the hypervisor level, we expect energy-efficient scheduling algorithms, memory systems, storage systems, resources management policies, etc. At the virtual machine level, we expect energy-efficient scheduling, communications, and applications.

Moreover, with the market of mobile phone growing at a very high speed, the mobile cloud computing has been introduced to be a potential technology for mobile services. In order to overcome the most obstacles related to the battery life, mobile cloud computing integrates the cloud computing into mobile environment. Therefore, the energy-efficient mobile cloud computing will have challenges, involving research in green networking and wireless communications, cloud-based mobile applications, limited resources management, and others.

Research communities for energy-efficient cloud computing and mobile cloud computing have recognized the need during the past few years. However, many challenges remain unaddressed. This Special Section in IEEE Access aims to encourage high-quality research in energy-efficient cloud computing, and push the theoretical and practical boundary forward for a deeper understanding in fundamental algorithms, modelling, and analysis techniques from academics and industry viewpoints. Authors from both academia and industry are invited to submit articles presenting new research related to the theory or practice of energy-efficient cloud computing, including algorithms, modelling, technologies and applications. The topics suggested can be discussed in terms of concepts, the state of the art, standards, implementations and evaluation, and running experiments and/or applications.

Topics of interest include, but are not limited to the following:

  • Energy-efficient memory systems for cloud computing
  • Energy-efficient storage systems for cloud computing
  • Theory and modeling for energy-efficient scheduling
  • Energy-efficient resource management
  • New energy-efficient storage medium
  • Green data center
  • Green networking technologies for data center
  • Energy-efficient cloud computing benchmarks
  • Modeling and energy evaluation
  • Green mobile cloud computing
  • Cloud-based mobile networks and applications
  • Multimedia applications in mobile cloud environments
  • Architecture, strategies and/or algorithms for green networking
  • Protocols, scheduling, and/or designs for green networking
  • Security, privacy, and trust issues of green networking
  • Data storage, data centers and data offloading for green networking
  • Energy efficient hardware, devices and designs for cloud computing platform
  • New technologies and research trends

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Guangjie Han, Hohai University, China

Guest Editors:
1. Gangyong Jia, Hangzhou Dianzi University, China
2. Jaime Lloret, Univ. Politecnica de Valencia, Spain
3. Yuanguo Bi, University of Waterloo, Canada

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)

Security Analytics and Intelligence for Cyber Physical Systems

Submission Deadline: 31 December 2017

IEEE Access invites manuscript submissions in the area of Security Analytics and Intelligence for Cyber Physical Systems.

Cyber security has gained significant attention worldwide due to the emergence of high profile cyber attacks. Cyber Physical Systems (CPS), by definition, are smart systems that include both physical and computational components which seamlessly integrate and closely interact in order to sense the constantly changing states of the real world. These systems are present at the core of the modern society. CPS are endangered to disastrous consequences in case of a failure. Applications of CPS include multiple sectors such as smart transportation, smart electric grids, smart medical technologies and air traffic control.

Cyber attackers cause harm to these infrastructures from multiple directions, such that their identity remains hidden. Due to latest advancements such as sophisticated threat matrices, industrial network automation, lack of knowledge about threat patterns, big data management and privacy, the upcoming attacks and threats have made these CPS highly insecure. As these infrastructures are heavily connected, this as a result makes the attack more sophisticated and targeted. In addition, such attacks can easily be triggered with minimum human involvement from remote locations, thus making the infrastructure more vulnerable to cyber attacks.

The volume of digital information is rapidly increasing for CPS. Large-scale data centers, used for CPS protection and monitoring are also vulnerable to malicious user behaviors, such as cyber attacks, compromise of credentials or unforeseen behavioral patterns. There is a need for deploying such security solutions that follow a defense-in-depth mechanism.

Security analytics and intelligence can play an important role in this regard. It works mainly by collecting enormous amounts of data and uses it for creating threat patterns, such that preventive measures could be taken in a timely manner. Proper analysis provides an in-depth knowledge about the root cause for an identified vulnerability or threat.

The goal of this Special Section in IEEE Access is to collect highly relevant and outstanding research articles that are able to provide solutions for securing CPS, keeping security analytics and intelligence as a base. This Special Section will benefit the research domain and the industry as a result. Topics of interest include, but are not limited to the following:

  • Big Data Analytics for Smart Grids Security
  • Security Analytics for ICS/SCADA Systems
  • New attack patterns and behavior analysis for CPS security
  • Detection and analysis for malwares in CPS
  • In-stream data analytics for CPS network monitoring
  • Big data analysis for CPS data storage
  • CPS data streams visualization and analysis
  • Collaborative intrusion detection and multiple agents monitoring for CPS security
  • CPS related big data policies and standards
  • Log analytics for CPS
  • Vulnerability analysis for CPS
  • Big data privacy protection for CPS
  • Security analysis of intrusion prevention systems for CPS
  • CPS network forensics
  • Intrusion detection systems analytics
  • Security modeling and threat of CPS data management
  • Cyber security multi-stream analysis for CPS correlations
  • Security data collection and protection technologies
  • Trustworthy data process, aggregation and analytics for CPS security

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Haider Abbas, National University of Sciences and Technology (NUST), Pakistan

Guest Editors:
1. Hiroki Suguri, Miyagi University, Japan
2. Zheng Yan, Aalto University, Finland; Xidian University, China
3. William Allen, Florida Institute of Technology, USA
4.  Xiali (Sharon) Hei, Delaware State University, United States

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)

Recent Developments in Consensus Problems for Complex Networked Systems

Submission Deadline: 1 March 2017

IEEE Access invites manuscript submissions in the area of Recent Developments in Consensus Problems for Complex Networked Systems.

During the last few years, consensus problems for complex networked systems composed of interconnected interacting agents have found an ever-increasing number of applications in various areas, such as swarm dynamics, smart grids, sensor networks, intelligent transportation systems, unmanned aerial vehicles, tele-robotics and military. The design of consensus protocols takes advantage of nearest neighbour interaction rules, which renders a framework of distributed multi-agent systems so that the group of dynamic agents can reach an agreement or consensus on certain desired cooperative tasks. The growing complexity of the communication topology and agents’ dynamics along with the great demands on system performance brings numerous challenges including consensus under switching topologies, interdependent networks, time-varying transmission delays, parameter variations, uncertainties, nonlinearities, etc. Moreover, deep links between network science and control theory have been gradually revealed within the last couple of years, which shed light into the consensus problem and make it a promising direction.

This Special Section in IEEE Access aims to bring together researchers and practitioners in the broad field of complex networks and systems, and provide a timely discussion on the recent advances and challenges of consensus problems in complex networked systems.

Topics of interested include, but are not limited to the following:
● Mathematical modeling and analysis of consensus processes
● Synchronization of complex networks
● Consensus seeking in multi-agent systems
● Controllability and observability of complex networks
● Distributed computation and distributed estimation
● Coordination in networked systems
● Formation control problems
● Robustness to changes in network topology and dynamics
● Consensus problems in networked dynamical systems
● Analysis of consensus algorithms
● Consensus related problems in engineering, biological, economic and social sciences

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Yilun Shang, Tongji University, China

Guest Editors:
1. Dequan Li, Anhui University of Science and Technology, China
2. Zhaoxia Peng, Beihang University, China
3. Ali Heydari, Southern Methodist University, USA
4. Kamran Turkoglu, San Jose State University, USA
5. Johan Thunberg, University of Luxembourg, Luxembourg

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)

Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security

Submission Deadline: 15 March 2017

IEEE Access invites manuscript submissions in the area of Exploiting the Benefits of Interference in Wireless Networks: Energy Harvesting and Security.

Interference used to be viewed as a harmful factor in wireless networks, which can reduce the quality of information transmission. To combat against interference, many interference management techniques have emerged. Due to the latest research advances, interference (or noise) can also be exploited to offer some benefits to wireless networks. The first aspect is that interference in multi-user networks can be collected as a green power supply for the transceivers, known as wireless energy harvesting. Another application is that we can generate artificial noise to disrupt the adversarial eavesdropping, and guarantee the security of wireless networks. Therefore, conventional interference management techniques can be combined with these recent research advances to gain some additional benefits while guaranteeing information transmission. Despite the development of interference exploitation, some fundamental problems are still open and require immediate studies, such as:

  • How can we achieve much higher efficiency of interference energy harvesting to support practical utilization?
  • How can we utilize artificial interference or noise to prevent eavesdropping while the QoS of legitimate transmission can be guaranteed or improved?
  • Can we leverage interference to enhance the transmission performance of wireless networks?
  • Are there any new applications for interference to benefit wireless networks?

This Special Section in IEEE Access will bring together leading researchers and developers from both industry and academia to discuss and present their views on all the aspects of interference in wireless networks. Topics of this Special Section include but are not limited to the following:

  • Interference alignment based wireless networks
  • Wireless energy harvesting in interference networks
  • Simultaneous wireless information and power transfer in interference alignment based networks
  • QoS provisioning and resource management in wireless networks with energy harvesting
  • Interference-oriented energy harvesting in cognitive radio networks
  • Artificial noise based physical layer security
  • Wireless security in interference alignment based networks
  • Wireless energy harvesting of adversarial jamming signal
  • Secure energy harvesting in interference environments
  • Energy efficiency of the Secure energy harvesting of interference
  • Signal processing for the secure energy harvesting of interference
  • New kinds of interference-oriented wireless networks

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Nan Zhao, Dalian University of Technology, China

Guest Editors:
1. F. Richard Yu, Carleton University, Canada
2. Hui-Ming Wang, Xi’an Jiaotong University, China
3. Trung Q. Duong, Queen’s University Belfast, UK
4. Zheng Chang, University of Jyvaskyla, Finland

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)

Security and Privacy in Applications and Services for Future Internet of Things

Submission Deadline: 10 March 2017

IEEE Access invites manuscript submissions in the area of Security and Privacy in Applications and Services for Future Internet of Things.

The Internet of Things (IoT) has emerged as an important field of future network research. Different from its predecessors (traditional Internet, mobile Internet, sensor network, etc.), IoT mainly focuses on more ubiquitous service patterns, universal accesses for people, things, devices, processes, etc., and heterogeneous network architectures. Driven by potentially great market and profit, future innovations on application and services for IoT will be motivated and deployed quickly. However, it will also expose new areas of vulnerability in system security and bring more challenging issues of privacy and trustworthiness. Society has shown tremendous concerns in these problems.

Investigating from the applications and services perspectives is very timely and important for security and privacy considerations of the future IoT. These perspectives can be further classified into three dimensions. Firstly, based on the evolution principles of network architectures, unilaterally enhancing one kind of performance property may trigger more problems in other aspects. Novel paradigms that can systematically support trustworthiness without affecting mobility, scalability, controllability, etc., are needed. Secondly, progress in application design has led experienced developers to introduce more efficient and agile software tools into IoT. Frequent updates in applications not only provide strong capacity to defend against old malicious approaches, but also provoke hackers to find better solutions to attack. Thirdly, due to the complexity of service requirements, providers have to integrate and merge some existing “atom elements” to achieve high quality services for people, things and other entities. From small atom elements to entire service package, fine-grained checking should be executed to reduce individual and hybrid risks in security and privacy.

In this Special Section in IEEE Access, we invite researchers who are working on related research issues to contribute high quality papers that further advance the technical community’s understanding in Security and Privacy of Applications and Services for the Future Internet of Things. We welcome both original practical work and overview papers.

Topics of interest include, but are not limited to:

  • Security and privacy enhancement for future IoT applications
  • Architectures and services of trustworthy guaranteed IoT
  • Intrusion detection and prevention
  • Vulnerability assessment methodology
  • Cyber-physical security in future IoT
  • Future data privacy protection
  • Reliability for IoT deployment
  • Trustworthiness evaluation of future IoT
  • IoT-oriented dependability analysis
  • Vehicle network security and privacy
  • Security for mobile cloud computing in IoT
  • Privacy protection of big data in future IoT scenario
  • Other related latest and emerging topics

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Victor Leung, The University of British Columbia, Canada

Guest Editors:
1. Ilsun You, Soonchunhyang University, South Korea
2. Joonsang Baek, Khalifa University of Science, Technology and Research (KUSTAR), United Arab Emirates
3. Carol Fung, Virginia Commonwealth University, USA

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)

Curbing Crowdturfing in Online Social Networks

Submission Deadline: 31 May 2017

IEEE Access invites manuscript submissions in the area of Curbing Crowdturfing in Online Social Networks.

Online social media is reshaping the way businesses manage their sales and marketing assets. Unlike traditional media, such as TV, radio or newspapers, social media is characterized by user contributions, sharing, decentralization, and being free. In addition to gaining phenomenal popularity as the Web becomes accessible via all sorts of devices, they also have a strong influence on brands, making social media a force that many organizations can no longer ignore.

Public relations companies have hired people to post product comments on different online communities and social networks, without even consuming the services or products. While online paid posters can be used as an efficient e-marketing strategy, they can also act maliciously by spreading gossip or negative information about competitors. More specifically, a group of paid posters could operate with well-coordinated attacks, and generate a desired result of positive or negative opinions, to attract attention or trigger curiosity. This is known as “crowdturfing” or “cyber-gossips”, which can mislead online users, and put the individuals or a business in a compromising position or at serious risk.

The goal of this Special Section in IEEE Access is to solicit the latest theoretical and research application output for curbing crowdturfing. We also welcome survey or tutorial style articles with clear application background. This Special Section will focus on the following topics, and but are not limited to:

(1) Content Based Methods: Opinion Modeling and Spread Analysis

  • Agent-based data retrieval
  • Complex sequence analysis
  • Content and Opinion analysis
  • Temporal-sequential pattern mining
  • Impact-oriented pattern mining
  • Event/activity/action filtering
  • Multi-granularity data visualization

(2) Behavior Based Methods: Behavior Modeling and Mining

  • Behavior structure extraction
  • Behavior life cycles
  • Sequential/Parallel/Distributed behavior modeling
  • Behavior dynamics
  • Cyber Criminal behavior analysis
  • Social networking behavior analysis

(3) Social Relation Based Methods: Cyber Analysis

  • Group and group behavior detection, tracking and recognition
  • Collusive crime/piracy detection
  • Graph-based behavior/social modeling
  • Dynamic/hidden group presentation
  • Collaborative social recommendation
  • Group interaction, collaboration, representation and profiling
  • Cyber-Gossip Spread Models

(4) Applications and Open Case Study

  • Poster spam detection
  • Blog spam detection
  • Click spam detection
  • Identity authentication
  • Botnets prevention
  • Datasets for cyber-gossips detection

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Dr. Gang Li, Deakin University, Australia

Guest Editors:
1. Prof. Jianlong Tan, Chinese Academy of Sciences, China
2. Prof. Lynn Batten, Deakin University, Australia
3. Prof. Sohail S. Chaudhry, Villanova University, USA

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)

Nano-antennas, Nano-transceivers, and Nano-networks / Communications

Submission Deadline: 20 February 2017

IEEE Access invites manuscript submissions in the area of Nano-antennas, Nano-transceivers, and Nano-networks / Communications.

Nanotechnology is enabling the development of devices on a scale ranging from one to a few hundred nanometers. At this scale, novel nanomaterials and nanoparticles show new properties and behaviors not observed at the microscopic level. In the future, networks of nano-devices will be a key component of almost every field of our society, with applications in biomedicine, environmental protection, entertainment, and homeland security, and beyond. In order to enable nano-devices to communicate with each other, many fundamental challenges need to be addressed. As the functional devices shrink into nano-scale, design, fabrication and control of the systems impose novel design principles, which greatly differ from that of the macro. Electromagnetic (EM) communication in the Terahertz (THz) band (0.1–10 THz) enabled by graphene-based plasmonic nano-transceivers and nano-antennas has been suggested as one of the possible approaches for communication among these devices. This special issue is dedicated to all aspects of nanoscale communication including transceiver and antenna design in addition to communication and networking solutions, as well as novel paradigm, e.g., Hybrid Molecular/EM communication systems.
Potential topics include, but are not limited to:

  • Nanomaterial- and metamaterial-based nano-antennas and nano-antenna arrays
  • Plasmonic and nanophotonic nano-transceiver design for THz communications
  • Channel modeling for THz communications, including free-space and body area propagation
  • Characterization of materials and human tissues at THz frequencies
  • Numerical and computational modelling techniques for THz electromagnetics
  • Experiments, implementation, and testbeds for nanoscale communication networks
  • Energy efficiency in nanoscale communication networks and Nano-computing paradigms
  • Novel applications of nano-sensor networks
  • Ultra-massive MIMO THz communications systems
  • Hybrid Molecular/EM communication
  • Security issues at the nano-scale

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Qammer Hussain Abbasi, Texas A & M University at Qatar, Qatar

Guest Editors:
1. Akram Alomainy, Queen Mary University of London, UK
2. Josep Miquel Jornet, University at Buffalo, The State University of New York, USA
3. Chong Han, University of Michigan–Shanghai Jiao Tong University Joint Institute, Shanghai Jiao Tong University, Shanghai, China
4. Yifan Chen, Southern University of Science and Technology (SUSTech), Shenzhen, China

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)

Resource Management in Vehicular Ad-Hoc Networks: Energy Management, Communication Protocol and Future Applications

Submission Deadline: 31 January 2017

IEEE Access invites manuscript submissions in the area of Resource Management in Vehicular Ad-Hoc Networks: Energy Management, Communication Protocol and Future Applications.

Vehicular Ad-hoc Network (VANET) is a wireless communications technology which holds the characteristics of Ad-Hoc Networks. However, due to the impact of dynamic road conditions, traffic flow theory concepts, mobility constraints, human interaction, and vehicular characteristics, VANETs exhibit different behavior. With the advancements and ongoing research in wireless communication, VANETs are integrated with different emerging technologies as well. The concept of VANET is implemented in every domain of life starting from intelligent transportation, safe and secures road journeys, smart and green technologies and business oriented services for societies. This attracts and arise different areas of interest for researchers to deal with the VANETs issues during its implementations and operations.

The goal of this Special Section in IEEE Access is to highlight and summarize the efforts and ongoing research work on the issue of resource management in VANETs. The issue will be covering the energy management, communication protocols and future applications of VANETs, focusing the key concepts of Internet of Vehicles, VANETs Clouds, VANETs based Smart Grid, Software Define Networking in VANETs and Unmanned Arial Vehicles integration with VANETs. This issue will provide the opportunity for research community across the globe to share their ideas on these newly emerging fields of VANETs.

The topics for this Special Section include:
Energy Management in VANETs:

  • Energy management in Internet of Vehicles (IOV) communication.
  • Renewable energy resources for VANETs cloud.
  • Energy management in electric vehicles recharging.
  • Managing energy resources in vehicles-to-home communications.
  • Energy issues in Software Define Networking for VANETs.

Communication Protocols in VANETs:

  • Multimedia communication in VANETs.
  • Energy aware routing protocols for VANETs.
  • Network coding for VANETs.
  • Communication protocols for IOVs.
  • Mac layer issues under vehicles-to-grid and vehicle-to-home applications.
  • Secure communication in VANETs.

Future Applications of VANETs:

  • VANET role towards Green environments.
  • Vehicular cyber physical system.
  • VANETs and Smart Grid.
  • Applications of vehicular Grid.

 

We also highly recommend the submission of multimedia with each article as it significantly increases the visibility, downloads, and citations of articles.

Associate Editor: Tariq Umer, COMSATS Institute of Information Technology, Pakistan

Guest Editors:
1. Mubashir Husain Rehmani, COMSATS Institute of Information Technology, Pakistan
2. Zhiguo Ding, Lancaster University, U.K
3. Byung-Seo Kim, Hongik University, Korea
4. Samee U. Khan, North Dakota State University, USA

 

IEEE Access Editor-in-Chief: Michael Pecht, Professor and Director, CALCE, University of Maryland

Paper submission: Contact Associate Editor and submit manuscript to:
http://ieee.atyponrex.com/journal/ieee-access

For inquiries regarding this Special Section, please contact: Bora M. Onat, Managing Editor, IEEE Access (Phone: (732) 562-6036, specialsections@ieee.org)