sensors-logo

Journal Browser

Journal Browser

Radio Mobile Communication System

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: closed (28 May 2021) | Viewed by 22744

Special Issue Editor

Centre Tecnológic de Telecomunicacions de Catalunya, Castelldefels, Spain
Interests: sustainable networking and computing; multi-agent systems; decision making processes; distributed optimization and optimal control; machine learning; data mining and analytics

Special Issue Information

Future mobile networks (5G and beyond) are expected to lead to a big revolution, enabling ubiquitous and enhanced broadband services, smart/autonomous vehicles, intelligent transport, and complex human–machine interactions (e.g., extended reality), as well as the Internet of Things (IoT), which will lay the foundations of future smart cities, Industry 4.0 and e-health environments, and allow a massive number of machine-type devices to connect to the network edge.

Planning, developing and managing such a complex and massive system of devices is a hard task, and machine learning (ML) is emerging as the technology of choice. Indeed, ML techniques can achieve outstanding performances for wireless communication applications thanks to their online learning and optimization capabilities. ML methods  decrease the complexity of algorithm computations, enabled by data learning and interactions with the environment. Hence, they accelerate the convergence in finding sub-optimal solutions compared to conventional optimization techniques.

This Special Issue is addressed to all the types of ML-based algorithms enabling intelligent mobile network management and optimization.

Dr. Paolo Dini
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (9 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review, Other

12 pages, 1872 KiB  
Article
Efficient Authentication Protocol and Its Application in Resonant Inductive Coupling Wireless Power Transfer Systems
by Emmanuel Ahene, Mark Ofori-Oduro, Frimpong Twum, Joojo Walker and Yaw Marfo Missah
Sensors 2021, 21(24), 8245; https://doi.org/10.3390/s21248245 - 09 Dec 2021
Viewed by 2036
Abstract
Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power transfer systems. Wireless power transfer (WPT) via resonant inductive coupling mechanism [...] Read more.
Chaos theory and its extension into cryptography has generated significant applications in industrial mixing, pulse width modulation and in electric compaction. Likewise, it has merited applications in authentication mechanisms for wireless power transfer systems. Wireless power transfer (WPT) via resonant inductive coupling mechanism enables the charging of electronic devices devoid of cords and wires. In practice, the key to certified charging requires the use of an authentication protocol between a transmitter (charger) and receiver (smartphone/some device). Via the protocol, a safe level and appropriate charging power can be harvested from a charger. Devoid of an efficient authentication protocol, a malicious charger may fry the circuit board of a receiver or cause a permanent damage to the device. In this regard, we first propose a chaos-based key exchange authentication protocol and analyze its robustness in terms of security and computational performance. Secondly, we theoretically demonstrate how the protocol can be applied to WPT systems for the purposes of charger to receiver authentication. Finally, we present insightful research problems that are relevant for future research in this paradigm. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

36 pages, 546 KiB  
Article
Predicting Popularity of Video Streaming Services with Representation Learning: A Survey and a Real-World Case Study
by Sidney Loyola de Sá, Antonio A. de A. Rocha and Aline Paes
Sensors 2021, 21(21), 7328; https://0-doi-org.brum.beds.ac.uk/10.3390/s21217328 - 03 Nov 2021
Cited by 5 | Viewed by 2554
Abstract
The Internet’s popularization has increased the amount of content produced and consumed on the web. To take advantage of this new market, major content producers such as Netflix and Amazon Prime have emerged, focusing on video streaming services. However, despite the large number [...] Read more.
The Internet’s popularization has increased the amount of content produced and consumed on the web. To take advantage of this new market, major content producers such as Netflix and Amazon Prime have emerged, focusing on video streaming services. However, despite the large number and diversity of videos made available by these content providers, few of them attract the attention of most users. For example, in the data explored in this article, only 6% of the most popular videos account for 85% of total views. Finding out in advance which videos will be popular is not trivial, especially given many influencing variables. Nevertheless, a tool with this ability would be of great value to help dimension network infrastructure and properly recommend new content to users. In this way, this manuscript examines the machine learning-based approaches that have been proposed to solve the prediction of web content popularity. To this end, we first survey the literature and elaborate a taxonomy that classifies models according to predictive features and describes state-of-the-art features and techniques used to solve this task. While analyzing previous works, we saw an opportunity to use textual features for video prediction. Thus, additionally, we propose a case study that combines features acquired through attribute engineering and word embedding to predict the popularity of a video. The first approach is based on predictive attributes defined by resource engineering. The second takes advantage of word embeddings from video descriptions and titles. We experimented with the proposed techniques in a set of videos from GloboPlay, the largest provider of video streaming services in Latin America. A combination of engineering features and embeddings using the Random Forest algorithm achieved the best result, with an accuracy of 87%. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

20 pages, 11112 KiB  
Article
Development and Validation of a Railway Safety System for Nordic Trains in Isolated Territories of Northern Quebec Based on IEEE 802.15.4 Protocol
by Laurent Ferrier, Hussein Ibrahim, Mohamad Issa and Adrian Ilinca
Sensors 2021, 21(18), 6129; https://0-doi-org.brum.beds.ac.uk/10.3390/s21186129 - 13 Sep 2021
Cited by 1 | Viewed by 2154
Abstract
Connected objects are deployed all over the world. Thus, they are contributing to improving communications. In urban areas, technological challenges are gradually being overcome, and advances in this area are exponential. Unfortunately, isolated territories such as northern Quebec do not beneficiate from this [...] Read more.
Connected objects are deployed all over the world. Thus, they are contributing to improving communications. In urban areas, technological challenges are gradually being overcome, and advances in this area are exponential. Unfortunately, isolated territories such as northern Quebec do not beneficiate from this technological progress. Yet, northern Quebec relies on abundant natural resources, with notably its huge hydroelectric dams and iron mines, and therefore, the region’s economic life revolves essentially around the exploitation of these resources and is heavily reliant on rail transportation. However, according to Transport Canada, 1246 railroad accidents were reported in 2019 to the Transportation Safety Board (TSB). Thirty-eight people described as trespassers lost their lives, and five railroad employees were fatally injured. In this context, we present the implementation of a security system in an isolated environment for employees intervening on the railroad track to warn them of the imminent arrival of a train. Due to the context of the isolated environment, i.e., without an electrical network, without internet, and without an LTE network, a solution for employees has been developed using a Zigbee telecommunication system and a connected watch. A case study on a train operating in a remote and isolated area in northern Quebec is presented to validate the performance of the proposed system based on an open-source and customizable solution. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

12 pages, 1334 KiB  
Communication
Dual Dynamic Scheduling for Hierarchical QoS in Uplink-NOMA: A Reinforcement Learning Approach
by Xiangjun Li, Qimei Cui, Jinli Zhai and Xueqing Huang
Sensors 2021, 21(13), 4404; https://0-doi-org.brum.beds.ac.uk/10.3390/s21134404 - 27 Jun 2021
Cited by 2 | Viewed by 1904
Abstract
The demand for bandwidth-intensive and delay-sensitive services is surging daily with the development of 5G technology, resulting in fierce competition for scarce radio resources. Power domain Nonorthogonal Multiple Access (NOMA) technologies can dramatically improve system capacity and spectrum efficiency. Unlike existing NOMA scheduling [...] Read more.
The demand for bandwidth-intensive and delay-sensitive services is surging daily with the development of 5G technology, resulting in fierce competition for scarce radio resources. Power domain Nonorthogonal Multiple Access (NOMA) technologies can dramatically improve system capacity and spectrum efficiency. Unlike existing NOMA scheduling that mainly focuses on fairness, this paper proposes a power control solution for uplink hybrid OMA and PD-NOMA in dual dynamic environments: dynamic and imperfect channel information together with the random user-specific hierarchical quality of service (QoS). This paper models the power control problem as a nonconvex stochastic, which aims to maximize system energy efficiency while guaranteeing hierarchical user QoS requirements. Then, the problem is formulated as a partially observable Markov decision process (POMDP). Owing to the difficulty of modeling time-varying scenes, the urgency of fast convergency, the adaptability in a dynamic environment, and the continuity of the variables, a Deep Reinforcement Learning (DRL)-based method is proposed. This paper also transforms the hierarchical QoS constraint under the NOMA serial interference cancellation (SIC) scene to fit DRL. The simulation results verify the effectiveness and robustness of the proposed algorithm under a dual uncertain environment. As compared with the baseline Particle Swarm Optimization algorithm (PSO), the proposed DRL-based method has demonstrated satisfying performance. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

14 pages, 1649 KiB  
Communication
Performance Analysis of Two-Way Satellite-Terrestrial Relay Network with SWIPT
by Zhen Li, Mingchuan Yang and Gang Wang
Sensors 2021, 21(13), 4303; https://0-doi-org.brum.beds.ac.uk/10.3390/s21134303 - 23 Jun 2021
Cited by 2 | Viewed by 1601
Abstract
In this paper, we investigated the performance of a two-way satellite-terrestrial DF relay network with asymmetric simultaneous wireless information and power transfer (SWIPT). In particular, selective physical-layer network coding (SPNC) was employed in the proposed network, improving the throughput performance. We derived the [...] Read more.
In this paper, we investigated the performance of a two-way satellite-terrestrial DF relay network with asymmetric simultaneous wireless information and power transfer (SWIPT). In particular, selective physical-layer network coding (SPNC) was employed in the proposed network, improving the throughput performance. We derived the expressions of system average end-to-end throughput and single node detection (SND) occurrence probability. Furthermore, to observe the effects of the power splitting (PS) coefficient on the energy efficiency performance, the expressions of energy harvested in the physical-layer network coding (PNC) and SPNC protocol were also derived. Finally, theoretical analyses and Monte Carlo simulation results are presented to show: (i) SPNC protocol outperforms the conventional PNC protocol in the two-way satellite-terrestrial relay network with SWIPT in infrequent light shadowing (ILS), average shadowing (AS), and frequent heavy shadowing (FHS) Shadowed-Rician fading channels; (ii) as the channel state gets worse, SPNC protocol can achieve more performance improvement than PNC protocol; (iii) as the PS coefficient increases, the average end-to-end throughput performance increases progressively, and the average energy efficiency performance increases progressively within a certain range, while decreasing in the others. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

16 pages, 1946 KiB  
Article
From Constellation Dithering to NOMA Multiple Access: Security in Wireless Systems
by Krystian Grzesiak and Zbigniew Piotrowski
Sensors 2021, 21(8), 2752; https://0-doi-org.brum.beds.ac.uk/10.3390/s21082752 - 13 Apr 2021
Cited by 3 | Viewed by 1799
Abstract
In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or [...] Read more.
In recent years, there has been a noticeable increase in interest in the possibilities of embedding additional data in the constellation of an already existing information signal in radio technology. This solution more precisely is based on adding a low power signal (or signals) to a stronger signal (cover). As will be described in the article, this technique is used in numerous radio communication areas, such as watermarking, covert channel creation, and multiple access techniques. Typically, those areas are considered as independent research topics. Our comparison suggests that these areas are closely related. In this article, a comprehensive survey of the implementation of signal superposition is conducted with an emphasis on the similarities and differences between individual solutions. Since the nature of the signal model entails certain problems in the security area, we provide the reader with a review of the state-of-the-art research on this topic, including the PLS (physical layer security) and LPD (low probability of detection) issues. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

22 pages, 571 KiB  
Article
Optimization-Based Resource Management Algorithms with Considerations of Client Satisfaction and High Availability in Elastic 5G Network Slices
by Chiu-Han Hsiao, Frank Yeong-Sung Lin, Evana Szu-Han Fang, Yu-Fang Chen, Yean-Fu Wen, Yennun Huang, Yang-Che Su, Ya-Syuan Wu and Hsin-Yi Kuo
Sensors 2021, 21(5), 1882; https://0-doi-org.brum.beds.ac.uk/10.3390/s21051882 - 08 Mar 2021
Cited by 1 | Viewed by 2413
Abstract
A combined edge and core cloud computing environment is a novel solution in 5G network slices. The clients’ high availability requirement is a challenge because it limits the possible admission control in front of the edge cloud. This work proposes an orchestrator with [...] Read more.
A combined edge and core cloud computing environment is a novel solution in 5G network slices. The clients’ high availability requirement is a challenge because it limits the possible admission control in front of the edge cloud. This work proposes an orchestrator with a mathematical programming model in a global viewpoint to solve resource management problems and satisfying the clients’ high availability requirements. The proposed Lagrangian relaxation-based approach is adopted to solve the problems at a near-optimal level for increasing the system revenue. A promising and straightforward resource management approach and several experimental cases are used to evaluate the efficiency and effectiveness. Preliminary results are presented as performance evaluations to verify the proposed approach’s suitability for edge and core cloud computing environments. The proposed orchestrator significantly enables the network slicing services and efficiently enhances the clients’ satisfaction of high availability. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

Review

Jump to: Research, Other

28 pages, 1252 KiB  
Review
A Survey of Rain Attenuation Prediction Models for Terrestrial Links—Current Research Challenges and State-of-the-Art
by Md Abdus Samad, Feyisa Debo Diba and Dong-You Choi
Sensors 2021, 21(4), 1207; https://0-doi-org.brum.beds.ac.uk/10.3390/s21041207 - 09 Feb 2021
Cited by 23 | Viewed by 4433
Abstract
Millimeter-wave (30–300 GHz) frequency is a promising candidate for 5G and beyond wireless networks, but atmospheric elements limit radio links at this frequency band. Rainfall is the significant atmospheric element that causes attenuation in the propagated wave, which needs to estimate for the [...] Read more.
Millimeter-wave (30–300 GHz) frequency is a promising candidate for 5G and beyond wireless networks, but atmospheric elements limit radio links at this frequency band. Rainfall is the significant atmospheric element that causes attenuation in the propagated wave, which needs to estimate for the proper operation of fade mitigation technique (FMT). Many models have been proposed in the literature to estimate rain attenuation. Various models have a distinct set of input parameters along with separate estimation mechanisms. This survey has garnered multiple techniques that can generate input dataset for the rain attenuation models. This study extensively investigates the existing terrestrial rain attenuation models. There is no survey of terrestrial rain mitigation models to the best of our knowledge. In this article, the requirements of this survey are first discussed, with various dataset developing techniques. The terrestrial links models are classified, and subsequently, qualitative and quantitative analyses among these terrestrial rain attenuation models are tabulated. Also, a set of error performance evaluation techniques is introduced. Moreover, there is a discussion of open research problems and challenges, especially the exigency for developing a rain attenuation model for the short-ranged link in the E-band for 5G and beyond networks. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

Other

Jump to: Research, Review

14 pages, 654 KiB  
Perspective
Location-Privacy Leakage and Integrated Solutions for 5G Cellular Networks and Beyond
by Stefano Tomasin, Marco Centenaro, Gonzalo Seco-Granados, Stefan Roth and Aydin Sezgin
Sensors 2021, 21(15), 5176; https://0-doi-org.brum.beds.ac.uk/10.3390/s21155176 - 30 Jul 2021
Cited by 9 | Viewed by 2798
Abstract
The fifth generation (5G) of cellular networks improves the precision of user localization and provides the means to disclose location information to over-the-top (OTT) service providers. The network data analytics function (NWDAF) can further elaborate this information at an aggregated level using artificial [...] Read more.
The fifth generation (5G) of cellular networks improves the precision of user localization and provides the means to disclose location information to over-the-top (OTT) service providers. The network data analytics function (NWDAF) can further elaborate this information at an aggregated level using artificial intelligence techniques. These powerful features may lead to the improper use of user location information by mobile network operators (MNOs) and OTT service providers. Moreover, vulnerabilities at various layers may also leak user location information to eavesdroppers. Hence, the privacy of users is likely at risk, as location is part of their sensitive data. In this paper, we first go through the evolution of localization in cellular networks and investigate their effects on location privacy. Then, we propose a location-privacy-preserving integrated solution comprising virtual private mobile networks, an independent authentication and billing authority, and functions to protect wireless signals against location information leakage. Moreover, we advocate the continuous and detailed control of localization services by the user. Full article
(This article belongs to the Special Issue Radio Mobile Communication System)
Show Figures

Figure 1

Back to TopTop