Next Issue
Volume 12, October
Previous Issue
Volume 12, June
 
 

J. Sens. Actuator Netw., Volume 12, Issue 4 (August 2023) – 15 articles

Cover Story (view full-size image): In a previous study, a low-cost real-time locating system (RTLS) based on ultra-wideband signals was tested both in the laboratory and in a real industrial environment in order to assess its performance and determine the best configuration, according to some selected KPIs. In this context, the evolution of the work is twofold. First, tests performed in the laboratory are refined and deepened in terms of (i) the arrangements and orientation of different anchors; (ii) an increased number of tested tags; (iii) the battery capacity test of the tags. Second, a case is developed for hosting tags to be positioned on the tracked asset, in line with the industrial context requirements. Finally, an economic analysis is performed to demonstrate the convenience of the investment and the feasibility of the solution. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Section
Select all
Export citation of selected articles as:
16 pages, 5717 KiB  
Article
Remote Binaural System (RBS) for Noise Acoustic Monitoring
by Oscar Acosta, Luis Hermida, Marcelo Herrera, Carlos Montenegro, Elvis Gaona, Mateo Bejarano, Kevin Gordillo, Ignacio Pavón and Cesar Asensio
J. Sens. Actuator Netw. 2023, 12(4), 63; https://doi.org/10.3390/jsan12040063 - 14 Aug 2023
Cited by 1 | Viewed by 2783
Abstract
The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level [...] Read more.
The recent emergence of advanced information technologies such as cloud computing, artificial intelligence, and data science has improved and optimized various processes in acoustics with potential real-world applications. Noise monitoring tasks on large terrains can be captured using an array of sound level meters. However, current monitoring systems only rely on the knowledge of a singular measured value related to the acoustic energy of the captured signal, leaving aside spatial aspects that complement the perception of noise by the human being. This project presents a system that performs binaural measurements according to subjective human perception. The acoustic characterization in an anechoic chamber is presented, as well as acoustic indicators obtained in the field initially for a short period of time. The main contribution of this work is the construction of a binaural prototype that resembles the human head and which transmits and processes acoustical data on the cloud. The above allows noise level monitoring via binaural hearing rather than a singular capturing device. Likewise, it can be highlighted that the system allows for obtaining spatial acoustic indicators based on the interaural cross-correlation function (IACF), as well as detecting the location of the source on the azimuthal plane. Full article
Show Figures

Figure 1

23 pages, 3763 KiB  
Article
Extraction of Hidden Authentication Factors from Possessive Information
by Nilobon Nanglae, Bello Musa Yakubu and Pattarasinee Bhattarakosol
J. Sens. Actuator Netw. 2023, 12(4), 62; https://doi.org/10.3390/jsan12040062 - 11 Aug 2023
Viewed by 2030
Abstract
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones [...] Read more.
Smartphones have emerged as a ubiquitous personal gadget that serve as a repository for individuals’ significant personal data. Consequently, both physiological and behavioral traits, which are classified as biometric technologies, are used in authentication systems in order to safeguard data saved on smartphones from unauthorized access. Numerous authentication techniques have been developed; however, several authentication variables exhibit instability in the face of external influences or physical impairments. The potential failure of the authentication system might be attributed to several unpredictable circumstances. This research suggests that the use of distinctive and consistent elements over an individual’s lifespan may be employed to develop an authentication classification model. This model would be based on prevalent personal behavioral biometrics and could be readily implemented in security authentication systems. The biological biometrics acquired from an individual’s typing abilities during data entry include their name, surname, email, and phone number. Therefore, it is possible to establish and use a biometrics-based security system that can be sustained and employed during an individual’s lifetime without the explicit dependance on the functionality of the smartphone devices. The experimental findings demonstrate that the use of a mobile touchscreen as the foundation for the proposed verification mechanism has promise as a high-precision authentication solution. Full article
(This article belongs to the Special Issue Advances in Security of Cyber-Physical Systems)
Show Figures

Figure 1

43 pages, 13660 KiB  
Article
An Investigation of the Effectiveness of Deepfake Models and Tools
by Md. Saddam Hossain Mukta, Jubaer Ahmad, Mohaimenul Azam Khan Raiaan, Salekul Islam, Sami Azam, Mohammed Eunus Ali and Mirjam Jonkman
J. Sens. Actuator Netw. 2023, 12(4), 61; https://doi.org/10.3390/jsan12040061 - 4 Aug 2023
Cited by 10 | Viewed by 13521
Abstract
With the development of computer vision and deep learning technologies, rapidly expanding approaches have been introduced that allow anyone to create videos and pictures that are both phony and incredibly lifelike. The term deepfake methodology is used to describe such technologies. Face alteration [...] Read more.
With the development of computer vision and deep learning technologies, rapidly expanding approaches have been introduced that allow anyone to create videos and pictures that are both phony and incredibly lifelike. The term deepfake methodology is used to describe such technologies. Face alteration can be performed both in videos and pictures with extreme realism using deepfake innovation. Deepfake recordings, the majority of them targeting politicians or celebrity personalities, have been widely disseminated online. On the other hand, different strategies have been outlined in the research to combat the issues brought up by deepfake. In this paper, we carry out a review by analyzing and comparing (1) the notable research contributions in the field of deepfake models and (2) widely used deepfake tools. We have also built two separate taxonomies for deepfake models and tools. These models and tools are also compared in terms of underlying algorithms, datasets they have used and their accuracy. A number of challenges and open issues have also been identified. Full article
Show Figures

Figure 1

25 pages, 1365 KiB  
Article
Performance Assessment and Mitigation of Timing Covert Channels over the IEEE 802.15.4
by Ricardo Severino, João Rodrigues, João Alves and Luis Lino Ferreira
J. Sens. Actuator Netw. 2023, 12(4), 60; https://doi.org/10.3390/jsan12040060 - 1 Aug 2023
Cited by 3 | Viewed by 1620
Abstract
The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices increases annually, they still present severe [...] Read more.
The fast development and adoption of IoT technologies has been enabling their application into increasingly sensitive domains, such as Medical and Industrial IoT, in which safety and cyber-security are paramount. While the number of deployed IoT devices increases annually, they still present severe cyber-security vulnerabilities, becoming potential targets and entry points for further attacks. As these nodes become compromised, attackers aim to set up stealthy communication behaviours, to exfiltrate data or to orchestrate nodes in a cloaked fashion, and network timing covert channels are increasingly being used with such malicious intents. The IEEE 802.15.4 is one of the most pervasive protocols in IoT and a fundamental part of many communication infrastructures. Despite this fact, the possibility of setting up such covert communication techniques on this medium has received very little attention. We aim to analyse the performance and feasibility of such covert-channel implementations upon the IEEE 802.15.4 protocol, particularly upon the DSME behaviour, one of the most promising for large-scale time critical communications. This enables us to better understand the involved risk of such threats and help support the development of active cyber-security mechanisms to mitigate these threats, which, for now, we provide in the form of practical network setup recommendations. Full article
Show Figures

Figure 1

20 pages, 585 KiB  
Article
Safe Data-Driven Lane Change Decision Using Machine Learning in Vehicular Networks
by Rola Naja
J. Sens. Actuator Netw. 2023, 12(4), 59; https://doi.org/10.3390/jsan12040059 - 1 Aug 2023
Cited by 1 | Viewed by 2358
Abstract
This research proposes a unique platform for lane change assistance for generating data-driven lane change (LC) decisions in vehicular networks. The goal is to reduce the frequency of emergency braking, the rate of vehicle collisions, and the amount of time spent in risky [...] Read more.
This research proposes a unique platform for lane change assistance for generating data-driven lane change (LC) decisions in vehicular networks. The goal is to reduce the frequency of emergency braking, the rate of vehicle collisions, and the amount of time spent in risky lanes. In order to analyze and mine the massive amounts of data, our platform uses effective Machine Learning (ML) techniques to forecast collisions and advise the driver to safely change lanes. From the unprocessed large data generated by the car sensors, kinematic information is retrieved, cleaned, and evaluated. Machine learning algorithms analyze this kinematic data and provide an action: either stay in lane or change lanes to the left or right. The model is trained using the ML techniques K-Nearest Neighbor, Artificial Neural Network, and Deep Reinforcement Learning based on a set of training data and focus on predicting driver actions. The proposed solution is validated via extensive simulations using a microscopic car-following mobility model, coupled with an accurate mathematical modelling. Performance analysis show that KNN yields up to best performance parameters. Finally, we draw conclusions for road safety stakeholders to adopt the safer technique to lane change maneuver. Full article
(This article belongs to the Special Issue Machine-Environment Interaction, Volume II)
Show Figures

Figure 1

17 pages, 1065 KiB  
Article
Echo State Learning for User Trajectory Prediction to Minimize Online Game Breaks in 6G Terahertz Networks
by Benedetta Picano, Leonardo Scommegna, Enrico Vicario and Romano Fantacci
J. Sens. Actuator Netw. 2023, 12(4), 58; https://doi.org/10.3390/jsan12040058 - 25 Jul 2023
Cited by 1 | Viewed by 1699
Abstract
Mobile online gaming is constantly growing in popularity and is expected to be one of the most important applications of upcoming sixth generation networks. Nevertheless, it remains challenging for game providers to support it, mainly due to its intrinsic and ever-stricter need for [...] Read more.
Mobile online gaming is constantly growing in popularity and is expected to be one of the most important applications of upcoming sixth generation networks. Nevertheless, it remains challenging for game providers to support it, mainly due to its intrinsic and ever-stricter need for service continuity in the presence of user mobility. In this regard, this paper proposes a machine learning strategy to forecast user channel conditions, aiming at guaranteeing a seamless service whenever a user is involved in a handover, i.e., moving from the coverage area of one base station towards another. In particular, the proposed channel condition prediction approach involves the exploitation of an echo state network, an efficient class of recurrent neural network, that is empowered with a genetic algorithm to perform parameter optimization. The echo state network is applied to improve user decisions regarding the selection of the serving base station, avoiding game breaks as much as possible to lower game lag time. The validity of the proposed framework is confirmed by simulations in comparison to the long short-term memory approach and another alternative method, aimed at thoroughly testing the accuracy of the learning module in forecasting user trajectories and in reducing game breaks or lag time, with a focus on a sixth generation network application scenario. Full article
(This article belongs to the Special Issue Advancing towards 6G Networks)
Show Figures

Figure 1

24 pages, 1075 KiB  
Article
Distributed Ledger as a Service: A Web 3.0-Oriented Architecture
by Francesco Chiti and Giorgio Gandini
J. Sens. Actuator Netw. 2023, 12(4), 57; https://doi.org/10.3390/jsan12040057 - 20 Jul 2023
Cited by 4 | Viewed by 1875
Abstract
This paper proposes a general and interoperable Web of Things (WoT)-oriented architecture to support a distributed storage application. In particular, the focus is on a distributed ledger service dedicated to machine-to-machine (M2M) transactions occurring in an intelligent ecosystem. For this purpose, the basic [...] Read more.
This paper proposes a general and interoperable Web of Things (WoT)-oriented architecture to support a distributed storage application. In particular, the focus is on a distributed ledger service dedicated to machine-to-machine (M2M) transactions occurring in an intelligent ecosystem. For this purpose, the basic functional modules have been characterized and integrated into a comprehensive framework relying on an IOTA approach. Furthermore, a general protocol that is built upon an underlying publish-and-subscribe framework is proposed to support all the application phases. The proposed approach has been validated by a simulation campaign targeting the achievable latency and throughput and, further, by a qualitative analysis of high-level metrics, both pointing out several advantages in terms of interoperability, scalability, and mobility support, together with addressing some constraints affecting service availability and security. Full article
Show Figures

Figure 1

25 pages, 763 KiB  
Article
STARC: Decentralized Coordination Primitive on Low-Power IoT Devices for Autonomous Intersection Management
by Patrick Rathje, Valentin Poirot and Olaf Landsiedel
J. Sens. Actuator Netw. 2023, 12(4), 56; https://doi.org/10.3390/jsan12040056 - 11 Jul 2023
Cited by 1 | Viewed by 1528
Abstract
Wireless communication is an essential element within Intelligent Transportation Systems and motivates new approaches to intersection management, allowing safer and more efficient road usage. With lives at stake, wireless protocols should be readily available and guarantee safe coordination for all involved traffic participants, [...] Read more.
Wireless communication is an essential element within Intelligent Transportation Systems and motivates new approaches to intersection management, allowing safer and more efficient road usage. With lives at stake, wireless protocols should be readily available and guarantee safe coordination for all involved traffic participants, even in the presence of radio failures. This work introduces STARC, a coordination primitive for safe, decentralized resource coordination. Using STARC, traffic participants can safely coordinate at intersections despite unreliable radio environments and without a central entity or infrastructure. Unlike other methods that require costly and energy-consuming platforms, STARC utilizes affordable and efficient Internet of Things devices that connect cars, bicycles, electric scooters, pedestrians, and cyclists. For communication, STARC utilizes low-power IEEE 802.15.4 radios and Synchronous Transmissions for multi-hop communication. In addition, the protocol provides distributed transaction, election, and handover mechanisms for decentralized, thus cost-efficient, deployments. While STARC’s coordination remains resource-agnostic, this work presents and evaluates STARC in a roadside scenario. Our simulations have shown that using STARC at intersections leads to safer and more efficient vehicle coordination. We found that average waiting times can be reduced by up to 50% compared to using a fixed traffic light schedule in situations with fewer than 1000 vehicles per hour. Additionally, we design platooning on top of STARC, improving scalability and outperforming static traffic lights even at traffic loads exceeding 1000 vehicles per hour. Full article
(This article belongs to the Special Issue Recent Advances in Vehicular Networking and Communications)
Show Figures

Figure 1

17 pages, 870 KiB  
Article
Loss Process at an AQM Buffer
by Andrzej Chydzinski
J. Sens. Actuator Netw. 2023, 12(4), 55; https://doi.org/10.3390/jsan12040055 - 10 Jul 2023
Cited by 2 | Viewed by 1334
Abstract
We perform a comprehensive analysis of packet losses occurring at an AQM buffer in which the packet deletion probability is relative to the size of the queue. Several characteristics of the loss process are derived: the number of deletions in an interval of [...] Read more.
We perform a comprehensive analysis of packet losses occurring at an AQM buffer in which the packet deletion probability is relative to the size of the queue. Several characteristics of the loss process are derived: the number of deletions in an interval of length t, the temporary intensity of deletions at arbitrary time, the steady-state loss ratio, and the number of losses if there is no service. All of them are obtained for a general deletion probability function and an advanced model of the arrival process, which incorporates, among other things, the autocorrelation of traffic. Analytical results are accompanied by examples in which numerical values are obtained for several configurations of the system. Using these examples, the dependence of the loss process on the initial system state, deletion probability function, and traffic autocorrelation are discussed. Full article
(This article belongs to the Section Communications and Networking)
Show Figures

Figure 1

21 pages, 6078 KiB  
Article
Low-Cost Real-Time Locating System Solution Development and Implementation in Manufacturing Industry
by Andrea Volpi, Roberto Montanari, Letizia Tebaldi and Marco Mambrioni
J. Sens. Actuator Netw. 2023, 12(4), 54; https://doi.org/10.3390/jsan12040054 - 10 Jul 2023
Cited by 1 | Viewed by 1515
Abstract
The present work originates from a previous study in which a low-cost Real-Time Locating System (RTLS) based on Ultra-Wideband signals was developed and tested both in a laboratory and in a real industrial environment for assessing its performance and determining the best configuration, [...] Read more.
The present work originates from a previous study in which a low-cost Real-Time Locating System (RTLS) based on Ultra-Wideband signals was developed and tested both in a laboratory and in a real industrial environment for assessing its performance and determining the best configuration, according to some selected KPIs. Starting from the future research directions depicted, the evolution herein presented is twofold. First, tests performed in the laboratory are refined and deepened in terms of (i) different anchors’ arrangements and orientation; (ii) the increased number of tested tags; and (iii) the tags’ battery capacity test. Second, the development and deployment of the industrial solution as well is improved by means of a case for hosting tags to be positioned on the asset to be tracked, realized through 3D printing, in line with the industrial context requirements. Finally, an economic analysis is performed so as to demonstrate the convenience of the investment and the feasibility of the solution. Results are positive and promising in terms of both economic sustainability and implementation of the system in a real industrial environment and may constitute guidelines for practitioners and managers. Full article
(This article belongs to the Special Issue Optimization within Sensor Networks and Telecommunications)
Show Figures

Figure 1

27 pages, 8188 KiB  
Article
Sensorless Estimation of Human Joint Torque for Robust Tracking Control of Lower-Limb Exoskeleton Assistive Gait Rehabilitation
by Auwalu Muhammad Abdullahi and Ronnapee Chaichaowarat
J. Sens. Actuator Netw. 2023, 12(4), 53; https://doi.org/10.3390/jsan12040053 - 7 Jul 2023
Cited by 9 | Viewed by 2228
Abstract
Patients suffering from motor disorders or weakness resulting from either serious spinal cord injury or stroke often require rehabilitation therapy to regain their mobility. In the lower limbs, exoskeletons have two motors aligned with the patients’ hip and knee to assist in rehabilitation [...] Read more.
Patients suffering from motor disorders or weakness resulting from either serious spinal cord injury or stroke often require rehabilitation therapy to regain their mobility. In the lower limbs, exoskeletons have two motors aligned with the patients’ hip and knee to assist in rehabilitation exercises by supporting the patient’s body structure to increase the torques at the hip and knee joints. Assistive rehabilitation is, however, challenging, as the human torque is unknown and varies from patient to patient. This poses difficulties in determining the level of assistance required for a particular patient. In this paper, therefore, a modified extended state observer (ESO)-based integral sliding mode (ISM) controller (MESOISMC) for lower-limb exoskeleton assistive gait rehabilitation is proposed. The ESO is used to estimate the unknown human torque without application of a torque sensor while the ISMC is used to achieve robust tracking of preset hip and knee joint angles by considering the estimated human torque as a disturbance. The performance of the proposed MESOISMC was assessed using the mean absolute error (MAE). The obtained results show an 85.02% and 87.38% reduction in the MAE for the hip and joint angles, respectively, when the proposed MESOISMC is compared with ISMC with both controllers tuned via LMI optimization. The results also indicate that the proposed MESOISMC method is effective and efficient for user comfort and safety during gait rehabilitation training. Full article
(This article belongs to the Special Issue Reliability Improvement for Acquired Human Signals)
Show Figures

Figure 1

26 pages, 1075 KiB  
Review
Recent Advances in Time-Sensitive Network Configuration Management: A Literature Review
by Boxin Shi, Xiaodong Tu, Bin Wu and Yifei Peng
J. Sens. Actuator Netw. 2023, 12(4), 52; https://doi.org/10.3390/jsan12040052 - 6 Jul 2023
Cited by 6 | Viewed by 4302
Abstract
At present, many network applications are seeking to implement Time-Sensitive Network (TSN) technology, which not only furnishes communication transmission services that are deterministic, low-latency, highly dependable, and have ample bandwidth, but also enables unified configuration management, permitting different network types to function under [...] Read more.
At present, many network applications are seeking to implement Time-Sensitive Network (TSN) technology, which not only furnishes communication transmission services that are deterministic, low-latency, highly dependable, and have ample bandwidth, but also enables unified configuration management, permitting different network types to function under a single management system. These characteristics enable it to be widely used in many fields such as industrial sensor and actuator networks, in-vehicle networks, data center networks, and edge computing. Nonetheless, TSN’s configuration management faces numerous difficulties and challenges related to network deployment, automated operation, and maintenance, as well as real-time and safety assurance, rendering it exceedingly intricate. In recent years, some studies have been conducted on TSN configuration management, encompassing various aspects such as system design, key technologies for configuration management, protocol enhancement, and application development. Nevertheless, there is a dearth of systematic summaries of these studies. Hence, this article aims to provide a comprehensive overview of TSN configuration management. Drawing upon more than 70 relevant publications and the pertinent standards established by the IEEE 802.1 TSN working group, we first introduce the system architecture of TSN configuration management from a macro perspective and then explore specific technical details. Additionally, we demonstrate its application scenarios through practical cases and finally highlight the challenges and future research directions. We aspire to provide a comprehensive reference for peers and new researchers interested in TSN configuration management. Full article
(This article belongs to the Special Issue Protocols, Algorithms and Applications for Time Sensitive Networks)
Show Figures

Figure 1

57 pages, 5223 KiB  
Review
DDoS Attack and Detection Methods in Internet-Enabled Networks: Concept, Research Perspectives, and Challenges
by Kazeem B. Adedeji, Adnan M. Abu-Mahfouz and Anish M. Kurien
J. Sens. Actuator Netw. 2023, 12(4), 51; https://doi.org/10.3390/jsan12040051 - 6 Jul 2023
Cited by 23 | Viewed by 17913
Abstract
In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent security flaws, the attacks seek [...] Read more.
In recent times, distributed denial of service (DDoS) has been one of the most prevalent security threats in internet-enabled networks, with many internet of things (IoT) devices having been exploited to carry out attacks. Due to their inherent security flaws, the attacks seek to deplete the resources of the target network by flooding it with numerous spoofed requests from a distributed system. Research studies have demonstrated that a DDoS attack has a considerable impact on the target network resources and can result in an extended operational outage if not detected. The detection of DDoS attacks has been approached using a variety of methods. In this paper, a comprehensive survey of the methods used for DDoS attack detection on selected internet-enabled networks is presented. This survey aimed to provide a concise introductory reference for early researchers in the development and application of attack detection methodologies in IoT-based applications. Unlike other studies, a wide variety of methods, ranging from the traditional methods to machine and deep learning methods, were covered. These methods were classified based on their nature of operation, investigated as to their strengths and weaknesses, and then examined via several research studies which made use of each approach. In addition, attack scenarios and detection studies in emerging networks such as the internet of drones, routing protocol based IoT, and named data networking were also covered. Furthermore, technical challenges in each research study were identified. Finally, some remarks for enhancing the research studies were provided, and potential directions for future research were highlighted. Full article
(This article belongs to the Section Communications and Networking)
Show Figures

Figure 1

35 pages, 785 KiB  
Review
On Wireless Sensor Network Models: A Cross-Layer Systematic Review
by Fernando Ojeda, Diego Mendez, Arturo Fajardo and Frank Ellinger
J. Sens. Actuator Netw. 2023, 12(4), 50; https://doi.org/10.3390/jsan12040050 - 30 Jun 2023
Cited by 16 | Viewed by 5697
Abstract
Wireless sensor networks (WSNs) have been adopted in many fields of application, such as industrial, civil, smart cities, health, and the surveillance domain, to name a few. Fateway and sensor nodes conform to WSN, and each node integrates processor, communication, sensor, and power [...] Read more.
Wireless sensor networks (WSNs) have been adopted in many fields of application, such as industrial, civil, smart cities, health, and the surveillance domain, to name a few. Fateway and sensor nodes conform to WSN, and each node integrates processor, communication, sensor, and power supply modules, sending and receiving information of a covered area across a propagation medium. Given the increasing complexity of a WSN system, and in an effort to understand, comprehend and analyze an entire WSN, different metrics are used to characterize the performance of the network. To reduce the complexity of the WSN architecture, different approaches and techniques are implemented to capture (model) the properties and behavior of particular aspects of the system. Based on these WSN models, many research works propose solutions to the problem of abstracting and exporting network functionalities and capabilities to the final user. Modeling an entire WSN is a difficult task for researchers since they must consider all of the constraints that affect network metrics, devices and system administration, holistically, and the models developed in different research works are currently focused only on a specific network layer (physical, link, or transport layer), making the estimation of the WSN behavior a very difficult task. In this context, we present a systematic and comprehensive review focused on identifying the existing WSN models, classified into three main areas (node, network, and system-level) and their corresponding challenges. This review summarizes and analyzes the available literature, which allows for the general understanding of WSN modeling in a holistic view, using a proposed taxonomy and consolidating the research trends and open challenges in the area. Full article
(This article belongs to the Topic Wireless Sensor Networks)
Show Figures

Figure 1

18 pages, 4821 KiB  
Article
The Power of Data: How Traffic Demand and Data Analytics Are Driving Network Evolution toward 6G Systems
by Dario Sabella, Davide Micheli and Giovanni Nardini
J. Sens. Actuator Netw. 2023, 12(4), 49; https://doi.org/10.3390/jsan12040049 - 27 Jun 2023
Cited by 2 | Viewed by 4205
Abstract
The evolution of communication systems always follows data traffic evolution and further influences innovations that are unlocking new markets and services. While 5G deployment is still ongoing in various countries, data-driven considerations (extracted from forecasts at the macroscopic level, detailed analysis of live [...] Read more.
The evolution of communication systems always follows data traffic evolution and further influences innovations that are unlocking new markets and services. While 5G deployment is still ongoing in various countries, data-driven considerations (extracted from forecasts at the macroscopic level, detailed analysis of live network traffic patterns, and specific measures from terminals) can conveniently feed insights suitable for many purposes (B2B e.g., operator planning and network management; plus also B2C e.g., smarter applications and AI-aided services) in the view of future 6G systems. Moreover, technology trends from standards and research projects (such as Hexa-X) are moving with industry efforts on this evolution. This paper shows the importance of data-driven insights, by first exploring network evolution across the years from a data point of view, and then by using global traffic forecasts complemented by data traffic extractions from a live 5G operator network (statistical network counters and measures from terminals) to draw some considerations on the possible evolution toward 6G. It finally presents a concrete case study showing how data collected from the live network can be exploited to help the design of AI operations and feed QoS predictions. Full article
(This article belongs to the Special Issue Advancing towards 6G Networks)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop