Next Issue
Volume 5, December
Previous Issue
Volume 5, June
 
 

Telecom, Volume 5, Issue 3 (September 2024) – 21 articles

Cover Story (view full-size image): The performance modeling of IoT-WSN is of key importance to better understand, deploy, and manage this technology. In heterogeneous scenarios, the modeling process must be achieved to guarantee a successful operation in terms of medium access, synchronization, and energy conservation. We propose a novel methodology to determine the energy consumed by sensor nodes deploying a recently proposed synchronous duty-cycled MAC protocol named Priority Sink Access MAC (PSA-MAC). We model the operation of a WSN with two classes of sensor devices by a pair of two-dimensional Discrete-Time Markov Chains (2D-DTMC), determine their stationary probability distribution, and propose new expressions to compute the energy consumption based solely on the obtained stationary probability distribution. View this paper
  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
13 pages, 1005 KiB  
Article
Modulation Recognition System of Electromagnetic Interference Signal Based on SDR
by Wei Dai and Changpeng Ji
Telecom 2024, 5(3), 928-940; https://doi.org/10.3390/telecom5030046 - 11 Sep 2024
Viewed by 720
Abstract
Considering the electromagnetic interference signal in non-cooperative communication, an automatic modulation identification and detection system of electromagnetic interference signal based on software defined radio is proposed. Based on GNU Radio 3.10.7.0 and HackRF One B210mini, the system estimates the frequency and symbol rate [...] Read more.
Considering the electromagnetic interference signal in non-cooperative communication, an automatic modulation identification and detection system of electromagnetic interference signal based on software defined radio is proposed. Based on GNU Radio 3.10.7.0 and HackRF One B210mini, the system estimates the frequency and symbol rate of the interference signal and completes clock synchronization and matching filtering under the condition of unknown a priori information. By extracting high-order cumulants as characteristic parameters, combined with the decision tree classifier, the classification and recognition of six modulation types of interference signals and signal phase correction are realized. This method can distinguish the recognition results in combination with the signal constellation, and complete the real-time reception and recognition of interference signals. Full article
Show Figures

Figure 1

21 pages, 4750 KiB  
Article
Empowering a Broadband Communications Course with a Unified Module on 5G and Fixed 5G Networks
by Dimitris Uzunidis, Gerasimos Pagiatakis, Ioannis Moscholios and Michael Logothetis
Telecom 2024, 5(3), 907-927; https://doi.org/10.3390/telecom5030045 - 4 Sep 2024
Viewed by 690
Abstract
Telecommunications profoundly impacts all major aspects of our everyday life. As a consequence, student instruction typically includes a series of specialized courses, each addressing a distinct telecommunication area, separating wireless from fixed (optical) communications. This creates the problem of knowledge fragmentation, hindering the [...] Read more.
Telecommunications profoundly impacts all major aspects of our everyday life. As a consequence, student instruction typically includes a series of specialized courses, each addressing a distinct telecommunication area, separating wireless from fixed (optical) communications. This creates the problem of knowledge fragmentation, hindering the student’s perception of the topic since, at the service level, the applications and services offered to the users seem “virtually” independent from the underlying infrastructure. In this paper, to address this problem, we designed, analyzed, and implemented a 6 h course module on the five generations of wireless and fixed networks, which was presented as an integral part of the undergraduate course “Broadband Communications”, which was offered at the Dept. of Electrical and Electronic Engineering, School of Pedagogical and Technological Education (ASPETE), Athens, Greece. The main targets of this module are the following. Firstly, it aims to familiarize students with the fixed generations taxonomy, defined by the ETSI Industry Specification Group (ISG) F5G. This taxonomy serves as a foundation for understanding the evolution of telecommunications technologies. Secondly, the module seeks to integrate the acquired knowledge of the students in their previous telecommunication-related courses. During their curriculum, this knowledge was divided into two separate parts: wireless and fixed (optical). By coupling these two areas, students can develop a deeper understanding of the field. Lastly, the module aims to explore cutting-edge technologies and advancements in the telecommunications industry. In this way, it prepares students to enter the professional world during the fifth-generation era. Additionally, it provides them with valuable insights into the ongoing research and development in the field of 6G. Overall, this module serves as a comprehensive platform for students to enhance their understanding of telecommunications, from the foundational concepts to the latest advancements. To evaluate the impact of this module, the students were asked to fill out a questionnaire that included seven questions upon module completion. This questionnaire was completed successfully by 32 students in the previous academic year and by 16 students in this academic year. Moreover, a 20-question multiple choice quiz was offered to the students, allowing us to probe more into the typical errors and misconceptions about the topic. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

15 pages, 9305 KiB  
Article
Symmetric Keys for Lightweight Encryption Algorithms Using a Pre–Trained VGG16 Model
by Ala’a Talib Khudhair, Abeer Tariq Maolood and Ekhlas Khalaf Gbashi
Telecom 2024, 5(3), 892-906; https://doi.org/10.3390/telecom5030044 - 3 Sep 2024
Viewed by 901
Abstract
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust enough to safeguard resource-constrained environments. This paper presents a [...] Read more.
The main challenge within lightweight cryptographic symmetric key systems is striking a delicate balance between security and efficiency. Consequently, the key issue revolves around crafting symmetric key schemes that are both lightweight and robust enough to safeguard resource-constrained environments. This paper presents a new method of making long symmetric keys for lightweight algorithms. A pre–trained convolutional neural network (CNN) model called visual geometry group 16 (VGG16) is used to take features from two images, turn them into binary strings, make the two strings equal by cutting them down to the length of the shorter string, and then use XOR to make a symmetric key from the binary strings from the two images. The key length depends on the number of features in the two images. Compared to other lightweight algorithms, we found that this method greatly decreases the time required to generate a symmetric key and improves defense against brute force attacks by creating exceptionally long keys. The method successfully passed all 15 tests when evaluated using the NIST SP 800-22 statistical test suite and all Basic Five Statistical Tests. To the best of our knowledge, this is the first research to explore the generation of a symmetric encryption key using a pre–trained VGG16 model. Full article
Show Figures

Figure 1

46 pages, 3730 KiB  
Article
Performance Evaluation of CF-MMIMO Wireless Systems Using Dynamic Mode Decomposition
by Freddy Pesantez Diaz and Claudio Estevez
Telecom 2024, 5(3), 846-891; https://doi.org/10.3390/telecom5030043 - 2 Sep 2024
Viewed by 1047
Abstract
Cell-Free Massive Multiple-Input–Multiple-Output (CF-MIMO) systems have transformed the landscape of wireless communication, offering unparalleled enhancements in Spectral Efficiency and interference mitigation. Nevertheless, the large-scale deployment of CF-MIMO presents significant challenges in processing signals in a scalable manner. This study introduces an innovative methodology [...] Read more.
Cell-Free Massive Multiple-Input–Multiple-Output (CF-MIMO) systems have transformed the landscape of wireless communication, offering unparalleled enhancements in Spectral Efficiency and interference mitigation. Nevertheless, the large-scale deployment of CF-MIMO presents significant challenges in processing signals in a scalable manner. This study introduces an innovative methodology that leverages the capabilities of Dynamic Mode Decomposition (DMD) to tackle the complexities of Channel Estimation in CF-MIMO wireless systems. By extracting dynamic modes from a vast array of received signal snapshots, DMD reveals the evolving characteristics of the wireless channel across both time and space, thereby promising substantial improvements in the accuracy and adaptability of channel state information (CSI). The efficacy of the proposed methodology is demonstrated through comprehensive simulations, which emphasize its superior performance in highly mobile environments. For performance evaluation, the most common techniques have been employed, comparing the proposed algorithms with traditional methods such as MMSE (Minimum Mean Squared Error), MRC (Maximum Ration Combining), and ZF (Zero Forcing). The evaluation metrics used are standard in the field, namely the Cumulative Distribution Function (CDF) and the average UL/DL Spectral Efficiency. Furthermore, the study investigates the impact of DMD-enabled Channel Estimation on system performance, including beamforming strategies, spatial multiplexing within realistic time- and delay-correlated channels, and overall system capacity. This work underscores the transformative potential of incorporating DMD into massive MIMO wireless systems, advancing communication reliability and capacity in increasingly dynamic and dense wireless environments. Full article
Show Figures

Figure 1

23 pages, 521 KiB  
Article
Sum-Rate Maximization for a Hybrid Precoding-Based Massive MIMO NOMA System with Simultaneous Wireless Information and Power Transmission
by Samarendra Nath Sur, Huu Q. Tran, Agbotiname Lucky Imoize, Debdatta Kandar and Sukumar Nandi
Telecom 2024, 5(3), 823-845; https://doi.org/10.3390/telecom5030042 - 2 Sep 2024
Viewed by 687
Abstract
Non-orthogonal multiple access (NOMA) has emerged as a key enabling technology in the realm of millimeter-wave (mmWave) massive MIMO (mMIMO) systems for enhancing spectral efficiency (SE). Furthermore, it is believed that simultaneous wireless information and power transmission (SWIPT) will allow for the system’s [...] Read more.
Non-orthogonal multiple access (NOMA) has emerged as a key enabling technology in the realm of millimeter-wave (mmWave) massive MIMO (mMIMO) systems for enhancing spectral efficiency (SE). Furthermore, it is believed that simultaneous wireless information and power transmission (SWIPT) will allow for the system’s energy efficiency (EE) to be maximised. The effectiveness of the mmWave mMIMO-NOMA system along with SWIPT has been examined in this article under multi-user (MU) scenarios. This paper’s major goal is to construct a low-complexity hybrid-precoder (HP) while taking into account the sub-connected (SC) architecture. The linear precoder is a computationally demanding technique as a result of the matrix inversion. The authors of this paper have suggested a symmetric sequential over-relaxation (SSOR) complex regularised zero-forcing (CRZF) linear precoder. The power distribution for the mmWave mMIMO-NOMA system and power splitting factors for SWIPT are jointly tuned to maximize the sum rate along with the suggested SSOR-CRZF precoder. In regards to complexity, SE, and EE, the SSOR-CRZF-HP surpasses conventional linear precoders. Full article
Show Figures

Figure 1

19 pages, 1225 KiB  
Review
AI-Enabled 6G Internet of Things: Opportunities, Key Technologies, Challenges, and Future Directions
by Madduma Wellalage Pasan Maduranga, Valmik Tilwari, R. M. M. R. Rathnayake and Chamali Sandamini
Telecom 2024, 5(3), 804-822; https://doi.org/10.3390/telecom5030041 - 16 Aug 2024
Viewed by 4249
Abstract
The advent of sixth-generation (6G) networks promises revolutionary advancements in wireless communication, marked by unprecedented speeds, ultra-low latency, and ubiquitous connectivity. This research paper delves into the integration of Artificial Intelligence (AI) in 6G network applications, exploring the challenges and outlining future directions [...] Read more.
The advent of sixth-generation (6G) networks promises revolutionary advancements in wireless communication, marked by unprecedented speeds, ultra-low latency, and ubiquitous connectivity. This research paper delves into the integration of Artificial Intelligence (AI) in 6G network applications, exploring the challenges and outlining future directions for this transformative synergy. The study investigates the key AI technologies for 6G: the potential of AI to optimize network performance, enhance user experience, and enable novel applications in diverse domains and AI-enabled applications. Analyzing the current landscape, the paper identifies key challenges such as scalability, security, and ethical considerations in deploying AI-enabled 6G networks. Moreover, it explores the dynamic interplay between AI and 6G technologies, shedding light on the intricate relationships that underpin their successful integration. The research contributes valuable insights to the ongoing discourse surrounding the convergence of AI and 6G networks, laying the groundwork for a robust and intelligent future communication infrastructure. Full article
Show Figures

Figure 1

12 pages, 4991 KiB  
Article
A 77 GHz Transmit Array for In-Package Automotive Radar Applications
by Francesco Greco, Emilio Arnieri, Giandomenico Amendola, Raffaele De Marco and Luigi Boccia
Telecom 2024, 5(3), 792-803; https://doi.org/10.3390/telecom5030040 - 14 Aug 2024
Viewed by 1026
Abstract
A packaged transmit array (TA) antenna is designed for automotive radar applications operating at 77 GHz. The compact dimensions of the proposed configuration make it compatible with standard quad flat no-lead package (QFN) technology. The TA placed inside the package cover is used [...] Read more.
A packaged transmit array (TA) antenna is designed for automotive radar applications operating at 77 GHz. The compact dimensions of the proposed configuration make it compatible with standard quad flat no-lead package (QFN) technology. The TA placed inside the package cover is used to focus the field radiated by a feed placed in the same package. The unit cell of the array is composed of two pairs of stacked patches separated by a central ground plane. A planar patch antenna surrounded by a mushroom-type EBG (Electromagnetic Band Gap) structure is used as the primary feed. An analytical approach is employed to evaluate the primary parameters of the suggested TA, including its directivity, gain and spillover efficiency. The final design has been refined using comprehensive full-wave simulations. The simulated gain is 14.2 dBi at 77 GHz, with a half-power beamwidth of 22°. This proposed setup is a strong contender for highly integrated mid-gain applications in the automotive sector. Full article
Show Figures

Figure 1

18 pages, 406 KiB  
Article
Toward Sustainable Development: Exploring the Value and Benefits of Digital Twins
by Paweł Weichbroth, Krystian Jandy and Jozef Zurada
Telecom 2024, 5(3), 774-791; https://doi.org/10.3390/telecom5030039 - 12 Aug 2024
Viewed by 1175
Abstract
The complexity and number of data streams generated by internal processes exceed the capabilities of most current simulation environments. Consequently, there is a need for the development of more advanced solutions that can handle any number of simultaneous simulations. One of the most [...] Read more.
The complexity and number of data streams generated by internal processes exceed the capabilities of most current simulation environments. Consequently, there is a need for the development of more advanced solutions that can handle any number of simultaneous simulations. One of the most promising ideas to address these and other challenges is the concept of a Digital Twin (DT), which refers to a digital representation or a virtual model designed to accurately reflect an intended or actual physical product, system, or process (i.e., a physical twin). As a Digital Twin spans the life-cycle of its physical twin, its development and application can bring considerable benefits to organizations seeking to improve existing processes as well as implement new ones. However, few studies have comprehensively examined the value and benefits of Digital Twins. To fill this gap, this study aims to provide a better understanding of this technology by reviewing the contemporary literature, with a particular focus on the documented case studies, as well as reported business and industrial deployments. The results obtained show that Digital Twins have proven beneficial for maintenance, cost reduction, optimization, simulation performance, monitoring, product life-cycle understanding, assessment validation, performance evaluation, product design, and safety and risk mitigation. In addition, when considering the human factor, DTs can facilitate education and training, team collaboration, and decision making. Undeniably, Digital Twins are a game changer for safer, faster, and more sustainable development. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

14 pages, 12198 KiB  
Article
Super-Wideband Monopole Printed Antenna with Half-Elliptical-Shaped Patch
by Fitri Yuli Zulkifli, Aditya Inzani Wahdiyat, Abdurrahman Zufar, Nurhayati Nurhayati and Eko Setijadi
Telecom 2024, 5(3), 760-773; https://doi.org/10.3390/telecom5030038 - 5 Aug 2024
Viewed by 876
Abstract
Super-wideband (SWB) antennas have emerged as a promising technology for next-generation wireless communication systems due to their ability to transmit and receive signals across a wide frequency spectrum. A half-elliptical-shaped patch antenna for a super-wideband antenna is proposed in this paper. The proposed [...] Read more.
Super-wideband (SWB) antennas have emerged as a promising technology for next-generation wireless communication systems due to their ability to transmit and receive signals across a wide frequency spectrum. A half-elliptical-shaped patch antenna for a super-wideband antenna is proposed in this paper. The proposed antenna was composed of a half-elliptical-shaped patch with a microstrip feedline and a partial ground plane with a triangular inset and a bent edge ground plane. This proposed antenna was designed using Taconic TLY-5 with a dielectric permittivity of 2.2 and a total dimension of 200 × 220 × 1.57 mm3. The proposed antenna demonstrates a bandwidth of 23 GHz (from 0.5 GHz to 23.5 GHz) with a bandwidth ratio of 47:1. Full article
Show Figures

Figure 1

13 pages, 71992 KiB  
Article
The Impact of Spoofing Attacks in Connected Autonomous Vehicles under Traffic Congestion Conditions
by Zisis-Rafail Tzoannos, Dimitrios Kosmanos, Apostolos Xenakis and Costas Chaikalis
Telecom 2024, 5(3), 747-759; https://doi.org/10.3390/telecom5030037 - 2 Aug 2024
Viewed by 1571
Abstract
In recent years, the Internet of Things (IoT) and the Internet of Vehicles (IoV) represent rapidly developing technologies. The majority of car manufacturing companies invest large amounts of money in the field of connected autonomous vehicles. Applications of connected and autonomous vehicles (CAVs) [...] Read more.
In recent years, the Internet of Things (IoT) and the Internet of Vehicles (IoV) represent rapidly developing technologies. The majority of car manufacturing companies invest large amounts of money in the field of connected autonomous vehicles. Applications of connected and autonomous vehicles (CAVs) relate to smart transport services and offer benefits to both society and the environment. However, the development of autonomous vehicles may create vulnerabilities in security systems, through which attacks could harm both vehicles and their drivers. To this end, CAV development in vehicular ad hoc networks (VANETs) requires secure wireless communication. However, this kind of communication is vulnerable to a variety of cyber-attacks, such as spoofing. In essence, this paper presents an in-depth analysis of spoofing attack impacts under realistic road conditions, which may cause some traffic congestion. The novelty of this work has to do with simulation scenarios that take into consideration a set of cross-layer parameters, such as packet delivery ratio (PDR), acceleration, and speed. These parameters can determine the integrity of the exchanged wave short messages (WSMs) and are aggregated in a central trusted authority (CTA) for further analysis. Finally, a statistical metric, coefficient of variation (CoV), which measures the consequences of a cyber-attack in a future crash, is estimated, showing a significant increase (12.1%) in a spoofing attack scenario. Full article
Show Figures

Figure 1

24 pages, 478 KiB  
Article
Energy Consumption Modeling for Heterogeneous Internet of Things Wireless Sensor Network Devices: Entire Modes and Operation Cycles Considerations
by Canek Portillo, Jorge Martinez-Bauset, Vicent Pla and Vicente Casares-Giner
Telecom 2024, 5(3), 723-746; https://doi.org/10.3390/telecom5030036 - 2 Aug 2024
Viewed by 1055
Abstract
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental [...] Read more.
Wireless sensor networks (WSNs) and sensing devices are considered to be core components of the Internet of Things (IoT). The performance modeling of IoT–WSN is of key importance to better understand, deploy, and manage this technology. As sensor nodes are battery-constrained, a fundamental issue in WSN is energy consumption. Additional issues also arise in heterogeneous scenarios due to the coexistence of sensor nodes with different features. In these scenarios, the modeling process becomes more challenging as an efficient orchestration of the sensor nodes must be achieved to guarantee a successful operation in terms of medium access, synchronization, and energy conservation. We propose a novel methodology to determine the energy consumed by sensor nodes deploying a recently proposed synchronous duty-cycled MAC protocol named Priority Sink Access MAC (PSA-MAC). We model the operation of a WSN with two classes of sensor devices by a pair of two-dimensional Discrete-Time Markov Chains (2D-DTMC), determine their stationary probability distribution, and propose new expressions to compute the energy consumption based solely on the obtained stationary probability distribution. This new approach is more systematic and accurate than previously proposed ones. The new methodology to determine energy consumption takes into account different specific features of the PSA-MAC protocol as: (i) the synchronization among sensor nodes; (ii) the normal and awake operation cycles to ensure synchronization among sensor nodes and energy conservation; (iii) the two periods that compose a full operation cycle: the data and sleep periods; (iv) two transmission schemes, SPT (single packet transmission) and APT (aggregated packet transmission) (v) the support of multiple sensor node classes; and (vi) the support of different priority assignments per class of sensor nodes. The accuracy of the proposed methodology has been validated by an independent discrete-event-based simulation model, showing that very precise results are obtained. Full article
Show Figures

Figure 1

17 pages, 3480 KiB  
Article
Measurement of Dielectric Properties of Thin Materials for Radomes Using Waveguide Cavities
by Tayla Dahms, Douglas B. Hayman, Bahare Mohamadzade and Stephanie L. Smith
Telecom 2024, 5(3), 706-722; https://doi.org/10.3390/telecom5030035 - 1 Aug 2024
Viewed by 1529
Abstract
We present waveguide cavity measurements used to evaluate several thin materials for use in radomes. In addition to the data on the materials, we show how these measurements can be performed with common laboratory equipment and simple calculations. We sought an approach that [...] Read more.
We present waveguide cavity measurements used to evaluate several thin materials for use in radomes. In addition to the data on the materials, we show how these measurements can be performed with common laboratory equipment and simple calculations. We sought an approach that allowed candidate materials to be readily evaluated to deal with formerly selected materials becoming unavailable or cost-prohibitive. We used lengths of standard waveguide (WR650 and WR137 here) with readily manufactured irises and a vector network analyzer (Keysight N5225B here). To select the iris size and determine the limits of the simplifications in the equations used, we employed a full-wave 3D electromagnetic simulator (CST Microwave Studio). The equations required to calculate the dielectric properties of samples and their contribution to the equivalent system noise temperature from unloaded and loaded resonant frequencies and Q factors are shown. While these formulations can be found elsewhere, we did not find these assembled as conveniently in other studies in the literature. We also show that orienting the sample down the length of the cavity allows for higher-order modes to be fully utilized. We did not find this straightforward adaptation of the common cross-guide orientation in other works. Overall, the results allowed us to recommend three fabrics for use at the frequencies tested (1.7 and 5.6 GHz). The complete process is outlined to assist others in performing these measurements themselves. Full article
Show Figures

Figure 1

26 pages, 15291 KiB  
Article
The Scale-Up of E-Commerce in Romania Generated by the Pandemic, Automation, and Artificial Intelligence
by Andreea Nistor and Eduard Zadobrischi
Telecom 2024, 5(3), 680-705; https://doi.org/10.3390/telecom5030034 - 30 Jul 2024
Viewed by 1459
Abstract
This study examines the significant growth of e-commerce in Romania, which has surpassed the rates of expansion observed in other more developed countries of the European Union. Based on market analysis by sector-specific companies, the Romanian e-commerce market has reached over €6.5 billion. [...] Read more.
This study examines the significant growth of e-commerce in Romania, which has surpassed the rates of expansion observed in other more developed countries of the European Union. Based on market analysis by sector-specific companies, the Romanian e-commerce market has reached over €6.5 billion. This rapid growth trajectory is expected to continue, driven by various factors, including the impact of the COVID-19 pandemic and the natural evolution of the market. The main purpose of this study is to assess the expansion of the e-commerce market in Romania, identify the key factors behind this growth, and project future market values. Data for this analysis has been collected from industry reports, market analysis, and relevant statistical databases. The study uses a quantitative approach, utilizing financial data and growth rates to forecast future market trends. The dataset includes financial figures from e-commerce sales, digital services such as bill payments, and airline and hotel bookings from 2018 to 2023. Projections for 2024 and beyond were derived from this historical data. In 2019, the e-commerce market in Romania was valued at €4.68 billion, representing a significant increase compared to previous years. By 2020, amid the pandemic, the market value increased to €5.5 billion, marking a 38.4% increase from the previous year. Forecasts for 2024 estimate that the market will exceed €8 billion. In addition, when related digital services are included, the total market value could exceed €10 billion, illustrating the substantial economic impact of the online sector and the growth potential. This study highlights the dynamic nature of the e-commerce landscape in Romania and underlines the significant economic opportunities it presents. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

28 pages, 5300 KiB  
Article
Performance Analysis of a Sound-Based Steganography Wireless Sensor Network to Provide Covert Communications
by Ariadna I. Rodriguez-Gomez, Mario E. Rivero-Angeles, Izlian Y. Orea Flores and Gina Gallegos-García
Telecom 2024, 5(3), 652-679; https://doi.org/10.3390/telecom5030033 - 25 Jul 2024
Viewed by 859
Abstract
Given the existence of techniques that disrupt conventional RF communication channels, the demand for innovative alternatives to electromagnetic-based communications is clear. Covert communication, which claims to conceals the communication channel, has been explored using bio-inspired sounds in aquatic environments, but its application in [...] Read more.
Given the existence of techniques that disrupt conventional RF communication channels, the demand for innovative alternatives to electromagnetic-based communications is clear. Covert communication, which claims to conceals the communication channel, has been explored using bio-inspired sounds in aquatic environments, but its application in terrestrial areas is largely unexplored. This work develops a mathematical analysis of a wireless sensor network that operates stealthily in outdoor environments by using birdsong audio signals from local birds for covert communication. Stored bird sounds are modified to insert sensor data while altering the sound minimally, both in characteristics and random silence/song patterns. This paper introduces a technique that modifies a fourth-level coefficient detail with a wavelet transform, then applies an inverse transform to achieve imperceptible audio modifications. The mathematical analysis includes a statistical study of the On/Off periods of different birds’ songs and a Markov chain capturing the system’s main dynamics. We derive the system throughput to highlight the potential of using birdsong as a covert communication medium in terrestrial environments. Additionally, we compare the performance of the sound-based network to the RF-based network to identify the proposed system’s capabilities. Full article
(This article belongs to the Special Issue Advances in Wireless Communication: Applications and Developments)
Show Figures

Figure 1

20 pages, 1255 KiB  
Article
Training from Zero: Forecasting of Radio Frequency Machine Learning Data Quantity
by William H. Clark IV and Alan J. Michaels
Telecom 2024, 5(3), 632-651; https://doi.org/10.3390/telecom5030032 - 18 Jul 2024
Viewed by 1186
Abstract
The data used during training in any given application space are directly tied to the performance of the system once deployed. While there are many other factors that are attributed to producing high-performance models based on the Neural Scaling Law within Machine Learning, [...] Read more.
The data used during training in any given application space are directly tied to the performance of the system once deployed. While there are many other factors that are attributed to producing high-performance models based on the Neural Scaling Law within Machine Learning, there is no doubt that the data used to train a system provide the foundation from which to build. One of the underlying heuristics used within the Machine Learning space is that having more data leads to better models, but there is no easy answer to the question, “How much data is needed to achieve the desired level of performance?” This work examines a modulation classification problem in the Radio Frequency domain space, attempting to answer the question of how many training data are required to achieve a desired level of performance, but the procedure readily applies to classification problems across modalities. The ultimate goal is to determine an approach that requires the lowest amount of data collection to better inform a more thorough collection effort to achieve the desired performance metric. By focusing on forecasting the performance of the model rather than the loss value, this approach allows for a greater intuitive understanding of data volume requirements. While this approach will require an initial dataset, the goal is to allow for the initial data collection to be orders of magnitude smaller than what is required for delivering a system that achieves the desired performance. An additional benefit of the techniques presented here is that the quality of different datasets can be numerically evaluated and tied together with the quantity of data, and ultimately, the performance of the architecture in the problem domain. Full article
Show Figures

Figure 1

23 pages, 5137 KiB  
Article
Secure-by-Design Real-Time Internet of Medical Things Architecture: e-Health Population Monitoring (RTPM)
by Jims Marchang, Jade McDonald, Solan Keishing, Kavyan Zoughalian, Raymond Mawanda, Corentin Delhon-Bugard, Nicolas Bouillet and Ben Sanders
Telecom 2024, 5(3), 609-631; https://doi.org/10.3390/telecom5030031 - 10 Jul 2024
Viewed by 1586
Abstract
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific [...] Read more.
The healthcare sector has undergone a profound transformation, owing to the influential role played by Internet of Medical Things (IoMT) technology. However, there are substantial concerns over these devices’ security and privacy-preserving mechanisms. The current literature on IoMT tends to focus on specific security features, rather than wholistic security concerning Confidentiality, Integrity, and Availability (CIA Triad), and the solutions are generally simulated and not tested in a real-world network. The proposed innovative solution is known as Secure-by-Design Real-Time IoMT Architecture for e-Health Population Monitoring (RTPM) and it can manage keys at both ends (IoMT device and IoMT server) to maintain high privacy standards and trust during the monitoring process and enable the IoMT devices to run safely and independently even if the server is compromised. However, the session keys are controlled by the trusted IoMT server to lighten the IoMT devices’ overheads, and the session keys are securely exchanged between the client system and the monitoring server. The proposed RTPM focuses on addressing the major security requirements for an IoMT system, i.e., the CIA Triad, and conducts device authentication, protects from Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, and prevents non-repudiation attacks in real time. A self-healing solution during the network failure of live e-health monitoring is also incorporated in RTPM. The robustness and stress of the system are tested with different data types and by capturing live network traffic. The system’s performance is analysed using different security algorithms with different key sizes of RSA (1024 to 8192 bits), AES (128 to 256 bits), and SHA (256 bits) to support a resource-constraint-powered system when integrating with resource-demanding secure parameters and features. In the future, other security features like intrusion detection and prevention and the user’s experience and trust level of such a system will be tested. Full article
Show Figures

Figure 1

21 pages, 4258 KiB  
Article
5G Network Deployment Planning Using Metaheuristic Approaches
by Binod Sapkota, Rijan Ghimire, Paras Pujara, Shashank Ghimire, Ujjwal Shrestha, Roshani Ghimire, Babu R. Dawadi and Shashidhar R. Joshi
Telecom 2024, 5(3), 588-608; https://doi.org/10.3390/telecom5030030 - 9 Jul 2024
Viewed by 2277
Abstract
The present research focuses on optimizing 5G base station deployment and visualization, addressing the escalating demands for high data rates and low latency. The study compares the effectiveness of Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), and Grey Wolf Optimizer [...] Read more.
The present research focuses on optimizing 5G base station deployment and visualization, addressing the escalating demands for high data rates and low latency. The study compares the effectiveness of Genetic Algorithm (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), and Grey Wolf Optimizer (GWO) in both Urban Macro (UMa) and Remote Macro (RMa) deployment scenarios that overcome the limitations of the current method of 5G deployment, which involves adopting Non-Standalone (NSA) architecture. Emphasizing population density, the optimization process eliminates redundant base stations for enhanced efficiency. Results indicate that PSO and GA strike the optimal balance between coverage and capacity, offering valuable insights for efficient network planning. The study includes a comparison of 28 GHz and 3.6 GHz carrier frequencies for UMa, highlighting their respective efficiencies. Additionally, the research proposes a 2.6 GHz carrier frequency for Remote Macro Antenna (RMa) deployment, enhancing 5G Multi-Tier Radio Access Network (RAN) planning and providing practical solutions for achieving infrastructure reduction and improved network performance in a specific geographical context. Full article
Show Figures

Figure 1

32 pages, 31472 KiB  
Article
Studying the Impact of Different TCP DoS Attacks on the Parameters of VoIP Streams
by Ivan Nedyalkov
Telecom 2024, 5(3), 556-587; https://doi.org/10.3390/telecom5030029 - 8 Jul 2024
Viewed by 883
Abstract
In today’s digital world, no one and nothing is safe from potential cyberattacks. There is also no 100% protection from such attacks. Therefore, it is advisable to carry out various studies related to the effects of the different cyberattacks on the performance of [...] Read more.
In today’s digital world, no one and nothing is safe from potential cyberattacks. There is also no 100% protection from such attacks. Therefore, it is advisable to carry out various studies related to the effects of the different cyberattacks on the performance of the specific devices under attack. In this work, a study was carried out to determine how individual TCP DoS attacks affect the parameters of VoIP (Voice over IP) voice and video streams. For the purpose of this work, a model of a simple IP network has been created using the GNS3 IP network-modeling platform. The VoIP platform used was Asterisk Free PBX. Tools from Kali Linux were used to implement the individual TCP DoS attacks; IP-network-monitoring tools and round-trip-delay-measurement tools were also used. The proposed study is applicable to multiple VoIP platforms wherein voice and video traffic are passed/processed by the VoIP server. From the obtained results, it was found that Asterisk Free PBX is very well secured against TCP DoS attacks, which do not affect the platform performance or the parameters of the voice and video streams. The values of the observed parameters, such as jitter, packet loss, round-trip delay, etc., are very far from the maximum allowable values. We also observed a low load on the CPU and RAM of the system during the whole study. Full article
Show Figures

Figure 1

19 pages, 1474 KiB  
Article
Bi-GRU-APSO: Bi-Directional Gated Recurrent Unit with Adaptive Particle Swarm Optimization Algorithm for Sales Forecasting in Multi-Channel Retail
by Aruna Mogarala Guruvaya, Archana Kollu, Parameshachari Bidare Divakarachari, Przemysław Falkowski-Gilski and Hirald Dwaraka Praveena
Telecom 2024, 5(3), 537-555; https://doi.org/10.3390/telecom5030028 - 1 Jul 2024
Viewed by 1091
Abstract
In the present scenario, retail sales forecasting has a great significance in E-commerce companies. The precise retail sales forecasting enhances the business decision making, storage management, and product sales. Inaccurate retail sales forecasting can decrease customer satisfaction, inventory shortages, product backlog, and unsatisfied [...] Read more.
In the present scenario, retail sales forecasting has a great significance in E-commerce companies. The precise retail sales forecasting enhances the business decision making, storage management, and product sales. Inaccurate retail sales forecasting can decrease customer satisfaction, inventory shortages, product backlog, and unsatisfied customer demands. In order to obtain a better retail sales forecasting, deep learning models are preferred. In this manuscript, an effective Bi-GRU is proposed for accurate sales forecasting related to E-commerce companies. Initially, retail sales data are acquired from two benchmark online datasets: Rossmann dataset and Walmart dataset. From the acquired datasets, the unreliable samples are eliminated by interpolating missing data, outlier’s removal, normalization, and de-normalization. Then, feature engineering is carried out by implementing the Adaptive Particle Swarm Optimization (APSO) algorithm, Recursive Feature Elimination (RFE) technique, and Minimum Redundancy Maximum Relevance (MRMR) technique. Followed by that, the optimized active features from feature engineering are given to the Bi-Directional Gated Recurrent Unit (Bi-GRU) model for precise retail sales forecasting. From the result analysis, it is seen that the proposed Bi-GRU model achieves higher results in terms of an R2 value of 0.98 and 0.99, a Mean Absolute Error (MAE) of 0.05 and 0.07, and a Mean Square Error (MSE) of 0.04 and 0.03 on the Rossmann and Walmart datasets. The proposed method supports the retail sales forecasting by achieving superior results over the conventional models. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

15 pages, 2222 KiB  
Article
Two-Level Clustering Algorithm for Cluster Head Selection in Randomly Deployed Wireless Sensor Networks
by Sagun Subedi, Shree Krishna Acharya, Jaehee Lee and Sangil Lee
Telecom 2024, 5(3), 522-536; https://doi.org/10.3390/telecom5030027 - 26 Jun 2024
Viewed by 1248
Abstract
Clustering strategy in wireless sensor networks (WSNs) affects the lifetime, adaptability, and energy productivity of the wireless network system. The low-energy adaptive clustering hierarchy (LEACH) protocol is a convention used to improve the lifetime of WSNs. In this paper, a novel energy-efficient clustering [...] Read more.
Clustering strategy in wireless sensor networks (WSNs) affects the lifetime, adaptability, and energy productivity of the wireless network system. The low-energy adaptive clustering hierarchy (LEACH) protocol is a convention used to improve the lifetime of WSNs. In this paper, a novel energy-efficient clustering algorithm is proposed, with the aim of improving the energy efficiency of WSNs by reducing and balancing the energy consumptions. The clustering-based convention adjusts the energy utilization by allowing an equal opportunity for each node to turn them into a cluster head (CH). Two-level clustering (TLC) is introduced by adopting LEACH convention where CH selection process undergoes first and second level of clustering to overcome boundary problem in LEACH protocol. The TLC method structures nodes within the scope of the appointed CHs, in order to extend the lifetime of the system. The simulation results show that, in comparison with state-of-the-art methodologies, our proposed method significantly enhanced the system lifetime. Full article
(This article belongs to the Special Issue Performance Criteria for Advanced Wireless Communications)
Show Figures

Figure 1

14 pages, 4673 KiB  
Article
Experimental Evaluation of a MIMO Radar Performance for ADAS Application
by Federico Dios, Sergio Torres-Benito, Jose A. Lázaro, Josep R. Casas, Jorge Pinazo and Adolfo Lerín
Telecom 2024, 5(3), 508-521; https://doi.org/10.3390/telecom5030026 - 24 Jun 2024
Viewed by 1191
Abstract
Among the sensors necessary to equip vehicles with an autonomous driving system, there is a tacit agreement that cameras and some type of radar would be essential. The ability of radar to spatially locate objects (pedestrians, other vehicles, trees, street furniture, and traffic [...] Read more.
Among the sensors necessary to equip vehicles with an autonomous driving system, there is a tacit agreement that cameras and some type of radar would be essential. The ability of radar to spatially locate objects (pedestrians, other vehicles, trees, street furniture, and traffic signs) makes it the most economical complement to the cameras in the visible spectrum in order to give the correct depth to scenes. From the echoes obtained by the radar, some data fusion algorithms will try to locate each object in its correct place within the space surrounding the vehicle. In any case, the usefulness of the radar will be determined by several performance parameters, such as its average error in distance, the maximum errors, and the number of echoes per second it can provide. In this work, we have tested experimentally the AWR1843 MIMO radar from Texas Instruments to measure those parameters. Full article
(This article belongs to the Topic Radar Signal and Data Processing with Applications)
Show Figures

Figure 1

Previous Issue
Next Issue
Back to TopTop