Wireless Sensor Network, IoT and Cloud Computing Technologies for Smart Cities

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".

Deadline for manuscript submissions: 30 September 2025 | Viewed by 12954

Special Issue Editor


E-Mail Website
Guest Editor
Department of Physics and Computer Science. Wilfrid Laurier University, N2L 3C5, Waterloo, ON, Canada
Interests: wireless technologies, standards, and protocols for the next generation communication networks (i.e., 5G/6G , Industrial IoT networks (IIoT)); resource management in 5G/6G and beyond networks; industrial IoT networks; software-defined wireless sensor networks; machine learning application in next generation communication networks

Special Issue Information

Dear Colleagues,

The Special Issue, focusing on “Wireless Sensor Network, IoT, and Cloud Computing Technologies for Smart Cities”, delves into the cutting-edge innovations and applications shaping the future of urban environments. With the rapid advancements of technology, the integration of wireless sensor networks (WSNs), internet of things (IoT), and cloud computing has revolutionized the way cities operate and function.

This Special Issue features research articles, case studies, and reviews that highlight the latest developments in leveraging these technologies to create smart cities. From intelligent transportation systems to energy-efficient buildings, the contributions in this issue showcase how WSNs, IoT, and cloud computing are being harnessed to enhance urban living experiences, improve resource management, and promote environmental sustainability.

By bringing together experts and researchers in the field, this Special Issue serves as a comprehensive resource for understanding the transformative potential of wireless sensor network, IoT, and cloud computing technologies in building the cities of tomorrow.

The key topics of interest include (but are not limited to):

  1. Data Security and Privacy
  2. Energy Efficiency 
  3. Edge Computing and Fog Computing
  4. Ultra-high-speed data transmission
  5. Ultra-low latency communication
  6. Spectrum sharing and management
  7. New technologies, such as non-terrestrial networks and intelligent reflecting surfaces

Dr. Lilatul Ferdouse
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Wireless Sensor Network (WSN)
  • Internet of Things (IoT)
  • cloud computing
  • smart cities
  • sensor data analytics
  • edge computing
  • smart infrastructure
  • data security
  • real-time monitoring
  • energy efficiency
  • smart transportation
  • intelligent reflecting surfaces
  • spectrum efficiency

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (8 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

19 pages, 2223 KiB  
Article
Performance Analysis of Wireless Sensor Networks Using Damped Oscillation Functions for the Packet Transmission Probability
by Izlian Y. Orea-Flores, Mario E. Rivero-Angeles, Sergio-Jesus Gonzalez-Ambriz, Eleazar Aguirre Anaya and Sumera Saleem
Computers 2024, 13(11), 285; https://doi.org/10.3390/computers13110285 - 4 Nov 2024
Viewed by 358
Abstract
Wireless sensor networks are composed of many nodes distributed in a region of interest to monitor different environments and physical variables. In many cases, access to nodes is not easy or feasible. As such, the system lifetime is a primary design parameter to [...] Read more.
Wireless sensor networks are composed of many nodes distributed in a region of interest to monitor different environments and physical variables. In many cases, access to nodes is not easy or feasible. As such, the system lifetime is a primary design parameter to consider in the design of these networks. In this regard, for some applications, it is preferable to extend the system lifetime by actively reducing the number of packet transmissions and, thus, the number of reports. The system administrator can be aware of such reporting reduction to distinguish this final phase from a malfunction of the system or even an attack. Given this, we explore different mathematical functions that drastically reduce the number of packet transmissions when the residual energy in the system is low but still allow for an adequate number of transmissions. Indeed, in previous works, where the negative exponential distribution is used, the system reaches the point of zero transmissions extremely fast. Hence, we propose different dampening functions with different decreasing rates that present oscillations to allow for packet transmissions even at the end of the system lifetime. We compare the system performance under these mathematical functions, which, to the best of our knowledge, have never been used before, to find the most adequate transmission scheme for packet transmissions and system lifetime. We develop an analytical model based on a discrete-time Markov chain to show that a moderately decreasing function provides the best results. We also develop a discrete event simulator to validate the analytical results. Full article
Show Figures

Figure 1

18 pages, 5170 KiB  
Article
An Efficient Detection Mechanism of Network Intrusions in IoT Environments Using Autoencoder and Data Partitioning
by Yiran Xiao, Yaokai Feng and Kouichi Sakurai
Computers 2024, 13(10), 269; https://doi.org/10.3390/computers13100269 - 14 Oct 2024
Viewed by 1025
Abstract
In recent years, with the development of the Internet of Things and distributed computing, the “server-edge device” architecture has been widely deployed. This study focuses on leveraging autoencoder technology to address the binary classification problem in network intrusion detection, aiming to develop a [...] Read more.
In recent years, with the development of the Internet of Things and distributed computing, the “server-edge device” architecture has been widely deployed. This study focuses on leveraging autoencoder technology to address the binary classification problem in network intrusion detection, aiming to develop a lightweight model suitable for edge devices. Traditional intrusion detection models face two main challenges when directly ported to edge devices: inadequate computational resources to support large-scale models and the need to improve the accuracy of simpler models. To tackle these issues, this research utilizes the Extreme Learning Machine for its efficient training speed and compact model size to implement autoencoders. Two improvements over the latest related work are proposed: First, to improve data purity and ultimately enhance detection performance, the data are partitioned into multiple regions based on the prediction results of these autoencoders. Second, autoencoder characteristics are leveraged to further investigate the data within each region. We used the public dataset NSL-KDD to test the behavior of the proposed mechanism. The experimental results show that when dealing with multi-class attacks, the model’s performance was significantly improved, and the accuracy and F1-Score were improved by 3.5% and 2.9%, respectively, maintaining its lightweight nature. Full article
Show Figures

Figure 1

19 pages, 5118 KiB  
Article
Enhancing Information Exchange in Ship Maintenance through Digital Twins and IoT: A Comprehensive Framework
by Andrii Golovan, Vasyl Mateichyk, Igor Gritsuk, Alexander Lavrov, Miroslaw Smieszek, Iryna Honcharuk and Olena Volska
Computers 2024, 13(10), 261; https://doi.org/10.3390/computers13100261 - 11 Oct 2024
Viewed by 811
Abstract
This article proposes a comprehensive framework for enhancing information exchange in ship maintenance through the integration of Digital Twins (DTs) and the Internet of Things (IoT). The maritime industry faces significant challenges in maintaining ships due to issues like data silos, delayed information [...] Read more.
This article proposes a comprehensive framework for enhancing information exchange in ship maintenance through the integration of Digital Twins (DTs) and the Internet of Things (IoT). The maritime industry faces significant challenges in maintaining ships due to issues like data silos, delayed information flow, and insufficient real-time updates. By leveraging advanced technologies such as DTs and IoT, this framework aims to optimize maintenance processes, improve decision-making, and increase the operational efficiency of maritime vessels. Digital Twins create virtual replicas of physical assets, allowing for continuous monitoring, simulation, and prediction of ship conditions. Meanwhile, IoT devices enable real-time data collection and transmission from various ship components, facilitating a seamless flow of information. This integrated approach enhances predictive maintenance capabilities, reduces downtime, and improves resource allocation. The article will delve into the architecture of the proposed framework, implementation steps, and potential challenges, supported by case studies that demonstrate its practical application and benefits. By addressing these aspects, the framework aims to provide a robust solution for modernizing ship maintenance operations and ensuring the longevity and reliability of maritime assets. Full article
Show Figures

Figure 1

27 pages, 1100 KiB  
Article
Specialized Genetic Operators for the Planning of Passive Optical Networks
by Oeber Izidoro Pereira, Edgar Manuel Carreño-Franco, Jesús M. López-Lezama and Nicolás Muñoz-Galeano
Computers 2024, 13(10), 259; https://doi.org/10.3390/computers13100259 - 10 Oct 2024
Viewed by 517
Abstract
Passive Optical Networks (PONs) are telecommunication technologies that use fiber-optic cables to deliver high-speed internet and other communication services to end users. PONs split optical signals from a single fiber into multiple fibers, serving multiple homes or businesses without requiring active electronic components. [...] Read more.
Passive Optical Networks (PONs) are telecommunication technologies that use fiber-optic cables to deliver high-speed internet and other communication services to end users. PONs split optical signals from a single fiber into multiple fibers, serving multiple homes or businesses without requiring active electronic components. PONs planning involves designing and optimizing the infrastructure for delivering fiber-optic communications to end users. The main contribution of this paper is the introduction of tailored operators within a genetic algorithm (GA) optimization approach for PONs planning. A three vector and an aggregator vector are devised to account, respectively, for physical and logical connections of the network, facilitating the execution of GA operators. This codification and these operators are versatile and can be applied to any population-based algorithm, not limited to GAs alone. Furthermore, the proposed operators are specifically designed to exploit the unique characteristics of PONs, thereby minimizing the occurrence of unfeasible solutions and accelerating convergence towards an optimal network design. By incorporating these specialized operators, this research aims to enhance the efficiency of PONs planning, ultimately leading to reduced costs and improved network performance. Full article
Show Figures

Figure 1

16 pages, 760 KiB  
Article
The Influence of National Digital Identities and National Profiling Systems on Accelerating the Processes of Digital Transformation: A Mixed Study Report
by Abdelrahman Ahmed Alhammadi, Saadat M. Alhashmi, Mohammad Lataifeh and John Lewis Rice
Computers 2024, 13(9), 243; https://doi.org/10.3390/computers13090243 - 23 Sep 2024
Viewed by 974
Abstract
The United Arab Emirates (UAE) is a frontrunner in digitalising government services, demonstrating the successful implementation of National Digital Identity (NDI) systems. Unlike many developing nations with varying levels of success with electronic ID systems due to legal, socio-cultural, and ethical concerns, the [...] Read more.
The United Arab Emirates (UAE) is a frontrunner in digitalising government services, demonstrating the successful implementation of National Digital Identity (NDI) systems. Unlike many developing nations with varying levels of success with electronic ID systems due to legal, socio-cultural, and ethical concerns, the UAE has seamlessly integrated digital identities into various sectors, including security, transportation, and more, through initiatives like UAE Pass. This study draws on the UAE’s functional digital ID systems, such as those utilised in the Dubai Smart City project, to highlight the potential efficiencies and productivity gains in public services while addressing the associated risks of cybersecurity and privacy. This paper provides a comprehensive understanding of the UAE’s NDI and its impact on the nation’s digital transformation agenda, offering a thorough analysis of the effectiveness and challenges of NDIs, explicitly focusing on the UAE’s approach. Full article
Show Figures

Figure 1

17 pages, 4387 KiB  
Article
Adaptive Load Balancing Approach to Mitigate Network Congestion in VANETS
by Syed Ehsan Haider, Muhammad Faizan Khan and Yousaf Saeed
Computers 2024, 13(8), 194; https://doi.org/10.3390/computers13080194 - 13 Aug 2024
Viewed by 833
Abstract
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, [...] Read more.
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, RSU-based medium access control (MAC) schemes, simplified clustering, and network activity control, a significant gap persists in employing a load-balancing server for effective traffic management. We propose a server-based network congestion handling mechanism (SBNC) in VANETs to bridge this gap. Our approach clusters RSUs within specified ranges and incorporates dedicated load balancing and network scheduler RSUs to manage route selection and request–response scheduling, thereby balancing RSU loads. We introduce three key algorithms: optimal placement of dedicated RSUs, a scheduling policy for packets/data/requests/responses, and a congestion control algorithm for load balancing. Using the VanetMobiSim library of Network Simulator-2 (NS-2), we evaluate our approach based on residual energy consumption, end-to-end delay, packet delivery ratio (PDR), and control packet overhead. Results indicate substantial improvements in load balancing through our proposed server-based approach. Full article
Show Figures

Figure 1

23 pages, 8046 KiB  
Article
Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System
by Aisha Edrah and Abdelkader Ouda
Computers 2024, 13(7), 159; https://doi.org/10.3390/computers13070159 - 22 Jun 2024
Cited by 1 | Viewed by 1356
Abstract
With our increasing reliance on technology, there is a growing demand for efficient and seamless access control systems. Smartphone-centric biometric methods offer a diverse range of potential solutions capable of verifying users and providing an additional layer of security to prevent unauthorized access. [...] Read more.
With our increasing reliance on technology, there is a growing demand for efficient and seamless access control systems. Smartphone-centric biometric methods offer a diverse range of potential solutions capable of verifying users and providing an additional layer of security to prevent unauthorized access. To ensure the security and accuracy of smartphone-centric biometric identification, it is crucial that the phone reliably identifies its legitimate owner. Once the legitimate holder has been successfully determined, the phone can effortlessly provide real-time identity verification for various applications. To achieve this, we introduce a novel smartphone-integrated detection and control system called Identification: Legitimate or Counterfeit (ILC), which utilizes gait cycle analysis. The ILC system employs the smartphone’s accelerometer sensor, along with advanced statistical methods, to detect the user’s gait pattern, enabling real-time identification of the smartphone owner. This approach relies on statistical analysis of measurements obtained from the accelerometer sensor, specifically, peaks extracted from the X-axis data. Subsequently, the derived feature’s probability distribution function (PDF) is computed and compared to the known user’s PDF. The calculated probability verifies the similarity between the distributions, and a decision is made with 92.18% accuracy based on a predetermined verification threshold. Full article
Show Figures

Figure 1

Review

Jump to: Research

29 pages, 742 KiB  
Review
Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review
by Munirah Maher Alshabibi, Alanood Khaled Bu dookhi and M. M. Hafizur Rahman
Computers 2024, 13(8), 213; https://doi.org/10.3390/computers13080213 - 22 Aug 2024
Viewed by 6294
Abstract
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for forensic analysts, making it necessary for them [...] Read more.
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for forensic analysts, making it necessary for them to investigate and adjust the evolving landscape of cloud computing. This is where cloud forensics emerges as a critical component. Cloud forensics, a specialized field within digital forensics, focuses on uncovering evidence of exploitation, conducting thorough investigations, and presenting findings to law enforcement for legal action against perpetrators. This paper examines the primary challenges encountered in cloud forensics, reviews the relevant literature, and analyzes the strategies implemented to address these obstacles. Full article
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: Enhancing Information Exchange in Ship Maintenance through Digital Twins and IoT: A Comprehensive Framework
Author: Mateichyk
Highlights: The article proposed and evaluated a comprehensive framework integrating Digital Twins and the Internet of Things to enhance information exchange in ship maintenance. The results demonstrate that the integration of these technologies can significantly improve the efficiency and effectiveness of maintenance practices, leading to reduced operational costs and extended asset lifespans.

Back to TopTop