Previous Issue
Volume 6, September
 
 

Telecom, Volume 6, Issue 4 (December 2025) – 15 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
36 pages, 9271 KB  
Article
Securing Keyboard Data Communication
by George Routis and Ioanna Roussaki
Telecom 2025, 6(4), 85; https://doi.org/10.3390/telecom6040085 - 4 Nov 2025
Viewed by 150
Abstract
Undoubtedly, the use of a keyboard is rather common when using a PC, laptop, terminal, or server. Unfortunately, when using wired or unencrypted wireless keyboards, all keystrokes can be eavesdropped using a simple RF scanner. The research presented in this paper aims to [...] Read more.
Undoubtedly, the use of a keyboard is rather common when using a PC, laptop, terminal, or server. Unfortunately, when using wired or unencrypted wireless keyboards, all keystrokes can be eavesdropped using a simple RF scanner. The research presented in this paper aims to tackle this problem, or better security “gap”, in order to secure the respective keyboard communication. Five solutions are presented for securing the keystrokes when using a wired USB keyboard with encryption, a fiber optic cable, and a wireless connection (either microwave or light). The proposed solutions are novel, aiming at securing the communication between the USB keyboard and the end PC/laptop/cloud, since the commercial keyboards either wired or wireless are an easy target for an eavesdropper, as stated in the relevant literature section. There are detailed diagrams illustrating the circuits and modules used, while the respective block diagrams and message details are also provided. In conclusion, challenges are studied and addressed, experiments are carried out, and suitable solutions are presented. Full article
Show Figures

Figure 1

21 pages, 598 KB  
Article
Mask Inflation Encoder and Quasi-Dynamic Thresholding Outlier Detection in Cellular Networks
by Roland N. Mfondoum, Nikol Gotseva, Atanas Vlahov, Antoni Ivanov, Pavlina Koleva, Vladimir Poulkov and Agata Manolova
Telecom 2025, 6(4), 84; https://doi.org/10.3390/telecom6040084 - 4 Nov 2025
Viewed by 157
Abstract
Mobile networks have advanced significantly, providing high-throughput voice, video, and integrated data access to support connectivity through various services to facilitate high user density. This traffic growth has also increased the complexity of outlier detection (OD) for fraudster identification, fault detection, and protecting [...] Read more.
Mobile networks have advanced significantly, providing high-throughput voice, video, and integrated data access to support connectivity through various services to facilitate high user density. This traffic growth has also increased the complexity of outlier detection (OD) for fraudster identification, fault detection, and protecting network infrastructure and its users against cybersecurity threats. Autoencoder (AE) models are widely used for outlier detection (OD) on unlabeled and temporal data; however, they rely on fixed anomaly thresholds and anomaly-free training data, which are both difficult to obtain in practice. This paper introduces statistical masking in the encoder to enhance learning from nearly normal data by flagging potential outliers. It also proposes a quasidynamic threshold mechanism that adapts to reconstruction errors, improving detection by up to 3% median area under the receiver operating characteristic (AUROC) compared to the standard 95% threshold used in base AE models. Extensive experiments on the Milan Human Telecommunications Interaction (HTA) dataset validate the performance of the proposed methods. Combined, these two techniques yield a 31% improvement in AUROC and a 34% lower computational complexity when compared to baseline AE, long short-term memory AE (LSTM-AE), and seasonal auto-regressive integrated moving average (SARIMA), enabling efficient OD in modern cellular networks. Full article
Show Figures

Figure 1

14 pages, 47654 KB  
Article
Time Reversal Technique Experiments with a Software-Defined Radio
by Marcelo B. Perotoni and Julien Huillery
Telecom 2025, 6(4), 83; https://doi.org/10.3390/telecom6040083 - 3 Nov 2025
Viewed by 217
Abstract
Time reversal techniques have been investigated for ultrasound and electromagnetic waves. They offer some advantages, particularly in cluttered and inhomogeneous environments, for point-to-point applications. The instrumentation usually employed for electromagnetic time reversal involves costly vector network analyzers, different interconnected generators and receivers, or [...] Read more.
Time reversal techniques have been investigated for ultrasound and electromagnetic waves. They offer some advantages, particularly in cluttered and inhomogeneous environments, for point-to-point applications. The instrumentation usually employed for electromagnetic time reversal involves costly vector network analyzers, different interconnected generators and receivers, or a base station for mobile phones. This article explores the use of a low-cost commercial software-defined radio, in frequencies between 700 MHz and 2100 MHz, with indoor tests showing its performance and observed voltage gains for the received pulse. Full article
Show Figures

Figure 1

17 pages, 1217 KB  
Article
An Internet of Things Approach to Vision-Based Livestock Monitoring: PTZ Cameras for Dairy Cow Identification
by Niken Prasasti Martono, Ryota Tsukamoto and Hayato Ohwada
Telecom 2025, 6(4), 82; https://doi.org/10.3390/telecom6040082 - 3 Nov 2025
Viewed by 325
Abstract
The Internet of Things (IoT) offers promising solutions for smart agriculture, particularly in the monitoring of livestock. This paper proposes a contactless, low-cost system for individual cow identification and monitoring in a dairy barn using a single Pan–Tilt–Zoom (PTZ) camera and a YOLOv8 [...] Read more.
The Internet of Things (IoT) offers promising solutions for smart agriculture, particularly in the monitoring of livestock. This paper proposes a contactless, low-cost system for individual cow identification and monitoring in a dairy barn using a single Pan–Tilt–Zoom (PTZ) camera and a YOLOv8 deep learning model. The PTZ camera periodically scans the barn, capturing images that are processed to detect and recognize a specific target cow among the herd without any wearable sensors. The system embeds barn area metadata in each image, allowing it to estimate the cow’s location and compute the frequency of its presence in predefined zones. We fine-tuned a YOLOv8 object detection model to distinguish the target cow, achieving high precision in identification. Experimental results in a real barn environment demonstrate that the system can identify an individual cow with 85.96% Precision and 68.06% Recall, and the derived spatial occupancy patterns closely match ground truth observations. Compared to conventional methods requiring multiple fixed cameras or RFID-based wearables, the proposed approach significantly reduces equipment costs and animal handling stress. It should be noted that the present work serves as a proof-of-concept for targeted cow tracking that identifies and follows a specific individual within a herd rather than a fully generalized multi-cow identification system. Full article
Show Figures

Figure 1

22 pages, 974 KB  
Article
Initial Synchronization Procedure and Doppler Pre-Compensation for LEO-SATCOM Terminals
by Marco Krondorf
Telecom 2025, 6(4), 81; https://doi.org/10.3390/telecom6040081 - 21 Oct 2025
Viewed by 419
Abstract
Wireless low earth orbit (LEO) satellite communication ground terminals need to perform an initial time and frequency synchronization to access to the LEO system. Initial synchronization consists of three steps: detecting the presence of the LEO satellite downlink signal, synchronizing the terminal receiver [...] Read more.
Wireless low earth orbit (LEO) satellite communication ground terminals need to perform an initial time and frequency synchronization to access to the LEO system. Initial synchronization consists of three steps: detecting the presence of the LEO satellite downlink signal, synchronizing the terminal receiver to the current Doppler frequency shift and performing Doppler pre-compensation before uplink signal transmission, and ensuring low probability of false alarm at low SNR in the LEO uplink receiver. This article explains this three step synchronization procedure in detail. The major advantage is that the synchronization procedure can be carried out even without a priori knowledge of the satellite orbit ephemeris or any sort of GNSS navigation data. Initial synchronization is of particular importance for typical LEO uplink signals which are formed of short radio bursts. The packet detection in burst traffic radio systems is a crucial task to accomplish start of frame detection. It triggers the start of the digital receiver algorithms to demodulate the incoming uplink burst. The packet detection is accomplished by cross-correlation and threshold detection which show significant probability of false alarm in low signal to noise (SNR) regions. Hence, before running a stable uplink connection, the terminal must accomplish the proposed initial synchronization procedure, as outlined in this article. Full article
Show Figures

Figure 1

22 pages, 2010 KB  
Article
Securing RSA Algorithm Against Side Channel Attacks
by Fayez Gebali and Alshimaa Magdy
Telecom 2025, 6(4), 80; https://doi.org/10.3390/telecom6040080 - 20 Oct 2025
Viewed by 463
Abstract
RSA’s modular exponentiation is the basic operation in public key infrastructure and is naturally the target of side-channel attacks. In this work we propose two algorithms that defeat side-channel attacks: Paired Permutation Exponentiation (PPE) and Permute, Split, and Accumulate (PSA). We compare these [...] Read more.
RSA’s modular exponentiation is the basic operation in public key infrastructure and is naturally the target of side-channel attacks. In this work we propose two algorithms that defeat side-channel attacks: Paired Permutation Exponentiation (PPE) and Permute, Split, and Accumulate (PSA). We compare these two algorithms with the classic right-to-left technique. All three implementations are evaluated using Intel® Performance Counter Monitor (PCM) at an effective 0.25 ms sampling interval. We use fixed 2048-bit inputs, pin the Python 3.9.13 process to a single core Intel® Core™ i5-10210U, and repeat each experiment 100 and 1000 times to characterize behavior and ensemble statistics. Our proposed technique PSA shows the lowest runtime and the strongest hardening against per-bit correlation relative to the standard RtL. Residual leakage related to the Hamming weight of the exponent may remain observable but the only information gathered is the the Hamming weight of the secret key. The exact location of the secret key bits is completely obscured. Full article
Show Figures

Figure 1

13 pages, 269 KB  
Article
Assessing Compliance in Child-Facing High-Risk AI IoT Devices: Legal Obligations Under the EU’s AI Act and GDPR
by Mohammed Rashed and Yasser Essa
Telecom 2025, 6(4), 79; https://doi.org/10.3390/telecom6040079 - 17 Oct 2025
Viewed by 540
Abstract
The rapid and ongoing adoption of smart home products, coupled with the increasing integration of artificial intelligence (AI), particularly in these products, is an undeniable reality. However, as both technologies converge, they also give rise to a range of significant concerns. The EU’s [...] Read more.
The rapid and ongoing adoption of smart home products, coupled with the increasing integration of artificial intelligence (AI), particularly in these products, is an undeniable reality. However, as both technologies converge, they also give rise to a range of significant concerns. The EU’s recent AI Act specifically addresses the challenges associated with the use of AI technology. In this study, we examine three AI-integrated products with toy capabilities that are sold in Spain, serving as a case study for the EU market of smart home devices that incorporate AI. Our research aims to identify potential compliance issues with both the AI Act and the General Data Protection Regulation (GDPR). Our results reveal a clear and worrying gap between the existing legislation and the functionalities of these devices. Using a normal user’s approach, we find that the privacy policies for these products, whose features make them high-risk AI systems, AI systems with systemic risk, or both as per the AI Act, fail to provide any information about AI usage, particularly of ChatGPT, which they all integrate. This raises significant concerns, especially as the market for such products will continue to grow. Without rigorous enforcement of existing legislation, the risk of misuse of sensitive personal information becomes even greater, making strict regulatory oversight essential to ensure user protection. Full article
19 pages, 2701 KB  
Article
RFID-Enabled Electronic Voting Framework for Secure Democratic Processes
by Stella N. Arinze and Augustine O. Nwajana
Telecom 2025, 6(4), 78; https://doi.org/10.3390/telecom6040078 - 16 Oct 2025
Viewed by 373
Abstract
The growing global demand for secure, transparent, and efficient electoral systems has highlighted the limitations of traditional voting methods, which remain susceptible to voter impersonation, ballot tampering, long queues, logistical challenges, and delayed result processing. To address these issues, this study presents the [...] Read more.
The growing global demand for secure, transparent, and efficient electoral systems has highlighted the limitations of traditional voting methods, which remain susceptible to voter impersonation, ballot tampering, long queues, logistical challenges, and delayed result processing. To address these issues, this study presents the design and implementation of a Radio Frequency Identification (RFID)-based electronic voting framework that integrates robust voter authentication, encrypted vote processing, and decentralized real-time monitoring. The system is developed as a scalable, cost-effective solution suitable for both urban and resource-constrained environments, especially those with limited infrastructure or inconsistent internet connectivity. It employs RFID-enabled smart voter cards containing encrypted unique identifiers, with each voter authenticated via an RC522 reader that validates their UID against an encrypted whitelist stored locally. Upon successful verification, the voter selects a candidate via a digital interface, and the vote is encrypted using AES-128 before being stored either locally on an SD card or transmitted through GSM to a secure backend. To ensure operability in offline settings, the system supports batch synchronization, where encrypted votes and metadata are uploaded once connectivity is restored. A tamper-proof monitoring mechanism logs each session with device ID, timestamps, and cryptographic checksums to maintain integrity and prevent duplication or external manipulation. Simulated deployments under real-world constraints tested the system’s performance against common threats such as duplicate voting, tag cloning, and data interception. Results demonstrated reduced authentication time, improved voter throughput, and strong resistance to security breaches—validating the system’s resilience and practicality. This work offers a hybrid RFID-based voting framework that bridges the gap between technical feasibility and real-world deployment, contributing a secure, transparent, and credible model for modernizing democratic processes in diverse political and technological landscapes. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

19 pages, 2314 KB  
Article
Utilization-Driven Performance Enhancement in Storage Area Networks
by Guixiang Lyu, Liudong Xing and Zhiguo Zeng
Telecom 2025, 6(4), 77; https://doi.org/10.3390/telecom6040077 - 11 Oct 2025
Viewed by 325
Abstract
Efficient resource utilization and low response times are critical challenges in storage area network (SAN) systems, especially as data-intensive applications like those driven by the Internet of Things and Artificial Intelligence place increasing demands on reliable, high-performance data storage solutions. Addressing these challenges, [...] Read more.
Efficient resource utilization and low response times are critical challenges in storage area network (SAN) systems, especially as data-intensive applications like those driven by the Internet of Things and Artificial Intelligence place increasing demands on reliable, high-performance data storage solutions. Addressing these challenges, this paper contributes by proposing a proactive, utilization-driven traffic redistribution strategy to achieve balanced load distribution across switches, thereby improving the overall SAN performance and alleviating the risk of overload-incurred cascading failures. The proposed approach incorporates a Jackson Queueing Network-based method to evaluate both utilization and response time of individual switches, as well as the overall system response time. Based on a comprehensive case study of a mesh SAN system, two key parameters—the transition probability adjustment step size and the node selection window size—are analyzed for their impact on the effectiveness of the proposed strategy, revealing several valuable insights into fine-tuning traffic redistribution parameters. Full article
Show Figures

Figure 1

26 pages, 1646 KB  
Article
Message Passing-Based Assignment for Efficient Handover Management in LEO Networks
by Gilang Raka Rayuda Dewa, Illsoo Sohn and Djati Wibowo Djamari
Telecom 2025, 6(4), 76; https://doi.org/10.3390/telecom6040076 - 10 Oct 2025
Viewed by 438
Abstract
As part of non-terrestrial networks (NTN), the Low Earth Orbit (LEO) plays a critical role in supporting high-throughput wireless communication. However, the high-speed mobility of LEO satellites, coupled with the high density of user terminals, makes efficient user assignment crucial in maintaining overall [...] Read more.
As part of non-terrestrial networks (NTN), the Low Earth Orbit (LEO) plays a critical role in supporting high-throughput wireless communication. However, the high-speed mobility of LEO satellites, coupled with the high density of user terminals, makes efficient user assignment crucial in maintaining overall wireless performance. The suboptimal assignment from LEO satellites to user terminals can result in frequent unnecessary handovers, rendering the user terminal unable to receive the entire downlink signal. Consequently, it reduces user rate and user satisfaction metrics. However, finding the optimum user assignment to reduce handover issues is categorized as a non-linear programming problem with a combinatorial number of possible solutions, resulting in excessive computational complexity. Therefore, this study proposes a distributed user assignment for the LEO networks. By utilizing message-passing frameworks that map the optimization problem into a graphical representation, the proposed algorithm splits the optimization problem into a local mapping issue, thereby significantly reducing computational complexity. By exchanging small messages iteratively, the proposed algorithm autonomously determines the near-optimal solution. The extensive simulation results demonstrate that the proposed algorithm significantly outperforms the conventional algorithm in terms of user rate and user satisfaction metric under various wireless parameters. Full article
Show Figures

Figure 1

24 pages, 658 KB  
Article
Securing Elliptic Curve Cryptography with Random Permutation of Secret Key
by Fayez Gebali and Alshimaa Magdy
Telecom 2025, 6(4), 75; https://doi.org/10.3390/telecom6040075 - 9 Oct 2025
Viewed by 485
Abstract
Scalar multiplication is the basis of the widespread elliptic curve public key cryptography. Standard scalar multiplication is vulnerable to side-channel attacks that are able to infer the secret bit values by observing the power or delay traces. This work utilizes the arithmetic properties [...] Read more.
Scalar multiplication is the basis of the widespread elliptic curve public key cryptography. Standard scalar multiplication is vulnerable to side-channel attacks that are able to infer the secret bit values by observing the power or delay traces. This work utilizes the arithmetic properties of scalar multiplication to propose two scalar multiplication algorithms to insulate ECC implementations from side-channel attacks. The two proposed designs rely on randomly permuting the ordering and storage locations of the different scalar multiplication values 2iG as well as the corresponding secret key bits ki. Statistical analysis and Python 3.9.13implementations confirm the validity of the two algorithms. Numerical results confirm that both designs produce the same results as the standard right-to-left scalar multiplication algorithm. Welch’s t-test as well as numerical simulations confirm the immunity of our proposed protocols to side-channel attacks. Full article
Show Figures

Figure 1

18 pages, 4299 KB  
Article
Unique Dielectric Protection for Microwave and Millimeter-Wave Antenna Applications
by Hafiz Usman Tahseen, Luca Francioso, Syed Shah Irfan Hussain and Luca Catarinucci
Telecom 2025, 6(4), 74; https://doi.org/10.3390/telecom6040074 - 4 Oct 2025
Viewed by 390
Abstract
Dielectric covers are generally used to provide external protection to antenna systems by providing electromagnetic transparency. They are utilized in ground applications as well as for protecting airborne, Sat Com, terrestrial and underwater antenna installations. This paper presents a unique and universal design [...] Read more.
Dielectric covers are generally used to provide external protection to antenna systems by providing electromagnetic transparency. They are utilized in ground applications as well as for protecting airborne, Sat Com, terrestrial and underwater antenna installations. This paper presents a unique and universal design of dielectric sandwich-layered cover that can effectively protect antennas operating in a large frequency band from 1 GHz to 28 GHz, including millimeter-wave and microwave ranges, with minimum insertion loss for various incident angles. The proposed single dielectric cover may give sufficient protection for an entire tower or chimney housing multiple antennas, ranging from first-generation to fifth-generation microwave base-station antennas, as well as other wireless/broadcast antennas in millimeter or lower frequency ranges. In the first step, optimum dielectric constant and thickness of the dielectric cover are calculated numerically through a MATLAB (R2015a) code. In the second step, a floquet port analysis is performed to observe the insertion loss through the transmission coefficient against various frequency band-spectrums in microwave and millimeter-wave ranges for validation of the proposed synthesis. The ANSYS 18.2 HFSS tool is used for the purpose. In the third step, fabrication of the dielectric-layered structure is completed with the optimum design parameters. In the final step, the dielectric package is tested under various fabricated antennas in different frequency ranges. Full article
Show Figures

Figure 1

17 pages, 3561 KB  
Article
A Compact Four-Element Multiple-Input Multiple-Output Array with an Integrated Frequency Selective Surface for Millimeter-Wave Applications
by Iftikhar Ud Din, Daud Khan, Arif Ullah, Messaoud Ahmed Ouameur and Bahram Razampoosh
Telecom 2025, 6(4), 73; https://doi.org/10.3390/telecom6040073 - 3 Oct 2025
Viewed by 429
Abstract
A compact fork-shaped four-element multiple-input multiple-output (MIMO) antenna system with wide bandwidth for 5G millimeter-wave (mmWave) applications is presented. The antenna elements are arranged orthogonally to achieve a compact footprint of 20×26mm2. To enhance the gain, a frequency [...] Read more.
A compact fork-shaped four-element multiple-input multiple-output (MIMO) antenna system with wide bandwidth for 5G millimeter-wave (mmWave) applications is presented. The antenna elements are arranged orthogonally to achieve a compact footprint of 20×26mm2. To enhance the gain, a frequency selective surface (FSS) is placed above the MIMO system, providing an average gain improvement of 1.5 dB across the entire operating band and achieving a peak gain of 7.5 dB at 41 GHz. The proposed design operates in the Ka-band (22–46 GHz), making it well suited for 5G communications. The antenna exhibits an isolation greater than 20 dB and radiation efficiency exceeding 80% across the band. Moreover, key MIMO performance metrics, including diversity gain (DG ≈ 10) and envelope correlation coefficient (ECC < 0.05), meet the required standards. A prototype of the proposed system was fabricated and measured, with the experimental results showing good agreement with simulations. Full article
Show Figures

Figure 1

17 pages, 620 KB  
Article
Closed-Form Approximation to the Average Symbol Error Probability for Cross-QAM over κμ Fading Channels with Experimental Validation in the Millimeter-Wave Band
by Wilian Eurípedes Vieira, Karine Barbosa Carbonaro, Gilberto Arantes Carrijo, Edson Agustini, André Antônio dos Anjos and Pedro Luiz Lima Bertarini
Telecom 2025, 6(4), 72; https://doi.org/10.3390/telecom6040072 - 2 Oct 2025
Viewed by 357
Abstract
This work presents a closed-form approximation to the symbol error probability (SEP) for cross-quadrature amplitude modulation (cross-QAM) schemes over κμ fading channels. The proposed formulation enables accurate performance evaluation while avoiding computationally expensive numerical integration. The analysis covers millimeter-wave (mmWave) frequencies [...] Read more.
This work presents a closed-form approximation to the symbol error probability (SEP) for cross-quadrature amplitude modulation (cross-QAM) schemes over κμ fading channels. The proposed formulation enables accurate performance evaluation while avoiding computationally expensive numerical integration. The analysis covers millimeter-wave (mmWave) frequencies at 55, 60, and 65 GHz, under both line-of-sight (LoS) and non-line-of-sight (nLoS) conditions, and for multiple transmitter–receiver polarization configurations. A key contribution of this work is the experimental validation of the theoretical expression with real channel-measurement data, which confirms the applicability of the κμ model in realistic mmWave scenarios. Furthermore, we perform a detailed parametric study to quantify the influence of κ and μ on adaptive modulation performance, providing practical insights for 5G and future 6G systems. The proposed framework bridges theoretical analysis and experimental validation, offering a computationally efficient and robust tool for the design and evaluation of advanced modulation schemes in generalized fading environments. Full article
Show Figures

Figure 1

15 pages, 846 KB  
Article
Machine-Learning-Based Adaptive Wireless Network Selection for Terrestrial and Non-Terrestrial Networks in 5G and Beyond
by Ahmet Yazar
Telecom 2025, 6(4), 71; https://doi.org/10.3390/telecom6040071 - 30 Sep 2025
Viewed by 476
Abstract
Non-terrestrial networks (NTNs) have become increasingly crucial, particularly with the standardization of fifth-generation (5G) technology. In parallel, the rise of Internet of Things (IoT) technologies has amplified the need for human-centric solutions in 5G and beyond (5 GB) systems. To address diverse communication [...] Read more.
Non-terrestrial networks (NTNs) have become increasingly crucial, particularly with the standardization of fifth-generation (5G) technology. In parallel, the rise of Internet of Things (IoT) technologies has amplified the need for human-centric solutions in 5G and beyond (5 GB) systems. To address diverse communication requirements from a human-centric perspective, leveraging the advantages of both terrestrial networks (TNs) and NTNs has emerged as a key focus for 5 GB communications. In this paper, a machine learning (ML)-based approach is proposed to facilitate decision making between TN and NTN networks within a multi-connectivity scenario, aiming to provide a human-centric solution. For this approach, a novel synthetic dataset is constructed using various sensing information, based on the assumption that numerous interconnected sensor systems will be available in smart city networks with sixth-generation (6G) technologies. The ML results are derived from this newly generated dataset. These simulation results demonstrate that the proposed approach, designed to meet the requirements of next-generation systems, can be effectively utilized with 6G. Full article
Show Figures

Figure 1

Previous Issue
Back to TopTop