-
BloodChain: A Blood Donation Network Managed by Blockchain Technologies
-
Unmanned Agricultural Tractors in Private Mobile Networks
-
Energy-Aware Security Adaptation for Low-Power IoT Applications
-
Large Geographical Area Aerial Surveillance Systems Data Network Infrastructure Managed by Artificial Intelligence and Certified over Blockchain: A Review
-
A Study of 5G Edge-Central Core Network Split Options
Journal Description
Network
Network
is an international, peer-reviewed, open access journal on science and technology of networks, published quarterly online by MDPI.
- Open Access—free to download, share, and reuse content. Authors receive recognition for their contribution when the paper is reused.
- Rapid Publication: first decisions in 15 days; acceptance to publication in 3 days (median values for MDPI journals in the second half of 2021).
- Recognition of Reviewers: APC discount vouchers, optional signed peer review, and reviewer names published annually in the journal.
- Network is a companion journal of Electronics.
Latest Articles
Energy Efficient Access Point Placement for Distributed Massive MIMO
Network 2022, 2(2), 288-310; https://doi.org/10.3390/network2020019 - 11 May 2022
Abstract
►
Show Figures
Distributed massive multiple-input multiple-output (D-mMIMO) is one of the key candidate technologies for future wireless networks. A D-mMIMO system has multiple, geographically distributed, access points (APs) jointly serving its users. First of all, this paper reports on where to position these APs to
[...] Read more.
Distributed massive multiple-input multiple-output (D-mMIMO) is one of the key candidate technologies for future wireless networks. A D-mMIMO system has multiple, geographically distributed, access points (APs) jointly serving its users. First of all, this paper reports on where to position these APs to minimize the overall transmit power in actual deployments. As a second contribution, we show that it is essential to take into account both the radiation pattern of the antenna array and the environment information when optimizing AP placement. Neglecting the radiation pattern and environment information, as generally assumed in the literature, can lead to a power penalty in the order of 15 and 20 , respectively. These results have been obtained by formulating the AP placement optimization problem as a combinatorial optimization problem, which can be solved with different approaches where different channel models are applied. The proposed graph-based channel model drastically lowers the computational time with respect to using an ray-tracing simulator (RTS) for channel evaluation. The performance of the graph-based approach is validated via the RTS, showing that it achieves 5 power saving on average compared with a Euclidean distance-based approach, which is the most commonly used approach in the literature.
Full article
Open AccessArticle
An Atmospheric Turbulence Compensation Algorithm Based on FSM-DM Cascaded AO Architecture for FSO Communications
Network 2022, 2(2), 270-287; https://doi.org/10.3390/network2020018 - 05 May 2022
Abstract
Free-space optics (FSO) communication enjoys desirable modulation rates at unexploited frequency bands, however, its application is hindered by atmospheric turbulence which causes phase shifting in laser links. Although a single deformable mirror (DM) adaptive optics (AO) system is a good solution, its performance
[...] Read more.
Free-space optics (FSO) communication enjoys desirable modulation rates at unexploited frequency bands, however, its application is hindered by atmospheric turbulence which causes phase shifting in laser links. Although a single deformable mirror (DM) adaptive optics (AO) system is a good solution, its performance remains unsatisfactory as the proportion of tilts aberrations becomes relatively high. This condition happens when the incident angle of the laser beam for the optical receiver dynamically shifts. To tackle this problem, we introduce a fast steering mirror (FSM), DM cascaded AO architecture, based upon which we also propose an atmospheric turbulence compensation algorithm. In this paper, we compare the compensation ability of FSM and DM towards tilts aberrations. Furthermore, we gain model matrices for FSM and DM from testbed and simulatively verify the effectiveness of our work. For a Kolmogorov theory-based atmospheric turbulence disturbed incident laser beam where the tilt components take up of the total proportion of wavefront aberrations, our proposed architecture compensates the input wavefront to a residual wavefront root mean square (RMS) of wavelength, compared to wavelength for single DM architecture. The study intends to overcome atmospheric turbulence and has the potential to guide the development of future FSO communications.
Full article
(This article belongs to the Special Issue Advances in Hybrid Radio Frequency (RF) and Optical Wireless Communication (OWC) Systems)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
Cooperative SWIPT MIMO-NOMA for Reliable THz 6G Communications
Network 2022, 2(2), 257-269; https://doi.org/10.3390/network2020017 - 24 Apr 2022
Abstract
►▼
Show Figures
In this paper, cooperative simultaneous wireless information and power transfer (SWIPT) terahertz (THz) multiple-input multiple-output (MIMO) nonorthogonal multiple access (NOMA) are considered. The aim is to improve wireless connectivity, resource management, scalability, and user fairness, as well as to enhance the overall performance
[...] Read more.
In this paper, cooperative simultaneous wireless information and power transfer (SWIPT) terahertz (THz) multiple-input multiple-output (MIMO) nonorthogonal multiple access (NOMA) are considered. The aim is to improve wireless connectivity, resource management, scalability, and user fairness, as well as to enhance the overall performance of wireless communications and reliability. We optimized the current wireless communication systems by utilizing MIMO-NOMA technology and THz frequencies, exploring the performance and gains obtained. Hence, we developed a path-selection mechanism for the far user to enhance the system performance. The EH SWIPT approach used to improve THz communications performance was investigated. Moreover, we proposed a reliable transmission mechanism with a non-LoS (NLoS) line of THz communications for open areas or any location where the intelligent reflecting surface (IRS) cannot be deployed, in addition to using the cheap decode-forward (DF) relaying instead of IRS. The performance and scalability of the upgradeable system were examined, using adjustable parameters and the simplest modulation scheme. The system presents a noticeable improvement in energy efficiency (EE) and spectral efficiency (SE), in addition to reliability. Accordingly, the outcome showed an improvement in the overall reliability, SE, EE, and outage probability as compared to the conventional cooperative networks of the recent related work (e.g., cooperative MIMO-NOMA with THz) by multiple times with a simpler design, whereas it outperformed our previous work, i.e., cooperative SWIPT SISO-NOMA with THz, by more than 50%, with a doubled individual user gain. This system reduces the transceiver hardware and improves reliability with increasing transmission rates.
Full article

Figure 1
Open AccessArticle
Towards Secure Searchable Electronic Health Records Using Consortium Blockchain
Network 2022, 2(2), 239-256; https://doi.org/10.3390/network2020016 - 20 Apr 2022
Abstract
►▼
Show Figures
There are significant data privacy implications associated with Electronic Health Records (EHRs) sharing among various untrusted healthcare entities. Recently, a blockchain-based EHRs sharing system has provided many benefits. Decentralization, anonymity, unforgeability, and verifiability are all unique properties of blockchain technology. In this paper,
[...] Read more.
There are significant data privacy implications associated with Electronic Health Records (EHRs) sharing among various untrusted healthcare entities. Recently, a blockchain-based EHRs sharing system has provided many benefits. Decentralization, anonymity, unforgeability, and verifiability are all unique properties of blockchain technology. In this paper, we propose a secure, blockchain-based EHR sharing system. After receiving the data owner’s authorization, the data requester can use the data provider’s keyword search to discover relevant EHRs on the EHR consortium blockchain and obtain the re-encryption ciphertext from the proxy server. To attain privacy, access control and data security, the proposed technique uses asymmetric searchable encryption and conditional proxy re-encryption. Likewise, proof of permission serves in consortium blockchains as the consensus method to ensure the system’s availability. The proposed protocol can achieve the specified security goals, according to the security analysis. In addition, we simulate basic cryptography and put the developed protocol into practice on the Ethereum platform. The analysis results suggest that the developed protocol is computationally efficient.
Full article

Figure 1
Open AccessFeature PaperArticle
Performance Evaluation of Machine Learning and Neural Network-Based Algorithms for Predicting Segment Availability in AIoT-Based Smart Parking
Network 2022, 2(2), 225-238; https://doi.org/10.3390/network2020015 - 08 Apr 2022
Abstract
►▼
Show Figures
Finding an available parking place has been considered a challenge for drivers in large-size smart cities. In a smart parking application, Artificial Intelligence of Things (AIoT) can help drivers to save searching time and automotive fuel by predicting short-term parking place availability. However,
[...] Read more.
Finding an available parking place has been considered a challenge for drivers in large-size smart cities. In a smart parking application, Artificial Intelligence of Things (AIoT) can help drivers to save searching time and automotive fuel by predicting short-term parking place availability. However, performance of various Machine Learning and Neural Network-based (MLNN) algorithms for predicting parking segment availability can be different. To find the most suitable MLNN algorithm for the above mentioned application, this paper evaluates performance of a set of well-known MLNN algorithms as well as different combinations of them (i.e., known as Ensemble Learning or Voting Classifier) based on a real parking datasets. The datasets contain around five millions records of the measured parking availability in San Francisco. For evaluation, in addition to the cross validation scores, we consider resource requirements, simplicity and execution time (i.e., including both training and testing times) of algorithms. Results show that while some ensemble learning algorithms provide the best performance in aspect of validation score, they consume a noticeable amount of computing and time resources. On the other hand, a simple Decision Tree (DT) algorithm provides a much faster execution time than ensemble learning algorithms, while its performance is still acceptable (e.g., DT’s accuracy is less than 1% lower than the best ensemble algorithm). We finally propose and simulate a recommendation system using the DT algorithm. We have found that around 77% of drivers can not find a free spot in their selected destinations (i.e., street or segment) and estimated that the recommendation system, by introducing alternative closest vacant locations to destinations, can save, in total, 3500 min drivers searching time for 1000 parking spot requests. It can also help to reduce the traffic and save a noticeable amount of automotive fuel.
Full article

Figure 1
Open AccessFeature PaperArticle
Privacy-Aware Access Protocols for MEC Applications in 5G
Network 2022, 2(2), 203-224; https://doi.org/10.3390/network2020014 - 01 Apr 2022
Abstract
Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We
[...] Read more.
Multi-access edge computing (MEC) is one of the emerging key technologies in fifth generation (5G) mobile networks, providing reduced end-to-end latency for applications and reduced load in the transport network. This paper proposes mechanisms to enhance user privacy in MEC within 5G. We consider a basic MEC usage scenario, where the user accesses an application hosted in the MEC platform via the radio access network of the mobile network operator (MNO). First, we create a system model based on this scenario. Second, we define the adversary model and give the list of privacy requirements for this system model. We also analyze the impact on user privacy when some of the parties in our model share information that is not strictly needed for providing the service. Third, we introduce a privacy-aware access protocol for the system model and analyze this protocol against the privacy requirements.
Full article
(This article belongs to the Special Issue Blockchain and Machine Learning for IoT: Security and Privacy Challenges)
►▼
Show Figures

Figure 1
Open AccessArticle
EchoIA: A Cloud-Based Implicit Authentication Leveraging User Feedback
Network 2022, 2(1), 190-202; https://doi.org/10.3390/network2010013 - 21 Mar 2022
Abstract
Implicit authentication (IA) transparently authenticates users by utilizing their behavioral data sampled from various sensors. Identifying the illegitimate user through constantly analyzing current users’ behavior, IA adds another layer of protection to the smart device. Due to the diversity of human behavior, existing
[...] Read more.
Implicit authentication (IA) transparently authenticates users by utilizing their behavioral data sampled from various sensors. Identifying the illegitimate user through constantly analyzing current users’ behavior, IA adds another layer of protection to the smart device. Due to the diversity of human behavior, existing research tends to utilize multiple features to identify users, which is less efficient. Irrelevant features may increase the system delay and reduce the authentication accuracy. However, dynamically choosing the best suitable features for each user (personal features) requires a massive calculation, making it infeasible in the real environment. In this paper, we propose EchoIA to find personal features with a small amount of calculation by leveraging user feedback derived from the correct rate of inputted passwords. By analyzing the feedback, EchoIA can deduce the true identities of current users and achieve a human-centered implicit authentication. In the authentication phase, our approach maintains transparency, which is the major advantage of IA. In the past two years, we conducted a comprehensive experiment to evaluate EchoIA. We compared it with four state-of-the-art IA schemes in the aspect of authentication accuracy and efficiency. The experiment results show that EchoIA has better authentication accuracy (93%) and less energy consumption (23-h battery lifetimes) than other IA schemes.
Full article
(This article belongs to the Special Issue Advances in Edge and Cloud Computing)
►▼
Show Figures

Figure 1
Open AccessArticle
Cluster-Based Transmission Diversity Optimization in Ultra Reliable Low Latency Communication
Network 2022, 2(1), 168-189; https://doi.org/10.3390/network2010012 - 17 Mar 2022
Abstract
►▼
Show Figures
Intra-vehicular communication is an emerging technology explored spontaneously due to higher wireless sensor-based application demands. To meet the upcoming market demands, the current intra-vehicular communication transmission reliability and latency should be improved significantly to fit with the existing 5G and upcoming 6G communication
[...] Read more.
Intra-vehicular communication is an emerging technology explored spontaneously due to higher wireless sensor-based application demands. To meet the upcoming market demands, the current intra-vehicular communication transmission reliability and latency should be improved significantly to fit with the existing 5G and upcoming 6G communication domains. Ultra-Reliable Low-Latency Communication (URLLC) can be widely used to enhance the quality of communication and services of 5G and beyond. The 5G URLLC service is highly dependable for transmission reliability and minimizing data transmission latency. In this paper, a multiple-access scheme named Cluster-based Orthogonal Frequency Subcarrier-based Multiple Access (C-OFSMA) is proposed with 5G URLLC’s high requirement adaptation for intra-vehicular data transmission. The URLLC demanded high reliability of approximately 99.999% of the data transmission within the extremely short latency of less than 1 ms. C-OFSMA enhanced the transmission diversity, which secured more successful data transmission to fulfill these high requirements and adapt to such a network environment. In C-OFSMA, the available sensors transmit data over specific frequency channels where frequency selection is random and special sensors (audio and video) transmit data over dedicated frequency channels. The minimum number of subcarrier channels was evaluated for different arrival rates and different packet duplication conditions in order to achieve 99.999% reliability within an air-interface latency of 0.2 ms. For the fixed frequency channel condition, C-OFSMA and OFSMA were compared in terms of reliability response and other packet duplication. Moreover, the optimal number of clusters was also evaluated in the aspects of the reliability response for the C-OFSMA system.
Full article

Figure 1
Open AccessFeature PaperArticle
5G Network Slice Isolation
Network 2022, 2(1), 153-167; https://doi.org/10.3390/network2010011 - 08 Mar 2022
Abstract
This article reveals an adequate comprehension of basic defense, security challenges, and attack vectors in deploying multi-network slicing. Network slicing is a revolutionary concept of providing mobile network on-demand and expanding mobile networking business and services to a new era. The new business
[...] Read more.
This article reveals an adequate comprehension of basic defense, security challenges, and attack vectors in deploying multi-network slicing. Network slicing is a revolutionary concept of providing mobile network on-demand and expanding mobile networking business and services to a new era. The new business paradigm and service opportunities are encouraging vertical industries to join and develop their own mobile network capabilities for enhanced performances that are coherent with their applications. However, a number of security concerns are also raised in this new era. In this article, we focus on the deployment of multi-network slicing with multi-tenancy. We identify the security concerns and discuss the defense approaches such as network slice isolation and insulation in a multi-layer network slicing security model. Furthermore, we identify the importance to appropriately select the network slice isolation points and propose a generic framework to optimize the isolation policy regarding the implementation cost while guaranteeing the security and performance requirements.
Full article
(This article belongs to the Special Issue Network Slicing)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
A Low-Overhead Message Authentication and Secure Message Dissemination Scheme for VANETs
by
and
Network 2022, 2(1), 139-152; https://doi.org/10.3390/network2010010 - 07 Mar 2022
Abstract
►▼
Show Figures
Given the enormous interest shown by customers as well as industry in autonomous vehicles, the concept of Internet of Vehicles (IoV) has evolved from Vehicular Ad hoc NETworks (VANETs). VANETs are likely to play an important role in Intelligent Transportation Systems (ITS). VANETs
[...] Read more.
Given the enormous interest shown by customers as well as industry in autonomous vehicles, the concept of Internet of Vehicles (IoV) has evolved from Vehicular Ad hoc NETworks (VANETs). VANETs are likely to play an important role in Intelligent Transportation Systems (ITS). VANETs based on fixed infrastructures, called Road Side Units ( s), have been extensively studied. Efficient, authenticated message dissemination in VANETs is important for the timely delivery of authentic messages to vehicles in appropriate regions in the VANET. Many of the approaches proposed in the literature use s to collect events (such as accidents, weather conditions, etc.) observed by vehicles in its region, authenticate them, and disseminate them to vehicles in appropriate regions. However, as the number of messages received by s increases in the network, the computation and communication overhead for s related to message authentication and dissemination also increases. We address this issue and propose a low-overhead message authentication and dissemination scheme in this paper. We compare the overhead, related to authentication and message dissemination, of our approach with an existing approach and also present an analysis of privacy and security implications of our approach.
Full article

Figure 1
Open AccessFeature PaperReview
Cybersecurity Challenges in the Maritime Sector
Network 2022, 2(1), 123-138; https://doi.org/10.3390/network2010009 - 07 Mar 2022
Abstract
Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which until now was considered safe due to
[...] Read more.
Cyberattacks have been rapidly increasing over the years, resulting to big financial losses to businesses for recovery, regulatory sanctions, as well as collateral damages, such as reputation and trust. In this respect, the maritime sector, which until now was considered safe due to the lack of Internet connectivity and the isolated nature of ships in the sea, is showing a 900% increase in cybersecurity breaches on operational technology as it enters the digital era. Although some research is being conducted in this area, maritime cybersecurity has not been deeply investigated. Hence, this paper provides a close investigation of the landscape of cybersecurity in the maritime sector with the aim of highlighting security problems and challenges. First, it explores the systems available on ships that could be targeted by attackers, their possible vulnerabilities that an attacker could exploit, the consequences if the system is accessed, and actual incidents. Then, it describes and analyses possible mitigation actions that can be utilised in advance to prevent such attacks. Finally, several challenges and open problems are discussed for future research.
Full article
(This article belongs to the Special Issue Advances on Networks and Cyber Security)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
A Dynamic Service Placement Based on Deep Reinforcement Learning in Mobile Edge Computing
Network 2022, 2(1), 106-122; https://doi.org/10.3390/network2010008 - 24 Feb 2022
Abstract
Mobile edge computing is an emerging paradigm that supplies computation, storage, and networking resources between end devices and traditional cloud data centers. With increased investment of resources, users demand a higher quality-of-service (QoS). However, it is nontrivial to maintain service performance under the
[...] Read more.
Mobile edge computing is an emerging paradigm that supplies computation, storage, and networking resources between end devices and traditional cloud data centers. With increased investment of resources, users demand a higher quality-of-service (QoS). However, it is nontrivial to maintain service performance under the erratic activities of end-users. In this paper, we focus on the service placement problem under the continuous provisioning scenario in mobile edge computing for multiple mobile users. We propose a novel dynamic placement framework based on deep reinforcement learning (DSP-DRL) to optimize the total delay without overwhelming the constraints on physical resources and operational costs. In the learning framework, we propose a new migration conflicting resolution mechanism to avoid the invalid state in the decision module. We first formulate the service placement under the migration confliction into a mixed-integer linear programming (MILP) problem. Then, we propose a new migration conflict resolution mechanism to avoid the invalid state and approximate the policy in the decision modular according to the introduced migration feasibility factor. Extensive evaluations demonstrate that the proposed dynamic service placement framework outperforms baselines in terms of efficiency and overall latency.
Full article
(This article belongs to the Special Issue Advances in Edge and Cloud Computing)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
Resource-Conserving Protection against Energy Draining (RCPED) Routing Protocol for Wireless Sensor Networks
Network 2022, 2(1), 83-105; https://doi.org/10.3390/network2010007 - 11 Feb 2022
Abstract
►▼
Show Figures
This paper proposes a routing protocol for wireless sensor networks to deal with energy-depleting vampire attacks. This resource-conserving protection against energy-draining (RCPED) protocol is compatible with existing routing protocols to detect abnormal signs of vampire attacks and identify potential attackers. It responds to
[...] Read more.
This paper proposes a routing protocol for wireless sensor networks to deal with energy-depleting vampire attacks. This resource-conserving protection against energy-draining (RCPED) protocol is compatible with existing routing protocols to detect abnormal signs of vampire attacks and identify potential attackers. It responds to attacks by selecting routes with the maximum priority, where priority is an indicator of energy efficiency and estimation of security level calculated utilizing an analytic hierarchy process (AHP). RCPED has no dependence on cryptography, which consumes less energy and hardware resources than previous approaches. Simulation results show the benefits of RCPED in terms of energy efficiency and security awareness.
Full article

Figure 1
Open AccessEditorial
Acknowledgment to Reviewers of Network in 2021
Network 2022, 2(1), 81-82; https://doi.org/10.3390/network2010006 - 11 Feb 2022
Abstract
Rigorous peer-reviews are the basis of high-quality academic publishing [...]
Full article
Open AccessFeature PaperArticle
Delegated Proof of Secret Sharing: A Privacy-Preserving Consensus Protocol Based on Secure Multiparty Computation for IoT Environment
Network 2022, 2(1), 66-80; https://doi.org/10.3390/network2010005 - 25 Jan 2022
Abstract
►▼
Show Figures
With the rapid advancement and wide application of blockchain technology, blockchain consensus protocols, which are the core part of blockchain systems, along with the privacy issues, have drawn much attention from researchers. A key aspect of privacy in the blockchain is the sensitive
[...] Read more.
With the rapid advancement and wide application of blockchain technology, blockchain consensus protocols, which are the core part of blockchain systems, along with the privacy issues, have drawn much attention from researchers. A key aspect of privacy in the blockchain is the sensitive content of transactions in the permissionless blockchain. Meanwhile, some blockchain applications, such as cryptocurrencies, are based on low-efficiency and high-cost consensus protocols, which may not be practical and feasible for other blockchain applications. In this paper, we propose an efficient and privacy-preserving consensus protocol, called Delegated Proof of Secret Sharing (DPoSS), which is inspired by secure multiparty computation. Specifically, DPoSS first uses polynomial interpolation to select a dealer group from many nodes to maintain the consensus of the blockchain system, in which the dealers in the dealer group take turns to pack the new block. In addition, since the content of transactions is sensitive, our proposed design utilizes verifiable secret sharing to protect the privacy of transmission and defend against the malicious attacks. Extensive experiments show that the proposed consensus protocol achieves fairness during the process of reaching consensus.
Full article

Figure 1
Open AccessFeature PaperArticle
Challenges in Physical Layer Security for Visible Light Communication Systems
Network 2022, 2(1), 53-65; https://doi.org/10.3390/network2010004 - 20 Jan 2022
Cited by 1
Abstract
This article highlights challenges associated with securing visible light communication (VLC) systems by using physical layer security (PLS) techniques. Motivated by the achievements in PLS studies for radio frequency (RF) communication, many PLS techniques for VLC systems were also rigorously investigated by tailoring
[...] Read more.
This article highlights challenges associated with securing visible light communication (VLC) systems by using physical layer security (PLS) techniques. Motivated by the achievements in PLS studies for radio frequency (RF) communication, many PLS techniques for VLC systems were also rigorously investigated by tailoring the RF techniques to the VLC environment. However, careful consideration of the inherent differences between RF and VLC systems is still needed. By disregarding these differences, an eavesdropper could be given an opportunity to wiretap the VLC systems, even when PLS techniques are employed to protect them. Crucially, the fact that it is often not possible to know the number and locations of eavesdroppers in real VLC systems may allow eavesdroppers to devise various cooperative eavesdropping methods. By examining a few examples of the possible eavesdropper threats that can occur in VLC systems, this article offers novel insights into the vulnerabilities of state-of-the-art PLS schemes for VLC systems. Although the focus of the paper is mostly on these weaknesses, some potential solutions are also briefly proposed with a view to stimulating discourse in the community.
Full article
(This article belongs to the Special Issue Advances in Hybrid Radio Frequency (RF) and Optical Wireless Communication (OWC) Systems)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
Energy-Aware Security Adaptation for Low-Power IoT Applications
by
and
Network 2022, 2(1), 36-52; https://doi.org/10.3390/network2010003 - 14 Jan 2022
Abstract
►▼
Show Figures
The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed
[...] Read more.
The constant evolution in communication infrastructures will enable new Internet of Things (IoT) applications, particularly in areas that, up to today, have been mostly enabled by closed or proprietary technologies. Such applications will be enabled by a myriad of wireless communication technologies designed for all types of IoT devices, among which are the Long-Range Wide-Area Network (LoRaWAN) or other Low-power and Wide-Area Networks (LPWAN) communication technologies. This applies to many critical environments, such as industrial control and healthcare, where wireless communications are yet to be broadly adopted. Two fundamental requirements to effectively support upcoming critical IoT applications are those of energy management and security. We may note that those are, in fact, contradictory goals. On the one hand, many IoT devices depend on the usage of batteries while, on the other hand, adequate security mechanisms need to be in place to protect devices and communications from threats against their stability and security. With thismotivation in mind, we propose a solution to address the management, in tandem, of security and energy in LoRaWAN IoT communication environments. We propose and evaluate an architecture in the context of which adaptation logic is used to manage security and energy dynamically, with the goal of guaranteeing appropriate security, while promoting the lifetime of constrained sensing devices. The proposed solution was implemented and experimentally evaluated and was observed to successfully manage security and energy. Security and energy are managed in line with the requirements of the application at hand, the characteristics of the constrained sensing devices employed and the detection, as well as the threat, of particular types of attacks.
Full article

Figure 1
Open AccessArticle
BloodChain: A Blood Donation Network Managed by Blockchain Technologies
Network 2022, 2(1), 21-35; https://doi.org/10.3390/network2010002 - 13 Jan 2022
Abstract
Due to the rapid change of population structure, leading to lower birth rates and quick aging rates, the demand for blood supply is increasing significantly. In most countries, blood quality and origin are managed by blood management information systems, such as national authorities.
[...] Read more.
Due to the rapid change of population structure, leading to lower birth rates and quick aging rates, the demand for blood supply is increasing significantly. In most countries, blood quality and origin are managed by blood management information systems, such as national authorities. Nevertheless, the traditional system has limitations in this field, such as a lack of detailed blood information, making it challenging to manage blood quality, supply, and demand. Hence, to solve these issues, this paper proposes a blockchain-based system called BloodChain, an improved system to support blood information management, providing more detailed information about blood, such as blood consumption and disposal. BloodChain exploits private blockchain techniques with a limited number of relatively fast and reliable participants, making them suitable for B2B (Business to Business) transactions. In this paper, we also develop a proposed system based on the architecture of Hyperledger Fabric. The evaluation of BloodChain is performed in several scenarios to prove our proposed model’s effectiveness.
Full article
(This article belongs to the Special Issue Blockchain and Machine Learning for IoT: Security and Privacy Challenges)
►▼
Show Figures

Figure 1
Open AccessFeature PaperArticle
Unmanned Agricultural Tractors in Private Mobile Networks
by
, , , , , , , , , and
Network 2022, 2(1), 1-20; https://doi.org/10.3390/network2010001 - 30 Dec 2021
Abstract
►▼
Show Figures
The need for high-quality communications networks is urgent in data-based farming. A particular challenge is how to achieve reliable, cost-efficient, secure, and broadband last-mile data transfer to enable agricultural machine control. The trialed ad hoc private communications networks built and interconnected with different
[...] Read more.
The need for high-quality communications networks is urgent in data-based farming. A particular challenge is how to achieve reliable, cost-efficient, secure, and broadband last-mile data transfer to enable agricultural machine control. The trialed ad hoc private communications networks built and interconnected with different alternative wireless technologies, including 4G, 5G, satellite and tactical networks, provide interesting practical solutions for connectivity. A remotely controlled tractor is exemplified as a use case of machine control in the demonstrated private communication network. This paper describes the results of a comparative technology analysis and a field trial in a realistic environment. The study includes the practical implementation of video monitoring and the optimization of the control channel for remote-controlled unmanned agricultural tractors. The findings from this study verify and consolidate the requirements for network technologies and for cybersecurity enablers. They highlight insights into the suitability of different wireless technologies for smart farming and tractor scenarios and identify potential paths for future research.
Full article

Figure 1
Open AccessArticle
A Study of 5G Edge-Central Core Network Split Options
Network 2021, 1(3), 354-368; https://doi.org/10.3390/network1030020 - 20 Dec 2021
Cited by 1
Abstract
With the wide adoption of edge compute infrastructures, an opportunity has arisen to deploy part of the functionality at the edge of the network to enable a localized connectivity service. This development is also supported by the adoption of “on-premises” local 5G networks
[...] Read more.
With the wide adoption of edge compute infrastructures, an opportunity has arisen to deploy part of the functionality at the edge of the network to enable a localized connectivity service. This development is also supported by the adoption of “on-premises” local 5G networks addressing the needs of different vertical industries and by new standardized infrastructure services such as Mobile Edge Computing (MEC). This article introduces a comprehensive set of deployment options for the 5G network and its network management, complementing MEC with the connectivity service and addressing different classes of use cases and applications. We have also practically implemented and tested the newly introduced options in the form of slices within a standard-based testbed. Our performed validation proved their feasibility and gave a realistic perspective on their impact. The qualitative assessment of the connectivity service gives a comprehensive overview on which solution would be viable to be deployed for each vertical market and for each large-scale operator situation, making a step forward towards automated distributed 5G deployments.
Full article
(This article belongs to the Special Issue Emerging Networks and Systems for Edge Computing)
►▼
Show Figures

Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, Electronics, Modelling, Network, J. Imaging
Computer Vision and Image Processing
Topic Editors: Pedro Latorre-Carmona, Filiberto Pla, Samuel MorillasDeadline: 30 June 2023

Conferences
Special Issues
Special Issue in
Network
Emerging Networks and Systems for Edge Computing
Guest Editors: Posco Fung Po Tso, Takahiro Shinagawa, Kiho LimDeadline: 30 June 2022
Special Issue in
Network
Blockchain and Machine Learning for IoT: Security and Privacy Challenges
Guest Editors: Michele Mastroianni, Francesco PalmieriDeadline: 31 July 2022
Special Issue in
Network
Advanced Technologies in Network and Service Management
Guest Editors: Hakim Mellah, Filippo MalandraDeadline: 30 September 2022
Special Issue in
Network
Innovative Mobile Communication and Sensing Systems
Guest Editors: Tianxing Li, Nidal NasserDeadline: 31 October 2022