applsci-logo

Journal Browser

Journal Browser

Wireless Networking: Application and Development

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: 20 October 2025 | Viewed by 3504

Special Issue Editors


E-Mail Website
Guest Editor
Hellenic Institute of Transport, Centre for Research and Technology Hellas, 57001 Thermi, Greece
Interests: wireless networks; stochastic network optimization; practical algorithms of wireless parameters
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Hellenic Institute of Transport (HIT), Center for Research and Technology Hellas (CERTH), 57001 Thermi, Greece
Interests: predictive maintenance; IoT; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

This Special Issue fosters research in the domain of wireless networking, a particularly pertinent subject in today's landscape, encompassing telecommunications—a domain generating considerable interest. We are seeking not only contributions that delve into the practical facets of wireless network research but also robust theoretical works that significantly contribute to the advancement of the field. While emphasizing practical aspects, the scope extends beyond, recognizing the importance of substantial theoretical contributions that push the boundaries of knowledge. Additionally, we welcome case studies depicting real-world deployments, amplifying the understanding and application of advanced wireless networks across diverse domains. The overarching aim is to provide a platform where research seamlessly integrates theory and practice, facilitating a comprehensive exploration of the multifaceted landscape of wireless networking.

For this Special Issue, we will accept research papers that include, but are not limited to, the following subjects:

  • 5G and beyond: encompassing the latest progress in wireless networking technologies (including developments in 5G) and beyond (including 6G).
  • Real-world applications: researching and producing practical cases of wireless networking across diverse industries like healthcare, smart cities, Internet of Things (IoT), and others.
  • Wireless security: investigation of cyber threats and new mechanisms of protection, including the zero-trust model.
  • SDN and NFV: exploring tools, frameworks, and methodologies essential for crafting wireless networking solutions, such as software-defined networking (SDN) and network function virtualization (NFV).
  • Optimisation: original ideas on the optimisation of cases, such as load balancing, cognitive radio, transmission power control, and rate control, among others.
  • MAC and routing protocols: new MAC and routing protocols that can be used in the wireless networking and telecommunications domain.

Dr. Evangelos Spyrou
Dr. Vassilios Kappatos
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • wireless networking
  • telecommunications
  • cross-layer development
  • optimisation
  • 5G and beyond
  • real-world applications

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • Reprint: MDPI Books provides the opportunity to republish successful Special Issues in book format, both online and in print.

Further information on MDPI's Special Issue policies can be found here.

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

17 pages, 1985 KB  
Article
Game-Theoretic Secure Socket Transmission with a Zero Trust Model
by Evangelos D. Spyrou, Vassilios Kappatos and Chrysostomos Stylios
Appl. Sci. 2025, 15(19), 10535; https://doi.org/10.3390/app151910535 - 29 Sep 2025
Abstract
A significant problem in cybersecurity is to accurately detect malicious network activities in real-time by analyzing patterns in socket-level packet transmissions. This challenge involves distinguishing between legitimate and adversarial behaviors while optimizing detection strategies to minimize false alarms and resource costs under intelligent, [...] Read more.
A significant problem in cybersecurity is to accurately detect malicious network activities in real-time by analyzing patterns in socket-level packet transmissions. This challenge involves distinguishing between legitimate and adversarial behaviors while optimizing detection strategies to minimize false alarms and resource costs under intelligent, adaptive attacks. This paper presents a comprehensive framework for network security by modeling socket-level packet transmissions and extracting key features for temporal analysis. A long short-term memory (LSTM)-based anomaly detection system predicts normal traffic behavior and identifies significant deviations as potential cyber threats. Integrating this with a zero trust signaling game, the model updates beliefs about agent legitimacy based on observed signals and anomaly scores. The interaction between defender and attacker is formulated as a Stackelberg game, where the defender optimizes detection strategies anticipating attacker responses. This unified approach combines machine learning and game theory to enable robust, adaptive cybersecurity policies that effectively balance detection performance and resource costs in adversarial environments. Two baselines are considered for comparison. The static baseline applies fixed transmission and defense policies, ignoring anomalies and environmental feedback, and thus serves as a control case of non-reactive behavior. In contrast, the adaptive non-strategic baseline introduces simple threshold-based heuristics that adjust to anomaly scores, allowing limited adaptability without strategic reasoning. The proposed fully adaptive Stackelberg strategy outperforms both partial and discrete adaptive baselines, achieving higher robustness across trust thresholds, superior attacker–defender utility trade-offs, and more effective anomaly mitigation under varying strategic conditions. Full article
(This article belongs to the Special Issue Wireless Networking: Application and Development)
Show Figures

Figure 1

30 pages, 5146 KB  
Article
A Routing Method for Extending Network Lifetime in Wireless Sensor Networks Using Improved PSO
by Zhila Mohammadian, Seyyed Hossein Hosseini Nejad, Asghar Charmin, Saeed Barghandan and Mohsen Ebadpour
Appl. Sci. 2025, 15(18), 10236; https://doi.org/10.3390/app151810236 - 19 Sep 2025
Viewed by 224
Abstract
WSNs consist of numerous energy-constrained Sensor Nodes (SNs), making energy efficiency a critical challenge. This paper presents a novel multipath routing model designed to enhance network lifetime by simultaneously optimizing energy consumption, node connectivity, and transmission distance. The model employs an Improved Particle [...] Read more.
WSNs consist of numerous energy-constrained Sensor Nodes (SNs), making energy efficiency a critical challenge. This paper presents a novel multipath routing model designed to enhance network lifetime by simultaneously optimizing energy consumption, node connectivity, and transmission distance. The model employs an Improved Particle Swarm Optimization (IPSO) algorithm to dynamically determine the optimal weight coefficients of a cost function that integrates three parameters: residual energy, link reliability, and buffer capacity. A compressed Bloom filter is incorporated to improve packet transmission efficiency and reduce error rates. Simulation experiments conducted in the NS2 environment show that the proposed approach significantly outperforms existing protocols, including Reinforcement Learning Q-Routing Protocol (RL-QRP), Low Energy Adaptive Clustering Hierarchical (LEACH), On-Demand Distance Vector (AODV), Secure and Energy-Efficient Multipath (SEEM), and Energy Density On-demand Cluster Routing (EDOCR), achieving a 7.45% reduction in energy consumption and maintaining a higher number of active nodes over time. Notably, the model sustains 19 live nodes at round 800, whereas LEACH and APTEEN experience complete node depletion by that point. This adaptive, energy-aware routing strategy improves reliability, prolongs operational lifespan, and enhances load balancing, making it a promising solution for real-world WSN applications. Full article
(This article belongs to the Special Issue Wireless Networking: Application and Development)
Show Figures

Figure 1

18 pages, 577 KB  
Article
Predicting Noise and User Distances from Spectrum Sensing Signals Using Transformer and Regression Models
by Myke Valadão, Diego Amoedo, André Costa, Celso Carvalho and Waldir Sabino
Appl. Sci. 2025, 15(8), 4296; https://doi.org/10.3390/app15084296 - 13 Apr 2025
Cited by 1 | Viewed by 661
Abstract
Frequency spectrum allocation has been a subject of dispute in recent years. Cognitive radio dynamically allocates users to spectrum holes using various sensing techniques. Noise levels and distances between users can significantly impact the efficiency of cognitive radio systems. Designing robust communication systems [...] Read more.
Frequency spectrum allocation has been a subject of dispute in recent years. Cognitive radio dynamically allocates users to spectrum holes using various sensing techniques. Noise levels and distances between users can significantly impact the efficiency of cognitive radio systems. Designing robust communication systems requires accurate knowledge of these factors. This paper proposes a method for predicting noise levels and distances based on spectrum sensing signals using regression machine learning models. The proposed methods achieved correlation coefficients of over 0.98 and 0.82 for noise and distance predictions, respectively. Accurately estimating these parameters enables adaptive resource allocation, interference mitigation, and improved spectrum efficiency, ultimately enhancing the performance and reliability of cognitive radio networks. Full article
(This article belongs to the Special Issue Wireless Networking: Application and Development)
Show Figures

Figure 1

23 pages, 1976 KB  
Article
Joint Optimization Algorithm for UAV-Assisted Caching and Charging Based on Wireless Energy Harvesting
by Yumeng Zhu and Qi Zhu
Appl. Sci. 2025, 15(7), 3908; https://doi.org/10.3390/app15073908 - 2 Apr 2025
Cited by 1 | Viewed by 491
Abstract
The proliferation of mobile terminal applications and the increasing energy consumption of chips have raised concerns about insufficient power in mobile user terminals. In response to this issue, this paper proposes a joint optimization algorithm for UAV-assisted caching and charging based on non-orthogonal [...] Read more.
The proliferation of mobile terminal applications and the increasing energy consumption of chips have raised concerns about insufficient power in mobile user terminals. In response to this issue, this paper proposes a joint optimization algorithm for UAV-assisted caching and charging based on non-orthogonal multiple access (NOMA) within the context of mobile edge caching scenarios. The proposed algorithm considers the revenue generated from UAVs providing caching and charging services to users, as well as the cost associated with leasing cache files and the UAV energy consumption. The optimization problem aimed at maximizing UAV utility is established under constraints related to power and cache capacity. To address this mixed-integer programming problem, we divided it into two parts. The first part uses the Stackelberg–Bertrand game to optimize file pricing and the UAV cache strategy. In the second part, the block coordinate descent (BCD) method is used to optimize the UAV transmission power distribution, positioning, and user pairing. The joint optimization problem is divided into three subproblems, which use the Lagrange multiplier method, a simulated annealing algorithm, and a particle swarm optimization algorithm. Simulation results demonstrate that the proposed algorithm effectively reduces user transmission delay while also improving overall revenue generated by UAVs. Full article
(This article belongs to the Special Issue Wireless Networking: Application and Development)
Show Figures

Figure 1

11 pages, 1056 KB  
Communication
Combined Sweeping and Jumping Method to Enhance Node Insertion Algorithm for Wi-Fi Sensor Networks
by Woo-Yong Choi
Appl. Sci. 2024, 14(17), 7762; https://doi.org/10.3390/app14177762 - 3 Sep 2024
Viewed by 1386
Abstract
Two dominant driving forces for evolving communication technologies in the current society have been the proliferation of wireless access networks to the Internet and the broadbandization of access and infrastructure networks. Through these evolutions of communication technologies, high-resolution contents are instantly delivered to [...] Read more.
Two dominant driving forces for evolving communication technologies in the current society have been the proliferation of wireless access networks to the Internet and the broadbandization of access and infrastructure networks. Through these evolutions of communication technologies, high-resolution contents are instantly delivered to wireless devices such as mobile phones, wireless tablets, and headsets. Recently, wireless sensor networks, where up to 1000 low-power sensors are wirelessly connected to each other, have been created and connected to the Internet, which presents a new challenge of efficiently coordinating the transmissions of many wireless sensors with minimal transmission overheads. Developing an efficient Medium Access Control (MAC) protocol governing the transmissions of wireless sensor networks is crucial for the success of wireless sensor networks for the realization of the Internet of Things (IoT). In 2023, the node insertion algorithm was proposed to efficiently derive the minimal number of serially connected multipolling sequences of many wireless sensors, by which Access Points (APs) can poll wireless sensors with minimal polling overheads. In this paper, the combined sweeping and jumping method is presented to dramatically enhance the searching performance of the node insertion algorithm. To validate the performance of the combined sweeping and jumping method, simulation results are presented for wireless sensor networks where wireless sensors with varying transmission ranges exist. Full article
(This article belongs to the Special Issue Wireless Networking: Application and Development)
Show Figures

Figure 1

Back to TopTop