applsci-logo

Journal Browser

Journal Browser

Security and Communication Technologies in Internet of Things, 5G and beyond 5G: Applications and Future Directions

A special issue of Applied Sciences (ISSN 2076-3417). This special issue belongs to the section "Electrical, Electronics and Communications Engineering".

Deadline for manuscript submissions: 31 December 2024 | Viewed by 4604

Special Issue Editors


E-Mail Website
Guest Editor
Institute of Telecommunications, AGH University of Science and Technology, 30-059 Kraków, Poland
Interests: software-defined networks; network function virtualization; cloud computing; 5G core networks; emerging network services; network optimization
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute of Telecommunications, AGH University of Science and Technology, 30-059 Kraków, Poland
Interests: wireless networks; 5G NR-unlicensed; wireless LANs; internet of things; quality of service; threat detection; steganography
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Institute of Telecommunications, Warsaw University of Technology, 00-661 Warsaw, Poland
Interests: video streaming; business data processing; cloud computing; multimedia communication; military communication

Special Issue Information

Dear Colleagues,

The popularity and spread of Internet of Things, 5G and beyond-5G technologies are still increasing. More and more attractive, interesting and profitable use cases are designed and proposed. However, to effectively provision emerging applications, two critical obstacles must be addressed: security and communication technologies.

Due to the heterogeneity and complexity of the considered architecture problems, they are demanding and require sophisticated approaches to be effectively solved. The wide range of use cases and scenarios further complicates the problem, as such a complex environment cannot be easily modeled and simulated.

We cordially invite original contributions focused on applications and future directions in terms of security and communication technologies in IoT, 5G and B5G. Topics of interest include but are not limited to:

  • Application-aware core and backbone network design and optimization for IoT, 5G and B5G;
  • Wireless communication technologies in Internet of Things, 5G and beyond 5G;
  • Security of wireless communication in IoT, 5G and B5G networks;
  • Secure virtualization and integrity verification for the purpose of IoT, 5G and B5G deployments;
  • Network slicing communication technology;
  • Network Softwareization and Network Function Virtualization enabling IoT, 5G and B5G;
  • Security monitoring of radio and core networks in IoT, 5G and B5G;
  • Multi-technology solutions based on the integration of IoT, 5G and B5G;
  • Quality of Service and Quality of Experience of emerging applications offered through IoT, 5G and B5G networks;
  • Integration between optical networks and IoT, 5G and B5G technologies;
  • Use of AI/ML to facilitate further development of IoT, 5G and B5G technologies;
  • Future directions and challenges in terms of security and Communication Technologies in Internet of Things, 5G and beyond 5G;
  • Proof of concept presenting security and communication technologies for IoT, 5G and B5G.

Dr. Piotr Borylo
Dr. Marek Natkaniec
Dr. Andrzej Bęben
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Applied Sciences is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • core and wireless network security
  • secure virtualized deployments
  • network slicing
  • network function virtualization
  • IoT, 5G and beyond-5G technologies
  • integration of heterogenous technologies

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 1525 KiB  
Article
Evaluation of User-Centric Cell-Free Massive Multiple-Input Multiple-Output Networks Considering Realistic Channels and Frontend Nonlinear Distortion
by Marcin Hoffmann and Paweł Kryszkiewicz
Appl. Sci. 2024, 14(5), 1684; https://doi.org/10.3390/app14051684 - 20 Feb 2024
Cited by 1 | Viewed by 1062
Abstract
Future 6G networks are expected to utilize Massive Multiple-Input Multiple-Output (M-MIMO) and follow a user-centric cell-free (UCCF) architecture. In a UCCF M-MIMO network, the user can be potentially served by multiple surrounding Radio Units (RUs) and Distributed Units (DUs) controlled and coordinated by [...] Read more.
Future 6G networks are expected to utilize Massive Multiple-Input Multiple-Output (M-MIMO) and follow a user-centric cell-free (UCCF) architecture. In a UCCF M-MIMO network, the user can be potentially served by multiple surrounding Radio Units (RUs) and Distributed Units (DUs) controlled and coordinated by a single virtualized Centralized Unit (CU). Moreover, in an M-MIMO network, each transmit frontend is equipped with a Power Amplifier (PA), typically with nonlinear characteristics, that can have a significant impact on the throughput achieved by network users. This work evaluates a UCCF M-MIMO network within an advanced system-level simulator considering multicarrier transmission, using Orthogonal Frequency-Division Multiplexing (OFDM), realistic signal-processing steps, e.g., per resource block scheduling, and a nonlinear radio frontend. Moreover, both idealistic independent and identically distributed (i.i.d.) Rayleigh and 3D ray-tracing-based radio channels are evaluated. The results show that under the realistic radio channel, the novel user-centric network architecture can lead to an almost uniform distribution of user throughput and improve the rate of the users characterized by the worst radio conditions by over 3 times in comparison to a classical, network-centric design. At the same time, the nonlinear characteristics of the PA can cause significant degradation of the UCCF M-MIMO network’s performance when operating close to its saturation power. Full article
Show Figures

Figure 1

16 pages, 1555 KiB  
Article
A Simplistic Downlink Channel Estimation Method for NB-IoT
by Jarosław Magiera
Appl. Sci. 2023, 13(23), 12615; https://doi.org/10.3390/app132312615 - 23 Nov 2023
Viewed by 1229
Abstract
This paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) [...] Read more.
This paper presents a downlink channel estimation method intended for a Narrowband Internet of Things (NB-IoT) access link. Due to its low computational complexity, this method is well suited for energy-efficient IoT devices, still providing acceptable reception quality in terms of signal-to-noise (SNR) performance. This paper describes the physical layer of NB-IoT within the scope of channel estimation, and also reviews existing channel estimation methods for OFDM signals. The proposed method, based on linear interpolation of channel coefficients, is described as a three-step procedure. Next, indicators of channel quality assessment, which may be determined without prior knowledge about the transmitted signal, are defined. Two variants of channel estimation, differing in the frequency domain processing, are evaluated to assess the significance of frequency selectivity in an NB-IoT downlink. The chosen method is compared with another method implemented in MATLAB LTE ToolboxTM. An analysis of the computation time is conducted, subsequently demonstrating the definite advantage of the proposed method. Full article
Show Figures

Figure 1

26 pages, 1048 KiB  
Article
A Novel Covert Channel for IEEE 802.11 Networks Utilizing MAC Address Randomization
by Geovani Teca and Marek Natkaniec
Appl. Sci. 2023, 13(14), 8000; https://doi.org/10.3390/app13148000 - 8 Jul 2023
Cited by 3 | Viewed by 1712
Abstract
Vendors implement the MAC address randomization technique to prevent IEEE 802.11 client station devices from being tracked. Although it conceals device identity, it cannot hide its occurring data transmission. This paper presents a novel covert channel that leverages the MAC address randomization technique [...] Read more.
Vendors implement the MAC address randomization technique to prevent IEEE 802.11 client station devices from being tracked. Although it conceals device identity, it cannot hide its occurring data transmission. This paper presents a novel covert channel that leverages the MAC address randomization technique to create a covert channel to hide data transmission inside IEEE 802.11 networks. The secret data are a disposable random MAC address generated by the IEEE 802.11 station as part of the probe request frame while scanning the network. The paper presents the concept of the covert channel, its implementation, and performance metrics. The study covers diverse scenarios, including the adaptation of the modified Selective Repeat ARQ protocol to alleviate the impact of the number of client stations and their offered loads on the covert channel. The results show that with the appropriate parameter selections, we can adapt the covert channel to produce excellent throughput, efficiency, delay, and jitter according to the environment in which it is installed. Full article
Show Figures

Figure 1

Back to TopTop