Protocols and Applications for Wireless Mobile Networks

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Networks".

Deadline for manuscript submissions: closed (1 March 2021) | Viewed by 7278

Special Issue Editor


E-Mail Website
Guest Editor
Department of Computer Science and Engineering, Pohang University of Science and Technology (POSTECH), San 31, Hyoja-Dong, Pohang 790-784, Republic of Korea
Interests: wireless LAN MAC protocols; Internet of Things (IoT); ad-hoc and sensor networks; indoor positioning system (IPS); activity recognition using wireless signals
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Mobile traffic has been increasing rapidly and diverse network applications have also been developed remarkably, which gives rise to new challenges in the protocols of the wireless mobile network. For example, various features that are impossible in the 4G network are added in the 5G network, so specialized protocols for the 5G network are required.

Furthermore, due to the shifts in lifestyle, we need to discuss and develop various applications using wireless mobile networks, such as multimedia networking, localization, mobile sensing applications, etc.

In this Special Issue, we wish to discuss, derive, and develop new protocols and applications for the wireless mobile network.

The topics in this Special Issue include but are not limited to:

  • Protocol design for 5G and beyond
  • Protocol design for WLAN, WPAN, LPWAN (e.g., Wi-Fi, Bluetooth, LoRA)
  • Cross-layer design for networking
  • Internet of things, cloud computing, fog computing and edge computing
  • Security and privacy in wireless mobile network
  • Network management, software defined networking, and network virtualization
  • Machine learning for wireless mobile network
  • Localization, tracking and location-based service
  • Mobile sensing applications based on wireless signal processing
  • Multimedia networking

Prof. Dr. Young-Joo Suh
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Protocol design for 5G and beyond networks
  • Protocol design for WLAN, WPAN, LPWAN (e.g., Wi-Fi, Bluetooth, LoRA)
  • Cross-layer design for networking
  • Internet of things, cloud computing, fog computing and edge computing
  • Security and privacy in wireless mobile network
  • Network management, software defined networking, and network virtualization
  • Machine learning for wireless mobile network
  • Localization, tracking and location-based service
  • Mobile sensing applications based on wireless signal processing
  • Multimedia networking

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 3603 KiB  
Article
TSCH Multiple Slotframe Scheduling for Ensuring Timeliness in TS-SWIPT-Enabled IoT Networks
by Dongwan Kim, Jung-Hyok Kwon and Eui-Jik Kim
Electronics 2021, 10(1), 48; https://doi.org/10.3390/electronics10010048 - 30 Dec 2020
Cited by 2 | Viewed by 1922
Abstract
This paper presents a time-slotted channel hopping (TSCH) multiple slotframe scheduling (TMSS) protocol to ensure the timeliness of energy harvesting and data transmission for sensor devices with different transmission periods in Internet of Things (IoT) networks enabled with time-switching simultaneous wireless information and [...] Read more.
This paper presents a time-slotted channel hopping (TSCH) multiple slotframe scheduling (TMSS) protocol to ensure the timeliness of energy harvesting and data transmission for sensor devices with different transmission periods in Internet of Things (IoT) networks enabled with time-switching simultaneous wireless information and power transfer (TS-SWIPT). The TMSS uses a modified three-step 6P transaction to allocate power and data cells within the slotframe. The sensor device sets the slotframe length equal to the transmission period and estimates the number of power and data cells for allocation in the configured slotframe and requests cell allocation to the hybrid access point (HAP). Upon request from a sensor device, the HAP executes a cell-overlapping prevention (COP) algorithm to resolve the cell-overlapping problem and responds to the sensor device with a candidate cell list. Upon receiving the response from HAP, the sensor device determines its power and data cells by referring to the cell list. We conducted experimental simulations and compared the TMSS performance to that of the legacy TSCH medium access control (MAC) with a single slotframe and the harvest-then-transmit-based modified enhanced distributed coordination function (EDCF) MAC protocol (HE-MAC). The results showed that TMSS outperforms legacy TSCH MAC and HE-MAC in terms of delay, effective throughput and energy utilization. Full article
(This article belongs to the Special Issue Protocols and Applications for Wireless Mobile Networks)
Show Figures

Figure 1

15 pages, 3653 KiB  
Article
An Energy-Efficient Secure Forwarding Scheme for QoS Guarantee in Wireless Sensor Networks
by Dongwan Kim, Jaekeun Yun and Daehee Kim
Electronics 2020, 9(9), 1418; https://doi.org/10.3390/electronics9091418 - 01 Sep 2020
Cited by 9 | Viewed by 2193
Abstract
Many wireless sensor network (WSN) applications require both security and quality-of-service (QoS) to be guaranteed simultaneously. However, ensuring both security and QoS is not trivial in WSNs since security normally has bad impact on QoS. In this paper, we propose an energy-efficient secure [...] Read more.
Many wireless sensor network (WSN) applications require both security and quality-of-service (QoS) to be guaranteed simultaneously. However, ensuring both security and QoS is not trivial in WSNs since security normally has bad impact on QoS. In this paper, we propose an energy-efficient secure forwarding method that minimizes energy consumption while meeting both security and QoS requirements at the same time. To accomplish this goal, we alternatively use hop-by-hop security for conserving energy through data aggregation and end-to-end security to satisfy the QoS requirement. We further analyze why hop-by-hop security with data aggregation provide better energy efficiency than end-to-end security without aggregation in detail. The simulation result shows that our proposed method outperforms other scheme in terms of energy efficiency while meeting both QoS and security. Full article
(This article belongs to the Special Issue Protocols and Applications for Wireless Mobile Networks)
Show Figures

Figure 1

18 pages, 2563 KiB  
Article
Research of Security Routing Protocol for UAV Communication Network Based on AODV
by Xiaopeng Tan, Zhen Zuo, Shaojing Su, Xiaojun Guo and Xiaoyong Sun
Electronics 2020, 9(8), 1185; https://doi.org/10.3390/electronics9081185 - 23 Jul 2020
Cited by 14 | Viewed by 2667
Abstract
With the rapid development of information technology and the increasing application of UAV in various fields, the security problems of unmanned aerial vehicle (UAV) communication network have become increasingly prominent. It has become an important scientific challenge to design a routing protocol that [...] Read more.
With the rapid development of information technology and the increasing application of UAV in various fields, the security problems of unmanned aerial vehicle (UAV) communication network have become increasingly prominent. It has become an important scientific challenge to design a routing protocol that can provide efficient and reliable node to node packet transmission. In this paper, an efficient Digital Signature algorithm based on the elliptic curve cryptosystem is applied to routing protocol, and an improved security method suitable for on-demand routing protocol is proposed. The UAV communication network was simulated through the NS2 simulation platform, and the execution efficiency and safety of the improved routing protocol were analyzed. In the simulation experiment, the routing protocols of ad-hoc on demand distance vector (AODV), security ad-hoc on demand distance vector (SAODV), and improved security ad-hoc on demand distance vector (ISAODV) are compared in terms of the performance indicators of packet delivery rate, throughput, and end-to-end delay under normal conditions and when attacked by malicious nodes. The simulation results show that the improved routing protocol can effectively improve the security of the UAV communication network. Full article
(This article belongs to the Special Issue Protocols and Applications for Wireless Mobile Networks)
Show Figures

Figure 1

Back to TopTop