Special Issue "Key Enabling Technologies for Beyond 5G Networks"

A special issue of Future Internet (ISSN 1999-5903). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: 31 October 2023 | Viewed by 4503

Special Issue Editors

Department of Information Engineering, University of Firenze, Via S. Marta 3, 50139 Firenze, Italy
Interests: wireless communications; wireless resource management; heterogeneous networks; transmission techniques
Department of Information Engineering, University of Firenze, Via S. Marta 3, 50139 Firenze, Italy
Interests: physical layer security; UWB positioning systems; visible light communications; molecular communications; body area networks; 6G; 5G; networks for healthcare applications
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Our society is increasingly digitized, hyper-connected, and data driven; hence, new systems and technologies are emerging and introducing paradigm shifts in wireless communi­cation.

The spectrum utilization will be improved and extended towards the THz, thus requiring new transceiver architectures, modulation schemes, and new paradigms for facing the challenging propagation conditions. At such high-frequencies, communications will be based on very narrow and pencil-beam signal propagation with the help of intelligent reflecting surfaces. Energy resources must be efficiently managed at a network-wide scale, also integrating self-sustainable solutions, and new access methods will be needed for truly massive machine-type communications. In addition, machine learning and artificial intelligence technologies will strongly impact the design of communication systems across all the layers of the communication architecture, operating both at the link- and system level. These technologies further accelerate the trends of cognition and self-organization, smart spectrum access, physical and medium access layers operation up to resource allocation, and network organization. New communication systems will also constitute a framework for providing services thanks to new computing architectures and the intelligence that spreads across the network. New applications will be provided integrating the communication capabilities with sensing, positioning, imaging, and mobility. In such a scenario, the security should be provided at all levels for a network with embedded trust, also providing protection at the physical layer.

This Special Issue aims at investigating emerging and future key technologies for wireless communication systems in the 5G-and-beyond era.

Dr. Dania Marabissi
Dr. Lorenzo Mucchi
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Future Internet is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • THz and visible light communications
  • intelligent reflecting surfaces (IRS)
  • cognitive and dynamic spectrum access
  • machine learning and artificial intelligence for wireless communications system
  • energy-efficient wireless communications and networking
  • network softwarization and virtualization
  • network security
  • physical layer security
  • zero-touch networks
  • massive IoT communication

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Article
Ambient Environmental Parameter Estimation for Reliable Diffusive Molecular Communications
Future Internet 2022, 14(11), 311; https://doi.org/10.3390/fi14110311 - 29 Oct 2022
Viewed by 760
Abstract
Molecular communication is a promising communication technology that uses biomolecules such as proteins and ions to establish a communication link between nanoscale devices. In diffusive molecular communication, which uses diffusion characteristics of transfer molecules, the diffusion mechanism is mathematically derived as a Channel [...] Read more.
Molecular communication is a promising communication technology that uses biomolecules such as proteins and ions to establish a communication link between nanoscale devices. In diffusive molecular communication, which uses diffusion characteristics of transfer molecules, the diffusion mechanism is mathematically derived as a Channel Impulse Response (CIR) to design an optimal detector structure. However, an ideal environment is assumed for deriving a CIR. Hence there is a concern that developed systems based on the derived CIR may not operate well in a realistic environment. In this study, based on the finite element method (FEM), we constructed a model of the environment with heterogeneous temperature distribution and actual volume of transmitting molecules to not only demodulate the bit information via maximum likelihood sequence estimation (MLSE) but also to estimate the temperature and volume of the transmitting molecules. Furthermore, in this study, we evaluated the performance of the MLSE method and investigated the effects of ambient environmental temperature distribution and volume of the transmitted molecules on diffusive molecular communication. The evaluation results demonstrated that the proposed method can improve the communication performance by approximately 9 dB by estimating the temperature and transmit molecule volume. Full article
(This article belongs to the Special Issue Key Enabling Technologies for Beyond 5G Networks)
Show Figures

Figure 1

Article
Joint Scalable Video Coding and Transcoding Solutions for Fog-Computing-Assisted DASH Video Applications
Future Internet 2022, 14(9), 268; https://doi.org/10.3390/fi14090268 - 17 Sep 2022
Viewed by 1256
Abstract
Video streaming solutions have increased their importance in the last decade, enabling video on demand (VoD) services. Among several innovative services, 5G and Beyond 5G (B5G) systems consider the possibility of providing VoD-based solutions for surveillance applications, citizen information and e-tourism applications, to [...] Read more.
Video streaming solutions have increased their importance in the last decade, enabling video on demand (VoD) services. Among several innovative services, 5G and Beyond 5G (B5G) systems consider the possibility of providing VoD-based solutions for surveillance applications, citizen information and e-tourism applications, to name a few. Although the majority of the implemented solutions resort to a centralized cloud-based approach, the interest in edge/fog-based approaches is increasing. Fog-based VoD services result in fulfilling the stringent low-latency requirement of 5G and B5G networks. In the following, by resorting to the Dynamic Adaptive Streaming over HTTP (DASH) technique, we design a video-segment deployment algorithm for streaming services in a fog computing environment. In particular, by exploiting the inherent adaptation of the DASH approach, we embed in the system a joint transcoding and scalable video coding (SVC) approach able to deploy at run-time the video segments upon the user’s request. With this in mind, two algorithms have been developed aiming at maximizing the marginal gain with respect to a pre-defined delay threshold and enabling video quality downgrade for faster video deployment. Numerical results demonstrate that by effectively mapping the video segments, it is possible to minimize the streaming latency while maximising the users’ target video quality. Full article
(This article belongs to the Special Issue Key Enabling Technologies for Beyond 5G Networks)
Show Figures

Figure 1

Article
IoT Nodes Authentication and ID Spoofing Detection Based on Joint Use of Physical Layer Security and Machine Learning
Future Internet 2022, 14(2), 61; https://doi.org/10.3390/fi14020061 - 17 Feb 2022
Cited by 3 | Viewed by 1847
Abstract
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigms, such as the Internet [...] Read more.
The wide variety of services and applications that shall be supported by future wireless systems will lead to a high amount of sensitive data exchanged via radio, thus introducing a significant challenge for security. Moreover, in new networking paradigms, such as the Internet of Things, traditional methods of security may be difficult to implement due to the radical change of requirements and constraints. In such contexts, physical layer security is a promising additional means to realize communication security with low complexity. In particular, this paper focuses on node authentication and spoofing detection in an actual wireless sensor network (WSN), where multiple nodes communicate with a sink node. Nodes are in fixed positions, but the communication channels varies due to the scatterers’ movement. In the proposed security framework, the sink node is able to perform a continuous authentication of nodes during communication based on wireless fingerprinting. In particular, a machine learning approach is used for authorized nodes classification by means of the identification of specific attributes of their wireless channel. Then classification results are compared with the node ID in order to detect if the message has been generated by a node other than its claimed source. Finally, in order to increase the spoofing detection performance in small networks, the use of low-complexity sentinel nodes is proposed here. Results show the good performance of the proposed method that is suitable for actual implementation in a WSN. Full article
(This article belongs to the Special Issue Key Enabling Technologies for Beyond 5G Networks)
Show Figures

Figure 1

Back to TopTop