sensors-logo

Journal Browser

Journal Browser

Recent Trends and Advances in Telecommunications and Sensing

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: closed (31 March 2024) | Viewed by 13417

Special Issue Editors


E-Mail Website1 Website2
Guest Editor
Institute of Microwave and Photonic Engineering, Faculty of Electrical and Information Engineering, Graz University of Technology, Inffeldgasse 12/I, A-8010 Graz, Austria
Interests: optical wireless technologies for broadband communications
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Telecommunications,Faculty of Electrical Engineering and Computing, University of Zagreb, HR-10000 Zagreb, Croatia
Interests: telecommunication computing; computer networks; World Wide Web

E-Mail Website
Guest Editor
Institute of Communication Networks and Satellite Communications, Graz University of Technology, 8010 Graz, Austria
Interests: satellite communications; optical wireless communications; parameter estimation; channel coding
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Telecommunications, Faculty of Electrical Engineering and Computing, University of Zagreb, HR-10000 Zagreb, Croatia
Interests: IoT; distributed systems; software agents; self-organised systems

Special Issue Information

Dear Colleagues,

This Special Issue is dedicated to research presented at the IEEE 17th International Conference on Telecommunications (ConTEL 2023). However, original articles not related to this conference are welcome as well.

With new services and access schemes, especially concerning 5G and others, there is a growing need for improved terrestrial and non-terrestrial networking infrastructure, not just in terms of quality and performance, but also with respect to scalability, mobility, energy, spectral efficiency and integration of multiple technologies. Extended contributions to ConTEL 2023 and other original research papers are solicited. Analytical and theoretical investigations and experimental or practical work may be submitted.

The areas of interest may include, but are not limited to, the following topics:

  • Optical wireless communications;
  • Satellite and space communications;
  • Antennas and wave propagation, including NFC and RFID;
  • Internet of Things (IoT) and sensor networks;
  • Smart spaces: context- and situation-awareness;
  • Internet and next generation networking;
  • Energy-efficient protocols and networks;
  • Software defined networks and network function virtualization;
  • Multimedia applications, rich communication services and networked games;
  • QoE and QoS assessment and provisioning;
  • Machine learning and big data in telecommunications
  • Social networking and social media;
  • Security and privacy issues in ICT services and networks;
  • Digital inclusion and assistive technology in ICT services.

Prof. Dr. Erich Leitgeb
Prof. Dr. Maja Matijašević
Dr. Wilfried Gappmair
Prof. Dr. Mario Kusek
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Editorial

Jump to: Research

3 pages, 145 KiB  
Editorial
Recent Trends and Advances in Telecommunications and Sensing
by Erich Leitgeb, Maja Matijašević, Wilfried Gappmair and Mario Kušek
Sensors 2024, 24(15), 4772; https://doi.org/10.3390/s24154772 - 23 Jul 2024
Viewed by 633
Abstract
In the context of the 17th International Conference on Telecommunications (ConTEL), which took place at Graz University of Technology, Austria, from the 11th until the 13th of July 2023, the chairs of the conference were approached by MDPI to organize a Special Issue [...] Read more.
In the context of the 17th International Conference on Telecommunications (ConTEL), which took place at Graz University of Technology, Austria, from the 11th until the 13th of July 2023, the chairs of the conference were approached by MDPI to organize a Special Issue as part of the Sensors journal (ISSN: 1424-8220) [...] Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)

Research

Jump to: Editorial

30 pages, 8584 KiB  
Article
MDE and LLM Synergy for Network Experimentation: Case Analysis of Wireless System Performance in Beaulieu-Xie Fading and κ-µ Co-Channel Interference Environment with Diversity Combining
by Dragana Krstic, Suad Suljovic, Goran Djordjevic, Nenad Petrovic and Dejan Milic
Sensors 2024, 24(10), 3037; https://doi.org/10.3390/s24103037 - 10 May 2024
Cited by 3 | Viewed by 1358
Abstract
Channel modeling is a first step towards the successful projecting of any wireless communication system. Hence, in this paper, we analyze the performance at the output of a multi-branch selection combining (SC) diversity receiver in a wireless environment that has been distracted by [...] Read more.
Channel modeling is a first step towards the successful projecting of any wireless communication system. Hence, in this paper, we analyze the performance at the output of a multi-branch selection combining (SC) diversity receiver in a wireless environment that has been distracted by fading and co-channel interference (CCI), whereby the fading is modelled by newer Beaulieu-Xie (BX) distribution, and the CCI is modelled by the κ-µ distribution. The BX distribution provides the ability to include in consideration any number of line-of-sight (LOS) useful signal components and non-LOS (NLOS) useful signal components. This distribution contains characteristics of some other fading models thanks to its flexible fading parameters, which also applies to the κ-µ distribution. We derived here the expressions for the probability density function (PDF) and cumulative distribution function (CDF) for the output signal-to-co-channel interference ratio (SIR). After that, other performances are obtained, namely: outage probability (Pout), channel capacity (CC), moment-generating function (MGF), average bit error probability (ABEP), level crossing rate (LCR), and average fade duration (AFD). Numerical results are presented in several graphs versus the SIR for different values of fading and CCI parameters, as well as the number of input branches in the SC receiver. Then, the impact of parameters on all performance is checked. From our numerical results, it is possible to directly obtain the performance for all derived and displayed quantities for cases of previously known distributions of fading and CCI by inserting the appropriate parameter values. In the second part of the paper, a workflow for automated network experimentation relying on the synergy of Large Language Models (LLMs) and model-driven engineering (MDE) is presented, while the previously derived expressions are used for evaluation. Due to the aforementioned, the biggest value of the obtained results is the applicability to the cases of a large number of other distributions for fading and CCI by replacing the corresponding parameters in the formulas for the respective performances. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

13 pages, 8848 KiB  
Article
Optical Camera Communications in Healthcare: A Wearable LED Transmitter Evaluation during Indoor Physical Exercise
by Eleni Niarchou, Vicente Matus, Jose Rabadan, Victor Guerra and Rafael Perez-Jimenez
Sensors 2024, 24(9), 2766; https://doi.org/10.3390/s24092766 - 26 Apr 2024
Viewed by 1006
Abstract
This paper presents an experimental evaluation of a wearable light-emitting diode (LED) transmitter in an optical camera communications (OCC) system. The evaluation is conducted under conditions of controlled user movement during indoor physical exercise, encompassing both mild and intense exercise scenarios. We introduce [...] Read more.
This paper presents an experimental evaluation of a wearable light-emitting diode (LED) transmitter in an optical camera communications (OCC) system. The evaluation is conducted under conditions of controlled user movement during indoor physical exercise, encompassing both mild and intense exercise scenarios. We introduce an image processing algorithm designed to identify a template signal transmitted by the LED and detected within the image. To enhance this process, we utilize the dynamics of controlled exercise-induced motion to limit the tracking process to a smaller region within the image. We demonstrate the feasibility of detecting the transmitting source within the frames, and thus limit the tracking process to a smaller region within the image, achieving an reduction of 87.3% for mild exercise and 79.0% for intense exercise. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

21 pages, 551 KiB  
Article
An Analytical Model of IaaS Architecture for Determining Resource Utilization
by Slawomir Hanczewski, Maciej Stasiak and Michal Weissenberg
Sensors 2024, 24(9), 2758; https://doi.org/10.3390/s24092758 - 26 Apr 2024
Cited by 2 | Viewed by 834
Abstract
Cloud computing has become a major component of the modern IT ecosystem. A key contributor to this has been the development of Infrastructure as a Service (IaaS) architecture, in which users’ virtual machines (VMs) are run on the service provider’s physical infrastructure, making [...] Read more.
Cloud computing has become a major component of the modern IT ecosystem. A key contributor to this has been the development of Infrastructure as a Service (IaaS) architecture, in which users’ virtual machines (VMs) are run on the service provider’s physical infrastructure, making it possible to become independent of the need to purchase one’s own physical machines (PMs). One of the main aspects to consider when designing such systems is achieving the optimal utilization of individual resources, such as processor, RAM, disk, and available bandwidth. In response to these challenges, the authors developed an analytical model (the ARU method) to determine the average utilization levels of the aforementioned resources. The effectiveness of the proposed analytical model was evaluated by comparing the results obtained by utilizing the model with those obtained by conducting a digital simulation of the operation of a cloud system according to the IaaS paradigm. The results show the effectiveness of the model regardless of the structure of the emerging requests, the variability of the capacity of individual resources, and the number of physical machines in the system. This translates into the applicability of the model in the design process of cloud systems. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

30 pages, 1044 KiB  
Article
Comparative Analysis of Anomaly Detection Approaches in Firewall Logs: Integrating Light-Weight Synthesis of Security Logs and Artificially Generated Attack Detection
by Adrian Komadina, Ivan Kovačević, Bruno Štengl and Stjepan Groš
Sensors 2024, 24(8), 2636; https://doi.org/10.3390/s24082636 - 20 Apr 2024
Cited by 1 | Viewed by 1455
Abstract
Detecting anomalies in large networks is a major challenge. Nowadays, many studies rely on machine learning techniques to solve this problem. However, much of this research depends on synthetic or limited datasets and tends to use specialized machine learning methods to achieve good [...] Read more.
Detecting anomalies in large networks is a major challenge. Nowadays, many studies rely on machine learning techniques to solve this problem. However, much of this research depends on synthetic or limited datasets and tends to use specialized machine learning methods to achieve good detection results. This study focuses on analyzing firewall logs from a large industrial control network and presents a novel method for generating anomalies that simulate real attacker actions within the network without the need for a dedicated testbed or installed security controls. To demonstrate that the proposed method is feasible and that the constructed logs behave as one would expect real-world logs to behave, different supervised and unsupervised learning models were compared using different feature subsets, feature construction methods, scaling methods, and aggregation levels. The experimental results show that unsupervised learning methods have difficulty in detecting the injected anomalies, suggesting that they can be seamlessly integrated into existing firewall logs. Conversely, the use of supervised learning methods showed significantly better performance compared to unsupervised approaches and a better suitability for use in real systems. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

25 pages, 3321 KiB  
Article
Decentralized IoT Data Authentication with Signature Aggregation
by Jay Bojič Burgos and Matevž Pustišek
Sensors 2024, 24(3), 1037; https://doi.org/10.3390/s24031037 - 5 Feb 2024
Cited by 1 | Viewed by 1645
Abstract
The rapid expansion of the Internet of Things (IoT) has introduced significant challenges in data authentication, necessitating a balance between scalability and security. Traditional approaches often rely on third parties, while blockchain-based solutions face computational and storage bottlenecks. Our novel framework employs edge [...] Read more.
The rapid expansion of the Internet of Things (IoT) has introduced significant challenges in data authentication, necessitating a balance between scalability and security. Traditional approaches often rely on third parties, while blockchain-based solutions face computational and storage bottlenecks. Our novel framework employs edge aggregating servers and Ethereum Layer 2 rollups, offering a scalable and secure IoT data authentication solution that reduces the need for continuous, direct interaction between IoT devices and the blockchain. We utilize and compare the Nova and Risc0 proving systems for authenticating batches of IoT data by verifying signatures, ensuring data integrity and privacy. Notably, the Nova prover significantly outperforms Risc0 in proving and verification times; for instance, with 10 signatures, Nova takes 3.62 s compared to Risc0’s 369 s, with this performance gap widening as the number of signatures in a batch increases. Our framework further enhances data verifiability and trust by recording essential information on L2 rollups, creating an immutable and transparent record of authentication. The use of Layer 2 rollups atop a permissionless blockchain like Ethereum effectively reduces on-chain storage costs by approximately 48 to 57 times compared to direct Ethereum use, addressing cost bottlenecks efficiently. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

23 pages, 1521 KiB  
Article
Comprehensive Analysis and Evaluation of Anomalous User Activity in Web Server Logs
by Lenka Benova and Ladislav Hudec
Sensors 2024, 24(3), 746; https://doi.org/10.3390/s24030746 - 24 Jan 2024
Cited by 1 | Viewed by 1810
Abstract
In this study, we present a novel machine learning framework for web server anomaly detection that uniquely combines the Isolation Forest algorithm with expert evaluation, focusing on individual user activities within NGINX server logs. Our approach addresses the limitations of traditional methods by [...] Read more.
In this study, we present a novel machine learning framework for web server anomaly detection that uniquely combines the Isolation Forest algorithm with expert evaluation, focusing on individual user activities within NGINX server logs. Our approach addresses the limitations of traditional methods by effectively isolating and analyzing subtle anomalies in vast datasets. Initially, the Isolation Forest algorithm was applied to extensive NGINX server logs, successfully identifying outlier user behaviors that conventional methods often overlook. We then employed DBSCAN for detailed clustering of these anomalies, categorizing them based on user request times and types. A key innovation of our methodology is the incorporation of post-clustering expert analysis. Cybersecurity professionals evaluated the identified clusters, adding a crucial layer of qualitative assessment. This enabled the accurate distinction between benign and potentially harmful activities, leading to targeted responses such as access restrictions or web server configuration adjustments. Our approach demonstrates a significant advancement in network security, offering a more refined understanding of user behavior. By integrating algorithmic precision with expert insights, we provide a comprehensive and nuanced strategy for enhancing cybersecurity measures. This study not only advances anomaly detection techniques but also emphasizes the critical need for a multifaceted approach in protecting web server infrastructures. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

28 pages, 1447 KiB  
Article
Analytical Model of the Connection Handoff in 5G Mobile Networks with Call Admission Control Mechanisms
by Mariusz Głąbowski, Maciej Sobieraj and Maciej Stasiak
Sensors 2024, 24(2), 697; https://doi.org/10.3390/s24020697 - 22 Jan 2024
Viewed by 1240
Abstract
Handoff mechanisms are very important in fifth-generation (5G) mobile networks because of the cellular architecture employed to maximize spectrum utilization. Together with call admission control (CAC) mechanisms, they enable better optimization of bandwidth use. The primary objective of the research presented in this [...] Read more.
Handoff mechanisms are very important in fifth-generation (5G) mobile networks because of the cellular architecture employed to maximize spectrum utilization. Together with call admission control (CAC) mechanisms, they enable better optimization of bandwidth use. The primary objective of the research presented in this article is to analyze traffic levels, aiming to optimize traffic management and handling. This article considers the two most popular CAC mechanisms: the resource reservation mechanism and the threshold mechanism. It presents an analytical approach to occupancy distribution and blocking probability calculation in 5G mobile networks, incorporating connection handoff and CAC mechanisms for managing multiple traffic streams generated by multi-service sources. Due to the fact that the developed analytical model is an approximate model, its accuracy was also examined. For this purpose, the results of analytical calculations of the blocking probability in a group of 5G cells are compared with the simulation data. This paper is an extended version of our paper published in 17th ConTEL 2023. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

16 pages, 1494 KiB  
Article
Novel Results on SNR Estimation for Bandlimited Optical Intensity Channels
by Wilfried Gappmair
Sensors 2024, 24(1), 23; https://doi.org/10.3390/s24010023 - 19 Dec 2023
Cited by 1 | Viewed by 879
Abstract
In a previous work of the author about non-data-aided estimation of the signal-to-noise ratio (SNR) for bandlimited optical intensity channels, a couple of limitations have been identified in terms of error performance and computational complexity. In the current paper, these deficiencies are avoided [...] Read more.
In a previous work of the author about non-data-aided estimation of the signal-to-noise ratio (SNR) for bandlimited optical intensity channels, a couple of limitations have been identified in terms of error performance and computational complexity. In the current paper, these deficiencies are avoided by the introduction of a second receiver filter with specific properties that is operated in parallel to the receiver filter normally used in this respect. Although not initially intended, the concept is also applied to data-aided SNR estimation by deriving a maximum likelihood algorithm and the Cramer–Rao lower bound (CRLB) as the theoretical limit of the error performance. In the next step, the dual-filter framework is used in the context of SNR estimation without knowledge about data symbols. The most significant benefit of this method is that the number of payload data employed for the estimation procedure might be selected arbitrarily long without impacting the spectral efficiency of the link. Since the computation of the true CRLB was out of scope due to complexity reasons, an asymptotic variant for very low SNR values is analyzed, which ends up in a closed-form solution. Furthermore, an algorithm based on first- and second-order moments of the samples at the dual-filter output is investigated, which turned out to be very attractive in terms of error performance and computational complexity. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

34 pages, 9721 KiB  
Article
Enhancing QoS of Telecom Networks through Server Load Management in Software-Defined Networking (SDN)
by Khawaja Tahir Mehmood, Shahid Atiq and Muhammad Majid Hussain
Sensors 2023, 23(23), 9324; https://doi.org/10.3390/s23239324 - 22 Nov 2023
Cited by 2 | Viewed by 1634
Abstract
In the modern era, with the emergence of the Internet of Things (IoT), big data applications, cloud computing, and the ever-increasing demand for high-speed internet with the aid of upgraded telecom network resources, users now require virtualization of the network for smart handling [...] Read more.
In the modern era, with the emergence of the Internet of Things (IoT), big data applications, cloud computing, and the ever-increasing demand for high-speed internet with the aid of upgraded telecom network resources, users now require virtualization of the network for smart handling of modern-day challenges to obtain better services (in terms of security, reliability, scalability, etc.). These requirements can be fulfilled by using software-defined networking (SDN). This research article emphasizes one of the major aspects of the practical implementation of SDN to enhance the QoS of a virtual network through the load management of network servers. In an SDN-based network, several servers are available to fulfill users’ hypertext transfer protocol (HTTP) requests to ensure dynamic routing under the influence of the SDN controller. However, if the number of requests is directed to a specific server, the controller is bound to follow the user-programmed instructions, and the load on that server is increased, which results in (a) an increase in end-to-end user delay, (b) a decrease in the data transfer rate, and (c) a decrease in the available bandwidth of the targeted server. All of the above-mentioned factors will result in the degradation of network QoS. With the implementation of the proposed algorithm, dynamic active sensing server load management (DASLM), on the SDN controller, the load on the server is shared based on QoS control parameters (throughput, response time, round trip time, etc.). The overall delay is reduced, and the bandwidth utilization along with throughput is also increased. Full article
(This article belongs to the Special Issue Recent Trends and Advances in Telecommunications and Sensing)
Show Figures

Figure 1

Back to TopTop