sensors-logo

Journal Browser

Journal Browser

Special Issue "Wireless Networks for Real Time Communication"

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: closed (6 December 2019).

Special Issue Editors

Dr. Guillermo Rodriguez-Navas
Website
Guest Editor
School of Innovation, Design and Engineering (IDT), Mälardalen University, Box 883, 721 23 Västeras, Sweden
Interests: dependable and real-time communication; safety-critical embedded systems; formal modeling and verification; fog computing
Dr. Hossein Fotouhi
Website SciProfiles
Guest Editor
School of Innovation, Design and Engineering, Mälardalen University, Västerås, Sweden
Interests: wireless networks; sensor networks; mobile computing; fog computing; Internet of Things; software defined networking; software defined mobile networks; wireless communication
Special Issues and Collections in MDPI journals
Dr. Rafia Inam
Website
Guest Editor
Ericsson Research, Ericsson AB, Torshamnsgatan 21, 164 83 Stockholm, Sweden
Interests: 5G network slices and management for industries; automation and safety for CPS using ML; safety for collaborative robots; intelligent transportation systems

Special Issue Information

Dear Colleagues,

The integration of IT and OT technologies holds the promise of a new industrial revolution, the so-called Industry 4.0, which will be supported by all-to-all connectivity between devices (IoT) and immense computing power, either centralized (cloud and HPC) or distributed (fog/edge computing). Wireless communication is one of the key constituents of this technological revolution, particularly when considering the edge of the architecture: wireless enables mobility and flexibility, reduces the cost and weight of equipment and often simplifies system deployment. Because of this, there is increasing interest in adapting wireless networks to the strict requirements of diverse application domains, such as industrial automation, intelligent transportation, autonomous robotics and healthcare.

For such applications, it is paramount to enable real-time support for IoT. The challenges are many. The heterogeneity of technologies represents an opportunity for fault tolerance and performance optimization, but it is also a challenge with respect to configuration and orchestration according to the differentiated QoS requirements, which can significantly impact system performance and reliability. Some emerging technologies such as fog and edge computing are the key enablers for future applications with real-time support, but their integration with wireless platforms (5G and others) needs to be addressed. There are also some efforts to design novel algorithms within the networking paradigm to enable concurrent transmission over wireless media. Moreover, IoT networks with low-power wireless networks are prone to interference. Thus, it is crucial to model novel wireless protocols to overcome interference. The particularities of wireless communication may render some traditional IT cybersecurity methods unusable, because of bandwidth and connectivity limitations, therefore it is vital to study the interdependencies between cybersecurity and real-time performance over wireless and devise appropriate solutions.

This Special Issue aims to receive contributions on advances in wireless networks as the key architecture enablers for real-time support within IoT applications and cyber–physical systems. The topics of interest include (but are not limited to):

  • Real-time support in heterogeneous wireless networks
  • Real-time support in vehicular networks
  • 5G for enabling real-time applications and automation
  • Software-defined networking for real-time support
  • Real-time industrial automation and use cases
  • Real-time healthcare monitoring
  • Real-time sensor networks and technologies
  • Fog and edge computing supporting real-time applications
  • Safety, security and trustworthiness in real-time networks
  • Energy-efficient real-time wireless networks

Dr. Guillermo Rodriguez-Navas
Dr. Hossein Fotouhi
Dr. Rafia Inam
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All papers will be peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2000 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • real-time networks
  • real-time analytics
  • wireless communications
  • sensor networks
  • fog and edge computing
  • SDR, SDN and NFV for real-time support
  • industrial IoT
  • eHealth applications
  • modeling, simulation and testbeds

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Open AccessArticle
A Threshold-Based Max-log-MPA Low Complexity Multiuser Detection Algorithm
Sensors 2020, 20(4), 1016; https://doi.org/10.3390/s20041016 - 13 Feb 2020
Abstract
Sparse Code Multiple Access (SCMA) technology is a new multiple access scheme based on non-orthogonal spread spectrum technology, which was proposed by Huawei in 2014. In the algorithm application of this technology, the original Message Passing Algorithm (MPA) has slow convergence speed and [...] Read more.
Sparse Code Multiple Access (SCMA) technology is a new multiple access scheme based on non-orthogonal spread spectrum technology, which was proposed by Huawei in 2014. In the algorithm application of this technology, the original Message Passing Algorithm (MPA) has slow convergence speed and high algorithm complexity. The threshold-based MPA has a high Bit Error Ratio (BER) when the threshold is low. In the Maximum logarithm Message Passing Algorithm (Max-log-MPA), the approximation method is used, which will cause some messages to be lost and the detection performance to be poor. Therefore, in order to solve the above problems, a Threshold-Based Max-log-MPA (T-Max-log-MPA) low complexity multiuser detection algorithm is proposed in this paper. The Maximum logarithm (Max-log) algorithm is combined with threshold setting, and the stability of user nodes is considered as a necessary condition for decision in the algorithm. Before message updating, the user information nodes are judged whether the necessary conditions for the stability of the user node have been met, and then the threshold is determined. Only users who meet the threshold condition and pass the necessary condition of user node stability can be decoded in advance. In the whole process, the logarithm domain MPA algorithm is used to convert an exp operation and a multiplication operation into a maximum value and addition operation. The simulation results show that the proposed algorithm can effectively reduce the computational complexity while ensuring the BER, and with the increase of signal-to-noise ratio, the effect of the Computational Complexity Reduction Ratio (CCRR) is more obvious. Full article
(This article belongs to the Special Issue Wireless Networks for Real Time Communication)
Show Figures

Figure 1

Open AccessArticle
Using Linguistic Properties of Place Specification for Network Naming to Improve Mobility Performance
Sensors 2019, 19(13), 2888; https://doi.org/10.3390/s19132888 - 29 Jun 2019
Abstract
By considering the definitions and properties from the field of linguistics regarding place specification, a questionnaire that can be used to improve naming in networks is obtained. The questionnaire helps introduce the idea of place specification from linguistics and the concept of metric [...] Read more.
By considering the definitions and properties from the field of linguistics regarding place specification, a questionnaire that can be used to improve naming in networks is obtained. The questionnaire helps introduce the idea of place specification from linguistics and the concept of metric spaces into network naming schemes. The questionnaire results are used to improve the basic Information-Centric Networking (ICN) architecture’s notoriously lax network naming structure. The improvements are realized by leveraging components from the Named-Node Network Architecture, a minor ICN design, to supply the resulting network architecture with the properties the questionnaire highlights. Evaluation results from experiments demonstrate that modifying the network architecture so that the proposed questionnaire is satisfied results in achieving high mobility performance. Specifically, the proposed system can obtain mean application goodput at above 88 % of the ideal result, with a delay below 0.104 s and with the network time-out Interest ratio below 0.082 for the proposed single mobile push producer, single mobile consumer scenario, even when the nodes reach the maximum tested speed of 14 m/s. Full article
(This article belongs to the Special Issue Wireless Networks for Real Time Communication)
Show Figures

Figure 1

Open AccessArticle
Conservative Sensor Error Modeling Using a Modified Paired Overbound Method and its Application in Satellite-Based Augmentation Systems
Sensors 2019, 19(12), 2826; https://doi.org/10.3390/s19122826 - 24 Jun 2019
Cited by 1
Abstract
Conservative sensor error modeling is of great significance in the field of safety-of-life. At present, the overbound method has been widely used in areas such as satellite-based augmentation systems (SBASs) and ground-based augmentation systems (GBASs) that provide integrity service. It can effectively solve [...] Read more.
Conservative sensor error modeling is of great significance in the field of safety-of-life. At present, the overbound method has been widely used in areas such as satellite-based augmentation systems (SBASs) and ground-based augmentation systems (GBASs) that provide integrity service. It can effectively solve the difficulties of non-Gaussian and non-zero mean error modeling and confidence interval estimation of user position error. However, there is still a problem in that the model is too conservative and leads to the lack of availability. In order to further improve the availability of SBASs, an improved paired overbound method is proposed in this paper. Compared with the traditional method, the improved algorithm no longer requires the overbound function to conform to the characteristics of the probability distribution function, so that under the premise of ensuring the integrity of the system, the real error characteristics can be more accurately modeled and measured. The experimental results show that the modified paired overbound method can improve the availability of the system with a probability of about 99%. In view of the fact that conservative error modeling is more sensitive to large deviations, this paper analyzes the robustness of the improved algorithm in the case of abnormal data loss. The maximum deviation under a certain integrity risk is used to illustrate the effectiveness of the improved paired overbound method compared with the original method. Full article
(This article belongs to the Special Issue Wireless Networks for Real Time Communication)
Show Figures

Figure 1

Open AccessArticle
Bacteria Interactive Cost and Balanced-Compromised Approach to Clustering and Transmission Boundary-Range Cognitive Routing In Mobile Heterogeneous Wireless Sensor Networks
Sensors 2019, 19(4), 867; https://doi.org/10.3390/s19040867 - 19 Feb 2019
Cited by 6
Abstract
The improvement of stable, energy-efficient mobile-based clustering and routing protocols in wireless sensor networks (WSNs) has become indispensable so as to develop large-scale, versitale, and adaptive applications. Data is gathered more efficiently and the total path length is shortened optimally by means of [...] Read more.
The improvement of stable, energy-efficient mobile-based clustering and routing protocols in wireless sensor networks (WSNs) has become indispensable so as to develop large-scale, versitale, and adaptive applications. Data is gathered more efficiently and the total path length is shortened optimally by means of mobile sink (MS). Two algorithms as bacterial interaction based cluster head (CH) selection and energy and transmission boundary range cognitive routing algorithm with novel approach for heterogeneous mobile networks are proposed in this study. The more reliable and powerful CH selection is made with the greedy approach that is based on the interaction fitness value, energy node degree, and distance to adjacent nodes in a compromised manner. The best trajectories, thanks to intersection edge points of the visited CHs, are obtained in the proposed routing algorithm. In this way, the MS entry to transmission range boundaries of the CH has been a sufficient strategy to collect information. As in energy model, we adopt energy consumption costs of listening and sensing channel as well as transmit and receive costs. Comprehensive performance analyzes have been seriously carried out via the Matlab 2016a environment. We validate that the proposed scheme outperforms existing studies in terms of several performance metrics as simulations. Full article
(This article belongs to the Special Issue Wireless Networks for Real Time Communication)
Show Figures

Figure 1

Back to TopTop