sensors-logo

Journal Browser

Journal Browser

Wireless Communication in Internet of Things

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Communications".

Deadline for manuscript submissions: closed (15 December 2020) | Viewed by 30625

Special Issue Editors


E-Mail Website
Guest Editor
School of Innovation, Design and Engineering, Mälardalen University, 721 23 Västerås, Sweden
Interests: wireless networks; intelligent wireless communication; sensor networks; mobile computing; edge computing; Internet of Things; software defined networking
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
1. School of Innovation, Design and Engineering, Mälardalen University, Västerås, Sweden
2. ABB Corporate Research, Västerås, Sweden
Interests: wireless sensor networks; industrial automation; time-sensitive networks; cybersecurity

E-Mail Website
Guest Editor
Department of Computer Science and Media Technology, Malmö University, SE-211 19 Malmö, Sweden
Interests: Internet of things; connectivity; advanced sensor networks; intelligent transportation systems; vehicular networks
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) allows billions of smart devices to be connected to the Internet. Such smart devices are sensors and actuators that have processing, memory, storage, and communication capabilities. Wireless communication plays a major role in IoT systems, since deploying several sensors through wired connection is tedious, and for some applications it is impossible to establish wired communication. Due to the advances in radio technologies and wireless communication protocols, it is possible to employ wireless links for data communication in IoT systems. This Special Issue focuses on various topics related to wireless communication, and some are listed in the keywords.

Dr. Hossein Fotouhi
Dr. Maryam Vahabi
Prof. Reza Malekian
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Sensor data storage, retrieval, and processing;
  • Network and system architectures and protocols;
  • IoT gateway platform architecture and services;
  • Localization and synchronization;
  • IoT reliability, adaptability, and dependability;
  • Security and privacy;
  • Machine learning and deep learning on sensor data;
  • Heterogeneous collaborative sensing, including human–robot sensor systems;
  • Low-power operation, energy harvesting, and energy management;
  • Mobile and pervasive systems with elements of networked sensing;
  • Transition strategies from existing networks to SDN/NFV;
  • Network softwarization for IoT;
  • Network slicing and slice management;
  • Mobility management;
  • QoS and QoE in softwarized infrastructures;
  • AI techniques to support network automation;
  • Big data analytics for managing softwarized networks;
  • Applications (e.g., intelligent transportation systems, healthcare, and energy management).

Published Papers (7 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review, Other

27 pages, 3702 KiB  
Article
An Intelligent Load Control-Based Random Access Scheme for Space-Based Internet of Things
by Changjiang Fei, Bin Jiang, Kun Xu, Lei Wang and Baokang Zhao
Sensors 2021, 21(4), 1040; https://doi.org/10.3390/s21041040 - 03 Feb 2021
Cited by 5 | Viewed by 2136
Abstract
Random access is one of the most competitive multiple access schemes for future space-based Internet of Things (S-IoT) due to its support for massive connections and grant-free transmission, as well as its ease of implementation. However, firstly, existing random access schemes are highly [...] Read more.
Random access is one of the most competitive multiple access schemes for future space-based Internet of Things (S-IoT) due to its support for massive connections and grant-free transmission, as well as its ease of implementation. However, firstly, existing random access schemes are highly sensitive to load: once the load exceeds a certain critical value, the throughput will drop sharply due to the increased probability of data collision. Moreover, due to variable satellite coverage and bursty traffic, the network load of S-IoT changes dynamically; therefore, when existing random access schemes are applied directly to the S-IoT environment, the actual throughput is far below the theoretical maximum. Accordingly, this paper proposes an intelligent load control-based random access scheme based on CRDSA++, which is an enhanced version of the contention resolution diversity slotted ALOHA (CRDSA) and extends the CRDSA concept to more than two replicas. The proposed scheme is dubbed load control-based three-replica contention resolution diversity slotted ALOHA (LC-CRDSA3). LC-CRDSA3 actively controls network load. When the load threatens to exceed the critical value, only certain nodes are allowed to send data, and the load is controlled to be near the critical value, thereby effectively improving the throughput. In order to accurately carry out load control, we innovatively propose a maximum likelihood estimation (MLE)-based load estimation algorithm, which estimates the load value of each received frame by making full use of the number of time slots in different states. On this basis, LC-CRDSA3 adopts computational intelligence-based time series forecasting technology to predict the load values of future frames using the historical load values. We evaluated the performance of LC-CRDSA3 through a series of simulation experiments and compared it with CRDSA++. Our experimental results demonstrate that in S-IoT contexts where the load changes dynamically, LC-CRDSA3 can obtain network throughput that is close to the theoretical maximum across a wide load range through accurate load control. Full article
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Show Figures

Figure 1

19 pages, 2229 KiB  
Article
A Novel Epidemic Model for Wireless Rechargeable Sensor Network Security
by Guiyun Liu, Baihao Peng and Xiaojing Zhong
Sensors 2021, 21(1), 123; https://doi.org/10.3390/s21010123 - 27 Dec 2020
Cited by 20 | Viewed by 2895
Abstract
With the development of wireless rechargeable sensor networks (WRSNs ), security issues of WRSNs have attracted more attention from scholars around the world. In this paper, a novel epidemic model, SILS(Susceptible, Infected, Low-energy, Susceptible), considering the removal, charging [...] Read more.
With the development of wireless rechargeable sensor networks (WRSNs ), security issues of WRSNs have attracted more attention from scholars around the world. In this paper, a novel epidemic model, SILS(Susceptible, Infected, Low-energy, Susceptible), considering the removal, charging and reinfection process of WRSNs is proposed. Subsequently, the local and global stabilities of disease-free and epidemic equilibrium points are analyzed and simulated after obtaining the basic reproductive number R0. Detailedly, the simulations further reveal the unique characteristics of SILS when it tends to being stable, and the relationship between the charging rate and R0. Furthermore, the attack-defense game between malware and WRSNs is constructed and the optimal strategies of both players are obtained. Consequently, in the case of R0<1 and R0>1, the validity of the optimal strategies is verified by comparing with the non-optimal control group in the evolution of sensor nodes and accumulated cost. Full article
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Show Figures

Figure 1

24 pages, 1274 KiB  
Article
On the Fidelity of NS-3 Simulations of Wireless Multipath TCP Connections
by Monika Prakash and Atef Abdrabou
Sensors 2020, 20(24), 7289; https://doi.org/10.3390/s20247289 - 18 Dec 2020
Cited by 6 | Viewed by 3256
Abstract
The multipath transmission control protocol (MPTCP) is considered a promising wireless multihoming solution, and the 3rd generation partnership project (3GPP) includes it as a standard feature in the fifth-generation (5G) networks. Currently, ns-3 (Network Simulator-3) is widely used to evaluate the performance of [...] Read more.
The multipath transmission control protocol (MPTCP) is considered a promising wireless multihoming solution, and the 3rd generation partnership project (3GPP) includes it as a standard feature in the fifth-generation (5G) networks. Currently, ns-3 (Network Simulator-3) is widely used to evaluate the performance of wireless networks and protocols, including the emerging MPTCP protocol. This paper investigates the fidelity of the Linux kernel implementation of MPTCP in the ns-3 direct code execution module. The fidelity of MPTCP simulation is tested by comparing its performance with a real Linux stack implementation of MPTCP using a hardware testbed for two different setups. One setup emulates the existence of a bottleneck link between the sending and receiving networks, whereas the other setup does not have such a bottleneck. The fidelity of ns-3’s simulation is tested for four congestion control algorithms, namely Cubic, linked-increases algorithm (LIA), opportunistic LIA (OLIA) and wVegas for relatively short and long data flows. It is found that the uplink MPTCP throughput performance exhibited by the ns-3 simulator matches the hardware testbed results only if the flows are long-lived and share no common bottleneck link. Likewise, the MPTCP throughput achieved during a downlink scenario using the ns-3 simulator and the hardware testbed are close to each other across all algorithms except wVegas regardless of the flow size if there is no bottleneck link. Moreover, it is observed that the impact of LTE handover on MPTCP throughput is less significant in the simulator than the real hardware testbed, and it is setup-dependent. Full article
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Show Figures

Figure 1

20 pages, 6217 KiB  
Article
An Analysis Scheme of Balancing Energy Consumption with Mobile Velocity Control Strategy for Wireless Rechargeable Sensor Networks
by Shun-Miao Zhang, Sheng-Bo Gao, Thi-Kien Dao, De-Gen Huang, Jin Wang, Hong-Wei Yao, Osama Alfarraj and Amr Tolba
Sensors 2020, 20(16), 4494; https://doi.org/10.3390/s20164494 - 11 Aug 2020
Cited by 5 | Viewed by 1870
Abstract
Wireless Rechargeable Sensor Networks (WRSN) are not yet fully functional and robust due to the fact that their setting parameters assume fixed control velocity and location. This study proposes a novel scheme of the WRSN with mobile sink (MS) velocity control strategies for [...] Read more.
Wireless Rechargeable Sensor Networks (WRSN) are not yet fully functional and robust due to the fact that their setting parameters assume fixed control velocity and location. This study proposes a novel scheme of the WRSN with mobile sink (MS) velocity control strategies for charging nodes and collecting its data in WRSN. Strip space of the deployed network area is divided into sub-locations for variant corresponding velocities based on nodes energy expenditure demands. The points of consumed energy bottleneck nodes in sub-locations are determined based on gathering data of residual energy and expenditure of nodes. A minimum reliable energy balanced spanning tree is constructed based on data collection to optimize the data transmission paths, balance energy consumption, and reduce data loss during transmission. Experimental results are compared with the other methods in the literature that show that the proposed scheme offers a more effective alternative in reducing the network packet loss rate, balancing the nodes’ energy consumption, and charging capacity of the nodes than the competitors. Full article
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Show Figures

Figure 1

Review

Jump to: Research, Other

27 pages, 5729 KiB  
Review
Integrating Cognitive Radio with Unmanned Aerial Vehicles: An Overview
by Guilherme Marcel Dias Santana, Rogers Silva de Cristo and Kalinka Regina Lucas Jaquie Castelo Branco
Sensors 2021, 21(3), 830; https://doi.org/10.3390/s21030830 - 27 Jan 2021
Cited by 16 | Viewed by 5005
Abstract
Unmanned Aerial Vehicles (UAVs) demand technologies so they can not only fly autonomously, but also communicate with base stations, flight controllers, computers, devices, or even other UAVs. Still, UAVs usually operate within unlicensed spectrum bands, competing against the increasing number of mobile devices [...] Read more.
Unmanned Aerial Vehicles (UAVs) demand technologies so they can not only fly autonomously, but also communicate with base stations, flight controllers, computers, devices, or even other UAVs. Still, UAVs usually operate within unlicensed spectrum bands, competing against the increasing number of mobile devices and other wireless networks. Combining UAVs with Cognitive Radio (CR) may increase their general communication performance, thus allowing them to execute missions where the conventional UAVs face limitations. CR provides a smart wireless communication which, instead of using a transmission frequency defined in the hardware, uses software transmission. CR smartly uses free transmission channels and/or chooses them according to application’s requirements. Moreover, CR is considered a key enabler for deploying technologies that require high connectivity, such as Smart Cities, 5G, Internet of Things (IoT), and the Internet of Flying Things (IoFT). This paper presents an overview on the field of CR for UAV communications and its state-of-the-art, testbed alternatives for real data experiments, as well as specifications to build a simple and low-cost testbed, and indicates key opportunities and future challenges in the field. Full article
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Show Figures

Figure 1

35 pages, 500 KiB  
Review
Bluetooth Low Energy Mesh Networks: Survey of Communication and Security Protocols
by Muhammad Rizwan Ghori, Tat-Chee Wan and Gian Chand Sodhy
Sensors 2020, 20(12), 3590; https://doi.org/10.3390/s20123590 - 25 Jun 2020
Cited by 40 | Viewed by 10376
Abstract
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support [...] Read more.
Bluetooth Low Energy (BLE) Mesh Networks enable flexible and reliable communications for low-power Internet of Things (IoT) devices. Most BLE-based mesh protocols are implemented as overlays on top of the standard Bluetooth star topologies while using piconets and scatternets. Nonetheless, mesh topology support has increased the vulnerability of BLE to security threats, since a larger number of devices can participate in a BLE Mesh network. To address these concerns, BLE version 5 enhanced existing BLE security features to deal with various authenticity, integrity, and confidentiality issues. However, there is still a lack of detailed studies related to these new security features. This survey examines the most recent BLE-based mesh network protocols and related security issues. In the first part, the latest BLE-based mesh communication protocols are discussed. The analysis shows that the implementation of BLE pure mesh protocols remains an open research issue. Moreover, there is a lack of auto-configuration mechanisms in order to support bootstrapping of BLE pure mesh networks. In the second part, recent BLE-related security issues and vulnerabilities are highlighted. Strong Intrusion Detection Systems (IDS) are essential for detecting security breaches in order to protect against zero-day exploits. Nonetheless, viable IDS solutions for BLE Mesh networks remain a nascent research area. Consequently, a comparative survey of IDS approaches for related low-power wireless protocols was used to map out potential approaches for enhancing IDS solutions for BLE Mesh networks. Full article
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Show Figures

Figure 1

Other

Jump to: Research, Review

14 pages, 1038 KiB  
Letter
Multipath Map Method for TDOA Based Indoor Reverse Positioning System with Improved Chan-Taylor Algorithm
by Cheng Hua, Kun Zhao, Danan Dong, Zhengqi Zheng, Chao Yu, Yu Zhang and Tiantian Zhao
Sensors 2020, 20(11), 3223; https://doi.org/10.3390/s20113223 - 05 Jun 2020
Cited by 20 | Viewed by 3451
Abstract
We study wireless indoor positioning systems where multiple synchronized infrastructure devices simultaneously receive signals from an object of interest whose arrival times are measured. The positioning performance is degraded by unresolvable channel multipath and non-line-of-sight (NLOS) reflctions which cause a bias in the [...] Read more.
We study wireless indoor positioning systems where multiple synchronized infrastructure devices simultaneously receive signals from an object of interest whose arrival times are measured. The positioning performance is degraded by unresolvable channel multipath and non-line-of-sight (NLOS) reflctions which cause a bias in the time difference of arrival (TDOA) measurements. In order to reduce the negative effect of multi-path, a Multi-Path Map (MPM) method based on spatial domain modeling principle in the reverse positioning framework with good robustness is proposed. Meanwhile, an improved non-linear iterative algorithm with height component constrained which reduces the complexity is introduced to calculate the coordinates so that the performance of the MPM can be verified. By using the MPM measurements as pre-calibration information to compensate the TDOA observed value, the accuracy of the cooperative location based on a UWB device is 6.45 cm, which achieves 63% improvement than that of none MPM used. Full article
(This article belongs to the Special Issue Wireless Communication in Internet of Things)
Show Figures

Figure 1

Back to TopTop