Journal Description
Telecom
Telecom
is an international, peer-reviewed, open access journal on communications and networks published quarterly online by MDPI. FITCE Hellas - Hellenic Branch of FITCE is affiliated with Telecom and its members receive a discount on the article processing charge.
- Open Access— free for readers, with article processing charges (APC) paid by authors or their institutions.
- High Visibility: indexed within ESCI (Web of Science), Scopus, and other databases.
- Journal Rank: CiteScore - Q2 (Computer Networks and Communications)
- Rapid Publication: manuscripts are peer-reviewed and a first decision is provided to authors approximately 16.9 days after submission; acceptance to publication is undertaken in 4.6 days (median values for papers published in this journal in the first half of 2023).
- Recognition of Reviewers: APC discount vouchers, optional signed peer review and reviewer names are published annually in the journal.
Latest Articles
6G Mobile Networks: Key Technologies, Directions, and Advances
Telecom 2023, 4(4), 836-876; https://doi.org/10.3390/telecom4040037 - 01 Dec 2023
Abstract
►
Show Figures
The exponential growth of the fifth-generation (5G) network gives businesses and universities a chance to turn their attention to the next-generation network. It is widely acknowledged that many IoT devices require more than 5G to send various types of data in real-time. In
[...] Read more.
The exponential growth of the fifth-generation (5G) network gives businesses and universities a chance to turn their attention to the next-generation network. It is widely acknowledged that many IoT devices require more than 5G to send various types of data in real-time. In addition to 5G, several research centres are currently concentrating on 6G, which is expected to produce networks with great quality of service (QoS) and energy efficiency. Future application requirements will necessitate a significant upgrade in mobile network architecture. 6G technologies offer larger networks with lower latency and faster data transmission than 5G networks. This review presents a comprehensive overview of 6G networks which includes the novel architectural changes within 6G networks, recent research insights from diverse institutions, applications within the realm of 6G networks, and the key features associated with them. We also explored various technologies of 6G networks encompassing terahertz, visible light connectivity, blockchain, and symbiotic broadcasting, all of which contribute to the establishment of robust and socially integrated network structures. In this survey, we have focused on 6G network slices and discussed a detailed exploration of security and privacy concerns regarding the potential 6G technologies at the levels of physical infrastructure, connecting protocols, and service provisions, alongside an evaluation of current security strategies.
Full article
Open AccessArticle
Performance Improvement Using ICIC for UAV-Assisted Public Safety Networks with Clustered Users during Emergency
Telecom 2023, 4(4), 816-835; https://doi.org/10.3390/telecom4040036 - 20 Nov 2023
Abstract
►▼
Show Figures
The application of drones, also known as unmanned aerial vehicles deployed as unmanned aerial base stations (UABSs), has received extensive interest for public safety communications (PSC) to fill the coverage gaps and establish ubiquitous connectivity. In this article, we design a PSC LTE-Advanced
[...] Read more.
The application of drones, also known as unmanned aerial vehicles deployed as unmanned aerial base stations (UABSs), has received extensive interest for public safety communications (PSC) to fill the coverage gaps and establish ubiquitous connectivity. In this article, we design a PSC LTE-Advanced air–ground-based HetNet (AG-HetNet) that is a scenario representation of a geographical area during and after a disaster. As part of the AG-HetNet infrastructure, we have UABSs and ground user equipment (GUE) flocking together in clusters at safe places or evacuation shelters. AG-HetNet uses cell range expansion (CRE), intercell interference coordination (ICIC), and 3D beamforming techniques to ensure ubiquitous connectivity. Through system-level simulations and using a brute-force technique, we evaluate the performance of the AG-HetNet in terms of fifth-percentile spectral efficiency (5pSE) and coverage probability. We compare system-wide 5pSE and coverage probability when UABSs are deployed on a hexagonal grid and for different clustering distributions of GUEs. The results show that reduced power subframes (FeICIC) defined in 3GPP Release-11 can provide practical gains in 5pSE and coverage probability than the 3GPP Release-10 with almost blank subframes (eICIC).
Full article

Figure 1
Open AccessArticle
A Vision of 6th Generation of Fixed Networks (F6G): Challenges and Proposed Directions
by
, , , , , , and
Telecom 2023, 4(4), 758-815; https://doi.org/10.3390/telecom4040035 - 07 Nov 2023
Abstract
►▼
Show Figures
Humankind has entered a new era wherein a main characteristic is the convergence of various technologies providing services and exerting a major impact upon all aspects of human activity, be it social interactions with the natural environment. Fixed networks are about to play
[...] Read more.
Humankind has entered a new era wherein a main characteristic is the convergence of various technologies providing services and exerting a major impact upon all aspects of human activity, be it social interactions with the natural environment. Fixed networks are about to play a major role in this convergence, since they form, along with mobile networks, the backbone that provides access to a broad gamut of services, accessible from any point of the globe. It is for this reason that we introduce a forward-looking approach for fixed networks, particularly focused on Fixed 6th Generation (F6G) networks. First, we adopt a novel classification scheme for the main F6G services, comprising six categories. This classification is based on the key service requirements, namely latency, capacity, and connectivity. F6G networks differ from those of previous generations (F1G–F5G) in that they concurrently support multiple key requirements. We then propose concrete steps towards transforming the main elements of fixed networks, such as optical transceivers, optical switches, etc., such that they satisfy the new F6G service requirements. Our study categorizes the main networking paradigm of optical switching into two categories, namely ultra-fast and ultra-high capacity switching, tailored to different service categories. With regard to the transceiver physical layer, we propose (a) the use of all-optical processing to mitigate performance barriers of analog-to-digital and digital-to-analog converters (ADC/DAC) and (b) the exploitation of optical multi-band transmission, space division-multiplexing, and the adoption of more efficient modulation formats.
Full article

Figure 1
Open AccessArticle
Lightweight and Robust Malware Detection Using Dictionaries of API Calls
Telecom 2023, 4(4), 746-757; https://doi.org/10.3390/telecom4040034 - 02 Nov 2023
Abstract
►▼
Show Figures
Malware in today’s business world has become a powerful tool used by cyber attackers. It has become more advanced, spreading quickly and causing significant harm. Modern malware is particularly dangerous because it can go undetected, making it difficult to investigate and stop in
[...] Read more.
Malware in today’s business world has become a powerful tool used by cyber attackers. It has become more advanced, spreading quickly and causing significant harm. Modern malware is particularly dangerous because it can go undetected, making it difficult to investigate and stop in real time. For businesses, it is vital to ensure that the computer systems are free from malware. To effectively address this problem, the most responsive solution is to operate in real time at the system’s edge. Although machine learning and deep learning have given promising performance for malware detection, the significant challenge is the required processing power and resources for implementation at the system’s edge. Therefore, it is important to prioritize a lightweight approach at the system’s edge. Equally important, the robustness of the model against the concept drift at the system’s edge is crucial to detecting the evolved zero-day malware attacks. Application programming interface (API) calls emerge as the most promising candidate to provide such a solution. However, it is quite challenging to create API call features to achieve a lightweight implementation, high malware detection rate, robustness, and fast execution. This study seeks to investigate and analyze the reuse rate of API calls in both malware and goodware, shedding light on the limitations of API call dictionaries for each class using different datasets. By leveraging these dictionaries, a statistical classifier (STC) is introduced to detect malware samples. Furthermore, the study delves into the investigation of model drift in the STC model, employing entirely distinct datasets for training and testing purposes. The results show the outstanding performance of the STC model in accurately detecting malware, achieving a recall value of one, and exhibiting robustness against model drift. Furthermore, the proposed STC model shows comparable performance to deep learning algorithms, which makes it a strong competitor for performing real-time inference on edge devices.
Full article

Figure 1
Open AccessArticle
Feasibility of Ultra-Wideband Channels at Millimeter Wavelengths Faded by Rain in GeoSurf Satellite Constellations
Telecom 2023, 4(4), 732-745; https://doi.org/10.3390/telecom4040033 - 25 Oct 2023
Abstract
►▼
Show Figures
We have studied the interference caused by amplitude and phase distortions induced by rain in ultra-wideband communication systems designed for using amplitude modulation in GeoSurf future satellite constellations. The results concern radio links simulated with the synthetic storm technique at Spino d’Adda (Italy),
[...] Read more.
We have studied the interference caused by amplitude and phase distortions induced by rain in ultra-wideband communication systems designed for using amplitude modulation in GeoSurf future satellite constellations. The results concern radio links simulated with the synthetic storm technique at Spino d’Adda (Italy), Madrid (Spain) and Tampa (Florida), which are sites located in different climatic regions. The conclusions are (a) the three sites, although in different climatic zones, are practically indistinguishable; (b) the channel signal-to-noise ratio can be increased or decreased by interference with equal probability. Channel theoretical capacity loss, even in the worst case, is very limited and rain, therefore, does not cause significant linear distortions in ultra-wideband channels at millimeter waves; therefore, these channels could be used at millimeter waves.
Full article

Figure 1
Open AccessArticle
Harnessing the Potential of Emerging Technologies to Break down Barriers in Tactical Communications
Telecom 2023, 4(4), 709-731; https://doi.org/10.3390/telecom4040032 - 16 Oct 2023
Cited by 1
Abstract
In the realm of military communications, the advent of new technologies like 5G and the future 6G networks holds promise. However, incorporating these technologies into tactical environments presents unique security challenges. This article delves into an analysis of these challenges by examining practical
[...] Read more.
In the realm of military communications, the advent of new technologies like 5G and the future 6G networks holds promise. However, incorporating these technologies into tactical environments presents unique security challenges. This article delves into an analysis of these challenges by examining practical use cases for military communications, where emerging technologies can be applied. Our focus lies on identifying and presenting a range of emerging technologies associated with 5G and 6G, including the Internet of things (IoT), tactile internet, network virtualization and softwarization, artificial intelligence, network slicing, digital twins, neuromorphic processors, joint sensing and communications, and blockchain. We specifically explore their applicability in tactical environments by proposing where they can be potential use cases. Additionally, we provide an overview of legacy tactical radios so that they can be researched to address the challenges posed by these technologies.
Full article
(This article belongs to the Topic Next Generation Intelligent Communications and Networks)
►▼
Show Figures

Figure 1
Open AccessArticle
Implementation of a Transportable Radar Mode S of Monopulse Secondary Surveillance (MSSR-S) for the Peruvian Civil Aviation Surveillance
by
, , , , , and
Telecom 2023, 4(4), 693-708; https://doi.org/10.3390/telecom4040031 - 03 Oct 2023
Abstract
►▼
Show Figures
This article describes the process of implementing a transportable radar MSSR-S for Peruvian civil aviation (ACP) to minimize the operational impact in emergencies that affects air traffic without causing structural damage and restore data from the radar in a short time. In recent
[...] Read more.
This article describes the process of implementing a transportable radar MSSR-S for Peruvian civil aviation (ACP) to minimize the operational impact in emergencies that affects air traffic without causing structural damage and restore data from the radar in a short time. In recent years, ACP has shown constant falls in the radars, causing radar data to be lost for long periods of time and putting air safety at risk due to the lack of maintenance and overlapping radar coverage of more than three radars. The deployment of the transportable radar in Mode S of Monopulse Secondary Surveillance (MSSR-S) has allowed for work that involves the prolonged stoppage of the radar to be carried out and provided coverage to eight more radars during maintenance and modernization, covering the areas without coverage in the Peruvian air space (EAP). For the implementation, this was divided into three SPRINTs using the SCRUM methodology; the first sprint refers to the equipment and radar coverage study, the second the implementation and service test phase, and the third the operational analysis phase with the eight modernized radars. As a result of the implementation and integration with the other ACP radar systems, they were able to operate together, providing highly reliable radar data, performing a continuous analysis of radar performance through the PASS software, complying with the thresholds established by ICAO and EuroControl, and guaranteeing that the systems operate under perfect conditions and with full coverage at all time.
Full article

Figure 1
Open AccessArticle
Entropy Weighted TOPSIS Based Cluster Head Selection in Wireless Sensor Networks under Uncertainty
Telecom 2023, 4(4), 678-692; https://doi.org/10.3390/telecom4040030 - 03 Oct 2023
Abstract
In recent decades, wireless sensor networks (WSNs) have become a popular ambient sensing and model-based solution for various applications. WSNs are now achievable due to the developments of micro electro mechanical and semiconductors logic circuits with rising computational power and wireless communication technology.
[...] Read more.
In recent decades, wireless sensor networks (WSNs) have become a popular ambient sensing and model-based solution for various applications. WSNs are now achievable due to the developments of micro electro mechanical and semiconductors logic circuits with rising computational power and wireless communication technology. The most difficult issues concerning WSNs are related to their energy consumption. Since communication typically requires a significant amount of energy, there are some techniques/ways to reduce energy consumption during the operation of the sensor’s communication systems. The topology control technique is one such effective method for reducing WSNs’ energy usage. A cluster head (CH) is usually selected using a topology control technique known as clustering to control the entire network. A single factor is inadequate for CH selection. Additionally, with the traditional clustering method, each round exhibits a new batch of head nodes. As a result, when using conventional techniques, nodes decay faster and require more energy. Furthermore, the inceptive energy of nodes, the range between sensor nodes and base stations, the size of data packets, voltage and transmission energy measurements, and other factors linked to sensor nodes are also completely unexpected due to irregular or hazardous natural circumstances. Here, unpredictability represented by Triangular Fuzzy Numbers (TFNs). The associated parameters of nodes were converted into crisp ones via the defuzzification of fuzzy numbers. The fuzzy number has been defuzzified using the well-known signed distance approach. Here, we have employed a multi-criteria decision-making (MCDM) approach to choosing the CHs depending on a bunch of characteristics of each node (i) residual energy, (ii) the number of neighbors, (iii) distance from the sink, (iv) average distance of cluster node, (v) distance ratio, and (vi) reliability. This study used the entropy-weighted Technique for Order Preference by Similarity to the Ideal Solution (TOPSIS) approach to select the CH in WSNs. For experiments, we have used the NSG2.1 simulator, and based on six characteristics comprising residual energy, number of neighbor nodes, distance from the sink or base station (BS), average distance of cluster nodes, distance ratio, and reliability, optimal CHs have been selected. Finally, experimental results have been presented and compared graphically with the existing literature. A statistical hypothesis test has also been conducted to verify the results that have been provided.
Full article
(This article belongs to the Special Issue Artificial Intelligence/Machine Learning in Wireless Communications and Networking)
►▼
Show Figures

Figure 1
Open AccessArticle
Detection of Transmission State of Multiple Wireless Sources: A Statistical Mechanics Approach
Telecom 2023, 4(3), 649-677; https://doi.org/10.3390/telecom4030029 - 18 Sep 2023
Abstract
►▼
Show Figures
Consider a random network of static primary wireless sources and a co-located network of secondary wireless devices. The channel coefficients between the two networks are assumed to be known to the secondary users (SUs), e.g., using radio environment maps (REM). However, the operational
[...] Read more.
Consider a random network of static primary wireless sources and a co-located network of secondary wireless devices. The channel coefficients between the two networks are assumed to be known to the secondary users (SUs), e.g., using radio environment maps (REM). However, the operational state of the sources is unknown due to intermittency. In this paper, we study the performance of primary source detection by SUs using a message-passing algorithm. Additionally, we employ methods from statistical mechanics, in particular, the Replica approach, to obtain analytic results for the performance of such networks in the large system-size limit. We test the results through a large-scale simulation analysis, obtaining good agreement. The proposed method provides a simple way to evaluate the performance of the system and assess how it depends on the macroscopic parameters that characterize it, such as the average density of SUs and sources and the signal-to-noise ratio. The main contribution of this paper is the application of an algorithm that quantitatively predicts the parameter value region for which accurate and reliable detection of the operational state of the primary sources can be achieved in a fast and decentralized manner.
Full article

Figure 1
Open AccessArticle
Incremental Online Machine Learning for Detecting Malicious Nodes in Vehicular Communications Using Real-Time Monitoring
Telecom 2023, 4(3), 629-648; https://doi.org/10.3390/telecom4030028 - 11 Sep 2023
Abstract
►▼
Show Figures
Detecting malicious activities in Vehicular Ad hoc Networks (VANETs) is an important research field as it can prevent serious damage within the network and enhance security and privacy. In this regard, a number of approaches based on machine learning (ML) algorithms have been
[...] Read more.
Detecting malicious activities in Vehicular Ad hoc Networks (VANETs) is an important research field as it can prevent serious damage within the network and enhance security and privacy. In this regard, a number of approaches based on machine learning (ML) algorithms have been proposed. However, they encounter several challenges due to data being constantly generated over time; this can impact the performance of models trained on fixed datasets as well as cause the need for real-time data analysis to obtain timely responses to potential threats in the network. Therefore, it is crucial for machine learning models to learn and improve their predictions or decisions in real time as new data become available. In this paper, we propose a new approach for attack detection in VANETs based on incremental online machine learning. This approach uses data collected from the monitoring of the VANET nodes’ behavior in real time and trains an online model using incremental online learning algorithms. More specifically, this research addresses the detection of black hole attacks that pose a significant threat to the Ad hoc On Demand Distance Vector (AODV) routing protocol. The data used for attack detection are gathered from simulating realistic VANET scenarios using the well-known simulators Simulation of Urban Mobility (SUMO) and Network Simulator (NS-3). Further, key features which are relevant in capturing the behavior of VANET nodes under black hole attack are monitored over time. The performance of two online incremental classifiers, Adaptive Random Forest (ARF) and K-Nearest Neighbors (KNN), are assessed in terms of Accuracy, Recall, Precision, and F1-score metrics, as well as training and testing time. The results show that ARF can be successfully applied to classify and detect black hole nodes in VANETs. ARF outperformed KNN in all performance measures but required more time to train and test compared to KNN. Our findings indicate that incremental online learning, which enables continuous and real-time learning, can be a potential method for identifying attacks in VANETs.
Full article

Figure 1
Open AccessArticle
A Novel Approach to Enhance the Energy Efficiency of a NOMA Network
Telecom 2023, 4(3), 611-628; https://doi.org/10.3390/telecom4030027 - 01 Sep 2023
Abstract
►▼
Show Figures
Spectral efficiency is crucial for implementing 5G cellular networks and beyond. Non-orthogonal multiple access (NOMA) is a promising scheme to enhance efficiency. This paper introduces two improvements that will further enhance the channel capacity using the NOMA algorithm. We first introduce a novel
[...] Read more.
Spectral efficiency is crucial for implementing 5G cellular networks and beyond. Non-orthogonal multiple access (NOMA) is a promising scheme to enhance efficiency. This paper introduces two improvements that will further enhance the channel capacity using the NOMA algorithm. We first introduce a novel algorithm, the User Sub-Channel Fair Matching Algorithm (USFMA), by applying a new sub-channel sorting and compensations scheme and then benefiting from the well-known Hungarian algorithm to allocate users to each sub-channel in a way that guarantees an optimum overall system performance. Then, for per sub-channel power allocation, we convert the non-convex objective function into a convex sub-problem using the concave–convex procedure (CCP) by converting the objective function into convex sub-problems and using the successive convex approximation to solve the convex sub-problems to find effective sub-optimal solutions. We have built a MATLAB simulation cellular environment to evaluate and compare the system performance with other known schemes. The results are promising and showed significant improvements compared to the other capacity and energy efficiency schemes.
Full article

Figure 1
Open AccessArticle
Design and Implementation of a Versatile OpenHAB IoT Testbed with a Variety of Wireless Interfaces and Sensors
Telecom 2023, 4(3), 597-610; https://doi.org/10.3390/telecom4030026 - 16 Aug 2023
Abstract
►▼
Show Figures
This paper presents the design and implementation of a versatile IoT testbed utilizing the openHAB platform, along with various wireless interfaces, including Z-Wave, ZigBee, Wi-Fi, 4G-LTE (Long-Term Evolution), and IR (Infrared Radiation), and an array of sensors for motion, temperature, luminance, humidity, vibration,
[...] Read more.
This paper presents the design and implementation of a versatile IoT testbed utilizing the openHAB platform, along with various wireless interfaces, including Z-Wave, ZigBee, Wi-Fi, 4G-LTE (Long-Term Evolution), and IR (Infrared Radiation), and an array of sensors for motion, temperature, luminance, humidity, vibration, UV (ultraviolet), and energy consumption. First, the testbed architecture, setup, basic testing, and collected data results are described. Then, by showcasing a typical day in the laboratory, we illustrate the testbed’s potential through the collection and analysis of data from multiple sensors. The study also explores the capabilities of the openHAB platform, including its robust persistence layer, event management, real-time monitoring, and customization. The significance of the testbed in enhancing data collection methodologies for energy assets and unlocking new possibilities in the realm of IoT technologies is particularly highlighted.
Full article

Figure 1
Open AccessReview
A Comprehensive Survey on Knowledge-Defined Networking
Telecom 2023, 4(3), 477-596; https://doi.org/10.3390/telecom4030025 - 02 Aug 2023
Cited by 1
Abstract
►▼
Show Figures
Traditional networking is hardware-based, having the control plane coupled with the data plane. Software-Defined Networking (SDN), which has a logically centralized control plane, has been introduced to increase the programmability and flexibility of networks. Knowledge-Defined Networking (KDN) is an advanced version of SDN
[...] Read more.
Traditional networking is hardware-based, having the control plane coupled with the data plane. Software-Defined Networking (SDN), which has a logically centralized control plane, has been introduced to increase the programmability and flexibility of networks. Knowledge-Defined Networking (KDN) is an advanced version of SDN that takes one step forward by decoupling the management plane from control logic and introducing a new plane, called a knowledge plane, decoupled from control logic for generating knowledge based on data collected from the network. KDN is the next-generation architecture for self-learning, self-organizing, and self-evolving networks with high automation and intelligence. Even though KDN was introduced about two decades ago, it had not gained much attention among researchers until recently. The reasons for delayed recognition could be due to the technology gap and difficulty in direct transformation from traditional networks to KDN. Communication networks around the globe have already begun to transform from SDNs into KDNs. Machine learning models are typically used to generate knowledge using the data collected from network devices and sensors, where the generated knowledge may be further composed to create knowledge ontologies that can be used in generating rules, where rules and/or knowledge can be provided to the control, management, and application planes for use in decision-making processes, for network monitoring and configuration, and for dynamic adjustment of network policies, respectively. Among the numerous advantages that KDN brings compared to SDN, enhanced automation and intelligence, higher flexibility, and improved security stand tall. However, KDN also has a set of challenges, such as reliance on large quantities of high-quality data, difficulty in integration with legacy networks, the high cost of upgrading to KDN, etc. In this survey, we first present an overview of the KDN architecture and then discuss each plane of the KDN in detail, such as sub-planes and interfaces, functions of each plane, existing standards and protocols, different models of the planes, etc., with respect to examples from the existing literature. Existing works are qualitatively reviewed and assessed by grouping them into categories and assessing the individual performance of the literature where possible. We further compare and contrast traditional networks and SDN against KDN. Finally, we discuss the benefits, challenges, design guidelines, and ongoing research of KDNs. Design guidelines and recommendations are provided so that identified challenges can be mitigated. Therefore, this survey is a comprehensive review of architecture, operation, applications, and existing works of knowledge-defined networks.
Full article

Figure 1
Open AccessArticle
Power Supply Technologies for Drones and Machine Vision Applications: A Comparative Analysis and Future Trends
by
, , , and
Telecom 2023, 4(3), 459-476; https://doi.org/10.3390/telecom4030024 - 01 Aug 2023
Abstract
►▼
Show Figures
The field of Unmanned Aerial Vehicles (UAVs), or drones, is encountering quick development in the areas of air transportation and computerization. Progress in innovation has prompted more noteworthy capacities and highlights in UAVs, which are currently broadly involved by the military and flying
[...] Read more.
The field of Unmanned Aerial Vehicles (UAVs), or drones, is encountering quick development in the areas of air transportation and computerization. Progress in innovation has prompted more noteworthy capacities and highlights in UAVs, which are currently broadly involved by the military and flying industry for an assortment of high-end generally safe errands. Highly advanced UAVs that can be controlled remotely via a controller, mobile phone, or ground station cockpit have been developed through the integration of automation technology and machine vision, which includes thermal imaging, cameras, sensors, and other sensors. The three primary characteristics of UAVs will be investigated in this study, namely power-source technology, deep-learning neural networks for computer vision, and some of the applications that are used the most. The goal is to thoroughly examine these characteristics and offer suggestions for addressing some of the difficulties of optimizing UAV performance and also exploring potential future trends.
Full article

Figure 1
Open AccessArticle
A Machine Learning-Aided Network Contention-Aware Link Lifetime- and Delay-Based Hybrid Routing Framework for Software-Defined Vehicular Networks
Telecom 2023, 4(3), 393-458; https://doi.org/10.3390/telecom4030023 - 18 Jul 2023
Cited by 3
Abstract
►▼
Show Figures
The functionality of Vehicular Ad Hoc Networks (VANETs) is improved by the Software-Defined Vehicular Network (SDVN) paradigm. Routing is challenging in vehicular networks due to the dynamic network topology resulting from the high mobility of nodes. Existing approaches for routing in SDVN do
[...] Read more.
The functionality of Vehicular Ad Hoc Networks (VANETs) is improved by the Software-Defined Vehicular Network (SDVN) paradigm. Routing is challenging in vehicular networks due to the dynamic network topology resulting from the high mobility of nodes. Existing approaches for routing in SDVN do not exploit both link lifetimes and link delays in finding routes, nor do they exploit the heterogeneity that exists in links in the vehicular network. Furthermore, most of the existing approaches compute parameters at the controller entirely using heuristic approaches, which are computationally inefficient and can increase the latency of SDVN as the network size grows. In this paper, we propose a novel hybrid algorithm for routing in SDVNs with two modes: the highest stable least delay mode and the highest stable shortest path mode, in which the mode is selected by estimating the network contention. We distinctly identify two communication channels in the vehicular network as wired and wireless, where network link entropy is formulated accordingly and is used in combination with pending transmissions to estimate collision probability and average network contention. We use the prospect of machine learning to predict the wireless link lifetimes and one-hop channel delays, which yield very low Root Mean Square Errors (RMSEs), depicting their very high accuracy, and the wireless link lifetime prediction using deep learning yields a much lower average computational time compared to an optimization-based approach. The proposed novel algorithm selects only stable links by comparing them with a link lifetime threshold whose optimum value is decided experimentally. We propose this routing framework to be compatible with the OpenFlow protocol, where we modify the flow table architecture to incorporate a route valid time and send a packet_in message to the controller when the route’s lifetime expires, requesting new flow rules. We further propose a flow table update algorithm to map computed routes to flow table entries, where we propose to incorporate an adaptive approach for route finding and flow rule updating upon reception of a packet_in message in order to minimize the computational burden at the controller and minimize communication overhead associated with control plane communication. This research contributes a novel hybrid routing framework for the existing SDVN paradigm, scrutinizing machine learning to predict the lifetime and delay of heterogeneity links, which can be readily integrated with the OpenFlow protocol for better routing applications, improving the performance of the SDVN. We performed realistic vehicular network simulations using the network simulator 3 by obtaining vehicular mobility traces using the Simulation of Urban Mobility (SUMO) tool, where we collected data sets for training the machine learning models using the simulated environment in order to test models in terms of RMSE and computational complexity. The proposed routing framework was comparatively assessed against existing routing techniques by evaluating the communication cost, latency, channel utilization, and packet delivery ratio. According to the results, the proposed routing framework results in the lowest communication cost, the highest packet delivery ratio, the least latency, and moderate channel utilization, on average, compared to routing in VANET using Ad Hoc On-demand Distance Vector (AODV) and routing in SDVN using Dijkstra; thus, the proposed routing framework improves routing in SDVN. Furthermore, results show that the proposed routing framework is enhanced with increasing routing frequency and network size, as well as at low vehicular speeds.
Full article

Figure 1
Open AccessArticle
An Adaptive Scheduling Mechanism Optimized for V2N Communications over Future Cellular Networks
Telecom 2023, 4(3), 378-392; https://doi.org/10.3390/telecom4030022 - 06 Jul 2023
Abstract
►▼
Show Figures
Automated driving requires the support of critical communication services with strict performance requirements. Existing fifth-generation (5G) schedulers residing at the base stations are not optimized to differentiate between critical and non-critical automated driving applications. Thus, when the traffic load increases, there is a
[...] Read more.
Automated driving requires the support of critical communication services with strict performance requirements. Existing fifth-generation (5G) schedulers residing at the base stations are not optimized to differentiate between critical and non-critical automated driving applications. Thus, when the traffic load increases, there is a significant decrease in their performance. Our paper introduces SOVANET, a beyond 5G scheduler that considers the Radio Access Network (RAN) load, as well as the requirements of critical, automated driving applications and optimizes the allocation of resources to them compared to non-critical services. The proposed scheduler is evaluated through extensive simulations and compared to the typical Proportional Fair scheduler. Results show that SOVANET’s performance for critical services presents clear benefits.
Full article

Figure 1
Open AccessArticle
Keystroke Dynamics as a Language Profiling Tool: Identifying Mother Tongue of Unknown Internet Users
Telecom 2023, 4(3), 369-377; https://doi.org/10.3390/telecom4030021 - 03 Jul 2023
Cited by 2
Abstract
►▼
Show Figures
Understanding the distinct characteristics of unidentified Internet users is helpful in various contexts, including digital forensics, targeted advertising, and user interaction with services and systems. Keystroke dynamics (KD) enables the analysis of data derived from a user’s typing behaviour on a keyboard as
[...] Read more.
Understanding the distinct characteristics of unidentified Internet users is helpful in various contexts, including digital forensics, targeted advertising, and user interaction with services and systems. Keystroke dynamics (KD) enables the analysis of data derived from a user’s typing behaviour on a keyboard as one approach to obtain such information. This study conducted experiments on a developed dataset that recorded samples of typing in five different mother tongues to determine Internet users’ mother tongue. Based on only a few KD features and machine learning techniques, 82% accuracy was achieved in recognising an unknown user’s mother tongue. This research highlights the potential for KD as a reliable method for identifying the mother tongue of Internet users, with implications for various applications such as improving digital forensic investigations, targeted advertising strategies, and optimising user experiences with online services.
Full article

Figure 1
Open AccessArticle
AI-Assisted Multi-Operator RAN Sharing for Energy-Efficient Networks
by
, , , and
Telecom 2023, 4(2), 334-368; https://doi.org/10.3390/telecom4020020 - 19 Jun 2023
Abstract
Recent times have seen a significant rise in interest from mobile operators, vendors, and research projects toward achieving more energy-efficient and sustainable networks. Not surprisingly, it comes at a time when higher traffic demand and more stringent and diverse network requirements result in
[...] Read more.
Recent times have seen a significant rise in interest from mobile operators, vendors, and research projects toward achieving more energy-efficient and sustainable networks. Not surprisingly, it comes at a time when higher traffic demand and more stringent and diverse network requirements result in diminishing benefits for operators using complex AI-driven network optimization solutions. In this paper, we propose the idea of tower companies that facilitate radio access network (RAN) infrastructure sharing between operators and evaluate the additional energy savings obtained in this process. In particular, we focus on the RAN-as-a-Service (RANaaS) implementation, wherein each operator leases and controls an independent logical RAN instance running on the shared infrastructure. We show how an AI system can assist operators in optimizing their share of resources under multiple constraints. This paper aims to provide a vision, a quantitative and qualitative analysis of the RANaaS paradigm, and its benefits in terms of energy efficiency. Through simulations, we show the possibility to achieve up to 75 percent energy savings per operator over 24 h compared to the scenario where none of the energy-saving features are activated. This is an additional 55 percent energy savings from sharing the RAN infrastructure compared to the baseline scenario where the operators use independent hardware.
Full article
(This article belongs to the Special Issue Artificial Intelligence/Machine Learning in Wireless Communications and Networking)
►▼
Show Figures

Figure 1
Open AccessArticle
Modeling and Evaluation of a Dynamic Channel Selection Framework for Multi-Channel Operation in ITS-G5
by
and
Telecom 2023, 4(2), 313-333; https://doi.org/10.3390/telecom4020019 - 19 Jun 2023
Abstract
►▼
Show Figures
Many years ago, it seemed inconceivable that our cars could drive autonomously or communicate with each other to form a self-organizing convoy or platoon. By 2023, however, technological advances have taken us to the point where most of these goals will be achieved.
[...] Read more.
Many years ago, it seemed inconceivable that our cars could drive autonomously or communicate with each other to form a self-organizing convoy or platoon. By 2023, however, technological advances have taken us to the point where most of these goals will be achieved. In the time of what was initially known as Day 1, single-channel Intelligent Transport System (ITS) devices fully met the requirements for safe communication. The trends show that with the rapid development and the emergence of new, more robust Vehicle-to-Everything (V2X) applications, which require higher bandwidth (collectively called Day 2), the current single-channel medium access method in the available ITS bands will no longer achieve the desired capacities. The main reason is that Day 2 and beyond V2X information dissemination protocols introduce increasing packet sizes and sending frequencies. To complete a resource-friendly and more efficient operation with Day 2 or other advanced V2X services, ITS standards present the Multi-Channel Operation (MCO) constellation as a potential solution. In the case of MCO, we use two or more channels simultaneously, thus preventing the radio medium from saturating its capacity. However, there are still several pending questions about MCO applicability, practical usage, configuration, and deployment, to name a few. The primary purpose of this article is to present a dynamic channel selection framework design and implementation capable of modeling and simulating advanced multi-channel communication use cases. We used this framework to investigate Channel Busy Ratio (CBR) based dynamic channel switching within the Artery/OMNeT++ simulation environment.
Full article

Figure 1
Open AccessArticle
Benchmarking Message Queues
Telecom 2023, 4(2), 298-312; https://doi.org/10.3390/telecom4020018 - 13 Jun 2023
Cited by 1
Abstract
►▼
Show Figures
Message queues are a way for different software components or applications to communicate with each other asynchronously by passing messages through a shared buffer. This allows a sender to send a message without needing to wait for an immediate response from the receiver,
[...] Read more.
Message queues are a way for different software components or applications to communicate with each other asynchronously by passing messages through a shared buffer. This allows a sender to send a message without needing to wait for an immediate response from the receiver, which can help to improve the system’s performance, reduce latency, and allow components to operate independently. In this paper, we compared and evaluated the performance of four popular message queues: Redis, ActiveMQ Artemis, RabbitMQ, and Apache Kafka. The aim of this study was to provide insights into the strengths and weaknesses of each technology and to help practitioners choose the most appropriate solution for their use case. We primarily evaluated each technology in terms of latency and throughput. Our experiments were conducted using a diverse array of workloads to test the message queues under various scenarios. This enables practitioners to evaluate the performance of the systems and choose the one that best meets their needs. The results show that each technology has its own pros and cons. Specifically, Redis performed the best in terms of latency, whereas Kafka significantly outperformed the other three technologies in terms of throughput. The optimal choice depends on the specific requirements of the use case. This paper presents valuable insights for practitioners and researchers working with message queues. Furthermore, the results of our experiments are provided in JSON format as a supplement to this paper.
Full article

Figure 1
Highly Accessed Articles
Latest Books
E-Mail Alert
News
Topics
Topic in
Applied Sciences, Electronics, Eng, Remote Sensing, Signals, Telecom
Radar Signal and Data Processing with Applications
Topic Editors: Yin Zhang, Yulin Huang, Yachao Li, Deqing MaoDeadline: 31 December 2023
Topic in
Applied Sciences, Electronics, Remote Sensing, Sensors, Technologies, Telecom
Recent Advances in PNT Technology with GNSS as the Core and Its Application in Emerging Fields
Topic Editors: Liang Chen, Zhiguo Deng, Guanwen Huang, Huizhong ZhuDeadline: 31 August 2024
Topic in
Coatings, Electronics, Energies, Sensors, Telecom
Condition Monitoring and Diagnostic Methods for Power Equipment in New Energy Power Systems
Topic Editors: Shuaibing Li, Guoqiang Gao, Guochang Li, Yi Cui, Jiefeng Liu, Guangya Zhu, Jin LiDeadline: 15 September 2024
Topic in
Applied Sciences, Electronics, IoT, JSAN, Network, Sensors, Telecom, Technologies
Wireless Energy Harvesting and Power Transfer for Communications and Networks
Topic Editors: Yichuang Sun, Arooj Mubashara Siddiqui, Xiaojing Chen, Oluyomi SimpsonDeadline: 31 December 2024

Conferences
Special Issues
Special Issue in
Telecom
Modern Circuits and Systems Technologies on Electronics and Communications (MOCAST 2023)
Guest Editors: Sotirios K. Goudos, Panagiotis SarigiannidisDeadline: 31 January 2024
Special Issue in
Telecom
Joint Application of Telecom and Internet Services
Guest Editors: Arianit Maraj, Dardan MarajDeadline: 31 May 2024
Special Issue in
Telecom
Digitalization, Information Technology and Social Development
Guest Editor: Przemysław Falkowski-GilskiDeadline: 10 June 2024