Joint Application of Telecom and Internet Services

A special issue of Telecom (ISSN 2673-4001).

Deadline for manuscript submissions: closed (31 May 2024) | Viewed by 1870

Special Issue Editors


E-Mail Website
Guest Editor
Kosovo Telecom, Pristina, Kosovo
Interests: 5G; cybersecurity; communication and wireless networking

E-Mail Website
Guest Editor Assistant
Faculty of Electrical Engineering and Computing, University of Zagreb, 10000 Zagreb, Croatia
Interests: security and privacy issues; QoE; QoS; WoT and cybersecurity

Special Issue Information

Dear Colleagues,

The joint application of telecom and broadband internet services will be possible with the deployment of new technologies such as 5G. Fifth-generation technologies in the telecom industry provide a great opportunity for businesses to provide new and qualitative services, which will help them grow their businesses. Mobile network operators must build a dense optical network that will serve as the 5G infrastructure in order to provide telecommunications services as well as broadband internet services.

As the successor to 4G, 5G technology will provide not only high-speed data connectivity for broadband mobile, but also opportunities for industry verticals. It will support a technological and business innovation ecosystem that includes vertical industries such as automotive, agriculture, government, healthcare, manufacturing, public transportation, energy, and many more. In addition, it will be capable of supporting a broader range of interactive applications, with requirements ranging from high reliability to ultra-low latency and bandwidth mobility. Moreover, 5G technology will have a significant impact on the digital economy, boosting economic growth, improving QoL, and opening up new business opportunities.

As we move toward a more connected future enabled by 5G technology, we must pay equal attention to the security of those devices and applications. Building 5G on top of a weak cybersecurity foundation is like building on sand. This is not only a matter of the safety of end users or of the industry, but is more of a matter of national security. Aside from the numerous benefits that 5G technology provides, it creates a much broader and multidimensional vulnerability to cyber-attacks. As a result, special cyber strategies are required to support the 5G ecosystem. There are numerous ways for institutions to directly participate in the implementation of cybersecurity policies and strategies for 5G. This is possible through close collaboration between industry, government, and academia.

This Special Issue invites submissions of high-quality, previously unpublished papers addressing open challenges in 5G technology and cybersecurity challenges in 5G. Theoretical and experimental studies, as well as high-quality review and survey papers, are all encouraged.

Authors are invited to submit original research articles or comprehensive reviews on topics including (but not limited to):

  • 5G network terminology, concepts and services;
  • 5G NR: new levels of capability and efficiency;
  • Dense optical backbone networks for 5G technology;
  • 5G cloud RAN;
  • 5G massive machine-type communications (m-MTC);
  • The 5G NR spectrum;
  • Massive MIMO deployment in 5G;
  • Industrial IoT (I-IoT) and 5G;
  • Industrial IoT with 5G private network;
  • Threats, vulnerabilities, and attacks in 5G architectures;
  • Securing 5G network infrastructure.

Dr. Arianit Maraj
Guest Editor
Dardan Maraj
Guest Editor Assistant

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Telecom is an international peer-reviewed open access quarterly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1200 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G
  • security
  • industry verticals
  • vulnerabilities
  • industrial IoT
  • cloud RAN
  • open RAN

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (1 paper)

Order results
Result details
Select all
Export citation of selected articles as:

Research

23 pages, 13515 KiB  
Article
Underlay Loosely Coupled Model for Public Safety Networks Based on Device-to-Device Communication
by Wajdi Elleuch
Telecom 2024, 5(1), 122-144; https://doi.org/10.3390/telecom5010007 - 1 Feb 2024
Viewed by 1209
Abstract
In several emergency situations, during natural or human-caused disasters, frontline responders need to be able to communicate and collaborate to properly carry out relief missions. Some countries build their national Public Safety Mobile Broadband based on cellular LTE technology to provide fast, safe, [...] Read more.
In several emergency situations, during natural or human-caused disasters, frontline responders need to be able to communicate and collaborate to properly carry out relief missions. Some countries build their national Public Safety Mobile Broadband based on cellular LTE technology to provide fast, safe, and secure emergency services. However, in several emergency situations, cellular antennas can be overloaded or partially damaged in a manner that affects group communication services. In the last few years, direct device-to-device (D2D) communications have been proposed by the 3GPP as an underlay of long-term evolution (LTE) networks based on proximity, reuse, and hop gains. This paper focuses on a loosely coupled model based on direct D2D communication in a public safety context. Many scenarios related to user membership and network management are detailed. Both the “less cost” and “optimized tree” approaches are proposed and implemented, and their performance is evaluated in terms of the network update number and the resulting average Channel Quality Indicator (CQI). Other optimization approaches, with different CQI thresholds and optimization interval parameters, are simulated to compare their performance with the “optimized tree” approach. By conducting simulations that combine a CQI threshold = 1 and optimization interval = 2 s, it becomes possible to keep an average CQI level close to the “optimized tree” approach, while the costs related to network updates significantly decrease by almost 35%. Other simulations are also carried out to measure the bandwidth required by the control messages between the server and active users. It was found that both inbound and outbound traffic on the server side can be well supported with LTE and 5G networks. Full article
(This article belongs to the Special Issue Joint Application of Telecom and Internet Services)
Show Figures

Figure 1

Back to TopTop