sensors-logo

Journal Browser

Journal Browser

Selected Papers from the IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks, CAMAD 2020

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Internet of Things".

Deadline for manuscript submissions: closed (31 January 2021) | Viewed by 11506

Special Issue Editors


E-Mail Website
Guest Editor
Dipartimento di Ingegneria dell'Informazione, University of Pisa, Pisa, Italy
Interests: software defined networking, network function virtualization, IoT for Agriculture, Industry 4.0, power-efficient resource allocation in cloud data center, traffic monitoring
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science Engineering, University of Bologna, ‎40126 Bologna, Italy
Interests: mobile computing environments; integrated management of networks, systems, and services; next generation networks
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Dipartimento di Ingegneria dell'Informazione, University of Pisa, Pisa, Italy
Interests: green networks; traffic optimization; traffic control and monitoring in cellular systems; QoE guarantee for MoIP services; routing in WMN; machine learning algorithms for network functions, IIoT communication technologies
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON K1N 6N5, Canada
Interests: 5G; 6G; AI-enabled wireless networks; smart grids

E-Mail Website
Guest Editor
Department of Computer Science & Engineering (DISI), University of Bologna, 40136 Bologna, Italy
Interests: distributed systems; industrial internet of things; industrial digital twins; edge cloud computing; resource orchestration in cloud/edge
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

The IEEE International Workshop on Computer Aided Modeling and Design of Communication Links and Networks (CAMAD 2020) was held as a stand-alone virtual event on September 14-16, 2020, due to the COVID-19 pandemic. Over the years, the IEEE CAMAD conference has continuously provided a forum for discussion of recent developments on analytical and simulation tools and techniques for the performance evaluation of communications systems. It was launched in 1986 and held every 2 years until 2006, often in cooperation with flagship IEEE Communication Society conferences (Int. Conference on Communications–ICC, Global Telecommunication Conference–GLOBECOM). Since 2006, the workshop has been held once every year motivated by the ever increasing interest in this hot research and development field.

The IEEE CAMAD 2020 focused on communication and experimentation aspects of 5G, Industrial IoT for Industry 4.0, and beyond. Authors of accepted papers are invited to submit the extended versions (at least 50% extension for the submissions) of their original papers and contributions regarding the following topics:

  • Wireless PHY layers and MAC protocols for 5G: design, analysis, and optimization
  • 5G IoT networks, Platforms, Integration and Services
  • Industrial IoT
  • IT/OT convergence in Industry 4.0
  • 5G Multi-tenant Networks and End-to-End Network slicing
  • Adaptive content distribution in on-demand services
  • Backhaul/fronthaul for multi-tier ultra-dense heterogeneous small cell networks
  • Cognitive and Cooperative Communications
  • Commercial and Societal Impact of Networks, Data, and Adaptive Services
  • Context and location-aware wireless services and applications
  • Cross-layer design for massive MIMO and multiuser MIMO networks
  • Circular economy for ICT
  • Software-Defined Networking (SDN) Architectures and Networks
  • Machine-Learning and Artificial Intelligence
  • Efficient integration of multiple novel 5G air interfaces
  • Energy efficiency and Energy harvesting in wireless networks
  • Mobile big data and network data analytics
  • Mobile Edge and Fog Computing Systems
  • Mobile Social Networks
  • Mobile Crowd Sensing
  • Security, Privacy and Trust by Design
  • Indoor localization
  • Mobility, location, and handoff management
  • Multimedia QoS, and traffic management
  • Multiple access in machine-to-machine communication
  • Network estimation techniques
  • Optical Communications & Fiber Optics for 5G
  • Quality of Experience: Framework, Evaluation and Challenges
  • Smart Grids: Communication, Modeling and Design
  • Testbed, experiments and prototype implementations of systems & Services for 5G
  • Ultra low-latency and ultra high-reliability
  • Validation of Simulation Models with Measurements
  • Wireless body area networks and e-health services
  • Wireless broadcast, multicast and streaming

Prof. Dr. Stefano Giordano
Prof. Dr. Luca Foschini
Prof. Dr. Rosario Giuseppe Garroppo
Dr. Melike Erol Kantarci
Dr. Giuseppe Di Modica
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G systems
  • Industrial Internet of Things (IIoT)
  • Industry 4.0
  • Software-Defined Networking (SDN)
  • Energy efficiency
  • 5G Testbeds and prototypes
  • Mobile Edge and Fog Computing Systems
  • Machine-Learning
  • Artificial Intelligence
  • Indoor localization
  • Smart Grids
  • Simulation Models
  • Ultra-reliable low-latency communication (URLLC)

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

20 pages, 609 KiB  
Article
Optimal Access Point Power Management for Green IEEE 802.11 Networks
by Rosario G. Garroppo, Gianfranco Nencioni, Luca Tavanti, Bernard Gendron and Maria Grazia Scutellà
Sensors 2021, 21(6), 2076; https://doi.org/10.3390/s21062076 - 16 Mar 2021
Cited by 5 | Viewed by 1952
Abstract
In this paper, we present an approach and an algorithm aimed at minimising the energy consumption of enterprise Wireless Local Area Networks (WLANs) during periods of low user activity. We act on two network management aspects: powering off some Access Points (APs), and [...] Read more.
In this paper, we present an approach and an algorithm aimed at minimising the energy consumption of enterprise Wireless Local Area Networks (WLANs) during periods of low user activity. We act on two network management aspects: powering off some Access Points (APs), and choosing the level of transmission power of each AP. An efficient technique to allocate the user terminals to the various APs is the key to achieving this goal. The approach has been formulated as an integer programming problem with nonlinear constraints, which comes from a general but accurate characterisation of the WLAN. This general problem formulation has two implications: the formulation is widely applicable, but the nonlinearity makes it NP-hard. To solve this problem to optimality, we devised an exact algorithm based on a customised version of Benders’ decomposition method. The computational results proved the ability to obtain remarkable power savings. In addition, the good performance of our algorithm in terms of solving times paves the way for its future deployment in real WLANs. Full article
Show Figures

Figure 1

22 pages, 1366 KiB  
Article
Data Stream Processing for Packet-Level Analytics
by Alessandra Fais, Giuseppe Lettieri, Gregorio Procissi, Stefano Giordano and Francesco Oppedisano
Sensors 2021, 21(5), 1735; https://doi.org/10.3390/s21051735 - 03 Mar 2021
Cited by 2 | Viewed by 2249
Abstract
One of the most challenging tasks for network operators is implementing accurate per-packet monitoring, looking for signs of performance degradation, security threats, and so on. Upon critical event detection, corrective actions must be taken to keep the network running smoothly. Implementing this mechanism [...] Read more.
One of the most challenging tasks for network operators is implementing accurate per-packet monitoring, looking for signs of performance degradation, security threats, and so on. Upon critical event detection, corrective actions must be taken to keep the network running smoothly. Implementing this mechanism requires the analysis of packet streams in a real-time (or close to) fashion. In a softwarized network context, Stream Processing Systems (SPSs) can be adopted for this purpose. Recent solutions based on traditional SPSs, such as Storm and Flink, can support the definition of general complex queries, but they show poor performance at scale. To handle input data rates in the order of gigabits per seconds, programmable switch platforms are typically used, although they offer limited expressiveness. With the proposed approach, we intend to offer high performance and expressive power in a unified framework by solely relying on SPSs for multicores. Captured packets are translated into a proper tuple format, and network monitoring queries are applied to tuple streams. Packet analysis tasks are expressed as streaming pipelines, running on general-purpose programmable network devices, and a second stage of elaboration can process aggregated statistics from different devices. Experiments carried out with an example monitoring application show that the system is able to handle realistic traffic at a 10 Gb/s speed. The same application scales almost up to 20 Gb/s speed thanks to the simple optimizations of the underlying framework. Hence, the approach proves to be viable and calls for the investigation of more extensive optimizations to support more complex elaborations and higher data rates. Full article
Show Figures

Figure 1

22 pages, 461 KiB  
Article
Optimization of Mixed Numerology Profiles for 5G Wireless Communication Scenarios
by Noélia Correia, Faroq Al-Tam and Jonathan Rodriguez
Sensors 2021, 21(4), 1494; https://doi.org/10.3390/s21041494 - 21 Feb 2021
Cited by 10 | Viewed by 2844
Abstract
The management of 5G resources is a demanding task, requiring proper planning of operating numerology indexes and spectrum allocation according to current traffic needs. In addition, any reconfigurations to adapt to the current traffic pattern should be minimized to reduce signaling overhead. In [...] Read more.
The management of 5G resources is a demanding task, requiring proper planning of operating numerology indexes and spectrum allocation according to current traffic needs. In addition, any reconfigurations to adapt to the current traffic pattern should be minimized to reduce signaling overhead. In this article, the pre-planning of numerology profiles is proposed to address this problem, and a mathematical optimization model for their planning is developed. The idea is to explore requirements and impairments usually present in a given wireless communication scenario to build numerology profiles and then adopt one of the profiles according to the current users/traffic pattern. The model allows the optimization of mixed numerologies in future 5G systems under any wireless communication scenario, with specific service requirements and impairments, and under any traffic scenario. Results show that, depending on the granularity of the profiles, the proposed optimization model is able to provide satisfaction levels of 60–100%, whereas a non-optimized approach provides 40–65%, while minimizing the total number of numerology indexes in operation. Full article
Show Figures

Figure 1

21 pages, 2076 KiB  
Article
Acceleration of Intrusion Detection in Encrypted Network Traffic Using Heterogeneous Hardware
by Eva Papadogiannaki and Sotiris Ioannidis
Sensors 2021, 21(4), 1140; https://doi.org/10.3390/s21041140 - 06 Feb 2021
Cited by 15 | Viewed by 3459
Abstract
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. However, encryption can [...] Read more.
More than 75% of Internet traffic is now encrypted, and this percentage is constantly increasing. The majority of communications are secured using common encryption protocols such as SSL/TLS and IPsec to ensure security and protect the privacy of Internet users. However, encryption can be exploited to hide malicious activities, camouflaged into normal network traffic. Traditionally, network traffic inspection is based on techniques like deep packet inspection (DPI). Common applications for DPI include but are not limited to firewalls, intrusion detection and prevention systems, L7 filtering, and packet forwarding. With the widespread adoption of network encryption though, DPI tools that rely on packet payload content are becoming less effective, demanding the development of more sophisticated techniques in order to adapt to current network encryption trends. In this work, we present HeaderHunter, a fast signature-based intrusion detection system even for encrypted network traffic. We generate signatures using only network packet metadata extracted from packet headers. In addition, we examine the processing acceleration of the intrusion detection engine using different heterogeneous hardware architectures. Full article
Show Figures

Figure 1

Back to TopTop