Previous Issue
Volume 5, September
 
 

Telecom, Volume 5, Issue 4 (December 2024) – 7 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
20 pages, 4362 KiB  
Article
Mechanisms for Securing Autonomous Shipping Services and Machine Learning Algorithms for Misbehaviour Detection
by Marwan Haruna, Kaleb Gebremichael Gebremeskel, Martina Troscia, Alexandr Tardo and Paolo Pagano
Telecom 2024, 5(4), 1031-1050; https://doi.org/10.3390/telecom5040053 - 15 Oct 2024
Viewed by 377
Abstract
Technological developments within the maritime sector are resulting in rapid progress that will see the commercial use of autonomous vessels, known as Maritime Autonomous Surface Ships (MASSs). Such ships are equipped with a range of advanced technologies, such as IoT devices, artificial intelligence [...] Read more.
Technological developments within the maritime sector are resulting in rapid progress that will see the commercial use of autonomous vessels, known as Maritime Autonomous Surface Ships (MASSs). Such ships are equipped with a range of advanced technologies, such as IoT devices, artificial intelligence (AI) systems, machine learning (ML)-based algorithms, and augmented reality (AR) tools. Through such technologies, the autonomous vessels can be remotely controlled from Shore Control Centres (SCCs) by using real-time data to optimise their operations, enhance safety, and reduce the possibility of human error. Apart from the regulatory aspects, which are under definition by the International Maritime Organisation (IMO), cybersecurity vulnerabilities must be considered and properly addressed to prevent such complex systems from being tampered with. This paper proposes an approach that operates on two different levels to address cybersecurity. On one side, our solution is intended to secure communication channels between the SCCs and the vessels using Secure Exchange and COMmunication (SECOM) standard; on the other side, it aims to secure the underlying digital infrastructure in charge of data collection, storage and processing by relying on a set of machine learning (ML) algorithms for anomaly and intrusion detection. The proposed approach is validated against a real implementation of the SCC deployed in the Livorno seaport premises. Finally, the experimental results and the performance evaluation are provided to assess its effectiveness accordingly. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

10 pages, 566 KiB  
Article
Cell-Free Massive MIMO Power Consumption with Serial Front-Hauls
by Danaisy Prado-Alvarez, Saúl Inca, David Martín-Sacristán and Jose F. Monserrat
Telecom 2024, 5(4), 1021-1030; https://doi.org/10.3390/telecom5040052 - 11 Oct 2024
Viewed by 328
Abstract
Massive MIMO deployments have been traditionally based on dedicated links in the front-haul, i.e., between the central processing units and the Access Points (APs). Recently, cell-free massive Multiple-Input Multiple-Output (MIMO) systems based on serial front-haul links have been discussed to simplify the deployments, [...] Read more.
Massive MIMO deployments have been traditionally based on dedicated links in the front-haul, i.e., between the central processing units and the Access Points (APs). Recently, cell-free massive Multiple-Input Multiple-Output (MIMO) systems based on serial front-haul links have been discussed to simplify the deployments, among other reasons. However, the power consumption models currently used for cell-free massive MIMO deployments typically assume dedicated front-haul links. This paper highlights the inaccuracy of these models when applied to serial front-hauls and proposes simple adaptations to achieve more realistic results. The results obtained for an exemplary scenario show that the front-haul power would represent 61.73% of the total consumed power with the original models. In contrast, with the proposed adaptations, it could be as low as 1.59% of the total consumed power for some serial front-haul configurations. Additionally, the impact of considering APs with lower power consumption is studied, in which case, the percentages above would become 93.15% and 11.96%, respectively. Hence the importance of having power models that fit the front-haul topology. Full article
Show Figures

Figure 1

13 pages, 1528 KiB  
Article
Experimental Performance Comparison of Proactive Routing Protocols in Wireless Mesh Network Using Raspberry Pi 4
by Dana Turlykozhayeva, Symbat Temesheva, Nurzhan Ussipov, Aslan Bolysbay, Almat Akhmetali, Sayat Akhtanov and Xiao Tang
Telecom 2024, 5(4), 1008-1020; https://doi.org/10.3390/telecom5040051 - 10 Oct 2024
Viewed by 555
Abstract
Nowadays, Wireless Mesh Networks (WMNs) are widely deployed in communication areas due to their ease of implementation, dynamic self-organization, and cost-effectiveness. The design of routing protocols is critical for ensuring the performance and reliability of WMNs. Although there have been numerous experimental works [...] Read more.
Nowadays, Wireless Mesh Networks (WMNs) are widely deployed in communication areas due to their ease of implementation, dynamic self-organization, and cost-effectiveness. The design of routing protocols is critical for ensuring the performance and reliability of WMNs. Although there have been numerous experimental works on WMNs in the past decade, only a few of them have been tested in real-world scenarios. This article presents a comparative analysis of three proactive routing protocols, OLSR, BATMAN, and Babel, using Raspberry Pi 4 devices. The evaluation, conducted at Al-Farabi Kazakh National University, covers both indoor and outdoor scenarios, focusing on key metrics such as bandwidth, Packet Delivery Ratio (PDR), and jitter. In outdoor scenarios, OLSR achieved the highest bandwidth at 2.9 Mbps, while BATMAN and Babel lagged. Indoor tests revealed that Babel initially outperformed with the highest bandwidth of 57.19 Mb/s but suffered from scalability issues, while BATMAN and OLSR exhibited significant declines in performance as network size increased. For PDR, BATMAN performed best with a decline from 100% to 42.8%, followed by OLSR with a moderate drop, and Babel with the greatest decrease. For jitter, OLSR showed the most stable performance, increasing from 0.281 ms to 2.58 ms at eleven nodes, BATMAN exhibited moderate increases, and Babel experienced the highest rise. Full article
Show Figures

Figure 1

16 pages, 308 KiB  
Article
Enhancing TCP Airtime Fairness through Precise Computation for Upload and Download Flows in WiFi Networks
by Yuhao Chen and Jinyao Yan
Telecom 2024, 5(4), 992-1007; https://doi.org/10.3390/telecom5040050 - 2 Oct 2024
Viewed by 465
Abstract
Airtime fairness has emerged as a key approach to enhancing wireless throughput performance. However, existing research often overlooks the precise calculation of airtime, particularly in relation to TCP acknowledgments. This paper introduces a novel method, implemented on the access point side, for accurately [...] Read more.
Airtime fairness has emerged as a key approach to enhancing wireless throughput performance. However, existing research often overlooks the precise calculation of airtime, particularly in relation to TCP acknowledgments. This paper introduces a novel method, implemented on the access point side, for accurately calculating the airtime of TCP and UDP flows. Building on this, we propose a QoS-based scheduling algorithm designed to improve fairness between upload and download traffic. The effectiveness of the algorithm is validated through experiments that accurately measure both throughput and airtime for upload and download traffic. Full article
(This article belongs to the Topic Advances in Wireless and Mobile Networking)
Show Figures

Figure 1

15 pages, 6348 KiB  
Review
Progress on Single-Feed Quality Wideband Linear Wire Array
by Lidong Chi, Lingxiao Xie, Zibin Weng and Yihong Qi
Telecom 2024, 5(4), 977-991; https://doi.org/10.3390/telecom5040049 - 2 Oct 2024
Viewed by 378
Abstract
This paper presents the latest developments regarding the single-feed Quality Wideband Linear (QWL) wire array antenna, known for its broadband and high-gain electromagnetic characteristics and robust design. A systematic review of recent advances in relation to the QWL antenna is provided, covering its [...] Read more.
This paper presents the latest developments regarding the single-feed Quality Wideband Linear (QWL) wire array antenna, known for its broadband and high-gain electromagnetic characteristics and robust design. A systematic review of recent advances in relation to the QWL antenna is provided, covering its driven element, director, reflector, low common-mode current interference connector, and array series-feed configuration. For the first time, an analytical expression and a quick design formula for the input impedance of the QWL antenna’s driven element, the linear Wideband High-gain Electromagnetic Structure (WHEMS) antenna, are presented. Theoretical analysis demonstrates the potential for broadband performance using the WHEMS antenna. The rugged design of the QWL array antenna offers engineering advantages such as simple feeding, low wind resistance, a lightweight construction, low cost, and structural robustness. The QWL antenna has already found applications in various industrial sectors, with potential for broader use in the future, contributing to further advancements in antenna technology. Full article
Show Figures

Figure 1

16 pages, 600 KiB  
Review
A Survey on User Profiling, Data Collection, and Privacy Issues of Internet Services
by Dardan Maraj, Marin Vuković and Petar Hotovec
Telecom 2024, 5(4), 961-976; https://doi.org/10.3390/telecom5040048 - 1 Oct 2024
Viewed by 479
Abstract
Users are usually required to share several types of data, including their personal data, as different providers strive to offer high-quality services that are often tailored to end-users’ preferences. However, when it comes to personalizing services, there are several challenges for meeting user’s [...] Read more.
Users are usually required to share several types of data, including their personal data, as different providers strive to offer high-quality services that are often tailored to end-users’ preferences. However, when it comes to personalizing services, there are several challenges for meeting user’s needs and preferences. For content personalization and delivery of services to end users, services typically create user profiles. When user profiles are created, user data is collected and organized to meet the personalization requirements of the services. In this paper, we provide an overview of current research activities that focus on user profiling and ways to protect user data privacy. The paper presents different types of data that services collect from users on examples of commonly used Internet services. It proposes data categorization as a prerequisite for controlled data sharing between users and Internet services. Furthermore, it discusses how data generalization can be used for anonymization purposes on examples of the proposed data categories. Finally, it gives an overview of the privacy framework being developed and gives guidelines for future work focusing on data generalization methods in order to reduce user privacy risks. Full article
Show Figures

Figure 1

20 pages, 1563 KiB  
Article
Enhancing Spreading Factor Assignment in LoRaWAN with a Geometric Distribution Approach for Practical Node Distributions
by Phanupong Tempiem and Rardchawadee Silapunt
Telecom 2024, 5(4), 941-960; https://doi.org/10.3390/telecom5040047 - 24 Sep 2024
Viewed by 384
Abstract
This paper proposes the GD (Geometric Distribution) algorithm, a novel approach to enhance the default Adaptive Data Rate (ADR) mechanism in the Long-Range Wide Area Network (LoRaWAN). By leveraging the Probability Mass Function (PMF) of the GD model, the algorithm effectively addresses biased [...] Read more.
This paper proposes the GD (Geometric Distribution) algorithm, a novel approach to enhance the default Adaptive Data Rate (ADR) mechanism in the Long-Range Wide Area Network (LoRaWAN). By leveraging the Probability Mass Function (PMF) of the GD model, the algorithm effectively addresses biased node distributions encountered in real-world scenarios. Its ability to finely adjust the weight factor (w) or the probability of success in allocating SFs enables the optimization of spreading factor (SF) allocation, thereby achieving the optimal Data Extraction Rate (DER). To evaluate the algorithm’s performance, simulations were conducted using the fixed node pattern derived from actual dairy farm locations in Ratchaburi province, Thailand. Comparative analyses were performed against the uniform random node pattern and existing algorithms, including the ADR, EXPLoRa, QCVM, and SD. The GD algorithm significantly outperformed existing methodologies for both fixed and uniform random node patterns, achieving a 14.3% and 4.8% improvement in DER over the ADR, respectively. While the GD algorithm consistently demonstrated superior DER values across varying coverage areas and payload sizes, it incurred a slight increase in energy consumption due to node allocations to higher SFs. Therefore, the trade-off between DER and energy consumption must be carefully weighed against the specific application. Full article
Show Figures

Figure 1

Previous Issue
Back to TopTop