Previous Issue
Volume 6, September
 
 

Telecom, Volume 6, Issue 4 (December 2025) – 11 articles

  • Issues are regarded as officially published after their release is announced to the table of contents alert mailing list.
  • You may sign up for e-mail alerts to receive table of contents of newly released issues.
  • PDF is the official format for papers published in both, html and pdf forms. To view the papers in pdf format, click on the "PDF Full-text" link, and use the free Adobe Reader to open them.
Order results
Result details
Select all
Export citation of selected articles as:
22 pages, 974 KB  
Article
Initial Synchronization Procedure and Doppler Pre-Compensation for LEO-SATCOM Terminals
by Marco Krondorf
Telecom 2025, 6(4), 81; https://doi.org/10.3390/telecom6040081 - 21 Oct 2025
Viewed by 241
Abstract
Wireless low earth orbit (LEO) satellite communication ground terminals need to perform an initial time and frequency synchronization to access to the LEO system. Initial synchronization consists of three steps: detecting the presence of the LEO satellite downlink signal, synchronizing the terminal receiver [...] Read more.
Wireless low earth orbit (LEO) satellite communication ground terminals need to perform an initial time and frequency synchronization to access to the LEO system. Initial synchronization consists of three steps: detecting the presence of the LEO satellite downlink signal, synchronizing the terminal receiver to the current Doppler frequency shift and performing Doppler pre-compensation before uplink signal transmission, and ensuring low probability of false alarm at low SNR in the LEO uplink receiver. This article explains this three step synchronization procedure in detail. The major advantage is that the synchronization procedure can be carried out even without a priori knowledge of the satellite orbit ephemeris or any sort of GNSS navigation data. Initial synchronization is of particular importance for typical LEO uplink signals which are formed of short radio bursts. The packet detection in burst traffic radio systems is a crucial task to accomplish start of frame detection. It triggers the start of the digital receiver algorithms to demodulate the incoming uplink burst. The packet detection is accomplished by cross-correlation and threshold detection which show significant probability of false alarm in low signal to noise (SNR) regions. Hence, before running a stable uplink connection, the terminal must accomplish the proposed initial synchronization procedure, as outlined in this article. Full article
Show Figures

Figure 1

22 pages, 2010 KB  
Article
Securing RSA Algorithm Against Side Channel Attacks
by Fayez Gebali and Alshimaa Magdy
Telecom 2025, 6(4), 80; https://doi.org/10.3390/telecom6040080 - 20 Oct 2025
Viewed by 265
Abstract
RSA’s modular exponentiation is the basic operation in public key infrastructure and is naturally the target of side-channel attacks. In this work we propose two algorithms that defeat side-channel attacks: Paired Permutation Exponentiation (PPE) and Permute, Split, and Accumulate (PSA). We compare these [...] Read more.
RSA’s modular exponentiation is the basic operation in public key infrastructure and is naturally the target of side-channel attacks. In this work we propose two algorithms that defeat side-channel attacks: Paired Permutation Exponentiation (PPE) and Permute, Split, and Accumulate (PSA). We compare these two algorithms with the classic right-to-left technique. All three implementations are evaluated using Intel® Performance Counter Monitor (PCM) at an effective 0.25 ms sampling interval. We use fixed 2048-bit inputs, pin the Python 3.9.13 process to a single core Intel® Core™ i5-10210U, and repeat each experiment 100 and 1000 times to characterize behavior and ensemble statistics. Our proposed technique PSA shows the lowest runtime and the strongest hardening against per-bit correlation relative to the standard RtL. Residual leakage related to the Hamming weight of the exponent may remain observable but the only information gathered is the the Hamming weight of the secret key. The exact location of the secret key bits is completely obscured. Full article
Show Figures

Figure 1

13 pages, 269 KB  
Article
Assessing Compliance in Child-Facing High-Risk AI IoT Devices: Legal Obligations Under the EU’s AI Act and GDPR
by Mohammed Rashed and Yasser Essa
Telecom 2025, 6(4), 79; https://doi.org/10.3390/telecom6040079 - 17 Oct 2025
Viewed by 316
Abstract
The rapid and ongoing adoption of smart home products, coupled with the increasing integration of artificial intelligence (AI), particularly in these products, is an undeniable reality. However, as both technologies converge, they also give rise to a range of significant concerns. The EU’s [...] Read more.
The rapid and ongoing adoption of smart home products, coupled with the increasing integration of artificial intelligence (AI), particularly in these products, is an undeniable reality. However, as both technologies converge, they also give rise to a range of significant concerns. The EU’s recent AI Act specifically addresses the challenges associated with the use of AI technology. In this study, we examine three AI-integrated products with toy capabilities that are sold in Spain, serving as a case study for the EU market of smart home devices that incorporate AI. Our research aims to identify potential compliance issues with both the AI Act and the General Data Protection Regulation (GDPR). Our results reveal a clear and worrying gap between the existing legislation and the functionalities of these devices. Using a normal user’s approach, we find that the privacy policies for these products, whose features make them high-risk AI systems, AI systems with systemic risk, or both as per the AI Act, fail to provide any information about AI usage, particularly of ChatGPT, which they all integrate. This raises significant concerns, especially as the market for such products will continue to grow. Without rigorous enforcement of existing legislation, the risk of misuse of sensitive personal information becomes even greater, making strict regulatory oversight essential to ensure user protection. Full article
19 pages, 2701 KB  
Article
RFID-Enabled Electronic Voting Framework for Secure Democratic Processes
by Stella N. Arinze and Augustine O. Nwajana
Telecom 2025, 6(4), 78; https://doi.org/10.3390/telecom6040078 - 16 Oct 2025
Viewed by 224
Abstract
The growing global demand for secure, transparent, and efficient electoral systems has highlighted the limitations of traditional voting methods, which remain susceptible to voter impersonation, ballot tampering, long queues, logistical challenges, and delayed result processing. To address these issues, this study presents the [...] Read more.
The growing global demand for secure, transparent, and efficient electoral systems has highlighted the limitations of traditional voting methods, which remain susceptible to voter impersonation, ballot tampering, long queues, logistical challenges, and delayed result processing. To address these issues, this study presents the design and implementation of a Radio Frequency Identification (RFID)-based electronic voting framework that integrates robust voter authentication, encrypted vote processing, and decentralized real-time monitoring. The system is developed as a scalable, cost-effective solution suitable for both urban and resource-constrained environments, especially those with limited infrastructure or inconsistent internet connectivity. It employs RFID-enabled smart voter cards containing encrypted unique identifiers, with each voter authenticated via an RC522 reader that validates their UID against an encrypted whitelist stored locally. Upon successful verification, the voter selects a candidate via a digital interface, and the vote is encrypted using AES-128 before being stored either locally on an SD card or transmitted through GSM to a secure backend. To ensure operability in offline settings, the system supports batch synchronization, where encrypted votes and metadata are uploaded once connectivity is restored. A tamper-proof monitoring mechanism logs each session with device ID, timestamps, and cryptographic checksums to maintain integrity and prevent duplication or external manipulation. Simulated deployments under real-world constraints tested the system’s performance against common threats such as duplicate voting, tag cloning, and data interception. Results demonstrated reduced authentication time, improved voter throughput, and strong resistance to security breaches—validating the system’s resilience and practicality. This work offers a hybrid RFID-based voting framework that bridges the gap between technical feasibility and real-world deployment, contributing a secure, transparent, and credible model for modernizing democratic processes in diverse political and technological landscapes. Full article
(This article belongs to the Special Issue Digitalization, Information Technology and Social Development)
Show Figures

Figure 1

19 pages, 2314 KB  
Article
Utilization-Driven Performance Enhancement in Storage Area Networks
by Guixiang Lyu, Liudong Xing and Zhiguo Zeng
Telecom 2025, 6(4), 77; https://doi.org/10.3390/telecom6040077 - 11 Oct 2025
Viewed by 257
Abstract
Efficient resource utilization and low response times are critical challenges in storage area network (SAN) systems, especially as data-intensive applications like those driven by the Internet of Things and Artificial Intelligence place increasing demands on reliable, high-performance data storage solutions. Addressing these challenges, [...] Read more.
Efficient resource utilization and low response times are critical challenges in storage area network (SAN) systems, especially as data-intensive applications like those driven by the Internet of Things and Artificial Intelligence place increasing demands on reliable, high-performance data storage solutions. Addressing these challenges, this paper contributes by proposing a proactive, utilization-driven traffic redistribution strategy to achieve balanced load distribution across switches, thereby improving the overall SAN performance and alleviating the risk of overload-incurred cascading failures. The proposed approach incorporates a Jackson Queueing Network-based method to evaluate both utilization and response time of individual switches, as well as the overall system response time. Based on a comprehensive case study of a mesh SAN system, two key parameters—the transition probability adjustment step size and the node selection window size—are analyzed for their impact on the effectiveness of the proposed strategy, revealing several valuable insights into fine-tuning traffic redistribution parameters. Full article
Show Figures

Figure 1

26 pages, 1646 KB  
Article
Message Passing-Based Assignment for Efficient Handover Management in LEO Networks
by Gilang Raka Rayuda Dewa, Illsoo Sohn and Djati Wibowo Djamari
Telecom 2025, 6(4), 76; https://doi.org/10.3390/telecom6040076 - 10 Oct 2025
Viewed by 338
Abstract
As part of non-terrestrial networks (NTN), the Low Earth Orbit (LEO) plays a critical role in supporting high-throughput wireless communication. However, the high-speed mobility of LEO satellites, coupled with the high density of user terminals, makes efficient user assignment crucial in maintaining overall [...] Read more.
As part of non-terrestrial networks (NTN), the Low Earth Orbit (LEO) plays a critical role in supporting high-throughput wireless communication. However, the high-speed mobility of LEO satellites, coupled with the high density of user terminals, makes efficient user assignment crucial in maintaining overall wireless performance. The suboptimal assignment from LEO satellites to user terminals can result in frequent unnecessary handovers, rendering the user terminal unable to receive the entire downlink signal. Consequently, it reduces user rate and user satisfaction metrics. However, finding the optimum user assignment to reduce handover issues is categorized as a non-linear programming problem with a combinatorial number of possible solutions, resulting in excessive computational complexity. Therefore, this study proposes a distributed user assignment for the LEO networks. By utilizing message-passing frameworks that map the optimization problem into a graphical representation, the proposed algorithm splits the optimization problem into a local mapping issue, thereby significantly reducing computational complexity. By exchanging small messages iteratively, the proposed algorithm autonomously determines the near-optimal solution. The extensive simulation results demonstrate that the proposed algorithm significantly outperforms the conventional algorithm in terms of user rate and user satisfaction metric under various wireless parameters. Full article
Show Figures

Figure 1

24 pages, 658 KB  
Article
Securing Elliptic Curve Cryptography with Random Permutation of Secret Key
by Fayez Gebali and Alshimaa Magdy
Telecom 2025, 6(4), 75; https://doi.org/10.3390/telecom6040075 - 9 Oct 2025
Viewed by 385
Abstract
Scalar multiplication is the basis of the widespread elliptic curve public key cryptography. Standard scalar multiplication is vulnerable to side-channel attacks that are able to infer the secret bit values by observing the power or delay traces. This work utilizes the arithmetic properties [...] Read more.
Scalar multiplication is the basis of the widespread elliptic curve public key cryptography. Standard scalar multiplication is vulnerable to side-channel attacks that are able to infer the secret bit values by observing the power or delay traces. This work utilizes the arithmetic properties of scalar multiplication to propose two scalar multiplication algorithms to insulate ECC implementations from side-channel attacks. The two proposed designs rely on randomly permuting the ordering and storage locations of the different scalar multiplication values 2iG as well as the corresponding secret key bits ki. Statistical analysis and Python 3.9.13implementations confirm the validity of the two algorithms. Numerical results confirm that both designs produce the same results as the standard right-to-left scalar multiplication algorithm. Welch’s t-test as well as numerical simulations confirm the immunity of our proposed protocols to side-channel attacks. Full article
Show Figures

Figure 1

18 pages, 4299 KB  
Article
Unique Dielectric Protection for Microwave and Millimeter-Wave Antenna Applications
by Hafiz Usman Tahseen, Luca Francioso, Syed Shah Irfan Hussain and Luca Catarinucci
Telecom 2025, 6(4), 74; https://doi.org/10.3390/telecom6040074 - 4 Oct 2025
Viewed by 279
Abstract
Dielectric covers are generally used to provide external protection to antenna systems by providing electromagnetic transparency. They are utilized in ground applications as well as for protecting airborne, Sat Com, terrestrial and underwater antenna installations. This paper presents a unique and universal design [...] Read more.
Dielectric covers are generally used to provide external protection to antenna systems by providing electromagnetic transparency. They are utilized in ground applications as well as for protecting airborne, Sat Com, terrestrial and underwater antenna installations. This paper presents a unique and universal design of dielectric sandwich-layered cover that can effectively protect antennas operating in a large frequency band from 1 GHz to 28 GHz, including millimeter-wave and microwave ranges, with minimum insertion loss for various incident angles. The proposed single dielectric cover may give sufficient protection for an entire tower or chimney housing multiple antennas, ranging from first-generation to fifth-generation microwave base-station antennas, as well as other wireless/broadcast antennas in millimeter or lower frequency ranges. In the first step, optimum dielectric constant and thickness of the dielectric cover are calculated numerically through a MATLAB (R2015a) code. In the second step, a floquet port analysis is performed to observe the insertion loss through the transmission coefficient against various frequency band-spectrums in microwave and millimeter-wave ranges for validation of the proposed synthesis. The ANSYS 18.2 HFSS tool is used for the purpose. In the third step, fabrication of the dielectric-layered structure is completed with the optimum design parameters. In the final step, the dielectric package is tested under various fabricated antennas in different frequency ranges. Full article
Show Figures

Figure 1

17 pages, 3561 KB  
Article
A Compact Four-Element Multiple-Input Multiple-Output Array with an Integrated Frequency Selective Surface for Millimeter-Wave Applications
by Iftikhar Ud Din, Daud Khan, Arif Ullah, Messaoud Ahmed Ouameur and Bahram Razampoosh
Telecom 2025, 6(4), 73; https://doi.org/10.3390/telecom6040073 - 3 Oct 2025
Viewed by 326
Abstract
A compact fork-shaped four-element multiple-input multiple-output (MIMO) antenna system with wide bandwidth for 5G millimeter-wave (mmWave) applications is presented. The antenna elements are arranged orthogonally to achieve a compact footprint of 20×26mm2. To enhance the gain, a frequency [...] Read more.
A compact fork-shaped four-element multiple-input multiple-output (MIMO) antenna system with wide bandwidth for 5G millimeter-wave (mmWave) applications is presented. The antenna elements are arranged orthogonally to achieve a compact footprint of 20×26mm2. To enhance the gain, a frequency selective surface (FSS) is placed above the MIMO system, providing an average gain improvement of 1.5 dB across the entire operating band and achieving a peak gain of 7.5 dB at 41 GHz. The proposed design operates in the Ka-band (22–46 GHz), making it well suited for 5G communications. The antenna exhibits an isolation greater than 20 dB and radiation efficiency exceeding 80% across the band. Moreover, key MIMO performance metrics, including diversity gain (DG ≈ 10) and envelope correlation coefficient (ECC < 0.05), meet the required standards. A prototype of the proposed system was fabricated and measured, with the experimental results showing good agreement with simulations. Full article
Show Figures

Figure 1

17 pages, 620 KB  
Article
Closed-Form Approximation to the Average Symbol Error Probability for Cross-QAM over κμ Fading Channels with Experimental Validation in the Millimeter-Wave Band
by Wilian Eurípedes Vieira, Karine Barbosa Carbonaro, Gilberto Arantes Carrijo, Edson Agustini, André Antônio dos Anjos and Pedro Luiz Lima Bertarini
Telecom 2025, 6(4), 72; https://doi.org/10.3390/telecom6040072 - 2 Oct 2025
Viewed by 296
Abstract
This work presents a closed-form approximation to the symbol error probability (SEP) for cross-quadrature amplitude modulation (cross-QAM) schemes over κμ fading channels. The proposed formulation enables accurate performance evaluation while avoiding computationally expensive numerical integration. The analysis covers millimeter-wave (mmWave) frequencies [...] Read more.
This work presents a closed-form approximation to the symbol error probability (SEP) for cross-quadrature amplitude modulation (cross-QAM) schemes over κμ fading channels. The proposed formulation enables accurate performance evaluation while avoiding computationally expensive numerical integration. The analysis covers millimeter-wave (mmWave) frequencies at 55, 60, and 65 GHz, under both line-of-sight (LoS) and non-line-of-sight (nLoS) conditions, and for multiple transmitter–receiver polarization configurations. A key contribution of this work is the experimental validation of the theoretical expression with real channel-measurement data, which confirms the applicability of the κμ model in realistic mmWave scenarios. Furthermore, we perform a detailed parametric study to quantify the influence of κ and μ on adaptive modulation performance, providing practical insights for 5G and future 6G systems. The proposed framework bridges theoretical analysis and experimental validation, offering a computationally efficient and robust tool for the design and evaluation of advanced modulation schemes in generalized fading environments. Full article
Show Figures

Figure 1

15 pages, 846 KB  
Article
Machine-Learning-Based Adaptive Wireless Network Selection for Terrestrial and Non-Terrestrial Networks in 5G and Beyond
by Ahmet Yazar
Telecom 2025, 6(4), 71; https://doi.org/10.3390/telecom6040071 - 30 Sep 2025
Viewed by 342
Abstract
Non-terrestrial networks (NTNs) have become increasingly crucial, particularly with the standardization of fifth-generation (5G) technology. In parallel, the rise of Internet of Things (IoT) technologies has amplified the need for human-centric solutions in 5G and beyond (5 GB) systems. To address diverse communication [...] Read more.
Non-terrestrial networks (NTNs) have become increasingly crucial, particularly with the standardization of fifth-generation (5G) technology. In parallel, the rise of Internet of Things (IoT) technologies has amplified the need for human-centric solutions in 5G and beyond (5 GB) systems. To address diverse communication requirements from a human-centric perspective, leveraging the advantages of both terrestrial networks (TNs) and NTNs has emerged as a key focus for 5 GB communications. In this paper, a machine learning (ML)-based approach is proposed to facilitate decision making between TN and NTN networks within a multi-connectivity scenario, aiming to provide a human-centric solution. For this approach, a novel synthetic dataset is constructed using various sensing information, based on the assumption that numerous interconnected sensor systems will be available in smart city networks with sixth-generation (6G) technologies. The ML results are derived from this newly generated dataset. These simulation results demonstrate that the proposed approach, designed to meet the requirements of next-generation systems, can be effectively utilized with 6G. Full article
Show Figures

Figure 1

Previous Issue
Back to TopTop