Challenges in 5G and IoT Environments

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (31 May 2023) | Viewed by 11614

Special Issue Editors


E-Mail Website
Guest Editor
Departamento de Ingeniería de Sistemas Telemáticos, ETSI Telecomunicación. Universidad Politécnica de Madrid, Madrid, Spain
Interests: Internet of Things; cybersecurity; access control and authorization mechanisms; computer network architectures; artificial intelligence
Deutsche Telekom AG, Technology Innovation, Darmstadt, Germany
Interests: communication network architectures; network slicing; energy efficiency; E2E architectures

E-Mail Website
Guest Editor
Departamento de Ingeniería de Sistemas Telemáticos, ETSI de Telecomunicación, Universidad Politécnica de Madrid, 28040 Madrid, Spain
Interests: emerging wirless networks; 5G; Internet of Things; QoS-security-mobility support; wireless sensor networks
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear colleagues,

Fifth generation (5G) networks are being currently developed and deployed across the globe, enabling new networking scenarios for services and environments. Among the systems that are going to take an enormous advantage of the use of 5G technologies are those related to the Internet of Things (IoT). Nevertheless, along with the development of these new technologies, new challenges are arising. The virtualization of network elements (Network Function Virtualization, NFV) and the use of new paradigms for their deployment, such as Software Defined Networking (SDN) or Intent-based Networking (IDN) are key enablers of the 5G and IoT scenarios and suppose interesting research areas nowadays. Moreover, there is a wide new scenario for security issues to be considered in these networks, and also it is an especially prolific area for the application of Artificial Intelligence (AI) and Machine Learning (ML) techniques, improving and generating new network-based services. We are pleased to invite researchers to contribute to this issue with their original research work or with review articles focused on the challenges that arise with the emergence of 5G and IoT communications.

In particular, this special issue will include but are not limited to the following research topics:

  • Network planning for 5G networks
  • Optimization methods for 5G networks
  • Spectrum usage and allocation for 5G
  • Green 5G networks
  • Cognitive radio networks for 5G
  • Multimedia-centric VR/AR service and technology in 5G networks
  • Security and privacy issues for 5G networks
  • Transition from Non-Standalone to Standalone deployments
  • 5G network performance tools
  • Sustainability IoT-based system over 5G
  • IoT deployment over 5G networks
  • Evaluation of 5G Trials
  • Programmable data planes
  • P4: Programming Protocol-Independent Packet Processors

Technical Program Committee Members:

Mr. Hans Einsiedler (Deutsche Telekom AG, Technology and Innovation, Berlín, Germany)

We look forward to receiving your contributions.

Dr. Diego Rivera Pinto
Dr. Nico Bayer
Prof. Dr. Jose I. Moreno Novella
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G
  • Internet of Things (IoT)
  • Programmable data planes
  • machine learning for 5G and IoT
  • Software defined Networking (SDN)
  • Intent-based Networking (IDN)
  • Security in 5G networks
  • Security in IoT

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

16 pages, 511 KiB  
Article
Analysis of Individual User Data Rate in a TDMA-RIS-NOMA Downlink System: Beyond the Limitation of Conventional NOMA
by Sourabh Tiwari, Joydeep Sengupta and Neeraj Dhanraj Bokde
Electronics 2023, 12(3), 618; https://doi.org/10.3390/electronics12030618 - 26 Jan 2023
Cited by 1 | Viewed by 1174
Abstract
Non-orthogonal multiple access (NOMA) is playing a pivotal role in 5G technology and has the potential to be useful in future developments beyond 5G. Although the effectiveness of NOMA has largely been explored in the sum throughput maximization, the identification of individual user [...] Read more.
Non-orthogonal multiple access (NOMA) is playing a pivotal role in 5G technology and has the potential to be useful in future developments beyond 5G. Although the effectiveness of NOMA has largely been explored in the sum throughput maximization, the identification of individual user data rate (IDR) still remained an unexplored area. Previously, it has been shown that reconfigurable intelligent surfaces (RIS) can lead to an overall improvement in the data rate by enhancing the effective channel gain of the downlink NOMA system. When time division multiple access (TDMA) is clubbed with multiple RISs in a distributed RIS-assisted NOMA (TDMA-RIS-NOMA) downlink system, a point-to-point communication model is created between access point-to-RIS-to-user device. Due to this point-to-point communication model, optimization of the phase shifts provided by meta-atoms of each RIS is facilitated. The optimized phase shifts of meta-atoms maximize the equivalent channel gain between the access point to the user. In this scenario, the channel becomes saturated and signal-to-interference plus noise ratio (SINR) becomes a function of power coefficients only. In this study, the power coefficients are calculated to maximize the SINR of each user belonging to a NOMA cluster using a geometric progression-based power allocation method such that IDR reaches its upper bound. These observations are also verified using the recently published magic matrix-based power allocation method. There are two observations from this study: (i) the IDR is better in the case of the TDMA-RIS-NOMA downlink system than using downlink NOMA alone and (ii) irrespective of the number of meta-atoms and total cluster power, the upper bound of IDR cannot be increased beyond a certain limit for all users except the highest channel gain user. Because of the restricted upper bound for IDR, we suggest that the RIS-assisted downlink TDMA-NOMA system is more suitable for IoT applications, where minimum IDR can also suffice Full article
(This article belongs to the Special Issue Challenges in 5G and IoT Environments)
Show Figures

Figure 1

17 pages, 5347 KiB  
Article
Network Slicing for mMTC and URLLC Using Software-Defined Networking with P4 Switches
by Yan-Jing Wu, Wen-Shyang Hwang, Chih-Yi Shen and Yu-Yen Chen
Electronics 2022, 11(14), 2111; https://doi.org/10.3390/electronics11142111 - 06 Jul 2022
Cited by 7 | Viewed by 2523
Abstract
Massive machine-type communication (mMTC) and ultra-reliable low-latency communication (URLLC) are two key services in fifth-generation (5G) mobile wireless networks. These networks have been developed with extremely high service quality requirements: scalability for mMTC and reliability with low latency for URLLC. Fifth-generation network slicing [...] Read more.
Massive machine-type communication (mMTC) and ultra-reliable low-latency communication (URLLC) are two key services in fifth-generation (5G) mobile wireless networks. These networks have been developed with extremely high service quality requirements: scalability for mMTC and reliability with low latency for URLLC. Fifth-generation network slicing will play a key role in supporting the distinct requirements of various services. Software-defined networking (SDN), a promising technology for network softwarization, physically separates the network control plane from the data plane by centrally controlling switches with an SDN controller. However, control channel bottleneck and processing delays due to this centralized control may reduce the scalability, reliability, and security of SDN. This paper proposes an SDN framework with programming protocol–independent packet processor (P4) switches (SDNPS), and defines a packet format containing in-band network telemetry data to simultaneously support heavy Internet of Things and URLLC traffic in 5G network slices. The method both satisfies the requirements of mMTC and URLLC and alleviates the load on the SDN controller. P4 is an advanced switch interface technology that provides enhanced stateful forwarding and reveals a persistent state on the SDN data plane. To demonstrate the superiority of SDNPS, simulations are performed on conventional SDNs and SDNPS. SDNPS outperforms the other schemes in terms of average throughput, packet loss ratio, and packet delay for both the mMTC and URLLC network slices. Full article
(This article belongs to the Special Issue Challenges in 5G and IoT Environments)
Show Figures

Figure 1

41 pages, 5190 KiB  
Article
Formal Verification and Analysis of 5G AKA Protocol Using Mixed Strand Space Model
by Yuelei Xiao and Shan Gao
Electronics 2022, 11(9), 1333; https://doi.org/10.3390/electronics11091333 - 22 Apr 2022
Cited by 2 | Viewed by 1484
Abstract
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd generation partnership project (3GPP) includes three cases because it introduces synchronization failure and message authentication code (MAC) failure procedures. Thus, there may be interactions between these [...] Read more.
The 5th generation mobile communication technology (5G) authentication and key management (AKA) protocol specified by the 3rd generation partnership project (3GPP) includes three cases because it introduces synchronization failure and message authentication code (MAC) failure procedures. Thus, there may be interactions between these cases, forming vulnerabilities that do not exist in any single case. However, this is not fully considered in the existing formal analysis and improvement of the 5G AKA protocol. To solve this problem, this paper formally analyzes the security of the latest version of the 5G AKA protocol based on the mixed strand space model for mixed protocols and finds many new attacks, including cross attacks for mixed cases. Then, a secure and efficient primary authentication and key agreement protocol for 5G networks is proposed, which is named the 5G-AKA’. In the 5G-AKA’ protocol, the pre-shared key between the user equipment (UE) and the home network (HN) is replaced with a derivation key of the pre-shared key, the challenge–response mechanism between the serving network (SN) and the HN is added, the subscription permanent identifier (SUPI) of the UE is added to the second message between the SN and the HN, and the MAC failure is replaced with a timeout mechanism on the HN. Finally, the 5G-AKA’ protocol is proved secure in the mixed strand space model and can overcome these attacks of the latest version of the 5G AKA protocol. Additionally, the comparative analysis shows that the 5G-AKA’ protocol is better than the recently improved 5G AKA protocols in security, and the 5G-AKA’ protocol is efficient and is backward compatible with the 5G AKA protocol. Full article
(This article belongs to the Special Issue Challenges in 5G and IoT Environments)
Show Figures

Figure 1

29 pages, 1565 KiB  
Article
A Model for the Definition, Prioritization and Optimization of Indicators
by Frederico Viana Almeida, Edna Dias Canedo, Robson de Oliveira Albuquerque, Flávio Elias Gomes de Deus, Ana Lucila Sandoval Orozco and Luis Javier García Villalba
Electronics 2022, 11(6), 967; https://doi.org/10.3390/electronics11060967 - 21 Mar 2022
Viewed by 2938
Abstract
Context: The definition and prioritization of indicators is now a common reality and an integral part of the evolution of the strategic, technical and business processes of any organization, whether public or private. Purpose: This paper proposes a new model regarding the definition [...] Read more.
Context: The definition and prioritization of indicators is now a common reality and an integral part of the evolution of the strategic, technical and business processes of any organization, whether public or private. Purpose: This paper proposes a new model regarding the definition and prioritization of indicators. Herein, we also investigate the definition and prioritization models currently adopted by academia and industry, and analyze the context of the proposed strategies against the traditional view of indicator definition currently adopted. In addition, we conducted a survey with organizations that had well-defined indicator management processes, seeking to identify customer expectations with a new indicator management model proposed by this work. Method: To gather evidence, we defined a methodology that relates the literature review and an exploratory case study with the application of an experiment. Driven by a set of research questions, this methodology comprised four main phases: planning, literature review, experiment execution and documentation of results. The method used is supported by some techniques, such as design thinking, design sprint and the Cynefin framework. Results: The analysis of the results was carried out in two different ways: Through the verification of the achievement of specific objectives and through a questionnaire applied to assess the degrees of perception of all employees who participated in the work. Regarding the specific objectives, it is clear that most of the objectives were achieved. Regarding the applied questionnaire, it is clear that, although the collaborators did not have adequate knowledge regarding the conceptual and practical aspects of some approaches used in the proposed model, there was a general perception that the model, in fact, supported top management for decision making. For professionals, the proposed model has a restricted scope; that is, it does not serve all types of organizations. Conclusion: The model proposed in this work proved to be effective, considering that the indicators were defined, prioritized and optimized, with a focus on the user experience. As future work, we intend to expand the scope of the model’s performance, evaluating business indicators alongside IT indicators. Full article
(This article belongs to the Special Issue Challenges in 5G and IoT Environments)
Show Figures

Figure 1

11 pages, 3305 KiB  
Article
Radio Access Evaluation of Commercial 5G Service
by José Antonio Martínez, José Ignacio Moreno, Diego Rivera and Julio Berrocal
Electronics 2021, 10(22), 2746; https://doi.org/10.3390/electronics10222746 - 10 Nov 2021
Cited by 1 | Viewed by 1721
Abstract
Wireless communication networks are enhancing faster than anyone could imagine. As everybody knows, 5G is the future and the study of it is very valuable nowadays. In this context, this paper provides a characterization of the deployment of a 5G access network by [...] Read more.
Wireless communication networks are enhancing faster than anyone could imagine. As everybody knows, 5G is the future and the study of it is very valuable nowadays. In this context, this paper provides a characterization of the deployment of a 5G access network by an operator in Spain, identifying its capacity and the actual use to which it is being subjected today. For this, sizing methods and tools will be used to qualify the capacity of the cells currently displayed, determining a better performance than we might initially think. This paper proposes a theoretical model which identifies relevant parameters for cell dimensioning, and determining that an expansion of cell’s capacity will be necessary at a 70% of load. Subsequently, this model is evaluated, analyzing real data via a vendor, showing a high performance, but discovering that some methods used in the current deployment, such as DSS, are, perhaps, not as expected. In addition, when comparing the 5G yield 4G, the power and potential future of the former is apparent. Full article
(This article belongs to the Special Issue Challenges in 5G and IoT Environments)
Show Figures

Figure 1

Back to TopTop