Low-Latency and High-Security Internet of Things towards 6G

A special issue of Electronics (ISSN 2079-9292). This special issue belongs to the section "Computer Science & Engineering".

Deadline for manuscript submissions: closed (15 July 2023) | Viewed by 5315

Special Issue Editors


E-Mail Website
Guest Editor
1. School of Information Engineering, East China Jiaotong University, Nanchang 330013, China
2. School of Electronic Information Engineering, Beijing Jiaotong University, Beijing 100044, China
Interests: wireless and mobile communications and the related applications
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science, Virginia Commonwealth University, Richmond, VA 23173, USA
Interests: cybersecurity; big data; wireless networking

Special Issue Information

Dear Colleagues,

The Internet of Things (IoT) connects objects to the internet through sensor devices, radio frequency identification devices and other information collection devices to realize information interaction. IoT is widely used in many fields, including intelligent transportation, intelligent healthcare, smart home and industry. In these fields, IoT devices connected via high-speed Internet for efficient and reliable communications and faster response times. Since the high-speed Internet is wireless, IoT is faced with security risks such as false information, false terminals, information tampering and privacy disclosure. Therefore, we need to provide a low-latency and high-security communications in IoT environment.

The main security work is analyzed from the three logical levels of the IoT. The perceptual layer needs more effective security measures on devices with limited resources to ensure integrity, confidentiality and identification of collected data. The transport layer needs to solve the low latency and high security problems when data is transmitted across the network. The application layer needs to fully protect users privacy information when providing services for users. In addition, 6G network with low-latency and ultra-high network capacity is expected to become a new paradigm of the secure IoT.

This Special Issue brings together experts, scholars and scientific researchers in relevant fields to share their latest research contributions and expert insights. Topics of interest include but not limited to the following:

  • Physical layer security of IoT
  • Access control in IoT
  • Low-latency and high-security authentication protocol
  • Resource allocation (to ensure the efficiency of security policies)
  • Offloading method design for edge management
  • Trust management mechanism in IoT
  • Intrusion detection technology for IoT (Artificial intelligence based)
  • Blockchain based security for IoT
  • Ultra-reliable low latency communications (URLLC) for IoT
  • Mobile broadband reliable low latency communication (MBRLLC)
  • Protocol design for high reliability low latency IoT
  • Quantum cryptography-based low-latency and high-security protocol for IoT

Prof. Dr. Junhui Zhao
Dr. Changqing Luo
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Electronics is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

Low-Latency;

High-Security;

Internet of Things;

6G;

Published Papers (3 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

21 pages, 1542 KiB  
Article
Characterization of Low-Latency Next-Generation eVTOL Communications: From Channel Modeling to Performance Evaluation
by Bing Mak, Sudhanshu Arya, Ying Wang and Jonathan Ashdown
Electronics 2023, 12(13), 2838; https://doi.org/10.3390/electronics12132838 - 27 Jun 2023
Cited by 6 | Viewed by 920
Abstract
Next-generation wireless communication networks are expected to offer extremely high data rates supported by very low latency and radically new applications, which require a new wireless radio technology paradigm. However, it is crucial to assist the radio link over the fast varying and [...] Read more.
Next-generation wireless communication networks are expected to offer extremely high data rates supported by very low latency and radically new applications, which require a new wireless radio technology paradigm. However, it is crucial to assist the radio link over the fast varying and highly dynamic channel to satisfy the diverse requirements of next-generation wireless networks. Recently, communication via autonomous electric vertical takeoff and landing (eVTOL) has gained momentum, owing to its potential for cost-effective network deployment. It is considered one of the most promising technologies conceived to support smart radio terminals. However, to provide efficient and reliable communications between ground base stations and eVTOLs as well as between eVTOLs and other eVTOLs, realistic eVTOL channel models are indispensable. In this paper, we propose a nonstationary geometry-based stochastic channel model for eVTOL communication links. The proposed eVTOL channel model framework considers time-domain nonstationarity and arbitrary eVTOL trajectory and is sufficiently general to support versatile C bands. One of the critical challenges for eVTOL is the fast vertical takeoff and landing flight patterns affecting the regular propagation communication channel. Moreover, we present a new method for estimating the SNR over the non-stationary fast dynamic time-variant eVTOL channel by utilizing the sliding window adaptive filtering technique. Furthermore, we present an information–theoretic approach to characterize the end-to-end transmission delay over the eVTOL channel and prove that the optimal transmission scheme strongly depends upon the eVTOL link configuration. In addition, to analyze the occurrence of deep fade regions in eVTOL links, we analyze the outage probability, which is an important performance metric for wireless channels operating over dynamic fading channels, and make an important observation that the outage probability increases non-linearly with the eVTOL height. Furthermore, we consider the commercially available eVTOL specifications and data to validate the channel model and analyze the Doppler shift and latency for the exponential acceleration and exponential deceleration velocities profiles during the takeoff and landing operation. This paper provides a new and practical approach for the design, optimization, and performance evaluation of future eVTOL-assisted next-generation wireless communications. Full article
(This article belongs to the Special Issue Low-Latency and High-Security Internet of Things towards 6G)
Show Figures

Figure 1

16 pages, 516 KiB  
Article
Secure and Efficient Message Authentication Scheme for 6G-Enabled VANETs
by Longxia Liao, Junhui Zhao, Huanhuan Hu and Xiaoke Sun
Electronics 2022, 11(15), 2385; https://doi.org/10.3390/electronics11152385 - 30 Jul 2022
Cited by 7 | Viewed by 1324
Abstract
In 6G-enabled vehicle ad hoc networks (VANETs), the messages transmitted through wireless communication face security problems such as tampering and disclosure. In this paper, to ensure the security of transmitted messages and the privacy of vehicle users, we propose an anonymous and secure [...] Read more.
In 6G-enabled vehicle ad hoc networks (VANETs), the messages transmitted through wireless communication face security problems such as tampering and disclosure. In this paper, to ensure the security of transmitted messages and the privacy of vehicle users, we propose an anonymous and secure message authentication (ASMA) scheme. The ASMA scheme can realize message verification and conditional privacy preservation with a lower computation overhead, and its security does not depend on a tamper-proof device (TPD). As the numbers of vehicles and applications increase in 6G-enabled VANETs, the number of messages in the network increases greatly. One-by-one verification messages in the ASMA scheme cannot meet the strict low-latency requirements. To improve the efficiency of the ASMA scheme, we investigate a proxy-vehicle-assisted batch message authentication (PVBA) scheme. In the scheme, a proxy vehicle selection algorithm is designed to choose a certain number of proxy vehicles, and the message verification tasks are completed by a roadside unit (RSU) and the proxy vehicles synchronously. Performance analysis shows that in the case of large-scale messages, the PVBA scheme has lower verification delay than related schemes, and the verification efficiency is greatly improved. Full article
(This article belongs to the Special Issue Low-Latency and High-Security Internet of Things towards 6G)
Show Figures

Figure 1

15 pages, 2361 KiB  
Article
A System-Level Performance Evaluation for a 5G System under a Leaky Coaxial Cable MIMO Channel for High-Speed Trains in the Railway Tunnel
by Penghui Liu, Jingran Feng, Weitao Ge, Hailong Wang, Xin Liu, Dongming Wang, Tiecheng Song and Jianping Chen
Electronics 2022, 11(8), 1185; https://doi.org/10.3390/electronics11081185 - 08 Apr 2022
Cited by 3 | Viewed by 1400
Abstract
As one of the typical application scenarios in the fifth generation (5G) mobile communication system, the situation of high-speed mobile communication is receiving increasing attention. The railway tunnel is a typical environment for high-speed mobile communications. Railway tunnels for high-speed trains are generally [...] Read more.
As one of the typical application scenarios in the fifth generation (5G) mobile communication system, the situation of high-speed mobile communication is receiving increasing attention. The railway tunnel is a typical environment for high-speed mobile communications. Railway tunnels for high-speed trains are generally installed with leaky coaxial cables (LCXs), which can radiate and receive electromagnetic waves through slots; thus, providing communication. To evaluate the system-level performance of the LCX channel in a tunnel, we propose a modified geometrically based single-bounce multiple-input-multiple-output (GBSB-MIMO) channel model considering the effect of Doppler spread. The time-domain statistics of the channel model are studied from numerical simulations. Based on the proposed channel model, we also simulate and analyze the effects of different factors on the 5G system-level performance, including the interval of cable slots and the quantity and location of LCX. Full article
(This article belongs to the Special Issue Low-Latency and High-Security Internet of Things towards 6G)
Show Figures

Figure 1

Back to TopTop