sensors-logo

Journal Browser

Journal Browser

Computing and Applications for Wireless and Mobile Networks

A special issue of Sensors (ISSN 1424-8220). This special issue belongs to the section "Sensor Networks".

Deadline for manuscript submissions: 31 August 2024 | Viewed by 3923

Special Issue Editors


E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National United University, Miaoli 360302, Taiwan
Interests: wireless and mobile networks; mobile computing; Internet of Things; cloud computing; artificial intelligence
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Electronic Engineering, National United University, Miaoli 360302, Taiwan
Interests: Internet of Things; deep learning technology; vehicular communications; multimedia communications
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Science and Information Engineering, National Yunlin University of Science and Technology, Douliou 640301, Taiwan
Interests: artificial intelligence; Internet of Things; wireless communication networks; unmanned aerial vehicles
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear Colleagues,

Wireless networking and communication technologies already have huge impact in a wide range of applications, including connected industry 4.0, precision and smart agriculture, robotics, transportation, energy and smart grids, health and fintech, and more. However, wireless networks also face many challenges, mainly caused by communication failures, storage and computation limitations, and limited power supply, which can be effectively addressed by intelligent computing. With the development of wireless networks, edge computing and mobile computing have played a huge role in the application field. Under the framework of mobile computing and wireless networks, users can quickly obtain effective information and save costs. Although mobile computing has achieved good development in communication networks, its security still needs further research and improvement.

This Special Issue welcomes state-of-the-art and high-quality research works describing practical and theoretical solutions to mobile computing, wireless networks, and security.

Potential topics include, but are not limited to:

  • Design, development, and implementation for wireless and mobile networks;
  • Algorithms, architectures, and applications for wireless sensor networks (WSNs), wireless ad hoc networks (WANETs), and vehicular ad hoc networks (VANETs);
  • Algorithms, architectures, and applications for wireless local area networks (WLANs), Internet of Things (IoTs), and unmanned aerial vehicles (UAVs);
  • Algorithms, architectures, and applications for cellular mobile communication networks (5G, B5G, and 6G);
  • Applications for cloud computing, fog computing, and edge computing technologies;
  • Applications for industry 4.0, smart agricultures, and smart cities;
  • Architecture and services for mobile computing and wireless networks;
  • Intelligent computing and applications for wireless and mobile networks;
  • Security and privacy for wireless and mobile networks;
  • Algorithm or protocol design for secure computing systems.

Prof. Dr. Neng-Chung Wang
Dr. Ming-Fong Tsai
Dr. Chao-Yang Lee
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sensors is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2600 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Published Papers (5 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

18 pages, 4028 KiB  
Article
A Hybrid Approach for Energy Consumption and Improvement in Sensor Network Lifespan in Wireless Sensor Networks
by Arif Ullah, Fawad Salam Khan, Zia Mohy-ud-din, Noman Hassany, Jahan Zeb Gul, Maryam Khan, Woo Young Kim, Youn Cheol Park and Muhammad Muqeet Rehman
Sensors 2024, 24(5), 1353; https://doi.org/10.3390/s24051353 - 20 Feb 2024
Viewed by 664
Abstract
In this paper, we propose an improved clustering algorithm for wireless sensor networks (WSNs) that aims to increase network lifetime and efficiency. We introduce an enhanced fuzzy spider monkey optimization technique and a hidden Markov model-based clustering algorithm for selecting cluster heads. Our [...] Read more.
In this paper, we propose an improved clustering algorithm for wireless sensor networks (WSNs) that aims to increase network lifetime and efficiency. We introduce an enhanced fuzzy spider monkey optimization technique and a hidden Markov model-based clustering algorithm for selecting cluster heads. Our approach considers factors such as network cluster head energy, cluster head density, and cluster head position. We also enhance the energy-efficient routing strategy for connecting cluster heads to the base station. Additionally, we introduce a polling control method to improve network performance while maintaining energy efficiency during steady transmission periods. Simulation results demonstrate a 1.2% improvement in network performance using our proposed model. Full article
(This article belongs to the Special Issue Computing and Applications for Wireless and Mobile Networks)
Show Figures

Figure 1

11 pages, 773 KiB  
Article
Examination of Transmission Zeros in the MIMO Sensor-Based Propagation Environment Using a New Geometric Procedure
by Dariusz Pączko and Wojciech P. Hunek
Sensors 2024, 24(3), 954; https://doi.org/10.3390/s24030954 - 01 Feb 2024
Viewed by 415
Abstract
In this paper, we propose the application of a new geometric procedure in order to calculate a set of transmission zeros of a propagation environment. Since the transmission zeros play a crucial role in modern communication systems, there is a need to apply [...] Read more.
In this paper, we propose the application of a new geometric procedure in order to calculate a set of transmission zeros of a propagation environment. Since the transmission zeros play a crucial role in modern communication systems, there is a need to apply the efficient solutions characterized by a maximum speed operation. It turns out that the classical method based on the Smith–McMillan factorization is time-consuming, so its contribution to the detection of transmission zeros could be unsatisfactory. Therefore, in order to fill the gap, we present a new algorithm strictly dedicated to the multivariable telecommunications systems described by the transfer-function approach. Consequently, a set of new achievements resulted, particularly in terms of computational efforts. Indeed, the proposed procedure allows us to overcome obstacles derived from technological limitations. The representative simulation examples confirm the great potential of this new method. Finally, it has been pointed out that the newly introduced geometric-originated approach has significantly reduced the computational burden. Indeed, for the randomly selected matrix of the 5×5 dimension describing the sensor-related propagation environment, two representative scenarios were performed in order to manifest the crucial properties. In the first scenario, the sets of multiple transmission zeros were analyzed, ultimately leading to intriguing results. The Smith–McMillan solution took three times longer to discover the mentioned sets. On the other hand, the second instance brought us the same result. Naturally, the discussed difference has increased as a function of the number of matrix elements. For the square matrices involving 100 components, we have observed the respective differences, both over QI=100 and QII=60. It should be emphasized that the finding derived from the Smith–McMillan factorization corresponds to the geometric-related approach in the context of some mechanisms. This is particularly visible when appointing the greatest common divisors. Full article
(This article belongs to the Special Issue Computing and Applications for Wireless and Mobile Networks)
Show Figures

Figure 1

25 pages, 790 KiB  
Article
Infrastructure-Wide and Intent-Based Networking Dataset for 5G-and-beyond AI-Driven Autonomous Networks
by Jimena Andrade-Hoz, Qi Wang and Jose M. Alcaraz-Calero
Sensors 2024, 24(3), 783; https://doi.org/10.3390/s24030783 - 25 Jan 2024
Viewed by 839
Abstract
In the era of Autonomous Networks (ANs), artificial intelligence (AI) plays a crucial role for their development in cellular networks, especially in 5G-and-beyond networks. The availability of high-quality networking datasets is one of the essential aspects for creating data-driven algorithms in network management [...] Read more.
In the era of Autonomous Networks (ANs), artificial intelligence (AI) plays a crucial role for their development in cellular networks, especially in 5G-and-beyond networks. The availability of high-quality networking datasets is one of the essential aspects for creating data-driven algorithms in network management and optimisation tasks. These datasets serve as the foundation for empowering AI algorithms to make informed decisions and optimise network resources efficiently. In this research work, we propose the IW-IB-5GNET networking dataset: an infrastructure-wide and intent-based dataset that is intended to be of use in research and development of network management and optimisation solutions in 5G-and-beyond networks. It is infrastructure wide due to the fact that the dataset includes information from all layers of the 5G network. It is also intent based as it is initiated based on predefined user intents. The proposed dataset has been generated in an emulated 5G network, with a wide deployment of network sensors for its creation. The IW-IB-5GNET dataset is promising to facilitate the development of autonomous and intelligent network management solutions that enhance network performance and optimisation. Full article
(This article belongs to the Special Issue Computing and Applications for Wireless and Mobile Networks)
Show Figures

Figure 1

19 pages, 2914 KiB  
Article
Nearest Neighbour Node Deployment Algorithm for Mobile Sensor Networks
by Mahsa Sadeghi Ghahroudi, Alireza Shahrabi and Tuleen Boutaleb
Sensors 2023, 23(18), 7797; https://doi.org/10.3390/s23187797 - 11 Sep 2023
Viewed by 636
Abstract
Many animal aggregations display remarkable collective coordinated movements on a large scale, which emerge as a result of distributed local decision-making by individuals. The recent advances in modelling the collective motion of animals through the utilisation of Nearest Neighbour rules, without the need [...] Read more.
Many animal aggregations display remarkable collective coordinated movements on a large scale, which emerge as a result of distributed local decision-making by individuals. The recent advances in modelling the collective motion of animals through the utilisation of Nearest Neighbour rules, without the need for centralised coordination, resulted in the development of self-deployment algorithms in Mobile Sensor Networks (MSNs) to achieve various types of coverage essential for different applications. However, the energy consumption associated with sensor movement to achieve the desired coverage remains a significant concern for the majority of algorithms reported in the literature. In this paper, the Nearest Neighbour Node Deployment (NNND) algorithm is proposed to efficiently provide blanket coverage across a given area while minimising energy consumption and enhancing fault tolerance. In contrast to other algorithms that sequentially move sensors, NNND leverages the power of parallelism by employing multiple streams of sensor motions, each directed towards a distinct section of the area. The cohesion of each stream is maintained by adaptively choosing a leader for each stream while collision avoidance is also ensured. These properties contribute to minimising the travel distance within each stream, resulting in decreased energy consumption. Additionally, the utilisation of multiple leaders in NNND eliminates the presence of a single point of failure, hence enhancing the fault tolerance of the area coverage. The results of our extensive simulation study demonstrate that NNND not only achieves lower energy consumption but also a higher percentage of k-coverage. Full article
(This article belongs to the Special Issue Computing and Applications for Wireless and Mobile Networks)
Show Figures

Figure 1

26 pages, 2807 KiB  
Article
Robust and Efficient Authentication and Group–Proof Scheme Using Physical Unclonable Functions for Wearable Computing
by Sungjin Yu and Youngho Park
Sensors 2023, 23(12), 5747; https://doi.org/10.3390/s23125747 - 20 Jun 2023
Viewed by 1033
Abstract
Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from sensor data. However, wearable computing environments can be fragile to cyber security attacks since adversaries attempt to block, delete, or intercept [...] Read more.
Wearable computing has garnered a lot of attention due to its various advantages, including automatic recognition and categorization of human actions from sensor data. However, wearable computing environments can be fragile to cyber security attacks since adversaries attempt to block, delete, or intercept the exchanged information via insecure communication channels. In addition to cyber security attacks, wearable sensor devices cannot resist physical threats since they are batched in unattended circumstances. Furthermore, existing schemes are not suited for resource-constrained wearable sensor devices with regard to communication and computational costs and are inefficient regarding the verification of multiple sensor devices simultaneously. Thus, we designed an efficient and robust authentication and group–proof scheme using physical unclonable functions (PUFs) for wearable computing, denoted as AGPS-PUFs, to provide high-security and cost-effective efficiency compared to the previous schemes. We evaluated the security of the AGPS-PUF using a formal security analysis, including the ROR Oracle model and AVISPA. We carried out the testbed experiments using MIRACL on Raspberry PI4 and then presented a comparative analysis of the performance between the AGPS-PUF scheme and the previous schemes. Consequently, the AGPS-PUF offers superior security and efficiency than existing schemes and can be applied to practical wearable computing environments. Full article
(This article belongs to the Special Issue Computing and Applications for Wireless and Mobile Networks)
Show Figures

Figure 1

Back to TopTop