sustainability-logo

Journal Browser

Journal Browser

Developing 5G/6G Wireless Technologies for Sustainable Communication Systems

A special issue of Sustainability (ISSN 2071-1050).

Deadline for manuscript submissions: closed (31 August 2022) | Viewed by 23113

Special Issue Editors


E-Mail Website
Guest Editor

E-Mail Website
Guest Editor
Department of Engineering, Sunway University, 47500 Selangor, Malaysia
Interests: aerial wireless communications; beyond 5G; channel modeling; IoT; wireless communications; low altitude platform; radio frequency propagation; rural wireless communications
Special Issues, Collections and Topics in MDPI journals

E-Mail Website
Guest Editor
Department of Computer Engineering, Faculty of Engineering and Architecture, Istanbul Gelisim University Istanbul, 34310 Istanbul, Turkey
Interests: cryptography; Internet of Things; authentication; authenticated encryption; blockchains; and 6G communication
Special Issues, Collections and Topics in MDPI journals

Special Issue Information

Dear colleagues,

The standardization of fifth-generation (5G) mobile communication network technologies has been completed, and 5G is expected to be deployed around most of the world by the end of 2020. To ensure continuity and competitiveness in wireless communication systems, efforts from industry and academia have started to conceptualize the next generation of wireless communication systems, also known as sixth generation (6G). The sixth generation aims to provide revolutionary communication services and applications to meet the future demands in the 2030s while promoting sustainable development to the environment. The aim of this Special Issue is to highlight the most promising lines of research, which share common directions toward sustainable 5G and 6G communication systems.

This Special Issue encourages researchers to present original and recent developments in fundamental theory, performance limits, design, management issues, and challenges and promising solutions for sustainable 5G and 6G communication systems. Topics of interest include but are not limited to the following areas:

  • Energy-aware design of 5G/6G transmissions and communication systems;
  • Wireless energy transfers and energy harvesting for sustainable 5G/6G systems;
  • Potential 5G/6G applications toward sustainable development growth;
  • Transdisciplinary approaches toward sustainable 5G/6G developments and implementations;
  • Application of information theory to the 5G/6G communication systems;
  • Big data and edge AI technology as enablers for 5G/6G communication systems;
  • Novel interference solutions and resource controls for 5G/6G communication systems;
  • Cell-free massive MIMO for 5G/6G communication systems;
  • Propagation modeling on millimeter waves and terahertz spectrum;
  • High intelligence versus privacy and complexity;
  • Three-dimensional integrated communications;
  • Ultra-reliable low-latency communications;
  • Security and reliability issues with 6G/IoT.

We hope this Special Issue will achieve a precise, concrete, and concise conclusion that contributes significantly to opening new horizons for future research directions.

Dr. Mohammed Alsharif
Prof. Rosdiadee Nordin
Prof. Shehzad Ashraf Chaudhry
Guest Editors

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Sustainability is an international peer-reviewed open access semimonthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 2400 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • 5G/6G Wireless networks
  • Terahertz communications
  • mmWave communications
  • Wirelessly powered communications
  • Holographic communications
  • Tactile communications
  • Low-latency communications
  • Massive MIMO for 5G/6G communication systems
  • AI technology for 5G/6G communication systems
  • Blockchains

Published Papers (10 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

13 pages, 1327 KiB  
Article
An Energy Efficient Local Popularity Based Cooperative Caching for Mobile Information Centric Networks
by Javed Iqbal, Zain ul Abideen, Nadia Ali, Saddam Hussain Khan, Azizur Rahim, Ali Zahir, Syed Agha Hassnain Mohsan and Mohammed H. Alsharif
Sustainability 2022, 14(20), 13135; https://doi.org/10.3390/su142013135 - 13 Oct 2022
Cited by 1 | Viewed by 1374
Abstract
The usage of social media applications such as Youtube, Facebook, and other applications is rapidly increasing with each passing day. These applications are used for uploading informational content such as images, videos, and voices, which results in exponential traffic overhead. Due to these [...] Read more.
The usage of social media applications such as Youtube, Facebook, and other applications is rapidly increasing with each passing day. These applications are used for uploading informational content such as images, videos, and voices, which results in exponential traffic overhead. Due to these overheads (high bandwidth consumption), the service providers fail to provide high-speed and low latency internet to users around the globe. The current internet cannot cope with such high data traffic due to its fixed infrastructure (host centric-network) degrading the network performance. A new internet paradigm known as Information Centric Networks (ICN) was introduced based on content-oriented addressing. The concept of ICN is to entertain the request locally by neighbor nodes without accessing the source, which will help offload the network’s data traffic. ICN can mitigate traffic overhead and meet future Internet requirements. In this work, we propose a novel decentralized placement scheme named self-organized cooperative caching (SOCC) for mobile ICN to improve the overall network performance through efficient bandwidth utilization and less traffic overhead. The proposed scheme outperforms the state-of-the-art schemes in terms of energy consumption by 55%, average latency, and cache hit rate by a minimum of 35%. Full article
Show Figures

Figure 1

11 pages, 2332 KiB  
Article
A Generalized Approach on Outage Performance Analysis of Dual-Hop Decode and Forward Relaying for 5G and beyond Scenarios
by Daljeet Singh, Mohamed Amine Ouamri, Mohammed Saleh Ali Muthanna, Abuzar B. M. Adam, Ammar Muthanna, Andrey Koucheryavy and Ahmed A. Abd El-Latif
Sustainability 2022, 14(19), 12870; https://doi.org/10.3390/su141912870 - 09 Oct 2022
Cited by 10 | Viewed by 1432
Abstract
This paper presents a generalized approach to the performance analysis of relay-aided communication systems for 5G-and-beyond scenarios. A dual-hop decoding and forwarding scheme is considered in the analysis. The relationship between the outage performance and cumulative distribution function (CDF) of the signal-to-noise ratio [...] Read more.
This paper presents a generalized approach to the performance analysis of relay-aided communication systems for 5G-and-beyond scenarios. A dual-hop decoding and forwarding scheme is considered in the analysis. The relationship between the outage performance and cumulative distribution function (CDF) of the signal-to-noise ratio (SNR) is exploited to derive a universal expression of the outage probability that is valid for all fading scenarios, irrespective of their nature or complexity. Furthermore, an effort is made to parameterize the channel PDF in such a manner that reflects a practical fading scenario that is commonly encountered in current and future wireless communication systems. The analytical results obtained for various cases are validated through Monte-Carlo simulations. Full article
Show Figures

Figure 1

20 pages, 1300 KiB  
Article
Incentive-Based Schema Using Game Theory in 5/6G Cellular Network for Sustainable Communication System
by Muhammad Asif, Eid Rehman, Tahir Saleem, Muhammad Abid, Muhammad Habib, Muhammad Aslam and Syeda Fizzah Jilani
Sustainability 2022, 14(16), 10163; https://doi.org/10.3390/su141610163 - 16 Aug 2022
Cited by 2 | Viewed by 1408
Abstract
Due to the technological advancement in cellular networks, massive data traffic appends to the existing digital technologies. These emerging digital technologies face quality of service (QoS) challenges, particularly when it comes to maintaining the tradeoffs between customers and service providers. The cellular service [...] Read more.
Due to the technological advancement in cellular networks, massive data traffic appends to the existing digital technologies. These emerging digital technologies face quality of service (QoS) challenges, particularly when it comes to maintaining the tradeoffs between customers and service providers. The cellular service providers are trying to meet the needs of end users by handling four substantially different types of data, i.e., Real Time, Video, Audio, and Text, with each type having its own requirements. To achieves an efficient QoS, different incentive-based algorithms were proposed. However, these schemes do not ensure a fair distribution of profit among the mobile network operator and access points. Furthermore, these schemes do not provide efficient QoS to the end user and cannot ensure a fair distribution of channels in crowning time. We propose an incentive-based scheme using game theory and two-stage Stackelberg approach for integrated data, offloading the decision-making process in a heterogeneous network. A single mobile base station and some integrated access points in a crowded metropolitan area are modeled in our proposed scheme. This station offers an economic incentive based on traffic types, and access points compete with each other to earn incentives for offload traffic. A mathematical game is derived to analyze the real-world scenario through simulation. The experimental method is applied to validate the numerical outcomes by comparing the results with other models. Full article
Show Figures

Figure 1

25 pages, 3820 KiB  
Article
Formal Modeling of IoT-Based Distribution Management System for Smart Grids
by Shaheen Kousar, Nazir Ahmad Zafar, Tariq Ali, Eman H. Alkhammash and Myriam Hadjouni
Sustainability 2022, 14(8), 4499; https://doi.org/10.3390/su14084499 - 10 Apr 2022
Cited by 8 | Viewed by 3091
Abstract
The smart grid is characterized as a power system that integrates real-time measurements, bi-directional communication, a two-way flow of electricity, and evolutionary computation. The power distribution system is a fundamental aspect of the electric power system in order to deliver safe, efficient, reliable, [...] Read more.
The smart grid is characterized as a power system that integrates real-time measurements, bi-directional communication, a two-way flow of electricity, and evolutionary computation. The power distribution system is a fundamental aspect of the electric power system in order to deliver safe, efficient, reliable, and resilient power to consumers. A distribution management system (DMS) begins with the extension of the Supervisory Control and Data Acquisition (SCADA) system through a transmission network beyond the distribution network. These transmission networks oversee the distribution of energy generated at power plants to consumers via a complex system of transformers, substations, transmission lines, and distribution lines. The major challenges that existing distribution management systems are facing, maintaining constant power loads, user profiles, centralized communication, and the malfunctioning of system equipment and monitoring huge amounts of data of millions of micro-transactions, need to be addressed. Substation feeder protection abruptly shuts down power on the whole feeder in the event of a distribution network malfunction, causing service disruption to numerous end-user clients, including industrial, hospital, commercial, and residential users. Although there are already many traditional systems with the integration of smart things at present, there are few studies of those systems reporting runtime errors during their implementation and real-time use. This paper presents the systematic model of a distribution management system comprised of substations, distribution lines, and smart meters with the integration of Internet-of-Things (IoT), Nondeterministic Finite Automata (NFA), Unified Modeling Language (UML), and formal modeling approaches. Non-deterministic finite automata are used for automating the system procedures. UML is used to represent the actors involved in the distribution management system. Formal methods from the perspective of the Vienna Development Method-Specification Language (VDM-SL) are used for modeling the system. The model will be analyzed using the facilities available in the VDM-SL toolbox. Full article
Show Figures

Figure 1

16 pages, 4075 KiB  
Article
Detection of Multiple Drones in a Time-Varying Scenario Using Acoustic Signals
by Zahoor Uddin, Aamir Qamar, Abdullah G. Alharbi, Farooq Alam Orakzai and Ayaz Ahmad
Sustainability 2022, 14(7), 4041; https://doi.org/10.3390/su14074041 - 29 Mar 2022
Cited by 2 | Viewed by 1899
Abstract
Detection of unauthorized drones is mandatory for defense organizations and also for human life protection. Currently, detection methods based on thermal, video, radio frequency (RF) and acoustic signals exist. In previous research, we presented an acoustic signals-based multiple drones detection technique utilizing independent [...] Read more.
Detection of unauthorized drones is mandatory for defense organizations and also for human life protection. Currently, detection methods based on thermal, video, radio frequency (RF) and acoustic signals exist. In previous research, we presented an acoustic signals-based multiple drones detection technique utilizing independent component analysis (ICA) in the presence of interfering sources. In this paper, a method is proposed in which the mixed signals are first separated taking the ICA technique into account. After extracting the features, the support vector machines (SVM) and the k-nearest neighbors (KNN) are used to identify multiple drones in the field. This technique can detect multiple drones in static and quasi-static mixing scenarios, while failing in time-varying scenarios. In this paper, a time-varying drone detection technique (TVDDT) is proposed that first stores a data set of the mixed signals in a time-varying scenario, where time variations occur within the processing data blocks. After estimating the mixing matrices, we developed a technique to track variations in the channel. This technique is based on variations in the mixing coefficients. The proposed channel tracking technique performs classification and detection based on minimum variation criteria in the channel. The proposed TVDDT technique is evaluated through simulations and its superior performance is observed. Full article
Show Figures

Figure 1

13 pages, 2048 KiB  
Article
A Multi-Message Multi-Receiver Signcryption Scheme with Edge Computing for Secure and Reliable Wireless Internet of Medical Things Communications
by Insaf Ullah, Muhammad Asghar Khan, Ali Alkhalifah, Rosdiadee Nordin, Mohammed H. Alsharif, Abdulaziz H. Alghtani and Ayman A. Aly
Sustainability 2021, 13(23), 13184; https://doi.org/10.3390/su132313184 - 28 Nov 2021
Cited by 6 | Viewed by 2076
Abstract
Thanks to recent advancements in biomedical sensors, wireless networking technologies, and information networks, traditional healthcare methods are evolving into a new healthcare infrastructure known as the Internet of Medical Things (IoMT). It enables patients in remote areas to obtain preventative or proactive healthcare [...] Read more.
Thanks to recent advancements in biomedical sensors, wireless networking technologies, and information networks, traditional healthcare methods are evolving into a new healthcare infrastructure known as the Internet of Medical Things (IoMT). It enables patients in remote areas to obtain preventative or proactive healthcare services at a cheaper cost through the ease of time-independent interaction. Despite the many benefits of IoMT, the ubiquitously linked devices offer significant security and privacy concerns for patient data. In the literature, several multi-message and multi-receiver signcryption schemes have been proposed that use traditional public-key cryptography, identity-based cryptography, or certificateless cryptography methods to securely transfer patient health-related data from a variety of biomedical sensors to healthcare professionals. However, certificate management, key escrow, and key distribution are all complications with these methods. Furthermore, in terms of IoMT performance and privacy requirements, they are impractical. This article aims to include edge computing into an IoMT with secure deployment employing a multi-message and multi-receiver signcryption scheme to address these issues. In the proposed method, certificate-based signcryption and hyperelliptic curve cryptography (HECC) have been coupled for excellent performance and security. The cost study confirms that the proposed scheme is better than the existing schemes in terms of computational and communication costs. Full article
Show Figures

Figure 1

16 pages, 386 KiB  
Article
Sustainable Delay Minimization Strategy for Mobile Edge Computing Offloading under Different Network Scenarios
by Admoon Andrawes, Rosdiadee Nordin, Zaid Albataineh and Mohammed H. Alsharif
Sustainability 2021, 13(21), 12112; https://doi.org/10.3390/su132112112 - 02 Nov 2021
Cited by 6 | Viewed by 2318
Abstract
The development of mobile edge computing (MEC) is expected to offer better performance in mobile communications than the current cloud computing architecture. MEC involves offering the closest access to the data source or physical mobile network environment. The network services are able to [...] Read more.
The development of mobile edge computing (MEC) is expected to offer better performance in mobile communications than the current cloud computing architecture. MEC involves offering the closest access to the data source or physical mobile network environment. The network services are able to respond faster, thus satisfying the demands of the mobile network industry when deploying various potential business applications in real-time. Since the harvested mobile data are transferred to the edge server to make calculations, data transfers and faults in the mobile network can be swiftly pinpointed and removed accurately. Nevertheless, there are still problems in the practical application of the systems, specifically in reducing delays and lessening energy consumption. Because of non-orthogonal multiple access (NOMA) superior spectrum efficiencies, it is best to combine NOMA with MEC for simultaneous support of multiple access for end users, thus reducing transmission latencies and lowering energy consumption. Combining MEC and NOMA would offer many advantages, including superior energy savings, reductions in latency, massive connectivity, and the potential of combining with additional transmission technologies, such as millimetre-wave (mmWave) and M-MIMO. In this paper, designing wireless resource allocation is crucial for an economically viable low-latency wireless network, which can be realised using the Karush–Kuhn–Tucker (KKT) approach to obtain the optimal solution for partial and full offloading network traffic scenarios to minimize the total latency of the MEC network. The convergence and performance for orthogonal multiple access (OMA), pure-NOMA (P-NOMA), and hybrid-NOMA (H-NOMA) are also compared under different network traffic offloading scenarios. The significant results from this study showed the convergence of the optimal resource allocation in the case of full and partial offloading. The results demonstrated that the P-NOMA reduces the total offloading delay by about 11%. Full article
Show Figures

Figure 1

19 pages, 4028 KiB  
Article
A Novel Handover Mechanism of PMIPv6 for the Support of Multi-Homing Based on Virtual Interface
by Indumathi Lakshmi Krishnan, Fadi Al-Turjman, Ramesh Sekaran, Rizwan Patan and Ching-Hsien Hsu
Sustainability 2021, 13(21), 11743; https://doi.org/10.3390/su132111743 - 24 Oct 2021
Viewed by 1690
Abstract
The Proxy Mobile IPv6 (PMIPv6) is a network-based accessibility managing protocol. Because of PMIPv6’s network-based approach, it accumulates the following additional benefits, such as discovery, efficiency. Nonetheless, PMIPv6 has inadequate sustenance for multi-homing mechanisms, since every mobility session must be handled through a [...] Read more.
The Proxy Mobile IPv6 (PMIPv6) is a network-based accessibility managing protocol. Because of PMIPv6’s network-based approach, it accumulates the following additional benefits, such as discovery, efficiency. Nonetheless, PMIPv6 has inadequate sustenance for multi-homing mechanisms, since every mobility session must be handled through a different binding cache entry (BCE) at a local mobility anchor (LMA) according to the PMIPv6 specification, and thus PMIPv6 merely permits concurrent admittance for the mobile node (MN) which is present in the multi-homing concept. Consequently, when a multi-homed MN interface is detached from its admittance network, the LMA removes its moving part from the BCE, and the current flows connected with the apart interface are not transmitted to the multi-homed MN, even if a more multi-homed MN interface is still linked to another access network. A superior multi-homing support proposal is proposed to afford flawless mobility among the interfaces for a multi-homed MN to address this problem. The projected method can shift an application from a disconnected interface of a multi-home MN to an attached interface using the PMIPv6 fields of Auxiliary Advertisement of Neighbor Detection (AAND). Full article
Show Figures

Figure 1

19 pages, 2809 KiB  
Article
An Anonymous Certificateless Signcryption Scheme for Secure and Efficient Deployment of Internet of Vehicles
by Insaf Ullah, Muhammad Asghar Khan, Mohammed H. Alsharif and Rosdiadee Nordin
Sustainability 2021, 13(19), 10891; https://doi.org/10.3390/su131910891 - 30 Sep 2021
Cited by 12 | Viewed by 2190
Abstract
Internet of Vehicles (IoV) is a specialized breed of Vehicular Ad-hoc Networks (VANETs) in which each entity of the system can be connected to the internet. In the provision of potentially vital services, IoV transmits a large amount of confidential data through networks, [...] Read more.
Internet of Vehicles (IoV) is a specialized breed of Vehicular Ad-hoc Networks (VANETs) in which each entity of the system can be connected to the internet. In the provision of potentially vital services, IoV transmits a large amount of confidential data through networks, posing various security and privacy concerns. Moreover, the possibility of cyber-attacks is comparatively higher when data transmission takes place more frequently through various nodes of IoV systems. It is a serious concern for vehicle users, which can sometimes lead to life-threatening situations. The primary security issue in the provision of secure communication services for vehicles is to ensure the credibility of the transmitted message on an open wireless channel. Then, receiver anonymity is another important issue, i.e., only the sender knows the identities of the receivers. To guarantee these security requirements, in this research work, we propose an anonymous certificateless signcryption scheme for IoV on the basis of the Hyperelliptic Curve (HEC). The proposed scheme guarantees formal security analysis under the Random Oracle Model (ROM) for confidentiality, unforgeability, and receiver anonymity. The findings show that the proposed scheme promises better security and reduces the costs of computation and communication. Full article
Show Figures

Figure 1

12 pages, 884 KiB  
Article
Comparative Analysis of Data Detection Techniques for 5G Massive MIMO Systems
by Mahmoud A. Albreem, Arun Kumar, Mohammed H. Alsharif, Imran Khan and Bong Jun Choi
Sustainability 2020, 12(21), 9281; https://doi.org/10.3390/su12219281 - 09 Nov 2020
Cited by 13 | Viewed by 2597
Abstract
Massive multiple-input multiple-output (MIMO) is a backbone technology in the fifth-generation (5G) and beyond 5G (B5G) networks. It enhances performance gain, energy efficiency, and spectral efficiency. Unfortunately, a massive number of antennas need sophisticated processing to detect the transmitted signal. Although a detector [...] Read more.
Massive multiple-input multiple-output (MIMO) is a backbone technology in the fifth-generation (5G) and beyond 5G (B5G) networks. It enhances performance gain, energy efficiency, and spectral efficiency. Unfortunately, a massive number of antennas need sophisticated processing to detect the transmitted signal. Although a detector based on the maximum likelihood (ML) is optimal, it incurs a high computational complexity, and hence, it is not hardware-friendly. In addition, the conventional linear detectors, such as the minimum mean square error (MMSE), include a matrix inversion, which causes a high computational complexity. As an alternative solution, approximate message passing (AMP) algorithm is proposed for data detection in massive MIMO uplink (UL) detectors. Although the AMP algorithm is converging extremely fast, the convergence is not guaranteed. A good initialization influences the convergence rate and affects the performance substantially together and the complexity. In this paper, we exploit several free-matrix-inversion methods, namely, the successive over-relaxation (SOR), the Gauss–Seidel (GS), and the Jacobi (JA), to initialize the AMP-based massive MIMO UL detector. In other words, hybrid detectors are proposed based on AMP, JA, SOR, and GS with an efficient initialization. Numerical results show that proposed detectors achieve a significant performance enhancement and a large reduction in the computational complexity. Full article
Show Figures

Figure 1

Back to TopTop