Editorial: Current and Future Trends in Wireless Communications Protocols and Technologies
- 767 Downloads
Information and Communications Technology (ICT) has significantly progressed in recent years by relying heavily on wireless communications. Currently, most of the devices and systems are connected via wireless technologies and numerous emerging solutions and applications are proposed based on wireless communications. Further, with the introduction of concepts such as Internet of Things (IoTs), nearly countless number of devices will be connected in a global network through wireless interfaces, using standard protocol solutions. The connectivity of these plethora of devices will be heavily relying on wireless communications and therefore, the challenges such as scalability, reliability, signal coexistence, data rate and energy consumption faced by the existing systems need to be thoroughly analyzed. In addition, the proposal for 5G technologies aims to provide very high data-rates, massive number of devices connectivity, very high reliability and low latencies. Therefore, efforts are underway to consider beyond state of-the-art protocols and mechanisms for wireless communication. Thus, the next generation of wireless communication is expected to meet the demands of various challenging use cases that go far beyond distribution of voice, video and data. Therefore, this special issue aims to present the solutions that address the challenges wireless communication systems are facing.
Therefore, European Alliance for Innovation (EAI) took a step towards the realization of Future Intelligent Vehicular Technologies based on dependable and real-time communication and invite both academic and industrial research community by organizing the 2nd edition of Future 5 V conference in Islamabad, Pakistan. Future 5 V is an annual international conference by EAI (European Alliance for Innovation) and co-sponsored by Springer. Future 5V received more than 150 research articles in field of Vehicular networks/communications covering theory and practices in the after mentioned field of study. The call-for-papers of this SI was an outcome of the 2st EAI International Conference on Future Intelligent Vehicular Technologies and open submission. Following are the details of the accepted papers in this special issue.
The first paper is “The Model Design of Mobile Resource Scheduling in Large Scale Activities” by Cai-Qiu Zhou et al. In this paper, the authors have presented work on multi-resource scheduling model based on Dijkstra and multi-ant colony optimization algorithms. The concept model of mobile resource scheduling is put forward, and the detailed introduction of each dimension is presented and multi-resource scheduling model based on Dijkstra and multi-ant colony optimization algorithms are established respectively. Furthermore, the advantages and disadvantages of the two algorithms are compared through the numerical examples. It has been presented that Dijkstra algorithm is superior to multi-ant colony optimization algorithm in the cost control, but in the running time of the algorithm, multi-ant colony optimization algorithm is better than Dijkstra algorithm. The research has practical significance for the development of scientific and effective population service operation plan and service management plan for large scale exhibition activities.
The next accepted paper is “A Novel On-Line Association Algorithm for Supporting Load Balancing in Multiple-AP Wireless LAN” by Liang Sun et al. It has been presented that wireless LAN has become the most widely deployed technology in mobile devices for providing Internet access. Operators and service providers remarkably increase the density of wireless access points in order to provide their subscribers with better connectivity and user experience. As a result, WLAN users usually find themselves covered by multiple access points and have to decide which one to associate with. The authors have proposed a novel on-line association algorithm to deal with any sequence of STAs during a long-term time such as one day. The performance of the proposed algorithm is evaluated through simulation and experiments. Simulation results show that our algorithm improves the overall WLAN throughput by up to 37%, compared with the conventional RSSI-based approach. The presented algorithm also performs better than SSF (Strongest Signal First) and LAB (Largest Available Bandwidth) in the experiments.
The next paper is “GCC: Group-based CSI Feedback Compression for MU-MIMO Networks” by Jian Fang et al. The Multi-user Multiple Input Multiple Output networks (MU-MIMO) adopts beamforming to enable Access Point (AP) to transmit packets concurrently to multiple users, which brings formidable overhead. The overhead of collecting Channel State Information (CSI) feedback matrix may even overwhelm real-data transmission when the scale of network is large, which incurs unsatisfactory performance and huge waste of resources. Therefore, in this paper, the authors have addressed this problem using GCC which is a Group-based CSI feedback Compression scheme for MU-MIMO networks. It enables users to feedback their CSI in terms of group determined by their location. The GCC limit the quantity of CSI feedback in each transmission round regardless of the size of network by allowing the location-related users to share a CSI matrix. In addition, the authors have used a novel metric to do the tradeoff between throughput and capacity loss of the system. GCC has been tested in different scenarios and compared it with existing works. The evaluation result showed that GCC achieved much higher throughput and is robust to various situations.
Since the The growth and adoption of the Internet of Things (IoT) is increasing day by day and it has become a very hot research topic. We have considered a paper for publication that has presented a Framework for trust management in IoT. The paper is tittled “Clustering-Driven Intelligent Trust Management Methodology for The Internet of Things” by Mohammad Dahman Alshehri et al. One possible approach to achieve IoT security is to enable a trustworthy IoT environment in IoT wherein the interactions are based on the trust value of the communicating nodes. The authors have proposed a methodology for scalable trust management solution in the IoT. The methodology addresses practical and pressing issues related to IoT trust management such as trust-based IoT clustering, intelligent methods for countering bad-mouthing attacks on trust systems, issues of memory-efficient trust computation and trust-based migration of IoT nodes from one cluster to another. Experimental results demonstrate the effectiveness of the proposed approaches.
A comprehensive study on designing an energy-aware architectures for Wireless Sensor Networks is presented in the next accepted paper. The paper is “Designing an Energy-Aware Mechanism for Lifetime Improvement of Wireless Sensor Networks: A Comprehensive Study”. The authors have also analysed and proposed a scheme, Extended-Multilayer Cluster Designing Algorithm (E-MCDA) in a large network. Among its components, algorithms for time slot allocation, minimising the CH competition candidates, and cluster member selection to CH play underpinning roles to achieve the target. The authors have done simulations in NS2 to evaluate the performance of E-MCDA in energy consumption at various aspects of energy, packets transmission, the number of designed clusters, the number of nodes per cluster and unclustered nodes. It is found that the proposed mechanism optimistically outperforms the competition with MCDA and EADUC.
The next paper is “Rule based (Forward Chaining/Data Driven) Expert System for Node Level Congestion Handling in Opportunistic Network” by Ahthasham Sajid et al. The paper is about Opportunistic networks which are part of the most popular categories of Mobile Ad hoc networks. One of the challenge is the selection of best custodian node that can store messages at its buffer until a destination node is found. The important features of the Delay Tolerant Network (DTN) are a selection of the best forwarding nodes and co-ordination among the nodes to deliver the packets to their destination in an efficient manner with less loss and maximum delivery rate. Therefore, in this paper, the authors have presented a rule based efficient expert system to address and handle storage level congestion issues. The proposed technique has been tested and validated via Opportunistic network environment and compared with MaxProp protocol.
The next paper is “A Comprehensive Analysis of Congestion Control Protocols in Wireless Sensor Networks” by Mian Ahmad Jan et al. In wireless Sensor Networks (WSNs) congestion occurs when the incoming traffic load exceeds the available capacity of the network. The authors have also presented the various factors that lead to congestion in WSNs such as buffer overflow, varying rates of transmission, many-to-one communication paradigm, channel contention and the dynamic nature of a transmission channel. The energy-efficient congestion control protocols need to be designed to detect, notify and control congestion effectively. The authors have present a review of the latest state-of-the-art congestion control protocols. Depending on their inherent nature of control mechanism, these protocols are classified into three categories, i.e., traffic-based, resource-based and hybrid. Traffic-based protocols are further subdivided, based on their hop-by-hop or end-to-end delivery modes. Resource-based control protocols are further analyzed, based on their route establishment approach and efficient bandwidth utilization techniques. In addition, they have discussed the internal operational mechanism of these protocols for congestion alleviation. The authors have concluded that the behaviour of each class of protocols varies with the type of application and a single metric alone cannot precisely detect congestion of the network.
In the last decade, there has been a considerable development in the field of wireless vehicular communications so as to satisfy the requirements of Cooperative Intelligent Transportation Systems (CITS). It is also worth mentioning that currently CITS and intelligent transportation systems are very hot research areas and especially the security of these systems. We have accepted the paper “Implementation and Analysis of IEEE and ETSI Security Standards for Vehicular Communications” by Bruno Fernandes et al. The paper presents the implementation and analysis of the two most used standards for vehicular communications. However, due to the expected popularity of ITS, VANETs could be prone to attacks by malicious sources. To prevent this, security standards, such as IEEE 1609.2 and ETSI ITS’ standards, were developed. In this work, the design and implementation of an API capable of conducting the required cryptographic algorithms and protocols for the transmission of secure messages according to the IEEE 1609.2 and ETSI ITS’ security standards is presented. The implemented security protocols are then integrated into a system emulating a public key infrastructure to evaluate the performance impact on safety-related communications, in particular, the delay associated with the communication’ coding/decoding process.
The next paper is “Performance of Cognitive Radio Sense-and-Wait assisted Hybrid Automatic Repeat reQuest” by Fazlullah Khan et al. In this paper the authors have presented a work on the the cognitive radio (CR) concept which emerges as a promising solution for reducing the spectrum scarcity issue. The CR network is a low cost solution for efficient utilization of the spectrum by allowing secondary users (SUs) to exploit the unoccupied licensed spectrum. The authors have presented the model the PU’s utilization activity by a two-state Discrete-Time-Markov Chain (DTMC) (i.e., Free and busy states), for identifying the temporarily unoccupied spectrum bands,. Furthermore, they have proposed a Cognitive Radio Sense-and-Wait assisted HARQ scheme, which enables the Cluster Head (CH) to perform sensing operation for the sake of determining the PU’s activity. Once the channel is found in free state, the CH advertise control signals to the member nodes for data transmission relying on Stop-and-Wait Hybrid- Automatic Repeat-Request (SW-HARQ). The proposed CRSW assisted HARQ scheme is analytical modeled, based on which the closed-form expressions are derived both for average block delay and throughput. Finally, the correctness of the closed-form expressions are confirmed by the simulation results.
The next accepted paper is “Opportunistic Energy Cooperation Mechanism for Large Internet of Things” by Jinyu Hu et al. In this paper, the authors have focus on energy efficiency maximization and network throughput optimization problems for energy cooperation in Energy Harvesting Cooperative Wireless Sensor Networks (EHC-WSNs). In order to maximize the efficiency of energy charging phase, a Region-based Proactive Energy Cooperation (RPEC) strategy is developed, which is used to charge the life-critical cooperators or receivers in time. Furthermore, by introducing a novel metric that converts optimal forwarder selection from the multi-dimensional problem to one-dimensional problem, an Energy-Neutral based Opportunistic Cooperative Routing (ENOCR) algorithm is proposed to optimize the relay nodes selection and improve the network throughput. The simulations results showed that the proposed mechanism can significantly improve energy efficiency and network lifetime.
The last paper is “User-centric Clustering and Beamforming for Energy Efficiency Optimization in CloudRAN”. In this paper, the authors have considered the problem of how to assign each user to several preferred remote radio heads (RRHs) and design the corresponding beamforming coefficients in a user-centric and energy efficient manner. They have formulated the problem as a joint clustering and beamforming optimization problem, with the objective to maximize the energy efficiency (EE) while satisfying the users’ quality of service (QoS) requirement and respecting the RRHs’ transmit power limits. They have first transform it into an equivalent parametric subtractive problem using the approach in fractional programming, and then it is cast into a tractable convex optimization problem by introducing a lower bound of the objective function. Finally, the structure of the optimal solution is derived and a two-tier iterative scheme is developed to find the clustering pattern and beamforming coefficients that maximize EE. Specially, they have derived a RRH-user association threshold, based on which the RRH clustering pattern and the corresponding beamforming coefficients can be simultaneously determined.