Sign in to use this feature.

Years

Between: -

Subjects

remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline
remove_circle_outline

Journals

Article Types

Countries / Regions

Search Results (103)

Search Parameters:
Keywords = OMNeT++

Order results
Result details
Results per page
Select all
Export citation of selected articles as:
16 pages, 2345 KiB  
Article
Performance Evaluation of Routing Algorithm in Satellite Self-Organizing Network on OMNeT++ Platform
by Guoquan Wang, Jiaxin Zhang, Yilong Zhang, Chang Liu and Zhaoyang Chang
Electronics 2024, 13(19), 3963; https://doi.org/10.3390/electronics13193963 - 9 Oct 2024
Viewed by 574
Abstract
Self-organizing networks of small satellites have gradually gained attention in recent years. However, self-organizing networks of small satellites have high topological change frequency, large transmission delay, and complex communication environments, which require appropriate networking and routing methods. Therefore, this paper, considering the characteristics [...] Read more.
Self-organizing networks of small satellites have gradually gained attention in recent years. However, self-organizing networks of small satellites have high topological change frequency, large transmission delay, and complex communication environments, which require appropriate networking and routing methods. Therefore, this paper, considering the characteristics of satellite networks, proposes the shortest queue length-cluster-based routing protocol (SQL-CBRP) and has built a satellite self-organizing network simulation platform based on OMNeT++. In this platform, functions such as the initial establishment of satellite self-organizing networks and cluster maintenance have been implemented. The platform was used to verify the latency and packet loss rate of SQL-CBRP and to compare it with Dijkstra and Greedy Perimeter Stateless Routing (GPSR). The results show that under high load conditions, the delay of SQL-CBRP is reduced by up to 4.1%, and the packet loss rate is reduced by up to 7.1% compared to GPSR. When the communication load is imbalanced among clusters, the delay of SQL-CBRP is reduced by up to 12.7%, and the packet loss rate is reduced by up to 16.7% compared to GPSR. Therefore, SQL-CBRP performs better in networks with high loads and imbalance loads. Full article
Show Figures

Figure 1

12 pages, 2244 KiB  
Article
Securing IoT Networks from DDoS Attacks Using a Temporary Dynamic IP Strategy
by Ahmad Hani El Fawal, Ali Mansour, Mohammad Ammad Uddin and Abbass Nasser
Sensors 2024, 24(13), 4287; https://doi.org/10.3390/s24134287 - 1 Jul 2024
Viewed by 1140
Abstract
The progression of the Internet of Things (IoT) has brought about a complete transformation in the way we interact with the physical world. However, this transformation has brought with it a slew of challenges. The advent of intelligent machines that can not only [...] Read more.
The progression of the Internet of Things (IoT) has brought about a complete transformation in the way we interact with the physical world. However, this transformation has brought with it a slew of challenges. The advent of intelligent machines that can not only gather data for analysis and decision-making, but also learn and make independent decisions has been a breakthrough. However, the low-cost requirement of IoT devices requires the use of limited resources in processing and storage, which typically leads to a lack of security measures. Consequently, most IoT devices are susceptible to security breaches, turning them into “Bots” that are used in Distributed Denial of Service (DDoS) attacks. In this paper, we propose a new strategy labeled “Temporary Dynamic IP” (TDIP), which offers effective protection against DDoS attacks. The TDIP solution rotates Internet Protocol (IP) addresses frequently, creating a significant deterrent to potential attackers. By maintaining an “IP lease-time” that is short enough to prevent unauthorized access, TDIP enhances overall system security. Our testing, conducted via OMNET++, demonstrated that TDIP was highly effective in preventing DDoS attacks and, at the same time, improving network efficiency and IoT network protection. Full article
(This article belongs to the Special Issue Intelligent Technologies and Applications of Wireless Sensor Networks)
Show Figures

Figure 1

17 pages, 6505 KiB  
Article
Analysis of E2E Delay and Wiring Harness in In-Vehicle Network with Zonal Architecture
by Chulsun Park, Chengyu Cui and Sungkwon Park
Sensors 2024, 24(10), 3248; https://doi.org/10.3390/s24103248 - 20 May 2024
Viewed by 863
Abstract
With recent advances in vehicle technologies, in-vehicle networks (IVNs) and wiring harnesses are becoming increasingly complex. To solve these challenges, the automotive industry has adopted a new zonal-based IVN architecture (ZIA) that connects electronic control units (ECUs) according to their physical locations. In [...] Read more.
With recent advances in vehicle technologies, in-vehicle networks (IVNs) and wiring harnesses are becoming increasingly complex. To solve these challenges, the automotive industry has adopted a new zonal-based IVN architecture (ZIA) that connects electronic control units (ECUs) according to their physical locations. In this paper, we evaluate how the number of zones in the ZIA affects the end-to-end (E2E) delay and the characteristics of the wiring harnesses. We evaluate the impact of the number of zones on E2E delay through the OMNeT++ network simulator. In addition, we theoretically predict and analyze the impact of the number of zones on the wiring harnesses. Specifically, we use an asymptotic approach to analyze the total length and weight evolution of the wiring harnesses in ZIAs with 2, 4, 6, 8, and 10 zones by incrementally increasing the number of ECUs. We find that as the number of zones increases, the E2E delay increases, but the total length and weight of the wiring harnesses decreases. These results confirm that the ZIA effectively uses the wiring harnesses and mitigates network complexity within the vehicle. Full article
(This article belongs to the Section Vehicular Sensing)
Show Figures

Figure 1

22 pages, 5052 KiB  
Article
Low-Cost, Open-Source, Experimental Setup Communication Platform for Emergencies, Based on SD-WAN Technology
by Vasileios Cheimaras, Spyridon Papagiakoumos, Nikolaos Peladarinos, Athanasios Trigkas, Panagiotis Papageorgas, Dimitrios D. Piromalis and Radu A. Munteanu
Telecom 2024, 5(2), 347-368; https://doi.org/10.3390/telecom5020018 - 2 May 2024
Viewed by 1676
Abstract
The rapid advancement of communication technologies underscores the urgent need for robust and adaptable emergency communication systems (ECSs), particularly crucial during crises and natural disasters. Although network-based ECSs have been extensively studied, integrating open-source technologies, such as software-defined wide area networks (SD-WAN) with [...] Read more.
The rapid advancement of communication technologies underscores the urgent need for robust and adaptable emergency communication systems (ECSs), particularly crucial during crises and natural disasters. Although network-based ECSs have been extensively studied, integrating open-source technologies, such as software-defined wide area networks (SD-WAN) with private long-term evolution (LTE) base stations, is a relatively unexplored domain. This study endeavors to fill this gap by introducing an experimental ECS platform that utilizes a hybrid network, incorporating a VoIP network to enhance open-source and on-premises communications in targeted areas. Our hypothesis posits that a hybrid network architecture, combining SD-WAN and private LTE, can substantially improve the reliability and efficiency of ECSs. Our findings, supported by the open-source OMNeT++ simulator, illuminate the enhanced communication reliability of the network. Moreover, the proposed platform, characterized by autonomous wireless 4G/LTE base stations and an Asterisk VoIP server, demonstrates improved quality of service (QoS) and quality of experience (QoE), with minimal data loss. This research not only has immediate practical applications but also bears significant implications for the development of cost-effective, open-source communication networks, optimized for emergencies, critical infrastructure, and remote areas. Full article
Show Figures

Figure 1

27 pages, 6417 KiB  
Article
Secure Data Aggregation Using Authentication and Authorization for Privacy Preservation in Wireless Sensor Networks
by Samuel Kofi Erskine
Sensors 2024, 24(7), 2090; https://doi.org/10.3390/s24072090 - 25 Mar 2024
Viewed by 1217
Abstract
Existing secure data aggregation protocols are weaker to eliminate data redundancy and protect wireless sensor networks (WSNs). Only some existing approaches have solved this singular issue when aggregating data. However, there is a need for a multi-featured protocol to handle the multiple problems [...] Read more.
Existing secure data aggregation protocols are weaker to eliminate data redundancy and protect wireless sensor networks (WSNs). Only some existing approaches have solved this singular issue when aggregating data. However, there is a need for a multi-featured protocol to handle the multiple problems of data aggregation, such as energy efficiency, authentication, authorization, and maintaining the security of the network. Looking at the significant demand for multi-featured data aggregation protocol, we propose secure data aggregation using authentication and authorization (SDAAA) protocol to detect malicious attacks, particularly cyberattacks such as sybil and sinkhole, to extend network performance. These attacks are more complex to address through existing cryptographic protocols. The proposed SDAAA protocol comprises a node authorization algorithm that permits legitimate nodes to communicate within the network. This SDAAA protocol’s methods help improve the quality of service (QoS) parameters. Furthermore, we introduce a mathematical model to improve accuracy, energy efficiency, data freshness, authorization, and authentication. Finally, our protocol is tested in an intelligent healthcare WSN patient-monitoring application scenario and verified using an OMNET++ simulator. Based upon the results, we confirm that our proposed SDAAA protocol attains a throughput of 444 kbs, representing a 98% of data/network channel capacity rate; an energy consumption of 2.6 joules, representing 99% network energy efficiency; an effected network of 2.45, representing 99.5% achieved overall performance of the network; and time complexity of 0.08 s, representing 98.5% efficiency of the proposed SDAAA approach. By contrast, contending protocols such as SD, EEHA, HAS, IIF, and RHC have throughput ranges between 415–443, representing 85–90% of the data rate/channel capacity of the network; energy consumption in the range of 3.0–3.6 joules, representing 88–95% energy efficiency of the network; effected network range of 2.98, representing 72–89% improved overall performance of the network; and time complexity in the range of 0.20 s, representing 72–89% efficiency of the proposed SDAAA approach. Therefore, our proposed SDAAA protocol outperforms other known approaches, such as SD, EEHA, HAS, IIF, and RHC, designed for secure data aggregation in a similar environment. Full article
(This article belongs to the Section Intelligent Sensors)
Show Figures

Figure 1

33 pages, 2374 KiB  
Review
Mathematical Models for Named Data Networking Producer Mobility Techniques: A Review
by Wan Muhd Hazwan Azamuddin, Azana Hafizah Mohd Aman, Hasimi Sallehuddin, Maznifah Salam and Khalid Abualsaud
Mathematics 2024, 12(5), 649; https://doi.org/10.3390/math12050649 - 23 Feb 2024
Cited by 1 | Viewed by 1204
Abstract
One promising paradigm for content-centric communication is Named Data Networking (NDN), which revolutionizes data delivery and retrieval. A crucial component of NDN, producer mobility, presents new difficulties and opportunities for network optimization. This article reviews simulation strategies designed to improve NDN producer mobility. [...] Read more.
One promising paradigm for content-centric communication is Named Data Networking (NDN), which revolutionizes data delivery and retrieval. A crucial component of NDN, producer mobility, presents new difficulties and opportunities for network optimization. This article reviews simulation strategies designed to improve NDN producer mobility. Producer mobility strategies have developed due to NDN data access needs, and these methods optimize data retrieval in dynamic networks. However, assessing their performance in different situations is difficult. Moreover, simulation approaches offer a cost-effective and controlled setting for experimentation, making them useful for testing these technologies. This review analyzes cutting-edge simulation methodologies for NDN producer mobility evaluation. These methodologies fall into three categories: simulation frameworks, mobility models, and performance metrics. Popular simulation platforms, including ns-3, OMNeT++, and ndnSIM, and mobility models that simulate producer movement are discussed. We also examine producer mobility performance indicators, such as handover data latency, signaling cost, and total packet loss. In conclusion, this comprehensive evaluation will help researchers, network engineers, and practitioners understand NDN producer mobility modeling approaches. By knowing these methodologies’ strengths and weaknesses, network stakeholders may make informed NDN solution development and deployment decisions, improving content-centric communication in dynamic network environments. Full article
(This article belongs to the Section Mathematics and Computer Science)
Show Figures

Figure 1

13 pages, 2519 KiB  
Article
Synchronizing TSN Devices via 802.1AS over 5G Networks
by Anas Bin Muslim, Ralf Tönjes and Thomas Bauschert
Electronics 2024, 13(4), 768; https://doi.org/10.3390/electronics13040768 - 15 Feb 2024
Cited by 4 | Viewed by 1530
Abstract
The 3GPP release 16 integrates TSN functionality into 5G and standardizes various options for TSN time synchronization over 5G such as transparent mode and bridge mode. The time domains for the TSN network and the 5G network are kept separate with an option [...] Read more.
The 3GPP release 16 integrates TSN functionality into 5G and standardizes various options for TSN time synchronization over 5G such as transparent mode and bridge mode. The time domains for the TSN network and the 5G network are kept separate with an option to synchronize either of the networks to the other. The TSN time synchronization over 5G is possible either by using the IEEE 1588 generalized Precision Time Protocol (gPTP) based on UDP/IP multicast or via IEEE 802.1AS based on Ethernet PDUs. The INET and Simu5G simulation frameworks, which are both based on the OMNeT++ discrete event simulator, are widely used for simulating TSN and 5G networks. The INET framework comprises the 802.1AS based time synchronization mechanism, and Simu5G provides the 5G user plane carrying IP PDUs. We modified the 802.1AS-based synchronization model of INET so that it works over UDP/IP. With that, it is possible to synchronize TSN slaves (connected to 5G UEs), across a 5G network, with a TSN master clock, present within a TSN network, that is connected to the 5G core network. Our simulation results show that 500 microseconds of synchronization accuracy can be achieved with the corrected asymmetric propagation delay of uplink and downlink between the gNodeB (gNB) and the User Equipment (UE). Furthermore, the synchronization accuracy can be improved if the delay difference between uplink and downlink is known. Full article
(This article belongs to the Special Issue Precise Timing and Security in Internet of Things)
Show Figures

Figure 1

25 pages, 12662 KiB  
Article
A Self-Localization Algorithm for Mobile Targets in Indoor Wireless Sensor Networks Using Wake-Up Media Access Control Protocol
by Rihab Souissi, Salwa Sahnoun, Mohamed Khalil Baazaoui, Robert Fromm, Ahmed Fakhfakh and Faouzi Derbel
Sensors 2024, 24(3), 802; https://doi.org/10.3390/s24030802 - 25 Jan 2024
Cited by 3 | Viewed by 1287
Abstract
Indoor localization of a mobile target represents a prominent application within wireless sensor network (WSN), showcasing significant values and scientific interest. Interference, obstacles, and energy consumption are critical challenges for indoor applications and battery replacements. A proposed tracking system deals with several factors [...] Read more.
Indoor localization of a mobile target represents a prominent application within wireless sensor network (WSN), showcasing significant values and scientific interest. Interference, obstacles, and energy consumption are critical challenges for indoor applications and battery replacements. A proposed tracking system deals with several factors such as latency, energy consumption, and accuracy presenting an innovative solution for the mobile localization application. In this paper, a novel algorithm introduces a self-localization algorithm for mobile targets using the wake-up media access control (MAC) protocol. The developed tracking application is based on the trilateration technique with received signal strength indication (RSSI) measurements. Simulations are implemented in the objective modular network testbed in C++ (OMNeT++) discrete event simulator using the C++ programming language, and the RSSI values introduced are based on real indoor measurements. In addition, a determination approach for finding the optimal parameters of RSSI is assigned to implement for the simulation parameters. Simulation results show a significant reduction in power consumption and exceptional accuracy, with an average error of 1.91 m in 90% of cases. This method allows the optimization of overall energy consumption, which consumes only 2.69% during the localization of 100 different positions. Full article
(This article belongs to the Section Sensor Networks)
Show Figures

Figure 1

17 pages, 4765 KiB  
Article
Satellite-Assisted Disrupted Communications: IoT Case Study
by Georgios Koukis and Vassilis Tsaoussidis
Electronics 2024, 13(1), 27; https://doi.org/10.3390/electronics13010027 - 20 Dec 2023
Cited by 1 | Viewed by 1468
Abstract
In recent years, the space industry has witnessed a resurgence, characterized by a notable proliferation of satellites operating at progressively lower altitudes, promising extensive global coverage and terrestrial-level data transfer speeds, while remaining cost-effective solutions. In particular, Wireless Sensor Networks (WSNs) can benefit [...] Read more.
In recent years, the space industry has witnessed a resurgence, characterized by a notable proliferation of satellites operating at progressively lower altitudes, promising extensive global coverage and terrestrial-level data transfer speeds, while remaining cost-effective solutions. In particular, Wireless Sensor Networks (WSNs) can benefit from the wide coverage of space infrastructure due to their extensive deployment, disrupted communication nature, and the potential absence of terrestrial support. This study explored the utility of Low-Earth Orbit (LEO) satellite constellations as a communication infrastructure for interconnecting “smart” devices via ground stations in Internet of Things (IoT) scenarios. To this end, we designed and implemented a series of experiments conducted within the OMNeT++ simulator, utilizing an updated iteration of the original Open Source Satellite Simulator (OS3) framework. Our research encompassed an IoT Case Study, incorporating authentic sensor data sourced from the Smart Santander testbed. Throughout our experimentation, we investigated the impact of the constellation design parameters such as the number of satellites and orbital planes, as well as the inter-satellite link configuration on the obtained Round-Trip Time (RTT) and packet loss rates. Full article
(This article belongs to the Section Networks)
Show Figures

Figure 1

1771 KiB  
Proceeding Paper
QoS Performance Evaluation for Wireless Sensor Networks: The AQUASENSE Approach
by Sofia Batsi and Stefano Tennina
Eng. Proc. 2023, 58(1), 113; https://doi.org/10.3390/ecsa-10-16181 - 15 Nov 2023
Viewed by 448
Abstract
The AQUASENSE project is a multi-site Innovative Training Network (ITN) that focuses on water and food quality monitoring by using Internet of Things (IoT) technologies. This paper presents the communication system suitable for supporting the pollution scenarios examined in the AQUASENSE project. The [...] Read more.
The AQUASENSE project is a multi-site Innovative Training Network (ITN) that focuses on water and food quality monitoring by using Internet of Things (IoT) technologies. This paper presents the communication system suitable for supporting the pollution scenarios examined in the AQUASENSE project. The proposed system is designed and developed in the SimuLTE/OMNeT++ simulation for simulating an LTE network infrastructure connecting the Wireless Sensors Network (WSN) with a remote server, where data are collected. In this frame, two network topologies are studied: Scenario A, a single-hop (one-tier) network, which represents a multi-cell network where multiple sensors are associated with different base stations, sending water measurements to the remote server through them, and Scenario B, a two-tier network, which is again a multi-cell network, but this time, multiple sensors are associated to local aggregators, which first collect and aggregate the measurements and then send them to the remote server through the LTE base stations. For these topologies, from the network perspective, delay and goodput parameters are studied as representative performance indices in two conditions: (i) periodic monitoring, where the data are transmitted to the server at larger intervals (every 1 or 2 s), and (ii) alarm monitoring, where the data are transmitted more often (every 0.5 or 1 s); and by varying the number of sensors to demonstrate the scalability of the different approaches. Full article
Show Figures

Figure 1

1220 KiB  
Proceeding Paper
Optimizing the Energy Efficiency in 5G Security Systems for Intrusion Detection with an Emphasis on DDOS Assaults
by Umar Danjuma Maiwada, Kamaluddeen Usman Danyaro, Aliza Bt Sarlan, Aminu Aminu Muazu and Abubakar Rufai Garba
Eng. Proc. 2023, 56(1), 324; https://doi.org/10.3390/ASEC2023-15258 - 26 Oct 2023
Viewed by 486
Abstract
In response to the rising demand for new and existing use cases of energy efficiency, the telecoms sector is going through a dramatic shift toward 5G technology. High data speeds, extensive coverage provided by dense base station deployment, higher capacity, improved Quality of [...] Read more.
In response to the rising demand for new and existing use cases of energy efficiency, the telecoms sector is going through a dramatic shift toward 5G technology. High data speeds, extensive coverage provided by dense base station deployment, higher capacity, improved Quality of Service (QoS), and extremely low latency are required for 5G wireless networks. New deployment methods, networking architectures, processing technologies, and storage solutions must be created to satisfy the anticipated service requirements of 5G technologies. These developments further increase the need to secure the security of 5G systems and their functionality as well as energy efficiency problems. Indeed, 5G system security is the target of intense efforts by developers and academics in this industry. Significant security concerns for 5G networks have been identified with extensive research. Attackers can make use of vulnerabilities like traffic and the flow base by introducing malicious code and performing other nefarious deeds to take advantage of the system. On 5G networks, attack techniques such as model node map (MNmap), power depletion assaults, and Man-in-the-Middle (MiTM) assaults can be effectively used. However, this study analyses 5G technology’s current energy efficiency problems. We recommend an unusual intrusion detection system (IDS) that makes use of Traffic Volume methods. Considering this investigation, we propose an enhancing training process by including statistical analysis on Distributed Denial-of-Service (DDoS) threats, which is how prior research recommended using OMNET and NS-3 on IDS for optimization. Additionally, the methodology for incorporating the suggested intrusion detection systems within a typical 5G architecture is presented by our research using NETSIM. The paper also offers a planned system’s correction method, providing a useful implementation after completing analysis. Full article
(This article belongs to the Proceedings of The 4th International Electronic Conference on Applied Sciences)
Show Figures

Figure 1

26 pages, 7410 KiB  
Article
Design of a Technique for Accelerating the WSN Convergence Process
by Jozef Papan, Ivana Bridova and Adam Filipko
Sensors 2023, 23(21), 8682; https://doi.org/10.3390/s23218682 - 24 Oct 2023
Cited by 1 | Viewed by 891
Abstract
A wireless sensor network (WSN) is a network that monitors the physical environment using small and energy-efficient sensor devices. The wide application of WSNs has caused them to be used in critical applications that require a quick response, even at the cost of [...] Read more.
A wireless sensor network (WSN) is a network that monitors the physical environment using small and energy-efficient sensor devices. The wide application of WSNs has caused them to be used in critical applications that require a quick response, even at the cost of higher consumption. In recent years, Fast Reroute (FRR) technology has been developed, which accelerates network recovery after line or node failure. This technology plays an important role in connection recovery and data recovery, which helps speed up detection and redirect traffic. In our work, we created a new modification of the Ad hoc On-Demand Distance Vector (AODV) routing protocol, where we added the fast detection of link failure used in the FRR area. This modification rapidly increased connection recovery time and was tested in the OMNET++ simulation environment. The modification was implemented based on an additional RFC 5880 Bidirectional Forwarding Detection (BFD) module, which speeds up failure detection by sending quick “Hello” messages. Full article
(This article belongs to the Special Issue Wireless Sensor Networks and IoT for Smart City)
Show Figures

Figure 1

8 pages, 1448 KiB  
Proceeding Paper
Which Simulator to Choose for Next Generation Wireless Network Simulations? NS-3 or OMNeT++
by Sohaib Manzoor, Mahak Manzoor, Hira Manzoor, Durr E Adan and Muhammad Akbar Kayani
Eng. Proc. 2023, 46(1), 36; https://doi.org/10.3390/engproc2023046036 - 28 Sep 2023
Cited by 2 | Viewed by 2380
Abstract
A common medium access control (MAC) protocol used in Wi-Fi networks is the distributed coordination function (DCF). In the past few decades, a number of network simulators have been developed to validate their analytical models for DCF and other MAC protocols, among which [...] Read more.
A common medium access control (MAC) protocol used in Wi-Fi networks is the distributed coordination function (DCF). In the past few decades, a number of network simulators have been developed to validate their analytical models for DCF and other MAC protocols, among which OMNET has gained popularity. NS3 and OMNET provide fundamental modeling framework for the IEEE 802.11 MAC and PHY layers. In this paper, we conducted a comparative study of a unified IEEE 802.11 DCF analytical model with NS3 and OMNET for performance evaluation. Various access modes and different topologies were examined for comparing the theoretical study with the simulators. This study provided a basis that the results obtained from NS3 and OMNET Wi-Fi modules are also credible just like in the theory. Full article
(This article belongs to the Proceedings of The 8th International Electrical Engineering Conference)
Show Figures

Figure 1

15 pages, 7169 KiB  
Article
Network Traffic Prediction Model in a Data-Driven Digital Twin Network Architecture
by Hyeju Shin, Seungmin Oh, Abubakar Isah, Ibrahim Aliyu, Jaehyung Park and Jinsul Kim
Electronics 2023, 12(18), 3957; https://doi.org/10.3390/electronics12183957 - 20 Sep 2023
Cited by 5 | Viewed by 3120
Abstract
The proliferation of immersive services, including virtual reality/augmented reality, holographic content, and the metaverse, has led to an increase in the complexity of communication networks, and consequently, the complexity of network management. Recently, digital twin network technology, which applies digital twin technology to [...] Read more.
The proliferation of immersive services, including virtual reality/augmented reality, holographic content, and the metaverse, has led to an increase in the complexity of communication networks, and consequently, the complexity of network management. Recently, digital twin network technology, which applies digital twin technology to the field of communication networks, has been predicted to be an effective means of managing complex modern networks. In this paper, a digital twin network data pipeline architecture is proposed that demonstrates an integrated structure for flow within the digital twin network and network modeling from a data perspective. In addition, a network traffic modeling technique using data feature extraction techniques is proposed to realize the digital twin network, which requires the use of massive streaming data. The proposed method utilizes the data generated in the OMNeT++ environment and verifies that the learning time is reduced by approximately 25% depending on the feature extraction interval, while the accuracy remains similar. Full article
(This article belongs to the Section Artificial Intelligence)
Show Figures

Figure 1

28 pages, 5492 KiB  
Article
Implementation of MEC-Assisted Collective Perception in an Integrated Artery/Simu5G Simulation Framework
by Gergely Attila Kovács and László Bokor
Sensors 2023, 23(18), 7968; https://doi.org/10.3390/s23187968 - 19 Sep 2023
Cited by 1 | Viewed by 1592
Abstract
Advanced vehicle-to-everything (V2X) safety applications must operate with ultra-low latency and be highly reliable. Therefore, they require sophisticated supporting technologies. This is especially true for cooperative applications, such as Collective Perception (CP), where a large amount of data constantly flows among vehicles and [...] Read more.
Advanced vehicle-to-everything (V2X) safety applications must operate with ultra-low latency and be highly reliable. Therefore, they require sophisticated supporting technologies. This is especially true for cooperative applications, such as Collective Perception (CP), where a large amount of data constantly flows among vehicles and between vehicles and a network intelligence server. Both low and high-level support is needed for such an operation, meaning that various access technologies and other architectural elements also need to incorporate features enabling the effective use of V2X applications with strict requirements. The new 5G core architecture promises even more supporting technologies, like Multi-access Edge Computing (MEC). To test the performance of these technologies, an integrated framework for V2X simulations with 5G network elements is proposed in the form of combining Simu5G, a standalone 5G implementation, with the go-to V2X-simulator, Artery. As a first step toward a fully functional MEC-assisted CP Service, an extension to Simu5G’s edge implementation is introduced. The edge application is responsible for dispatching the Collective Perception Messages generated by the vehicles via the 5G connectivity so that a MEC server provided by the network can process incoming data. Simulation results prove the operability of the proposed integrated system and edge computing’s potential in assisting V2X scenarios. Full article
(This article belongs to the Special Issue The Intelligent Sensing Technology of Transportation System)
Show Figures

Figure 1

Back to TopTop