Wireless Sensor Network, IoT and Cloud Computing Technologies for Smart Cities

A special issue of Computers (ISSN 2073-431X). This special issue belongs to the section "Internet of Things (IoT) and Industrial IoT".

Deadline for manuscript submissions: 30 September 2024 | Viewed by 4164

Special Issue Editor


E-Mail Website
Guest Editor
Department of Physics and Computer Science. Wilfrid Laurier University, N2L 3C5, Waterloo, ON, Canada
Interests: wireless technologies, standards, and protocols for the next generation communication networks (i.e., 5G/6G , Industrial IoT networks (IIoT)); resource management in 5G/6G and beyond networks; industrial IoT networks; software-defined wireless sensor networks; machine learning application in next generation communication networks

Special Issue Information

Dear Colleagues,

The Special Issue, focusing on “Wireless Sensor Network, IoT, and Cloud Computing Technologies for Smart Cities”, delves into the cutting-edge innovations and applications shaping the future of urban environments. With the rapid advancements of technology, the integration of wireless sensor networks (WSNs), internet of things (IoT), and cloud computing has revolutionized the way cities operate and function.

This Special Issue features research articles, case studies, and reviews that highlight the latest developments in leveraging these technologies to create smart cities. From intelligent transportation systems to energy-efficient buildings, the contributions in this issue showcase how WSNs, IoT, and cloud computing are being harnessed to enhance urban living experiences, improve resource management, and promote environmental sustainability.

By bringing together experts and researchers in the field, this Special Issue serves as a comprehensive resource for understanding the transformative potential of wireless sensor network, IoT, and cloud computing technologies in building the cities of tomorrow.

The key topics of interest include (but are not limited to):

  1. Data Security and Privacy
  2. Energy Efficiency 
  3. Edge Computing and Fog Computing
  4. Ultra-high-speed data transmission
  5. Ultra-low latency communication
  6. Spectrum sharing and management
  7. New technologies, such as non-terrestrial networks and intelligent reflecting surfaces

Dr. Lilatul Ferdouse
Guest Editor

Manuscript Submission Information

Manuscripts should be submitted online at www.mdpi.com by registering and logging in to this website. Once you are registered, click here to go to the submission form. Manuscripts can be submitted until the deadline. All submissions that pass pre-check are peer-reviewed. Accepted papers will be published continuously in the journal (as soon as accepted) and will be listed together on the special issue website. Research articles, review articles as well as short communications are invited. For planned papers, a title and short abstract (about 100 words) can be sent to the Editorial Office for announcement on this website.

Submitted manuscripts should not have been published previously, nor be under consideration for publication elsewhere (except conference proceedings papers). All manuscripts are thoroughly refereed through a single-blind peer-review process. A guide for authors and other relevant information for submission of manuscripts is available on the Instructions for Authors page. Computers is an international peer-reviewed open access monthly journal published by MDPI.

Please visit the Instructions for Authors page before submitting a manuscript. The Article Processing Charge (APC) for publication in this open access journal is 1800 CHF (Swiss Francs). Submitted papers should be well formatted and use good English. Authors may use MDPI's English editing service prior to publication or during author revisions.

Keywords

  • Wireless Sensor Network (WSN)
  • Internet of Things (IoT)
  • cloud computing
  • smart cities
  • sensor data analytics
  • edge computing
  • smart infrastructure
  • data security
  • real-time monitoring
  • energy efficiency
  • smart transportation
  • intelligent reflecting surfaces
  • spectrum efficiency

Benefits of Publishing in a Special Issue

  • Ease of navigation: Grouping papers by topic helps scholars navigate broad scope journals more efficiently.
  • Greater discoverability: Special Issues support the reach and impact of scientific research. Articles in Special Issues are more discoverable and cited more frequently.
  • Expansion of research network: Special Issues facilitate connections among authors, fostering scientific collaborations.
  • External promotion: Articles in Special Issues are often promoted through the journal's social media, increasing their visibility.
  • e-Book format: Special Issues with more than 10 articles can be published as dedicated e-books, ensuring wide and rapid dissemination.

Further information on MDPI's Special Issue polices can be found here.

Published Papers (4 papers)

Order results
Result details
Select all
Export citation of selected articles as:

Research

Jump to: Review

16 pages, 760 KiB  
Article
The Influence of National Digital Identities and National Profiling Systems on Accelerating the Processes of Digital Transformation: A Mixed Study Report
by Abdelrahman Ahmed Alhammadi, Saadat M. Alhashmi, Mohammad Lataifeh and John Lewis Rice
Computers 2024, 13(9), 243; https://doi.org/10.3390/computers13090243 - 23 Sep 2024
Abstract
The United Arab Emirates (UAE) is a frontrunner in digitalising government services, demonstrating the successful implementation of National Digital Identity (NDI) systems. Unlike many developing nations with varying levels of success with electronic ID systems due to legal, socio-cultural, and ethical concerns, the [...] Read more.
The United Arab Emirates (UAE) is a frontrunner in digitalising government services, demonstrating the successful implementation of National Digital Identity (NDI) systems. Unlike many developing nations with varying levels of success with electronic ID systems due to legal, socio-cultural, and ethical concerns, the UAE has seamlessly integrated digital identities into various sectors, including security, transportation, and more, through initiatives like UAE Pass. This study draws on the UAE’s functional digital ID systems, such as those utilised in the Dubai Smart City project, to highlight the potential efficiencies and productivity gains in public services while addressing the associated risks of cybersecurity and privacy. This paper provides a comprehensive understanding of the UAE’s NDI and its impact on the nation’s digital transformation agenda, offering a thorough analysis of the effectiveness and challenges of NDIs, explicitly focusing on the UAE’s approach. Full article
Show Figures

Figure 1

17 pages, 4387 KiB  
Article
Adaptive Load Balancing Approach to Mitigate Network Congestion in VANETS
by Syed Ehsan Haider, Muhammad Faizan Khan and Yousaf Saeed
Computers 2024, 13(8), 194; https://doi.org/10.3390/computers13080194 - 13 Aug 2024
Viewed by 405
Abstract
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, [...] Read more.
Load balancing to alleviate network congestion remains a critical challenge in Vehicular Ad Hoc Networks (VANETs). During route and response scheduling, road side units (RSUs) risk being overloaded beyond their calculated capacity. Despite recent advancements like RSU-based load transfer, NP-Hard hierarchical geography routing, RSU-based medium access control (MAC) schemes, simplified clustering, and network activity control, a significant gap persists in employing a load-balancing server for effective traffic management. We propose a server-based network congestion handling mechanism (SBNC) in VANETs to bridge this gap. Our approach clusters RSUs within specified ranges and incorporates dedicated load balancing and network scheduler RSUs to manage route selection and request–response scheduling, thereby balancing RSU loads. We introduce three key algorithms: optimal placement of dedicated RSUs, a scheduling policy for packets/data/requests/responses, and a congestion control algorithm for load balancing. Using the VanetMobiSim library of Network Simulator-2 (NS-2), we evaluate our approach based on residual energy consumption, end-to-end delay, packet delivery ratio (PDR), and control packet overhead. Results indicate substantial improvements in load balancing through our proposed server-based approach. Full article
Show Figures

Figure 1

23 pages, 8046 KiB  
Article
Enhanced Security Access Control Using Statistical-Based Legitimate or Counterfeit Identification System
by Aisha Edrah and Abdelkader Ouda
Computers 2024, 13(7), 159; https://doi.org/10.3390/computers13070159 - 22 Jun 2024
Viewed by 1026
Abstract
With our increasing reliance on technology, there is a growing demand for efficient and seamless access control systems. Smartphone-centric biometric methods offer a diverse range of potential solutions capable of verifying users and providing an additional layer of security to prevent unauthorized access. [...] Read more.
With our increasing reliance on technology, there is a growing demand for efficient and seamless access control systems. Smartphone-centric biometric methods offer a diverse range of potential solutions capable of verifying users and providing an additional layer of security to prevent unauthorized access. To ensure the security and accuracy of smartphone-centric biometric identification, it is crucial that the phone reliably identifies its legitimate owner. Once the legitimate holder has been successfully determined, the phone can effortlessly provide real-time identity verification for various applications. To achieve this, we introduce a novel smartphone-integrated detection and control system called Identification: Legitimate or Counterfeit (ILC), which utilizes gait cycle analysis. The ILC system employs the smartphone’s accelerometer sensor, along with advanced statistical methods, to detect the user’s gait pattern, enabling real-time identification of the smartphone owner. This approach relies on statistical analysis of measurements obtained from the accelerometer sensor, specifically, peaks extracted from the X-axis data. Subsequently, the derived feature’s probability distribution function (PDF) is computed and compared to the known user’s PDF. The calculated probability verifies the similarity between the distributions, and a decision is made with 92.18% accuracy based on a predetermined verification threshold. Full article
Show Figures

Figure 1

Review

Jump to: Research

29 pages, 742 KiB  
Review
Forensic Investigation, Challenges, and Issues of Cloud Data: A Systematic Literature Review
by Munirah Maher Alshabibi, Alanood Khaled Bu dookhi and M. M. Hafizur Rahman
Computers 2024, 13(8), 213; https://doi.org/10.3390/computers13080213 - 22 Aug 2024
Viewed by 836
Abstract
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for forensic analysts, making it necessary for them [...] Read more.
Cloud computing technology delivers services, resources, and computer systems over the internet, enabling the easy modification of resources. Each field has its challenges, and the challenges of data transfer in the cloud pose unique obstacles for forensic analysts, making it necessary for them to investigate and adjust the evolving landscape of cloud computing. This is where cloud forensics emerges as a critical component. Cloud forensics, a specialized field within digital forensics, focuses on uncovering evidence of exploitation, conducting thorough investigations, and presenting findings to law enforcement for legal action against perpetrators. This paper examines the primary challenges encountered in cloud forensics, reviews the relevant literature, and analyzes the strategies implemented to address these obstacles. Full article
Show Figures

Figure 1

Planned Papers

The below list represents only planned manuscripts. Some of these manuscripts have not been received by the Editorial Office yet. Papers submitted to MDPI journals are subject to peer-review.

Title: Enhancing Information Exchange in Ship Maintenance through Digital Twins and IoT: A Comprehensive Framework
Author: Mateichyk
Highlights: The article proposed and evaluated a comprehensive framework integrating Digital Twins and the Internet of Things to enhance information exchange in ship maintenance. The results demonstrate that the integration of these technologies can significantly improve the efficiency and effectiveness of maintenance practices, leading to reduced operational costs and extended asset lifespans.

Back to TopTop