scholarly journals AI-Inspired Non-Terrestrial Networks for IIoT: Review on Enabling Technologies and Applications

IoT ◽  
2020 ◽  
Vol 1 (1) ◽  
pp. 21-48
Author(s):  
Emmanouel T. Michailidis ◽  
Stelios M. Potirakis ◽  
Athanasios G. Kanatas

During the last few years, various Industrial Internet of Things (IIoT) applications have emerged with numerous network elements interconnected using wired and wireless communication technologies and equipped with strategically placed sensors and actuators. This paper justifies why non-terrestrial networks (NTNs) will bring the IIoT vision closer to reality by providing improved data acquisition and massive connectivity to sensor fields in large and remote areas. NTNs are engineered to utilize satellites, airships, and aircrafts, which can be employed to extend the radio coverage and provide remote monitoring and sensing services. Additionally, this paper describes indicative delay-tolerant massive IIoT and delay-sensitive mission-critical IIoT applications spanning a large number of vertical markets with diverse and stringent requirements. As the heterogeneous nature of NTNs and the complex and dynamic communications scenarios lead to uncertainty and a high degree of variability, conventional wireless communication technologies cannot sufficiently support ultra-reliable and low-latency communications (URLLC) and offer ubiquitous and uninterrupted interconnectivity. In this regard, this paper sheds light on the potential role of artificial intelligence (AI) techniques, including machine learning (ML) and deep learning (DL), in the provision of challenging NTN-based IIoT services and provides a thorough review of the relevant research works. By adding intelligence and facilitating the decision-making and prediction procedures, the NTNs can effectively adapt to their surrounding environment, thus enhancing the performance of various metrics with significantly lower complexity compared to typical optimization methods.

Author(s):  
Michail Yu. Maslov ◽  
Yuri M. Spodobaev

Telecommunications industry evolution shows the highest rates of transition to high-tech systems and is accompanied by a trend of deep mutual penetration of technologies - convergence. The dominant telecommunication technologies have become wireless communication systems. The widespread use of modern wireless technologies has led to the saturation of the environment with technological electromagnetic fields and the actualization of the problems of protecting the population from them. This fundamental restructuring has led to a uniform dense placement of radiating fragments of network technologies in the mudflow areas. The changed parameters of the emitted fields became the reason for the revision of the regulatory and methodological support of electromagnetic safety. A fragmented structural, functional and parametric analysis of the problem of protecting the population from the technological fields of network technologies revealed uncertainty in the interpretation of real situations, vulnerability, weakness and groundlessness of the methodological basis of sanitary-hygienic approaches. It is shown that this applies to all stages of the electromagnetic examination of the emitting fragments of network technologies. Distrust arises on the part of specialists and the population in not only the system of sanitary-hygienic control, but also the safety of modern network technologies is being called into question. Growing social tensions and radio phobia are everywhere accompanying the development of wireless communication technologies. The basis for solving almost all problems of protecting the population can be the transfer of subjective methods and means of monitoring and sanitary-hygienic control of electromagnetic fields into the field of IT.


Author(s):  
Олег Анатольевич Гришин ◽  
Дина Халитовна Шабаева

Процессы цифровой трансформации, достигая глобальных масштабов развития и распространения, не только затрагивают коммуникационные технологии, но и оказывают преобразовательное воздействие на все сферы социально-правового взаимодействия. Так, киберпространственные механизмы являются частью современного электронного документооборота. Электронная цифровая подпись в настоящее время представляет собой широко распространенный продукт цифрового развития общества. До настоящего периода времени принято было считать, что она обладает характеристиками высокой степени правовой надежности и безопасности. Авторы статьи, анализируя практику правонарушений в сфере применения электронной цифровой подписи, ставят под сомнение данный довод. Отмечая слабые стороны механизма подтверждения правомочным лицом авторства при помощи криптографически преобразованного путем электронного шифрования реквизита документа, они предлагают возможные пути разрешения существующих на современном этапе вопросов данной области социально-правового взаимодействия: обязательного присутствия лица, либо лично, либо он-лайн, с видеофиксацией и его идентификацией. The processes of digital transformation, reaching global scales of development and dissemination affect not only communication technologies, but also have a transformative impact on all spheres of social and legal interaction. Thus, cyberspace mechanisms are part of the modern electronic document flow. Electronic digital signature is currently a widespread product of digital development of society. Until now, it has been generally assumed that it has the characteristics of a high degree of legal reliability and security. The authors of the article, analyzing the practice of offenses in the field of electronic digital signature, question this argument. Noting the weaknesses of the mechanism for confirming authorship by an authorized person with the help of cryptographically-converted by electronic encryption of the document details, they suggest possible ways to resolve existing issues in this area of social and legal interaction at the present stage. Mandatory presence of the person, either in person or online, with video recording and identification.


Author(s):  
Senthil Prabu Ramalingam ◽  
Prabhakar Karthikeyan Shanmugam

Background: The smart grid communication network is constructed with three tiers namely, Home Area Networks (HANs), Neighborhood Area Networks (NANs) and Wide Area Networks (WANs). These networks function with various communication protocols like table protocol, on-demand protocol, Wi-Fi, Zigbee, Z-Wave, Wi-MAX, GSM, LTE, Cognitive Radio Networks. The network interconnection is heterogonous and all appliances have to communicate through the IP gateways. A large amount of data is collected from various sensors placed in different locations. The analytics on large data- “big data” is essential because these data were used to organize and plan an efficient control and management of the smart home including secured data exchange in different sectors. Objective: This paper investigates broadly on data rate, channel bandwidth, power consumption, and a coverage range of both wired and wireless communication technologies used in residential buildings. Besides, a literature survey on optimization algorithms with various constraints to manage home appliances through scheduling is included. The paper also discusses the communication standards along with security and privacy requirements for smart metering networks. Conclusion: Discussion on IEEE standards for both wired and wireless communication protocols. Gives direction to identify the suitable communication technique through mathematical model for computing the communication channel bandwidth. Comparison of various optimization algorithms with multiple constraints in HEMS to achieve the minimum electricity cost and user comfort (with and without Renewable Energy Sources). From the investigation on both wired and wireless networks, the wireless communication networks (Zig-Bee & Wi-Fi) are mostly preferred to use in HAN because of more reliability and low cost. Zigbee is the most appropriate technology used for data transmission between the individual appliances and smart meters. Wi-Fi is a suitable technology for controlling and monitoring appliances because of its high data rate.


Sensors ◽  
2018 ◽  
Vol 18 (11) ◽  
pp. 4075 ◽  
Author(s):  
Ali Balador ◽  
Anis Kouba ◽  
Dajana Cassioli ◽  
Fotis Foukalas ◽  
Ricardo Severino ◽  
...  

Cooperative Cyber-Physical Systems (Co-CPSs) can be enabled using wireless communication technologies, which in principle should address reliability and safety challenges. Safety for Co-CPS enabled by wireless communication technologies is a crucial aspect and requires new dedicated design approaches. In this paper, we provide an overview of five Co-CPS use cases, as introduced in our SafeCOP EU project, and analyze their safety design requirements. Next, we provide a comprehensive analysis of the main existing wireless communication technologies giving details about the protocols developed within particular standardization bodies. We also investigate to what extent they address the non-functional requirements in terms of safety, security and real time, in the different application domains of each use case. Finally, we discuss general recommendations about the use of different wireless communication technologies showing their potentials in the selected real-world use cases. The discussion is provided under consideration in the 5G standardization process within 3GPP, whose current efforts are inline to current gaps in wireless communications protocols for Co-CPSs including many future use cases.


2010 ◽  
Vol 48 (5) ◽  
pp. 156-162 ◽  
Author(s):  
Kashif Dar ◽  
Mohamed Bakhouya ◽  
Jaafar Gaber ◽  
Maxime Wack ◽  
Pascal Lorenz

Author(s):  
S. R. PATIL ◽  
SNEHAL SALUNKHE ◽  
NIKITA KULKARNI ◽  
PRIYANKA SAVANT

ample efforts have been taken in restaurant sector to intrigue the dining experience. Several information and communication technologies have been adopted earlier such as PDA; wireless communication technologies etc.These technologies provide a simple but powerful infrastructure. This paper highlights the limitations of the existing technologies and proposed the E-CONVERSE, which focuses on low cost touch-screen development to enhance the dining experience. In this paper we discuss the design and implementation of a low cost, customizable touch screen. To ensure the security of the system some security strategies are discussed. Basic level testing reveals that proposed system has potential for practical implementation and can overcome several drawbacks of existing system.


2021 ◽  
Author(s):  
Silvio Mandelli ◽  
Alessandro Lieto ◽  
Mark Razenberg ◽  
Andreas Weber ◽  
Thorsten Wild

Abstract One of the current 6G wireless networks research's trends is to investigate short distance and dense scenarios, where users are locally connected in sub-networks. Such use case is critical to support the advances of industrial internet of things or Industry 4.0, e.g. connecting an entire group of sensors and actuators of a robot. Therefore, schemes that can properly manage the interference must be deployed in practical systems to allow the promised performance advances of 6G . Targeting these high density scenarios, we describe the Power Optimization for Low Interference and Throughput Enhancement (POLITE) paradigm for link adaptation and power allocation, which leverages available radio resources to stabilize and reduce the interference. The baseline link adaptation schemes are compared with POLITE in their performance in a 3GPP -calibrated system level simulator for industrial scenarios. As services in industrial environments require high reliability under constrained delays, we propose different delay-aware formulations in the POLITE design. In this work we provide solutions both for relaxed delay requirements and for latency critical traffic, whose delay must be minimized. In particular, in the latter case, we propose also modifications of user selection and resource allocation procedures to further improve the reliability and latency. Simulation results prove the benefits of POLITE in terms of increased throughput, fulfillment of relaxed and delay-critical requirements, with an overall reduced transmit power compared to the current baseline link adaptation schemes.


Sign in / Sign up

Export Citation Format

Share Document